export_week 14 chapter 13 ethernet and tcpip networking Flashcards

1
Q

, tab

Domain Names

A

▪ Hierarchical system of network address identifiers used throughout the Internet and on local area networks, intranets and extranets ▪ Created so users would not have to memorize IP addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

, tab

what is the Domain name resolution ?

A

translates domain names into IP addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

, tab

what does DNS Domain Name System do ?

A

▪ Uses a massive distributed database containing a directory system of servers

▪ Each entry contains a domain name and an associated IP addres

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

, tab

Domain Name System (DNS) diagram

A

DNS Server Hierarchy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

, tab

The Elements of a Domain Name

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

, tab

Top Domain Name Registrations

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

, tab

Domain Name Resolution diagram

A

://s3.amazonaws.com/classconnection/655/flashcards/7082655/png/imagegfh0qx-14A5D8663DA589825FD.png

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what is DOEs Transport Layer ▪ TCP protocol?

A

▪ TCP protocol ▪ Sends a packet to TCP at the destination site, requesting a connection ▪ Handshaking – back and forth series of requests and acknowledgments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

, tab

▪ If handshaking negotiations are successful in the transport layer ?

A

▪ If handshaking negotiations are successful, a connection is opened

▪ Connection is logically full-duplex

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

, tab

Three-Way TCP Connection Handshake Diagram

A

ws.com/classconnection/655/flashcards/7082655/png/imagegq72qx-14A7DE018793E0C9E3C.png

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

, tab

TCP Segment Format Diagram

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

, tab

Network Layer IP protocol?

A

▪ IP protocol ▪ Responsible for relaying packets from the source end node to the destination end node through intermediate nodes ▪ Performed using datagram packet switching and logical IP addresses ▪ Best-attempt unreliable service ▪ Size of datagram ranges from 20 to 65,536 bytes ▪ Header size between 20 and 60 bytes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

, tab

IPv4 Addresses

A

▪ Registered and allocated by ICANN ▪ 32 bits long divided into 4 octets ▪ Assigned in blocks of contiguous addresses ▪ Number of addresses is a power of two

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

, tab

IPv4 Addresses ▪ Divided into three levels?

A

▪ Network address ▪ Subnetworks (subnets) ▪ Hosts (nodes)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

, tab

what does Masks do ?

A

▪ Used to separate the different parts of the address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

, tab

IPv4 Datagram Format Diagram ?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

, tab

IP Addresses Diagram ?

A

IP Block Addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

, tab

IP Addresses IP Hierarchy and Subnet Mask Diagram ?

A

IP Hierarchy and Subnet Mask

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

, tab

Reseved IP Addresses

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

, tab

Two methods to distribute IP addresses more efficiently:?

A
  1. Use of private network IP addresses behind a router 2. Dynamic Host Configuration Protocol (DHCP)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

, tab

what does Dynamic Host Configuration Protocol (DHCP) do ?

A

Maintain a bank of available IP addresses and assign them dynamically to computers for use when the computers are attached to the network Method often used by large organizations, DSL and cable providers

22
Q

, tab

what does DHCP Client and server ?

A

* DHCP client on computer or network device broadcasts a query to locate the DHCP server * DHCP server responds with a lease which includes an IP address, domain name of network, IP address of DNS server, subnet mask, IP address of gateway and other configuration parameters

23
Q

, tab

Operation of IP two major functions?

A
  1. ▪ Routes datagrams from node to node until they reach their destination node 2. ▪ Translates IP addresses to physical addresses before it passes the packets to the data link later for delivery
24
Q

, tab

(ARP)

A

Address Resolution Protocol

25
# , tab when is the (ARP) network implemented ?
▪ Implemented at the network layer
26
# , tab what does ARP do ?
▪ Translation of IP address to physical address at each intermediate node until destination is reached ▪ A broadcast of the IP address is sent to every node on the network. The matching node responds with a physical address ▪ Physical address (MAC address in the case of Ethernet) is sent in frame to the data link layer At final destination, the packet is passed up to the transport layer for deployment to the application layer
27
# , tab Data Link Layer what is this responsible for ?
Layer responsible for transmitting a packet from one node to the next node
28
# , tab how is node access defined ?
Node access defined by the medium access control (MAC) protocol ▪ Steer data to its destination ▪ Detect errors ▪ Prevent collisions
29
# , tab what does Ethernet (CSMA-CD)?
▪ Predominant medium-access protocol for local area networks ▪ Standard Ethernet packet is a frame (see next slide)
30
# , tab Ethernet Frame
![](https://s3.amazonaws.com/classconnection/655/flashcards/7082655/png/imagetjz1qx-14A5D9CF97736E01D1D.png)
31
# , tab Hub-Based Ethernet ![](https://encrypted-tbn3.gstatic.com/images?q=tbn:ANd9GcQKDHa_QzvFWnVKFsRY444hgxc9LxB3JHAxNIQoLpT_qw-vFsI_CA)
\* Simple means of wiring bussed Ethernet together \* Logically still a bus network \* CSMA-CD
32
# , tab when does the collision happens in the hub- based Ethernet happen ?
Collision ▪ Occurs when multiple nodes access the network in such a way that their messages become mixed and garbled
33
# , tab what is Network propagation delay ?
Amount of time that it takes for one packet to get from one end of the network to the other
34
# , tab when is gthe hub based Etherent work ?
▪ Adequate for networks with light traffic
35
# , tab what Switched Ethernet do ?
1. Permits point-to-point connection of any pair of nodes 2. Multiple pairs can be connected simultaneously 3. Possible to connect nodes in full-duplex mode 4. Each pair of connections operates at the maximum bit rate of the network
36
# , tab (QoS)
Quality of Service
37
# , tab wh/at does QOS do
. 1. Methods to reserve and prioritize channel capacity to favor packets that require special treatment 2. Service guarantees from contract carrier services that specify particular levels of throughput, delay and jitter
38
# , tab Jitter
variation in delay from packet to packet
39
# , tab Differentiated service (DiffServ) about
1. ▪ 8-bit (DS) field in IP header 2. ▪ Set by the application at the sender or by the first node 3. ▪ Diffserv capable nodes such as routers can then prioritize and route packets based on the packet class
40
# , tab Network Security Categories
1. Intrusion 2. Confidentiality 3. Authentication 4. Data integrity and non-repudiation 5. Assuring network availability and access control
41
# , tab Intrusion
Keeping network and system resources free from intruders
42
# , tab Confidentiality
Keeping the content of data private
43
# , tab Authentication
Verifying the identity of a source of data being received
44
# , tab Data integrity and non-repudiation
Protecting the content of data communication against changes and verifying the source of the message
45
# , tab Assuring network availability and access control
Keep network resources operational and restricting access to those permitted to use them
46
# , tab ▪ Network intrusions how ?
▪ Packet sniffers read data in a packet as it passes through a network ▪ Probing attacks to uncover IP address / port numbers that accept data packets
47
# , tab what are Physical and Logical Restriction ?
Physical and Logical Restriction ▪ Limit access to wiring and network equipment ▪ Firewall ▪ Private networks
48
# , tab Encryption
1-Symmetric key cryptography Both key used for encryption and decryption Both sender and receiver use the same key which makes security difficult 2- Public key cryptography Two different keys are used for encryption and decryption
49
# , tab MPLS
(Multi-Protocol Label Switching) Creates a virtual circuit over packet switched networks to improve forwarding speed of datagrams
50
# , tab ATM
(Asynchronous Transfer Mode) ▪ Partial-mesh network technology in which data passes through the network in cells (53-byte packets)
51
# , tab SONET and SDH
(Synchronous Optical Network) and (Synchronous Digital Hierarchy) Protocol that uses fiber optic to create wide area networks with very high bit rates over long distances
52
# , tab Frame Relay
▪ Slow, wide area network standard A standardized wide area network technology that specifies the physical and logical link layer of digital telecommunications channels using a packet switching methodology