The bits and Bytes of Computer Networking Flashcards

1
Q

Protocol

A

A defined set of standards that computers must follow in order to communicate properly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Computer Networking

A

The name we’ve given to the full scope of how computers communicate with each other

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Physical layer

A

Represents the physical devices that interconnect computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Data link layer

A

Responsible for defining a common way of interpreting these signals so network devices can communicate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The Ethernet standards

A

also define a protocol responsible for getting data nodes on the same network or link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Network layer

A

Allows different networks to communicate with each other through devices known as routers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Internetworks

A

A collection of networks connected together through routers, the most famous of these being the INTERNET

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

IP

A

is the heart of the internet and most smaller networks around the world.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Transport layer

A

Sorts out which client and server programs are supposed to get that data ( Transport Control Protocol is part of this layer)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Application layer

A

Application specific

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Cables

A

Connect different devices to each other allowing data to be transmitted over them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Common Network Cables are made of

A

Copper and Fiber

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Copper Cables

A

Operate by Changing voltage to binary, the most common forms to copper twisted-paid cables used in networking are Cat5,Cat5e, and Cat6 cables. Cat is short form of category. Category has different amount of twists and twist pairs are arranged.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Crosstalk

A

When an electrical pulse on one wire is accidentally detected on another wire

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Fiber optic cables

A

Contain individual optical fibers, which are tiny tubes made out of glass about the width of a human hair. Uses light to represent data. Usually can transmit data quicker but are more expensive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Hub

A

A physical layer device that allows for connections from many computers are once. Are rare nowadays.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Collision domain

A

A network segment where only one device can communicate at a time. If multiple systems try sending data at the same time, the electrical pulses sent across the cable can interfere with each other.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Network Switch

A

More common than hubs nowadays. Originally known as a switching hub. A data Link device not a physical layer device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Hubs and Switches

A

The primary devices used to connect computers on a single network, usually referred to as a LAN, or local area network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Router

A

A device that knows how to forward data between independent networks. Operates at layer 3, network. Inspects IP data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Border Gateway Protocol ( BGP)

A

Routers share data with each other via this protocol , which lets them learn about the most optimal paths to forward traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Servers

A

Provide data to something requesting data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Clients

A

The thing receiving the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Note on servers, clients and nodes

A

Almost all nodes are server and clients at some time. But we classify something as server or client based on the primary reason for its existence i.e to serve clients data for mail etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Bit

A

The smallest representation of data that a computer can understand; it’s a one or a zero.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Modulation

A

A way of varying the voltage of a charge moving across the cable. When used on computer network this kind of modulation is known as line coding.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Duplex communication ( Also known as Full Duplex)

A

The concept that information can flow in both directions across the cable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Simplex communication ( Also known as Half Duplex)

A

This process is unidirectional

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Ethernet as a protocol solved

A

the collision problem by using a technique known as carrier sense multiple access with collision detection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

CSMA/CD

A

User to determine when the communications channels are clear, and when a device is free to transmit data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

MAC address ( Media Access Control Address)

A

A globally unique identifier attached to an individual network interface. It’s a 48-bit number normally represented by six groupings of two hexadecimal numbers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Hexadecimal

A

A way to represent numbers using 16 digits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Octet

A

In computer networking, any number that can be represented by 8 bits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Organizationally Unique Identifier ( OUI)

A

The first three octets of a MAC address ( allows you to identify the manufacturer)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Note on Mac Addresses

A

Ethernet uses MAC addresses to ensure that the data it sends has both an address for the machine that sent the transmission as well as the one the transmission was intended for.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Unicast

A

A unicast transmission is always meant for just one receiving address. If the least significant bit in the first octet of a destination address is set to zero, it means that ethernet frame is intended for only the destination address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Multicast

A

If the least significant bit in the first octet of a destination address is set to one, it means you’re dealing with a multicast frame.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Data Packet

A

An all-encompassing term that represents any single set of binary data being sent across a network link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Ethernet frame

A

A highly structured collection of information presented in a specific order.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Preamble

A

8 bytes ( or 64 bits) long, and can itself be split into two sections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Start frame delimiter ( SFD)

A

Signals to a receiving device that the preamble is over and that the actual frame contents will now follow.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Destination MAC address

A

The hardware address of the intended recipient

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

EtherType field

A

16 bits long and used to describe the protocol of the contents of the frame.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Vlan header

A

Indicates that the frame itself is what’s called a VLAN frame.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

If a VLAN header is present,

A

the EtherType field follows it.

46
Q

Virtual LAN ( VLAN)

A

A technique that lets you have multiple logical LANs operating on the same physical equipment.

47
Q

Payload

A

In networking terms, is the actual data being transported, which is everything that isn’t a header.

48
Q

Frame Check Sequence

A

A 4-byte(or 32-bit) number that represents a checksum value for the entire frame.

49
Q

checksum value

A

is calculated by performing what’s known as cyclical redundancy check against the frame.

50
Q

Cyclical Redundancy Check ( CRC)

A

An important concept for data integrity, and is used all over computing, not just network transmissions.

51
Q

IP addresses belong to

A

networks, not to the devices attached to those networks.

52
Q

In most cases, static IP addresses are

A

reserved for servers and network devices while dynamic IP addresses are reserved for clients

53
Q

IP datagram

A

A highly structured series of fields that are strictly defined.

54
Q

The most common version of IP is

A

version 4, or IPv4.

55
Q

Header Length field

A

Almost always 20 bytes in length when dealing with IPv4

56
Q

Service Type field

A

These 8 bits can be used to specify details about quality of service, or QoS, technologies

57
Q

Total Length field

A

Indicates the total length of the IP datagram it’s attached to

58
Q

Identification field

A

A 16-bit number that’s used to group messages together

59
Q

The maximum size of a single datagram is the largest number you can represent with

A

16 bits 65535

60
Q

If the total amount of data that needs to be sent is larger than what can fit in a single datagram,

A

the IP layer needs to split this data up into many individual packets.

61
Q

Flag field

A

Used to indicate if a datagram is allowed to be fragmented, or to indicate that the datagram has already been fragmented.

62
Q

Fragmentation

A

The process of taking a single IP datagram and splitting it up into several smaller datagrams

63
Q

Time to live(TTL)field

A

An 8-bit field that indicates how many router hops a datagram can traverse before it’s thrown away

64
Q

Protocol field

A

Another 8-bit field that contains data about what transport layer protocol is being used.

65
Q

Header checksum field

A

A checksum of the contents of the entire IP datagram header

66
Q

Ip options field

A

An optional field and is used to set special characteristics for datagrams primarily used for testing purposes.

67
Q

Padding field

A

A series of zeros used to ensure the header is the correct total size.

68
Q

IP addresses can be split into two sections:

A

The network ID and the host ID

69
Q

Address class system

A

A way of defining how the global IP address space is split up

70
Q
A
71
Q

ARP

A

A protocol used to discover the hardware address of a node iwth a certain IP address

72
Q

ARP table

A

A list of IP addresses and the MAC addresses associated with them

73
Q

ARP table entries generally

A

expire after a short amount of time to ensure changes in the network are accounted for.

74
Q

What happens to the TTL field of an IP datagram every time it reaches a router?

A

At every router hop, the TTL field is decremented by one until it reaches zero, causing the datagram to be discarded.

75
Q

Incorrect subnetting setups are a common problem you might run into as an IT Support Specialist,

A

so it’s important to have a strong understanding of how it works

76
Q

Subnet masks

A

32-bit numbers that are normally written out as four octets in decimal

77
Q

A single 8-bit number

A

Can represent 256 different numbers, or more specifically , the numbers 0-255.

78
Q

Two of the most important operators are

A

OR and AND

79
Q

In computer logic, a 1 represents

A

true and a 0 represents a false

80
Q

X OR Y = Z

A

If either X or Y is true, then Z is true; otherwise, it’s false.

81
Q

1 OR 0 = 1

0 OR 0 = 0

A
82
Q

Subnet mask

A

A way for a computer to use AND operators to determine if an IP address exists on the same network

83
Q

Network ID in the address classes

A

8 bit = Class A

16 bit = Class B

24 bit = Class C

84
Q

Demarcate

A

Set something off

85
Q

Demarcation point

A

To describe where one network or system ends and another one begins

86
Q

What does CIDR stands for?

A

Classless Inter-Domain Routing

87
Q

Router

A

A network device that forwards traffic depending on the destination address of that traffic

88
Q
A
89
Q

Routing Table

A

is a data table stored in a router or a network host that lists the routes to particular network destinations, and in some cases, metrics (distances) associated with those routes. The routing table contains information about the topology of the network immediately around it.

90
Q

Routing protocols

A

A routing protocol specifies how routers communicate with each other to distribute information that enables them to select routes between nodes on a computer network

91
Q

Routing protocols fall into two main categories:

A

interior gateway protocols and exterior gateway protocols.

92
Q

interior gateway protocols are further split into two categories:

A

Link state routing protocols and distance vector protocols

93
Q

Interior gateway protocols

A

Used by routers to share information within a single autonomous system

94
Q

Autonomous system

A

A collection of networks that all fall under the control of a single network operator

95
Q

In computer science, a LIST is know as a

A

VECTOR

96
Q

Internet Assigned Numbers Authority(IANA)

A

A non-profit organization that helps manage things like IP address allocation

97
Q

Along with managing IP address allocation, the IANA is also responsible for

A

ASN, or Autonomous System Number allocation

98
Q

Autonomous System Number ( ASN)

A

Numbers assigned to individual autonomous systems.

Autonomous Systems do not deliver data between each other using IP addresses, but rather use a special globally unique Autonomous System Number (ASN) assigned by IANA. Originally a 16-bit number, the current ASNs are 32 bits, displayed as two 16-bit numbers separated by a dot.

99
Q

Non-Routable Address Spaces

A
  1. 0.0.0/8
  2. 16.0.0/12
  3. 168.0.0/16
100
Q

Request for Comments

A

RFCs started as a way for academics to discuss how their computers might talk to each other.

101
Q

Router Protocols Include:

A

Routing Information Protocol (RIP)

Interior Gateway Protocol (IGRP)

Open Shortest Path First (OSPF)

Exterior Gateway Protocol (EGP)

Enhanced Interior Gateway Routing Protocol (EIGRP)

Border Gateway Protocol (BGP)

Intermediate System-to-Intermediate System (IS-IS)

102
Q

On a Local Area Network, or LAN, what identification do nodes use to communicate with each other internally?

A

Physical MAC Addresses

103
Q

What protocol communicates data between routers representing the edges of autonomous systems?

A

Exterior Gateway

104
Q

A ________ is where one network ends and another begins.

A

Demarcation point

105
Q

RC stands for

A

Request for Comments

106
Q

The process of taking a large network and splitting it up into many individual and smaller subnetworks is known as ________.

A

subnetting

107
Q

An ARP broadcast is sent to the special MAC address ________.

A

FF:FF:FF:FF:FF:FF

108
Q

What protocol is used to discover the hardware address of a node with a certain IP address?

A

ARP is a simple query–response packet protocol used to match workstations hardware addresses to IP addresses. In other words, ARP is the protocol used to identify nodes in a LAN.

109
Q

What is the process of taking a large network and splitting it up into many individual and smaller subnetworks called?

A

Subnetting

110
Q
A