Match each description

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Layer 3

Source IP address

Layer 3

TTL

peer-to-peer application

a background service is required

169.254.1.5

a link-local address

127.0.0.1

a loopback address

198.133.219.2

a public address

store-and-forward

always stores the entire frame

240.2.6.255

an experimental address

cut-through

begins forwarding when the destination address is received

store-and-forward

checks the CRC before forwarding

store-and-forward

checks the frame length before forwarding

peer-to-peer network

client and server roles are set on a per request basis

MAC address

contained in the Layer 2 header

IP address

contained in the Layer 3 header

Layer 2

destination MAC address

cut-through

has low latency

physical topology diagram

location of a desktop PC in a classroom, path of cables that connect rooms to wiring closets

cut-through

may forward runt frames

retransmission

method of managing segment of data loss

peer-to-peer network

no dedicated server

window size

number of bytes a destination device can accept and process at one time

hardware threats

physical damage to servers, routers switches, cabling plant and workstations

maintenance threats

poor handling of key electrical components (electrostatic discharge), lack of critical spare parts, poor cabling, and poor labeling

packet filtering

prevents access based on IP or MAC address

application filtering

prevents access by port number

URL filtering

prevents access to websites

stateful packet inspection

prevents unsolicited incoming sessions

acknowledge

receiver by a sender before transmitting more segments in a session

peer-to-peer application

requires a specific user interface

MAC address

separated into OUI and a unique identifier

IP address

separated into a network portions and a unique identifier

environmental threats

temperature extremes (too hot or too cold) or humidity extremes (too wet or too dry)

message sizing

the process of breaking up a long message into individual pieces before sent over the network

message encoding

the process of converting information from one format into another acceptable for transmission

message encapsulation

the process of placing one message format inside another message format

error detection

this field checks of the frame has been damaged during the transfer

addressing

this field helps to direct the frame towards its destination

frame start

this field identifies the beginning of a frame

type

this field is used by the LLC to identify the Layer 3 protocol

global routing prefix

this network portion of the address is assigned by the provider

interface ID

this part of the address is the equivalent to the host portion of an Ip4 address

subnet ID

this part of the address is used by an organisation to identify subnets

sequence number

used to identify missing segments of data

electrical threats

voltage spikes, insufficient supply voltage (brownouts), unconditioned power (noise), and total power loss

IP address

32 or 128 bits

MAC address

48 bits

Layer 2

802.2 header

UDP

DHCP, TFTP

Layer 2

FCS (Frame Check Sequence)

TCP

FTP, HTTP, SMTP

logical topology diagram

IP address of a server


संबंधित स्टडी सेट्स

Campaign Basics > Report on Your Campaigns

View Set

What is the longest word you know

View Set

Med Surge Exam 1 Review Questions

View Set

Physiology of Health and Aging: Exam 1

View Set

CompTIA A+ Practice Exam 1 (220-1102)

View Set

Chapter 9 (section quiz 3) History

View Set

Chapter 39: PrepU - Management of patients with oral and esophageal diorders

View Set