LESSON 3 Flashcards

(61 cards)

1
Q

Message sources are people, or electronic devices, that need to send a message to other individuals or devices.

A

Message source (sender)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The destination receives the message and interprets it.

A

Message Destination (receiver)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

This consists of the media that provides the pathway over which the message travels from source to destination.

A

Channel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Common computer protocols include the following requirements:

A

Message encoding
Message formatting and encapsulation
Message size
Message timing
Message delivery options

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Protocols must account for the following requirements to successfully deliver a message that is understood by the receiver:

A

An identified sender and receiver
Common language and grammar
Speed and timing of delivery
Confirmation or acknowledgment requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

is the process of converting information into another acceptable form, for transmission.

One of the first steps to sending a message

A

Encoding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

reverses this process to interpret the information.

A

Decoding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

depend on the type of message and the channel that is used to deliver the message.

A

Message formats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Another rule of communication is

A

Message Size

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

This is the process of managing the rate of data transmission. _______ defines how much information can be sent and the speed at which it can be delivered.

A

Flow Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

For example, if one person speaks too quickly, it may be difficult for the receiver to hear and understand the message. In network communication, there are network protocols used by the source and destination devices to negotiate and manage the flow of information.

A

Flow Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

If a person asks a question and does not hear a response within an acceptable amount of time, the person assumes that no answer is coming and reacts accordingly. The person may repeat the question or instead, may go on with the conversation. Hosts on the network use network protocols that specify how long to wait for responses and what action to take if a response timeout occurs.

A

Response Method

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

This determines when someone can send a message. Click Play in the figure to see an animation of two people talking at the same time, then a “collision of information” occurs, and it is necessary for the two to back off and start again. Likewise, when a device wants to transmit on a wireless LAN, it is necessary for the WLAN network interface card (NIC) to determine whether the wireless medium is available.

A

Access method

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

has similar delivery options to communicate

A

Network communications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Information is being transmitted to a single end device.

A

Unicast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Information is being transmitted to a one or more end devices

A

Multicast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Information is being transmitted to all end devices.

A

Broadcast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

are typically represented as a circle

A

Nodes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the process of converting information into the proper form for transmission?

A

Encoding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which step of the communication process is concerned with properly identifying the address of the sender and receiver?

A

Encapsulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which three are components of message timing?

A

Flow control
Access method
Response timeout

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which delivery method is used to transmit information to one or more end devices, but not all devices on the network?

A

Multicast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

define a common format and set of rules for exchanging messages between devices

A

Network protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

are implemented by end devices and intermediary devices in software, hardware, or both.

A

Protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Protocols enable two or more devices to communicate over one or more networks. The Ethernet family of technologies involves a variety of protocols such as IP, Transmission Control Protocol (TCP), HyperText Transfer Protocol (HTTP), and many more.
Network Communications Protocols
22
rotocols secure data to provide authentication, data integrity, and data encryption. Examples of secure protocols include Secure Shell (SSH), Secure Sockets Layer (SSL), and Transport Layer Security (TLS).
Network Security Protocols
23
Protocols enable routers to exchange route information, compare path information, and then to select the best path to the destination network. Examples of routing protocols include Open Shortest Path First (OSPF) and Border Gateway Protocol (BGP).
Routing Protocols
24
Protocols are used for the automatic detection of devices or services. Examples of service discovery protocols include Dynamic Host Configuration Protocol (DHCP) which discovers services for IP address allocation, and Domain Name System (DNS) which is used to perform name-to-IP address translation.
Service Discovery Protocols
25
are responsible for a variety of functions necessary for network communications between end devices.
Network communication protocols
26
This identifies the sender and the intended receiver of the message using a defined addressing scheme. Examples of protocols that provide addressing include Ethernet, IPv4, and IPv6.
Addressing
27
This function provides guaranteed delivery mechanisms in case messages are lost or corrupted in transit. TCP provides guaranteed delivery.
Reliability
28
This function ensures that data flows at an efficient rate between two communicating devices. TCP provides flow control services.
Flow control
29
This function uniquely labels each transmitted segment of data. The receiving device uses the sequencing information to reassemble the information correctly. This is useful if the data segments are lost, delayed or received out-of-order. TCP provides sequencing services.
Sequencing
30
This function is used to determine if data became corrupted during transmission. Various protocols that provide error detection include Ethernet, IPv4, IPv6, and TCP.
Error Detection
31
This function contains information used for process-to- process communications between network applications. For example, when accessing a web page, HTTP or HTTPS protocols are used to communicate between the client and server web processes.
Application Interface
32
- his protocol governs the way a web server and a web client interact. - defines the content and formatting of the requests and responses that are exchanged between the client and server. Both the client and the web server software implement as part of the application. - relies on other protocols to govern how the messages are transported between the client and server.
Hypertext Transfer Protocol (HTTP)
33
- this protocol manages the individual conversations. - is responsible for guaranteeing the reliable delivery of the information and managing flow control between the end devices.
Transmission Control Protocol (TCP)
34
- This protocol is responsible for delivering messages from the sender to the receiver. - is used by routers to forward the messages across multiple networks.
Internet Protocol (IP)
35
his protocol is responsible for the delivery of messages from one NIC to another NIC on the same Ethernet local area network (LAN).
Ethernet
36
BGP and OSPF are examples of which type of protocol?
Routing
37
Which two protocols are service discovery protocols? (Choose two.)
DNS (Domain Name System) DHCP (Dynamic Host Configuration Protocol)
38
This protocol is responsible for guaranteeing the reliable delivery of information.
TCP (Transmission Control Protocol)
39
is a set of protocols that work together to provide comprehensive network communication services.
protocol suite
40
- This is the most common and relevant protocol suite used today. - The protocol suite is an open standard protocol suite maintained by the Internet Engineering Task Force (IETF).
Internet Protocol Suite or TCP/IP
41
This is a family of protocols developed jointly in 1977 by the International Organization for Standardization (ISO) and the International Telecommunications Union (ITU). - protocol also included a seven-layer model called the OSI reference model. - OSI reference model categorizes the functions of its protocols. - mainly known for its layered model.
Open Systems Interconnection (OSI) protocols
42
A short-lived proprietary protocol suite released by Apple Inc. in 1985 for Apple devices. In 1995, Apple adopted TCP/IP to replace AppleTalk.
AppleTalk
43
A short-lived proprietary protocol suite and network operating system developed by Novell Inc. in 1983 using the IPX network protocol. In 1995, Novell adopted TCP/IP to replace IPX.
Novell NetWare
44
available for the application, transport, and internet layers.
TCP/IP protocols
45
is the protocol suite used by the internet and the networks of today.
TCP/IP
45
The most common network access layer LAN protocols
Ethernet and WLAN (wireless LAN) protocols
46
are responsible for delivering the IP packet over the physical medium.
Network access layer
47
Internet Message Access Protocol. Enables clients to access email stored on a mail server as well as maintaining email on the server.
IMAP
48
CP/IP has two important aspects for vendors and manufacturers:
Open standard protocol suite - This means it is freely available to the public and can be used by any vendor on their hardware or in their software. Standards-based protocol suite - This means it has been endorsed by the networking industry and approved by a standards organization. This ensures that products from different manufacturers can interoperate successfully.
49
Sets the rules that enable a user on one host to access and transfer files to and from another host over a network. FTP is a reliable, connection-oriented, and acknowledged file delivery protocol.
FTP - File Transfer Protocol
50
As an extension to Secure Shell (SSH) protocol, SFTP can be used to establish a secure file transfer session in which the file transfer is encrypted. SSH is a method for secure remote login that is typically used for accessing the command line of a device.
SFTP - SSH File Transfer Protocol.
51
A simple, connectionless file transfer protocol with best-effort, unacknowledged file delivery. It uses less overhead than FTP.
TFTP - Trivial File Transfer Protocol.
52
A set of rules for exchanging text, graphic images, sound, video, and other multimedia files on the World Wide Web
HTTP - Hypertext Transfer Protocol.
53
A secure form of HTTP that encrypts the data that is exchanged over the World Wide Web.
HTTPS - HTTP Secure
54
A web service that uses application programming interfaces (APIs) and HTTP requests to create web applications.
REST - Representational State Transfer
55
UDP and TCP belong to which layer of the TCP/IP protocol?
Transport
56
Which two protocols belong in the TCP/IP model application layer?
DNS (Domain Name System) DHCP (Dynamic Host Configuration Protocol)