• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/154

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

154 Cards in this Set

  • Front
  • Back
What are the layers of the OSI model? (Number and Name)
7 - Application
6 - Presentation
5 - Session
4 - Transport
3 - Network
2 - Data Link
1 - Physical
What is the function of the Application layer?
The Application layer serves as an entry-point for data from an application.
What is a redirector?
A redirector is a part of network client software installed on a workstation.
What does a redirector do?
A redirector passes data from applications to the Application layer, and from the Application layer to the appropriate applications.
What is the function of the Presentation layer?
The function of the Presentation layer is to free network communication from the limitations imposed by differences in data representation methods.
How does the Presentation layer serve its function?
The Presentation layer serves its function by translating, converting, encrypting and decrypting, and compressing and decompressing data.
What are the tasks of the Session layer?
The Session layer handles the initiation of communication connections, session maintenance, and bidirectional acknowledgment of communication.
What is a bidirectional acknowledgment of communication referred to as?
A bidirectional acknowledgment of communication is referred to as a handshake.
What responsibilities are met by the Transport layer?
The Transport layer provides optional error detection and correction and end-to-end (host-to-host) error recovery and it controls the flow of packets.
Why must the flow of packets be controlled?
If packets are sent more quickly than the recipient can process them, they will be dropped.
What two protocols are employed at the Transport layer?
The Transport layer uses the Transmission Control Protocol, or TCP, and the User Datagram Protocol, or UDP.
What is the difference between TCP and UDP?
TCP ensures data delivery by resending dropped packets. UDP maximizes speed by not resending packets.
What happens to data passed to the Transport layer from the Session layer?
Data passed down to the Transport layer is broken down into pieces.
What are the data pieces generally referred to as?
The general name for the data pieces is Data Protocol Units, or DPUs.
What are DPUs also called at the Transport layer?
At the Transport layer, DPUs are also called segments.
What does the Network layer handle?
The Network layer is tasked with packet addressing, path determination, and packet forwarding.
What else are DPUs referred to as at the Network layer?
At the Network layer, DPU's are also referred to as datagrams or packets.
What is packet addressing?
Packet addressing is encapsulating a packet with an IP header containing the source and destination network addresses.
What is path determination?
Path determination is determining how to get to the destination network.
What is packet forwarding?
Packet forwarding is sending the packet towards its destination.
What else does the Network layer determine, which it then passes to the Data Link layer?
The Network layer also determines the source and destination MAC (or data link) addresses then passes it to the Data Link layer.
In a TCP/IP environment, which protocols are responsible for which tasks?
The IP protocol handles packet addressing and path determination.
The ARP protocol takes care of MAC address determination.
What does the Network layer do on behalf of the network technology?
The Network layer ensures that the datagrams passed down to the Data Link layer are not too large for the network technology to handle.
What does MTU stand for, and what is the significance?
MTU stands for Maximum Transmission Units, and it represents the largest packet size the network technology can handle.
What defines the Data Link layer in a network?
The Data Link layer is defined by the network technology.
What protocol is most common for LANs?
The protocol for LANs is most often the 802.3 protocol, better known as Ethernet.
What other name do DPUs have at the Data Link layer.
At the Data Link layer, DPUs are also called frames.
What's contained in a frame?
At the Data Link layer, a packet is wrapped in headers containing the source and destination MAC addresses, some network protocol specific info, and an added checksum for error checking, then called a frame.
What is a MAC address?
MAC (Media Access Control) addresses are the unique identifying address burned into every network interface card and NIC-less computer.
What else are MAC addresses known as?
MAC addresses are known as physical addresses, because they're permanently tied to their NIC. They are also known as data link addresses in the OSI model.
How many bits are in a MAC address, and how is it represented?
A MAC address is 48 bits represented by 6 pairs of hexadecimal digits.
How are the parts of a MAC address divided?
The first 3 pairs in a MAC address dfenote the manufacturer, and the last 3 are unique to the NIC.
What is the Data Link layer responsible for on the local network only?
Just on the local network, the Data Link layer also takes care of delivery and error detection.
What happens to the data if it must be routed to another network?
If the data must be routed to another network, the router strips the frame off the packet and applies a new one depending on the network protocol at the packet's next hop.
How is the data passed to the Physical layer?
The Data Link layer converts frames to bit streams to pass to the Physical layer.
What are the sub-layers of the Data Link layer, in order?
The upper sub-layer of the Data Link Layer is the Logical Link (LLC) layer. The lower sub-layer is the MAC layer.
What defines the LLC sub-layer?
The LLC sub-layer is defined by the IEEE 802.2 standard.
What does the LLC sub-layer do with packets?
The LLC sub-layer frames packets by applying the MAC address and checksum headers.
What are the LLC sub-layer's session-related capabilities?
The LLC sub-layer can establish a connection-based or connection-less session with the next node in the path.
What else is handled by the LLC sub-layer?
The LLC sub-layer is also responsible for frame synchronization, flow control, and error correction.
What is an 802.2 frame good for?
An 802.2 frame allows for identification of the transport protocol in use.
What networking standards is the MAC sub-layer associated with?
The MAC sub-layer is associated with various networking standards such as 802.3 and 802.5.
What are the names for protocols 802.3 and 802.5?
802.3 is CSMA/CD or Ethernet, and 802.5 is Token Ring.
What does the MAC sub-layer handle?
The MAC sub-layer takes care of communication with the network adapter and arbitrates shared access to the media.
What is defined by the Physical layer?
The Physical layer defines the electrical, mechanical, functional, and procedural characteristics used to access and send a stream of bits over a physical medium.
How does the Physical layer prepare bits for transmission?
The Physical layer converts bits to electrical, light, or radio signals for transmission across a physical medium,
What is encapsulation?
Encapsulation is the process of wrapping data in headers as it is passed down the layers.
What headers are applied at each layer?
No headers are applied in the upper layers (Application to Session).
A TCP or UDP header is applied at the Transport layer.
The Network layer encapsulates DPUs with an IP header.
The Data Link layer adds a MAC header, as well as an 802.2, LLC, and/or SNAP header.
The Physical layer does not contribute any headers.
What basic information is stored in the TCP/UDP header?
Both TCP and UDP headers contain the source and destination port numbers and a checksum.
Describe the layers of the TCP/IP networking model.
The TCP/IP networking model is separated into the Application layer, Transport layer, Internet layer, and Network Interface layer.
Match up the layers of the TCP/IP model to the layers of the OSI model.
The Application layer in the TCP/IP model represents the Application, Presentation, and Session layers of the OSI model, the Transport layer is the Transport layer, the Internet layer is equivalent to the Network layer, and the Network Interface layer corresponds to the Data Link and Physical layers together.
Which TCP/IP protocols are associated with the Application layer of the TCP/IP model?
HTTP, TELNET, FTP, SMTP, DNS, and SNMP all correspond to the TCP/IP Application layer.
Which protocols are associated with the Transport layer?
TCP and UDP are associated with the Transport layer.
Which protocols are associated with the Internet layer?
IP, ARP, IGMP, and ICMP are associated with the Internet layer.
What are the individual merits of the OSI and the TCP/IP models.
The OSI model is embedded in the lexicon as the model most used for describing networking. The TCP/IP model best reflects the actual protocols in use.
Describe the encapsulation state of a DPU as it passes through a router.
A DPU enters a router as a layer 2 frame and moves through it as a layer 3 datagram.
What layer of the OSI model are repeaters associated with?
Repeaters are associated with the Physical layer, as they are unable to examine the content of frames.
What do repeaters do, in detail?
Repeaters receive a frame, regenerate an exact copy of it, and send the copy on its way.
What is the primary use of repeaters?
Repeaters are used only for intranetwork communication, mostly to extend the maximum length of cable runs.
What effect has fiber optics had on the usefulness of repeaters?
Repeaters are hardly seen used specifically for networking anymore, as fiber optics have extended maximum cable run length without need for repeaters.
What are hubs?
Hubs are essentially multiport repeaters, with 24+ ports instead of 2.
How does a hub work?
It forwards packets received in any port out through all other ports.
What layer does a hub operate on?
Hubs, like repeaters, operate on the Physical layer, as they cannot scrutinize the bits received in any way.
What is a collision domain?
A collision domain is a section of a network where packets may collide with one another.
What is packet collision?
If two signals are on the same wire at the same time they collide.
What problem arises with large single collision domains?
As more hosts enter a collision domain, collisions become more frequent, and communication must be reattempted so often as to impede performance.
What is a bridge?
A bridge is a repeater with the ability to examine the outer layer of frames and thus make intelligent forwarding decisions.
What layer does a bridge serve at?
Bridges are associated with the Data Link layer, as they can examine the headers applied at that layer.
How does a bridge know which direction to forward DPUs?
Bridges build an internal table that records every node attached to either port, and so learns which nodes are connected to which port.
What is the primary benefit of bridges over repeaters?
Since bridges don't forward DPUs the wrong direction, they limit wasted network communication and they split collision domains.
What is a switch?
Switches are to bridges what hubs are to repeaters.
How are collision domains determined by a switch?
Each port on a switch forms a collision domain.
What is wire speed technology and what is its significance?
Wire speed technology is a firmware based code that mitigates the delay arising form the switch examining every packet's MAC addresses.
In what form do switches often appear in when in a home?
In homes, switches are often employed within 4 port switch/Internet/router combo boxes.
What is the primary benefit of a switch with only 4 nodes on the network?
Having each node on a switched port makes eavesdropping more difficult, enhancing security.
What's the basic purpose of routers?
Routers are generally required to forward packets from one network to another.
Which OSI layer are routers associated with?
Routers are Network layer devices, as they read the IP (network) addresses of DPUs to determine where to send them.
What type of domain do routers isolate?
Routers isolate broadcast domains as well as collision domains.
What are the basic attributes of any router?
A router has a processor, an OS, 2+ network interfaces to forward packets through, a route table indicating which interface the packets should be forwarded through, and some type of memory to store the OS, route table, and config info.
What does one need to use a general purpose computer as a router?
To use a general purpose computer as a router, just install 2+ network interface cards and configure for packet forwarding.
What is a computer with 2+ NICs referred to as?
A computer with 2+ NICs is referred to as a multi-homed computer or a multi-homed system.
What types of memory are employed by routers?
Routers use non-volatile memory, such as ROM, Flash/EEPROM, and NVRAM, and volatile memory, like RAM.
What are the differences between volatile and non-volatile memory?
Volatile memory is faster, but non-volatile memory isn't lost when power is shut off.
What do routers typically use each type of memory for?
Routers typically store a stripped down OS in ROM, the full OS in Flash/EEPROM, and start up config in NVRAM. Information is copied to RAM on boot up for faster operation, and RAM also stores the running config, route tables, etc.
What are the two traditional interface types in routers?
Each router traditionally has a LAN interface and a WAN interface.
Throw out some details about WAN interfaces.
WAN interfaces allow connections to a WAN link, such as a modem or digital line (such as T1 or 56K). A Data Terminal Equipment / Data Circuit-terminating Equipment cable connects a WAN interface to a Channel Service Unit / Data Service Unit.
Throw out some details about LAN interfaces.
A LAN interface connects a routers to one or more local networks. It can be either an RJ-45 jack (100base-T) or a DB-15 female connector.
What was the DB-15 connector designed for?
The DB-15 connector was designed to connect to the now-obsolete 10base-2 (coax) networks.
What series of Cisco router still uses a DB-15 connector?
The Cisco 2500 series routers still use DB-15 connectors.
What does NAT device stand for?
Network Address Translation device.
What does a NAT device do?
NAT devices translate a private address to a public address when communicating with outside networks.
Most consumer networking devices which incorporate NAT are labelled as what?
Most consumer networking devices label NAT-incorporating devices as routers, despite NAT devices not performing any actual routing.
What is a layer 3 switch?
A layer 3 switch combines switch and router functions. It can read layers 2&3 headers and so can forward data either across the local network or to a separate network.
What is a public IP address?
A public IP address is a number assigned to a host that uniquely identifies them both on the local network and all public IP networks.
What is a private IP address?
A private IP address can't be used on public IP networks (including the Internet) and so can be reused by many people in private networks.
What is the purpose of private IP addresses?
Private IPs allow many hosts to use one public IP, thereby saving many.
How large is an IP address and how is it expressed?
IP addresses are 128 bits as of IPv6, and are often expressed as groupings of 8 bits each then converted to decimal.
What's the general rule regarding IP address validity?
If the network or host section of an IP address is all 1s or 0s, then the address is invalid.
Why are all 0 and all 1 host addresses invalid?
All 0s in the host section of an address represents the network number itself. All 1s represents the broadcast address for the network.
Why was the classful addressing system replaced with the classless?
With the classful addressing system, many IP addresses were wasted as network addresses were distributed. With the classless, requesters get the exact number of addresses they need.
How is it ensured that all public IP addresses are unique?
A central assigning authority allocates all public IP addresses.
What are the ranges of public IP addresses?
1.0.0.0 - 9.0.0.0
11.0.0.0 - 126.0.0.0
128.0.0.0 - 172.15.0.0
172.32.0.0 - 191.255.0.0
192.0.0.0 - 192.167.255.0
192.169.0.0 - 223.255.255.0
What are the ranges of private IP addresses?
10.0.0.0
172.16.0.0 - 172.31.0.0
192.168.0.0 - 192.168.255.0
What is RFC 1918 and when was it done?
In the mid-90's, RFC 1918 allocated a range of IP addresses for use by private networks, never to be used online.
The use of which devices was fueled by the implementation of private addresses?
The use of proxy servers, NAT boxes, and gateways has been fueled by the implementation of private addresses, as they substitute a public IP for the private when communicating with the internet.
Most consumer internet routers, which incorporate NAT devices for internet access, default to what private address?
Most consumer routers default to a class C private address, usually 192.168.(0-2).0.
What was the method of determining the network portion of an address in the classful system?
The First Octet rule was used with the classful system; the first octet was examined to determine class and so length of network portion in the address.
What is used in a classless environment to distinguish the network portion of an IP address?
In a classless environment, subnet masks and/or prefix numbers are used to distinguish the network portion of an IP address.
Subnet Time! Express subnet masks in dotted decimal.
a. The first one and a half octets are in the network portion of the address.
b. The first two octets and one bit more are in the network portion of the address.
a. 255.240.0.0
b. 255.255.128.0
Prefix Notation Time! Translate these dotted decimal subnet masks to prefix notation.
a. 172.0.0.0
b. 255.224.0.0
a. /2
b. /11
How is a subnet mask applied by a router?
A router applies a subnet mask to an IP address (both as 32-bit binary numbers) by ANDing them.
Which method of distinguishing network portions of IPs is commonly used by public WAN carriers?
Public WAN carriers often use prefix notation.
What is subnetting?
Subnetting is the act of taking a single IP network ID and subdividing it to create 2+ network IDs, by relocating the network/host division towards the right.
What are Variable Length Subnet Masks?
VLSMs allow subnets to be further subnetted.
What is supernetting?
Supernetting is the act of combining sequential IP network IDs into one network ID.
What is CIDR?
Classless Inter Domain Routing is the sub-/supernetting and VLSM techniques applied at the address assignment level.
How does CIDR work, basically? Generic example works.
ISP A receives an allotment of addresses with the subnet mask 240.0.0.0. ISP A subnets their addresses then gives ISP B an allotment with the subnet mask 255.255.0.0.
ISP B subnets and gives a network address to a small group with the subnet mask 255.255.255.240
What benefit does CIDR hold for route tables?
The CIDR address allotment system lends well to route summarization, limiting the entries in tables for backbone routers.
What are some important steps to take before you subnet a network ID?
Before subnetting a network ID...
1. Determine the total number of subnets needed, accounting for future networks.
2. Determine the total number of hosts that each subnet must support, accounting for the future.
3. Define a custom subnet mask that will support the required number of hosts per subnet.
4. Derive the subnet IDs, then the host IDs and broadcast address for each subnet.
Give the formula(s) for finding the number of valid subnet addresses created by subnetting and calculating how many valid host addresses are in a subnet.
2^n-2=number of viable addresses
For number of network addresses, n is the number of bits borrowed from the host portion.
For host addresses, n is the number of bits left in the host portion.
What is the original network address useful for after subnetting? What's that use referred to as, and why is it good?
The original network address can represent the collection of subnets in route tables of certain routers. This is called route summarization, and it minimizes route table entries.
If one subnets a network address, what does one need hardware-wise?
When subnetting a network address, one needs a router for each subnet and another router to forward packets between the subnets.
The introduction of what led to supernetting becoming unnecessary?
The introduction of CIDR removed need for supernetting, as old class limitations no longer applied.
What is the central internet agency responsible for assigning network addresses?
The internet agency responsible for assigning network addresses is called the Internet Network Information Center, InterNIC, or just NIC.
With regards to allocation of network addresses, what has come of the internet growing so large?
As the internet has grown larger, allocation of public IPs has been delegated to private regional entities,
What is the American agency for allocating network addresses?
The American Registry for Internet Numbers (ARIN) allocates network addresses in America.
What is a domain?
A domain is defined as a network or networks under a single administrative control.
What problems were solved by CIDR?
CIDR solved the problem of wasted IP addresses and the sheer enormity of backbone route tables.
What's the difference between IPv4 and IPv6?
IPv4 IP addresses are 32 bits; IPv6 addresses are 128 bits.
What does a port number indicate?
A port number indicates which application is to be used to process a packet.
How does the recipient computer use the port number of packets?
A recipient computer reads the port number of packets and sends the packets to the application listening on that port.
What ports do web servers and FTP servers listen on?
Web servers listen on TCP port 80; FTP servers listen on port 20.
What is the range of ports?
Both UDP and TCP protocols have their own 0-65,535 range of ports.
What range of ports is reserved?
The range of ports from 0-1023 are reserved, and used by server-based applications.
What is a socket and how is it displayed?
A socket is an IP address and port combination, and is displayed IPaddress:port (ie 192.164.0.2:80).
What series of port numbers do web clients make use of?
Web clients make requests using any of a series of sequential port numbers between 1024 and 4096, order wrapping.
What is a connection-oriented protocol? Give an example.
Connection-oriented protocols, such as TCP, establish a connection between the source and destination hosts before transferring data packets.
What is a connection-less protocol? Give an example.
A connection-less protocol, such as UDP or IP, does not create an initial connection between the source and destination hosts before sending packets.
Which layer header contains the source and destination port numbers?
The source and destination port numbers are contained in the Transport layer (4) header.
What is TFTP?
TFTP stands for Trivial File Transfer Protocol, and is used when assured delivery is not required, as it utilizes UDP.
What does Cisco use TFTP for?
Cisco uses TFTP to upload IOS and config files to routers, as that often happens over a local network, a relatively reliable medium.
What does the TFTP application use for error detection and correction?
The TFTP application uses checksums for error detection and correction.
Do broadcast packets use TCP or UDP?
Broadcast packets use UDP, because broadcasts are sent to all hosts on a subnet and are usually responded to by one host, if that, making it pointless to ensure delivery of all broadcast packets.
What does TCP do first, before sending data packets?
Before actual communication begins, TCP sends a SYN packet, and waits for an ACK packet reply so it knows the connection has been established.
What is the sequence number in TCP communications?
The sequence number is used in TCP communications to ID packets and ensure that each packet arrives at the destination.
How do two hosts synchronize TCP sequence numbers?
Two hosts synchronize the sequence number in the initial SYN and ACK packets.
What does the sending host do when it receives the ACK packet?
When the sending host receives the ACK packet, it sends one additional packet to indicate to the other host that it received the ACK and synched to the given sequence number.
What is the TCP communication preparation called?
The 3-way handshake is the name given to the TCP process for initializing communication.
How does TCP decide when to resend packets?
For every packet sent out, TCP notes the sequence number and starts a timer. If the ACK with that sequence number is not received before the timer expires, the packet is resent.
What is a sliding window?
The sliding window is TCP's method of flow control. It's a buffer in memory that stores a number of outbound packets to be sent in a burst, after which no more packets will be sent until the packets in the burst have been ACKd.
What happens if the TCP sliding window is too large?
If the sliding window is too large, flow is too high and packets are dropped, and TCP responds by narrowing the window.
How is the initial size of a TCP sliding window determined?
The initial size for the sliding window is determined in the 3-way handshake.
What is the Internet Protocol (IP) responsible for?
IP is responsible for logical packet addressing and forwarding datagrams.
What must be done if reliable communication is required when using IP?
If reliable communication is required, the layer 4 TCP protocol must be invoked by the sending application.