module 3 Flashcards

1
Q

are people, or electronic devices, that need to send a message to other individuals or devices.

A

Message source (sender)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The destination receives the message and interprets it.

A

Message Destination (receiver)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

This consists of the media that provides the pathway over which the message travels from source to destination.

A

Channel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Common computer protocols (rule of communication)

A

Message encoding
Message formatting and encapsulation
Message size
Message timing
Message delivery options

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

___ is the process of converting information into another acceptable form, for transmission. ____ reverses this process to interpret the information.

A

Encoding, Decoding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Message timing includes the following:

A

Flow Control
Response Timeout
Access Method

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

This is the process of managing the rate of data transmission

A

Flow Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

If a person asks a question and does not hear a response within an acceptable amount of time, the person assumes that no answer is coming and reacts accordingly

A

Response Timeout

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

This determines when someone can send a message

A

Access method

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

are typically represented as a circle

A

Nodes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which delivery method is used to transmit information to one or more end devices, but not all devices on the network?

A

multicast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

one to one communication

A

Unicast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

one to all

A

Broadcast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  • are implemented by end devices and intermediary devices in software, hardware, or both
  • set of rules
A

protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

protocol type

A

Network Communication Protocols
Network Security Protocols
Routing Protocols
Service Discovery Protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

protocols enable two or more devices to communicate over one or more network

A

Network communication protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

protocols secure data to provide authentication, data integrity, and data encryption

A

Network security protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

protocols enable routers to exchange route information compare path information, and then to select the best path to the destination network

A

Routing protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

protocols are used for the automatic detection of devices or services

A

Service discovery protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Network protocol functions

A

addressing
reliability
flow control
Sequencing
error detection
application interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

This identifies the sender and the intended receiver of the message using a defined addressing scheme

A

addressing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

this function provides guaranteed delivery mechanisms in case message are lost or corrupted in transit

A

Reliability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

This functions ensures that data flows at an efficient rate between two communication devices

A

Flow control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

This function uniquely labels each transmitted segment of data

A

Sequencing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
This function is used to determine if data became corrupted during transmission
Error Detection
26
This function contains information used for process to process communication between network applications
Application Interface
27
This protocol governs the way a web server and a web client interact
Hypertext Transfer Protocol (HTTP)
28
This protocol manages the individual conversations. __ is responsible for guaranteeing the reliable delivery of the information and managing flow control between the end devices.
Transmission Control Protocol (TCP)
29
This protocol is responsible for delivering messages from the sender to the receiver. ___ is used by routers to forward the messages across multiple networks.
Internet Protocol (IP)
30
This protocol is responsible for the delivery of messages from one NIC to another NIC on the same Ethernet local area network (LAN).
Ethernet
31
BGP and OSPF are examples of which type of protocol?
Routing
32
Which two protocols are service discovery protocols?
DNS (Domain Name System) DHCP (Dynamic Host Configuration Protocol)
33
This protocol is responsible for guaranteeing the reliable delivery of information.
TCP (Transmission Control Protocol)
34
is a group of inter-related protocols necessary to perform a communication function. - is a set of protocols that work together to provide comprehensive network communication services
protocol suite
35
This is the most common and relevant protocol suite used today. The __ protocol suite is an open standard protocol suite maintained by the Internet Engineering Task Force (IETF).
Internet Protocol Suite or TCP/IP
36
This is a family of protocols developed jointly in 1977 by the International Organization for Standardization (ISO) and the International Telecommunications Union (ITU).
Open Systems Interconnection (OSI) protocols
37
A short-lived proprietary protocol suite released by Apple Inc. in 1985 for Apple devices. In 1995, Apple adopted TCP/IP to replace ____ .
AppleTalk
38
A short-lived proprietary protocol suite and network operating system developed by Novell Inc.
Novell NetWare
39
This means it is freely available to the public and can be used by any vendor on their hardware or in their software.
Open standard protocol suite
40
This means it has been endorsed by the networking industry and approved by a standards organization.
Standards-based protocol suite
41
protocols layer
Application Layer Transport Layer Internet Layer Network Access Layer
42
under application layer
Name System Host Config Email File Transfer Web and Web Service
43
Translates domain names such as cisco.com, into IP addresses.
DNS - Domain Name System
44
dynamically assigns IPv4 addressing information to DHCPv4 clients at start-up and allows the addresses to be re-used when no longer needed.
DHCPv4
45
A method that allows a device to obtain its IPv6 addressing information without using a DHCPv6 server.
SLAAC
46
Enables clients to send email to a mail server and enables servers to send email to other servers.
SMTP - Simple Mail Transfer Protocol.
47
Enables clients to retrieve email from a mail server and download the email to the client's local mail application.
POP3 - Post Office Protocol version 3
48
Enables clients to access email stored on a mail server as well as maintaining email on the server.
IMAP - Internet Message Access Protocol.
49
Sets the rules that enable a user on one host to access and transfer files to and from another host over a network.
FTP - File Transfer Protocol
50
As an extension to Secure Shell (SSH) protocol, ___ can be used to establish a secure file transfer session in which the file transfer is encrypted.
SFTP - SSH File Transfer Protocol.
51
A simple, connectionless file transfer protocol with best-effort, unacknowledged file delivery. It uses less overhead than FTP.
TFTP - Trivial File Transfer Protocol
52
A set of rules for exchanging text, graphic images, sound, video, and other multimedia files on the World Wide Web.
HTTP - Hypertext Transfer Protocol
53
A secure form of HTTP that encrypts the data that is exchanged over the World Wide Web.
HTTPS - HTTP Secure.
54
A web service that uses application programming interfaces (APIs) and HTTP requests to create web applications.
REST - Representational State Transfer
55
UDP and TCP belong to which layer of the TCP/IP protocol?
Transport
56
Which two protocols belong in the TCP/IP model application layer?
DNS DHCP
57
Which protocol operates at the network access layer of the TCP/IP model?
Ethernet
58
Responsible for promoting the open development and evolution of internet use throughout the world.
Internet Society (ISOC)
59
Responsible for the overall management and development of internet standards
Internet Architecture Board (IAB
60
develops, updates, and maintains internet and TCP/IP technologies. This includes the process and documents for developing new protocols and updating existing protocols, which are known as Request for Comments (RFC) documents.
Internet Engineering Task Force (IETF)
61
Focused on long-term research related to internet and TCP/IP protocols such as Anti-Spam Research Group (ASRG), Crypto Forum Research Group (CFRG), and Peer-to-Peer Research Group (P2PRG).
Internet Research Task Force (IRTF)
62
Open System Interconnection (OSI) Reference Model
7 -1 application Presentation session Transport Network Data link Physical
63
TCIP/ IP Model Layer
4-1 application transport internet Network access
64
contains protocols used for process to process communications
application
65
provides for common representation of the data transferred between application layer services
presentation
66
provides services to the presentation layer to organize its dialogue and to manage data exchange
session
67
defines services to segment, transfer, and reassemble the data for individual communications between the end devices
transport
68
provides services to exchange the individual pieces of data over the network between identified end devices
network
69
describe methods for exchanging data frames between devices over a common media
data link
70
describe the mechanical, electrical, functional, and procedural means to activate, maintain, and de activate physical connections for a bit transmission to and from a network device
physical
71
represents data to the user, plus encoding and dialog control
application (TCP/IP)
72
Supports communication between various devices across diverse networks
Transport(TCP/IP)
73
determines the best path through the network
internet
74
controls the hardware devices and media that make up the network
Network Access
75
divides the network access layer and the application layer of the TCP/IP model into multiple layers.
The OSI model
76
does not specify which protocols to use when transmitting over a physical medium
The TCP/IP protocol suite
77
is the process of breaking up messages into smaller units
Segmenting
78
Segmenting messages has two primary benefits:
Increases speed Increases efficiency
79
Large amounts of data can be sent over the network without tying up a communications link
Increases speed
80
Only segments which fail to reach the destination need to be retransmitted, not the entire data stream.
Increases efficiency
81
is the process of numbering the segments so that the message may be reassembled at the destination.
Sequencing messages
82
is the process where protocols add their information to the data. is a top down process.
Encapsulation
83
PDUs passing down the stack are as follows:
Data (Data Stream) Segment Packet Frame Bits (Bit Stream)
84
Responsible for delivering the IP packet from original source to the final destination.
Network layer source and destination addresses 
85
Responsible for delivering the data link frame from one network interface card (NIC) to another NIC on the same network.
Data link layer source and destination addresses
86
Timing and synchronization bits
Physical
87
Destination and source physical addresses
Data link
88
Destination and source logical network address
Network
89
Destination and source process number(port)
Transport
90
ENcoded application data
Upper layers
91
The IP address of the sending device, original source of the packet.
Source IP address 
92
The IP address of the receiving device, final destination of the packet.
Destination IP address 
93
The left-most part of the address indicates the network group which the IP address is a member. Each LAN or WAN will have the same network portion
Network portion (IPv4) or Prefix (IPv6) 
94
The remaining part of the address identifies a specific device within the group. This portion is unique for each device on the network.
Host portion (IPv4) or Interface ID (IPv6) 
95
is the router interface IP address that is part of this LAN and will be the “door” or “gateway” to all other remote locations.
default gateway (DGW)
96