Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
58 Cards in this Set
- Front
- Back
A Windows and Unix command used to troubleshoot network connections. It verifies that the host can communicate with another host on the network
|
Ping (Packet Internet Groper)
|
|
A 48-bit hardware address unique to each NIC.
|
MAC address
|
|
The process of associating a NetBIOS name or host name to an IP address
|
name resolution
|
|
a network cable that is used to connect a PC to a hub, switch, or router.
|
patch cable
|
|
Segment of network data that also includes header, destination address, and trailer info that is sent as a unit
|
packet
|
|
term for each of the four 8-bit numbers that make up an IP address
|
octet
|
|
Microsoft's version of the IPX/SPX protocol suite used by Novell NetWare OS
|
NWLink
|
|
A text file located in the Windows folder that contains NetBIOS names and their associated IP address. This file is used for name resolution for a NetBEUI network
|
LMHosts
|
|
An API protocol used by some applications to communicate over a NetBEUI network. Replaced by Windows socket over a TCP/IP network
|
NetBIOS (Network Basic Input/Output System)
|
|
a fast, proprietary Microsoft networking protocol used only by Windows-based systems, and limited to LAN b/c routing isnt supported
|
NetBEUI (NetBIOS Extended User Interface)
|
|
A networking protocol suite first used by Novell Netware, and which corresponds to the TCP/IP protocols
|
IPX/SPX (Internetwork Packet Exchange/Sequenced Packet Exchange)
|
|
a computer or other device that connects networks
|
gateway
|
|
any computer or other device on a network that has been assigned an IP address. AKA a node
|
host
|
|
a host name and a domain name such as jsmith.amazon.com. AKA a domain name
|
fully qualified domain name (FQDN)
|
|
The header and trailer info added to data to form a data packet to be sent over a network
|
frame
|
|
a unique, text-based name that identifies a network
|
domain name
|
|
a name that identifies a computer, printer, or other device on a network
|
host name
|
|
a computer that can find an IP address for another computer when only the domain name is known
|
DNS server
|
|
a distributed pool of info that keeps track of assigned domain names and their corresponding IP addresses
|
DNS (Domain Name Service)
|
|
a service that assigns dynamic IP addresses to computers on a network when they first access the network
|
DHCP (Dynamic Host Configuration Protocol)
|
|
the gateway a computer on a network will use to access another network unless it knows to specifically use another gateway for quicker access to that network
|
default gateway
|
|
a group of four dotted numbers that tells TCP/IP if a computer's IP address is on the same or different newtwork than another computer
|
subnet mask
|
|
Subnet masks that have a mix of zeroes and ones in one octet. Used to segment large corporate networks into subnetworks or subnets using (CIDR)
|
classless subnet masks
|
|
Subnet masks that use all ones or all zeros in an an octet
|
classful subnet masks
|
|
The process by which a protocol is associated with a network card or modem
|
binding
|
|
an IP address in the address range 169.254.x.x, used b a computer when it cannot successfully lease an IP address from a DHCP server
|
Automatic Private IP Address (APIPA)
|
|
10.0.0.0 - 10.255.255.255
172.16.0.0 - 172.31.255.255 192.168.0.0-192.168.255.255 |
Private IP address
|
|
a server that acts as a intermediary between another computer and the internet. It substitutes its own IP address for the IP address of the computer
|
proxy server
|
|
the suite of protocols that supports communication on the internet. _____ is responsible for error checking, and ____ is responsible for routing.
|
TCP/IP (Transmission Control Protocol/Internet Protocol)
|
|
a data encryption method used on wireless networks that uses either 64-bit ir 128-bit encryption that are static keys
|
WEP (Wired Equivalent Privacy)
|
|
a Microsoft resolution service with a distributed database that tracks relationships between NetBIOS names and IP addresses. Compare to DNS
|
WINS (Windows Internet Naming Service)
|
|
a data encryption method for wireless networks that use the TKIP (Temporary Key Integrity Protocol) encryption method and the encryption keys are changed at set intervals
|
WPA (WiFi Protected Access)
|
|
a data encryption standard compliant with the IEEE802.11i standard that uses the AES (Advanced Encryption Standard) protocol. strongest
|
WPA2 (WiFi Protected Access 2)
|
|
1.Name the three types of Ethernet. What transmission speed does each support. (pg 404)
|
•10-Mbps
•100-Mbps or Fast Ethernet •1000-Mbps or Gigabit Ethernet |
|
2.When using dynamic IP addressing, what type of server must be on the network? (pg 419)
|
•DHCP (Dynamic Host Configuration Protocol) Server
|
|
3.Give an example of a classful subnet mask. Give an example of a classless subnet mask. (pg 416)
|
•Classful: 11111111.11111111.11111111.00000000 (255.255.255.0.)
•Classless: 11111111.11111111.11110000.00000000 (255.255.240.0.) |
|
4.Which is more efficient for network traffic, a switch or a hub? Why?
|
•Switch, because a switch actively routes data
|
|
5.Is 172.16.50.100 intended to a public or private address?
|
•Private (pg 417)
|
|
6.What are the three ways a wireless network can be secured? (pg 452)
|
•WEP (Wired Equivalent Privacy)
•WPA (WiFi Protected Access) •WPA2 |
|
7.What connecting device do you use for a small LAN? For two or more connected networks?
|
•For a small LAN network, a switch is best. To connect two or more LAN networks, a router is required.
|
|
8.Describe the structure of an IP address. How is it different from MAC address? (pg 414-416)
|
•IP Address: 32-bits long, made up of 4 bytes, 4 (8-bit) Octets separated by periods
•MAC Address: 48-bit (6-byte) number; six pairs of hex numbers separated by dashes |
|
9.How many potential IP address are there?
|
•4.3 billion IP Addresses (pg 414)
|
|
10.How many networks and addresses are available for class A IP addresses? Class B? Class C? (pg 415)
|
•Class A: Networks: 127, Addresses: 16 million
•Class B: Networks: 16,000, Addresses: 65,000 •Class C: Networks: 2 Million, Addresses: 254 |
|
11.Why are class D and E addresses not available to individuals and companies? (pg 416)
|
•Class D: multicasting
•Class E: research |
|
12.Which octets are used for the network address and for host addresses in Class A? Class B? Class C? (pg 415)
|
•Class A: Octet 1: Network Octet 2-4: Host
•Class B: Octet 1-2: Network Octet 3-4: Host •Class C: Octet 1-3: Network Octet 4: Host |
|
13.In what class is the IP address 185.75.255.10
|
•Class B (pg 415)
|
|
14.In what class is the IP address 193.200.30.5?
|
•Class C (pg 415)
|
|
15.Describe the difference between public and private IP addresses. If a network is using private IP addresses, how can the computers on the network access the Internet? (pg 417-419) proxy server pg 420
|
•Public address is used to connect to the internet
•Private address is only intended to be used on private intranets •Uses a DHCP server to lease an IP address |
|
16.Why is it unlikely that you will find the IP address 192.168.250.10 on the internet? (pg 417)
|
•It is a private IP Address
|
|
17.Which windows OS doesn’t automatically include the NetBEUI protocol?
|
•Windows XP (pg 410)
|
|
18.What are the two ways an IP address can be assigned to a PC? What is one advantage of each?
|
Dynamic
Static |
|
19.What are the Ping, Ipconfig, and Winipcfg utilities used for? (pg 458)
|
•Ping: is a useful TCP/IP utility to check network connectivity
•Ipconfig/Winipcfg: IP address is assigned and the IP address, subnet mask, and the default gateway appear along with the adapter address |
|
20.Of IPX/SPX, TCP/IP, and NetBEUI, which is routable and which is not? (pg 410)
|
•NetBEUI is not routable
|
|
21.When a PC reports it has used an automatic private IP address, what can you assume about the network configuration and current connectivity?
|
•That it uses DHCP server and that it can’t connect to the server
|
|
22.A network uses a subnet mask of 255.255.255.0 and has a computer on the network with the IP address of 120.12.12.3. Will the IP address 120.12.10.3 be on the network? Explain your answer?
|
•No because the first three octets don’t match (pg416)
|
|
23.What networking protocol was first used by Novell Netware and is not supported on the internet? (pg 410)
|
•IPX/SPX
|
|
24.If you were going to connect two PCs together in a simple network using the network ports on each PC, what type of cable would you use?
|
•Crossover Cable (pg 404)
|
|
25.Which name resolution service is used on the Internet, DNS or WINS? Why?
|
•DNS and WINS track the relationship between host names and IP addresses
|