Fundamentals of computer networking Introduction
The ______ _____ ______ _____ manages the allocation of port numbers, the regional assignment of IP addresses, and Domain Name System (DNS) root zones. And also manages a central repository for protocol names and the registry used in internet protocols.
Internet Assigned Numbers Authority (IANA)
______ ______ is responsible for the addressing of a data packet. IP encapsulates the data packet to be delivered and adds an address header. The header contains information on the sender and recipient IP addresses. This protocol isn't concerned about the order in which the packets are sent or received. It also doesn't guarantee that a packet will be delivered, only the address.
Internet Protocol IP
This third layer is responsible for exchanging datagrams. A datagram contains the data from the transport layer and adds in the origin and recipient IP addresses. The protocols associated with this layer are IP, ICMP, and the Internet Protocol Security (IPsec) suite.
Internet layer
_____ _____ _____ and reports on the health of your network, provides insights into its performance, and reports on connectivity between your applications. While Network Performance Monitor is cloud-based, it can provide a hybrid service to monitor both cloud and on-premises networks
Network Performance Monitors
The bottom layer of this stack is responsible for defining how the data is sent across the network. The protocols associated with this layer are ARP, MAC, Ethernet, DSL, and ISDN.
Network access layer
Protocols fall into three categories: 1. 2. 3.
Network communication protocols Network security protocols Network management protocols
What would you use the Simple Network Management Protocol (SNMP) for?
SNMP is a protocol that's used to gather and organize information on your IP network. For collecting and organizing information about managed devices on IP networks and for modifying that information to change device behavior.
network security protocol provides a cryptographic network protocol?
SSH is a network protocol that provides a cryptographic network protocol to operate services securely over an unsecured network.
These protocols here are based on a type of application, for example, an email client or a web browser. Here are the most commonly used network communication protocols:
Secure Socket Layer (SSL) Transport Layer Security (TLS Hypertext Transfer Protocol Secure (HTTPS) Secure Shell (SSH) Kerberos
Two network management protocols are available: 1. 2.
Simple Network Management Protocol (SNMP): Internet Control Message Protocol (ICMP):
_____ ____ chunks up data into data packets that can be sent securely and quickly while minimizing the chance of data loss. It provides a stable and reliable mechanism for the delivery of data packets across an IP-based network. Even though TCP is an effective connection-oriented protocol, it has overhead.
Transmission Control Protocol TCP
This second layer is responsible for host-to-host communication on the network. The protocols associated with this layer are TCP and UDP. TCP is responsible for flow control. UDP is responsible for providing a datagram service.
Transport layer
_____ ____ ____ is a connectionless protocol that offers a low-latency and loss-tolerant implementation. UDP is used with processes that don't need to verify that the recipient device received a datagram.
User Datagram Protocol UDP
Much in the same way that IP addresses are split into classes, so are ports. There are three ranges of ports: 1. 2. 3.
the well-known ports the registered ports the dynamic/private ports
The top layer of this stack is concerned with application or process communication. The application layer is responsible for determining which communication protocols to use based on what type of message is transmitted. For example, the layer assigns the correct email protocols such as POP, SMTP, or IMAP if the message is email content.
Application layer
Open Systems Interconnection (OSI) networking
Application layer Transport layer Internet layer Network access layer
You can use _____ _____ ______ to capture packet data from the Azure services you use. You can also understand the flow of data in network traffic patterns and troubleshoot network-related problems on your network.
Azure Network Watcher
Azure has three network monitoring tools to assist you in maintaining and managing the health of your networks. You can also extend some of the monitoring features to on-premises networks: 1. 2. 3.
Azure Network Watcher Network Performance Monitor Performance Monitor
What is the Internet Control Message Protocol (ICMP) used for?
ICMP is a protocol that's used to send information about the success or failure of any network operation. To send error messages and operational information that indicate success or failure when communicating with another IP address.
these standards and protocols is used predominantly for email?
POP3, SMTP, and IMAP are all email protocols.
________ _________ is a capability within Network Performance Monitor. Designed to monitor network connectivity across your entire estate, whether on-premises or cloud-based, it reports network issues as they occur. Performance Monitor can monitor all network routes, along with redundant paths, and report any issues. It can identify particular network segments that degrade network performance. Performance Monitor can report on the health of the network without needing to rely on SNMP.
Performance Monitor:
Network communication protocols defining three foundational protocols of all internet-based networks. .These three protocols are Transmission Control 1. 2. 3. These protocols are concerned with the logical transmission of data over the network
Protocol (TCP) Internet Protocol (IP) User Datagram Protocol (UDP)
When you consider a move to the cloud, it's essential to know the fundamentals of how your network works. The first step in understanding the composition of a network is to understand how network devices ______ with each other. This knowledge applies to your organization's network and to more extensive networks like the web. The same principles apply to all networks.
communicate
A network protocol is a set of _____and ____ that specify how network devices communicate on a given network. It provides a common framework for establishing and maintaining a communications channel, and how to handle errors or faults should they occur. Network protocols allow communication between different network-enabled devices, for example, laptops, tablets, smartphones, desktops, servers, and other network-enabled devices.
conditions rules
The concept of _____ ____ is similar to sending someone a letter in the mail. But instead of sending several pages in one envelope, each page is sent in a separate envelope. Enough information is sent in each _______ to allow the recipient to piece together the complete message after they have all the pages.
data packet envelope
What is a datagram? A datagram is considered the same as a ____ ____. Datagrams commonly refer to data packets of an ______ service, where delivery can't be guaranteed.
data packet unreliable
Network communication protocols Communication protocols focus on ______ and _____ a connection between devices. As you work with different devices and network services, you'll make use of various network communication protocols.
establishing maintaining
What is routing? Routing, in the context of networks, refers to the _______ used to make sure that data packets follow the correct delivery _____ between the sending and receiving devices on different networks.
mechanism path
A data packet is a unit that's used to describe the _____ two devices on a network send each other. A data packet consists of ____ ____, headers, and potentially also a trailer. The header contains several information items. For example, it includes the sender and destination device addresses, the size of the packet, the protocol used, and the packet number. The trailer in a data packet deals with error checking.
message raw data
What is routing? For example, think about the PC you're using and the server that's serving the page you're currently reading. Multiple ______ might connect your PC and the server, and various _____ might be available between these two devices.
networks paths