Chapter 4 Flashcards
(88 cards)
(CIDR)
Classless inter-domain routing; a standard notation that indicates what portions of an IP address are used for network ID and host ID
binary
using 1s and 0s to represent hexadecimal
You are given the following address: 00-90-4B-AD-2A-AC What type of address is this?
MAC address
The physical address, also known as MAC address, assigned to a NIC by its manufacturer is 48 bits long. Because of the way this address is divided up into two 24-bit parts, each manufacturer has only 16 million or so unique addresses to use before the manufacturer has to start reusing physical addresses.
Public Class C IP range
192.0.0.0 - 223.255.255.255
What technology takes a voice communication, breaks the data into small packets, and sends the packets from one network segment to another?
packet switching
Packet switching opens up connections only long enough for a small data packet to move from one network segment to another. Data—regardless of type, content, or structure—is broken into small blocks called packets and sent to its destination.
What device has each port as its own collision domain?
switch
A basic switch can be referred to as a multiport bridge because like a bridge, it can separate a network out into multiple collision domains.
Which Ethernet standard was developed to work over fiber?
100Base-FX
100Base-FX is the version of Fast Ethernet that is intended to be used over fiber-optic cable. Introduced at the same time as 100Base-TX, 100Base-FX was part of the same IEEE 802.3y standard.
What connects two network segments together, yet only forwards packets based on MAC addresses from one segment to another segment only when needed?
bridge
Bridges are intended to break up networks into smaller sections; as a result, they are more intelligent than your average hub. Because bridges work on the Data-Link layer of the OSI model, they can read and make sense of MAC addresses. Based on these MAC or Physical addresses, a bridge can determine whether a frame is allowed to pass through to the other side of the bridge.
What is a set of agreed-upon instructions designed to allow computers to communicate to each other across a network connection?
protocol
In computer networking, a protocol is a set of agreed-upon instructions designed to allow computers to communicate to each other across a network connection. Many protocols are used in networking because many different tasks need to be done to allow computers to communicate with each other.
What device converts one type of media to another type?
media converter
Media converters are used to convert one type of media to another type. Such devices are used to convert coaxial to twisted pair or fiber to copper. These types of devices are important for allowing two different types of technologies on the same network.
What type of server acts as an intermediary between a client and other servers?
proxy server
Proxy servers act as intermediaries between a client and other servers. They can fulfill many roles and can be used for many different jobs.
public IP address
can be used on the Internet; must be registered with the Network Information Center
What protocol is used to provide bi-directional interactive command-line access to either a remote or local host?
TELNET
TELNET, short for TErminaL NETwork, is used to provide bi-directional interactive command-line access to either a remote or local host. TELNET was first introduced in 1969 in RFC 15. In 1983, TELNET was extended in RFC 854. TELNET client software can be found for pretty much every computer platform out there.
Public Class B IP range
128.0.0.0 - 191.255.255.255
physical address
MAC address; physical binary address that every network device is given when it is created by its manufacturer
Which wireless mode does not use a central WAP?
ad hoc
An ad hoc wireless network is formed when a wireless network is composed of only independent wireless computers in which each device participates in forwarding wireless packets. An ad hoc wireless network has no central WAP to monitor and control it. In effect, an ad hoc wireless network is the wireless network version of a peer-to-peer network.
EUI
Extended Unique Identifiers; the variations of MAC addresses
In what type of technology is the whole message routed to its destination one hop at a time?
message switching
In message switching, whole messages are routed to their destination one hop at a time. Over time, the message switching idea evolved into what we call packet switching today. With message switching, the entire message is sent out at once.
TCP/IP Protocol Suite
A group of protocols to carry out the functions needed to communicate across a network
What helps protect data that is sent using a wireless network?
encryption
Encryption is where a device such as a computer or a WAP takes the data that it is sending out and first runs an algorithm on it so that it cannot be read without first having the key to read it. This capability increases the security of a network by making it more difficult for an outsider to read what is passing across a network.
Which protocol is used to resolve host names to IP addresses?
DNS
Domain Name System (DNS) makes it possible for us to use the Internet the way we do. DNS is the protocol that converts all those URLs we can easily remember to IP addresses that the Internet can use.
What was the first Ethernet standard used on UTP?
10Base-T
While 10Base-T was not the first XBase-Y standard developed, it was the first twisted-pair XBase-Y standard developed. In 1990 IEEE 802.3i formalized the 10Base-T standard. 10Base-T used CAT 3 UTP and could carry 10 mbps throughput for a distance of 100 meters. 10Base-T was a baseband technology. This standard became known as Twisted-Pair Ethernet.
What protocol do multiple switches on the same network use to ensure that an infinite loop is not created?
STP
Spanning Tree Protocol (STP) is used when multiple switches are implemented on the same network. As a Data-Link layer protocol, STP is used primarily to prevent endless loops from developing on switch-based LANs. The protocol gets its name from a mathematical algorithm called “spanning tree,” which takes a group of points and connects them all together without allowing any loops to form.
Which protocol is used to send messages about the network when a route goes bad?
ICMP
The Internet Control Message Protocol (ICMP) is used mainly by a computer’s operating system to send messages about the network. When an error occurs in the IP packet, a service is unreachable or down, a host is not found, or a router is down, among other situations, an ICMP message is sent.