MODULO1-3 Flashcards

1
Q

peer-to-peer

A

Client and server software usually run on separate computers, but it is also possible for one
computer to be used for both roles at the same time. In small businesses and homes, many
computers function as the servers and clients on the network. This type of network is called
a peer-to-peer network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

end device initiates communication

A

When an end device initiates communication, it uses the address of the destination end
device to specify where to deliver the message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Intermediary devices

A

Intermediary devices connect the individual end devices to the network. They can connect
multiple individual networks to form an internetwork. These intermediary devices provide
connectivity and ensure that data flows across the network.
Intermediary devices use the destination end device address, in conjunction with
information about the network interconnections, to determine the path that messages
should take through the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Communication

A

Communication transmits across a network on media. The media provides the channel
over which the message travels from source to destination.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

types of media to interconnect devices

A

Metal wires within cables - Data is encoded into electrical impulses.
* Glass or plastic fibers within cables (fiber-optic cable) - Data is encoded into
pulses of light.
* Wireless transmission - Data is encoded via modulation of specific frequencies of
electromagnetic waves.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

, specialized terminology is used to describe how each
of these devices and media connect to each other:

A

Network Interface Card (NIC) - A NIC physically connects the end device to the
network.
* Physical Port - A connector or outlet on a networking device where the media
connects to an end device or another networking device.
* Interface - Specialized ports on a networking device that connect to individual
networks. Because routers connect networks, the ports on a router are referred to
as network interfaces.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Physical topology

A

diagrams illustrate the physical location of intermediary devices and
cable installation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Logical topology

A

diagrams illustrate devices, ports, and the addressing scheme of the
network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Intranet

A

is a term often used to refer to a private connection of LANs and WANs that
belongs to an organization. An intranet is designed to be accessible only by the
organization’s members, employees, or others with authorization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

extranet

A

An organization may use an extranet to provide secure and safe access to individuals who
work for a different organization but require access to the organization’s data. Here are
some examples of extranets:
* A company that is providing access to outside suppliers and contractors
* A hospital that is providing a booking system to doctors so they can make
appointments for their patients
* A local office of education that is providing budget and personnel information to the
schools in its district

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Cable

A

Typically offered by cable television service providers, the internet data
signal transmits on the same cable that delivers cable television. It provides a high
bandwidth, high availability, and an always-on connection to the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

DSL

A

Digital Subscriber Lines also provide high bandwidth, high availability, and an
always-on connection to the internet. DSL runs over a telephone line. In general,
small office and home office users connect using Asymmetrical DSL (ADSL), which
means that the download speed is faster than the upload speed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Cellular

A

Cellular internet access uses a cell phone network to connect. Wherever
you can get a cellular signal, you can get cellular internet access. Performance is
limited by the capabilities of the phone and the cell tower to which it is connected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Satellite

A

The availability of satellite internet access is a benefit in those areas that
would otherwise have no internet connectivity at all. Satellite dishes require a clear
line of sight to the satellite.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Dial-up Telephone

A

An inexpensive option that uses any phone line and a
modem. The low bandwidth provided by a dial-up modem connection is not
sufficient for large data transfer, although it is useful for mobile access while
traveling.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

four basic characteristics that network
architects must address to meet user expectations:

A

Fault Tolerance
* Scalability
* Quality of Service (QoS)
* Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A fault tolerant

A

is one that limits the number of affected devices during a failure. It
is built to allow quick recovery when such a failure occurs. These networks depend on
multiple paths between the source and destination of a message. If one path fails, the
messages are instantly sent over a different link. Having multiple paths to a destination is
known as redundancy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A scalable

A

expands quickly to support new users and applications. It does this
without degrading the performance of services that are being accessed by existing users.
The figure shows how a new network is easily added to an existing network. These
networks are scalable because the designers follow accepted standards and protocols.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Quality of Service (QoS)

A

is an increasing requirement of networks today. New applications
available to users over networks, such as voice and live video transmissions, create higher
expectations for the quality of the delivered services. Have you ever tried to watch a video
with constant breaks and pauses? As data, voice, and video content continue to converge
onto the same network, QoS becomes a primary mechanism for managing congestion and
ensuring reliable delivery of content to all users.
Congestion occurs when the demand for bandwidth exceeds the amount available.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Network administrators must address two types
of network security concerns:

A

network infrastructure security and information security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Securing the network infrastructure

A

includes physically securing devices that provide
network connectivity and preventing unauthorized access to the management software that
resides on them, as shown in the figure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Network administrators must also protect the information contained within the packets
being transmitted over the network, and the information stored on network attached
devices. In order to achieve the goals of network security, there are three primary
requirements.

A

Confidentiality - Data confidentiality means that only the intended and authorized
recipients can access and read data.
* Integrity - Data integrity assures users that the information has not been altered in
transmission, from origin to destination.
* Availability - Data availability assures users of timely and reliable access to data
services for authorized users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

As new technologies and end-user devices come to market, businesses and consumers
must continue to adjust to this ever-changing environment. There are several networking
trends that affect organizations and consumers:

A

Bring Your Own Device (BYOD)
* Online collaboration
* Video communications
* Cloud Computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Bring Your Own Device (BYOD).

A

The concept of any device, for any content, in any manner, is a major global trend that
requires significant changes to the way we use devices and safely connect them to
networks. This is called Bring Your Own Device (BYOD).
BYOD enables end users the freedom to use personal tools to access information and
communicate across a business or campus network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

ONLINE COLLABORATION

A

Individuals want to connect to the network, not only for access
to data applications, but also to collaborate with one another. Collaboration is defined as
“the act of working with another or others on a joint project.” Collaboration tools, like Cisco
WebEx, shown in the figure, give employees, students, teachers, customers, and partners
a way to instantly connect, interact, and achieve their objectives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

VIDEO COMMUNICATIONS

A

Another facet of networking that is critical to the
communication and collaboration effort is video. Video is used for communications,
collaboration, and entertainment. Video calls are made to and from anyone with an internet
connection, regardless of where they are located.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Cloud computing

A

is one of the ways that we access and store data. Cloud computing allows
us to store personal files, even backup an entire drive on servers over the internet.
Applications such as word processing and photo editing can be accessed using the cloud.
For businesses, Cloud computing extends the capabilities of IT without requiring
investment in new infrastructure, training new personnel, or licensing new software. These
services are available on-demand and delivered economically to any device that is
anywhere in the world without compromising security or function.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Powerline

A

networking for home networks uses existing electrical wiring to connect devices,.
Using a standard powerline adapter, devices can connect to the LAN wherever there is an
electrical outlet. No data cables need to be installed, and there is little to no additional
electricity used.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Wireless Internet Service Provider (WISP)

A

is an ISP that connects subscribers to a
designated access point or hot spot using similar wireless technologies found in home
wireless local area networks (WLANs). WISPs are more commonly found in rural
environments where DSL or cable services are not available.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

WIRELESS BROADBAND

A

This solution uses the same cellular technology as a smart
phone.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Viruses, worms, and Trojan horses

A

These contain malicious software or code
running on a user device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Spyware and adware

A

These are types of software which are installed on a user’s
device. The software then secretly collects information about the user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Zero-day attacks

A

Also called zero-hour attacks, these occur on the first day that a
vulnerability becomes known.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Threat actor attacks

A

A malicious person attacks user devices or network
resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Denial of service attacks

A

These attacks slow or crash applications and
processes on a network device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Data interception and theft

A

This attack captures private information from an
organization’s network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Identity theft

A

This attack steals the login credentials of a user in order to access
private data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

These are the basic security components for a home or small office network:

A

Antivirus and antispyware - These applications help to protect end devices from
becoming infected with malicious software.
* Firewall filtering - Firewall filtering blocks unauthorized access into and out of the
network. This may include a host-based firewall system that prevents unauthorized
access to the end device, or a basic filtering service on the home router to prevent
unauthorized access from the outside world into the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Larger networks and corporate networks use antivirus, antispyware, and firewall filtering,
but they also have other security requirements:

A

Dedicated firewall systems - These provide more advanced firewall capabilities
that can filter large amounts of traffic with more granularity.
* Access control lists (ACL) - These further filter access and traffic forwarding
based on IP addresses and applications.
* Intrusion prevention systems (IPS) - These identify fast-spreading threats, such
as zero-day or zero-hour attacks.
* Virtual private networks (VPN) - These provide secure access into an
organization for remote workers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

internet

A

The internet is a network of networks that connects hundreds of millions of computers
world-wide.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

LAN i

A

A LAN is a network infrastructure that spans a small geographical area. A WAN is a network
infrastructure that spans a wide geographical area.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Intranet

A

refers to a private connection of LANs and WANs that belongs to an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

extranet

A

An organization may use an extranet to provide secure and safe access to individuals who
work for a different organization but require access to the organization’s data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

SOHO i

A

internet connections include cable, DSL, Cellular, Satellite, and Dial-up telephone.
Business internet connections include Dedicated Leased Line, Metro Ethernet, Business
DSL, and Satellite.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Console

A

This is a physical management port that provides out-of-band access to a Cisco
device. Out-of-band access refers to access via a dedicated management channel that is
used for device maintenance purposes only. The advantage of using a console port is that
the device is accessible even if no networking services are configured, such as performing
the initial configuration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Secure Shell (SSH)

A

SSH is an in-band and recommended method for remotely esta -
blishing a secure CLI connection, through a virtual interface, over a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Telnet

A

Telnet is an insecure, in-band method of remotely establishing a CLI session,
through a virtual interface, over a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

shell and a kernel.

A

The kernel interacts with
the hardware and the shell interfaces between the kernel and the users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

auxiliary

A

Some devices, such as routers, may also support a legacy auxiliary port that was
used to establish a CLI session remotely over a telephone connection using a modem.
Similar to a console connection, the AUX port is out-of-band and does not require
networking services to be configured or available.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Cisco IOS software separates management access into the
following two command modes:

A

User EXEC Mode - This mode has limited capabilities but is useful for basic
operations. It allows only a limited number of basic monitoring commands but does
not allow the execution of any commands that might change the configuration of the
device. The user EXEC mode is identified by the CLI prompt that ends with the >
symbol.
* Privileged EXEC Mode - To execute configuration commands, a network
administrator must access privileged EXEC mode. Higher configuration modes, like
global configuration mode, can only be reached from privileged EXEC mode. The
privileged EXEC mode can be identified by the prompt ending with the # symbol.

51
Q

User Exec Mode:

A

Mode allows access to only a limited number of basic monitoring commands.
* It is often referred to as “view-only” mode.
* Switch>
Router>

52
Q

Privileged EXEC Mode

A

Mode allows access to all commands and features.
* The user can use any monitoring commands and execute configuration and
management commands.
* Switch#
Router#

53
Q

global configuration mode

A

To configure the device, the user must enter global configuration mode, which is commonly
called global config mode.
From global config mode, CLI configuration changes are made that affect the operation of
the device as a whole. Global configuration mode is identified by a prompt that ends with
(config)# after the device name, such as Switch(config)#.

54
Q

Global configuration mode Two
common subconfiguration modes include:

A
  • Line Configuration Mode - Used to configure console, SSH, Telnet, or AUX
    access.
  • Interface Configuration Mode - Used to configure a switch port or router network
    interface.
55
Q

Various commands are used to move in and out of command prompts.

A

To move from user
EXEC mode to privileged EXEC mode, use the enable command. Use
the disable privileged EXEC mode command to return to user EXEC mode.

56
Q

To return to the privileged EXEC mode

A

enter the exit global config
mode command.

57
Q

To move from any subconfiguration mode to the privileged EXEC mode

A

, enter
the end command or enter the key combination Ctrl+Z.

58
Q

You can also move directly from one subconfiguration mode to another.

A

Notice how after
selecting an interface, the command prompt changes from (config-line)# to (config-if)#.

59
Q

Tab

A

Completes a partial command name entry.

60
Q

Backspace

A

Erases the character to the left of the cursor.

61
Q

Ctrl+D

A

Erases the character at the cursor.

62
Q

Ctrl+K

A

Erases all characters from the cursor to the end of the command line.

63
Q

Esc D

A

Erases all characters from the cursor to the end of the word.

64
Q

Ctrl+U or Ctrl+X

A

Erases all characters from the cursor back to the beginning of the command line.

65
Q

Ctrl+W

A

Erases the word to the left of the cursor.

66
Q

Up Arrowor Ctrl+P

A

Recalls the previous command in the history buffer, beginning with the most recent

67
Q

Down Arrowor Ctrl+N

A

Goes to the next line in the the history buffer.

68
Q

Ctrl+R or Ctrl+I or Ctrl+L

A

Redisplays the system prompt and command line after a console message is receive

69
Q

Enter Key

A

Displays the next line.

70
Q

Space Bar

A

Displays the next screen.

71
Q

Ctrl-C

A

When in any configuration mode, ends the configuration mode and returns to privileged
EXEC mode. When in setup mode, aborts back to the command prompt.

72
Q

Ctrl-Z

A

When in any configuration mode, ends the configuration mode and returns to privileged
EXEC mode.

73
Q

Ctrl
Shift-6

A

All-purpose break sequence used to abort DNS lookups, traceroutes, pings, etc.

74
Q

By choosing names
wisely, it is easier to remember, document, and identify network devices. Here are some
important naming guidelines for hosts:

A

Start with a letter
* Contain no spaces
* End with a letter or digit
* Use only letters, digits, and dashes
* Be less than 64 characters in length
* From global configuration mode, enter the command hostname followed by the
name of the switch and press Enter. Notice the change in the command prompt
name.
* Note: To return the switch to the default prompt, use the no hostname global
config command.

75
Q

choosing passwords:

A

Use passwords that are more than eight characters in length.
* Use a combination of upper and lowercase letters, numbers, special characters,
and/or numeric sequences.
* Avoid using the same password for all devices.
* Do not use common words because they are easily guessed.

76
Q

enable VTY access using

A

the login command.

77
Q

service password-encryption

A

To encrypt all plaintext passwords, use the service password-encryption global
config command as shown in the example.

78
Q

startup-config

A

This is the saved configuration file that is stored in NVRAM. It
contains all the commands that will be used by the device upon startup or reboot.
Flash does not lose its contents when the device is powered off.

79
Q

running-config

A

This is stored in Random Access Memory (RAM). It reflects the
current configuration. Modifying a running configuration affects the operation of a
Cisco device immediately. RAM is volatile memory. It loses all of its content when
the device is powered off or restarted.

80
Q

The two characteristics of RAM on a Cisco device are:

A

The contents of RAM are lost during a power cycle: RAM (Random Access Memory) is volatile memory, meaning that it loses its contents when the device is powered off or restarted. This is in contrast to non-volatile storage, such as flash memory or hard drives, which retains data even when the power is removed.

The configuration that is actively running on the device is stored in RAM: RAM is used to store the running configuration of the device, which includes settings and parameters currently in use. This configuration is held in RAM while the device is operational, allowing for quick access and modification.

81
Q

If power to the device is lost, or if the device is restarted

A

all configuration changes will be
lost unless they have been saved. To save changes made to the running configuration to
the startup configuration file, use the copy running-config startup-config privileged
EXEC mode command.
If changes made to the running config do not have the desired effect and the running-config
has not yet been saved, you can restore the device to its previous configuration. Remove
the changed commands individually, or reload the device using the reload privileged EXEC
mode command to restore the startup-config.
The downside to using the reload command to remove an unsaved running config is the
brief amount of time the device will be offline, causing network downtime.

82
Q

if undesired changes were saved to the startup config, it may be necessary to
clear all the configurations.

A

This requires erasing the startup config and restarting the
device. The startup config is removed by using the erase startup-config privileged EXEC
mode command. After the command is issued, the switch will prompt you for confirmation.
Press Enter to accept.
After removing the startup config from NVRAM, reload the device to remove the current
running config file from RAM. On reload, a switch will load the default startup config that
originally shipped with the device.

83
Q

IPv4

A

is called dotted decimal notation and is represented by
four decimal numbers between 0 and 255. IPv4 addresses are assigned to individual
devices connected to a network.
With the IPv4 address, a subnet mask is also necessary. An IPv4 subnet mask is a 32-bit
value that differentiates the network portion of the address from the host portion. Coupled
with the IPv4 address, the subnet mask determines to which subnet the device is a
member.

84
Q

SVI

A

An SVI is created in software.
The virtual interface lets you remotely manage a switch over a network using IPv4 and
IPv6. Each switch comes with one SVI appearing in the default configuration “out-of-the
box.” The default SVI is interface VLAN1.
Note: A Layer 2 switch does not need an IP address. The IP address assigned to the SVI is
used to remotely access the switch. An IP address is not necessary for the switch to
perform its operations.

85
Q

Changes to router and switch configurations

A

take effect as soon as
the command is entered. For this reason, it is very important that
changes to live production devices are always carefully planned
before being implemented. If commands are entered that render the
device unstable or inaccessible, the device may have to be
reloaded, resulting in network downtime.

86
Q

ipconfig

A

to verify the network
configuration of a PC host, you also use commands to verify the interfaces and address
settings of intermediary devices like switches and routers.

87
Q

The first configuration command on any device should be

A

to give it a unique device name
or hostname.

88
Q

all
communication methods have the following three elements in common:

A

Message source (sender) - Message sources are people, or electronic devices,
that need to send a message to other individuals or devices.
* Message Destination (receiver) - The destination receives the message and
interprets it.
* Channel - This consists of the media that provides the pathway over which the
message travels from source to destination

89
Q

Common computer
protocols include the following requirements:

A

Message encoding
* Message formatting and encapsulation
* Message size
* Message timing
* Message delivery options

90
Q

Encoding

A

is the process of
converting information into another acceptable form, for transmission. Decoding reverses
this process to interpret the information.

91
Q

Message formatting

A

When a message is sent from source to destination, it must use a specific format or
structure. Message formats depend on the type of message and the channel that is used to
deliver the message.

92
Q

encapsulation

A

The process of placing one message format (the letter) inside another message format (the
envelope) is called encapsulation. De-encapsulation occurs when the process is reversed
by the recipient and the letter is removed from the envelope.

93
Q

Message timing

A

is also very important in network communications. Message timing
includes the following:
* Flow Control - This is the process of managing the rate of data transmission. Flow
control defines how much information can be sent and the speed at which it can be
delivered.
* Response Timeout - If a person asks a question and does not hear a response
within an acceptable amount of time, the person assumes that no answer is coming
and reacts accordingly.
* Access method - This determines when someone can send a message.

94
Q

NETWORK COMMUNICATIONS PROTOCOLS

A

TCP, HTTP

95
Q

NETWORK SECURITY PROTOCOLS

A

SSH, SSL TLS

96
Q

ROUTING PROTOCOLS

A

OSPF, BGP

97
Q

SERVICE DISCOVERY PROTOCOLS

A

DNS , DHCP,

98
Q

ADDRESSING

A

IPV4,IPV6

99
Q

RELIABITY

A

TCP - PROVIDES GUARANTEED DELIVERY

100
Q

FLOW CONTROL

A

TCP - PROVIDES FLOW CONTROL

101
Q

SEQUENCY

A

his function uniquely labels each transmitted segment of data. The receiving device uses the sequencing information to reassemble the information correctly. This is useful if the data segments are lost, delayed or received out-of-order. TCP provides sequencing services.

102
Q

Error Detection

A

his function is used to determine if data became corrupted during transmission. Various protocols that provide error detection include Ethernet, IPv4, IPv6, and TCP.

103
Q

Application Interface

A

This function contains information used for process-to-process communications between network applications. For example, when accessing a web page, HTTP or HTTPS protocols are used to communicate between the client and server web processes.

104
Q

TCP/IP Protocol Suite - Application Layer

A

Name System
* DNS - Domain Name System. Translates domain names such as cisco.com, into IP
addresses.
Host Config
* DHCPv4 - Dynamic Host Configuration Protocol for IPv4. A DHCPv4 server
dynamically assigns IPv4 addressing information to DHCPv4 clients at start-up and
allows the addresses to be re-used when no longer needed.
* DHCPv6 - Dynamic Host Configuration Protocol for IPv6. DHCPv6 is similar to
DHCPv4. A DHCPv6 server dynamically assigns IPv6 addressing information to
DHCPv6 clients at start-up.
* SLAAC - Stateless Address Autoconfiguration. A method that allows a device to
obtain its IPv6 addressing information without using a DHCPv6 server.
Email
* SMTP - Simple Mail Transfer Protocol. Enables clients to send email to a mail
server and enables servers to send email to other servers.
* POP3 - Post Office Protocol version 3. Enables clients to retrieve email from a mail
server and download the email to the client’s local mail application.
* IMAP - Internet Message Access Protocol. Enables clients to access email stored
on a mail server as well as maintaining email on the server.
File Transfer
* FTP - File Transfer Protocol. Sets the rules that enable a user on one host to
access and transfer files to and from another host over a network. FTP is a reliable,
connection-oriented, and acknowledged file delivery protocol.
* SFTP - SSH File Transfer Protocol. As an extension to Secure Shell (SSH)
protocol, SFTP can be used to establish a secure file transfer session in which the
file transfer is encrypted. SSH is a method for secure remote login that is typically
used for accessing the command line of a device.
* TFTP - Trivial File Transfer Protocol. A simple, connectionless file transfer protocol
with best-effort, unacknowledged file delivery. It uses less overhead than FTP.
Web and Web Service
* HTTP - Hypertext Transfer Protocol. A set of rules for exchanging text, graphic
images, sound, video, and other multimedia files on the World Wide Web.
* HTTPS - HTTP Secure. A secure form of HTTP that encrypts the data that is
exchanged over the World Wide Web.
* REST - Representational State Transfer. A web service that uses application
programming interfaces (APIs) and HTTP requests to create web applications.

105
Q

Transport layer

A

Connection-Oriented
* TCP - Transmission Control Protocol. Enables reliable communication between
processes running on separate hosts and provides reliable, acknowledged
transmissions that confirm successful delivery.
Connectionless
* UDP - User Datagram Protocol. Enables a process running on one host to send
packets to a process running on another host. However, UDP does not confirm
successful datagram transmission.

106
Q

Internet Layer

A

Internet Protocol
* IPv4 - Internet Protocol version 4. Receives message segments from the transport
layer, packages messages into packets, and addresses packets for end-to-end
delivery over a network. IPv4 uses a 32-bit address.
* IPv6 - IP version 6. Similar to IPv4 but uses a 128-bit address.
* NAT - Network Address Translation. Translates IPv4 addresses from a private
network into globally unique public IPv4 addresses.
Messaging
* ICMPv4 - Internet Control Message Protocol for IPv4. Provides feedback from a
destination host to a source host about errors in packet delivery.
* ICMPv6 - ICMP for IPv6. Similar functionality to ICMPv4 but is used for IPv6
packets.
* ICMPv6 ND - ICMPv6 Neighbor Discovery. Includes four protocol messages that
are used for address resolution and duplicate address detection.
Routing Protocols
* OSPF - Open Shortest Path First. Link-state routing protocol that uses a
hierarchical design based on areas. OSPF is an open standard interior routing
protocol.
* EIGRP - EIGRP - Enhanced Interior Gateway Routing Protocol. An open standard
routing protocol developed by Cisco that uses a composite metric based on
bandwidth, delay, load and reliability.
* BGP - Border Gateway Protocol. An open standard exterior gateway routing
protocol used between Internet Service Providers (ISPs). BGP is also commonly
used between ISPs and their large private clients to exchange routing information.

107
Q

Network Access Layer

A

Address Resolution
* ARP - Address Resolution Protocol. Provides dynamic address mapping between
an IPv4 address and a hardware address.
Note: You may see other documentation state that ARP operates at the Internet
Layer (OSI Layer 3). However, in this course we state that ARP operates at the
Network Access layer (OSI Layer 2) because it’s primary purpose is the discover
the MAC address of the destination. A MAC address is a Layer 2 address.
Data Link Protocols
* Ethernet - Defines the rules for wiring and signaling standards of the network
access layer.
* WLAN - Wireless Local Area Network. Defines the rules for wireless signaling
across the 2.4 GHz and 5 GHz radio frequencies.

108
Q

This standards organization is concerned with the Request for Comments (RFC) documents that specify new protocols and update existing ones.

A

INTERNET ENGINEERING TASK FORCE(IETF)

109
Q

This standards organization is responsible for IP address allocation and domain name management.

A

IANA - INTERNET ASSIGNED NUMBERS AUTHORITY

110
Q

What types of standards are developed by the Electronics Industries Alliance (EIA)?

A

ELETRIC WIRING AND CONNETORS

111
Q

OSI MODEL

A

7 LAYERS

112
Q

7 - APPLICATION

A

CONTAINS PROTOCOLS USED FOR PROCESS-TO-PROCESS COMUNICATIONS. DATA IS THE GENERAL TERM FOR THE PDU

113
Q

6- PRESENTATION

A

PROVIDES FOR COMMON REPRESENTATION OF THE DATA TRANSFERRED BETWEEN APLICATTION LAYER SERVICES

114
Q

5- SESSION

A

PROVIDES SERVICES TO THE PRESENTATION LAYER ORGANIZE ITS DIALOGUE AND TO MANAGE DATA EXCHANGE

115
Q

4 - TRANSPORT

A

DEFINES SERVICES TO SEGMENT, TRANSFER, AND REASSEMBLE THE DATA FOR INDIVIDUAL COMUNNICATIONS BETWEEN THE END DEVICES

116
Q

3 - NETWORK

A

PROVIDES SERVICES TO EXCHANGE THE INDIVIDUAL PIECES OF DATA OVER THE NETWORK BETWEEN IDENTIFIED END DEVICES

117
Q

DATA LINK

A

DESCRIBES METHODS FOR EXCHANGING DATA FRAMES BETWEEN DEVICES OVER A COMMON MEDIA

118
Q

PHYSICAL

A

DESCRIBES THE MECHANICAL , ELECTRICAL . CONNECTIONS FOR A BIT TRANSMISSION TO AND FROM NETWORK DEVICES.

119
Q

TCP/IP :

A

4- APLICATION - REPRESENTS DATA TO THE USER , PLUS ENCODING AND DIALOG CONTROL.
3-TRANSPORT-SUPPORT COMUNICATION BETWEEN VARIOUS DEVICES ACROSS DIVERSE NETWORKS
2- INTERNET-DETERMINES THE BEST PATH THROUGH THE NETWORK
1-NETWORK ACCESS-CONTROLS THE HARDWARE

120
Q

OSI LAYER 3 /INTERNETLAYER

A

DESCRIBE PROTOCOLS THAT ADDRESS AND ROUTE MESSAGES THROUGH AN INTERNETWORK

121
Q

OSI LAYER 4 / TRANSPORT LAYER

A

DESCRIBES GENERAL SERVICES AND FUNCTIONS THAT PROVIDE ORDERED AND RELIABLE DELIVERY OF DATA BETWEEN SOURCE AND DESTINATION HOSTS

122
Q

TRANSPORT LAYER

A

DESTINATION AND SOUCE NUMBER (PORTS)

123
Q
A