Lesson 5 Flashcards
TCP/IP
Transport Control Protocol/Internet Protocol
IXPs
Internet Exchange Points
A physical location through which the internet infrastructure companies connect with each other
Internet Exchange Points (IXPs)
PoP
Point of Presence
The media, hardware, and protocols used to link the local network at a domestic residence or small office to the Internet Service Providers Point of Presence
Internet Connection Type
PSTN
Public Switched Telephone Network
POTS
Plain Old Telephone System
DSL
Digital Subscriber Line
ADSL
Asymmetric Digital Subscriber Line
a type of Direct Subscriber Link that provides a fast downlink, but a slow uplink
Asymmetric Digital Subscriber Line (ADSL)
CATV
Cable Access TV
DOCSIS
Data Over Cable Service Interface Specification
FTTx
Fiber To The X
FTTC
Fiber To The Curb
FTTP
Fiber To The Premesis
Means that the service provider’s fiber optic cable runs directly to the customer’s building
Fiber To The Premises (FTTP)
Uses fiber optic cables to the main exchange but then uses old copper wires to connect to properties
Fiber To The Curb (FTTC)
RTT
Round Trip Time
VSAT
Very Small Aperture Terminal
DVB-S
Digital Video Broadcast Satellite
LEO
Low Earth Orbit
WISP
Wireless Internet Service Provider
The area served by each base station is referred to as a
Cell
GSM
Global System for Mobile Communication
CDMA
Code Division Multiple Access
SIM
Subscriber Identity Module
With _______, the handset is directly managed by the provider and there is no removable Subscriber Identity Module (SIM) card
Code Division Multiple Access (CDMA)
UMTS
Universal Mobile Telecommunications Service
EV-DO
Evaluation-Data Optimized
HSPA (H/H+)
High Speed Packet Access
LTE
Long-Term Evolution
MIMO
Multiple Input Multiple Output
The role of filtering allowed and denied hosts and protocols is performed by a
Firewall
ACL
Access Control Link
The rules a basic firewall is controlled by are referred to as a network
Access Control Link (ACL)
UTM
Unified Threat Management
_____ is used to perform logical addressing and data forwarding functions on most networks
Transmission Control Protocol/Internet Protocol (TCP/IP)
A set of rules that allows networked hosts to communicate data in a structured format
Protocol
What are protocols that work together referred to as?
Protocol Suite
Most networks have converged on the use of the
Transmission Control Protocol/Internet Protocol (TCP/IP) Suite
How many layers does the Transmission Control Protocol/Internet Protocol suite have?
Four
The four layers of the Transmission Control Protocol/Internet Protocol (TCP/IP) suite starting from the lower layer
(Starting from lower)
1. Link/Network Interface
2. Internet
3. Transport
4. Application
Which Transmission Control Protocol/Internet Protocol (TCP/IP) layer is responsible for putting frames onto a physical network? (Uses devices such as ethernet and/or Wi-Fi)
Link/Network Interface Layer
A PC, laptop, mobile device, or server that can communicate on an IP network is generally referred to as an
End System Host
Allows a host to query (ask) which MAC address is associated with an IP address
Address Resolution Protocol (ARP)
ARP
Address Resolution Protocol
Which layer determines how each host manages multiple connections for different application layer protocols at the same time
Transport Layer
The transport layer is implemented by one of two protocols:
- Transmission Control Protocol
- User Datagram Protocol
Guarantees connection-oriented forwarding of packets. Can identify and recover from lost or out-of-order packets.
Transmission Control Protocol
Provides unreliable, connectionless forwarding. Is faster because it does not need to send extra information to establish reliable connections
User Datagram Protocol (UDP)
Which layer contains protocols that perform some high-level function, rather than simply addressing hosts and transporting data
Application Layer
The core protocol in TCP/IP is the
Internet Protocol (IP)
Provides network and host addressing and packet forwarding between networks.
Internet Protocols (IP)
There are two versions of Internet Protocol (IP)
IPv4
IPv6
IPv4 is how many bits long?
32
The 32 bits can be arranged into four groups of eight bits (one byte) known as
Octets
The IP address of a router interface that the host can use to forward packets to other networks
Default Gateway
To communicate on the internet, a host must be configured with a unique public or private IP address?
Public
NAT
Network Address Translation
The router uses _____________ to convert between the private and public addresses
Network Address Translation (NAT)
Which type of address configuration requires an administrator to visit each computer to manually enter the configuration conformation for that host?
Static Addressing
DHCP
Dynamic Host Configuration Protocol
APIPA
Automatic Private IP Addressing
A network protocol that is used to configure network devices to communicate on an IP network
Dynamic Host Configuration Protocol (DHCP)
What is intended to replace IPv4 completely in the future?
IPv6
An IPv6 is a ____-bit number
128-bit
While being send from one host to another, frames are transporting what?
IP Packets
The Transmission Control Protocol is describes as a ______________ protocol
Connection-Oriented Protocol
The Transmission Control Protocol established a connection between the sender and recipient using a handshake sequence of
SYN, SYN/ACK, and ACK packets
ACK
Acknowledge
NACK
Negative Acknowledgement
_____ is suitable for applications that do not require acknowledgement of receipt and can tolerate missing or out-of-order packets.
User Datagram Protocol (UDP)
IANA
Internet Assigned Numbers Authority
The range of addresses that a DHCP server can offer to client hosts in a particular subnet
Scope
TLD
Top-Level Domain
FQDN
Fully Qualified Domain Name
.COM, .NET, .ORG are examples of
Top-Level Domains (TLDs)
www.funny.edibles.com
What is the:
Resource Record
Subdomain
Domain
Top-Level-Domain
Resource Record: www
Subdomain: funny
Domain: edibles
Top-Level Domain: com
MX
Mail Exchanger
What type of record is used to identify an email server for the domain so that other servers can send messages to it?
Mail Exchange (MX) record
What is used to store any free-form text that may be needed to support other network services
TXT Record
Identifies the hosts authorized to send email from that domain
Sender Policy Framework (SPF)
SPF
Sender Policy Framework
DKIM
DomainKeys Identified Mail
Uses cryptography to validate the source server for a given email message
DomainKeys Identified Mail (DKIM)
DBMARC
Domain-Based Message Authentication, Reporting, ad Conformance
Ensures that SPF and SKIM are being utilized effectively
Domain-Based Message Authentication, Reporting, and Conformance
VLAN
Virtual LAN