Networking Flashcards

1
Q

Define the Application Layer.

A

High-level protocols such as for resource sharing
or remote file access ,e.g. HTTP.

Directly interacts with end-user software. Provides network services to applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define the Presentation Layer.

A

Translation of data between a networking service
and an application; including character encoding, data compression and encryption/decryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define the Data link Layer.

A

Transmission of data frames between two nodes
connected by a physical layer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define the Physical Layer.

A

Transmission and reception of raw bit streams
over a physical medium.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define the session layer.

A

Managing communication sessions,
i.e., continuous exchange of information in the form of multiple back-and-forth transmissions between two nodes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define the Transport Layer.

A

Reliable transmission of data segments between
points on a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define the Network Layer.

A

Structuring and managing a multi-node network using packets. Protocol = IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What data unit is the application layer?

A

Data unit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What data unit is session layer?

A

data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What data unit is network layer?

A

packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What data unit is the session layer?

A

data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What data unit is the transport layer?

A

segments/ datagram

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What data unit is the presentation layer?

A

data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What data unit is the data link layer?

A

frames

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the components of an ethernet data frame?

A
  • destination mac addres
  • source mac address
  • Type
  • Data
  • CRC (cyclical redundancy check)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what are the three types of addresses in networking?

A

domain name, mac address and IP address

17
Q

What does CRC do?

A

error detection

18
Q

In an ethernet frame what does the type field do?

A

The Type field is used to determine how the payload is processed by the receiver.

19
Q

What does the IP protocol do?

A

Packet routing: determines the best path for packet travel within a network.

Addressing: Each device on a network is assigned a unique IP address which identifies the source and destination of the data packets, ensuring that the data is delivered to the correct device.

20
Q

what is ipv4s format?

A

consist of four octets, each represented by a decimal
number ranging from 0 to 255

21
Q

what is ipv6s format?

A

eight hextets, each represented by a four-digit
hexadecimal number

22
Q

Function of TCP ?

A

provides reliable, ordered, and error-checked delivery of a stream of data between applications running on hosts communicating via an IP network.

23
Q

function of UDP

A

provides unreliable communication, suitable for applications that
prioritise speed over reliability

24
Q

what does a port number do?

A

specifies a specific application/ process/ service
running on the host device.

25
In addition to an IP address what else does TCP and UDP provide?
a port number.
26
function of transport layer security?
provide security, including privacy (confidentiality), integrity, and authenticity through the use of cryptography, such as the use of certificates, between two or more communicating computer applications.
27
what are the 2 layers of TLS?
TLS record and the TLS handshake protocols.
28
How is the connection provided by TLS made to be private?
a symmetric-key algorithm is used to encrypt the data transmitted.
29
How is the connection provided by TLS made to be reliable?
each message transmitted includes a message integrity check using a message authentication code to prevent undetected loss or alteration of the data during transmission.
30
name all 5 of HTTP request methods
get post delete put patch
31
what does http get do
Requests a representation of the specified resource. GET should only retrieve data and should have no other effect.
32
what does http post do?
Used to submit an entity to the specified resource, often causing a change in state or side effects on the server.
33
what does http put do?
Replaces all current representations of the target resource with the request payload.
34
what does http delete do?
Removes all current representations of the target resource given by a URI.
35
what does http patch do?
Used to apply partial modifications to a resource.
36
explain the tls handshake procedure
The client and server agree to use TLS and begin a handshake. The client sends a list of supported cipher suites. The server chooses a compatible cipher and hash function and tells the client. The server sends a digital certificate containing its identity, CA information, and public key. The client validates the certificate. The client then generates session keys for secure communication. Once completed, a secure, encrypted connection is established using the session keys. If any step fails, the TLS handshake fails and no connection is made.