Study your flashcards anywhere!

Download the official Cram app for free >

  • Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

How to study your flashcards.

Right/Left arrow keys: Navigate between flashcards.right arrow keyleft arrow key

Up/Down arrow keys: Flip the card between the front and back.down keyup key

H key: Show hint (3rd side).h key

A key: Read text to speech.a key

image

Play button

image

Play button

image

Progress

1/224

Click to flip

224 Cards in this Set

  • Front
  • Back
LAN
Local Area Network
MAN
Metropolitian Area Network
WAN
Wide Area Network
SAN
Storage Area Network
VPN
Virtual Private Network
Application Layer - which layer and define.
Layer 7 - provides an interface between a host communication software and any necessary external applications.
Presentation Layer
Layer 6
Session Layer
Layer 5
Transport Layer
Layer 4
Network Layer
Layer 3
Data Link Layer
Layer 2
Physical Layer
Layer 1
HTTP - Define and list layer
Hyper Text Transfer Protocol - Enables web browsing with the transmission of Hypertext Markup Language (HTML) documents on the Internet.
Work in the Application Layer
HTTPS
Secure Hyper Text Transfer Protocol - Enables secure web browsing. A secure connection is indicated when the URL begins with https:// or when there is a lock symbol at the lower-right corner of the web page that is being viewed. Which is used by the application Layer.
FTP
File Transfer Protocal
DNS
Domain Name Service - resolved hostnames into ip addresses.
SMTP
Simple Mail Transfer Protocol - sends electronic mail across the network.
POP3
Post Office Protocol 3 - receives electronic mail by accessing an internet server.
NFS
Network File System - Enables users of different operating systems such as unix to share files
SNMP
Simple Network Management Protocol - Monitors the network and manages configurations - Collects statistics to analyze network performance and ensure network security.
NTP
Network Time Protocol - sycronizes clocks on the internet to provide accurate time on the users system.
DHCP
Dynamic Host Configuration Protocol - Works dynamically to provide an IP address, subnet mask, domain name, and a default gateway for routers. Works with DNS and WINS (used for NetBIOS addressing).
Application Layer 7 provides synchronization of
client/server applications
Application Layer 7 provides error
control and data integrity between applications
Applications Layer 7 provides system
independant processes to a host
Presentation Layer 6 presents
data to the application and acts as a data format translator
Presentation Layer 6 Format translation is
necessary to ensure that the data can be read by applications.
Presentation Layer 6 handles
the structuring of data and negotiating data transfer syntax to layer 7
Presentation Layer 6 processes include data
encryption and decryption
Presentation Layer 6 processes include data
compression and decompression.
The presentation layer is the only layer that can
change data.
Presentation Layer 6 protocol include JPEG
Joint Photographic Group
Presentation Layer 6 protocol include ASCII
American Standard Code for Information Interexchange
Presentation Layer 6 protocol include EBCDIC
Extended binary Coded Decimal Interexhange code
Presentation Layer 6 Protocol include TIFF
Tagged image file format
Presentation Layer 6 Protocol include GIF
Graphic Image File
Presentation Layer 6 protocol include PICT
Picture
Application Layer 7 protocol include Telnet
A TCP/IP protocol that provides terminal emulation to a remote host by creating a virtual terminal.
Application Layer 7 protocol include HTTP
Hypertext Transfer Protocol - enables web browsing with the transmission of HTML (Hypertext Markup Languange)
Application Layer 7 protocol include HTTPS
Secure Hypertext Transfer Protocol - Enables secure Web Browsing.
Application Layer 7 protocol include FTP
File Transfer Protocol - which enable a user to transfer files.
Application Layer 7 protocol include TFTP
Trivial File Transfer Protocol - bare bones File Transfer Protocol - not secure and send smaller blocks of data.
Application Layer 7 protocols include DNS
Domain Name Service which resolves hostnames to ip addresses.
Application Layer 7 protocols include SMTP
Simple Mail Transfer Protocol - sends electronic mail across the network.
Application Layer 7 protocols include POP3
Post Office Protocol 3 - receives electronic mail by accessing an internet server.
Application Layer 7 protocols include NFS
Network File System - enables users with different operation systems such as unix to share files.
Application Layer 7 protocols include NNTP
Network News Transfer Protocol which offers access to usenet newsgroup postings.
Application Layer 7 protocols include SNMP
Simple Network Management Protocol - Monitors the network and manages configurations.
Application Layer 7 protocols include NTP
Network Time Protocol - which synchronizes clocks on the internet to provide accurate local time on the users system.
Application Layer 7 protocols include DHCP
Dynamic Host Configuration Protocol - works dynamically to provide an ip address, subnet mask, domain name and a defualt gateway for routers.
Presentation Layer 6 protocols include MPEG
Moving Picture Experts Group
Presentation Layer 6 protocols include MIDI
Musical Instrument Digital Interface
Presentation Layer 6 protocols include QT
Quicktime
Presentation Layer 6 protocols include RTF
Rich Text Format
Session Layer 5 protocols include NFS
Network File System - Accesses remote resources transparently and represents files and directories as if local to the suer system. Used on Unix workstations.
Session Layer 5 protocols include SQL
Structured Query Language - functions as a query language that requests, updates, and manages databases.
Session Layer 5 protocols include RPC
Remote Procedure Call - Basis for Client/server communications - calls are created on the client and carried out on the server.
Session Layer 5 protocols include ASP
Appletalk Session Protocol - Client/Server communications specific to appletalk
Session Layer 5 protocols include X Window
Communicates with remote unix machines and enables the user to operate the device as if attached locally.
Session Layer 5 protocols include DNASCP
Digital Network Architecture Session Control Protocol - A proprietary Digital Equipment Corporation Networking Protocol.
Session Layer 5 is primarily concerned with
dialog control among devices
Session Layer 5 determines
the beginning, middle, and end of a session or conversation.
Session Layer 5 acts as a
intermediary for applications.
Lower Layers of the OSI Model
Layers 1-4
Lower Layer 4
Transport Layer
Lower Layer 3
Network Layer
Lower Layer 2
Data Link
Lower Layer 1
Physical
The lower layers of the OSI Model focus on
data transport, which can be achieved via a router, switch, or a physical wire.
Transport Layer 4 provides Fault
Detection
Transport Layer 4 provides error
recovery
Transport Layer 4 provides the functionality of establishing
a virtual circuit
Transport Layer 4 provides the functionality of maintaining
a virtual circuit
Transport Layer 4 provides the functionality of tearing down
a virtual circuit
Transport Layer 4 provides reliable networking via
acknowledgments, sequencing, and flow control.
Segmenting occurs as which Layer
Transport Layer 4
Session Layer 5 determines
the beginning, middle, and end of a session or conversation.
Session Layer 5 acts as a
intermediary for applications.
Lower Layers of the OSI Model
Layers 1-4
Lower Layer 4
Transport Layer
Lower Layer 3
Network Layer
Lower Layer 2
Data Link
Lower Layer 1
Physical
The lower layers of the OSI Model focus on
data transport, which can be achieved via a router, switch, or a physical wire.
Transport Layer 4 provides Fault
Detection
Transport Layer 4 provides error
recovery
Transport Layer 4 provides the functionality of establishing
a virtual circuit
Transport Layer 4 provides the functionality of maintaining
a virtual circuit
Transport Layer 4 provides the functionality of tearing down
a virtual circuit
Transport Layer 4 provides reliable networking via
acknowledgments, sequencing, and flow control.
Segmenting occurs as which Layer
Transport Layer 4
Session Layer 5 determines
the beginning, middle, and end of a session or conversation.
Session Layer 5 acts as a
intermediary for applications.
Lower Layers of the OSI Model
Layers 1-4
Lower Layer 4
Transport Layer
Lower Layer 3
Network Layer
Lower Layer 2
Data Link
Lower Layer 1
Physical
The lower layers of the OSI Model focus on
data transport, which can be achieved via a router, switch, or a physical wire.
Transport Layer 4 provides Fault
Detection
Transport Layer 4 provides error
recovery
Transport Layer 4 provides the functionality of establishing
a virtual circuit
Transport Layer 4 provides the functionality of maintaining
a virtual circuit
Transport Layer 4 provides the functionality of tearing down
a virtual circuit
Transport Layer 4 provides reliable networking via
acknowledgments, sequencing, and flow control.
Segmenting occurs as which Layer
Transport Layer 4
Transport Layer 4 protocols include TCP
Transmission Control Protocol.
Transport Layer 4 Protocols include UDP
User Datagram Protocol
Transport Layer 4 Protocols include SPX
Sequenced Packet Exchange created by Novell Netware.
Transport Layer 4 is responsible for
end to end connections and data delivery between two hosts.
Transport Layer 4 has the ability to
segment and reassemble data.
Transport Layer 4 key functionility is
the ability to segment and reassemble data
Transport Layer 4 transmissions occur via logical connectivity between
the sender and destination.
Transport Layer provides
Transparent data transfer by hiding the details of the transmission from the upper layers.
Network Layer 3 is where the
best patch determination is made for packet delivery across the network.
Network Layer 3 routed protocols such as IP are used to
determine logical addressing.
Network Layer 3 routed protocols such as IP are used to identify
the destination of a packet or datagram.
Network Layer 3 most common network device found at Layer 3 is a
router or layer 3 switches.
Network Layer 3 router follows this step to ensure proper data transport. Checks the
Destination IP address of the incoming packet on the router interface.
Network Layer 3 router follows this step to ensure proper data transport. Packets destined for that router
are processed
Network Layer 3 router follows this step to ensure proper data transport. Packets destined another router
must be looked up in the routing table.
Network Layer 3 router follows this step to ensure proper data transport. Router Determines an
Exit interface based on the routing table.
Network Layer 3 router table contains the Network
Address
Network Layer 3 router table contains (I)
Interface - exit interface used to forward packets
Network Layer 3 router table contains (M)
Metric - distance to reach a remote network.
Network Layer 3 utilizes two type of packets
data packets and route update packets
Network layer 3 utilizes two type of packets the first is data packets. Define
Transport data across the internetwork and are supported by IP and IPX protocols.
Network Layer 3 utilizes two types of packets the second is route update packets. Define
Sends updates to neighbor routers about all networks connected to that internetwork
Route Update Packets are supported by
RIP, EIGRP and OSPF
Network Layer 3 protocols include IP
Internet Protocol
Network Layer 3 protocols include IPX
Internet Packet Exchange (Novell Netware)
Network Layer 3 protocols include Appletalk DDP
Appletalk Datagram Delivery Protocol used by apple
Network Layer 3 data is in the form of
packets or a datagram.
Routers and logical addressing (ip addresses) are used at Layer
3 the Network Layer
Data Link Layer 2 ensures
reliable data transfer from the network layer to the physical layer for transmission across the network.
Data Link Layer 2 have two domains to determine data transport reliability. List the two
Broadcast domain and collision Domain.
Data Link Layer 2 has the broadcast domain to
determine data transport reliability
Data Link Layer 2 has the collision domain to
determine data transport reliability
Data Link Layer 2 - define the broacast domain.
A group of nodes that can receive each others broadcast messages and are segmented by routers.
Data Link Layer 2 - define the collision domain.
A group of nodes that share the same media and are segmented by switches.
CSMA/CD
Carrier Sense Multiple Access Collision Dectection
Define CSMA/CD
a access method that sends a jam signal to notify the devices that there has been a collision.
Routers segment
broadcast domains
Switches segment
collision domains.
Broadcast domains are segmented by
routers
Collision domains are segmented by
switches
Data Link Layer 2 is responsible for error
notification
Data Link Layer 2 is not responsible for error
correction
Data Link Layer 2 is responsible for Network
topology
Data Link Layer 2 is responsible for flow
control
Data Link Layer 2 is the only layer that has
sublayers
Data Link Layer 2 has two sublayers
MAC and LLC
Data Link Layer 2 has two sublayers that provides
physical addressing and flow control
Data Link Layer 2 sublayer MAC define
the hard coded addresson the network interface controller (NIC)
Data Link Layer 2 sublayer MAC must be
unique
Data Link Layer 2 sublayer MAC must consist of
48 bits
Data Link Layer 2 sublayer MAC must be displayed by
12 hexadecimal digits
Data Link Layer 2 sublayer MAC first 6 hexadecimal digits define
the vendor code assigned by the NIC manufacturer.
Data Link Layer 2 sublayer MAC has a broadcast value of
FFFF FFFF FFFF
Data Link Layer 2 sublayer LLC is responsible for
framing, error and flow control.
Data Link Layer 2 sublayer LLC provides a SAP
Service Access Point identifier in the frame.
Data Link Layer 2 sublayer LLC provides a SAP. The SAP field of the fram consists of
One byte that identifies an upper layer protocol.
Data Link Layer 2 sublayer LLC provides a DSAP
Destination Service Access Point.
Data Link Layer 2 sublayer LLC provides a SSAP
Source Service Access Point.
Data Link Layer 2 uses two devices: List the two
Bridges and switches
Data Link Layer 2 uses two devices: The first is a bridge: define
bridges connect two segments in a signle network or two networks together.
Data Link Layer 2 uses two devices: The second is a switch: define
at layer two switches are multiport bridges that utilize ASCII to forward frames. Each port of the switch has a dedicated bandwidth.
Switch dedicated bandwidth enables the switch to
guarantee the speed assigned to the port.
Broadcast domains are segmented at the
Network Layer by routers
Physical Layer 1 moves
bits between nodes
Physical Layer 1 assist with the
activation, maintenance, and deactivation between devices.
Physical Layer 1 include the specification of
voltage, wire speed and pin-out cables.
Physical Layer 1 include the capability to
receive and transmit a data signal.
Physical Layer 1 include the identification of the
interface that is set up between the DTE/DCE
Physical Layer 1 DTE
Data terminal equipment
Physical layer 1 DCE
Data communications equipment
Physical Layer 1 define the e___________ requirements.
electrical
Physical Layer 1 define the m___________ requirements.
mechanical
Physical Layer 1 define the p___________ requirements.
procedural
Physical Layer 1 define the f___________ requirements.
functional
Physical Layer 1 DTE is the
locally attached device
Physical Layer 1 DCE is the
Equipment found at the service provider.
Physical Layer 1 DTE can be accessed with a
model or a channel service/data service unit (CSU/DSU)
OSI Layer Communication - each layer passes information to adjecent layers using
Protocol Data Units (PDU's)
OSI Layer Communication - the PDU includes
both the message and the protocol/control information from the forwarding layer.
OSI Layer Communications PDU control information can be in the form of a
header or trailer
OSI Layer Communications of adding a header or trailer to the PDU at each layer is called
encapsulation
Application Layer 7 Control Information Name
Data
Transport Layer 4 Control information Name
Segment
Network Layer 3 Control Information Name
Packet
Data Link Layer 2 Control Information Name
Frame
Physical Layer 1 Control Information Name
Bit
Data encapsulation order 1
Data which occurs at application layer 7
Data encapsulation order 2
Segment which occurs at transport layer 4
Data encapsulation order 3
Packet which occurs at network Layer 3
Data encapsulation order 4
frame which occurs at data link layer 2
Data encapsulation order 5
Bit which occurs at physical layer 1
Summary:
Application layer 7 provides an interface between a host's commuication software and the necessary expternal applications.
Layer 7
Summary: Application Layer 7 Evaluates what resources are necessary and the available resources for communication between two devices
Layer 7
Summary: Application Layer 7 synchonizes client/server applications.
Layer 7
Summary: Application Layer 7 provides error control and data integrity between applications
Layer 7
Summary: Application Layer 7 provides system independant processes to a host
Layer 7
Summary: Presentation Layer 6 presents data to the application Layer
Layer 6
Summary: Presentation Layer 6 acts as a data format translator
Layer 6
Summary: Presentation Layer 6 handles the structuring of data and negotiating data transfers syntax to layer 7
Layer 6
Summary: Presentation Layer 6 processes involved include data encryption, decryption, compression and decompression
Layer 6
Summary: Session Layer 5 handles dialog control among devices
Layer 5
Summary: Session Layer 5 determines the beginning, middle and end of a session or conversation that occurs between applications (intermediary)
Layer 5
Summary: Transport Layer 4 manages end to end connections and data delivery between two hosts
Layer 4
Summary: Transport Layer 4 segments and reassembles data
Layer 4
Summary: Transport Layer 4 provides transparent data transfer by hiding details of the transmission from the upper layers.
Layer 4
Summary: Network Layer 3 determines best path for packet delivery across the network.
Layer 3
Summary: Network Layer 3 determines logical addressing, which can identify the destination of a packet or datagram.
Layer 3
Summary: Network Layer 3 uses data packets (IP, IPX) and route update packets (RIP, EIGRP)
Layer 3
Summary: Network Layer 3 uses routed protocols IP, IPX, and Appletalk DDP.
Layer 3
Summary: Network Layer 3 devices include routers and layer 3 switches
Layer 3
Summary: Data Link Layer 2 ensures reliable data transfer from the network layer to the physical layer
Layer 2
Summary: Data link Layer 2 oversees physical or hardware addressing
Layer 2
Summary: Data link Layer 2 formats packets into a frame
Layer 2
Summary: Data Link layer 2 provides error notification
Layer 2
Summary: Data Link Layer 2 devices included bridges and layer 2 switches
Layer 2
Summary: Physical layer 1 moves bits between nodes
Layer 1
Summary: Physical layer 1 assists with the activation, maintenance, and deactivation of physical connectivity between devices
Layer 1
Summary: Physical layer 1 devices include hubs and repeaters.
Layer 1