Cisco Chapter 3 Flashcards

1
Q

Rule Establishment of communication

A

An identified sender and receiver
Common language and grammar
Speed and timing of delivery
Confirmation or acknowledgement requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Encoding is the process of converting information into another acceptable form, for transmission.

A

Decoding reverses this process in order to interpret the information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The process of placing one message format (the letter) inside another message format (the envelope/frame) is called encapsulation. De-encapsulation occurs when the process is reversed by the recipient and the letter is removed from the envelope.

A
An identifier of the recipient
A salutation or greeting
The message content(source)
A closing phrase
An identifier of the sender
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Message size

A

The long message will be sent in separate frames, with each frame containing a piece of the original message. Each frame will also have its own addressing information. At the receiving host, the individual pieces of the message are reconstructed into the original message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Message Timing

A

Access Method
When someone can send a message
Flow Control
To calibrate the timing and speed of the message
Response Timeout
if no respons from the senders message comes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

1 person to another

A one-to-one delivery option is referred to as a unicast, (uni = one cast is sending)

A

Multicasting

The delivery of the same message to a group of host destinations simultaneously.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Broadcast
If all hosts on the network need to receive the message at the same time it represents a one-to-all message delivery option. Some protocols use a special multicast message that is sent to all devices, making it essentially the same as a broadcast. Additionally, hosts may be required to acknowledge the receipt of some messages while not needing to acknowledge others.

A

Without any additional configuration, the switch in the example would forward multicast traffic out all other ports.
The switch is configured with Cisco Group Management Protocol (CGMP) so it can learn on which interfaces multicast members reside. CGMP is beyond the scope of this course.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Protocol suite

Like customs in a country

A

A group of inter-related protocols with describe precise requirements and interactions that arenecessary to perform a communication function.
Protocol suites are implemented by hosts and networking devices in software, hardware or both.

Networking protocols define a common format and set of rules for exchanging messages between devices. Common networking protocols:
Hypertext Transfer Protocol (HTTP)
Transmission Control Protocol (TCP)
Internet Protocol (IP).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Protocol stack

A

Shows how the individual protocols within a suite are implemented.
The protocols are viewed in terms of layers, with each higher level service depending on the functionality defined by the protocols shown in the lower levels.
The lower layers
are concerned with moving data over the network and providing services to the upper layers
Upper layers
Are focused on the content of the message being sent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

IP in this course refers to both the IPv4 and IPv6 protocols. IPv6 is the most recent version of IP and the replacement for the more common IPv4.

Can you describe the networking protocols processes?

A

1: The message is formatted or structured (sender)
2 The networking devices share information about pathways with other networks (Router)
3: The figuring out of how and when the error/system messages are passed between the devices
4: The setup and termination of data transfer sessions,(Receiver)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

HTTP

application layer 1

A

Aan application protocol that governs the way a web server and a web client interact. HTTP defines the content and formatting of the requests and responses that are exchanged between the client and server. Both the client and the web server software implement HTTP as part of the application. HTTP relies on other protocols to govern how the messages are transported between the client and server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

TCP

Transport layer 2

A

The transport protocol that manages the individual conversations. TCP divides the HTTP messages into smaller pieces, called segments. These segments are sent between the web server and client processes running at the destination host. TCP is also responsible for controlling the size and rate at which messages are exchanged between the server and the client.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Eternet

Network acces layer 4

A

A network access protocol that describes two primary functions: communication over a data link and the physical transmission of data on the network media. Network access protocols are responsible for taking the packets from IP and formatting them to be transmitted over the media.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

IP

Internet layer 3

A

Is responsible for taking the formatted segments from TCP, encapsulating them into packets, assigning them the appropriate addresses, and delivering them to the destination host.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The TCP/IP protocol suite

A

An open standard, means these protocols are freely available to the public, and any vendor is able to implement these protocols on their hardware or in their software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A standards-based protocol

A

A process that has been endorsed by the networking industry and approved by a standards organization. The use of standards in developing and implementing protocols ensures that products from different manufacturers can interoperate successfully. If a protocol is not rigidly observed by a particular manufacturer, their equipment or software may not be able to successfully communicate with products made by other manufacturers.

17
Q

proprietary protocol

A

One company or vendor controls the definition of the protocol and how it functions.
Examples of proprietary protocols:
AppleTalk
Novell Netware
Which are legacy protocol suites. It is not uncommon for a vendor (or group of vendors) to develop a proprietary protocol to meet the needs of its customers and later assist in making that proprietary protocol an open standard.

18
Q

Development of TCP/IP

A

The first packet switching network and predecessor to today’s Internet was the Advanced Research Projects Agency Network (ARPANET), which came to life in 1969 by connecting mainframe computers at four locations. ARPANET was funded by the U.S. Department of Defense for use by universities and research laboratories.

19
Q

EGP

A

Exterior Gateway proctol

20
Q

IRC

A

Internet Relay chat

21
Q

AGS

A

router

22
Q

web server transmitting data to a client.

encapsulation

A
  1. It begins with the web server preparing the Hypertext Markup Language (HTML) page as data to be sent.
  2. The application protocol HTTP header is added to the front of the HTML data. The header contains various information, including the HTTP version the server is using and a status code indicating it has information for the web client.
  3. The HTTP application layer protocol delivers the HTML-formatted web page data to the transport layer. The TCP transport layer protocol is used to manage individual conversations, in this example between the web server and web client.
  4. Next, the IP information is added to the front of the TCP information. IP assigns the appropriate source and destination IP addresses. This information is known as an IP packet.
  5. The Ethernet protocol adds information to both ends of the IP packet, known as a data link frame. This frame is delivered to the nearest router along the path towards the web client. This router removes the Ethernet information, analyzes the IP packet, determines the best path for the packet, inserts the packet into a new frame, and sends it to the next neighboring router towards the destination. Each router removes and adds new data link information before forwarding the packet.
  6. This data is now transported through the internetwork, which consists of media and intermediary devices.
  7. In Figure 2, the animation begins with the client receiving the data link frames that contain the data. Each protocol header is processed and then removed in the opposite order it was added. The Ethernet information is processed and removed, followed by the IP protocol information, the TCP information, and finally the HTTP information.
  8. The web page information is then passed on to the client’s web browser software.
23
Q

This is because both operating systems implement the open standard protocols, such as those in the TCP/IP protocol suite.

A

Free market

24
Q

Standards organizations are usually vendor-neutral, non-profit institutions established to develop and promote the concept of open standards. Various organizations have different responsibilities for promoting and creating standards for the TCP/IP protocol.

A

Standards organizations shown in Figure 1 include:

Internet Society (ISOC) – Responsible for promoting the open development and evolution of Internet use throughout the world.
Internet Architecture Board (IAB) - Responsible for the overall management and development of Internet standards.
Internet Engineering Task Force (IETF) - Develops, updates, and maintains Internet and TCP/IP technologies. This includes the process and documents for developing new protocols and updating existing protocols know as Request for Comments (RFC) documents.
Internet Research Task Force (IRTF) - Focused on long-term research related to Internet and TCP/IP protocols such as Anti-Spam Research Group (ASRG), Crypto Forum Research Group (CFRG), and Peer-to-Peer Research Group (P2PRG).
Standards organizations shown in Figure 2 include:

Internet Corporation for Assigned Names and Numbers (ICANN) - Based in the United States, coordinates IP address allocation, the management of domain names, and assignment of other information used TCP/IP protocols.
Internet Assigned Numbers Authority (IANA) - Responsible for overseeing and managing IP address allocation, domain name management, and protocol identifiers for ICANN.

25
Q

.

A

Other standard organizations have responsibilities for promoting and creating the electronic and communication standards used to deliver the IP packets as electronic signals over a wired or wireless medium.

Institute of Electrical and Electronics Engineers (IEEE, pronounced “I-triple-E”) – Organization of electrical engineering and electronics dedicated to advancing technological innovation and creating standards in a wide area of industries including power and energy, healthcare, telecommunications, and networking. Figure 1 shows several of the standards related to networking.

Electronic Industries Alliance (EIA) - Best known for its standards related to electrical wiring, connectors, and the 19-inch racks used to mount networking equipment.

Telecommunications Industry Association (TIA) - Responsible for developing communication standards in a variety of areas including radio equipment, cellular towers, Voice over IP (VoIP) devices, satellite communications, and more. Figure 2 shows an example of an Ethernet cable meeting TIA/EIA standards.

International Telecommunications Union-Telecommunication Standardization Sector (ITU-T) - One of the largest and oldest communication standard organizations. The ITU-T defines standards for video compression, Internet Protocol Television (IPTV), and broadband communications, such as a digital subscriber line (DSL).

26
Q

The benefits to using a layered model to describe network protocols and operations include:

A

Assisting in protocol design because protocols that operate at a specific layer have defined information that they act upon and a defined interface to the layers above and below.

Fostering competition because products from different vendors can work together

Preventing technology or capability changes in one layer from affecting other layers above and below.

Providing a common language to describe networking functions and capabilities.

27
Q

As shown in the figure, the TCP/IP model and the Open Systems Interconnection (OSI) model are the primary models used when discussing network functionality. They each represent a basic type of layered networking models:

A

Protocol model - This type of model closely matches the structure of a particular protocol suite. The TCP/IP model is a protocol model because it describes the functions that occur at each layer of protocols within the TCP/IP suite. TCP/IP is also used as a reference model.
Reference model - This type of model provides consistency within all types of network protocols and services by describing what has to be done at a particular layer, but not prescribing how it should be accomplished. The OSI model is a widely known internetwork reference model, but is also a protocol model for the OSI protocol suite.

28
Q

The TCP/IP Protocol Model

A

network access
internet
transport
application

29
Q

PDU

A

protocol data unit

The cutting of data and numbering them this the part where they get named