click below
click below
Normal Size Small Size show me how
Cisco Networking
Chapter 1-3
| Question | Answer |
|---|---|
| Describe the Presentation Layer. | translates, encrypts, or prepares data from the Application layer for network transmission. |
| Describe the Network Layer. | handles routing information for data packets. |
| Describe the Session Layer. | Establishes, maintains, and manages sessions between applications. |
| Describe the Transport Layer. | Segments and reassembles data and provides either connection-oriented or connectionless communications. |
| Describe the Data Link layer. | handles link control and uses the MAC address on the NIC. |
| Describe the Physical layer. | Provides the electrical and mechanical transmission of data. |
| Describe the Application layer. | provides network services to the user. |
| Describe the Media Access Control (MAC) address. | It is a physical number set during the manufacturing process, MAC addresses contain 12 hexadecimal numbers, computers use this address to uniquely identify themselves on the network. |
| Describe the network address. | This address is used when routing communications between different network segments, it is set at layer 3 of the OSI model, and an example of this type of address is an IP address. |
| What are connectionless services also called? | unreliable services. |
| What type of services receive an acknowledgment from the destination? | reliable and connection-oriented services. |
| What is the correct descending order of data encapsulation? | 1. data conversion, 2. segment header added, 3. packet creation and network header, 4. frame headers and trailers added; and 5. bit transmissions |
| Describe a WAN? | a network spread over multiple geographic areas and usually connected by publicly and privately maintained media. |
| Describe a LAN? | a network that is contained in a single geographic area such as a building or floor in a building. |
| What are the reasons for providing a layered OSI architecture? | to provide design modularity, which allows upgrades to a specific layer to remain separate from the other layers, to enable programmers to specialize in a particular layer, and to allow for standardized interfaces from networking vendors. |
| On a network, what must a computer use in order for communication to occur? | common protocols. |
| Before networks, what did people use to transfer files? | Sneakernet. |
| A protocol is to a computer as a(n) is to a person. | language |
| Which of the following are network hardware? | NIC, network media, connectors. |
| Which of the following are network software? | components that map to the Application layer of the OSI model, NOS |
| Do all networking vendors follow the OSI model and design seven-layer architectures? | No, there is the TCP/IP model and Cisco model. |
| Where do communications on a network originate? | source. |
| Which computer are transmitted signals bound for? | destination |
| What is information transmitted on a network called? | data frame |
| Name the 7 layers of the OSI model. | Application, Presentation, Session, Transport, Network, Data Link, Physical |
| Which layer of the OSI model is responsible for media access and packaging data into frames? | Data Link layer. |
| At which layer of the OSI model will encryption and compression occur? | Presentation layer. |
| Which layer is responsible for finding the best path to route packets within an internetwork? | Network |
| Name a reliable communications protocol? | TCP |
| Which protocol is used by the TFTP protocol | UDP |
| Name protocols which are used by the TCP/IP Application layer protocol. | DNS, FTP, TFTP, NFS, SMTP, Telnet, rlogin, SNMP, DNS, HTTP |
| What is the range of Registered Ports? | 1,024 through 49,151 |
| What is the range of Dynamic/Private Ports | 49,152 through 65,535 |
| How does TCP establish a reliable connection between two points? | TCP uses a three-way handshake. This process involves the exchange of three data packets before the communication process begins. |
| What is an expectational acknowledgment? | A TCP acknowledgment process in which the acknowledgment number refers to the next expected sequence number. |
| What is the function of the Internet Protocol (IP)? | It provides a connectionless delivery service. It moves packets around the network, including through routers. |
| What does ICMP (Internet Control Message Protocol do? | It controls and manages IP communications. |
| How many message types does ICMP use to manage the different aspects of IP communications? | 8. They are destination unreachable, time exceeded, parameter problem, source quench, redirect, echo request/reply, timestamp request/reply, and information request/reply. |
| What is the function of ARP? | It resolves IP addresses to MAC addresses for source hosts that know the IP address of the destination host, butt not the MAC address. |
| What does the acronym RARP stand for? | Reverse Address Resolution Protocol |
| What is the function of RARP? | It provides IP address to MAC address resolution. The host knows its MAC address, but not its IP address. |
| What are the tables that maintain MAC and IP addresses of other devices on the network called? | ARP tables. |
| Where are ARP tables maintained? | RAM (Randam Access Memory) |
| How do networks ensure that ARP table entries contain current entries? | They place a timer on ARP entries. |
| What is the process of removing ARP entries from an ARP table called? | aging |
| RARP has been largely replaced by what protocol? | DHCP (Dynamic Host Configuration Protocol. |
| What protocols provide the same basic functionality as RARP? | BOOTP and DHCP |
| How does segmenting a network reduce network traffic? | Routers do not forward broadcast traffic from one segment to another by default. |
| What do routers do. | They segment networks |
| What does the acronmym PING stand for? | Packet Internet Groper. |
| What does the PING utility do? | It verifies connectivity between two points. |
| When the ping command is issued, what happens? | the source node sends out ICMP echo request packets to the specified destination node. |
| What does the trace utility do? | It uses ICMP messages to determine the path between a source and destination host. It can discover all of the hops (routers) along the path between two points. |
| What is an ICMP flood? | It is used by a malicious user or program and sends a large quantity of ICMP echo requests to a target device in an attempt to crash or greatly reduce the performance of the target device. |
| What does a router do? | They connect two or more network segments. |
| How does a router determine which of its interfaces is connected to the destination network? | It uses a routing table. |
| What are the two types of routing tables? | Static and dynamic. |
| What does TTL stand for, and what does it mean? | Time-to-live is the number of hops a packet can make before it is discarded. |
| Why is a packet discarded when its TTL is zero? | It prevents a packet from looping endlessly around the network. |
| What methods are used by dynamic routers to determine the best path across a network? | They use distance-vector or link-state algorithms. |
| How does the distance-vector algorithm determine the best path across a network? | It considers the number of hops between two points. |
| How does a router use the link-state algorithm? | It takes network traffic, connection speed, and other factors into consideration. |
| What is the Cisco Three-Layer Hierarchical Model? | It is a model that emphasizes good network design and involves the access layer at the bottom, the distribution layer in the middle, and the core layer at the top. |
| What layer of the Cisco 3-layer model is closest to the users? | The bottom layer (Access layer). |
| What is the middle layer of the Cisco three-layer model? | Distribution layer. It provides many networking services (NAT, firewall protection, and QoS) and implements network policies. |
| What is the top layer of the Cisco three-layer model? | The Core layer is the top layer and is responsible for switching large amounts of data quickly and efficiently. |
| What is a node? | It is a connection point or junction on the network. It can be a terminal or a computer connected to the network. |
| A feature of TCP used to control the flow of communications between two hosts. | Sliding windows |
| How does the TCP sliding window regulate how often acknowledgments will be sent to the transmitting host from the receiving host. | the size of the TCP sliding window |
| A TCP acknowledgment process in which the acknowledgment number refers to the next expected sequence number. | expectational acknowledgment |
| A protocol that provides network administrators the ability to centrally control and monitor the network. | Simple Network Management Protocol (SNMP) |
| The number of hops that a packet can make before it is discarded. | time-to-live (TTL) |
| What keeps a packet from looping endlessly around the network. | When its TTL is zero, the router discards the packet. |