Networking Exam 2

0.0(0)
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/84

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

85 Terms

1
New cards

Is 10.3.45.78 routable on the internet? If yes indicate class. If no why?

No, Private A

2
New cards

Is 222.546.23.4 routable on the internet? If yes indicate class. If no, why?

No, 546>255

3
New cards

Is 187.34.24.56 routable on the internet? If yes indicate class. If no, why?

Yes, Class B

4
New cards

Is 195.168.3.1 routable on the internet? If yes indicate class. If no, why?

Yes, Class C

5
New cards

Subnetting is _

the practice of dividing a network into two or more networks

6
New cards

Routing Tables _

specifies how messages will travel through the network

7
New cards

T or F: Compared to a hub, a switch is intelligent and can read the frame and determine where to send it

True

8
New cards

T or F: The IP address 127.192.240.0 is a valid subnet mask

False (needs to be continuous 1’s, then 0’s)

9
New cards

What component of the computer provides it with a MAC address?

NIC (network card interface)

10
New cards

A MAC address is composed of two 24-bit numbers. What does the first 24-bit number represent?

It’s the organizationally unique identifier for the manufacturer of the device

11
New cards

A network address is 131.247.160.0/19. The 19 implies that _

19 bits are reserved for the network part of IP addresses on the network

12
New cards

The IPv6 address below 2001:0db8:0000:0000:aaaa:0000:eeee:0001 should be written as _

2001:db8::aaaa:0:eeee:1

13
New cards

The advantage(s) of using two different addresses on a computer (MAC address and IP address) include:

It is possible to upgrade the IP software without upgrading the network hardware

It is possible to upgrade the network hardware without upgrading the IP software

The data link and network layers can be independent of each other

14
New cards

Flow control in TCP is used to _

Slow down the sender if necessary

15
New cards

Given the subnet 10.5.12.0/22, which of the following IP addresses is a valid host address residing within the network?

A. 10.5.12.0

B. 10.5.16.1

C. 10.5.14.255

D. 10.5.15.255

10.5.14.255

16
New cards

A routing table is a table stored in a router which keeps track of _

the best paths to destination networks

17
New cards

Suppose you have leased the following network ID 145.34.0.0 and you want to divide it into 20 subnets to correspond to the 20 different departments in your company: What class of an address is this?

Class B

18
New cards

Suppose you have leased the following network ID 145.34.0.0 and you want to divide it into 20 subnets to correspond to the 20 different departments in your company: What is the default subnet mask for this class?

255.255.0.0 or /16

19
New cards

Suppose you have leased the following network ID 145.34.0.0 and you want to divide it into 20 subnets to correspond to the 20 different departments in your company: How many bits from the host space do you need to use so that you can create 20 subnets?

5

20
New cards

Suppose you have leased the following network ID 145.34.0.0 and you want to divide it into 20 subnets to correspond to the 20 different departments in your company: How many subnets will you be able to create with these borrowed bits?

32 (2^5=32)

21
New cards

Suppose you have leased the following network ID 145.34.0.0 and you want to divide it into 20 subnets to correspond to the 20 different departments in your company: What is the new subnet mask in Binary, Dotted Decimal, and Slash Notation?

11111111.11111111.11111000.00000000, 255.255.248.0, /21

22
New cards

Suppose you have leased the following network ID 145.34.0.0 and you want to divide it into 20 subnets to correspond to the 20 different departments in your company: If the new subnet mask is /21, how many unique hosts can you put on each of these subnets?

2046

23
New cards

Suppose you have leased the following network ID 145.34.0.0 and you want to divide it into 20 subnets to correspond to the 20 different departments in your company: If the new subnet mask is /21, what is the maximum number of unique hosts you can put on each of these subnets?

2046

24
New cards

Purpose of the data link layer is _

to move a message or a frame from one hub to another hub

25
New cards

What is a hub?

A device that has multiple ports that accepts ethernet connections from network devices

26
New cards

Routers connect

two or more networks

27
New cards

The network architecture component which contains the organization’s servers is called _

data center

28
New cards

When the data link layer detects errors in incoming data, it typically _

deletes the data

29
New cards

A 12-bit binary number can be used to uniquely label _ objects

4096

30
New cards

T or F: The building block process of network design focuses on predicting user traffic to optimize network capacity

False

31
New cards

T or F: Rather than predicting user traffic, the building block process emphasizes simplicity of design

True

32
New cards

Is 128.192.5.4 routable on the internet? If yes indicate class. If no, why?

Yes, Class B

33
New cards

Is 10.2.56.145 routable on the internet? If yes indicate class. If no, why?

No, Private A

34
New cards

Is 127.0.0.0 routable on the internet? If yes indicate class. If no, why?

No, Loopback

35
New cards

Given the subnet 10.5.12.0/22, which of the following IP addresses is a valid host address residing within the network?

A. 10.5.14.255

C. 10.5.12.0

D. 10.5.13.272

E. 10.5.15.255

10.5.14.255

36
New cards

If an error is detected in the network architecture, which layer fixes it?

TCP Transport Layer

37
New cards

Information Bits are those used to convey the user’s _

meaning

38
New cards

Overhead bits are used for purposes such as _ and marking the start and end of _

error checking/characters and packets

39
New cards

How long is IPV4?

32 bits (4 bytes)

40
New cards

How long is IPV6

128 bits (16 bytes)

41
New cards

T or F: IP addresses are NOT assigned at random like MAC addresses or even on first come first serve basis

True

42
New cards

there are two addresses on every network that are reserved – the first one is called _ and the second is called _

subnet ID/broadcast network

43
New cards

What is controlled access?

A type of media access control where the wireless access point controls the circuit and determines which clients can transmit at what times (By request, roll call polling, token passing)

44
New cards

What is contention based access?

A type of media control where computer wait until the circuit is free (no other computers are transmitting) and then transmit whenever they have data to send

45
New cards

Most wireless LAN’s use _

controlled access

46
New cards

_ is commonly used in ethernet LAN’s

contention

47
New cards

_ are controlled by network hardware and software, typically consist of corrupted and lost data

network error

48
New cards

_ are controlled by application programs and typically result from a mistake in typing a number

human erros

49
New cards

Sources of error include:

line outages, white noise, impulse noises, cross talk, echo, attenuation, intermodulation noise, jitter, harmonic distortion

50
New cards

A data link protocol determines _

who can transmit at what time, where a message begins and ends, and how a receiver recognizes and corrects a transmission error

51
New cards

An objective of the network:

move as many bits as possible with minimum errors (higher efficiency and lower cost)

52
New cards

What is a session?

a conversation between two computers, when the sender wants to send a message it first establishes a session with the destination computer

53
New cards

What are the responsibilities of the transport layer (TCP)?

Linking to the application layer, segmentation (splitting large data into small chunks) so it can be sent over networks, session management (end to end responsibility)

54
New cards

What are the responsibilities of the network layer (IP)?

Addressing (finding destination address), routing (finding best route through network)

55
New cards

What does a TCP 3 way handshake look like?

Client - Hi, I want to talk to you

Server - Sure, I also want to talk. Are you ready?

Client - Ok, lets talk

56
New cards

UDP (user datagram protocol)

Connection-less protocol, unreliable (used to send only 1 frame), does not check for lost messages so a datagram is occasionally lost and the message must be resent. Decision on which protocol to use is left to the engineer

57
New cards

TCP (transmission control protocol)

Connection-oriented protocol, reliable (establishes connection with 3 way handshake), 4 way to end, many applications use this

58
New cards

IP (internet protocol)

Routable, unreliable (does not do error checking, just goes and sends), address assignment (where IP address comes from, static vs dynamic)

59
New cards

ICMP (internet control message protocol)

Between routers

60
New cards

ARP (address resolution protocol)

Non-routable (only function locally), MAC address

61
New cards

How many bytes of MAC address?

6 bytes

62
New cards

What is the type of address for the application layer?

Web url, email (assigned by software)

63
New cards

What is the type of address for the transport layer?

port number (well-known, registered, and temporary) (assigned by software)

64
New cards

What is the type of address for the network layer?

IP address: IPV4 and IPV6 (assigned by software)

65
New cards

What is the type of address for the data link layer?

MAC (media access control) (assigned by hardware, typically manufacturers)

66
New cards

There are _ addresses in the IPV4 address space

4.3 billion

67
New cards

IP addresses are managed by _

IANA (internet assigned numbers authority) (assigns these numbers to regional internet registries)

68
New cards

What is ARP (address resolution protocol) used for?

to find a MAC address from a host where it knows its IP address, maps an IP to a MAC address

69
New cards

Centralized routing

one computer does all the routing, common in host-based architecture, send all the messages to the central computer which performs the task of ‘routing’

70
New cards

Static decentralized routing

each computer does its own routing, routing tables change only as the network changes, static routing is commonly used in networks that have few routing options that seldom change

71
New cards

Dynamic decentralized routing

each computer does its own routing, routing tables are adjusted on the fly based on distance vector (# of hops) and link state (determines how fast each route is)

72
New cards

Enterprise edge

the parts of a network that are at the edge of an enterprise campus and connect that campus to the rest of the world

73
New cards

Needs analysis

the process during which the designer attempts to understand the fundamental current and future network needs of the various users, departments, and applications

74
New cards

Technology design

examines the available technologies and assesses which options will meet users’ needs

75
New cards

Cost assessment

The relative costs of the technologies are considered

76
New cards

LAN (local area network) (access layer)

enables users to access the network (network hub, switches, and AP’s)

77
New cards

Building backbone network (distribution layer)

It distributes network traffic to and from the LAN’s (faster switches)

78
New cards

Campus backbone (core layer)

It connects all the buildings on one campus (routers or 3 layer switches)

79
New cards

Data center

data center contains the organization’s servers (database servers, email servers)

80
New cards

WAN (wide area network)

private network that connects its different campus locations, usually leased from a common carrier such as AT&T; used for private use of the organization and only carries its network traffic from one campus to another

81
New cards

Internet access

It enables the organization to connect to the internet. Internet access carries traffic from many different organizations

82
New cards

E-commerce edge

A special LAN with a group of servers that enables electronic data exchange between organization and the external entities with which it does business (customers and suppliers)

83
New cards

Parity check

one additional bit is added to each byte in the message, the value of this addition is based on the number of 1’s in each byte transmitted

84
New cards

Checksum

typically 1 byte, added to the end of the message, calculated by adding the decimal value of each character in the message, dividing the sum by 255, and using the remainder as one

85
New cards

Cyclic redundancy check (crc)

a message is treated as one long binary number, which is divided by a preset number, and the remainder is used as a code