Windows 7 - Chapter 5

43 terms by Swimming-Bear 

Create a new folder

Advertisement Upgrade to remove ads

Classless inter-domain routing (CIDR)

CIDR differs from traditional address (now called classful addressing) by allowing the division between the network identifier and the host identifier to fall anywhere in an IPv4 address, it does not have to fall on one of the eight-bit boundaries. Helps conserves the IP address space

Connectionless protocol

One in which two communicating system eatables a connection before they transmit data. Once the connection is established the computers exchange packets with complex headers designed to provide error detection and correction. A connection-oriented protocol ensures bit-perfect data transmissions, but at the price of greatly increased overhead

Connectionless-oriented protocol

Does not require the establishment of a connection, nor does it perform error detection or correction. Systems simply transmit their packets to the destination without know if the destination system is ready to accept data, or if it even exists. Connectionless protocols do not guarantee delivery of their data, but they operate with a very low overhead that conserves network bandwidth.

Data encapsulation

The process of applying the header and the footer is called data encapsulation.

Datagram

Data-link layer packet that gets transmitted over the network consists of transport layer data, encapsulated within an IP packet, which called datagram, which in turn encapsulated within an Ethernet frame

8P8C connectors

At either end of each cable run are modular 8P8C connectors. It is often incorrectly referred to as RJ45 connectors, which is similar to the RJ11 connectors used for telephones. . A network interface adapter is the component that provides the connection to the network.

Firewall

Firewall is a software routine that acts as a virtual barrier between a computer and the network to which it is attached. Essentially, a filter that enables certain types of incoming and outgoing traffic to pass through the barrier, while blocking other types

Frame

Header and footer and the data they contain are collectively called a frame.

Internet Protocol (IP)

The protocols that Windows uses by default at the network and transport layers are collectively called TCP/IP. IP is the network layer protocol that performs many important networking functions.

IP address

Every device that is directly connected to a TCP/IP network must have an IP address. IP addresses are independent of the hardware address assigned to network interface adapters.

Link Local Multicast Name Resolution (LLMNR)

System transmits name query request messages as multicasts to the local network. The request contains the name the computer is trying to resolve. The other computers on the local network, on receiving he messages, compare the requested name with their own names. The computer with the requested name than replies with a message containing IP address, which it transmits as unicast to the original requestor.

Media access control (MAC) addresses

The addresses computers use at the data-link layer are six-byte hexadecimal sequences, hardcoded into each network interface adapter by the manufacturer. These sequences are called hardware addresses or media access control (MAC) address). The first three bytes of a hardware address identify the manufacturer of the network interface adapter and the last three bytes identify the adapter itself.

Network address translation (NAT)

NAT is a feature built into many routers that takes the packets destined for the Internet that are generated by computers on a private network, substitutes a registered address for the computer's private address and then forwards the packet to the Internet destination. When it gets a reply, it reverses the process.

Open system Interconnection (OSI) reference model

Most common method for illustrating the operations of the networking stack which consists of seven layers. Application, Presentation, Session, Transport, Network, data-link, Physical

Packet-switching networks

Local area networks are sometimes described as packet-switching networks because the messages generated by each computer are divided up into small pieces called packets, which he computer transmits individually over the network.

Ports

Headers both contain codes that identify specific applications running on the systems. Codes are called ports.

Protocols

Computer networking is a highly complex process, but most of the technology operates invisibly, both to the user and the administrator. Computers on a network communicate using protocols, which are nothing more than the languages that all computers understand. These protocols operative on different levels, coming what is commonly known s a networking stack.

Router

A device that connects one network to another.

Socket

The combination of an IP address and a prot number is called a socket

Stateless address autoconfiguration

IPv6 address assignment is much more of an automatic process than in IPv4. A technique called stateless address autoconfiguration enables computers to configure their own addresses after transmitting routers solicitation multicasts to the router on the network and receiving router advertisement message in return.

Subnet mask

A 32-bit number, expressed in dotted decimal notation, such as 255.255.255.0 Difference between a subnet mask and an IPv4 address is that a subnet mask, consists, in binary form, of a series of consecutive 1s followed by a series of consecutive O'sPro

Transmission Control Protocol

One of two protocols that Windows uses by default at the nework and transprt layers that is collectively called TCP/IP

Unshielded twisted pair (UTP)

Most cabled networks use a type of cable called unshielded twisted pair (UTP), which is similar to cable used for telephone wiring. UTP cable consists of four pairs of wires, with each pair twisted individually. At either end of each cable run are modular 8P8C connectors

A software routine, which also acts as a filter that blocks certain type of incoming and outgoing traffic, while enabling other types is called a ________ .

Firewall

The ________ tool provides a central access point for all of the network controls and connections on a computer running Windows 7.

Network and Sharing Center

A device that connects one network to another is called a ________ .

Router

The most common method for illustrating the operations of a network stack is the ________ , which consists of ________ layers.

Open Systems Interconnection (OSI) Reference model and 7 layers

Protocols that do not guarantee deliver of their data, but do operate with a very low overhead that conserve network bandwidth are called ________ .

Connectionless-Oriented Protocol

"The Windows 7 command line utility that can tell if the TCP/IP stack of another system on the network is functioning normally is called ________ _.

Ping.exe

The Windows 7 command line utility that enables you to generate DNS request messages and then transmit them to specific DNS servers on the network is called ________ .

NSLookup.exe

Most networks use ________ to dynamically assign addresses and configure computers to use them.

DHCP

The Windows 7 command line utility that displays a list of the routers currently forwarding packets to a particular destination is called ________ .

TRACERT.EXE

The top and bottom layers of the OSI model are called the ________ .

Application and Physical Layer

The purpose of Network Diagnostics is to display error messages only.

FALSE

Transport layer protocols are not concerned with addressing packets to the correct system.

TRUE

The National Map utility uses a new protocol called Link Layer Topology Discover (LLTD) to discover information about the network and the devices attached to it.

TRUE

The protocols that Windows uses by default at the network and transport layers are collectively called TCP/IP

TRUE

Home and work computers have Network Discovery turned on, and public computers have it turned off

TRUE

There are two basic types of port numbers ephemeral port numbers and well known port numbers.

TRUE

A Windows 7 computer that is connected to a LAN has hardware address and a computer that is connected to the Internet has an IP address

FALSE

The only two layers of the OSI reference model that do not have individual protocols associated with them are the transport layer and the session layer.

FALSE

Because the configuration of the Internet is constantly changing, the only way can know for certain what route packets are taking to a specific destination is to use Tracert.exe

FALSE

The IPv6 addresses Windows 7 computers use at the network layer are six byte hexadecimal sequences, hard coded into each network interface adapter by the manufacturer.

FALSE

Please allow access to your computer’s microphone to use Voice Recording.

Having trouble? Click here for help.

We can’t access your microphone!

Click the icon above to update your browser permissions above and try again

Example:

Reload the page to try again!

Reload

Press Cmd-0 to reset your zoom

Press Ctrl-0 to reset your zoom

It looks like your browser might be zoomed in or out. Your browser needs to be zoomed to a normal size to record audio.

Please upgrade Flash or install Chrome
to use Voice Recording.

For more help, see our troubleshooting page.

Your microphone is muted

For help fixing this issue, see this FAQ.

Star this term

You can study starred terms together

NEW! Voice Recording

Create Set