Chapter 10 Flashcards

1
Q

1000BaseT

A

Ethernet over UTP cables, using hubs to produce a star topology; supports a maximum (theoretical) transmission of 1Gbit/s.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

100BaseT

A

Ethernet over UTP cables, using hubs to produce a star topology; supports a maximum (theoretical) transmission of 100 Mbit/s.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

10BaseT

A

Ethernet over UTP cables, using hubs to produce a star topology; supports a maximum (theoretical) transmission of 10 Mbit/s.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Address Resolution Protocol

A

A protocol used to learn a network hardware address based on an IPv4 address. See Neighbor Discovery Protocol (NDP).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

ARP

A

A protocol used to learn a network hardware address based on an IPv4 address. See Neighbor Discovery Protocol (NDP).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Broadband

A

High-speed (greater than 200Kbps) Internet connections delivered to homes and small businesses.
Networking technologies that support simultaneous transmission of data, voice, and video.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Broadcast

A

A type of network communication in which one computer sends a message to many computers (typically all the computers on the sender’s local network segment).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

CIDR

A

A method of breaking IP addresses into subnets for routing purposes that doesn’t rely on the traditional Class A/B/C distinctions. CIDR is more flexible than the class system but requires certain Internet routers to have larger routing tables.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Classless Inter-Domain Routing (CIDR)

A

A method of breaking IP addresses into subnets for routing purposes that doesn’t rely on the traditional Class A/B/C distinctions. CIDR is more flexible than the class system but requires certain Internet routers to have larger routing tables.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Default route

A

The route that network packets take if a more specific route doesn’t direct them in some other way. The default route typically involves a gateway or router system that can further redirect the packets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

DHCP

A

Provides for automatic downloading of IP address and other configuration data from a server to a client. Allows for reuse of IP addresses so that the number of hosts can exceed the number of available IP addresses. See BOOTP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

DHCP lease

A

A temporary assignment of an IP address to a DHCP client by a DHCP server. Clients must periodically renew their DHCP leases or risk losing the right to use the address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Digital Subscriber Line (DSL)

A

A type of broadband network access provided over telephone lines. Several subtypes of DSL exist, including Asymmetric DSL (ADSL) and Symmetric DSL (SDSL).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

DNS

A

The Domain Name System (DNS) is a distributed database of computers that converts between IP addresses and hostnames.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Domain name

A

A name assigned to a group of computers, such as example.com. Individual computers have hostnames that include the domain name, such as jupiter.example.com.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Dotted quad

A

A method of referring to an IPv4 address or netmask that uses four 1-byte numbers separated by dots (.), as in 192.168.72.27 or 255.255.255.0.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

DSL

A

A type of broadband network access provided over telephone lines. Several subtypes of DSL exist, including Asymmetric DSL (ADSL) and Symmetric DSL (SDSL).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Frame

A

In networking, a data packet associated with network hardware (such as Ethernet) as opposed to the software (such as TCP/IP).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Gigabit Ethernet

A

A variety of Ethernet that can transfer 1,000 megabits (1 gigabit) per second.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Half-duplex

A

A type of data transmission in which data can be sent in only one direction at a time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Hardware Address

A

A code that uniquely identifies a single network interface. This address is built into the device itself rather than assigned in Linux.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Host

A

This program serves as a replacement for the simpler uses of nslookup, but it lacks an interactive mode, and of course many details of its operation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Hostname

A

A computer’s human-readable name, such as persephone.example.com.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Hub

A

Hub
A type of network hardware that serves as a central exchange point in a network. Each computer has a cable that links to the hub, so all data pass through the hub. Hubs echo all data they receive to all the other computers to which they connect. See also switch.
A USB device that can be used to multiply the available connectors; the USB hub plugs into a computer’s USB port, and multiple devices can plug into the USB hub.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

ICMP

A

A type of network packet that’s commonly used to signal error conditions, such as corrupted packets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Internet Control Message Protocol (ICMP)

A

A type of network packet that’s commonly used to signal error conditions, such as corrupted packets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Internet Protocol (IP)

A

An internet-layer protocol that’s an important part of the TCP/IP network stack because it handles data packet exchange based on low-level addressing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

IP

A

An internet-layer protocol that’s an important part of the TCP/IP network stack because it handles data packet exchange based on low-level addressing.

29
Q

IP address

A

A computer’s numeric TCP/IP address, such as 192.168.45.203.

30
Q

IP masquerading

A

A technique in which a router can “hide” a whole network from view, making all the systems look like one computer to the outside world.

31
Q

IPv6

A

The “next-generation” Internet Protocol. This upgrade to TCP/IP allows for a theoretical maximum of approximately 3.4 _ 1038 addresses, as opposed to the 4 billion addresses possible with the older IPv4. Although IPv4 addresses are still available in many regions in late 2012, future growth of the Internet will depend upon IPv6.

32
Q

Localhost

A

A name for the local computer.

33
Q

Loopback address

A

A name that refers to a network interface or address that points back to the computer itself. This is typically the 127.0.0.1 IP address.

34
Q

MAC address

A

A low-level address associated with a piece of network hardware. The MAC address is usually stored on the hardware itself, and it’s used for local network addressing only. Addressing between networks (such as on the Internet) uses higher-level addresses, such as an IP address.

35
Q

Machine name

A

The portion of a hostname that identifies a computer on a network, as opposed to the network as a whole (for instance, ginkgo is the machine name portion of ginkgo.example.com). The machine name is sometimes used in reference to the entire hostname.

36
Q

Media Access Control (MAC) address

A

A low-level address associated with a piece of network hardware. The MAC address is usually stored on the hardware itself, and it’s used for local network addressing only. Addressing between networks (such as on the Internet) uses higher-level addresses, such as an IP address.

37
Q

Multicast

A

A method of sending network data to multiple remote sites. Multicasts differ from broadcasts in that multicasts are more focused, whereas broadcasts are typically sent to all the computers on a network.

38
Q

NAT

A

A technique in which a router can “hide” a whole network from view, making all the systems look like one computer to the outside world.

39
Q

NDP

A

A protocol used to learn a network hardware address based on an IPv6 address. See also Address Resolution Protocol (ARP).

40
Q

Neighbor Discovery Protocol (NDP)

A

A protocol used to learn a network hardware address based on an IPv6 address. See also Address Resolution Protocol (ARP).

41
Q

Netmask

A

network mask: the network part of an IP address; See variable length subnet mask

42
Q

Network

A

An interconnected set of hosts and other network devices which share a common physical layer such as Ethernet, X.25, etc.;See LAN and WAN.

43
Q

Network Address Translation (NAT)

A

A technique in which a router can “hide” a whole network from view, making all the systems look like one computer to the outside world.

44
Q

Network stack

A

A collection of drivers, kernel procedures, and other software that implements a standard means of communicating across a network. Two computers must support compatible protocol stacks to communicate. The most popular protocol stack today is TCP/IP. Also called a network stack.

45
Q

NFS

A

A protocol (developed by Sun Microsystems) enabling a UN*X machine to mount a remote disk area as part of its local filesystem; widely considered of questionable security.

46
Q

Packet

A

A limited amount of data collected together with addressing information and sent over a network.

47
Q

Packet sniffer

A

A program that monitors network traffic at a low level, enabling diagnosis of problems and capturing data. Packet sniffers can be used both for legitimate network diagnosis and for data theft.

48
Q

Point to Point protocol (PPP)

A

A method of initiating a TCP/IP connection between two computers over an RS-232 serial line or modem. See also PPP over Ethernet (PPPoE).

49
Q

Port

A

A number that identifies the program from which a data packet comes or to which it’s addressed. When a program initiates a network connection, it associates itself with one or more ports, enabling other computers to uniquely address the program.

50
Q

Port Number

A

A number that identifies the program from which a data packet comes or to which it’s addressed. When a program initiates a network connection, it associates itself with one or more ports, enabling other computers to uniquely address the program.

51
Q

PPP

A

A method of initiating a TCP/IP connection between two computers over an RS-232 serial line or modem. See also PPP over Ethernet (PPPoE).

52
Q

PPP over Ethernet (PPPoE)

A

A variant of the Point-to-Point Protocol (PPP) that’s optimized for use over Ethernet rather than RS-232 serial connections. PPPoE is used by some DSL providers.

53
Q

PPPoE

A

A variant of the Point-to-Point Protocol (PPP) that’s optimized for use over Ethernet rather than RS-232 serial connections. PPPoE is used by some DSL providers.

54
Q

Privileged Port

A

A port (see port number) that’s numbered less than 1024. Linux restricts access to such ports to root. In networking’s early days, any program running on a privileged port could be considered trustworthy because only programs configured by professional system administrators could be run on such ports. Today, that’s no longer the case. See also unprivileged port.

55
Q

Protocol stack

A

A collection of drivers, kernel procedures, and other software that implements a standard means of communicating across a network. Two computers must support compatible protocol stacks to communicate. The most popular protocol stack today is TCP/IP. Also called a network stack.

56
Q

Reverse lookup

A

A DNS lookup that uses an IP address as a key and that returns a hostname.

57
Q

SLAAC

A

Allows an IPv6 computer to determine its network address automatically by examining traffic on the network.

58
Q

Subdomain

A

A subdivision of a domain. A subdomain may contain computers, subdomains of its own, or both.

59
Q

Subnet mask

A

network mask: the network part of an IP address; See variable length subnet mask.

60
Q

Switch

A

In computer networks, a dedicated hardware used to connect devices and quickly shunt packets through the network.

61
Q

TCP

A

A connection-oriented transport protocol. Connection-oriented transport protocols provide reliable transport, in that if a segment is dropped, the sender can detect that drop and retransmit that dropped segment. Specifically, a receiver acknowledges segments that it receives. Based on those acknowledgments, a sender can determine which segments were successfully received.

62
Q

TCP/IP

A

The protocol suite developed by the Department of Defense (DoD) in conjunction with the Internet. It was designed as an internetworking protocol suite that could route information around network failures. Today it’s the de facto standard for communications on the Internet.

63
Q

Transmission Control Protocol (TCP)

A

A major transport-layer protocol type in modern networking. TCP supports error correction and other features that are helpful in maintaining a link between two computers.

64
Q

TRansmission Control Protocol/Internet Protocol (TCP/IP)

A

The most important protocol stack in common use today, and the basis for the Internet.

65
Q

Twisted-pair

A

A type of wiring in which pairs of wires are wrapped around each other (and typically enclosed in a plastic sheath). Twisted-pair cabling is commonly used for Ethernet and certain other network cabling. Many telephone wires also use twisted-pair cabling.

66
Q

UDP

A

A transport-layer protocol used on the TCP/IP stack. UDP is a simple and efficient protocol, but it lacks error checking and other advanced features that can be helpful in maintaining a connection.

67
Q

Unprivileged Port

A

A port that’s numbered from 1024. Such ports may be accessed by any user and so are commonly used by client programs and by a few servers that may legitimately be run by ordinary users. See also privileged port.

68
Q

User Datagram Protocol (UDP)

A

A transport-layer protocol used on the TCP/IP stack. UDP is a simple and efficient protocol, but it lacks error checking and other advanced features that can be helpful in maintaining a connection.