Cisco Networking

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Describe the 2 processes a daemon uses (listening and hears)?

"listening" for a request from a client, because they are programmed to respond whenever the server receives a request for the service provided by the daemon "hears" a request from a client, it exchanges appropriate messages with the client, as required by its protocol, and proceeds to send the requested data to the client in the proper format

What are the seven steps in a complete communication process?

1. Creation of data at the application layer of the originating source end device 2. Segmentation and encapsulation of data as it passes down the protocol stack in the source end device 3. Generation of the data onto the media at the network access layer of the stack 4. Transportation of the data through the internetwork, which consists of media and any intermediary devices 5. Reception of the data at the network access layer of the destination end device 6. Decapsulation and reassembly of the data as it passes up the stack in the destination device 7. Passing this data to the destination application at the Application layer of the destination end device

What 6 things do protocols define?

1. processes on either end of the communication 2. types of messages 3. syntax of messages 4. meaning of any informational fields 5. how messages are sent and the expected response 6. interaction with the nextlower layer

What are the 2 ports used and their purpose in FTP?

21- Used for control 20- Used for actual file transfer

Define a physical port

A connector or outlet on a networking device where the media is connected to a host or other networking device.

What is an internetwork?

A global mesh of interconnected networks (internetworks) meets these human communication needs.

What are the seven layers of the OSI Model?

Application, Presentation, Session, Transport, Network, Data Link, Physical

Which Layers of the OSI Model parallel with the TCP/IP Model?

Application, Presentation, Session-Application Transport-Transport Internet-Network Data Link, Physical-Network Access

What is the difference between an application and a service?

Applications interact with the user and services prepare data for the network

What are the benefits of using a layered model to describe networking?

Assists in protocol design, because protocols that operate at a specific layer have defined information that they act upon and a defined interface to the layers above and below. Fosters competition because products from different vendors can work together. Prevents technology or capability changes in one layer from affecting other layers above and below. Provides a common language to describe networking functions and capabilities.

What PDU is used when physically transporting the information over the medium?

Bits

What are the three primary functions of the Presentation Layer?

Coding and conversion of Application layer data to ensure that data from the source device can be interpreted by the appropriate application on the destination device. Compression of the data in a manner that can be decompressed by the destination device. Encryption of the data for transmission and the decryption of data upon receipt by the destination.

the visible components of the network platform

Computers (work stations, laptops, file servers, web servers) Network printers VoIP phones Security cameras Mobile handheld devices (such as wireless barcode scanners, PDAs)

What are the 3 layers of protocols described?

Content Layer, Rules Layer, Physical Layer

What is done at the Network Access Layer?

Controls the hardware devices and media that make up the network

What happens to emails in many companies once the email reaches the internal server?

Converted to a proprietary protocol for mail delivery

What are the 4 types of messages sent and received in DHCP?

DHCP Discover DHCP Offer DHCP Request DHCP Acknowledge

What is the PDU for the application layer?

Data

What is the process use at the receiving end called?

Decapsulation

What address does the network layer use?

Destination and source logical address

What addresses does the data link layer use?

Destination and source physical address

What does the transport layer use?

Destination and source process number (ports)

What is done at the Internet Layer?

Determines the best path through the network

What are the five aspects of the information network we will focus on in this course?

Devices that make up the network Media that connect the devices Messages that are carried across the network Rules and processes that govern network communications Tools and commands for constructing and maintaining networks

What does the command ipconfig /displaydns show?

Displays all of the cached DNS entries on a Windows XP or 2000 computer system

What do the upper layers use?

Encoded application data

What is the PDU for Layer 2 called

Frame

What is the PDU for the Network Access Layer?

Frame

What type of request is sent to the server when retrieving a web page?

GET

List and describe some of the commands used by the SMTP protocol.

HELO - identifies the SMTP client process to the SMTP server process EHLO - Is a newer version of HELO, which includes services extensions MAIL FROM - Identifies the sender RCPT TO - Identifies the recipient DATA - Identifies the body of the message

What protocol is used for secure transmission across the web?

HTTPS:

What address is used at Layer 3?

IP address

If the same request is made again where does the DNS server look?

In its cache

What happens if a DNS server does not have a name in its stored records?

It passes the request on to another DNS server

What is the layer 2 address called?

MAC address

What are the two processes that email servers perform?

MTA Mail Transfer Agent MDA Mail Delivery Agent

What is another name for an email application?

MUA Mail User Agent

What are the 3 primary types of media used in modern networks?

Metallic wires within cables Glass or plastic fibers (fiber optic cable) Wireless transmission

List examples of intermediary devices.

Network Access Devices (Hubs, switches, and wireless access points) Internetworking Devices (routers) Communication Servers and Modems Security Devices (firewalls)

What is the Network Access Protocol?

Network access protocols describe two primary functions, data link management and the physical transmission of data on the media.

Are peer-to-peer networks easy to secure?

No

What 2 Application Layer protocols are used in sending and receiving email?

POP (Post Office Protocol) and SMTP (Simple Mail Transfer Protocol)

What is the PDU for the Internet Layer?

Packet

What is the PDU of the Layer 3 information?

Packet

How is each application or service represented at Layer 4?

Port number

What do application layer protocols do?

Protocols provide the rules and formats that govern how data is treated.

List examples of process that intermediary devices perform.Regenerate and retransmit data signals

Regenerate and retransmit data signals Maintain information about what pathways exist through the network and internetwork Notify other devices of errors and communication failures Direct data along alternate pathways when there is a link failure Classify and direct messages according to QoS priorities Permit or deny the flow of data, based on security settings

What is done at the Application Layer?

Represents the data to the user plus encoding and dialog control

Which device decapsulates the frame at the edge of a network?

Router

What protocol is recommended alternative to Telnet when security is a concern?

SSH Secure Shell protocol

What is the Transport Layer PDU?

Segment

What are the three elements of communication?

Sender, Receiver, Chanel

What does the POST command do?

Sends information to the web server

What does the PUT command do?

Sends resources or content to the web server

Define an interface

Specialized ports on an internetworking device that connect to individual networks.

What are the 3 message types of SMB messages?

Start, authenticate, and terminate sessions Control file and printer access Allow an application to send or receive messages to or from another device

What is done at the Transport Layer?

Supports communication between diverse devices across diverse neworks

What are the two primary models used when describing networking?

TCP/IP and OSI

What criteria should be used to select network media?

The distance the media can successfully carry a signal. The environment in which the media is to be installed. The amount of data and the speed at which it must be transmitted. The cost of the media and installation

What process do networking layer protocol suites describe?

The format or structure of the message The process by which networking devices share information about pathways with other networks How and when error and system messages are passed between devices The setup and termination of data transfer sessions

What are the ways in which network infrastructure can vary?

The size of the area covered The number of users connected The number and types of services available

What does the physical layer do?

Timing and synchronization of bits

How is the protocol stack processed when sending information?

Top to bottom

When is a server declared to be an authoritative server?

When the resource is directly held on that server

What is an intranetwork?

a private connection of LANs and WANs that belongs to an organization, and is designed to be accessible only by the organization's members, employees, or others with authorization

What are peer-to-peer applications?

allows a device to act as both a client and a server within the same communication

What does Dynamic Host Confirmation Protocol (DHCP) do for a network?

allows a host to obtain an IP address dynamically when it connects to the network

What does the nslookup utility allow you to do?

allows the user to manually query the name servers to resolve a given host name

In general networking sense what is a server?

any device that responds to requests from client applications is functioning as a server

What do port numbers identify?

applications and Application layer services that are the source and destination of data

What are the two forms of software programs or process that provide network access in the Application Layer

applications and services

What is the main function of the session layer?

create and maintain dialogs between source and destination applications

What is the definition of the term network for this course?

data or information networks capable of carrying many different types of communications, including traditional computer data, interactive voice, video, and entertainment products.

What does the DNS protocol do?

defines an automated service that matches resource names with the required numeric network address.

What is an application protocol?

defines the content and formatting of the requests and responses exchanged between the client and server

What is File Transfer Protocol (FTP)?

developed to allow for file transfers between a client and a server

Define segmentation of messages

division of the data stream into smaller pieces

What is the definition of a host?

either the source or destination of a message transmitted over the network

What is the definition of a server?

hosts that have software installed that enables them to provide information and services

What is the definition of a client?

hosts that have software installed that enables them to request and display the information obtained from the server

Define the three parts of a url as listed on the page?

http:- protocol www.cisco.com- name of server web-server.htm- name of file or page

What does the information in the frame provide at Layer 4?

identifies the specific process or service running on the destination host device that will act on the data being delivered

What is the definition of a LAN?

individual network usually spans a single geographical area, providing services and applications to people within a common organizational structure

What is a Transport Protocol?

manages the individual conversations between web servers and web clients

What are the 2 advantages of segmentation?

many different conversations can be interleaved on the network segmentation can increase the reliability of network communications

What is the definition of a WAN?

networks that connect LANs in geographically separated locations

What would happen to the network if a message was sent as one massive continuous stream of bits?

no other device would be able to send or receive messages on the same network while this data transfer was in progress

What is proprietary?

one company or vendor controls the definition of the protocol and how it functions

What is multiplexing?

process used to interleave the pieces of separate conversations together on the network

What does the use of standards and protocols provide?

products from different manufacturers can work together for efficient communications

What are the two basic types of networking models?

protocol models and reference models

What does the Telenet application provide?

provides a standard method of emulating text-based terminal devices over the data network.

Define a NIC

provides the physical connection to the network at the PC or other host device.

What is the Internetwork Protocol

responsible for taking the formatted segments from TCP, encapsulating them into packets, assigning the appropriate addresses, and selecting the best path to the destination host.

What happens after the frame has reached its' destination?

the Layer 2 address information is removed as the data is decapsulated and moved up the protocol stack to Layer 3

What is the difference between a client and a server?

the device requesting the information is called a client and the device responding to the request is called a server

What do the Application Layer protocols of the TCP/IP protocol specify?

the format and control information necessary for many of the common Internet communication functions

What happens when the frame reaches the end device?

the frame and packet headers are removed and the data moved up to Layer 4

What do networking protocols describe?

the functions that occur during network communications

What does the application layer provide?

the interface between the applications we use to communicate and the underlying network over which our messages are transmitted

What do protocols provide?

the rules and formats that govern how data is treated

What is SMB (Server Message Block)?

the structure of shared network resources, such as directories, files, printers, and serial ports

What is hardware on a network?

the visible components of the network platform

What are application layer protocols used for?

to exchange data between programs running on the source and destination hosts

What are layer 3 devices primarily designed for?

to move data from one local network to another local network within an internetwork

What is a peer-to-peer network?

two or more computers are connected via a network and can share resources (such as printers and files) without having a dedicated server

What does a router do?

use the network identifier portion of this address to determine which path to use to reach the destination host


Kaugnay na mga set ng pag-aaral

Chapter 3 - Cells: The Living Units

View Set

Networking - Chapter 13: Hardening and Update Management

View Set

ENGLISH 3: MLA Essay Writing Questions

View Set

Chapter 30: Eating Disorders Practice Questions (answers and explanation at the end)

View Set

Ch. 15: Capital Structure: Limits to the Use of Debt

View Set

Drugs for Parkinson's Disease EAQ

View Set

Exam 2: Ch. 34 powerpoint CAD and ACS

View Set