Protocols and Models Flashcards

1
Q

People exchange ideas using many different communication methods. However, all communication methods have the following three elements in common:

A

-Message source (sender)
-Message Destination (receiver)
-Channel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a message source (sender)?

A

Message sources are people, or electronic devices, that need to send a message to other individuals or devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a message destination (receiver)?

A

The destination receives the message and interprets it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a channel?

A

This consists of the media that provides the pathway over which the message travels from source to destination.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are protocols?

A
  • Sending a message, whether by face-to-face communication or over a network, is governed by rules called protocols.
    -These protocols are specific to the type of communication method being used.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the five steps to how communication occurs in a computer network?

A

-Message source
-Transmitter
-Transmission medium
-Receiver
-Message Destination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Prior to communicating, the devices must agree on how to __________. They must also _______ the message in a way that is understandable.

A

communicate, format

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Before communicating with one another, individuals must use ___________ ____ or __________ to govern the conversation.

A

established rules, agreements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Messages should be written using _____ (i.e. _________) that are necessary for effective communication.

A

rules, protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Protocols must account for the four following requirements to successfully deliver a message that is understood by the receiver:

A

-An identified sender and receiver
-Common language and grammar
-Speed and timing of delivery
-Confirmation or acknowledgment requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

In addition to identifying the ________ and _________, computer and network protocols define the details of how a message is transmitted across a network.

A

source, destination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Common computer protocols include the five following requirements:

A

-Message encoding
-Message formatting and encapsulation
-Message size
-Message timing
-Message delivery options

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is encoding?

A

Encoding is the process of converting information into another acceptable form, for transmission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is decoding?

A

Decoding reverses the process of encoding to interpret the information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the seven steps to encoding and decoding a message across a network?

A

-Message source
-Encoder
-Transmitter
-Transmission Medium “The Channel”
-Receiver
-Decoder
-Message Destination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Messages sent across the network are first converted into ____ by the sending host.

A

bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

When a message is sent from ______ to __________, it must use a specific format or structure. ________ _______ depend on the type of message and the channel that is used to deliver the message.

A

source, destination, Message formats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Similar to sending a letter, a message that is sent over a computer network follows specific _______ _______ for it to be delivered and processed.

A

format rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

IP is responsible for sending a message from the ________ _______ to _________ over one or more ________.

A

message source, destination, networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

When a long message is sent from one host to another over a network, it is necessary to break the message into _______ _____.

A

smaller pieces

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

The rules that govern the size of the pieces, or ______, communicated across the network are very ______. They can also be _______, depending on the _______ used. Frames that are too long or too short are not _______.

A

frames, strict, different, delivered

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

The ____ ___________ of frames require the source host to break a long message into individual pieces that meet both the __________ and _________ size requirements.

A

size restrictions, minimum, maximum

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

The long message will be sent in separate ______, with each ______ containing a piece of the ________ _________. Each frame will also have its own __________ __________.

A

frames, frame, original message, addressing information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

At the receiving host, the individual pieces of the message are ___________ into the original message.

A

reconstructed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Message timing is also very important in network communications. Message timing includes the three following:

A

-Flow control
-Response timeout
-Access method

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is flow control?

A

-This is the process of managing the rate of data transmission.
-Defines how much information can be sent and the speed at which it can be delivered.
-There are network protocols used by the source and destination devices to negotiate and manage the flow of information.
————————————————–
Ex. For example, if one person speaks too quickly, it may be difficult for the receiver to hear and understand the message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is response timeout?

A

-Hosts use network protocols that specify how long to wait for responses and what action to take if a response timeout occurs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What is access method?

A

-When a device wants to transmit on a wireless LAN, the WLAN network interface card (NIC) determines whether the wireless medium is available.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What are three types of data communications?

A

-Unicast
-Multicast
-Broadcast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What is unicast?

A

Information is being transmitted to a single-end device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What is multicast?

A

Information is being transmitted to one or more end devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What is broadcast?

A

Information is being transmitted to all end devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Networking documents and topologies often represent networking and end devices using a ______ ______. _____ are typically represented as a ______.

A

node icon, Nodes, circle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

You know that for end devices to be able to communicate over a network, each device must abide by the same ___ ___ ____. These rules are called _______ and they have many functions in a network.

A

set of rules, protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What is a network protocol?

A

Network protocols define a common format and protocols for exchanging messages between devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Protocols are implemented by ___ _______ and __________ ________ in software, hardware, or both.

A

end devices, intermediary devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What are four different protocols required to enable communications across one or more networks?

A

-Network Communications Protocols
-Network Security Protocols
-Routing Protocols
-Service Discovery Protocols

38
Q

What are network communications protocols? Give three examples.

A

-Protocols that enable two or more devices to communicate over one or more networks.
-The Ethernet family includes IP, Transmission Control Protocol (TCP), Hypertext Transfer Protocol (HTTP)

39
Q

What are network security protocols? Give three examples.

A
  • Protocols secure data to provide authentication, data integrity, and data encryption.
    -Ex. Secure Shell (SSH), Secure Sockets Layer (SSL), and Transport Layer Security (TLS).
40
Q

What are routing protocols? Give two examples.

A

-Protocols enable routers to exchange and compare route information and then select the best path to the destination network.
-Ex. Open Shortest Path First (OSPF) and Border Gateway Protocol (BGP)

41
Q

What are service discovery protocols? Give two examples.

A

-Protocols are used for the automatic detection of devices or services.
-Ex. Dynamic Host Configuration Protocol (DHCP) and Domain Name System (DNS)

42
Q

________ _________ _______ are responsible for a variety of functions necessary for network communications between ____ _______.

A

Network communication protocols, end devices

43
Q

Computers and network devices use agreed-upon _________ to communicate.

A

protocols

44
Q

What are six examples of agreed-upon protocols computers and network devices use to communicate?

A

-Addressing
-Reliability
-Flow control
- Sequencing
-Error detection
-Application interface

45
Q

What is addressing? Give three examples.

A

-This identifies the sender and the intended receiver of the message using a defined addressing scheme.
-Ex. Ethernet, IPv4, and IPv6.

46
Q

What is reliability? Give one example.

A

-This function provides guaranteed delivery mechanisms in case messages are lost or corrupted in transit.
-Ex. TCP provides guaranteed delivery.

47
Q

What is flow control? Give one example.

A

-This function ensures that data flows at an efficient rate between two communicating devices.
-Ex. TCP provides flow control services.

48
Q

What is sequencing? Give one example.

A

-This function uniquely labels each transmitted segment of data.
-The receiving device uses the sequencing information to reassemble the information correctly.
-This is useful if the data segments are lost, delayed or received out-of-order.
-Ex. TCP provides sequencing services.

49
Q

What is error detection? Give four examples.

A

-This function is used to determine if data became corrupted during transmission.
-Various protocols that provide error detection include Ethernet, IPv4, IPv6, and TCP.

50
Q

What is the application interface? Give two examples.

A

-This function contains information used for process-to-process communications between network applications.
-Ex. when accessing a web page, HTTP or HTTPS protocols are used to communicate between the client and server web processes.

51
Q

What are four common network protocols that are used when a device sends a request to a web server for its web page?

A

-HTTP
-TCP
-IP
-Ethernet

52
Q

What is Hypertext Transfer Protocol (HTTP)?

A

-Governs the way a web server and web client interact.
-It defines the content and formatting of the requests/responses exchanged between the client/server.
-HTTP relies on other protocols to govern how messages are transported between client/server.

53
Q

What is Transmission Control Protocol (TCP)?

A

-Manages the individual conversations.
-It’s responsible for the reliable delivery of the information and managing flow control between end devices.

54
Q

What is Internet Protocol (IP)?

A

-It’s responsible for delivering messages from the sender to the receiver.
-It’s used by routers to forward messages across multiple networks.

55
Q

What is the Ethernet protocol?

A

This protocol is responsible for the delivery of messages from one NIC to another NIC on the same Ethernet LAN.

56
Q

What are network protocol suites?

A

-A protocol suite is a group of interrelated protocols necessary to perform a communication function.
-Protocols need to work with other protocols so that your online experience gives you everything you need for network communications.

57
Q

One of the best ways to visualize how the protocols within a suite interact is to view the interaction as a _____.

A

stack

58
Q

What is a protocol stack?

A
  • A protocol stack shows how the individual protocols within a suite are implemented.
    -The protocols are viewed in terms of layers, with each higher-level service depending on the functionality defined by the protocols in the lower levels.
59
Q

What is the purpose of the lower layers of a stack?

A

The lower layers of the stack are concerned with moving data over the network and providing services to the upper layers.

60
Q

What is the purpose of the higher layers of a stack?

A

The higher layers of the stack are focused on the content of the message being sent.

61
Q

What are four examples of protocol suites?

A

-Internet Protocol Suite (TCP/IP)
-Open Systems Interconnection (OSI) protocols
-AppleTalk
-Novell NetWare

62
Q

What is Internet Protocol Suite (TCP/IP)

A

-Is the most common/relevant protocol suite used today.
-It’s an open standard protocol suite maintained by the Internet Engineering Task Force (IETF).

63
Q

What are the Open Systems Interconnection (OSI) protocols?

A

-Family of protocols developed jointly in 1977 by the International Organization for Standardization (ISO) and the International Telecommunication Union (ITU).
-Includes the seven-layer OSI reference model which categorizes the function of its protocols.

64
Q

What is AppleTalk?

A

-A short-lived proprietary protocol suite released by Apple in 1985 for Apple devices.
-In 1995, Apple adopted TCP/IP to replace Apple Talk.

65
Q

What is Novell Netware?

A

-A short-lived proprietary protocol suite/network operating system developed by Novell Inc. in 1983.
-It used the IPX network protocol.
-In 1995, Novell adopted TCP/IP to replace IPX.

66
Q

What are the four layers of TCP/IP?

A

-Network Access
-Internet
-Transport
-Application

67
Q

Name four examples of services provided by TCP/IP at the Internet Layer.

A

-IPv4
-IPv6
-ICMPv4
-ICMPv6

68
Q

Name two examples of services provided by TCP/IP at the transport layer.

A

-TCP
-UDP

69
Q

Name four examples of services provided by TCP/IP at the application layer.

A

-HTTP
-DNS
-DHCP
-FTP

70
Q

Name two examples of services provided by OSI at the internet layer.

A

-CONP/CMNS
-CLNP-CLNS

71
Q

Name five examples of services provided by OSI at the transport layer.

A

-TP0
-TP1
-TP2
-TP3
-TP4

72
Q

Name four examples of services provided by OSI at the application layer.

A

-ACSE
-ROSE
-TRSE
-SESE

73
Q

Name three examples of services provided by both OSI and TCP/IP at the network access layer.

A

-Ethernet
-ARP
-WLAN

74
Q

TCP/IP protocols are available for the __________, __________, and _______ _____. There are no TCP/IP protocols in the ______ _______layer.

A

application, transport, internet layers, network access

75
Q

The most common network access layer LAN protocols are __________ and ___ protocols.

A

Ethernet, WLAN (wireless LAN)

76
Q

Network access layer protocols are responsible for…

A

delivering the IP packet over the physical medium.

77
Q

_____ is the protocol suite used by the internet and the networks of today.

A

TCP/IP

78
Q

TCP has two important aspects for vendors and manufacturers:

A

-Open standard protocol suite
-Standards-based protocol suite

79
Q

What is an open standard protocol suite?

A

It’s freely available to the public and can be used by any vendor on their hardware/software.

80
Q

What is a standards-based protocol suite?

A

It has been endorsed by the networking industry and approved by a standards organization.

81
Q

What is SLACC (Stateless Address Autoconfiguration)?

A

A method that allows a device to obtain its IPv6 addressing information without using a DHCPv6 server.

82
Q

What is SMTP (Simple Mail Transfer Protocol)?

A

Enables clients to send email to a mail server and enables servers to send email to other servers.

83
Q

What is POP3 (Post Office Protocol version 3)?

A

Enables clients to retrieve email from a mail server and download the email to the client’s local mail application.

84
Q

What is IMAP (Internet Message Access Protocol)?

A

Enables clients to access email stored on a mail server as well as maintaining email on the server.

85
Q

What is FTP (File Transfer Protocol)?

A

-Sets the rules that enable a user on one host to access and transfer files to and from another host over a network.
-FTP is a reliable, connection-oriented, and acknowledged file delivery protocol.

86
Q

What is SFTP (SSH File Transfer Protocol)?

A

As an extension to Secure Shell (SSH) protocol, SFTP can be used to establish a secure file transfer session in which the file transfer is encrypted.

87
Q

What is TFTP (Trivial File Transfer Protocol)?

A

A simple, connectionless file transfer protocol with best-effort, unacknowledged file delivery. It uses less overhead than FTP.

88
Q

What is REST (Representational State Transfer)?

A

A web service that uses application programming interfaces (APIs) and HTTP requests to create web applications.

89
Q

What is TCP (Transmission Control Protocol)?

A

Enables reliable communication between separate hosts and provides reliable transmissions that confirm successful delivery and is connection-oriented.

90
Q

What is UDP (User Datagram Protocol)?

A

-Enables a process running on one host to send packets to a process running on another host.
-However, UDP does not confirm successful datagram transmission and is connectionless.

91
Q
A