Busy. Please wait.
or

show password
Forgot Password?

Don't have an account?  Sign up 
or

Username is available taken
show password

why


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
We do not share your email address with others. It is only used to allow you to reset your password. For details read our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

Remove ads
Don't know
Know
remaining cards
Save
0:01
To flip the current card, click it or press the Spacebar key.  To move the current card to one of the three colored boxes, click on the box.  You may also press the UP ARROW key to move the card to the "Know" box, the DOWN ARROW key to move the card to the "Don't know" box, or the RIGHT ARROW key to move the card to the Remaining box.  You may also click on the card displayed in any of the three boxes to bring that card back to the center.

Pass complete!

"Know" box contains:
Time elapsed:
Retries:
restart all cards




share
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

CCNA - Network Vocab

QuestionAnswer
4b/5b An encoding scheme 4B/5B uses 5-bit symbols and codes to represent 4 bits of data. 4B/5B is used in 100Base-tx ethernet.
ACK a 1-bit flag in the tcp header that indicates the acknowledgment field is valid.
acknowledgment a notification sent from one network device to another to confirm that some event has occured.
acknowledgment number a 32-bit field in the tcp segment header that specifies the sequence number of the next byte this host expects to receive as a part of the TCP session. It is used to recognize lost packets and flow control
address pool the range of ip addresses that can be assigned by the DHCP server.
Address resolution protocol the method of for finding a host's hardware address from its IPv4 network layer address.
administratively scoped address an IPv4 multicast address that is restricted to a local group or organization
AND one of the three basic binary logic operations. ANDing yields the following result: 1 and 1 = 1
argument additional data that is provided with a command to provide information used by the execution of the command. IOS command arguments are entered at the CLI after the command
ARP cache a logical storage in the host's RAM to store ARP entries
ARP poisoning a technique used to attack an ethernet network by sending fake ARP messages to an ethernet LAN. These frames contain false MAC addresses that confuse network devices
ARP table a logical storage in a host's RAM to store arp entries.
association identity AID a number used in the 802.11 header to specify the session between a wireless client and the access point.
asynchronous communication that does not use a common clock between the sender and receiver. To maintain timing
attenuation the loss of communication signal on the media. This loss is due to degradation of the energy wave over time.
authentication a process used to verify the identity of a person or process
authoritative a source of information that is highly reliable and known for its accuracy
backoff algorithm the retransmission delay used with CSMA/CD when a collision occurs. The algorithm forces each sender that detected the collisions to delay a random amount of time before attempting to retransmit.
bandwidth In networking
best effort network protocols or technologies that do not use the acknowledgment system to guarantee reliable delivery of information
binary a numbering system characterized by 1 and 0
bit binary digit used in the binary numbering system. Binary digits are units of information storage and communication in computing. Each bit can be either a 0 or a 1.
bit time the time required to send a single bit over some transmission medium. The time can be calculated at 1/speed
bridge a device that connects multiple network segments at the data link layer of the OSI model. Bridges were the predecessor to LAN switches.
bridge table the table used by a switch or bridge that associates MAC addresses with the outgoing port. The switch or bridge uses this table for its forwarding/filtering decisions.
bridging the process of forwarding frames in a switch or a bridge from one port to another port or from segment to segment
broadcast a form of transmission where one device transmits to all devices within the network or on another network
broadcast address an address used to represent a transmission from one device to all devices. In ethernet
broadcast domain a logical network composed of all the computers and networking devices that can be reached by sending a frame to the data link layer broadcast address.
burned in address the MAC address that is permanently assigned to a LAN interface or NIC. It is called burned-in because the address is burned into a chip on the card
cache a temporary storage where data that has been retrieved or calculated and is accessed frequently can be stored. After the data is stored in the cache
carrier a signal on a medium used to support the transmission of data. Data is carried over the medium by modulation.
carrier sense multiple access (CSMA) media access methodology in which a node wishing to transmit listens for a carrier wave before trying to send. If a carrier is sensed
carrier sense multiple access collision detect (CSMA/CD) The MAC algorithm used by ethernet devices in a shared media. The protocol requires a node wishing to transmit to listen for a carrier signal before trying to send. If a carrier is sensed
channel a communication path over a medium used to transport information from a sender to a receiver. Multiple channels can be multiplexed over a single cable
channel service unit/data service unit a device that connects to a local digital telephone loop for a WAN circuit to a serial interface on a network device
classful addressing a unicast IP address that is considered to have three parts: a network part
classless addressing an IPV4 addressing scheme that uses a subnet mask that does not follow classful addressing limitations. It provides increased flexibility when dividing ranges of IP addresses into separate networks. Classless addressing is considered the best in current n
client a network device that accesses a service on another computer remotely by accessing the network.
cloud In networking
code gropu a grouping of code that meets a certain
collaborative Information systems that allow the creation of a document or documents that can be edited by more than one person in real time
collision In ethernet
collision domain a physical or a logical area in a LAN where the signals sent by the interfaces ma be subject o being combined. Within a collision domain
connection oriented communication where the sender and receiver must prearrange for communications to occur; otherwise
connectionless any communication in which the sender and receiver do not prearrange for communications to occur
console port a port on cisco devices to which a terminal or computer with a terminal emulator is connected to the network device in order to communicate and configure the network device
control data data that directs a process. a flag in a data-link frame is an example of control data.
convergence another form of the root word converge in the phrase converged network. This kind of network aggregates various forms of traffic such as voice
cyclic redundancy check a type of hash function that is used to produce a small
daemon a computer program that runs in the background and is usually initiated as a process. Daemons often support server processes.
data communications equipment the devices and connections of a communications network that comprise the network end of the user to network interface. The DCE provides a physical connection to the network
data termianl equipment devices at the user end of a user-network interface that serves as a data source
decapsulation a process by which an end device
default gateway a device on a network that serves as an access point to other networks. A default gateway is used by a host to forward IP packets that have destination addresses outside the local subnet. A router interface typically is used as the default gateway. When t
default route Routing table entry that is used to direct frames for which a next hop is not explicitly listed in the routing table. This route is used to forward a packet when no other known route exists for a give packet's destination address.
delimiter this field of a frame signals the beginning or end of a frame.
destination IP address the layer 3 address to which the data is going.
deterministic refers to whether the performance of a device
digital logic also known as boolean algebra. These consist of the AND OR and IF operations
directed broadcast a term that describes IPv4 packets sent to all hosts in a particular network. In a directed broadcast
directly connected network a network that is connected to a device's interface. For example networks that interface with the router are known to be directly connected. Devices learn their initial IP routes based on being connected to these subnets.
dispersion the spreading of light signal caused by light signals traveling at different speeds through a fiber.
distributed a method of computer processing in which different parts of a program run simultaneously on two or more computers that are communicating with each other over a network
dns resolver the client part of the DNS client server mechanism. A DNS resolver creates queries sent a across a network to a same server
domain name a name
domain name system an internet wide system by which a hierarchical set of DNS servers collectively hold all the name IP address mappings
dotted decimal a convention for writing IP addresses with four decimal numbers
download to transfer data from the computer functioning as a server to the client computer you are using.
dynamic host configuration protocol a protocol used to dynamically assign IP configurations to hosts. The services defined by the protocol are used to request and assign an IP address
dynamic or private ports TCP or UDP ports that range from 49152 to 65535 and are not used by any defined server applications.
dynamic routing routing that adjusts automatically to network topology or traffic changes.
electromagnetic interface interface by magnetic signals caused by the flow of electricity. EMI can cause reduced data integrity and increased error rates on transmission channels. The physics of this process are that electrical current creates magnetic fields
enable password unencrypted password used to allow access to privledge EXEC mode from IOS user EXEC mode.
encapsulation the process by which a device adds networking heads and trailers to data from an application for the eventual transmission of the data onto a transmission medium.
encode to change the energy levels transmitted over some networking medium to transmit bits over that medium.
encryption the process of obscuring information to make it unreadable without special knowledge
end device a device such as a desktop or mobile device that is used by an end user.
ethernet PHY the physical interface transceivers. It deals with Layer 1 (the physical layer
extended star a network topology characterized by a central location connected to multiple hubs. In an extended star
extranet part of a company's intranet that is extended to users outside the company
fast ethernet a common name for ethernet technology that operates at 100 mbps.
fault tolerance the design on networks that can continue to operate without interruption in the case of hardware
fiber-optic cable physical medium that uses glass or plastic threads to transmit data. A fiber-optic cable consists of a bundle of these threads
fiber optics the glass fibers inside certain cables over which light is transmitted to encode 0 and 1
filtering in ethernet
FIN a 1-bit field in the TCP header that is used by a device that wants to terminate its session with the other device. This is done by inserting the FIN flag in the flag field found in the TCP segment
firewall any combination of hardware device and/or software application designed to protect network devices from outside network users and/or malicious applications and files.
flash a removable component that has memory space for storage. Used on the router or switch for storing the compressed operating system image.
flooding a process used by a switch or bridge to forward broadcasts and unknown destination unicasts. The bridge/switch forwards these frames out all ports except the port on which the frame was received.
flow control the management of data flow between devices in a network. It is used to avoid too much data arriving before a device can handle it
forwarding In ethernet
fragmentation the dividing of IP datagrams to meet the MTU requirement of a layer 2 protocol.
frame the layer 2 pdu that has been encoded by a data link layer protocol for digital transmission. Some different kinds of frames are ethernet frames and PPP frames.
full duplex communication that allows receipt and transmission simultaneously. A station can transmit and receive at the same time. There are no collisions with full-duplex ethernet transmision.
gateway normally
gigabit ethernet ethernet that transmits data at 1
global configuration mod from the priviledged mode
globally scoped addresses unique addresses that are public domain addresses.
goodput application-level throughput. It is the number of useful bits per unit of time from a certain source address to a certain destination
half duplex communication that only allows one station to receive while the other station is transmitting
hierarchical addressing an addressing scheme in which a network is partitioned into sections
high-order bit the portion of a binary number that carries the most weight
hop the passage of a data packet between two network nodes.
host a network device that has an IPv4 address assigned to it to communication over a network.
host address IPv4 address of a network host. When talking about host addresses
host group a group defined by a class D address (multicast
hub In ethernet
hybrid fiber-coax a network that incorporates both optical fiber along with coaxial cable to create a broadband network. commonly used by cable tv companies.
hypertext transfer protocol defines the commands
instant messaging real-time communication between two or more people through text. The text is conveyed through computers connected over a network such as the internet. files can also be transferred through the IM program to share files.
Institute of Electrical and Electronics Engineers An international
interframe spacing a time period between ethernet frames that allows fairness with the CSMA/CD algorithm. Without a space between frames in other words
intermediary device a device that connects end devices to the network or interconnects different networks. A router is an example of an intermediary device.
International Organization for Standardization An international standards body that defines many networking standards. Also
Internet The network that combines enterprise networks
Internet Assigned Numbers Authority An organization that assigns the numbers important to the proper operation of the TCP/IP protocol and the Internet
Internet backbone a high-speed line or series of connections that forms a major pathway within a network. The term is often used to describe the main network connections comprising the Internet.
Internet control message protocol As part of the TCP/IP internet layer
Internet Engineering Task Force The standards body responsible for the development and approval of TCP/IP standards
Internet service provider A company that helps create the Internet by providing connectivity to enterprises and individuals
internetwork a combination of many IP subnets and networks
Interpret as command In the telnet application
intranet a corporate system such as a website that is explicitly used by internal employees. Can be assessed internally or remotely
IP Network layer protocol in the TCP/IP stack offering a connectionless internetwork service. IP provides features for addressing
IP address a 32-bit number
IP header the header defined by the IP. Used to create IP packets by encapsulating data supplied by higher-layer protocol (such as TCP) behind an IP header.
jam signal in a shared media ethernet network
keyword Used in the CLI following the command. Keywords are parameters that are used with the command from a set of predefined values.
kilobits per second a unit of measurement of the number of times 1000 bits can be transmitted in 1 second. 1 kbps = 1000bps
latency the time that passes while some event occurs. In networking
layered model a model that consists of various layers that enable the development and explanation of technology to be done on a modular basis. This allows interoperability among different technologies among the different layers.
limited broadcast a broadcast that is sent to a specific network or series of networks.
limited scope address An IPv4 multicast address that is restricted to a local group or organization.
link-local address an IPv4 address in the range of 169.254.1.0 to 169.254.254.255. Communication using these addresses is used with a ttl of 1 and limited to the local network
local area network a network created for devices located in a limited geographic area
locally administered address a MAC address that can be configured on a device. The LAA can be used in place of the BIA . This means that you can replace a NIC or use a substitute device without changing the address used by the network to access the station.
Logical link control the IEEE 802.2 standard that defines the upper sublayer of the Ethernet Layer 2 specifications.
logical network a group of devices associated by the arrangement of a hierarchial addressing scheme. Devices in the same logical network that share a common network portion of their Layer 3 addresses.
logical topology a map of the devices on a network representing how the devices communcate with each other.
loopback a special reserved IPv4 address
low-order bit Represents the 0 in the binary number. In an IP subnet mask
MAC table on a switch
Mail user agent program used to download and send email. Email clients use POP3 to receive emails and use SMTP to send emails. Also called an email client
manchester encoding line code in which each bit of data is signified by at least one voltage level transition.
maximum transmission unit the largest IP packet size allowed to be sent out a particular interface. Ethernet interfaces default to an MTU of 1500 because the data field of an Ethernet frame should be limited to 1500 bytes
media access control the lower of the two sublayers of the IEEE standard for ethernet. It is also the name of that sublayer
media independent the networking layers whose processes are not affected by the media being used. In ethernet
media-dependent interface (MDI) The normal operation of ethernet ports on a hub. In this mode
media-dependent interface crossover MDIX is an alternative operation of ethernet ports on a hub. In this mode
metropolitan-area network a network with a geographic size between a LAN and a WAN. Typically used by service providers to create a highspeed network in a major metropolitan area where many customers might want high speed services between large sites around a city.
most significant bit the bit position in a binary number having the greatest value. The most significant bit is sometime referred to as the leftmost bit.
multicast client a member of a multicast group. Every multicast client in each group has the same IP address. Multicast addresses begin with 224.*.*.* and end with 239.*.*.*
multicast group a group that receives a multicast transmission. The members of a multicast group have the same mulitcast IP addressing to receive the same transmission.
multiplexing a process where multiple digital data streams are combined into one signal.
network 1.collection of computers
network address a dotted decimal number defined by the IPv4 protocol to represent a network or subnet. It represents the network that hosts reside in. Also called a network number or network ID.
Network address translation (NAT) translation RFC 1918 addresses to public domain addresses. Because RFC 1918 addresses are not routerd on the Internet
network baseline a collection of data that establishes a reference for network performance and behavior over a period of time. This reference data is used in the future to assess the health and relative growth of network utilization.
network interface card computer hardware
network segment a part of a computer network that every device communicates with using the same physical medium. Network segments are extended by hubs or repeaters.
Network time protocol a protocol for synchronizing the clocks of computer systems over packet-switch data networks. NTP uses UDP port 123 as its transport layer.
node data link layer term describing a device connected to a network.
noise In networking
nonreturn to zero line code in which 1s are represented by one significant condition and 0s are represented by another.
nonvolatile RAM (NVRAM) random-access memory that does not lose its contents when the computer is shut down
nslookup a service or a program to look up information in the DNS
octet a group of 8 binary bits. It is similar to
Open systems interconnection International standardization program created by ISO and ITU-T to develop standards for data networking that facilitate multivendor equipment interoperability
Optical time domain reflectometer a popular certification method for fiber systems. The OTDR injects light into the fiber and then graphically displays the results of the detected reflected light. The OTDR measures the elapsed transit time of reflected light to calculate the distance to d
Organizational Unique Identifier The first half of a MAC address. Manufactures must ensure that the value of the OUI has been registered with the IEEE. This value identifies the manufacturer of any Ethernet NIC or interface.
overhead resources used to manage or operate the network. Overhead consumes bandwidth and reduces the amount of application data that can be transported across the network.
packet when used generically
Packet Tracer a drag-and-drop network simulator developed by Cisco to design
Pad a part of the ethernet frame that fills in the data field to ensure that the data field meets the minimum size requirement of 46 bytes.
peer a host or node that participates in some form of a group. For example
physical address a data link layer address
physical media the cabling and connectors used to interconnect the network devices.
physical network the connection of devices on a common media. Sometimes a physical network is also referred to as a network segment.
physical topology the arrangement of the nodes in a network and the physical connections between them. This is the representation of how the media is used to connect the devices.
ping sweep a network scanning technique used to identify which host IP addresses are operational.
pinout defines which wires in a cable should connect to each pin on the connectors on both ends of a cable. For example
plug-in In a web browser
port In networking
positional notation somtimes called place-value notation
post office protocol a protocol that allows a computer to retrieve email from a server.
prefix length in IP subnetting
priority queing a routing feature in which frames in an interface output queue are prioritized based on various characteristics such as packet size and interface type.
prviate address define in RFC 1918
protocol a written specification that defines what tasks a service or device should perform. Each protocol defines messages
protocol data unit a generic term from OSI that refers to the data
protocol suite a delineation of networking protocols and standards into different categories
proxy arp a process that uses the same ARP messages as a normal ARP
PSH a 1-bit flag in the TCP header that is used to request to the higher layers for immediate delivery of the packet.
public address an IP address that has been registered with IANA or one of its member agencies
pulse amplitude modulation a form of signal modulation where the message information is encoded in the amplitude of series of signal pulses. It transmits data by varying the aplitunes of the individual pulses. This is now obsolete and has been replaced by pulse code modulation
quality of service a control mechanism that can provide different priorities to different users or data flows
query a request for information. Queries are answered with replies.
radio frequency interference radio frequencies that creat noise that interferes with information being transmitted across unshielded copper cabling.
radix the number of various unique digits
redundancy a network architecture designed to eliminate network downtime cause by a single point of failure.
Regional Internet Registries organizations that are responsible for the allocation and registration of Internet number resources within a particular region of the world. These registries include the American Registry for Internet Number for North America; RIPE network coordination ce
registered ports using values between 1024 and 49
Requests for Comments a series of documents and memoranda encompassing new research
reserved link-local addresses the IPv4 multicast addresses 224.0.0.0 to 224.0.0.255. These addresses are to be used for multicast groups on a local network. Packets to these destinations are always transmitted with a TTTL value of 1
resource records DNS data records. Their precise format is defined in RFC 1035. The most important fields in a resource record are Name
RJ-45 a rectangular cabling connector with eight pins
round-trip time the time required for some network pdu's to be sent and received
router path through an internetwork through which packets are forwarded.
router a network device
routing the process by which a router receives an incoming frame
router protocol a protocol used between routers so that they can learn routes to add to their routing tables.
routing table a list of router holds in memory for the purpose of deciding how to forward packets.
RST a 1-bit flag in the TCP header that is used to request that a connection be re-established.
runt frame an ethernet frame that is less than 64 bytes in size. Runts are caused by collisions and are also know as collision fragments
scalability the ability of a protocol. system or component to be modified to fit a new need.
scheme a plan
scope the extent of a certain item. For example
segment 1. a collision domain that is a section of a LAN that is bound by bridges
segmentation In TCP
selective forwarding the forwarding of packets where the forwarding decision is taken dynamically
server can refer to computer hardware that is to be used by multiple concurrent users. Alternatively
server message block an application level network protocl mainly applied to shared access to files
session a related set of communications transactions between two or more network devices.
shielded twisted pair cable a type of network cabling that includes twisted-pair wires
signal the optical or electrical impulse on a physical medium for purposes of communication.
smtp an application protocol typically not used by end users. Instead
single point of failure a system of network design characterized by one or more major components that are required to maintain operation.
slash format a method of expressing a network prefix. It uses a forward slash / followed by the network prefix.
slot time the minimum time a NIC or interface can take to send an entire frame. Slot time
source the origin of the PDU. This can be a process a host or a node
source IP address the IP address of the originating host that is placed into the IP packet header.
standards an internationally recognized definition of technical specifications that ensure worldwide consistency.
static route an entry in an IP routing table that was created because a network engineer entered the routing information into the router's configuration.
store and forward a method of internal processing by LAN switches. The switch must receive the entire frame before it sends the first bit of the frame. Store and forward switch is the method used by cisco switches.
subnet a group of IP addresses that have the same value in the first part of the IP addresses
subnet mask a dotted decimal number that helps identify the structure of IP addresses. The mask represents the network and subnet parts of related IP addresses with binary 1s and the host part of related IP addresses with binary 0s
switch In ethernet a layer 2 device that receives an electrical signal in one port
switch table the table used by a switch that associates MAC addresses with the outgoing port. A general term for the table that a LAN bridge uses for its forwarding/filtering decisions. The table holds a list of MAC addresses and the port out which the bridge should f
symmetric switching In LAN switches a reference to cases in which a frame is forwarded
SYN a 1-bt flag in the TCP header used to indicate the initial value of the sequence number. The SYN flag is only set in the first two segments of the three-way TCP connection establishment sequence.
synchronous Communication that uses a common clocking signal. In most synchronous communicatino
syntax the structure and order of words in a computer language
TCP a layer 4 protocl of TCP/IP model
TCP/IP a network model defined by the IETF that has been implemented on most computers and network device in the world.
test-net address the IPv4 address block 192.0.2.0 to 192.0.2.255 that is set aside for teaching and learning purposes. These addresses can be used in documentation and network examples.
Thicknet a common term for 10base5 ethernet
thinnet a common term for 10base2 ethernet
throuhpu the actual data transfer rate between two computers at some point in time. Throughput is impacted by the slowest-speed link used to send data between the two computers
Time to live a field in the IP header that prevents a packet form indefinitely looping around an IP internetwork. Router decrements the TTL field each time they forward a packet
token passing an access method used with some LAN technologies by which devices access the media in a controlled manner. This access to the LAN is managed using a small frame called a toke. A device can send only when it has claimed the use of the token.
tracert a command on many computer operating systems that discovers the IP addresses
transparent bridging the learning of source addresses on incoming frames and adding them to the bridging table. After the table has been completed and when a frame is received on one of the bridge's interfaces
unshieled twisted-pair a general type of cable
URG a 1-bit flag in the TCP header used to indicate that the receiving host should notify the destination process to do urgent processing.
user executive mode the limited CLI mode where the commands available to the user are a subset of those available at the privileged level. In general
virtual circuit a logical connection between devices in which the frames are passed between the devices. Virtual circuits are independent of the physical structure and may be established through multiple physical devices.
virtual local area network a network of computers that behave as if they are connected to the same network segment
virtual terminal line the reference to text based logical interfaces on an ios device. These are accesses using telnet or ssh to perform administrative tasks. VTY lines are also called virtual type terminal.
well known ports used by tcp or udp
window size as filed in the TCP header that is set in a sent segment
Created by: doogie