Sunteți pe pagina 1din 3

SEMESTER 1 Chapter 3

Application Layer Functionality and Protocols


V 4.0

3.1.1. What does the application the interface between the applications we use
1 layer provide? to communicate and the underlying network
over which our messages are transmitted
What are application layer to exchange data between programs running
protocols used for? on the source and destination hosts
3.1.1. What are the three primary Coding and conversion of Application layer
2 functions of the data to ensure that data from the source
Presentation Layer? device can be interpreted by the appropriate
application on the destination device.
Compression of the data in a manner that can
be decompressed by the destination device.
Encryption of the data for transmission and the
decryption of data upon receipt by the
destination.
What is the main function of create and maintain dialogs between source
the session layer? and destination applications
3.1.1. What do the Application the format and control information necessary
3 Layer protocols of the for many of the common Internet
TCP/IP protocol specify? communication functions
3.1.2 What are the two forms of applications and services
software programs or
process that provide
network access in the
Application Layer
3.1.3 What do protocols provide? the rules and formats that govern how data is
treated
What is the difference Applications interact with the user and services
between an application and prepare data for the network
a service?
What do application layer Protocols provide the rules and formats that
protocols do? govern how data is treated.
3.1.4 What 6 things do protocols 1. processes on either end of the
define? communication
2. types of messages
3. syntax of messages
4. meaning of any informational fields
5. how messages are sent and the
expected response
6. interaction with the nextlower layer
3.2.1 What is the difference the device requesting the information is called
between a client and a a client and the device responding to the
server? request is called a server
3.2.2 In general networking sense any device that responds to requests from
what is a server? client applications is functioning as a server
Describe the 2 processes a "listening" for a request from a client, because
daemon uses (listening and they are programmed to respond whenever the
hears)? server receives a request for the service
provided by the daemon
"hears" a request from a client, it exchanges
appropriate messages with the client, as
required by its protocol, and proceeds to send
the requested data to the client in the proper
format
3.2.3. Complete the packet tracer
2 lab examine a number of
packets to see what each
packet contains.
3.2.4 What is a peer-to-peer two or more computers are connected via a
network? network and can share resources (such as
printers and files) without having a dedicated
server
Are peer-to-peer networks No
easy to secure?
3.2.4. What are peer-to-peer allows a device to act as both a client and a
2 applications? server within the same communication
3.3.1 What do port numbers applications and Application layer services that
identify? are the source and destination of data
What does the DNS defines an automated service that matches
protocol do? resource names with the required numeric
network address.
3.3.1. What does the nslookup allows the user to manually query the name
2 utility allow you to do? servers to resolve a given host name
What does the command Displays all of the cached DNS entries on a
ipconfig /displaydns show? Windows XP or 2000 computer system
3.3.1. What happens if a DNS It passes the request on to another DNS
3 server does not have a server
name in its stored records?
If the same request is made In its cache
again where does the DNS
server look?
3.3.1. When is a server declared When the resource is directly held on that
4 to be an authoritative server
server?
3.3.2. Define the three parts of a http:- protocol
1 url as listed on the page? www.cisco.com- name of server
web-server.htm- name of file or page
What type of request is sent GET
to the server when
retrieving a web page?
3.3.2. What does the POST Sends information to the web server
2 command do?
What does the PUT Sends resources or content to the web server
command do?
What protocol is used for HTTPS:
secure transmission across
the web?
3.3.2. Packet Tracer Lab
3
3.3.3 What 2 Application Layer POP (Post Office Protocol) and SMTP (Simple
protocols are used in Mail Transfer Protocol)
sending and receiving
email?
What is another name for MUA Mail User Agent
an email application?
3.3.3. What are the two processes MTA Mail Transfer Agent
2 that email servers perform? MDA Mail Delivery Agent
3.3.3. What happens to emails in Converted to a proprietary protocol for mail
3 many companies once the delivery
email reaches the internal
server?
3.3.3. List and describe some of HELO - identifies the SMTP client process to
4 the commands used by the the SMTP server process
SMTP protocol. EHLO - Is a newer version of HELO, which
includes services extensions
MAIL FROM - Identifies the sender
RCPT TO - Identifies the recipient
DATA - Identifies the body of the message
3.3.4 What is File Transfer developed to allow for file transfers between a
Protocol (FTP)? client and a server
What are the 2 ports used 21- Used for control
and their purpose in FTP? 20- Used for actual file transfer
3.3.5 What does Dynamic Host allows a host to obtain an IP address
Confirmation Protocol dynamically when it connects to the network
(DHCP) do for a network?
3.3.5. What are the 4 types of DHCP Discover
2 messages sent and DHCP Offer
received in DHCP? DHCP Request
DHCP Acknowledge
3.3.6 What is SMB (Server the structure of shared network resources,
Message Block)? such as directories, files, printers, and serial
ports
3.3.6. What are the 3 message Start, authenticate, and terminate sessions
2 types of SMB messages? Control file and printer access
Allow an application to send or receive
messages to or from another device
3.3.8 What does the Telenet provides a standard method of emulating text-
application provide? based terminal devices over the data network.
3.3.8. What protocol is SSH (Secure Shell protocol)
2 recommended alternative to
Telnet when security is a
concern?

S-ar putea să vă placă și