• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/31

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

31 Cards in this Set

  • Front
  • Back
6to4
6to4 Addresses
Two nodes running both IPv4 and IPv6 across and IPv4 routing infrastructure. Use this address type when communicating with each other. You can form the 6-to-4 address by combining the prefix 2002::/16 with the 32-bit public, IPv4 address to form a 48 but prefix of the form 2002:wwxx:yyzz::/48 in the case of a public IPv4 address w.x.y.z. The 6to4 address is completed with a 16-bit subnet ID and a 64-bit interface ID. This tunneling technique is described in RFC 3056.

(Poulton, 2012 p.64)
ARP
Address Resolution Protocol

The address resolution protocol (ARP) detects and updates a table that matches up physical addresses with IP addresses.
(Poulton, 2012 p.39)

ARP is the is the protocol in the TCP/IP suite that resolves IP addresses to MAC address by creating an address resolution table in each ost that transmits data on the network segment.

(Poulton, 2012 p.70)
Anycast IP Address
Address prefix: (From the Unicast addresses)

Anycast: Represents multiple interfaces. Anycast packets are delivered to a single network interface that represents the nearest (in terms of routing hops) interface identified by the address

(Poulton, 2012 p.57)
APIPA
Automatic private IP addressing

Automatic Private IP Addressing (APIPA) The dynamic IPv4 addressing system
used when DHCP is unavailable. It uses the IP address range of 169.254.y.z.

(Poulton, 2012 cd. glossary)
CIDR
Classless inter-domain routing

classless inter-domain routing (CIDR) A flexible method of stating IP addresses
and masks without needing to classify the addresses. An example of the CIDR format
is 192.168.1.0/24.


(Poulton, 2012 cd. glossary)
Default Gateway
Default Gateway

The address listed as the default gateway is the location on the local subnet to which the local computer sends all data meant for other subnets. In other words, this is the IP address for the local network side of the router that is capable of transmitting the data to other networks.

(Poulton, 2012 p.41)
Dynamic IP address
Dynamic IP addresses are provided to a computer when it needs to be connected to the network. The provider is the Dynamic Host Configuration Protocol (DHCP) server. Such as an IP address is leased for a specific period of time when configuring the DHCP server), and when the lease is up, the IP address is placed back in an IP address pool and can be delivered to another computer. You learn more about DHCP and dynamic IP addressing in Chapter 2, "Configuring Dynamic Host Configuration Protocol (DHCP),"

(Poulton, 2012 p.48)
Global unicast IPv6 address
Address Prefix (2000::/3)

Uses a global routing prefix of 45 bits (beyond the initial 001 bits), which identifies a specific organization's network: a 16-but subnet ID, which identifies up to 65,536 subnets within an organizations network; and a 64-bit interface ID, which indicates a specific network interface within the subnet.

(Poulton, 2012 p.57)
Host
host Any computing device that has been assigned an IP address.

(Poulton, 2012 cd. glossary)
Internet Layer
The internet layer is primarily concerned with the ouring and delivery of packets. This layer corresponds closely to the OSI network layer. Both versions 4 and 6 of the IP operate at this layer.

Routing is accomplished mainly by means of IP. Other protocols that function at the internet layer are the Internet Control Messaging Protocol (ICMP), Internet Group Management Protocol (IGMP), Address Resolution Protocol (ARP), Neighbor Discovery (ND) protocol, and the Multicast Listener Discovery (MLD) protocol.

(Poulton, 2012 p.37)
IP
Internet Protocol

The Internet Protocol (IP handles, addressing, and routes packets between hosts on a network. It performs this service foe all protocols in the TCP/IP protocol suite.

IP is a connectionless protocol. Connectionless protocol transmission occur without a pre-established path between the source and destination. This means that packets may take different routes between the source and destination. Packets may arrive in their destination by different paths and in random order. They may also be duplicated or delayed. Although there is no way to guarantee delivery. IP will always make a "best effort" to deliver packets using the limited means of disposal.

(Poulton, 2012 p.39)
ICMP
Internet Control Message Protocol

The internet control message protocol (ICMP) delivers messages to host on a TCP/IP network. ICMP is specifically responsible for reporting errors and messages regarding the delivery of IP datagrams. It is not responsible for error correction. Higher layer protocols use information provided by ICMP to recover from transmission problem. Network administrators may also be able to use ICMP to detect network problems. ICMP is required in every IPv4 network implementation. IPv6 networks use a newer implementation of this protocol: ICMPv6.

(Poulton, 2012 p.39-40)
ISATAP
Intra-site Automatic Tunnel Addressing Protocol

As defined in RFC 4214, ISATAP is a tunneling technology that enables unicast IPv6 connectivity between IPv6/IPv4 host over an IPv4 intranet. You do not need to perform any manual configuration actions on an ISATAP host; ISATAP addresses are created using standard auto configuration.

(Poulton, 2012 p.63)
IPv4
Internet Version 4

The unique, logical 32-bit address, which identifies the computer (called a host or node) and the subnet on which it is located. The IP address is displayed in dotted-decimal notation (each decimal represents an octet of binary ones and zeros). For example, the binary notation of an address may be 10000000.00000001.00000001.00000011, which in dotted decimal notation is 128.1.1.3

(Poulton, 2012 p.41)
IPv6
Internet Version 6

The 128-bit addressing scheme used by IPv66 enables an unimaginably high number of 3.4 x 10 ^38 addresses, which equated to a total of 6.5x10^23 addresses for every square meter of the Earth's surface. Consequently, this is a complicated addressing scheme, as described in the following sections.

(Poulton, 2012 p.54)
IP Address
IP address A logical address that is used to identify both a host and a network segment.
Each network adapter on an IP network requires a unique IP address.

(Poulton, 2012 cd. glossary)
IPv4- Compatible address
IPv4-compatible address An IPv6 address represented in the form
0:0:0:0:0:0:w.x.y.z, where w.x.y.z is the IPv4 address in dotted decimal. This allows
communication between IPv4 and IPv6 networks.

(Poulton, 2012 cd. glossary)
Ipv4-mapped Address
IPv4-mapped address An IPv4-only node is represented as ::ffff:.w.x.y.z to an IPv6
node. Used only for internal representation.

(Poulton, 2012 cd. glossary)
ipconfig
Windows Server 2008 uses the ipconfig utility without any additional parameters to display summary information about the IP address configuration of its network adapters. When you experience a problem with connectivity, this is the first thing you need to check (besides the link lights on the network adapter). If you are using DHCP, you can see whether the adapter was able to obtain an IP address lease. If you are using a static IP address, you can verify and validate whether it has been configured correctly.

(Poulton, 2012 p.71)
link local IPv6 address
Address Prefix ( fe80::/64)

Equivalent to APIPA configured IPv4 addresses in the 169.254.0.0/16 network prefix.

(Poulton, 2012 p.57)
multicast IPv6 address
Address Prefic (ff)

Multicast: Represents multiple interfaces. Anycast packets are delivered to a single network interface that represents the nearest (in terms of routing hops) interface identified by the address.

(Poulton, 2012 p.57)
netsh
netsh A command-line tool that enables you to configure TCP/IP networking
and addressing options. netsh also enables you to configure and display the status of
various networking server roles and components.

(Poulton, 2012 cd. glossary)
network interface layer
The network interface layer provides an interface for the layer above it to the network media. This layer controls the way frames are ultimately built and set out on to the network media (Ethernet cables, Network adapter cares, wireless cards and so on) or received from the network media and transmitted to the upper layers. The network interface layer needs to furnish an interface allowing the internet layer to communicate with it from above. The Internet layer, In turn, is responsible for communicating directly with the network interface layer.

(Poulton, 2012 p.37)
OSI reference model
Open system Interconnection reference model

Thus model serves to describe the work of protocols in a standardized fashion. This standardization allows differing systems to communicate and provide protocol developers a list of common protocol tasks and a blueprint for designing protocol suites. The OSI model can be used to describe network communication in two ways: across boundary layers from a higher layer to a lower layer or as virtual, peer-to-peer, communication between corresponding layers on two different machines.

(Poulton, 2012 p.34)
Private IPv4 network
IPv4 specifications define sets of networks that are specified as private IPv4 networks. The private IP address classes are used on private networks that do not need to be accessed directly from the public Internet. Internet routers are preconfigured to not forward data that contains these IP addresses.

(Poulton, 2012 p.48)
Static IP address
IP addresses indicate the same type of location information as a street address within a city. A building on a street has a number, and when you add it to the street name you can find it fairly easily because the number and the street will be unique within that city. This type of address scheme-an individual address plus a location address allows every computer on a corporate network or the internet to be uniquely identified.

(Poulton, 2012 p.42)
subnet mask
The subnet mask is applied to an IP address to determine the subnetwork address and the host address on that subnet. All host on the same subnet must have the same subnet mask for them to be correctly identified. If a mask is incorrect, both the subnet and the host address will be wrong. (for example, if you have an IP address of 128.1.1.3, and an incorrect mask of 255.255.128.0, the subnet address would be 128.1.0 and the host address would be 1.3. If the correct subnet mask is 255.255.255.0, the subnet mask would be 128.1.1 and the host address would be 3.)

(Poulton, 2012 p.41)
subnetting
The process of subnetting enables you to reconfigure which portion of the subnet mask constitutes the network portion and which portion constitutes the host portion. When you apply the subnet mask to the IP address by using a "bitwise logical AND" operation, as discussed in the previous section, the result is a network number.

(Poulton, 2012 p.45)
Teredo
Teredo is a tunneling communication protocl that enab;es IPv6 connectivity between IPv6/IPv4 nodes across a network address translation (NAT) interfaces, thereby improving connectivity for newer IPv6-enabled applications on IPv4 networks. Teredo is described in RFC 4380. Teredo makes use of the special IPv6 address that includes the following components in the sequence given.

- A 32-bit terod prefix, which is 2001::/32 in Windows Vista /7 and Windows Server 2008/R2

- The 32 bit IPv4 address of the Teredo Server involved in creating this address

- A 160bit Teredo flag field an an obscured 16-bit UDP Port interface definition

- An obscured external IPv4 address corresponding to all Teredo traffic across the Teredo Interface

(Poulton, 2012 p.65)
TCP
Transmission Control Protocol

The transmission Control Protocol (TCP) provides connection-oriented, reliable communication between two hosts, typically involving large amounts of data. This kind of communication also involves acknowledgments that data has been correctly received. TCP works bu establishing a connection, or session, between two hosts before transmitting data. Once established, this connection is maintained for the duration of a session. The connection is closed at the end of the session.

(Poulton, 2012 p.38)
UDP
User Datagram Protocol

The User Datagram Protocol (UDP) is used for fast non-connection oriented communication with no guarantee of delivery-typically small short bursts of data. It guarantees neither delivery nor correct sequencing of packets. Applications using UDP data transmission are responsible for checking their data's integrity. UDP operates with less overhead than TCP. It also used sending data from a single source to multiple destinations.

(Poulton, 2012 p.38)