Chapter 7 Flashcards
(25 cards)
Name the layers of the DOD model.
Network Access
Internet
Host to HOst
Process/Application p. 312
What layer of the DOD model are the majority of the TCP/IP protocols found?
Process/Application. (there are dozens)p. 313
Name the protocols at the Host to Host layer.
TCP User Diagram (UDP) p. 313
What is the HTTP protocol designed to do?
Browse the internet p. 314
What is the FTP protocol designed to do?
File downloads. p. 314
What does the RDP protocol designed to do?
connect to remote computers and manage programs p. 314
What does the Dynamic Host Configuration Protocol (DHCP) do?
It dynamically assigns IP addresses and other IP configuration information to network clients. p.314
What does the DNS (Domain Name System) service do?
It services protocol TCP/UDP in the Host to Host layer. It Finds IP addresses p. 314 Resolves host names to IP addresses p. 324 Because of DNS if you type out coke or toyota in your browser it can find the right page. p. 325
How do you know if you are on a secure website?
if it has HTTPS p. 315
What does the Internet Message Access Protocol (IMAP) protocol do?
A secure protocol desgined to download e mail. It replaced the POP 3 protocol. p. 316
What does the Lighweight Directory Access Protocol (LDAP) do?
Designed to access information stored in an information directory, typically known as the LDAP directory or LDAP database. p. 316
What does the Simple Network Management Protocol (SNMP) do?
gathers and manages network performance information. p. 317 an SNMP server can be set up to collect data from these devices called agents and ensure your network is operating properly ie monitor connectivity devices.
What does the Telnet protocol do?
It allows another person to see into another computer in a window on their screen. p. 318
What is the major difference between the UDP and TCP protocols in the host to host layer?
TCP guarnantees packet delivery through the use of a virtual circuit and data acknowledgements and UDP does not. p. 318
How do UDP and TCP use port numbers?
It manages incoming connections by using port numbers to keep track of incoming users and make sure the data gets to the right application and right end user. When a client makes a request it must do so at a specific port ie assigns HTTP requests to port 80.
What port is the DNS service registerd under?
53 (TCP/UDP)
What are three support protocols to the IP protocol at the Internet layer?
Internet Control Message Protocol (ICMP) which sends error messages;Address Resolution Protocol (ARP) resolves logical IP addresses to physical MAC addresses built into network cards; and Revers ARP resolves MAC to IP. p. 320
Give an example of heirarchal addressing scheme.
telephone numbers, addresses, IP addresses p. 321
What are the two components of the IP address?
Network ID and the Host ID p. 322
Define subnet mask.
It allows the computer to differeentiate where the network ID ends and the host address begins. It is written like an IP address. 255 is the highest number. (indicates network portion) p. 322
What three requirements are required to communicate using TCP/IP?
IP address
subnet mask
default gate which identifies the IP address of the device that will allow the host to connect outside the local network. ie router. p. 322
How many Class A networks are there?
126 [/ 323
What are some protocols that must be installed on a computer before it is internet capable?
DHCP and DNS p. 324
What does the Network Address Translation (NAT) do?
Because there is a finite number of public addresses private networks have private addresses. They need a NAT to translate the private nonroutable IP addresses into public IP addresses. p. 325