CCNA CHAPTER 2 (PASAR) Flashcards
Was created by by the DoD to ensure data integrity, as well as maintain communications during war.
Transmission Control Protocol/Internet Protocol
Is a condensed version of the OSI Model
DoD Model
TCP/IP Model Layers
Process/Application Layer
Host-to-Host Layer
Internet Layer
Network Access Layer
TCP/IP layer that defines protocols for node to node application communication and also controls user-interface specifications
Application Layer
TCP/IP that takes care of the addressing of host by giving them an IP address
Internet Layer
TCP/IP layer that creates reliable end-to-end communication and ensuring the error-free delivery of data.
Host-to-Host Layer
TCP/IP layer that monitors the data exchange between the host and the network.
Network Access Layer
Is the chameleon of protocols and its specialty is terminal emulation
Telnet
Protocol that actually lets us to transfer files
File Transfer protocol
Stripped down, stock version of FTP
Trivial File Transfer Protocol
Protocol specializing in file sharing
Network File System
IS used to send email
SMTP
Is used to receive email
POP3
Protocol designed for printer sharing
Line Printer Daemon
Defines a protocol for writing clients/server applications based on a GUI
X Window
Collects and manipulates valuable network information
SNMP
A report delimiting the operational traits of a healthy network
baseline
Resolves hostnames
DNS
Assigns IP addresses to hosts
DHCP
Information a DHCP server can provide
IP Address
Subnet Mask
Domain Name
Default Gateway(routers)
DNS
WINS information
Takes large block of information from an application and breaks them into segments.
TCP
The TCP header is ___bytes long, or up to ___ bytes with options.
20 ; 24
The port number of the application on the host sending the data.
Source port
The port number of the application requested on the destination host.
Destination port
A number used by TCP that puts the data back in the correct order or retransmits missing or damaged data, a process called sequencing.
Sequence number
The TCP octet that is expected next.
Acknowledgment number
The number of 32-bit words in the TCP header. This indicates where the data begins. The TCP header (even one including options) is an integral number of 32 bits in length.
Header length
Always set to zero.
Reserved
Control functions used to set up and terminate a session.
Code bits
The window size the sender is willing to accept, in octets.
Window
The cyclic redundancy check (CRC), because TCP doesn’t trust the lower layers and checks everything. The CRC checks the header and data fields.
Checksum
A valid field only if the Urgent pointer in the code bits is set. If so, this value indicates the offset from the current sequence number, in octets, where the first segment of non-urgent data begins.
Urgent
May be 0 or a multiple of 32 bits, if any. What this means is that no options have to be present (option size of 0). However, if any options are used that do not cause the option field to total a multiple of 32 bits, padding of 0s must be used to make sure the data begins on a 32-bit boundary.
Options
Handed down to the TCP protocol at the Transport layer, which includes the upper-layer headers.
Data
- Scaled down economy model of TCP/IP model
- referred to as thin model
UDP
Considered as a connectionless protocol
UDP
Specifies whether fragmentation should occur.
Flags
Unique IP-packet value.
Identification