• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/23

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

23 Cards in this Set

  • Front
  • Back
CIDR
classless inter-domain routing
CIDR allows for the division of the network identifier and the host identifier to fall anywhere in an IPv4 address. It does not have to fall on one of the eight-bit boundaries.
connectionless protocol
A connectionless protocol does not require the establishment of a connection, nor does it perform error detection or correction. Systems simply transmit their packets to the destination, without knowing if the destination system is ready to accept data, or if it even exists. Connectionless protocols do not guarantee delivery of their data, but they operate with a very low overhead that conserves network bandwidth.
connection-oriented protocol
A connection-oriented protocol is one in which two communicating systems establish a connection before they transmit any data. Once the connection is established, the computers exchange packets with complex headers designed to provide error detection and correction. A connection-oriented protocol ensures bit-perfect data transmissions, but a the price of greatly increased overhead.
datagram
The data-link layer packet that gets transmitted over the network consists of transport layer data, encapsulated within an IP packet.
8P8C connectors
At either end of each cable run are modular 8P8C connectors (often incorrectly referred to as RJ45 Connectiors).
firewall
A firewall is a software routine that acts as a virtual barrier between a computer and the network to which it is attached. A firewall is essentially a filter that enables certain types of incoming and outgoing traffic to pass through the barrier, while blocking other types.
frame
The header and footer and the data in the data-link layer is call a frame.
IP
Internet Protocol is the transport layer for Windows.
IP address
IP addresses are independent of hardware addresses. IP address in a given packet always identifies the packet's final destination. This is why IP is called an end-to-end protocol. For IPv4 address the first part is the network identifier and the last park is the host identifier.
MAC addresses
media access control (MAC) addresses or hardware address
The addresses computers use at the data-link layer are six-byte hexadecimal sequences, hard-coded into each network interface adapter by the manufacturer.
NAT
network address translation
NAT is a feature built into many routers that takes the packets destined for the Internet that are generated by the computers on a private network, substitutes a registered address for the computer's private address, and then forwards the packets to the Internet destinations. When the Internet servers send replies, the NAT router does the same thing in reverse. As a result, an entire private network can share a single registered address.
OSI reference model
open systems interconnection (OSI) reference model
The most common method for illustrating the operations of the networking stack which consists of seven layers.
1. Application
2. Presentation
3. Session
4. Transport
5. Network
6. Data-link
7. Physical
packet-switching networks
Local area networks are sometimes described as packet-switching networks because the mssages generated by each computer are divided up into small pieces call packets, which the computer transmits individually over the network.
ports
The TCP and UDP headers both comtain codes that identify specific applications running on the system.
protocols
Languages that all of the computers understand.
router
A router is a device that connects one network to another.
socket
The cobination of an IP address and a port number.
stateless address autoconfiguration
In IPv6 address assignment, this technique enables computers to configure their own addresses after transmitting router solicitation multicasts to the routers on the network and receiving router advertisement messages in return.
subnet mask
A subnet mask is also a 32-bit number, expressed in dotted decimal notation, such as 255.255.255.0. The subnet mask consists, in binary form, of a series of consecutive 1s followed by a series of consecutive 0s. When you compare the binary values of the subnet mask to those of the IPv4 address, the 1 bits in the mask represent the network identifier, while the 0 bits represent the host identifier.
TCP
Transmission Control Protocol
The default network layer.
UTP
unshielded twisted pair
A cable which is similar to the cable used for telephone wiring. UTP cable consists of four pairs of wires, which each pair twisted individually. At either end of each cable run are modular 8P8C connectors.
data encapsulation
Data encapsulation is the process of applying a header and footer around the data. IP performs its encapsulation first, by adding a hearder to the data it receives from the transport layer protocol. This header includes the packet's source and destination IP addresses, as well as other information that facilitiates the transmission of the packet. After IP add its header, it sends the packet down to the data-link layer, where Ethernet adds its own header and footer to the packet. Thus, the data-link layer packet that gets transmitted over the network consists of transport layer data, encapsulated within an IP packet (datagram), which in turn encapsulated within an Ethernet frame.
LLMNR
Link Local Multicast Name Resolution
For computers with link-local addresses, which might not have access to a DNS server, the system uses the LLMNR protocol. To use LLMNR, systems transmit name query request messages as multicasts to the local network. The request contains the name the computer is trying to resolve. The other computers on the local network, on reciving the messages, compare the requested name with their own names. The computer with the requested name then replies with a message containing its IP address, which it transmits as a unicast to the original requester.