Module 04 Flashcards
A three-step process in which transport layer protocols establish a connection between nodes.
Three-way-handshake
A method of error checking that determines if the contents of an arriving data unit match the contents of the data unit sent by the source.
Checksum
A software package or hardware-based tool that can capture and analyze data on a network.
Protocol analyzer
The trip a unit of data takes from one connectivity device to another. Typically, hop is used in the context of router-to-router communications
Hops
A core protocol in the TCP/IP suite that functions in the data link layer of the OSI model. ARP works in conjunction with IPv4 to discover the MAC address of a node on the local network and to maintain a database that maps local IP addresses to MAC addresses.
ARP (Address Resolution Protocol)
A database of records that maps MAC addresses to IP addresses. The ARP table is stored on a computer’s hard disk where it is used by the ARP utility to supply the MAC addresses of network nodes, given their IP addresses.
ARP table
A record in an ARP table that is created when a client makes an ARP request that cannot be satisfied by data already in the ARP table.
Dynamic ARP table entries
A record in an ARP table that someone has manually entered using the ARP utility.
Static ARP table entries
A data link layer protocol that works with ICMPv6 to detect neighboring devices on an IPv6 network, helps manage the SLAAC (stateless address autoconfiguration) process, and oversees router and network prefix discovery.
NDP (Neighbor Discovery Protocol)
The name for a MAC address on an IPv6 network.
Link-layer address
The most common Ethernet standard today. Ethernet II is distinguished from other Ethernet frame types in that it contains a 2-byte type field to identify the upper-layer protocol contained in the frame.
Ethernet II
A sublayer of layer 2 that is primarily concerned with multiplexing, flow and error control, and reliability.
LLC (logical link control) sublayer
The lower portion of the data link layer that is specifically involved with managing MAC addresses in message frames.
MAC sublayer
The largest IP packet size in bytes that routers in a message’s path will allow without fragmentation and excluding the frame.
MTU (maximum transmission unit)
A setting on Ethernet network devices that allows the creation and transmission of extra-large frames, which can be as large as just over 9,000 bytes.
Jumbo frame
A network access method specified for use by IEEE 802.3 (Ethernet) networks. In CSMA/CD, each node waits its turn before transmitting data to avoid interfering with other nodes’ transmissions.
CSMA/CD (Carrier Sense Multiple Access with Collision Detection)
In Ethernet networks, the interference of one node’s data transmission with the data transmission of another node sharing the same segment.
Collision
The portion of an Ethernet network in which collisions could occur if two nodes transmit data at the same time. Today, switches and routers separate collision domains.
Collision domain
The use of an algorithm to scramble data into a format that can be read only by reversing the algorithm—that is, by decrypting the data—to keep the information private.
Encryption
A three-tenet, standard security model describing the primary ways that encryption protects data. Confidentiality ensures that data can only be viewed by its intended recipient or at its intended destination. Integrity ensures that data was not modified after the sender transmitted it and before the receiver picked it up. Availability ensures that data is available to and accessible by the intended recipient when needed.
CIA (confidentiality, integrity, and availability) triad
A series of characters that is combined with a block of data during that data’s encryption.
Key
A type of key encryption in which the sender and receiver use a key to which only they have access. Also known as symmetric encryption.
Private key encryption
A method of encryption that requires the same key to encode the data as is used to decode the cipher text.
Symmetric encryption
A form of key encryption in which data is encrypted using two keys: One is a key known only to a user (that is, a private key), and the other is a key associated with the user and that can be obtained from a public source, such as a public key server. Public key encryption is also known as asymmetric encryption.
Public key encryption