Module 3 - Protocols and Models Flashcards

1
Q

Role of Protocols

A

In addition to identifying the source and destination, computer and network protocols define the details of how a message is transmitted across a network. Common computer protocols include the following requirements:

Message encoding
Message formatting and encapsulation
Message size
Message timing
Message delivery options

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Encoding / Decoding

A

Encoding is the process of converting information into another acceptable form, for transmission. Decoding reverses this process to interpret the information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Flow Control

A

This is the process of managing the rate of data transmission. Flow control defines how much information can be sent and the speed at which it can be delivered. For example, if one person speaks too quickly, it may be difficult for the receiver to hear and understand the message. In network communication, there are network protocols used by the source and destination devices to negotiate and manage the flow of information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Response Timeout

A

Hosts on the network use protocols that spedify how long to wait for responses and what action to take if a respoinse timeout occurds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Access method

A

When a device wants to transmit on a particular medium, the NIC determines whether the medium s available.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which step of the communication process is concerned with properly identifying the address of the sender and receiver?

A

Formatting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Network Communications Protocols

A

Protocols enable two or more devices to communicate over one or more networks. The Ethernet family of technologies involves a variety of protocols such as IP, Transmission Control Protocol (TCP), HyperText Transfer Protocol (HTTP), and many more.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Network Security Protocols

A

Protocols secure data to provide authentication, data integrity, and data encryption. Examples of secure protocols include Secure Shell (SSH), Secure Sockets Layer (SSL), and Transport Layer Security (TLS).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Routing Protocols

A

Protocols enable routers to exchange route information, compare path information, and then to select the best path to the destination network. Examples of routing protocols include Open Shortest Path First (OSPF) and Border Gateway Protocol (BGP).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Service Discovery Protocols

A

Protocols are used for the automatic detection of devices or services. Examples of service discovery protocols include Dynamic Host Configuration Protocol (DHCP) which discovers services for IP address allocation, and Domain Name System (DNS) which is used to perform name-to-IP address translation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Network Protocol Functions

A

Addressing, Reliability, Flow control, Sequencing, Error Detection, Application Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Addressing

A

This identifies the sender and the intended receiver of the message using a defined addressing scheme. Examples of protocols that provide addressing include Ethernet, IPv4, and IPv6.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Reliability

A

This function provides guaranteed delivery mechanisms in case messages are lost or corrupted in transit. TCP provides guaranteed delivery.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Flow control

A

This function ensures that data flows at an efficient rate between two communicating devices. TCP provides flow control services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Sequencing

A

This function uniquely labels each transmitted segment of data. The receiving device uses the sequencing information to reassemble the information correctly. This is useful if the data segments are lost, delayed or received out-of-order. TCP provides sequencing services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Error Detection

A

This function is used to determine if data became corrupted during transmission. Various protocols that provide error detection include Ethernet, IPv4, IPv6, and TCP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Application Interface

A

This function contains information used for process-to-process communications between network applications. For example, when accessing a web page, HTTP or HTTPS protocols are used to communicate between the client and server web processes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

DHCPv4

A

Dynamic Host Configuration Protocol for IPv4. A DHCPv4 server dynamically assigns IPv4 addressing information to DHCPv4 clients at start-up and allows the addresses to be re-used when no longer needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

DHCPv6

A

Dynamic Host Configuration Protocol for IPv6. DHCPv6 is similar to DHCPv4. A DHCPv6 server dynamically assigns IPv6 addressing information to DHCPv6 clients at start-up.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

SLAAC

A

Stateless Address Autoconfiguration. A method that allows a device to obtain its IPv6 addressing information without using a DHCPv6 server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

DNS

A

Domain Name System. Translates domain names such as cisco.com, into IP addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

SMTP

A

Simple Mail Transfer Protocol. Enables clients to send email to a mail server and enables servers to send email to other servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

POP3

A

Post Office Protocol version 3. Enables clients to retrieve email from a mail server and download the email to the client’s local mail application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

IMAP

A

Internet Message Access Protocol. Enables clients to access email stored on a mail server as well as maintaining email on the server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

FTP

A

File Transfer Protocol. Sets the rules that enable a user on one host to access and transfer files to and from another host over a network. FTP is a reliable, connection-oriented, and acknowledged file delivery protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

SFTP

A

SSH File Transfer Protocol. As an extension to Secure Shell (SSH) protocol, SFTP can be used to establish a secure file transfer session in which the file transfer is encrypted. SSH is a method for secure remote login that is typically used for accessing the command line of a device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

TFTP

A

Trivial File Transfer Protocol. A simple, connectionless file transfer protocol with best-effort, unacknowledged file delivery. It uses less overhead than FTP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

HTTP

A

Hypertext Transfer Protocol. A set of rules for exchanging text, graphic images, sound, video, and other multimedia files on the World Wide Web.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

HTTPS

A

HTTP Secure. A secure form of HTTP that encrypts the data that is exchanged over the World Wide Web.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

REST

A

Representational State Transfer. A web service that uses application programming interfaces (APIs) and HTTP requests to create web applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

TCP

A

Transmission Control Protocol. Enables reliable communication between processes running on separate hosts and provides reliable, acknowledged transmissions that confirm successful delivery.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

UDP

A

User Datagram Protocol. Enables a process running on one host to send packets to a process running on another host. However, UDP does not confirm successful datagram transmission.

33
Q

IPv4

A

Internet Protocol version 4. Receives message segments from the transport layer, packages messages into packets, and addresses packets for end-to-end delivery over a network. IPv4 uses a 32-bit address.

34
Q

IPv6

A

IPv6 - IP version 6. Similar to IPv4 but uses a 128-bit address.

35
Q

NAT

A

NAT - Network Address Translation. Translates IPv4 addresses from a private network into globally unique public IPv4 addresses.

36
Q

ICMPv4

A

ICMPv4 - Internet Control Message Protocol for IPv4. Provides feedback from a destination host to a source host about errors in packet delivery.

37
Q

ICMPv6

A

ICMPv6 - ICMP for IPv6. Similar functionality to ICMPv4 but is used for IPv6 packets.

38
Q

ICMPv6 ND

A

ICMPv6 ND - ICMPv6 Neighbor Discovery. Includes four protocol messages that are used for address resolution and duplicate address detection.

39
Q

OSPF

A

OSPF - Open Shortest Path First. Link-state routing protocol that uses a hierarchical design based on areas. OSPF is an open standard interior routing protocol.

40
Q

EIGRP

A

EIGRP - Enhanced Interior Gateway Routing Protocol. An open standard routing protocol developed by Cisco that uses a composite metric based on bandwidth, delay, load and reliability.

41
Q

BGP

A

BGP - Border Gateway Protocol. An open standard exterior gateway routing protocol used between Internet Service Providers (ISPs). BGP is also commonly used between ISPs and their large private clients to exchange routing information.

42
Q

ARP

A

ARP - Address Resolution Protocol. Provides dynamic address mapping between an IPv4 address and a hardware address.

43
Q

Ethernet

A

Ethernet - Defines the rules for wiring and signaling standards of the network access layer.

44
Q

WLAN

A

WLAN - Wireless Local Area Network. Defines the rules for wireless signaling across the 2.4 GHz and 5 GHz radio frequencies.

45
Q

Application Layer

A

Name System
Host Config
Email
File Transfer
Web and Web Services

46
Q

Transport Layer

A

TCP (Connection Control)
UDP (Connectionless)

47
Q

Internet Layer

A

Internet Protocol
Messaging
Routing Protocols

48
Q

Network Access Layer

A

Address Resolution (ARP)
Data Link Protocols (Ethernet, WLAN)

49
Q

Internet Society (Isoc)

A

Responsible for Promoting the open development and evolution of internet use throughout the world.

50
Q

Internet Architecture Board (IAB)

A

Responsible for the overall management and development of internet standards.

51
Q

Internet Engineering Trask Force (IETF)

A

Develops updates, and maintains internet and TCP/IP technologies. This includes the process and documents for developng new protocols and updating existing ones. Request for Comments documents.

52
Q

Internet Research Task Force (IRTF)

A

Focused on long-term research related to internet and TCP/IP protoclols such as Antti-Spam Research Group (ASRG), Crypto Forum Research Group (CFRG), and Peer-to-Peer Research Group (P2PRG)

53
Q

Internet Corporation for Assigned Names and Numbers (ICANN)

A

coordinates IP address allocation, the management of domain names, and the assignment of other information used in

54
Q

Institute of Electrical and Electronics Engineers

A

Organization of electrical engineering and electronics dedicated. to advancing technological innovation and creating standards in a wide area of industries including power and energy, healthcare, telecommunications, and networking.

55
Q

Electronic Industries Alliance (EIA)

A

Organization is best known for its standards relating to electrical wiring, connectors, and the 19-inch racks used to mount networking equipment.

56
Q

Telecommunications Industry Association (TIA)

A

Organization responsible for developing communication standards in a variety of areas including radio equipment, cellular towers, Voice over IP (VoIP) devices, satellite communications, and more.

57
Q

International Telecommunications Union-Telecommunication Standardization Sector (ITU-T)

A

One of the largest and oldest communication standards organizations. The ITU-T defines standards for video compression, Internet Protocol Television (IPTV), and broadband communications, such as a digital subscriber line (DSL).

58
Q

Open System Interconnection (OSI) Reference Model

A

Application
Presentation
Session
Transport
Network
Data Link
Physical

59
Q

TCP/IP Reference Model

A

Application
Transport
Internet
Network Access

60
Q

7 - Application

A

The application layer contains protocols used for process-to-process communications.

61
Q

6 - Presentation

A

The presentation layer provides for common representation of the data transferred between application layer services.

62
Q

5 - Session

A

The session layer provides services to the presentation layer to organize its dialogue and to manage data exchange.

63
Q

4 - Transport

A

The transport layer defines services to segment, transfer, and reassemble the data for individual communications between the end devices.

64
Q

3 - Network

A

The network layer provides services to exchange the individual pieces of data over the network between identified end devices.

65
Q

2 - Data Link

A

The data link layer protocols describe methods for exchanging data frames between devices over a common media

66
Q

1 - Physical

A

The physical layer protocols describe the mechanical, electrical, functional, and procedural means to activate, maintain, and de-activate physical connections for a bit transmission to and from a network device.

67
Q

TCP/IP Model

A

TCP/IP Model Layer Description
4 - Application Represents data to the user, plus encoding and dialog control.
3 - Transport Supports communication between various devices across diverse networks.
2 - Internet Determines the best path through the network.
1 - Network Access Controls the hardware devices and media that make up the network.

68
Q

Segmenting Benefits

A

Increases speed - Because a large data stream is segmented into packets, large amounts of data can be sent over the network without tying up a communications link. This allows many different conversations to be interleaved on the network called multiplexing.
Increases efficiency -If a single segment is fails to reach its destination due to a failure in the network or network congestion, only that segment needs to be retransmitted instead of resending the entire data stream.

69
Q

Data Encapsulation

A

Data, Segment, Packet, Frame, Bits
Data - General term for any PDU used at the application layer
Segment - Transport layer PDU
Packet - Network Layer PDU
Frame - Data link layer pdu
Bits - physical layer PDU used when physically transmitting over the medium

70
Q

Segmentation

A

Segmentation is the process of dividing a stream of data into smaller units for transmissions over the network. Segmentation is necessary because data networks use the TCP/IP protocol suite send data in individual IP packets. Each packet is sent separately, similar to sending a long letter as a series of individual postcards. Packets containing segments for the same destination can be sent over different paths.

71
Q

Sequencing

A

In network communications, each segment of the message must go through a similar process to ensure that it gets to the correct destination and can be reassembled into the content of the original message, as shown in the figure. TCP is responsible for sequencing the individual segments.

72
Q

Source IP address

A

The IP address of the sending device, which is the original source of the packet.

73
Q

Destination IP Address

A

The IP address of the receiving device, which is the final destination of the packet.

74
Q

Network portion (IPv4) or Prefix (IPv6)

A

Network portion (IPv4) or Prefix (IPv6) - The left-most part of the address that indicates the network in which the IP address is a member. All devices on the same network will have the same network portion of the address.

75
Q

Host portion (IPv4) or Interface ID (IPv6)

A

Host portion (IPv4) or Interface ID (IPv6) - The remaining part of the address that identifies a specific device on the network. This portion is unique for each device or interface on the network.

76
Q

Subnet Mask / Prefix Length

A

The subnet mask (IPv4) or prefix-length (IPv6) is used to identify the network portion of an IP address from the host portion.

77
Q

Source MAC address

A

This is the data link address, or the Ethernet MAC address, of the device that sends the data link frame with the encapsulated IP packet. The MAC address of the Ethernet NIC of PC1 is AA-AA-AA-AA-AA-AA, written in hexadecimal notation.

78
Q

Destination MAC address

A

When the receiving device is on the same network as the sending device, this is the data link address of the receiving device. In this example, the destination MAC address is the MAC address of the FTP server: CC-CC-CC-CC-CC-CC, written in hexadecimal notation

79
Q

Which layer of the OSI model defines services to segment and reassemble data for individual communications between end devices?

A

Transport