CCNA - Network Vocab Word Scramble
![]() A M O D E N
|
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.
Normal Size Small Size show me how
Normal Size Small Size show me how
Question | Answer |
daemon | a computer program that runs in the background and is usually initiated as a process. Daemons often support server processes. |
International Organization for Standardization | An international standards body that defines many networking standards. Also |
AND | one of the three basic binary logic operations. ANDing yields the following result: 1 and 1 = 1 |
extranet | part of a company's intranet that is extended to users outside the company |
hierarchical addressing | an addressing scheme in which a network is partitioned into sections |
symmetric switching | In LAN switches a reference to cases in which a frame is forwarded |
Internet service provider | A company that helps create the Internet by providing connectivity to enterprises and individuals |
single point of failure | a system of network design characterized by one or more major components that are required to maintain operation. |
goodput | application-level throughput. It is the number of useful bits per unit of time from a certain source address to a certain destination |
plug-in | In a web browser |
URG | a 1-bit flag in the TCP header used to indicate that the receiving host should notify the destination process to do urgent processing. |
enable password | unencrypted password used to allow access to privledge EXEC mode from IOS user EXEC mode. |
half duplex | communication that only allows one station to receive while the other station is transmitting |
maximum transmission unit | the largest IP packet size allowed to be sent out a particular interface. Ethernet interfaces default to an MTU of 1500 because the data field of an Ethernet frame should be limited to 1500 bytes |
firewall | any combination of hardware device and/or software application designed to protect network devices from outside network users and/or malicious applications and files. |
gateway | normally |
nslookup | a service or a program to look up information in the DNS |
cloud | In networking |
intranet | a corporate system such as a website that is explicitly used by internal employees. Can be assessed internally or remotely |
global configuration mod | from the priviledged mode |
instant messaging | real-time communication between two or more people through text. The text is conveyed through computers connected over a network such as the internet. files can also be transferred through the IM program to share files. |
broadcast address | an address used to represent a transmission from one device to all devices. In ethernet |
scheme | a plan |
routing | the process by which a router receives an incoming frame |
Network address translation (NAT) | translation RFC 1918 addresses to public domain addresses. Because RFC 1918 addresses are not routerd on the Internet |
quality of service | a control mechanism that can provide different priorities to different users or data flows |
prefix length | in IP subnetting |
Internet control message protocol | As part of the TCP/IP internet layer |
routing table | a list of router holds in memory for the purpose of deciding how to forward packets. |
pulse amplitude modulation | a form of signal modulation where the message information is encoded in the amplitude of series of signal pulses. It transmits data by varying the aplitunes of the individual pulses. This is now obsolete and has been replaced by pulse code modulation |
peer | a host or node that participates in some form of a group. For example |
router | path through an internetwork through which packets are forwarded. |
code gropu | a grouping of code that meets a certain |
locally administered address | a MAC address that can be configured on a device. The LAA can be used in place of the BIA . This means that you can replace a NIC or use a substitute device without changing the address used by the network to access the station. |
user executive mode | the limited CLI mode where the commands available to the user are a subset of those available at the privileged level. In general |
high-order bit | the portion of a binary number that carries the most weight |
forwarding | In ethernet |
radix | the number of various unique digits |
octet | a group of 8 binary bits. It is similar to |
fiber-optic cable | physical medium that uses glass or plastic threads to transmit data. A fiber-optic cable consists of a bundle of these threads |
classless addressing | an IPV4 addressing scheme that uses a subnet mask that does not follow classful addressing limitations. It provides increased flexibility when dividing ranges of IP addresses into separate networks. Classless addressing is considered the best in current n |
post office protocol | a protocol that allows a computer to retrieve email from a server. |
fault tolerance | the design on networks that can continue to operate without interruption in the case of hardware |
flow control | the management of data flow between devices in a network. It is used to avoid too much data arriving before a device can handle it |
static route | an entry in an IP routing table that was created because a network engineer entered the routing information into the router's configuration. |
Requests for Comments | a series of documents and memoranda encompassing new research |
physical media | the cabling and connectors used to interconnect the network devices. |
physical network | the connection of devices on a common media. Sometimes a physical network is also referred to as a network segment. |
Organizational Unique Identifier | The first half of a MAC address. Manufactures must ensure that the value of the OUI has been registered with the IEEE. This value identifies the manufacturer of any Ethernet NIC or interface. |
electromagnetic interface | interface by magnetic signals caused by the flow of electricity. EMI can cause reduced data integrity and increased error rates on transmission channels. The physics of this process are that electrical current creates magnetic fields |
keyword | Used in the CLI following the command. Keywords are parameters that are used with the command from a set of predefined values. |
acknowledgment | a notification sent from one network device to another to confirm that some event has occured. |
dynamic routing | routing that adjusts automatically to network topology or traffic changes. |
limited scope address | An IPv4 multicast address that is restricted to a local group or organization. |
frame | the layer 2 pdu that has been encoded by a data link layer protocol for digital transmission. Some different kinds of frames are ethernet frames and PPP frames. |
limited broadcast | a broadcast that is sent to a specific network or series of networks. |
server | can refer to computer hardware that is to be used by multiple concurrent users. Alternatively |
MAC table | on a switch |
reserved link-local addresses | the IPv4 multicast addresses 224.0.0.0 to 224.0.0.255. These addresses are to be used for multicast groups on a local network. Packets to these destinations are always transmitted with a TTTL value of 1 |
multicast client | a member of a multicast group. Every multicast client in each group has the same IP address. Multicast addresses begin with 224.*.*.* and end with 239.*.*.* |
cache | a temporary storage where data that has been retrieved or calculated and is accessed frequently can be stored. After the data is stored in the cache |
flooding | a process used by a switch or bridge to forward broadcasts and unknown destination unicasts. The bridge/switch forwards these frames out all ports except the port on which the frame was received. |
media-dependent interface crossover | MDIX is an alternative operation of ethernet ports on a hub. In this mode |
Time to live | a field in the IP header that prevents a packet form indefinitely looping around an IP internetwork. Router decrements the TTL field each time they forward a packet |
carrier sense multiple access (CSMA) | media access methodology in which a node wishing to transmit listens for a carrier wave before trying to send. If a carrier is sensed |
router | a network device |
IP header | the header defined by the IP. Used to create IP packets by encapsulating data supplied by higher-layer protocol (such as TCP) behind an IP header. |
fragmentation | the dividing of IP datagrams to meet the MTU requirement of a layer 2 protocol. |
end device | a device such as a desktop or mobile device that is used by an end user. |
source IP address | the IP address of the originating host that is placed into the IP packet header. |
ARP cache | a logical storage in the host's RAM to store ARP entries |
server message block | an application level network protocl mainly applied to shared access to files |
dynamic host configuration protocol | a protocol used to dynamically assign IP configurations to hosts. The services defined by the protocol are used to request and assign an IP address |
Pad | a part of the ethernet frame that fills in the data field to ensure that the data field meets the minimum size requirement of 46 bytes. |
dynamic or private ports | TCP or UDP ports that range from 49152 to 65535 and are not used by any defined server applications. |
flash | a removable component that has memory space for storage. Used on the router or switch for storing the compressed operating system image. |
RST | a 1-bit flag in the TCP header that is used to request that a connection be re-established. |
ARP table | a logical storage in a host's RAM to store arp entries. |
delimiter | this field of a frame signals the beginning or end of a frame. |
manchester encoding | line code in which each bit of data is signified by at least one voltage level transition. |
ACK | a 1-bit flag in the tcp header that indicates the acknowledgment field is valid. |
download | to transfer data from the computer functioning as a server to the client computer you are using. |
FIN | a 1-bit field in the TCP header that is used by a device that wants to terminate its session with the other device. This is done by inserting the FIN flag in the flag field found in the TCP segment |
virtual local area network | a network of computers that behave as if they are connected to the same network segment |
most significant bit | the bit position in a binary number having the greatest value. The most significant bit is sometime referred to as the leftmost bit. |
well known ports | used by tcp or udp |
node | data link layer term describing a device connected to a network. |
logical network | a group of devices associated by the arrangement of a hierarchial addressing scheme. Devices in the same logical network that share a common network portion of their Layer 3 addresses. |
Address resolution protocol | the method of for finding a host's hardware address from its IPv4 network layer address. |
administratively scoped address | an IPv4 multicast address that is restricted to a local group or organization |
IP | Network layer protocol in the TCP/IP stack offering a connectionless internetwork service. IP provides features for addressing |
TCP | a layer 4 protocl of TCP/IP model |
media-dependent interface (MDI) | The normal operation of ethernet ports on a hub. In this mode |
round-trip time | the time required for some network pdu's to be sent and received |
bit | binary digit used in the binary numbering system. Binary digits are units of information storage and communication in computing. Each bit can be either a 0 or a 1. |
logical topology | a map of the devices on a network representing how the devices communcate with each other. |
prviate address | define in RFC 1918 |
network baseline | a collection of data that establishes a reference for network performance and behavior over a period of time. This reference data is used in the future to assess the health and relative growth of network utilization. |
protocol | a written specification that defines what tasks a service or device should perform. Each protocol defines messages |
ping sweep | a network scanning technique used to identify which host IP addresses are operational. |
4b/5b | An encoding scheme 4B/5B uses 5-bit symbols and codes to represent 4 bits of data. 4B/5B is used in 100Base-tx ethernet. |
bridging | the process of forwarding frames in a switch or a bridge from one port to another port or from segment to segment |
smtp | an application protocol typically not used by end users. Instead |
multiplexing | a process where multiple digital data streams are combined into one signal. |
slot time | the minimum time a NIC or interface can take to send an entire frame. Slot time |
host | a network device that has an IPv4 address assigned to it to communication over a network. |
console port | a port on cisco devices to which a terminal or computer with a terminal emulator is connected to the network device in order to communicate and configure the network device |
test-net address | the IPv4 address block 192.0.2.0 to 192.0.2.255 that is set aside for teaching and learning purposes. These addresses can be used in documentation and network examples. |
intermediary device | a device that connects end devices to the network or interconnects different networks. A router is an example of an intermediary device. |
nonreturn to zero | line code in which 1s are represented by one significant condition and 0s are represented by another. |
public address | an IP address that has been registered with IANA or one of its member agencies |
acknowledgment number | a 32-bit field in the tcp segment header that specifies the sequence number of the next byte this host expects to receive as a part of the TCP session. It is used to recognize lost packets and flow control |
directed broadcast | a term that describes IPv4 packets sent to all hosts in a particular network. In a directed broadcast |
physical address | a data link layer address |
internetwork | a combination of many IP subnets and networks |
shielded twisted pair cable | a type of network cabling that includes twisted-pair wires |
switch | In ethernet a layer 2 device that receives an electrical signal in one port |
binary | a numbering system characterized by 1 and 0 |
media independent | the networking layers whose processes are not affected by the media being used. In ethernet |
PSH | a 1-bit flag in the TCP header that is used to request to the higher layers for immediate delivery of the packet. |
carrier | a signal on a medium used to support the transmission of data. Data is carried over the medium by modulation. |
unshieled twisted-pair | a general type of cable |
protocol suite | a delineation of networking protocols and standards into different categories |
selective forwarding | the forwarding of packets where the forwarding decision is taken dynamically |
protocol data unit | a generic term from OSI that refers to the data |
Internet | The network that combines enterprise networks |
syntax | the structure and order of words in a computer language |
priority queing | a routing feature in which frames in an interface output queue are prioritized based on various characteristics such as packet size and interface type. |
media access control | the lower of the two sublayers of the IEEE standard for ethernet. It is also the name of that sublayer |
token passing | an access method used with some LAN technologies by which devices access the media in a controlled manner. This access to the LAN is managed using a small frame called a toke. A device can send only when it has claimed the use of the token. |
bridge | a device that connects multiple network segments at the data link layer of the OSI model. Bridges were the predecessor to LAN switches. |
attenuation | the loss of communication signal on the media. This loss is due to degradation of the energy wave over time. |
pinout | defines which wires in a cable should connect to each pin on the connectors on both ends of a cable. For example |
carrier sense multiple access collision detect (CSMA/CD) | The MAC algorithm used by ethernet devices in a shared media. The protocol requires a node wishing to transmit to listen for a carrier signal before trying to send. If a carrier is sensed |
scope | the extent of a certain item. For example |
argument | additional data that is provided with a command to provide information used by the execution of the command. IOS command arguments are entered at the CLI after the command |
Network time protocol | a protocol for synchronizing the clocks of computer systems over packet-switch data networks. NTP uses UDP port 123 as its transport layer. |
broadcast | a form of transmission where one device transmits to all devices within the network or on another network |
latency | the time that passes while some event occurs. In networking |
Thicknet | a common term for 10base5 ethernet |
globally scoped addresses | unique addresses that are public domain addresses. |
overhead | resources used to manage or operate the network. Overhead consumes bandwidth and reduces the amount of application data that can be transported across the network. |
jam signal | in a shared media ethernet network |
dotted decimal | a convention for writing IP addresses with four decimal numbers |
dispersion | the spreading of light signal caused by light signals traveling at different speeds through a fiber. |
store and forward | a method of internal processing by LAN switches. The switch must receive the entire frame before it sends the first bit of the frame. Store and forward switch is the method used by cisco switches. |
Optical time domain reflectometer | a popular certification method for fiber systems. The OTDR injects light into the fiber and then graphically displays the results of the detected reflected light. The OTDR measures the elapsed transit time of reflected light to calculate the distance to d |
packet | when used generically |
fast ethernet | a common name for ethernet technology that operates at 100 mbps. |
loopback | a special reserved IPv4 address |
backoff algorithm | the retransmission delay used with CSMA/CD when a collision occurs. The algorithm forces each sender that detected the collisions to delay a random amount of time before attempting to retransmit. |
runt frame | an ethernet frame that is less than 64 bytes in size. Runts are caused by collisions and are also know as collision fragments |
Regional Internet Registries | organizations that are responsible for the allocation and registration of Internet number resources within a particular region of the world. These registries include the American Registry for Internet Number for North America; RIPE network coordination ce |
encryption | the process of obscuring information to make it unreadable without special knowledge |
network | 1.collection of computers |
subnet mask | a dotted decimal number that helps identify the structure of IP addresses. The mask represents the network and subnet parts of related IP addresses with binary 1s and the host part of related IP addresses with binary 0s |
Interpret as command | In the telnet application |
network segment | a part of a computer network that every device communicates with using the same physical medium. Network segments are extended by hubs or repeaters. |
connection oriented | communication where the sender and receiver must prearrange for communications to occur; otherwise |
channel service unit/data service unit | a device that connects to a local digital telephone loop for a WAN circuit to a serial interface on a network device |
data termianl equipment | devices at the user end of a user-network interface that serves as a data source |
Open systems interconnection | International standardization program created by ISO and ITU-T to develop standards for data networking that facilitate multivendor equipment interoperability |
standards | an internationally recognized definition of technical specifications that ensure worldwide consistency. |
deterministic | refers to whether the performance of a device |
extended star | a network topology characterized by a central location connected to multiple hubs. In an extended star |
host address | IPv4 address of a network host. When talking about host addresses |
channel | a communication path over a medium used to transport information from a sender to a receiver. Multiple channels can be multiplexed over a single cable |
switch table | the table used by a switch that associates MAC addresses with the outgoing port. A general term for the table that a LAN bridge uses for its forwarding/filtering decisions. The table holds a list of MAC addresses and the port out which the bridge should f |
scalability | the ability of a protocol. system or component to be modified to fit a new need. |
hub | In ethernet |
low-order bit | Represents the 0 in the binary number. In an IP subnet mask |
signal | the optical or electrical impulse on a physical medium for purposes of communication. |
dns resolver | the client part of the DNS client server mechanism. A DNS resolver creates queries sent a across a network to a same server |
IP address | a 32-bit number |
window size | as filed in the TCP header that is set in a sent segment |
query | a request for information. Queries are answered with replies. |
broadcast domain | a logical network composed of all the computers and networking devices that can be reached by sending a frame to the data link layer broadcast address. |
source | the origin of the PDU. This can be a process a host or a node |
hop | the passage of a data packet between two network nodes. |
port | In networking |
fiber optics | the glass fibers inside certain cables over which light is transmitted to encode 0 and 1 |
SYN | a 1-bt flag in the TCP header used to indicate the initial value of the sequence number. The SYN flag is only set in the first two segments of the three-way TCP connection establishment sequence. |
network address | a dotted decimal number defined by the IPv4 protocol to represent a network or subnet. It represents the network that hosts reside in. Also called a network number or network ID. |
directly connected network | a network that is connected to a device's interface. For example networks that interface with the router are known to be directly connected. Devices learn their initial IP routes based on being connected to these subnets. |
TCP/IP | a network model defined by the IETF that has been implemented on most computers and network device in the world. |
classful addressing | a unicast IP address that is considered to have three parts: a network part |
nonvolatile RAM (NVRAM) | random-access memory that does not lose its contents when the computer is shut down |
domain name system | an internet wide system by which a hierarchical set of DNS servers collectively hold all the name IP address mappings |
collision | In ethernet |
filtering | in ethernet |
kilobits per second | a unit of measurement of the number of times 1000 bits can be transmitted in 1 second. 1 kbps = 1000bps |
subnet | a group of IP addresses that have the same value in the first part of the IP addresses |
throuhpu | the actual data transfer rate between two computers at some point in time. Throughput is impacted by the slowest-speed link used to send data between the two computers |
Mail user agent | program used to download and send email. Email clients use POP3 to receive emails and use SMTP to send emails. Also called an email client |
transparent bridging | the learning of source addresses on incoming frames and adding them to the bridging table. After the table has been completed and when a frame is received on one of the bridge's interfaces |
ethernet PHY | the physical interface transceivers. It deals with Layer 1 (the physical layer |
router protocol | a protocol used between routers so that they can learn routes to add to their routing tables. |
client | a network device that accesses a service on another computer remotely by accessing the network. |
resource records | DNS data records. Their precise format is defined in RFC 1035. The most important fields in a resource record are Name |
Institute of Electrical and Electronics Engineers | An international |
bandwidth | In networking |
Internet Engineering Task Force | The standards body responsible for the development and approval of TCP/IP standards |
decapsulation | a process by which an end device |
gigabit ethernet | ethernet that transmits data at 1 |
positional notation | somtimes called place-value notation |
hypertext transfer protocol | defines the commands |
Packet Tracer | a drag-and-drop network simulator developed by Cisco to design |
slash format | a method of expressing a network prefix. It uses a forward slash / followed by the network prefix. |
digital logic | also known as boolean algebra. These consist of the AND OR and IF operations |
full duplex | communication that allows receipt and transmission simultaneously. A station can transmit and receive at the same time. There are no collisions with full-duplex ethernet transmision. |
default route | Routing table entry that is used to direct frames for which a next hop is not explicitly listed in the routing table. This route is used to forward a packet when no other known route exists for a give packet's destination address. |
hybrid fiber-coax | a network that incorporates both optical fiber along with coaxial cable to create a broadband network. commonly used by cable tv companies. |
bridge table | the table used by a switch or bridge that associates MAC addresses with the outgoing port. The switch or bridge uses this table for its forwarding/filtering decisions. |
authentication | a process used to verify the identity of a person or process |
thinnet | a common term for 10base2 ethernet |
control data | data that directs a process. a flag in a data-link frame is an example of control data. |
session | a related set of communications transactions between two or more network devices. |
default gateway | a device on a network that serves as an access point to other networks. A default gateway is used by a host to forward IP packets that have destination addresses outside the local subnet. A router interface typically is used as the default gateway. When t |
tracert | a command on many computer operating systems that discovers the IP addresses |
Internet Assigned Numbers Authority | An organization that assigns the numbers important to the proper operation of the TCP/IP protocol and the Internet |
registered ports | using values between 1024 and 49 |
link-local address | an IPv4 address in the range of 169.254.1.0 to 169.254.254.255. Communication using these addresses is used with a ttl of 1 and limited to the local network |
radio frequency interference | radio frequencies that creat noise that interferes with information being transmitted across unshielded copper cabling. |
metropolitan-area network | a network with a geographic size between a LAN and a WAN. Typically used by service providers to create a highspeed network in a major metropolitan area where many customers might want high speed services between large sites around a city. |
synchronous | Communication that uses a common clocking signal. In most synchronous communicatino |
ARP poisoning | a technique used to attack an ethernet network by sending fake ARP messages to an ethernet LAN. These frames contain false MAC addresses that confuse network devices |
bit time | the time required to send a single bit over some transmission medium. The time can be calculated at 1/speed |
domain name | a name |
segment | 1. a collision domain that is a section of a LAN that is bound by bridges |
Internet backbone | a high-speed line or series of connections that forms a major pathway within a network. The term is often used to describe the main network connections comprising the Internet. |
proxy arp | a process that uses the same ARP messages as a normal ARP |
encapsulation | the process by which a device adds networking heads and trailers to data from an application for the eventual transmission of the data onto a transmission medium. |
layered model | a model that consists of various layers that enable the development and explanation of technology to be done on a modular basis. This allows interoperability among different technologies among the different layers. |
distributed | a method of computer processing in which different parts of a program run simultaneously on two or more computers that are communicating with each other over a network |
address pool | the range of ip addresses that can be assigned by the DHCP server. |
local area network | a network created for devices located in a limited geographic area |
authoritative | a source of information that is highly reliable and known for its accuracy |
best effort | network protocols or technologies that do not use the acknowledgment system to guarantee reliable delivery of information |
association identity AID | a number used in the 802.11 header to specify the session between a wireless client and the access point. |
destination IP address | the layer 3 address to which the data is going. |
connectionless | any communication in which the sender and receiver do not prearrange for communications to occur |
convergence | another form of the root word converge in the phrase converged network. This kind of network aggregates various forms of traffic such as voice |
network interface card | computer hardware |
noise | In networking |
redundancy | a network architecture designed to eliminate network downtime cause by a single point of failure. |
host group | a group defined by a class D address (multicast |
multicast group | a group that receives a multicast transmission. The members of a multicast group have the same mulitcast IP addressing to receive the same transmission. |
interframe spacing | a time period between ethernet frames that allows fairness with the CSMA/CD algorithm. Without a space between frames in other words |
encode | to change the energy levels transmitted over some networking medium to transmit bits over that medium. |
asynchronous | communication that does not use a common clock between the sender and receiver. To maintain timing |
burned in address | the MAC address that is permanently assigned to a LAN interface or NIC. It is called burned-in because the address is burned into a chip on the card |
collaborative | Information systems that allow the creation of a document or documents that can be edited by more than one person in real time |
virtual terminal line | the reference to text based logical interfaces on an ios device. These are accesses using telnet or ssh to perform administrative tasks. VTY lines are also called virtual type terminal. |
data communications equipment | the devices and connections of a communications network that comprise the network end of the user to network interface. The DCE provides a physical connection to the network |
physical topology | the arrangement of the nodes in a network and the physical connections between them. This is the representation of how the media is used to connect the devices. |
Logical link control | the IEEE 802.2 standard that defines the upper sublayer of the Ethernet Layer 2 specifications. |
virtual circuit | a logical connection between devices in which the frames are passed between the devices. Virtual circuits are independent of the physical structure and may be established through multiple physical devices. |
segmentation | In TCP |
RJ-45 | a rectangular cabling connector with eight pins |
collision domain | a physical or a logical area in a LAN where the signals sent by the interfaces ma be subject o being combined. Within a collision domain |
cyclic redundancy check | a type of hash function that is used to produce a small |
Created by:
doogie
Popular Computers sets