CCNA V-1

Card Set Information

Author:
cxiong85
ID:
196507
Filename:
CCNA V-1
Updated:
2013-01-29 23:49:29
Tags:

Folders:

Description:
V-1
Show Answers:

Home > Flashcards > Print Preview

The flashcards below were created by user cxiong85 on FreezingBlue Flashcards. What would you like to do?


  1. OSI MODEL 1-7 OR 7-1
    • OSI Networking Model
    • (Please Do Not Throw Sausage Pizza Away)
    • 7-Physical->6-Data Link->5-Network->4-Transport->3-Session->2-Presentation->1-Application
  2. L-7
    APPLICATION
  3. APPLICATION
    • Where the end users themselves interact with the network. Authentication service also run at L-7, but encryption runs at the next layer.
    • The Application Layer ensures that the remote communication partner is available, that the needed communication resources exits (a modem, for example) or basically saying is the modem ready, and that both ends of the communication agree on procedures involving data integrity, privacy, and error recovery.
  4. Protocols and services that run at L-7
    • 1) (SMTP) & (POP3).
    • 2) Telnet
    • 3)HTTP
    • 4)FTP
    • 5)SNMP
  5. SMTP
    Email protocols Simple Mail Transfer Protocols  
  6. POP3
    Post Office Protocols 3
  7. Telnet or Telecommunication Network
    Was the original Internet or a protocol that allows you to connect to the remote computers over TCP/IP network aka Internet.
  8. HTTP
    Hypertext Transfer Protocols (HTTP): is a set of rules used for transferring files on the WWW.
  9. FTP
    File Transfer Protocols (FTP): is used to transfer files between computers or a network.
  10. SNMP
    Simple Network Management Protocol (SNMP): is used to monitor and map network availability, performance, and error rates.
  11. L-7 transmits what kind of data
    DATA
  12. L-6
    PRESENTATION
  13. PRESENTATION
    this layer answers one simple question; "How should this data be presented?" In addition to properly formatting data, encryption occurs at this layer.Have you ever opened a file in a work processing application, and you got pages of unrecognizable characters? THAT'S A PRESENTATION LAYER ISSUE. The applications have not agreed on how the data is to be presented.
  14. 4 Primary tasks that L-6 is concerned with
    • 1)Compatibility with the OS
    • 2)Proper encapsulation of data network transmission
    • 3)Data formatting (ascii, binary)
    • 4)Data encryption, compression, and translation
  15. SOME FILES THAT ARE USED ON L-6
    JPEG, ASCII, GIF, MPEG, MIDI, EBCDIC, and TIFF.
  16. WHAT WAS BEING TRANSLATED TO DATA AND @ WHAT LAYER?
    1'S AND 0'S. L-7
  17. OS OPERATES AT WHAT LAYER?
    L-6
  18. Encryption and at what Layer
    sealing data into a capsule in case it gets lost or stolen. L-6
  19. Encryption and @ what Layer?
    sealing data into a capsule in case it gets lost or stolen. L-6
  20. Translation and at what Layer
    translating data from 1 to 0, for application layer to understand. L-6
  21. L-5
    SESSION
  22. SESSION
    is like a manager of the two-way communication between two remote hosts. This is the layer that handles the creation, maintenance, and teardown of communications between those two hosts. The overall communication itself is referred to as a session.
  23. WHAT IS CONVERTED INTO DATA AND @ WHAT LAYER?
    SEGMENT HEADERS & L-5
  24. EXPLAIN SESSION
    is like a manager of the two-way communication between two remote hosts. This is the layer that handles the creation, maintenance, and teardown of communications between those two hosts. The overall communication itself is referred to as a session.
  25. L-4
    TRANSPORT
  26. TRANSPORT
    there are two methods for transporting data: connection-oriented, referring to Transport Control Protocol (TCP): is one of the main protocols in TCP/IP networks. Whereas the IP deals only with packets, TCP enables two hosts to establish a connection and exchange streams of data.TCP guarantees delivery of data and also guarantees that packets will be delivered in the same order in which they were sent, and connectionless, referring to User Datagram Protocols (UDP): does not guarantee the delivery of data, though the speed is fast.
  27. WHAT IS CONVERTED TO SEGMENT HEADERS AND @ WHAT LAYER?
    IP PACKETS & L-4
  28. WHAT IS TRANSPORT?
    decides how much information can be sent and received at one time. When communicating with a website, this layer determines how much information or data is communicated between you and the website.
  29. TCP
    TRANSPORT CONTROL PROTOCOL
  30. WHAT IS TCP?
    connection orientated or guaranteed that it will get to the destination.
  31. UDP
    USER DATAGRAM PROTOCOL
  32. WHAT IS UDP?
    connectionless is fast but unsecure.
  33. L-3
    NETWORK LAYER
  34. WHAT IS NETWORK LAYER?
    t's at L-3 of the OSI model that you and I as network admins begin to have a great deal of interaction with the network. IP runs at this layer, and since routers operate here at L-3, this layer is often called "the routing layer."
  35. WHAT IS CONVERTED TO IP PACKETS AND @ WHAT LAYER?
    FRAMES & L-3
  36. routing is a two-question process? WHAT ARE THE TWO QUESTION'S?
    • 1)What valid paths exist from the local router to a given destination?
    • 2)What is the best path (the "optimal path") to take to get there?'
  37. WHAT IS CONVERTED TO IP PACKETS AND @ WHAT LAYER?
    FRAMES AND L-3
  38. WHAT IS A ROUTER AND LAYER?
    determine valid path from the local router to the given destination. The router is the middle man that gets you to Facebook. L-3
  39. L-2
    DATA LINK
  40. DATA LINK
    The switches that we'll spend so much time with later in the course operates at L-2. WAPs also operate at this layer -more on WAPs in the Wireless section. Devices that you may well be using right now to access the Internet, cable modems and DSL modems, also run at L-2.
  41. What are the four major specifications that run here, some of which you may already be familiar with and @ what Layer?
    • Ethernet
    • HDLC
    • PPP
    • Frame Relay

    L-2
  42. WHAT IS HDLC AND @ WHAT LAYER?
    High Data Link Control. L-2
  43. WHAT IS PPP AND @ WHAT LAYER?
    Point-to-Point Protocol. L-2
  44. Error detection AND @ LAYER
    finding an error through something called the Frame Check Sequence (FCS), but this layer does not preform error recovery: actually doing something with the error,and they will not happen at the same time. FCS allows the recipient of the data at L-2 to verify the integrity of the data to make sure it was not corrupted during transmission. The recipient can not do anything about the quality of the transmission. Media Access Control (MAC) address: all network has an self assigned unique MAC address.L-2
  45. FCS AND @ LAYER?
    FRAME CHECK SQUENCE. L-2
  46. MAC ADDRESSES AND @ LAYER
    are sometimes called hardware addressesand physical addresses.That's bc a MAC address is physically burned into a piece of hardware or the Network Interface Card NIC, which leads to another name for this address -a burned-in address(BIA). L-2
  47. PHYSICAL ADDRESSES IS USED AT WHICH LAYER?
    L-2
  48. SWITCHES IN L-3?
    Switches do exists, but when operating at L-3, they're not switching or bridging. They're routing.
  49. WHAT IS CONVERTED INTO FRAMES AND LAYER?
    bit's. L-2
  50. WHAT LAYER DOES SWITCHES AND BRIDGES OPERATE ON?
    L-2
  51. L-1
    PHYSICAL LAYER
  52. PHYSICAL LAYER
    are all the components that connect the network together. Wiring and cabling.
  53. WHAT IS LOGICAL AND LAYER?
    you cannot touch but only program. L-1
  54. PHYSICAL AND LAYER?
    anything you can touch. L-1
  55. NIC AND LAYER?
    Network Interface Card NIC-your port to connect to the network. Think about where the Ethernet cable plugs into. L-1
  56. WHAT IS NOS AND LAYER?
    Networking Operating System NOS-emailing. L-1
  57. DATA FLOWING DOWN FROM L-7 TO L-1
    • L-7, L-6, and L-5: Data is simply data
    • L-4: Data is placed into segments
    • L-3: Data is placed into packets
    • L-2: Data is placed into frames
    • L-1: Data takes the form of bits (1's and 0's)
  58. DATA FLOWING DOWN AND THE UP WITH HEADERS?
    L-7: Data +/-header aka L7 Protocol Data Unit PDU and so on.L-6: Data +/-header L-5: Data +/-headerL-4: Data +-header L-3: Data +/-headerL-2: Data +/-trailer and header.
  59. WHAT IS SAME-LAYER?
    OSI layer removing the header. Ex. L-7 on the receiving end will remove only the header placed onto the data by the L-7 on the sending side and so forth. FYI: HAPPENS ON THE RECIEVER SIDE.
  60. WHAT IS ADJACENT LAYER?
    to the interaction between layers of the OSI model on the same host. Ex. L-1 interacts with L-2, and L-2 interacts with L-1 and L-3 and so on. FYI: HAPPENS ON THE SENDER OR USER THAT IS SENDING THE DATA.
  61. KNOWN PHRASE'S FOR TCP?
    • Guaranteed delivery
    • Error via sequence and ACK numbers
    • Windowing
    • "Connection-Oriented"
  62. KNOWN PHRASE'S FOR UDP?
    • "Best-effort" delivery, but no guarantee of delivery
    • No error detection
    • No Windowing
    • "Connectionless"
  63. 3 WAY HAND SHAKE 1ST PART?
    1)Data transmission: which begins with the Sender/Client transmitting a TCP segment with the Synchronization (SYN) bit set. In other words, Sender/Client sends SYN.
  64. 3 WAY HAND SHAKE 2ND PART?
    2)Recipient/Server: Responds with a TCP segment with both the SYN and Acknowledgement ACK bits set -"SYN/ACK"
  65. 3 WAY HAND SHAKE 3RD PART?
    3)Sender/Client: responds with an ACK, and 3 Way Handshake is complete.
  66. WHO USES 3 WAY HANDSHAKE?
    TCP
  67. SLINDING WINDOW AND FOR WHAT?
    refers to this dynamic adjustment of the window size. TCP
  68. TCP & UDP HAS WHAT 3 VALUES IN COMMON?
    they both have a source port, destination port, and checksum.
  69. TFTP
    Trivial File Transfer Protocol
  70. SMTP
    Simple Mail Transfer Protocol

What would you like to do?

Home > Flashcards > Print Preview