Objectives Upon completion of this chapter, you will be able to answer the following questions: • What network utilities can you use to troubleshoot networks? Key Terms There are no key terms for this chapter. Introduction (17.0) Kishori tries to reach a website using her desktop computer at her nursing station. She gets an error…
What Did I Learn in this Module – 100-150 Exam Guide
• The Client Server Relationship—The term server refers to a host running a software application that provides information or services to other hosts that are connected to the network, such as a web server. An example of client software is a web browser, like Chrome or Firefox. A single computer can also run multiple types…
Text Messaging – 100-150 Exam Guide
Text messaging, shown in Figure 16-11, is one of the most popular communication tools in use today. In addition, text messaging software is built into many online applications, smart phone apps, and social media sites. Figure 16-11 Text Messaging Both clients can simultaneously send and receive messages. Text messages may also be called instant messages,…
Security Issues with Telnet
After a Telnet connection is established, users can perform any authorized function on the server, just as if they were using a command line session on the server itself. If authorized, they can start and stop processes, configure the device, and even shut down the system. Although the Telnet protocol can require a user to…
FTP Clients and Servers
In addition to web services, another common service used across the internet is one that allows users to transfer files. File Transfer Protocol (16.5.1) In addition to web services, another common service used across the internet is one that allows users to transfer files. The File Transfer Protocol (FTP) provides an easy method to transfer…
A Note About Syntax Checker Activities
When you are learning how to modify device configurations, you might want to start in a safe, non-production environment before trying it on real equipment. There are different simulation tools to help build your configuration and troubleshooting skills. Because these are simulation tools, they typically do not have all the functionality of real equipment. One…
Network Application Services
Network application services allow users to use domain names instead of IP addresses, receive information from web servers, access our email, and perform file transfers. These are the services in which users interact with network and the internet. Common Network Application Services (16.2.1) What are the most common internet services that you use on a…
Client Requests a Web Page – 100-150 Exam Guide
Much of the information that we receive over the internet is provided in the form of web page documents. To request and view a web page, a person uses a device that is running web client software, such as a web browser.The key characteristic of client/server systems is that the client sends a request to…
Application Layer Services
ObjectivesUpon completion of this chapter, you will be able to answer the following questions: Key TermsThis chapter uses the following key terms. You can find the definitions in the Glossary.Domain Name System (DNS)Dynamic Host Configuration Protocol (DHCP)File Transfer Protocol (FTP)HyperText Markup Language (HTML)Hypertext Transfer Protocol (HTTP)Internet Message Access Protocol (IMAP)Post Office Protocol (POP)Secure Shell (SSH)Simple…
TCP and UDP Summary – 100-150 Exam Guide
The following is a summary of each topic in the chapter and some questions for your reflection. What Did I Learn in this Module? (15.3.1) • TCP and UDP—UDP is a ’best effort’ delivery system that does not require acknowledgment of receipt. UDP is preferable with applications such as streaming audio and VoIP. Acknowledgments would…