IP Address Flashcards
(IP) An IP address is a _______ _______.
numeric address
(IP) It’s an _________ for a computer or device on a network.
identifier
(IP) Every device on a network needs to have an __ ________ to communicate.
IP address
(IP) The IP address consists of 2 parts: the first part is the _______ address and second part is the ____ address.
network, host
(IP) Two types of IP addresses: the first one is the most common one, ____, and the second type is ____.
IPv4, IPv6
(IPv4) IPv4 is the _______ version of IP addresses.
current
(IPv4) is a __-___ numeric address written as four numbers separated by _______.
32-bit, periods
(IPv4) Each group of numbers that are separated by periods is called an _____.
octet
(IPv4) EX: 66.94.234.13 , any group of these numbers is an _____.
octet
(IPv4) The number range in each octet is __-____.
0-255
(IPv4) This address version can produce over 4 billion (4,294,967,296) ______ _________.
unique addresses
(IPV4 Bi) IPv4 is made up of 4 sets of __ binary bits. And these sets are called ______.
8, octets
(IPV4 Bi) The bits in each octet are represented by a ______.
number
(IPV4 Bi) by manipulating the ones and the zeros in the octet, you can come up with a range from __ to ___.
0, 255
(IPv6) ____ is the next generation of IP addresses.
IPv6
(IPv6) The main difference between IPv4 and IPv6 is the ______ of the _______.
length, address
(IPv6) The IPv4 address is a __-___ numeric address.
32-bit
(IPv6) IPv6 is a ___-___ hexadecimal address.
128-bit
(IPv6) Hexadecimal uses both _______ and _________ in the address.
numbers, alphabets
(IPv6) So with this type of address, IPv6 can produce an unbelievable 340 ___________ __ _________.
undecillion, ip, addresses
(IPv6 Bi) It’s made up of eight sets of __ bits, with the eight sets separated by ______.
16, colons
(IPv6 Bi) In a similar way that we converted an IPv4 address to a binary number, this is how we convert a binary number to a ___________ _______.
hexadecimal, address
(IPv6 Bi) In an IPv6 ip address, each hexadecimal character represents ____ ____. So we have to convert four bits at a time, to get one ___________ character.
four bits, hexadecimal
(Subnet Mask) IP address consists of 2 parts: A _______ address and a ____ address.
network, host
(Subnet Mask) So the way to tell which portion belongs to either the network or the host, is where the ______ ____ comes in.
subnet, mask
(Subnet Mask) Subnet mask: a number that resembles an __ _______. It reveals how many bits in the IP address are used for the _______ by masking the network _______ of the IP address.
I.P address, network, portion
(IP C&R) IP addresses are assigned to different organizations and ______. And these blocks are divided into ____ _______. But for the exam you only need to know three of them.
blocks, five, classes
(IP C&R) They are class __, __, and __. And you can tell by the number in the first octet, which class an I.P address belongs to.
A, B, C.
(IP C&R) a class A I.P range is from __ to ___. This class supports 16 million hosts, on 126 networks. This class is mainly given to large _____________ because of a tremendous amount of I.P addresses it can give out.
1, 126, large, organizations
(IP C&R) a class B I.P range is from ___ to ___, and this class supports 65,000 hosts on 16,000 networks. This class is given to ______-_____ organizations.
128, 191, medium-sized
(IP C&R) a class C I.P range is from ___ to ___. This class supports 254 hosts on 2 million networks. And this class is given to _____ _____________.
192, 223, small, organizations
(IP C&R) You also going to need to memorize the _______ ______ _____ for each of these classes.
default, subnet, masks,
(IP C&R) Now if you notice we skipped over the “___” _____. And that’s because this number cannot be used for a network. Because the number 127 address is reserved for ________ ________ functions.
127, range, internal, loopback
(Private I.P) Public I.P addresses are ________ __________ on the internet. Which basically means that if you have a Public I.P address, you have access to the internet.
publicly, registered
(Private I.P) But Private I.P addresses are different. A private I.P is not ________ __________. So you cannot directly access the internet with a _______ I.P.
publicly, registered, private
(Private I.P) let’s say you have a small business and you need 10 public IP addresses so your employees can access the internet. Now, you could contact your ISP and ask them for these additional IP addresses, but that would be very _________ and unnecessary. So, that’s where _______ __ addressing comes in.
expensive, private, IP
(Private I.P) In private IP addressing, you can create these 10 private IP addresses and just have one publicly registered IP address from your ISP. These 10 private IPs would then be translated into the one ______ __, so your employees can have access to the ________. This not only saves money but it also helps prevent having a shortage of public IP addresses.
public IP, internet
(Private I.P) The RFC-1918 standard created private IP addressing to prevent a shortage of ______ __ ________ available to ISPs and subscribers.
public, IP, addresses
(Private I.P) Private IP addresses are typically used on _____ ________ such as homes, schools, and businesses.
local, networks
(Private Ranges) These private IP ranges have three classes: Class A starts with the number __, Class B starts with the number ___, and Class C starts with the number ___.
10, 172, 192
(Subnetting) The word “subnet” is short for “__________,” which means a smaller network within a ______ one.
subnetwork, larger
(Subnetting) Subnetting is basically breaking down a large network into _______ ________ or subnets. It’s mainly done to make your network more __________.
smaller networks, manageable
(Subnetting) Subnetting is basically done by changing the _______ ______ ____, by borrowing some of the bits that were designated for hosts and using them to create subnets.
default, subnet, mask
(Dyn IP AM) Every computer on the network has to have an IP address for _____________ purposes.
communication
(Dyn IP AM) There are two ways that a computer can be assigned an IP address. It can be done either by using a _______ IP or a ______ IP.
dynamic, static
(Dyn IP AM) A dynamic IP is where a computer gets an IP address ______________ from a ____ server.
automatically, DHCP
(Dyn IP AM) DHCP stands for _______ ____ _____________.
Dynamic Host Configuration Protocol
(Dyn IP AM) A DHCP server automatically assigns a computer with an IP address, and in addition to an IP address, it can also assign a ______ ____, _______ _______, and a ___ ______.
subnet mask, default gateway, DNS server
(Dyn IP AM) Dynamic IP addressing is the best choice because it makes _________ a ________ a lot easier.
managing, network
(Stat IP AM) You can also assign a computer with an IP address ________, and this is called a ______ __.
manually, static IP
(Stat IP AM) A static IP is where a user ________ assigns an __ _______ for the computer. So there is no need for a DHCP server, and this kind of IP addressing is also known as permanent because, unlike dynamic addressing where the IP address can change automatically, a static IP only changes if the user decides to.
manually, IP, address
(Self-Assigned) self-assigned addressing is called APIPA, which stands for _________ _______ __ _______ _________.
Automatic, Private, IP, Address, Assignment
(Self-Assigned) Computers running Microsoft Windows 98 or later do this so they can still be able to ___________ with other _________ on the same network that also have ____-_______ __ _________.
communicate, computers, self, assigned, IP, addresses.
(Self-Assigned) If a DHCP server later becomes available, the computer changes its IP address to one that’s obtained from a ____ ______.
DHCP, server
(Scope DHCP) A DHCP server assigns __ _________ to computers on a subnet from its _____.
IP, addresses, scope
(Scope DHCP) a scope is a group and a range of ___________ __ _________ for computers that automatically get their IP address from a ____ server.
consecutive, IP addresses, DHCP
(Reserv DHCP) If you wanted a computer on your network to have a specific IP address all the time, you can create a ___________ on the DHCP server.
reservation
(Reserv DHCP) A reservation ensures that a specific computer or device, identified by its ___ _______, will always be given the same IP address when that computer accesses the DHCP server.
MAC, Address
(Reserv DHCP) Reservations are not typically given to regular computers; they are typically given to _______ _______ or _________ such as network printers and servers that require using the same IP address constantly.
special, devices, computers.
(Lease DHCP) Computers obtain an IP address from a ____ ______.
DHCP, server
(Lease DHCP) The DHCP server assigns the IP address as a _____. So the computer doesn’t actually own the __ _______; it’s actually a lease.
lease, IP, address
(Lease DHCP) a lease is the amount of ____ an IP address is assigned to a ________.
time, computer
(Lease DHCP) The lease duration could be a ___ or more depending upon the lease ________ of a DHCP server.
day, settings
(Lease DHCP) if I do an ipconfig /all in a command prompt on my computer, you can see that the DHCP service on my router has assigned my computer an IP address with a _____ of one ___.
lease, day
(Lease DHCP) Typically, a DHCP server will _____________ _____ the IP address for you, so you won’t have to do anything or even notice that the IP address is being renewed.
automatically, renew
(DHCP Relay) A DHCP relay or IP helper is a service that is enabled on a router that will relay a ____ broadcast it receives and ________ it.
DHCP, forwards
(DHCP Relay) So now the computer will broadcast a request for an IP address, and once the DHCP relay on the router receives the broadcast, it will forward the broadcast to the DHCP server, and then the DHCP server will send the __ _______ back to the ________.
IP, address, computer
(TCP) Transmission Control Protocol is one of the ____ protocols used in a TCP/IP _______.
main, network
(TCP) Now, this is a __________-oriented protocol, which basically means that it must first acknowledge a session between the two computers that are _____________. And it does this by using a three-way handshake.
connection, communicating.
(TCP) The first step is that a computer will send a message called a ___ (S-S-Y-N). Then, the receiving computer will send back an acknowledgement message, telling the sender that it has received the _________. And finally, the sender computer sends another acknowledgement message back to the receiver. And once this has taken place, data can be _________.
SYN, message, delivered.
(TCP) Another important thing to remember about TCP is that it guarantees the delivery of the ____. So, if a data packet goes astray and doesn’t arrive, then TCP will ______ it.
data, resend
(UDP) UDP is very similar to ___.
TCP
(UDP) UDP is also for sending and receiving data, but the main difference is that UDP is _______________, which means that it does not establish a _______ and does not guarantee data ________. So, when a computer sends its data, it doesn’t really care if the data is received at the other end.
connectionless, session, delivery
(UDP) UDP is known as a “____ ___ ______” protocol because it sends data and it doesn’t really care what happens to it.
fire, and, forget
(UDP) because of the less overhead involved in not guaranteeing data delivery, ___ is faster than TCP.
UDP
(FTP) FTP stands for ____ _______ ________, and this is the standard protocol that is used by web users to ______ and download files between computers through the _________.
File, Transfer, Protocol, upload, internet.
(FTP) if a user wanted to make their files available to download to other users, all they would have to do is simply ______ their files to an ___ ______, and then a user can simply download them.
upload, FTP, server
(FTP) There are a few ways to transfer files using ___.
FTP
(FTP) You can use your standard ________ _______, or you can use special ___ ________.
internet, browser, FTP, software
(FTP) FTP is a __________-oriented protocol that uses ___ for file transfer.
connection, TCP
(SFTP) Secure FTP is just like FTP, except that it adds a layer of _______ to the data.
security
(SFTP) Using Secure FTP, the data is actually encrypted using ______ _____ during data transfer. So, no sensitive data like passwords are sent in _____ ____.
Secure, Shell, clear, text
(SMTP) SMTP stands for ______ ____ ________ ________.
Simple, Mail, Transfer, Protocol
(SMTP) this is the protocol that is used to send _____.
(SMTP) A good way to remember this is by looking at the acronym SMTP and translating that to “_______ ____ __ ______.”
sending, mail, to, people
(SMTP) SMTP uses the ___ protocol, and as you know by now, it is __________-oriented. So, if an email you send does not reach its destination, you’ll get that familiar mail delivery error in your mailbox, informing that the email you sent ______.
TCP, connection, failed
(POP3) Where SMTP is used for _______ email, POP3 is the protocol that is used for _________ email.
sending, receiving
(POP3) Whenever an email arrives at your mail server, you can retrieve it using the ____ protocol and ________ it to your computer.
POP3, download
(POP3) The main characteristic about POP3 is that all it does is grab the email from the mail server and ________ the email to your computer.
download
(POP3) It does not sync any email or folders from the mail server and your computer like IMAP4 does, It strictly _________ the _____.
downloads, email
(POP3) when your email application using POP3 retrieves the email from the mail server, the email is removed from the mail server unless you specify in your email application to keep a copy on the ____ ______.
mail server
(POP3) POP3 is commonly used with email applications such as _________ _______.
Microsoft Outlook
(IMAP4) IMAP4 is another protocol that is used for _________ _____.
receiving, email
(IMAP4) IMAP4 is similar to POP3 because they are both used for retrieving email from a mail server, but _____ has better ________.
IMAP4, features
(IMAP4) With IMAP4, you can access and manage your email on the server from your _____ _________. So, if you wanted to read your email and keep a copy of it on the server, IMAP4 will allow you to do just that.
local, computer
(IMAP4) And unlike POP3, IMAP4 _____ your email and your email folders from the mail server with your computer.
syncs
(IMAP4) IMAP4 is also commonly used with ________ _______.
Microsoft Outlook
(HTTP) HTTP stands for __________ ________ ________
Hypertext, Transfer, Protocol
(HTTP) this is probably the most widely ____ ________ in the world today.
used, protocol
(HTTP) HTTP is the protocol that is used for _______ ___ _____ on the internet. So, when you type in a web address, for example, google.com, you’ll notice that HTTP is added at the beginning of the URL. And this indicates that you are now using HTTP to retrieve this web page.
viewing, web, pages
(HTTP) In standard HTTP, all information is sent in _____ ____. Now, normally, this would be okay if you were just browsing regular websites. But if you were at a website where you had to enter _________ ____, such as passwords or credit card information, then this would be a problem as far as security.
clear, text, sensitive, data
(HTTPS) HTTPS stands for ______ Hypertext Transfer Protocol.
Secure
(HTTPS) this is HTTP with a ________ feature.
security
(HTTPS) HTTPS encrypts the ____ that is being retrieved by _____.
data, HTTP
(HTTPS) example, if you wanted to go to your bank’s website to check your account, you will notice that an “s” will be added to the HTTP in the web URL. And this indicates that you are now using HTTPS and have entered a ______ website where sensitive data is going to be passed. And that data needs to be protected.
secure
(HTTPS) Some other examples where HTTPS is used would be like ______ servers or __-_________ websites.
email, e-commerce
(Telnet) Telnet is a terminal emulation program that is used to ______ ______ ______.
access, remote, servers
(Telnet) It’s a simple tool that runs on your computer, and it will allow you to ____ _________ ________.
send, commands, remotely
(Telnet) because it only sends commands and not graphics, it’s very ____. But the drawback is that it’s ___ ______.
fast, not, secure
(Telnet) All commands are sent in _____ ____.
clear, text
(Telnet) So today, Telnet is mainly used to access _______ within a _____ _______ and not on the internet.
devices, local, network
(SSH) SSH or ______ _____ is a better alternative to Telnet.
Secure Shell
(SSH) Secure Shell protects the data from being ________ or stolen as it’s being transferred over a _______.
attacked, network
(SSH) for example, if you were sending sensitive data like a login and password, a potential hacker could be listening and steal the data. And that’s the reason for ______ _____.
Secure, Shell
(SSH) Secure Shell acts like a ______ ______ that forms around the data transfer and protects it from _________ _______.
secure, tunnel, potential, threats
(ARP) ARP stands for _______ ___________ ________.
Address, Resolution, Protocol
(ARP) this is a protocol that is used to resolve __ addresses to ___ addresses.
IP, MAC
(ARP) Whenever a computer needs to communicate with another computer on the network, it needs the ___ _______ for that computer.
MAC address
(ARP) let’s say a computer wants to communicate with another one. Now, it will first look at its internal list, called an ___ _____, to see if the targeted computer’s IP address already has a matching ____ address in its table. (PT.1)
ARP, cache, MAC
(ARP) Now, if it doesn’t, it will send out a _________ _______ out on the network, asking which computer has the IP address. And the computer that has the matching IP address will respond back, informing that it has the IP it’s looking for. (PT.2)
broadcast, message
(ARP) Then, the original computer will ask for their MAC address. And once it receives it, the ____________ will take place between the two. (PT.3)
communication
(RARP) RARP, which stands for _______ _______ __________ ________.
Reverse, Address, Resolution, Protocol
(RARP) this is just the ________ of ARP. It’s used to resolve MAC addresses to __ addresses.
opposite, IP
(NTP) NTP stands for _______ ____ ________, and this is an internet standard that is used to ___________ the clocks of computers with the US Naval Observatory master clocks.
Network, Time, Protocol, synchronize
(NTP) This protocol runs on each ________ and sends out periodic requests to the server to make sure the time is in ____.
computer, sync
(SCP) SCP stands for ______ ____ ________
Secure, Copy, Protocol
(SCP) this protocol simply uses Secure Shell to _________ data as it’s being transferred over a _______.
safeguard, network
(SNMP) SNMP stands for ______ _______ ___________ ________.
Simple, Network, Management, Protocol
(SNMP) this is a protocol used for _______ __________.
network, management
(SNMP) It’s basically used for collecting data from various _______ _______, such as routers, printers, and servers.
network, devices
(Ports) When data is sent over the internet to your computer, it needs to know how to accept it, and your computer accepts this data using _____.
ports
(Ports) These ports are categorized by two protocols: ___ and ___.
TCP, UDP
(Ports) Now, a port is a _______ __________ that is used by programs to exchange information, and these ports have a ______ ______ that identifies them.
logical, connection, unique, number
(Ports) The number ranges from __ to __,___, but for the exam, you only need to know a few of them.
0-65k (65,535)
(Ports) Some of these ports are very common and are used _____ ______ ___. For example, port 80 is used for bringing up web pages on the internet.
every, single, day
(Ports) Another one is port 443, which is used for logging into ______ ___ _____ that require a login and password.
secure, web, pages
(Ports) And another common one is port 25, which is used for _______ _____ from an _____ ____________ such as Microsoft Outlook.
sending, email, email application
(DNS) DNS stands for ______ ____ ______.
Domain, Name, System
(DNS) DNS resolves domain names to __ _________.
IP, addresses
(DNS) In the world of networking, computers don’t go by names like humans do; they go by ________.
numbers
(DNS) if you type in a web address in your web browser, DNS will transform the name to a ______ because all _________ know are numbers.
number, computers
(DNS) demonstration, when you type in yahoo.com in your web browser, the DNS server will search through its database to find a matching IP address for that domain name. And when it finds it, it will transform that domain name to the __ _______ of the Yahoo web server.
IP, address
(DNS) So, DNS basically works like a _____ ____. When you want to find a phone number, you don’t look up the number first; you look up the ____ first, then it will give you the number.
phone, book, name
(WINS) WINS stands for _______ ________ ____ _______, and this is used on NetBIOS networks.
Windows, Internet, Name, Service
(WINS) This service is similar to DNS, and as you recall, DNS resolves domain names to IP addresses. But WINS resolves _______ names or computer names to __ _________.
NetBIOS, IP, addresses
(WINS) if you wanted to communicate with another computer on the same network, you would do so by using the __________ name, and then the WINS server will resolve the name to the __ _______ of that computer.
computer’s, IP, address
(NAT) This is called _______ _______ ___________ or NAT, and this is a service that is typically used in routers.
Network, Address, Translation
(NAT) It is used to ________ a set of IP addresses to another set of IP addresses.
translate
(NAT) If a computer on the internet wants to communicate with a computer on this private network, then the public IP address needs to be _________ to the private IP address for that computer. (PT.2)
translated
(PAT) Another version of Network Address Translation is called PAT, which stands for ____ _______ __________.
Port, Address, Translation
(PAT) this translates IP addresses based on ____ ________.
port, numbers
(PAT) Each computer in a private network is issued not only a unique IP address, but they are also issued a ______ ____ _______. (PT.1)
unique, port, number
(PAT) This is done so that external data packets from the ________ know which computer on the _______ network it wants to talk to. (PT.2)
internet, private
(PAT) example, if a device outside this network wanted to communicate with a computer on this private network, the IP address along with its port number will be translated by ___ to find the correct ________.
PAT, computer
(SNAT) SNAT stands for ______ _______ _______ __________
Static, Network, Address, Translation
(SNAT) NAT translates a private network’s IP addresses to a ______ __ _______.
public, IP, address
(SNAT) So what SNAT does is that it can link a ______ IP address with a _______ IP address permanently, and this is useful when a computer or server needs to be accessed from outside the _______.
public, private, network
(Proxy S) a proxy service is similar to your ___ ________.
web, browser
(Proxy S) Whenever you look at a web page, your web browser will store that web page into _____. So, at a later time, if you were to look at that web page again, your browser retrieves it much faster because it doesn’t have to ________ the contents of that web page all over again since it’s already stored on your computer. And a _____ ______ does the same thing.
cache, download, proxy, server
(Proxy S) example, if a company uses a proxy server, whenever a user wants to retrieve a web page, the proxy server will ________ the web page from the internet on behalf of the user. And then it will store that ___ page into a centralized cached ________. (PT.1)
retrieve, web, database
(Proxy S) So, if another user on a different computer goes to a web page that has been stored in the proxy database, the proxy server does not have to go out on the internet to ________ the ___ ____. It can simply retrieve it from its database and send it to the user. (PT.2)
retrieve, web, page
(Proxy S) a benefit of using a proxy service is ______ since web page retrieval is much faster.
speed
(Proxy S) Proxy service saves _________ because a proxy server reduces the need to go out on the ________.
bandwidth, internet
(Proxy S) it provides security because it reports what web pages are retrieved to the _______ _____________.
network, administrator
(RDP) Remote Desktop Protocol is a technology from _________ to access a ______ __________ _______.
Microsoft, remote, computer’s, desktop
(RDP) RDP is based on _________ _______ ________.
Microsoft, Terminal, Services
(RDP) if a user wanted to access another computer, the user can simply type in an __ _______ along with the proper credentials. And then the user can have the ______ __________ _______ displayed on their own computer screen.
IP, address, remote, computer’s, desktop
(CSMA/CD) When you have a lot of computers on a network, and they’re all sending data, the potential for collisions is present. And when you have __________, data communication is ____. So, that’s why they developed a protocol called CSMA/CD
collisions, lost
(CSMA/CD) CSMA/CD, which stands for _______ _____ ________ ______/_________ _________.
Carrier, Sense, Multiple, Access/Collision Detection
(CSMA/CD) this is the access method used on ________ ________. This method works by each computer first sensing if the wire is idle, and if it is, it sends its data, therefore ________ any __________.
ethernet, networks, avoiding, collisions
(CSMA/CD) if you have two computers trying to send data at the same time, a _________ will ______. And if a collision happens, the computers will wait a random amount of time and _____ to send their data.
collision, happen, retry
(CSMA/CA) CSMA/CA stands for ______ _____ ________ ______ with ________ __________, and this is the access method used for carrier transmission in ________ ________.
Carrier, Sense, Multiple, Access, Collision, Avoidance, wireless, networks
(CSMA/CA) this method is similar to CSMA/CD, except that when a computer wants to send its data, it first sends out a _____ ____ ______ to make sure that the channel is _____ before sending out its main data. If the packet is successfully transmitted, then the computer is clear to send out its main data.
small, data, packet, clear
(Broadcast) The term broadcast refers to when there is a single transmitter of ____, and that data is being received by ________ _________.
data, multiple, receivers
(Broadcast) example, a wireless router can _________ its wireless signal and be picked up by ________ ___________ to access the internet.
broadcast, multiple, computers
(Uni v. Mul) The difference between unicast and multicast is that with unicast, the data packets are sent to a ______ __________. And with multicast, the data packets are sent to ________ __________ at the same time.”
single , destination, multiple, destinations