Networking 3 Flashcards

1
Q
  • delivers the packets
  • allows the devices to really see their place
A

IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Message sources are people, or electronic devices, that need to send a message to other individuals or devices.

A

Message source (sender)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The destination receives the message and interprets it.

A

Message Destination (receiver)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

This consists of the media that provides the pathway over which the message travels from source to destination.

A

Channel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Common computer protocols include the following requirements

A
  • message encoding
  • message formatting and encapsulation
  • message size
  • message timing
  • message delivery option
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

is the process of converting information into another acceptable form, for transmission

A

encoding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

reverses this process to interpret the information.

A

decoding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

When a message is sent from source to destination, it must use a specific format or structure. Message formats depend on the type of message and the channel that is used to deliver the message.

A

Message Formatting and Encapsulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The size restrictions of frames require the source host to break a long message into individual pieces that meet both the minimum and maximum size requirements. The long message will be sent in separate frames, with each frame containing a piece of the original message.

A

Message Size

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The size restrictions of frames require the source host to break a long message into individual pieces that meet both the minimum and maximum size requirements. The long message will be sent in separate frames, with each frame containing a piece of the original message.

A

Message Size

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

This is the process of managing the rate of data transmission. Flow control defines how much information can be sent and the speed at which it can be delivered.

A

Flow Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

If a person asks a question and does not hear a response within an acceptable amount of time, the person assumes that no answer is coming and reacts accordingly.

A

Response Timeout

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

This determines when someone can send a message

A

Access method

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Information is being transmitted to a single end device.

A

Uncast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Information is being transmitted to a multiple end device.

A

Multicast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Information is being transmitted to all end device.

A

Broadcast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

This identifies the sender and the intended receiver of the message using a defined addressing scheme

A

Addressing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

This function ensures that data flows at an efficient rate between two communicating devices. TCP provides flow control services.

A

Flow control

19
Q

This function uniquely labels each transmitted segment of data. The receiving device uses the sequencing information to reassemble the information correctly. This is useful if the data segments are lost, delayed or received out-of-order.

A

Sequencing

20
Q

This function is used to determine if data became corrupted during transmission

A

Error Detection

21
Q

This function contains information used for process-to-process communications between network applications.

A

Application Interface

22
Q

device sends a request to a web server for its web page.

A

HTTP
TCP
IP
ETHERNET

23
Q

governs the way a web server and a web client interact. HTTP defines the content and formatting of the requests and responses that are exchanged between the client and server. Both the client and the web server software implement HTTP as part of the application. HTTP relies on other protocols to govern how the messages are transported between the client and server.

A

Hypertext Transfer Protocol (HTTP)

24
Q

This protocol manages the individual conversations. TCP Is responsible for guaranteeing the reliable delivery of the information and managing flow control between the end devices.

A

Transmission Control Protocol (TCP)

25
protocol Is **responsible for delivering messages from the sender to the receiver**. IP is used by routers to forward the messages across muitiple networks.
Internet Protocol (IP)
26
protocol is responsible for the delivery of messages from one NIC to another NIC on the same Ethernet local area network (LAN).
Ethernet
27
Protocols **enable two or more devices to communicate over one or more networks.** The Ethernet family of technologies involves a variety of protocols such as IP, Transmission Control Protocol (TCP), HyperText Transfer Protocol (HTTP), and many more.
Network Communications Protocol
28
Protocols **secure data to provide authentication**, data integrity, and data encryption. Examples of secure protocols include Secure Shell (SSH), Secure Sockets Layer (SSL), and Transport Layer Security (TLS).
Network Security Protocol
29
Protocols enable **routers to exchange route information**, compare path information, and then to select the best path to the destination network. Examples of routing protocols include Open Shortest Path First (OSPF) and Border Gateway Protocol (BGP).
Routing Protocols
30
Protocols are used for the **automatic detection of devices or services**. Examples of service discovery protocols include Dynamic Host Configuration Protocol (DHCP) which discovers services for IP address allocation, and Domain Name System (DNS) which is used to perform name-to-IP address translation.
Service Discovery Protocols
31
a group of inter-related protocols necessary to perform a communication function
protocol suite
32
is Is the **most common and relevant protocol suite used today**. The TCP/IP protocol suite is an open standard protocol suite maintained by the Internet Engineering Tsk Force (IET).
TCP/IP
33
Today OSI is mainly known for its layered model. The OSI protocols have largely been replaced by TCP/IP
Open Systems Interconnection (OSI)
34
means it is freely avallable to the public and can be used by any vendor on their hardware or in their software.
Open standard protocol suite
35
This means it has been **endorsed by the networking industry and approved by a standards organization**. Ihis ensures that products from different manufacturers can interoperate successfully.
standard-based protocol suite
36
Translates domain names such as cisco.com, into IP addresses.
DNS - Domain Name System
37
Enables reliable communication between processes running on separate hosts and provides reliable, acknowledged transmissions that confirm successful deliver
TCP - Transmission Control Protocol
38
User Datagram Protocol
Enables a process running on one host to send packets to a process running on another host. However, UDP does not confirm successful datagram transmission.
39
Provides dynamic address mapping between an IPv4 address and a hardware address.
ARP - Address Resolution Protocol.
40
Defines the rules for wiring and signaling standards of the network access layer.
Ethernet
41
Defines the rules for wireless signaling across the 2.4 GHz and 5 GHz radio frequencies.
WLAN - Wireless Local Area Network
42
When messages are being sent on a network
encapsulation process works from top to bottom
43
process of dividing a large data stream into smaller pieces prior to transmission
segmentation
44
Responsible for delivering the IP packet from the original source to the final destination, which may be on the same network or a remote network.
Network layer source and destination addresses