Term
|
Definition
Routable protocol each interface is associated with a unique IP address Some nodes may use multiple IP addresses |
|
|
Term
Router that contains two NIC's Page 399 |
|
Definition
Each NIC can be assigned a seperate IP address, or on a web server that hosts multiple web sites such as one manged by an ISP-each web service associated with a site can have a different IP address. |
|
|
Term
|
Definition
Consists of four 8 bit octets Expressed in either binary or or a dotted decimal |
|
|
Term
Assigning of IP addresses Page 399 |
|
Definition
Assigned using DHCP rather than statically. |
|
|
Term
Every IPv4 Address associated with a network class Page 399 |
|
Definition
Class A, B, C, D,or E Class D or E addresses are reserved for special purposes |
|
|
Term
|
Definition
Separates a network into multiple logically defined segments, or subnets.
Networks are commonly subnetted according to geographic locations
Subnet traffic is separated with every other subnets traffic. |
|
|
Term
|
Definition
Enhance security Improve Performance Simplify troubleshooting |
|
|
Term
|
Definition
Must be connected via routers or other Layer 3 devices
Do not transmit incoming frames to all other nodes on the same segment as a hub does.
Forward frames only as necessary |
|
|
Term
Classful Addressing in IPv4 |
|
Definition
Simplest and and first of IPv4 addressing adheres to network class distinctions Consists of host and network information |
|
|
Term
|
Definition
Network ID is limited to the first 8 bits |
|
|
Term
|
Definition
network information First 16 bits |
|
|
Term
|
Definition
Network information First 24 bits |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
Adhering to a fixed network ID size ultimately limits the number of _____a network can include. |
|
Definition
|
|
Term
|
Definition
Depends on the use of the subnet masks to identify how a network is subdivided. |
|
|
Term
|
Definition
Indicates where the network information is located in an IPv4 address. |
|
|
Term
The bits in a subnet mask that are assigned a ____indicate that corresponding bits in an IPv4 address contain___information |
|
Definition
|
|
Term
The bits that are assigned ___indicate that corresponding bits in an IP address contain ____ |
|
Definition
|
|
Term
|
Definition
Default subnet mask for a Class A network |
|
|
Term
Link Local addresses in IPv6 always begins with |
|
Definition
|
|
Term
Multicast addresses in IPv6 always begins with____ |
|
Definition
|
|
Term
The octets are ______reserved |
|
Definition
|
|
Term
When using classful addressing a network ID always ends with an____ |
|
Definition
|
|
Term
|
Definition
Additional bits used for subnet information plus the existing network ID
Based on which of the additional network information bits are set to equal 1 |
|
|
Term
If you use subnetting on your LAN only your LAN's ______need to interpret your devices subnetting information. |
|
Definition
|
|
Term
________external to your LAN , such as those on the internet, pay attention to only the network portion of your device's IP addresses when transmitting data to them. |
|
Definition
|
|
Term
Devices _______to a subnetted LAN can direct data to those LAN devices without interpreting the LAN's subnetting information. |
|
Definition
|
|
Term
A ______must interpret IP addresses from different subnets and direct data from one____to another |
|
Definition
|
|
Term
Each_____corresponds to a different port on the router |
|
Definition
|
|
Term
Because subnetting ______ how a device is addressed by external networks, a network administrator does not need to inform Internet authorities about new segments created via subnetting. |
|
Definition
|
|
Term
CIDR Classless Interdomain Routing |
|
Definition
Sometimes called supernetting, not exclusive of subnetting, it provides additional ways of arranging network and host information in an IP address. Conventional network class distinctions do not exist. |
|
|
Term
|
Definition
Internet Engineering Task force |
|
|
Term
|
Definition
Moving the subnet boundary to the left allows you to use more bits for host information and therefore generate more IP addressing. |
|
|
Term
|
Definition
Takes the form of the netwrk ID followed by a forward slash, followed by the number of bits that are used for the extended network prefix. 199.34.89.0/27 because 27 bits of the subnet addresses are used for the extended network. |
|
|
Term
|
Definition
199.34.89.0/22 forward slash plus the number of bits used for the extended network prefix |
|
|
Term
Routers that rely on older routing protocols_____are ______capable of interpreting classless IP addresses |
|
Definition
|
|
Term
IPv6 addressing does ______use classes |
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
2^128 available addresses |
|
|
Term
How does subnetting help network administrators manage enormous volume of IPv6 addresses? |
|
Definition
|
|
Term
|
Definition
An address assigned to a single interface on the network. |
|
|
Term
|
Definition
2608:FE10::1:A:002:50FF:FE2B:E708 |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
IPv6 enables network administrators to more general group interfaces that belong to the same route |
|
|
Term
|
Definition
Includes all subnets whose prefixes begin with 2608:FE10 and consequently all interfaces whose IP address begin with 2608:FE10 |
|
|
Term
|
Definition
The gateway that first interprets its outbound requests to other subnets, and then interprets its inbound requests from other subnets |
|
|
Term
|
Definition
Combination of software and hardware that enables two different network segments to exchange data. |
|
|
Term
Each node on the network can have ______ |
|
Definition
only one default gateway, it is either assigned manually or automatically. |
|
|
Term
Each default gateway is assigned____ |
|
Definition
|
|
Term
When a router is used as a gateway, it must maintain_______as well. |
|
Definition
|
|
Term
|
Definition
Gateways that make up the internet backbone |
|
|
Term
Internet gateways maintain_____ to known addresses to expedite data transfer. |
|
Definition
|
|
Term
An organization's default gateway can also be used to____ the organization's internal IP addressing and keep them from being recognized on a public network. |
|
Definition
|
|
Term
|
Definition
Any user may access with little or no restrictions. Example: Internet |
|
|
Term
|
Definition
Network whose access is restricted to only clients or machines with proper credentials. |
|
|
Term
NAT Network Address Translation |
|
Definition
When the clients transmission reaches the default gateway, the gateway opens the IP datagram and replaces the client's private IP address with an Internet recognized IP address. |
|
|
Term
One reason for using address translation is to_____ of a low quantity of IPv4 addresses. |
|
Definition
|
|
Term
Reasons for Address Translations |
|
Definition
Overcome limitations of a low quantity of IPv4 addresses
Add a marginal amount of security to a private network
Enable a network administrator to develop her own network scheme that does not conform to a scheme dictated by ICANN |
|
|
Term
|
Definition
A transmission is assigned a new IP address each time it reaches the public, those outside an organization cannot trace the origin of the transmission back to the specific network node that sent it.....
However the IP address assigned to a transmission by the gateway must be an internet authorized IP address, thus it can be traced back to the organization that leased the address. |
|
|
Term
SNAT Static Network Address Translation |
|
Definition
Each client is associated with one private IP address and one public IP address that never changes.
Example mail server. |
|
|
Term
DNAT Dynamic Network Address Translation |
|
Definition
Replaces the source address field in the datagram with a legitimate IP address |
|
|
Term
Most Popular mail server programs |
|
Definition
Sendmail Microsoft Exchange Server |
|
|
Term
|
Definition
Belongs to Application layer of the OSI model and relies on the TCP at the transport layer
Port 25 |
|
|
Term
|
Definition
Application layer Port 110 |
|
|
Term
|
Definition
Protocol that runs in the session and transport layers.
Not routable because it does not contain network layer information
If you know NetBios name of a workstation, you can use nbstat to determine its IP address. |
|
|
Term
|
Definition
Provide information about Netbios statistics and resolve NetBios names tot heir IP addresses |
|
|
Term
|
Definition
Displays TCP/IP statistics and details about TCP/IP components and connections on a host. |
|
|
Term
|
Definition
Provides a quick way to view traffic statistics without having to run a more complex traffic analysis program |
|
|
Term
Long response to HTTP requests check for the following |
|
Definition
Application: Web server has multiple processors Sufficient hard disk space Multiple NIC's
Check: Server's memory resources Web Server software Checking traffic flow going into and out of the NICs using Netstat |
|
|
Term
Netstat without any switches pulls |
|
Definition
All active TCP/IP connections Transport layer Protocol used (UDP or TCP) Packets sent and received IP adddress State of those connections |
|
|
Term
|
Definition
Responds with clients host name Ability to change name if administrator privileges |
|
|
Term
|
Definition
Query the DNS database from any computer on the network and find the host name of a device by specifying its IP address.
Useful for verifying that a host is configured correctly or for troubleshooting DNS resolution problems. |
|
|
Term
Dig Domain Information Groper |
|
Definition
Allows to query DNS database and find the host name associated with a specific IP address. Diagnose DNS problems Provide more detail than Nslookup Windows based must obtain the code from a third party |
|
|
Term
|
Definition
Good for troubleshooting slow internet connections Uses ICMP ECHO requests to trace the path UDP datagrams Cannot detect router configuration problems or detect whether a router uses different send and receive interfaces |
|
|
Term
|
Definition
Route discovery and analysis utility that comes with UNIX and Linux operating systems.
Combines functions of ping and traceroute utilities and delivers easy to read chart.
Reveals poor performance networks |
|
|
Term
|
Definition
Similar to MTR, displays the path first then issues hundreds of ICMP ECHO requests before revealing any reply or packt loss statistics. |
|
|
Term
|
Definition
View host's routing table Add, delete, or modify routes |
|
|
Term
|
Definition
20 FTP DATA 22 SSH 69 TFTP 119 NNTP 123 NTP 143 IMAP4 443 HTTPS |
|
|