DV Chapter 3 Flashcards
Chapter 3 notes
What are the basic rules of Network Communication?
The message must have an identified sender and receiver
The message must be written in common language and grammar
The message must be sent in a timely manner
The message must be confirmed or acknowledged by the receiver
What is the role of Ethernet and Wireless protocols?
They physically connect devices to a network.
What is the role of DHCP and ICMPv6 protocols?
Provide IP addressing information, tells media where to send packets over the network, give DHCP information for when the device knows the name of the end location, but not the IP address.
What is the role of the TCP protocol?
The TCP ensures reliability, and makes sure that packets reach their destination. If a packet fails, TCP is responsible for resending it.
What is Message Encoding and Decoding?
Encoding is converting a message into another acceptable form for transmission. Decoding is when it is converted back to its original state at its destination.
What is Formatting?
Formatting is making sure messages stick to a specific format depending on the type of message that is being sent.
What is data encapsulation?
Encapsulation is breaking down large pieces of data into smaller, more transferable pieces. This makes traversing the network faster, and allows for protocol information to be imprinted on packets during travel.
How are physical and logical addresses different?
Logical addresses are Layer 3 addresses that provide the IP information.
Physical addresses are the Layer 2 MAC addresses that are burned into specific media.
Name all 7 Layers of the OSI model in order.
Application Layer (Data) Presentation Session Transport (Segment) Network (Packets) Data link (Frames) Physical (Bits)
What 3 OSI layers can fit into a single TCP/IP layer?
Application, Presentation, and session (Application Layer)
The Network Interface layer of the TCP/IP model is also made up of multiple OSI layers (Data link and physical)
What is De-encapsulation?
After data goes through encapsulation, it is put back together and De-encapsulated once it reaches the destination host.
Name Network Communication protocols.
IP (Internet Protocol)
TCP (Transmission Control Protocol)
HTTP (HyperText Transfer Protocol)
Network Communication protocols enable two or more devices to be able to communicate over one or more networks.
Name Network Security protocols.
SSH (Secure Shell)
SSL (Secure Sockets Layer)
TLS (Transport Layer Security)
Network Security protocols secure data and provide encryption, authentication, and data integrity.
Name Routing Protocols
OSPF (Open Shortest Path First)
BGP (Border Gateway Protocol)
Routing protocols enable routers to exchange information, compare path information with other routers, and determine the best path to their destination.
Name Service Discovery protocols.
DHCP (Dynamic Host Configuration Protocol)
DNS (Domain Name System)
Used for Automatic detection of devices and services over a network.