Term
|
Definition
Open System Interconnection International standardization program created by ISO and ITU-T to develop standards for data networking that facilitate multivendor equipment interoperability |
|
|
Term
|
Definition
The sending station of a transmission |
|
|
Term
|
Definition
Simple Mail Transfer Protocol Protocol for e-mail transmissions across the Internet Uses port 25 |
|
|
Term
|
Definition
Domain Name System Translates domain names (computer hostnames) to IP addresses |
|
|
Term
|
Definition
Service that provides the IP address of a web site or domain name so a host can connect to it |
|
|
Term
|
Definition
Service that allows administrators to login to a host from a remote location and control the host as though they were logged in locally |
|
|
Term
|
Definition
Uses Simple Mail Transfer Protocol (SMTP), Post Office Protocol (POP3) or Internet Message Access Protocol (IMAP)
Used to send e-mail messages from clients to servers over the Internet
Recipients are specified using the user@xyz format |
|
|
Term
|
Definition
Dynamic Host Configuration Protocol Service that assigns the IP address subnet mask default gateway and other information to clients |
|
|
Term
|
Definition
Uses Hypertext Transfer Protocol (HTTP)
Used to transfer information between web clients and web servers
Most web pages are accessed using HTTP |
|
|
Term
|
Definition
File Transfer Protocol Service that allows for the download and upload of files between a client and server |
|
|
Term
|
Definition
The rules governing the form of communication |
|
|
Term
|
Definition
A related set of communications transactions between two or more network devices
In Systems Network Architecture (SNA), a logical connection enabling two network addressable units (NAUs) to communicate |
|
|
Term
|
Definition
Define processes on either end of the communication Define the types of messages Define the syntax of messages Define the meaning of any informational fields Define how messages are sent and the expected response Define interaction with the next lower layer |
|
|
Term
|
Definition
A network architecture that connects a client to a server whereupon the client accesses services provided by the server |
|
|
Term
|
Definition
To transmit data to a server or to another receiving device |
|
|
Term
|
Definition
To transmit data to a client or to another receiving device |
|
|
Term
|
Definition
a computer program that runs in the background and usually initiated as processes |
|
|
Term
|
Definition
A plain, design, or program of action to be followed Sometimes an addressing plan is an addressing SCHEME |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
FTP
port 20 is for actual file transfer and is created every time there is a file transferred
port 21 is used for control traffic, consisting of client commands and server replies |
|
|
Term
|
Definition
Network layer address referring to a logical, rather than a physical, network device. Also called a protocol address |
|
|
Term
|
Definition
Resource Records (RRs) are the DNS data records. Their precise format is defined in RFC 1035. The most important fields in a resource record are Name, Class, Type, and Data |
|
|
Term
|
Definition
In Unix/Linux computer systems, resolver is a set of software routines used for making, sending and interpreting query and reply messages with Internet domain name servers |
|
|
Term
|
Definition
nslookup is a service or a program to look up information in the Domain Name System (DNS) |
|
|
Term
|
Definition
Message used to inquire about the value of some variable or set of variables |
|
|
Term
|
Definition
A source of information that is highly reliable and known for its accuracy |
|
|
Term
|
Definition
|
|
Term
|
Definition
An authoritative name server |
|
|
Term
|
Definition
The canonical name (or Fully Qualified Domain Name) for an alias; used when multiple services have the single network address but each service has its own entry in DNS |
|
|
Term
|
Definition
mail exchange record; maps a domain name to a list of mail exchange servers for that domain |
|
|
Term
|
Definition
A temporary storage where data that is accessed frequently can be stored. Once the data is stored in the cache, accessing the cached copy instead of accessing the original data, so that the average access time is lower. For example a proxy server that as a cache |
|
|
Term
|
Definition
Data which has had a specific algorithm applied so as to alter appearance of the data making it incomprehensible to those who are not authorized to see the information |
|
|
Term
|
Definition
Mail User Agent allows messages to be sent and places received messages into the client's mailbox, both of which are distinct processes |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
the function of a subnet mask is to identify the network portion, the subnet portion and the host portion of an IP address. Sub netting is a means of dividing the network and breaking a large or extremely large network up into smaller, more efficient and manageable segments, or subnets |
|
|
Term
|
Definition
a device on a network that serves as an access point to another network. a default gateway is used by a host when an IP packet's destination address belongs to someplace outside the local subnet. a router is a good example of a default gateway |
|
|
Term
|
Definition
in TCP, ACK is used in the initial 3 way handshake to acknowledge the sending station's sequence number and in the actual sending of data the ACK is used to acknowledge sent segments. |
|
|
Term
|
Definition
|
|
Term
|
Definition
Server Message Block is an application-level network protocol mainly applied to shared access to files, printers, serial ports, and miscellaneous communications between nodes on a network |
|
|
Term
List the seven step process for converting human communications to data |
|
Definition
1. The user inputs data using a hardware interface 2. Software and hardware convert data to a digital format 3. Application services initiate the data transfer 4. OSI layers encapsulate data down the stack 5. Encapsulated data travels across the media to the destination 6. OSI layers at the destination decapsulate the data up the stack 7. Data is ready to be processed by the end device |
|
|
Term
Describe the two forms of Application layer software and the purpose of each |
|
Definition
Applications and Services
Applications are designed to interact with us. Application is software for the user. If the device is a computer, the application is typically initiated by the user. Although there may be many layers of support underneath, application software provides an interface between humans and the hardware. The application will initiate the data transfer process when the user presses the Send button, or a similar action.
Services are background programs that perform function in the data network. Services are invoked by a device connecting to the network or by an application. For example, a network service can provide functions that transmit data or provide conversion of data in a network. In general, services are not directly accesssible or seen by the end user. They provide the connection between an application and the network |
|
|
Term
what is the meaning of the terms Server and Client in the context of data networks? |
|
Definition
The source end of data communication is referred to as the "server" and the receiving end is called the "client." The client and server processes are application layer services that provide the foundation for data network connectivity |
|
|
Term
|
Definition
The state of a network when there is not sufficient bandwidth to support the amount of network traffic |
|
|
Term
|
Definition
Data that guides a process. A flag in a data-link frame is an example of control data. |
|
|
Term
|
Definition
|
|
Term
|
Definition
A data packet that traverses an IP based network |
|
|
Term
|
Definition
Flow control is the management of data flow between devices in a network. It is used to avoid too much data arriving before a device can handle it, causing data overflow |
|
|
Term
|
Definition
the unique combination of IP addresses and port number, for example, 192.168.1.20:80 |
|
|
Term
|
Definition
Ports that range from 0-1023 |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
Well Known (Contact) Ports |
|
|
Term
|
Definition
|
|
Term
|
Definition
Private and/or Dynamic Ports |
|
|
Term
|
Definition
a process that establishes a TCP session between two endpoints. The process is as follows: 1. a client wishes to communicate with a server 2. in response, the server responds with a SYN-ACK 3. the client then send an ACK (usually called SYN-ACK-ACK) back to the other end and the session is established |
|
|
Term
|
Definition
a base 16 numeral system whose characters begin at 0-9 and A-F (to represent 10-15) |
|
|
Term
|
Definition
acknowledgments are sent by receiving stations to sending stations to confirm receipt of data |
|
|
Term
|
Definition
TCP uses window size to determine the number of segments sent by the sending device before the receiving device sends a confirmation |
|
|
Term
|
Definition
an addressing scheme in which a network is partitioned into sections, with the section identifier forming one part of each destinations address, and the destination identifier forming another |
|
|
Term
|
Definition
the next point of routing. when routers are not directly connected to the destination network, they will have a neighboring router that provides the next step in routing the data to its destination |
|
|
Term
|
Definition
Maximum transmission unit. Maximum packet size, in bytes, that a particular interface can handle. |
|
|
Term
|
Definition
a logical network composed of all the computers and networking devices that can be reached by sending a frame to the data link layer broadcast address |
|
|
Term
|
Definition
number of bits that are used to define the subnet mask. for example the subnet mask 255.255.0.0 is a /16 prefix |
|
|
Term
|
Definition
Port Address Translation. a feature of a network device that translate TCP or UDP communications made between hosts on a private network and hosts on a public network. |
|
|
Term
|
Definition
The difference between the highest and lowest frequencies available for network signals. Used to describe the rated throughput capacity of a given network medium or protocol |
|
|