Internetworking Flashcards

1
Q

that’s connected using a hub, which is basically just an antiquated device that connects wires together.

A

Local Area Network (LAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

breaking up a massive network into a number to smaller one

A

Network Segmentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Networking Devices:

A

Routers
Switches
Bridges

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Causes of LAN Traffic Congestion:

A
  • Too many hosts in a collision or broadcast domain
  • Broadcast storms
  • Too much multicast traffic
  • Low bandwidth
  • Adding hubs for connectivity to the network
  • A bunch of ARP broadcasts
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

They are basically employed to efficiently break up a broadcast domain and are allowed to “hear” all broadcasts sent out on that specific segment.

A

Routers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

______ provide connections to wide area network (WAN) services as well via a serial interface for WAN connections

A

routers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The set of all devices on a network segment.

A

Broadcast Domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Two advantages to using routers:

A
  • They don’t forward broadcasts by default.
  • They can filter the network based on layer 3 (Network layer) information such as an IP address.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Router functions in the network:

A

Packet switching
Packet filtering
Internetwork communication
Path selection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

It forwards or filter frames using logical addressing and provide an important capacity.

A

Packet Switching

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Is connect two or more networks together and use logical addressing (IPv4 or IPv6).

A

Internetwork

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

It is an Ethernet term used to describe a network scenario in which one device sends a packet out on a network segment and every other device on that same segment is forced to pay attention no matter what.

A

Collision Domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

They basically do the same thing—break up collision domains on a LAN

A

Bridges and Switches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

These devices connect wireless devices such as computers, printers, and tablets to the network. Since pretty much every device manufactured today has a wireless NIC, you just need to configure a basic access point (AP) to connect to a traditional wired network.

A

WLAN devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

These devices allow wireless devices to connect to a wired network and extend a collision domain from a switch, and are typically in their own broadcast domain or what we’ll refer to as a Virtual LAN (VLAN).

A

Access Points or APs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

An AP can be a simple standalone device, but today they are usually managed by wireless controllers either in house or through the internet.

A

Access Points or APs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

These devices are network security systems that monitor and control the incoming and outgoing network traffic based on predetermined security rules, and is usually an Intrusion Protection System (IPS).

A

Firewalls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is the meaning of the abbreviation OSI?

A

Open Systems Interconnection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the meaning of the abbreviation ISO?

A

International Organization for Standardization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

In the late 1970s, the _______ reference model was created by the ________ to break through this barrier.

A

Open Systems Interconnection (OSI);
International Organization for Standardization (ISO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

The ______ was meant to help vendors create interoperable network devices and software in the form of protocols so that different vendor networks could work in peaceable accord with each other.

A

OSI model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

_______ is the primary architectural model for networks. It describes how data and network information are communicated from an application on one computer through the network media to an application on another computer. The OSI reference model breaks this approach into layers.

A

OSI model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

______ is a conceptual blueprint of how communications should take place.

A

Reference Model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
- processes required for effective communication and divides them into logical groupings hierarchical or layered architecture a communication system is design.
Layers
26
Advantages of Reference Models:
- It divides the network communication process into smaller and simpler components, facilitating component development, design, and troubleshooting. - It allows multiple-vendor development through the standardization of network components. - It encourages industry standardization by clearly defining what functions occur at each layer of the model. - It allows various types of network hardware and software to communicate. - It prevents changes in one layer from affecting other layers to expedite development.
27
____ is a logical model, not a physical one. It’s essentially a set of guidelines that developers can use to create and implement applications to run on a network.
OSI
28
It also provides a framework for creating and implementing networking standards, devices, and internetworking schemes.
OSI
29
OSI define into 2 Layers:
- The three top layers define how the applications within the end stations will communicate with each other as well as with users. -The bottom four layers define how data is transmitted end to end.
30
7 layers of the OSI reference model
Application layer (layer 7) Presentation layer (layer 6) Session layer (layer 5) Transport layer (layer 4) Network layer (layer 3) Data Link layer (layer 2) Physical layer (layer 1)
31
The _____ of the OSI model marks the spot where users actually communicate to the computer and comes into play only when it’s clear that access to the network will be needed soon.
Application layer
32
The _____ gets its name from its purpose: It presents data to the Application layer and is responsible for data translation and code formatting. Think of it as the OSI model’s translator, providing coding and conversion services. One very effective way of ensuring a successful data transfer is to convert the data into a standard format before transmission.
Presentation layer
33
The _____ is responsible for setting up, managing, and dismantling sessions between Presentation layer entities and keeping user data separate. Dialog control between devices also occurs at this layer.
Session layer
34
Three Different Modes:
Simplex Half-duplex Full-duplex
35
It is simple one-way communication, kind of like saying something and not getting a reply.
Simplex
36
It is actual two-way communication, but it can take place in only one direction at a time, preventing the interruption of the transmitting device.
Half-duplex
37
It is exactly like a real conversation where devices can transmit and receive at the same time, much like two people arguing or interrupting each other during a telephone conversation.
Full-duplex
38
The _________ segments and reassembles data into a single data stream.
Transport layer
39
Services located at this layer take all the various data received from upper-layer applications, then combine it into the same, concise data stream.
Transport layer
40
These protocols provide end-to-end data transport services and can establish a logical connection between the sending host and destination host on an internetwork.
Transport layer
41
The _____ is responsible for providing mechanisms for multiplexing upper layer applications, establishing sessions, and tearing down virtual circuits.
Transport layer
42
A device that transmit and establish a connection-oriented communication session with a remote device
Call Setup Or A Three-way Handshake
43
The two operating systems communicate by sending messages over the network confirming that the transfer is approved and that both sides are ready for it to take place.
Connection-Oriented Communication or Call Setup Or A Three-way Handshake
44
True of False: The first “connection agreement” segment is a request for synchronization (SYN).
True
45
True or False: After SYN, the next segments acknowledge (ACK) the request and establish connection parameters— the rules—between hosts. These segments request that the receiver’s sequencing is synchronized here as well so that a bidirectional connection can be formed.
True
46
True or False: The final segment is also an acknowledgment, which notifies the destination host that the connection agreement has been accepted and that the actual connection has been established. Data transfer can now begin.
True
47
Its job is to ensure data integrity at the Transport layer by allowing applications to request reliable data transport between systems.
Flow Control
48
______ prevents a sending host on one side of the connection from overflowing the buffers in the receiving host.
Flow control
49
The Protocols Involved Ensure That The Following Will Be Achieved:
- The segments delivered are acknowledged back to the sender upon their reception. - Any segments not acknowledged are retransmitted. - Segments are sequenced back into their proper order upon arrival at their destination. - A manageable data flow is maintained in order to avoid congestion, overloading, or worse, data loss.
50
_____ is the quantity of data segments, measured in bytes, that the transmitting machine is allowed to send without receiving an acknowledgment.
Window; Windowing
51
Reliable data delivery ensures the integrity of a stream of data sent from one machine to the other through a fully functional data link.
Acknowledgments
52
It is a technique that requires a receiving machine to communicate with the transmitting source by sending an acknowledgment message back to the sender when it receives data.
Positive Acknowledgment with retransmission
53
______ or layer 3, manages device addressing, tracks the location of devices on the network, and determines the best way to move data.
Network Layer
54
______ to transport traffic between devices that aren’t locally attached.
Network Layer
55
These are used to transport user data through the internetwork.
Data Packets
56
Protocols used to support data traffic are called _____, and IP and IPv6 are key examples
routed protocols
57
These packets are used to update neighboring routers about the networks connected to all routers within the internetwork.
Route Update Packets
58
_____ send route update packets.
Routing Protocols
59
These are specific network addresses. A router must maintain a routing table for individual routing protocols because each routed protocol keeps track of a network with a different addressing scheme.
Network Addresses Protocol
60
The exit interface a packet will take when destined for a specific network.
Interface
61
The distance to the remote network. Different routing protocols use different ways of computing this distance.
Metric
62
True or False: A router in an internetwork. Each router LAN interface is a broadcast domain. Routers break up broadcast domains by default and provide WAN services.
True
63
True or False: Routers, by default, will not forward any broadcast or multicast packets.
True
64
True or False: Routers use the logical address in a Network layer header to determine the next-hop router to forward the packet to.
True
65
True or False: Routers can use access lists, created by an administrator, to control security based on the types of packets allowed to enter or exit an interface.
True
66
True or False: Routers can provide layer 2 bridging functions if needed and can simultaneously route through the same interface.
True
67
True or False: Layer 3 devices—in this case, routers—provide connections between virtual LANs (VLANs).
True
68
True or False: Routers can provide quality of service (QoS) for specific types of network traffic.
True
69
The ______ provides for the physical transmission of data and handles error notification, network topology, and flow control.
Data Link layer
70
It will ensure that messages are delivered to the proper device on a LAN using hardware addresses and will translate messages from the Network layer into bits for the Physical layer to transmit.
Data Link layer
71
The Data Link layer formats the messages, each called a _____, and adds a customized header containing the hardware destination and source address. This added information forms a sort of capsule that surrounds the original message in much the same way that engines, navigational devices, and other tools were attached to the lunar modules of the Apollo project.
data frame
72
What is LLC?
Logical Link Control
73
What is MAC?
Media Access Control
74
Defines how packets are placed on the media. Contention for media access is “first come/first served” access where everyone shares the same bandwidth— hence the name.
Media Access Control (MAC)
75
It’s the signal path through a physical topology.
Logical topology
76
Responsible for identifying Network layer protocols and then encapsulating them.
Logical Link Control (LLC)
77
An _____ tells the Data Link layer what to do with a packet once a frame is received.
LLC header
78
True or False: LLC works like this: a host receives a frame and looks in the LLC header to find out where the packet is destined—for instance, the IP protocol at the Network layer.
True
79
The _____ can also provide flow control and sequencing of control bits.
LLC
80
True or False: Layer 2 switching is considered hardware-based bridging because it uses specialized hardware called an application-specific integrated circuit (ASIC).
True
81
True or False: ASICs can run up to high gigabit speeds with very low latency rates.
True
82
This layer does two things: it sends bits and receives bits. Bits come only in values of 1 or 0 - a Morse code with numerical values.
Physical layer
83
The _____ layer communicates directly with the various types of actual communication media. Different kinds of media represent these bit values in different ways.
Physical Layer
84
A ___ is really a multiple-port repeater.
hub
85
A ____ receives a digital signal, reamplifies or regenerates that signal, then forwards the signal out the other port without looking at any data.
repeater
86
A _____ does the same thing across all active ports: any digital signal received from a segment on a hub port is regenerated or reamplified and transmitted out all other ports on the hub.
hub
87
The ______ of a network refers to the physical layout of the devices, but mostly the cabling and cabling layout.
physical topology
88
The ______ defines the logical path on which the signal will travel on the physical topology.
logical topology
89
In a _____, every workstation is connected to a single cable, meaning every host is directly connected to every other workstation in the network.
bus topology
90
In a _____, computers and other network devices are cabled together in a way that the last device is connected to the first to form a circle or ring.
ring topology
91
The most common physical topology is this topology, which is your Ethernet switching physical layout. A central cabling device (switch) connects the computers and other network devices together. This category includes star and extended star topologies. Physical connection is commonly made using twisted-pair wiring.
Star topology
92
In a _____, every network device is cabled together with connection to each other. Redundant links increase reliability and self-healing. The physical connection is commonly made using fiber or twisted-pair wiring.
mesh topology
93
Ethernet uses a physical star layout (cables come from all directions), and the signal travels end-to-end, like a bus route.
Hybrid