Module five day two Flashcards

1
Q

Why would I use non-routable space for internal IP addresses

A

IP addresses are scarce and expensive, non-routable space is secure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

NAT

A

Network address translation. A way to map many private addresses inside a local network to a public IP address Before trans frame the information onto the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

who uses nat?

A

organizations that won multiple devices to employ single IP address, and most home routers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What makes network configuration easier?

A

configuring local DNS and DHCP server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Is non-routable address space intended to access the internte?

A

no, unless you use Network Address Translation to translate non-routable IP addresses to public ones, allowing them to access the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what network layer does NAT operate at?

A

3, the Network layer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What reserves an alias IP address for a device in routable range?

A

NAT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What allows a private network to connect with the internet through the translated public IP?

A

NAT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

WAN

A

Acts like a single network, but spans across multiple physical locations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What do WAN usually require?

A

I contract a link across the internet with my internet service provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What handles sending data from one site to another?

A

ISP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Where does each LAN network end?

A

a demarcation point where the ISP network takes over.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what is the area between each demarcation point and an ISPs actual core network?

A

local loop

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is an example of a local loop?

A

something like a T carrier line, high speed optical connection to the provider’s regional office.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What would connect to the ISP’s core network and the internet at large?

A

WAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a physical Connection that leaks a customer’s premises to a telecommunication service providers network?

A

local loop, local tale, subscriber line, last mile

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

How do WAN work?

A

busing different protocols at the data link layer to transport data from one site to another.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

WAN protocols are sometimes at work

A

at the core of the internet itself.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What can be connected Through the internet with connections provided by internet service providers in each locale?

A

WAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What can be formed by connecting multiple LAN sites using equipment and cables leased from a regional internet service provider?

A

WAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

what can be configured through virtual private networks

A

security for WAN across the public internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

what are hardware devices that act as intermediate systems to route data amongst the LAN member groups of a WAN using a private connection? they also facilitate and organization’s access to a carrier network. they also have a digital modem interface for the WAN, which works at the OsI link layer, and an ethernet interface for the LAN

A

WAN router, border router, edge router.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

what is software developed to address the unique needs of cloud based WAN environments? they can be used alone or in conjunction with a traditional WAN, simplify how WAN are implemented, managed, maintained. the overall cost to operate them is less than the overall cost of equipping and maintaining a traditional WAN.

A

SD-WAN, software defined WAN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Why do SD-WAN replace lines leased from an internet service provider by linking regional LAN together to build a WAN?

A

to reduce operational costs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

what are four techniques available to optimize network traffic and data storage on a WAN?

A

compression, deduplication, protocol optimization, local caching, traffic shaping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

what technique involves reducing file size to improve network traffic efficiency? it has algorithms available for text, image, video, etc. also the center and receiver will need apps that offer the same algorithm to encode and decode files.

A

compression

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

what technique prevents files from being stored multiple times within a network to avoid wasting expensive hard drive space? one copy of a file is kept in a central location and all other copies are file pointers to the single copy of the file, n which saves hard drive space, makes performing data backup efficient, reduces the amount of time to recover data from data lost disasters

A

deduplication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

what technique improves the efficiency of network protocols for applications that need higher bandwidth low latency

A

protocol optimization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

what are three techniques in traffic shaping

A

bandwidths throttling, rate limiting, use of complex algorithms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

what technique on a WAN stores local copies of network and internet files on a usual computer to reduce the need to resend the same information across the network every time the file is accessed?

A

local cashing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

what’s an example of local caching

A

WAN optimization products storing shared files at a physical LAN location when groups of employees at the location tend to request the same set of files frequently.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

what technique involves optimizing network performance by controlling the flow of network traffic?

A

traffic shaping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

what traffic shaping technique involves controlling network traffic volume during peak use times?

A

throttling bandwidth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

what traffic shaping technique involves capping maximum data rates and speeds

A

rate limiting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

what traffic shaping technique involves classifying and prioritizing data to give preference to more important traffic?

A

use of complex algorithms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

would are used in conjunction with WAN routers to perform the task of distinguishing between a private LAN and the related public WAN?

A

WAN protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

what are examples of WAN protocols and techniques?

A

packet switching, frame relay, asynchronous transfer mode (ATM), high level data control HLDC), packet over synchronous optical network (SONET) or synchronous digital hierarchy (SDH), multi protocol label switching (MPLS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

what method of data transmission involves breaking messages down into multiple packets? with each packet having a header that includes information on how to reassemble the packet as well as the intended destination of the packets.

A

Packet switching

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

in packet switching, why are packets triplicated?

A

to prevent data corruption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

what is done with triplicated packets?

A

they are sent separately over optimal routes, then reassembled when they reach their destination.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

what happens to triplicated copies of a packet when they reach their destination

A

they are reassembles and the copies are compared with each other to detect and correct data corruption. at least to of the three copy should match.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

what happens of the data from packet switching cannot be reassembled or data corruption is evident in all three copies?

A

the destination makes a request to the origin to resend the packet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Which method of data transmission is an older technology originally designed for use and integrated services digital network lines?

A

Frame Relay

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

which method of data transmission is no used transmitting data between end points of WAN through a pocket switching method that works at the OSI data link and physical layers?

A

Frame Relay

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

what data communications network is used to transport data packets and frames, with the reliability minimizing the need for error checking?

A

a frame relay network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

in frame relay what circuits are used for long term data connections and stay open even when data are not being transmitted

A

permanent virtual circuits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

in frame relay what circuits are used in temporary session connections for sporadic communications

A

switched virtual circuits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

put etc the frames and frame relay include?

A

routing address information for the destination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

what is an older technology that encodes data using asynchronous time division multiplexing?

A

asynchronous transfer mode, ATM.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

in asynchronous transfer mode how is data sent?

A

encoded data is packaged into small fix size cells. it can be sent over long distances which makes it useful for WAN communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

how does ATM use routers?

A

as end points between ATM networks and other networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

what has ATM technology been replaced by?

A

internet protocol, IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

what WAN protocol involves the encapsulation or data link protocol that delivers data frames through a network, with frames including multiple fields that can hold information about start and end flags, controls, frames check sequence, and protocol use?

A

HLDC, High Level Data Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

What was developed to use multiple protocols to replace SLDC, Synchronous Data Link control?

A

HLDC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

What protocol includes error correction, flow control, and data transmission through polling?

A

HLDC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

What protocol has three modes to define the relationship between two devices, or nodes, during communications?

A

HLDC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

What are the three modes of the HLDC protocol?

A

Normal response mode, asynchronous response mode, asynchronous balanced mode.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

in high level data control, what is a normal response mode?

A

primary node must give permission to the secondary node to transmit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

in high level data control, what is asynchronous response mode

A

the primary node allows the secondary node to initiate communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

what is asynchronist balanced mode in high level data control

A

both nodes can act as etc the primary or secondary nodes. they can initiate communications without permission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

what communication protocol is used for WAN transport, defining how point to point links communicate over fiber optics?

A

Packet over synchronous obstacle network (SONET) or synchronous digital hierarchy (SDH)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

what technique for optimizing network routing replaces inefficient table lookups for long network addresses with short path labels, with labels directing data from node to node?

A

n multi protocol label switching MPLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

What are a popular alternative to WAN technologies

A

point to point vpn

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

Where a WAN technologies best?

A

when you need to transport large amounts of dataAcross lots of sites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

WAN technologies are built to be

A

superfast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

Business cable or direct service line dsl maybe cheaper, but

A

it can’t handle the load required when you need to transport large amounts of data across lots of sits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

what lets companies outsource all or part of their different pieces of infrastructure to other companies to manage?

A

the cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

what typically hosts emails these days?

A

the cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

what can a company do with their email?

A

they can have a cloud hosting provider host the email server, or even use an email as a service provider.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

what do lots of businesses no longer require between their sites?

A

extreme high speed connections, WAN expense

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

what does a point A point VPN do

A

make sure different sites of a company can communicate with each other, by establishing a VPN tunnel between them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

for site to site VPN, what handles the tunneling logic?

A

network devices at either side

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

What does WAN stand for

A

wide area network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

In a WAN what is the area between a demarcation point and the internet service provider’s core network known as

A

local loop

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

A point to point virtual private network is also known as

A

site to site virtual private network vpn

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

Who handles sending data from one site to another

A

internet service provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

In today’s world what are fewer devices weighed down by

A

physical cables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

what type of networking is on the rise?

A

wireless networking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

Where are the most common specifications for how wireless networking devices should communicate defined by?

A

the IEEE 802.11 standards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

what set of specifications makes up the set of technologies we call wifi?

A

801.11

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

how do wireless networking devices communicate with each other?

A

radio waves

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

what is a frequency band?

A

a certain section of the radio spectrum that’s been agreed upon to be used for certain communications. different 802.11 standards generally use the same basic protocol, but might operate at different frequency bands.

81
Q

what is the range of FM radio broadcast band in north America?

A

between 88 and 108 megahertz

82
Q

what frequencies do wifi networks most commonly operate on

A

2.4 gigahertz and 5 gigahertz bands.

83
Q

what are the most common 802.11 specifications? in the order that they were adopted

A

802.11b, 802.11a, 802.11g, 802.11n, 802.11ac

84
Q

what are improvements each new version of the 802.11 specifications have seen?

A

higher axes speeds, ability for more devices to use the network simultaneously

85
Q

what define how we operate at both the physical and data link layers in Wifi?

A

802.11 protocols

86
Q

List the fields in an 802.11 frame

A

frame control 2octets, duration/ID 2 octets, address 1 6 octets, address 2 6 octets, address 3 6 octets, sequence control 2 octets, address 4 6 octets, data payload 0-7951 octets, FCS 4 octets

87
Q

Which field in a 802.11 frame its 16 bit long and contains a number of subfields that are used to describe how the frame itself should be processed? For example: what version of 802.11 was used.

A

frame control field

88
Q

what 802.11 field specifics how long the total frame is so the receiver knows how long it should expect to have to listen to this transmission

A

Duration field

89
Q

How many address fields are there in 802.11?

A

four

90
Q

what’s a device that bridges the wireless and wired portions of a network

A

Wireless access points

90
Q

important for the wireless device to talk to specific access points, Allows for incoming transmissions to the wireless device to be sent by the right access point

A

Associations

91
Q

Why are there for address fields in 802.11?

A

there needs to be room to indicate which wireless access point should be processing the frame

92
Q

Which wireless access point do devices on a wireless network associated with?

A

the one that they are closest to, Which has the best general signal strength, least wireless interference,

93
Q

What is address one in 802.11?

A

source address field. The mac address of the sending device.

94
Q

What is address 2 in 802.11?

A

intended destination on the network.

95
Q

What is address 3 on 802.11?

A

receiver address. the mac address of the access point that should receive the frame.

96
Q

What is address 4 on 802.11?

A

Transmitter address. The mac address of whatever has just transmitted the frame

97
Q

What addresses might be the same in 802.11?

A

destination an receiver address, Source and transmitter.

98
Q

What kind of addresses are all addresses in 802.11 frames?

A

mac addresses

99
Q

What field is in between the third and fourth address fields in 802.11?

A

Sequence control field

100
Q

What field in 802.11 is 16 bit long and mainly contains a sequence number used to keep track of the ordering of frames?

A

sequence control field

101
Q

What field in 802.11 has all the data of the protocols further up the stack

A

data payload

102
Q

Which frame on 802.11 contains a checksum used for a cyclical redundancy check like how ethernet does

A

frame check sequence field

103
Q

What is wifi 6 formerly known as?

A

802.11ax

104
Q

what are the benefits of wifi 6?

A

faster, more efficient for networks with a larger number of connected devices, higher data rates, increased band capacity, better performance, improved power efficiency.

105
Q

how does wifi 6 get higher data rates

A

band splitting or increased client group sizes allow for uploading and downloading greater amounts of data

105
Q

how does wifi 6 get increased band capacity?

A

band utilization is increased from eighty megahertz to one hundred sixty megahertz, creating a faster connection from the router to connected devices

106
Q

how does wifi 6 get better performance?

A

input slash output streams are doubled from the four by four allowed by wifi 5 to eight by eight in wifi 6, allowing more clients to be grouped

107
Q

how does wifi number six get improved power efficiency

A

devices only connect to the network when sending or receiving data increasing battery life.

108
Q

what are some capabilities of wifi 6

A

channel sharing, target wake time, multiuser multiple input multiple output(MIMO), 160 MHz channel utilization, 1024 quadrature amplitude modulation, orthogonal frequency division multiple access (OFDMA), transit beam forming

109
Q

what wifi 6 capability allows for better efficiency and shortened the time it takes to send data once a user gives the send command?

A

channel sharing

110
Q

what wifi six capability improves the network speed and increases battery life by allowing battery powered devices to sleep when not in use

A

target wake time TWT.

111
Q

what capability of wifi number six allows more data to be transferred simultaneously, increasing capacity and efficiency and high bandwidth applications like voice calls or video streaming

A

multiuser MIMO ( multiple inputs, multiple output) wireless technology

112
Q

what capability of wifi 6 gives more space for transmitting data and increases bandwidth capability

A

160 MHz channel utilization

113
Q

what capability of wifi 6 combines two signals into a single channel so more data is encoded

A

1024 quadrature amplitude modulation

114
Q

what capability of wifi 6 allows for bandwidth splitting which is assigned dynamically by the axis point to separate devices?

A

orthogonal frequency division multiple access OFDMA

115
Q

what wifi 6 capability is a technique that sends signals that allow for more efficient higher data rates by targeting each connected device

A

transmit beamforming

116
Q

what does WiFi 6E extend wifi number six into?

A

6GHZ

117
Q

What does Wi-Fi 6E have more of than 6?

A

channels to broadcast. 14 more 80MHz channels, 7 more 160MHz channels. allowing networks with it to have better performance even with high def video or VR.

118
Q

how does wifi 6 improve the quality of networks

A

faster speeds and energy saving technology

119
Q

What is an additional certification of wifi 6 that has even faster speeds and stronger performance?

A

Wi-Fi 6E

120
Q

which wireless technologies use frequencies ranging from radio to microwave bands?

A

Wi-fi, z-wave, zigbee, thread, Bluetooth, near field communication.

121
Q

what frequency bands have specific ranges that are divided into channels

A

radio and microwave

122
Q

what band ranges does wifi use for sending and deceiving data?

A

2.4 GHz and 5 GHz

123
Q

What do some wifi routers use to avoid signal interference and to load balance network traffic?

A

multiple channels within each range

124
Q

what are some advantages of using 2.4GHz frequency bands?

A
  • has the longest signal range from 150 feet (45 meters) indoors to 300 feet (92 meters) outdoors
  • can pass through walls and other solid objects
125
Q

what are disadvantages of using 2.4 gigahertz frequency bandwidths?

A

the long signal range also increases the chances of wifi traffic being intercepted by cybercriminals
* includes a limited number of channels that can range from 11 to 14 channels depending on regulations in the country of use
* can experience network traffic congestion and interference with other wifi networks and wireless technologies such as Bluetooth that overlap the frequency bands
microwave ovens also work in the frequency bandon can cause wifi interference
* under specific conditions the maximum achievable data rate is 600 Mbps

126
Q

what are advantages of using 5 gigahertz frequency bandwidth

A

includes significantly more channels than 2.4 GHz
* experiences fewer interference problems and less wireless traffic congestion
can achieve over 2 Gbps data transfer speeds under specific conditions

127
Q

disadvantages of using 5 GHz

A

the wireless range is limited to 50 feet (12 meters) indoors and 100 feet (30 meters) outdoors
does not penetrate wells and other solid objects as well as 2.4 GHz

128
Q

when did the institute of electrical and electronics engineers ratify the first 802.11 standard for wireless fidelity?

A

1997

129
Q

who is the standard for wireless fidelity first published for use by?

A

computer device manufacturers to uses a common protocol for wireless communications

130
Q

how does the IEEE name each new amendment to wifi?

A

with one or two letters appended to 802.11.

131
Q

how long does the institute of electrical and electronics engineers plan to continue updating the 802.11 specifications/

A

until a new technology replaces wifi

132
Q

what do wifi networks include?

A

client devices that are configured to connect to wireless access points

133
Q

what is the configuration of client devices to connect to wireless access points referred to as?

A

infrastructure mode

134
Q

how do access points work between wireless devices and a wired network?

A

they can connect to an ethernet switch through a wired ethernet cable to bridge them.

135
Q

what are some characteristics that may vary at the OSI physical layer for the various amended 802.11 specifications that mostly use the same fundamental data length protocol?

A
  • signal ranges
  • modulation techniques
  • transmission bit rates
  • frequency bands
  • channels
136
Q

what technology is required to prevent 5GHz wifi signals from interfering with local radar and satellite communication?

A

DFS, dynamic frequency selection

137
Q

What are two common data protocol models that illustrate how low power internet of things devices share data

A
  • request/ response model
  • publish/ subscribe model
138
Q

what protocol model is often used in distributed systems where the communication flow between servers and clients consists of requests and responses for data? examples include HTTP and CoAP

A

request/ response model

139
Q

what protocol model is a framework for message exchanges between publishers and subscribers that I routed through a broker? subscribers can sign up to a channel to receive notices through the broker when the publisher releases new messages. examples: MQTT and AMQP

A

Publish/Subscribe Model

140
Q

what can internet of things devices collect environmental data around?

A

physical location, equipment data, metered data

141
Q

what’s an example of physical location data collected by internet of things devices

A

temperature

142
Q

what’s an example of equipment data collected by internet of things devices

A

maintenance status

143
Q

what’s an example of metered data collected by internet of things devices

A

electricity usage

144
Q

what is needed to transfer and format the data for use by applications that interface with humans or automated systems? IoT

A

data protocols

145
Q

what can we do with internet of things devices to facilitate the transfer and format of environmental data?

A

we can configure them to use various data transfer and formatting protocols at the application and software layers of communication OSI model wise.

146
Q

what dater transfer protocols can most internet of things devices use at least one of

A
  • hypertext transfer protocol/ secure (http/https)
  • machine to machine communication protocols (M2M)
  • message queue telemetry transport (MQTT)
  • constrained application protocol (CoAP)
  • advance message queuing protocol (AMQP)
  • extensible messaging and presence protocol (XMPP)
  • data distribution service (DDS)
147
Q

what are the most widely used information transfer protocols across the worldwide web?

A

HTTP/HTTPS. hypertext transfer protocol / secure

148
Q

what protocol uses ASCII formatting, has a header side of eight bytes, and is designed for transmitting documents?

A

HTTP/S

149
Q

how does http send information across the internet?

A

transmission control protocol, tcp, and udp, user datagram protocol.

150
Q

What happens when a website address is entered into a browser? What does Http do?

A

http sends a request to the site’s web server, which returns an http formatted response to the browser.

151
Q

What do Http/https protocols define?

A

how information is formatted and transmitted

152
Q

What model does http use?

A

request/response model

153
Q

What protocol uses port 80 or 8080?

A

Http/ https

154
Q

which version of http/https provides security?

A

https

155
Q

what is Http supported by for device to cloud communication?

A

Google cloud IoT Core

156
Q

etc communication protocol is a set of direct communication methods for low power devices common machines, and systems, with three primary architectural and protocol groups?

A

machine to machine communication protocols (M2M)

157
Q

what are the three primary architectural and protocol groups in machine to machine electronic communications

A

representational state transfer REST
service oriented architectures SOA
message oriented protocols

158
Q

what is an architectural style, in machine to machine communication protocols, for a communication amongst web accessible systems

A

REST, representational state transfer

159
Q

what is an architecture, in machine to machine communication protocols, for data exchanges and industrial automation systems

A

service oriented architectures SOA

160
Q

what’s a protocol for asynchronous data transfers for distributed system in machine to machine transfer protocols

A

message reentered protocols

161
Q

what’s an internet of things data centric interaction protocol for machine to machine that uses simple publish subscribe model?

A

message queue telemetry transport MQTT

162
Q

what supports quality of service QoS, uses TCP for sending information, and utilizes secure sockets layer SSL, and transport layer security TLS for security of the transport protocols for internet of things?

A

MQTT, Message queue telemetry transport

163
Q

is mqtt supported by google cloud IOT core?

A

yes

164
Q

what is a web transfer protocol for internet things constrained nodes and networks designed for machine to machine applications? it is also used for internet of things applications like building automation and smart energy management. Very similar to HTTP in that it is built on the REST model and places resources on a server accessible to clients via URL

A

constrained application protocol CoAP

165
Q

what is an open standard for messaging amongst applications in different organizations and/or platforms, with a purpose to remove vendor lock in for app communication, and offer reliability and security in addition to interoperability?

A

advanced message queueing protocol AMQP

166
Q

what OSI decentralized open standard for chat, messaging, video, voice calls, collaboration tools, and more. it is built on jabber, and offers a proven communication technology that is extensible flexible and diverse

A

extensible messaging and presence protocol XMPP

167
Q

what is an API standard and middleware protocol from the object management group that exists in the applications layer between software and the operating system in the OSI model. It uses the published subscribe communications model, is data centric, provides low latency data connectivity, and helps devices and an internet of things ecosystems share data more efficiently, reliable, scalable, provides control of quality of service parameters, including bandwidth and resource limits.

A

Data distribution service DDS

168
Q

Main ways a wireless network can be configured

A

ad hoc networks
wireless LAN, WLAN
mesh networks

169
Q

ad hoc networks

A

nodes all speak directly to each other

170
Q

what network configuration lets one or more access point act as a bridge between a wireless and a wired network

A

wireless LAN, WLAN

171
Q

what network is a Hybrid of ad hoc and wireless LAN?

A

Mesh networks

172
Q

which of the wireless nobler configurations are the simplest? every device involved within a network communicates with every other device within range and all nodes help pass along messages. not the most common type of wireless network.

A

ad hoc. there is no supporting network infrastructure.

173
Q

what are practical applications of ad hoc networks?

A

individual pieces of equipment communicating with each other. phone the phone, etc.

174
Q

why are at hoc networks useful during disaster situations?

A

if an earthquake hurricane locks out all the existing infrastructure in an area professionals can use an ad hoc network to communicate while they perform search and rescue efforts

175
Q

what is the most common type of wireless network you’ll run into in the business world?

A

WLAN

176
Q

what type of wireless network configuration consists of one or more access points which act as bridges between the wireless and wired networks? the word network operates as a normal LAN. the wired LAN contains the outbound internet link. in order to access resources outside of the network, wireless devices communicate with access points. they then forward traffic along the gateway router where everything proceeds like normal.

A

WLAN

177
Q

what networks are like ad hoc networks since lots of the devices communicate with each other wireless?

A

mesh, since if you were to draw lines for all the links between all the nodes most mesh networks you’ll run into are made up of only wireless access points and will still be connected to a wired network.

178
Q

what wireless network configuration lets you deploy more access points without having to run a cable to each of them? allowing you to increase the performance and range of a wireless network

A

Mesh

179
Q

What are individual, smaller sections of an overall frequency band used by a wireless network called

A

channels

180
Q

what does wireless networking use to address collision domains? f

A

channels

181
Q

what is a network segment where one computer can interrupt another and communications that overlap each other can’t be understood by the receiving end, when two or more transmissions occur at the same time, and all devices in question have to stop their transmissions?

A

collision domain

182
Q

what do devices have to do in the collision domain?

A

stop transmissions, wait a random amount of time, and try again when things quiet down.

183
Q

what are 2.4 and 5 shorthand for?

A

were frequency bands actually begin. networks operate on roughly the band from 2.4 to 2.5 GHz. between these two frequencies are a number of channels with a certain width of megahertz.

184
Q

what do here many channels are available for use depend on?

A

where you are in the world.

185
Q

Why do we need a buffer around what exact frequencies of transmission might actually arrive on

A

radio waves are imprecise. some channels overlap but some are so far apart they won’t interfere with each other

186
Q

When do you know that channels are isolated?

A

when channel widths do not overlap values. , cause an overlapping values. channel 1 and 6 and 11 are the only ones that never overlap.

187
Q

what is most wireless networking equipment built to auto sense?

A

what channels are most congested

188
Q

when do some access points perform analysis of which channels are congested/

A

when they start up. others can dynamically change their channel as needed.

189
Q

What do you want to make sure of concerning your access points and those of neighboring businesses? for wireless technologies?

A

etc you get a little channel overlap as possible

190
Q

What kind of communication has a certain amount of inherent privacy

A

wired connections

191
Q

what devices know what data is being transmitted in a wired connection

A

the two nodes on either end of the link

192
Q

what was invented so that we could solve the problem of anyone being able to read the radio transmissions being broadcast with the air?

A

WEP

193
Q

WEP stands for

A

wired equivalent privacy

194
Q

what’s an encryption technology that provides a very low level of privacy

A

WEP

195
Q

what corresponds to help secure encryption is?

A

the number of bits and an encryption key corresponds to how secure it is. the more bits in the key, the longer it takes for someone to crack the encryption.

196
Q

why is wired equivalent privacy so weak?

A

it only uses 40 bits for its encryption keys, and that can usually be cracks in just minutes.

197
Q

what was wired equivalent privacy replaced by?

A

WPA, wifi protected access, etc uses a 128 bit key, making it a lot harder to crack.

198
Q

what is the most commonly etc encryption algorithm for wireless networks today

A

WPA2, using 256 bit key

199
Q

what’s another common way to help secure wireless networks, where you configure your access points to only allow for connections from a specific set of mac addresses belonging to devices you trust? this doesn’t do anything more to help encrypt wireless traffic, but it does provide an additional barrier preventing unauthorized devices from connecting to the network itself.

A

mac filtering.