Term
Dedicated and converged networks |
|
Definition
Dedicated networks for voice, video and computer data communications required a different type of device in order to access the network. Telephones, televisions, and computers used specific technologies and different dedicated network structures, to communicate. Converged networks are capable of delivering voice, video and data services over the same communication channel or network structure. |
|
|
Term
Why is the internet considered a "network of networks"? |
|
Definition
Because it is literally made up of thousands of networks that are connected to each other |
|
|
Term
|
Definition
Hosts send and receive user traffic. A host is a generic name for most end-user devices. A host has an IP network address. Examples of hosts are personal computers and network attached printers. |
|
|
Term
|
Definition
Shared peripheral devices do not communicate directly on the network. Insteead, peripherals rely on their connected host to perform all network operations. Examples of shared peripherals are cameras, scanners, and locally attached printers. |
|
|
Term
|
Definition
Networking devices connect other devices, mainly hosts. These devices move and control network traffic. Examples of network evices include hubs, switches, and routers. |
|
|
Term
|
Definition
Network media provides connections between hosts and network devices. Network media can be wired, such as copper and fiber optic or use wireless technologies. |
|
|
Term
|
Definition
The simplest peer-to-peer network consists of two directly connected computers using a wired or wireless connection. |
|
|
Term
Advantages of peer-to-peer networks |
|
Definition
Easy to set up Less complexity Lower cost Can be used for simple tasks such as transferring files and sharing printers |
|
|
Term
Disadvantages of Peer-to-peer networks |
|
Definition
No centralized administration Not as secure Not scalable All devices may act as both clients and servers which can slow their performance |
|
|
Term
|
Definition
A physical topology map is created to record where each host is located and how it is connected to the network. The physical topology map also shows where the wiring is installed and the locations of the networking devices that connect the hosts. |
|
|
Term
|
Definition
A logical topology map groups hosts by how they use the network, no matter where they are physically located. Host names, addresses, group information and applications can be recorded on the logical topology map. |
|
|
Term
|
Definition
The process of placing one message format (the letter) inside another message format (the envelope) is called encapsulation. |
|
|
Term
|
Definition
Access Method determines when someone is able to send a message. These timing rules are based on the environment. For example, you may be able to speak whenever you have something to say. In this environment, a person must wait until no one else is talking before speaking. If two people talk at the same time, a collision of information occurs and it is necessary for the two to back off and start again. These rules ensure communication is successful. Likewise, it is necessary for computers to define an access method. Hosts on a network need an access method to know when to begin sending messages and how to respond when errors occur. |
|
|
Term
|
Definition
Timing also effects how much information can be sent and the speed that it can be delivered. If one person speaks too quickly, it is difficult for the other person to hear and understand the message. The receiving person must ask the sender to slow down. In network communication, a sending host can transmit messages at a faster rate than the destination host can receive and process. Source and destination hosts use flow control to negotiate correct timing for successful communication. |
|
|
Term
|
Definition
If a person asks a question and does not hear a response within an acceptable amount of time, the person assumes that no answer is coming and reacts accordingly. The person may repeat the question, or may go on with the conversation. Hosts on the network also have rules that specify how long to wait for responses and what action to take if a response timeout occurs. |
|
|
Term
What are the three rules of engagement with regard to timing? |
|
Definition
Access Method, Flow control, and Response Timeout. |
|
|
Term
What are the types of network communication |
|
Definition
Unicast, Multicast, and Broadcast |
|
|
Term
|
Definition
A one-to-one message pattern is referred to as a unicast, meaning that there is only a single destination for the message. |
|
|
Term
|
Definition
When a host needs to send messages using a one-to-many pattern, it is referred to as a multicast. Multicasting is the delivery of the same message to a group of host destinations simultaneously. |
|
|
Term
|
Definition
If all hosts on the network need to receive the message at the same time, a broadcast is used. Broadcasting represents a one-to-all message pattern. |
|
|
Term
Explain what protocols allow networks to accomplish |
|
Definition
Protocols are especially important on a local network. In a wired environment, a local network is defined as an area where all hosts must "speak the same language" or in computer terms "share a common protocol". the most common set of protocols used on local wired networks is Ethernet |
|
|
Term
WQhat issues do networking protocols help to manage? |
|
Definition
Message format Message size Timing Encapsulation Encoding Standard message pattern |
|
|
Term
Standards are beneficial to networking in many ways. These include... |
|
Definition
Facilitate design Simplify product development Promote competition Provide consistent interconnections Facilitate training Provide more vendor choices for customers |
|
|
Term
|
Definition
100 - is the speed in Mbps BASE - stands for baseband transmission T - stands for the type of cable, in this case, twisted pair. |
|
|
Term
Explain in detail how Ethernet networks use MAC addresses when communicating and sending frames |
|
Definition
When a host on an Ethernet network communicates, it sends frames containing its own MAC address as the source and the MAC address of the intended recipient. Any hosts that receive the frame will decode the frame and read the destination MAC address. If the destination MAC address matches the address configured on the NIC, it will process the message and store it for the host application to use. If the destination MAC address does not match the host MAC address, the NIC will ignore the message. |
|
|
Term
Which specific address do NICs use when deciding whether or not to accept a frame? |
|
Definition
|
|
Term
|
Definition
Defined pattern of alternating 1 and 0 bits used to synchronize timing |
|
|
Term
|
Definition
Start of Frame Delimiter. Marks the end of the timing information and start of the frame. |
|
|
Term
|
Definition
The Destination MAC Address field contains the destination MAC address (receiver). The destination MAC address can be unicast (a specific host), multicast (a group of hosts), or broadcast (all hosts on the local network). |
|
|
Term
|
Definition
The Source MAC Address field contains the source MAC address (sender). This is the unicast address of the Ethernet node that transmitted the frame. |
|
|
Term
|
Definition
The Length/Type field supports two different uses. A type value indicates which protocol will receive the data. The length indicates the number of bytes of data that follows this field. |
|
|
Term
|
Definition
The Data field contains the packet of information being sent. Ethernet requires each frame to be between 64 and 1518 bytes. |
|
|
Term
|
Definition
The FCS contains a 4-byte value that is created by the device that sends data and is recalculated by the destination device to check for damaged frames. |
|
|
Term
What does the format for Ethernet frames specify? |
|
Definition
the location of the destination and source MAC addresses Preamble for sequencing and timing Start of frame delimiter Length and type of frame Frame check sequence to detect transmission errors |
|
|
Term
What is the hierarchical design used to do? |
|
Definition
It is used to group devices into multiple networks that are organized in a layered approach. It consists of smaller, more manageable groups that allow local traffic to remain local. Only traffic that is destined for other networks is moved to a higher layer. |
|
|
Term
What are the three basic layers of the hierarchical design models? |
|
Definition
Access layer, Distribution layer, and Core layer. |
|
|
Term
|
Definition
The access layer provides a connection point for end user devices to the network and allows multiple hosts to connect to other hosts through a network device, usually a hub or switch. Typically, all devices within a single access layer will have the same network portion of the IP address. If a message is destined for a local host, based on the network portion of the IP address, the message remains local. If it is destined for a different network, it is passed to the Distribution Layer. Hubs and switches provide the connection to the distribution layer devices, usually a router. |
|
|
Term
|
Definition
The distribution layer provides a connection point for separate networks and controls the flow of information between the networks. It typically contains more powerful switches than the access layer as well as routers for routing between networks. Distribution layer devices control the type and amount of traffic that flows from the access layer to the core layer. |
|
|
Term
|
Definition
The Core Layer is a high-speed backbone layer with redundant connections. It is responsible for transporting large amounts of data between multiple end networks. Core layer devices typically include very powerful, high speed switches and routers. The main goal of the core layer is to transport data quickly. Hubs, switches, and routers are discussed in more detail in the next two sections. |
|
|
Term
The differences between physical and logical addresses. |
|
Definition
On a host, the MAC address does not change, it is physically assigned to the host NIC and is known as the physical address. The physical address remains the same regardless of where the host is placed on the network. The IP address is similar to the address of a person. It is known as a logical address because it is assigned logically based on where the host is located. The IP address, or network address, is assigned to each host by a network administrator based on the local network. |
|
|
Term
The two parts of an IP address |
|
Definition
IP addresses contain two parts. One part identifies the local network. The network portion of the IP address will be the same for all hosts connected to the same local network. The second part of the IP address identifies the individual host. Within the same local network, the host portion of the IP address is unique to each host. |
|
|
Term
Within an Ethernet network, each host is able to connect directly to an access layer networking device using a point-to-point cable. What are these networking devices that each host connects to? |
|
Definition
|
|
Term
When a hub recieves a message from a host for another host what does it do with it? |
|
Definition
Hubs cannot determine which host should get any particular message. A hub simply accepts electronic signals from one port and regenerates the same message out all of the other ports. |
|
|
Term
What happens after a collision occurs in a collision domain? |
|
Definition
A collision causes the messages to become garbled and unreadable by the hosts. A hub does not decode the messages, therefore it does not detect that the message is garbled and repeats it out all the ports. The area of the network where a host can receive a garbled message resulting from a collision is known as a collision domain. Inside a collision domain when a host receives a garbled message, it detects that a collision has occured. Each sending host waits a short amount of time and then attempts to send, or retransmit the message again. As the number of hosts connected to the hub increases, so does the chance of collisions. More collisions cause more retransmissions. |
|
|
Term
Why do you need to limit the size of collision domains? |
|
Definition
More collisions cause more retransmissions. Excessive retransmissions can clog up the network and slow down network traffic. For this reason, it is necessary to limit the size of a collision domain. |
|
|
Term
What advantage does a switch have over a hub when forwarding messages through the network? |
|
Definition
unlike a hub, a switch can forward a message to a specific host. |
|
|
Term
What is a MAC address table? |
|
Definition
A table on the switch, called a MAC address table, contains a list of all the active ports and the host MAC addresses that are attached to them. |
|
|
Term
What happens when the switch receives a frame addressed to a new host that is not yet in the MAC address table? |
|
Definition
If the destination MAC address is not in the table, the switch does not have the necessary information to create an individual circuit. When the switch cannot determine where the destination host is located, is uses a process called flooding to forward the message out to all attached hosts. Each host compares the destination MAC address, but only the host with the correct destination address processes the message and responds to the sender. |
|
|
Term
How does the MAC address of a new host get into the MAC address table? |
|
Definition
A switch builds the MAC address table by examining the source MAC address of each frame that is sent between hosts. When a new host sends a message or responds to a flooded message, the switch immediately learns its MAC address and the port to which it is connected. The table is dynamically updated each time a new source MAC address is read by the switch. In this way, a switch quickly learns the MAC addresses of all attached hosts. |
|
|
Term
What is a network broadcast? |
|
Definition
Within the local network it is often necessary for one host to be able to send messages to all the other hosts at the same time. This can be done using a message known as a broadcast. Broadcasts are useful when a host needs to find information without knowing exactly what other host can supply it or when a host wants to provide information to all other hosts in the same network in a timely manner |
|
|
Term
How is a broadcast MAC address represented? |
|
Definition
MAC addresses are usually represented in a hexadecimal notation. The broadcast MAC address in a hexadecimal notation is FFFF.FFFF.FFFF |
|
|
Term
Explain the problem encountered with too many computers in a broadcast domain? |
|
Definition
If too many hosts are connected to the same broadcast domain, broadcast traffic can become excessive. The number of hosts and the amount of network traffic that can be supported on the local network is limited by the capabilities of the hubs and switches used to connect them. As the network grows and more hosts are added, network traffic, including broadcast traffic, increases. It is often necessary to divide one local network, or broadcast domain, into multiple networks to improve performance. |
|
|
Term
Explain the three step proccess that Address Resolution Protocol (ARP) uses to discover and store MAC addresses |
|
Definition
1. The sending host creates and spends a frame addressed to a broadcast MAC address. Contained in the frame is a message with the IP address of the intended destination host. 2. Each host on the network receives the broadcast frame and compares the IP address inside the message with its configured IP address. The host with the matching IP address sends its MAC address back to the original sending host. 3. The sending host recieves the message and stores the MAC address and IP address information in a table called an ARP table. |
|
|
Term
In very general terms, what is the function of a router? |
|
Definition
A router is a networking device that connects a local network to other local networks. |
|
|
Term
How do routers and switches differ? |
|
Definition
Switches only decode the frame containing the MAC address information. The router reads the network portion of the destination IP address and uses it to find which one of the attached networks is the best way to forward the message to the destination |
|
|
Term
Explain how a router determines what path to send the message to get the destination network? |
|
Definition
When a router receives a frame, it decodes the frame to get to the packet containing the destination IP address it matches the address of the destination to all of the networks that are contained in the routing table. If the destination network address is in the table, the router encapsulates the packet in a new frame in order to send it out. It forwards the new frame out of the interface associated with the path to the destination network. |
|
|
Term
How do routers handle broadcasts messages using a MAC address? |
|
Definition
Router interfaces do not forward messages that are addressed to the broadcast MAC address. As a result, local network broadcasts are not sent across routers to other local networks. |
|
|
Term
Which device is typically used as a hosts default gateway? |
|
Definition
The default gateway address is the address of the router interface connected to the same local network as the secure host. |
|
|
Term
Why are default gateways necessary to proper network functionality? |
|
Definition
If no default gateway is configured in the host TCP/IP settings, or if the wrong default gateway is specified, messages addressed to hosts on remote networks cannot be delivered. |
|
|
Term
What do routers use routing tables to determine? |
|
Definition
Routers use the routing tables to determine which interface to use to forward a message to its intended destination |
|
|
Term
Explain the purpose of configuring a routing table with a default route. |
|
Definition
If the router cannot determine where to forward a message, it will drop it. Network administrators configure a routing table with a default route to keep a packet from being dropped because the path to the destination network is not in the routing table. A default route is the interface through which the router forwards a packet containing an unknown destination IP network address. |
|
|
Term
Explain the term Local Area Network (LAN) |
|
Definition
The term Local Area Network (LAN) refers to a local network or a group of interconnected local networks that are under the same administrative control. In the early days of networking. |
|
|
Term
A network plan starts with the gathering of information about how the network will be used. This information could include: |
|
Definition
The number and type of hosts to be connected to a network, the applications to be used, sharing and internet connectivity requirements, security and privacy considerations, reliability and uptime expectations, and connectivity requirements including wired and wireless. |
|
|
Term
Explain what should be included in a physical topology of the network: |
|
Definition
Physical location of devices such as routers, switches, and hosts How all devices are interconnected Location and length of all cable runs Hardware configuration of end devices such as hosts and servers. |
|
|
Term
Explain what should be included in a logical topology of the network: |
|
Definition
Location and size of broadcast and collision domains, IP addressing scheme, naming scheme, sharing configuration, and permissions,. |
|
|
Term
What is the purpose of prototyping? |
|
Definition
A prototype allows a network administrator to test whether or not the planned network will operate as expected, before moey is spent on equipment and installation. Documentation should be maintained on all aspects of the prototyping process |
|
|
Term
An Integrated Services Router (ISR) can perform the functions of what devices? |
|
Definition
Switch, Router, and Access Point. |
|
|
Term
Why would you disable Simple File Sharing on your computer? |
|
Definition
Simple File Sharing can be disabled so that more specific security access levels can be assigned. |
|
|