Module 3

Ace your homework & exams now with Quizwiz!

Message timing includes the following:

- flow control - response timeout - access method

All communication methods have the following three elements in common:

- message source (sender) - message destination (reciever) - channel

What is covered in the application layer?

- name system - host config - email - file transfer - web and web service

TCP/IP has two important aspects for vendors and manufactures:

- open standard protocol suite - standards-based protocol suite

Address Resolution Protocol. Provides dynamic address mapping between an IPv4 address and a hardware address.

ARP

What does the network access layer cover?

Address resolution Data link protocols

A short lived proprietary suite released by Apple Inc. in 1995 for Apple devices. It adopted TCP/IP to replace it.

AppleTalk

What are the TCP/IP layers from top to bottom?

Application, transport, internet, network access

BGP

Border Gateway Protocol. An open standard exterior gateway routing protocol used between Internet Service Providers (ISPs). BGP is also commonly used between ISPs and their large private clients to exchange routing information.

What is covered in the transport layer?

Connection oriented: TCP Connectionless: UDP

Host config (application layer)

DHCPv4: dynamic host configuration for ipv4 DHCPv6: dynamic host configuration for ipv6 SLAAC: stateless address auto configuration. A method that allows a device to obtain its ipv6 addressing information without using a DHCPv6 server.

Name system (application layer)

DNS - domain name system. Translates domain names such as cisco.com, into IP addresses.

Which two protocols are service discovery protocols? - DNS - TCP - SSH - DHCP

DNS, DHCP

WLAN

Defines the rules for wireless signaling across the 2.4 GHz and 5 GHz radio frequencies.

EIGRP

Enhanced Interior Gateway Routing Protocol. An open standard routing protocol developed by Cisco that uses a composite metric based on bandwidth, delay, load and reliability.

Defines the rules for wiring and signaling standards of the network access layer.

Ethernet

This protocol is responsible for the delivery of messages from one NIC to another NIC on the same LAN.

Ethernet

What are the data link protocols?

Ethernet WLAN

The most common network access layer LAN protocols are _____________ and _________________ protocols.

Ethernet, WLAN

File transfer (application layer)

FTP SFTP TFTP

FTP

File Transfer Protocol. Sets the rules that enable a user on one host to access and transfer files to and from another host over a network. FTP is reliable, connection oriented, and acknowledged file delivery protocol.

This protocol governs the way a web server and web client interact. It defines the content and formatting of the requests and responses that are exchanged between the client and server.

HTTP

Web and Web Service (Application layer)

HTTP HTTPS REST

HTTPS

HTTP Secure. A secure form of HTTP that encrypts the data that is exchanged over the World Wide Web.

HTTP

Hypertext Transfer Protocol. A set of rules for exchanging text, graphic images, sound, video, and other multimedia files on the World Wide Web.

Internet Control Message Protocol for IPv4. Provides feedback from a destination host to a source host about errors in packet delivery.

ICMPv4

What are the messaging protocols?

ICMPv4 ICMPv6 ICMPv6 ND

ICMPv6 Neighbor Discovery. Includes four protocol messages that are used for address resolution and duplicate address detection.

ICMPv6 ND

This protocol is responsible for delivering the messages from the server to the receiver. It is used by routers to forward the messages across multiple networks.

IP

Receives message segments from the transport layer, packages messages into packets, and addresses packets for end-to-end delivery over a network. Uses a 32-bit address.

IPv4

What are the internet protocols?

IPv4 IPv6 NAT

Similar to IPv4 but uses a 128-bit address.

IPv6

IAB

Internet Architecture Board: Responsible for the overall management and development of internet standards.

IMAP

Internet Message Access Protocol. Enables clients to access email stored on a mail server as well as maintaining email on the server.

ISOC

Internet Society: Responsible for promoting the open development and evolution of internet use throughout the world.

NAT

Network Address Translation. Translates IPv4 addresses from a private network into globally unique public IPv4 addresses.

______________________ protocols are responsible for delivering the IP packet over the physical medium.

Network access layer

This protocol enables two or more devices to communicate over one or more networks.

Network communications protocols

These protocols secure data to provide authentication, data integrity, and data encryption.

Network security protocols

A short-lived proprietary protocol suite and network operating system developed by Novell Inc. in 1983 using the IPX network protocol.

Novell Netware

What are the routing protocols?

OSPF EIGRP BGP

OSPF

Open Shortest Path First. Link-state routing protocol that uses a hierarchical design based on areas. OSPF is an open standard interior routing protocol.

POP3

Post Office Protocol version 3. Enables clients to retrieve email from a mail server and download the email to the client's local mail application.

REST

Representational State Transfer. A web service that uses application programming interfaces (APIs) and HTTP requests to create web applications.

Email (application layer)

SMTP POP3 IMAP

SFTP

Secure File Transfer Protocol. An extension of Secure Shell (SSH) using SSH to transmit the files in an encrypted format.

SMTP

Simple Mail Transfer Protocol. Enables clients to send email to a mail server and enables servers to send email to other servers.

This protocol is responsible for guaranteeing the reliable delivery of information. - TCP - IP - HTTP - Ethernet

TCP

This protocol manages the individual conversations. It is responsible for guaranteeing the reliable delivery of the information and managing flow control between the end devices.

TCP

The most common and relevant suite used today. _____________ protocol suite is an open standard protocol suite maintained by the IETF.

TCP/IP

Name four competing protocol suites:

TCP/IP, ISO, AppleTalk, Novell Netware

TCP

Transmission Control Protocol. Enables reliable communication between processes running on separate hosts and provides reliable, acknowledged transmissions that confirm successful delivery.

TFTP

Trivial File Transfer Protocol. A simple, connectionless file transfer protocol with best effort, unacknowledged file delivery. It uses less overhead than FTP.

UDP

User Datagram Protocol. Enables a process running on one host to send packets to a process running on another host. However, UDP does not confirm successful datagram transmission.

This determines when someone can send a message.

access method

This identifies the sender and the intended receiver of the message using a defined _______________________ scheme.

addressing

This function contains information used for process-to-process communications between network applications. When accessing a web page, HTTP or HTTPS protocols are used to communicate between the client and server web processes.

application interface

BGP

border gateway protocol

Information is being transmitted to all end devices.

broadcast

This consists of the media that provides the pathway over which the message travels from source to destination.

channel

_______________________ occurs when the process is reversed by the recipient and the letter is removed from the envelope.

de-encapsulation

__________________________ reverses this process to interpret the information.

decoding

DNS

domain name system

The process of placing one message format inside another message format is called ___________________.

encapsulation

What is the first step to sending a message?

encoding

What is the process of converting information into the proper form for transmission? - Formatting - Encoding - Encapsulation

encoding

__________________ is the process of converting information into another acceptable form, for transmission.

encoding

This function is used to determine if data became corrupted during transmission.

error detection

This function ensures that data flows at an efficient rate between two communication devices.

flow control

This is the process of managing the rate of data transmission. It defines how much information can be sent and the speed at which it can be delivered.

flow control

Which three are components of message timing? - Flow control - Sequence numbers - Access method - Retransmit time - Response timeout

flow control, access method, response timeout

Which step of the communication process is concerned with properly identifying the address of the sender and receiver? - Formatting - Encoding - Encapsulation

formatting

HTTP

hypertext transfer protocol

IETF

internet engineering task force

What does the internet layer cover?

internet protocol messaging routing protocols

Receives the message and interprets it.

message destination (receiver)

People or electronic devices that need to send a message to other individuals or devices.

message source (sender)

___________________ give you a way to visualize the rules and their place in your network.

models

Information is being transmitted to one or more end devices.

multicast

Which delivery method is used to transmit information to one or more end devices, but not all devices on the network? - unicast - multicast - broadcast

multicast

There are no TCP/IP protocols in the _________________________ layer.

network access

Networking documents and topologies often represent networking and end devices using a _______________________. They are typically represented as a circle.

node icon

OSPF

open shortest path first

This TCP/IP protocol means it is freely available to the public and can be used by any vendor on their hardware or in their software.

open standard protocol suite

A ________________________ is a group of inter-related protocols necessary to perform a communication function.

protocol suite

Sending a message, whether by face-to-face communication or over a network, is governed by rules called _______________. These are specific to the type of communication method being used.

protocols

_________________ are sets of agreed upon rules that have been created by standards organizations.

protocols

This function provides guaranteed delivery mechanisms in case messages are lost or corrupted in transit. TCP provides guaranteed delivery.

reliability

Hosts on a network use network protocols that specify how long to wait for responses and what action to take if a response timeout occurs.

response timeout

BGP and OSPF are examples of which type of protocol? - network communication - network security - routing - service discovery

routing

These protocols enable routers to exchange route information, compare path information, and then to select the best path to the destination network.

routing protocols

SSL

secure sockets layer

This function uniquely labels each transmitted segment of data. The receiving device uses the _______________ information to reassemble the information correctly. This is useful is the data segments are lost, delayed or received out-of-order.

sequencing

There protocols are used for the automatic detection of devices or services.

service discovery protocols

This TCP/IP protocol means it has been endorsed by the networking industry and approved by a standards organization. This ensures that products from different manufacturers can interoperate successfully.

standards-based protocol

What is the purpose of the sequencing function in network communication? - to uniquely label transmitted segments of data for proper reassembly by the receiver - to determine if data is corrupted during transmission - to ensure data flows at an efficient rate between sender and receiver - to guarantee delivery of data

to uniquely label transmitted segments of data for proper reassembly by the receiver

TCP

transmission control protocol

TLS

transport layer security

Information is being transmitted to a single end device.

unicast

The three types of data communications:

unicast, multicast, broadcast


Related study sets

microecon Final exam chapters 10, 11, 12, 13

View Set

Chapter 25 Care of Patients Requiring Oxygen Therapy or Tracheostomy

View Set

Calcium and vitamin D rec for bone health

View Set

WHAP Period 6 (last period, yeaaa!) TEST Review

View Set

College Planning & Preparation Module 2

View Set

Certified Specialist of Spirits - Vodka

View Set

EAQ Ch 30 Nursing Assessment: Hematologic System

View Set

History Western civilization 2 midterm exam study guide

View Set