Quiz 3 IT 105 CHAP 13 Flashcards

1
Q

What are parts of the communication model and what does it consist of?

A

Implemented as a hierarchical protocol stack

Each layer of the stack at the sender node contributes information that is used by the corresponding peer layer at the receiver node

Different protocols for the different aspects of communication

Separating tasks and including well defined interfaces between the tasks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the 4 qualities the communication model has?

A

Adds flexibility

Simplifies design of protocols

Permits modification or substitution of protocols without affecting unrelated tasks

Permits a system to select only the protocols needed for a particular application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is TCP/IP? What is it based on? What does it encompass?

A

Transmission Control Protocol/Internet Protocol

Based on five protocol layers, although layers 1 and 2 are not actually specified in the standard. However, the TCP/IP model recognizes the existence of these layers as a necessity.

The TCP/IP protocol suite encompasses an integrated suite of numerous protocols that work together and guide all aspects of communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How many layers does the TCP/IP have?

A

5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is layer 1 called and what are it’s components?

A

Physical layer

Layer at which communication actually takes place consisting of a bare stream of bits

Primarily implemented in hardware by a network interface controller (NIC)

Physical access protocol includes
-Definition of the medium
-Signaling method, signal parameters, carrier -frequencies, lengths of pulses, synchronization and timing issues
-Method used to physically connect the computer to the medium

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is layer 2’s first section called and what are it’s components?

A

Data Link Layer

Responsible for the reliable transmission and delivery of packets between two adjacent nodes

Packets at this layer are called frames

Often divided into two sublayers:

Software logical link control (LLC) sublayer
Hardware medium-access control (MAC) sublayer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are layer 2’s subsections called and what are its components ?

A

Software logical link control (LLC) sublayer
Error correction, flow control, retransmission, packet reconstruction and IP datagram/frame conversions

Numbers frames and reorders received frames to recreate the original message

Rarely used

Hardware medium-access control (MAC) sublayer
Defines procedures for accessing the channel and detecting errors

Responsible for services such as data encoding, collision handling, synchronization, and multiplexing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is an example of a data link layer implementation?

A

Layer 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the concept of switched ethernet?

A

The Ethernet switch keeps a table of which MAC addresses are accessible through each of its ports

Permits point-to-point connection of any pair of nodes

Multiple pairs can be connected simultaneously

Possible to connect nodes in full-duplex mode

Each pair of connections operates at the maximum bit rate of the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is wireless ethernet: WIFI?

A

Infrastructure mode:
Based on shared access point

CSMA/CA – collision avoidance MAC protocol

Station waits until channel is clear plus a short random amount of time before transmitting

May use ‘request to send’ and ‘clear to send’ options to improve collision avoidance

Ad hoc mode:
Assumes direct connections between nodes

Based on partial mesh network topology

Rarely used

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is layer 3 called and what are its components?
What does the IP protocol consist of?

A

Network Layer
Also called the internetworking layer or IP layer

IP protocol:

Responsible for routing packets from the source end node to the destination end node through intermediate nodes

Performed using datagram packet switching and logical IP addresses

Unreliable, best-effort delivery service

Size of datagram ranges from 20 to 65,536 bytes

Header size between 20 and 60 bytes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does layer 3’s network layer transmission consist of?

A

Communications within a local network:
No routing is required because nodes are directly addressable

Physical addresses for corresponding IP addresses are looked up in a table

IP appends a header with the physical address and passes the datagram to layer 2, the data link layer

Communications sent outside of the local network:

At each intermediate node, the network layer removes the current node address and determines the next node address

The new address is added to the packet and passed to layer 2, the data link layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does the operation of IP consist of and what are the two major functions? What is the ARP?

A

Two major functions

Routes datagrams from node to node until they reach their destination node

Translates IP addresses to physical addresses before it passes the packets to the data link later for delivery

Address Resolution Protocol (ARP):
Implemented at the network layer

Translation of IP address to physical address at each intermediate node until destination is reached

A broadcast of the IP address is sent to every node on the network. The matching node responds with a physical address

Physical address (MAC address in the case of Ethernet) is sent in frame to the data link layer

At final destination, the packet is passed up to the transport layer for deployment to the application layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is ICMP and what are it’s 4 qualities?

A

Internet Control Message Protocol

Auxiliary protocol that creates error messages for failures at the network layer

Error code is encapsulated in an IP datagram and sent to source

Typical messages: ‘Destination Host Unknown’, ‘Time to Live Exceeded’

Used for queries by network tools such as ping and traceroute

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is layer 4 called and what are its components?
What is packetization?

A

Transport layer
Provides services that support reliable end-to-end communications

Generates the final address of the destination

Responsible for all end-to-end communication facilities

Establishes connection with the destination, provides flow control, data assurance, reordering of packets, error recovery, and connection termination

Packetization:
Breaking up of the message into packets of reasonable size, takes place at this level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How doTCP/IP addressing and port addresses work?

A

Transport layer uses to identify the application that is to receive the message

16 bits in length

Example: Port 80 is commonly used for Web services

First 1024 numbers are called well-known ports because they are standard addresses specified for most common applications

User defined port numbers are also available to applications

For example, the following Web service uses the user-defined port of 8080:

Review well known port numbers slide 21

17
Q

What are TCP/IP addresses sockets defined by?

A

Defined by a combination of the IP address and port number

Identify which computer (IP address) and which application on that computer (port number)

Provide an interface between the application layer and the transport layer to initiate connections and send messages through the network

Allow for multiple simultaneous open connections

Originated with BSD UNIX

18
Q

What are the three different transport layer protocols and what do they stand for ?

A

TCP (Transmission Control Protocol)

UDP (User Datagram Protocol)

SCTP (Stream Control Transmission Protocol)

19
Q

What is TCP?

A

TCP (Transmission Control Protocol)

Connection-oriented, reliable delivery service

Control packets are used to create a full duplex logical connection through handshaking

Numbering of packets allows packets to be reassembled in order

20
Q

What is UDP?

A

UDP (User Datagram Protocol)

Unreliable, connectionless service

No acknowledgment of receipt by receiving node

Example: streaming video

21
Q

What is SCTP?

A

SCTP (Stream Control Transmission Protocol)

Similar to TCP but with improved fault tolerance and ability to transport multiple messages through the same connection

22
Q

What are the components of IPv4 addresses ? What are the 3 levels they are divided into? What are the masks?

A

Registered and allocated by ICANN

32 bits long divided into 4 octets

Assigned in blocks of contiguous addresses

-Number of addresses is a power of two
-Example: 208.80.152.2 (Wikipedia’s IP address)

Divided into three levels:
Network address
Subnetworks (subnets)
Hosts (nodes

Masks
Used to separate the different parts of the address

23
Q

What are two addresses to distribute IP addresses more efficiently?

A

Network Address Translation (NAT)

Dynamic Host Configuration Protocol (DHCP)

24
Q

What is NAT?

A

Network Address Translation (NAT)

Use of private network IP addresses behind a router

The router must readdress traffic passing between the Internet and the local network

Difficult with large networks

25
Q

What is DHCP?

A

Maintain a bank of available IP addresses and assign them dynamically to computers for use when the computers are attached to the network

Method often used by large organizations, DSL, and cable providers

DHCP client on computer or network device broadcasts a query to locate the DHCP server

DHCP server responds with a lease that includes an IP address, domain name of network, IP address of DNS server, subnet mask, IP address of gateway, and other configuration parameters

26
Q

What is IPv6?

A

Intended to eventually replace IPv4 to provide additional IP addresses

128-bit addresses arranged as eight groups of four-digit hexadecimal numbers separated by colons

Leading zeroes and zero values in one or more consecutive groups may be eliminated

Example: 2CAA:30::370:0:12AB is the same as
2CAA:0030:0000:0000:0000:0370:0000:12AB

27
Q

What are components of domain names and DNS services?

A

Domain Names:
Hierarchical system of network address identifiers used throughout the Internet and on local area networks, intranets and extranets

Created so users would not have to memorize IP addresses

Domain Name System (DNS):
Domain name resolution – translates domain names into IP addresses

Uses a massive distributed database containing a directory system of servers

Each entry contains a domain name and an associated IP address

28
Q

What are the two parts in Quality of Service? QoS

what is jitter?

A
  1. Methods to reserve and prioritize channel capacity to favor packets that require special treatment

2.Service guarantees from contract carrier services that specify particular levels of throughput, delay and jitter

Jitter – variation in delay from packet to packet

29
Q

What is Differentiated service (DiffServ)?

A

8-bit (DS) field in IP header

Set by the application at the sender or by the first node

DiffServ capable nodes such as routers can then prioritize and route packets based on the packet class

30
Q

What are the 5 network security categories?

A

Intrusion:
Keeping network and system resources free from intruders

Confidentiality:
Keeping the content of data private

Authentication:
Verifying the identity of a source of data being received

Data integrity and non-repudiation:
Protecting the content of data communication against changes and verifying the source of the message

Assuring network availability and access control:
Keep network resources operational and restricting access to those permitted to use them

31
Q

What are the three network security measures and what do they consist of?

A

Network intrusions:
Packet sniffers read data in a packet as it passes through a network

Probing attacks to uncover IP address / port numbers that accept data packets

Physical and Logical Access Restriction:
Limit access to wiring and network equipment

Firewall

Private networks

Encryption:
Symmetric key cryptography

Same key is used for encryption and decryption

Public key-private key cryptography

Two different keys are used for encryption and decryption

32
Q

What is layer 5 called and what does it consist of?

A

Session Layer :

Establishes a dialogue between two cooperating applications or processes at the ends of the communication link

Responsible for
-Establishing the session between the applications
-Controlling the dialogue
-Terminating the session

Examples
Remote login
Print spooling to remote printer

33
Q

What is layer 6 called and what does it consist of?

A

OSI presentation layer

-Responsible for presenting data at the destination with the same meaning and appearance as it would have at the source

Provides common data conversions and transformations that allow systems with different standards to communicate

Includes services such as data compression and restoration, encryption and decryption, data reformatting, ASCII-Unicode conversion, etc.

34
Q

What are the 4 components of cellular tech?

A

Long Term Evolution (4G LTE) standard is being replaced with 5G technologies

Provides standard TCP/IP protocol services at application, transport, and network layers

Requires additional protocols between data link and network layers to address handoff and movement from cell to cell

May serve as Wi-Fi access points for computing devices

35
Q
A