Term
| The _____ is the last six digits, of a MAC address, identifiying the manufacturers unique serial number for that NIC. |
|
Definition
|
|
Term
| The first job of a NIC is called the _____ which is the aspect of the NIC that talks to the operating system, places data coming from the software into frames and creates the CRC on each frame. |
|
Definition
|
|
Term
| The _____ layer moves packets between computers on different networks. Routers operate at this layer. IP and IPX operate at this layer as well. |
|
Definition
|
|
Term
| The TCP/IP model lumps together the OSI model's Layer 1 and Layer 2 into asingle layer called the Network _____. |
|
Definition
|
|
Term
| The _____ layer provides tools for programs to use to access the network and the lower layers. HTTP, FTP, SMTP, and POP3 are all examples of protocols that operate at this layer. |
|
Definition
|
|
Term
| The _____ layer defines hardware connections and turns binary into physical pulses. Repeaters and hubs operate at this layer. |
|
Definition
|
|
Term
| A NIC may send a _____ onto the network to ask for a MAC Address. |
|
Definition
|
|
Term
| An IP address is known as a _____ to distinguish it from the physical address, the MAC address of the MAC. |
|
Definition
|
|
Term
| A charge on the wire of a NIC is one and a no charge is a _____. |
|
Definition
|
|
Term
| A mathematical method that is used to check for errors in long streams of transmitted data with high accuracy. |
|
Definition
| Cyclic Redundancy Check (CRC) |
|
|
Term
| A ______ is basically a container for a chunk of data moving across a network. |
|
Definition
|
|
Term
| The TCP/IP model is a _____ model. |
|
Definition
|
|
Term
| _____ connectes each of the subnets via IP addresses instead of MAC addresses. |
|
Definition
|
|
Term
| The _____ serves as the interface between the PC and the network. |
|
Definition
|
|
Term
| Each interdependent network in a TCP/IP internetwork. |
|
Definition
|
|
Term
| UDP also gets data from the Applicaton layer programs and adds port and sequencing numbers to create a container called a UDP _____. |
|
Definition
|
|
Term
| Large networks need a _____ addressing method. |
|
Definition
|
|
Term
| The first 24 bits of a MAC address, assigned to the NIC manufacturer by the IEEE. |
|
Definition
| Organizationally Unique Identifier (OUI) |
|
|
Term
| TCP _____ have many other fields that ensure the data gets to its destination in good order. |
|
Definition
|
|
Term
| This cable, known in the networking industry as _____, usually contains four pairs of wires that can transmit and receive data. |
|
Definition
|
|
Term
| The _____ layer manages connections between machines. NetBIOS and Sockets operate at this layer. |
|
Definition
|
|
Term
| Basic component of communication over a network. |
|
Definition
|
|
Term
| The _____ layer, which can also manage data encryption hides the differences among various types of computer systems. |
|
Definition
|
|
Term
| To move past the physical MAC addresses and start using logical addressing requires some special software called a _____. |
|
Definition
|
|
Term
| Type _____ from the command prompt to display the MAC address. |
|
Definition
|
|
Term
| The average frame carries around _____ of data. |
|
Definition
|
|
Term
| The _____ combines features of the OSI Transport and Session layers with a dash of Application layer just for flavor. |
|
Definition
|
|
Term
| The _____ Model and the TCP/IP Model are two methods to conceptualize the many parts of a network. |
|
Definition
|
|
Term
| All operating systems have _____ that programmers can use to make their programs network aware. |
|
Definition
|
|
Term
| The _____ handles this part of networking connecting applications to applications. |
|
Definition
|
|
Term
| The _____ layer breaks data down into manageable chunks. TCP, UDP, SPX, and NetBEUI operate at this layer. |
|
Definition
|
|
Term
| The OSI seven-layer model is the _____ model. |
|
Definition
|
|
Term
| Uses a type of binary math called cyclic redundancy check that the receiving NIC uses to verify that the data arrived intact. |
|
Definition
| Frame Check Sequence (FCS) |
|
|
Term
| Sets of clearly defined rules, regulations, standards, and procedures that enable hardware and software developers to make devices and applications that function properly at a particular level. |
|
Definition
|
|
Term
| The _____ layer identifies devices on the Physical layer. MAC addresses are part of this layer. Bridges operate at this layer. |
|
Definition
|
|
Term
| Sets standards that promote equality among network designers and manufacturers. |
|
Definition
| The International Organization for Standardization (ISO) |
|
|
Term
| The MAC address of FF-FF-FF-FF-FF-FF is the broadcast _____. |
|
Definition
|
|
Term
| Key piece of hardware the network uses is a special box-like device called a _____, often tucked away in a closet or an equipment room. |
|
Definition
|
|
Term
| A _____ address is a special firmware containing a unique identifier with a 48-bit value burned onto a NIC card. |
|
Definition
|
|
Term
| The ______ layer should really be called the "IP packet" layer. |
|
Definition
|
|