CSS 50 Module 15 Application Layer

Ace your homework & exams now with Quizwiz!

Application Layer Protocols

(1.) Utility (DNS, SNMP, DHCP (2.) Messaging protocols (SMTP) (3.) Data Transfer protocols (NFS, FTP) (4.) Interactive protocols (Telnet)

P2P applications

A P2P application allows a device to act as both a client and a server within the same communication. Common P2P Networks: · BitTorrent · Direct Connect · eDonkey · Freenet

On a home network, which device is most likely to provide dynamic IPv4 addressing to clients on the home network? A home router A DNS server An ISP DHCP server A dedicated file server

A home router

peer-to-peer

A network model where all computers on the network are equal and data may be shared from computer to computer.

Which of the following DNS record types is used to resolve IPv6 addresses? A NS AAAA MX

AAAA (Quad A)

SSL

An abbreviation for Secure Sockets Layer; it is a protocol that provides security when communicating on the Internet

MKV, GIF, and JPG standards are associated with which OSI layer? Application Transport Network physical

Application

This layer of the OSI model is concerned with the protocols that exchange data between programs running on hosts. Application Transport Network physical

Application

Which TCP/IP model layer is closest to the end user? Network access Application Transport Internet

Application

DHCP

Dynamic Host Configuration Protocol. A service used to dynamically assign TCP/IP configuration information to clients. DHCP is often used to assign IP addresses, subnet masks, default gateways, DNS server addresses, and much more. (TCP PORT 67)

This is a function of the OSI session layer. Compress and decompress data Provide an interface between applications Format data for the application layer Exchanger of information to initiate dialog between peers

Exchanger of information to initiate dialog between peers

True or false? A DNS server that receives a request for a name resolution that is not within its DNS zone will send a failure message to the requesting client. True False

False

True or false? HTTP is a secure protocol. True False

False

True or false? Resource sharing over SMB is only supported on Microsoft operating systems. True False

False

True or false? The peer-to-peer networking model requires the implementation of a dedicated server for data access. True False

False

DHCPACK

sent by a DHCP server to acknowledge the client's acceptance of a DHCP lease

DHCPREQUEST

used by a DHCP client to signal acceptance of a DHCP lease that was sent by a DHCPOFFER message

HTTP PUT request

· This uploads resources or content to the web server, such as an image.

BOOTP

• Enables a diskless workstation to discover its own IP address, the IP address of a BOOTP server on the network, and a file to be loaded into memory to boot the machine • BOOTP is being superseded by DHCP

Which of these ports are used by FTP? (Choose two.) 20 21 25 110

20 21

How many connections are required by FTP between client and server? 1 2 3 4

2

DHCPDISCOVER

Broadcast-based DHCP message used by clients to locate available DHCP servers.

Samba

LINUX and UNIX operating systems also provide a method of sharing resources with Microsoft networks

Which three protocols or standards are used at the application layer of the TCP/IP model? (Choose three.) MPEG GIF HTTP TCP UDP IP

MPEG HTTP GIF

Which of the following DNS resource record types resolves authoritative name servers? A NS AAAA MX

NS

Presentation Layer (Layer 6)

OSI Layer: Converts data intended for or received from the application layer into other formats. three primary functions: · Formatting, or presenting, data at the source device into a compatible format for receipt by the destination device. · Compressing data in a way that can be decompressed by the destination device. · Encrypting data for transmission and decrypting data upon receipt.

URL

Uniform Resource Locator: An easy-to-remember address for calling a web page (like www.code.org). Uniform Resource Identifiers (URIs)

DHCPRELEASE

Used by clients to terminate an IP address lease

DHCPOFFER

a DHCP server responding to the initial request by a client

P2P network

each node connected on the network can communicate directly with every other node on the network data is accessed from a peer device without the use of a dedicated server.

Three parts of a URL

http (the protocol or scheme) www.cisco.com (the server name) index.html (the specific filename requested)

DNS

(Domain Name System) The Internet's system for converting alphabetic names into numeric IP addresses. (TCP PORT 53)

IMAP

(Internet Message Access Protocol) The main protocol used by email clients in communicating with email servers. Enables clients to access email stored on a mail server Maintains email COPY on the server (TCP PORT 143)

POP3

(Post Office Protocol 3) A standard for retrieving e-mail messages from an e-mail server (TCP PORT 110)

SMTP

(Simple Mail Transfer Protocol) Email - The main protocol used to send electronic mail from server to server on the Internet. (TCP PORT 25)

Session Layer (Layer 5)

-responsible for establishing, maintaining, and terminating comm sessions b/t two computers -manages dialogue discipline or dialogue control (simplex, half-duplex, full-duplex) -re-transmits PDU's (packets) that have failed

What part of the URL, http://www.cisco.com/index.html, represents the top-level DNS domain? http www index .com

.com

These three OSI layers define the same functions as the TCP/IP model application layer. Application presentation Transport Network Physical Data link Session

Application presentation Session

Which peer-to-peer application allows users to share pieces of many files with each other at the same time? Hybrid Gnutella BitTorrent

BitTorrent

An author is uploading one chapter document from a personal computer to a file server of a book publisher. What role is the personal computer assuming in this network model? Transient Client Master Server Slave

Client

What are two characteristics of the application layer of the TCP/IP model? (Choose two.) Responsibility for physical addressing Responsibility for logical addressing Closest to the end user The creation and maintenance of dialogue between source and destination applications

Closest to the end user The creation and maintenance of dialogue between source and destination applications

A wireless host needs to request an IPv4 address. What protocol would be used to process the request? DHCP FTP ICMP SNMP HTTP

DHCP (Dynamic Host Configuration Protocol)

Which two are protocols that belong in the OSI application layer? PNG DNS SMTP QuikTime

DNS SMTP

DNS Record Types

DNS server stores different types of resource records that are used to resolve names · A - An end device IPv4 address · NS - An authoritative name server · AAAA - An end device IPv6 address (pronounced quad-A) · MX - A mail exchange record

nslookup command

Displays information about DNS names and their corresponding IP addresses, and it can be used to diagnose DNS servers.

top-level domain

Domains (including .net, .org, .com, .mil. and the set .xx country codes) at the end of a domain name are the highest level of the domain name hierarchy.

FTP

File Transfer Protocol. A format and set of rules for transferring files from a host to a remote computer. • FTP is a reliable, connection-oriented, and acknowledged file delivery protocol (TCP PORTS 20 and 21)

Which two tasks can be performed by a local DNS server? (Choose two.) Forwarding name resolution requests between servers Mapping name-to-IP addresses for internal hosts Retrieving email messages Providing IP addresses to local hosts Allowing data transfer between two network devices.

Forwarding name resolution requests between servers Mapping name-to-IP addresses for internal hosts

FQDN

Fully Qualified Domain Name - consists of a host ID and domain name. Such as http://www.cisco.com

What message type is used by an HTTP client to request data from a web server? GET PUT ACK POST

GET

This protocol is used by a web browser to establish a connection to a web server. HTTP SSL IMAP SMTP

HTTP (Hyper Text Transfer Protocol)

Which protocol uses encryption? HTTPS DNS DHCP FTP

HTTPS (Hyper Text Transfer Protocol Secure)

HTTP

HyperText Transfer Protocol - the protocol used for transmitting web pages over the Internet • A set of rules for exchanging text, graphic images, sound, video, and other multimedia files on the World Wide Web (TCP PORTS 80, 8080)

HTTPS

Hypertext Transfer Protocol Secure. Encrypts HTTP traffic with SSL or TLS using port 443. • The browser uses encryption to secure HTTP communications • Authenticates the website to which you are connecting your browser (TCP PORT 443)

When retrieving email messages, which protocol allows for easy, centralized storage and backup of emails that would be desirable for a small- to medium-sized business? POP HTTPS IMAP SMTP

IMAP (Internet Message Access Protocol)

Which is a feature of IMAP? It upload email messages to a server It listens passively on port 110 for client requests. It downloads a copy of email messages leaving the original on the server

It downloads a copy of email messages leaving the original on the server

Why is DHCP for IPv4 preferred for use on large networks? Large networks send more requests for domain to IP address resolution It is more efficient way to manage IPv4 addresses than static address assignment is. It prevents sharing of files that are copyrighted DHCP uses a reliable transport layer protocol. Hosts on a large networks require more IPv4 addressing configuration settings than do hosts on small networks.

It is more efficient way to manage IPv4 addresses than static address assignment is.

Gnutella protocol

Operates without any centralized server and allows for numerous software clients to be used for access, which makes it nearly impossible to shut down. Grnutell Client Applications: μTorrent BitComet DC++ Deluge emule.

Which protocol can be used to transfer messages from an email server to an email client? POP3 SMTP SNMP HTTP

POP3 (Post Office Protocol)

This message type is used when uploading data files to a web server. GET POST PUT

POST

Which application layer protocol is used to provide file-sharing and print services to Microsoft applications? SMB SMTP DHCP HTTP

SMB (Server Message Block)

This protocol is used by a client to send email to a mail server. POP SMTP IMAP HTTP

SMTP (Simple Mail Transfer Protocol)

SMB

The Server Message Block (SMB) is a client/server file sharing protocol that describes the structure of shared network resources, such as directories, files, printers, and serial ports Server Message Block • Start, authenticate, and terminate sessions. • Control file and printer access. • Allow an application to send or receive messages to or from another device.

Which statement is true about FTP? FTP does not provide reliability during data transmission. FTP is a peer-to-peer application. The client can down load data from or upload data to the sever The client can choose if FTP is going to establish one or two connections with the server.

The client can down load data from or upload data to the sever

Application Layer

The seventh layer of the OSI model. Application layer protocols enable software programs to negotiate formatting, procedural, security, synchronization, and other requirements with the network.

HTTP GET

This is a client request for data. A client (web browser) sends the GET

HTTP POST request

This uploads data files to the web server, such as form data.

TLS

Transport Layer Security. Used to encrypt traffic on the wire. TLS is the replacement for SSL and like SSL, it uses certificates issued by CAs. PEAP-TLS uses TLS to encrypt the authentication process and PEAP-TLS requires a CA to issue certificates.

TFTP

Trivial File Transfer Protocol. Used to transfer small amounts of data with UDP port 69. A simple, connectionless file transfer protocol with best-effort, unacknowledged file delivery It uses less overhead than FTP

True or false? FTP data transfers take place from client to server (push) and from server to client (pull). True False

True

True or false? In a peer-to-peer network environment every peer can function as both a client and a server. True False

True

Which of the following is a feature of the Gnutella protocol? Users can share whole files with other users Users can share pieces of files with other users Users can access an index server to get the location of resources shared by other users

Users can share whole files with other users


Related study sets

Chapter 14: Cleft Lips and Palates

View Set

Chapter 5; Sensation and Perception

View Set

Chapter 4: Carbohydrates: Sugars, Starches and Fibers

View Set

Sherman- Spinal Biodynamics 2- QUIZZES

View Set

Ranking Task: Luminosity, Distance and the Apparent Brightness of Stars

View Set

1-4, 6, 18, 24, 31. Health Promotion, Wellness, Disease Prevention & Religion

View Set