Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password

Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

Chapter 1

Quiz yourself by thinking what should be in each of the black spaces below before clicking on it to display the answer.
        Help!  

Question
Answer
are used to connect networks together and route packets of data from one network to another   show
🗑
show Broadcast Domain  
🗑
show Router  
🗑
The router uses something called a ____interface for WAN connections, specifically, a V.35 physical interface on a Cisco router   show
🗑
two advantages of using routers in your network   show
🗑
Four router functions   show
🗑
This device forwards or filters frames   show
🗑
This device uses logical addressing and provide what is called packet switching   show
🗑
What is it called when routers connect two or more networks together and use logical addressing (IP or IPv6)?   show
🗑
show routing table  
🗑
show Switches  
🗑
show Collision Domain  
🗑
show Routers  
🗑
show bridge  
🗑
show Switches  
🗑
provide a separate broadcast domain for each interface   show
🗑
show will not  
🗑
even though you have a switched network, you still need a _____ to provide your inter-VLAN communication, or internetworking   show
🗑
show collision domain  
🗑
show OSI Layered Model  
🗑
 It encourages industry standardization by defining what functions occur at each layer of the model.  It allows various types of network hardware and software to communicate.   show
🗑
 It prevents changes in one layer from affecting other layers, so it does not hamper development   show
🗑
show OSI  
🗑
The bottom four layers of the OSI define how____ is transmitted end to end   show
🗑
show Session  
🗑
In the OSI, this layer • Presents data • Handles processing such as encryption   show
🗑
show Transport  
🗑
show Network  
🗑
Which OSI layer Combines packets into bytes and bytes into frames • Provides access to media using MAC address • Performs error detection not correction   show
🗑
Which OSI layer • Moves bits between devices • Specifies voltage, wire speed, • and pin-out of cables   show
🗑
show Application  
🗑
show Application  
🗑
show presentation layer  
🗑
show Session  
🗑
This layer provides dialog control between devices, or nodes. It coordinates communication between systems and serves to organize their communication by offering three different modes: simplex, half duplex, and full duplex   show
🗑
The _____ layer segments and reassembles data into a data stream   show
🗑
Services located in the _______ layer segment and reassemble data from upper-layer applications and unite it into the same data stream   show
🗑
What type of networking means that acknowledgments, sequencing, and flow control will be used? Reliable or Unreliable   show
🗑
____ ______ prevents a sending host on one side of the connection from overflowing the buffers in the receiving host—an event that can result in lost data   show
🗑
show connection.  
🗑
show acknowledged.Any segments not acknowledged are retransmitted.  
🗑
The purpose of flow control is to provide a means for the _______ to govern the amount of data sent by the ______.   show
🗑
In reliable transport operation, a device that wants to transmit sets up a connection-oriented communication with a remote device by creating a session. The transmitting device 1st establishes a connection-oriented session w/its peer system,which is_ _ _   show
🗑
show 1  
🗑
The second and third segments acknowledge the request and establish connection parameters—the rules—between hosts. is the what step of the 3 way handshake?   show
🗑
These segments request that the receiver’s sequencing is synchronized here as well so that a bidirectional connection is formed. At what step of the 3 way handshake does this happen?   show
🗑
The final segment is also an acknowledgment. It notifies the destination host that the connection agreement has been accepted and that the actual connection has been established. Data transfer can now begin.( what step of 3 way handshake is this?)   show
🗑
A service is considered _______-________ if it has the following characteristics:  A virtual circuit is set up (e.g., a three-way handshake).  It uses sequencing.  It uses acknowledgments.  It uses flow control   show
🗑
show flow control  
🗑
The quantity of data segments (measured in bytes) that the transmitting machine is allowed to send without receiving an acknowledgment for them is called a ______   show
🗑
If a receiving host fails to receive all the segments that it should acknowledge, the host can improve the communication session by decreasing the _______ size.   show
🗑
show destination IP address  
🗑
What type of packets are used to transport user data through the internetwork.?   show
🗑
What type of packets are used to update neighboring routers about the networks connected to and to help build and maintain routing tables on each router all routers within the internetwork?   show
🗑
Protocols that send route update packets are called _____ protocols   show
🗑
show routed .examples of routed protocols are IP and IPv6.  
🗑
show broadcast  
🗑
show Application  
🗑
show Presentation  
🗑
show Session  
🗑
What OSI layer does this describe? End-to-end connection   show
🗑
What OSI layer does this describe? Routing   show
🗑
What OSI layer does this describe? Framing   show
🗑
What OSI layer does this describe? Physical Topology   show
🗑
A service is considered ______ -______ if it has the following characteristics:  A virtual circuit is set up (e.g., a three-way handshake).  It uses sequencing.  It uses acknowledgments.  It uses flow control.   show
🗑
show Network.the Network layer must transport traffic between devices that aren’t locally attached. Routers (layer 3 devices) are specified at the Network layer and provide the routing services within an internetwork.  
🗑
Two types of packets are used at the Network layer?_____ and_______ _______   show
🗑
show Metric  
🗑
show Interface.Each interface in a router represents a separate network.it must be assigned unique network identification numbers, and each host on the network connected to that router must use the same network number.  
🗑
What is the number of routers a packet passes through en route to a remote network called?   show
🗑
Routers, by default, will or will not forward any broadcast or multicast packets.   show
🗑
show logical  
🗑
show access lists  
🗑
show Routers  
🗑
show  
🗑
show Interface.Each interface in a router represents a separate network.it must be assigned unique network identification numbers, and each host on the network connected to that router must use the same network number.  
🗑
show hop count  
🗑
Routers, by default, will or will not forward any broadcast or multicast packets.   show
🗑
show logical  
🗑
Routers can use ____ ______, created by an administrator, to control security on the types of packets that are allowed to enter or exit an interface.   show
🗑
_____ can provide layer 2 bridging functions if needed and can simultaneously route through the same interface.   show
🗑
show connections  
🗑
_____ can provide quality of service (QoS) for specific types of network traffic   show
🗑
The _____ _____ layer provides the physical transmission of the data and handles error notification, network topology, and flow control.   show
🗑
the Data Link layer will ensure that messages are delivered to the proper device on a LAN using ______ addresses and will translate messages from the Network layer into ___ for the Physical layer to transmit.   show
🗑
The Data Link layer formats the message into pieces, each called a data _____ and adds a customized header containing the hardware destination and source address   show
🗑
show Data Link  
🗑
show packet  
🗑
show Media Access Control (MAC) 802.3.Physical addressing is defined here, as well as logical topologies  
🗑
_____ topology is the signal path through a physical topology   show
🗑
show Logical Link Control (LLC) 802.2.An LLC header tells the Data Link layer what to do with a packet once a frame is received.  
🗑
show hardware (MAC) addresses.  
🗑
show application-specific integrated circuit (ASIC).  
🗑
show Latency  
🗑
Bridges and switches read each frame as it passes through the network. The layer 2 device then puts the source hardware address in a ____ table and keeps track of which port the frame was received on.   show
🗑
show networks  
🗑
show devices  
🗑
show It will forward the frame to all connected segments.If the unknown device that was sent the “mystery frame” replies to this forwarding action, the switch updates its filter table regarding that device’s location  
🗑
show Physical  
🗑
This layer is where you identify the interface between the data terminal equipment (DTE) and the data communication equipment (DCE).   show
🗑
show Hub  
🗑
show Ethernet  
🗑
Ethernet networking uses _____, a protocol that helps devices share the bandwidth evenly without having two devices transmit at the same time on the network medium.   show
🗑
Explain what happens with CSMA/CD on an Ethernet LAN....   show
🗑
show  Delay  Low throughput  Congestion  
🗑
show  With a connection from a switch to a host  With a connection from a switch to a switch  With a connection from a host to a host using a crossover cable Full-duplex Ethernet requires a point-to-point connection when only two nodes are present.  
🗑
There are no collisions in ____-duplex mode.   show
🗑
show full  
🗑
show network  
🗑
show *for Ethernet addressing, commonly referred to as hardware addressing or MAC addressing and for framing packets received from the Network layer and preparing them for transmission on the local network through the Ethernet contention media access method  
🗑
show 48,6  
🗑
______ are used at the Data Link layer to encapsulate packets handed down from the Network layer for transmission on a type of media access.   show
🗑
function of Ethernet stations is to pass data frames between each other using a group of bits known as a MAC frame format. This provides error _____ from a cyclic redundancy check (CRC)   show
🗑
Encapsulating a frame within a different type of frame is called _______   show
🗑
show broadcast  
🗑
show Multicast  
🗑
What type of cable is used to connect these ?  Host to switch or hub  Router to switch or hub   show
🗑
What type of cable is used to connect these ?  Switch to switch  Hub to hub  Host to host  Hub to switch  Router direct to host   show
🗑
To communicate&exchange info,each layer uses ____ ____ ____ These hold the control information attached to the data at each layer of the model. usually attached to the header in front of the data field but can also be in the trailer, or end, of it.   show
🗑
The Cisco hierarchical model...(The definition of the layers is logical, not physical.) The layer that provides the backbone is the ____   show
🗑
The Cisco hierarchical model... (The definition of the layers is logical, not physical.)The layer that provides the routing is the what layer?   show
🗑
The Cisco hierarchical model... (The definition of the layers is logical, not physical.)The layer that provides the switching is the what layer?   show
🗑
show Distribution  
🗑
These things should be done at which layer of the hierarchical model? Routing  Implementing tools (such as access lists), packet filtering, and queuing  Implementing security and network policies, including address translation and firewalls   show
🗑
These things should be done at which layer of the hierarchical model?  Redistributing between routing protocols, including static routing  Routing between VLANs and other workgroup support functions  Defining broadcast and multicast domains   show
🗑
In the cisco hierarchical model, the ____ layer controls user and workgroup access to internetwork resources.   show
🗑
show Access.Technologies such as DDR and Ethernet switching are frequently seen in the access layer. Static routing (instead of dynamic routing protocols) is seen here as well.  
🗑


   

Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
 
To hide a column, click on the column name.
 
To hide the entire table, click on the "Hide All" button.
 
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
 
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.

 
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how
Created by: mlletech
Popular Computers sets