Midterm 1 - CECS 303

5.0(1)
studied byStudied by 35 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/154

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

155 Terms

1
New cards

IEEE

An international society of engineering professionals whose goal is to promote development and education in electrical engineering and computer science fields.

2
New cards

IEEE Project 802

Effort to standardize physical and logical network elements.

3
New cards

802.3

Ethernet

4
New cards

802.11

Wireless

5
New cards

ISO (International Organization for Standardization)

Organization whose goal is to establish technological standards to facilitate global information exchange and barrier free trade.

6
New cards

ITU (International Telecommunication Union)

global telecommunication issues and worldwide internet services implementation

7
New cards

ISOC (Internet Society)

supports growth of the internet. Establishes technical internet standards.

8
New cards

IP (Internet Protocol) address

An address identifying computers in TCP/IP (Internet) based networks. Network Layer Protocol.

9
New cards

IANA (Internet Assigned Numbers Authority)

Assigns IP addresses. Was split up into three regional registries

10
New cards

ARIN

American Internet Registry

11
New cards

APNIC

Asia Pacific Internet Registry

12
New cards

RIPE

European Internet Registry

13
New cards

OSI Model

Model for understanding and developing host to host commections

14
New cards

PDUS (protocol data units)

Discrete amounts of data. Flows through layers 6, 5, 4, 3, 2, 1.

15
New cards

Type of PDUS in Layers 5-7

data

16
New cards

Type of PDUS in Layer 4

Segment

17
New cards

Type of PDUS in Layer 3

Packet

18
New cards

Type of PDUS in Layer 2

Frame

19
New cards

Type of PDUS in Layer 1

Bits

20
New cards

Application layer

does not include the software apps, facilitates communication between software apps and lower layer network services. EX: HTTP

21
New cards

Presentation Layer

accepts application layer data. Formats data that is understandable to different applications and hosts. EX of files translated: GIF, JPG, MPEG. Manages data encryption and decryption (SSL)

22
New cards

Session Layer

Coordinate and maintain communication between two network nodes (keeping alive communications throughout the session). Helps keep communications secure, synchronized dialogue, etc.)

23
New cards

Transport Layer

Accepts data from the sessions layer. Manages end to end data delivery. Handles flow control.

24
New cards

TCP Handshake

Connection Oriented Protocol. SYN -> SYN-ACK -> ACK. Has a checksum for data integrity.

25
New cards

UDP

Connectionless protocol. Does not establish a connection, does not check for data integrity BUT much faster.

26
New cards

Segmentation

Breaks large data units received from the session layer into smaller units called segments. Increases data transmission efficiency.

27
New cards

Network Layer

Translates network addresses into physical counterparts. Decides how to route data from sender to receiver. Know addressing and routing. Linked to firewalls. EX. Routers

28
New cards

Addressing

A system for assigning unique identification numbers to network devices.

29
New cards

Network Address

logical or virtual, EX 192.168.1.4

30
New cards

Physical Address

MAC. A fixed number associated with each device’s network interface EX. A6-2B-B5-AE-00-FB (48 bits)

31
New cards

Factors to determine path routing

delivery priority, network congestion, quality of service, cost of alternative routes.

32
New cards

Fragmentation

subdividing transport layer segments

33
New cards

Data Link Layer

Divides data received into distinct frames for transmission in Physical layer. Uses Frames

34
New cards

Frame

structured package for moving data. Includes raw data payload, sender and receiver network addresses, and error checking and control information. Not all info is received, corrected by error checking. Checks for errors by frame check sequence and cyclic redundancy check

35
New cards

LLC (Logical Link Control)

sublayer of the datalink layer

36
New cards

MAC (Media Access Control)

sublayer of the datalink layer. manages access to the physical medium, and appends the physical address of the destination computer onto data frame

37
New cards

Physical Layer

accepts frames from the data link layer. Generate signals as changes in voltage at the NIC.

38
New cards

Copper

signals issues as voltage

39
New cards

Fiber-optic

signals issued as light pulse

40
New cards

Wireless

signals issued as electromagnetic waves

41
New cards

Computer network

A group of interconnected computers and devices. Connected by transmission media. ADVANTAGES -> device and resource sharing by multiple users. Central network management.

42
New cards

Peer to Peer

direct computer communication, equal authority, individual resource sharing (up to individuals if resources are shared). Advantages-> simple config, less expensive. Disadvantages-> not flexible, less secure, not practical for large installations / businesses. Resources shared by modifying file sharing controls (user controlled). Not centrally controlled (access not uniform or secure). EX: Napster, Bittorrent

43
New cards

Server

central computer, facilitates communication and resource sharing. RESPONSIBILITIES -> manage client data/resources, authenticate access, control file access, restrict user network access, dictate computer communication rules, supply applications to clients. OS EXAMPLES -> unix, linux, Microsoft server, macOS Server. Compared to clients, has increased memory, processing, storage plus probably has special hardware.

44
New cards

Clients

personal computers, mobile devices, IoT

45
New cards

LAN (local area network)

Network confined to a small location. Currently used for large complex client/server networks and P2P networks

46
New cards

MAN (metropolitan area network)

Connects clients and server from multiple buildings. EX: CSULB

47
New cards

WAN (Wide area network)

Connects two or more geographically separate LANS or MANS. Often connected via the internet and different internet service providers.

48
New cards

Common Network Uses

File and Print Services, Access Services, Mail Servers

49
New cards

Internet Protocol

Determines how and where data is delivered, including data’s source and destination address. Enables TCP/IP to internetwork. Contains network layer data formed into packets.

50
New cards

IP packet

data envelope containing information for routers to transfer data between different LAN segments

51
New cards

IPv4

IP version that is unreliable and has connectionless protocol

52
New cards

IPv6

IP version that has connectionless and connection-oriented protocol. Was created because more IP addresses were needed.

53
New cards

ARP (Address Resolution Protocol)

Network layer protcol used with IPv4. Contains MAC (physical) address of a host or node. Creates a database mapping MAC addresses to IP addresses.

54
New cards

ARP Table

Table of recognized MAC-to-IP address mappings, stored locally on network devices, increases efficiency. Contains dynamic and static entries

55
New cards

ICMP (Internet Control Message Protocol)

Network layer protocol reporting on data delivery success or failure. Announces transmission failures to the sender. cannot correct errors, but provides critical network troubleshooting information

56
New cards

Class A IPv4

0-127 First Octet, 0.0.0.0 - 127.255.255.255. Subnet Mask 255.0.0.0

57
New cards

Class B

128-191 First Octet. 128.0.0.0-191.255.255.255. Subnet Mask 255.255.0.0

58
New cards

Class C IPv4

192-233 First Octet, 192.0.0.0- 223.255.255.255, Subnet Mask 255.255.255.0

59
New cards

Class D IPv4

Multicast. 224-239 First Octet, 224.0.0.0.0- 239.255.255.255

60
New cards

Class E

Experiemental. 240-255 First Octet. 240.0.0.0- 255.255.255.255

61
New cards

What is the first octet of the loopback address?

127 (127.0.0.1), used for loopback tests.

62
New cards

What is a loopback test used for?

Attempting to connect to your own machine, useful for troubleshooting

63
New cards

ifconfig

command used for loopback tests on Linux/Unix and Windows

64
New cards

dotted decimal notation

Common way of expressing IP addresses, each octet is a decimal number between 0 and 255 separated by periods.

65
New cards

subnet mask

A 32-bit number identifying a device’s subnet, used to inform the network about the logical subdivision of IPs.

66
New cards

How is a subnet mask formatted?

Four octets (32 bits), expressed in binary or dotted decimal notation.

67
New cards

How many bits does an IPv6 address have?

28 bits, composed of eight 16-bit fields.

68
New cards

How do most companies and individuals obtain IP addresses?

From ISPs.

69
New cards

What is a static IP address?

An IP address that is manually assigned.

70
New cards

What is a dynamic IP address?

An IP address that is assigned automatically via DHCP.

71
New cards

DHCP

Automatically assigns a unique IP address.

72
New cards

DHCP leasing process

The device borrows an IP address while attached to the network.

73
New cards

What determines the lease time in DHCP?

It is determined when the client logs on.

74
New cards

When may a DHCP lease be terminated?

A user may force lease termination, and it can be manually terminated due to server failure, network troubleshooting, or another client needing the IP address.

75
New cards

What do hosts within an organization use private addresses for?

Internal communication, not routed on public networks.

76
New cards

Socket

A combination of a port number and a host machine’s IP address.

77
New cards

Well Known ports

0 to 1023

78
New cards

Registered Ports

1024 to 49151

79
New cards

Dynamic/private ports

49152 to 65535

80
New cards

Why are domain names used instead of IP addresses?

Because IP addresses are long and complex, so domain names are used for easier human interaction.

81
New cards

domain name

A group of computers belonging to the same organization (e.g., abc.com).

82
New cards

DNS

Associates domain names with IP addresses.

83
New cards

What are the three types of DNS servers?

Resolvers, authoritative name servers, and root servers.

84
New cards

recursive DNS query

The resolver responds directly to a client with a top-down search.

85
New cards

iterative DNS query

The resolver provides a direct answer if known or refers the client to another server.

86
New cards

non-recursive DNS query

The resolver has the answer cached.

87
New cards

DDNS

Automatically updates DNS records when IP addresses change.

88
New cards

Who typically uses DDNS?

Small businesses or individuals with dynamic external IP addresses.

89
New cards

How can external LAN security breaches be prevented?

By restricting access at every point where the LAN connects to the rest of the world.

90
New cards

Router Access List

Controls traffic through routers

91
New cards

router’s main functions

Examine packets and determine the destination based on Network layer addressing information.

92
New cards

ACL (access control list)

routers can decline to forward certain packets.

93
New cards

Stateless ACL

Access lists look at packets independently of previous traffic.

94
New cards

Stateful ACL

Allow traffic implicitly based on previous traffic.

95
New cards

What variables do ACLs use to permit or deny traffic?

Network layer protocol, transport layer protocol, source IP address, source netmask, destination IP address, destination netmask, TCP or UDP port number.

96
New cards

What happens when a router receives a packet?

The router examines the packet and refers to the ACL for permit/deny criteria. It drops the packet if deny characteristics match or forwards it if permit characteristics match.

97
New cards

firewall

A specialized device or computer installed with specialized software that selectively filters and blocks traffic between networks.

98
New cards

What are the locations of firewalls?

Between two interconnected private networks, between a private network and a public network (network-based firewall), and between two hosts (host-based firewall).

99
New cards

What is the most common form of firewall?

Packet filters

100
New cards

stateful packet filter

Makes decisions based on previous traffic, such as allowing return traffic from a web server.