The OSI application layer Flashcards

(104 cards)

1
Q

What is the role of applications in the network?

A

Provide the means for generating and receiving data that can be transported along the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the 3 components of the application layer?

A

Applications, services and protocols.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the 1st (5) step that the application layer performs in OSI model communication?

A

People create the communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the 2nd (5) step that the application layer performs in OSI model communication?

A

Software and hardware convert communication into digital format

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the 3rd (5) step that the application layer performs in OSI model communication?

A

Application layer services initiate the data transfer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the 4th (5) step that the application layer performs in OSI model communication?

A

Each layer plays its role

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the 5th (5) step that the application layer performs in OSI model communication?

A

The application layer receives data from the network and prepares it for human use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is another role of the application layer in OSI model communication?

A

The application layer prepares human communication for transmission over a data network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does the application layer provide?

A

An interface between the applications we use to communicate and the underlying network over which messages are transmitted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are application layer protocols used for?

A

To exchange data between programs running on source and data hosts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the 1st (3) of the presentation layer’s primary functions?

A

Coding and conversion of Application layer to ensure data on the source device can be interpreted by the appropriate application on the destination device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the 2nd (3) of the presentation layer’s primary functions?

A

Compression of data in a manner that can be decompressed by the destination device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the 3rd (3) of the presentation layer’s primary functions?

A

Encryption of data for transmission and decryption when data reaches destination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What protocol stack is associated with the presentation layer?

A

No particular one

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Why is no particular protocol stack associated with presentation layer?

A

Multiple standards for image and video

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are some video standards?

A

Quicktime

Motion Picture Experts Group (MPEG)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is quicktime?

A

A specification for video and audio

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is MPEG?

A

A standard for video compression and coding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are some well known graphics image standards?

A

Graphics interchange format (GIF)
Joint photographics expert group (JPEG)
Tagged image file format (TIFF)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are GIF and JPEG?

A

Coding and compression standards for graphic images

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is TIFF?

A

Standard coding format for graphic images

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is the role of the session layer?

A

Create and maintain dialogues between source and destination applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is the 1st thing (3) the session layer does?

A

Handles exchange of information to initiate dialogues

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is the 2nd thing (3) the session layer does?

A

Handles exchange of information to keep dialogues active

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What is the 3rd thing (3) the session layer does?
Restarts sessions that are disrupted or idle for long periods of time
26
What is the role of TCP/IP application layer protocols.
Specify the format and control information necessary for many common internet functions
27
What is the 1st (5) of commonly known TCP/IP application layer protocols?
Domain Name Service (DNS) - Used to resolve internet names to IP addresses
28
What is the 2nd (5) of commonly known TCP/IP application layer protocols?
Hypertext transfer protocol (HTTP) - Used to transfer files that make up webpages of the world wide web
29
What is the 3rd (5) of commonly known TCP/IP application layer protocols?
Simple mail transfer protocol (SMTP) - Used to transfer mail messages and attachments
30
What is the 4th (5) of commonly known TCP/IP application layer protocols?
Telnet, a terminal emulation protocol - Used to provide remote access to servers and networking devices
31
What is the 5th (5) of commonly known TCP/IP application layer protocols?
File transfer protocol (FTP) - Used for interactive file transfer between systems
32
What defines the protocols in the TCP/IP suite?
Requests for comments (RFCs) - standards for TCP/IP suite
33
What is an executing program loaded on a device known as in the world of networks?
A process
34
What are the two forms of software programs or processes that provide access to a network in the application layer?
Applications and services
35
What are applications?
Software programs used by people to communicate over a network
36
What is a network-aware application?
An application that implements the application layer and can communicate directly with the lower levels of the stack
37
What are 2 examples of network aware applications?
Email client and web browser
38
How does and application or network service know what data formats and standards to use?
Protocols
39
What protocols does the application layer use?
The ones that are implemented in applications and network services
40
What components could 'Telnet' refer to?
Application, service or protocol
41
What is the 1st thing (4) that protocols specify in the application layer?
What messages are exchanged between source and destination hosts
42
What is the 2nd thing (4) that protocols specify in the application layer?
The syntax of the control commands
43
What is the 3rd thing (4) that protocols specify in the application layer?
The type and format for the data being transmitted
44
What is the 4th thing (4) that protocols specify in the application layer?
The appropriate methods for error notification and recovery
45
Which devices use application layer protocols during communication?
Source and destination
46
What is an examples of multiple protocols being used in the same conversation?
One protocol may specify how to establish network communication while another may describe the process for data transfer when the message is passed two another layer
47
What is the 1st (5) example of a message that a protocol will structure?
Requests for services
48
What layer are client/server processes in?
Application
49
What is the 2nd (5) example of a message that a protocol will structure?
Acknowledgements
50
What is the 3rd (5) example of a message that a protocol will structure?
Data messages
51
What is the 4th (5) example of a message that a protocol will structure?
Status messages
52
What is the 5th (5) example of a message that a protocol will structure?
Error messages
53
Protocols define message dialogues. What does this mean?
A message dialogue ensures a message gets the correct response and that corrected services are invoked when data transfer occurs
54
How does the client begin a client/server exchange?
By requesting data from the server
55
How does the server respond to a clients request in a client/server exchange?
By sending one or more streams of data to the client
56
What do application layer protocols describe in a client/server exchange?
Format of the requests and responses
57
What control information may be required in a client/server exchange?
User authentication | Identification of data file to be transferred
58
In an email example, what is the client role in a client/server exchange?
Email client issues a request for any unread email to the email server
59
In an email example, what is the server role in a client/server exchange?
Servers responds by sending requested email to client
60
Where does data flow in client/server exchange?
From server -> client and from client -> server
61
In general networking terms, what is a server?
A device that responds to requests from client appliations
62
What is the 1st (6) example of files that can be stored on servers?
Web page
63
What is the 2nd (6) example of files that can be stored on servers?
Document
64
What is the 3rd (6) example of files that can be stored on servers?
Database
65
What is the 4th (6) example of files that can be stored on servers?
Picture file
66
What is the 5th (6) example of files that can be stored on servers?
Video file
67
What is the 6th (6) example of files that can be stored on servers?
Audio file
68
How does a network printer work in a client/server exchange?
Print server delivers client print request to specified printer
69
Why might some servers require the authentication of user account information?
To verify if the user has permission to access particular data or a specific operation.
70
What do servers that authenticate user accounts rely on?
Central list of user accounts along with their permissions (for data and operations)
71
What is an example of permissions in FTP client/server?
When uploading, you may have permission to write to your specific folder, but not anybody elses folder
72
What is a server service, or process, sometimes called?
A daemon
73
Why are daemons described as 'listening'?
They are programmed to respond to any request of a service provided by that daemon
74
What does a daemon do when it "hears" a request from a client?
Exchanges appropriate messages with client, as dictated by its protocols, then sends client requested data in correct format
75
How must a server handle multiple client requests in order to succeed?
Simultaneously and seperately
76
How many application layer services could 1 application need?
Many
77
What does the application layer rely on to successfully manage multiple conversations?
Support from lower layer functions
78
What is the 1st (2) peer-to-peer networking form?
Peer-to-peer networking design
79
What is the 2nd (2) peer-to-peer networking form?
Peer-to-peer applications (P2P)
80
What is a peer-to-peer network?
Two or more computers are connected over a network and can share resources.
81
What is each end device on a peer-to-peer network known as?
A peer
82
What can each peer in a peer-to-peer network act as?
A client and a server on a per request basis
83
What is a simple example of a peer-to-peer network?
Two connected computers on a home network sharing a printer.
84
What is another example of a peer-to-peer network?
Two computers connected to a network that uses software applications to share resources between one another on the network
85
Where can information be found on a peer-to-peer network?
Anywhere on any connected device. It is decentralised.
86
Why is it difficult to enforce security and access policies on a peer-to-peer network?
Since user account information is not centralised, this information would have to be set up on every device connecting to the network
87
How does a P2P application differ from a P2P server?
A P2P application allows a device to act as a client and server in the same communication
88
What do P2P applications require?
Each end device to have a user interface and run a background service
89
What is the P2P hybrid system?
Resource sharing is decentralized but an index server stores the locations of resources
90
What is another role an index server can play?
It can help connect two peers, but after that, the peers only communicate with each other
91
What is the 1st (7) application layer service and port number?
Domain Name System (DNS) TCP/UDP Port 53
92
What is the 2nd (7) application layer service and port number?
Hypertext transfer protocol (HTTP) TCP Port 80
93
What is the 3rd (7) application layer service and port number?
Simple Mail Transfer Protocol (SMTP) TCP Port 25
94
What is the 4th (7) application layer service and port number?
Post Office Protocol (POP) TCP Port 110
95
What is the 5th (7) application layer service and port number?
Telnet TCP Port 23
96
What is the 6th (7) application layer service and port number?
Dynamic Host Configuration Protocol (DHCP) UDP Ports 67 and 68
97
What is the 7th (7) application layer service and port number?
File Transfer Protocol (FTP) TCP Ports 20 and 21
98
What is the 1st (4) basic DNS step?
User types in easy to use URL
99
What is the 2nd (4) basic DNS step?
DNS server matches URL (human address) with IP address (numeric address)
100
What is the 3rd (4) basic DNS step?
Numeric address is returned to client making requests of the server
101
What is the 4th (4) basic DNS step?
Legible name has been resolved into numbers by DNS
102
What are two advantages of domain names?
Easy to remember | If IP address is changed, user will not notice
103
What single format do DNS communications protocols use?
A message
104
What does the DNS protocol include the formats for?
Queries, responses and data formats