Chapter 4 Flashcards

1
Q

network protocols

A

Network Protocols are rules used by networks to transfer data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

protocol suite

A

Protocol suite is a series of related protocols in which each protocol performs a separate function or a set of related functions and multiple protocols are combined in order to transfer data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

subprotocol

A

Each of the individual protocols within the protocol suite (ex. TCP and IP) are known as a subprotocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is TCP/IP?

A

TCP/IP is a routable protocol suite

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

routable protocol suites

A

Routable protocol suites are capable of spanning more than one
network segment … they support routing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

non-routable protocol suites

A

Non-routable protocol suites (older technology) can be used to communicate within a network but CANNOT be used to communicate with other networks

Non-routable protocol suites are not able to communicate with routers – the mechanism used to communicate with other networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

host

A

In TCP/IP terminology, the term host means the same as the term node in general network terminology

(A device (computer, printer, etc.) that is directly connected to the network)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

TCP/IP is open, rather than proprietary

A

it is not owned

by any company and therefore does not require a license for its use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

TCP/IP and OSI

A

TCP/IP implements all layers of the OSI model; however it does not implement OSI with a one -to-one correlation between TCP/IP sub-protocols and the OSI model

TCP/IP combines the functions performed by layers of the OSI model into its own layers

It is important to note that TCP/IP does not eliminate any of the functions defined in the OSI model; it combines functions of multiple layers into a single TCP/IP layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

TCP/IP core protocols

A

TCP/IP core protocols function at the Transport and Internet (OSI Network layer) and provide basic services to protocols in other layers

Core protocols are generic in that they support all types of applications (Application layer) and physical networks (Network Interface layer)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

transmission control protocol (TCP)

A

Transmission Control Protocol (TCP) operates at the transport layer of the OSI model and provides reliable delivery of data from sender to receiver

(Connection oriented transmission)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

TCP functions

A

Breaking transmission into packets (known as datagrams in TCP/IP) at sender and putting packets back together (including re-sequencing) at the receiver

Error detection and correction to insure that all packets have been received

Use of sending and receiving port numbers to insure that data is sent back and forth between the correct application process running on each computer

Flow control to adjust speed to transmission to the capabilities of the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

datagrams

A

packets in TCP/IP world

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

User datagram Protocol (UDP)

A

User Datagram Protocol (UDP) operates at the transport layer of the OSI model and supports applications that DO NOT require guaranteed delivery of all packets

(Connectionless transmission)

EX: live video and audio transmissions

More efficient than TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Internet Protocol (IP)

A

Internet Protocol (IP) manages the overall movement of data from the sender to the receiver

Functions include managing address translation and routing

IP makes a best effort to deliver the datagrams; determining if they were all delivered properly is the responsibility of TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

IPv4

A

IPv4 (version 4) has been in use for over 30 years and is the standard for most networks and transmissions

Contains multiple problems with the most serious being limitation on the number of available addresses resulting in IPv4 being unable to meet the demands for the large number of networks and hosts on the Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

IPv6 (IPng or IP Next Generation)

A

IPv6 (aka: IPng or IP Next Generation) was released in 1998 and addresses many of the problems of IPv6

Supports a virtually unlimited number of addresses through the use of a new addressing scheme

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Internet Control Message Protocol (ICMP)

A

Internet Control Message Protocol (ICMP) provides the sender with information about the success or failure of data delivery

Delivers Acks and Naks to the sender

Reports when data fails to reach destination due to time outs during transmission (taking too long to reach a destination) or other problems

Provides information that can be used to troubleshoot network problems but does not solve the problems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Internet Group Management Protocol (IGMP)

A

Internet Group Management Protocol (IGMP) manages multicasting for IPv4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

multicasting

A

Allows one host to send data to a defined group of hosts (as opposed to broadcasting which sends to all connected nodes)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Address Resolution Protocol (ARP)

A

Address Resolution Protocol (ARP) converts logical addresses (IP Address) into physical addresses (MAC addresses)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

ICMPv6 (version 6)

A

ICMPv6 (version 6) is used with IPv6 to perform the functions performed by ICMP, IGMP and ARP in IPv4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

TCP/IP physical address

A

known as MAC address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

physical delivery of data

A

The Physical layer function that delivers the frame to a computer or other device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

IP Addresses (TCP/IP logical addresses)

A

IP Addresses (TCP/IP logical addresses) are assigned to a node and can be easily changed if the functions on the node are moved to another node

IP addresses must be translated into MAC address for the actual physical delivery of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

implications of using IP address to identify computer

A

IP addresses are independent of MAC addresses

IP addresses can be moved from one computer to another

NICs can be changed without affecting IP addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

what does the IP address identify?

A

The IP address identifies the network on which a host resides and the host within the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

structure of the IP address

A

Dotted decimal notation

consists of 32 binary bits

each of the numbers in the dotted decimal notation is known as an octet

EX: 00110110 11000110 01101100 00001101
54 . 198 . 108 . 13

The bits on the left side of the IP address represent the address of the network and the bits on the right hand side represent the address of the host

The dividing line between which bits are network and which bits are host varies under different circumstances

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

octet

A

Each of the numbers in the dotted decimal notation is known as an octet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

subnet mask

A

The subnet mask (which accompanies an IP address) determines which positions of the IP address are network and which positions are host

The subnet mask is also a 32 binary number that is represented in dotted decimal notation

Positions in the subnet mask that contain binary ones (1) represent positions in the IP address that are network

Positions in the subnet mask that contain binary zeroes (0) represent positions in the IP address that are host

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

the network portion of the IP address

A

The network portion of the IP address must be

the same for all devices on the same network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

the host portion of the IP address

A

The host portion of the IP address, and therefore the entire IP address, must be different for every host on the network

33
Q

a host address of zeros

A

A host address of zeroes (the host portion of the IP
address; not the entire IP address) is the address of
the network itself.

34
Q

a host address of all 1s

A

A host address of all 1s (in every host address position) is reserved for broadcasts

35
Q

broadcasts

A

A broadcast is a transmission that is sent to all nodes on a network

36
Q

number of potential hosts on any network

A

RULE: number of potential hosts on any network is maximum number of hosts values minus 2 (all zeroes and all ones)

37
Q

every packet requires 128 bits of address data

A

source IP address 32 bits
source subnet mask: 32 bits
destination IP address: 32 bits
destination subnet mask: 32 bits

38
Q

class addressing

A

a scheme known as class addressing was developed that allowed subnet masks to be determined from the contents of the IP address and therefore made it unnecessary to transmit the subnet mask

(This scheme does not eliminate the need for subnet masks; it allows it to be determined and therefore not transmitted.)

39
Q

how class addresses work

A

Class addresses use the first octet of the IP address to determine what subnet mask to use

Class A addresses are addresses where the first octet is in the range from 001 to 126

Class A addresses are automatically assigned a subnet mask of 255.0.0.0

40
Q

class A addresses

A

Class A addresses are addresses where the first octet is in the range from 001 to 126

Class A addresses are automatically assigned a subnet mask of 255.0.0.0

There are only 126 Class A addresses (001 to 126)

These addresses are assigned to many of the organizations that founded the Internet

41
Q

class B addresses

A

Class B addresses are addresses where the first octet is in the range from 128 to 191

Class B addresses are automatically assigned a subnet mask of 255.255.0.0

These addresses are primarily assigned to ISPs and large organizations

42
Q

class C addresses

A

Class C addresses are addresses where the first octet is in the range from 192 to 223

Class C addresses are automatically assigned a subnet mask of 255.255.255.0

43
Q

IPv6 addressing

A

IPv6 addressing uses a 6 sixteen bit fields (a total 128 bits) as opposed to the 32 bit addresses in IPv6

represented ass hexadecimal values separated by colons

consecutive zeros are represented with double colons (::) (Can only occur once within the address)

leading zeros are eliminated

44
Q

Each TCP/IP host on a network would need the following information:

A

IP address that is unique to that network

IPv4 Subnet Mask to be used to interpret the IP Address

Other TCP/IP information such as the address of the router to be used to communicate with other networks

45
Q

static assignment

A

requires manual settings on the host

46
Q

dynamic assignment

A

uses a service on the network (primarily DHCP) to automatically assign addresses and other TCP/IP information

47
Q

Dynamic Host Configuration Protocol (DHCP)

A

is the mechanism currently used for dynamic address assignments

One or more hosts on the network are designated to function as DHCP servers

Can be a stand-alone device or a function running on a server or other host

48
Q

leased IP addresses

A

DHCP assignments expire when a node disconnects from the network or after a set period of time (DHCP lease time)

When the lease is terminated, the assigned IP address is put back into the pool of IP addresses and is available for another assignment

49
Q

IPCONFIG

A

The IPCONFIG command (issued at the command prompt) can be used to manage DHCP settings

/all
/release
/renew

50
Q

reasons for using DHCP

A

Reduce the effort required to manage TCP/IP (especially address assignment)

Reduce the potential for errors when assigning IP addresses and other TCP/IP information

Enable the movement of nodes without having to reconfigure TCP/IP since node will be assigned TCP/IP info upon reconnection to the network

Make IP addressing transparent to users

Large networks can have multiple DHCP servers for load sharing and redundancy

DHCP server can be on another network allowing ISPs to use DHCP to assign IP addresses and other information to their subscribers

51
Q

Automatic Private IP Addressing (APIPA

A

Automatic Private IP Addressing (APIPA) will assign an IPv4 address if DHCP server cannot be access or is not functional

IP address is in the range 169.254.0.0 thru 169.254.255.255 with a Class B subnet mask of 255.255.0.0

This address range IS NOT on your network but is part of a second network containing only devices with APIPA assigned addresses

Other TCP/IP information such as the address of the default gateway (router) is not assigned

APIPA address can only be used to communicate with other network nodes in with 169.254.x.x addresses assigned by APIPA and communications with other networks will not function since default gateway address is not assigned

52
Q

how sockets are used

A

Transport layer on sender determines the port number for the destination process and includes the port number in the Transport layer header

Transport layer on the receiver uses the port number in the Transport layer header to direct the transmission to the appropriate process

53
Q

registered ports

A

Registered Ports (1024 - 49151) are assigned to network users and process

54
Q

dynamic ports

A

Dynamic ports (a.k.a. private ports) (49152 – 65535) are open for general use

Application developers can assign one of these port number to an application and then program the application to use this port number

55
Q

Issues with using IP addresses to identify the source or destination of a transmissions:

A

IP addresses are assigned to host on a network; if the host (ex. a web server) is moved to another network (ex. changing the ISP that hosts your web site), then the host will get a new IP address

If a function (ex. an e-mail server) is moved to a different computer, then that function will have a different IP address (the IP address of the computer that the function was moved to)

Addresses are not “human friendly” and are hard for people to remember

56
Q

TCP/IP names

A

Names can be used to identify a host on a network instead of the IP address for that host
Names are independent of the physical network on which the host resides

Names are human friendly

Names must be resolved to addresses before transmission can occur

57
Q

Fully Qualified Domain Names (FQDN

A

Fully Qualified Domain Names (FQDN) also known as Fully Qualified Host Names (FQHN) identify a host using a host name and a domain name

FQHN consist of a series of character strings (labels) separated by periods

Label on the left [mail] always identifies the host or function

Component on the right is known as the top-level domain (TLD)

58
Q

domain names

A

Domain names are associated with an organization (company, school, government body, association, ISP, etc.)

59
Q

host names

A

Host names are assigned to individual hosts within a domain

60
Q

ICANN

A

ICANN (the Internet naming authority) is responsible for registering domain names

61
Q

second level domain

A

labels between the host name on the left and the TLD on the right are known as the second level domain and identify the organization

Second level domain names can be a simple single label [rmu] or a complex hierarchical structure such as show below

62
Q

HOSTS file

A

A text file that contains host and domain names and corresponding IP addresses

The first place that TCP/IP looks when resolving a name is on the HOSTS file on the sending host

If an entry is found on the HOSTS file, then this IP address will be used and no further attempt at name resolution will be made

63
Q

Domain Name System (DNS)

A

Domain Name System (DNS) is a TCP/IP application layer service that resolves domain and host names in IP addresses

componenets:

resolvers
name servers

64
Q

resolvers

A

component of dns

Resolvers are hosts (any host) that require the resolution of domain names

65
Q

name servers

A

component of dns

Name servers are a hierarchical set of servers that contain names and their associated IP addresses

66
Q

second step in DNS name resolution

A

The first step in DNS name resolution (after the HOSTS file is checked) is to check the LAN DNS server which is the server that contains names for your domain

For individual computers who have a registered name or for networks that do not have a lot of names, the DNS local server is most likely to be at an ISP since there would be no need for a LAN DNS server in these situations

67
Q

third step in DNS name resolution

A

When an LAN DNS server is queried and the name cannot be resolved on this server, then the resolution request is forwarded to the ISP’s DNS server

An ISP’s DNS server would most likely have the names for all networks attached to this ISP and would then resolve these names without having to forward the request to the Internet

68
Q

fourth step in DNS name resolution

A

When a name cannot be resolved at the ISP level (or if the network is directly connected to the Internet and cannot resolve the name on its in-house DNS servers) then the request is
forwarded to DNS servers on the Internet.

The Internet consists of a series of root DNS servers each of which contains names for a specific domain suffix (ex. .COM root servers, .EDU roots servers, etc.)

69
Q

root DNS server

A

The Internet consists of a series of root DNS servers each of which contains names for a specific domain suffix (ex. .COM root servers, .EDU roots servers, etc.)

The contents of root DNS servers can be:

The actual name to be resolved and its IP address

The domain name for a network (ex. rmu.edu) and the IP address of the DNS server (ISP or local) that contains the names for this network

70
Q

Dynamic DNS (DDNS)

A

Dynamic DNS (DDNS) dynamically updates the DNS system when a host’s IP address changes

71
Q

Telnet

A

Telnet is a terminal emulation protocol used to log onto remote
hosts using the TCP/IP protocol suite

72
Q

Hosts

A

Each device on a TCP/IP network is known as a host. A host can be a computer
(a device that is capable of processing data) or a terminal

73
Q

terminal

A

terminal (a device that does

input and/or output but no processing of data).

74
Q

terminal emulation

A

Terminal emulation is the ability to make one computer or terminal, typically a PC, appear to look like another, usually older type of terminal so that a user can access programs originally written to communicate with the other terminal type.

75
Q

FTP (File Transfer Protocol)

A

FTP (File Transfer Protocol) is used to send and retrieve files.

76
Q

TFTP (Trivial File Transfer Protocol)

A

TFTP (Trivial File Transfer Protocol) is used to send and retrieve files but does not guarantee delivery

77
Q

NTP (Network Time Protocol)

A

NTP (Network Time Protocol) is used to synchronize the clocks of computer on a network

78
Q

PING (Packet Internet Groper)

A

PING (Packet Internet Groper) is used to test the functioning of TCP/IP and determine the ability to connect with another host