Final Exam Flashcards
the amount or number of signals that a wire can carry
bandwidth
space between floors
plenum
What is the physical address assigned to a NIC?
MAC address
he physical address, also known as the MAC address, assigned to a NIC by its manufacturer is 48 bits long. Because of the way this address is divided up into two 24 bit parts, each manufacturer has only 16 million or so unique addresses they can use before the manufacturer has begun reusing physical addresses.
Ethernet II
(Ethernet DIX) can be used directly by the IP
rollover cable
used to hook Ethernet connections together
router
used to move packets around a larger network
The encapsulation unit on the Network layer of the OSI Model is _____
Packet
NFT
(Network Fault Tolerance) bonding technique that provides network redundancy
RJ-22
Older style phones
Electromagnetic Interference, copper trying to overcome electromagnetic fields
EMI
Recommended Standard 232, a standard used for serial data cables connecting equipment
RS-232
shielded twisted pair
STP
Define: protocol
a set of rules to describe how a task works in a network environment
Neighbor table
contains information about the routers that are directly connected to the current router.
Define: Data Link layer
concerned with moving data from one computer to another.
EGP
used to exchange routing information between autonomous systems
RG-59
low-power video and audio transmission (DVDs)
Public Class C IP range
192.0.0.0 - 223.255.255.255
serial
one bit is sent at a time
Authoritative name servers
attached to domain servers and responsible for answering requests received about the domain space they are part of.
NIC
(Network Interface Card) connects a computer to a computer network.
baseband
a signal that has a very narrow frequency range
TLS
(Transport Layer Security) a protocol that ensures privacy between communicating applications and their users on the Internet
Registered ports
used consistently on all systems
Novel Ethernet
(Ethernet_802.3) does not include a Layer 2 Data Link identifier
SSH
(Secure Shell) a cryptographic (encrypted) network protocol to allow remote login and other network services to operate securely over an insecure network.
BPL
Broadband over PowerLine
low-power video and audio transmission (DVDs)
RG-59
What is used to determine which upper-layer protocols, services, and processors each data segment is intended for?
port
Protocols on the Transport layer have port addresses, also known as ports. These ports are used to determine which upper-layer protocols, services, and processes each data segment is intended for. Port addresses ensure that the correct protocol, service, or process can get the data intended for it. The two main protocols on the Transport layer, UDP and TCP, both use ports.
trunking
provides network access to many clients by sharing a set of lines or frequencies
Define: Session layer
manages dialog between networked devices.
Name servers
database of all the name domains on the Web
SMTP
(Simple Mail Transport Protocol)
latency
time interval between responses
supplies a signal to many connected pairs
feeder cable
multiple signals
broadband cable
IS-IS
(Intermediate System to Intermediate System) used to determine routing tables within an autonomous system using link state routing
UDP
(User Datagram Protocol) connection-less counterpart of TCP, does not guarantee reliable delivery and is primarily used to give other protocols access to datagram services
What is a multiport repeater?
hub
Hubs work as though they are the bus of a larger network. When a computer connected to one port of a hub want to connect to a computer connected to a different port on a hub, it has to broadcast the signal to all devices connected to that hub. In this way, a hub acts as a bus. As a signal comes into a hub, it is regenerated or repeated and sent to its destination.
What helps protect data that is sent using a wireless network?
encryption
Encryption is where a device such as a computer or a WAP takes the data that it is sending out and first runs an algorithm on it so that it cannot be read without first having the key to read it. This capability increases the security of a network by making it more difficult for an outsider to read what is passing across a network.
Application Layer Protocols
designed to carry out specific purposes or functions
In what type of technology is the whole message routed to its destination one hop at a time?
message switching
In message switching, whole messages are routed to their destination one hop at a time. Over time, the message switching idea evolved into what we call packet switching today. With message switching, the entire message is sent out at once.
What is referred to as a group of hosts in the Data-Link layer that share a common set of communications requirements and can be isolated from other groups?
VLAN
In its most basic form, a VLAN (short for Virtual LAN) enables you to break up a much larger network into smaller networks within the Data-Link layer of the OSI model. In other words, a VLAN refers to a group of hosts that share a common set of communications requirements whether or not they are attached to the same device.
content-based access method
accessing a network in which different nodes compete to see which node can send out its packet first
Port addresses/ports
determine which upper-layer protocols, services, and processes each data segment is intended for
channel
specific subrange of radio frequencies that has been set aside within 2.4 GHz
port bonding
associated with a specific protocol, service, application
1MHz, North American telephone system
CAT 1
noise
transmission of information
connect a host or router to a switch or hub
straight-through cable
straight tip
ST connector
IGP
(Interior Gateway Protocol) used for exchanging routing information between gateways (commonly routers) within an autonomous system
The encapsulation unit on the Presentation layer of the OSI Model is _____
Data
Define: connection-oriented protocol
asks for verification that a data packet has reached its destination
Today, what type of cable is the most common for Ethernet?
UTP Today, virtually all Ethernet cabling is done with either UTP or fiber.
Because UTP is easier to configure, is less expensive, and has been widely available longer, UTP is much more common then fiber.
coaxial cable
center conductor made of copper surrounded by plastic
192.130.277.277/8
Define: MAC
Media Access Control sublayer, provides access control to the media just as its name implies
collision domain
A physical region of a LAN in which data collisions can occur
Define: frame
The packet becomes this in the Data Link layer.
cable with connectors on both ends
patch cable
light emitting diodes
LEDs
routing table
contains the routes to the various destinations
What port does HTTP use by default?
80Hyper-Text Transfer Protocol (HTTP) uses TCP port 80 to display web pages via a browser.
local connector
LC
Ethernet bonding
combining the bandwidth from two ore more Ethernet links
transmission of information
noise
main distribution frame
MDF
((N-X)) Signaling stands for:
signaling type
Define: tailer
contains error correction information.
EMI
Electromagnetic Interference, copper trying to overcome electromagnetic fields
. What represents the number of routers it takes to get from one destination to another?
hops
Within a routing table database are several information fields. The three most common of these fields are the network ID of the destination network, the cost of path the packet will need to take to get to the destination network, and the next hop. The cost refers to the network cost (not money cost) of getting to the destination network, which is based on available bandwidth, speed and other factors.
Public Sswitched Telephone Network
PSTN
Define: encapsulation
the process of taking data from a previous layer of the OSI Model and carrying it forward into the next layer.
Define: packet
The segment becomes this in the Networking layer.
What media type can carry multiple data signals at the same time?
broadband
Baseband means is that a cable can carry only one signal one way at one time. In the case of most modern Ethernet cables, this means that there is one line for sending signals and another line for receiving signals inside an Ethernet cable.
passive hub
joins wires from several stations in a star configuration
You are given the following address: 00-90-4B-AD-2A-AC What type of address is this?
MAC address
The physical address, also known as MAC address, assigned to a NIC by its manufacturer is 48 bits long. Because of the way this address is divided up into two 24-bit parts, each manufacturer has only 16 million or so unique addresses to use before the manufacturer has to start reusing physical addresses.
out-of-order packet delivery
Packets arrive in a different order than the one they were sent in
What is the 7th Layer of the OSI Model?
Application
MT-RJ or MTRJ
mechanical transfer registered jack
What type of hub does not amplify or resend a signal?
passive hub
A passive hub is really nothing more than a cable splitter. If you have seen old cable TV connections where a coaxial cable is connected to a cable splitter and two or more cables come out, you have seen what is essentially a passive hub. These types of devices are not used very commonly in data networks.
Permanent host group
a host group with permanent IP addresses
Static routing
uses a manually-configured routing entry, rather than information from a dynamic routing traffic
When a DNS client needs to resolve a host name to an IP address, where will it first check?
its own DNS cache
When you open your web browser and put in a URL, the browser checks the local web cache to see if the IP address of the entered URL can be found. If it cannot be found, your computer sends a query to your ISP’s DNS server asking it for the URL’s IP address.
UTP
unshielded twisted pair, used in all types of twisted pair Ethernet networks
physical address
MAC address; physical binary address that every network device is given when it is created by its manufacturer
Define: Half-duplex
a device can only send or recieve
classful IP address
a network addressing architecture used in the Internet from 1981 until 1993. The method divides the address space for Internet Protocol Version 4 (IPv4) into five address classes.
What protocol is used to provide bi-directional interactive command-line access to either a remote or local host?
TELNET
TELNET, short for TErminaL NETwork, is used to provide bi-directional interactive command-line access to either a remote or local host. TELNET was first introduced in 1969 in RFC 15. In 1983, TELNET was extended in RFC 854. TELNET client software can be found for pretty much every computer platform out there.
sqare connector
SC
broadband cable
multiple signals
Define: port address
a unique address inside the computer associated with a specific protocol, service, or application
Define: bits
frames converted in the Physical layer.
used to hook Ethernet connections together
rollover cable
Which type of routing protocol are RIP and IGRP?
distance vector routing protocol
The simplest type of routing protocol is a distance vector routing protocol. Some examples of distance vector routing protocols are RIP, RIPv2, and IGRP. In a distance vector routing protocol, each router periodically sends an update of its routing table to all routers directly connected to it. In this way, periodically the entire network of routers gets updated. The time it takes for this update to take place is called convergence.
SC
subscriber connector
128.0.0.0 - 191.255.255.255
public class B
single-mode fiber, high-speed, long-distance fiber-optic cable
SMF
Media converter
connects two dissimilar media types such as twisted pair with fiber optic cabling.
bridge
connects two or more local area networks at layer 2.
N refers to signal rate in Mbps
((N-X)) N stands for:
MMF
multimode fiber, uses light to communicate a signal
Define: OSI Model
framework and reference model to explain how different networking technologies work together and interact.
1.0.0.0 - 126.255.255.255
public class A
Denial of Service attack
using pings across a large range of computers to bring down a server
channel bonding
uses two or more channels to move data
Define: data
Top three layers of the OSI Model: The Application, Presentation, and Session layers.
The two most important portocols on the Transport layer of the TCP/IP Model are _____and _____
TCP & UDP
Define: Network layer
moves data in the form of packets from one end of the network to the other.
Ethernet DIX
(Ethernet II) can be used directly by the IP
10Base-2, thin coaxial cable
Thin Ethernet (Thinnet)
SMF
single-mode fiber, high-speed, long-distance fiber-optic cable
SIP
(Session Initiation Protocol) protocol for signaling and controlling multimedia communication sessions
when two improperly shielded copper wires run too close together so that signals become mixed
crosstalk
switch
connecting multiple wires, allowing them to communicate simultaneously
public class B
128.0.0.0 - 191.255.255.255
crossover cable
TIA/EIA 568A is used on one end of a cable and TIA/EIA 568B is used on the other end
straight-through cable
connect a host or router to a switch or hub
At what OSI layer do routers operate?
Network layer
Network Routers are networking devices used to move packets around a larger network. To do this, they have to be very intelligent and able to read data packets to know where they are intended to go and where they have come from. Because routers are meant to relay based on IP addresses, they work on the Network layer.
public class C
192.0.0.0 - 223.255.255.255
Define: physical address
MAC address
RAIN
(Redundant Array of Independent Nodes) protects data stored at the file-system level by providing redundancy across network nodes
Block
data broken into segments that contain headers
ST connector
straight tip
steady state
all the routers in a network are updated/converged
broadband
transports multiple signals and traffic types.
VLAN
(Virtual LAN) groups users by logical addresses into a virtual LAN through a switch or router.
tracert
the Windows implementation of a trace route
(CIDR)
Classless inter-domain routing; a standard notation that indicates what portions of an IP address are used for network ID and host ID
CAT 6
250MHz
EUI-60
60-bit Extended Unique Identifier; a MAC address where the host extension is 36-bits long
Define: Application layer
contains all the services that are needed by the application
LC
local connector
feeder cable
supplies a signal to many connected pairs
CAT 4
20 MHz
private class C
192.168.0.0 - 192.168.255.255
firewall
used to prevent unauthorized packets into the network
((N-X)) N stands for:
N refers to signal rate in Mbps
multimode fiber, uses light to communicate a signal
MMF
Define: header
describes what each layer should do.
16MHz, 10Mbps
CAT 3
content switch
distribute user requests to servers based on Layer 7 payload.
The primary function of the Physical Layer
Transfer the bits
TCP/IP Protocol Suite
used for Internet commuinications
Define: Routing
the ability of the various network devices to move data packets from their source to their destination.
Ethernet is considered ___________.
baseband
Ethernet is what is called a baseband technology. Most modern Ethernet cables have one line for sending signals and another line for receiving signals.
classful subnet mask for a Class B IP address
255.255.0.0
What routing type is manually defined?
static routing
The most basic way of building routing tables is to manually create one in a router. As new routes are needed on a network or old routes change, the routing tables must be manually changed or updated on the affected routers. This process is called static routing, which is time-consuming and prone to errors.
10MHz, 4Mbps
CAT 2
20 MHz
CAT 4
TIA/EIA 568A and 568B
wiring standards agreed upon by over 60 ISP vendors
What measurement is used to choose the best route to a specific location?
metrics
The purpose of any routing protocol is to compile a table listing all routes known to it so that IP can use the table to find the best route to a specific location. The measurements used by a routing protocol to determine the best routes available to it are called metrics.
plenum
space between floors
What mechanism is used to send one set of packets to multiple hosts at the same time?
multicasting IP
multicasting is basically an IP host’s capability to send a datagram or data packet to all IP hosts within a host group. A host group consists of all the IP computers currently connected to a particular IP multicast host that are set to receive the same transmission from that host. These host groups can be set to contain 0 or more hosts.
hop
one portion of the path between source and destination
BGP
(Border Gateway Protocol) designed to exchange routing and reachability information between autonomous systems (AS) on the Internet.
What happens when two computers broadcast at the same time on the network, causing both sets of data to be garbled?
collision
When two different computers need to send data at the same time, they will listen to the network. If neither computer hears any activity on the network, they both will conclude that they are clear to send data at that time. As a result, both computers end up sending data packets simultaneously; however, because only one data packet can be on the network cable at one time, a collision occurs. The collision results in a slight power spike on the network as well as destruction of the data in the two packets.
public IP address
can be used on the Internet; must be registered with the Network Information Center
EIGRP
(Enhanced Interior Gateway Routing Protocol) used on a computer network to help automate routing decisions and configuration
Which connectionless transport protocol does not guarantee reliable delivery?
UDP
User Datagram Protocol (UDP) is the connectionless counterpart of TCP. It does not guarantee reliable delivery and is used primarily to give other protocols, such as IP, access to datagram services like port numbers. Due to the limited functionality provided by UDP, the header is correspondingly much smaller and less complex.
What command is used to test IP connectivity between two hosts?
ping
Ping is a network administration utility that is used to test connectivity to specific nodes on a network and to measure the round-trip time it takes for a packet to get to a specific destination and back.
RJ-11
Used to connect a phone to a phone jack
Thin Ethernet (Thinnet)
10Base-2, thin coaxial cable
intermediate distribution frame
IDF
demarc
demarcation point, last point of responsibility from the ISP
patch cable
cable with connectors on both ends
DNS
(Domain Name System) the protocol that converts URLs to IP addresses
broadband and home video coaxial cable connector
F-connector
multilayer switch
switches on OSI layer 2 like an ordinary network switch and provides extra functions on higher OSI layers.
amount of actual data that is being carried
throughput
port mirroring
Cross connecting two or more ports on a network switch so that traffic can be simultaneously sent to a network analyzer or monitor connected to another port.
When you use port authentication, what is used to limit access to the network?
MAC addresses Port authentication provides security to the entire network because it limits access via a particular port to pre-authorized MAC addresses.
The primary job of the Network layer is to
Perform routing functions and a means of transmitting data packages.
Which Ethernet standard was developed to work over fiber?
100Base-FX
100Base-FX is the version of Fast Ethernet that is intended to be used over fiber-optic cable. Introduced at the same time as 100Base-TX, 100Base-FX was part of the same IEEE 802.3y standard.
Which protocol is used to resolve host names to IP addresses?
DNS
Domain Name System (DNS) makes it possible for us to use the Internet the way we do. DNS is the protocol that converts all those URLs we can easily remember to IP addresses that the Internet can use.
Trace route
a utility used to report back each hop along a route to a specific IP destination.
center conductor made of copper surrounded by plastic
coaxial cable
The two sublayers of the Data Link layer are _____, and _____
LLC & MAC
classful subnet mask for a Class A IP address
255.0.0.0
topology table
an aggregation of the routing tables of all routers connected to current router
TCP
(Transmission Control Protocol) provide communication services between Application layer services, protocols, and processes and the IP.
or Network Interface Device (NID), used between the ISP and internal network
smart jack
Which protocol translates an IP address into a MAC address?
ARP
In network addressing—when a packet is passed along a network via routers—the MAC address is actually changed at each hop so that the data frame can move on to the next hop in its journey. The Address Resolution Protocol (ARP)is responsible for changing the MAC address. Part of ARP’s job is to determine what the MAC address is for the next hop and then adjust the frame accordingly so that the frame can be moved to the next hop.
What was the first Ethernet standard used on UTP?
10Base-T
While 10Base-T was not the first XBase-Y standard developed, it was the first twisted-pair XBase-Y standard developed. In 1990 IEEE 802.3i formalized the 10Base-T standard. 10Base-T used CAT 3 UTP and could carry 10 mbps throughput for a distance of 100 meters. 10Base-T was a baseband technology. This standard became known as Twisted-Pair Ethernet.
Resolvers
the clients that make requests of the Domain Name System
data corruption
the data contained in the packet is corrupted
CAT 1
1MHz, North American telephone system
crosstalk
when two improperly shielded copper wires run too close together so that signals become mixed
CSMA/CD
(Carrier Sense Multiple Access with Collision Detection) used most notably in local area networking using early Ethernet technology.
FTP
(File Transport Protocol) a standard network protocol used to transfer computer files from one host to another host over a TCP-based network, such as the Internet
100 MHz, transmits on two pairs
CAT 5
SFF connector
small form factor connector
BNC connector
attach stations to the network
What type of port ranges from 0 to 1023?
well-known ports
The first group is called the well-known ports. Port numbers in this group range from 0–1023. Well-known ports can be assigned only by the Internet Assigned Numbers Authority (IANA). The ports in this range, according to IANA, can be used only by the system or root processes and by programs executed by privileged users.
TELNET
(Terminal Network) an application layer protocol used on the Internet or local area networks to provide a bidirectional interactive text-oriented communication facility using a virtual terminal connection
plenum-rated cable
used for buildings that catch fire
What is used to monitor the activity of a network and notify network administrators when it identifies something as suspicious?
IDS
Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) are related technologies. An IDS usually sits inside a network and monitors the network’s activities. When something suspicious is noted, the IDS then notifies network administrators so that they can take steps to stop the suspect activity. Because an IDS only monitors activity, it is considered passive.
active hub
regenerates signals on the output side to keep the signal strong
Ethernet SNAP
allows larger number of protocols, a better Ethernet_802.2
The Application layer of the TCP/IP Model corresponds to the blank layer(s) of the OSI model
Session and Presentation
The process of moving data from one layer of the OSI model to the next layer is called
encapsulation
baseband cable
can only carry 1 signal at a time
RFI
Radio Frequency Interference
routed protocols
the process of selecting best paths in a network
Define: simplex
one-way communications
RTP
(Real-Time Transport Protocol) a packet format for delivering audio and video over IP networks
What is a set of agreed-upon instructions designed to allow computers to communicate to each other across a network connection?
protocol
In computer networking, a protocol is a set of agreed-upon instructions designed to allow computers to communicate to each other across a network connection. Many protocols are used in networking because many different tasks need to be done to allow computers to communicate with each other.
MAC address filtering
only a pre-programmed MAC address is allowed access to a specific WAP
MLT
(Multilink trunking) binds ports together to allow fault tolerance or greater throughput
wiring standards agreed upon by over 60 ISP vendors
TIA/EIA 568A and 568B
Used to connect a phone to a phone jack
RJ-11
172.16.0.0 - 172.16.255.255
private class B
Modem
(Modulator/Demodulator) a device that modulates signals to encode and demodulates to decode.
IDF
intermediate distribution frame
MIMO
multiple-input/multiple-output
convergence
the time it takes for routing tables to update
hybrid routing protocols
uses distance-vector metrics-based method to determine the best route, while using link state to update the other routers
hexadecimal
base 16 numbering system that replaces every fourth 1 and 0 with numerals 0-9 or the alphabetic letters A-F
What command tests connectivity between two hosts while showing each hop between the two hosts?
tracert
The traceroute/tracert utility is used to report back each hop along a route to a specific IP destination.
SONET
(Synchronous Optical Network) transfers multiple digital bit streams over fiber-optic
Routing tables
small databases that routers use to determine which route to take
What is used to repeat a signal it receives and rebroadcast it?
repeater
A repeater is a device that repeats a signal it receives in order to rebroadcast it, thus extending the range of a particular cable run. A repeater is always active and requires a power source of some sort. It has one cable coming in and one going out.
public class A
1.0.0.0 - 126.255.255.255
attenuation
degradation of a signal due to the distance the signal has to travel
throughput
amount of actual data that is being carried
What is the 4th Layer of the OSI Model?
Transport
latched
sturdy plastic connection
SYN
indicate that the segment contains synchronizing sequence numbers
define: protocol suite
made up of a large number of protocols that allow computers to communicate
Link state routing protocol
every node constructs a map of the connectivity to the network, in the form of a graph, showing which nodes are connected to which other nodes
F-connector
broadband and home video coaxial cable connector
On which OSI layer does the network interface card work?
Physical
A NIC is required to work on both the Data-Link and Physical layers of the OSI model. The NIC acts as translator between the software in the upper layers of the OSI model and the physical components of the media.
Define: Physical layer
all aspects of physically moving data from one computer to the next.
hub
a node with a number of links that greatly exceeds the average.
where all the wires come together
cross-connect
broadcast
sends packets across all available computers on the network
What mathematical function is performed on data to ensure that it has not been changed or corrupted?
checksum
Before data is sent, a mathematical calculation is done on the data and is sent with the data. When the data is received, the same mathematical calculation is done and the two checksum calculations are compared. If they are the same, the data packet has not been changed or corrupted.
CAT 5e
100 MHz, transmits on all four wire pairs
RJ-45
Ethernet data networks
Which layer of the OSI Model is responsible for segmenting data and sequencing it for the rest of the OSI model
Transport
IPv6
128-bit address, will never run out of IP addresses
IGMP
(Internet Group Management Protocol) used by IP hosts to manage their multicast group’s dynamic membership and by connecting routers to find those group members
smart jack
or Network Interface Device (NID), used between the ISP and internal network
Private Class C IP range
192.168.0.0 - 192.168.X.X
CAT 2
10MHz, 4Mbps
Define: frame synchronization
a method of finding valid data in a transmission that consists of data frames
Define: connectionless protocol
does not ask for verification that a data packet has reached its destination.
ICMP
(Internet Control Message Protocol) checks to see if the data packets have successfully reached the destination
What device converts one type of media to another type?
media converter
Media converters are used to convert one type of media to another type. Such devices are used to convert coaxial to twisted pair or fiber to copper. These types of devices are important for allowing two different types of technologies on the same network.
ACK
acknowledgement field
subscriber connector
SC
What device has each port as its own collision domain?
switch
A basic switch can be referred to as a multiport bridge because like a bridge, it can separate a network out into multiple collision domains.
used for buildings that catch fire
plenum-rated cable
STP
shielded twisted pair
The process of moving data from one layer of the OSI model to the next layer is called
encapsulation
Where would you place a web server that will be accessed from the Internet?
DMZ
Because a web server that needs to be accessed needs to have some security but should be isolated from the internal network, you should place the web server on the DMZ.
Define: Transport layer
moves data to segments then sent for data transmission
What connects two network segments together, yet only forwards packets based on MAC addresses from one segment to another segment only when needed?
bridge
Bridges are intended to break up networks into smaller sections; as a result, they are more intelligent than your average hub. Because bridges work on the Data-Link layer of the OSI model, they can read and make sense of MAC addresses. Based on these MAC or Physical addresses, a bridge can determine whether a frame is allowed to pass through to the other side of the bridge.
What technology takes a voice communication, breaks the data into small packets, and sends the packets from one network segment to another?
packet switching
Packet switching opens up connections only long enough for a small data packet to move from one network segment to another. Data—regardless of type, content, or structure—is broken into small blocks called packets and sent to its destination.
ad hoc wireless network
does not rely on a pre existing infrastructure
PoE (Power over Ethernet)
safetly transfers power over Ethernet cabling
RFC
(Request For Comment) all networking standards and protocols are defined by these various documents
CSMA/CA
(Carrier Sense Multiple Access with Collision Avoidance) nodes attempt to avoid collisions by transmitting only when the channel is sensed to be “idle”.
TIA/EIA 568A is used on one end of a cable and TIA/EIA 568B is used on the other end
crossover cable
What type of access method does Ethernet use?
CSMA/CD
Carrier Sensing Media Access/Collision Detection (CSMA/CD) is the primary method that Ethernet uses to access wired LANs. Ethernet uses a different method to access wireless LANs.
link aggregation
bonding method to increase link speed of multiple network cables and ports
What is the 5th Layer of the OSI Model?
Session
What communications term describes the establishment of a dedicated communications channel for the duration of a given transmission?
circuit switching
In its most basic definition, circuit switching is a type of communications that establishes a dedicated communications channel for the duration of a given transmission. Initially, circuit switching was done manually, where operators would perform physical connections to establish a circuit or connection. Later, this type of switching was done electronically.
SSID
(Service Set Identifier) Network name for wireless
192.0.0.0 - 223.255.255.255
public class C
CAT 5
100 MHz, transmits on two pairs
a rack that houses cable connections
patch panel
private class A
10.0.0.0 - 10.255.255.255
private IP address
cannot be used on the Internet; is not registered with the Network Information Center
Ethernet_802.3
(Novell Ethernet) does not include a Layer 2 Data Link identifier
hop
each time a computer or network device sends data frame to the next computer or network device
NTP
(Network Time Protocol) a means of synchronizing clocks over a computer network
To connect to a wireless network, you would start with what?
SSID
of the wireless router SSID (short for Set Service Identifier) acts as the network name for a particular WAP. If you are using multiple WAPs in the same network, they will all need to have the same SSID. In Linksys WAPs, the SSID can be up to 32 characters long.
patch panel
a rack that houses cable connections
CSU/DSU
(Channel Service Unit/Data Service Unit) used to convert a digital signal from one frame format to another
250MHz
CAT 6
The encapsulation unit on the Presentation layer of the OSI Model is _____
Data
OSPF
(Open Shortest Path First) gathers link state information from available routers and constructs a topology map of the network
Well known ports
only assigned by the IANA * can only be used by the system or root processes and by programs that are executed by privileged users
Dynamic or private ports
can be used at any time and are assigned dynamically by the system
cross-connect
where all the wires come together
port authentication, port-based authentication
limits access to a specific port to just certain MAC addresses.
Which wireless mode does not use a central WAP?
ad hoc
An ad hoc wireless network is formed when a wireless network is composed of only independent wireless computers in which each device participates in forwarding wireless packets. An ad hoc wireless network has no central WAP to monitor and control it. In effect, an ad hoc wireless network is the wireless network version of a peer-to-peer network.
SC
sqare connector
The primary job of the Presentation layer concerned with
data representation and code formatting.
The encapsulation unit on the Data Link layer of the OSI Model is _____
Frame
bonding
increases network throughput by using two ore more NICs
unshielded twisted pair, used in all types of twisted pair Ethernet networks
UTP
RIP
(Routing Information Protocol) implements a limit on the number of hops allowed in a path from source to destination
subnetting
breaking an IP address range into smaller pieces to be used in more than one network.
demarcation point, last point of responsibility from the ISP
demarc
bandwidth
the amount or number of signals that a wire can carry
((N-X)) X stands for:
identifier
protocol suite
a group of networking protocols that are designed to work together to accomplish the separate little tasks needed to allow network communications
MDF
main distribution frame
signaling type
((N-X)) Signaling stands for:
Which core protocol used on the Internet moves data packets from one location on a packet-switched network to another location based on a logical address?
IP
The TCP/IP model’s Internet layer is the first layer to have TCP/IP protocol suite–specific protocols. The Internet Protocol (IP) is the most important protocol on this layer and is one of the two protocols used to name the TCP/IP protocol suite.
IPv4
32 bits long
Define: de-encapsulation
bits become frames, frames become packets, packets become segments, segments become data.
routing metrics
used by a router to make routing decisions through a routing table
Older style phones
RJ-22
port speed
how fast a specific port on the router is able to send/receive data
Public Class B IP range
128.0.0.0 - 191.255.255.255
SOHO
(Small Office Home Office)
What is used to protect a network from unauthorized access?
firewall
The firewall that is mentioned here, is not the “firewall” that you load onto your computer to protect it from internet attacks. A firewall is a networking device whose purpose is to prevent unauthorized packets from getting into your network. It is also used as the first line of defense between a private network and the Internet.
Ping
a network administration utility that is used to test connectivity to specific nodes on a network and to measure the round-trip time it takes for a packet to get to a specific destination and back
What protocol is used to transport and display web pages using a browser?
HTTP
Hyper-Text Transport Protocol (HTTP) is used to transport Hyper-Text Markup Language (HTML) documents, otherwise known as web pages, over the Internet. HTTP can also be used to retrieve graphics, images, and other types of media and it can be used with email.
What is the 3rd Layer of the OSI Model?
Network
What type of access method is used in wireless networks?
CSMA/CA
Like CSMA/CD, Carrier Sensing Media Access/Collision Avoidance (CSMA/CA) is a method used by Ethernet to access a local area network. Where CSMA/CD is most commonly used for wired networks, CSMA/CA is most commonly used for wireless networks.
dynamic routing
alter the path that the route takes through the system in response to a change in conditions
What is the 6th Layer of the OSI Model?
Presentation
What is used to convert digital signals from one frame format to another, specifically to convert Frame Relay into Ethernet signals?
CSU/DSU
A Channel Service Unit/Data Service Unit (CSU/DSU) converts a digital signal from one frame format to another. Most commonly, it is used to convert Frame Relay or T-1 signals into Ethernet signals.
RS-232
Recommended Standard 232, a standard used for serial data cables connecting equipment
Which protocol is used to retrieve emails?
POP3
Post Office Protocol (POP) is used to connect to an email server and retrieve any emails on that server before closing the connection. When POP3 retrieves emails, it can either leave copies on the server, or delete the emails from the server after it downloads them to the client system.
RDP
(Remote Desktop Protocol) a remote access network protocol
On what OSI layer does a switch operate?
Data-LinkSwitches, like bridges, work primarily on the Data-Link layer of the OSI model.
MTU
(Maximum Transmission Unit)
broadcast networking
transmitting a packet that will be received by every device on the network
Which connection-oriented protocol ensures that data gets its final destination?
TCP
TCP focuses on the two end devices, whereas IP focuses on getting the network packet from one device to the next toward its ultimate destination.
POP
(Post Office Protocol) local e-mail clients to retrieve e-mail from a remote server over a TCP/IP connection.
192.168.0.0 - 192.168.255.255
private class C
(IP)
Internet Protocol; contains IPv4 and IPv6
private class B
172.16.0.0 - 172.16.255.255
small form factor connector
SFF connector
Which layer of the OSI model contains all the services or protocols that are needed by application software or the operating system to communicate on the network?
Application
hardware loopback
a way to redirect data flow
T1 crossover cable
T1 applications for WAN networks
Which protocol is used to send messages about the network when a route goes bad?
ICMP
The Internet Control Message Protocol (ICMP) is used mainly by a computer’s operating system to send messages about the network. When an error occurs in the IP packet, a service is unreachable or down, a host is not found, or a router is down, among other situations, an ICMP message is sent.
one bit is sent at a time
serial
Private Class B IP range
172.16.0.0 - 162.31.255.255
When a collision occurs, what do the two sending nodes do?
They both wait a random amount of time and try again.
When computers on the network segment “hear” a collision on the network, they all immediately activate something called a hold-down timer. This timer is effectively a clock that activates in each NIC on the network and starts counting down from a randomly set point of time. While the clock on a particular NIC is counting down, it cannot send any packets. As each computer on the network segment finishes its random countdown, it can begin listening to the network again to find an open point where it can begin to send its data packet.
repeater
receives a signal and retransmits it at a power, or onto the other side of an obstruction, so that the signal can cover longer distances.
What networking device is used to modulate an analog signal in such a way that it can encode digital information?
modem
The word modem is short for modulator/demodulator. A modem is a networking device that is used to modulate an analog signal in such a way that it can encode digital information or to demodulate the encoded signal so that it can be decoded back into something a computer can read. Any device used to encode digital information onto analog communication links, regardless of throughput, can rightfully be called a modem.
ACL
(Access Control List) Rules for a firewall
10Base-5 uses what type of cable?
coaxial
Because 10Base-5 used thick coaxial cables to carry data, it was called Thick Ethernet.
ARP
(Address Resolution Protocol) responsible for determining what the MAC address is for the next hop and then adjust the frame accordingly so that the frame can be moved to the next hop
Define: TCP/IP Model
built around the TCP/IP protocol suite
RG-6
Old military standard
Lost data packets
Packets never reach their intended destination
What protocol is used to send and manipulate files over a TCP/IP network?
FTP
The most commonly used current version of File Transfer Protocol (FTP) was first introduced in 1985 in RFC 959. However, FTP in its original form was introduced in 1971 using RFC 114.
Duplicate arrivals
More than one copy of the data packet arrived at the destination computer
EUI-64
64-bit Extended Unique Identifier; a MAC address where the host extension is 40-bits long; creates a unique interface identifier through IPv6
degradation of a signal due to the distance the signal has to travel
attenuation
_____ are used for node-to-node communications on a network. Logical address, Port address, Physical address, Socket
Physical Address
Distance-Vector Routing Protocol
when each router periodically sends an update of its routing table to all the neighboring routers that are direcrtly connected to it
multiple-input/multiple-output
MIMO
can only carry 1 signal at a time
baseband cable
Which wireless encryption is considered the weakest?
WEP
Available encryption schemes are WPA Enterprise and Personal, WPA2 Enterprise and Personal, RADIUS, and WEP. Of these options, WEP is the weakest.
PSTN
Public Sswitched Telephone Network
TCP/IP Protocol Suite
A group of protocols to carry out the functions needed to communicate across a network
IMAP
(Internet Mail Access Protocol) used by e-mail clients to retrieve e-mail messages from a mail server over a TCP/IP connection.
LEDs
light emitting diodes
IPv4
32-bit address
SNMP
(Simple Network Management Protocol) manages devices on IP networks
Ethernet data networks
RJ-45
What protocol is used to assign IP addresses automatically to a host?
DHCP
DHCP was first introduced in RFC 1541 in 1993 and was intended as a replacement for the older and less wieldy BOOTP. DHCP assigns IP addresses and IP configurations automatically for the host.
classful subnet mask for a Class C IP address
255.255.255.0
EUI
Extended Unique Identifiers; the variations of MAC addresses
CAT 3
16MHz, 10Mbps
T1 applications for WAN networks
T1 crossover cable
Define: segment
Data going to the Transport layer.
Define: LLC
Logical Link Control sublayer, facilitate communications between the upper Network layer and the Physical layer.
attach stations to the network
BNC connector
100 MHz, transmits on two pairs
CAT 5
(STP) Spanning Tree Protocol
used by switches when multiple switches are used in the same network
identifier
((N-X)) X stands for:
sturdy plastic connection
latched
What is the 1st Layer of the OSI Model?
Physical
Which layer of the OSI model is concerned with reliably getting data from one computer to another
Data Link
What is the copper version of Gigabit Ethernet?
1000Base-T
1000Base-T is the copper version of Gigabit Ethernet and was standardized in 1999. The standard used for copper-based Gigabit Ethernet was IEEE 802.3ab, which was designed to use CAT 5, 5e, or 6.
What type of server acts as an intermediary between a client and other servers?
proxy server
Proxy servers act as intermediaries between a client and other servers. They can fulfill many roles and can be used for many different jobs.
time interval between responses
latency
In what type of network segment do computers have the possibility of having their signals collide with each other?
collision domain
A network segment where computers have the possibility of having their signals collide with each other is called a collision domain. If too many computers are on a single collision domain, a network can reach a point where it has so many collisions, no computers can actually communicate with each other. Therefore, the goal of a hub-based network is to have as few computers as possible on a single collision domain.
Transient host group
host group formed for a specific multicast and then disbanded after use
checksum
when a network device receives a data packet from another network device, it runs an algorithm on the header of the IP packet and then compares the result of this algorithm with the result stored in the IP header
Define: logical addresses
logically assigned depending on the Networking layer protocol being used
Ethernet_802.2
identifier included to enable the frame header to work with the Data Link layer
NID
network interface device(NID), or smart jack, used between the ISP and internal network
10.0.0.0 - 10.255.255.255
private class A
protocol stack
all the protocols from a protocol suit that are currently being used to carry out specific functions of network communications within the computer
Which Ethernet frame type supports TCP/IP?
Ethernet II
The most widely used Ethernet frame type is Ethernet II or Ethernet DIX. It is so widely used because the Internet Protocol (IP) can use it directly.
intelligent hub
functions for network management, bridging, routing and switching.
binary
using 1s and 0s to represent hexadecimal
What is the 2nd Layer of the OSI Model?
Data Link
The most important protocol on the Internet layer of the TCP/IP model is _____
Internet Protocol
What protocol do multiple switches on the same network use to ensure that an infinite loop is not created?
STP
Spanning Tree Protocol (STP) is used when multiple switches are implemented on the same network. As a Data-Link layer protocol, STP is used primarily to prevent endless loops from developing on switch-based LANs. The protocol gets its name from a mathematical algorithm called “spanning tree,” which takes a group of points and connects them all together without allowing any loops to form.