Assignment title: Information


IT 5174 Learning Outcomes, Selected Chapters Version 6.0 Chapter 3 Objectives Upon completion of this chapter, you will be able to answer the following questions: ■ What are the types of rules that are necessary to successfully communicate? ■ Why are protocols necessary in network communication? ■ What is the purpose of adhering to a protocol suite? ■ What is the role of standards organizations in establishing protocols for network interoperability? ■ How are the TCP/IP model and the OSI model used to facilitate standardization in the communication process? ■ How does data encapsulation allow data to be transported across the network? ■ How do local hosts access local resources on a network? Key Terms This chapter uses the following key terms. You can find the definitions in the Glossary. ● Source Page 93, ● Destination Page 93 ● Channel Page 93 ● Protocols Page 93 ● Encapsulation Page 96 ● Decapsulation (de-encapsulation) Page 96 ● Access method Page 98 ● Flow control Page 98 ● Response timeout Page 98 ● Acknowledgement Page 98 ● Unicast Page 98 ● Multicast Page 99 ● Broadcast Page 99 ● Protocol suite Page 100 ● Ethernet Page 106 ● Standard Page 115 ● Reference model Page 118 ● Segment Page 124 ● Protocol Data Unit (PDUs) Page 125Default gateway Page 133 Chapter 4 Objectives Upon completion of this chapter, you will be able to answer the following questions: ■ What are options for connecting devices to a data network? ■ What are the purpose and functions of the physical layer in data networks? ■ What are the basic principles of physical layer standards? ■ What are the basic characteristics of copper cabling? ■ How are UTP cables built for use in Ethernet networks? ■ What are advantages of using fiber-optic cabling over using other media in data networks? ■ What are the basic characteristics of using wireless media in data networks? ■ What are the purposes and functions of the data link layer in preparing communications for transmission on specific data network media? ■ How do the functions of physical topologies compare with the functions of logical topologies? ■ What are the basic characteristics of Media Access Control on WAN topologies? ■ What are the basic characteristics of Media Access Control on LAN topologies? ■ What are the characteristics and functions of the data link layer frame? Key Terms This chapter uses the following key terms. You can find the definitions in the Glossary. ● Telecommunications Industry Association/ ● Electronic Industries Association ● (TIA/EIA) Page 149 ● International Telecommunications Union (ITU) Page 149 ● Institute of Electrical and Electronics Engineers (IEEE) Page 149 ● International Organization for Standardization (ISO) Page 149 ● Manchester encoding Page 150 ● Bandwidth Page 152 ● Throughput Page 153 ● Latency Page 153 ● Electromagnetic interference (EMI) Page 156 ● Radio frequency interference (RFI) Page 156 ● Crosstalk Page 156 ● Unshielded twisted-pair (UTP) cable Page 158Chapter 5 Objectives Upon completion of this chapter, you will be able to answer the following questions: ■ What is the function of each of the Ethernet sublayers? ■ What are the characteristics and purpose of the Ethernet MAC address? ■ How does an Ethernet switch build its MAC address table and how is it used to forward frames? ■ What are the available forwarding methods and port settings on an Ethernet switch? ■ What are the functions and differences between MAC and IP addresses? ■ What is the role of ARP in an Ethernet network? ■ How do ARP requests impact network and host performance? Key Terms This chapter uses the following key terms. You can find the definitions in the Glossary. ● Contention-based Page 214 ● Collision fragment Page 215 ● Runt frame Page 215 ● Jumbo frame Page 215 ● Cyclic redundancy check (CRC) Page 216 ● Organizationally Unique Identifier (OUI) ● Page 219 ● Burned-in address (BIA) Page 220 ● Address Resolution Protocol (ARP) ● Page 223 ● Switch fabric Page 226 ● MAC address table Page 226 ● Unknown unicast Page 228 ● Asymmetric switching Page 244 ● Automatic medium-dependent interface ● crossover (auto-MDIX) Page 246 ● ARP table Page 251 ● ARP cache Page 251 ● Default gateway Page 251Chapter 6 Objectives Upon completion of this chapter, you will be able to answer the following questions: ■ What is the purpose of the network layer in data communications? ■ Why does the IPv4 protocol require services of other layers to provide reliability? ■ What is the role of the major header fields in the IPv4 and IPv6 packets? ■ How does a host device use routing tables to direct packets to itself, a local destination, or a default gateway? ■ What are the similarities and differences between host routing tables and routing tables of a router? ■ What are the common components and interfaces of a router? ■ What are the steps in the bootup process of a Cisco IOS router? ■ How do you configure the initials settings on a Cisco IOS router? ■ How do you configure active interfaces on a Cisco IOS router? ■ How do you configure the default gateway on network devices? Key Terms This chapter uses the following key terms. You can find the definitions in the Glossary. ● Routing Page 274 ● Connectionless Page 278 ● Best-effort delivery Page 278 ● Media independent Page 278 ● Maximum transmission unit (MTU) Page 280 ● Fragmentation Page 281 ● Internet Control Message Protocol (ICMP) Page 282 ● Network Address Translation (NAT) Page 283 ● Loopback interface Page 288 ● Default gateway Page 289Chapter 9 Objectives Upon completion of this chapter, you will be able to answer the following questions: ■ What is the purpose of the transport layer in managing the transportation of data in end-to-end communications? ■ What are the characteristics of TCP and UDP? ■ What is a port number and what is it used for? ■ How do the TCP session establishment and termination processes facilitate reliable communication? ■ How are TCP protocol data units transmitted and acknowledged to guarantee delivery? ■ How does UDP establish communications with a server? ■ What factors determine whether high reliability TCP transmissions, or non-guaranteed UDP transmissions, are best suited for common applications? Key Terms This chapter uses the following key terms. You can find the definitions in the Glossary. ● Port number Page 459 ● Multiplexing Page 460 ● Transmission Control Protocol (TCP) Page 461 ● User Datagram Protocol (UDP) Page 461 ● Connection-oriented Page 465 ● Stateful Page 466 ● Socket Page 471 ● Three-way handshake Page 481 ● Initial sequence number (ISN) Page 483 ● Expectational acknowledgement Page 484 ● Selective acknowledgement (SACK) Page 485 ● Window size Page 485Chapter 10 Objectives Upon completion of this chapter, you will be able to answer the following questions: ■ How do the functions of the application layer, session layer, and presentation layer work together to provide network services to end-user applications? ■ How do common application layer protocols interact with end-user applications? ■ How do common application layer protocols provide Internet services to end users, including WWW services and email? ■ What application layer protocols provide IP addressing services, including DNS and DHCP? ■ What are the features and operation of well-known application layer protocols that allow file-sharing services, including FTP, File Sharing Services, and SMB protocol? Key Terms This chapter uses the following key terms. You can find the definitions in the Glossary. ● Bootstrap Protocol (BOOTP) Page 505 ● Simple Mail Transfer Protocol (SMTP) Page 505 ● Post Office Protocol (POP) Page 505 ● Internet Message Access Protocol (IMAP) Page 505 ● File Transfer Protocol (FTP) Page 505 ● Trivial File Transfer Protocol (TFTP) Page 505 ● Client-server Page 506 ● Server Message Block (SMB) Page 527