Chapter 4 Flashcards
(CIDR)
Classless inter-domain routing; a standard notation that indicates what portions of an IP address are used for network ID and host ID
binary
using 1s and 0s to represent hexadecimal
You are given the following address: 00-90-4B-AD-2A-AC What type of address is this?
MAC address
The physical address, also known as MAC address, assigned to a NIC by its manufacturer is 48 bits long. Because of the way this address is divided up into two 24-bit parts, each manufacturer has only 16 million or so unique addresses to use before the manufacturer has to start reusing physical addresses.
Public Class C IP range
192.0.0.0 - 223.255.255.255
What technology takes a voice communication, breaks the data into small packets, and sends the packets from one network segment to another?
packet switching
Packet switching opens up connections only long enough for a small data packet to move from one network segment to another. Data—regardless of type, content, or structure—is broken into small blocks called packets and sent to its destination.
What device has each port as its own collision domain?
switch
A basic switch can be referred to as a multiport bridge because like a bridge, it can separate a network out into multiple collision domains.
Which Ethernet standard was developed to work over fiber?
100Base-FX
100Base-FX is the version of Fast Ethernet that is intended to be used over fiber-optic cable. Introduced at the same time as 100Base-TX, 100Base-FX was part of the same IEEE 802.3y standard.
What connects two network segments together, yet only forwards packets based on MAC addresses from one segment to another segment only when needed?
bridge
Bridges are intended to break up networks into smaller sections; as a result, they are more intelligent than your average hub. Because bridges work on the Data-Link layer of the OSI model, they can read and make sense of MAC addresses. Based on these MAC or Physical addresses, a bridge can determine whether a frame is allowed to pass through to the other side of the bridge.
What is a set of agreed-upon instructions designed to allow computers to communicate to each other across a network connection?
protocol
In computer networking, a protocol is a set of agreed-upon instructions designed to allow computers to communicate to each other across a network connection. Many protocols are used in networking because many different tasks need to be done to allow computers to communicate with each other.
What device converts one type of media to another type?
media converter
Media converters are used to convert one type of media to another type. Such devices are used to convert coaxial to twisted pair or fiber to copper. These types of devices are important for allowing two different types of technologies on the same network.
What type of server acts as an intermediary between a client and other servers?
proxy server
Proxy servers act as intermediaries between a client and other servers. They can fulfill many roles and can be used for many different jobs.
public IP address
can be used on the Internet; must be registered with the Network Information Center
What protocol is used to provide bi-directional interactive command-line access to either a remote or local host?
TELNET
TELNET, short for TErminaL NETwork, is used to provide bi-directional interactive command-line access to either a remote or local host. TELNET was first introduced in 1969 in RFC 15. In 1983, TELNET was extended in RFC 854. TELNET client software can be found for pretty much every computer platform out there.
Public Class B IP range
128.0.0.0 - 191.255.255.255
physical address
MAC address; physical binary address that every network device is given when it is created by its manufacturer
Which wireless mode does not use a central WAP?
ad hoc
An ad hoc wireless network is formed when a wireless network is composed of only independent wireless computers in which each device participates in forwarding wireless packets. An ad hoc wireless network has no central WAP to monitor and control it. In effect, an ad hoc wireless network is the wireless network version of a peer-to-peer network.
EUI
Extended Unique Identifiers; the variations of MAC addresses
In what type of technology is the whole message routed to its destination one hop at a time?
message switching
In message switching, whole messages are routed to their destination one hop at a time. Over time, the message switching idea evolved into what we call packet switching today. With message switching, the entire message is sent out at once.
TCP/IP Protocol Suite
A group of protocols to carry out the functions needed to communicate across a network
What helps protect data that is sent using a wireless network?
encryption
Encryption is where a device such as a computer or a WAP takes the data that it is sending out and first runs an algorithm on it so that it cannot be read without first having the key to read it. This capability increases the security of a network by making it more difficult for an outsider to read what is passing across a network.
Which protocol is used to resolve host names to IP addresses?
DNS
Domain Name System (DNS) makes it possible for us to use the Internet the way we do. DNS is the protocol that converts all those URLs we can easily remember to IP addresses that the Internet can use.
What was the first Ethernet standard used on UTP?
10Base-T
While 10Base-T was not the first XBase-Y standard developed, it was the first twisted-pair XBase-Y standard developed. In 1990 IEEE 802.3i formalized the 10Base-T standard. 10Base-T used CAT 3 UTP and could carry 10 mbps throughput for a distance of 100 meters. 10Base-T was a baseband technology. This standard became known as Twisted-Pair Ethernet.
What protocol do multiple switches on the same network use to ensure that an infinite loop is not created?
STP
Spanning Tree Protocol (STP) is used when multiple switches are implemented on the same network. As a Data-Link layer protocol, STP is used primarily to prevent endless loops from developing on switch-based LANs. The protocol gets its name from a mathematical algorithm called “spanning tree,” which takes a group of points and connects them all together without allowing any loops to form.
Which protocol is used to send messages about the network when a route goes bad?
ICMP
The Internet Control Message Protocol (ICMP) is used mainly by a computer’s operating system to send messages about the network. When an error occurs in the IP packet, a service is unreachable or down, a host is not found, or a router is down, among other situations, an ICMP message is sent.
What is used to monitor the activity of a network and notify network administrators when it identifies something as suspicious?
IDS
Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) are related technologies. An IDS usually sits inside a network and monitors the network’s activities. When something suspicious is noted, the IDS then notifies network administrators so that they can take steps to stop the suspect activity. Because an IDS only monitors activity, it is considered passive.
classful subnet mask for a Class C IP address
255.255.255.0
What type of access method does Ethernet use?
CSMA/CD
Carrier Sensing Media Access/Collision Detection (CSMA/CD) is the primary method that Ethernet uses to access wired LANs. Ethernet uses a different method to access wireless LANs.
What is used to protect a network from unauthorized access?
firewall
The firewall that is mentioned here, is not the “firewall” that you load onto your computer to protect it from internet attacks. A firewall is a networking device whose purpose is to prevent unauthorized packets from getting into your network. It is also used as the first line of defense between a private network and the Internet.
private IP address
cannot be used on the Internet; is not registered with the Network Information Center
What is used to determine which upper-layer protocols, services, and processors each data segment is intended for?
port
Protocols on the Transport layer have port addresses, also known as ports. These ports are used to determine which upper-layer protocols, services, and processes each data segment is intended for. Port addresses ensure that the correct protocol, service, or process can get the data intended for it. The two main protocols on the Transport layer, UDP and TCP, both use ports.
When a collision occurs, what do the two sending nodes do?
They both wait a random amount of time and try again.
When computers on the network segment “hear” a collision on the network, they all immediately activate something called a hold-down timer. This timer is effectively a clock that activates in each NIC on the network and starts counting down from a randomly set point of time. While the clock on a particular NIC is counting down, it cannot send any packets. As each computer on the network segment finishes its random countdown, it can begin listening to the network again to find an open point where it can begin to send its data packet.
What type of access method is used in wireless networks?
CSMA/CA
Like CSMA/CD, Carrier Sensing Media Access/Collision Avoidance (CSMA/CA) is a method used by Ethernet to access a local area network. Where CSMA/CD is most commonly used for wired networks, CSMA/CA is most commonly used for wireless networks.
At what OSI layer do routers operate?
Network layer
Network Routers are networking devices used to move packets around a larger network. To do this, they have to be very intelligent and able to read data packets to know where they are intended to go and where they have come from. Because routers are meant to relay based on IP addresses, they work on the Network layer.
IPv4
32 bits long
Which Ethernet frame type supports TCP/IP?
Ethernet II
The most widely used Ethernet frame type is Ethernet II or Ethernet DIX. It is so widely used because the Internet Protocol (IP) can use it directly.