Chatper 2,3,1?

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

The physical numeric address functions at a sublayer of the Data Link layer in the OSI network reference model, called the ____________________.

MAC Media Access Control

a communications technology that allows voice and multimedia communication sessions over IP networks (e.g., the Internet or an intranet)

VOIP

Though defined in terms of seconds, a TTL value is implemented as a number of hops that a packet can travel before being discarded by a router.

true

Multicast addresses in IPv6 use which of the following to define the portion of the Internet to which the multicast group pertains?

scope identifier

a 4-bit field limiting the valid range for a multicast address

scope identifier

____________________ involves cutting up a big message into a numbered sequence of chunks, called segments, in which each chunk represents the maximum data payload that the network media can carry between sender and receiver.

segmentation

How many possible fields can be contained in an IPv4 header?

14

In IPv4, what is the maximum time to live value?

255

IPv6 jumbograms are specified as a proposed standard in which of the following RFCs?

2675

The fixed IPv6 header of an IPv6 packet is made up of how many octets?

40

The header can be between 20 and how many bytes in length?

60

the header can be between 20 and how many bytes in lenght

60

a method of allowing IPv6 network nodes to communicate with each other over an IPv4 network by special encapsulation of IPv6 packets

6to4

the field taht defines where a fragment should be place when the entire data set is reassembled

A= Fragment Offset Field

Which of the following technologies is used to permit computers to translate numeric IP addresses to MAC layer addresses?

ARP Address Resolution Protocol

Which of the following is a special marker with which traffic can be prioritized by an end device or boundary device and queued and forwarded according to this value?

DSCP

Which of the following allows IPv4 addresses from Class A, B, or C to be combined and treated as a larger address space, or subdivided arbitrarily, as needed?

CIDR Classless inter-domain routing in IPv4

Which class of IP addresses are used for multicast communications, in which a single address may be associated with more than one network host machine?

Calss D

What technology gets its name from the notion that it ignores the traditional A, B, and C class designations for IP addresses?

Classless Inter-Domain Routing

The ____ extension header provides a method for extending the IPv6 header to support options for packet handling and preferences.

Destination Options

Previously, IPv6 specified that interface identifiers followed which format, which specifies a unique 64-bit interface identifier for each interface?

EUI-64

_________________________ was designed to provide devices with a method for notifying each other that a link is experiencing congestion before the routers start to drop packets.

Explcit Congestion Notification

_________________________ allow additional functionality to be implemented in an IPv6 packet.

Extension headers

When a packet is sent between two ECN-capable routers, the packet is usually marked ECT(0) or ECT(10) for ECN Capable Transport.

FALSE

Providing a narrower address space is the primary design goal for IPv6.

FALSE(Providing a much larger address pace is one of the primary design goals for IPv6)

Class D addresses are used strictly for unicast applications.

False

For each network reference model layer, the software handles packages of data, which are called packet defined units.

False

Because PHB is independent of how individual routers are configured, the end-to-end behavior of traffic is predictable.

False PHB is dependent on how

If the packet is a fragment, the _________________________ field shows where to place this packet's data when the fragments are reassembled into a single packet.

Fragment offset field

Jumbograms use which of the following extension headers to add an alternate Packet Length field of 32 bytes?

Hop-by-Hop opations

Which extension header is designed to carry information that affects routers along a path?

Hop-by-Hop options

Briefly describe three options for analyzing switched networks.

Hubbing out/tap device - place a devices between switch and monitored devices. All traffic to and from the server can be monitored port redirection = copes packets traveling from one port to another, you can place analyzer at destination port and listen in Remote monitoring (RMON) - this uses SNMP to collect traffic data and can display entire packet decodes

What name is given to a device that interconnects multiple IP networks or subnets?

IP gateway

When a computer on one subnet wishes to communicate with a computer on another subnet, traffic must be forwarded from the sender to which of the following devices?

IP gateway

What is the purpose of the Internet Architecture Board?

Internet Activities Board (The Internet Architecture Board (IAB), a.k.a. Internet Activities Board, is the arm of the ISOC that is the parent organization for the standards-making and research groups that handle current and future Internet technologies, protocols, and research. As such, the IAB's most important task is to provide oversight for the architecture for all Internet protocols and procedures, and to supply editorial oversight over the documents known as Requests for Comments (RFCs), wherein Internet Standards are stated, and so forth.)

Which organization is responsible for creating and managing RFCs, in which the rules and formats for all related protocols and services are described?

Internet Engineering Task Force

What is the purpose of the following protocols: Internet Protocol, Internet Control Message Protocol, and Address Resolution Protocol.

Internet Protocol (IP): Routes packets from sender to receiver. Internet Control Message Protocol (ICMP): Handles information about IP-based routing and network behavior, especially as they relate to "traffic conditions" and errors. Address Resolution Protocol (ARP): Address Resolution Protocol (ARP) converts between numeric IP network addresses and Media Access Control (MAC) addresses on a specific cable segment (always used for the final step of packet delivery).Routing:This defines the mechanism that forwards packets from sender to receiver, in which numerous intermediate relays may be involved in achieving delivery from sender to receiver.

Which term refers to a single logical network composed of multiple physical networks, which may all be at a single physical location, or spread among multiple physical locations?

Internetwork

a specification for allowing very large ( beyond 4-gigabyte) patckets to be transported using IPv6

Jumbogram

the logest period of time a datagram may exist

Maximum Data lifetime (MLD)

Which technology allows networks use multiple private IPv4 addresses internally and maps them to one or more public IPv4 addresses externally?

NAT

In which layer are notions of network location addressed and the intricacies of directing a PDU from sender to receiver handled?

Network layer

In IPv6, each extension header is identified by a specific value known as which of the following.

Next Header

Which field specifies the header type of the header immediately following the IPv6 header?

Next Header

What field in the basic IPv6 header is used to chain additional headers?

Next header

The Internet Protocol (IP) primarily works to transmit and deliver data between devices on internetworks.

True

What is the difference between the Open Shortest Path First protocol and the Border Gateway Protocol?

Open Shortest Path First (OSPF): Defines a widely used, link-state routing protocol for local or interior routing regions within local internetworks. Border Gateway Protocol (BGP): Defines a widely used routing protocol that connects to common Internet backbones, or other routing domains within the Internet where multiple parties jointly share responsibility for managing traffic.

Which OSI model layer handles the conversion of outgoing data from bits that computers use in the signals that networks use?

Physical

Which RFC is used to define a method for differentiating services for network traffic using the six high-order bits of the byte that was formerly the 3-bit Precedence field and the first bit of the TOS field?

RFC - 2474

Which RFC reserves three ranges of IP addresses for private use - a single Class A (10.0.0.0-10.255.255.255), 16 Class Bs (172.16.0.0-172.31.255.255), and 256 Class Cs (192.168.0.0-192.168.255.255)?

RFC 1918

What protocol is used to translate MAC layer addresses into numeric IP addresses?

Reberse Address resolution Protocol (RARP)

____________________ informs the network interface card to pass packets sent to that address to the IP stack so their contents can be read, and tells the IP gateway to forward such traffic onto the physical network, where the listening network interface resides.

Registration

Which IPv6 header includes fields for the intermediary addresses through which the IPv6 packet should be forwarded?

Routing extension

In which layer are ongoing communications between a sender and a receiver set up, maintained, and then terminated, or torn down, as needed?

Session layer

Which of the following is a TCP/IP model Transport layer protocol?

TCP

The Type of Service field actually has two components: Precedence and which of the following?

TOS ( type of Service)

As a frame moves from interface to interface, the IP source and destination address information is preserved.

TRUE

IP addresses can be represented as domain names to make it possible for users to identify and access resources on a network.

TRUE

When a host uses a service that employs a multicast address, it registers itself to "listen" on that address, as well as on its own unique host address (and the broadcast address).

TRUE

In networking terms, the remaining distance that the packet can travel is known as which of the following?

TTL time to live

A divide and conquer approach permits concerns related to networking hardware to be completely separated from those related to networking software.

True

Which field defines the length of the IP header and any valid data (although it does not include any data link padding)?

Totla lenght

Which field in an IPv6 packet is used by source network hosts and forwarding routers to distinguished classes or priorities?

Traffice class field

What technique may be performed by boundary devices that include proxy server capabilities to replace private IP addresses with one or more public IP addresses as outbound traffic exits the server, and to replace such public addresses with their proper private equivalents as incoming traffic passes through the server?

address masquerading

Q - an address that can be combined with other addresses into a single entry in the router table

aggregated global unicast address

packets goes to the nearest single instance of this address

anycast address

allows internetwork devices to perform complex address recognition and management functions that can keep up with data volumes and time-sensitive processing needs

application-specifit integrated circuits

Which of the following represents a network address that all hosts on a network must read?

broadcast address

Which technique is known as the simplest form of subnet masking in which each subnet includes the same number of stations and represents a simple division of the address space made available by subnetting into multiple equal segments?

constant-length subnet masking

What are applied to the packets that are captured into the trace buffer so you can see the packets in a readable format?

decodes

A(n) _________________________ is a set of packets for which a source requires special handling by the intervening routers.

flow

The value in which of the following fields will decrement by one each time it is forwarded by a network node, and the IPv6 packet is discarded if the value in this field reaches 0?

hop limit

Which term is used to describe the data frame crossing a router?

hops

in IPv6 addressing, a bit string that uniquely identifies a particular interface

interface identifier

an addressing scheme that is designed to be used only on a single segment of a local network

link-local address

an IPv6 address that is all zeros except for the very last bit, which is set to 1 and may be represented as ::1 in compact notation

loop back address

In IPv6, _________________________ addresses are used to send an identical message to multiple hosts.

multicast addresses

Calss D addresses are used stricly for unicast applications

multicast communications

a technique used by IPv6 nodes to determine the size of packets that can be transmitted along a proposed network path from a source to a network address

path MTU Deiscover PMTU

What type of address is a six-byte numeric address, burned into firmware (on a chip) by network interface manufacturers?

physical nuymberic address

a definition of priority for an IP packet

precedence

Which of the following can be used to replace internal network addresses with one or more different addresses so the traffic that actually travels over the public Internet does not reveal the address structure of the internal network to outsiders?

proxy server

a way of reducing the number of individual routing table entries that routers must manage

route aggregation

A special bit pattern that "blocks off " the network portion of an IPv4 address with an all-ones pattern is known as which of the following?

subnet mask

The activity of stealing (borrowing) bits from the host portion to further subdivide the network portion of an address is called ____________________.

subnetting

____________________ combines contiguous network addresses by stealing bits from the network portion and using them to create a single, larger contiguous address space for host addresses.

supernetting

an indication of the remaining distance that a packet can travel

time to live (TTL)

Which part of a PDU is most likely to provide data integrity checks for the data portion of the PDU?

trailer

To be valid, any domain name must correspond to at least one of which of the following?

unique numeric IP address

In IPv6, which address contains all zeros and can be represented as two colon characters (::) in normal notation?

unspecified

In which subnetting technique can a single address to be subdivided into multiple subnets, in which subnets need not all be the same size?

variable-lenght subnet masking (VLSM)


Set pelajaran terkait

Chapter 15; Atherosclerosis and other Arterial Diseases

View Set

LEGAL, ETHICAL & MORAL ISSUES OF HEALTH CARE

View Set

Positive and Negative reinforcement. 3 term contingency

View Set

Econ 320 Lecture 12 Practice Problems

View Set

Employment Law Exam 2: week 2 quizzes

View Set