MODULO1-3 Flashcards

1
Q

peer-to-peer

A

Client and server software usually run on separate computers, but it is also possible for one
computer to be used for both roles at the same time. In small businesses and homes, many
computers function as the servers and clients on the network. This type of network is called
a peer-to-peer network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

end device initiates communication

A

When an end device initiates communication, it uses the address of the destination end
device to specify where to deliver the message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Intermediary devices

A

Intermediary devices connect the individual end devices to the network. They can connect
multiple individual networks to form an internetwork. These intermediary devices provide
connectivity and ensure that data flows across the network.
Intermediary devices use the destination end device address, in conjunction with
information about the network interconnections, to determine the path that messages
should take through the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Communication

A

Communication transmits across a network on media. The media provides the channel
over which the message travels from source to destination.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

types of media to interconnect devices

A

Metal wires within cables - Data is encoded into electrical impulses.
* Glass or plastic fibers within cables (fiber-optic cable) - Data is encoded into
pulses of light.
* Wireless transmission - Data is encoded via modulation of specific frequencies of
electromagnetic waves.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

, specialized terminology is used to describe how each
of these devices and media connect to each other:

A

Network Interface Card (NIC) - A NIC physically connects the end device to the
network.
* Physical Port - A connector or outlet on a networking device where the media
connects to an end device or another networking device.
* Interface - Specialized ports on a networking device that connect to individual
networks. Because routers connect networks, the ports on a router are referred to
as network interfaces.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Physical topology

A

diagrams illustrate the physical location of intermediary devices and
cable installation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Logical topology

A

diagrams illustrate devices, ports, and the addressing scheme of the
network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Intranet

A

is a term often used to refer to a private connection of LANs and WANs that
belongs to an organization. An intranet is designed to be accessible only by the
organization’s members, employees, or others with authorization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

extranet

A

An organization may use an extranet to provide secure and safe access to individuals who
work for a different organization but require access to the organization’s data. Here are
some examples of extranets:
* A company that is providing access to outside suppliers and contractors
* A hospital that is providing a booking system to doctors so they can make
appointments for their patients
* A local office of education that is providing budget and personnel information to the
schools in its district

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Cable

A

Typically offered by cable television service providers, the internet data
signal transmits on the same cable that delivers cable television. It provides a high
bandwidth, high availability, and an always-on connection to the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

DSL

A

Digital Subscriber Lines also provide high bandwidth, high availability, and an
always-on connection to the internet. DSL runs over a telephone line. In general,
small office and home office users connect using Asymmetrical DSL (ADSL), which
means that the download speed is faster than the upload speed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Cellular

A

Cellular internet access uses a cell phone network to connect. Wherever
you can get a cellular signal, you can get cellular internet access. Performance is
limited by the capabilities of the phone and the cell tower to which it is connected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Satellite

A

The availability of satellite internet access is a benefit in those areas that
would otherwise have no internet connectivity at all. Satellite dishes require a clear
line of sight to the satellite.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Dial-up Telephone

A

An inexpensive option that uses any phone line and a
modem. The low bandwidth provided by a dial-up modem connection is not
sufficient for large data transfer, although it is useful for mobile access while
traveling.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

four basic characteristics that network
architects must address to meet user expectations:

A

Fault Tolerance
* Scalability
* Quality of Service (QoS)
* Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A fault tolerant

A

is one that limits the number of affected devices during a failure. It
is built to allow quick recovery when such a failure occurs. These networks depend on
multiple paths between the source and destination of a message. If one path fails, the
messages are instantly sent over a different link. Having multiple paths to a destination is
known as redundancy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A scalable

A

expands quickly to support new users and applications. It does this
without degrading the performance of services that are being accessed by existing users.
The figure shows how a new network is easily added to an existing network. These
networks are scalable because the designers follow accepted standards and protocols.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Quality of Service (QoS)

A

is an increasing requirement of networks today. New applications
available to users over networks, such as voice and live video transmissions, create higher
expectations for the quality of the delivered services. Have you ever tried to watch a video
with constant breaks and pauses? As data, voice, and video content continue to converge
onto the same network, QoS becomes a primary mechanism for managing congestion and
ensuring reliable delivery of content to all users.
Congestion occurs when the demand for bandwidth exceeds the amount available.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Network administrators must address two types
of network security concerns:

A

network infrastructure security and information security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Securing the network infrastructure

A

includes physically securing devices that provide
network connectivity and preventing unauthorized access to the management software that
resides on them, as shown in the figure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Network administrators must also protect the information contained within the packets
being transmitted over the network, and the information stored on network attached
devices. In order to achieve the goals of network security, there are three primary
requirements.

A

Confidentiality - Data confidentiality means that only the intended and authorized
recipients can access and read data.
* Integrity - Data integrity assures users that the information has not been altered in
transmission, from origin to destination.
* Availability - Data availability assures users of timely and reliable access to data
services for authorized users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

As new technologies and end-user devices come to market, businesses and consumers
must continue to adjust to this ever-changing environment. There are several networking
trends that affect organizations and consumers:

A

Bring Your Own Device (BYOD)
* Online collaboration
* Video communications
* Cloud Computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Bring Your Own Device (BYOD).

A

The concept of any device, for any content, in any manner, is a major global trend that
requires significant changes to the way we use devices and safely connect them to
networks. This is called Bring Your Own Device (BYOD).
BYOD enables end users the freedom to use personal tools to access information and
communicate across a business or campus network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
ONLINE COLLABORATION
Individuals want to connect to the network, not only for access to data applications, but also to collaborate with one another. Collaboration is defined as “the act of working with another or others on a joint project.” Collaboration tools, like Cisco WebEx, shown in the figure, give employees, students, teachers, customers, and partners a way to instantly connect, interact, and achieve their objectives.
26
VIDEO COMMUNICATIONS
Another facet of networking that is critical to the communication and collaboration effort is video. Video is used for communications, collaboration, and entertainment. Video calls are made to and from anyone with an internet connection, regardless of where they are located.
27
Cloud computing
is one of the ways that we access and store data. Cloud computing allows us to store personal files, even backup an entire drive on servers over the internet. Applications such as word processing and photo editing can be accessed using the cloud. For businesses, Cloud computing extends the capabilities of IT without requiring investment in new infrastructure, training new personnel, or licensing new software. These services are available on-demand and delivered economically to any device that is anywhere in the world without compromising security or function.
28
Powerline
networking for home networks uses existing electrical wiring to connect devices,. Using a standard powerline adapter, devices can connect to the LAN wherever there is an electrical outlet. No data cables need to be installed, and there is little to no additional electricity used.
29
Wireless Internet Service Provider (WISP)
is an ISP that connects subscribers to a designated access point or hot spot using similar wireless technologies found in home wireless local area networks (WLANs). WISPs are more commonly found in rural environments where DSL or cable services are not available.
30
WIRELESS BROADBAND
This solution uses the same cellular technology as a smart phone.
31
Viruses, worms, and Trojan horses
These contain malicious software or code running on a user device.
32
Spyware and adware
These are types of software which are installed on a user’s device. The software then secretly collects information about the user.
33
Zero-day attacks
Also called zero-hour attacks, these occur on the first day that a vulnerability becomes known.
34
Threat actor attacks
A malicious person attacks user devices or network resources.
35
Denial of service attacks
These attacks slow or crash applications and processes on a network device.
36
Data interception and theft
This attack captures private information from an organization’s network.
37
Identity theft
This attack steals the login credentials of a user in order to access private data.
38
These are the basic security components for a home or small office network:
Antivirus and antispyware - These applications help to protect end devices from becoming infected with malicious software. * Firewall filtering - Firewall filtering blocks unauthorized access into and out of the network. This may include a host-based firewall system that prevents unauthorized access to the end device, or a basic filtering service on the home router to prevent unauthorized access from the outside world into the network.
39
Larger networks and corporate networks use antivirus, antispyware, and firewall filtering, but they also have other security requirements:
Dedicated firewall systems - These provide more advanced firewall capabilities that can filter large amounts of traffic with more granularity. * Access control lists (ACL) - These further filter access and traffic forwarding based on IP addresses and applications. * Intrusion prevention systems (IPS) - These identify fast-spreading threats, such as zero-day or zero-hour attacks. * Virtual private networks (VPN) - These provide secure access into an organization for remote workers.
40
internet
The internet is a network of networks that connects hundreds of millions of computers world-wide.
41
LAN i
A LAN is a network infrastructure that spans a small geographical area. A WAN is a network infrastructure that spans a wide geographical area.
42
Intranet
refers to a private connection of LANs and WANs that belongs to an organization.
43
extranet
An organization may use an extranet to provide secure and safe access to individuals who work for a different organization but require access to the organization’s data.
44
SOHO i
internet connections include cable, DSL, Cellular, Satellite, and Dial-up telephone. Business internet connections include Dedicated Leased Line, Metro Ethernet, Business DSL, and Satellite.
45
Console
This is a physical management port that provides out-of-band access to a Cisco device. Out-of-band access refers to access via a dedicated management channel that is used for device maintenance purposes only. The advantage of using a console port is that the device is accessible even if no networking services are configured, such as performing the initial configuration.
46
Secure Shell (SSH)
SSH is an in-band and recommended method for remotely esta - blishing a secure CLI connection, through a virtual interface, over a network.
47
Telnet
Telnet is an insecure, in-band method of remotely establishing a CLI session, through a virtual interface, over a network.
48
shell and a kernel.
The kernel interacts with the hardware and the shell interfaces between the kernel and the users.
49
auxiliary
Some devices, such as routers, may also support a legacy auxiliary port that was used to establish a CLI session remotely over a telephone connection using a modem. Similar to a console connection, the AUX port is out-of-band and does not require networking services to be configured or available.
50
Cisco IOS software separates management access into the following two command modes:
User EXEC Mode - This mode has limited capabilities but is useful for basic operations. It allows only a limited number of basic monitoring commands but does not allow the execution of any commands that might change the configuration of the device. The user EXEC mode is identified by the CLI prompt that ends with the > symbol. * Privileged EXEC Mode - To execute configuration commands, a network administrator must access privileged EXEC mode. Higher configuration modes, like global configuration mode, can only be reached from privileged EXEC mode. The privileged EXEC mode can be identified by the prompt ending with the # symbol.
51
User Exec Mode:
Mode allows access to only a limited number of basic monitoring commands. * It is often referred to as “view-only" mode. * Switch> Router>
52
Privileged EXEC Mode
Mode allows access to all commands and features. * The user can use any monitoring commands and execute configuration and management commands. * Switch# Router#
53
global configuration mode
To configure the device, the user must enter global configuration mode, which is commonly called global config mode. From global config mode, CLI configuration changes are made that affect the operation of the device as a whole. Global configuration mode is identified by a prompt that ends with (config)# after the device name, such as Switch(config)#.
54
Global configuration mode Two common subconfiguration modes include:
* Line Configuration Mode - Used to configure console, SSH, Telnet, or AUX access. * Interface Configuration Mode - Used to configure a switch port or router network interface.
55
Various commands are used to move in and out of command prompts.
To move from user EXEC mode to privileged EXEC mode, use the enable command. Use the disable privileged EXEC mode command to return to user EXEC mode.
56
To return to the privileged EXEC mode
enter the exit global config mode command.
57
To move from any subconfiguration mode to the privileged EXEC mode
, enter the end command or enter the key combination Ctrl+Z.
58
You can also move directly from one subconfiguration mode to another.
Notice how after selecting an interface, the command prompt changes from (config-line)# to (config-if)#.
59
Tab
Completes a partial command name entry.
60
Backspace
Erases the character to the left of the cursor.
61
Ctrl+D
Erases the character at the cursor.
62
Ctrl+K
Erases all characters from the cursor to the end of the command line.
63
Esc D
Erases all characters from the cursor to the end of the word.
64
Ctrl+U or Ctrl+X
Erases all characters from the cursor back to the beginning of the command line.
65
Ctrl+W
Erases the word to the left of the cursor.
66
Up Arrowor Ctrl+P
Recalls the previous command in the history buffer, beginning with the most recent
67
Down Arrowor Ctrl+N
Goes to the next line in the the history buffer.
68
Ctrl+R or Ctrl+I or Ctrl+L
Redisplays the system prompt and command line after a console message is receive
69
Enter Key
Displays the next line.
70
Space Bar
Displays the next screen.
71
Ctrl-C
When in any configuration mode, ends the configuration mode and returns to privileged EXEC mode. When in setup mode, aborts back to the command prompt.
72
Ctrl-Z
When in any configuration mode, ends the configuration mode and returns to privileged EXEC mode.
73
Ctrl Shift-6
All-purpose break sequence used to abort DNS lookups, traceroutes, pings, etc.
74
By choosing names wisely, it is easier to remember, document, and identify network devices. Here are some important naming guidelines for hosts:
Start with a letter * Contain no spaces * End with a letter or digit * Use only letters, digits, and dashes * Be less than 64 characters in length * From global configuration mode, enter the command hostname followed by the name of the switch and press Enter. Notice the change in the command prompt name. * Note: To return the switch to the default prompt, use the no hostname global config command.
75
choosing passwords:
Use passwords that are more than eight characters in length. * Use a combination of upper and lowercase letters, numbers, special characters, and/or numeric sequences. * Avoid using the same password for all devices. * Do not use common words because they are easily guessed.
76
enable VTY access using
the login command.
77
service password-encryption
To encrypt all plaintext passwords, use the service password-encryption global config command as shown in the example.
78
startup-config
This is the saved configuration file that is stored in NVRAM. It contains all the commands that will be used by the device upon startup or reboot. Flash does not lose its contents when the device is powered off.
79
running-config
This is stored in Random Access Memory (RAM). It reflects the current configuration. Modifying a running configuration affects the operation of a Cisco device immediately. RAM is volatile memory. It loses all of its content when the device is powered off or restarted.
80
The two characteristics of RAM on a Cisco device are:
The contents of RAM are lost during a power cycle: RAM (Random Access Memory) is volatile memory, meaning that it loses its contents when the device is powered off or restarted. This is in contrast to non-volatile storage, such as flash memory or hard drives, which retains data even when the power is removed. The configuration that is actively running on the device is stored in RAM: RAM is used to store the running configuration of the device, which includes settings and parameters currently in use. This configuration is held in RAM while the device is operational, allowing for quick access and modification.
81
If power to the device is lost, or if the device is restarted
all configuration changes will be lost unless they have been saved. To save changes made to the running configuration to the startup configuration file, use the copy running-config startup-config privileged EXEC mode command. If changes made to the running config do not have the desired effect and the running-config has not yet been saved, you can restore the device to its previous configuration. Remove the changed commands individually, or reload the device using the reload privileged EXEC mode command to restore the startup-config. The downside to using the reload command to remove an unsaved running config is the brief amount of time the device will be offline, causing network downtime.
82
if undesired changes were saved to the startup config, it may be necessary to clear all the configurations.
This requires erasing the startup config and restarting the device. The startup config is removed by using the erase startup-config privileged EXEC mode command. After the command is issued, the switch will prompt you for confirmation. Press Enter to accept. After removing the startup config from NVRAM, reload the device to remove the current running config file from RAM. On reload, a switch will load the default startup config that originally shipped with the device.
83
IPv4
is called dotted decimal notation and is represented by four decimal numbers between 0 and 255. IPv4 addresses are assigned to individual devices connected to a network. With the IPv4 address, a subnet mask is also necessary. An IPv4 subnet mask is a 32-bit value that differentiates the network portion of the address from the host portion. Coupled with the IPv4 address, the subnet mask determines to which subnet the device is a member.
84
SVI
An SVI is created in software. The virtual interface lets you remotely manage a switch over a network using IPv4 and IPv6. Each switch comes with one SVI appearing in the default configuration "out-of-the box." The default SVI is interface VLAN1. Note: A Layer 2 switch does not need an IP address. The IP address assigned to the SVI is used to remotely access the switch. An IP address is not necessary for the switch to perform its operations.
85
Changes to router and switch configurations
take effect as soon as the command is entered. For this reason, it is very important that changes to live production devices are always carefully planned before being implemented. If commands are entered that render the device unstable or inaccessible, the device may have to be reloaded, resulting in network downtime.
86
ipconfig
to verify the network configuration of a PC host, you also use commands to verify the interfaces and address settings of intermediary devices like switches and routers.
87
The first configuration command on any device should be
to give it a unique device name or hostname.
88
all communication methods have the following three elements in common:
Message source (sender) - Message sources are people, or electronic devices, that need to send a message to other individuals or devices. * Message Destination (receiver) - The destination receives the message and interprets it. * Channel - This consists of the media that provides the pathway over which the message travels from source to destination
89
Common computer protocols include the following requirements:
Message encoding * Message formatting and encapsulation * Message size * Message timing * Message delivery options
90
Encoding
is the process of converting information into another acceptable form, for transmission. Decoding reverses this process to interpret the information.
91
Message formatting
When a message is sent from source to destination, it must use a specific format or structure. Message formats depend on the type of message and the channel that is used to deliver the message.
92
encapsulation
The process of placing one message format (the letter) inside another message format (the envelope) is called encapsulation. De-encapsulation occurs when the process is reversed by the recipient and the letter is removed from the envelope.
93
Message timing
is also very important in network communications. Message timing includes the following: * Flow Control - This is the process of managing the rate of data transmission. Flow control defines how much information can be sent and the speed at which it can be delivered. * Response Timeout - If a person asks a question and does not hear a response within an acceptable amount of time, the person assumes that no answer is coming and reacts accordingly. * Access method - This determines when someone can send a message.
94
NETWORK COMMUNICATIONS PROTOCOLS
TCP, HTTP
95
NETWORK SECURITY PROTOCOLS
SSH, SSL TLS
96
ROUTING PROTOCOLS
OSPF, BGP
97
SERVICE DISCOVERY PROTOCOLS
DNS , DHCP,
98
ADDRESSING
IPV4,IPV6
99
RELIABITY
TCP - PROVIDES GUARANTEED DELIVERY
100
FLOW CONTROL
TCP - PROVIDES FLOW CONTROL
101
SEQUENCY
his function uniquely labels each transmitted segment of data. The receiving device uses the sequencing information to reassemble the information correctly. This is useful if the data segments are lost, delayed or received out-of-order. TCP provides sequencing services.
102
Error Detection
his function is used to determine if data became corrupted during transmission. Various protocols that provide error detection include Ethernet, IPv4, IPv6, and TCP.
103
Application Interface
This function contains information used for process-to-process communications between network applications. For example, when accessing a web page, HTTP or HTTPS protocols are used to communicate between the client and server web processes.
104
TCP/IP Protocol Suite - Application Layer
Name System * DNS - Domain Name System. Translates domain names such as cisco.com, into IP addresses. Host Config * DHCPv4 - Dynamic Host Configuration Protocol for IPv4. A DHCPv4 server dynamically assigns IPv4 addressing information to DHCPv4 clients at start-up and allows the addresses to be re-used when no longer needed. * DHCPv6 - Dynamic Host Configuration Protocol for IPv6. DHCPv6 is similar to DHCPv4. A DHCPv6 server dynamically assigns IPv6 addressing information to DHCPv6 clients at start-up. * SLAAC - Stateless Address Autoconfiguration. A method that allows a device to obtain its IPv6 addressing information without using a DHCPv6 server. Email * SMTP - Simple Mail Transfer Protocol. Enables clients to send email to a mail server and enables servers to send email to other servers. * POP3 - Post Office Protocol version 3. Enables clients to retrieve email from a mail server and download the email to the client's local mail application. * IMAP - Internet Message Access Protocol. Enables clients to access email stored on a mail server as well as maintaining email on the server. File Transfer * FTP - File Transfer Protocol. Sets the rules that enable a user on one host to access and transfer files to and from another host over a network. FTP is a reliable, connection-oriented, and acknowledged file delivery protocol. * SFTP - SSH File Transfer Protocol. As an extension to Secure Shell (SSH) protocol, SFTP can be used to establish a secure file transfer session in which the file transfer is encrypted. SSH is a method for secure remote login that is typically used for accessing the command line of a device. * TFTP - Trivial File Transfer Protocol. A simple, connectionless file transfer protocol with best-effort, unacknowledged file delivery. It uses less overhead than FTP. Web and Web Service * HTTP - Hypertext Transfer Protocol. A set of rules for exchanging text, graphic images, sound, video, and other multimedia files on the World Wide Web. * HTTPS - HTTP Secure. A secure form of HTTP that encrypts the data that is exchanged over the World Wide Web. * REST - Representational State Transfer. A web service that uses application programming interfaces (APIs) and HTTP requests to create web applications.
105
Transport layer
Connection-Oriented * TCP - Transmission Control Protocol. Enables reliable communication between processes running on separate hosts and provides reliable, acknowledged transmissions that confirm successful delivery. Connectionless * UDP - User Datagram Protocol. Enables a process running on one host to send packets to a process running on another host. However, UDP does not confirm successful datagram transmission.
106
Internet Layer
Internet Protocol * IPv4 - Internet Protocol version 4. Receives message segments from the transport layer, packages messages into packets, and addresses packets for end-to-end delivery over a network. IPv4 uses a 32-bit address. * IPv6 - IP version 6. Similar to IPv4 but uses a 128-bit address. * NAT - Network Address Translation. Translates IPv4 addresses from a private network into globally unique public IPv4 addresses. Messaging * ICMPv4 - Internet Control Message Protocol for IPv4. Provides feedback from a destination host to a source host about errors in packet delivery. * ICMPv6 - ICMP for IPv6. Similar functionality to ICMPv4 but is used for IPv6 packets. * ICMPv6 ND - ICMPv6 Neighbor Discovery. Includes four protocol messages that are used for address resolution and duplicate address detection. Routing Protocols * OSPF - Open Shortest Path First. Link-state routing protocol that uses a hierarchical design based on areas. OSPF is an open standard interior routing protocol. * EIGRP - EIGRP - Enhanced Interior Gateway Routing Protocol. An open standard routing protocol developed by Cisco that uses a composite metric based on bandwidth, delay, load and reliability. * BGP - Border Gateway Protocol. An open standard exterior gateway routing protocol used between Internet Service Providers (ISPs). BGP is also commonly used between ISPs and their large private clients to exchange routing information.
107
Network Access Layer
Address Resolution * ARP - Address Resolution Protocol. Provides dynamic address mapping between an IPv4 address and a hardware address. Note: You may see other documentation state that ARP operates at the Internet Layer (OSI Layer 3). However, in this course we state that ARP operates at the Network Access layer (OSI Layer 2) because it's primary purpose is the discover the MAC address of the destination. A MAC address is a Layer 2 address. Data Link Protocols * Ethernet - Defines the rules for wiring and signaling standards of the network access layer. * WLAN - Wireless Local Area Network. Defines the rules for wireless signaling across the 2.4 GHz and 5 GHz radio frequencies.
108
This standards organization is concerned with the Request for Comments (RFC) documents that specify new protocols and update existing ones.
INTERNET ENGINEERING TASK FORCE(IETF)
109
This standards organization is responsible for IP address allocation and domain name management.
IANA - INTERNET ASSIGNED NUMBERS AUTHORITY
110
What types of standards are developed by the Electronics Industries Alliance (EIA)?
ELETRIC WIRING AND CONNETORS
111
OSI MODEL
7 LAYERS
112
7 - APPLICATION
CONTAINS PROTOCOLS USED FOR PROCESS-TO-PROCESS COMUNICATIONS. DATA IS THE GENERAL TERM FOR THE PDU
113
6- PRESENTATION
PROVIDES FOR COMMON REPRESENTATION OF THE DATA TRANSFERRED BETWEEN APLICATTION LAYER SERVICES
114
5- SESSION
PROVIDES SERVICES TO THE PRESENTATION LAYER ORGANIZE ITS DIALOGUE AND TO MANAGE DATA EXCHANGE
115
4 - TRANSPORT
DEFINES SERVICES TO SEGMENT, TRANSFER, AND REASSEMBLE THE DATA FOR INDIVIDUAL COMUNNICATIONS BETWEEN THE END DEVICES
116
3 - NETWORK
PROVIDES SERVICES TO EXCHANGE THE INDIVIDUAL PIECES OF DATA OVER THE NETWORK BETWEEN IDENTIFIED END DEVICES
117
DATA LINK
DESCRIBES METHODS FOR EXCHANGING DATA FRAMES BETWEEN DEVICES OVER A COMMON MEDIA
118
PHYSICAL
DESCRIBES THE MECHANICAL , ELECTRICAL . CONNECTIONS FOR A BIT TRANSMISSION TO AND FROM NETWORK DEVICES.
119
TCP/IP :
4- APLICATION - REPRESENTS DATA TO THE USER , PLUS ENCODING AND DIALOG CONTROL. 3-TRANSPORT-SUPPORT COMUNICATION BETWEEN VARIOUS DEVICES ACROSS DIVERSE NETWORKS 2- INTERNET-DETERMINES THE BEST PATH THROUGH THE NETWORK 1-NETWORK ACCESS-CONTROLS THE HARDWARE
120
OSI LAYER 3 /INTERNETLAYER
DESCRIBE PROTOCOLS THAT ADDRESS AND ROUTE MESSAGES THROUGH AN INTERNETWORK
121
OSI LAYER 4 / TRANSPORT LAYER
DESCRIBES GENERAL SERVICES AND FUNCTIONS THAT PROVIDE ORDERED AND RELIABLE DELIVERY OF DATA BETWEEN SOURCE AND DESTINATION HOSTS
122
TRANSPORT LAYER
DESTINATION AND SOUCE NUMBER (PORTS)
123