ccna review Flashcards
Requirements for Internet Connection
Physical connection: used to transfer signals between PCs within the
local network and to remote devices on the Internet
– Logical connection: uses standards called protocols. A protocol is a
formal description of a set of rules and conventions that govern how
devices on a network communicate.
– The application: interprets the data and displays the information in an
understandable form
uses standards called protocols. A protocol is a
formal description of a set of rules and conventions that govern how
devices on a network communicate.
Logical connection:
used to transfer signals between PCs within the
local network and to remote devices on the Internet
Physical connection:
interprets the data and displays the information in an
understandable form
The application:
is a printed circuit
board that provides network communication
capabilities to and from a personal computer
A network interface card (NIC)
is a device that provides the computer with connectivity to a telephone line.
A modem, or modulator-
demodulator,
converts (modulates)
the data from a digital signal to an
analog signal that is compatible
with a standard phone line.
The modem
is a set of protocols or rules
developed to allow cooperating
computers to share resources
across a network.
Transmission Control
Protocol/Internet Protocol (TCP/IP)
is a program that is useful for verifying a
successful TCP/IP installation.
Ping
This ping is unique and is called an internal
loopback test. It verifies the operation of the TCP/IP stack and NIC
transmit/receive function.
ping 127.0.0.1 -
A ping to a host PC verifies the TCP/IP address
configuration for the local host and connectivity to the host.
ping IP address -
Computers operate with electronic switches that are
either
“on” or “off”, corresponding to 1 or 0.
Internet Protocol (IP) addresses assigned to
computers on the Internet are
32-bit binary numbers
The 32-bit binary addresses used on the Internet are
referred to as
Internet Protocol (IP) addresses.
will always be all 1s until the network
address is identified and then be all 0s from there to the
right most bit of the mask.
subnet mask