ccna 1 - chapter 3 for students
TRANSCRIPT
-
8/8/2019 CCNA 1 - Chapter 3 for Students
1/74
2007 Cisco System s, Inc. All rights reserved. Cisco Public
ITE PC v4.0
Chapter 1 1
Application Layer
Functionality andProtocols
Network Fundamentals Chapter 3
-
8/8/2019 CCNA 1 - Chapter 3 for Students
2/74
-
8/8/2019 CCNA 1 - Chapter 3 for Students
3/74
ITE PC v4.0
Chapter 1 3Rainier Pimentel
T
wo basic types of networks
Peer-to-PeerNetworks
Client/Server
N
etworks
-
8/8/2019 CCNA 1 - Chapter 3 for Students
4/74
ITE PC v4.0
Chapter 1 4Rainier Pimentel
P
eer-to-P
eer Networks In a peer-to-peer network, networked computers act asequal partners, or peers.
As peers, each computer can take on the client function or
the server function.
In a peer-to-peer network, individual users control their own
resources.
Since individual users make these decisions, there is nocentral point of control or administration in the network.
-
8/8/2019 CCNA 1 - Chapter 3 for Students
5/74
ITE PC v4.0
Chapter 1 5Rainier Pimentel
Peer-to-Peer Networks
Peer-to-peer networks are relatively easy to install and
operate.
No additional equipment is necessary beyond a suitable
operating system installed on each computer.
Since users control their own resources, no dedicated
administrators are needed.
As networks grow, peer-to-peer relationships becomeincreasingly difficult to coordinate. A peer-to-peer network
works well with 10 or fewer computers.
-
8/8/2019 CCNA 1 - Chapter 3 for Students
6/74
ITE PC v4.0
Chapter 1 6Rainier Pimentel
Peer to Peer
1. decentralizedresources
2. resource
sharingwithout adedicatedserver
3. Security is
difficult toenforce.
A computer that responds to a file sharing request is
functioning as a server.
-
8/8/2019 CCNA 1 - Chapter 3 for Students
7/74
ITE PC v4.0
Chapter 1 7Rainier Pimentel
A small home network has been installed
to interconnect three computers togetherfor gaming and file sharing. What twoproperties represent this network type?(Choose two.)
a. User accounts are centralized.
b. Security is difficult to enforce.
c. Specialized operating system software is required.
d. File permissions are controlled by a single computer.
e. A computer that responds to a file sharing request isfunctioning as a server.
-
8/8/2019 CCNA 1 - Chapter 3 for Students
8/74
ITE PC v4.0
Chapter 1 8Rainier Pimentel
A small home network has been installed
to interconnect three computers togetherfor gaming and file sharing. What twoproperties represent this network type?(Choose two.)
a. User accounts are centralized.
b. Security is difficult to enforce.
c. Specialized operating system software is required.
d. File permissions are controlled by a single computer.
e. A computer that responds to a file sharing request isfunctioning as a server.
-
8/8/2019 CCNA 1 - Chapter 3 for Students
9/74
ITE PC v4.0
Chapter 1 9Rainier Pimentel
What are two characteristics of peer-to-peer networks? (Choose two.)
a. scalable
b. one way data flow
c. decentralized resources
d. centralized user accounts
e. resource sharing without a dedicated server
-
8/8/2019 CCNA 1 - Chapter 3 for Students
10/74
ITE PC v4.0
Chapter 1 10Rainier Pimentel
What are two characteristics of peer-to-peer networks? (Choose two.)
a. scalable
b. one way data flow
c. decentralized resources
d. centralized user accounts
e. resource sharing without a dedicated server
-
8/8/2019 CCNA 1 - Chapter 3 for Students
11/74
ITE PC v4.0
Chapter 1 11Rainier Pimentel
Peer to Peer
Some P2P applications use a hybrid systemwhere resource sharing is decentralized but the
indexes that point to resource locations arestored in a centralized directory.
Peer-to-peer applications can be used on peer-to-peer networks, client/server networks, and
across the Internet.
-
8/8/2019 CCNA 1 - Chapter 3 for Students
12/74
ITE PC v4.0
Chapter 1 12Rainier Pimentel
What are three properties of peer-to-peerapplications? (Choose three.)
a. acts as both a client and server within the samecommunication
b. requires centralized account administrationc. hybrid mode includes a centralized directory of files
d. can be used in client-server networks
e. requires a direct physical connection between devices
f. centralized authentication is required
-
8/8/2019 CCNA 1 - Chapter 3 for Students
13/74
ITE PC v4.0
Chapter 1 13Rainier Pimentel
What are three properties of peer-to-peerapplications? (Choose three.)
a. acts as both a client and server within the samecommunication
b. requires centralized account administrationc. hybrid mode includes a centralized directory of files
d. can be used in client-server networks
e. requires a direct physical connection between devices
f. centralized authentication is required
-
8/8/2019 CCNA 1 - Chapter 3 for Students
14/74
ITE PC v4.0
Chapter 1 14Rainier Pimentel
Client/Server Networks
-
8/8/2019 CCNA 1 - Chapter 3 for Students
15/74
ITE PC v4.0
Chapter 1 15Rainier Pimentel
Client/Server Network
Some nodes (SERVER) are dedicated to presentservices to other nodes (CLIENTS)
Client1
Client2 Server
Client3
centralized administration security is easier to
enforce
-
8/8/2019 CCNA 1 - Chapter 3 for Students
16/74
ITE PC v4.0
Chapter 1 16Rainier Pimentel
Client/Server Network
centralized user accounts
Client computers initiate dataexchanges and may upload data
to servers
-
8/8/2019 CCNA 1 - Chapter 3 for Students
17/74
ITE PC v4.0
Chapter 1 17Rainier Pimentel
Client/Server Networks
In a client/server arrangement, network services are
located on a dedicated computer called a server.
The server responds to the requests of clients.
The server is a central computer that is continuously
available to respond to requests from clients for file, print,
application, and other services.
Servers are designed to handle requests from many clientssimultaneously.
-
8/8/2019 CCNA 1 - Chapter 3 for Students
18/74
ITE PC v4.0
Chapter 1 18Rainier Pimentel
What are two characteristics of clients in
data networks? (Choose two.)
1. initiate data exchanges
2. are repositories of data
3. may upload data to servers
4. listen for requests from servers
-
8/8/2019 CCNA 1 - Chapter 3 for Students
19/74
ITE PC v4.0
Chapter 1 19Rainier Pimentel
What are two characteristics of clients in
data networks? (Choose two.)
1. initiate data exchanges
2. are repositories of data
3. may upload data to servers
4. listen for requests from servers
-
8/8/2019 CCNA 1 - Chapter 3 for Students
20/74
ITE PC v4.0
Chapter 1 20Rainier Pimentel
A network administrator is designing anetwork for a new branch office of twenty-fiveusers. What are the advantages of using aclient-server model? (Choose two.)
a. centralized administration
b. does not require specialized software
c. security is easier to enforce
d. lower cost implementation
-
8/8/2019 CCNA 1 - Chapter 3 for Students
21/74
ITE PC v4.0
Chapter 1 21Rainier Pimentel
A network administrator is designing anetwork for a new branch office of twenty-fiveusers. What are the advantages of using aclient-server model? (Choose two.)
a. centralized administration
b. does not require specialized software
c. security is easier to enforce
d. lower cost implementation
-
8/8/2019 CCNA 1 - Chapter 3 for Students
22/74
ITE PC v4.0
Chapter 1 22Rainier Pimentel
Applications The Interface BetweenHuman and Data Networks
Applications provide the means for generating and
receiving data that can be transported on the network
-
8/8/2019 CCNA 1 - Chapter 3 for Students
23/74
ITE PC v4.0
Chapter 1 23Rainier Pimentel
Application layer (definitions)
Application layer supplies services that allow user tointerface with the network.
It provides the interface between the applications oneither end of the network
Application layer provides services for an applicationprogram to ensure that effective communication withanother application program in a network.
-
8/8/2019 CCNA 1 - Chapter 3 for Students
24/74
ITE PC v4.0
Chapter 1 24Rainier Pimentel
Which layer of the OSI model suppliesservices that allow user to interface with the
network?
a. physical
b. session
c. network
d. presentation
e. application
f. transport
-
8/8/2019 CCNA 1 - Chapter 3 for Students
25/74
ITE PC v4.0
Chapter 1 25Rainier Pimentel
Which layer of the OSI model suppliesservices that allow user to interface with the
network?
a. physical
b. session
c. network
d. presentation
e. application
f. transport
-
8/8/2019 CCNA 1 - Chapter 3 for Students
26/74
ITE PC v4.0
Chapter 1 26Rainier Pimentel
What is the role of the OSI applicationlayer?
a. provides segmentation of data
b. provides encryption and conversion of data
c. provides the interface between the applications oneither end of the network
d. provides control of all the data flowing between thesource and destination devices
-
8/8/2019 CCNA 1 - Chapter 3 for Students
27/74
ITE PC v4.0
Chapter 1 27Rainier Pimentel
What is the role of the OSI applicationlayer?
a. provides segmentation of data
b. provides encryption and conversion of data
c. provides the interface between the applications oneither end of the network
d. provides control of all the data flowing between thesource and destination devices
-
8/8/2019 CCNA 1 - Chapter 3 for Students
28/74
ITE PC v4.0
Chapter 1 28Rainier Pimentel
2 Forms ofApplication
Layer Software
Applications
Web browsers, Email program
Services
Application Protocols(FTP, HTTP, DNS, Telnet, DHCP)
-
8/8/2019 CCNA 1 - Chapter 3 for Students
29/74
ITE PC v4.0
Chapter 1 29Rainier Pimentel
What are two forms of application layersoftware? (Choose two.)
a. applications
b. dialogs
c. requests
d. services
e. spreadsheet
-
8/8/2019 CCNA 1 - Chapter 3 for Students
30/74
ITE PC v4.0
Chapter 1 30Rainier Pimentel
What are two forms of application layersoftware? (Choose two.)
a. applications
b. dialogs
c. requests
d. services
e. spreadsheet
-
8/8/2019 CCNA 1 - Chapter 3 for Students
31/74
ITE PC v4.0
Chapter 1 31Rainier Pimentel
Application LayerProtocols
FTP and TFTP
File TransferProtocol (FTP)
FTP enables file sharing between hosts.
FTP is commonly used to support for filetransfers between a client and a server
Trivial File TransferProtocol (TFTP)
TFTP is a connectionless service that uses theUserDatagram Protocol (UDP).
-
8/8/2019 CCNA 1 - Chapter 3 for Students
32/74
ITE PC v4.0
Chapter 1 32Rainier Pimentel
What application layer protocol is commonly used tosupport for file transfers between a client and a
server?
a. DNS
b. HTTP
c. FTP
d. Telnet
-
8/8/2019 CCNA 1 - Chapter 3 for Students
33/74
ITE PC v4.0
Chapter 1 33Rainier Pimentel
What application layer protocol is commonly used tosupport for file transfers between a client and a
server?
a. DNS
b. HTTP
c. FTP
d. Telnet
-
8/8/2019 CCNA 1 - Chapter 3 for Students
34/74
ITE PC v4.0
Chapter 1 34Rainier Pimentel
Application LayerProtocols
Server Message Block (SMB) is an applicationlayer protocol that describes the services that areused for file sharing in Microsoft networks
Network File System (NFS)NFS is a
distributed file system protocol suite developed bySun Microsystems that allows file access to aremote storage device such as a hard disk across
a network.
-
8/8/2019 CCNA 1 - Chapter 3 for Students
35/74
ITE PC v4.0
Chapter 1 35Rainier Pimentel
What application layer protocol describes theservices that are used for file sharing in
Microsoft networks?
a. DHCP
b. DNS
c. SMB
d. SMTP
e. WINS
-
8/8/2019 CCNA 1 - Chapter 3 for Students
36/74
ITE PC v4.0
Chapter 1 36Rainier Pimentel
What application layer protocol describes theservices that are used for file sharing in
Microsoft networks?
a. DHCP
b. DNS
c. SMB
d. SMTP
e. WINS
-
8/8/2019 CCNA 1 - Chapter 3 for Students
37/74
ITE PC v4.0
Chapter 1 37Rainier Pimentel
Application LayerProtocols
Simple Mail TransferProtocol (SMTP) SMTPadministers the transmission of e-mail overcomputer networks.
It is used to forward mail between servers.
It is a protocol that operates at the Applicationlayer of the OSI model
-
8/8/2019 CCNA 1 - Chapter 3 for Students
38/74
ITE PC v4.0
Chapter 1 38Rainier Pimentel
Application LayerProtocols
(Telnet and SSH) Terminal emulation (Telnet) Telnet provides the
capability to remotely access another computer.
Secure Shell (SSH), a common network protocol forremote administration of Unix computers.
Telnet does not support encryption
-
8/8/2019 CCNA 1 - Chapter 3 for Students
39/74
ITE PC v4.0
Chapter 1 39Rainier Pimentel
Telnet protocol
Telnetprovides a
virtualconnection forremote access
-
8/8/2019 CCNA 1 - Chapter 3 for Students
40/74
ITE PC v4.0
Chapter 1 40Rainier Pimentel
Which application layer protocols correctlymatch a corresponding function? (Choose
two.)
a. DNS dynamically allocates IP addresses to hosts
b. HTTP transfers data from a web server to a client
c. POP delivers email from the client to the server emailserver
d. SMTP supports file sharing
e. Telnet provides a virtual connection for remote access
-
8/8/2019 CCNA 1 - Chapter 3 for Students
41/74
ITE PC v4.0
Chapter 1 41Rainier Pimentel
Which application layer protocols correctlymatch a corresponding function? (Choose
two.)
a. DNS dynamically allocates IP addresses to hosts
b. HTTP transfers data from a web server to a client
c. POP delivers email from the client to the server emailserver
d. SMTP supports file sharing
e. Telnet provides a virtual connection for remote access
-
8/8/2019 CCNA 1 - Chapter 3 for Students
42/74
ITE PC v4.0
Chapter 1 42Rainier Pimentel
As compared to SSH, what is the primarydisadvantage of telnet?
a. not widely available
b. does not support encryption
c. consumes more network bandwidth
d. does not support authentication
-
8/8/2019 CCNA 1 - Chapter 3 for Students
43/74
ITE PC v4.0
Chapter 1 43Rainier Pimentel
As compared to SSH, what is the primarydisadvantage of telnet?
a. not widely available
b. does not support encryption
c. consumes more network bandwidth
d. does not support authentication
-
8/8/2019 CCNA 1 - Chapter 3 for Students
44/74
ITE PC v4.0
Chapter 1 44Rainier Pimentel
Application LayerProtocols
Simple Network Management Protocol (SNMP)SNMP is a protocol that provides a way to monitorand control network devices, and to manageconfigurations, statistics collection, performance,and security.
-
8/8/2019 CCNA 1 - Chapter 3 for Students
45/74
ITE PC v4.0
Chapter 1 45Rainier Pimentel
Application LayerProtocols
HTTP and HTTPS HTTP - defines the rules for transferring information,
files, and multimedia on web pages. Hypertext MarkupLanguage (HTML) is the language used within HTTP.
HTTPS is the secured version of the HTTP application,which normally uses 128 bit SSL encryption to securethe information sent and received on a web page.
These two protocols are used tocontrol the transfer of web
resources from a web server toa client browser.
-
8/8/2019 CCNA 1 - Chapter 3 for Students
46/74
ITE PC v4.0
Chapter 1 46Rainier Pimentel
Which two protocols are used to control thetransfer of web resources from a web server to
a client browser? (Choose two.)
a. ASP
b. FTP
c. HTML
d. HTTP
e. HTTPS
-
8/8/2019 CCNA 1 - Chapter 3 for Students
47/74
ITE PC v4.0
Chapter 1 47Rainier Pimentel
Which two protocols are used to control thetransfer of web resources from a web server to
a client browser? (Choose two.)
a. ASP
b. FTP
c. HTML
d. HTTP
e. HTTPS
-
8/8/2019 CCNA 1 - Chapter 3 for Students
48/74
ITE PC v4.0
Chapter 1 48Rainier Pimentel
DHCP
The Dynamic Host Configuration Protocol (DHCP)service enables devices on a network to obtain IPaddresses and other information from a DHCP server.
DHCP allows a host to obtain an IP addressdynamically when it connects to the network. TheDHCP server is contacted and an address requested.The DHCP server chooses an address from a
configured range of addresses called a pool andassigns ("leases") it to the host for a set period.
-
8/8/2019 CCNA 1 - Chapter 3 for Students
49/74
ITE PC v4.0
Chapter 1 49Rainier Pimentel
DHCP
-
8/8/2019 CCNA 1 - Chapter 3 for Students
50/74
ITE PC v4.0
Chapter 1 50Rainier Pimentel
DHCP
TheD
HCP leasing process
-
8/8/2019 CCNA 1 - Chapter 3 for Students
51/74
ITE PC v4.0
Chapter 1 51Rainier Pimentel
What is DNS?
It is a database system that translates hostname to IPaddresses
It is a protocol that operates at the Application layer ofthe OSI model
It is used by the server to resolve names
It is the automated service that matches resource
names with the required IP address
-
8/8/2019 CCNA 1 - Chapter 3 for Students
52/74
ITE PC v4.0
Chapter 1 52Rainier Pimentel
DNS
-
8/8/2019 CCNA 1 - Chapter 3 for Students
53/74
ITE PC v4.0
Chapter 1 53Rainier Pimentel
DNS (Common Resource Records)
Record Type Use
A (host address)
The A record maps a DNS host name to an IP
address. This is the most common resource
record type.
CNAME (canonicalname)
The CNAME record provides alternate names
(or aliases) to hosts that already have an A
record.
MX (Mail Exchanger)The MX record identifies servers that can be
used to deliver mail.
NS (name server)
The NS resource record identifies all name
servers that can perform name resolution for thezone.
PTR (pointer)
In a reverse lookup zone, the PTR record maps
an IP address to a host name (i.e. "points" to an
A record).
-
8/8/2019 CCNA 1 - Chapter 3 for Students
54/74
ITE PC v4.0
Chapter 1 54Rainier Pimentel
Email Services and POP3/SMTP
Protocols POP3 (Post Office Protocol version 3) allows your
computer to receive emails and SMTP means it cansend emails.
POP3 allows users to pickup email across the network.
SMTP (Simple Mail Transfer Protocol) delivers emailacross the network.
email components are used to forward mail betweenservers.
-
8/8/2019 CCNA 1 - Chapter 3 for Students
55/74
ITE PC v4.0
Chapter 1 55Rainier Pimentel
MUA (Mail UserAgent)
MUA is also called e-mail client
MUA is the program that the user used to create emailmessages.
To receive e-mail messages from an e-mail server, thee-mail client can use POP. Sending e-mail from either aclient or a server uses message formats and commandstrings defined by the SMTP protocol.
MTA (Mail TransferAgent) receives email from theclient's MUA
-
8/8/2019 CCNA 1 - Chapter 3 for Students
56/74
ITE PC v4.0
Chapter 1 56Rainier Pimentel
MDA (Mail Delivery Agent)
A MDA is software that delivers e-mail messages rightafter they've been accepted on a server.
MTA passes email to the MDA for final delivery.
-
8/8/2019 CCNA 1 - Chapter 3 for Students
57/74
ITE PC v4.0
Chapter 1 57Rainier Pimentel
MTA (Mail TransferAgent )
The Mail Transfer Agent (MTA) process is used toforward e-mail.
The MTA receives messages from the MUA or fromanother MTA on another e-mail server.
Based on the message header, it determines how amessage has to be forwarded to reach its destination. Ifthe mail is addressed to a user whose mailbox is on the
local server, the mail is passed to the MDA. If the mailis for a user not on the local server, the MTA routes thee-mail to the MTA on the appropriate server.
-
8/8/2019 CCNA 1 - Chapter 3 for Students
58/74
ITE PC v4.0
Chapter 1 58Rainier Pimentel
MTA
MTA passes email to the MDA for final delivery.
MTA uses SMTP to route email between servers.
MTA receives email from the client's MUA.
-
8/8/2019 CCNA 1 - Chapter 3 for Students
59/74
ITE PC v4.0
Chapter 1 59Rainier Pimentel
Email Services (SMTP and POP)
MTA and SMTP areemail components areused to forward mail
between servers
-
8/8/2019 CCNA 1 - Chapter 3 for Students
60/74
ITE PC v4.0
Chapter 1 60Rainier Pimentel
Email Services (SMTP and POP)
1. MTA receives email
from the client's MUA2. MTA passes email to
the MDA for finaldelivery
3. MTA uses SMTP toroute email between
servers
-
8/8/2019 CCNA 1 - Chapter 3 for Students
61/74
ITE PC v4.0
Chapter 1 61Rainier Pimentel
The process of sending mails
between clients
1. MUA
2. SMTP3. MTA4. SMTP5. MTA6. MDA
7. POP8. MUA
-
8/8/2019 CCNA 1 - Chapter 3 for Students
62/74
ITE PC v4.0
Chapter 1 62Rainier Pimentel
Which email components are used to forwardmail between servers? (Choose two.)
a. MDA
b. IMAP
c. MTA
d. POP
e. SMTP
-
8/8/2019 CCNA 1 - Chapter 3 for Students
63/74
ITE PC v4.0
Chapter 1 63Rainier Pimentel
Which email components are used to forwardmail between servers? (Choose two.)
a. MDA
b. IMAP
c. MTA
d. POP
e. SMTP
-
8/8/2019 CCNA 1 - Chapter 3 for Students
64/74
ITE PC v4.0
Chapter 1 64Rainier Pimentel
Which statements are correct concerning therole of the MTA in handling email? (Choosethree.)
a. routes email to the MDA on other servers
b. receives email from the client's MUA
c. receives email via the POP3 protocol
d. passes email to the MDA for final delivery
e. uses SMTP to route email between servers
-
8/8/2019 CCNA 1 - Chapter 3 for Students
65/74
ITE PC v4.0
Chapter 1 65Rainier Pimentel
Which statements are correct concerning therole of the MTA in handling email? (Choosethree.)
a. routes email to the MDA on other servers
b. receives email from the client's MUA
c. receives email via the POP3 protocol
d. passes email to the MDA for final delivery
e. uses SMTP to route email between servers
-
8/8/2019 CCNA 1 - Chapter 3 for Students
66/74
ITE PC v4.0
Chapter 1 66Rainier Pimentel
Presentation Layer
Presents data to the Application Layer
Provides data translation, coding, and conversion functions
Translates genericallyformatted data into its native format
(EBCDIC to ASCII)
Data compression, decompression, encryption, anddecryption
Ex: PICT/TIFF/JPEG/MIDI/MPEG/QuickTime
-
8/8/2019 CCNA 1 - Chapter 3 for Students
67/74
ITE PC v4.0
Chapter 1 67Rainier Pimentel
Port Numbers
Application layer uses support from lower layer functionsto distinguish between connections to the service
-
8/8/2019 CCNA 1 - Chapter 3 for Students
68/74
ITE PC v4.0
Chapter 1 68Rainier Pimentel
-
8/8/2019 CCNA 1 - Chapter 3 for Students
69/74
ITE PC v4.0
Chapter 1 69Rainier Pimentel
What is the destination port for thecommunication that is represented on line 82?
a. 80
b. 1261
c. 15533
d. 3912
e. 65520
-
8/8/2019 CCNA 1 - Chapter 3 for Students
70/74
ITE PC v4.0
Chapter 1 70Rainier Pimentel
What is the destination port for thecommunication that is represented on line 82?
a. 80
b. 1261
c. 15533
d. 3912
e. 65520
-
8/8/2019 CCNA 1 - Chapter 3 for Students
71/74
ITE PC v4.0
Chapter 1 71Rainier Pimentel
How does the application layer on a
server usually process multiple clientrequest for services?
a. ceases all connections to the service
b. denies multiple connections to a single daemon
c. suspends the current connection to allow the newconnection
d. uses support from lower layer functions to distinguish
between connections to the service
-
8/8/2019 CCNA 1 - Chapter 3 for Students
72/74
ITE PC v4.0
Chapter 1 72Rainier Pimentel
How does the application layer on a
server usually process multiple clientrequest for services?
a. ceases all connections to the service
b. denies multiple connections to a single daemon
c. suspends the current connection to allow the newconnection
d. uses support from lower layer functions to distinguish
between connections to the service
-
8/8/2019 CCNA 1 - Chapter 3 for Students
73/74
ITE PC v4.0
Chapter 1 73Rainier Pimentel
-
8/8/2019 CCNA 1 - Chapter 3 for Students
74/74
Summary