Match each description
Layer 3
Source IP address
Layer 3
TTL
peer-to-peer application
a background service is required
169.254.1.5
a link-local address
127.0.0.1
a loopback address
198.133.219.2
a public address
store-and-forward
always stores the entire frame
240.2.6.255
an experimental address
cut-through
begins forwarding when the destination address is received
store-and-forward
checks the CRC before forwarding
store-and-forward
checks the frame length before forwarding
peer-to-peer network
client and server roles are set on a per request basis
MAC address
contained in the Layer 2 header
IP address
contained in the Layer 3 header
Layer 2
destination MAC address
cut-through
has low latency
physical topology diagram
location of a desktop PC in a classroom, path of cables that connect rooms to wiring closets
cut-through
may forward runt frames
retransmission
method of managing segment of data loss
peer-to-peer network
no dedicated server
window size
number of bytes a destination device can accept and process at one time
hardware threats
physical damage to servers, routers switches, cabling plant and workstations
maintenance threats
poor handling of key electrical components (electrostatic discharge), lack of critical spare parts, poor cabling, and poor labeling
packet filtering
prevents access based on IP or MAC address
application filtering
prevents access by port number
URL filtering
prevents access to websites
stateful packet inspection
prevents unsolicited incoming sessions
acknowledge
receiver by a sender before transmitting more segments in a session
peer-to-peer application
requires a specific user interface
MAC address
separated into OUI and a unique identifier
IP address
separated into a network portions and a unique identifier
environmental threats
temperature extremes (too hot or too cold) or humidity extremes (too wet or too dry)
message sizing
the process of breaking up a long message into individual pieces before sent over the network
message encoding
the process of converting information from one format into another acceptable for transmission
message encapsulation
the process of placing one message format inside another message format
error detection
this field checks of the frame has been damaged during the transfer
addressing
this field helps to direct the frame towards its destination
frame start
this field identifies the beginning of a frame
type
this field is used by the LLC to identify the Layer 3 protocol
global routing prefix
this network portion of the address is assigned by the provider
interface ID
this part of the address is the equivalent to the host portion of an Ip4 address
subnet ID
this part of the address is used by an organisation to identify subnets
sequence number
used to identify missing segments of data
electrical threats
voltage spikes, insufficient supply voltage (brownouts), unconditioned power (noise), and total power loss
IP address
32 or 128 bits
MAC address
48 bits
Layer 2
802.2 header
UDP
DHCP, TFTP
Layer 2
FCS (Frame Check Sequence)
TCP
FTP, HTTP, SMTP
logical topology diagram
IP address of a server
