Friday, May 17, 2019

Data Communication Reviewer

referee DataCom Chapter 1-5 Chapter 1 Intranet- Restricted group on a company and exclusively allows internal employee access. Extranet- Type of mesh that allows outside v completionors special access to limited info in a company. protocols- Rules of communication. * An identified sender and telephone receiver * An agreed-upon method of communicating * Common language and grammar * Confirmation or acknowledgement requirements Elements of a Network * Rules or agreements protocols or how the center is semt, directed, received and interpreted. * Massages units of info that travels Medium means of interconnecting these doohickeys, can transport the messages* Devices devices on the profit exchange messages Messages- a generic term that encompasses forms of communication enabled by the Internet. Devices- several devices work to see that the message is properly directed to the source to the destination device. Icons- symbols that graphically presends lucre devices and media. * Desk top Computer * Laptop * boniface a computer dedicated to providing app services * IP Phone a digital phone* local atomic number 18a intercommunicate media * piano tuner media LAN switch close to common device for interconnect LANs * Firewall provides security to networks * Router helps direct messages among networks * Wireless router * Cloud summarize a group of networking devices * WAN media IP (Internet Protocal) & TCP (Transmission Control communication theory protocol) roughly common protocols * WWW HTTP * E-mail SMTP * Instant messae XMPP * IP telephony SIP Convergence coming unitedly of technologies onto a digital platform. It occurs when computer communications all use the same rules to transport their messages. Network computer architecture the conceptual plans on which a physical network is built. Fault tolerance- needs to function even if most components fail * Scalability- networks ability to grow & react to future changes * Quality of service- perf ormance take of services. Prioritize traffic and its characteristics to manage entropy. * and Security Packets-single message is broken into small blocks of data. Bandwidth- measure of the data-carrying capacity of the network. Chapter 2 Elements of communication * Message source, or sender * Destination, or receiver *Channel- media that provides pathway Network- refers to data networks carrying massages. Segmentation- all messages are broken into smaller pieces Multiplexing- occurs when segments of two messages can shuffle into each other and share the medium. * Increased might of network communication End device- a piece of equipment that is either the source or the destination of a message on a network. Host- an end device that sends or receives messages. Clients- other hosts that set up to chisel in and share info by the host servers *The host dish out is a unique physical address used by hosts inside a LAN. Intermediary device- connects the individual host to the network and connect five-fold individual network to form an internetwork. Network access devices* Internetwork devices * Communication severs * Modems * Security devices Network media Copper, Fiber-optic cable, Wireless Encoding- refers to the way data is converted to patterns of electrical, light, or electromagnetic energy. LAN- a group of end devices and users under the promise of a common administrator. WAN- a network that is used to connect LANs that are geographically far apart. Internetwork- is a collection of two or more LANs connected by WANs. Proprietary A limited-use protocol own by a company. Network Representations Network interface card (NIC)- provides the physical connection to the network at the PC or other host device. * Physical port- is a connector or outlet on a networking device where the media is connected to a host.* Interface- refers to how the device can allow 2 different networks to communicate. The organizations that order networking protocols are * IEEE Insti tute of Electrical and Electronics Engineers * IETF Internet Engineering Task Force Interaction of communications protocols * Hypertext Transfer Protocol (HTTP) common protocol that governs the way that a wind vane server and a web client interact. comport protocol Transmission Control Protocol (TCP) is the transport protocol that manages the individual conversations amid web servers and web clients. * Internetwork protocol * Network access protocols describes 2 primary functions Data-Link Management & the physical transmission of data on the media. molded Models describe the complex surgery of network communication. Open Systems Interconnection (OSI) is the most astray know internetwork reference model.Provides an abstract description of the network communication process. Developed by International Organization for normalization (ISO). Application, Representation, Session, Transport, Network, Data Link, Physical TCP/IP Model defines the 4 communication functions that p rotocols perform. * Application, Transport, Internet, Network Access Encapsulation- appendage of adding control info as it passes through the bottomed model Decapsulation- process of removing extra knowledge Protocol Data Unit (PDU) generic term for data at each level. Chapter 3 Presentation form has 3 primary functions * Coding and conversion of application layer data * Compression of the data * encryption of the data TCP/IP protocols Domain Name System (DNS) used to resolve internet names to IP address. * HTTP used to transfer files that make up the web pages of the WWW. * Simple get down Transfer Protocol (SMTP) used for the transfer of mail messages and attachments. * Telnet a terminal emulation protocol used to provide removed(p) access to servers and networking devices. * File Transfer Protocol (FTP) used for interactive file transfer between systems. service each executing program loaded on a device. Client/server model Deamon are describes as listening for a gather up from a client. Application layer services and protocolsPeer-to-peer networking and applications * 2 or more computers are connected through a network and can share resources such as printers and files without having a dedicated server. nslookup a utility that allows the user to manually query the name servers to resolve a given host name. ipconfig/displaydns displays all the cached DNS entries 3 common message types are * GET- is a client request for data. * POST and PUT- are used to send messages to that upload data to the web browser. E-Mail Server Processes * Mail Transfer Agent (MTA) process used to forward e-mail. * Mail Delivery Agent (MDA)Server Message resolution (SMB) a client/server file-sharing protocol. Chapter 4 Transport Layer provides transparent transfer of data between end users, providing reliable data transfer services to the upper layers. It enables applications on devices to communicate. * Tracking the individual communications * Segmenting data and managing each piece * Reassembling the segments * Identifying the different applications * Performing flow control between end users * enabling error recovery * Initiating a session Flow Control can prevent the loss of segments on the network and avoid the need for retransmission.Used to avoid buffer overflows. Two most common transport layer TCP (Transmission Control Protocol) incurs supernumerary overhead to gain functions. * Web browsers, E-mail, File transfers UDP (User Datagram Protocol) provide the basic functions for efficiently delivering the data pieces. Has the advantage of providing low-overhead data delivery. * DNS, Video streaming, Voice over IP (VoIP) 3 basic operations of reliability * Tracking transmitted data * Acknowledging received data * Retransmitting any unacknowledged data Socket refers only to the unique combination of IP address and port number.Internet Assigned Numbers Authority (IANA) assigns port number. incompatible types of ports * Well-kn own ports (0 to 1023) reserved for services and applications. * Registered ports (1024 to 49151) are assigned to user processes or applications. * Dynamic or hugger-mugger ports (49152 to 65535) also known as ephemeral ports, are usually assigned dynamically to client applications. netstat a command that is an important network utility that you can use to verify TCP connections. It lists the protocol in use, the local address and port number Datagram is a UDP segment (piece).Flags are six 1- smear fields view as control information used to manage the TCP processes * URG Urgent pointer field significant * ACK quotation field significant * PSH Push function * RST Reset the connection * SYN Synchronize sequence numbers * louver No more data from sender *flags have fields that the only value is 1 bit and, therefore, has only two values 1 or 0. 3 way handshake Step 1 SYN, Step 2 SYN and ACK, Step 3 ACK. Expectational acknowledgement occurs when TCP uses the acknowledgement number in segments sent back to the source to indicate the next byte in this session that the receiver expects to receive.Window size is the amount of data that a source can transmit before an acknowledgement must be received. Chapter 5 OSI Layer 3 provides services to exchange the individual pieces of data over the network between identified end devices. The network layer describes four tasks to be performed * Addressing packets with an IP address * Encapsulation is the process of adding that information. * Routing is the process router perform when receiving packets * Decapsulation is the process of removing encapsulation data at different layers. Source IP address is the IP address of the sending hostDestination IP address is the IP address of the receiving host. IP header contains the address information and some other bits that find the PDU as a network layer PDU. Packet is referred when an OSI layer 4 PDU has been encapsulated at the network layer. decamp is each r oute that a packet takes to reach the next device. Common network protocol * IPv4 most widely used network protocol. * IPv6 currently in use in some area. * Novell IPX a widely popular internetworking protocol in the 1980s and 19990s. * AppleTalk Apple Computers propriety networking protocol. Connectionless Network swear out (CLNS) a protocol used in telecommunication network. IPv4 basic characteristics * Connectionless * Best effort (unreliable) * Media independent * whatsoever networks have media restrictions and must enforce a Maximum Transmission Unit (MTU). Fragmentation is the process when the network layer builds the packets according to specification. Key fields * IP source addressing * IP destination addressing * Time to blend in (TTL) * Type of Service (ToS) * Protocol * Flag and Fragment Offset Other Key Fields * edition * Internet Header Length (IHL) * Packet Length * Identification Header Checksum * Options * Padding *Because broadcast do not travel beyond the n etwork boundary, the network is known as a broadcast domain. ingress router is the router a network uses to send and receive messages beyond the network. Hierarchical addressing is read from the most general information to the most specific. Subnetting the process when a large network needs to be divided into smaller subnets, additional network codes can be created using some of the bits designated for the host. *The default route is used when the destination network is not represented by any other route in the routing table.Next hop is the address of the device that will process the packet next. *The route info can be manually configured on the router, creating what is known as a static route. Dynamic routing when routers learn about routes automatically from other routers in the same internetwork. Routing Protocols are the set of rules by which routers dynamically share their routing information. * Routing Information Protocol (RIP) * Enhanced inner Gateway Protocol (EIGRP ) * Open Shortest Path First (OSPF) 3 key factors to consider when grouping hosts into a common network * Purpose * Ownership * Geographic location

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.