Chapter 4 Study Guide

meetcokeNetworking and Communications

Oct 26, 2013 (3 years and 11 months ago)

71 views

IT Essentials II: Network Operating Systems,
version 3




1

Module4



Created by Glenn Wright, ESC XI


Ft. Worth, Texas

Name:

_______________________________


Date:

________________



IT Essentials II: Network Operating Systems

Module

4


4.1.1

What is a closed network system?

A network system is called "closed"
when one company owns and
controls it.

What is an open network system?

An open system means that the
specifications for the Internet
protocols were made publicly
available so that any company could
build computer hardware or software
that implements them. This strategy
allows customers

4.1.2

What

are the four layers of the TCP/IP model?

Application layer

Transport layer

Internet layer

Network access layer

What OSI model layers are represented by the following TCP/IP model layers


Application

Application

Presentation

Session


Transport

Transport


Internet

Network


Network access

Data link

Physical

Which ports are used for the following items


FTP

21


Telnet

23


DNS

53


HTTP (Web access)

80

At
which layer of the TCP/IP model does ICMP exist?

Internet

What

is the function of the netstat utility?

View network connections and
protocol statistics.

IT Essentials II: Network Operating Systems,
version 3




2

Module4



Created by Glenn Wright, ESC XI


Ft. Worth, Texas

4.1.2

What is the function of the ping utility?

Determine IP connectivity between
two systems.

4.1.3

Which protocol
suite has

all of today’s NOS vendors
adopted for carrying data between client and server
systems?

Today, all NOS vendors have
adopted the TCP/IP protocol suite
for carrying data between client and
server systems.

4.2.1

What

must each
connection point on a device have?

One unique identifier, or address per
connection point.

What
Linux command can be used to temporarily change
an IP address and network mask of the Ethernet 0 adapter?

ifconfig eth0
<IP
address>

netmask

<address>

What
Linux command can be used to temporarily change
the default gateway?

route add default gw
<gateway
address>

What

file would a technician need to edit to permanently
change the IP address of Ethernet 0 on a Linux Red Hat
computer?


By editing the IPADDRE
SS line in
the file /etc/sysconfig/network
-
scripts/ifcfg
-
eth0

4.2.2

What are the two parts of every IP address?

Network

Host

What type of addressing contains different levels and can
be broken down into multiple parts?

Hierarchical addressing

An IP address is divided into four parts, separated by
periods. What is each of the parts referred to as?

An "octet"

What is the range for Class A addresses?

0


127*

What is the range for Class B addresses?

128


191

What is
the range for Class C addresses?

192


223

4.2.3

What is the format of a Class A address?

Network.Host.Host.Host, or
N.H.H.H.

What address

is known as the “local loopback” address?

The IP address 127.0.0.1 is known
as the "local loopback"
address

4.2.4

What is the format of a Class B address?

Network.Network.Host.Host, or
N.N.H.H.

4.2.5

What is the format of a Class C address?

Network.Network.Network.Host, or
N.N.N.H.

4.2.6


What are Class D addresses reserved for?

Class D is
reserved for a technique
called multicast.

What are Class E addresses reserved for?

E addresses are used for
experimental purposes.

IT Essentials II: Network Operating Systems,
version 3




3

Module4



Created by Glenn Wright, ESC XI


Ft. Worth, Texas

4.2.6


What

class(es) of IP addresses do commercial organization
use to identify networks and host?

Commercial
organizations use
classes A, B, or C addresses to
identify networks and hosts.

4.2.7

What

is the process of splitting a network portion of an IP
address to allow an administrator to divide a network known
as?

Subnetting

What does a binary 1 represent
in a subnet mask?

The network or subnet part of the
address.

What is the primary function of NAT?S

NAT is enabled on a router or a
gateway device, which translates all
of the incoming and outgoing traffic
through the known, or public IP
addresses.

4.2.8

What is the default subnet mask for a Class C address?

255.255.255.0

In a Class C address, what is the host address .255
reserved for?

There cannot be 255 hosts because
that value is reserved for a
broadcast address.

4.3.2

What is a host
table?

Host tables are lists that can be
configured in each computer,
associating the names of the
computers in the network with the IP
address host table.

What are two disadvantages of host tables?

A host table must be configured in
each separate computer to tell it the
names and corresponding IP
addresses of each of the other
computers.

When there is a change in the
network (the addition of a new
computer, for example), the tables
must be updated in each and
every
computer to reflect the change.

4.3.3

What is the function of a DNS server?

To translate a domain name into an
IP address

4.3.5

What is the function of a WINS server?

A WINS server dynamically
associates NETBIOS names with IP
addresses and automatically
updates its database of name
-
to
-
address associations as systems
enter and leave the network

IT Essentials II: Network Operating Systems,
version 3




4

Module4



Created by Glenn Wright, ESC XI


Ft. Worth, Texas

4.4.1

What is a protocol?

A protocol is a set of messages that
is exchanged between systems in a
defined sequence in order to
accomplis
h a specific networking
task.

List the protocols associated with the application layer of
the TCP/IP model.

TFTP

FTP

NFS

SMTP

Telnet

SNMP

DNS

List the protocols associated with the transport layer of the
TCP/IP model.

TCP

UDP

List the protocols associated with the internet layer of the
TCP/IP model.

IP

ICMP

ARP

RARP

4.4.2

What

is the function of ARP?

ARP consists of mapping network
addresses with Media Access
Control (MAC) addresses.

4.4.3

What types of messages is
used by ICMP?

An Echo Request and an Echo
Reply

Which program uses ICMP to send Echo Request and to
receive the Echo Reply?

The Ping program uses ICMP to
send Echo Request messages and
to receive the Echo Reply
messages.

What is a Traceroute used for?

ICMP allows the path, or route, from
the local computer to the remote
host to be traced using the
Traceroute routine.

4.4.4

What is the function of the IP?

The Internet Protocol (IP) will
forward the message from one
network to the next, but it may not
be able to deliver the message to
the destination because of network
problems.

Does IP guarantee the delivery of a message?

IP makes its best effort, but does not
guarantee delivery of the message.

What is the function of TCP?

The Transmission Control Protocol
(TCP) has the job of guaranteeing
that messages arrive at their
destination, or if they cannot be
delivered,

informing the application
programs of the failure.

IT Essentials II: Network Operating Systems,
version 3




5

Module4



Created by Glenn Wright, ESC XI


Ft. Worth, Texas

4.4.5

What is the function of UDP?

User Datagram Protocol (UDP)
provides an "unreliable" service to
applications that can tolerate a loss
of some messages but still function.

4.4.6

What is the purpose of DHCP?

The purpose of the Dynamic Host
Configuration Protocol (DHCP) is to
enable individual computers on an
IP network to extract their
configurations from a DHCP server.

4.4.7

What is the function of HTTP?

The Hypertext Transport
Protocol
(HTTP) specializes in the transfer of
World Wide Web pages between
web browser client programs like
Netscape Communicator or Internet
Explorer, and web servers where
web pages are stored.

How is the content of web pages
organized?

The content of web pages is
organized using the Hypertext
Markup Language (HTML).

4.4.8

What is the function of FTP?

The File Transfer Protocol (FTP) is
used to transfer any type of file from
one system to another.

4.4.9

What

does the Telnet protocol allow a user to do?

The telnet protocol allows users to
connect and log on to a system that
is remote from their computers.

4.4.10

What is the function of SMTP?

Simple Mail Transfer Protocol
(SMTP) is a protocol for sending e
-
mai
l messages between servers.

4.4.11

What is the function of POP3

POP3 permits a workstation to
retrieve mail that the server is
holding.