Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
224 Cards in this Set
- Front
- Back
LAN
|
Local Area Network
|
|
MAN
|
Metropolitian Area Network
|
|
WAN
|
Wide Area Network
|
|
SAN
|
Storage Area Network
|
|
VPN
|
Virtual Private Network
|
|
Application Layer - which layer and define.
|
Layer 7 - provides an interface between a host communication software and any necessary external applications.
|
|
Presentation Layer
|
Layer 6
|
|
Session Layer
|
Layer 5
|
|
Transport Layer
|
Layer 4
|
|
Network Layer
|
Layer 3
|
|
Data Link Layer
|
Layer 2
|
|
Physical Layer
|
Layer 1
|
|
HTTP - Define and list layer
|
Hyper Text Transfer Protocol - Enables web browsing with the transmission of Hypertext Markup Language (HTML) documents on the Internet.
Work in the Application Layer |
|
HTTPS
|
Secure Hyper Text Transfer Protocol - Enables secure web browsing. A secure connection is indicated when the URL begins with https:// or when there is a lock symbol at the lower-right corner of the web page that is being viewed. Which is used by the application Layer.
|
|
FTP
|
File Transfer Protocal
|
|
DNS
|
Domain Name Service - resolved hostnames into ip addresses.
|
|
SMTP
|
Simple Mail Transfer Protocol - sends electronic mail across the network.
|
|
POP3
|
Post Office Protocol 3 - receives electronic mail by accessing an internet server.
|
|
NFS
|
Network File System - Enables users of different operating systems such as unix to share files
|
|
SNMP
|
Simple Network Management Protocol - Monitors the network and manages configurations - Collects statistics to analyze network performance and ensure network security.
|
|
NTP
|
Network Time Protocol - sycronizes clocks on the internet to provide accurate time on the users system.
|
|
DHCP
|
Dynamic Host Configuration Protocol - Works dynamically to provide an IP address, subnet mask, domain name, and a default gateway for routers. Works with DNS and WINS (used for NetBIOS addressing).
|
|
Application Layer 7 provides synchronization of
|
client/server applications
|
|
Application Layer 7 provides error
|
control and data integrity between applications
|
|
Applications Layer 7 provides system
|
independant processes to a host
|
|
Presentation Layer 6 presents
|
data to the application and acts as a data format translator
|
|
Presentation Layer 6 Format translation is
|
necessary to ensure that the data can be read by applications.
|
|
Presentation Layer 6 handles
|
the structuring of data and negotiating data transfer syntax to layer 7
|
|
Presentation Layer 6 processes include data
|
encryption and decryption
|
|
Presentation Layer 6 processes include data
|
compression and decompression.
|
|
The presentation layer is the only layer that can
|
change data.
|
|
Presentation Layer 6 protocol include JPEG
|
Joint Photographic Group
|
|
Presentation Layer 6 protocol include ASCII
|
American Standard Code for Information Interexchange
|
|
Presentation Layer 6 protocol include EBCDIC
|
Extended binary Coded Decimal Interexhange code
|
|
Presentation Layer 6 Protocol include TIFF
|
Tagged image file format
|
|
Presentation Layer 6 Protocol include GIF
|
Graphic Image File
|
|
Presentation Layer 6 protocol include PICT
|
Picture
|
|
Application Layer 7 protocol include Telnet
|
A TCP/IP protocol that provides terminal emulation to a remote host by creating a virtual terminal.
|
|
Application Layer 7 protocol include HTTP
|
Hypertext Transfer Protocol - enables web browsing with the transmission of HTML (Hypertext Markup Languange)
|
|
Application Layer 7 protocol include HTTPS
|
Secure Hypertext Transfer Protocol - Enables secure Web Browsing.
|
|
Application Layer 7 protocol include FTP
|
File Transfer Protocol - which enable a user to transfer files.
|
|
Application Layer 7 protocol include TFTP
|
Trivial File Transfer Protocol - bare bones File Transfer Protocol - not secure and send smaller blocks of data.
|
|
Application Layer 7 protocols include DNS
|
Domain Name Service which resolves hostnames to ip addresses.
|
|
Application Layer 7 protocols include SMTP
|
Simple Mail Transfer Protocol - sends electronic mail across the network.
|
|
Application Layer 7 protocols include POP3
|
Post Office Protocol 3 - receives electronic mail by accessing an internet server.
|
|
Application Layer 7 protocols include NFS
|
Network File System - enables users with different operation systems such as unix to share files.
|
|
Application Layer 7 protocols include NNTP
|
Network News Transfer Protocol which offers access to usenet newsgroup postings.
|
|
Application Layer 7 protocols include SNMP
|
Simple Network Management Protocol - Monitors the network and manages configurations.
|
|
Application Layer 7 protocols include NTP
|
Network Time Protocol - which synchronizes clocks on the internet to provide accurate local time on the users system.
|
|
Application Layer 7 protocols include DHCP
|
Dynamic Host Configuration Protocol - works dynamically to provide an ip address, subnet mask, domain name and a defualt gateway for routers.
|
|
Presentation Layer 6 protocols include MPEG
|
Moving Picture Experts Group
|
|
Presentation Layer 6 protocols include MIDI
|
Musical Instrument Digital Interface
|
|
Presentation Layer 6 protocols include QT
|
Quicktime
|
|
Presentation Layer 6 protocols include RTF
|
Rich Text Format
|
|
Session Layer 5 protocols include NFS
|
Network File System - Accesses remote resources transparently and represents files and directories as if local to the suer system. Used on Unix workstations.
|
|
Session Layer 5 protocols include SQL
|
Structured Query Language - functions as a query language that requests, updates, and manages databases.
|
|
Session Layer 5 protocols include RPC
|
Remote Procedure Call - Basis for Client/server communications - calls are created on the client and carried out on the server.
|
|
Session Layer 5 protocols include ASP
|
Appletalk Session Protocol - Client/Server communications specific to appletalk
|
|
Session Layer 5 protocols include X Window
|
Communicates with remote unix machines and enables the user to operate the device as if attached locally.
|
|
Session Layer 5 protocols include DNASCP
|
Digital Network Architecture Session Control Protocol - A proprietary Digital Equipment Corporation Networking Protocol.
|
|
Session Layer 5 is primarily concerned with
|
dialog control among devices
|
|
Session Layer 5 determines
|
the beginning, middle, and end of a session or conversation.
|
|
Session Layer 5 acts as a
|
intermediary for applications.
|
|
Lower Layers of the OSI Model
|
Layers 1-4
|
|
Lower Layer 4
|
Transport Layer
|
|
Lower Layer 3
|
Network Layer
|
|
Lower Layer 2
|
Data Link
|
|
Lower Layer 1
|
Physical
|
|
The lower layers of the OSI Model focus on
|
data transport, which can be achieved via a router, switch, or a physical wire.
|
|
Transport Layer 4 provides Fault
|
Detection
|
|
Transport Layer 4 provides error
|
recovery
|
|
Transport Layer 4 provides the functionality of establishing
|
a virtual circuit
|
|
Transport Layer 4 provides the functionality of maintaining
|
a virtual circuit
|
|
Transport Layer 4 provides the functionality of tearing down
|
a virtual circuit
|
|
Transport Layer 4 provides reliable networking via
|
acknowledgments, sequencing, and flow control.
|
|
Segmenting occurs as which Layer
|
Transport Layer 4
|
|
Session Layer 5 determines
|
the beginning, middle, and end of a session or conversation.
|
|
Session Layer 5 acts as a
|
intermediary for applications.
|
|
Lower Layers of the OSI Model
|
Layers 1-4
|
|
Lower Layer 4
|
Transport Layer
|
|
Lower Layer 3
|
Network Layer
|
|
Lower Layer 2
|
Data Link
|
|
Lower Layer 1
|
Physical
|
|
The lower layers of the OSI Model focus on
|
data transport, which can be achieved via a router, switch, or a physical wire.
|
|
Transport Layer 4 provides Fault
|
Detection
|
|
Transport Layer 4 provides error
|
recovery
|
|
Transport Layer 4 provides the functionality of establishing
|
a virtual circuit
|
|
Transport Layer 4 provides the functionality of maintaining
|
a virtual circuit
|
|
Transport Layer 4 provides the functionality of tearing down
|
a virtual circuit
|
|
Transport Layer 4 provides reliable networking via
|
acknowledgments, sequencing, and flow control.
|
|
Segmenting occurs as which Layer
|
Transport Layer 4
|
|
Session Layer 5 determines
|
the beginning, middle, and end of a session or conversation.
|
|
Session Layer 5 acts as a
|
intermediary for applications.
|
|
Lower Layers of the OSI Model
|
Layers 1-4
|
|
Lower Layer 4
|
Transport Layer
|
|
Lower Layer 3
|
Network Layer
|
|
Lower Layer 2
|
Data Link
|
|
Lower Layer 1
|
Physical
|
|
The lower layers of the OSI Model focus on
|
data transport, which can be achieved via a router, switch, or a physical wire.
|
|
Transport Layer 4 provides Fault
|
Detection
|
|
Transport Layer 4 provides error
|
recovery
|
|
Transport Layer 4 provides the functionality of establishing
|
a virtual circuit
|
|
Transport Layer 4 provides the functionality of maintaining
|
a virtual circuit
|
|
Transport Layer 4 provides the functionality of tearing down
|
a virtual circuit
|
|
Transport Layer 4 provides reliable networking via
|
acknowledgments, sequencing, and flow control.
|
|
Segmenting occurs as which Layer
|
Transport Layer 4
|
|
Transport Layer 4 protocols include TCP
|
Transmission Control Protocol.
|
|
Transport Layer 4 Protocols include UDP
|
User Datagram Protocol
|
|
Transport Layer 4 Protocols include SPX
|
Sequenced Packet Exchange created by Novell Netware.
|
|
Transport Layer 4 is responsible for
|
end to end connections and data delivery between two hosts.
|
|
Transport Layer 4 has the ability to
|
segment and reassemble data.
|
|
Transport Layer 4 key functionility is
|
the ability to segment and reassemble data
|
|
Transport Layer 4 transmissions occur via logical connectivity between
|
the sender and destination.
|
|
Transport Layer provides
|
Transparent data transfer by hiding the details of the transmission from the upper layers.
|
|
Network Layer 3 is where the
|
best patch determination is made for packet delivery across the network.
|
|
Network Layer 3 routed protocols such as IP are used to
|
determine logical addressing.
|
|
Network Layer 3 routed protocols such as IP are used to identify
|
the destination of a packet or datagram.
|
|
Network Layer 3 most common network device found at Layer 3 is a
|
router or layer 3 switches.
|
|
Network Layer 3 router follows this step to ensure proper data transport. Checks the
|
Destination IP address of the incoming packet on the router interface.
|
|
Network Layer 3 router follows this step to ensure proper data transport. Packets destined for that router
|
are processed
|
|
Network Layer 3 router follows this step to ensure proper data transport. Packets destined another router
|
must be looked up in the routing table.
|
|
Network Layer 3 router follows this step to ensure proper data transport. Router Determines an
|
Exit interface based on the routing table.
|
|
Network Layer 3 router table contains the Network
|
Address
|
|
Network Layer 3 router table contains (I)
|
Interface - exit interface used to forward packets
|
|
Network Layer 3 router table contains (M)
|
Metric - distance to reach a remote network.
|
|
Network Layer 3 utilizes two type of packets
|
data packets and route update packets
|
|
Network layer 3 utilizes two type of packets the first is data packets. Define
|
Transport data across the internetwork and are supported by IP and IPX protocols.
|
|
Network Layer 3 utilizes two types of packets the second is route update packets. Define
|
Sends updates to neighbor routers about all networks connected to that internetwork
|
|
Route Update Packets are supported by
|
RIP, EIGRP and OSPF
|
|
Network Layer 3 protocols include IP
|
Internet Protocol
|
|
Network Layer 3 protocols include IPX
|
Internet Packet Exchange (Novell Netware)
|
|
Network Layer 3 protocols include Appletalk DDP
|
Appletalk Datagram Delivery Protocol used by apple
|
|
Network Layer 3 data is in the form of
|
packets or a datagram.
|
|
Routers and logical addressing (ip addresses) are used at Layer
|
3 the Network Layer
|
|
Data Link Layer 2 ensures
|
reliable data transfer from the network layer to the physical layer for transmission across the network.
|
|
Data Link Layer 2 have two domains to determine data transport reliability. List the two
|
Broadcast domain and collision Domain.
|
|
Data Link Layer 2 has the broadcast domain to
|
determine data transport reliability
|
|
Data Link Layer 2 has the collision domain to
|
determine data transport reliability
|
|
Data Link Layer 2 - define the broacast domain.
|
A group of nodes that can receive each others broadcast messages and are segmented by routers.
|
|
Data Link Layer 2 - define the collision domain.
|
A group of nodes that share the same media and are segmented by switches.
|
|
CSMA/CD
|
Carrier Sense Multiple Access Collision Dectection
|
|
Define CSMA/CD
|
a access method that sends a jam signal to notify the devices that there has been a collision.
|
|
Routers segment
|
broadcast domains
|
|
Switches segment
|
collision domains.
|
|
Broadcast domains are segmented by
|
routers
|
|
Collision domains are segmented by
|
switches
|
|
Data Link Layer 2 is responsible for error
|
notification
|
|
Data Link Layer 2 is not responsible for error
|
correction
|
|
Data Link Layer 2 is responsible for Network
|
topology
|
|
Data Link Layer 2 is responsible for flow
|
control
|
|
Data Link Layer 2 is the only layer that has
|
sublayers
|
|
Data Link Layer 2 has two sublayers
|
MAC and LLC
|
|
Data Link Layer 2 has two sublayers that provides
|
physical addressing and flow control
|
|
Data Link Layer 2 sublayer MAC define
|
the hard coded addresson the network interface controller (NIC)
|
|
Data Link Layer 2 sublayer MAC must be
|
unique
|
|
Data Link Layer 2 sublayer MAC must consist of
|
48 bits
|
|
Data Link Layer 2 sublayer MAC must be displayed by
|
12 hexadecimal digits
|
|
Data Link Layer 2 sublayer MAC first 6 hexadecimal digits define
|
the vendor code assigned by the NIC manufacturer.
|
|
Data Link Layer 2 sublayer MAC has a broadcast value of
|
FFFF FFFF FFFF
|
|
Data Link Layer 2 sublayer LLC is responsible for
|
framing, error and flow control.
|
|
Data Link Layer 2 sublayer LLC provides a SAP
|
Service Access Point identifier in the frame.
|
|
Data Link Layer 2 sublayer LLC provides a SAP. The SAP field of the fram consists of
|
One byte that identifies an upper layer protocol.
|
|
Data Link Layer 2 sublayer LLC provides a DSAP
|
Destination Service Access Point.
|
|
Data Link Layer 2 sublayer LLC provides a SSAP
|
Source Service Access Point.
|
|
Data Link Layer 2 uses two devices: List the two
|
Bridges and switches
|
|
Data Link Layer 2 uses two devices: The first is a bridge: define
|
bridges connect two segments in a signle network or two networks together.
|
|
Data Link Layer 2 uses two devices: The second is a switch: define
|
at layer two switches are multiport bridges that utilize ASCII to forward frames. Each port of the switch has a dedicated bandwidth.
|
|
Switch dedicated bandwidth enables the switch to
|
guarantee the speed assigned to the port.
|
|
Broadcast domains are segmented at the
|
Network Layer by routers
|
|
Physical Layer 1 moves
|
bits between nodes
|
|
Physical Layer 1 assist with the
|
activation, maintenance, and deactivation between devices.
|
|
Physical Layer 1 include the specification of
|
voltage, wire speed and pin-out cables.
|
|
Physical Layer 1 include the capability to
|
receive and transmit a data signal.
|
|
Physical Layer 1 include the identification of the
|
interface that is set up between the DTE/DCE
|
|
Physical Layer 1 DTE
|
Data terminal equipment
|
|
Physical layer 1 DCE
|
Data communications equipment
|
|
Physical Layer 1 define the e___________ requirements.
|
electrical
|
|
Physical Layer 1 define the m___________ requirements.
|
mechanical
|
|
Physical Layer 1 define the p___________ requirements.
|
procedural
|
|
Physical Layer 1 define the f___________ requirements.
|
functional
|
|
Physical Layer 1 DTE is the
|
locally attached device
|
|
Physical Layer 1 DCE is the
|
Equipment found at the service provider.
|
|
Physical Layer 1 DTE can be accessed with a
|
model or a channel service/data service unit (CSU/DSU)
|
|
OSI Layer Communication - each layer passes information to adjecent layers using
|
Protocol Data Units (PDU's)
|
|
OSI Layer Communication - the PDU includes
|
both the message and the protocol/control information from the forwarding layer.
|
|
OSI Layer Communications PDU control information can be in the form of a
|
header or trailer
|
|
OSI Layer Communications of adding a header or trailer to the PDU at each layer is called
|
encapsulation
|
|
Application Layer 7 Control Information Name
|
Data
|
|
Transport Layer 4 Control information Name
|
Segment
|
|
Network Layer 3 Control Information Name
|
Packet
|
|
Data Link Layer 2 Control Information Name
|
Frame
|
|
Physical Layer 1 Control Information Name
|
Bit
|
|
Data encapsulation order 1
|
Data which occurs at application layer 7
|
|
Data encapsulation order 2
|
Segment which occurs at transport layer 4
|
|
Data encapsulation order 3
|
Packet which occurs at network Layer 3
|
|
Data encapsulation order 4
|
frame which occurs at data link layer 2
|
|
Data encapsulation order 5
|
Bit which occurs at physical layer 1
|
|
Summary:
Application layer 7 provides an interface between a host's commuication software and the necessary expternal applications. |
Layer 7
|
|
Summary: Application Layer 7 Evaluates what resources are necessary and the available resources for communication between two devices
|
Layer 7
|
|
Summary: Application Layer 7 synchonizes client/server applications.
|
Layer 7
|
|
Summary: Application Layer 7 provides error control and data integrity between applications
|
Layer 7
|
|
Summary: Application Layer 7 provides system independant processes to a host
|
Layer 7
|
|
Summary: Presentation Layer 6 presents data to the application Layer
|
Layer 6
|
|
Summary: Presentation Layer 6 acts as a data format translator
|
Layer 6
|
|
Summary: Presentation Layer 6 handles the structuring of data and negotiating data transfers syntax to layer 7
|
Layer 6
|
|
Summary: Presentation Layer 6 processes involved include data encryption, decryption, compression and decompression
|
Layer 6
|
|
Summary: Session Layer 5 handles dialog control among devices
|
Layer 5
|
|
Summary: Session Layer 5 determines the beginning, middle and end of a session or conversation that occurs between applications (intermediary)
|
Layer 5
|
|
Summary: Transport Layer 4 manages end to end connections and data delivery between two hosts
|
Layer 4
|
|
Summary: Transport Layer 4 segments and reassembles data
|
Layer 4
|
|
Summary: Transport Layer 4 provides transparent data transfer by hiding details of the transmission from the upper layers.
|
Layer 4
|
|
Summary: Network Layer 3 determines best path for packet delivery across the network.
|
Layer 3
|
|
Summary: Network Layer 3 determines logical addressing, which can identify the destination of a packet or datagram.
|
Layer 3
|
|
Summary: Network Layer 3 uses data packets (IP, IPX) and route update packets (RIP, EIGRP)
|
Layer 3
|
|
Summary: Network Layer 3 uses routed protocols IP, IPX, and Appletalk DDP.
|
Layer 3
|
|
Summary: Network Layer 3 devices include routers and layer 3 switches
|
Layer 3
|
|
Summary: Data Link Layer 2 ensures reliable data transfer from the network layer to the physical layer
|
Layer 2
|
|
Summary: Data link Layer 2 oversees physical or hardware addressing
|
Layer 2
|
|
Summary: Data link Layer 2 formats packets into a frame
|
Layer 2
|
|
Summary: Data Link layer 2 provides error notification
|
Layer 2
|
|
Summary: Data Link Layer 2 devices included bridges and layer 2 switches
|
Layer 2
|
|
Summary: Physical layer 1 moves bits between nodes
|
Layer 1
|
|
Summary: Physical layer 1 assists with the activation, maintenance, and deactivation of physical connectivity between devices
|
Layer 1
|
|
Summary: Physical layer 1 devices include hubs and repeaters.
|
Layer 1
|