Chapter 03 - Reading Organizer

advertisement
Chapter 3
After completion of this chapter, you should be able to:



Explain how rules are used to facilitate communication.
Explain the role of protocols and standards organizations in facilitating interoperability in
network communications.
Explain how devices on a LAN access resources in a small to medium-sized business network.
3.1 Rules of Communication
1. All communication methods have three elements in common, these are?
a. Source or sender
b. Destination or receiver
c. Channel or media
2. List the common computer protocols.
a. Message encoding
b. Message formatting and encapsulation
c. Message size
d. Message timing
e. Message delivery options
3. The first step to sending a message is encoding it. What is encoding?
Encoding is the process of converting information into another, acceptable form, for
transmission.
4. How is decoding different from encoding?
Decoding reverses this process in order to interpret the information.
5. What is encapsulation?
The process of placing one message format (the letter) inside another message format (the
envelope) is called encapsulation.
6. Explain how long messages or large frames are handled in a network to ensure delivery?
The size restrictions of frames require the source host to break a long message into individual
pieces that meet both the minimum and maximum size requirements of the sender.
7. Explain the following terms.
1
a. Message Timing –
People use timing to determine when to speak, how fast or slow to talk, and how long to wait
for a response. These are the rules of engagement.
b. Access Method –
Access method determines when someone is able to send a message.
c. Collision –
If two people talk at the same time, a collision of information occurs and it is necessary for the
two to back off and start again
d. Flow Control –
Timing affects how much information can be sent and the speed that it can be delivered.
Source and destination hosts use flow control to negotiate correct timing for successful
communication.
e. Response Timeout –
Hosts on the network have rules that specify how long to wait for responses and what action to
take if a response timeout occurs.
8. Explain the following terms.
a. Unicast –
A one-to-one delivery option is referred to as a unicast, meaning that there is only a single
destination for the message.
b. Multicast –
When a host needs to send messages using a one-to-many delivery option, it is referred to as a
multicast. Multicasting is the delivery of the same message to a group of host destinations
simultaneously.
c. Broadcast –
2
If all hosts on the network need to receive the message at the same time, a broadcast is used.
Broadcasting represents a one-to-all message delivery option. Additionally, hosts have
requirements for acknowledged versus unacknowledged messages.
3.2 Network Protocols and Standards
9. Explain what a protocol suite is and what devices implement or use them?
A group of inter-related protocols necessary to perform a communication function. Protocol suites are
implemented by hosts and networking devices in software, hardware or both.
10. What is a protocol stack?
A protocol stack shows how the individual protocols within a suite are implemented.
11. In a protocol stack the protocols are viewed in terms of layers. How do these layers interact with
each other?
Each higher level service depends on the functionality defined by the protocols shown in the
lower levels
12. What do the lower layers in the protocol stack focus on?
a. Moving data over the network
b. Providing services to the upper layers
12. What do the upper layers in the protocol stack focus on?
The content of the message being sent.
13. What are the three layers in the protocol stack?
a. Physical layer
b. Rules layer
c. Content layer
14. For devices to successfully communicate, a network protocol suite must describe precise
requirements and interactions. What do networking protocols define?
A common format and set of rules for exchanging messages between devices.
15. List some common networking protocols.
3
a. IP
b. HTTP
c. DHCP
16. Describe some of the processes networking protocols are responsible for.
a. How the message is formatted or structured.
b. The process by which networking devices share information about pathways with other
networks.
c. How and when error and system messages are passed between devices.
d. The setup and termination of data transfer sessions.
17. Explain in detail how the following protocols operate. (in detail means more than one sentence)
Application Protocol - Hypertext Transfer Protocol (HTTP) –
Is a protocol that governs the way a web server and a web client interact. HTTP defines the
content and formatting of the requests and responses that are exchanged between the client
and server.
Transport Protocol - Transmission Control Protocol (TCP) –
Is the transport protocol that manages the individual conversations between web servers and
web clients. TCP divides the HTTP messages into smaller pieces, called segments. These
segments are sent between the web server and client processes running at the destination
host. TCP is also responsible for controlling the size and rate at which messages are exchanged
between the server and the client.
Internet Protocol – IP –
4
Is responsible for taking the formatted segments from TCP, encapsulating them into packets,
assigning them the appropriate addresses, and delivering them across the best path to the
destination host.
Network Access Protocols –
Network access protocols describe two primary functions, communication over a data link and
the physical transmission of data on the network media. Data-link management protocols take
the packets from IP and format them to be transmitted over the media. The standards and
protocols for the physical media govern how the signals are sent and how they are interpreted
by the receiving clients. An example of a network access protocol is Ethernet.
18. The protocols IP, HTTP, and DHCP are all part of the Internet protocol suite known as:
Transmission Control Protocol/IP (TCP/IP)
19. The TCP/IP protocol suite is an open standard. Explain what that means.
These protocols are freely available to the public, and any vendor is able to implement these
protocols on their hardware or in their software.
20. Explain what a standards-based protocol is.
It is a process or protocol that has been endorsed by the networking industry and ratified, or
approved, by a standards organization.
21. Explain in detail why it’s important to have standard based protocols.
The use of standards in developing and implementing protocols ensures that products from
different manufacturers can interoperate successfully. If a protocol is not rigidly observed by a
particular manufacturer, their equipment or software may not be able to successfully
communicate with products made by other manufacturers.
22. Explain in detail what proprietary protocols are.
Proprietary means that one company or vendor controls the definition of the protocol and how
it functions. Some proprietary protocols can be used by different organizations with permission
from the owner. Others can only be implemented on equipment manufactured by the
proprietary vendor.
23. Is Cisco’s EIGRP routing protocol proprietary or non-proprietary?
5
Non-proprietary
24. The IP suite is a suite of protocols required for transmitting and receiving information using the
Internet. It is commonly known as TCP/IP.
25. What year was the TCP and IP protocols formalized?
1981
26. What year did Cisco launch its first routing innovation?
1986
27. Explain the protocol steps involved in during the communication process after a remote computer
requests a webpage from a web server.
a. The web server’s Hypertext Markup Language (HTML) page is the data to be sent.
b. The application protocol HTTP header is added to the front of the HTML data. The header
contains various information, including the HTTP version the server is using and a status code
indicating it has information for the web client.
c. The HTTP application layer protocol delivers the HTML-formatted web page data to the
transport layer. The TCP transport layer protocol is used to manage the individual conversation
between the web server and web client.
d. Next, the IP information is added to the front of the TCP information. IP assigns the
appropriate source and destination IP addresses. This information is known as an IP packet.
e. The Ethernet protocol adds information to both ends of the IP packet, known as a data link
frame. This frame is delivered to the nearest router along the path towards the web client. This
router removes the Ethernet information, analyzes the IP packet, determines the best path for
the packet, inserts the packet into a new frame, and sends it to the next neighboring router
towards the destination. Each router removes and adds new data link information before
forwarding the packet.
f. This data is now transported through the internetwork, which consists of media and
intermediary devices.
g. The client receives the data link frames that contain the data and each protocol header is
processed and then removed in the opposite order that it was added. The Ethernet information
is processed and removed, followed by the IP protocol information, then the TCP information,
and finally the HTTP information.
h. The web page information is then passed on to the client’s web browser software.
6
28. Fill in the correct protocols.
29. Standards organizations are usually vendor-neutral, non-profit organizations established to develop
and promote the concept of open standards.
30. Explain the function and responsibility of each of the following standards organizations.
a. The Internet Society (ISOC) –
Is responsible for promoting open development, evolution, and Internet use throughout the
world. ISOC facilitates the open development of standards and protocols for the technical
infrastructure of the Internet, including the oversight of the Internet Architecture Board (IAB).
b. The Internet Architecture Board (IAB) –
Is responsible for the overall management and development of Internet standards. The IAB
provides oversight of the architecture for protocols and procedures used by the Internet.
c. The Internet Engineering Task Force (IETF) –
The IETF’s mission is to develop, update, and maintain Internet and TCP/IP technologies. One of
the key responsibilities of the IETF is to produce Request for Comments (RFC) documents,
which are a memorandum describing protocols, processes, and technologies for the Internet.
7
d. The Institute of Electrical and Electronics Engineers (IEEE) pronounced “I-triple-E” –
Is a professional organization for those in the electrical engineering and electronics fields who
are dedicated to advancing technological innovation and creating standards.
e. The International Organization for Standardization (ISO) –
Is the world’s largest developer of international standards for a wide variety of products and
services.
f. The Electronic Industries Alliance (EIA) –
Is an international standards and trade organization for electronics organizations. The EIA is
best known for its standards related to electrical wiring, connectors, and the 19-inch racks used
to mount networking equipment.
g. The Telecommunications Industry Association (TIA) –
Is responsible for developing communication standards in a variety of areas including radio
equipment, cellular towers, Voice over IP (VoIP) devices, satellite communications, and more.
h. The International Telecommunications Union-Telecommunication Standardization Sector (ITU-T) –
The ITU-T defines standards for video compression, Internet Protocol Television (IPTV), and
broadband communications, such as a digital subscriber line (DSL).
i. The Internet Corporation for Assigned Names and Numbers (ICANN) –
Coordinates IP address allocation, the management of domain names used by DNS, and the
protocol identifiers or port numbers used by TCP and UDP protocols.
j. The Internet Assigned Numbers Authority (IANA) –
Is a department of ICANN responsible for overseeing and managing IP address allocation,
domain name management, and protocol identifiers for ICANN.
31. The IEEE 802.3 and IEEE 802.11 standards are significant IEEE standards in computer networking.
Explain why.
a. 802.3 –
Defines Media Access Control (MAC) for wired Ethernet. This technology is usually for LANs, but
also has wide-area network (WAN) applications.
b. 802.11 –
Defines a set of standards for implementing wireless local-area networks (WLANs). This
standard defines the Open Systems Interconnection (OSI) physical and data link MAC for
wireless communications.
8
32. Match the standards organization to its correct description.
9
33. Explain the benefits to using a layered model to describe network protocols and operations.
10
a. Assists in protocol design, because protocols that operate at a specific layer have defined
information that they act upon and a defined interface to the layers above and below.
b. Fosters competition because products from different vendors can work together.
c. Prevents technology or capability changes in one layer from affecting other layers above and
below.
d. Provides a common language to describe networking functions and capabilities.
34. There are two basic types of networking models. Explain both:
a. Protocol model –
This model closely matches the structure of a particular protocol suite. The hierarchical set of
related protocols in a suite typically represents all the functionality required to interface the
human network with the data network. The TCP/IP model is a protocol model, because it
describes the functions that occur at each layer of protocols within the TCP/IP suite.
b. Reference model –
This model provides consistency within all types of network protocols and services by
describing what has to be done at a particular layer, but not prescribing how it should be
accomplished. A reference model is not intended to be an implementation specification or to
provide a sufficient level of detail to define precisely the services of the network architecture.
The primary purpose of a reference model is to aid in clearer understanding of the functions
and processes involved
35. What are the two most commonly used network models when discussing network functionality?
a. OSI
b. TCP/IP
36. Fill in the correct information to complete the two network models.
11
37. Explain what happens at each of the OSI model layers.
a. Application Layer –
Provides the means for end-to-end connectivity between individuals in the human network
using data networks.
b. Presentation Layer –
Provides for common representation of the data transferred between application layer
services.
c. Session Layer –
Provides services to the presentation layer to organize its dialogue and to manage data
exchange.
d. Transport Layer –
Defines services to segment, transfer, and reassemble the data for individual communications
between the end devices.
e. Network Layer –
Provides services to exchange the individual pieces of data over the network between identified
end devices.
f. Data Link Layer –
Protocols describe methods for exchanging data frames between devices over a common
media.
g. Physical Layer –
12
Describe the mechanical, electrical, functional, and procedural means to activate, maintain, and
de-activate physical-connections for bit transmission to and from a network device.
38. Explain what happens at each of the TCP/IP model layers.
a. Application Layer –
Represents data to the user, plus encoding and dialog control
b. Transport Layer –
Supports communication between diverse devices across diverse networks
c. Internet Layer –
Determines the best path through the network
d. Network Access Layer –
Controls the hardware devices and media that make up the network
39. Match the following terms to their definitions.
Data Link
Manages data exchange
Presentation
Bit Transmission
Session
Data Representation
Network
Exchanges frames between devices
Physical
Provides a data path or route
Application
Exchanges frames between devices
Network Access
Segments, transfers, and reassembles data
Transport
Determines the best path through a network
Internet
Organizes dialog – manages data exchange
3.3 Moving Data in the Network
40. What is segmentation?
13
Segmentation divides data into smaller, more manageable pieces to send over the network.
41. What are two primary benefits to segmenting data over a network?
a. By sending smaller individual pieces from source to destination, many different conversations
can be interleaved on the network.
b. Segmentation can increase the reliability of network communications.
42. The process used to interleave the pieces of separate conversations together on the network is
called?
Multiplexing.
43. What is the downside to using segmentation and multiplexing to transmit messages across a
network?
It is the level of complexity that is added to the process
44. As application data is passed down the protocol stack on its way to be transmitted across the
network media, various protocols add information to it at each level. This is commonly known as?
The encapsulation process
45. Explain what data encapsulation is.
Data encapsulation is the process that adds additional protocol header information to the data
before transmission.
46. How does de-encapsulation differ from encapsulation?
De-encapsulation is the process used by a receiving device to remove one or more of the
protocol headers.
47. Fill in the blanks on the graphic with the correct PDU name.
14
48. OSI model describes the processes of encoding, formatting, segmenting, and encapsulating data for
transmission over the network. What happens at the network layer and data link layer?
They are responsible for delivering the data from the source device or sender, to the
destination device or receiver.
49. A Layer 3 or Network layer IP address has two parts, list and explain both.
a. Network prefix –
The network prefix is used by routers to forward the packet to the proper network.
b. Host part –
The host part is used by the last router in the path to deliver the packet to the destination
device.
50. An IP packet contains two IP addresses, list and explain both.
a. Source IP address –
15
The IP address of the sending device.
b. Destination IP address –
The IP address of the receiving device. The destination IP address is used by routers to forward
a packet to its destination.
51. What is the purpose of a data link address?
The purpose of the data link address is to deliver the data link frame from one network
interface to another network interface on the same network.
52. What are other names for a data link address?
a. MAC address
b. Physical address
c. Burned-in address (BIA)
53. Which two addresses are required to send data to another host on the same network?
a. physical address
b. logical address
54. How can a source host can learn the numeric destination IP address of another host?
a. it may learn the IP address through the use of the Domain Name System (DNS)
b. it may know the destination IP address because the address is entered in the application
manually
55. What is Address Resolution Protocol or ARP used for?
To discover the MAC address of any host on the same local network.
56. Explain in detail how Address Resolution Protocol or ARP works?
The sending host sends an ARP Request message to the entire LAN. The ARP Request is a
broadcast message. The ARP Request contains the IP address of the destination device. Every
device on the LAN examines the ARP Request to see if it contains its own IP address. Only the
device with the IP address contained in the ARP Request responds with an ARP Reply. The ARP
Reply includes the MAC address associated with the IP address in the ARP Request.
57. Explain how a host sends a message to another host located on the same network?
16
It will forward the message directly. A host will use ARP to discover the MAC address of the destination
host. It includes the destination IP address within the packet header and encapsulates the packet into a
frame containing the MAC address of the destination and forwards it.
58. Explain how a host sends a message to a remote network?
It must use the router, also known as the default gateway. The default gateway is the IP address of an
interface on a router on the same network as the sending host.
59. If no default gateway address is configured in the host TCP/IP settings, or if the wrong default
gateway is specified, what happens to messages addressed to hosts on remote networks?
They cannot be delivered.
60. How does a local host learn the MAC address of its default gateway router?
It can use ARP to determine the MAC address
17
Download
Study collections