OSI Model & Networking Basics

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

Which layer of the OSI model is responsible for data encryption and decryption?

  • Transport layer
  • Application layer
  • Presentation layer (correct)
  • Session layer

Which of the following devices operate at the Physical layer of the OSI model?

  • Router
  • Switch
  • Bridge
  • Hub (correct)

How many bits are there in two MAC addresses?

  • 96 bits (correct)
  • 48 bits
  • 72 bits
  • 24 bits

The Data Link layer is divided into two sublayers. What are they called?

<p>MAC and LLC (D)</p> Signup and view all the answers

Which layer of the OSI model manages the synchronization and maintenance of sessions between applications?

<p>Session (D)</p> Signup and view all the answers

Which type of address is used for identifying a unique device on a local network?

<p>Physical (D)</p> Signup and view all the answers

Which of the following statements best describes the function of a Network Interface Card (NIC)?

<p>Provides a physical connection for a device to connect to a network, and implements the Data Link layer protocols. (C)</p> Signup and view all the answers

At which layer of the OSI model do routers primarily operate to forward data packets across networks?

<p>Network (B)</p> Signup and view all the answers

What is the result of performing a CRC calculation on data and finding the remainder is zero?

<p>The data transmission was successful and error-free. (A)</p> Signup and view all the answers

Frames in most wired networks hold at most what amount of data?

<p>1500 bytes of data (B)</p> Signup and view all the answers

What is the function of layer 7 of the OSI model?

<p>Application layer (D)</p> Signup and view all the answers

How can an understanding of the OSI seven-layer model help a network technician?

<p>Troubleshooting networks (D)</p> Signup and view all the answers

Which cable type is most suitable for long-distance data transmissions?

<p>Fiber-optic (D)</p> Signup and view all the answers

Why do manufacturers connect two fibers together to create duplex fiber-optic cabling?

<p>Duplex (C)</p> Signup and view all the answers

Which cable type is most susceptible to electromagnetic interference (EMI)?

<p>Unshielded twisted pair (UTP) (A)</p> Signup and view all the answers

Which type of cable consists of a central conductor wire surrounded by insulation and a braided metal shield?

<p>Coaxial (A)</p> Signup and view all the answers

In a three-tier hierarchical network model, which layer controls communication between the end user devices and the rest of the network?

<p>Access/Edge layer (C)</p> Signup and view all the answers

Which layer serves as the backbone of the network architecture in a three-tier model?

<p>Core layer (A)</p> Signup and view all the answers

What cabling category is generally used for new installations requiring speeds up to 1000 Mbps?

<p>Cat 5e (D)</p> Signup and view all the answers

Which connector, while technically named differently, is commonly referred to as RJ-45 in wired networks?

<p>8P8C (B)</p> Signup and view all the answers

What is the minimum category rating of UTP cabling required to support a network running at 1000 Mbps?

<p>Cat 5e (A)</p> Signup and view all the answers

What is the typical range of values for each octet in an IPv4 address?

<p>0 to 255 (A)</p> Signup and view all the answers

What is the typical application of coaxial cable in modern networking setups?

<p>Connecting a cable modem to an Internet service provider (ISP) (A)</p> Signup and view all the answers

Which protocol do web servers and web browsers primarily use for communication?

<p>HTTP (C)</p> Signup and view all the answers

In the context of 10BASE-T, what does "10" represent?

<p>maximum speed of 10 Mbps (A)</p> Signup and view all the answers

Which formula accurately calculates the number of usable hosts on a subnet, where 'x' represents the number of zeroes in the subnet mask?

<p>$2x – 2$, where x represents the number of zeroes in the subnet mask (C)</p> Signup and view all the answers

A Class C network uses which octets to define the network ID?

<p>first three (D)</p> Signup and view all the answers

If the first octet of an IP address falls within the range of 128 to 191, to which IP class does the address belong?

<p>Class B (A)</p> Signup and view all the answers

Which protocol guarantees reliable data delivery through connection-oriented communication?

<p>TCP (B)</p> Signup and view all the answers

Which type of packet transmission delivers a message directly from one computer to another?

<p>unicast (C)</p> Signup and view all the answers

What type of packet transmission allows every device on a local network to receive the message?

<p>broadcast (A)</p> Signup and view all the answers

Which Transport Layer protocol is utilized by DNS and DHCP for their operations?

<p>UDP (D)</p> Signup and view all the answers

Which of the following IP addresses is classified as a private IP address?

<p>10.164.19.5 (B)</p> Signup and view all the answers

Which command is used to instruct a device to send network packets to itself for testing purposes?

<p><code>ping 127.0.0.1</code> (A)</p> Signup and view all the answers

Which type of packet transmission delivers a message from a single source to a defined group of interested devices?

<p>multicast (D)</p> Signup and view all the answers

What network protocol do Apple devices currently use for network communication?

<p>TCP/IP (B)</p> Signup and view all the answers

Dynamic IP addressing, facilitated by which protocol, automatically assigns IP addresses to devices when they connect to the network?

<p>the Dynamic Host Configuration Protocol (DHCP) (D)</p> Signup and view all the answers

To which layer of the OSI model does the Internet Protocol (IP) primarily correspond?

<p>Network (A)</p> Signup and view all the answers

Which statement accurately describes the role of root servers in the Domain Name System (DNS)?

<p>They delegate to domain-specific name servers. (B)</p> Signup and view all the answers

Which organization significantly expanded the number of generic Top-Level Domains (gTLDs), such as .biz and .rodeo?

<p>ICANN (C)</p> Signup and view all the answers

What is a fundamental requirement for hosts operating on the Internet?

<p>IP addresses must be unique. (D)</p> Signup and view all the answers

Which DNS record type identifies the authoritative name server for a domain?

<p>NS record (A)</p> Signup and view all the answers

Which command-line utility is most useful for troubleshooting DNS-related issues?

<p>ping (B)</p> Signup and view all the answers

What is the correct order of components in a Fully Qualified Domain Name (FQDN)?

<p>host.domain.root (D)</p> Signup and view all the answers

Which of the following is considered an original top-level domain name?

<p>.mil (B)</p> Signup and view all the answers

Which UDP port is predominantly utilized by DNS servers for communication?

<p>53 (A)</p> Signup and view all the answers

What is the primary function of RADIUS in network administration?

<p>Authenticating and authorizing users for network access. (B)</p> Signup and view all the answers

What type of information is stored within a DNS resolver cache?

<p>IP addresses already resolved (A)</p> Signup and view all the answers

Which of the following contains a public key and the digital signature of a trusted third party?

<p>Certificate (C)</p> Signup and view all the answers

When a computer using NetBIOS starts up, what information does it broadcast along with its MAC address?

<p>NetBIOS name (C)</p> Signup and view all the answers

Which protocol allows programs to interact with and modify a network's database?

<p>LDAP (D)</p> Signup and view all the answers

What is the name of the most commonly used DNS server in UNIX/Linux systems?

<p>BIND (A)</p> Signup and view all the answers

Windows DNS server serves as the default resolver and name server for which Microsoft enterprise network management approach?

<p>Active Directory (A)</p> Signup and view all the answers

The underlying mathematical process for a cipher is known as what?

<p>Algorithm (B)</p> Signup and view all the answers

Which element is an essential component of a fully qualified domain name (FQDN)?

<p>host name (D)</p> Signup and view all the answers

What is another common term for port bonding?

<p>Port Aggregation (A)</p> Signup and view all the answers

Which protocol is designed to enable secure data transfers between two hosts and is often considered a more secure alternative to FTP?

<p>Secure Copy Protocol (SCP) (A)</p> Signup and view all the answers

Which set of states applies to switches using VLAN Trunking Protocol (VTP)?

<p>Transparent, server, and client (A)</p> Signup and view all the answers

What type of network allows you to segment a physical network into multiple discrete networks without additional hardware?

<p>Virtual Local Area Network (VLAN) (D)</p> Signup and view all the answers

What term describes data that has been transformed using a cipher algorithm with a key?

<p>ciphertext (D)</p> Signup and view all the answers

Which mode enables an intrusion detection system (IDS) to examine a copy of every packet on a network?

<p>Promiscuous (D)</p> Signup and view all the answers

What tool does Cisco utilize to implement DHCP relay?

<p>IP Helper (B)</p> Signup and view all the answers

What is the name of the Cisco protocol used for accomplishing aggregation?

<p>Port Aggregation Protocol (PAgP) (A)</p> Signup and view all the answers

What is the term for a switch port configured to carry all traffic, regardless of VLAN number, between all switches in a LAN?

<p>Trunk Port (D)</p> Signup and view all the answers

To name a VLAN, what is typically appended to the word “VLAN”?

<p>A Number (A)</p> Signup and view all the answers

The VLAN ID a trunk port associates untagged traffic with is its __________ VLAN.

<p>Native (C)</p> Signup and view all the answers

What does a managed switch need to enable configuration through the network?

<p>IP Address (D)</p> Signup and view all the answers

What is the term for the switch capability to duplicate data from one or more ports to a single port?

<p>Port Mirroring (A)</p> Signup and view all the answers

Which type of NAT allows multiple internal devices to share a single public IP address, using different port numbers?

<p>Port Address Translation (PAT) (A)</p> Signup and view all the answers

Which routing protocol is often favored in large enterprise internal networks due to its vendor-neutral nature and link-state algorithm?

<p>OSPF (D)</p> Signup and view all the answers

What term defines the maximum size of a packet or frame that a particular network technology can transmit?

<p>Maximum Transmission Unit (C)</p> Signup and view all the answers

Upon receiving a packet, what information does a router primarily examine to determine the packet's next destination?

<p>Destination IP addresses (D)</p> Signup and view all the answers

What is the general name for the protocols used for routing communication within an Autonomous System?

<p>Interior Gateway Protocols (IGPs) (A)</p> Signup and view all the answers

What networking term describes each instance of a data packet passing through a router?

<p>Hop (B)</p> Signup and view all the answers

What is the result of the Frame Check Sequence (FCS) calculation in an Ethernet frame used for?

<p>Error detection. (B)</p> Signup and view all the answers

Which aspect of network communication is primarily determined by the network access method defined in the 802.3 standards?

<p>How devices share the network. (D)</p> Signup and view all the answers

What type of routing protocol facilitates communication between different Autonomous Systems?

<p>Exterior Gateway Protocol (EGP) (A)</p> Signup and view all the answers

What is the primary function of the data portion within an Ethernet frame on an IP network?

<p>To transmit the actual data being transferred. (A)</p> Signup and view all the answers

Which file transfer protocol uses the User Datagram Protocol (UDP) and operates on port 69?

<p>TFTP (D)</p> Signup and view all the answers

What term describes the data retained by one side of a network communication to maintain the state of the interaction?

<p>session (C)</p> Signup and view all the answers

How does using an RJ-45 connector impact Ethernet network design and functionality?

<p>It provides a standardized interface for connecting devices to the network. (B)</p> Signup and view all the answers

Which category do port numbers ranging from 1024 to 49151 belong to?

<p>registered (A)</p> Signup and view all the answers

Why is it important to adhere to the maximum cable length specification on a 1000BASE-T network segment?

<p>To maintain signal integrity and prevent data loss. (B)</p> Signup and view all the answers

What term indicates the state of a port that is actively participating in a functional communication pairing?

<p>established port (B)</p> Signup and view all the answers

How does the 'W' designation in 10GBASE-SW relate to the application and compatibility of the standard?

<p>It indicates compatibility with SONET/WAN signaling. (D)</p> Signup and view all the answers

Which type of communication involves an initial handshake, followed by data exchange, and concludes with a connection termination?

<p>connection-oriented (C)</p> Signup and view all the answers

How does 'Fast Ethernet' contrast with more modern Ethernet standards?

<p>Fast Ethernet offers significantly lower data transfer rates. (B)</p> Signup and view all the answers

What general term describes any single instance of communication between two computers in a network?

<p>session (C)</p> Signup and view all the answers

How did the pre-existing SONET infrastructure influence the development and adoption of 10 GbE?

<p>SONET provided a proven high-speed transmission method. (A)</p> Signup and view all the answers

In what scenarios would fiber-optic cabling be preferred over traditional copper cabling for Ethernet installations?

<p>When data transmission needs to prevent electrical interference. (D)</p> Signup and view all the answers

When using ping, what message typically indicates that a response was not received from the target device within the expected timeframe?

<p>request timed out (A)</p> Signup and view all the answers

At which layer of the OSI model does the Internet Control Message Protocol (ICMP) operate to transmit connectionless packets?

<p>Layer 3 (B)</p> Signup and view all the answers

What considerations are important when choosing between 10GBASE-T and other 10 GbE standards?

<p>10GBASE-T can utilize existing twisted pair cabling. (A)</p> Signup and view all the answers

How does the choice of connector in a 1000BASE-SX network impact its performance and compatibility?

<p>SC and LC connectors ensure compatibility with fiber-optic cabling. (B)</p> Signup and view all the answers

What are the trade-offs between using STP and UTP cabling in network installations?

<p>UTP is cheaper but offers less protection against EMI. (D)</p> Signup and view all the answers

How does understanding the 'R' designation in 10GBASE-SR help in troubleshooting network issues?

<p>It clarifies that the issue is likely related to short-range fiber optic connections. (C)</p> Signup and view all the answers

How does the wavelength of laser signals in fiber-optic cables affect data transmission?

<p>Different wavelengths enable multiple data streams on a single fiber. (D)</p> Signup and view all the answers

How does the telecommunications room contribute to the overall organization and maintainability of a network?

<p>It centralizes network equipment and cabling. (A)</p> Signup and view all the answers

Which layer of the OSI model opens and closes conversations between applications?

<p>Session Layer (B)</p> Signup and view all the answers

Which layer of the OSI model is the only layer divided into two sublayers?

<p>Data Link Layer (C)</p> Signup and view all the answers

Which layer of the OSI model is responsible for data encryption and decryption?

<p>Presentation Layer (@)</p> Signup and view all the answers

Which layer of the OSI model manages the synchronization and maintenance of sessions between applications?

<p>Session Layer (C)</p> Signup and view all the answers

What device connects subnets?

<p>Router (@)</p> Signup and view all the answers

Which OSI model layer resends packets that were not received in good order?

<p>Transport Layer (A)</p> Signup and view all the answers

Which of the following devices operates at the Network layer of the OSI model?

<p>Router (B)</p> Signup and view all the answers

Signup and view all the answers

Flashcards

Presentation Layer

Layer 6 of the OSI model; handles data formatting, encryption, and compression.

Physical Layer devices

Hubs and network cabling operate at this OSI model layer.

MAC Address Length

A 48-bit hardware address that identifies a device on a network.

OSI Layer with Sublayers

The Data Link layer is divided into the Media Access Control (MAC) and Logical Link Control (LLC) sublayers.

Signup and view all the flashcards

Session Layer Function

The OSI layer that manages the start, control, and end of conversations between applications.

Signup and view all the flashcards

Physical Address

A unique hardware address assigned to a network interface card (NIC).

Signup and view all the flashcards

NIC Function

Verifies data integrity using CRC, and prepares protocol data for transfer between a PC and the network.

Signup and view all the flashcards

Router OSI Layer

Forward data packets between different networks. Operates at the network layer.

Signup and view all the flashcards

Maximum Frame Size

Most wired network frames can hold up to 1500 bytes of data.

Signup and view all the flashcards

OSI Layer 7

Layer 7 of the OSI model, responsible for network applications.

Signup and view all the flashcards

OSI Model Benefit

The OSI model helps with network problem analysis and resolution.

Signup and view all the flashcards

Best Cable for Distance

Fiber-optic cables use light to transmit signals over long distances.

Signup and view all the flashcards

Duplex Fiber

A type of fiber-optic cabling where two fibers are connected together.

Signup and view all the flashcards

EMI Susceptible Cable

UTP cables are susceptible to interference from electromagnetic sources.

Signup and view all the flashcards

Coaxial Cable

A cable with a central conductor surrounded by insulation and a braided metal shield.

Signup and view all the flashcards

Access Layer

This layer controls communication and connectivity to end user devices.

Signup and view all the flashcards

Core Layer

The backbone connecting different parts of the network.

Signup and view all the flashcards

Cat 5e/Cat 6 Cabling

Category of cabling often used for networks running at speeds up to 1000Mbps.

Signup and view all the flashcards

8P8C Connector

A connector commonly used in wired networks for connecting devices.

Signup and view all the flashcards

Minimum Cat 5e

Minimum UTP cable category to support 1000 Mbps network speeds.

Signup and view all the flashcards

Coaxial Cable Use

Primarily used to connect a cable modem to an ISP.

Signup and view all the flashcards

Plenum Space

The space above the ceiling tiles used for cabling.

Signup and view all the flashcards

BASE Meaning

It defines the signalling type.

Signup and view all the flashcards

Minimum Ethernet Frame Size

The minimum size of an Ethernet frame is 64 bytes.

Signup and view all the flashcards

802.3 Shared Elements

The 802.3 working group standards share a basic frame type and network access method.

Signup and view all the flashcards

Ethernet Frame Data

The data portion of an Ethernet frame on an IP network includes padding information.

Signup and view all the flashcards

RJ-45 Pins

An RJ-45 connector has eight pins.

Signup and view all the flashcards

1000BASE-T Max Length

The maximum cable length on a 1000BASE-T segment is 100 meters.

Signup and view all the flashcards

10GBASE-SW Meaning

In 10GBASE-SW, "W" stands for SONET/WAN signaling.

Signup and view all the flashcards

Fast Ethernet Speed

"Fast Ethernet" refers to 100-Mbps Ethernet standards.

Signup and view all the flashcards

Pre-10GbE WAN tech

SONET was in place before 10 GbE.

Signup and view all the flashcards

Cabling for Interference

Fiber-optic cabling is used for high electrical interference areas.

Signup and view all the flashcards

10GBASE-T Standard

The IEEE standard for 10 GbE running on twisted pair cabling is 10GBASE-T.

Signup and view all the flashcards

1000BASE-SX Connector

The most common connector used in a 1000BASE-SX network is LC.

Signup and view all the flashcards

10GBASE-SR Meaning

In 10GBASE-SR, the 'R' stands for LAN signaling.

Signup and view all the flashcards

Fiber Optic Colors

Different colors of laser signals transmitted over fiber-optic cables feature different wavelengths.

Signup and view all the flashcards

Telecommunications Room

The telecommunications room (or IDF) is where horizontal runs come together.

Signup and view all the flashcards

Horizontal Cabling

Horizontal cabling runs from the telecommunication room to the computers.

Signup and view all the flashcards

IP Address Octet Range

Valid IP addresses range from 0 to 255 for each octet.

Signup and view all the flashcards

HTTP

Web servers and browsers use this protocol for communication.

Signup and view all the flashcards

Usable Hosts Formula

2x - 2, where x is the number of zeroes in the subnet mask, determines the number of usable hosts.

Signup and view all the flashcards

Class C Network ID

A Class C network ID is defined by the first three octets.

Signup and view all the flashcards

Class B IP Range

IP addresses between 128 and 191 fall under Class B.

Signup and view all the flashcards

TCP (Connection-Oriented)

TCP is a connection-oriented protocol, ensuring reliable data transfer.

Signup and view all the flashcards

Unicast

Unicast sends a packet directly from one computer to another.

Signup and view all the flashcards

Broadcast

Broadcast sends a packet to every device on the LAN.

Signup and view all the flashcards

DNS and DHCP Protocol

DNS and DHCP commonly use UDP.

Signup and view all the flashcards

Private IP Example

10.164.19.5 is a private IP address.

Signup and view all the flashcards

Loopback Address Test

ping 127.0.0.1 sends packets to the device itself.

Signup and view all the flashcards

Multicast

Multicast sends a packet to a specific group of computers.

Signup and view all the flashcards

Apple Network Protocol

Apple systems use TCP/IP.

Signup and view all the flashcards

DHCP Function

DHCP automatically assigns IP addresses to devices.

Signup and view all the flashcards

IP OSI Layer

The Network Layer in the OSI model corresponds to the Internet Protocol.

Signup and view all the flashcards

DNS Server Role

Handle name resolution tasks for the Internet by delegating to domain-specific name servers.

Signup and view all the flashcards

ICANN

The organization that has added hundreds of generic Top-Level Domains (TLDs), like .biz and .rodeo.

Signup and view all the flashcards

IP Address Uniqueness

IP addresses must be unique for each host.

Signup and view all the flashcards

NS Record

Points to the server holding records for a part of the DNS tree.

Signup and view all the flashcards

Best Friend for DNS Testing

A tool for testing DNS resolution

Signup and view all the flashcards

FQDN Sequence

The host, then the domain, then the root.

Signup and view all the flashcards

Original TLD

An original top-level domain name.

Signup and view all the flashcards

DNS UDP Port

Port 53

Signup and view all the flashcards

DNS Resolver Cache

Resolved IP addresses.

Signup and view all the flashcards

NetBIOS Boot Broadcast

NetBIOS name

Signup and view all the flashcards

Popular DNS Server (UNIX/Linux)

BIND

Signup and view all the flashcards

Windows DNS Integration

Active Directory

Signup and view all the flashcards

Part of FQDN

host name

Signup and view all the flashcards

Encrypted output

Ciphertext

Signup and view all the flashcards

Defines data access rights

authorization

Signup and view all the flashcards

Port Address Translation (PAT)

A type of NAT where a single public IP address is used for many private IP addresses, distinguished by port numbers.

Signup and view all the flashcards

OSPF (Open Shortest Path First)

A vendor-neutral routing protocol widely used in large enterprise internal networks.

Signup and view all the flashcards

Maximum Transmission Unit (MTU)

The largest size packet or frame that can be sent over a network.

Signup and view all the flashcards

Destination IP Address

A router uses this to determine the next hop for an incoming packet.

Signup and view all the flashcards

Interior Gateway Protocols (IGPs)

Protocols used for communication within an Autonomous System.

Signup and view all the flashcards

Exterior Gateway Protocol (EGP)

A protocol used by Autonomous Systems to communicate with each other.

Signup and view all the flashcards

TFTP (Trivial File Transfer Protocol)

A simple file transfer protocol that uses UDP port 69.

Signup and view all the flashcards

Endpoint

Information stored on one side of a communication session.

Signup and view all the flashcards

Registered Port

A type of port number in the range of 1024 to 49151.

Signup and view all the flashcards

Established Port

The status of a port that is currently part of an active and working connection.

Signup and view all the flashcards

Connection-Oriented

A communication method where two computers acknowledge each other, communicate, and then close the connection.

Signup and view all the flashcards

Session

A single communication between two computers.

Signup and view all the flashcards

"Request timed out"

Error message from ping when no reply is received within the default time.

Signup and view all the flashcards

ICMP (Internet Control Message Protocol)

This protocol operates at Layer 3 to deliver connectionless packets.

Signup and view all the flashcards

Network Access Control (NAC)

A security system that controls access to a network.

Signup and view all the flashcards

Certificate

A standardized file containing a public key and a trusted third party's digital signature.

Signup and view all the flashcards

LDAP (Lightweight Directory Access Protocol)

A protocol used to query and modify databases used by networks.

Signup and view all the flashcards

Algorithm

A cipher's underlying mathematical formula for encrypting and decrypting data.

Signup and view all the flashcards

Port Aggregation

Combining multiple network connections in parallel to increase throughput.

Signup and view all the flashcards

VTP Switch States

Transparent, Server, and Client

Signup and view all the flashcards

Virtual Local Area Network (VLAN)

A logical network that segments a physical network without additional hardware.

Signup and view all the flashcards

Promiscuous Mode

Mode where an IDS inspects a copy of every packet on the network.

Signup and view all the flashcards

IP Helper

Cisco's tool for implementing DHCP relay.

Signup and view all the flashcards

Port Aggregation Protocol (PAgP)

Cisco protocol for link aggregation.

Signup and view all the flashcards

Trunk Port

A switch port that carries all traffic, regardless of VLAN, between switches.

Signup and view all the flashcards

VLAN naming

A number

Signup and view all the flashcards

Native VLAN

The VLAN to which untagged traffic is assigned on a trunk port.

Signup and view all the flashcards

Managed Switch Requirement

IP address

Signup and view all the flashcards

Port Mirroring

Copying network traffic from one or more ports to a monitoring port.

Signup and view all the flashcards

Study Notes

  • Layer 6 of the OSI model is the Presentation layer.

Physical Layer

  • Hubs and network cabling reside at the physical layer of the OSI model.

MAC Addresses

  • A MAC address is 48 bits long.
  • The Data Link layer of the OSI model is divided into two sublayers.

Session Layer

  • The Session layer of the OSI model opens and closes conversations between applications.

MAC (Physical) Addresses

  • A MAC address is also known as a physical address.

NIC Functions

  • A NIC utilizes network protocols for data transfer between the PC and the network.

Router Function

  • Routers function at the Network layer of the OSI model.

Transport Layer

  • The Transport layer of the OSI model resends packets that were not received in good order.

Physical Addressing

  • Physical addressing takes place at the Data Link layer in the OSI model.

Connecting Subnets

  • A router connects subnets.

Physical Layer Data Units

  • The data unit used at the OSI physical layer is a bit.

OSI Model Layers

  • The OSI model contains 7 layers.

Frame Data Capacity

  • Frames in most wired networks hold at most 1500 bytes of data.

Application Layer

  • OSI layer 7 is also known as the Application layer.

OSI Model

  • One benefit of understanding the OSI seven-layer model is using it as a primary tool for troubleshooting networks.

Long Distance Transmission

  • Fiber-optic cable works best for long-distance transmissions.

Fiber-Optic Cabling

  • Two fibers are often connected together to create duplex fiber-optic cabling.

Electromagnetic Interference (EMI)

  • Unshielded twisted pair (UTP) cable suffers from electromagnetic interference (EMI).

Coaxial Cable

  • Coaxial cable has a central conductor wire surrounded by insulating materials and placed inside a braided metal shield.

Three-Tier Hierarchical Model

  • The Access/Edge layer in the three-tier hierarchical model network architecture facilitates traffic between end devices and the rest of the network.

Network Backbone

  • The Core layer is considered the backbone of a network in the three-tier model.

Cabling Installations

  • Most new cabling installations use Cat 6 because most networks can run at speeds of up to 1000 Mbps.

Wired Networks

  • The 8P8C connector is currently used in wired networks, but commonly referred to as RJ-45.

UTP Cabling

  • Cat 5e is the minimum category rating of UTP cabling needed for a network that runs at 1000 Mbps.

Coaxial Cable Use

  • The primary use of coaxial cable in networking today is connecting a cable modem to an Internet service provider (ISP).

Network Architecture

  • The Access/Edge layer in the three-tier hierarchical model network architecture facilitates traffic between end devices and the rest of the network.

Plenum

  • Plenum refers to the space between the acoustical tile ceiling in an office building and the actual concrete ceiling above.

10BASE-T

  • The "10" in 10BASE-T means maximum speed of 10 Mbps.

Start Frame Delimiter

  • The start frame delimiter is 1 byte long.

Root Guard

  • Root guard will move a port into a root-inconsistent state if BPDUs indicate another switch is trying to become the root bridge.

Fiber-Optic Cabling Advantage

  • Fiber-optic cabling offers a greater maximum distance compared to other types.

10BASE-FL Standard

  • The 10BASE-FL standard specified fiber-optic cabling.

Ethernet Frame Preamble

  • The preamble of an Ethernet frame includes a 7-byte series of alternating ones and zeroes followed by a start frame delimiter.

10BASE-T "BASE"

  • In a specification such as 10BASE-T, the word "BASE" identifies signaling type.

Ethernet Frame Fields

  • A basic Ethernet frame contains nine fields.

Ethernet Frame Size

  • The minimum size of an Ethernet frame is 64 bytes.

Wired Network Standards

  • The 802.3 working group defines wired network standards that share the same basic frame type and network access method.

Ethernet Frame Data Portion

  • The data portion of an Ethernet frame on an IP network includes IP addresses of the source and destination systems.

RJ-45 Connector Pins

  • An RJ-45 connector has eight pins.

1000BASE-T Network

  • The maximum cable length on a segment of a 1000BASE-T network is 100 meters.

10GBASE-SW "W"

  • The "W" in the standard 10GBASE-SW stands for SONET/WAN signaling.

Fast Ethernet

  • Fast Ethernet refers to the 100-Mbps standards.

High-Speed Fiber Network

  • SONET was already in place for wide area networking (WAN) before the IEEE developed 10 GbE Ethernet standards.

Ethernet Cabling for High Interference

  • A technician is most likely to use fiber-optic cabling when installing Ethernet cabling in areas with high electrical interference.

10 GbE Twisted Pair

  • The IEEE standard for 10 GbE running on twisted pair cabling is 10GBASE-T.

1000BASE-SX Connector

  • The most common connector used in a 1000BASE-SX network is LC.

Ethernet in High Interference Areas

  • When installing Ethernet cabling in areas with high electrical interference, fiber-optic is most likely used.

10GBASE-SR "R"

  • The "R" in the standard 10GBASE-SR stands for LAN signaling.

Fiber-Optic Laser Signals

  • The different colors of the laser signals transmitted over fiber-optic cables feature different wavelengths.

Intermediate Distribution Frame

  • The telecommunications room, technically called the intermediate distribution frame (IDF), is where all the horizontal runs from all the work areas come together.

Demarcation Point

  • The physical location where connections come in from the outside world is known as the demarcation point (demarc).

Patch Panel

  • The most commonly used type of patch panel currently in use is the 110 block.

Structured Cabling Network

  • The essential ingredients for a successful basic structured cabling network are a telecommunications room, horizontal cabling, and a work area.

Patch Panel Definition

  • A patch panel is a box with a row of ports in front and permanent connections to horizontal cabling in the back.

Horizontal Cabling

  • Cables that run from the telecommunication room to the computers are referred to as the horizontal cabling.

Responsibility of Business Owner

  • The box where the responsibility of the business owner begins is referred to as the demarcation point (demarc).

IPv4 Digits

  • There are 32 binary digits in an IPv4 address.

HTTP Web Severs

  • HTTP Web servers use port 80.

IPv4 Decimal Value Range

  • The range of decimal values in each of the four groups of an IPv4 address is 0 to 255.

Web Communication Protocol

  • Web servers and Web browsers use HTTP to communicate.

Subnet Hosts

  • Subnet hosts is calculated using: 2x – 2, where x represents the number of zeroes in the subnet mask.

Class C Network Blocks

  • A Class C network block uses the first three octets to define only the network ID.

IP Address Class

  • If the first decimal value of an IP address is between 128 and 191, the network belongs to Class B.

Connection-Oriented Protocol

  • TCP is a connection-oriented protocol.

Unicast Packet Sending

  • Unicast allows one computer to send a message directly to another.

Broadcast Packet Sending

  • Broadcast allows every computer on the LAN to hear the message.

DNS and DHCP Protocol

  • DNS and DHCP use UDP.

Private IP Address

  • 10.164.19.5 is a private IP address.

Loopback Command

  • The command "ping 127.0.0.1" tells a device to send packets to itself.

Multicast Packet Sending

  • Multicast allows a single computer to send a packet to a group of interested computers.

Apple Network Protocol

  • Apple systems today use TCP/IP.

Dynamic IP Addressing

  • Dynamic IP addressing via Dynamic Host Configuration Protocol (DHCP) automatically assigns an IP address whenever a computer connects to the network.

Internet Protocol Layer

  • The Internet Protocol corresponds to the Network layer.

Valid Host IP Address

  • 192.168.4.2 is a valid IP address for an individual host.

Internet Communication Protocol

  • Border Gateway Protocol (BGP-4) is used on the Internet for communication between Autonomous Systems.

Network Route Tool

  • Traceroute records the route between any two hosts on a network.

Cisco Proprietary Protocol

  • EIGRP was originally Cisco's proprietary protocol.

Cisco Operating System

  • Cisco's proprietary operating system is called Cisco IOS.

NAT

  • Static NAT maps a single routable IP address to a single machine, enabling access from outside the network.

Obsolete Protocol

  • RIPv2, adopted in 1994, is now considered obsolete except for small, private WANs.

Routing Table Gateway Value

  • 0.0.0.0 routing table gateway value indicates that there is no gateway needed for a network ID.

Bandwidth

  • Bandwidth refers to the ability of one connection to handle more data than others.

Network Management Software (NMS)

  • NMS is used by an administrator to manage many routers and provide an overall view of the network.

Dynamic NAT

  • Dynamic NAT allows many computers to share a pool of routable IP addresses that number fewer than the computers.

NAT Connections

  • Port address translation (PAT) typically handles the one-to-many connections form of NAT.

Enterprise Internal Networks

  • OSPF routing protocol is the choice in most large enterprise's internal networks.

Maximum Transmission Unit

  • Maximum transmission unit is used to determine the largest frame a particular technology can handle.

Router Destination Determination

  • A router determines where an incoming packet should go by looking at the packet's destination IP addresses.

Interior Gateway Protocols (IGPs)

  • Networks within an AS communicate with Interior Gateway Protocols (IGPs).

Hop

  • Hop refers to the passage of a packet through a router.

Exterior Gateway Protocol (EGP)

  • The protocol used by Autonomous Systems to communicate with each other is an Exterior Gateway Protocol (EGP).

TFTP Port

  • TFTP uses UDP port 69.

Endpoint

  • Endpoint refers to session information stored by a computer on one side of a session.

Registered Ports

  • Registered ports have a number in the 1024 to 49151 range.

Established Port Status

  • An established port describes the status of a port that is part of an active, working endpoint pair.

Connection-Oriented Communication

  • Connection-oriented is when two computers first acknowledge each other, communicate, & end by closing the communication.

Session

  • Session is used for any single communication between a computer and another computer.

Ping Message

  • If you ping a device and no echo reply comes back before the default time, ping will respond with a "request timed out" message.

ICMP Operation

  • ICMP works at Layer 3 to deliver connectionless packets.

Three-Way Handshake Protocol

  • TCP involves a three-way handshake.

File Transfers

  • TFTP is popular for moving files between computers on the same LAN.

IGMP Group Range

  • An IGMP multicast group is assigned an address in the Class D range.

Telnet Port

  • Telnet runs on TCP port 23.

Well-Known Port Numbers

  • The port numbers in the range of 0 to 1023 are well-known port numbers.

TCP/IP Application

  • Web servers use port 80.

TFTP Transport Layer Protocol

  • Trivial File Transfer Protocol (TFTP) uses UDP for its Transport layer protocol.

Dynamic Ports

  • A Web client's source port number is classically assigned as dynamic ports.

DNS Problem

  • Ping works with the IP address but not the name associated with that address, that confirms a DNS problem.

Top-Level Domain Servers

  • Top-level domain servers are the DNS servers just below the DNS root.

DNS Naming Convention

  • In the DNS naming convention, each name is separated by a period (.).

DNS Root Servers

  • DNS root servers delegate to domain-specific name servers.

Generic TLDs

  • ICANN has added hundreds of generic TLDs, such as .biz and .rodeo.

Internet Hosts

  • IP addresses must be unique for hosts on the Internet.

DNS Tree Record

  • An NS record points to the server that holds the records (zone) for a part of the DNS tree.

DNS Testing

  • Ping is helpful when testing DNS.

FQDN Sequence

  • In the DNS naming convention, the correct sequence for writing a fully qualified domain name (FQDN) is host.domain.root.

Top-Level Domain Name

  • .com is an original top-level domain name

DNS Server Port

  • DNS servers primarily use UDP port 53.

DNS Resolver Cache

  • DNS resolver cache keeps IP addresses already resolved.

NetBIOS Broadcasting

  • A computer using NetBIOS broadcasted its NetBIOS name along with its MAC address when booted up.

Linux DNS Server

  • The most popular DNS server used in UNIX/Linux systems is called BIND.

Windows DNS Server

  • Windows DNS server is the default resolver and name server for Active Directory.

FQDN

  • Part of a fully qualified domain name (FQDN) is the host name.

Secure Data Transfers

  • Secure Copy Protocol (SCP) enables secure data transfers between two hosts.

Ciphertext

  • Ciphertext refers to the result of running plaintext through a cipher algorithm using a key.

Authorization

  • Authorization defines what an authenticated person can do with data.

Asymmetric-Key

  • An asymmetric-key algorithm is used when two different keys, one to encrypt and one to decrypt, are used in encryption.

Common Block Cipher

  • Advanced Encryption Standard (AES) is the most-common block cipher and is very fast.

Encryption

  • Encryption means to scramble data so that bad guys cannot read it but the intended recipient can descramble it.

HTTPS Connections

  • A good certificate exchange is needed for HTTPS connections.

Protection Applications

  • Network access control (NAC) defines a newer series of protection applications that combine features traditionally done by separate applications.

Authentication, Authorization, Accounting

  • RADIUS offers authentication, authorization, and accounting.

Authentication/Encryption Protocol Suite

  • IPSec is an authentication and encryption protocol suite at the Network layer of the OSI model.

Cryptographic Hash Functions

  • Cryptographic hash functions are commonly used for verifying file integrity.

Dedicated File Server

  • Network attached storage (NAS) is a type of dedicated file server used in many networks.

Standardized File Type

  • A certificate refers to a standardized type of file that includes a public key and the digital signature of a trusted third party.

Network Query/Change Protocol

  • LDAP is the protocol that programs use to query and change a database used by the network.

Cipher Formula

  • Algorithm refers to a cipher's underlying mathematical formula.

Port Aggregation

  • Another name for port bonding is port aggregation.

VLAN Trunking Protocol States

  • Transparent, server, and client are the three states that can be applied to switches using VLAN Trunking Protocol (VTP).

Segmenting Physical Network

  • A virtual local area network (VLAN) enables segmentation without additional hardware.

IDS Mode

  • Promiscuous mode allows an intrusion detection system (IDS) to inspect a copy of every packet on a network.

DHCP Relay

  • Cisco uses IP helper to implement DHCP relay.

Cisco Aggregation Protocol

  • Port Aggregation Protocol (PAgP) is the Cisco protocol for accomplishing aggregation.

Switch Port Configuration

  • A trunk port on a switch carries all traffic, regardless of VLAN number, between all switches in a LAN.

VLAN Naming

  • A number is typically appended to the word "VLAN" to give a VLAN its name.

Trunk Port Traffic

  • The VLAN ID a trunk port associates untagged traffic with its native VLAN.

Managed Switch Configuration

  • A managed switch needs an IP address for network configuration.

Switch Data Copy

  • Port mirroring is the capability of a switch to copy data from any or all physical ports on a switch to a single physical port.

Server Cluster Creation

  • Load balancing refers to making servers look like a single server, creating a server cluster.

Content Switches

  • Layer 7 supports content switches.

Connecting Switches

  • IEEE 802.1Q trunk standard enables you to connect switches from different manufacturers.

Subnets From Class B

  • You can create 1024 subnets if you borrow 10 bits of a Class B network.

85 in Binary

  • 85 in binary is 01010101.

Network ID

  • 160.160.160.0 /28 and 160.160.160.0 /20 are network IDs.

Subnets From Class C

  • You can create 32 subnets if you borrow 5 bits of a Class C network.

10101010 to Decimal

  • The binary number 10101010 is 170 in decimal.

Subnet Mask Prefix

  • A network with a subnet mask of 255.255.255.240 would have a /28 prefix.

Number of Host Bits

  • If you needed a network that would provide for 20 hosts, you would have to have 5 host bits.

Host Range

  • The host range for 192.168.32.32 /30 is 192.168.32.33 - 192.168.32.34.

Valid Network Host

  • 192.168.24.27 with a subnet mask 255.255.255.248 is a valid host on network 192.168.24.0 /29.

/29 Increment

  • The increment of a /29 is 8.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

More Like This

Internet Data Transmission Quiz
5 questions

Internet Data Transmission Quiz

PoliteArcticTundra8232 avatar
PoliteArcticTundra8232
OSI Model and Network Protocols Quiz
16 questions
Network Protocols Quiz
0 questions

Network Protocols Quiz

AccommodativeEuphemism avatar
AccommodativeEuphemism
Networks and the Internet Quiz
42 questions
Use Quizgecko on...
Browser
Browser