Chapter 1 Flashcards

1
Q

What are the three criteria necessary for an effective and efficient network?

A

Performance, Reliability, Scalability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Group the OSI layers by function.

A

The OSI layers can be grouped by function as follows:

Application-Oriented Layers:
Application Layer (Layer 7)
Presentation Layer (Layer 6)
Session Layer (Layer 5)
These layers handle end-user services, data formatting, and session management.
Data Transport Layers:
Transport Layer (Layer 4)
This layer provides reliable data transfer between devices.
Network-Oriented Layers:
Network Layer (Layer 3)
Data Link Layer (Layer 2)
Physical Layer (Layer 1)
These layers handle data routing, physical addressing, and the transmission of raw bits over physical media.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Why are protocols needed?

A

Without network protocols, computers and other devices would not know how to engage with each other.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Write the parameters used to measure network performance.

A

Network performance is measured in two fundamental ways: bandwidth (also called throughput) and latency (also called delay).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the major duties of Network Layer?

A

The network layer has two main functions. One is breaking up segments into network packets, and reassembling the packets on the receiving end. The other is routing packets by discovering the best path across a physical network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the use of Switch?

A

A switch enables connected devices to share information and talk to each other.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the function of Bridge?

A

A bridge is a network device that connects multiple subnetworks to create a single network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define source routing.

A

Source packet routing or segment routing is a control-plane architecture that enables an ingress router to steer a packet through a specific set of nodes and links in the network without relying on the intermediate nodes in the network to determine the actual path it should take.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the difference between switch and bridge?

A

A bridge is a point-to-point connection joining two LANs using the same protocol, such as Ethernet. A switch is a multiport bridge that connects multiple clients and chooses the packet path on the network. Every switch is a bridge, but bridges are not truly switches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the characteristics of data communications system?

A

The effectiveness of a data communications system depends on four fundamental characteristics: delivery, accuracy, timeliness and jitter.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Give an advantage for each type of network topology.

A

Network reliability and fault tolerance
Mesh topologies, for example, provide multiple data paths, enhancing network reliability. If one node or link fails, data can be rerouted through alternative paths. In contrast, bus or star topologies might be more vulnerable to single points of failure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Discuss the three main division of the domain name space.

A

TCP/IP protocol DNS is used on several platforms. Country domains, generic domains, and inverse domains are the three divisions of the domain name space.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Mention the different levels in domain name space.

A

TCP/IP protocol DNS is used on several platforms. Country domains, generic domains, and inverse domains are the three divisions of the domain name space.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Explain the protocols for retrieving and transmitting E-mails.

A

Email clients use Mail Access protocols like the POP/ IMAP protocols to retrieve/ sync emails from the server. Basically, mail access protocols are used to download or sync emails from the server. Email clients use transfer protocol - the SMTP protocol to transfer/ send emails through the server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Justify the need for layer five in the OSI model.

A

The Session Layer, positioned as the fifth layer in the OSI Model, is responsible for establishing, maintaining, and terminating communication sessions between devices. It plays a crucial role in ensuring that data exchange between applications is synchronized, organized, and reliable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the Applications of FTP?

A

FTP (File Transfer Protocol) is a standard network protocol used for the transfer of files from one host to another over a TCP-based network, such as the Internet

17
Q

Mention the types of HTTP messages.

A

HTTP messages are how data is exchanged between a server and a client. There are two types of messages: requests sent by the client to trigger an action on the server, and responses, the answer from the server.

18
Q

List the function of POP.

A

The pop() method removes and returns the last element from a Python list by default. It can also be used to remove and return an element from a specific position in the list by passing the index of the element to be removed as an argument.

19
Q

List the two types of DNS message.

A

The DNS protocol uses two types of DNS messages, queries and responses; both have the same format. Each message consists of a header and four sections: question, answer, authority, and an additional space.

20
Q

State the purpose of SNMP.

A

The purpose of SNMP is to provide network devices, such as routers, servers and printers, with a common language for sharing information with a network management system (NMS).