click below
click below
Normal Size Small Size show me how
TCP/IP Chapter 3
TCP/IP Chapter 3 and 4 Terms to know!
| Question | Answer |
|---|---|
| Most commonly used frame type used for datagram transmissions over Ethernet networks | Ethernet II |
| IEEE standard for token ring | 802.5 |
| encapsulation at the data link layer | frame |
| encapsulation at the network layer | packet |
| Two sublayers of the data link layer | LLC and MAC |
| Type of address that is used at the data link layer | MAC address or physical address |
| Type of address that is used at the network layer | IP address or logical address |
| Is used to obtain an IP address for a known MAC address | RARP (reverse ARP) |
| Is used to obtain a MAC address for a known IP address | ARP (address resolution protocol) |
| MTU | Maximum Transmission Unit |
| MTU for Ethernet | 1,518bytes |
| Minimum Ethernet frame size | 64 bytes |
| Command line utility that allows you to view the temporary table in memory that consists of recent ARP entries | arp -a |
| data link address | also called a MAC address |
| router IP address of the interface that traffic on a LAN must pass through to access a remote network | default gateway |
| Process of dividing a packet into multiple smaller packets to cross a link that supports a smaller MTU than the link where the packet originated | fragmentation |
| IEEE standard for Ethernet | 802.3 |
| IEEE standard for Wireless | 802.11 |
| The process of obtaining an IP address based on a symbolic name | name resoulution process |
| command line utility used to identify the MAC address, IP address, and other important information | ipconfig |
| Examples of WAN technolgies | ISDN, Frame Relay, DSL, X.25 |
| indication of the remaining distance that a packet can travel | TTL or Time to Live |
| tests to determine the reachability of a device | connectivity tests, examples include Ping and Tracert |
| person who uses computer and communications knowledge to exploit information or functionality of a device | hacker |
| key protocol in TCP/IP suite that provides error messages and the ability to query other devices | ICMP |
| Protocol that supports the formation of multicast groups. | IGMP |
| route a packet can take through a internetwork | path |
| command line utility that allows you to test router and path latency, as well as connectivity | PATHPING |
| time synchronization protocol that provides the mechanisms to synchronize and coordinate time distribution | NTP |
| The best route possible | optimal route |
| command line utility that uses multiple PING commands to establish and identify round-trip times for all hosts between a sender and receiver | TRACERT |
| The amount of time required to get from one host to another host and back again. | round-trip time |
| The mean solar time of the meridian of Greenwich, used as the prime basic of standard time around the world. | GMT Greenwich Mean Time also referred to as UT or UCT. |
| process of identifying live network hosts positioned behind a filtered device by probing for addresses known not to be in use | inverse mapping |
| process of sending PING packets to each host within an IP address range to obtain a list of active hosts in that range. | IP address scanning |
| IP address information that can be displayed using the ipconfig /all command | Your IP address, MAC address, Default Gateway, DNS Server, DHCP server, DHCP lease time |
| command to see the arp cach on your computer | arp -a |
| command parameter to use with ipconfig to release the DHCP IP address for the adapter | /release |
| command parameter that uses DHCP to renew the IP address for the adapter | /renew |
| command line utility that execute an end-to-end connectivity test to other devices and obtains the round-trip time between source and destination | PING |
| Excessive use of PING results in this | Denial of Service Attack |
| Information obtained by using Microsoft PING utility | IP address of responding device, bytes contained in PING response, roundtrip time, and the TTL value |
| Path MTU discovery using ICMP. Enables a source to learn the currently supported MTU across an entire path | PMTU Discovery |
| MTU | Maximum Transmission Unit |
| Attacker redirects traffic to his PC and perform man-in-the-middle attacks, which usually consist of trust-based service exploitation. | ICMP redirect attack |
| Attack using the ICMP protocol that involves walking a firewall ACL or ruleset to determine what it filters and how. | firewalking |
| Concept that indicates a path exists between two hosts on a TCP/IP internetwork | reachability |
| RFC that decribes ICMP | 792 |
| ICMP message type that relates to reachability analysis | echo/echo reply |
| ICMP message type that reports delivery errors | destination unreachable |
| ICMP message type that relates to congestion control | source quench |
| ICMP message type that relates to route optimization | redirect |
| Protocols supported by PPP | TCP/IP, IPX/SPX, Appletalk, NetBEUI |
| Protocols supported by SLIP | TCP/IP |
| Wan technology that offers the highest bandwidth to PPP | SONET |
| Replying to ARP requests on another network. Hides subnetting from individual hosts. | Proxy ARP |
| Routing Protocols used to exchange information between routers | RIP, EIGRP, OSPF, BGP |
| Protocol used by ISPs to authenticate and manage broadband subscribers. Kind of PPP designed for serial communications adapted specifically for Ethernet networks | PPPoE |
| Type of data link protocol designed to carry data over a large distance. | WAN protocol |