Chapter 3 - Introduction to TCP/IP Flashcards

Describe how a network works Describe the purpose and basic operation of the protocols in the OSI and TCP models. Identify and correct common network problems at Layers 1, 2, 3 and 7 using a layered model approach Implement an IP addressing scheme and IP Service to meet network requirements in a medium-size Enterprise branch office network. Describe the operation and benefits of using private and public IP addressing.

1
Q

Process Application Layer

A

the DoD’s equivalent to the OSIs top three layers (Application, Presentation, Session).

Defines protocols for node-to-node application communication and also controls user-interface specifications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Host-to-Host

A

Equivalent to the Transport Layer.

Defines protocols for setting up the level of transmission service for applications.

Creates reliable end-to-end communication

Ensures error-free delivery of data.

Handles packet sequencing and maintains data integrity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Internet Layer

A

Corresponds to the Network Layer.

Designates the protocols related to the logical transmission of packets over the entire network.

Takes care of the addressing of hosts by giving them an IP address.

Handles the routing of packets among multiple networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Network Access Layer

A

Equivalent to the Data Link and Physical Layers of the OSI.

Implements data exchange between the host and the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Protocols in the Process/Application Layer

A
8 Total
Telnet
FTP
LPD
SNMP
TFTP
SMTP
NFS
XWindow
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Protocols in the Host-to-Host Layer

A

TCP

UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Protocols in the Internet Layer

A

4 Total

ICMP
ARP
RARP
IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Protocols in the Network Access Layer

A
4 Total
Ethernet
Fast Ethernet
Token Ring
FIDDI
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Telnet

A

Application/Process Layer:

Deals with terminal emulation.

Allows a user on a remote client machine, called a Telnet client, to access the resources of another machine, the Telnet server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

File Transfer Protocol

FTP

A

Application/Process Layer:

Allows for file transfers between any two machines using it.

Allows for access to both directories and files.

Can accomplish certain directory operations such as relocating into different ones.

No authentication

A protocol and a program.

Protocol: Used by applications.

Program: Used by users to perform file tasks by hand.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Trivial File Transfer Protocol

A

Application/Process Layer:

Unlike FTP:
No directory-browsing abilities. can do nothing but send and receive files.

Sends smaller blocks of data than FTP making it faster.

No authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Network File System

NFS

A

Application/Process Layer:

Specializes in file sharing.
Allows two different types of file systems to interoperate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Simple Mail Transfer Protocol (SMTP)

A

Application/Process Layer:

Used to SEND mail.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Post Office Protocol (POP)

A

Application/Process Layer:

Used to RECEIVE email
Provides storage facility for incoming email.

Latest version is POP3.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Internet Message Access Protocol (IMAP)

A

Application/Process Layer:

Gives control on how you download email.
Added security
Can peek at mail or download just a part of it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Secure Sockets Layer (SSL)

A

Application/Process Layer:

Cryptographic protocols.
Enables secure online data-transfer activities ie; browsing the Web, instant messaging, Internet faxing, etc.

17
Q

Transport Layer Security (TSL)

A

Application/Process Layer:

Very similar to SSL.
Cryptographic protocols.
Enables secure online data-transfer activities ie; browsing the Web, instant messaging, Internet faxing, etc.