• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/49

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

49 Cards in this Set

  • Front
  • Back
{Ch. 2} Same-layer interactions on different computers
The two computers use a protocol to communicate with the same layer on another computer. The protocol defined by each layer uses a header that is transmitted between the computers, to communicate what each computer wants to do
[Ch. 2] Adjacent-layer interaction on the same computer
On a single computer, one layer provides a service to a higher layer. The software or hardware that implements the higher layer requests that the next lower layer perform the needed function
[Ch. 2] Name this OSI layer: Defines the format and organization of data. Includes encryption
Presentation layer
[Ch. 2] Name this OSI layer: Interfaces between network and application software. Also includes authentication services
Application layer
[Ch. 2] Name this OSI layer: Logical addressing, routing and path determination
Network Layer
[Ch. 2] Name this OSI layer: Defines the electrical, optical, cabling, connectors, and procedural details required for transmitting bits, represented as some form of energy passing over a physical medium
Physical layer
[Ch. 2] Name this OSI layer: Formats data into frames appropriate for transmission onto some physical medium. Defines rules for when the medium can be used. Defines means by which to recognize transmission errors
Data-Link layer
[Ch. 2] Name this OSI layer; Establishes and maintains end-to-end bidirectional flows between endpoints. Includes managing transaction flows
Session Layer
[Ch. 2] Name this OSI layer: Provides a variety of services between two host computers, including connection establishment and termination, flow control, error recovery, and segmentation of large data blocks into smaller parts for transmission
Transport Layer
[Ch. 3] Name Ethernet's speed, alternate name, IEEE standard, and cable type (including max length)
speed = 10 Mbps
Alt Name = 10BASE-T
IEEE Standard = 802.3
Cabling = Copper (100 m)
[Ch. 3] Name Fast Ethernet's: speed, alternate name, IEEE standard, and cable type (including max length)
speed = 100 Mbps
Alt Name = 100BASE-TX
IEEE standard = 802.3u
Cabling = Copper (100 m)
[Ch. 3} Name Gigabit Ethernet's: speed, alternate name, IEEE standard, and cable type (including max length)
speed = 1000 Mbps
Alt Name = 1000BASE-LX
1000BASE-SX
IEEE standard = 802.3z
Cabling (LX) = Fiber (5 km)
Cabling (SX) = Fiber (550 m)
[Ch. 3} What are some other names for MAC addresses?
Ethernet address, NIC address, LAN address
[Ch. 3] What is a burned-in address?
6-byte address assigned by the vendor making the Network interface card
[Ch. 3] What is a unicast addresss?
A term for a MAC that represents a single LAN interface
[Ch. 3] Broadcast address
An address that means "all devices that reside on this LAN right now"
[Ch. 3] Multicast address
On Ethernet, a multicast address implies some subset of all devices currently on the Ethernet LAN
[Ch. 4] What is the bit rate of a WAN DSO line?
64 Kbps
[Ch. 4] Bit rate of a DS1 (T1)
1.544 Mbps (24 DSOs, plus 8 kb/s overhead)
[Ch. 4] Bit rate of a DS3 (T3)
44.736 Mbps (28 DS1s, plus mgmt overhead)
[Ch. 4] Bit rate of E1
2.048 Mbps (32 DSOs)
[Ch. 4] Bit rate of E3
34.064 Mbps (16 E1s, plus mgmt overhead)
[Ch. 4] Bit rate of J1 (Y1)
2.048 Mbps (32 DSOs, Japanese standard)
[Ch. 5] Class A network: number of network bytes, host bytes, and addresses per network
network bytes = 1 (8 bits)
host bytes = 3 (24 bits)
Addresses/network = 2^24-2
[Ch. 5] Class B network: number of network bytes, host bytes, and addresses per network
network bytes = 2 (16 bits)
host bytes = 2 (16 bits)
Addresses/network = 2^16-2
[Ch. 5] Class C network: number of network bytes, host bytes, and addresses per network
network bytes = 3 (24 bits)
host bytes = 1 (8 bits)
Addresses/Network = 2^8-2
[Ch. 5] Class A network: first octet range, valid network numbers, total number for this class of network, number of hosts per network
First octet range = 1 to 126
Valid Network Numbers = 1.0.0.0 - 126.0.0.0
Total number for class of network = 2^7-2 (126)
Total number of hosts = 2^24-2
[Ch. 5] Class B network: first octet range, valid network numbers, total number for this class of network, number of hosts per network
First octet range = 128 to 191
Valid Network Numbers = 128.1.0.0 - 191.254.0.0
Total number for class of network = 2^14 (16384)
Total number of hosts = 2^16-2
[Ch. 5] Class C network: first octet range, valid network numbers, total number for this class of network, number of hosts per network
First octet range = 192 to 223
Valid Network Numbers = 192.0.1.0 - 223.255.254.0
Total number for class of network = 2^21 (2,097,152)
Total number of hosts = 2^8-2
Left arrow or Ctrl-b
This moves the cursor backward in the currently displayed command without deleting characters
Right arrow or Ctrl-f
This moves the cursor forward in the currently displayed command without deleting characters
This moves the cursor backward in the currently displayed command , deleting characters
Backspace
This moves the cursor directly to the first character of the currently displayed command
Ctrl-a
Ctrl-e
This moves the cursor directly to the end of the currently displayed command
This redisplays the command line with all characters. Its useful when messages clutter the screen
Ctrl-r
Ctrl-d
This deletes a single character
This moves back one word
Esc-b
Esc-f
This moves forward one word
hostname(config)#
Global configuration mode. First mode after configure termina commandl
hostname(config-line)#
Mode = Line
Command(s) to reach mode =
line console 0
line vty 0 15
hostname(config-if)#
Mode = interface
Command to reach mode =
interface [type number]
Stores the initial configuration used any time the switch reloads IOS. Stored in NVRAM
Startup-config
Running-config
Stores the currently used configuration commands. This file changes dynamically when someone enters commands in configuration mode
1st step in SSH config on Cisco IOS-based Switch
Change the vty lines to use usernames, with either locally configured usernames or an AAA server. IN this case, the login local subcommand defines the use of local usernames, replacing the login subcommand in vty configuration mode
Tell the switch to accept both telnet and ssh with the transport input telnet ssh vty subcommand.
2nd step in SSH config on Cisco IOS-based Switch
3rd step in SSH config on Cisco IOS-based Switch
Add one or more username [name] password [pass-value] with global config commands
Configure a DNS domain name with ip domain-name [name] global config command
4th step in SSH config on Cisco IOS-based Switch
5th step in SSH config on Cisco IOS-based Switch
Configure the switch to generate a matched public and private key pair, as well as shared encryption key, using the crypto key generate rsa global config command
6th step in SSH config on Cisco IOS-based Switch
Although no switch commands are required, each SSH client needs a copy of the switch's public key before the client can connect