1 Flashcards

(66 cards)

1
Q

What is .Point to Point protocol (PPP)

A

A bite oriented protocol broadly, used for high traffic, data transmissions. It functions at the datalink layer. It is designed to link devices so end points do not need to be the same vendor to work.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does point to point protocol do on the data link layer

A

Transmit data between two devices on the same network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What four things are required to configure point to point protocol

A

Multi link connection
Compression
Authentic
And error detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

When configuring PPP for devices on the network, why do you need a multi Link connection?

A

Because it provides a method for spreading traffic across multiple distinct, PPP connections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

When configuring PPP for devices on your network, what does compression do?

A

It increases throughput by reducing the amount of data in the frame 

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

When configuring PPP for devices on your network, when does authentication take place?

A

It occurs when connected devices exchange authentication messages, using either password, authentication protocol or challenge handshake authentication protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is password authentication protocol PAP

A

It is a password authentication option that is too hard to obtain plane. Text from if passwords are compromised.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is challenge handshake authentication protocol CHAP

A

It’s a three-way handshake authentication that periodically confirms the identity of the clients

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

When configuring PPP, what does error detection include?

A

It includes frame check sequence FCS and looped link detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

When configuring PPP, what does frame check sequence FCS do

A

It is a number included in the frame calculated over the address, control, protocol, information, and padding fields used to determine if there has been data loss during transmission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

When configuring PPP and air detection what does looped link detection do

A

In PPP, it detects looped links using magic numbers. A magic number is generated randomly at the end of the connection. The device checks the magic number against its own if the line is looped the number will match the senders’s magic number and the frame is discarded.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are two sub protocols for PPP

A

Network control protocol, NCP and link control pro protocol LCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is network control protocol NCP

A

It is a protocol used to negotiate optional configuration parameters, and facilities for the network layer. There is one for each higher layer of protocol used by the PPP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is link control protocol LCP

A

It is a protocol that initiates and terminate connections automatically for hosts. It automatically configures the interfaces at each end, like magic numbers, and selecting for optional authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

True or false data is sent using PPP in a frame

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

When data is being sent using PPP in a frame what is a frame referring to

A

A collection of data sent to a receiving point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Normally, how many parts of the frame does PPP have

A

Seven

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are the seven sections of a PPP frame?

A

Flag address, control protocol, data, and frame check sequence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

On a PPP frame, what does a flag do

A

It is a single bite and lets the receiver know this is the beginning of the frame. Depending on the encapsulation there may or may not be one of these to start or end in a PP frame 

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

In a PPP frame, what does the address section do?

A

It is a single bite and it contains the broadcast address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

In a PPP frame, what does the control section do?

A

It is a single bite required for various purposes, but also allows a connection list data link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

In a PPP frame, what does the protocol section do?

A

It varies from one to three bites which identify the network protocol of the datagram

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

In a PPP frame, what does the data section contain?

A

It is where the information you need to transmit is stored and has a limit of 1500 bites per frame

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
In a PPP frame, what does the frame check sequence FCS do
It is two or four bites and is used to verify data is intact upon receipt at the end point 
26
In what order do the sections of the PPP frame?
First is flag Second address Third is control Fourth is protocol Fifth is data Sixth is FCS or frame check sequence And the seventh section is an end flag
27
When data is packaged in a frame, it undergoes encapsulation. What is encapsulation?
Encapsulation is a process by white each layer takes data from the previous layer and adds headers and trailers for the next layer to interpret
28
Describe point to point protocol over Ethernet
It is a protocol made to bridge the gap between directly connected and points and other devices
29
What is PPP?oE?
A way of encapsulating PPP frames inside and ethernet frame. It is a solution for tunneling packets over the DSL connection, service providers, IP network and from there to the rest of the Internet.
30
What does PPP?oE provide
It provides authentication encryption and compression, though it’s primary use uses our password authentication protocol PAP for authentication
31
What additional step does PPPoE require that PPP does not
A discovery stage. The discovery stage establishes a session ID to identify the hardware address this stage ensures data gets routed to the correct place.
32
What does PPPOE encapsulate?
And encapsulation of PPP inside an ethernet frame
33
Which two protocols does broadband Internet require to make sure different connected devices can communicate with each other each other
Point to point protocol PPP Point to point over ethernet PPPOE
34
What are the two sub protocols for PPP
NCP - network control protocol. It’s a sub protocol used to negotiate optional configuration parameters and facilities for the network layer. LCP link control protocol. It’s a sub protocol that initiates and terminate connections automatically for host.
35
What do you call the demarcation point for fiber technologies?
ONT optical network terminator
36
physical versus software based land when router hardware devices that act as immediate systems to route data among the land member groups of the wind.
37
What is a WAN Reuter?
A hardware device that acts as an intermediate systems to route data amongst land member groups of a win, also called endpoints using a private connection
38
What are two other names for a WAN Reuter?
Border routers or edge routers
39
What are border routers or edge routers responsible for?
Facilitating and organizations access to a carrier network
40
What type of interface do?WAN ROUTERS HAVE.
A digital modem interface
41
The digital modem interface for aWAN Reuter works with what link layer
The OSI link layer and an ethernet interface for the land
42
What is a SD – WAN
Software defined WAN
43
What is a SD-WAN
Software developed to address the unique needs of cloud based WAN environments
44
What are the four main techniques available for? WAN optimization?
Compression Duplication Protocol optimization Local cash cashing
45
In reference to WAN optimization what does the compression technique do?
It reduces file sizes to improve network traffic efficiency. The center and the receiver will need application applications that offer the same compression/decompression algorithms to encode and decode the compression files.
46
In reference to WAN optimization what does the technique duplication offer?
It prevents files from being stored multiple times within a network to avoid wasting expensive hard drive space. One copy of a file is kept in the central location. All other copies are actually file pointers to the single copy of the file.
47
In reference WAN optimization what does protocol optimization offer
It improves the efficiency of network networking protocols for application applications that need bandwidth and lower latency
48
In reference to WAN optimization what does local caching offer?
It stores, local copies of network and Internet files on a users computer to reduce the need to resend the same information across the network every time the file is accessed
49
How does traffic shaping optimize network performance?
By controlling the flow of network traffic
50
What are the three most commonly used techniques of traffic shaping?
Bandwidth throttling Rate limiting Use of complex algorithms
51
Using bandwidth throttling to optimize traffic shaping does what
It controls network traffic volume during peak use times
52
How does rate limiting help traffic shaping optimized network performance
By capping, maximum data rate/speeds
53
How does the use of complex algorithms help traffic shaping optimize network performance?
By classifying and prioritizing data to give preference to more important traffic
54
What does packet swishing have to do with?WAN protocols
It is a method of data transmission where messages are broken into multiple packets. Each packet containing a header that includes information on how to reassemble the packets as well as the intended destination. The packets these packets are triplicated sent separately over optimal roots to the Internet, and once they reached, our destination are reassembled.
55
What does frame relay do in conjunction with? WAN protocols. WAN route
It is a method of data transmission originally designed for ISDN or integrated service digital network lines. It is used to transmit data between end points of a WAN through a packet switching method that works on the OSI data link and physical layers.
56
What are PVCs or permanent virtual circuits?
They are used for long-term data connections, and stay open even when data is not being transmitted
57
What are SVC’s switched virtual circuits?
They are used in temporary session connections for sporadic communication communications
58
What is ATM or asynchronous transfer mode
It is an older technology that includes data using asynchronous time division Multiplex. So encoded data is packaged into small fixed cells. ATM sends the sales over a long distance, using routers as end points between ATM networks and other networks.
59
ATM technology has been replaced for the most part by what
Internet protocol or IP technology
60
What is HLDC or high-level data
It is a method of encapsulation or data link protocol that delivers data frames through a network. It was developed to use multiple protocols to replace SLDC or synchronous data link control. It includes error. Correction flow control, and data transmission through Paul.
61
What are the three modes that defined the relationship between two devices notes or communication that HLDC performs?
Normal response mode and RM Asynchronous response mode And asynchronous balance mode, ABM
62
What is normal response mode N
Primary node must be given permission to the secondary note to transmit
63
What is asynchronous response mode or ARM
A primary note allowing the secondary note to initiate communication
64
What is asynchronous balanced mode or ABM?
It’s when both notes can act either as primary or secondary notes and each can initiate communications without permission
65
What is packet over synchronous optical network or SONET or synchronous digital hierarchy SDH
These are communication protocols used for WAN transport. They defined how point to point links communicate over fiber, optic cables
66
What is multi protocol label switching MPLS
It is a technique for optimizing network routing it replaces inefficient table lookups for long network addresses with short path labels these labels, direct data from node to no