Term
The distance between hosts is in the range of tens of kilometers to a few thousand kilometers |
|
Definition
|
|
Term
The distance between hosts is in the range of one to 20 kilometers |
|
Definition
Metropolitan Area Networks(MAN) |
|
|
Term
The distance between hosts is in the range of a few meters to about one kilometer |
|
Definition
|
|
Term
When two or more computer hardware resources are connected they form a ? |
|
Definition
|
|
Term
In a ___ the are connected to each other via specialized computers called routers or gateways. It is a network of networks. |
|
Definition
|
|
Term
Routers that connect more than two networks are known as ? |
|
Definition
|
|
Term
Name the reasons for using networks of computers |
|
Definition
1. Sharing of computer resources 2. Network is an inexpensive, fast, and reliable communications medium. 3. It is cost efficient. 4. Less performance degradation. |
|
|
Term
The two best known network models are ? |
|
Definition
1. International Standard's Organization's Open System Interconnect Reference Model (ISO's OSI 7-layer reference model 2. TCP/IP 5 layer model |
|
|
Term
Name the 5 layers of the TCP/IP model |
|
Definition
5. Application 4. Transport 3. Network 2. Link 1. Device/Physical |
|
|
Term
Name the 7 layers of the ISO 7-layer Reference Model |
|
Definition
7. Application 6. Presentation 5. Session 4. Transport 3. Network 2. Data link 1. Physical |
|
|
Term
What protocols are associated with the Device/Physical layer |
|
Definition
|
|
Term
What protocols are associated with the Link layer |
|
Definition
ARP, RARP, Ethernet, Token rign, ATM, etc |
|
|
Term
What protocols are associated with the Network layer |
|
Definition
|
|
Term
What protocols are associated with the Transport layer |
|
Definition
|
|
Term
What protocols are associated with the Application layer |
|
Definition
http, telnet, smtp, ftp, traceroute, ping, time, daytime, e-mail, web browser. |
|
|
Term
What is the purpose of the transport layer |
|
Definition
to transport application data from one machine to a remote machine and vice versa |
|
|
Term
the best effort delivery service is offered by what Transport protocol |
|
Definition
|
|
Term
The completely reliable in-sequence delivery is offered by which Transport layer protocol |
|
Definition
Transmission Control Protocol |
|
|
Term
a data packet transported by TCP is called a ? |
|
Definition
|
|
Term
a data packet transported by UDP is called a ? |
|
Definition
|
|
Term
TCP and UDP protocols identify every process running on a host by a 16-bit positive integer called ? |
|
Definition
|
|
Term
The network protocol responsible for routing application data to the destination host is ? |
|
Definition
Internet Protocol (IP) which uses a connectionless routing algorithm |
|
|
Term
Applications that need guaranteed delivery use which network protocol as their transport level protocol |
|
Definition
Transport Control Protocol (TCP) |
|
|
Term
The key to routing is the __ __ of a unique identification to every host on the Internet. |
|
Definition
IP assignment, which IP does by uniquely identifying the network it is on and then uniquely identifying the host on that network. |
|
|
Term
In IPV4, the address is divided into what three fields |
|
Definition
address class which identifies the class of the address, the network ID and host ID. |
|
|
Term
|
Definition
A 0.0.0.0 -127.255.255.255 B 128.0.0.0 -192.255.255.255 C 192.0.0.0 -233.255.255.255 |
|
|
Term
Symbolic names have the format __.__ |
|
Definition
|
|
Term
The symbolic name referring to the site and is assigned by various registrars whose list is maintained by Internet's Network Information Center. |
|
Definition
|
|
Term
It is assigned and controlled by the site that is allocated the domain_name. |
|
Definition
|
|
Term
The right-most string in a domain name is called ? |
|
Definition
|
|
Term
The string to the left of the right-most period identifies an ? |
|
Definition
|
|
Term
Attaching the name of a host to a domain name with a period between them yields the ? |
|
Definition
fully qualified domain name (FQDN) |
|
|
Term
This service implements a distributed database of name-address mappings. |
|
Definition
|
|
Term
Use this command to view the IP address and other information about your host's interface to the network |
|
Definition
|
|
Term
This command allows you to display IP address(es) for a domain name or vice versa |
|
Definition
|
|
Term
This command allows you to interact with DNS servers and display their responses to queries |
|
Definition
dig [options] -p port interact with a name server at 'port' instead of the default port 53 |
|
|
Term
If a server accepts a client request, the client and server are said to be connected through a ? |
|
Definition
|
|
Term
When you want to view the Web page of a site, you give the site's __ to the client process. |
|
Definition
Universal Resource Locator |
|
|
Term
A client software that can invoke client programs for most Internet services by specifying a domain name or IP address, as well as the port number of the host on which a server runs is known as a ? |
|
Definition
fully parameterized client. |
|
|
Term
Display information about the users currently using machines on your network. |
|
Definition
|
|
Term
Command to display the names of the users logged on to the machines on your local network. |
|
Definition
|
|
Term
Command to show status of machines on the local area network |
|
Definition
|
|
Term
Command to test the status of a network of a particular host. |
|
Definition
|
|
Term
Command to display information about the users on a local or remote host |
|
Definition
finger [options] user-list |
|
|
Term
Command to allow you to connect to a remote computer over a network |
|
Definition
telnet [options][host[port]] |
|
|
Term
Command that allows you to log on to a host on your local network. |
|
Definition
|
|
Term
Command to execute a command on remote host on your local network. |
|
Definition
|
|
Term
Command to transfer files from or to a remote host |
|
Definition
|
|
Term
Command to copy files to and from a remote machine on the same LAN, without logging on to the remote host. |
|
Definition
remote copy rcp [options] [host:]sfile [host:]dfile -r recursively copy files at sfile to dfile -p preserve file modify and access times The name of your local host must be in tehe /etc/hosts.equiv file on the remote machine for it to be a trusted host |
|
|
Term
This command allows you to perform the same tasks that you can perform with the rlogin and rsh commands, but in a more secure mannter. |
|
Definition
|
|
Term
Security feature to authenticate a user and its host before allowing the user to log in to the remote machine. |
|
Definition
|
|
Term
This command is the secure version of the rcp command. It means that copying takes place under encrypted sessions after proper authentication of the local host and user. |
|
Definition
|
|
Term
This command is the secure version of the ftp command. It works just like the ftp command, except that stronger authentication takes place before file transfer takes place, and transfer takes place in encrypted session. |
|
Definition
|
|
Term
The command to initiate interactive communcation with 'user' who is logged in on a 'tty' terminal. |
|
Definition
|
|
Term
The command to display the route(the names of the routers in the path) that your e-mail messages, telnet commands, and downloaded files from an ftp site can take from yuour host to the remote and vice versa. |
|
Definition
|
|