Term
| The distance between hosts is in the range of tens of kilometers to a few thousand kilometers |
|
Definition
|
|
Term
| The distance between hosts is in the range of one to 20 kilometers |
|
Definition
| Metropolitan Area Networks(MAN) |
|
|
Term
| The distance between hosts is in the range of a few meters to about one kilometer |
|
Definition
|
|
Term
| When two or more computer hardware resources are connected they form a ? |
|
Definition
|
|
Term
| In a ___ the are connected to each other via specialized computers called routers or gateways. It is a network of networks. |
|
Definition
|
|
Term
| Routers that connect more than two networks are known as ? |
|
Definition
|
|
Term
| Name the reasons for using networks of computers |
|
Definition
1. Sharing of computer resources 2. Network is an inexpensive, fast, and reliable communications medium. 3. It is cost efficient. 4. Less performance degradation. |
|
|
Term
| The two best known network models are ? |
|
Definition
1. International Standard's Organization's Open System Interconnect Reference Model (ISO's OSI 7-layer reference model 2. TCP/IP 5 layer model |
|
|
Term
| Name the 5 layers of the TCP/IP model |
|
Definition
5. Application 4. Transport 3. Network 2. Link 1. Device/Physical |
|
|
Term
| Name the 7 layers of the ISO 7-layer Reference Model |
|
Definition
7. Application 6. Presentation 5. Session 4. Transport 3. Network 2. Data link 1. Physical |
|
|
Term
| What protocols are associated with the Device/Physical layer |
|
Definition
|
|
Term
| What protocols are associated with the Link layer |
|
Definition
| ARP, RARP, Ethernet, Token rign, ATM, etc |
|
|
Term
| What protocols are associated with the Network layer |
|
Definition
|
|
Term
| What protocols are associated with the Transport layer |
|
Definition
|
|
Term
| What protocols are associated with the Application layer |
|
Definition
| http, telnet, smtp, ftp, traceroute, ping, time, daytime, e-mail, web browser. |
|
|
Term
| What is the purpose of the transport layer |
|
Definition
| to transport application data from one machine to a remote machine and vice versa |
|
|
Term
| the best effort delivery service is offered by what Transport protocol |
|
Definition
|
|
Term
| The completely reliable in-sequence delivery is offered by which Transport layer protocol |
|
Definition
| Transmission Control Protocol |
|
|
Term
| a data packet transported by TCP is called a ? |
|
Definition
|
|
Term
| a data packet transported by UDP is called a ? |
|
Definition
|
|
Term
| TCP and UDP protocols identify every process running on a host by a 16-bit positive integer called ? |
|
Definition
|
|
Term
| The network protocol responsible for routing application data to the destination host is ? |
|
Definition
| Internet Protocol (IP) which uses a connectionless routing algorithm |
|
|
Term
| Applications that need guaranteed delivery use which network protocol as their transport level protocol |
|
Definition
| Transport Control Protocol (TCP) |
|
|
Term
| The key to routing is the __ __ of a unique identification to every host on the Internet. |
|
Definition
| IP assignment, which IP does by uniquely identifying the network it is on and then uniquely identifying the host on that network. |
|
|
Term
| In IPV4, the address is divided into what three fields |
|
Definition
| address class which identifies the class of the address, the network ID and host ID. |
|
|
Term
|
Definition
A 0.0.0.0 -127.255.255.255 B 128.0.0.0 -192.255.255.255 C 192.0.0.0 -233.255.255.255 |
|
|
Term
| Symbolic names have the format __.__ |
|
Definition
|
|
Term
| The symbolic name referring to the site and is assigned by various registrars whose list is maintained by Internet's Network Information Center. |
|
Definition
|
|
Term
| It is assigned and controlled by the site that is allocated the domain_name. |
|
Definition
|
|
Term
| The right-most string in a domain name is called ? |
|
Definition
|
|
Term
| The string to the left of the right-most period identifies an ? |
|
Definition
|
|
Term
| Attaching the name of a host to a domain name with a period between them yields the ? |
|
Definition
| fully qualified domain name (FQDN) |
|
|
Term
| This service implements a distributed database of name-address mappings. |
|
Definition
|
|
Term
| Use this command to view the IP address and other information about your host's interface to the network |
|
Definition
|
|
Term
| This command allows you to display IP address(es) for a domain name or vice versa |
|
Definition
|
|
Term
| This command allows you to interact with DNS servers and display their responses to queries |
|
Definition
dig [options] -p port interact with a name server at 'port' instead of the default port 53 |
|
|
Term
| If a server accepts a client request, the client and server are said to be connected through a ? |
|
Definition
|
|
Term
| When you want to view the Web page of a site, you give the site's __ to the client process. |
|
Definition
| Universal Resource Locator |
|
|
Term
| A client software that can invoke client programs for most Internet services by specifying a domain name or IP address, as well as the port number of the host on which a server runs is known as a ? |
|
Definition
| fully parameterized client. |
|
|
Term
| Display information about the users currently using machines on your network. |
|
Definition
|
|
Term
| Command to display the names of the users logged on to the machines on your local network. |
|
Definition
|
|
Term
| Command to show status of machines on the local area network |
|
Definition
|
|
Term
| Command to test the status of a network of a particular host. |
|
Definition
|
|
Term
| Command to display information about the users on a local or remote host |
|
Definition
| finger [options] user-list |
|
|
Term
| Command to allow you to connect to a remote computer over a network |
|
Definition
| telnet [options][host[port]] |
|
|
Term
| Command that allows you to log on to a host on your local network. |
|
Definition
|
|
Term
| Command to execute a command on remote host on your local network. |
|
Definition
|
|
Term
| Command to transfer files from or to a remote host |
|
Definition
|
|
Term
| Command to copy files to and from a remote machine on the same LAN, without logging on to the remote host. |
|
Definition
remote copy rcp [options] [host:]sfile [host:]dfile -r recursively copy files at sfile to dfile -p preserve file modify and access times The name of your local host must be in tehe /etc/hosts.equiv file on the remote machine for it to be a trusted host |
|
|
Term
| This command allows you to perform the same tasks that you can perform with the rlogin and rsh commands, but in a more secure mannter. |
|
Definition
|
|
Term
| Security feature to authenticate a user and its host before allowing the user to log in to the remote machine. |
|
Definition
|
|
Term
| This command is the secure version of the rcp command. It means that copying takes place under encrypted sessions after proper authentication of the local host and user. |
|
Definition
|
|
Term
| This command is the secure version of the ftp command. It works just like the ftp command, except that stronger authentication takes place before file transfer takes place, and transfer takes place in encrypted session. |
|
Definition
|
|
Term
| The command to initiate interactive communcation with 'user' who is logged in on a 'tty' terminal. |
|
Definition
|
|
Term
| The command to display the route(the names of the routers in the path) that your e-mail messages, telnet commands, and downloaded files from an ftp site can take from yuour host to the remote and vice versa. |
|
Definition
|
|