week 11 Flashcards

1
Q

what is the application layer

A
  • -> The application layer is the closest to the user
  • -> Provides interface between the applications we use to communicate and underlying network over which our messages are transmitted
  • -> application layer protocols are used to exchange data between source and destination hosts
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what are the 3 functions of the presentation layer

A

–> formats data from the source device into a compatible form for receipt by the destination device

–> compression of data in a way that can be decompressed by the destination device

–> Encryption of the data for transmission and the decryption of data upon receipt by the destination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what are the functions of the session layer

A
  • -> creates and maintains dialogs between source and destination applications
  • -> Handles the exchange of information to initiate dialogs, keep them active and to restart the session s
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what is DNS

A

used to resolve internet names to ip addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what is telnet

A

a terminal emulation protocol used to provide remote access to servers and networking devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what is DHCP

A

used to assign ip address, subnet mask, default gateway and DNS server to a host

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what is HTTP used for

A

used to transfer flies that make up webpages of the world wide web

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what is FTP

A

used for interactive file transfer between systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what is trivial file transfer protocol (TFTP)

A

used for connectionless active file transfer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what is simple mail transfer protocol

A

used for transfer of mail messages and attachments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what is post office protocol (POP)

A

used by email clients to retrieve mail from a remote server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what is internet message access protocol (IMAP)

A

another protocol for email retrieval

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

every connected end device are considered _________ in the p2p network

A

equal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what is a peer in peer to peer networks

A

it is the end devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what do peer networks do with the resources on the network

A

peer to peer networks decentralize the resources on a network

instead of locating the data to be shared on dedicated servers, data can be located anywhere and on any connected device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what do p2p applications do instead of using a central database

A

The devices on the network each tell the others what files are available when queried, and use the file sharing protocol and services to support locating resources

17
Q

what are some common p2p applications

A
  • -> edonkey
  • -> eMule
  • -> BitTorrent
  • -> Bitcoin
  • -> LionShare
18
Q

in a client server architecture in addition to actual data transfer what else is required

A

user authentication

identification of file data

19
Q

what protocols does HTTP specify

A

request and response protocol

20
Q

what are 3 common request message types in HTTP

A

GET
POST
PUT

21
Q

SMTP used to __________

A

send mails

22
Q

_________ and __________ used to retrive mail

A

POP and IMAP

23
Q

SMTP transfers mail reliably and efficiently to ___________–

A

destination email server

24
Q

describe how SMTP works

A
  • -> transfers mail
  • -> SMTP processes must be running on both client and server
  • -> message and message header must have a properly formatted recipient email address and a sender
  • -> uses port 25
25
Q

what is post office protocol

A
  • -> enables a workstation to retrieve mail from a mail server
  • -> mail is downloaded from the server to the client and then deleted on the server
  • -> uses port 110
26
Q

what is Internet Message Access Protocol

A
  • -> another protocol that is used to retrieve email messages
  • -> unlike POP, when the user connects to an IMAP capable server copies of the message are downloaded to the client application
  • -> original messages are kept on the server until manually deleted
  • -> port 143
27
Q

why were domain names created

A

domain names were created to convert the numeric IP addresses into a simple, recognisable, and easy to remember name

28
Q

the domain name system was created for ________________-

A

domain name to address resolution

29
Q

what does DNS use to resolve the names associated with these numbered IP addresses

A

distributed set of servers

30
Q

what system does a DNS protocol use and why

A

Hierarchical system is used to create a database to provide name resolutino

this system looks like inverted tree

31
Q

DNS relies _________ to store and maintain records

A

decentralised servers

32
Q

what is EACH DNS server responsible for

A

–>maintains a specific database file and is responsible for managing name to IP mappings for that small portion of the entire DNS structure

33
Q

give some examples of top level domains

A

.au
.com
.jp

34
Q

what is Dynamic Host Configuration Protocol

A

–> automatically assigns IP addresses, subnet masks, gateway and other IP networking parameters to network devices

–>When the DHCP server is contacted and an address is requested, the DHCP server chooses an address from a configured range of addresses called a pool and assigns it to the host for a set period. This is why DHCP assigned addresses are not permanent

–> DHCP can pose a security risk because any device connected to the network can receive an address

35
Q

what are the 4 DHCP steps

A

DHCP discover
DHCP offer
DHCP request
DHCP Ack

36
Q

how does an FTP client applicaiton push and pull data from a server

A

by running FTP daemon

37
Q

what are the 2 connections that the client establishes in FTP

A

–> the client establishes the first connection to the server for control traffic, consisting of client commands and server replies

–> The client establishes the second connection to the server for the actual data transfer `