Standardization Organizations

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

Which organization is primarily responsible for setting standards on how systems communicate over the Internet?

  • IETF (Internet Engineering Task Force) (correct)
  • ANSI (American National Standards Institute)
  • IEEE (Institute of Electrical and Electronics Engineers)
  • TIA (Telecommunications Industry Association)

Which protocol is specifically designed to allow a workstation to retrieve mail that a server is holding?

  • POP3 (Post Office Protocol version 3) (correct)
  • SMTP (Simple Mail Transfer Protocol)
  • FTP (File Transfer Protocol)
  • TFTP (Trivial File Transfer Protocol)

Which protocol uses UDP to transfer files and is considered a smaller, simpler alternative to FTP?

  • TFTP (correct)
  • NFS
  • HTTP
  • SMTP

What is the role of the Internet Assigned Numbers Authority (IANA)?

<p>Overseeing Internet naming and addressing, including IP addresses. (C)</p> Signup and view all the answers

Which protocol enables computers to mount drives on remote hosts and operate them as if they were local drives?

<p>NFS (C)</p> Signup and view all the answers

What is the primary function of the Domain Name System (DNS)?

<p>Translating domain names into IP addresses. (D)</p> Signup and view all the answers

Which of the following is a characteristic of UDP (User Datagram Protocol)?

<p>Offers a connectionless, best-effort service. (A)</p> Signup and view all the answers

What number of bits are used to identify ports in TCP and UDP?

<p>16-bit (D)</p> Signup and view all the answers

The port numbers ranging from 0 to 1023 are typically reserved for what purpose?

<p>Use by well-known services such as HTTP and FTP. (A)</p> Signup and view all the answers

In a TCP header, what does the 'Sequence Number' field indicate?

<p>Every byte of data sent over a TCP connection. (A)</p> Signup and view all the answers

What is the purpose of the 'Window' field in a TCP header?

<p>To control the flow of data between sender and receiver. (A)</p> Signup and view all the answers

During a TCP three-way handshake, what is the correct order of flags being set?

<p>SYN, SYN-ACK, ACK (A)</p> Signup and view all the answers

What is the main purpose of sequence and acknowledgment number fields in TCP headers?

<p>To ensure reliable and ordered data transmission. (C)</p> Signup and view all the answers

Which organization assigns the Media Access Control (MAC) address to a network interface card?

<p>The manufacturer of the network interface card. (A)</p> Signup and view all the answers

What does the term 'OUI' refer to in the context of MAC addresses?

<p>The first 24 bits of the MAC address, identifying the vendor. (C)</p> Signup and view all the answers

Which IPv4 class uses the first three octets to indicate the network address?

<p>Class C (B)</p> Signup and view all the answers

Which of the following IPv4 addresses is reserved for loopback?

<p>127.0.0.1 (C)</p> Signup and view all the answers

What is the purpose of a subnet mask?

<p>To determine which part of an IP address identifies the network and which part identifies the host. (B)</p> Signup and view all the answers

In IPv6, what is the purpose of using a double colon (::) in an address?

<p>To represent one or more consecutive 16-bit segments containing only zeros. (B)</p> Signup and view all the answers

Flashcards

Network Standard Protocols

Documented agreements containing technical specifications for products/services.

IEEE

International society promoting development in electrical engineering and computer science.

ANSI

Organization determining standards for various industries like electronics and construction.

EIA

Trade organization writing ANSI standards and legislation for the electronics industry.

Signup and view all the flashcards

TIA

Focuses on standards for information technology and telecommunications.

Signup and view all the flashcards

IETF

Responsible for the overall development of the Internet and its technologies.

Signup and view all the flashcards

Internet Society (ISOC)

Oversees the overall development on the Internet.

Signup and view all the flashcards

IESG

Oversees the activities of IETF and manages the process to introduce or update internet standards

Signup and view all the flashcards

IAB

Technology advisory group for the Internet Society, responsible for protocol development.

Signup and view all the flashcards

ISO

The international standard covering a wide range of standards relevant to networking.

Signup and view all the flashcards

Application Layer Protocols

Provides interfaces for application software to use network services.

Signup and view all the flashcards

SMTP

TCP/IP protocol for reliable electronic mail transfer over the Internet.

Signup and view all the flashcards

POP3

TCP/IP protocol designed to retrieve mail that the server is holding for a workstation

Signup and view all the flashcards

TFTP

Simple alternative to FTP using UDP to transfer files between systems.

Signup and view all the flashcards

FTP

A TCP/IP protocol for sharing files between hosts over a network.

Signup and view all the flashcards

NFS

TCP/IP protocol enabling computers to mount drives on remote hosts.

Signup and view all the flashcards

DNS

TCP/IP protocol for translating domain names into IP addresses.

Signup and view all the flashcards

SNMP

A TCP/IP protocol that monitors and controls the exchange of management information between networks and network components.

Signup and view all the flashcards

Telnet

A TCP/IP protocol that uses TCP as the transport protocol to establish a connection between server and client.

Signup and view all the flashcards

HTTP

Application-level protocol supporting information exchange on the World Wide Web.

Signup and view all the flashcards

Study Notes

  • Standards are documented agreements containing technical specifications or precise criteria for product/service design and performance.

Common Standardization Organizations

  • Institute of Electrical and Electronics Engineers (IEEE) promotes development/education in electrical engineering and computer science.
  • IEEE's Project 802 standardized LAN technologies like Ethernet (802.3), token-ring (802.5), and Wireless LAN (802.11).
  • American National Standards Institute (ANSI) has over one thousand industry and government representatives determining standards for various fields.
  • ANSI publishes standards, such as American Standard for Code Information Interchange (ASCII) and Small Computer System Interface (SCSI).
  • Electronic Industries Alliance (EIA) is a trade organization of electronics manufacturers writing ANSI standards and legislation.
  • Telecommunications Industry Association (TIA) focuses on standards for information technology, wireless, satellite, fiber optics, and telephone equipment.
  • TIA/EIA 568 – B Series" are the alliance's guidelines for network cable installation in commercial buildings.
  • Internet Engineering Task Force (IETF) develops the Internet and internetworking technologies and sets standards for communication.
    • The Internet Society (ISOC) oversees overall Internet development.
    • The Internet Engineering Steering Group (IESG) manages IETF activities and the process for introducing/updating Internet standards.
    • The Internet Architecture Board (IAB) is the technology advisory group to the Internet Society, responsible for protocol and architecture development.
    • The Internet Assigned Numbers Authority (IANA) oversees Internet naming/addressing and manages "unique parameters," including IP addresses.
  • The International Organization for Standardization (ISO) develops a wide range of standards relevant to networking.

Application Layer Protocols

  • The application layer provides interfaces for application software to use network services and designates transport layer protocols and ports.
  • Simple Mail Transfer Protocol (SMTP) is a TCP/IP protocol for reliable and efficient electronic mail transfer.
  • Post Office Protocol, version 3 (POP3) retrieves mail for a workstation from a server using TCP/IP.
  • Trivial File Transfer Protocol (TFTP) uses UDP to transfer files and serves as a small alternative to FTP.
  • File Transfer Protocol (FTP) uses TCP/IP to share computer programs/data between hosts, creating virtual connections for control/data transfer.
  • Network File System (NFS) allows computers to mount drives on remote hosts and operate them as local drives using TCP/IP.
  • Domain Name System (DNS) translates domain names and their network nodes into IP addresses using TCP/IP.
  • Simple Network Management Protocol (SNMP) manages network information exchange, and enables administrators to manage configurations, performance and security, with three components:
    • Managed devices collect/store management information for NMSs using SNMP.
    • An agent translates management information into a format compatible with SNMP.
    • NMS executes applications to monitor/control managed devices and provides processing / memory resources.
  • Terminal Emulation Protocol Network (Telnet) utilizes TCP to facilitate connection between a server and client.
    • Telnet employs a daemon which is a remote host, and establishes a Virtual Terminal (VTY) session

Remote Login and Transfer Protocols

  • Remote login application (rlogin): Allows authorized UNIX users to log into other UNIX machines (hosts) on a network.
  • Hypertext Transfer Protocol (HTTP): Supports information exchange on the World Wide Web and internal networks.
  • HTTPS (Hypertext Transfer Protocol over Secure Socket Layer): A secure communications protocol used with HTTP.
  • Secure Sockets Layer (SSL): Exists between the TCP layer and the application layer to encrypt/decode and authenticate data.

TCP and UDP Connections

  • Computers on the Internet use Transmission Control Protocol (TCP) or User Datagram Protocol (UDP) to communicate.
  • Transport Control Protocol (TCP) is a connection-oriented TCP/IP protocol:
    • TCP provides reliable data delivery, data suppression, congestion control, and flow control.
    • Transport protocols deliver information from one port to another facilitating communication between applications.
    • TCP ensures reliability through error detection and error correction.
  • User Datagram Protocol (UDP) is a connectionless TCP/IP protocol that provides best-effort service.
    • UDP sends independent packets called datagrams without guaranteed arrival.
    • Sending datagrams is like sending letters; order isn't important/guaranteed and each message is independent.

Ports

  • Data transmitted includes addressing information for the computer and port.
  • The computer is identified by its 32-bit IP address.
  • Ports use a 16-bit number to deliver data to the identified application using TCP and UDP.
  • Port numbers range from 0 to 65,535.
  • Ports 0-1023 are restricted and reserved for well-known services such as HTTP and FTP.

TCP and UDP Formats

  • TCP Header Fields:
  • Source Port: identifies the sending application (16 bits).
  • Destination Port: identifies the receiving application (16 bits).
  • Sequence Number: refers to every byte of data sent over a TCP connection (32 bits).
  • Acknowledgment Number: sequence number of next byte receiver expects (32 bits).
  • Header Length: length of TCP header in 32-bit units (4 bytes).
  • Reserved: always set to 0 (6 bits).
  • Control Bits: include FIN, ACK, SYN flags.
  • Window: for TCP flow control and indicates maximum bytes allowed by receiver.
  • Checksum: a mandatory field which is calculated/stored by the sender and verified by the receiver.
  • UDP Header Fields:
  • Source Port: identifies the sending application (16 bits).
  • Destination Port: identifies the receiving application (16 bits).
  • Length: total length of UDP header plus data; minimum length is 8 bytes.
  • Checksum: refers to the checksum of the UDP header and UDP data.

Handshake

  • SYN-ACK Handshake:
  • Three-way handshake: sender and receiver inform operating systems of an impending connection
    • SYN (Synchronize)
    • ACK (Acknowledge)
    • FIN (Finish)
  • The Sequence Number and Acknowledgment Number fields facilitate reliable and ordered data transmission.
  • Window Sliding Mechanism requires the sender to receive acknowledgement after transmitting data.
  • TCP Shutdown (Four-Way Handshake): Disconnects TCP connection and releases system resources when data transmission completes.

IP Addressing and Subnetting

  • The Internet Protocol (IP) has two versions: IP version 4 (IPv4) and IP version 6 (IPv6).
IP version 4 (IPv4) IP version 6 (IPv6)
Deployed 1981 1992
Address Size 32 bit (4 bytes) 128 bit (16 bytes)
Address Format Dotted Decimal Notation Hexadecimal Notation
Prefix Notation 192.149.0.0/24 3FFE:F200:0234::/48
  • MAC (Media Access Control) address: A unique physical address of a computer, assigned by the manufacturer.
    • Organizational Unique Identifier (OUI): The first 24 bits of MAC indicate the vendor.
    • Vendor-Assigned: Remaining 24 bits incrementally assigned denoting the serial number of the device.

IP Addresses

  • An IP address is assigned to uniquely identify a device on an IP network.
    • Public IP Address: used to find/exchange information assigned by the ISP.
      • Static Public IP Address: fixed IP primarily for hosting web pages or services.
      • Dynamic Public IP Address: Chosen from a pool, changing each connection.
    • Private IP Address: Used by computers on a network to communicate with the router and can change with each new session. Parts of an IP Address
    • network ID: identifies the host on the same physical network.
    • host ID: identifies the workstation, server, and router within a network.

IPv4 Classes

  • Class A: Uses only the first octet (8 bits) for network address, using all other octets for host addresses.
    • 1.0.0.0 to 127.0.0.0
    • Network.Host.Host.Host
    • Number of Bits used in Network / Host – 24
    • Maximum Host of Network – 16,777,214
  • Class B: Uses two octets (16 bits) for the network address.
    • 128.0.0.0 to 191.255.255.255
    • Network.Network.Host.Host
    • Number of Bits used in Network / Host – 16
    • Maximum Host of Network – 65,534
  • Class C: Uses three octets (24 bits) to identify the network portion.
    • 192.0.0.0 to 233.255.255.255
    • Network.Network.Network.Host
    • Number of Bits used in Network / Host – 8
    • Maximum Host of Network – 254
  • Class D: Used to enable multicasting by using an IP address.
    • 224.0.0.0 to 239.255.255.255
    • Host.Host.Host.Host
    • This requires its first four bits be "1110". Its first octect range is 224-239
  • Class E: Reserved by the IETF for research.
  • 240.0.0.0 to 255.255.255.255 (First four bits are set to "1111")

IANA IPv4 Special-Purpose Addresses

  • Diagnostic (Loopback/Localhost Address): Used for debugging programs and hardware.
    • 127.0.0.0 – 127.255.255.255 (SYN-ACK)
  • Default Network: Used for routing internet datagram (TCP).
    • 0.0.0.0
  • Network Broadcast: Used to broadcast to an entire network.
    • 255.255.255.255
  • Private-use of Internet Space: Preconfigured for network devices extending IPv4 spaces.
    • 10.0.0.0 – 10.254.254.254
    • 172.16.0.0 – 172.16.254.254
    • 192.168.0.0 – 192.168.254.254
  • Link-Local Addresses: Selected/configured if DHCP isn't there.
    • 169.254.0.0 – 169.254.254.254
  • Subnet Mask (Default Mask): Designates which portion of an IP is host and which is network.

Binary to Dotted Decimal Conversion

  • Binary value conversion can be done for each octet, and then concatenated for a full IP address in dotted decimal form.
  • Subnet Masking:
  • "ANDing" the default mask in binary with the IP address determines the network and host sections.

Subnetting

  • It refers to the process of borrowing bits from the host ID field to form a new subnet ID field.
  • Default masks are used in this process.
  • A custom subnet mask is determined by masking, supporting different sizes of networks.

IPV6

  • The Internet was rapidly expanding, which was unforeseen before, so IETF technologies like NAT and CIDR were used.
  • IANA announced full IPv4 allocation on February 3, 2011 to several Regional Internet Registries (RIRs). IPv4 officially used up November 25, 2019.
  • December 1998 IPv6 became the standard.
  • Internet Protocol version 6 (IPv6) is a set of specifications designed by the IETF, which is an upgraded version of IPv4. Also known as IP Next Generation (IPng).
    • It is 128 bits.
    • It Uses Colons.
  • IPV6 Abbreviation Specifications:
  • The leading 0s in each 16-bit segment can be omitted.
  • One 0 must be present in a segment, if all bits are 0s
  • Double colons represent consecutive 0s, but are only used once in address.
  • IPv6 Address Classification
  • Unicast
  • Multicast
  • Anycast

Sample Space, Relationships Among Events, and Rules of Probability

  • Probability relates to likelihood of an event, not providing guarantees.
  • Probabilities fall into 2 branches: -- Subjective is theoretical and based on past experience and can have bias from person to person --Objective is empirical and examines data using logical equations

Probability Formula

  • P(E) means the probability that an "Experiment" has chance of having "Event" happen
  • E means the number of possible outcomes are in a single "Event"
  • S means all possible "Event/Experiment" sets

Properties

  1. Between 0% and 100%
  2. Probability cannot be less than 0 (0%)
  3. Probability cannot be more than 1 (100%)
  • There are two "probability of occurence" rules "OR" and "AND": --Rule "OR" has 2 sub-branches
    1. Mutually exclusive: probability of separate events which when summed, equal total probability of each event.
    1. Not mutually exclusive: opposite of above.
  • The other rule "AND" involves multiplication of events.

Multiplication Rule

  • Events that are independent occur when probability doesn't affect the "Event" that unfolds.
  • Dependent events, do affect their specific happenings.

Counting Principles

  • Multiplication Principle* When there is an event with two possible ways, you simply multiply their possible outcomes with each other.
  • Permutations* Is a technique that refers to the arrangement or ordering of a set of objects.
  • The Formula for this is !P = ! / (! r ) (! = factorial)
  • You can also re-apply permutations but some "events" are similar where this is a formula for that too.
  • !P= ! / (! x ! ...... !)*
  • Combination*: Objects are chosen at random.
    • The formula for it is: C ( ,) = ! /( ! (!))

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Embedded Systems
38 questions

Embedded Systems

CorrectPlum avatar
CorrectPlum
Networking Standards and Organizations
20 questions
Networking Standards: IEEE, ANSI, and EIA
20 questions
Use Quizgecko on...
Browser
Browser