Part 1 Flashcards

1
Q

Same-layer interaction

A

2 PCs who use a protocol to communicate on the same layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Adjacent-layer interaction

A

On a single PC. One layer provides a service to a higher layer, depending on what the software or hardware at the higher layer asked for.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Segment

A

Transport layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Packet

A

Network layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Frame

A

Link layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

OSI Layering benefits

A
  • Less Complex
  • Standard interfaces
  • Easier to learn
  • Easier to develop
  • Multivvendor interoperability
  • Modular engineering
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

10BASE-T and 100BASE-T Pin Pairs Used - Transmits on 1,2

A

PC NICs, Routers, Wireless AP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

10BASE-T and 100BASE-T Pin Pairs Used - Transmits on 3,6

A

Hubs & Switches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Crossover cable

A

If the endpoints transmit on the same pin pair (Hubs & Switches)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Straight through cable

A

If the endpoints transmit on different pin pairs (PC NICs, Routers, Wireless AP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

MAC addresses

A

Media Access Control addresses are 6-byte-long (48-bit-long) binary numbes, most list as 12 digit hexadecimal numbers.

Before a product can have an ethernet port it must ask the IEEE to assign them a universally unique 3 byte code. (OUI)

Mac addresses consist of 2 parts, one from OUI and one vendor assigned

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

MAC represent

A

MAC represent a single NIC or ethernet port. These addresses are often called a unicast ethernet address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

MAC address issues

A

MAC works well providing its unique, because if someone has a the same there will obv be confusion

If two have same address, ethernet will solve this using an admin process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Half-duplex

A

Device must wait to send if receiving as frame, cant send and receive at same time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Full duplex

A

Can send and receive at the same time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

IP Addresses and routers

A

All IP addresses in the same group must not be separated from each other by a router

IP addresses separated from each other by a router must be in different groups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Class A IP address - Networks and HPN

A

Networks: 126

Hosts per network: 16,777,214

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Class B IP address - Networks and HPN

A

Networks: 16,384

Hosts per network: 65,534

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Class C IP address - Networks and HPN

A

Networks: 2,097,152

Hosts per network: 254

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Routing protocol goals

A
  • Dynamically learn and fill routing table with a route to each subnet in the internetwork
  • If more than one route available, choose the best one
  • Notice and remove non valid routes
  • If a route is removed, and another is available through another router, add this route to table
  • To work quick when adding new routes or replacing lost routes
  • Prevent routing loops
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Basic DNS Name Resolution Request

A
  • Click a page (e.g google.com)
  • Connects to DNS server to find IP of google.com
  • Returns the IP of google.com to host
22
Q

ARP

A
  • Discovers MAC addresses and caches them
  • IP packets have IP address but not the physical address
  • Sends out “If t his is your iP address please reply with your MAC address”
23
Q

TCP/IP Transport Layer Features - Multiplexing using ports

A

Function that allows receiving hosts to choose the correct application for which the data is destined, based on the port number

24
Q

TCP/IP Transport Layer Features - Error recovery (reliability)

A

Numbering and acknowledging data with sequence and acknowledgement header fields

25
TCP/IP Transport Layer Features - Flow control using windowing
Flow control is the process of managing the rate of data transmission between two nodes to prevent a fast sender from overwhelming a slow receiver. It provides a mechanism for the receiver to control the transmission speed, so that the receiving node is not overwhelmed with data from transmitting node. A method of flow control in which a receiver gives a transmitter permission to transmit data until a window is full. When the window is full, the transmitter must stop transmitting until the receiver advertises a larger window.
26
TCP/IP Transport Layer Features - Connection establishment and termination
Process used to initialize port numbers and Seq and Ack fields
27
TCP/IP Transport Layer Features - Ordered data transfer and data segmentation
Continuous stream of bytes from an upper layer process, that is segmented fro transmission and delivered to upper layer processes at the receiving device, with bytes in same order
28
Ports - FTP data
20 (TCP)
29
Ports - FTP control
21 (TCP)
30
Ports - SSH
22 (TCP)
31
Ports - Telnet
23 (TCP)
32
Ports - SMTP
25 (TCP)
33
Ports - DNS
53 (UDP, TCP)
34
Ports - DHCP Server
67 (UDP)
35
Ports - DHCP Client
68 (UDP)
36
Ports - TFTP
69 (UDP)
37
Ports - HTTP (WWW)
80 (TCP)
38
Ports - POP3
110 (TCP)
39
Ports - SNMP
161 (UDP)
40
Ports - SSL
443 (TCP)
41
Ports - Syslog
514 (UDP)
42
3-way handshake
SYN SYN, ACK ACK
43
4-way TCP connection termination
Uses FIN bit (short for finished ACK, FIN ACK ACK, FIN ACK
44
Connection-oriented protocol
A protocol that requires an exchange of messages before data transfer begins, or that has a required pre-established correlation between two endpoints.
45
Connectionless protocol
A protocol that does not requrie an exchange of messages and that does not require a pre-established correlation between two endpoints.
46
Identify next header
Figure 5-15
47
TCP benefits
- Provides a variety of services to application - Provides Error recovery - Helps to avoid congestion - Reliability
48
TCP cons
- 20 byte frame instead of UDPs 8 bytes - Requires more bandwith and processing power - Unnesescary in situations such as VoIP and streaming
49
UDP benefits
- Benefits applications that are tolerant of data loss - 8 bytes compared to TCPs 20 byte frames - Simply less work to do
50
UDP cons
- No reliability - No windowing - No reordering of recieved data - No segmentation of large chunks