Module 3: Internetworks: Principles of Internetworking, Architectures, IP Addressing Flashcards
What are the criterias for dividing the local network?
broadcast containment
security
locations
logical grouping
Criteria for dividing the local network where routers in the distribution layer can limit broadcasts to the local network where they need to be heard.
broadcast containment
Criteria for dividing the local network where routers in the distribution layer can separate and protect certain groups of computers where confidential information resides.
security
Criteria for dividing the local network where routers in the distribution layer can be used to interconnect local networks at various locations of an organization that are geographically separated.
locations
Criteria for dividing the local network where routers in the distribution layer can be used to logically group users, such as departments within a company, who have common needs or for access to resources.
logical grouping
A table that contains information for how to reach local and remote networks.
routing table
It is the router interface used when forwarding packets to a destination that is not in the routing table.
default route
A table that shows a mapping of IP address to MAC address.
arp (Address Resolution Protocol) table
A logical network address that identifies a particular host.
ipv4 (internet protocol version 4) address
It is a series of 32 binary bits (ones and zeros).
ipv4 (internet protocol version 4) address
what do you call the 8-bit bytes
octet
IPv4 address is represented as decimal value separated by a period which is called _____________.
dotted-decimal notation
What are the 2 parts of an IPv4 address?
network
host
Designed to support extremely large networks with more than 16 million host addresses. It used a fixed /8 prefix (255.0.0.0).
Class A
Designed to support the needs of moderate to large size networks with up to approximately 65,000 host addresses. It used a fixed /16 prefix (255.255.0.0).
Class B
Designed to support small networks with a maximum of 254 hosts. It used a fixed /24 prefix (255.255.255.0).
Class C
Private IPv4 address blocks
10.0.0.0 /8 or 10.0.0.0 to 10.255.255.255
172.16.0.0 /12 or 172.16.0.0 to 172.31.255.255
192.168.0.0 /16 or 192.168.0.0 to 192.168.255.255
It is used to translate between private IPv4 and public IPv4 addresses.
Network Address Translation (NAT)
Organization that manages both IPv4 and IPv6 addresses.
Internet Assigned Numbers Authority (IANA)
Responsible for allocating IP addresses to ISPs, who in turn provide IPv4 address blocks to organizations and smaller ISPs
Regional Internet Registries (RIRs)
Used for normal host-to-host communication in both a client/server and a peer-to-peer network.
Unicast communication
Type of transmission where packets use the address of the destination device as the destination address and can be routed through an internetwork.
Unicast Transmission
Type of transmission where a host is allowed to send a single packet to a selected set of hosts that subscribe to a multicast group.
Multicast Transmission
Type of transmission where packets are sent to all hosts in the network using a broadcast address.
Broadcast Transmission
Hosts that receive multicast data are called ______.
multicast clients
It allows IPv4 and IPv6 to coexist on the same network segment.
Dual stack
A method of transporting an IPv6 packet over an IPv4 network.
Tunneling
It allows a host to create its own internet-routable IPv6
address without the need for a DHCP server.
Stateless Address Autoconfiguration (SLAAC)
It is used to communicate with devices on the same IPv6 local network.
Link-local address
identifies only the namespace of the resource without reference to the protocol
Uniform Resource Name (URN)
defines the network location of a specific resource on the network
Uniform Resource Locator (URL)
Component of a URL
Protocol/scheme
Hostname
Path and file name
Fragment
A ‘best effort’ delivery system that does not require acknowledgment of receipt.
User Datagram Protocol (UDP)
A numeric identifier within each segment that is used to keep track of specific conversations between a client and server.
port
Ports are assigned and managed by an organization known as _______
Internet Corporation for
Assigned Names and Numbers (ICANN)
three categories of ports
Well-Known Ports
Registered Ports
Private Ports
A port number associated with the originating application on the local sending host.
source port number
a port number associated with the destination application on the remote host.
destination port number
The combination of the source IP address and source port number, or the destination IP address and destination port number is known as ________
socket
A command that lists the protocols in use, the local address and port numbers, the foreign address and port numbers, and the connection state
netstat
A protocol that resolves internet names to IP addresses.
Domain Name System (DNS)
A protocol that is used to provide remote access to servers and networking devices
Secure Shell (SSH)
or
Secure Socket Shell
A protocol that sends email messages and attachments from clients to servers and from servers to other email servers.
Simple Mail Transfer Protocol (SMTP)
Two protocols that are used by email clients to retrieve email and attachments from a remote server
Post Office Protocol (POP)
Internet Message Access Protocol (IMAP)
A protocol that is used by web browsers to request web pages and web servers to transfers the files that make up web pages of the World Wide Web.
Hypertext Transfer Protocol (HTTP)
A protocol that defines the content and formatting of the requests and responses that are exchanged between the client and server.
Hypertext Transfer Protocol (HTTP)
A protocol that is used for interactive file transfer between systems
File Transfer Protocol (FTP)
A protocol that is used to automatically configure devices with IP addressing and other necessary information to enable them to communicate over the internet.
Dynamic Host Configuration Protocol (DHCP)
It provides a standard method of emulating text-based terminal devices over the data network.
Telnet
A connection using Telnet is called a _________
virtual terminal (vty) session
Enables users to communicate or chat over the internet in real-time
Text Messaging
What suite of protocols does common internet services rely on to communicate information reliably?
transmission control protocol/internet protocol (TCP/IP)