Study your flashcards anywhere!

Download the official Cram app for free >

  • Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

How to study your flashcards.

Right/Left arrow keys: Navigate between flashcards.right arrow keyleft arrow key

Up/Down arrow keys: Flip the card between the front and back.down keyup key

H key: Show hint (3rd side).h key

A key: Read text to speech.a key

image

Play button

image

Play button

image

Progress

1/74

Click to flip

74 Cards in this Set

  • Front
  • Back
Provides interface between software applications and network for interpreting application requests and requirements.
Application Layer Function
Gateways, Proxy Servers, Application Switches, Content Filtering Firewalls
Application Layer Hardware
BOOTP, DHCP, DNS, FTP, HTTP, HTTPS, IMAP4, PING, POP3, NSLOOKUP, NTP, SFTP, SMTP, Telnet, TFTP
Application Layer Protocols and Standards
Application Layer Number
7
Allows hosts and applications to use a common language; performs data formatting, encryption, and compression
Presentation Layer Function
Gateways, Proxy Servers, Application Switches, Content Filtering Firewalls
Presentation Layer Hardware
MIME, SSL, TLS
Presentation Layer Protocols and Standards
Presentation Layer Number
6
Establishes, Maintains, and Terminates user connections
Session Layer Function
Gateways, Proxy Servers, Application Switches, Content Filtering Firewalls
Session Layer Hardware
RTP, SIP
Session Layer Protocols and Standards
Session Layer Number
5
Ensures accurate delivery of data through flow control, segmentation and reassembly, error correction, and acknowledgment
Transport Layer Function
Gateways, Proxy Servers, Application Switches, Content Filtering Firewalls
Transport Layer Hardware
TCP, UDP
Transport Layer Protocols and Standards
Transport Layer Number
4
Establishes network connections; translates network addresses into their physical counterparts and determines routing
Network Layer Function
Routers, Layer 3 Switches, Firewalls, Gateways, Proxy Servers, Application Switches, Content Filtering Firewalls
Network Layer Hardware
ARP, ICMP, IGMP, IP, IPSec, RARP
Network Layer Protocols and Standards
Network Layer Number
3
Packages data in frames appropriate to network transmission method
Data Link Layer Function
Bridges, Switches, Wireless access points, NICs, Modems, Cable Modems, DSL Modems, Gateways, Proxy Servers, Application Switches, Content Filtering Firewalls
Data Link Layer Hardware
L2TP, PPP, PPTP, SLIP
Data Link Layer Protocols and Standards
Data Link Layer Number
2
Manages signaling to and from physical network connections
Physical Layer Function
Hubs, Repeaters, NICs, Modems, Cable Modems, DSL Modems
Physical Layer Hardware
IEEE 802.3 (Ethernet)
802.5 (Token Ring)
802.11 (Wi-Fi)
Physical Layer Protocols and Standards
Physical Layer Number
1
An Application layer protocol in the TCP/IP suite that uses a central list of IP addresses and their associated devices' MAC addresses to assign IP addresses to clients dynamically. It was the precursor to DHCP
BOOTP (Bootstrap Protocol)
An Application layer protocol in the TCP/IP suite that manages the dynamic distribution of IP addresses on a network. Using it to assign IP addresses can nearly eliminate duplicate-addressing problems.
DHCP (Dynamic Host Configuration Protocol)
A hierarchical way of tracking domain names and their addresses, devised in the mid-1980s. Its database does not rely on one file or even one server, but rather is distributed over several key computers across the internet to prevent catastrophic failure if one or a few computers go down. It is a TCP/IP service that belongs to the Application layer of the OSI model.
DNS (Domain Name System or Domain Name Service)
An Application layer protocol used to send and receive files via TCP/IP
FTP (File Transfer Protocol)
An Application layer protocol that formulates and interprets requests between Web clients and servers.
HTTP (Hypertext Transfer Protocol)
The URL prefix that indicates that a Web page requires its data to be exchanged between client and server using SSL encryption. Uses the TCP port number 443, rather that port 80
(HTTP over Secure Sockets Layer)
HTTPS
the most commonly used form of Internet Message Access Protocol (IMAP).
(Internet Message Access Protocol, version 4)
IMAP4
A TCP/IP troubleshooting utility that can verify that TCP/IP is installed, bound to the NIC, configured correctly, and communicating with the network. It uses ICMP to send echo request and echo reply messages that determine the validity of an IP address.
(Packet Internet Groper)
PING
The most commonly used form of the Post Office Protocol. An Application Layer protocol used to retrieve messages from a mail server. When a client retrieves mail via POP, messages previously stored on the mail server are downloaded to the client's workstation, and then deleted from the mail server.
(Post Office Protocol, version 3)
POP3
A TCP/IP utility that allows you to look up the DNS host name of a network node by specifying its IP address, or vice versa. This ability is useful for verifying that a host is configured correctly and for troubleshooting DNS resolution problems.
NSLOOKUP
A simple Application layer protocol in the TCP/IP suite used to synchronize the clocks of computers on a network. It depends on UDP for Transport layer services
(Network Time Protocol)
NTP
A protocol available with proprietary version of SSH that copies files between hosts securely. Like FTP, it first establishes a connection with a host and then allows a remote user to browse directories, list files, and copy files. Unlike FTP, it encrypts data before transmitting it.
(Secure File Transfer Protocol)
SFTP
The Application layer TCP/IP subprotocol responsible for moving messages from one e-mail server to another.
(Simple Mail Transfer Protocol)
SMTP
An Application layer protocol in the TCP/IP suite used to convey data regarding the statusof managed devices on a network.
(Simple Network Management Protocol)
SNMP
A terminal emulation protocol used to log on to remote hosts using the TCP/IP protocol. It resides in the Application layer of the OSI model.
Telnet
Application layer protocol that enables file transfers between computers. Unlike FTP, it relies on UDP at the Transport layer and does not require a user to log on to the remote host.
(Trivial File Transfer Protocol) A TCP/IP
TFTP
A standard for encoding and interpreting binary files, images, video, and non-ASCII character sets within an e-mail message.
(Multipurpose Internet Mail Extensions)
MIME
A method of encrypting TCP/IP transmissions-including Web pages and data entered into Web forms-en route between the client and server using public key encryption technology.
(Secure Sockets Layer)
SSL
A version of SSL being standardized by the IETF (Internet Engineering Task Force). With it, the IETF aims to create a version of SSL that encrypts UDP as well as TCP transmissions. It, which is supported by new Web browsers, uses slightly different encryption algorithms than SSL, but otherwise is very similar to the most recent version of SSL.
(Transport Layer Security)
TLS
A Transport layer protocol used with voice and video transmission. it operates on top of UDP and provides information about packet sequence to help receiving nodes detect delay and packet loss. It also assigns packets a timestamp that corresponds to when the data int he packet was sampled from the voice or video stream. This timestamp helps the receiving node synchronize incoming data.
(Real-time Transport Protocol)
RTP
Which of the following is an example of a MAC address?

BB:BB:BB:BB:BB:BB:BB:BB
131.54.34.141
131.0.0.3
02:45:FD:1C:E6:31
02:45:FD:1C:E6:31
Prior to the OSI model different vendors

worked together to standardize products
transmitted data using the same set of rules
used a variety of transmission methods
had the same set of rules for data transmission
used a variety of transmission methods
Plug and Play compatibility refers to a function that

is not supported by the OSI Model
was first developed by IBM
requires user intervention or installation of software
None of the above.
None of the above.
If data is transmitted using a snychronous bit method, a _________ signal is part of the transmission.

start bit
end bit
timing
clocking
clocking
The OSI model was designed to provide

a standardized framework for data communications
a non-standard model for data processing
a framework for the Internet
a way of identifying uncommon elements that enabled transfer
a standardized framework for data communications
In the on state, a bit of data is set to

3
2
1
0
1
In an effort to predict future network needs, the ISO created the open model in beta format during the late

1960s
1970s
1980s
1990s
1970s
A timing function that allows devices to understand when the signal starts and stops is

bit synchronization
bit monitoring
coordinated transmission
None of the above.
bit synchronization
________ is a topology of a network that requires a central switch or a hub and drop cables to each node on the segment.

Mesh
Star
Bus
Ring
Star
ISO is an acronym for

International Services Organization
International Standards Organization
International Systems Office
None of the above.
International Standards Organization
Which of the following is an example of the type of information that may be included in the header?

source address
destination address
port number
All of the above.
source address
Which layer(s) is(are) involved in getting informaiton that you enter into an application on your computer transmitted across the network to another computer?

Application layer only
layers 1, 2, and 3 only
only the Transport layer
all layers
all layers
A category of digital encoding schemes is

amplitude
current-state encoding
phase shift keying
frequency shift keying
amplitude
The OSI Model contains _______ layers.

7
8
9
11
7
A function that moves a packet from the source machine to the destination machine across multiple networks is called a

router
connector
delivery connection
None of the above.
router
As data moves through different layers of the OSI model, each layer adds a

footnote
token packet
layer
header
header
Which of the following layers is responsible for handling the logical address of network devices and packet routing?

Data Link
Physical
Network
Transport
Network
At the Application (layer)level, the data is called

PDUs
packets
frames
bits
PDUs
Stress on a transmitted signal causes degradation which is known as

deflagration
distortion
attenuation
amplification
attenuation
Which of the following are clocking methods?

guaranteed state change
separate clock signals
over sampling
All of the above.
over sampling
The OSI model

specifies a framework for data transmission
defines specific criteria for protocols and devices
requires that vendors adhere to the characteristics of each layer
does not support Plug and Play
specifies a framework for data transmission
The OSI layer that turns data from upper layers into bits for transmission is called

Presentation
Transport
Data Link
Network
Data Link
There are _____ major topologies, excluding wireless.

8
6
4
2
4
When using baseband transmissions _________ use(s) the entire capacity of the media to send the data.

two signals
four signals
one signal
many signals
one signal
The purpost of the ISO is to _________ standards throughout the world.

eliminate
unify
revise
diversify
unify
A ________ signal allows the sending and receiving nodes to get in synch with each other and identify the beginning and enc of a transmitted message.

clocking
timing
end bit
start bit
clocking