T/F: All protocols are routable
T/F: ICMP (Internet Control Message Protocol) reports on the success or failure of data deliver.
T/F: If a device does not know its own IP address it can still use ARP.
T/F: The command used to view IP information on a Windows XP or Windows Vista workstation is ifconfig
T/F: If your network does not need or use APIPA, it must be uninstalled to avoid conflicts.
TCP is a ___ subprotocol
A ___ number is the address on a host where an application makes itself available to incoming or outgoing data.
___ is more efficient than TCP for carrying messages that fit within one data packet.
A UDP header contains ___ fields.
The subprotocol that enables TCP/IP to internetwork - that is, to traverse more than one LAN segment and more than one type of network through a router is ____
____ operates at the Network layer and manages multicasting
___ ARP table entries are created when a client makes an ARP request that cannot be satisfied by data already in the ARP table.
In the TCP/IP protocol suite, ___ is the core protocol responsible for logical addressing.
In IPv4 addressing, each IP address is a unique ___ number.
In IPv4 addressing, an IP address whose first octet is in the range of 192-223 belongs to a Class ___ network.
In IPv4 addressing, a node with an IP address of 220.127.116.11 belongs to a Class ___ network.
In dotted decimal notation, a___ separates each decimal.
The default subnet mask for a Class B network is ___.
In most cases BOOTP has been surpassed by the more sophisticated IP addressing utility ____.
A ___ address represents any one interface from a group of interfaces, any one of which can accept a transmission.
In IPv6, each address contains a ___ or a variable length field at the beginning of the address that indicates what type of address it is.
If the standard port number for the Telnet service is 21, a host whose IPv4 address is 10.43.3.87 has a socket address for Telnet of ___.
In the domain name www.google.com, ___ Is the top-level domain (TLD).
___ is a terminal emulation protocol used to log on to remote hosts using the TCP/IP protocol suite.
___ is a simple Application layer protocol used to synchronize the clocks of computers on a network.
___ is a utility that can verify that TCP/IP is installed, bound to the NIC, configured correctly, and communicating with the network.
Protocols that can span more than one LAN or LAN segment are ___ because they carry Network layer addressing information that can be interpreted by a router.
In the context of TCP/IP a packet is known as a ___.
A ___ is a special 32-bit number that, when combined with a devices IP address, informs the rest of the network about the segment or network to which the device is attached
___ is a process of subdividing a single class of networks into multiple, smaller logical networks, or segments.
Whether connecting to the Internet or to another computer within a LAN, every node on a network must have a unique ____
well known ports
Ports ranging from 0 to 1023; assigned to processes that only the operating system or administrator of the system can access.
Ports ranging from 1024 to 49151; accessible to network users and processes that do not have special administrative privileges.
Ports ranging from 49152 through 65535; open for use without restriction
Database of Internet IP addresses and their associated names
Any hosts on the internet that need to look up domain name information
fully qualified host name
The local host name plus its domain name.
The ASCII text files called HOSTS.TXT that associates host names with IP addresses
A hierarchal way of associating domain names with IP addresses.
dotted decimal notation
The most common way of expressing IP addresses.
time to live field
What is the field that states the maximum amount of time a packet will stay on the network before being discarded.
Protocols made to simplify addressing of nodes on a TCP/IP network. This assigns a node an IP address & recognizes services without needing a DNS server.
A program that is used by a service provider on a user's computer. It detects changes to the users IP address and updates the users DNS accordingly.
What is it called when a device will borrow an IP address temporarily while connected to the network. The length of the lease depends on server and client settings.
127 is used for a device to communicate with itself with loopback.
In IPv4 addressing, explain what is special about an address containing 127 in the first octet and how this address is used in troubleshooting.
In IPv4 addressing, what number is a placeholder for referring to all computers on a network
In IPv4 addressing, what number is for broadcast transmissions only
Computers cache the MAC to IP mappings in what kind of table to find the address locally rather than requesting the information again.