Term
What is the last valid host on the subnetwork 172.26.232.0/22 ? |
|
Definition
|
|
Term
What is the first valid host on the subnetwork that the node 172.26.41.179/26 belongs to ? |
|
Definition
|
|
Term
List the three possible physical media that networks can operate on. |
|
Definition
|
|
Term
|
Definition
Segmentation is the process of breaking down large pieces of data in to smaller pieces that can be sent over the network. |
|
|
Term
List one major benefit of segmenting data. |
|
Definition
Multiplexing - multiple chunks of data can be sent simultaneously.
Error Control - breaking down the job allows the process to happen in a more controlled way. |
|
|
Term
Segmentation occurs at which OSI layer |
|
Definition
|
|
Term
The TCP/IP Layer "Application" corresponds to which layer(s) of the OSI model? |
|
Definition
Application, Presentation, and Session. |
|
|
Term
The TCP/IP Layer "Transport" corresponds to which layer(s) of the OSI model? |
|
Definition
|
|
Term
The TCP/IP Layer "Internet" corresponds to which layer(s) of the OSI model? |
|
Definition
|
|
Term
The TCP/IP Layer "Network Access" corresponds to which layer(s) of the OSI model? |
|
Definition
|
|
Term
The OSI layer "Physical" corresponds to which layer of the TCP/IP model? |
|
Definition
|
|
Term
The OSI layer "Data Link" corresponds to which layer of the TCP/IP model? |
|
Definition
|
|
Term
The OSI layer "Network" corresponds to which layer of the TCP/IP model? |
|
Definition
|
|
Term
The OSI layer "Transport" corresponds to which layer of the TCP/IP model? |
|
Definition
|
|
Term
The OSI layer "Session" corresponds to which layer of the TCP/IP model? |
|
Definition
|
|
Term
The OSI layer "Presentation" corresponds to which layer of the TCP/IP model? |
|
Definition
|
|
Term
The OSI layer "Application" corresponds to which layer of the TCP/IP model? |
|
Definition
|
|
Term
The name of the PDU occuring at Layer 4 of the OSI model is _____________ |
|
Definition
The Transport Layer PDU is called a Segment. |
|
|
Term
The name of the PDU occuring at Layer 7 of the OSI model is _____________ |
|
Definition
The Application Layer PDU is simply "data". |
|
|
Term
The name of the PDU occuring at Layer 1 of the OSI model is _____________ |
|
Definition
The Physical Layer PDU is simply "bits". |
|
|
Term
The name of the PDU occuring at Layer 2 of the OSI model is __________. |
|
Definition
The Data Link Layer PDU is called a "frame". |
|
|
Term
The name of the PDU occuring at Layer 3 of the OSI model is _______________. |
|
Definition
The Network Layer PDU is called a packet. |
|
|
Term
The name of the PDU occuring at the Network Layer of the OSI model is called a ___________. |
|
Definition
|
|
Term
The most information added to a PDU at Layer 1 is _____________. |
|
Definition
Timing is added to the bits at the physical layer. |
|
|
Term
The most information added to a PDU at Layer 2 is _____________. |
|
Definition
destination and source physical address (MAC) |
|
|
Term
The most important information added to a PDU at Layer 3 is __________. |
|
Definition
destination and source IP's. |
|
|
Term
The most important information added to the PDU at Layer 4 is ___________. |
|
Definition
|
|
Term
The information added to a PDU at the transport layer enables the receiver of the packet to _____________. |
|
Definition
Deliver the packet to the appropriate application. |
|
|
Term
LAYER, FUNCTION, PORT, TRANSPORT TYPE: Identify the layer and describe the function, transport protocol, and port of the following protocol:
DNS |
|
Definition
Application Layer, UDP, Port 53, Resolves IP from a user-friendly name (example.com) |
|
|
Term
LAYER, FUNCTION, PORT, TRANSPORT TYPE: Identify the layer and describe the function, transport protocol, and port of the following protocol:
SSH |
|
Definition
Application Layer, TCP, Port 22, remote access and secure shell |
|
|
Term
LAYER, FUNCTION, PORT, TRANSPORT TYPE: Identify the layer and describe the function, transport protocol, and port of the following protocol:
HTTP |
|
Definition
Application Layer, TCP, Port 80, internet |
|
|
Term
LAYER, FUNCTION, PORT, TRANSPORT TYPE: Identify the layer and describe the function, transport protocol, and port of the following protocol:
DHCP |
|
Definition
Application Layer, UDP, Port 67, dynamic ip addressing |
|
|
Term
LAYER, FUNCTION, PORT, TRANSPORT TYPE: Identify the layer and describe the function, transport protocol, and port of the following protocol:
SMTP |
|
Definition
Application Layer, TCP, Port 25, mail (sending) |
|
|
Term
LAYER, FUNCTION, PORT, TRANSPORT TYPE: Identify the layer and describe the function, transport protocol, and port of the following protocol:
Telnet |
|
Definition
Application Layer, TCP, Port 23, remote access and shell |
|
|
Term
LAYER, FUNCTION, PORT, TRANSPORT TYPE: Identify the layer and describe the function, transport protocol, and port of the following protocol:
FTP |
|
Definition
Application Layer, TCP, Port 21, file transfer |
|
|
Term
LAYER, FUNCTION, PORT, TRANSPORT TYPE: Identify the layer and describe the function, transport protocol, and port of the following protocol:
SMB |
|
Definition
Application Layer, TCP, Port 445, printer and file access |
|
|
Term
What are the 3 main purposes of the Transport Layer? |
|
Definition
-Segmentation -Multiplexing -Error Checking |
|
|
Term
DEFINE
Connection Oriented |
|
Definition
An exchange occurs after client and server establish a session, and only ends when both agree to end it. |
|
|
Term
|
Definition
In the transport layer, if packets are lost (not acknowledged), transport protocols like TCP ensure servers resend. |
|
|
Term
IDENTIFY
the Layer 4 protocol that allows 'ordered data reconstruction'. |
|
Definition
|
|
Term
IDENTIFY
the Layer 4 protocol that allows flow control. |
|
Definition
|
|
Term
IDENTIFY
the Layer 4 protocol that has low overhead. |
|
Definition
|
|
Term
IDENTIFY
the fastest Layer 4 protocol. |
|
Definition
|
|
Term
IDENTIFY
the most reliable Layer 4 protocol. |
|
Definition
|
|
Term
TRUE/FALSE
Client A receives packets over TCP and the last packet had a sequence number of 3000. Client A will send an acknowledgement with a sequence number of 3000. |
|
Definition
False. "Next Expected" means the acknowledgement will have a seq. of 3001. |
|
|
Term
TRUE/FALSE
The TCP header size is 8 bytes, and the UDP header size is 20 bytes. |
|
Definition
False. TCP = 20 bytes, UDP = 8 bytes. |
|
|
Term
TRUE/FALSE
Well known ports occur between 0 - 1023. |
|
Definition
True. Well known ports 0-1023. Registered ports 1024-49151. |
|
|
Term
DESCRIBE
Client A wishes to establish a TCP session with Server B. List the order in which the syn and acks will occur. |
|
Definition
1. A sends SYN. 2. B receives SYN, sends SYN ACK. 3. A receives SYN ACK, sends ACK. |
|
|
Term
DESCRIBE
Client A wishes to teardown an existing TCP session with Server B. List the order in which the fin and acks will occur. |
|
Definition
1. A sends FIN 2. B receives FIN and sends ACK. 3. B sends FIN. 4. A receives FIN and sends ACK. |
|
|
Term
|
Definition
TCP windowing employs the windowsize field and sequence # field to tell the client how often to send an acknowledgement. |
|
|
Term
DESCRIBE
Server B has determined congestion is causing packet loss in its TCP connection with Client A. How can Server B use TCP windowing to reduce packet loss? |
|
Definition
Server B can reduce window size, forcing Client A to send more acknowledgements more frequently, ensuring packet delivery. |
|
|
Term
TRUE/FALSE
In a TCP session, Client A sends Server B an acknowledgement with a window size of 0. Client A is telling Server B that the transmission is complete. |
|
Definition
False. A TCP acknowledgement with a window size of 0 is a CHOKE PACKET, which means "I cant handle this right now, stop sending packets." |
|
|
Term
TRUE/FALSE
The dominant Layer 3 protocol in use all over the world is IPV6. |
|
Definition
|
|
Term
CALCULATE
What is the last valid host on the subnetwork 192.168.102.200/29? |
|
Definition
|
|
Term
CALCULATE
Which subnet does host 172.18.134.229 255.255.255.192 belong to? |
|
Definition
|
|
Term
CALCULATE
What valid host range is the IP address 172.23.165.30 255.255.248.0 a part of? |
|
Definition
172.23.160.1 through to 172.23.167.254 |
|
|
Term
CALCULATE
What valid host range is the IP address 172.31.32.98/28 a part of? |
|
Definition
172.31.32.97 through to 172.31.32.110 |
|
|
Term
TRUE/FALSE
Layer 3 is tasked with providing an address scheme to identify hosts and networks. |
|
Definition
|
|
Term
TRUE/FALSE
The Network layer is tasked with encapsulating a layer 5 segment in to a packet and include src/dst addresses |
|
Definition
False. The network layer takes a layer 4 segment. |
|
|
Term
TRUE/FALSE
The Layer 3 header is read at every network hop. |
|
Definition
True. It is read to determine if the IP is in the routing table. |
|
|
Term
TRUE/FALSE
The Layer 3 header is removed and a new one is put on at every router (every network hop). |
|
Definition
False. The Network header is never removed, it is just read and modified (TTL decremented). |
|
|
Term
TRUE/FALSE
IPv4 is connection-oriented |
|
Definition
False
IPv4 is connectionless and unreliable. |
|
|
Term
DESCRIBE
Describe the encapsulation process that data generated at the application layer experiences as it descends through the layers of the OSI model. |
|
Definition
1. Data handed to Layer 4, where ports are added. It is now a segment. 2. Segment handed to Layer 3, where IP is added. It becomes a packet. 3. The packet is handed to Layer 2, where MACs are added. It is now a frame. 4. Bits/// |
|
|
Term
TRUE/FALSE
IPv4 is a "best effort" protocol. |
|
Definition
True. No guaranteed delivery. |
|
|
Term
IDENTIFY
The amount of bytes in the Layer 3 header. |
|
Definition
Network layer header is 24 bits. |
|
|
Term
IDENTIFY
At least 3 fields in the Layer 3 header. |
|
Definition
Options: version,IHL, Type, Packet, Length, ID, flag, fragment offset, TTL, protocol, header checksum, src addr., dst addr., options, padding. |
|
|
Term
TRUE/FALSE
A router is a Layer 2 device. |
|
Definition
False. A router is a layer 3 device. |
|
|
Term
TRUE/FALSE
A router is a network layer device. |
|
Definition
|
|
Term
TRUE/FALSE
A router is the delimiter of a broadcast domain. |
|
Definition
|
|
Term
ANALYZE
A network tech seeks to limit the amount of broadcasts taking up bandwidth on his network. What device/activity should he/she do to reduce these? |
|
Definition
|
|
Term
TRUE/FALSE
A switch is the delimiter for a broadcast domain. |
|
Definition
False. Switches delimit collision domains. |
|
|
Term
IDENTIFY
The device that delimits a hop. |
|
Definition
|
|
Term
ANALYZE
A network tech is entering static IPs on to hosts in a network. He/she enters the broadcast address of the network as the default gateway. Was this appropriate? Would it work? |
|
Definition
No. The broadcast address and the default gateway are not the same. |
|
|
Term
CALCULATE
What valid host range is the IP address 192.168.75.166/26 a part of? |
|
Definition
192.168.75.129 through to 192.168.75.190 |
|
|
Term
CALCULATE
You are designing a subnet mask for the 192.168.177.0 network. You want 26 subnets with up to 5 hosts on each subnet. What subnet mask should you use? |
|
Definition
|
|
Term
ANALYZE
A router determines a received packet is to be delivered to a device inside its broadcast domain. What will the router do to the Layer 3 header of this packet? |
|
Definition
The message is decapsulated and sent to layer 2 for MAC-based delivery. |
|
|
Term
ANALYZE
A router determines a received packet is to be delivered to a directly connected device. What will the router do to the Layer 3 header of this packet? |
|
Definition
The message is decapsulated and sent to the appropriate interface for MAC-based delivery. |
|
|
Term
TRUE/FALSE
Every router on a packet's route will decapsulate the packet's layer 3 header. |
|
Definition
False. The layer 3 header (IP) is only removed once it reaches the gateway of the destination network. |
|
|
Term
IDENTIFY
The action a router will take if a PDU contains an IP that is a) not in its routing table AND b) no next hop exists AND c) a default route exists |
|
Definition
Packet will be sent to the default route |
|
|
Term
IDENTIFY
The action a router will take if a PDU contains an IP that is a) not in its routing table AND b) no next hop exists AND c) a default route does not exist |
|
Definition
|
|
Term
IDENTIFY
The first step a router that is engaged in packet forwarding must take when a packet arrives. |
|
Definition
Packets arrive at routers encapsulated in layer 2 frames. This frame must be taken off. |
|
|
Term
IDENTIFY
The first THREE steps taken by a router that is engaged in packet forwarding when a packet arrives. |
|
Definition
1. Take off Layer 2 frame 2. Check IP 3. Check the routing table |
|
|
Term
IDENTIFY
The three possible outcomes a packet faces when it arrives at a router engaged in packet forwarding. |
|
Definition
1. If packet is to be forwarded to a routing table entry it is wrapped in a layer 2 frame and sent to next hop
2. If no next hop exists in routing table the packet will be sent to default route after encapsulating the packet in a layer 2 frame.
3. Drop. |
|
|
Term
TRUE/FALSE
Switches decrement a packet's TTL |
|
Definition
|
|
Term
TRUE/FALSE
Switches are a layer 3 device. |
|
Definition
False. Switches are layer 2. |
|
|
Term
DESCRIBE
Given an IP address in binary, what steps does one take to calculate the network address? |
|
Definition
|
|
Term
DESCRIBE
Given a host address in binary and a subnet mask, what steps does one take to calculate the first usable host? |
|
Definition
Set all host bits to 0, first host = network address + 1 |
|
|
Term
DESCRIBE
Given a host address in binary and a subnet mask, what steps does one take to calculate the last usable host? |
|
Definition
Set all host bits to 1, last usable host = broadcast address -1 |
|
|
Term
DESCRIBE
Given a host address in binary and a subnet mask, what steps does oe take to calculate the broadcast address? |
|
Definition
|
|
Term
IDENTIFY
The formula that describes the possible number of hosts in a network given
h
where h = the number of host bits. |
|
Definition
|
|
Term
IDENTIFY
The number of possible subnets when given
b
where b = borrowed bits. |
|
Definition
|
|
Term
CALCULATE
The subnet mask, in dotted decimal, for a /28 network? |
|
Definition
|
|
Term
CALCULATE
The subnet mask, in dotted decimal, for a /30 network. |
|
Definition
|
|
Term
CALCULATE
You are designing a subnet mask for the 172.18.0.0 network. You want 110 subnets with up to 300 hosts on each subnet. What subnet mask should you use? |
|
Definition
|
|
Term
CALCULATE
What valid host range is the IP address 172.18.168.68/23 a part of? |
|
Definition
172.18.168.1 through to 172.18.169.254 |
|
|
Term
IDENTIFY
What three layers of the OSI model make up the Application layer for the TCP/IP model? |
|
Definition
presentation, session, application |
|
|
Term
IDENTIFY
What protocol is used to transfer web pages from server to client? |
|
Definition
|
|
Term
IDENTIFY
What application protocol is used to *send* email? |
|
Definition
|
|
Term
IDENTIFY FROM
(a) DHCP (b) DNS (c) ARP (d) ICMP
Which is not triggered by the "ping" command? |
|
Definition
|
|
Term
TRUE/FALSE
A router can have a default route. |
|
Definition
|
|
Term
IDENTIFY
When does a router use a default route? |
|
Definition
For packets of unknown networks (not in routing table) |
|
|
Term
IDENTIFY
What entry will be added to a client’s ARP cache following a ping of a remote host |
|
Definition
The client’s gateway MAC address |
|
|
Term
IDENTIFY
What port does HTTP use on the client side? |
|
Definition
any port from 1024 – 65534 |
|
|
Term
IDENTIFY
What port does DNS use on the server side? |
|
Definition
|
|
Term
|
Definition
NAT allows hosts on a private network to borrow a public address for communication with outside networks. A neighborhood uses their postman to communicate with people in other neighborhoods/cities. |
|
|
Term
IDENTIFY
The most widely used Layer 2 standard. |
|
Definition
|
|
Term
IDENTIFY
The primary function of layer 2. |
|
Definition
Delivery of messages connected to the same network segment. |
|
|
Term
TRUE/FALSE
A hub is a layer 2 device. |
|
Definition
False. A hub is a layer 1 device. |
|
|
Term
IDENTIFY
The two key services of the data link layer. |
|
Definition
1. Links the upper OSI layers to the physical media.
2. Controls the hardware at the physical layer, determines when a device can transmit on physical media. |
|
|
Term
IDENTIFY
The to sublayers occuring within the data link layer. |
|
Definition
1. Logical link control 2. Media access control |
|
|
Term
IDENTIFY
The function of the logical link control sublayer of the data link layer. |
|
Definition
Sets up the frame header and trailer to encapsulate the package. Identified the network layer protocol. |
|
|
Term
IDENTIFY
The function of the Media Access Control sublayer of the Data Link layer. |
|
Definition
Adds layer 2 addresses, marks frame start and end. |
|
|
Term
DEFINE
As related to Layer 2, a logical topology. |
|
Definition
A logical topology is a conceptual representation of how nodes access a common connection. [point to point, multiaccess, token ring] |
|
|
Term
IDENTIFY
Three possible logical topologies as related to the data link layer. |
|
Definition
Point to point, multiaccess, token ring |
|
|
Term
ANALYZE
Some Layer 2 topologies attempt to limit media access to "one at a time". Why would a network designer be interested in controlling media access at layer 2? |
|
Definition
|
|
Term
IDENTIFY
A media access model at layer 2 can take one of two forms. What are these forms? |
|
Definition
1. Contention-based (collisions exist) 2. Controlled (high overhead, no coll.) |
|
|
Term
DESCRIBE
Characteristics and advantages of a controlled media access model in Layer 2. |
|
Definition
Characteristics: One speaks at a time, devices wishing to transmit must wait their turn, predictable, deterministic
Advantages: No collisions, predictable, deterministic |
|
|
Term
DESCRIBE
Characteristics and advantages of a contention-based media access model in Layer 2. |
|
Definition
Characteristics: collisions exist, collisions must be handled, low overhead, speedier
Advantages: low overhead, speedy. |
|
|
Term
IDENTIFY
The layer 2 collision-resolution method used on ethernet media. |
|
Definition
CSMA-CD
Carrier sense multiple access with collision detection |
|
|
Term
IDENTIFY
The layer 2 collision-resolution method used on wireless media. |
|
Definition
CSMA-CD
Carrier sense multiple access with collision avoidance |
|
|
Term
TRUE/FALSE
In a full duplex point-to-point access model (layer 2) only one node may transmit at a time. |
|
Definition
False. Full duplex = both can send and receive at the same time. |
|
|
Term
TRUE/FALSE
In a half duplex point-to-point access model (layer 2) data can only travel in one direction at a time. |
|
Definition
|
|
Term
IDENTIFY
The 3 general overall elements that are inside of the layer 2 PDU. |
|
Definition
1. Header 2. Data 3. Trailer |
|
|
Term
DESCRIBE
The differences (Layer 2) between an Ethernet frame and a PPP frame. |
|
Definition
PPP is like UDP --- low overhead, low control.
Ethernet is like TCP - more control, more overhead. |
|
|
Term
TRUE/FALSE
The layer 2 protocol 802.11 requires every sent PDU to be acknowledged by the receiver. |
|
Definition
|
|
Term
TRUE/FALSE
A switch is the delimiter for a collision domain. |
|
Definition
|
|
Term
DESCRIBE
How a collision is handled in CSMA/CA. |
|
Definition
|
|
Term
DESCRIBE
How a collision is handled in CSMA/CD. |
|
Definition
|
|
Term
CALCULATE
Which subnet does host 172.19.42.137/28 belong to? |
|
Definition
|
|
Term
CALCULATE
What is the first valid host on the subnetwork that the node 172.20.85.56/24 belongs to? |
|
Definition
|
|
Term
DESCRIBE
A new computer with an empty ARP table wishes to send a packet to a computer inside its network. What steps will the computer take to accomplish this? |
|
Definition
1. Check ARP table, find empty 2. Broadcast request for mac 3. Receive response from target (mac) 4. Store mac and transmit message |
|
|