Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
136 Cards in this Set
- Front
- Back
LAN |
Network of users that share computer resources in a limited area |
|
Protocol |
Set of rules established for users to exchange information |
|
Topology |
Architecture of a network |
|
Token Ring Topology |
A network topology configured in a logical ring that complements the token passing protocol |
|
Token Passing |
A technique where an electrical token circulates around a network - control of the token enables the user to gain access to the network |
|
IEEE |
Institute of Electrical and Electronics Engineers, one of the major standards-setting bodies for technological development |
|
Deterministic |
Access to the network is provided at fixed time intervals |
|
Token Ring Hub |
A hub that manages the passing of the token in a |
|
Bus Topology |
The computers share the media (coaxial cable) for data transmission |
|
ThinNet |
A type of coaxial cable used to connect LANs configured with a bus topology |
|
Star Topology |
The most common networking topology in today's LANs where all networking devices connect to a central switch or hub |
|
Hub |
Broadcasts the data it receives to all the devices connected to its ports |
|
Multiport Repeater |
Another name for a hub |
|
Broadcast |
Transmission of data by a hub to all devices connected to its ports |
|
Switch |
Forwards a frame it receives directly out the port associated with its destination address |
|
Ports |
The physical input/output interfaces to the networking hardware |
|
Mesh Topology |
All networking devices are directly connected to each other |
|
OSI |
Open System Interconnect |
|
OSI Model |
The seven layers describing networking functions |
|
Physical Layer |
Provides the electrical and mechanical connection to the network |
|
Data Link Layer |
Handles error recovery, flow control (synchronization), and sequencing |
|
Network Layer |
Accepts outgoing messages and combines messages or segments into packets, adding a header that includes routing information
"Creates the package to be sent" |
|
Transport Layer |
Is concerned with message integrity between source and destination
"Insures integrity during shipment" |
|
Session Layer |
Provides the control functions necessary to establish, manage, and terminate the connections
"connection" |
|
Presentation Layer |
Accepts and structures the message for the application
"receives and prepares the package for the application" |
|
Application layer |
Interacts with application programs that incorporate a communication component such as your Internet browser and email
"uses the received information" |
|
CSMA/CD |
The Ethernet LAN media-access method, Carrier Sense Multiple Access with Collision Detection. Basically, for a computer to "talk" on the Ethernet network, it first "listens" to see whether there is any data traffic (carrier sense). This means that any computer connected to the LAN can be "listening" for data traffic, and any of the computers on the LAN can access the network (multiple access). There is a change that two or more computer will attempt to broadcast a message a the same time: therefore, Ethernet systems must have the capability to detect data collisions (collision detection) |
|
Packet |
Provides grouping of the information for transmission |
|
Network Interface Card (NIC) |
The electronic hardware used to interface the computer to the network |
|
MAC Address |
A unique 6-byte address assigned by the vendor of the network interface card |
|
Organizationally Unique Identifier (OUI) |
The first 3 bytes of the MAC address that identifies the manufacturer of the network hardware |
|
Ethernet, physical, hardware, or adapter address |
Other names for the MAC address |
|
ipconfig/all |
Enables the MAC address information to be displayed from the command prompt |
|
IANA |
The agency that assigns IP addresses to computer networks |
|
IP Address |
Unique 32-bit address that identifies on which network the computer is located as well as differentiates the computer from all other devices on the same network |
|
Network Number |
The portion of the IP address that defines which network the IP packet is originating from or being delivered to |
|
Host Number |
The portion of the IP address that defines teh location of the networking device connected to the network; also called the host address |
|
Host Address |
Same as the host number |
|
ISP |
Internet service provider |
|
Private Addresses |
IP addresses set aside for use in private intranets |
|
Intranet |
An internal network that provides file and resource sharing but is not accessed from the Internet |
|
IP Internetwork |
A network that uses IP addressing for identifying devices connected to the netowrk |
|
TCP/IP |
Transmission Control Protocol/Internet Protocol, the protocol suite used for internetworks such as the Internet |
|
Wired Network |
Uses cables and connectors to establish the network connection |
|
Wireless Network |
Uses radio signals to establish the network connection |
|
Wi-Fi |
the abbreviation for Wi-Fi Alliance, which is an organization that tests and certifies wireless equipment for compliance with the 802.11x standard. Wi-Fi stands for wireless fidelity. |
|
State whether the following network descriptions are describing a MAN, WAN, or LAN:
a. A network of users that share computer resources in a limited area. b. A network of users that share computer resources across a metropolitan area. c. A network that connects local area networks across a large geographic area.
1-1 |
a. LAN
b. MAN
c. WAN |
|
Expand the acronym NIC
1-1 |
Network Interface Card |
|
Expand the acronym MAC
1-1 |
Media Access Control |
|
Expand the acronym LAN
1-1 |
Local Area Network |
|
Expand the acronym WAN
1-1 |
Wide Area Network |
|
Define the term protocol.
1-2 |
A Protocol is a set of rules established for users to exchange information |
|
Define the term topology.
1-2 |
Topology is the architecture of a network |
|
Define the term deterministic.
1-2 |
Deterministic means that access to the network is provided at fixed time intervals |
|
A disadvantage of the Token Ring system is that if an error changes the token pattern, it can cause the token to stop circulating. This can be eliminated by adding which of the following?
a. Router b. Multiport Repeater c. Token Passer d. Token Ring Hub
1-2 |
D. Token Ring Hub |
|
What is the difference between a hub and a switch?
1-2 |
Hub broadcasts and a switch sends data directly to the specified recipient. |
|
What are the seven layer of the OSI model?
1-3 |
Application Presentation Session Transport Network Data Link Physical |
|
Which OSI layer is considered the media access control layer?
1-3 |
Data Link Layer |
|
Which OSI layer combines messages or segments into packets?
1-3 |
Network Layer |
|
What layer does a router work at?
1-3 |
Networking Layer?? |
|
Which OSI layer is responsible for the mechanical connection to the network?
1-3 |
Physical Layer |
|
The OSI layer responsible for data compression and encryption is which layer?
1-3 |
Presentation Layer |
|
TCP functions at which layer of the OSI model?
1-3 |
Transport Layer |
|
HTTP functions at which layer of the OSI model?
1-3 |
Application Layer |
|
IP and IPX are example of protocols that operate in which layer of the OSI model?
1-3 |
Network Layer |
|
The network interface card operates at which layer of the OSI model?
1-3 |
Physical Layer |
|
Why are the layers of the OSI model important to the network administrator?
1-3 |
Knowledge of the layers can help to isolate the network problem. The network administrator uses the OSI model to troubleshoot network problems by verifying functionality of each layer. |
|
Define the acronym CSMA/CD and the protocol that uses CSMA/CD.
1-4 |
Carrier Sense Multiple Access with Collision Detection is the networking protocol used in Ethernet networks. |
|
What information is not included in an Ethernet frame?
a. Frame size b. Source MAC address c. Pad d. Frame check sequence
1-4 |
A. Frame Size |
|
What is the minimum size of the data payload in an Ethernet frame?
1-4 |
No Answer yet. |
|
What is the minimum size and maximum size of an Ethernet frame?
1-4 |
No Answer yet. |
|
Define the acronym OUI. Where is the OUI used?
1-4 |
Organizationally Unique Identifier. |
|
What does the OUI represent?
1-4 |
No Answer yet. |
|
In Windows Vista or Windows XP, how would you find the Ethernet (MAC) address?
1-4 |
No Answer yet. |
|
INTERNET SEARCH: Find the device manufacturer for the following Ethernet devices:
1. 00-C0-4F-49-68-AB 2. 00-0A-27-B7-3E-F8 3. 00-04-76-B6-9D-06 4. 00-00-36-69-42-27
1-4 |
No Answer yet. |
|
State the class of address (A, B or C) for the following IP addresses:
a. 46.39.42.05____ b. 220.244.38.168____ c. 198.1.0.4____ d. 126.87.12.34_____ e. 99.150.200.251_____ f. 128.64.32.16_____
1-4 |
No Answer yet. |
|
Expand the acryonm TCP/IP.
1-4 |
Telecommunications Protocol/Internet Protocol |
|
Cite the three advantages of a wired network.
1-5 |
No Answer yet. |
|
Cite three advantages of a wireless network.
1-5 |
No Answer yet. |
|
What does it mean for a wireless networking device to be WiFi compliant?
1-5 |
No Answer yet. |
|
What are the most common types of equipment that are used to establish a broadband connection to the ISP?
1-5 |
No Answer yet. |
|
Name six issues that should be considered when planning a home network.
1-5 |
No Answer yet. |
|
Why is checking the lights of the networking device that connects to the ISP important?
1-5 |
No Answer yet. |
|
What is the purpose of a range expander?
1-5 |
No Answer yet. |
|
What is a hotspot?
1-5 |
No Answer yet. |
|
List five steps that can be used to protect the home network.
1-5 |
No Answer yet. |
|
You have the choice of selecting a networking device with WEP and another with WPA. Which offers better security, and why?
1-5 |
No Answer yet. |
|
What are the potential problems of using the default factory passwords?
1-5 |
No Answer yet. |
|
What is the purpose of the SSID, and what can the network administrator do to protect the network from hackers who might have learned the SSID?
1-5 |
No Answer yet. |
|
What is the purpose of MAC filtering on a wireless network?
1-5 |
No Answer yet. |
|
How does NAT help protect outsider access to computers in the home network?
1-5 |
No Answer yet. |
|
What is Stateful Packet Inspection?
1-5 |
No Answer yet. |
|
What is a VPN, and how does it protect the data transferred over a wireless network?
1-5 |
No Answer yet. |
|
How is IP addressing typically handled in a home network?
1-5 |
No Answer yet. |
|
What is port address translation (PAT)?
1-5 |
No Answer yet. |
|
A router on a home network is assigned an IP address of 128.123.45.67. A computer in the home network is assigned a private IP address of 192.168.10.62. This computer is assigned the public IP address 128.123.45.67:1922. Which IP address is used for routing data packets on the Internet? Is overloading being used?
1-5 |
No Answer yet. |
|
Which of the following is not a step in building an office LAN?
a. Obtaining proper government permits b. Configuring the network settings c. Connecting the devices together d. Network documentation
1.-6 |
No Answer yet. |
|
What does RJ-45 represent?
a. A 45-pin connector for CAT6 b. An IEEE standard for data speed c. An 8-pin modular connector for twisted-pair Ethernet d. Protocol used to verify a communications link
1-6 |
No Answer yet. |
|
What is an uplink port?
1-6 |
No Answer yet. |
|
What is the maximum speed and length for Category 6 cabling?
1-6 |
No Answer yet. |
|
What do the link lights on a hub represent?
1-6 |
No Answer yet. |
|
What does cross-connected mean?
1-6 |
No Answer yet. |
|
Documentation: Draw a network diagram similar to Fig 1-33 consisting of three computers, a switch, and a printer. Use the MAC addresses given in Table 1-9 on page 55. Assign each network device an IP address from the private address space 192.168.5.x network. You are the network administrator and can choose the host address for each device.
1-6 |
No Answer yet. |
|
Which command would you use to ping 10.3.9.42 indefinitely?
1-7 |
No Answer yet. |
|
Which command would you use to ping 192.168.5.36 20 times with 1024 bytes of data?
1-7 |
No Answer yet. |
|
Expand the acronym TTL.
1-7 |
No Answer yet. |
|
In terms of computer security, a switch offers better security than a hub. Why is this?
a. A hub requires a special pin to activate the connection. b. A hub forwards the data it receives to every device connected to the hub. It is possible for network devices to pick up data intended for a different device. A switch eliminates this by only forwarding data packets to the correct device whenever possible. c. A switch forward teh data it receives to every device connected to the switch. It is possible for network devices to pick up data intended for a different device. A hub eliminates this by only forwarding data packets to the correct device whenever possible. d. The use of the switch guarantees that all devices connected to it will share link integrity pulses. This sharing of the pulses strengthens the security of the connection.
Certification Question (section 1) |
No Answer yet. |
|
What networking protocol does Ethernet use?
a. Ethernet uses a token ring passing scheme. The computer devices must posses the ring to be able to pass a token. b. Ethernet uses Carrier Access - Multiple Sensing - Collision Detection c. Ethernet uses Carrier Sense - Multiple Access - Collision Detection d. Ethernet uses Collision Sense - Carrier Access - Multiple Pairing
Certification Question (section 1) |
No Answer yet. |
|
Network interface card has a MAC address of 00-00-86-15-7A. From this information, specify the OUI.
a. There is not sufficient information to specify the OUI. b. The OUI is 86-15-7A c. The OUI is 86-00-00 d. The OUI is 00-00-86
Certification Question (section 1) |
No Answer yet. |
|
An IP address for a computer is assigned by
a. The Internet Assigned Numbers Authority b. The local network administrator c. The user of the computer d. Internet Address Numbers Authority
Certification Question (section 1) |
No Answer yet. |
|
The pad field in an Ethernet packet
a. Is used to bring the total number of bytes up to 46 if the data file is less than 46 bytes. b. Is used to bring the total number of bytes up to 64 if the data file is less than 64 bytes. c. Is not required with CSMA/CD d. Provides grouping of the information for transmission
Certification Question (section 1) |
No Answer yet. |
|
The IP Address 10.10.20.250 is an example of (select all that apply)
a. Class A address b. Class B address c. A private IP address d. A routable IP address e. A nonroutable Internet IP address
Certification Question (section 1) |
No Answer yet. |
|
An intranet (select all that apply)
a. Uses class E addressing b. Used in high speed (gigabit) Ethernet c. Is an internal network that provides file and resource sharing d. Enables Fast Ethernet connections e. Is not accessed from the Internet
Certification Question (section 1) |
No Answer yet. |
|
Wireless Router |
Device used to interconnect wireless networking devices and to give access to wired devices and establish the broadband Internet connection to the ISP |
|
Range Extender |
Device that relays the wireless signals from an access point or wireless router into areas with a weak signal or no signal at all |
|
Hotspots |
A limited geographic area that provides wireless access for the public |
|
SSID |
Service Set Identifier is the name that is used to identify your wireless network and is used by your access point or wireless router to establish an association |
|
Firewall Protection |
Used to prevent unauthorized access to your network |
|
Stateful Packet Inspection (SPI) |
Type of firewall that inspects incoming data packets to make sure they correspond to an outgoing request |
|
Virtual Private Network (VPN) |
Establishes a secure network connection and is a way to protect your LAN's data from being observed by outsiders |
|
Network Address Translation (NAT) |
Translates the private IP address to a public address for routing over the Internet |
|
Overloading |
Where NAT translates the home network's private IP addresses to a single public IP address |
|
Port Address Translation (PAT) |
A port number is tracked with the client computer's private address when translating to a public address |
|
CAT6 (Category 6) |
Twisted-pair cables capable of carrying up to 1000Mbps (1 gigabit) of data up to a length of 100 meters |
|
RJ-45 |
The 8-pin modular connector used with CAT6/5e/5 cable |
|
Mbps |
Megabits per second |
|
Numerics |
A numerical representation |
|
Ports |
The interface for the networking devices |
|
Crossover |
Transmit and receive signal pairs are crossed to properly align the transmit signal on one device with the receive signal of the other device |
|
Straight-through |
Transmit and receive signal pairs are aligned end-to-end |
|
Uplink Port |
Allows the connection of a hub or switch to another hub or switch without having to use a crossover cable |
|
Link Light |
Indicates that the transmit and receive pairs are properly aligned |
|
Link Integrity Test |
Protocol used to verify that a communication link between two Ethernet devices has been established |
|
Link Pulses |
Sent by each of the connected devices via the twisted-pair cables when data is not being transmitted to indicate that the link is still up |
|
Ping |
Command used to test that a device on the network is reachable |
|
ICMP |
Internet Control Message Protocol |