Chapter 15: Application Layer

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

What is a swarm or BiTorrent?

A swarm is when clients ask for pieces from multiple users at the same time.

What does a P2P application allow a device to do?

Allows a device to act as both a client and a server within the same communication.

Client and server processes are considered to be in which layer in the OSI model?

Application

What is the swarm technology called?

BitTorrent

In the client/server model the device requesting the information is called what?

Client

One of primary services offered by and ISP is what?

Email Hosting

True or False? The peer-to-peer networking model requires the implementation of a dedicated server for data access. True False

False

What does HTTPS stand for?

Hypertext Transfer Protocol Secure

File Transfer UDP client 69 A simple, connectionless file transfer protocol with best-effort, unacknowledged file delivery It uses less overhead than FTP

TFTP-Trivial File Transfer protocol

What is the first step that happens when you request a web page?

The browser interprets the three parts of the URL

IMAP is another protocol that describes a method to _______?

retrieve email messages

Many Gnutella client applications are available:

uTorrent BitComet DC++ Deluge emule

After the connection when using SMTP, the client attempts to do what?

Attempts to send the email to the server across the connection.

Host Config UDP Client 68, Server 67 Enables a diskless workstation to discover its own IP address, the IP address of a BOOTP server on the network, and a file to be loaded into memory to boot the machine Is being superseded by DHCP

BOOTP-Bootstrap Protocol

The server starts the POP service by passively listening on which TCP port for client connection request?

110

Common P2P networks include the follwoing:

BitTorrent Direct Connect eDonkey Freenet

Data transfer from a server to a client is referred to as what?

Download

When a client wants to make use of the POP service, it does what?

It sends a request to establish a TCP connection with the server using port 110. When the connection is established, the POP server sends a greeting.

Email clients communicate with who to send and receive email?

Mail Servers

The presentation layer formats data for the application layer, and it sets standards for file formats. What are three well-known standards for video?

Mastroska Video (MKV) Motion Picture Experts Group (MPG) QuickTime Video (MOV)

SMTP message format require what?

Message header and message body Note: Although the message body can contain any amount of text, the message header must have a properly formatted recipient email address and a sender address.

True or False: An email does not communicate directly with another email clients when sending email.

True, Instead, both clients rely on the mail server to transport messages.

True or False: Although HTTP is remarkably flexible, it is not secure a protocol

True, The request messages send information to the server in plaintext that can be intercepted and read. The server responses, typically HTML pages, are also unencrypted.

What does URI stand for?

Uniform Resource Identifier

What does URL stand for?

Uniform Resource Locator (URL)

How is IMAP different form POP?

Unlike POP, when the user connect to an IMAP-capable server, copies of the messages are downloaded to the client application The original messages are kept on the server until manually deleted.

Data transfer from a client to a server is referred to as what?

Upload

P2P Applications require that each device provide what?

User interface Run background service

Which of the following is a feature of Gnutella Protocol? Users can share whole files with other users Users can share pieces of files with other users Users can access an index server to get the location of resources shared by other users.

Users can share whole files with other users

This is a function of the OSI session layer. Compress and decompress data provide an interface between applications format data for the application layer exchange of information to initiate dialog between peers

exchange of information to initiate dialog between peers

These three OSI layers define the same functions as the TCP/IP model application layer. Application Presentation Session Transport Network Data Link

Application Presentation Session

What are Application Layer protocols used for?

Application Layer protocols are used to exchange data between programs running on the source and destination hosts.

What layer protocols describe the format of the requests and the responses between clients and server?

Application layer protocols describe the format of the requests and responses between clients and servers. In addition to the actual data transfer, this exchange may also require user authentication and the identification of a data file to be transferred.

Based on the TCP/IP model what three upper layers of the OSI model define the functions of the TCP/IP Application layer?

Application, Presentation, Session

This layer of the OSI model is concerned with the protocols that exchange data between programs running on hosts. Application Transport Network Physical

Applicaton

What does email require to run on a computer or other end device?

Email requires several applications and services.

MKV, GIF, and JPG standards are associated with which OSI layer? Application Presentation Session Transport

Presentation

Email is a ____ and ___ method of sending , storing, and retrieving electronic messages across a network.

Store and Forward

Which peer-to-peer application allows users to share pieces of many files with each other at the same time? Hybrid Gnutella BitTorrent

BitTorrent

With P2P applications, each computer in the network that is running the application can act as what?

Client or a server for the other computers in the network that are also running the application.

What doe torrent files contain?

Contains information about tracker computers that keep track of which users have specific pieces of certain files.

What are the Session Layers functions?

Crate and maintain dialogs between source and destination applications Handles the exchange of information to initiate dialogs Keep dialogs active Restart sessions that are disrupted or idle for a long period of time.

Host Config UPD Client 68, Server 67 Dynamically assigns IP address to be re-used when no longer neede

DHCP-Dynamic Host Configuration Protocol

Which two are protocols that belong in the OSI application layer? PNG DNS SMTP QuickTime

DNS SMTP

Name System TCP, UDP client 53 Translates Domain Names, such as cisco.com into IP addresses

DNS -Domain Name System (Service)

File Transfer TCP 20 (data) to 21 (control) Sets rules that enable a user on one host to access and transfer files to and from another host over a network Is reliable, connection-oriented, and acknowledged file delivery protcol

FTP-File Transfer Protocol

What are the Presentation Lyres (Layer 6) three primary functions?

Formatting, or presenting, data at the source device into a compatible format for receipt by the destination device. Compressing data in a way that can be decompressed by the destination device Encrypting data for transmission and decrypting data upon receipt

This client request for data. A client (web browser) sends the GET message to the web server to request HTML pages

GET

The three common message types for HTTP are?

Get POST PUT

The presentation layer formats data for the application layer, and it sets standards for file formats. What are three well-known graphic image formats?

Graphics Interchange Format (GIF) Joint Photographic Experts Group (JPG) Portable Network Graphics (PNG)

This protocol is used by a web browser to establish a connecting to a web server.

HTTP

What are the three parts of the URL example, use the http://www.cisco.com/index.html URL?

HTTP (the protocol or scheme) www.cisco.com (the server name) index.html (The specific filename requested)

Web TCP 80, 8080 A set of rules for exchanging text, graphic images, sound, video, and other multimedia files on the World Wide Web

HTTP-Hyper Text Transfer Protocol

For secure communication across the internet, which HTTP protocol is used?

HTTPS

How does HTTP work?

HTTPS uses authentication and encryption to secure data as it travels between the client and server.

Web TCP, UDP 443 The browser uses encryption to secure HTTP communications Authenticates the website to which you are connecting your browser

HTTPS-Hyper Text Transfer Protocol Secure

What email protocol allows users to view copies of the messages in their email client software?

IMAP

Email TCP 143 Enables clients to access email stored on a mail server Maintains email on the server

IMAP-Internet Message Access Protocol

Where are emails store?

In databases on mail servers

What is the third step that happens when you request a web page?

In response to the request, the server sends the HTML code for this web page to the browser.

What is the Gnutella protocol?

Is a protocol where each user shares whole files with other users. Gnutella-compatible client software allows users to connect to Gnutella services over the internet, and to locate and access resources shared by other Gnutella peers.

When the server receives the message, what will do?

It either places the message in a local account, if the recipient is local Or forward the message to another mail server for delivery.

Periodically, the server checks the queue for messages and attempts to send them again, but what happens if the message is not delivered after a predetermined expiration time?

It is returned to sender as undeliverable

Mail servers communicate with who to transport messages form one domain to another?

Other mail servers

The P2P network model involves two parts:

P2P networks P2P applications Note: Both parts have similar features, but in practice work quite differently.

A client retrieves emails using on of the two Application layer email protocols:

POP IMAP

Which email protocol downloads mail from a mail server to the client and then deletes the email on the server?

POP Note: This is the default operation of POP

Which version of POP is the most commonly used version?

POP3

Email TCP 110 Enables clients to retrieve email form a mail server Downloads the email to the local mail application of the client

POP3-Post Office Protocol 3

This message type is used when uploading data files to a web server. GET POST PUT

POST

This uploads data files to the web server, such as form data.

POST

This uploads resources or content to the web server, such as an image

PUT

What type of protocol is a HTTP?

Request/response protocol

What does it mean if a P2P application uses a hybrid system?

Resource sharing is decentralized, but the indexes that point to resource locations are stored in a centralized directory. In a hybrid system, each peer accesses an index server to get the location of a resource stored on another peer.

The application layer process that sends mail uses which email protocol?

SMTP

This protocol is used by a client to send email to a mail server. POP SMTP IMAP HTTP

SMTP

Email TCP 25 Enables clients to send email to a mail server Enables servers to send email to other servers

SMTP-Simple Mail Transfer protocol

In the client /server model the device responding to the request is call what?

Server

Email supports three separate protocols for operation:

Simple Mail Transfer Protocol (SMTP) Post Office Protocol version 3 (POP3) Internet Message Access Protocol (IMAP)

What does the Application Layer provide?

The Application layer provides the interface between the applications used to communicate, and the underlying network over which messages are transmitted.

What is the fourth step that happens when you request a web page?

The browser deciphers the HTML code and formats the page for the browser window.

What is the second step that happens when you request a web page?

The browser then checks with a name server to convert www.cisco.com into a numeric IP address, which it uses to connect to the server. The client initiates an Http request to a server by sending a GET request to the server and asks for the index.html file.

When a clients sends email, how does the client SMTP process connect with the server SMTP process?

The client SMTP process connects with a server SMTP process on well-known port 25.

When a client, typically a web browser, sends a request to a web server, HTTP specifies what?

The message types used for that communication.

What happens when you type a URL into a web browser?

The web browser establishes a connection to the web service. The web service is running on the server that is using the HTTP protocol.

The destination email server may no be online, or may be busy, when email messages are sent. Therefore what happens to the email?

Therefore, SMTP spools messages to be sent at a later time.

What do the TCP/IP Application Layer protocols specify?

They specify the formats and control information necessary for many common internet communication functions.

With POP email messages downloaded and removed from the mail server, what does this mean?

This means there is no centralized location where email messages are kept.

POP is used by an application to do what?

To retrieve mail from a mail server.

What doe clients use to locate other users who have pieces that they need so that they can then connect directly to them?

Torrent File

HTTPS uses the same client request-server response process as HTTP, but the data stream is encrypted by what two possible cryptographic protocol?

Transport Layer Security - TLS Secure Socket Layer - SSL

True or False: Any type of file can be shared between users. Many of these files are copyrighted, meaning that only the creator has the right to use and distribute them. It is against the law to download or distribute copyrighted files without permission from the copyright holder. Copyright violation can result in criminal charges and civil lawsuits.

True

True or False: Application layer protocols are used by both the source and destination devices during a communication session. For the communications to be successful, the application layer protocols that are implemented on the source and destination host must be compatible.

True

True or False: Because POP does not store messages, it is not recommended for a small business that needs a centralized backup solution.

True

True or False: In the peer-to-peer (P2P) networking model, the data is accessed form a peer device without the use of dedicated server.

True

True or False: Many P2P applications allow users to share pieces of many files with each other at the same time.

True

True or False: The client and POP server exchange commands and responses until the connection is closed or aborted.

True

True or False? In a peer-to-peer network environment every peer can function as both client and server. True

True

True or False: BitTorrent has its own client

True, But there are many other BitTorrent clients including uTorrent, Deluge, and qBittorren

Users using IMAP-capable servers can create a file hierarchy on the server to organize and store mail. That file structure is duplicated on the email client as well. So what happens when you delete a message using the client email software?

When a user decides to delete a message, the server synchronizes that action and deletes the message form the server.


Set pelajaran terkait

Iggy Chapter 43: Care of Patients with Problems of the Central Nervous System: The spinal cord

View Set

Financial Accounting Chapter 12- Self Study

View Set

NLE Syllabus Culture (Latin 1/2 to Latin 2)

View Set

Entrepreneurial Finance Final Exam

View Set

Peds ATI Ch. 26 (Renal Disorders)

View Set