-
What is a host?
All computers that are connected to a network and that participate directly in network communication
-
What terms can be interchanged with the term host?
end devices, endpoints, or nodes.
-
-
What is a Web Server?
The web server runs web server software that allows many computers to access web pages.
-
What is a Email Server?
The email server runs email server software that enables emails to be sent and received.
-
What is an Internet Exchange Point (IXP)
-
What does the acronym IXP stand for?
Internet Exchange Point
-
What is a Point of Presence (PoP)?
-
What are network protocols?
Are the set of rules that computers follow to communicate with eachother
-
List some Application Layer protocols.
- • DNS - Domain Name System.
- • DHCPv4 - Dynamic Host Configuration Protocol for IPv4.
- • DHCPv6 - Dynamic Host Configuration Protocol for IPv6.
- • SLAAC - Stateless Address Autoconfiguration.
- • SMTP - Simple Mail Transfer Protocol.
- • POP3 - Post Office Protocol version 3.
- • IMAP - Internet Message Access Protocol.
- • FTP - File Transfer Protocol.
- • SFTP - SSH File Transfer Protocol.
- • TFTP - Trivial File Transfer Protocol.
- • HTTP - Hypertext Transfer Protocol
- • HTTPS - HTTP Secure.
- • REST - Representational State Transfer
-
List some Transport Layer Protocols.
- • TCP - Transmission Control Protocol.
- • UDP - User Datagram Protocol.
-
List some Internet Layer Protocols.
- • IPv4 - Internet Protocol version 4.
- • IPv6 - Internet Protocol version 6
- • NAT - Network Address Translation.
- • ICMPv4 - Internet Control Message Protocol for IPv4
- • ICMPv6 - ICMP for IPv6.
- • CMPv6 ND - ICMPv6 Neighbor Discovery
- • OSPF - Open Shortest Path First
- • EIGRP - EIGRP - Enhanced Interior Gateway Routing Protocol.
- • BGP - Border Gateway Protocol.
-
List some Network Access Layer Protocols.
- • ARP - Address Resolution Protocol.
- • Ethernet
- • WLAN - Wireless Local Area Network
-
-
What is de-encapsulation?
refers to the process of removing headers and trailers as data passes from lower to upper layers. This process happens on the computer that is receiving data.
-
What is include in message timing? And describe each of them.
- • Flow control -This is the process of managing the rate of data transmission.
- • Response Timeout - how long to wait for a response from another device and what to do if response timeout occurs.
- • Access method - determines when someone can send a message.
-
What is Flow Control?
- • This is the process of managing the rate of data transmission.
- • Flow control defines how much information can be sent and the speed at which it can be delivered.
-
What is Response Timeout?
Host on a network use response time out that specify how long to wait for responses from a another device and what action to take if a response timeout occurs.
-
What does the term unicast mean?
A one-to-one delivery option is referred to as a unicast, meaning there is only a single destination for the message.
-
What does the term multicast mean?
When a host needs to send messages using a one-to-many delivery option, it is referred to as a multicast.
-
What does the term broadcast mean?
If all hosts on the network need to receive the message at the same time, a broadcast may be used. Broadcasting represents a one-to-all message delivery option.
-
What are the benefits to using a layered model?
- • Assisting in protocol design because protocols that operate at a specific layer have defined information that they act upon and a defined interface to the layers above and below
- • Fostering competition because products from different vendors can work together
- • Preventing technology or capability changes in one layer from affecting other layers above and below
- • Providing a common language to describe networking functions and capabilities
-
What does the OSI reference model stand for?
Open System Interconnection (OSI) Reference Model
-
What is another term for the TCP/IP protocol model?
is sometimes referred to as the internet model.
-
How many layers are in the OSI reference model? List each of the layer by number and name.
All People Seem To Need Processing
All People Seem To Need Processing
- • There are 7 layers in the OSI model.
- • The following layers in the OSI model layers are:
- Layer 7 --> Application
- Layer 6 --> Presentation
- Layer 5 --> Session
- Layer 4 --> Transport
- Layer 3 --> Network
- Layer 2 --> Data Link
- Layer 1 --> Physical
-
How many layers are in the TCP/IP protocol model? List each of the layer by number and name.
Hint: Armored Thieves Neutralized Drunken Pigs
Armored Thieves Neutralized Drunken Pigs
- • There are 4 layers in the TCP/IP protocol model.
- • The following layers are in the TCP/IP protocol model.
- Layer 4 --> Application
- Layer 3 --> Transport
- Layer 2 -->Internet
- Layer 1 -->Network Access
-
List the layers of the OSI reference model with a quick description.
| OSI Model Layer | Description |
|---|
| 7 - Application | The application layer contains protocols used for process-to-process communications. | | 6 - Presentation | The presentation layer provides for common representation of the data transferred between application layer services. | | 5 - Session | The session layer provides services to the presentation layer to organize its dialogue and to manage data exchange. | | 4 - Transport | The transport layer defines services to segment, transfer, and reassemble the data for individual communications between the end devices. | | 3 - Network | The network layer provides services to exchange the individual pieces of data over the network between identified end devices. | | 2 - Data Link | The data link layer protocols describe methods for exchanging data frames between devices over a common media | | 1 - Physical | The physical layer protocols describe the mechanical, electrical, functional, and procedural means to activate, maintain, and de-activate physical connections for a bit transmission to and from a network device. |
-
List the layers of the TCP/IP protocol model with a quick description.
| TCP/IP Model Layer | Description |
|---|
| 4 - Application | Represents data to the user, plus encoding and dialog control. | | 3 - Transport | Transport Supports communication between various devices across diverse networks. | | 2 - Internet | Determines the best path through the network. | | 1 - Network | Access Controls the hardware devices and media that make up the network. |
-
What is segmentation?
is the process of dividing a stream of data into smaller units for transmissions over the network
-
What are the benefits of using segmentation on messages?
- • It increases speed
- • Increases efficiency
-
What is a PDU?
- • A protocol data unit is the form that a piece of data takes at any layer.
- • contains layer-specific information necessary for a message to be transmitted through a network
-
What is the term for PDU at the at the application layer?
Data
-
What is the term for PDU at the at the transport layer?
- If it is TCP its called a Segment
- But If it’s a UDP its called a datagram
-
What is the term for PDU at the at the network layer?
Packet
-
What is the term for PDU at the at the data link layer?
Frame
-
What is the term for PDU at the at the physical layer?
Bits
-
What is the names and order of an PDU when it is passed down the TCP/IP stack?
HINT: Smelly Pigs Fought Babies
- Application through session layers --> Data
- Transport layer PDU --> Segment
- Network layer PDU --> Packet
- Data Link layer PDU --> Frame
- Physical layer PDU--> Bits
-
What type of address does the Data Link Layer read?
MAC Address aka physical address
-
What type of address does the Network Layer read?
IP addresses aka network host address
-
What type of address does the Transport Layer read
port addresses
-
What is a frame?
encapsulated data defined by the data link layer. A frame can have both a header and a trailer.
-
What is a Packet?
- encapsulated data defined by the Network layer. A header contains the
- source and destination IP addresses
-
What is a segment?
encapsulated data as defined by the Transport layer. Information such as the source and destination ports or sequence and acknowledgment numbers are included in the header.
-
What family of technologies defines Ethernet technology?
the IEEE 802.2 and 802.3 standards.
-
What layers does the Ethernet operate at?
the data link layer and the physical layer.
-
What is the minimum and maximum Ethernet frame size?
- 64 bytes is the minimum
- 1518 bytes is the maximum
-
What is an “collision fragment” or “runt frame”?
Its any ethernet frame less than 64 bytes in length is automatically discarded by receiving stations.
-
What is an “jumbo” or “baby giant frames”?
An ethernet frame with more than 1500 bytes of data
-
What is the Preamble and Start Frame Delimiter Field used for? Also what are the sizes?
- The Preamble (7 bytes) and Start Frame Delimiter (SFD), also called the Start of Frame (1 byte), fields are used for synchronization between the sending and receiving devices. These first eight bytes of the frame are used to get the attention of the receiving nodes. Essentially, the first few bytes tell the receivers to get ready to receive a new frame.
- NOTE: the preamble and SFD are not included in the Ethernet Frame Field
-
What is the Destination MAC Address Field in an ethernet frame used for? Also what it the size?
This 6-byte field is the identifier for the intended recipient. As you will recall, this address is used by Layer 2 to assist devices in determining if a frame is addressed to them. The address in the frame is compared to the MAC address in the device. If there is a match, the device accepts the frame. Can be a unicast, multicast or broadcast address.
-
What is the Source MAC Address Field in an ethernet frame used for? Also what it the size?
This 6-byte field identifies the originating NIC or interface of the frame. A source MAC address can only be a unicast address.
-
What is the Type / Length Field in an ethernet frame used for? Also what it the size?
- This 2-byte field identifies the upper layer protocol encapsulated in the Ethernet frame. Common values are, in hexadecimal, 0x800 for IPv4, 0x86DD for IPv6 and 0x806 for ARP.
- Note: You may also see this field referred to as EtherType, Type, or Length.
-
What is the Data Field in an ethernet frame used for? Also what it the size?
This field (46 - 1500 bytes) contains the encapsulated data from a higher layer, which is a generic Layer 3 PDU, or more commonly, an IPv4 packet. All frames must be at least 64 bytes long. If a small packet is encapsulated, additional bits called a pad are used to increase the size of the frame to this minimum size.
-
What is the Frame Check Sequence Field in an ethernet frame used for? Also what it the size?
The Frame Check Sequence (FCS) field (4 bytes) is used to detect errors in a frame. It uses a cyclic redundancy check (CRC). The sending device includes the results of a CRC in the FCS field of the frame. The receiving device receives the frame and generates a CRC to look for errors. If the calculations match, no error occurred. Calculations that do not match are an indication that the data has changed; therefore, the frame is dropped. A change in the data could be the result of a disruption of the electrical signals that represent the bits.
-
What does the acronym MAC stand for?
Media Access Control
-
What does the Network layer do?
- provides services to allow end devices to exchange data across networks.
- Allows for end-to-end communications across network
-
What is the size of an Ethernet MAC address?
48-bit binary value expressed as 12 hexadecimal digits (4 bits per hexadecimal digit).
-
What part of the Mac Address is the OUI/ vendor ID and what part vendor assigned serial number?
- The OUI/ vendor ID is the 1st 6 hex numbers or the 1st 24 bits.
- The vendor assigned serial number is the last 6 hex numbers or the last 24 bits.
-
What are the basic operations for network layer protocols?
- • Addressing end devices
- • Encapsulation
- • De-encapsulation
- • Routing
-
Fill in the black: the IP address _____ the device, the MAC address ______ the device
○ IP address locates the device, MAC address identifies the device.
-
What command determines the MAC address when given the IP address?
ARP -a
-
What services does the OSI layer 3 or network layer provide?
to allow end devices to exchange data across networks.
-
What are the principle network layer communication protocols?
IP version 4 (IPv4) and IP version 6 (IPv6)
-
What four operations must be performed to accomplish end-to-end communications on the network layer?
- • Addressing end devices
- • Encapsulation
- • De-encapsulation
- • Routing
-
What are the characteristics of IP? And describe each of the charateristics.
- • Connectionless - There is no connection with the destination established before sending data packets.
- • Best Effort - IP is inherently unreliable because packet delivery is not guaranteed.
- ○ NOTE: Other protocols manage the process of tracking packets and ensuring packet delivery.
- • Media Independent - Operation is independent of the medium (i.e., copper, fiber-optic, or wireless) carrying the data.
-
The network layer encapsulates the transport layer segment by adding what?
By adding an IP header
-
The network layer encapsulates the transport layer PDU (______) turning into an ________.
Segment, packet
-
What is the Version Field in an IPV4 Header frame used for? Also what it the size?
Contains a 4-bit binary value set to 0100 that identifies this as an IPv4 packet.
-
What is the Differentiated Services or DiffServ (DS) field in an IPV4 Header frame used for? Also what it the size?
Formerly called the type of service (ToS) field, the DS field is an 8-bit field used to determine the priority of each packet. The six most significant bits of the DiffServ field are the differentiated services code point (DSCP) bits and the last two bits are the explicit congestion notification (ECN) bits.
-
What is the Header Checksum Field in an IPV4 Header frame used for? Also what it the size?
This is used to detect corruption in the IPv4 header.
-
What is the Time to Live (TTL) Field in an IPV4 Header frame used for? Also what it the size?
TTL contains an 8-bit binary value that is used to limit the lifetime of a packet. The source device of the IPv4 packet sets the initial TTL value. It is decreased by one each time the packet is processed by a router. If the TTL field decrements to zero, the router discards the packet and sends an Internet Control Message Protocol (ICMP) Time Exceeded message to the source IP address. Because the router decrements the TTL of each packet, the router must also recalculate the Header Checksum.
-
What is the Protocol Field in an IPV4 Header frame used for? Also what it the size?
This field is used to identify the next level protocol. This 8-bit binary value indicates the data payload type that the packet is carrying, which enables the network layer to pass the data to the appropriate upper-layer protocol. Common values include ICMP (1), TCP (6), and UDP (17).
-
What is the Source IPv4 Address Field in an IPV4 Header frame used for? Also what it the size?
This contains a 32-bit binary value that represents the source IPv4 address of the packet. The source IPv4 address is always a unicast address.
-
What is the Destination IPv4 Address Field in an IPV4 Header frame used for? Also what it the size?
This contains a 32-bit binary value that represents the destination IPv4 address of the packet. The destination IPv4 address is a unicast, multicast, or broadcast address.
-
What is the Internet Header Length (IHL), Total Length, and Header Checksum fields in an IPV4 Header frame used for? Also what it the size?
- These fields are used to identify and validate the packet.
- Internet Header Length (IHL) is 4 bits or (0.5) bytes, Total Length 16 bits or 2 bytes, and Header Checksum is 16 bit or 2 bytes
-
What is the Identification, Flags, and Fragment Offset fields in an IPV4 Header frame used for? Also what it the size?
They are used to keep track of the fragments and used to reorder a fragmented packet. Identification is 2 byte, Flags is 3 bits or 0.375 bytes, and Fragment Offset is 13 bits or 1.625 bytes
-
What is the size of an IPv4 address?
32 bit/4 bytes, 4 bytes (4 groups of 8 bits),
-
What are the 2 portions of the IP adress?
Network address portion and host address portion
-
A network address/network ID/ network portion is what?
- ○ This is the number that is assigned to a whole network
- ○ The bits within the network portion of the address must be identical for all devices that reside in the same network.
-
A host address/host ID/ host portion is what?
- ○ An host Id is assigned to host within an network for example tables, computers, printers and ect
- ○ The bits within the host portion of the address must be unique to identify a specific host within a network.
-
What is a subnet mask?
The IPv4 subnet mask is used to differentiate the network portion from the host portion of an IPv4 address.
-
What is an public address class A?
Designed to support extremely large networks.
-
What is an public address class B?
Designed to support the needs of moderate to large size networks
-
What is an public address class C?
Designed to support small networks with a maximum of 254 hosts.
-
What is a private IPv4 addresses?
This is IPv4 addresses that are only used inside a network, if data is going across the default gateway the address changes from private address to an public address and vice vera when it is being sent into the network.
-
What is an public IPv4 address range for class A?
0.0.0.0/8 to 127.0.0.0/8
-
What is an public IPv4 address range for class B?
128.0.0.0 /16 – 191.255.0.0 /16
-
What is an public IPv4 address range for class C?
192.0.0.0 /24 – 223.255.255.0 /24
-
What is an private IPv4 address range for class A?
- 10.0.0.0 /8
- or
- 10.0.0.0 to 10.255.255.255
-
What is an private IPv4 address range for class B?
- 172.16.0.0 /12
- or
- 172.16.0.0 to 172.31.255.255
-
What is an private IPv4 address range class C?
- 192.168.0.0 /16
- or
- 192.168.0.0 to 192.168.255.255
-
What is the 1st rule to help shorten the notation of IPv6 addresses?
- to omit any leading 0s (zeros) in any hextet.
- For example
- ○ 01ab can be represented as 1ab
- ○ 09f0 can be represented as 9f0
- ○ 0a00 can be represented as a00
- ○ 00ab can be represented as ab
-
What is the 2nd rule to help shorten the notation of IPv6 addresses?
- a double colon (::) can replace any single, contiguous string of one or more 16-bit hextets consisting of all zeros.
- ○ For example
- ○ 2001:db8:cafe:1:0:0:0:1 (leading 0s omitted) could be represented as 2001:db8:cafe:1::1.
- ○ Note that the can only be used one with in an address so the following example is incorrect 2001:db8::abcd::1234.
|
|