Save
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

Chapter 15 Terms

TermDefinition
Protocols Methods and rules for communication
Client/server most communication between computers use the client server model
TCP/IP (Transmission Control Protocol/internet protocol) a group of suite protocols
Packet transmitted data
Network Adapter makes your machine capable of getting on the internet
MAC (Media Access Control) a number written in hex that represents your network card
Local Area Network (LAN) a network bound by routers and gateways
Router a device that manages traffic between two or more networks
Gateway any device or computer that network traffic can use to leave one network and go to a different model
IP Address a 32 or 128 bit address that is assigned to a network connection
Port number, Port, Port Address each client and server application installed on a computer listens at a predetermined address that uniquely identifies the application on the computer
Dynamic IP Address an IP address that is assigned to by a server each time it connects to the network
Static IP Address an IP address that is permanently assigned to a computer or device
DHCP Dynamic Host Configuration Protocol gives an IP address to a computer when it first attempts to initiate a connection to the network and request an IP address
DHCP Client a computer or other device such as a printer that requires a DHCP Address
Internet Protocol Version 4 IPv4 created about 4 billion potential IP addresses but they are all used up
Internet Protocol Version 6 IPv6 uses 128 bit address in Hex format
Class A is a single network octet
Class B is 2 octets used for network
Class C using 3 octets for network portion
Class D used for Multicasting
Multicasting in which one host sends messages to multiple hosts
Loopback Address 127.0.0.1
Subnet Mask used with IPv4 identifies what portion is network and what portion is host
Classful Subnet Mask if you don't divide a network into subnets the default subnet is used
Classless Subnet Mask does not align with the network id with the network octets assigned by the class license
Public IP Addresses the IP Addresses that are open to the public
Private IP Addresses a group of IP addresses that are available on private company internet servers
NAT Network Address Translation a program that substitutes public IP addresses for Private Addresses
Automatic Private IP Addresses APIPA when the computer cannot lease an IP address it uses an APIPA
Link or local link a LAN or Wan that has a router boundry
Interface a nodes attachment link
Interface ID the last 64 bits or 4 blocks of an IP addresses
ISATAP Intra-Site Automatic Tunnel Addressing Protocol
Teredo named after the teredo worm that bores holes in wood if IPv6 addresses intended to be used by this protocol always begin with the same 32 bit prefix
6TO4 an older tunneling protocol
Unicast Address packets are delivered to a single node on the network
Multicast Address Packets are delivered to all nodes on a network
Anycast Address used by routers
Global unicast Address or Global Address can be routed on the internet
Link-Local Unicast Address or Link-Local Address can be used for communicating with nodes in the same link
Unique Local Unicast Address or Unique Local Address used to identify a specific site within a large organization
Host Name or Computer Name a name of a computer and can be used in place of its IP address
Domain Name identifys a network
Fully Qualified Domain Name identifies a computer and the network it belongs to
DNS Domain Name Server used by a dns server to find an IP address
Name Resolution associating a name with an IP address
Host File what is loaded at startup
DNS Client when windows queries the DNS Server
TCP the protocol that guarantees packet delivery
Connection Oriented Protocol checks to insure packet delivery
UDP does not guarantee packet delivery
Connectionless Protocol or best effort protocol checks to insure packet delivery
HTTP a protocol used for web browsers
HTTPS a secure version of HTTP
SMTP used to send emails
SMTP AUTH used to authenticate email servers
POP3 or IMAP4 used to deliver email messages
Telnet used by an Admin to access a computer remotely
LDAP is used by various client applications when the application needs to query a database
SMB a protocol used by windows to share files and printers on a network
FTP used to transfer files between two computers
SSH is used to pass login information to a remote computer
SFTP used to transfer files from client to server
SNMP used to monitor network traffic
RDP used by windows to remote onto a desktop
Alternate IP Address When you manually assign an IP address
Wireless Access Point creates wireless networks
SSID when the wireless device does not broadcast its name
Wireless Wide Area Network to connect a computer using mobile broadband to a cellular network
SIM small flash memory card
Virtual Private Network used by employees when they work away from the corporate office
QOS used to improve network performance
Port Filtering is used to open and close certain ports
Port Forwarding means when the firewall receives a request for communication from the internet to a specific computer and port
Port Triggering opens a port when a Pc on the network initiates communication through another port
WIFI Wireless internet connection
802.11 a/b/g/n Standards for wireless connectivity
Multiple input/Multiple Output can use 2 or more antennas to improve performance
Radio Frequency the frequency of waves generated by a radio signal
Channel a specific radio frequency within a broader frequency
WEP no longer considered a secure because the key used for encryption is static
WPA More secure than wep and designed to replace it also called TKIP
TKIP More secure than wep and designed to replace it also called WPA
WPA2 also called the 802.11i standard is the best wireless encryption standard
AES improved the way TKIP generated encryption keys
WPS makes it easier for uses to connect their computers to a wireless network
Created by: 1019660571411816
Popular Computers sets

 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards