Networking for AV Flashcards
____ are the devices that send and receive data. This can be a computer, a mobile device, a video server, a projector, a control panel, or some other electronic system capable of sharing data.
Nodes
____ are the means by which data travels from one node to another. They can be any signal-transmission medium: radio frequency, copper cabling, light, and so on.
Connections
A ____ can consist of anything that is interconnected in a netlike manner or that is linked together to pass information.
network
A ____ sends data in a continuous stream. No other devices can use the channel while the connection is active.
circuit-switched network
_____ allow several nodes to send information on the same channel at the same time.
Packets
If a piece of computer hardware does nothing but provide services, that computer is called a ____.
server
The term ____ can also refer to a program that runs on a computer alongside other programs.
server
In a client-server network architecture, a ____ provides services to dependent ____.
server / nodes
A computer whose only task is to perform a particular service is known as a ____ server. This type of server offers only one service.
thin
A(n) ____ is an interface that allows you to connect a device to a network.
network interface card (NIC)
A(n) ____ address is the actual hardware address, or number, of your NIC device. Every device has this globally unique address that identifies its connection on the network.
media access control (MAC)
A(n) ____ provides a physical connection between multiple devices. As each device is connected, this device collects and stores its MAC address.
network switch
____ switches have no configuration options; you just plug in a device, and it connects.
Unmanaged
____ switches allow the network technician to adjust port speeds, set up virtual local area networks (VLANs), configure quality of service, monitor traffic, and so on.
Managed
A(n) ____ forwards data between devices that are not directly physically connected. They mark the border between a local area network (LAN) and a wide area network (WAN).
router
A ____ is a router that connects a private network to outside networks. All data that travels to the Internet must pass through this device.
gateway
For local area network connections, the three most common physical transmission methods are as follows:
- Over copper, as voltage
- Over glass, as visible light
- Over air, as radio frequencies
____ is a glass medium used for transmitting modulated light from point A to point B.
Optical fiber
There are two modes, or paths of light, behind optical fiber, known as ____ and ____.
single-mode and multimode.
Network data can typically travel farther over ____ optical fiber cabling.
single-mode
Optical fiber cable connectors.
The ____ can be found on transmitter-receiver equipment and is similar to the Bayonet Neill-Concelman (BNC) connector, meaning that all you have to do is “stab and twist” to lock it into place, which keeps the optical fiber and ferrule from rotating during connection. This connector can be used on both single-mode and multimode fiber.
A. ST connector
B. LC connector
C. SC connector
D. LT connector
A. ST connector
Optical fiber cable connectors.
The ____ is much smaller in diameter than the ST and is used for basic wiring applications. It has low loss qualities and is known as a “push, pull” connector.
A. ST connector
B. LC connector
C. SC connector
D. LT connector
B. LC connector
Optical fiber cable connectors.
The ____ is larger in diameter than the LC. It is a “stab and click” connector, which means that when the connector is pushed in or pulled out, there is an audible click because of the attachment lock. This connector is useful for tight spaces.
A. ST connector
B. LC connector
C. SC connector
D. LT connector
C. SC connector
The wireless connection known as Wi-Fi is defined by the _____ standard and has been revised several times to keep up with the growing demands for wireless communication.
Institute of Electrical and Electronics Engineers (IEEE) 802.11
The speed of a Wi-Fi connection depends on the ____ signal strength and the revision of 802.11 with which you connect.
radio frequency (RF)
The ____ model provides a mental map for the transfer of data across a network.
Open Systems Interconnection (OSI)
OSI stands for _____.
Open Systems Interconnection (OSI)
The OSI Model Layers 1–3, known as the ____, define hardware-oriented functions such as routing, switching, and cable specifications. These are the areas that most concern AV professionals because they’re the ones that affect us directly.
media layers
The OSI Model Layers 4–7, known as the ____, define the software that implements network services. Each layer contains a broad set of protocols and standards that regulate a certain portion of the data transfer process.
host layers
The OSI model is broken down into seven layers:
_____ (named Physical layer) is the physical layer. The devices need to be plugged in to work. The physical layer can be copper, optical fiber, and, yes, even RF (because it requires a signal that needs to be received). The physical layer sends and receives electrons, light, or electromagnetic flux.
A. Layer 1 B. Layer 2 C. Layer 3 D. Layer 4 E. Layer 5 F. Layer 6 G. Layer 7
A. Layer 1
The OSI model is broken down into seven layers:
____ (named Data Link layer) is the interface to the physical layer; it uses frames of information to talk back and forth. The addressing scheme is MAC addresses. One MAC address talks to another MAC address. Switches use this layer to send and receive frames.
A. Layer 1 B. Layer 2 C. Layer 3 D. Layer 4 E. Layer 5 F. Layer 6 G. Layer 7
B. Layer 2
The OSI model is broken down into seven layers:
____ (named Network layer) is packet-based. Packets “ride” inside layer 2 frames. This layer adds IP addressing. Routers can send, receive, and route IP addresses.
A. Layer 1 B. Layer 2 C. Layer 3 D. Layer 4 E. Layer 5 F. Layer 6 G. Layer 7
C. Layer 3
The OSI model is broken down into seven layers:
____ (named Transport layer) works with ports. Ports are generally associated with firewalls. These ports are virtual ports and can be found at the end of an IP address such as 192.168.1.35:80. The :80 is the port number.
A. Layer 1 B. Layer 2 C. Layer 3 D. Layer 4 E. Layer 5 F. Layer 6 G. Layer 7
D. Layer 4
The OSI model is broken down into seven layers:
____ ( named Session layer) controls (starts, stops, monitors, and keeps track of ) layers 4 and 3. For example, Real Time Streaming Protocol (RTSP) keeps track of the User Datagram Protocol (UDP) layer 3 traffic. It keeps track of whether the data makes it to the far end. UDP can’t do that on its own; it needs a session protocol to do the work for it.
A. Layer 1 B. Layer 2 C. Layer 3 D. Layer 4 E. Layer 5 F. Layer 6 G. Layer 7
E. Layer 5
The OSI model is broken down into seven layers:
____ (named Presentation layer) opens up or transcodes between the session and the application. It is a kind of go-between. Data encryption and decryption are at this layer as well. An application can’t talk data directly; it needs an interpreter, and this is it.
A. Layer 1 B. Layer 2 C. Layer 3 D. Layer 4 E. Layer 5 F. Layer 6 G. Layer 7
F. Layer 6
The OSI model is broken down into seven layers:
____ (named Application layer) is the application layer or the layer with which the human interacts. Using the streaming example, it is Windows Media Player. The application has the controls to manipulate the output of audio and video. It takes all the layers for a player application to retrieve the stream and play it on your desktop.
A. Layer 1 B. Layer 2 C. Layer 3 D. Layer 4 E. Layer 5 F. Layer 6 G. Layer 7
G. Layer 7
Port __ is generally associated with web or Hypertext Transfer Protocol (HTTP) traffic.
80
This simple mnemonic can help you remember the names of all the layers of the OSI model, from one to seven: ____ ____ ____ ____ ____ ____ ____.
Please Do Not Throw Sausage Pizza Away.
- Physical
- Data Link
- Network
- Transport
- Session
- Presentation
- Application
Network ____ helps to determine how far data must travel to reach its destination, or how many devices data has to pass through to reach its destination.
topology
The ____ network topology is the “way it is wired” or how it is connected together. It maps the placement of each network device and the cable installation path.
A. application
B. physical
C. session
D. logical
B. physical
The ____ network topology depicts electrical routing and control of data. It is how you manage the data routes or the flow of data within a network.
A. application
B. physical
C. session
D. logical
D. logical
How many devices data has to pass through before it gets to its destination is known as network _____.
hops
Many real-time AV protocols have a limited number of allowable hops, usually fewer than ____.
ten
As a best practice, no more than __ devices should be affected by any one single point of failure.
20
_____ networks use physical addresses to communicate.
Local area networks
The LAN’s physical address is the ____, hard-coded into each node.
MAC address
Local Area Network Topologies
In a ____, all nodes connect to a central point, such as a router, switch, or hub. They are hierarchical. Each node has access to the other nodes through the central point. If any one node fails, information still flows. The central device is a single point of failure; if it fails, communication stops.
A. star topology
B. extended star topology
C. mesh topology
D. partial mesh topology
A. star topology
Local Area Network Topologies
In a ____, if any device fails, access to the devices below is cut off, but the rest of the network continues to work. The central device remains a single point of failure; if it fails, communication stops.
A. star topology
B. extended star topology
C. mesh topology
D. partial mesh topology
B. extended star topology
Local Area Network Topologies
In a ____, each node connects to every other node. They provide fast communication and excellent redundancy, ensuring that the failure of no one device can bring down the whole network. Providing physical connections between every device is really expensive, though. They are rare.
A. star topology
B. extended star topology
C. mesh topology
D. partial mesh topology
C. mesh topology
Local Area Network Topologies
In a ____, each node connects to several other nodes, but not all. They provide good redundancy, ensuring that several devices must fail at the same time before communications cease.
A. star topology
B. extended star topology
C. mesh topology
D. partial mesh topology
D. partial mesh topology
When IP data is sent across a LAN, it is encapsulated inside a(n) ____.
Ethernet frame
The type, or speed, a device sends out depends on the capability of its _____.
Network Interface Card (NIC)
As a general rule, you need a ____ technology to aggregate multiple ____ links.
A. slower / faster
B. faster / slower
B. faster / slower
10 Mbps Ethernet is sometimes referred to as ____ Ethernet.
Classic
100 Mbps Ethernet is sometimes referred to as ____ Ethernet.
Fast
1 Gbps Ethernet is sometimes referred to as ____ Ethernet.
Gigabit
All networked devices send out occasional administrative messages, called ____ messages, that go to every other device on the LAN.
broadcast
A(n) ____ isolates devices on a LAN from other devices connected to the network, shutting out their broadcast traffic.
virtual local area network (VLAN)
When the switch forwards data from a device in a VLAN, it adds the VLAN ____ to the Ethernet frame.
identifier
Traffic in and out of a VLAN has to go through a ____.
router
If you determine that a system should be segregated on a VLAN, for either its own good or that of the network, you’ll need to provide the network manager with the following information: ____, ____, ____.
- What VLAN you want to create and why (for example, “I want to create an IPTV VLAN so that the network isn’t flooded with streaming video traffic”)
- Which devices should be included in the VLAN
• Whether any routing between the VLAN and other network locations is required
or allowed
A ____ network is a network that connects one or more LANs together.
wide area network (WAN)
Many networked AV protocols can travel over WANs.
A True
B. False
B. False
Why can’t networked AV protocols travel over WANs?
Speed. WANs are generally slower than LANs.
Wide Area Network Topologies
In a ____ WAN, each LAN connects to a central location. For example, several branch offices may connect to a corporate headquarters.
A. hub-and-spoke
B. star
C. common carrier
D. mesh
A. hub-and-spoke
Wide Area Network Topologies
In a ____ WAN, each LAN site runs a spoke to an ISP backbone.
A. hub-and-spoke
B. star
C. common carrier
D. mesh
C. common carrier
Wide Area Network Topologies
In a ____ WAN, every LAN connects to every other LAN. This provides excellent redundancy.
A. hub-and-spoke
B. star
C. common carrier
D. mesh
D. mesh
A ____ uses the Internet to create a tunnel between two or more LANs. They are also used to create virtual WANs and for remote monitoring, troubleshooting, and control.
Virtual Private Network (VPN)
Layer 2 Tunneling Protocol has the following characteristics:
- Client devices must have client software installed.
- It can transport both IP and non-IP data.
- It monitors data integrity, authenticates data origin, and protects against data “capture and replay.”
- It can introduce significant latency.
- It is not commonly used in newer systems.
IPSec stands for ____.
Internet Protocol Security (IPSec)
Internet Protocol Security (IPSec) has the following characteristics:
- Client devices must have client software installed.
- It is an IP-based protocol, and it provides security for any IP transport protocol (TCP, UDP, Internet Control Message Protocol [ICMP], and so on).
- It can authenticate and encrypt, or just authenticate, based on need.
• It assigns remote devices an internal address upon connection, making them
effectively on the LAN.
- Remote clients have access to the same devices and resources they would on-premise.
- Client software may manage clients by requiring them to have antivirus software or a host-based firewall.
- It is commonly used for site-to-site connections.
SSL stands for ____.
Secure Sockets Layer (SSL)
Secure Sockets Layer (SSL) has the following characteristics:
- No client software is needed—the client accesses the VPN via a web browser.
- It requires a dedicated SSL VPN server.
- It’s an IP-based protocol (TCP only).
- It does not require an internal address.
- It acts as a proxy allowing only authorized users to access only approved resources; access can be configured on an individual user basis.
- It’s common for mobile user–to-site connections.
A(n) ____ is the logical address that allows devices to locate each other anywhere in the world, no matter where they are physically.
IP address
An IP address requires three distinct components.
- Network identifier bits
- Host identifier bits
- Subnet mask
IP address components
These bits identify the network. They help the IP packet find its destination LAN. They are always the first digits in an IP address.
A. Network identifier bits
B. Host identifier bits
C. Subnet mask
A. Network identifier bits
IP address components
These bits identify a specific node. They help the
IP packet find its actual destination device. They are always the last bits or least significant bits in a network address.
A. Network identifier bits
B. Host identifier bits
C. Subnet mask
B. Host identifier bits
IP address components
These bits tell you which bits in the IP address are the network bits and which bits are the host bits. They also reveal the size of the network. It is a separate address that must be included with the IP address.
A. Network identifier bits
B. Host identifier bits
C. Subnet mask
C. Subnet mask
An IPv4 address consists of four, 8-bit groups, or ____.
bytes
To interpret any IPv4 address, you need a separate 32-bit number called a ____.
subnet mask
____ notation is just a slash, followed by a number. The number tells you how many of the address bits are network bits (any remaining bits are host bits).
Classless Inter-Domain Routing (CIDR)
In a /18 network, how many bits are network bits and how many bits are host bits?
18 network bits
14 host bits
Written in binary
11111111 11111111 11000000 00000000
10.0.0.0
A. Class A
B. Class B
C. Class C
A. Class A
172.16.0.0 to 172.31.0.0
A. Class A
B. Class B
C. Class C
B. Class B
192.168.0.0
A. Class A
B. Class B
C. Class C
C. Class C
The major advantage of private network addresses is that they are reusable.
A. True
B. Flase
A. True
Global, or public, IP addresses have to be unique.
A. True
B. False
A. True
Private IP addresses can access the internet.
A. Ture
B. False
B. False
____ is any method of altering IP address information in IP packet headers as the packet traverses a routing device. Its purpose is to resolve private IP addresses to public IP addresses, and vice versa, so that devices with private addresses can send data across the Internet.
Network Address Translation (NAT)
A ____ address is a special address used for testing devices.
loopback
The loopback address is also known as the ____.
localhost
____ divides a network into smaller networks.
Subnetting
For devices to communicate directly by Ethernet or belong to the same VLAN, they have to be in the same ____.
subnet
A 192.168.1.x network has ___ possible unique address, but only ___ addresses that can be assigned.
256 / 254
In a 192.168.1.x network, the first address (192.168.1.0), or slot, is the ____ address.
network
In a 192.168.1.x network, the last address (182.168.1.255), or slot, is the ____ address.
broadcast
There are two ways for a device to get an IP address, ____ or ____.
manual (static) or automatic (dynamic)
You need at least three pieces of information to manually assign an IP address:
- Device’s MAC address
- IP Address
- Subnet Mask
_____ is an IP addressing scheme that allows network administrators to automate address assignment.
Dynamic Host Configuration Protocol (DHCP)
DHCP stands for _____.
Dynamic Host Configuration Protocol
On a DHCP network, after the ____ time has expired, the address may be assigned to another device.
lease
The size of the DHCP address pool depends on three factors:
- Size of the subnet the device is connecting to
- Number of addresses already in use
- Number of addresses reserved for another purpose
____ is a method of establishing static addresses on a DHCP server.
Reserve Dynamic Host Configuration Protocol (DHCP)
With Reserve DHCP, a network administrator takes the device’s ____ and associates it with an IP address from within the DHCP pool on the DHCP server.
MAC address
____ automatically assigns locally routable addresses from the reserved network 169.254.0.0/16 to devices that do not have or cannot obtain an IP address.
Automatic Private IP Addressing (APIPA)
APIPA stands for _____.
Automatic Private IP Addressing (APIPA)
Automatic Private IP Addressing (APIPA) is also referred to as a ____ address.
link-local
Automatic Private IP Addressing (APIPA) operates on the ___ layer of the OSI model.
Network (layer 3)
At the Data Link layer, devices are uniquely identified by their ____.
MAC addresses
At the Network layer, devices are uniquely identified by their ____.
IP addresses
A ____ is a hierarchical, distributed database that maps names to data such as IP addresses.
Domain Name System (DNS)
The goal of the DNS is to translate, or ____, a name into a specific IP address.
resolve
DNS is known as a ____ database. No one device has to keep track of all the names and IP addresses on the Internet. That information is distributed across all the DNS servers on the network.
distributed
_____ links and synchronizes the DHCP and DNS servers. Whenever a device’s address changes, it automatically updates the DNS server with the new address.
Dynamic DNS (DDNS)
In the lower layers of the OSI model, each layer carries the layer above it. Physical layer technologies (layer 1) carry Ethernet frames (layer 2), which carry IP packets (layer 3). This is called _____.
encapsulation
Transport layer protocols are not encapsulated inside IP packets. Instead, Transport layer protocols fragment IP packets into smaller chunks that fall within the maximum transmission unit (MTU) of the network connection. This process is known as ____.
segmentation
____ is a connection-oriented, reliable Transport layer protocol. It uses two-way communication to provide guaranteed delivery of information to a remote host. It is reliable because it tracks each packet and ensures that it arrives intact.
Transmission Control Protocol (TCP)
____ is the most common transport protocol for sending data across the Internet.
Transmission Control Protocol (TCP)
TCP stands for ____.
Transmission Control Protocol (TCP)
____ is a connectionless, unacknowledged Transport layer protocol. It begins sending data without attempting to verify the origin device’s connection to the destination device and continues sending data packets without waiting for any acknowledgment of receipt. It is designed to transmit information when timing is more important than missing packets.
Universal Datagram Protocol (UDP)
____ is used for streaming audio and video.
A. TCP
B. UDP
B. UDP
____ transport is used when the guaranteed delivery and accuracy or quality of the data being sent are most important, such as when sending control signals.
A. TCP
B. UDP
A. TCP
____ transport is used when speed and continuity are most important, such as during any real-time communications.
A. TCP
B. UDP
B. UDP
UDP stands for _____.
Universal Datagram Protocol (UDP)
A ____ indicates to the server what you want the data to do. Many are permanently assigned by the IANA to standardized, well-known services.
port number
____ ports, 0 to 1023, are assigned to standards-track protocols. These are also known as well-known ports.
A. Static Ports
B. System Ports
C. Dynamic Ports
D. User Ports
B. System Ports
____ ports, 1024 to 49151, are assigned by IANA upon request from an application developer.
A. Static Ports
B. System Ports
C. Dynamic Ports
D. User Ports
D. User Ports
____ ports, 49152 to 65535, cannot be assigned or reserved. Applications can use any that are available on the local host.
A. Static Ports
B. System Ports
C. Dynamic Ports
D. User Ports
C. Dynamic Ports
Audio Video Bridging/Time-Sensitive Networking, EtherSound, Cobranet, Dante, and HDBaseT are layer __ protocols.
layer 2
AV streaming protocols require a minimum data throughput of ____.
A. 1 Gbps
B. 10 Gbps
C. 100 Mbps
D. 10 Mbps
C. 100 Mbps