You are on page 1of 40

Terms Definitions

Network is a group of computers and possibly other devices (ex.


printers) connected by some type of transmission media (ex.
wire, fiber optic, wireless)

Why are networks used? (1) Networks are mechanisms for sharing resources 
(2) Allow multiple users and/or applications to share a 
common set of data
(3) Networks can also be used to manage resources (install
software, resolve problems, etc.) from a central location.

What is a resource? Devices (ex. printers or disk drives), data and programs
accessed via a network

What is a stand-alone When a computer IS NOT attached to a network.


computer?

Local computer is the computer you are working on

Remote Computer is the computer or device you are accessing via the network

What is a peer-to-peer A peer-to-peer network is a group of individual computers


network? that can communicate with each other in an environment in
which :
(1) each computer manages itself
(2) no computer is in charge of network functions

Understand how an account is On a P2P network. Because each computer manages its own
required on each computer resources, then changes made on one computer (ex.
that a user wishes to access changing passwords) would have to be repeated on every
via the network. other computer if the changes were to effect all of the
computers

Rights what a user can and cannot do


Permissions what resources a user can access and what the user can do
with these resources

Advantages of a P2P network (1) Easy to configure (if the network is small - 5 or less
computers)
(2) Less expensive then Client/Server based networks

Disadvantages of a P2P (1)Becomes difficult to manage as the network grows


network (2) Difficult to fully secure due to variations in capabilities of
various O/S and inconsistencies in how security is
implemented
(3) Not considered to be highly scalable due to technical
limitations and problems relating to managing each
computer individually
(4) Limited application support - many network applications
do not support the use of a peer-to-peer network

Workgroups personnel computers or notebook computers. Refers back


to peer-to-peer network

Homegroups home and personnel computers or notebook computers.


Refers back to peer-to-peer network.

what is a client/server is a network in which one or more computers (network


network? servers) perform the network management functions for all
computers on the network. a client/server based network
uses network servers to manage network operations. NOT
THE SAME AS client/server application

What is the role of network to utilize a special operating system known as a Network
server? Operating System or NOS that is capable of managing
networks
What is a Network Operating capable of managing networks. Windows 200x Server, ((ex.
System (NOS)? 2008 Server), UNIX, LINUX, and MAC OS X Server are
examples of network operating system)

Why do network servers only are responsible for network management and utilize a
exist on a server based common network security database that contains security
network? information (accounts, user names, passwords, rights,
permissions, etc. ) for the entire network

Why are network servers NOT because network servers perform the network management
used on a P2P network? functions for all computers on the network and P2P
networks don't function off of a network.

What is a network client? Computers that are attached to a client/server based


network but DO NOT provide network management
functions

What is the role of client manages the operation of the client (ex. starting programs,
operating system? allocating memory and accessing disk drives on the client)
and interfaces with the network operating system for
network operations
(1) Windows XP and Windows 7 are examples of client O/S in
Windows
(2) Windows Server is also a client operating system when it
is running on a computer that is not a network server (a
server that is not performing network management
functions)

What is a member server? are computers that provide services via a network (ex.
database servers or web servers) but DO NOT perform
network management functions

Advantages of server based (1) Higher level of security


network (2) Highly scalable due to (a) use of a common database to
store network management information and (b) ability of
network operating system software to support large
complex networks
(3) Supports a wider range of network based applications
due to the ability of NOS to provide more extensive support
to these applications

Disadvantages of a server (1) Cost of the hardware (network server) and software 
based network (network operating system)
(2) Complex to install and maintain 
(3) Specialized expertise is required to manage client/server
based networks

What is a domain based a term used by microsoft to refer to client/server based


network? networks

What is the difference Topic addresses how the data is processed on a network as
between client  opposed to topic 5 which dealt with how the network is
processing based application managed
and server 
processing based application?

client/server application and The terms client/server application and distributed


distributed processing (when processing, when used in the context of applications, refers
used in the context of to a design that combines clients and servers in order to
applications) process data

What is the difference LAN is confined to a relatively small area and WAN spans a
between LAN and WAN? large area.

What is a metropolitan area is sometimes used to refer to a network that connects


network (MAN)? multiple closely located buildings

Addressing A unique identifier assigned to each node on a network.


When communicating on the Internet, you must know (1) the
address of the network you are communicating with AND (2)
the address of the node within the network
Backbone A single connection between multiple segments of a 
network.

Client In a general context (without any qualifications) a 


client is a computer on a network that requests 
resources or services from other computers on the 
network

connectivity device A specialized device that allows multiple nodes 


or multiple networks to connect and communicate with each
other

node or host Client, server or other device that is directly


connected via a network and can communicate over 
the network

segment A part of a network that consists of a group of nodes 


that is connected to the remainder of the network via 
the same connectivity device

server In a general context (without any qualifications) a 


server is any computer or software that provides
services to users (clients) on a network

topology The physical layout of a network. The most commonly used


topologies are:
Bus topology and star topology

transmission media The means through which data is transmitted and received.
Can be physical (wire or fiber optic) or atmospheric
(microwave or radio)

workstation A personal computer that may or may not be connected to a


network
What is a packet? Unit of data that is transmitted across a network. The actual
data that is sent across a network (ex. an entire 
file) is usually too big to be transmitted as a single unit and
must be broken up into smaller units known as packets.

What is a NIC (also known as Device that enables a computer or other device 
Network  on a network to connect to the network. NICs can be
Interface Card or Network circuitry on the computers system board, a card or board
Adapter) that is plugged into the computer or an external NIC such a
USB NIC

communication services allows users on a network to communicate using various


mechanisms

file services provide the ability to share disk storage (folders, files, 
etc.) that are stored and managed on a network file server

database services provide the ability to maintain, update and query a 


database

internet services provides access to features such as WWW and FTP 


via an Internet server

mail services (email) is a form of communications services

management services supports the centralized control and administration of the


network

print services allow clients on a network to utilize printers that are 


attached to the network. Print server stores the material on
disk until a printer becomes available
Multiple Choice Questions

1. Network

1.  is the computer or device you are accessing via the network

2.  Device that enables a computer or other device 


on a network to connect to the network. NICs can be circuitry on the computers system board, a card
or board that is plugged into the computer or an external NIC such a USB NIC

3.  A personal computer that may or may not be connected to a network

4.  is a group of computers and possibly other devices (ex. printers) connected by some type
of transmission media (ex. wire, fiber optic, wireless)
b. What is a peer-to-peer network?

1.  A personal computer that may or may not be connected to a network

2.  A peer-to-peer network is a group of individual computers that can communicate with


each other in an environment in which :
(1) each computer manages itself
(2) no computer is in charge of network functions

3.  A part of a network that consists of a group of nodes 


that is connected to the remainder of the network via 
the same connectivity device

4.  are responsible for network management and utilize a common network security database
that contains security information (accounts, user names, passwords, rights, permissions, etc. ) for
the entire network
b. Understand how an account is required on each computer that a user wishes to access via the network.

1.  A personal computer that may or may not be connected to a network

2.  because network servers perform the network management functions for all computers on
the network and P2P networks don't function off of a network.

3.  On a P2P network. Because each computer manages its own resources, then changes made
on one computer (ex. changing passwords) would have to be repeated on every other computer if the
changes were to effect all of the computers

4.  is a network in which one or more computers (network servers) perform the network
management functions for all computers on the network. a client/server based network uses network
servers to manage network operations. NOT THE SAME AS client/server application
b. Addressing

1.  Device that enables a computer or other device 


on a network to connect to the network. NICs can be circuitry on the computers system board, a card or
board that is plugged into the computer or an external NIC such a USB NIC

2.  supports the centralized control and administration of the network


3.  A unique identifier assigned to each node on a network. When communicating on the
Internet, you must know (1) the address of the network you are communicating with AND (2) the
address of the node within the network

4.  allows users on a network to communicate using various mechanisms


b. Local computer

1.  is the computer you are working on

2.  When a computer IS NOT attached to a network.

3.  what a user can and cannot do

4.  is a form of communications services


b. Advantages of a P2P network

1.  (1) Easy to configure (if the network is small - 5 or less computers)


(2) Less expensive then Client/Server based networks

2.  LAN is confined to a relatively small area and WAN spans a large area.

3.  A single connection between multiple segments of a 


network.

4.  A personal computer that may or may not be connected to a network


b. What is a NIC (also known as Network 
Interface Card or Network Adapter)

1.  is the computer or device you are accessing via the network

2.  A personal computer that may or may not be connected to a network

3.  Device that enables a computer or other device 


on a network to connect to the network. NICs can be circuitry on the computers system board, a card
or board that is plugged into the computer or an external NIC such a USB NIC

4.  When a computer IS NOT attached to a network.


b. file services

1.  provide the ability to maintain, update and query a 


database

2.  provide the ability to share disk storage (folders, files, 


etc.) that are stored and managed on a network file server

3.  provides access to features such as WWW and FTP 


via an Internet server

4.  is the computer or device you are accessing via the network
b. What is the difference between LAN and WAN?

1.  is the computer or device you are accessing via the network

2.  is the computer you are working on

3.  LAN is confined to a relatively small area and WAN spans a large area.
4.  A single connection between multiple segments of a 
network.
b. What is a network client?

1.  supports the centralized control and administration of the network

2.  a term used by microsoft to refer to client/server based networks

3.  is a network in which one or more computers (network servers) perform the network
management functions for all computers on the network. a client/server based network uses network
servers to manage network operations. NOT THE SAME AS client/server application

4.  Computers that are attached to a client/server based network but DO NOT provide network
management functions
b. Permissions

1.  what a user can and cannot do

2.  supports the centralized control and administration of the network

3.  what resources a user can access and what the user can do with these resources

4.  is the computer or device you are accessing via the network
b. Remote Computer

1.  supports the centralized control and administration of the network

2.  is the computer you are working on

3.  is the computer or device you are accessing via the network

4.  When a computer IS NOT attached to a network.


b. Rights

1.  is the computer you are working on

2.  what a user can and cannot do

3.  When a computer IS NOT attached to a network.

4.  is a form of communications services


b. Disadvantages of a P2P network

1.  (1)Becomes difficult to manage as the network grows


(2) Difficult to fully secure due to variations in capabilities of various O/S and inconsistencies in how
security is implemented
(3) Not considered to be highly scalable due to technical limitations and problems relating to managing
each computer individually
(4) Limited application support - many network applications do not support the use of a peer-to-peer
network

2.  (1) Networks are mechanisms for sharing resources 


(2) Allow multiple users and/or applications to share a 
common set of data
(3) Networks can also be used to manage resources (install software, resolve problems, etc.) from a
central location.

3.  provides access to features such as WWW and FTP 


via an Internet server

4.  is sometimes used to refer to a network that connects multiple closely located buildings
b. Client

1.  because network servers perform the network management functions for all computers on
the network and P2P networks don't function off of a network.

2.  In a general context (without any qualifications) a 


client is a computer on a network that requests 
resources or services from other computers on the 
network

3.  In a general context (without any qualifications) a 


server is any computer or software that provides 
services to users (clients) on a network

4.  A personal computer that may or may not be connected to a network


b. What is the role of network server?

1.  are computers that provide services via a network (ex. database servers or web servers) but
DO NOT perform network management functions

2.  A unique identifier assigned to each node on a network. When communicating on the


Internet, you must know (1) the address of the network you are communicating with AND (2) the
address of the node within the network

3.  to utilize a special operating system known as a Network Operating System or NOS that is
capable of managing networks

4.  (1) Cost of the hardware (network server) and software 


(network operating system)
(2) Complex to install and maintain 
(3) Specialized expertise is required to manage client/server based networks
b. server

1.  In a general context (without any qualifications) a 


client is a computer on a network that requests 
resources or services from other computers on the 
network

2.  In a general context (without any qualifications) a 


server is any computer or software that provides 
services to users (clients) on a network

3.  A personal computer that may or may not be connected to a network

4.  provides access to features such as WWW and FTP 


via an Internet server
b. Disadvantages of a server based network
1.  are responsible for network management and utilize a common network security database
that contains security information (accounts, user names, passwords, rights, permissions, etc. ) for the
entire network

2.  Device that enables a computer or other device 


on a network to connect to the network. NICs can be circuitry on the computers system board, a card
or board that is plugged into the computer or an external NIC such a USB NIC

3.  A single connection between multiple segments of a 


network.

4.  (1) Cost of the hardware (network server) and software 


(network operating system)
(2) Complex to install and maintain 
(3) Specialized expertise is required to manage client/server based networks
b. print services

1.  A personal computer that may or may not be connected to a network

2.  When a computer IS NOT attached to a network.

3.  allow clients on a network to utilize printers that are 


attached to the network. Print server stores the material on disk until a printer becomes available

4.  allows users on a network to communicate using various mechanisms


b. What is a domain based network?

1.  is the computer or device you are accessing via the network

2.  a term used by microsoft to refer to client/server based networks

3.  A personal computer that may or may not be connected to a network

4.  When a computer IS NOT attached to a network.


b. mail services (email)

1.  is the computer you are working on

2.  what a user can and cannot do

3.  is a form of communications services

4.  When a computer IS NOT attached to a network.


b. Homegroups

1.  home and personnel computers or notebook computers. Refers back to peer-to-peer


network.

2.  A personal computer that may or may not be connected to a network

3.  is the computer or device you are accessing via the network

4.  personnel computers or notebook computers. Refers back to peer-to-peer network


b. What is a metropolitan area network (MAN)?

1.  allows users on a network to communicate using various mechanisms


2.  a term used by microsoft to refer to client/server based networks

3.  is sometimes used to refer to a network that connects multiple closely located buildings

4.  A personal computer that may or may not be connected to a network


b. topology

1.  A single connection between multiple segments of a 


network.

2.  The physical layout of a network. The most commonly used topologies are:
Bus topology and star topology

3.  A personal computer that may or may not be connected to a network

4.  allows users on a network to communicate using various mechanisms


b. management services

1.  When a computer IS NOT attached to a network.

2.  is the computer you are working on

3.  is the computer or device you are accessing via the network

4.  supports the centralized control and administration of the network


b. What is the difference between client 
processing based application and server 
processing based application?

1.  The means through which data is transmitted and received. Can be physical (wire or fiber
optic) or atmospheric (microwave or radio)

2.  A unique identifier assigned to each node on a network. When communicating on the


Internet, you must know (1) the address of the network you are communicating with AND (2) the
address of the node within the network

3.  Topic addresses how the data is processed on a network as opposed to topic 5 which dealt
with how the network is managed

4.  allows users on a network to communicate using various mechanisms


b. client/server application and distributed processing (when used in the context of applications)

1.  The terms client/server application and distributed processing, when used in the context
of applications, refers to a design that combines clients and servers in order to process data

2.  supports the centralized control and administration of the network

3.  LAN is confined to a relatively small area and WAN spans a large area.

4.  is the computer or device you are accessing via the network
b. Workgroups

1.  personnel computers or notebook computers. Refers back to peer-to-peer network

2.  is the computer or device you are accessing via the network
3.  home and personnel computers or notebook computers. Refers back to peer-to-peer
network.

4.  A personal computer that may or may not be connected to a network


b. node or host

1.  A specialized device that allows multiple nodes 


or multiple networks to connect and communicate with each other

2.  Client, server or other device that is directly


connected via a network and can communicate over 
the network

3.  is the computer or device you are accessing via the network

4.  A personal computer that may or may not be connected to a network


b. database services

1.  provide the ability to maintain, update and query a 


database

2.  is a form of communications services

3.  A single connection between multiple segments of a 


network.

4.  is the computer or device you are accessing via the network
b. connectivity device

1.  Client, server or other device that is directly


connected via a network and can communicate over 
the network

2.  Device that enables a computer or other device 


on a network to connect to the network. NICs can be circuitry on the computers system board, a card
or board that is plugged into the computer or an external NIC such a USB NIC

3.  A specialized device that allows multiple nodes 


or multiple networks to connect and communicate with each other

4.  A single connection between multiple segments of a 


network.
b. Why do network servers only exist on a server based network?

1.  A peer-to-peer network is a group of individual computers that can communicate with


each other in an environment in which :
(1) each computer manages itself
(2) no computer is in charge of network functions

2.  provide the ability to maintain, update and query a 


database
3.  are responsible for network management and utilize a common network security database
that contains security information (accounts, user names, passwords, rights, permissions, etc. ) for
the entire network

4.  A single connection between multiple segments of a 


network.
b. Why are networks used?

1.  A part of a network that consists of a group of nodes 


that is connected to the remainder of the network via 
the same connectivity device

2.  is a network in which one or more computers (network servers) perform the network
management functions for all computers on the network. a client/server based network uses network
servers to manage network operations. NOT THE SAME AS client/server application

3.  (1) Networks are mechanisms for sharing resources 


(2) Allow multiple users and/or applications to share a 
common set of data
(3) Networks can also be used to manage resources (install software, resolve problems, etc.) from a
central location.

4.  (1)Becomes difficult to manage as the network grows


(2) Difficult to fully secure due to variations in capabilities of various O/S and inconsistencies in how
security is implemented
(3) Not considered to be highly scalable due to technical limitations and problems relating to
managing each computer individually
(4) Limited application support - many network applications do not support the use of a peer-to-
peer network
b. What is a stand-alone computer?

1.  what a user can and cannot do

2.  is the computer or device you are accessing via the network

3.  When a computer IS NOT attached to a network.

4.  is the computer you are working on


b. workstation

1.  is the computer you are working on

2.  A personal computer that may or may not be connected to a network

3.  When a computer IS NOT attached to a network.

4.  is the computer or device you are accessing via the network
b. what is a client/server network?

1.  supports the centralized control and administration of the network

2.  is a network in which one or more computers (network servers) perform the network
management functions for all computers on the network. a client/server based network uses network
servers to manage network operations. NOT THE SAME AS client/server application
3.  Computers that are attached to a client/server based network but DO NOT provide network
management functions

4.  personnel computers or notebook computers. Refers back to peer-to-peer network


b. What is a Network Operating System (NOS)?

1.  allows users on a network to communicate using various mechanisms

2.  LAN is confined to a relatively small area and WAN spans a large area.

3.  capable of managing networks. Windows 200x Server, ((ex. 2008 Server), UNIX, LINUX, and
MAC OS X Server are examples of network operating system)

4.  a term used by microsoft to refer to client/server based networks


b. What is the role of client operating system?

1.  provide the ability to maintain, update and query a 


database

2.  manages the operation of the client (ex. starting programs, allocating memory and
accessing disk drives on the client) and interfaces with the network operating system for network
operations
(1) Windows XP and Windows 7 are examples of client O/S in Windows
(2) Windows Server is also a client operating system when it is running on a computer that is not a
network server (a server that is not performing network management functions)

3.  Devices (ex. printers or disk drives), data and programs accessed via a network

4.  LAN is confined to a relatively small area and WAN spans a large area.
b. What is a packet?

1.  is the computer or device you are accessing via the network

2.  what resources a user can access and what the user can do with these resources

3.  supports the centralized control and administration of the network

4.  Unit of data that is transmitted across a network. The actual data that is sent across a
network (ex. an entire 
file) is usually too big to be transmitted as a single unit and must be broken up into smaller units
known as packets.
b. Advantages of server based network

1.  are responsible for network management and utilize a common network security database
that contains security information (accounts, user names, passwords, rights, permissions, etc. ) for the
entire network

2.  LAN is confined to a relatively small area and WAN spans a large area.

3.  (1) Higher level of security


(2) Highly scalable due to (a) use of a common database to store network management information
and (b) ability of network operating system software to support large complex networks
(3) Supports a wider range of network based applications due to the ability of NOS to provide more
extensive support to these applications
4.  provide the ability to maintain, update and query a 
database
b. What is a member server?

1.  Computers that are attached to a client/server based network but DO NOT provide network
management functions

2.  are computers that provide services via a network (ex. database servers or web servers) but
DO NOT perform network management functions

3.  is the computer or device you are accessing via the network

4.  A personal computer that may or may not be connected to a network


b. communication services

1.  allows users on a network to communicate using various mechanisms

2.  is a form of communications services

3.  is the computer you are working on

4.  is the computer or device you are accessing via the network
b. Why are network servers NOT used on a P2P network?

1.  In a general context (without any qualifications) a 


client is a computer on a network that requests 
resources or services from other computers on the 
network

2.  because network servers perform the network management functions for all computers on
the network and P2P networks don't function off of a network.

3.  supports the centralized control and administration of the network

4.  is sometimes used to refer to a network that connects multiple closely located buildings
b. Backbone

1.  A single connection between multiple segments of a 


network.

2.  A personal computer that may or may not be connected to a network

3.  When a computer IS NOT attached to a network.

4.  is the computer or device you are accessing via the network
b. internet services

1.  is the computer or device you are accessing via the network

2.  When a computer IS NOT attached to a network.

3.  provides access to features such as WWW and FTP 


via an Internet server

4.  provide the ability to maintain, update and query a 


database
b. What is a resource?

1.  is the computer or device you are accessing via the network

2.  Devices (ex. printers or disk drives), data and programs accessed via a network

3.  When a computer IS NOT attached to a network.

4.  A personal computer that may or may not be connected to a network


b. transmission media

1.  Topic addresses how the data is processed on a network as opposed to topic 5 which dealt
with how the network is managed

2.  what resources a user can access and what the user can do with these resources

3.  LAN is confined to a relatively small area and WAN spans a large area.

4.  The means through which data is transmitted and received. Can be physical (wire or fiber
optic) or atmospheric (microwave or radio)
b. segment

1.  A personal computer that may or may not be connected to a network

2.  allow clients on a network to utilize printers that are 


attached to the network. Print server stores the material on disk until a printer becomes available

3.  A peer-to-peer network is a group of individual computers that can communicate with


each other in an environment in which :
(1) each computer manages itself
(2) no computer is in charge of network functions

4.  A part of a network that consists of a group of nodes 


that is connected to the remainder of the network via 
the same connectivity device

Intro to networking concepts


Terms Definitions

4G Cellular technology that focuses on real time multimedia

10.134.12.9 Private IP Address

127.0.0.1 Most popular Loopback Address

128.211.0.16/28 CIDR Notation

802.11g Wireless standard that specifies a data rate of 2.4Ghz


802.11i Wireless standard that specifies enhanced security such as
WPA2

802.11n wireless standard that specifies a data rate over 100 Mbps

802.11 WiFI standard

802.15 Pan standards

A wireless WAN technology WiFi

Access Delay Time needed to obtain access to the transmission medium

access point Home base for wireless stations

ACK A small message that reports successful reception of a frame

Anycast Address that corresponds to a set a computer that share a


common prefix

ARP Protocol that converts between IP protocol and hardware


adddress

ARP Cache Small table of address bindings held in memory.

ARPANET The first Internet backbone

BGP Commonly used External Gateway Control used in the Internet

Bluetooth Personal area wireless technology for exchanging data over


short distances

BOOTP Predecessor to DHCP

Bridge Connects two LAN segments and forward frames

Broadcast Address Address that consist of all 1 bits and is sent across a network

Buffer allocated by the sliding windows technique as a place to hold


incoming data
Can do hierarchical routing OSPF

CDMA Cellular technology commonly used in US

Cypher Text A message after it has been ecrypted

Datagram Packet sent across TCP/IP Internet

DHCP Protocol that converts between IP protocol and hardware


address

Digital Certificates Provides sender authentication

Digital Signatures Provides message authentication

Distance Vector Routing algorithm where each link is assigned a weight and
distance

DoS Making a copy of packets as they traverse the internet to


obtain information

Dotted Decimal Notation Conversion of a binary IP Address to a convention where each


octet is expressed in decimal

Echo Used by Ping

EGP Used by router to exchange routing information w/ a router in


a different autonomous system

Encapsulation Placing IP Datagram in the Payload of a frame for transmission


across physical network

Encryption Provides privacy

Firewall Helps protect an organization's network from unwanted


Internet traffic

Forwarding Table A set of values that specify a destination and the next hop
used to reach that destination.
GPS System of satellites that provide accurate time and location
information.

GSM Cellular technology commonly used in Europe

Hashing Provides data integrity

HTTPS Uses port 443 to provide authenticated, confidential


communication over the web

Hub analog device, provides multiple ports to attach computers,


handles signals not packets

ICANN An organization established to handle Internet Address


assignment

ICMP Protocol that is used to report errors in transmission back to


the original sender

IGMP Protocol that allows a host to join or leave a multicast group

IGP Used by routers within an autonomous system to exchange


routing information

InfraRED Line of sight communication between a small device and


nearby system

IPv4 Uses 32 bit addresses

IPv6 Uses 128 bit addresses

ISM wireless "Areas of the electromagnetic spectrum that can be used by


Industrial, Scientific and Medical groups and are broadly
available for products"

Jitter The changes in delay that occur and the duration of the
changes

LAN Spans a building or campus


Latency Time required to transfer data across a network

Layer 3 of the TCP/IP model Layer at which a router functions

Layer 4 of the TCP/IP model Specifies messages and procedures used to reliable transfer

Link State "Also known as shortest path first, based on Dijkstra's


algorithm and can detect link failures"

Loopback Address Used to test network applications

MAC Address Used by link Layer of the TCP/IP model

MTU Maximum amount of data a frame can carry

Multicast Address corresponds to a set of computers

NAT Mechanism to allow computer to share a single globaly valid IP


address

One of the original IGP RIP


protocols uses

OSPF a commonly used Internal Gateway Control.

Packet Filter A mechanism that examines fields in each packet header and
decides to allow it to pass or not

Packet Switching Uses Store and Forward

PAN Spans region near an individual

payload data area of the packet

PGP Developed at MIT a system applications can use to encrypt


data before transmission

Phishing Masquerading as a well-know site to obtain personal


information
ping None of the above

Plaintext An original message before it has been encrypted

Port number A part of the IPv6 header

Privated Key encryption Uses a single key shared by communication entities

Propagation Delay The time required for a signal to travel across a transmission
medium

Public Key encryption uses a pair of keys

QoS Mechanisms that are used to implement service quarantees

Queuing Delay Time a packet spends in memory of a switch or router waiting


to be selected for transmission

Radius A protocol used to centralize authentication, authorization and


accounting

Repeater Analog device used to propagate LAN signals over long


distances - simply amplifies the signal

RFID Used to pull information from tags on merchandise

RIP Uses Hop Count Routing Metric

Router "Can interconnect networks w/ different technologies, media,


addressing"

Routing Protocol that uses OSPF


Link State

RSVP Fine Grain QoS

RTP Provides the mechanism to transmit real-time data across the


Internet

Sliding Window Technique used for flow control by TCP


SMS A message service used for texting

Spanning Tree Protocol that allows bridges to work in a circular configuration

Spread Spectrum Can help wireless LAN's function in noisy environments


Transmission

SSL Fits between the application and socket API and encrypts data
before transmission

Static Routing Has the advantages of simplicity and low overhead

Subnet Mask Marks the boundary between the network prefix and host
prefix

Switch Digital device, provides multiple ports to attach computer,


forward packets

SYN Flood Sending a stream of random segments to exhaust a receiver's


set of TCP Connections

TCP Full Duplex

Three-way handshake Used by TCP to guarantee a connection is established and


terminated properly

Throughput Amount of data that can be transferred per unit of time

Time to Live Value decremented by each router that processes a datagram -


which is discarded when the value reaches 0

Type of address a bridge MAC


uses for forwarding?

UDP Best effort

Unicast Address corresponds to a single computer

VLAN Switch Divides computers into separate broadcast domains


VoIP Replaces traditional telephone switches with IP routers

VSAT Short distances protocol used in PANS

WAN Spans multiple cities or countries

WEP Original security for Wi-Fi has weakness such as a short static
key

Wiretapping Making a copy of packets as they traverse the Internet to


obtain information

Zigbee technology Wireless standard for remote control, not data


Multiple Choice Questions

1. Specifies messages and procedures used to reliable transfer

1.  Time to Live

2.  Layer 3 of the TCP/IP model

3.  Layer 4 of the TCP/IP model

4.  Packet Filter
b. WiFi

a.  Wiretapping

b.  ISM wireless

c.  A wireless WAN technology

d.  Packet Switching
a. a commonly used Internal Gateway Control.

a.  QoS

b.  OSPF

c.  WEP

d.  GPS
a. Connects two LAN segments and forward frames

a.  Router

b.  Bridge

c.  RIP

d.  ARP
a. Personal area wireless technology for exchanging data over short distances

a.  Bluetooth

b.  BOOTP

c.  Switch

d.  Buffer
a. analog device, provides multiple ports to attach computers, handles signals not packets

a.  DHCP

b.  BGP

c.  PAN

d.  Hub
a. Used to test network applications

a.  Packet Filter
b.  Link State

c.  MAC Address

d.  Loopback Address
a. None of the above

a.  PAN

b.  ping

c.  IGP

d.  PGP
a. The time required for a signal to travel across a transmission medium

a.  Router

b.  Plaintext

c.  Repeater

d.  Propagation Delay
a. Value decremented by each router that processes a datagram - which is discarded when the value
reaches 0

a.  Time to Live

b.  access point

c.  Firewall

d.  IPv6
a. Wireless standard that specifies a data rate of 2.4Ghz

a.  802.11

b.  802.11n

c.  4G

d.  802.11g
a. The changes in delay that occur and the duration of the changes

a.  VSAT

b.  IPv4

c.  Router

d.  Jitter
a. Routing algorithm where each link is assigned a weight and distance

a.  VLAN Switch

b.  Static Routing

c.  Distance Vector
d.  Link State
a. Packet sent across TCP/IP Internet

1.  Datagram

2.  Jitter

3.  NAT

4.  IGP
b. Cellular technology that focuses on real time multimedia

1.  BGP

2.  NAT

3.  4G

4.  EGP
b. Divides computers into separate broadcast domains

1.  VLAN Switch

2.  Latency

3.  Switch

4.  LAN
b. Protocol that allows a host to join or leave a multicast group

1.  PGP

2.  GSM

3.  IGMP

4.  IGP
b. Pan standards

1.  802.11n

2.  PGP

3.  MTU

4.  802.15
b. A message after it has been ecrypted

1.  Repeater

2.  Plaintext

3.  InfraRED

4.  Cypher Text
b. Uses port 443 to provide authenticated, confidential communication over the web

1.  TCP
2.  HTTPS

3.  MTU

4.  GPS
b. MAC

1.  Can do hierarchical routing

2.  One of the original IGP protocols uses

3.  Broadcast Address

4.  Type of address a bridge uses for forwarding?


b. Time a packet spends in memory of a switch or router waiting to be selected for transmission

1.  Hashing

2.  Queuing Delay

3.  ping

4.  Link State
b. Line of sight communication between a small device and nearby system

1.  ARPANET

2.  Anycast

3.  InfraRED

4.  Repeater
b. OSPF

1.  Link State

2.  Time to Live

3.  Digital Certificates

4.  Routing Protocol that uses Link State


b. Short distances protocol used in PANS

1.  QoS

2.  WEP

3.  PAN

4.  VSAT
b. Provides data integrity

1.  ping

2.  Hashing

3.  Radius

4.  PAN
b. Protocol that converts between IP protocol and hardware adddress

1.  RIP

2.  ARP

3.  RTP

4.  IGP
b. Uses Store and Forward

1.  Phishing

2.  Packet Filter

3.  VLAN Switch

4.  Packet Switching
b. Uses 128 bit addresses

1.  GPS

2.  RIP

3.  IPv6

4.  RSVP
b. Digital device, provides multiple ports to attach computer, forward packets

1.  Switch

2.  RTP

3.  DHCP

4.  RFID
b. Wireless standard that specifies enhanced security such as WPA2

1.  802.15

2.  802.11i

3.  802.11n

4.  IGMP
b. Provides the mechanism to transmit real-time data across the Internet

1.  TCP

2.  RIP

3.  RTP

4.  WEP
b. Best effort

1.  PGP

2.  RIP
3.  ARP

4.  UDP
b. Layer at which a router functions

1.  Public Key encryption

2.  Zigbee technology

3.  ARP Cache

4.  Layer 3 of the TCP/IP model


b. Technique used for flow control by TCP

1.  SYN Flood

2.  Sliding Window

3.  Switch

4.  Queuing Delay
b. Protocol that is used to report errors in transmission back to the original sender

1.  ICMP

2.  Echo

3.  ICANN

4.  IGMP
b. data area of the packet

1.  Anycast

2.  payload

3.  VSAT

4.  SYN Flood
b. "Areas of the electromagnetic spectrum that can be used by Industrial, Scientific and Medical groups
and are broadly available for products"

1.  Firewall

2.  Cypher Text

3.  GSM

4.  ISM wireless
b. Original security for Wi-Fi has weakness such as a short static key

1.  EGP

2.  RIP

3.  WEP

4.  PGP
b. Time required to transfer data across a network
1.  TCP

2.  Latency

3.  NAT

4.  LAN
b. An organization established to handle Internet Address assignment

1.  PAN

2.  ARP

3.  ICANN

4.  Unicast
b. Helps protect an organization's network from unwanted Internet traffic

1.  SSL

2.  Jitter

3.  ICANN

4.  Firewall
b. Provides message authentication

1.  MAC Address

2.  Digital Signatures

3.  Link State

4.  Wiretapping
b. Sending a stream of random segments to exhaust a receiver's set of TCP Connections

1.  InfraRED

2.  RFID

3.  payload

4.  SYN Flood
b. Placing IP Datagram in the Payload of a frame for transmission across physical network

1.  Unicast

2.  VSAT

3.  LAN

4.  Encapsulation
b. Conversion of a binary IP Address to a convention where each octet is expressed in decimal

1.  Zigbee technology

2.  Public Key encryption

3.  Dotted Decimal Notation


4.  Time to Live
b. "Can interconnect networks w/ different technologies, media, addressing"

1.  Router

2.  Repeater

3.  BOOTP

4.  RTP
b. Uses a single key shared by communication entities

1.  Dotted Decimal Notation

2.  Packet Switching

3.  Privated Key encryption

4.  Packet Filter
Answer Key
Multiple Choice Questions

1. Specifies messages and procedures used to reliable transfer (No Answer)


a. Time to Live
b. Layer 3 of the TCP/IP model
c. CORRECT: Layer 4 of the TCP/IP model
d. Packet Filter
a. WiFi(No Answer)
a. Wiretapping
b. ISM wireless
c. CORRECT: A wireless WAN technology
d. Packet Switching
a. a commonly used Internal Gateway Control. (No Answer)
1. QoS
2. CORRECT: OSPF
3. WEP
4. GPS
b. Connects two LAN segments and forward frames (No Answer)
1. Router
2. CORRECT: Bridge
3. RIP
4. ARP
b. Personal area wireless technology for exchanging data over short distances (No Answer)
1. CORRECT: Bluetooth
2. BOOTP
3. Switch
4. Buffer
b. analog device, provides multiple ports to attach computers, handles signals not packets (No Answer)
1. DHCP
2. BGP
3. PAN
4. CORRECT: Hub
b. Used to test network applications (No Answer)
1. Packet Filter
2. Link State
3. MAC Address
4. CORRECT: Loopback Address
b. None of the above(No Answer)
1. PAN
2. CORRECT: ping
3. IGP
4. PGP
b. The time required for a signal to travel across a transmission medium (No Answer)
1. Router
2. Plaintext
3. Repeater
4. CORRECT: Propagation Delay
b. Value decremented by each router that processes a datagram - which is discarded when the value
reaches 0(No Answer)
1. CORRECT: Time to Live
2. access point
3. Firewall
4. IPv6
b. Wireless standard that specifies a data rate of 2.4Ghz (No Answer)
1. 802.11
2. 802.11n
3. 4G
4. CORRECT: 802.11g
b. The changes in delay that occur and the duration of the changes(No Answer)
1. VSAT
2. IPv4
3. Router
4. CORRECT: Jitter
b. Routing algorithm where each link is assigned a weight and distance (No Answer)
1. VLAN Switch
2. Static Routing
3. CORRECT: Distance Vector
4. Link State
b. Packet sent across TCP/IP Internet(No Answer)
1. CORRECT: Datagram
2. Jitter
3. NAT
4. IGP
b. Cellular technology that focuses on real time multimedia (No Answer)
1. BGP
2. NAT
3. CORRECT: 4G
4. EGP
b. Divides computers into separate broadcast domains (No Answer)
1. CORRECT: VLAN Switch
2. Latency
3. Switch
4. LAN
b. Protocol that allows a host to join or leave a multicast group (No Answer)
1. PGP
2. GSM
3. CORRECT: IGMP
4. IGP
b. Pan standards(No Answer)
1. 802.11n
2. PGP
3. MTU
4. CORRECT: 802.15
b. A message after it has been ecrypted(No Answer)
1. Repeater
2. Plaintext
3. InfraRED
4. CORRECT: Cypher Text
b. Uses port 443 to provide authenticated, confidential communication over the web (No Answer)
1. TCP
2. CORRECT: HTTPS
3. MTU
4. GPS
b. MAC(No Answer)
1. Can do hierarchical routing
2. One of the original IGP protocols uses
3. Broadcast Address
4. CORRECT: Type of address a bridge uses for forwarding?
b. Time a packet spends in memory of a switch or router waiting to be selected for transmission (No
Answer)
1. Hashing
2. CORRECT: Queuing Delay
3. ping
4. Link State
b. Line of sight communication between a small device and nearby system (No Answer)
1. ARPANET
2. Anycast
3. CORRECT: InfraRED
4. Repeater
b. OSPF(No Answer)
1. Link State
2. Time to Live
3. Digital Certificates
4. CORRECT: Routing Protocol that uses Link State
b. Short distances protocol used in PANS(No Answer)
1. QoS
2. WEP
3. PAN
4. CORRECT: VSAT
b. Provides data integrity(No Answer)
1. ping
2. CORRECT: Hashing
3. Radius
4. PAN
b. Protocol that converts between IP protocol and hardware adddress (No Answer)
1. RIP
2. CORRECT: ARP
3. RTP
4. IGP
b. Uses Store and Forward(No Answer)
1. Phishing
2. Packet Filter
3. VLAN Switch
4. CORRECT: Packet Switching
b. Uses 128 bit addresses(No Answer)
1. GPS
2. RIP
3. CORRECT: IPv6
4. RSVP
b. Digital device, provides multiple ports to attach computer, forward packets (No Answer)
1. CORRECT: Switch
2. RTP
3. DHCP
4. RFID
b. Wireless standard that specifies enhanced security such as WPA2 (No Answer)
1. 802.15
2. CORRECT: 802.11i
3. 802.11n
4. IGMP
b. Provides the mechanism to transmit real-time data across the Internet (No Answer)
1. TCP
2. RIP
3. CORRECT: RTP
4. WEP
b. Best effort(No Answer)
1. PGP
2. RIP
3. ARP
4. CORRECT: UDP
b. Layer at which a router functions(No Answer)
1. Public Key encryption
2. Zigbee technology
3. ARP Cache
4. CORRECT: Layer 3 of the TCP/IP model
b. Technique used for flow control by TCP(No Answer)
1. SYN Flood
2. CORRECT: Sliding Window
3. Switch
4. Queuing Delay
b. Protocol that is used to report errors in transmission back to the original sender (No Answer)
1. CORRECT: ICMP
2. Echo
3. ICANN
4. IGMP
b. data area of the packet(No Answer)
1. Anycast
2. CORRECT: payload
3. VSAT
4. SYN Flood
b. "Areas of the electromagnetic spectrum that can be used by Industrial, Scientific and Medical groups
and are broadly available for products" (No Answer)
1. Firewall
2. Cypher Text
3. GSM
4. CORRECT: ISM wireless
b. Original security for Wi-Fi has weakness such as a short static key (No Answer)
1. EGP
2. RIP
3. CORRECT: WEP
4. PGP
b. Time required to transfer data across a network (No Answer)
1. TCP
2. CORRECT: Latency
3. NAT
4. LAN
b. An organization established to handle Internet Address assignment (No Answer)
1. PAN
2. ARP
3. CORRECT: ICANN
4. Unicast
b. Helps protect an organization's network from unwanted Internet traffic (No Answer)
1. SSL
2. Jitter
3. ICANN
4. CORRECT: Firewall
b. Provides message authentication(No Answer)
1. MAC Address
2. CORRECT: Digital Signatures
3. Link State
4. Wiretapping
b. Sending a stream of random segments to exhaust a receiver's set of TCP Connections (No Answer)
1. InfraRED
2. RFID
3. payload
4. CORRECT: SYN Flood
b. Placing IP Datagram in the Payload of a frame for transmission across physical network (No Answer)
1. Unicast
2. VSAT
3. LAN
4. CORRECT: Encapsulation
b. Conversion of a binary IP Address to a convention where each octet is expressed in decimal (No
Answer)
1. Zigbee technology
2. Public Key encryption
3. CORRECT: Dotted Decimal Notation
4. Time to Live
b. "Can interconnect networks w/ different technologies, media, addressing" (No Answer)
1. CORRECT: Router
2. Repeater
3. BOOTP
4. RTP
b. Uses a single key shared by communication entities (No Answer)
1. Dotted Decimal Notation
2. Packet Switching
3. CORRECT: Privated Key encryption
4. Packet Filter

You might also like