Cyber Transport Block 4 Flashcards

0
Q

What are the three basic network configurations?

A

Centralized
Peer to peer
Server base

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

A system of independent computers that are interconnected together to share data and resources is called______________.

A

Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which basic network configuration uses “dumb terminals” along with a mainframe computer?

A

Centralized computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

_______ is the standard for optical transport and is capable of transmitting data in excess 1Gbps

A

Sonet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The most popular physical network architecture in use today Is called________.

A

Eithernet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The ________ topology uses cable segments from each computer that are connected to a centralized component such as a hub.

A

Star

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A system of rules and procedures that govern communications between two or more devices on a network is called a ___________.

A

Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The _________ layer in protocol stack ensures that packets are delivered error free and in sequence.

A

Transport

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which transport protocol category establishes, maintains and breaks a connection with the receiving system?

A

Connection -oriented

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The user datagram protocol (UDP) falls under the ________ ________ classification.

A

Connectionless oriented

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What concept of TCP/IP prevent network congestion by ensuring transmitting devices do not overwhelm receiving device with data?

A

Flow control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A______ is the combination of an IP address and a port number.

A

Socket

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

An example of an exterior routing protocol used to link several LAN/MANs together is the _________ _________ __________.

A

Border gateway protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What protocol layer transmits the unstructured, raw bit stream over a physical medium?

A

Physical layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The______ __________ ___________ is the United States representative to the international organization of standardization.

A

American national standards institute (ANSI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the term for a standard development by a company for that company’s products only?

A

Propriety

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The ___________ is a standard that has been officially approved by a recognized standards committee.

A

De Jure standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

List the three specifications for the 802 series of standards.

A
  • type of network interface card
  • components for LAN, MAN, WAN
  • layout of connection pins
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What IEEE 802 category defines standards for broadband wireless?

A

802.16

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What IEEE 802 category defines standards for wireless LAN networks?

A

802.11

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What device is designed to establish, maintain, and terminate a connection and transfer data without regards to the contents?

A

DCE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

A ________ is a device that is added to a network to extend the length of a cable.

A

Repeater

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A ______ is a device that can connect two or more LAN segments together and uses software to preform switching functions.

A

Bridge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which device function as a translator between systems using different protocols on the same network?

A

Gateway

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
A______ creates a virtual private network through a process called "tunneling"
VPN connection
25
What type of clock uses an atomic resonance frequency standard as it's time keeping element?
Atomic clock
26
_________ is the process by which a subject professes an identity and accountability is initiated.
Identification
27
What are the six methods of identification and authentication?
``` Knowledge base (password) Poisson-based (token) Biometric- base( fingerprint) Combining method Ticket authentication Sign on ```
28
Which I&A method that uses a token that the system can recognize by the host is called________.
Possession based
29
_________ methods provide a high level of security because authentication is directly related to a "users behavior or physiological characteristic.
Biometric
30
The use of prescribed safeguard and controls to prevent reconstruction of sensitive or classified information is called__________.
Remanence security
31
Which method of destruction removes classified and sensitive information from media to render the information unrecoverable by technical means?
Sanitizing media
32
_____________ is the DOD's practical strategy for achieving information assurance in today's network-dependent environments.
Defense in depth.
33
What are the three elements that make up the defense in depth strategy?
People Operation Technology
34
What is the second element of the defense in depth strategy that focuses on all the activities required to sustain an organizations security on a day-to-day basis?
Operations
35
_____________ is a network architectural concept design for network security as established by the Air Force
Barrier reef
36
___________ is what protects the bases "network perimeter" in accordance to Air Force security policies
Boundary protection
37
The ______________ router is controlled by the integrated network operations and security center (INOSC) and is the first line of defense for Air Force bases.
Air Force SDP
38
A pice of hardware or software program that examines data passing into your computer or network is called a _____________.
Firewall
39
An__________ system scans, audits and monitors the security infrastructure for signs of unauthorized access or abuse in progress.
Intrusion detection
40
The ability to identify and report vulnerabilities at the host and network level to protect resources directly managed by NCC is called _____________.
Internal control
41
___________ limits access to base systems based on roles or identification that reflects the degree of the users need-to-know and privileges.
Access control
42
What is the procedural method that provides the capability to prioritize and guarantee network access to traffic at various levels of mission criticality?
Access preservation
43
What are the three sanctioned tools that from the foundation of combat information transport system (CITS)?
Internet security system(ISS) Intruder alert Enterprise security manger (ESM)
44
The __________ performs automated, distributed or event-driven probes of geographically dispersed network services and prioritized scan results and remediation information in clear reports that allow users to respond quickly to critical vulnerabilities.
Internet security system
45
___________ is an agent based intrusion detection tool used by INOSC and NCC operations to detect unauthorized activity on selected network hosts, key servers, and critical workstations.
Intruder alert
46
Which Air Force approved tool runs on a management server and has agents installed on hosts to run checks based on vulnerabilities of a particular operating system.
Enterprise security manger
47
The two primary goals of anti-virus software are______ and _______.
Prevention | Detection
48
Automated security incident measurement system (ASIMS) logs all connections and looks for suspicious events that enter a _______ network.
Base
49
A network__________ policy focuses on controlling the network traffic and usage.
Security
50
What are the three types of perimeter networks?
Outmost perimeter Internal perimeter Innermost perimeter
51
The_______ network is the most insecure area of your network infrastructure.
Outermost
52
A ___________ is an access control device, performing perimeter security by determining which packets are allowed or denied into a network.
Firewall
53
What filtering firewall works by examining packets and comparing them to a list of rules based on source of data, intended destination, and the port number the data was sent from?
Packet filtering firewall
54
A____________ firewall examines more than just addresses and port information of the data by looking deeper at the actual application data.
Stateful packet inspection
55
_______ management is the process of detecting, isolating and correcting network problems.
Fault
56
What are the five network management domains as defined by IOS?
``` Fault management Configuration management Account management Performance management Security management ```
57
Periodically the network management software can send out a message to others devices asking them for their status which is called?
Polling
58
The final step in fault management is called ______ the problem
Fix
59
The goal of _______ _________ is to monitor network and system configurations so the effect on network operations of various versions of hardware and software can be tracked and managed.
System configuration
60
Storing data in a database such as relational database management system (RDMS) to allow quick access to the number of routers in a building falls under _______ management.
Configuration
61
"Fine tuning" a network operations capabilities fall under__________.
Performance
62
_________ is combination of protocols, each layer has it own set of rules and defines the rules of each layer in the OSI reference model
Protocol stack
63
What is the management of network usage, costs, charges and access to resources?
Account management
64
The goal of _________ management is to ensure all users have adequate network resources and they are regulated and distributed accordingly.
Account
65
Securing access points to sensitive information on a network is part of _________ management
Security
66
True/false | Security management under FCAPS deals with physical and operating system security.
False
67
As part of security management ________ _______ ________ should be used to provide a basic level of security for accessing a network.
Access control lists (ACL)
68
The final step in security management is _________ the secure access points.
Maintaining
69
_________________ are another name for communication computer facility records.
Central office records
70
______ is a datebase designed to proactively manage small, medium, and large scale enterprise network from local, regional, and central locations simultaneously.
CAIRS OSS
71
Which software was adopted by the Air Force as the standard application to generate and maintain telephone central office records?
Telecommunications management system | TMS
72
What is another name for the action request system?
Remedy action request system
73
A central point to receive help on various computer issue is called a__________.
Help desk
75
The connection protocol that just sends out the packet to the receiving system and does not check to see if it was received?
Connectionless-oriented
76
TCP/IP uses what connectionless transport protocol?
User Datagram Protocol (UDP)
77
What is UDP best used for?
To send small amounts of data for which guaranteed delivery is not required and minor packet loss can be tolerated (VOIP, video-confereincing, streaming audio and video, online games)
78
Does UDP use windowing or acknowledgments?
No
79
What protocols use UDP?
TFTP, SNMP, DHCP, DNS
80
What is the 3rd layer of the OSI model?
Network layer (N3twork)
81
What is the transport layer responsible for?
logical addressing and routing of the data packets from the source to the destination network device
82
Network Layer protocols are divided into what 2 categories?
Routed and Routing
83
What are the 2 things a protocol describes?
The format a message must take, and the way computers must exchange a message within the context of a particular activity
84
What is a Routed Protocol?
A network layer protocol that provides enough information in its header to allow a packet/segment/frame to be forwarded from one host to another based on the addressing through the router
85
Is Internet Protocol (IP) a routed protocol?
Yes
86
Define IP
Connectionless, unreliable, best-effort delivery system protocol
87
What 5 parts make up an IP packet?
Source and destination address, protocol identifier, checksum, time to live (TTL)
88
What is TTL (Time to live)
It tells each router between source and destination how long the packet has to remain on the network, by counting seconds, hops, or both
89
What are the 8 protocols that IP uses as its carrier to pass through a router?
DNS, FTP, HTTP, SMTP, SNMP, ICMP, Telnet, SSH
90
Define DNS
Domain Name System. Translates names of domains and their publicly advertised network nodes on to IP addresses
91
Define FTP
File Transfer Protocol. Download and upload files from the internet
92
Define HTTP
Hyper Text Transfer Protocol. Identifies to the browser what protocol should be used
93
Define SMTP
Simple Mail Transfer Protocol. Email servers use it to send and receive email using TCP
94
Define SNMP
Simple Network Management Protocol. Facilitates the exchange of management information between network devices. Allows network managers to monitor traffic.
95
Define ICMP
Internet Control Message Protocol. Sends and recieves status reports about information being transmitted. Often used to control flow between routers.
96
Define Telnet (aka VTY)
Terminal Emulation. Software to remotely access another device. Often used for remote admin of routers and switches. BANNED by the Air Force on the operational network
97
Define SSH
Secure Shell. Network protocol allowing data to be exchanged using a secure channel between 2 networked devices. Provides encryption for confidentiality and integrity of data on an unsecure network
98
What is a Routing Protocol?
Supports a routed protocol by providing mechanisms for sharing routing information. Routing protocol messages move between the routers to update and maintain tables
99
What are the 2 classes of routing protocols?
Interior Gateway Protocols (IGPs) and Exterior Gateway Protocols (EGPs). Classified by how the operate with regard to an Autonomous System
100
Interior routing protocols operate where?
Inside a local network
101
What are the 5 interior routing protocols?
RIP, IGRP, EIGRP, OSPF, IS-IS
102
Define RIP
Routing Information Protocols. Uses hop count to determine the direction and distance to any link in the internetwork. Selects the path with fewest hops
103
Define IGRP
Interior Gateway Routing Protocol. Selects fastest path based on delay, bandwidth, load, and reliability. Has much higher max hop count than RIP
104
Define EIGRP
Enchanced Interior Gateway Routing Protocol. Uses a 32 bit metric and faster convergence and lower-overhead bandwidth for superior operating efficiency. AKA hybrid.
105
Define OSPF
Open Shortest Path First. Developed for IP networks because RIP was incapable of service large intranets
106
Define IS-IS
Intermediate System-to-Intermediate System. Dynamic link-state routing protocol for the OSI protocol stack
107
What is theone example given of an exterior routing protocol?
Border Gateway Protocol (BGP).
108
Define BGP
Border Gateway Protocol (BGP). Exchanges routing information between autonomous systems while guaranteeing loop-free path selection. Principle routing protocol for ISPs and major companies
109
What is the name of the OSI Layer 2?
Data-Link layer
110
What does the Data Link layer do?
Conditions and controls data frames between the Network Layer and the Physical Layer. Encapsulates the datagram from the Network layer with physical addressing, network toplogy, error notification, sequencing of frames and flow control
111
What is the information called when it is in the Data Link layer?
Frame
112
What is a Cell?
Information unit of fixed size whose source and destination are Data Link layer entities
113
The Data Link layer is broken in to what 2 layers?
Logical Link Control (LLC) and Media Access Control address (MAC Address)
114
Define LLC
Logical Link Control (LLC). Interface between the Network layer and MAC sublayer. Establishes and terminates links, controls, sequences and acknowledges frames
115
Define MAC
Media Access Control. Manages media access, checking frame errors, recognizing frame address
116
What is the name of the OSI Layer 1?
Physical Layer
117
Define the physical layer
Transmits the unstructured raw bistream over a physical medium. Totally hardware oriented, it also defines how the cable attaches to the NIC (shape, # of pins)
118
What are the two Mediac Access Techniques?
Centralized Access Control and Distributed Access Control
119
Define Centralized Access Control
Workstations are not allowed to xmit until they receive a query from the central controller (Method called "Polling")
120
Define Distributed Access Control
Each station shares responsibility for access control, uses Random Access and Deterministic Access (xmit at any time vs. each waiting a turn)
121
Random Access Methods are contention-based. T/F?
TRUE
122
What is the example of Random Access Method given in the book?
Collision Sense Multiple Access with Collision Detection (CSMA/CD)
123
What happens if a collision occurs with CSMA/CD?
Stations use a "back off" period before xmitting again
124
What are the two Deterministic Access Methods given?
Token Passing and Slotted Access
125
Define Token Passing
Most popular, a station must wait for the token to be passed to it to xmit and then passes the token on. Determines WHEN but not AMOUNT of data to be sent
126
Define Slotted Access
Empty dataframe is passed among the stations. Restricts WHEN and AMOUNT of data that can be xmitted
127
The International Oganization for Standardization (ISO) developed what model?
7-layer OSI Reference Model
128
Define ANSI's job
US representative to the ISO. Creates and publishes standards for programming, comm, networking
129
Define the ITU
International Telecommunications Union. UN agency to develop and standardize comm. Has 3 sub-agencies
130
What are the 3 subagencies of the ITU?
ITU-T, ITU-R, ITU-D
131
What standards does IEEE define?
Standards related to networking
132
What does the EIA set standards for?
Consumer products and electronic components (e.g. RS-232 cable)
133
What standards does TIA devlop?
Communication Standards (e.g. EIA/TIA-568-B connector, aka RJ-45)
134
What does the IAB do?
Oversees the development of internet standards and protocols, especially IP addressing
135
What is the old name for NIST?
National Bureau of Standards
136
What is the independent, non-profit standardization org for telecomm industry in Europe with worldwide projection?
ETSI
137
What is the original Military Standard tactical and long haul comm?
Military Standard 188 (MIL-STD-188)
138
Which MIL-STD is closely associated with Cyber Transport?
MIL-STD-188-114
139
Define a Proprietary Standard
Standard developed for a company for that company's products only. They sometimes "lock" a user into a single vendor's product
140
Define a Non-proprietary or Open Standard
Widely accepted standard designed to apply to equipment and software regardless of the manufacturer. Very advantageous when it comes to networking
141
Define De Facto standard
A vendor's standard that is so widely used to becomes a standard WITHOUT any formal path of implementation
142
Define De Jure standard
A standard that has been officially approved by a recognized standards committee. Usually non-proprietary
143
What are the 3 parts to the Hardware Interface?
Physical Interface, Electrical Interface, Functional Interface
144
What Interface defines the number of pins, wires, and how they are arranged and attached?
Physical Interface
145
What Interface defines the magnitude, duration, and sign of electrical signals?
Electrical Interface
146
What Interface defines the interpretation of signals on each wire
Functional Interface
147
IEEE 802 provides specifications on what 3 things?
Type of network interfaces and cards to use, components for the LAN/MAN/WAN and wireless connection, layout of the connector pins
148
What is required when taking a signal from one format to another?
Converter
149
Basically, what does a Transceiver do?
Both transmits and receives analog or digital signals
150
What is a transceiver most commonly used for today?
Applies signals onto the network wire and detects signals passing through the wire
151
Define a NIC
Network Interface Card. Enables a PC to be attached to some sort of network cabling by providing a physical connection point and electrical signal conversion
152
What type of address is associated with every NIC?
A MAC address
153
The MAC Address belongs in what layer?
Data-Link layer
154
What layers does the NIC work in?
Both the physical Itransceiver and connectors )and data-link layers (controller)
155
Define DTE
Data Terminal Equipment. Any digital device at the user end which xmits or rcvs data and uses communication equipment for data transfer
156
Define DCE
Data Communications Equipment. Devices connected to a communication line for the purpose of transferring data from one point to another. They also establish, maintain, and terminate the connection
157
What are 5 examples of DCE given in the book?
Modems (most common), hubs, repeaters, bridges, switches
158
Define a Hub
Layer 1 device, broadcasts any packet entering on one port to all other ports
159
Define a Repeater
Layer 1 device, compensates for loss of a DIGITAL signal. No filtration or processing done to signal; any signal in is repeated out
160
Define a Bridge
Layer 2 device, connects 2 or more LAN segments to effectively make one logical network
161
Define a Switch
Layer 2 device, can interconnect LANs of different bandwidth and provide collision-free, high speed comm between network devices
162
Define a Gateway
Converts protocols, languages, and architecture to allow communications between different systems but do not alter the original data (Think PC to Mac communication). Slow and expensive
163
Define a Router
Layer 3 device, Connect two or more network semgents and support dynamic path assignment
164
The connection protocol that just sends out the packet to the receiving system and does not check to see if it was received?
Connectionless-oriented
165
TCP/IP uses what connectionless transport protocol?
User Datagram Protocol (UDP)
166
What is UDP best used for?
To send small amounts of data for which guaranteed delivery is not required and minor packet loss can be tolerated (VOIP, video-confereincing, streaming audio and video, online games)
167
Does UDP use windowing or acknowledgments?
No
168
What protocols use UDP?
TFTP, SNMP, DHCP, DNS
169
What is the 3rd layer of the OSI model?
Network layer (N3twork)
170
What is the transport layer responsible for?
logical addressing and routing of the data packets from the source to the destination network device
171
Network Layer protocols are divided into what 2 categories?
Routed and Routing
172
What are the 2 things a protocol describes?
The format a message must take, and the way computers must exchange a message within the context of a particular activity
173
What is a Routed Protocol?
A network layer protocol that provides enough information in its header to allow a packet/segment/frame to be forwarded from one host to another based on the addressing through the router
174
Is Internet Protocol (IP) a routed protocol?
Yes
175
Define IP
Connectionless, unreliable, best-effort delivery system protocol
176
What 5 parts make up an IP packet?
Source and destination address, protocol identifier, checksum, time to live (TTL)
177
What is TTL (Time to live)
It tells each router between source and destination how long the packet has to remain on the network, by counting seconds, hops, or both
178
What are the 8 protocols that IP uses as its carrier to pass through a router?
DNS, FTP, HTTP, SMTP, SNMP, ICMP, Telnet, SSH
179
Define DNS
Domain Name System. Translates names of domains and their publicly advertised network nodes on to IP addresses
180
Define FTP
File Transfer Protocol. Download and upload files from the internet
181
Define HTTP
Hyper Text Transfer Protocol. Identifies to the browser what protocol should be used
182
Define SMTP
Simple Mail Transfer Protocol. Email servers use it to send and receive email using TCP
183
Define SNMP
Simple Network Management Protocol. Facilitates the exchange of management information between network devices. Allows network managers to monitor traffic.
184
Define ICMP
Internet Control Message Protocol. Sends and recieves status reports about information being transmitted. Often used to control flow between routers.
185
Define Telnet (aka VTY)
Terminal Emulation. Software to remotely access another device. Often used for remote admin of routers and switches. BANNED by the Air Force on the operational network
186
Define SSH
Secure Shell. Network protocol allowing data to be exchanged using a secure channel between 2 networked devices. Provides encryption for confidentiality and integrity of data on an unsecure network
187
What is a Routing Protocol?
Supports a routed protocol by providing mechanisms for sharing routing information. Routing protocol messages move between the routers to update and maintain tables
188
What are the 2 classes of routing protocols?
Interior Gateway Protocols (IGPs) and Exterior Gateway Protocols (EGPs). Classified by how the operate with regard to an Autonomous System
189
Interior routing protocols operate where?
Inside a local network
190
What are the 5 interior routing protocols?
RIP, IGRP, EIGRP, OSPF, IS-IS
191
Define RIP
Routing Information Protocols. Uses hop count to determine the direction and distance to any link in the internetwork. Selects the path with fewest hops
192
Define IGRP
Interior Gateway Routing Protocol. Selects fastest path based on delay, bandwidth, load, and reliability. Has much higher max hop count than RIP
193
Define EIGRP
Enchanced Interior Gateway Routing Protocol. Uses a 32 bit metric and faster convergence and lower-overhead bandwidth for superior operating efficiency. AKA hybrid.
194
Define OSPF
Open Shortest Path First. Developed for IP networks because RIP was incapable of service large intranets
195
Define IS-IS
Intermediate System-to-Intermediate System. Dynamic link-state routing protocol for the OSI protocol stack
196
What is theone example given of an exterior routing protocol?
Border Gateway Protocol (BGP).
197
Define BGP
Border Gateway Protocol (BGP). Exchanges routing information between autonomous systems while guaranteeing loop-free path selection. Principle routing protocol for ISPs and major companies
198
What is the name of the OSI Layer 2?
Data-Link layer
199
What does the Data Link layer do?
Conditions and controls data frames between the Network Layer and the Physical Layer. Encapsulates the datagram from the Network layer with physical addressing, network toplogy, error notification, sequencing of frames and flow control
200
What is the information called when it is in the Data Link layer?
Frame
201
What is a Cell?
Information unit of fixed size whose source and destination are Data Link layer entities
202
The Data Link layer is broken in to what 2 layers?
Logical Link Control (LLC) and Media Access Control address (MAC Address)
203
Define LLC
Logical Link Control (LLC). Interface between the Network layer and MAC sublayer. Establishes and terminates links, controls, sequences and acknowledges frames
204
Define MAC
Media Access Control. Manages media access, checking frame errors, recognizing frame address
205
What is the name of the OSI Layer 1?
Physical Layer
206
Define the physical layer
Transmits the unstructured raw bistream over a physical medium. Totally hardware oriented, it also defines how the cable attaches to the NIC (shape, # of pins)
207
What are the two Mediac Access Techniques?
Centralized Access Control and Distributed Access Control
208
Define Centralized Access Control
Workstations are not allowed to xmit until they receive a query from the central controller (Method called "Polling")
209
Define Distributed Access Control
Each station shares responsibility for access control, uses Random Access and Deterministic Access (xmit at any time vs. each waiting a turn)
210
Random Access Methods are contention-based. T/F?
TRUE
211
What is the example of Random Access Method given in the book?
Collision Sense Multiple Access with Collision Detection (CSMA/CD)
212
What happens if a collision occurs with CSMA/CD?
Stations use a "back off" period before xmitting again
213
What are the two Deterministic Access Methods given?
Token Passing and Slotted Access
214
Define Token Passing
Most popular, a station must wait for the token to be passed to it to xmit and then passes the token on. Determines WHEN but not AMOUNT of data to be sent
215
Define Slotted Access
Empty dataframe is passed among the stations. Restricts WHEN and AMOUNT of data that can be xmitted
216
The International Oganization for Standardization (ISO) developed what model?
7-layer OSI Reference Model
217
Define ANSI's job
US representative to the ISO. Creates and publishes standards for programming, comm, networking
218
Define the ITU
International Telecommunications Union. UN agency to develop and standardize comm. Has 3 sub-agencies
219
What are the 3 subagencies of the ITU?
ITU-T, ITU-R, ITU-D
220
What standards does IEEE define?
Standards related to networking
221
What does the EIA set standards for?
Consumer products and electronic components (e.g. RS-232 cable)
222
What standards does TIA devlop?
Communication Standards (e.g. EIA/TIA-568-B connector, aka RJ-45)
223
What does the IAB do?
Oversees the development of internet standards and protocols, especially IP addressing
224
What is the old name for NIST?
National Bureau of Standards
225
What is the independent, non-profit standardization org for telecomm industry in Europe with worldwide projection?
ETSI
226
What is the original Military Standard tactical and long haul comm?
Military Standard 188 (MIL-STD-188)
227
Which MIL-STD is closely associated with Cyber Transport?
MIL-STD-188-114
228
Define a Proprietary Standard
Standard developed for a company for that company's products only. They sometimes "lock" a user into a single vendor's product
229
Define a Non-proprietary or Open Standard
Widely accepted standard designed to apply to equipment and software regardless of the manufacturer. Very advantageous when it comes to networking
230
Define De Facto standard
A vendor's standard that is so widely used to becomes a standard WITHOUT any formal path of implementation
231
Define De Jure standard
A standard that has been officially approved by a recognized standards committee. Usually non-proprietary
232
What are the 3 parts to the Hardware Interface?
Physical Interface, Electrical Interface, Functional Interface
233
What Interface defines the number of pins, wires, and how they are arranged and attached?
Physical Interface
234
What Interface defines the magnitude, duration, and sign of electrical signals?
Electrical Interface
235
What Interface defines the interpretation of signals on each wire
Functional Interface
236
IEEE 802 provides specifications on what 3 things?
Type of network interfaces and cards to use, components for the LAN/MAN/WAN and wireless connection, layout of the connector pins
237
What is required when taking a signal from one format to another?
Converter
238
Basically, what does a Transceiver do?
Both transmits and receives analog or digital signals
239
What is a transceiver most commonly used for today?
Applies signals onto the network wire and detects signals passing through the wire
240
Define a NIC
Network Interface Card. Enables a PC to be attached to some sort of network cabling by providing a physical connection point and electrical signal conversion
241
What type of address is associated with every NIC?
A MAC address
242
The MAC Address belongs in what layer?
Data-Link layer
243
What layers does the NIC work in?
Both the physical Itransceiver and connectors )and data-link layers (controller)
244
Define DTE
Data Terminal Equipment. Any digital device at the user end which xmits or rcvs data and uses communication equipment for data transfer
245
Define DCE
Data Communications Equipment. Devices connected to a communication line for the purpose of transferring data from one point to another. They also establish, maintain, and terminate the connection
246
What are 5 examples of DCE given in the book?
Modems (most common), hubs, repeaters, bridges, switches
247
Define a Hub
Layer 1 device, broadcasts any packet entering on one port to all other ports
248
Define a Repeater
Layer 1 device, compensates for loss of a DIGITAL signal. No filtration or processing done to signal; any signal in is repeated out
249
Define a Bridge
Layer 2 device, connects 2 or more LAN segments to effectively make one logical network
250
Define a Switch
Layer 2 device, can interconnect LANs of different bandwidth and provide collision-free, high speed comm between network devices
251
Define a Gateway
Converts protocols, languages, and architecture to allow communications between different systems but do not alter the original data (Think PC to Mac communication). Slow and expensive
252
Define a Router
Layer 3 device, Connect two or more network semgents and support dynamic path assignment