Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
87 Cards in this Set
- Front
- Back
What is a network? |
A network is a collection of devices and end systems. |
|
What are the four major categories of physical components of a computer network? |
- Personal computers (PCs): Send and receive data and are the endpoints of the network. |
|
What is the difference between the physical and logical network topology? |
Physical topology defines the physical components of the network: cables, network devices, and computers. |
|
What are six reasons the OSI reference model was created? |
Six reasons that the OSI reference model was created are as follows: |
|
What are the seven layers of the OSI reference model? Include the layer number and name of each layer in your answer. |
The seven layers of the OSI reference model are as follows: |
|
What is the function of the OSI model's physical layer (Layer 1)? Give some examples of physical layer implementations. |
The physical layer defines the physical medium. It defines the media type, the connector type, and the signaling type (baseband versus broadband). This includes voltage levels, physical data rates, and maximum cable lengths. The physical layer is responsible for converting frames into electronic bits of data, which are then sent or received across the physical medium. Twisted-pair, coaxial, and fiber-optic cable operate at this level. Other implementations at this layer are repeaters/hubs. |
|
What is the responsibility of the data link layer (Layer 2)? |
The data link layer defines how data is formatted from transmission and how access to the physical media is controlled. This layer also typically includes error correction to ensure reliable delivery of data. |
|
The Institute of Electrical and Electronics Engineers (IEEE) defines what two sublayers of the data link layer? |
The IEEE defines the following two sublayers of the data link layer: |
|
For what is the Logical Link Control (LLC) sublayer responsible? |
The Logical Link Control (802.2) sublayer is responsible for identifying different network layer protocols and then encapsulating them to be transferred across the network. |
|
What functions does the Media Access Control (MAC) sublayer provide? |
The MAC sublayer specifies how data is placed and transported over the physical wire. It controls access to the physical medium. |
|
What are some network devices that operate at the data link layer? |
Bridges and switches operate at the data link layer. |
|
Describe the function of the network layer (Layer 3). Give some examples of network layer implementations. |
The network layer provides internetwork routing and logical network addresses. It defines how to transport traffic between devices that are not locally attached. |
|
Are network layer addresses physical or logical? |
Network layer addresses are logical. |
|
What is the transport layer (Layer 4) responsible for? Give some examples of transport layer implementations. |
The transport layer segments and reassembles data from upper-layer applications into data streams. It provides reliable data transmission to upper layers. |
|
What is flow control, and what are the three methods of implementing it? |
Flow control is the method of controlling the rate at which a computer sends data, thus preventing network congestion. |
|
What are the functions of the session layer (Layer 5)? Give some examples. |
The session layer is responsible for creating, managing, and ending communication sessions between presentation layer entities. |
|
In the OSI model, what are the responsibilities of the presentation layer (Layer 6)? Give some examples of this layer. |
Also known as the translator, the presentation layer provides coding and conversion functions to application layer data. This guarantees that the application layer on one system can read data transferred from the application layer of a different system. Some examples of the presentation layer are as follows: |
|
What does the application layer (Layer 7) of the OSI model do, and what are some examples of this layer? |
The application layer is the layer that is closest to the user. This means that this layer interacts directly with the software application. The application layer's main function is to identify and establish communication partners, determine resource availability, and synchronize communication. Some examples include the following: |
|
How do the different layers of the OSI model communicate with each other? |
Each layer of the OSI model can communicate only with the layer above it, below it, and parallel to it (a peer layer). |
|
What is data encapsulation? |
Encapsulation wraps data with the necessary protocol information before network transmission. |
|
What are the four layers of the TCP/IP stack? |
The four layers of the TCP/IP stack are as follows: |
|
On what layer are physical data rates, connectors, and MAC addresses located in the TCP/IP stack? |
Physical data rates, connectors, and MAC addresses are located on the network access layer. |
|
What are some protocols that operate at the TCP/IP Internet layer? |
Some protocols that operate at the TCP/IP Internet layer are as follows: |
|
What is the Internet Protocol (IP)? |
IP is a connectionless protocol that provides best-effort delivery routing of packets. |
|
How many bits are in an IPv4 address? In an IPv6 address? |
IPv4: 32 bits |
|
An IP address is a hierarchical address that consists of what two parts? |
An IP address is a hierarchical address that consists of the following two parts: |
|
What are the different classes of IP addressing and the address ranges of each class? |
The different classes of IP addressing and their ranges are as follows: |
|
What is the range of addresses for Class A networks? |
- Class A: 1.0.0.0 to 126.255.255.255 |
|
What is the range of addresses for Class B networks? |
- Class B: 128.0.0.0 to 191.255.255.255 |
|
What is the range of addresses for Class C networks? |
- Class C: 192.0.0.0 to 223.255.255.255 |
|
What is the range of addresses for Class D networks? |
- Class D: 224.0.0.0 to 239.255.255.255 (Multicasting) |
|
What is the range of addresses for Class E networks? |
- Class E: 240.0.0.0 to 255.255.255.254 (Reserved) |
|
What does RFC 1918 define? |
RFC 1918 defines reserved (private) networks and addresses that are not routed on the Internet. |
|
What is the range of addresses for Class A private networks? |
- 10.0.0.0 to 10.255.255.255 |
|
What is the range of addresses for Class B private networks? |
- 172.16.0.0 to 172.31.255.255 |
|
What is the range of addresses for Class C private networks? |
- 192.168.0.0 to 192.168.255.255 |
|
If an IP wants to communicate with all devices on the local network, what is the destination IP address of its broadcast? |
255.255.255.255. |
|
What is special about IP address 127.0.0.1? |
127.0.0.1 is the loopback address. |
|
In a Class A network, how many octets are used for host addresses? |
3. One octet consists of 8 bits; thus a Class A network reserves 24 bits for host addresses. The maximum number of hosts a Class A network can have is 16,777,214 (2^24 - 2). |
|
How many hosts are available for use in a Class B network? |
65,534. A Class B network reserves 16 bits for host addresses; thus 2^16 - 2 = 65,534. |
|
How many hosts are available for use in a Class C network? |
254. A Class C network reserves 8 bits for host addresses. Thus 2^8 - 2 = 254. |
|
What is DHCP? |
Dynamic Host Configuration Protocol (DHCP) allows a host to obtain an IP address automatically and to set TCP/IP stack configuration parameters such as subnet mask, default gateway, and DNS addresses. |
|
What is DNS? |
The Domain Name System (DNS) converts names into IP addresses. |
|
What two protocols function at the transport layer of the TCP/IP model? |
Two protocols that function at the transport layer of the TCP/IP model are as follows: |
|
Which has more overhead, UDP or TCP? |
TCP. Because UDP segments are not acknowledged, they do not carry the overhead that TCP does, thus allowing faster transmissions and greater efficiency. |
|
What are the protocol numbers for TCP and UDP? |
TCP: 6 |
|
What is reliable versus best-effort delivery? |
Reliable delivery is connection oriented, and best-effort is connectionless. |
|
What are TCP and UDP port numbers? |
To pass information (such as e-mail) to upper layers, TCP and UDP use port numbers. These port numbers are predefined and keep track of different conversations among different hosts at the same time. Originating source port numbers are dynamically assigned by the source host using a number in the range of 49,152 to 65,535. |
|
What are well-known port numbers? |
Well-known port numbers are used for fundamental applications on the Internet such as e-mail and DNS. They have a range from 1 to 1023. |
|
What is the port number for SMTP? |
25 |
|
What is the port number for DNS? |
53 |
|
What are the port numbers for FTP? |
20 and 21. |
|
What is the port number for TFTP? |
69 |
|
What is the port number for Telnet? |
23 |
|
What is a socket? |
A socket is an IP address combined with a TCP or UDP port number. |
|
What are the three mechanisms TCP uses to accomplish a connection-oriented connection? |
The three mechanisms TCP uses to accomplish a connection-oriented connection are as follows: |
|
What are the steps for the TCP three-way handshake? |
The steps for the TCP three-way handshake are as follows:Step 1. The source host sends a SYN to the destination host. |
|
What is the purpose of flow control? |
Flow control provides a mechanism for the receiver to control the transmission speed. |
|
What is a TCP window? |
What is a TCP window? |
|
What is the purpose of a three-way handshake? |
The three-way handshake initiates communication by establishing an initial sequence number and window size. |
|
What is the purpose of TCP sequencing? |
The purpose of sequencing is to provide reliability by requiring the recipient to acknowledge receipt of a group of segments before a timer expires. |
|
What fields are included in the TCP header? |
The fields included in the TCP header are as follows: |
|
What is an example of a Layer 2 address? |
MAC address. |
|
What is the Address Resolution Protocol (ARP)? |
ARP is used to resolve a known IP address to a MAC address. For a host to communicate with another host, it must know the MAC address of the destination host (if they are on the same network) or next-hop router. This is the reason for ARP. |
|
What is the ARP table? |
The ARP table stores the reference of each known IP address to its MAC address. |
|
What is the purpose of the default gateway? |
What is the purpose of the default gateway? |
|
A host computer has been correctly configured with a static IP address, but the default gateway is incorrect. Which layer of the OSI model is first affected by this misconfiguration? |
Layer 3. |
|
What three configuration settings does a host on a TCP/IP network require to communicate with hosts on a remote TCP/IP network? |
The configuration settings are as follows: |
|
You want to test TCP/IP connectivity between two hosts. What IP tool can you use to do this? |
Ping. Ping is a tool that is part of IP that sends Internet Control Message Protocol (ICMP) packets to test network layer connectivity between two hosts. Ping sends an "echo request" packet to the target host and listens for an ICMP "echo response." |
|
What two utilities test IP connectivity? |
Ping and traceroute (tracert). |
|
List four functions of ICMP. |
Four functions of ICMP are as follows: |
|
While troubleshooting a computer with network connectivity problems, you notice steady link lights on both the computer and the switch port the computer is connected to. However, when you issue the ping command from the computer, you receive a "Request timed out" message. On what layer of the OSI model does the problem most likely exist? |
The network layer. |
|
What are LAN standards? |
LAN standards define the physical media and connectors used to connect to the media at the physical layer and the way devices communicate at the data link layer. |
|
What functions does the Media Access Control (MAC) sublayer provide? |
The MAC sublayer specifies how data is placed and transported over the physical wire. |
|
What does the LLC sublayer do? |
The Logical Link Control (802.2) sublayer is responsible for identifying different network layer protocols and then encapsulating them to be transferred across the network. |
|
What do the Ethernet and IEEE 802.3 standards define? |
The Ethernet and IEEE 802.3 standards define a bus-topology LAN that operates at a baseband signaling rate of 10 Mbps, referred to as 10BASE. Within the Ethernet standards are protocol specifications that define the transmission medium and access. The following three protocol specifications exist: |
|
Define the Fast Ethernet standard. |
The Ethernet standard that defines Fast Ethernet is IEEE 802.3u. This standard raises the speed of the Ethernet standard of 10 Mbps to 100 Mbps with only minimal changes to the existing cable structure. The Fast Ethernet standard defines different protocol specifications depending of the physical medium used. The following are the four different Fast Ethernet specifications: |
|
What does BASE mean in 10BASE-T and 100BASE-T? |
BASE in 10BASE-T and 100BASE-T refers to the baseband signaling method. Baseband is a network technology in which only one carrier frequency is used. This means that when a device transmits, it uses the entire bandwidth on the wire and does not share it. Ethernet defined baseband technology. |
|
What is Gigabit Ethernet? |
Gigabit Ethernet is an extension of the IEEE 802.3 Ethernet standard. It increases the speed of the Ethernet protocol to 1000 Mbps, or 1 Gbps. IEEE 802.3z specifies Gigabit over fiber, and IEEE 802.3ab specifies Gigabit over twisted-pair cable. |
|
What is carrier sense multiple access collision detect (CSMA/CD)? |
CSMA/CD describes the Ethernet access method. |
|
What are the three ways LAN traffic is transmitted? |
LAN traffic is transmitted one of the following three ways: |
|
How many bits are in an Ethernet address? |
48. Also called a MAC address, an Ethernet address is the Layer 2 address associated with the Ethernet network adapter. Typically burned into the adapter, the MAC address is usually displayed in a hexadecimal format, such as 00-0d-65-ac-50-7f. |
|
What portion of the MAC address is vendor specific? |
The first half or first 24 bits of the MAC address are vendor specific. |
|
What portion of the MAC address is vendor assigned? |
The last 24 bits are vendor assigned. |
|
What is the maximum cable length for UTP? |
100 meters or 328 feet. |
|
What is a straight-through Ethernet cable, and when would you use it? |
A straight-through Ethernet cable is wired the same way at both ends. This cable uses pins 1, 2, 3, and 6. The send and receive wires are not crossed. |
|
What is a crossover Ethernet cable, and when would you use it? |
A crossover Ethernet cable is a cable that has the send and receive wires crossed at one of the ends. In a Category 5 cable, the 1 and 3 wires are switched and the 2 and 6 wires are switched at one end of the cable. |