Client Server 1 Flashcards

1
Q

collection of individual networks, connected by intermediate networking devices, that functions as a single large network.

A

intranetwork

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

evolved around the PC revolution.

A

LAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

interconnect LANs with geographically dispersed users to create connectivity

A

WAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Physical Network Components

A
  1. router
  2. cable
  3. switching equipments
  4. transport stack
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Transport Stack examples

A
  1. TCP/IP
  2. NetBIOS
  3. IPX
  4. DECNet
  5. AppleTalk
  6. APPC
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

conceptual framework which breaks down the complexity of networking into seven layers

A

OSI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

OSI 7 layers

A
  1. Application
  2. Presentation
  3. Session
  4. Network
  5. Data Link
  6. Physical
  7. Transport
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

deal with application issues and generally are implemented only in software

A

upper layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

handle data transport issues.

A

lower layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Concerned with the physical, mechanical and electrical characteristics of the network hardware – cables, voltages, etc

A

physical layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Concerned with the error-free delivery of data

A

Data Link Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Organizes raw bit stream into groupings of bits

A

frames

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Transfers frames between devices on a single network

A

Data Link Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The Institute of Electrical and Electronics Engineers (IEEE) has subdivided the data link layer into two sublayers

A

Logical Link Control (LLC) and
Media Access Control (MAC).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Organizes raw bit stream into groupings of bits, called frames

A

Data Link Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

sub-layer defines the relationship at the hardware level between Physical Layer devices, like Network Adapter Cards, and the Data Link Layer

A

Media Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

sub-layer defines the relationship between the MAC sub-layer and Data Link Layer devices and drivers

A

Logical Link Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Handles routing between networks and timely delivery of data

A

Network Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Packets include a header which includes network addresses for the source and destination

A

Network Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Organizes frames from the Data Link Layer into packets

A

Network Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Responsible for delivering data reliably

A

Transport Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Transport Layer Operations (4)

A
  • Building up and tearing down connections
  • packet sequencing
  • acknowledgements
  • flow control
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Provides mechanisms to establish and maintain communications between applications.

A

session layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

session layer operations

A
  • Access authentication (for example, logging into a server)
  • Session Management
  • Verification that adequate disk space is available for a request
  • Notifying a user that a printer is offline
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Responsible for formatting, representing and translating data

A

presentation layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

presentation layer operations

A
  • ASCII to EBCDIC translation
  • Compression of data
  • Encryption of data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Provides interface between the network and the application software

A

Application Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Umbrella committee

A

IEEE 802.1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Umbrella committee

A

IEEE 802.2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Defines Ethernet and its variations, including 10Base5, 10Base2, 10BaseT and 100BaseT

A

IEEE 802.3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Defines Token Ring

A

IEEE 802.5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Provides the physical and electrical connection required to access the networkcabling.

A

physical layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Provides the processing to assemble or disassemble the bit stream on the cable into frames suitable for the Media Access Method* in use

A

data link layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q
  • Operates at the Physical and Data LinkLayers of the ISO Reference Model
  • Media-dependent (physical connector)
  • Media Access Method-dependent (Ethernet vs Token Ring, etc.)
  • Protocol-independent (i.e. an Ethernet NIC can simultaneously connect to a LAN server running IPX/SPX and to a UNIX host running TCP/IP)
A

Network Interface Card (NIC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q
  • Amplifies and rebroadcasts a signal
  • Extends the distance a signal may be run reliably over a cable
  • Makes no decisions based on signal content
A

repeater

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q
  • Used as a concentrator to join multiple workstations with a single link to the rest of the LAN
  • Functions as a multi-port repeater
  • Signals received on any port are immediately retransmitted to all other ports on the hub.
  • Increases the number of connectable devices
  • Operates at the OSI Physical Layer (Level 1)
A

hub
* Personal hub
* Stack hubs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q
  • Looks at destination address of a frame and internally establishes a logical connection with the port connected to the destination node.
  • Other ports on the switch have no part in the connection
  • Result: Each port on the switch corresponds to an individual collision domain, and network collision is avoided.
  • Operates at the OSI Data Link Layer (Level 2)
  • Essentially an intelligent hub
A

switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q
  • Operate at the Data Link layer
  • Establish logical connections between ports based on MAC addresses
  • Used to segment existing network into small collision domains
A

Layer 2 switch based on bridging technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q
  • Used to divide a network into mutually isolated segments
  • Operates at the Data Link Layer (layer 2) of the ISO Reference Model
  • Physical media-dependent; usually media access layer dependent
  • Protocol-independent above the Data Link Layer
A

bridge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q
  • Operate at the Network Layer
  • Establish logical connections between ports based on network addresses
  • Used to connect different networks into an internetwork
A

Layer-3 (based on routing technologies) (aka routing or multilayer switches)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q
  • Used to connect one network to another
  • Operates at the Network Layer (layer 3) of the ISO Reference Model
  • Media-independent
  • Protocol-dependent above the Data Link Layer
  • Works with packets and their logical addresses
A

router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q
  • Some protocols (e.g. TCP/IP, IPX/SPX) have packets that include the Network Layer logical addresses needed by routers
  • Others (e.g. NetBEUI) do not, and are non-routed/non-routable protocols
A

Routed/Routable protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q
  • Used to translate between incompatible protocols
  • Can function at any one layer of the ISO Reference Model, or at at several layers simultaneously.
  • Most commonly used at Session Layer (layer 5) and above
A

gateway

43
Q
  • acts as an intermediary for certain protocol exchanges.
  • Operates at the Application Layer (layer 7)
A

proxy server

44
Q

The most common use for a proxy server

A

HTTP proxy

45
Q

Can prevent access to certain web sites, such as pornographic sites, or a company’s competitors’ sites.

A

Firewalling and Filtering

46
Q
  • The network can be configured so that the HTTP proxy server is the only machine that is directly connected to the Internet.
  • This can improve network bandwidth, and thus performance
A

Connection Sharing

47
Q
  • If many users access certain sites often, an HTTP proxy server can cache those web sites’ pages/images/etc. in its own local storage, and thus avoid unnecessary Internet access.
  • This can improve network bandwidth, and response times
A

caching

48
Q

There are three reasons to employ a proxy server

A
  1. firewalling and filtering
  2. connection sharing
  3. caching
49
Q

Data is transmitted over a network using

A

packets

50
Q

block of user data together with necessary address and administration information attached, to allow the network to deliver the data to the correct destination.

A

packet

51
Q

which contains the information needed to get the packet from the source to the destination

A

header

52
Q

which contains the information to be transmitted

A

data area

53
Q
  • a self-contained packet, which:
  • Contains enough information in the header to allow the network to forward it to the destination, independently of previous or future datagrams.
  • Requires no setup before a computer tries to send datagrams to a computer with which it has not previously communicated
A

datagram

54
Q

distinguish the packet from “dead air”

A

delimiters

55
Q

detect errors

A

checksums

56
Q

address and control

A

fields specific to the link

57
Q

multiplexer divides the underlying communication channel so that it can be used simultaneously for more than one transmission.

A

frame

58
Q
  • Messages that are sent from one device to another device
  • Not intended for others
  • A “private conversation” (but eavesdropping is still possible).
A

unicast messages

59
Q
  • Messages sent to every device on a network.
  • “Making an announcement”
A

broadcast messages

60
Q
  • Messages sent to a group of stations that meet a particular set of criteria
  • These stations are usually related to each other in some way, such as serving a common function, or being set up into a particular multicast group
  • A “small discussion group”
A

multicast messages

61
Q

the specification of a set of rules for a particular type of communication.

A

network protocol

62
Q

to divide the protocol design into a number of smaller parts, each of which accomplishes a particular sub-task.

A

Protocols are layered

63
Q

Common network protocols include

A
  • TCP, IP, UDP, ICMP (Internet Control Message Protocol)
  • FTP, Telnet, SMTP, DNS, HTTP, POP3, NNTP, NetBIOS, IRC, SSH.
64
Q

application layer example

A
  • HTTP
  • SMTP
  • FTP
  • SSH
  • IRC
65
Q

transport layer

A
  • TCP
  • UPD
  • DCCP
  • ICMP
  • RTP
66
Q

Network layer

A
  • IPv4
  • IPv6
  • ARP
67
Q

Data link layer

A
  • Ethernet
  • Wifi
  • Token Ring
68
Q

a data-oriented protocol used by source and destination hosts for communicating data across a packet-switched internetwork.

A

IP

69
Q

allows programs on networked computers to create connections to one another, over which they can send data.

A

TCP

70
Q
  • A connectionless protocol.
  • A minimal message-oriented transport layer protocol
  • Provides a very simple interface between a network layer below and an application layer above.
  • Provides no guarantees for message delivery and a UDP sender retains no state on UDP messages once sent onto the network.
A

UDP

71
Q

Examples of applications that often use UDP include

A
  1. Streaming media
  2. Real-time multi-player games
  3. Voice over IP (VoIP)
  4. DNS (Domain Name System)
  5. SNMP (Simple Network Management Protocol)
  6. DHCP (Dynamic Host Configuration Protocol)
  7. RIP (Routing Information Protocol
  8. General message broadcasting or multicasting
72
Q
  • An extension of IP; a Network Layer (Layer 3) protocol
  • Supports packets containing error, informational, and control messages
A

ICMP

73
Q

is a standard for securing IP communications by encrypting and authenticating all IP packets. Operates at the Network Layer (layer 3) of the OSI model.

A

IPSec (IP Security)

74
Q

IPSec 3 major protocols

A
  • Internet Security Association and Key Management Protocol (ISAKMP)
  • Authentication Header (AH)
  • Encapsulating Security Payload (ESP)
75
Q

used for creating and maintaining Security Associations (SAs)

A

ISKAMP

76
Q

adds information to the header of a packet the for purpose of integrity and authentication.

A

Authentication Header (AH)

77
Q

adds guarantees of confidentiality by means of encryption.

A

Encapsulating Security Payload (ESP)

78
Q

ESP supports two different modes of operation

A
  1. Transport Mode
  2. Tunnel Mode
79
Q
  • Creates virtual circuits between two networking devices, and encrypts all the data passed between them.
  • Encrypts the packet header, as well as the payload.
A

Tunnel Mode

80
Q

is a set of standards for wireless local area networks (WLAN), based on the IEEE 802.11 specifications

A

“Wi-Fi” (Wireless Fidelity)

81
Q

A combination of a port and a network address

A

socket

82
Q

an organization that oversees IP address, top level domain and Internet protocol code point allocations.

A

IANA

83
Q

two different kinds of ports

A
  1. hardware port
  2. network port (connection and numerical designation)
84
Q

Originally, every computer on the Internet was assigned a fixed identifier, called an

A

IP Address

85
Q
  • For computers within a private company or organization’s network
  • Only have to be unique within that network.
  • Often start with 10. …
A

Private IP Address

86
Q
  • For computers connected to the Internet
  • No two can be the same
A

Public IP Address

87
Q
  • The network number is contained in the first octet.
  • This class provides for a 24-bit host part, allowing roughly 1.6 million hosts per network
A

Class A (1.0.0.0 through 127.0.0.0)

88
Q
  • The network number is in the first two octets.
  • This class allows for 16,320 nets with 65,024 hosts each.
A

Class B (128.0.0.0 through 191.255.0.0)

89
Q
  • The network number contained in the first three octets.
  • This class allows for nearly 2 million networks with up to 254 hosts.
A

Class C (192.0.0.0 through 223.255.255.0)

90
Q
  • Experimental or reserved for special purpose use and don’t specify any network.
  • IP Multicast, which is a service that allows material to be transmitted to many points on an internet at one time, has been assigned addresses from within this range.
A

Classes D, E, and F (224.0.0.0 through 254.0.0.0)

91
Q

There are four regional Internet registries that assign Internet addresses from the A, B & C classes

A
  1. ARIN
  2. RIPE NCC
  3. APNIC
  4. LACNIC
92
Q

If all host part bits are 0, the address

A

network address

93
Q

If all host part bits are 1, the address

A

broadcast address

93
Q

0.0.0.0 is called

A

dafault route

94
Q

127.0.0.1

A

looback address

95
Q

variable length subnet masks (VLSM) to allocate IP addresses to subnets according to individual need, rather than some general network-wide rule.

A

CIDR

96
Q

network allows you to break down a large network into smaller ones

A

subnetting

97
Q

bitmask used to tell how much of an IP address identifies the subnetwork the host is on and how much identifies the host.

A

subnetmask

98
Q

In subnetting, IPv4 addresses are broken down into three parts:

A
  1. network
  2. host
  3. subnet
99
Q
  • Part of the original IEEE 802.11 standard (1999)
  • A scheme used to secure wireless networks
  • Uses RC4 cipher for confidentiality and the CRC-32 checksum for integrity.
  • For RC4, WEP uses two key sizes: 40 bit and 104-bit; to each is added a 24-bit initialization vector (IV) which is transmitted in the clear.
A

Wired Equivalent Privacy

100
Q
  • Designed for use with an 802.1X authentication server, which distributes different keys to each user
  • Can also be used in a less secure pre-shared key (PSK) mode.
A

WPA

101
Q
  • Uses the Advanced Encryption Standard (AES) block cipher
  • The IEEE 802.11i architecture also contains the following components:
  • 802.1X for authentication, involving the use of:
  • EAP (Extensible Authentication Protocol), and
  • An authentication server
  • RSN (Robust Security Network) for keeping track of associations
  • CCMP (Counter-Mode/CBC-Mac Protocol) to provide confidentiality, integrity and origin authentication.
  • An important feature of IEEE 802i is the Four-Way Handshake
A

IEEE 802.11i, formally known as WPA2, in June 2004

102
Q
  • Developed by a group of electronics manufacturers
  • Sony Ericsson, IBM, Intel, Toshiba, & Nokia; joined later by others
  • Aptly named after a Danish king*, known for his unification of previously warring tribes from Denmark, Norway and Sweden.
  • Allows any sort of electronic equipment to interconnect without wires, cables or any direct action by a user
  • Short range radio solution (2.45 GHz; spread-spectrum frequency hopping technology)
  • Inexpensive
A

Bluetooth

103
Q
  • Provides a way to connect and exchange information between devices:
  • personal digital assistants (PDAs)
  • mobile phones
  • laptops & PCs
  • printers
  • digital cameras
A

Bluetooth