Module 3
Message timing includes the following:
- flow control - response timeout - access method
All communication methods have the following three elements in common:
- message source (sender) - message destination (reciever) - channel
What is covered in the application layer?
- name system - host config - email - file transfer - web and web service
TCP/IP has two important aspects for vendors and manufactures:
- open standard protocol suite - standards-based protocol suite
Address Resolution Protocol. Provides dynamic address mapping between an IPv4 address and a hardware address.
ARP
What does the network access layer cover?
Address resolution Data link protocols
A short lived proprietary suite released by Apple Inc. in 1995 for Apple devices. It adopted TCP/IP to replace it.
AppleTalk
What are the TCP/IP layers from top to bottom?
Application, transport, internet, network access
BGP
Border Gateway Protocol. An open standard exterior gateway routing protocol used between Internet Service Providers (ISPs). BGP is also commonly used between ISPs and their large private clients to exchange routing information.
What is covered in the transport layer?
Connection oriented: TCP Connectionless: UDP
Host config (application layer)
DHCPv4: dynamic host configuration for ipv4 DHCPv6: dynamic host configuration for ipv6 SLAAC: stateless address auto configuration. A method that allows a device to obtain its ipv6 addressing information without using a DHCPv6 server.
Name system (application layer)
DNS - domain name system. Translates domain names such as cisco.com, into IP addresses.
Which two protocols are service discovery protocols? - DNS - TCP - SSH - DHCP
DNS, DHCP
WLAN
Defines the rules for wireless signaling across the 2.4 GHz and 5 GHz radio frequencies.
EIGRP
Enhanced Interior Gateway Routing Protocol. An open standard routing protocol developed by Cisco that uses a composite metric based on bandwidth, delay, load and reliability.
Defines the rules for wiring and signaling standards of the network access layer.
Ethernet
This protocol is responsible for the delivery of messages from one NIC to another NIC on the same LAN.
Ethernet
What are the data link protocols?
Ethernet WLAN
The most common network access layer LAN protocols are _____________ and _________________ protocols.
Ethernet, WLAN
File transfer (application layer)
FTP SFTP TFTP
FTP
File Transfer Protocol. Sets the rules that enable a user on one host to access and transfer files to and from another host over a network. FTP is reliable, connection oriented, and acknowledged file delivery protocol.
This protocol governs the way a web server and web client interact. It defines the content and formatting of the requests and responses that are exchanged between the client and server.
HTTP
Web and Web Service (Application layer)
HTTP HTTPS REST
HTTPS
HTTP Secure. A secure form of HTTP that encrypts the data that is exchanged over the World Wide Web.
HTTP
Hypertext Transfer Protocol. A set of rules for exchanging text, graphic images, sound, video, and other multimedia files on the World Wide Web.
Internet Control Message Protocol for IPv4. Provides feedback from a destination host to a source host about errors in packet delivery.
ICMPv4
What are the messaging protocols?
ICMPv4 ICMPv6 ICMPv6 ND
ICMPv6 Neighbor Discovery. Includes four protocol messages that are used for address resolution and duplicate address detection.
ICMPv6 ND
This protocol is responsible for delivering the messages from the server to the receiver. It is used by routers to forward the messages across multiple networks.
IP
Receives message segments from the transport layer, packages messages into packets, and addresses packets for end-to-end delivery over a network. Uses a 32-bit address.
IPv4
What are the internet protocols?
IPv4 IPv6 NAT
Similar to IPv4 but uses a 128-bit address.
IPv6
IAB
Internet Architecture Board: Responsible for the overall management and development of internet standards.
IMAP
Internet Message Access Protocol. Enables clients to access email stored on a mail server as well as maintaining email on the server.
ISOC
Internet Society: Responsible for promoting the open development and evolution of internet use throughout the world.
NAT
Network Address Translation. Translates IPv4 addresses from a private network into globally unique public IPv4 addresses.
______________________ protocols are responsible for delivering the IP packet over the physical medium.
Network access layer
This protocol enables two or more devices to communicate over one or more networks.
Network communications protocols
These protocols secure data to provide authentication, data integrity, and data encryption.
Network security protocols
A short-lived proprietary protocol suite and network operating system developed by Novell Inc. in 1983 using the IPX network protocol.
Novell Netware
What are the routing protocols?
OSPF EIGRP BGP
OSPF
Open Shortest Path First. Link-state routing protocol that uses a hierarchical design based on areas. OSPF is an open standard interior routing protocol.
POP3
Post Office Protocol version 3. Enables clients to retrieve email from a mail server and download the email to the client's local mail application.
REST
Representational State Transfer. A web service that uses application programming interfaces (APIs) and HTTP requests to create web applications.
Email (application layer)
SMTP POP3 IMAP
SFTP
Secure File Transfer Protocol. An extension of Secure Shell (SSH) using SSH to transmit the files in an encrypted format.
SMTP
Simple Mail Transfer Protocol. Enables clients to send email to a mail server and enables servers to send email to other servers.
This protocol is responsible for guaranteeing the reliable delivery of information. - TCP - IP - HTTP - Ethernet
TCP
This protocol manages the individual conversations. It is responsible for guaranteeing the reliable delivery of the information and managing flow control between the end devices.
TCP
The most common and relevant suite used today. _____________ protocol suite is an open standard protocol suite maintained by the IETF.
TCP/IP
Name four competing protocol suites:
TCP/IP, ISO, AppleTalk, Novell Netware
TCP
Transmission Control Protocol. Enables reliable communication between processes running on separate hosts and provides reliable, acknowledged transmissions that confirm successful delivery.
TFTP
Trivial File Transfer Protocol. A simple, connectionless file transfer protocol with best effort, unacknowledged file delivery. It uses less overhead than FTP.
UDP
User Datagram Protocol. Enables a process running on one host to send packets to a process running on another host. However, UDP does not confirm successful datagram transmission.
This determines when someone can send a message.
access method
This identifies the sender and the intended receiver of the message using a defined _______________________ scheme.
addressing
This function contains information used for process-to-process communications between network applications. When accessing a web page, HTTP or HTTPS protocols are used to communicate between the client and server web processes.
application interface
BGP
border gateway protocol
Information is being transmitted to all end devices.
broadcast
This consists of the media that provides the pathway over which the message travels from source to destination.
channel
_______________________ occurs when the process is reversed by the recipient and the letter is removed from the envelope.
de-encapsulation
__________________________ reverses this process to interpret the information.
decoding
DNS
domain name system
The process of placing one message format inside another message format is called ___________________.
encapsulation
What is the first step to sending a message?
encoding
What is the process of converting information into the proper form for transmission? - Formatting - Encoding - Encapsulation
encoding
__________________ is the process of converting information into another acceptable form, for transmission.
encoding
This function is used to determine if data became corrupted during transmission.
error detection
This function ensures that data flows at an efficient rate between two communication devices.
flow control
This is the process of managing the rate of data transmission. It defines how much information can be sent and the speed at which it can be delivered.
flow control
Which three are components of message timing? - Flow control - Sequence numbers - Access method - Retransmit time - Response timeout
flow control, access method, response timeout
Which step of the communication process is concerned with properly identifying the address of the sender and receiver? - Formatting - Encoding - Encapsulation
formatting
HTTP
hypertext transfer protocol
IETF
internet engineering task force
What does the internet layer cover?
internet protocol messaging routing protocols
Receives the message and interprets it.
message destination (receiver)
People or electronic devices that need to send a message to other individuals or devices.
message source (sender)
___________________ give you a way to visualize the rules and their place in your network.
models
Information is being transmitted to one or more end devices.
multicast
Which delivery method is used to transmit information to one or more end devices, but not all devices on the network? - unicast - multicast - broadcast
multicast
There are no TCP/IP protocols in the _________________________ layer.
network access
Networking documents and topologies often represent networking and end devices using a _______________________. They are typically represented as a circle.
node icon
OSPF
open shortest path first
This TCP/IP protocol means it is freely available to the public and can be used by any vendor on their hardware or in their software.
open standard protocol suite
A ________________________ is a group of inter-related protocols necessary to perform a communication function.
protocol suite
Sending a message, whether by face-to-face communication or over a network, is governed by rules called _______________. These are specific to the type of communication method being used.
protocols
_________________ are sets of agreed upon rules that have been created by standards organizations.
protocols
This function provides guaranteed delivery mechanisms in case messages are lost or corrupted in transit. TCP provides guaranteed delivery.
reliability
Hosts on a network use network protocols that specify how long to wait for responses and what action to take if a response timeout occurs.
response timeout
BGP and OSPF are examples of which type of protocol? - network communication - network security - routing - service discovery
routing
These protocols enable routers to exchange route information, compare path information, and then to select the best path to the destination network.
routing protocols
SSL
secure sockets layer
This function uniquely labels each transmitted segment of data. The receiving device uses the _______________ information to reassemble the information correctly. This is useful is the data segments are lost, delayed or received out-of-order.
sequencing
There protocols are used for the automatic detection of devices or services.
service discovery protocols
This TCP/IP protocol means it has been endorsed by the networking industry and approved by a standards organization. This ensures that products from different manufacturers can interoperate successfully.
standards-based protocol
What is the purpose of the sequencing function in network communication? - to uniquely label transmitted segments of data for proper reassembly by the receiver - to determine if data is corrupted during transmission - to ensure data flows at an efficient rate between sender and receiver - to guarantee delivery of data
to uniquely label transmitted segments of data for proper reassembly by the receiver
TCP
transmission control protocol
TLS
transport layer security
Information is being transmitted to a single end device.
unicast
The three types of data communications:
unicast, multicast, broadcast