Shared Flashcard Set

Details

302U second 3 weeks
OSI model and Subnetting
84
Computer Networking
Undergraduate 3
06/01/2011

Additional Computer Networking Flashcards

 


 

Cards

Term
How many bits are in an IPv6 address?
Definition
128
Term
Which protocol is responsible for determining the Mac addresses associated with each IP address and keeping a table of the results?
Definition
ARP
Term
How many bits are in an IPv4 address?
Definition
32
Term
How many hosts addresses are available on a Class C network?
Definition
254
Term
How many hosts addresses are available on a Class B network?
Definition
65,534
Term
How many hosts addresses are available on a Class A network?
Definition
16,777,214
Term
What is the binary number system based on?
Definition
Powers of 2
Term
TCP establishes a connection with the destination device using which process?
Definition
Three-way handshake
Term
In which layer does the router operate?
Definition
Internetwork
Term
Which layer does the NIC operate?
Definition
Network Access
Term
Which part of a computer's IP address configuration indicates the portion of the address that specifies the network ID?
Definition
Subnet Mask
Term
What are rules and procedures for communication and behavior or etiquette?
Definition
Protocols
Term
When a set of protocols works cooperatively, this is known as what?
Definition
Protocol Stack or Protocol Suite
Term
The most common protocol suite is what?
Definition
Transmission Control Protocol/Internet Protocol (TCP/IP)
Term
What is the unit of information the Application layer works with called?
Definition
Data
Term
What is the unit of information the Transport layer works with called?
Definition
Segment
Term
What layer do most of the network administrators do most of the network configurations?
Definition
Internetwork Layer
Term
What are the four main tasks that the Internetwork layer is responsible for?
Definition
  • Defines and verifies IP addresses
  • Routes packets through an internetwork
  • Resolves MAC addresses from IP addresses
  • Delivers packets efficiently
Term
What are the two parts that every IP address contains?
Definition
Network ID and Host ID
Term
What are the most commonly used protocols at the Internetwork layer?
Definition
  • IPv4
  • IPv6
  • ICMP
  • ARP
  • IPSec
Term
What are the two protocols of the Transport layer?
Definition
  • Transmission Control Protocol (TCP)
  • User Datagram Protocol (UDP)

 

Term
This protocol is connection oriented and designed for reliable transfer of information in complex internetworks.
Definition
Transmission Control Protocol (TCP)
Term
This protocol is connectionless and designed for efficient communication of generally small amounts of data.
Definition
User Datagram Protocol (UDP)
Term
Both the TCP and UDP protocols perform which tasks mentioned in the book?
Definition
  • Work with segments
  • Provide a means to identify the source and destination applications involved in a communication
  • Protect data in the segment with a checksum
Term
TCP and UDP use what to specify the source and destination Application layer protocols?
Definition
Port Numbers
Term
A role of TCP is to provide what, which prevents a destination from becoming overwhelmed by data, resulting in dropped packets
Definition
Flow Control
Term
What is the role of the Application layer?
Definition
  • Provides network services to user applications that access network resources.

 

Term
Name some of the functions the Application layer provides.
Definition
  • Access by applications to network services
  • Client/server data access
  • Name resolution
  • Dynamic address assignment
  • Authentication/user logon
  • Data formatting and translation
Term
What are some examples of roles of the Network Access layer?
Definition
  • Provides a physical (MAC) address for the network interface.
  • Verifies that incoming frames have the correct destination MAC address.
  • Defines and follows media access rules
  • Receives packets from the Internetwork layer and encapsulates them to create frames.
  • De-encapsulates received frames and sends the resulting packets to the internetwork layer.
Term
Examples of roles of the Internetwork layer?
Definition
  • Is where administrators usually do the most network configuration.
  • This is where the IP protocol operates and is the heart of the TCP/IP protocol suite.
  • Responsible for four main tasks: Defines and verifies IP addresses, Routes packets throught an internetwork, Resolves MAC addresses from IP addresses, and Delivers packets efficiently.
Term
What are the protocols at the Internetwork layer?
Definition
  • IPv4
  • IPv6
  • Address Resolution Protocol (ARP)
  • Internet Control Message Protocol (ICMP)
  • Internet Protocol Security (IPSec)

 

Term
This is used to automatically assign IP addresses as needed.
Definition
Dynamic Host Configuration Protocol (DHCP)
Term
This is a name-to-address resolution protocol that keeps a list of computer names and their IP addresses.
Definition
Domain Name System (DNS)
Term
An IP address is how many bits in length?
Definition
32
Term
An IP address is divided into what two parts?
Definition
Network ID and Host ID
Term
IP addressing is divided into how many classes and what are each called?
Definition
5 classes A-E
Term
What allows an organization to use private IP addresses while connected to the internet?
Definition
Network Address Translation (NAT)
Term
This allows several hundred workstations to access the internet with a single public internet address.
Definition
Port Address Translation (PAT)
Term
What does CIDR stand for?
Definition
Classless Interdomain Routing
Term
This is an addressing scheme that uses all available addresses more efficiently.
Definition
CIDR
Term
What is a subnet mask used for?
Definition
It determines what part of the IP address is the host and what is the network ID.
Term
Name the layers of the OSI model using this pneumonic. Please Do Not Throw Sausage Pizza Away
Definition
  • Physical
  • Data Link
  • Network
  • Transport
  • Session
  • Presentation
  • Application
Term
Using the corresponding pneumonic Don't, Don't, Don't Steal Pennies From Babies, name the PDU's and the corresponding layer that they match.
Definition
  • Data            Application
  • Data            Presentation
  • Data            Session
  • Segments     Transport
  • Network       Packets
  • Frames         Data Link
  • Bits             Physical
Term
What is the PDU and Job of the Application Layer?
Definition
  • PDU is Data
  • Jobs include File Transfer, email, telnet...closest to user
Term
What is the PDU and Job of the Presentation Layer?
Definition
  • PDU is Data
  • Job is Data syntax, jp, txt
Term
What is PDU and Job of the Session Layer?
Definition
  • PDU is Data
  • Job is to Establish, Manage, and End Connection
Term
What is the PDU and Job of the Transport Layer?
Definition
  • PDU is Segments
  • Job is reliability and flow control, windowing.
Term
What is the PDU and Job of the Network Layer?
Definition
  • PDU is Packets
  • Job is Path Determination and Switching, puts header on each segment (IP Addresses)
Term

What is the PDU and Job of the Data Link Layer?

 

Definition
  • PDU is Frames
  • Job is to put a Header and Trailer on each packet.
Term
What is the PDU and Job of the Physical Layer?
Definition
  • PDU is Bits
  • Job is to convert frames to bits. Defines electrical and functional specifications.
Term
What equipment do the layers Application, Presentation, Session and Transport use and what is the purpose of the equipment? What protocols are used for each of these layers?
Definition
  • Equipment used is computers
  • Used to combine networks using different protocols.
  • Words to remember are: Browsers for Application Layer, Common Data Format for Presentation Layer, Dialogues and Conversations for Session Layer and Quality of Service and Reliability for the Transport Layer.
  • Protocols: Redirector, FTP, Telnet, SMTP, SNMP, Netware Core are used at the Application and Presentation Layer.
  • Protocols NFS, SQL, RPC, X-Win for the Session Layer.
  • Protocols TCP and UDP for the Transport Layer.
Term
What equipment does the Network layer use and what is the purpose of the equipment? What Protocols are used?
Definition
  • Equipment used is Router.
  • Purpose of equipment is to Segment Network into Smaller Broadcast Domains.
  • Protocols used are Routable Protocols such as IP, IPX, and Apple Talk.
  • Words to remember are Path Selection, Routing, and Addressing.
Term
What equipment does the Data Link (LLC, MAC) layer use and what is the purpose of the equipment? What Protocols are used?
Definition
  • Equipment used is Bridge (2 ports) or Switch (Multi-port) and NIC
  • The purpose of the equipment is to Segment Network into Smaller Collision Domains.
  • Protocols used are NDIS, ODI, MAC Address, and Ether Talk.
  • Words to Remember are Frames and Media Access Control (MAC)
Term
What equipment does the Physical layer use and what is the purpose of the equipment? What Protocols are used?
Definition
  • Equipment used are Repeater (2 Ports), Hubs (multi-port), Cabling.
  • Equipment purpose is One Collision and One Broadcast Domain.
  • Protocols used are Physical.
  • Words to remember are Signals and Media
Term
Name the TCP/IP model that corresponds to the OSI Model Name for all Layers.
Definition
  • OSI                                 TCP/IP
  • Application                Application
  • Presentation              Application
  • Session                     Application
  • Transport                  Transport
  • Network                    Internet
  • Data Link                  Network Access
  • Physical                    Network Access
Term
What does OSI stand for?
Definition
Open Systems Interconnection Reference Model
Term
What term is used when one computer is communicating on the same layer as another computer.
Definition
Peer Communication
Term
What does PDU stand for?
Definition
Protocol Data Units
Term
What are some possible problems associated with the Applications Layer?
Definition
  • Missing or Misconfigured client software and incompatible or obsolete commands used to communicate between a client and server.
Term
Which two Layers define how computers attach to a specific network media and specify how more than one computer can access the network without causing interference with other computers on the network.
Definition
The two lowest layers Physical and Data Link.
Term
The Data Link Layer is divided into what two sublayers?
Definition
  • Logical Link Control (LLC)
  • Media Access Control (MAC)
Term
Summary of the OSI model layer functions.
Definition
  • Application: Provides access to network resources.
  • Presentation: Handles data formatting and translation.
  • Session: Manages ongoing conversations between two computers.
  • Transport: Breaks long data streams into smaller chunks (segments).
  • Network: Provides best path selection and IP addressing
  • Data Link: Defines how computers access the media.
  • Physical: Converts bits into signals and defines media and connectors.
Term
What are some basic items needed to start writing your security policy?
Definition
  • Privacy policy
  • Acceptable Use Policy
  • Authentication Policy
  • Internet use policy
  • Access policy
  • Auditing Policy
  • Data Protection
Term
Before determining the level of security your network needs, what questions must be asked?
Definition
  • What must be protected
  • From whom should data be protected
  • What costs are associated with security being breached and data being lost or stolen
  • How likely is it that a threat will occur
  • Are the costs to implement security and train personnel to use a secure network outweighed by the need to create an efficient, user friendly environment.
Term
What are the three levels of security?
Definition
  • Highly Restrictive Security Policies
  • Moderately Restrictive Security Policices
  • Open Security Policies

 

Term
What are some ways to secure data on a network?
Definition
  • Authentication and Authorization
  • Encryption
  • Virtual Private Network (VPN)
  • Firewalls
  • Virus and Worm Protection
  • Spyware Protection
  • Wireless Security
Term
How many characters are allowed for a password in Windows 7?
Definition
128
Term
This is known as a network connection that uses the internet to give users or branch offices secure access to a company's network resources.
Definition
Virtual Private Network (VPN)
Term
VPN's use what type of technology to ensure the communication is secure while traveling through the public internet.
Definition
Encryption
Term
What are some of the benefits of using a VPN.
Definition
  • Enable mobile users to connect with corporate networks securely wherever an Internet connection is available.
  • Allow multiple sites to maintain permanent secure connections via the Internet instead of using expensive WAN links.
  • Can reduce costs by using the ISP's support services instead of paying for more expensive WAN support
  • Eliminate the need to support dial-up remote access.
Term
This is a hardware device or software program that inspects packets going into or out of a network or computer, then discards or forwards these packets based on a set of rules.
Definition
Firewall
Term
Firewalls can attempt to determine a packet's context by using a process called what?
Definition
Stateful Packet Inspection (SPI)
Term
What does an Intrusion Detection System (IDS) do?
Definition
  • Usually works with a firewall or router
  • Detects an attempted security breach and notifies the administrator.
  • In some cases IDS takes countermeasures like resetting the connection between source and destination devices.
Term
When a program that spreads by replicating itself into other programs or documents is known as what?
Definition
Virus
Term
This is similar to a virus but does not attach itself to another program.
Definition
Worm
Term
This is a form of a Trojan program that can monitor traffic to and from a computer (capturing passwords and other important information).
Definition
Rootkits
Term
This is a type of malware that monitors or controls part of your computer at the expense of your privacy.
Definition
Spyware
Term
This is known as more of a nuisance than a threat to your computer.
Definition
Spam
Term
What are some of the wireless security options?
Definition
  • Service Set Identifier (SSID)
  • MAC address  filtering
  • Wired Equivalency Protocol (WEP)
  • Wi-Fi Protected Access (WPA)
  • 802.11i (WPA 2)
Term
This scanner is used as an automated method for pinging a range of IP addresses.
Definition
Ping
Term
This scanner determines which TCP and UDP ports are available on a particular computer or device.
Definition
Port
Term
This resource allows you to capture packets and determine which protocol services are running.
Definition
Protocol Analyzers
Term
This is an attackers attempt to tie up network bandwidth or network services.
Definition
Denial-of-Service attack (DoS)
Term
This is a document that describes the rules governing access to a company's information resources.
Definition
Network Security Policy
Supporting users have an ad free experience!