Uploaded by Jahi Gerald

Chapter 10 Study Guide

Name _______________________________________________________ Date ________________
Chapter 10 – Application Layer
 Study Guide
Tips for success: While answering the questions read Chapter 9 and review the summary.
All answers should be in RED type
After completion of this chapter, you should be able to:
Explain how the functions of the application layer, session layer, and presentation layer work
together to provide network services to end user applications.
Describe how common application layer protocols interact with end user applications.
Describe, at a high level, common application layer protocols that provide Internet services to
end-users, including WWW services and email.
Describe application layer protocols that provide IP addressing services, including DNS and
Describe the features and operation of well-known application layer protocols that allow for file
sharing services, including: FTP, File Sharing Services, SMB protocol.
Explain how data is moved across the network, from opening an application to receiving data.
10.1 Application Layer Protocols
1. Write in the correct layers of the OSI and TCP/IP models.
OSI Model
TCP/IP Model
Data Link
Network Access
2. What is the purpose of the application layer?
It is the layer that provides the interface between the applications we use to communicate and
the underlying network over which our messages are transmitted.
IST 166 – Network Fundamentals
Page 1
Luse – Spring 2018
3. List the common protocols that fall under the application Layer.
a. Hypertext Transfer Protocol (HTTP)
b. File Transfer Protocol (FTP)
c. Trivial File Transfer Protocol (TFTP)
d. Internet Message Access Protocol (IMAP)
e. Domain Name System (DNS) protocol
4. The presentation layer has three primary functions. These are:
a. Formats, or presents, data from the source device into a compatible form for receipt by the
destination device.
b. Compression of the data in a way that can be decompressed by the destination device.
c. Encryption of the data for transmission and the decryption of data upon receipt by the
5. List the common protocols that work in the presentation layer.
a. QuickTime
b. Motion Picture Experts Group (MPEG)
Graphic Image Formats:
a. Graphics Interchange Format (GIF)
b. Joint Photographic Experts Group (JPEG)
c. Portable Network Graphics (PNG)
6. Explain in detail the function of the session layer.
It functions at the session layer create and maintain dialogs between source and destination
applications. The session layer handles the exchange of information to initiate dialogs, keep
them active, and to restart sessions that are disrupted or idle for a long period of time.
7. The TCP/IP model Application layer is equal to which three OSI model layers?
a. Application
b. Presentation
c. Session
8. List the protocols that fall under the TCO/IP model Application layer.
a. Domain Name System (DNS)
b. Telnet
c. Simple Mail Transfer Protocol (SMTP)
d. Dynamic Host Configuration Protocol (DHCP)
e. Hypertext Transfer Protocol (HTTP)
f. File Transfer Protocol (FTP)
g. Trivial File Transfer Protocol (TFTP)
h. Bootstrap Protocol (BOOTP)
i. Post Office Protocol (POP)
j. Internet Message Access Protocol (IMAP)
9. The P2P network model involves two parts, these are:
IST 166 – Network Fundamentals
Page 2
Luse – Spring 2018
a. P2P networks
b. P2P applications
10. Why is it difficult to enforce security and access policies in networks containing more than
just a few computers?
P2P networks do not use centralized user accounts or access servers to maintain permissions.
11. A peer to peer (P2P) application allows a device to act as both a client and a server within
the same communication.
12. In the client - server model, the device requesting the information is called a client and the
device responding to the request is called a server.
13. At what layer of the OSI model is the Client and server processes are considered to be in?
Application layer
10.2 Well - Known Application Layer Protocols and Service
14. Three application layer protocols that are involved in everyday work or play are:
a. Hypertext Transfer Protocol (HTTP)
b. Simple Mail Transfer Protocol (SMTP)
c. Post Office Protocol (POP)
15. How does a browser interpret the three parts of the URL?
a. http - the protocol or scheme
b. www.cisco.com - the server name
c. index.html - the specific filename requested
16. HTTP is a
request/response protocol.
17. List and explain the three common message types used by HTTP.
a. GET – a client request for data
b. POST – POST and PUT are used to upload data files to the web server
c. PUT – PUT uploads resources or content to the web server
18. Is HTTP a secure protocol?
19. HTTPS uses the same client request server response process as HTTP. How is the data
stream encrypted before being transported across the network?
Secure Socket Layer (SSL)
20. Email is a
Store and forward method of sending, storing, and retrieving electronic messages across
a network.
IST 166 – Network Fundamentals
Page 3
Luse – Spring 2018
21. An email client does not communicate directly with another email client when sending
Explain what happens.
Both clients rely on the mail server to transport messages. This is true even when both users are
in the same domain.
22. Email supports three separate protocols for operation. These are:
a. Simple Mail Transfer Protocol (SMTP)
b. Post Office Protocol
c. Internet Message Access Protocol (IMAP)
23. Clients only use two application layer protocols to retrieve email. These are:
a. POP
24. What is the purpose of SMTP?
Simple Mail Transfer Protocol (SMTP) transfers mail reliably and efficiently.
25. Where must SMTP be running in order to operate correctly?
On both the client and the server
26. What port number does SMTP use?
27. What is the purpose of Post Office Protocol (POP)?
It enables a workstation to retrieve mail from a mail server.
28. What port number does POP use?
29. What is the purpose of Internet Message Access Protocol (IMAP)?
It is another protocol that describes a method to retrieve email messages.
30. Explain in detail how is IMAP different from POP?
When the user connects to an IMAP capable server, copies of the messages are downloaded to
the client application. The original messages are kept on the server until manually deleted.
Users view copies of the messages in their email client software. POP downloads the message
to the local account. No copy is kept on the server.
31. On the Internet, domain names, such as http://www.cisco.com, are much easier for people
to remember than, which is the numeric address for this server. Explain what
happens if Cisco decides to change the numeric address of www.cisco.com.
It is transparent to the user, because the domain name remains the same. The new address is
simply linked to the existing domain name and connectivity is maintained.
IST 166 – Network Fundamentals
Page 4
Luse – Spring 2018
32. What is the purpose of a Domain Name System (DNS)?
DNS uses a distributed set of servers to resolve the names associated with these numbered
33. Which Microsoft DOS command displays all of the cached DNS entries on a Windows
computer system?
ipconfig /displaydns
34. The DNS client, sometimes called the
DNS resolver
35. Computer operating systems have a utility called nslookup. What does this allow users to
It allows the user to manually query the name servers to resolve a given hostname.
36. What services does a DNS Server offer?
a. assignment of IP addresses
b. subnet masks
c. gateway
d. other IP networking parameters
37. How is DHCP a security risk?
DHCP can pose a security risk because any device connected to the network can receive an
38. Explain how DHCP operates.
The DHCP server maintains a pool of IP addresses and leases an address to any DHCP
enabled client when the client is powered on.
39. What is the purpose of FTP?
FTP was developed to allow for data transfers between a client and a server.
40. Explain what is a Server Message Block (SMB)?
It is a client/server file sharing protocol, developed by IBM in the late 1980s, to describe
the structure of shared network resources, such as directories, files, printers, and serial ports. It
is a request - response protocol.
41. SMB messages can:
a. Start, authenticate, and terminate sessions
b. Control file and printer access
c. Allow an application to send or receive messages to or from another device
42. SMB file - sharing and print services have become the mainstay of
Microsoft networking.
10.3 The Message Heard Around the World
IST 166 – Network Fundamentals
Page 5
Luse – Spring 2018
43. What is the application layer is responsible for?
Directly accessing the underlying processes that manage and deliver
communication through the network
IST 166 – Network Fundamentals
Page 6
Luse – Spring 2018
Random flashcards
Arab people

15 Cards


20 Cards


30 Cards

Create flashcards