cs/is 190 midterm review midterm: monday, september 28

37
CS/IS 190 Midterm Review Midterm: Monday, September 28

Upload: barry-houston

Post on 29-Dec-2015

223 views

Category:

Documents


3 download

TRANSCRIPT

CS/IS 190 Midterm Review

Midterm: Monday, September 28

Midterm Overview

• Chapters 2 through 11• Multiple Choice• Similar to questions at the end of each chapter

and in the homework assignments.• 50 questions• You will have the full class time to complete

Chapter 2

• The OSI 7 layer model• Know the layer names & numbers and the major

function(s) of each• 7. Application• 6. Presentation• 5. Session• 4. Transport• 3. Network• 2. Data Link• 1. Physical

Chapter 2

• Layer 2: Data Link• The NIC• MAC addresses

– 2 parts– Broadcast address FF-FF-FF-FF-FF-FF

• Frames– Max size 1500 bytes– CRC’s

• 2 Sublayers– Logical Link Control (LLC)– Media Access Control (MAC)

Chapter 2

• Layer 3 – Network layer• IP Addresses • Example IP: 192.168.4.66• Routers

Chapter 2

• Layer 4 – Transport Layer– Assembly and Disassembly

• Layer 5 – Session Layer– Session tracking– Naming

• Layer 6 – Presentation Layer– Data conversion– Encryption

• Layer 7 – Application Layer– Internet Explorer– Email clients– FTP programs

Chapter 3

• Topology– Bus– Ring– Star– Hybrids– Mesh

• Formula for number of connections in a fully meshed network with x computers: x*(x-1)/2

– Point-to-Multipoint– Point-to-Point

Chapter 3

• Cabling– Coaxial cable

• Connectors: BNC and F-type• RG Ratings

– RG-6– RG-59

– Twisted Pair• Shielded (STP)• Unshielded (UTP)

– Category Ratings: 3, 5, 5e, 6, 6a

• RJ-45 connectors

Chapter 3

• Cabling (continued)– Fiber Optic

• Connectors: ST, SC, LC

– Serial Cables– Parallel Cables– FireWire– Fire Ratings

• Plenum vs. PVC

– IEEE Standards• 802.3 - Ethernet• 802.11 - Wireless LAN and Wi-Fi

Chapter 4

• Ethernet Frames– MAC addresses– Length (1500 bytes Max, 64 bytes min)– Data– Pad– Frame Check Sequence (CRC)

• CSMA/CD– Collision Domain

Chapter 4

• 10BaseT• 10BaseFL• Connecting Ethernet Segments– Daisy Chain hubs– Uplink ports– Crossover cables– Bridges– Switches

• Spanning Tree Protocol (STP)– Detects bridge loops

Chapter 5

• 100BaseT– Auto-negotiation– “Fast Ethernet”

• 100FaseFX• Full Duplex operations• 1000BaseCX

– Twinaxial Cable• 1000BaseSX• 1000BaseLX• 1000BaseT

– Needs Cat5e or higher

Chapter 5

• 10GBaseSR/SW• 10GBaseLR/LW• 10GBaseER/EW• 10GBaseT– Cat 6 – 55 Meters– Cat 6a – 100 Meters

Chapter 6

• Telecomunnications Room• Horizontal Cabling• Solid Core Vs. Stranded Core• Equipment Racks• Patch Panels– 110 block– 66 block

• Demarc

Chapter 6

• Pulling Cable• Rolling your own patch cables• Testing Cable runs• Crosstalk• Time Domain Reflectometer (TDR)• Near End Crosstalk (NEXT)• Far End Crosstalk (FEXT)• Optical Time Domain Reflectometer (OTDR)

Chapter 6

• NICs– PCI– PCI Express– USB– Link Lights– Bonding

• Diagnostics– Lookback plug– Checking lights– Cable Testing– Toners (Fox and Hound)

Chapter 7

• TCP/IP• IP Addresses– 32 bits– Dotted decimal notation– IPCONFIG /ALL (Windows)– IFCONFIG (Unix/Linux/Mac)– 2 parts: Network ID and host ID– Subnet Mask

• Dotted Decimal notation• / notation (/24 or /8 etc)

Chapter 7

• ARP (Address Resolution Protocol)– Arp – a to show ARP table

• Class IDs– Class A – 1 through 126– Class B – 128 through 191– Class C – 192 through 223

• CIDR (Classless Interdomain Routing)• Subnetting

Chapter 7

• Subnetting• Calculate # of hosts given the subnet mask– 2^(# of zeros in subnet mask) – 2

• Decimal to Binary conversion• Binary to Decimal conversion• Static IP Addressing• Dynamic IP Addressing– DHCP– Automatic Private IP Addressing (APIPA)

• 169.254/16

Chapter 7

• Special IP addresses– 127.0.0.0/8• Loopback

– Private IP’s:– 10.0.0.0 /8– 172.16.0.0 /16 through 172.31.0.0 /16– 192.168.0.0/8 through 192.168.255.0 /8

Chapter 8

• Routing• Routing Tables• Default Route• Metric (“cost”)• Network Address Translation (NAT)• NAT, Overloaded• NAT Translation Table

Chapter 8

• Port Forwarding• Port Address Translation• Dynamic Routing– Distance Vector– Convergence– RIPv1– RIPv2– BGP

Chapter 8

• Link State– Open Shortest Path First (OSPF)– IS-IS

• Hybrid– EIGRP

• Traceroute• My Traceroute (MTR)

Chapter 9

• TCP– Connection Oriented

• UDP– Connectionless– TFPT

• ICMP– Ping

• IGMP– Multicasting

Chapter 9

• Port numbers• 0 to 1023 = well known port numbers• 1024 to 49151 = registered port numbers• 49152 to 65535 = dynamic or private ports• Netstat– Netstat –n

• HTTP– Port 80

Chapter 9

• HTTPS– S stands for SSL (Secure Sockets Layer)– Uses port 443

• Telnet– Not secure– Uses port 23

• Rlogin (Remote Login)– Port 513

• RSH (Remote Shell)– Port 514

• RCP (Remote Copy)– Port 514

Chapter 9

• SSH (Secure Shell)– A secure form of telnet– Uses port 22

• Email– SMTP (Simple Mail transport protocol)

• Uses port 25

– POP3 (Post office protocol)• Uses port 110

– IMAP4 (Internet Message Access Protocol)• Uses port 143

Chapter 9

• FTP (File Transfer Protocol)– Uses ports 21 and 20

Chapter 10

• Network Naming• Domain Name System (DNS)• Hosts File• DNS Root Servers• Hierarchical name space• Fully Qualified Domain name (FQDN)• Name Servers

Chapter 10

• Common Internet File System (CIFS)• Ping• IPCONFIG• NSLOOKUP• DIG (Unix/Linux)• WINS• LMHOSTS• NBTSTAT

Chapter 11

• Security• Nonrepudiation• Encryption• Authentication• Authorization• Plaintext• Complete Algorithm• Ciphertext

Chapter 11

• symmetric-key algorithm– DES– RC4– AES

• Asymmetric-key algorithm– RSA

• Hash– MD5– SHA

Chapter 11

• Digital Signatures• Certificates• public-key infrastructure (PKI)• Authorization– access control list (ACL)– mandatory access control (MAC)– Discretionary access control (DAC)– Role-based access control (RBAC)

Chapter 11

• Authentication– Point-to-Point Protocol (PPP)– Password Authentication Protocol (PAP)– Challenge Handshake Authentication Protocol (CHAP)– MS-CHAP and MS-CHAPv2

• Authentication, Authorization, and Accounting (AAA)– RADIUS– Kerberos– Extensible Authentication Protocol (EAP)– 802.1X

Chapter 11

• Encryption• SSH• Tunneling• Secure Sockets Layer (SSL)• Transport Layer Security (TLS)• IPSec– Transport mode and Tunnel mode.

• HTTPS• SFTP, SNMP, NTP

The Midterm

• Bring a #2 pencil and an eraser.• Mr. Hodges will supply the scantron forms.• Closed book, closed note, closed computer.

Questions

• Any Questions?