Assignment title: Information
IT 5174 Learning Outcomes,
Selected Chapters Version 6.0
Chapter 3
Objectives
Upon completion of this chapter, you will be able to answer the following questions:
■ What are the types of rules that are necessary to successfully communicate?
■ Why are protocols necessary in network communication?
■ What is the purpose of adhering to a protocol suite?
■ What is the role of standards organizations in establishing protocols for network
interoperability?
■ How are the TCP/IP model and the OSI model used to facilitate standardization in the
communication process?
■ How does data encapsulation allow data to be transported across the network?
■ How do local hosts access local resources on a network?
Key Terms
This chapter uses the following key terms. You can find the definitions in the Glossary.
● Source Page 93,
● Destination Page 93
● Channel Page 93
● Protocols Page 93
● Encapsulation Page 96
● Decapsulation (de-encapsulation) Page 96
● Access method Page 98
● Flow control Page 98
● Response timeout Page 98
● Acknowledgement Page 98
● Unicast Page 98
● Multicast Page 99
● Broadcast Page 99
● Protocol suite Page 100
● Ethernet Page 106
● Standard Page 115
● Reference model Page 118
● Segment Page 124
● Protocol Data Unit (PDUs) Page 125Default gateway Page 133
Chapter 4
Objectives
Upon completion of this chapter, you will be able to answer the following questions:
■ What are options for connecting devices to a data network?
■ What are the purpose and functions of the physical layer in data networks?
■ What are the basic principles of physical layer standards?
■ What are the basic characteristics of copper cabling?
■ How are UTP cables built for use in Ethernet networks?
■ What are advantages of using fiber-optic cabling over using other media in data networks?
■ What are the basic characteristics of using wireless media in data networks?
■ What are the purposes and functions of the data link layer in preparing communications
for transmission on specific data network media?
■ How do the functions of physical topologies compare with the functions of logical
topologies?
■ What are the basic characteristics of Media Access Control on WAN topologies?
■ What are the basic characteristics of Media Access Control on LAN topologies?
■ What are the characteristics and functions of the data link layer frame?
Key Terms
This chapter uses the following key terms. You can find the definitions in the Glossary.
● Telecommunications Industry Association/
● Electronic Industries Association
● (TIA/EIA) Page 149
● International Telecommunications Union (ITU) Page 149
● Institute of Electrical and Electronics Engineers (IEEE) Page 149
● International Organization for Standardization (ISO) Page 149
● Manchester encoding Page 150
● Bandwidth Page 152
● Throughput Page 153
● Latency Page 153
● Electromagnetic interference (EMI) Page 156
● Radio frequency interference (RFI) Page 156
● Crosstalk Page 156
● Unshielded twisted-pair (UTP) cable Page 158Chapter 5
Objectives
Upon completion of this chapter, you will be able to answer the following questions:
■ What is the function of each of the Ethernet sublayers?
■ What are the characteristics and purpose of the Ethernet MAC address?
■ How does an Ethernet switch build its MAC address table and how is it used to forward
frames?
■ What are the available forwarding methods and port settings on an Ethernet switch?
■ What are the functions and differences between MAC and IP addresses?
■ What is the role of ARP in an Ethernet network?
■ How do ARP requests impact network and host performance?
Key Terms
This chapter uses the following key terms. You can find the definitions in the Glossary.
● Contention-based Page 214
● Collision fragment Page 215
● Runt frame Page 215
● Jumbo frame Page 215
● Cyclic redundancy check (CRC) Page 216
● Organizationally Unique Identifier (OUI)
● Page 219
● Burned-in address (BIA) Page 220
● Address Resolution Protocol (ARP)
● Page 223
● Switch fabric Page 226
● MAC address table Page 226
● Unknown unicast Page 228
● Asymmetric switching Page 244
● Automatic medium-dependent interface
● crossover (auto-MDIX) Page 246
● ARP table Page 251
● ARP cache Page 251
● Default gateway Page 251Chapter 6
Objectives
Upon completion of this chapter, you will be able to answer the following questions:
■ What is the purpose of the network layer in data communications?
■ Why does the IPv4 protocol require services of other layers to provide reliability?
■ What is the role of the major header fields in the IPv4 and IPv6 packets?
■ How does a host device use routing tables to direct packets to itself, a local destination, or a
default gateway?
■ What are the similarities and differences between host routing tables and routing tables of a
router?
■ What are the common components and interfaces of a router?
■ What are the steps in the bootup process of a Cisco IOS router?
■ How do you configure the initials settings on a Cisco IOS router?
■ How do you configure active interfaces on a Cisco IOS router?
■ How do you configure the default gateway on network devices?
Key Terms
This chapter uses the following key terms. You can find the definitions in the Glossary.
● Routing Page 274
● Connectionless Page 278
● Best-effort delivery Page 278
● Media independent Page 278
● Maximum transmission unit (MTU) Page 280
● Fragmentation Page 281
● Internet Control Message Protocol (ICMP) Page 282
● Network Address Translation (NAT) Page 283
● Loopback interface Page 288
● Default gateway Page 289Chapter 9
Objectives
Upon completion of this chapter, you will be able to answer the following questions:
■ What is the purpose of the transport layer in managing the transportation of data in
end-to-end communications?
■ What are the characteristics of TCP and UDP?
■ What is a port number and what is it used for?
■ How do the TCP session establishment and termination processes facilitate reliable
communication?
■ How are TCP protocol data units transmitted and acknowledged to guarantee delivery?
■ How does UDP establish communications with a server?
■ What factors determine whether high reliability TCP transmissions, or non-guaranteed UDP
transmissions, are best suited for common applications?
Key Terms
This chapter uses the following key terms. You can find the definitions in the Glossary.
● Port number Page 459
● Multiplexing Page 460
● Transmission Control Protocol (TCP) Page 461
● User Datagram Protocol (UDP) Page 461
● Connection-oriented Page 465
● Stateful Page 466
● Socket Page 471
● Three-way handshake Page 481
● Initial sequence number (ISN) Page 483
● Expectational acknowledgement Page 484
● Selective acknowledgement (SACK) Page 485
● Window size Page 485Chapter 10
Objectives
Upon completion of this chapter, you will be able to answer the following questions:
■ How do the functions of the application layer, session layer, and presentation layer work
together to provide network services to end-user applications?
■ How do common application layer protocols interact with end-user applications?
■ How do common application layer protocols provide Internet services to end users, including
WWW services and email?
■ What application layer protocols provide IP addressing services, including DNS and DHCP?
■ What are the features and operation of well-known application layer protocols that allow
file-sharing services, including FTP, File Sharing Services, and SMB protocol?
Key Terms
This chapter uses the following key terms. You can find the definitions in the Glossary.
● Bootstrap Protocol (BOOTP) Page 505
● Simple Mail Transfer Protocol (SMTP) Page 505
● Post Office Protocol (POP) Page 505
● Internet Message Access Protocol (IMAP) Page 505
● File Transfer Protocol (FTP) Page 505
● Trivial File Transfer Protocol (TFTP) Page 505
● Client-server Page 506
● Server Message Block (SMB) Page 527