Module 3 Flashcards

1
Q

Network views

A
  • Small home network
  • SOHO (Small Office/Home Office)
  • Medium to large networks
  • World-wide networks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The term [blank] means a ‘network of networks’. A collection of interconnected private and public networks

A

Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  • Server stores corporate and user files
  • Client devices access these files or services with client software
A

File Client and Server communications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

[blank] runs web server software and client uses browser software

A

Web Client Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

[blank] runs email server software

A

Email Client-Server communications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

For example, Terry’s data flows with the data of thousands of other users along a fiber-
optic network that connects Terry’s ISP with the several other ISPs, including the ISP that
is used by the search engine company. Eventually, Terry’s search string enters the search
engine company’s website and is processed by its powerful servers. The results are then
encoded and addressed to Terry’s school and her device.

A

Student

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Michelle’s network, like many home networks, connects to an ISP using a router and
modem. These devices allow Michelle’s home network to connect to a cable TV network
that belongs to Michelle’s ISP. The cable wires for Michelle’s neighborhood all connect to
a central point on a telephone pole and then connect to a fiber-optic network. This fiber-
optic network connects many neighborhoods that are served by Michelle’s ISP.

A

Gamer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Dr. Ismael Awad is an oncologist who performs surgery on cancer patients. He frequently
needs to consult with radiologists and other specialists on patient cases. The hospital that
Dr. Awad works for subscribes to a special service called a cloud. The cloud allows medical
data, including patient x-rays and MRIs to be stored in a central location that is accessed
over the Internet.

A

Surgeon

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

[blank] must be able to determine the origin of traffic that enters the network, and the destination of traffic that leaves it

A

Cybersecurity analysts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Usually connect through an Internet Exchange Point (IXP)

A

Tier 1 Network and Tier 2 networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Larger networks connect to Tier 2 networks, usually through a [blank]

A

Point of Presence (POP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Connect homes and businesses to the Internet

A

Tier 3 ISPs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The rules of communications

A

Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A set of protocols that work together to provide comprehensive network communication services

A

Protocol suite

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Common networking protocols

A

Hypertext Transfer Protocol (HTTP), Transmission Control Protocol (TCP), and Internet Protocol (IP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

TCP/IP protocol model

A
  • Application
  • Transport
  • Internet
  • Network Access Layers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Is implemented on both the sending and receiving hosts to provide end-to-end delivery of mesages over a network

A

TCP/IP protocol suite

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Process of placing one message format inside another message format

A

Encapsulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

The reverse process of encapsulation

A

Decapsulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Message is broken up into many frames when sent and reconstructed into the original messag when received

A

Size

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Includes the access method, flow control, and response timeout

A

Timing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

One-to-one

A

Unicast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

One-to-many

A

Multicast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

One-to-all

A

Broadcast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Provides an extensive list of functions and services that can occur at each layer

A

OSI model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Three important addresses

A
  • Protocol
  • Network host
  • Physical
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

This process increases the efficiency of network communications. If part
of the message fails to make it to the destination, due to failure in the network or network
congestion, only the missing parts need to be retransmitted.

A

Segmentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

By sending smaller individual pieces from source to destination, many
different conversations can be interleaved on the network

A

Multiplexing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

The form that an encapsulated piece of data takes at any layer

A

Protocol data unit (PDU)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Governs the way a web server and a web client interact

A

HTTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Manages individual conversations

A

TCP

32
Q

Responsible for taking the formatted segments from TCP, encapsulating them into packets, assigning them the appropriate addresses, and delivering them to the destination host

A

IP

33
Q

Responsible for taking the packets from iP and formatting them to be transmitted over the media

A

Ethernet

34
Q

Defined by the IEEE 802.2 and 803.3 standards

A

Operates at Layer 1 and 2

35
Q

Ethernet Sublayers

A
  • Logical Link Layer
  • Media Access Control Layer
36
Q

By sending smaller individual pieces from source to destination, many
different conversations can be interleaved on the network

A

Data Encapsulation

37
Q

Ethernet manages the process of converting the frame into bits
and sending the frame out onto the network. In older wired networks, devices could not
send and receive data at the same time. Thisis still the case for wireless networks. In such
situations, Ethernet use a process to determine when a device can send and what to do
if the data sent by two devices collides on the network.

A

Media access control

38
Q

Minimum Ethernet frame size

A

64 bytes

39
Q

Maximum Ethernet frame size

A

1518 bytes

40
Q

Two key identifiers

A
  • Destination MAC address
  • Source MAC address
41
Q

No dedicated end-to-end connection is created before data is sent

A

Connectionless

42
Q

IP protocol does not guarantee that all packets that are delivered are, in fact, received

A

Unreliable (Best Effort)

43
Q

IP operates independently of the media that carry the data at lower layers of the protocol stack

A

Media Independent

44
Q

Is a hierarchical address that is made up of a network portion and a host portion

A

IPv4 address

45
Q

The network portion of the address must be [blank] for all devices that reside in the same network

A

Identical

46
Q

Takes a network space and divides it into smaller spaces called [blank]

A

Subnets

47
Q

Designed to support extremely large networks (Class A to E)

A

Class A

48
Q

Designed to support moderate to large networks (Class A to E)

A

Class B

49
Q

Designed to support small networks (Class A to E)

A

Class C

50
Q

Multicast block (Class A to E)

A

Class D

51
Q

Experimental block (Class A to E)

A

Class E

52
Q

Blocks of addresses mostly used by organizations to assign IPv4 addresses to internal hosts

A

Reserved Private Addresses

53
Q

A host can ping itself by sending a packet to a special IPv4 address
of 127.0.0.1. Pinging the loopback interface tests the TCP/IP protocol stack

A

Itself

54
Q

This is a host on the same local network

A

Local host

55
Q

This is a host on a remote network. The hosts do not share
the same network address

A

Remote host

56
Q

Unique IPv4 address of the host

A

IPv4 address

57
Q

Used to identify the network/host portion of the IPv4 address

A

Subnet mask

58
Q

Identifies the local gateway (i.e. local router interface IPv4 address) to
reach remote networks

A

Default gateway

59
Q

The depletion of IPv4 address space has been the motivating factor for moving to [blank]

A

IPv6.128-bit address space

60
Q

[blank] out of the five Regional Internet Registries (RIRs) have run out of IPv4 addresses

A

Four

61
Q
  • String of 32 hexadecimal values
  • Every 4 bits represented by one hexadecimal digit
  • Hextet is 16 bits or 4 hexadecimal digits
A

128-bit address space

62
Q
  • 128 bit address space
  • Can remove leading zeros
  • Can leave out 1 “all zeros” segment
  • Two sections: Prefix and Interface ID
A

IPv6 Addresses

63
Q

Used to provide feedback and troubleshoot network problems

A

ICMPv4 Messages

64
Q

Echo request and echo reply with the ping utility

A

Host confirmation

65
Q

0 - net
1 - host
2- protocol
3 - port

A

Destination or service unreachable codes

66
Q

Used by a router to indicate that a packet cannot be sent onward
- IPv4 is due to the time to live (TTL) field having a value of 0.
- IPv6 does not have a TTL field but has a hop limit field instead.

A

Time exceeded

67
Q

[blank] new protocols as part of the Neighbor Discovery Protocol (ND or NDP)

A

Four

68
Q

Used between an IPv6 device and router

A

Router Solicitation

69
Q

Used between an IPv6 router and a device to provide addressing info using Stateless Address Autoconfiguration (SLAAC)

A

Router Advertisement

70
Q

➢ Ping is a testing utility that uses ICMP echo request and echo reply messages to test connectivity
between hosts.
➢ To test connectivity to another host on a network, an echo request is sent to the host address
using the ping command.
➢ If the host at the specified address receives the echo request, it responds with an echo reply.

A

Ping - Testing and Local Stack

71
Q

▪ You can also use ping to test the ability of a host to communicate on the local network. This is
generally done by pinging the IP address of the gateway of the host.
▪ A successful ping to the gateway indicates that the host and the router interface serving as the
gateway are both operational on the local network.
▪ For this test, the gateway address is most often used because the router is normally always
operational.

A

Ping - Testing Connectivity to Local LAN

72
Q

▪ Ping can also be used to test the ability of a local host to communicate across an internetwork.
▪ Successful ping across the internetwork confirms communication on the local network.
▪ It also confirms the operation of the router serving as the gateway, and the operation of all other
routers that might be in the path between the local network and the network of the remote host.

A

Ping - Testing Connectivity to Remote Host

73
Q

➢ Traceroute provides information about the details of devices between the hosts.
➢ Generates a list of hops that were successfully reached along the path:
• Round trip Time (RTT) – time for each hop along path.
• IPv4 TTL and IPv6 Hop Limit - Traceroute makes use of a function of the TTL field in IPv4
and the Hop Limit field in IPv6 in the Layer 3 headers, along with the ICMP time exceeded
message.
➢ After the final destination is reached, the host responds with either an ICMP port unreachable
message or an ICMP echo reply message instead of the ICMP time exceeded message.

A

Traceroute - Testing the Path

74
Q

Considered to be a Layer 3 protocol

A

ICMP

75
Q

0 - echo reply
3 - destination unreachable
5 - redirect
8 - echo request
11 - time exceeded

A

ICMP Message Codes