Lesson 08 Glossary for Configure TCP-IP Flashcards

1
Q

An integration/migration method in IPv6 allowing native IPv6 client machines to communicate through IPv4 clouds.

This method is used for non-dual stack machines running IPv6 only.

The edge or border devices (connecting IPv6 and IPv4 networks) need to be configured to forward IPv6 traffic to IPv6 networks “tunneling” the IPv6 addresses through the IPv4 space.

The IPv6 prefix for 6to4 functionality is 2002:: /16.

A

6to4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

IPv6 (also defined for IPv4 but not generally used) packet type that defines a unique address for an interface that can also be applied to multiple devices.

Communication occurs only between two devices, typically the closest devices on the network.

Anycast is described as one-to-“one of many.”

A

Anycast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

IPsec header used to authenticate data or a data stream included in the IPv6 protocol as an extension header.

A

Authentication header

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Network IDs and host IDs within an IPv4 address are distinguished by using a subnet mask.

The default subnet mask is assigned based on the class of the address in question, such as a Class A, B, or C address.

These addresses are characterized by 8, 16, or 24 bits to specify the network portion of the address one octet for a Class A network (255.0.0.0), two octets for a Class B network (255.255.0.0), and three octets for a Class C network (255.255.255.0).

It’s not the subnet mask that determines the class of an address; it is the first octet numerical value.

A

Default subnet mask

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

IPsec header (and specification) used to provide security by encrypting data or a stream of data.

Included in IPv6 as an extension header.

A

Encapsulating Security Payload

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Extended unique identifier using 64 bits.

The EUI-64 address uses the 48-bit MAC address (6 bytes) and adds 2 bytes between the organizationally unique identifier (the first 3 bytes of the MAC address) and the last 3 bytes.

The added 2 bytes are FF:FE.

Also, the first byte of the MAC has its sixth bit flipped, so the value is 02.

A

Extended User Interface 64-bit (EUI-64) format

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A component of IPv6 that allows additional or new information to be included as part of the layer 3 data but as an extension or addition to the base frame.

IPv4 had similar functionality, but it was part of the base header making the header variable length and harder to work with as far as software/device evaluation.

By using extension headers, IPv6 becomes more efficient and extensible.

A

Extension headers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

In the IPv6 address space, addresses assigned to devices that will be accessible to the global IPv6 Internet space.

This is similar to the public IP addresses of IPv4, but there are a lot more of them.

The current allocation of the global unicast address space is 2000:: /3 (which leaves only 125 bits for uniqueness).

A

Global unicast address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Describes notation used to represent 8 bits (a byte) using two characters (each representing 4 bits, or a nibble).

The valid 4-byte values are 0-9 and A-F.

Any of these two characters together represent a byte.

(C0 in hex, for example, is a C and a 0. A C is 1100 in binary, a zero is 0000 in binary; the 8 bits are then 1100 0000, or 192, in decimal.)

A

Hexadecimal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

In IP addressing, one part (the leftmost) of an address is designated as the network address, and the other part is designated as a node address.

Devices on a network share the highest-order bits.

This allows you to summarize routes in routing tables so that routers have the fewest route entries upon which to make layer 3 decisions.

A

Hierarchical address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Also known as IPv6.

Early in the development of the new IP protocol, it was not known which concepts and ideas (and even version) of IP would be the replacement for IPv4.

Many folks took to calling it the next generation of IP, or IPng.

You will still see this term used in documentation today.

A

Internet Protocol next generation (IPng)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The next generation of IP, also called IPng, is being implemented and standardized today. IPv6 is simply a replacement of the layer 3 components of the TCP/IP protocol suite.

The layer 4 components (TCP and UDP) are not modified.

IPv6 uses a 128-bit address space, much larger than IPv4’s 32-bit address space.

A

Internet Protocol version 6 (IPv6)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

An IPv4 to IPv6 integration/ migration utility that allows dual-stack nodes to discover ISATAP routers and communicate with other IPv6 networks on the other side of an IPv4 cloud.

A

Intrasite Automatic Tunnel Addressing Protocol (ISATAP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Address used on a local link (a link in IPv6 terms is a network segment) that allows devices on the same link to communicate (for example, to share files) without needing to be configured.

Link-local addresses use the prefix FE80:: /10.

Link-local addresses are not globally routable.

A

Link-local address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

When you apply the subnet mask to an IP address to see the network value (subnet value), the IP addresses is said to be masked.

A

Masked

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Protocol used in IPv6 that allows devices to discover other devices on the same link.

Neighbor discovery uses multicast packets and can retrieve router information.

Neighbor discovery is the IPv6 functionality that replaces the IPv4 ARP.

Neighbor discovery also participates in the IPv6 stateless autoconfiguration feature.

A

Neighbor discovery

17
Q

A server that participates in a cluster and can host clustered resources.

A

Node

18
Q

A value that uniquely identifies a device in a network.

In IPv4, the node has a single node address; in IPv6, a node will typically have more than one IPv6 address”one for the physical interface and addresses for the virtual or pseudo interfaces as well.

A

Node address

19
Q

Small chunks of data that are constructed, modified, and disassembled by network protocols at various levels of the OSI model during the process of transmitting data across the network.

Each packet, also called an envelope, consists of three parts: a header, data, and a trailer.

A

Packet

20
Q

IPv4 and IPv6 notation for showing the network portion of an IP address by specifying the number of network bits after a forward slash.

For example, /16 (pronounced “slash 16”) indicates 16 network bits (out of 32 for IPv4 and out of 128 for IPv6).

A

Prefix notation

21
Q

A group of protocols, arranged in layers, that implements an entire communication process.

TCP/IP is an example of a protocol stack. TCP is one protocol and IP is another.

They are stacked together to allow communications.

A

Protocol stack

22
Q

Virtual or logical interface of an IPv6 device.

A Teredo interface or an ISATAP interface is an example of a pseudo-interface.

The pseudo-interfaces of a network device will have their own IPv6 addresses.

A

Pseudo-interface

23
Q

In IPv6, a network node can automatically find the network.

It is on and the address of the network’s router.

The node can then assign itself an IPv6 address and default gateway.

This functionality is similar to the APIPA feature of IPv4, but unlike APIPA, it provides access not only to the local network but to the bigger routed network as well.

A

Stateless autoconfiguration

24
Q

The portion of an IP address that your routers are using to make routing decisions on your network infrastructure.

Routers find this value by looking at the bits of the IP address as defined by the 1s of the subnet mask for the network and making all the other bits (the host bits) 0 and converting the address back to decimal (or hex in the IPv6 world).

What’s nice about IPv6 is you can just put a :: in at the end of the Network/Subnet portion.

A

Subnet address

25
Q

In IP addressing, masking is the function of letting the device evaluate the network portion of the IP address to make routing decisions.

The device uses the mask (or subnet mask) to find the network portion by logically ANDing the IP address and the subnet mask (which essentially makes all of the non-network bits, or host bits, zero).

The dotted decimal or slash (/) value indicates the network portion of an IP address.

The subnet mask is the stream of 1s in the dotted-decimal mask for IPv4 or the number of bits defined by the slash for IPv4 in CIDR or slash notation as well as the number of bits defined by the slash in IPv6.

A

Subnet mask

26
Q

TCP/IP is a protocol suite, and it is the primary communication protocol on a Windows Server 2012 network.

Transmission Control Protocol (TCP) is a reliable connection-oriented protocol on the Transport layer of the OSI Model, part of the TCP/IP protocol suite.

A

TCP/IP

27
Q

Protocol used for unicast IPv6 communication with an IPv4 NAT implementation across an IPv4 infrastructure.
Allows IPv6 addresses to be available to hosts through one or more layers of NAT.

Teredo works by tunneling packets through the IPv4 space using User Datagram Protocol (UDP).

The Teredo service encapsulates the IPv6 data within a UDP segment (packet) and uses an IPv4 address to get through the IPv4 cloud.

Other IPv6 integration/migration methods do not work behind a NAT.

A

Teredo

28
Q

A technology usually associated with VPNs that establishes a secure channel of communications over a network such as the Internet.

A

Tunnel

29
Q

A type of network communication in which a packet is sent from a source host to a single destination host.

The unicast packet type defines a unique address for each node (IPv4) or interface (IPv6).

A

Unicast

30
Q

When you apply the subnet mask to an IP address and can see the network value (subnet value), the host portion of the address is said to be unmasked.

A

Unmasked

31
Q

A connectionless protocol on the Transport layer of the OSI model and part of the IP protocol suite.

A

User Datagram Protocol (UDP)