export_week 14 chapter 13 ethernet and tcpip networking Flashcards

1
Q

, tab

Domain Names

A

▪ Hierarchical system of network address identifiers used throughout the Internet and on local area networks, intranets and extranets ▪ Created so users would not have to memorize IP addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

, tab

what is the Domain name resolution ?

A

translates domain names into IP addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

, tab

what does DNS Domain Name System do ?

A

▪ Uses a massive distributed database containing a directory system of servers

▪ Each entry contains a domain name and an associated IP addres

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

, tab

Domain Name System (DNS) diagram

A

DNS Server Hierarchy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

, tab

The Elements of a Domain Name

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

, tab

Top Domain Name Registrations

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

, tab

Domain Name Resolution diagram

A

://s3.amazonaws.com/classconnection/655/flashcards/7082655/png/imagegfh0qx-14A5D8663DA589825FD.png

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what is DOEs Transport Layer ▪ TCP protocol?

A

▪ TCP protocol ▪ Sends a packet to TCP at the destination site, requesting a connection ▪ Handshaking – back and forth series of requests and acknowledgments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

, tab

▪ If handshaking negotiations are successful in the transport layer ?

A

▪ If handshaking negotiations are successful, a connection is opened

▪ Connection is logically full-duplex

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

, tab

Three-Way TCP Connection Handshake Diagram

A

ws.com/classconnection/655/flashcards/7082655/png/imagegq72qx-14A7DE018793E0C9E3C.png

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

, tab

TCP Segment Format Diagram

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

, tab

Network Layer IP protocol?

A

▪ IP protocol ▪ Responsible for relaying packets from the source end node to the destination end node through intermediate nodes ▪ Performed using datagram packet switching and logical IP addresses ▪ Best-attempt unreliable service ▪ Size of datagram ranges from 20 to 65,536 bytes ▪ Header size between 20 and 60 bytes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

, tab

IPv4 Addresses

A

▪ Registered and allocated by ICANN ▪ 32 bits long divided into 4 octets ▪ Assigned in blocks of contiguous addresses ▪ Number of addresses is a power of two

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

, tab

IPv4 Addresses ▪ Divided into three levels?

A

▪ Network address ▪ Subnetworks (subnets) ▪ Hosts (nodes)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

, tab

what does Masks do ?

A

▪ Used to separate the different parts of the address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

, tab

IPv4 Datagram Format Diagram ?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

, tab

IP Addresses Diagram ?

A

IP Block Addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

, tab

IP Addresses IP Hierarchy and Subnet Mask Diagram ?

A

IP Hierarchy and Subnet Mask

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

, tab

Reseved IP Addresses

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

, tab

Two methods to distribute IP addresses more efficiently:?

A
  1. Use of private network IP addresses behind a router 2. Dynamic Host Configuration Protocol (DHCP)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

, tab

what does Dynamic Host Configuration Protocol (DHCP) do ?

A

Maintain a bank of available IP addresses and assign them dynamically to computers for use when the computers are attached to the network Method often used by large organizations, DSL and cable providers

22
Q

, tab

what does DHCP Client and server ?

A

* DHCP client on computer or network device broadcasts a query to locate the DHCP server * DHCP server responds with a lease which includes an IP address, domain name of network, IP address of DNS server, subnet mask, IP address of gateway and other configuration parameters

23
Q

, tab

Operation of IP two major functions?

A
  1. ▪ Routes datagrams from node to node until they reach their destination node 2. ▪ Translates IP addresses to physical addresses before it passes the packets to the data link later for delivery
24
Q

, tab

(ARP)

A

Address Resolution Protocol

25
Q

, tab

when is the (ARP) network implemented ?

A

▪ Implemented at the network layer

26
Q

, tab

what does ARP do ?

A

▪ Translation of IP address to physical address at each intermediate node until destination is reached

▪ A broadcast of the IP address is sent to every node on the network. The matching node responds with a physical address

▪ Physical address (MAC address in the case of Ethernet) is sent in frame to the data link layer At final destination, the packet is passed up to the transport layer for deployment to the application layer

27
Q

, tab

Data Link Layer what is this responsible for ?

A

Layer responsible for transmitting a packet from one node to the next node

28
Q

, tab

how is node access defined ?

A

Node access defined by the medium access control (MAC) protocol ▪ Steer data to its destination ▪ Detect errors ▪ Prevent collisions

29
Q

, tab

what does Ethernet (CSMA-CD)?

A

▪ Predominant medium-access protocol for local area networks ▪ Standard Ethernet packet is a frame (see next slide)

30
Q

, tab

Ethernet Frame

A
31
Q

, tab

Hub-Based Ethernet

A

* Simple means of wiring bussed Ethernet together * Logically still a bus network * CSMA-CD

32
Q

, tab

when does the collision happens in the hub- based Ethernet happen ?

A

Collision ▪ Occurs when multiple nodes access the network in such a way that their messages become mixed and garbled

33
Q

, tab

what is Network propagation delay ?

A

Amount of time that it takes for one packet to get from one end of the network to the other

34
Q

, tab

when is gthe hub based Etherent work ?

A

▪ Adequate for networks with light traffic

35
Q

, tab

what Switched Ethernet do ?

A
  1. Permits point-to-point connection of any pair of nodes 2. Multiple pairs can be connected simultaneously 3. Possible to connect nodes in full-duplex mode 4. Each pair of connections operates at the maximum bit rate of the network
36
Q

, tab

(QoS)

A

Quality of Service

37
Q

, tab

wh/at does QOS do

A

. 1. Methods to reserve and prioritize channel capacity to favor packets that require special treatment 2. Service guarantees from contract carrier services that specify particular levels of throughput, delay and jitter

38
Q

, tab

Jitter

A

variation in delay from packet to packet

39
Q

, tab

Differentiated service (DiffServ) about

A
  1. ▪ 8-bit (DS) field in IP header 2. ▪ Set by the application at the sender or by the first node 3. ▪ Diffserv capable nodes such as routers can then prioritize and route packets based on the packet class
40
Q

, tab

Network Security Categories

A
  1. Intrusion 2. Confidentiality 3. Authentication 4. Data integrity and non-repudiation 5. Assuring network availability and access control
41
Q

, tab

Intrusion

A

Keeping network and system resources free from intruders

42
Q

, tab

Confidentiality

A

Keeping the content of data private

43
Q

, tab

Authentication

A

Verifying the identity of a source of data being received

44
Q

, tab

Data integrity and non-repudiation

A

Protecting the content of data communication against changes and verifying the source of the message

45
Q

, tab

Assuring network availability and access control

A

Keep network resources operational and restricting access to those permitted to use them

46
Q

, tab

▪ Network intrusions how ?

A

▪ Packet sniffers read data in a packet as it passes through a network ▪ Probing attacks to uncover IP address / port numbers that accept data packets

47
Q

, tab

what are Physical and Logical Restriction ?

A

Physical and Logical Restriction ▪ Limit access to wiring and network equipment ▪ Firewall ▪ Private networks

48
Q

, tab

Encryption

A

1-Symmetric key cryptography Both key used for encryption and decryption Both sender and receiver use the same key which makes security difficult 2- Public key cryptography Two different keys are used for encryption and decryption

49
Q

, tab

MPLS

A

(Multi-Protocol Label Switching) Creates a virtual circuit over packet switched networks to improve forwarding speed of datagrams

50
Q

, tab

ATM

A

(Asynchronous Transfer Mode) ▪ Partial-mesh network technology in which data passes through the network in cells (53-byte packets)

51
Q

, tab

SONET and SDH

A

(Synchronous Optical Network) and (Synchronous Digital Hierarchy) Protocol that uses fiber optic to create wide area networks with very high bit rates over long distances

52
Q

, tab

Frame Relay

A

▪ Slow, wide area network standard

A standardized wide area network technology that specifies the physical and logical link layer of digital telecommunications channels using a packet switching methodology