click below
click below
Normal Size Small Size show me how
NETW202 Ch 3
Application Layer Functionality and Protocols
Question | Answer |
---|---|
daemon | a computer program that runs in the background and is usually initiated as a process. Daemons often support server processes. |
peer | a host or node that participates in some form of a group. |
scheme | A plan, design, or program of action to be followed. Sometimes an addressing plan is called an addressing scheme. |
IP Address | A 32 bit number, written in dotted decimal notation, used by IP to uniquely identify an interface connected to an IP network. |
Domain Name | A name, as defined by DNS, that uniquely identifies a computer on the Internet. DNS servers can then respond to DNS requests by supplying the IP address that is used by the computer that has a particular domain name. |
Network Address | a dotted decimal number defined by the IPv4 protocol to represent a network or subnet. It represents the network that hosts reside in. Also called a network number or network ID. |
Resource Record | DNS data records. Their precise format is defined in RFC 1035. The most important fields in a resource record are Name, Class, Type, and Data. |
DNS Resolver | the client part of the DNS client server mechanism. A DNS resolver creates queries sent a across a network to a name server, interprets responses, and returns information to the requesting programs. |
nslookup | a service or a program to look up information in DNS. |
query | a request for information. Queries are answered with replies. |
cache | a temporary storage where data that has been retrieved or calculated and is accessed frequently can be stored. Reduces access time and reduces overhead of recalculating the data. |
Authoritative | a source of information that is highly reliable and known for its accuracy. |
Hypertext Transfer Protocol (HTTP) | Defines the commands, headers, and processes by which web servers and web browsers transfer files. |
Distributive | a method of computer processing in which different parts of a program run simultaneously on two or more computers that are communicating with each other over a network. |
Collaborative | Information systems that allow the creation of a document or documents that can be edited by more than one person in real time. |
Encryption | the process of obscuring information to make it unreadable without special knowledge, sometimes referred to as scrambling. |
Post Office Protocol (POP) | a protocol that allows a computer to retrieve email from a server. |
Simple Mail Transfer Protocol (SMTP) | An application protocol typically not used by end users. Used to send E-mail from users to the MX servers listed in DNS records as MTAs. |
Mail User Agent (MUA) | program used to download and send email. Email clients use POP3 to receive emails and use SMTP to send emails. Also called an email client. |
Spam | Unsolicited commercial Email |
Gateway | A general term that refers to different kinds of networking devices. Usually refers to a router. |
Dynamic Host Configuration Protocol (DHCP) | A protocol used to dynamically assign IP configurations to hosts. Assigns an IP Address, Subnet Mask, Gateway Address, and DNS servers. |
Subnet Mask | a dotted decimal number that helps identify the structure of IP addresses. The mask represents the network and subnet parts of related IP addresses with binary 1s and the host part of related IP addresses with binary 0s. |
Broadcast | a form of transmission where one device transmits to all devices within the network or on another network. |
Server Message Block (SMB) | An application level network protocol mainly applied to shared access to files, printers, serial ports, and misc. communications between nodes on a network. |
UNIX | A multi-user, muti-tasking operating system originally developed in the 1960s and 1970s by a group of AT&T employees at Bell labs. |
Interpret as Command (IAC) | In the Telnet application, commands ar always introduced by a character with the decimal code 255, known as an Interpret as Command (IAC) character. |
Session | a related set of communications transactions between two or more network devices. |
What number layer of the OSI model is application? | Layer 7 |
The TCP/IP application layer consists roughly of which three OSI layers? | The functionality of the TCP/IP application layer protocols fits roughly into the framework of the top three layers of the OSI model: Application, Presentation, and Session. |
HTTP is used to do what? | Transfer files that make up the wb pages of the World Wide Web. |
Post Office Protocol (POP) uses which port? | POP uses port 110 TCP (books says UDP, but that has to be wrong!) |
What is GET? | GET is a HTTP client request for data. |
What is the most popular network service? HTTP, FTP, Telnet, or E-mail? | E-mail, because the only other one that would come close, is HTTP, a protocol, not a service. |
FTP requires __________ connection(s) between client and server to successfully transfer files. | FTP requires two connections between the client and the server: one for the commands and replies and the other for the actual file transfer. |
DHCP enables clients on a network to do what? | Obtain IP addresses, Gateway Address, and DNS settings. |
Linux and UNIX use SAMBA, which is a version of what protocol? | Server Message Block (SMB) |
Which of the following is a connection using Telnet? FTP, TFTP, VTY, or AUX | Virtual Terminal session, VTY |
Is eBay a peer-to-peer or client/server application? | Client/Server |
In the client/server model, the device requesting the service is referred to as the __________? | Client |
HTTP is referred to as a request/response protocol. What are three typical message formats? | GET, PUT, and POST. GET is a request; PUT and POST provide uploading. |
DHCP allows the automation of what? | Assignement of IP addresses, subnet masks, gateway and other IP networking parameters. |
What does FTP stand for, and what is it used for? | File Transfer Protocol. It is used to moves files from one node to another. |