Chapter 2 Flashcards

1
Q

(OSI)stands for what? p28

A

Open Systems Interconnection (OSI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

is the process of encoding data as it goes down the OSI stack. p28

A

Encapsulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

is a conceptual blueprint of how communications should take place. It addresses all the processes required for effective communication and divides these processes into logical groupings called layers. p28

A

reference model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

If they’re developing a protocol for a certain layer, all they need to concern them- selves with is that specific layer’s functions, not those of any other layer.The technical term for this idea is called?p29

A

binding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Advantages of using the OSI layered model include, but are not limited to, the following: p29

A

It divides the network communication process into smaller and simpler components, thus aiding component development, design, and troubleshooting.
It allows multiple-vendor development through standardization of network components.
It encourages industry standardization by defining what functions occur at each layer of the model.
It allows various types of network hardware and software to communicate
It prevents changes in one layer from affecting other layers, so it doesn’t hamper development and makes application programming easier.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The OSI model has seven layers: p30

A
Application (Layer 7)
Presentation (Layer 6)
Session (Layer 5)
Transport (Layer 4)
Network (Layer 3)
Data Link (Layer 2)
Physical (Layer 1)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Provides a user interface

A

Application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Presents data

Handles processing such as encryption

A

Presentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Keeps different applications’

data separate

A

Session

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Provides reliable or unreliable delivery

Performs error correction before retransmit

A

Transport

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Provides logical addressing

which routers use for path determination

A

Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Combines packets into bytes and bytes into frames
Provides access to media using MAC address
Performs error detection not correction

A

Data Link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Moves bits between devices

Specifies voltage, wire speed,and pin-out of cables.

A

Physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

After all of this required synchronization takes place, a connection is fully established and the data transfer begins. This virtual circuit setup is called?p34

A

overhead.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a flow control?p35

A

Flow control provides a means for the receiver to govern the amount of data sent by the sender.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are some of the Flow Control protocols involved ensure that the following will be achieved: p35

A

The segments delivered are acknowledged back to the sender upon their reception
Any segments not acknowledged are retransmitted
Segments are sequenced back into their proper order upon arrival at their destination
A manageable data flow is maintained in order to avoid congestion, overloading, and data loss

17
Q

what happens when a machine receives a flood of datagrams too quickly for it to process? It stores them in a memory section called a what?p35

A

Buffer

18
Q

To summarize, a service is considered connection-oriented if it has the following characteristics: p36

A

A virtual circuit is set up (such as a three-way handshake).
It uses sequencing.
It uses acknowledgments.
It uses flow control

19
Q

The quantity of data segments (measured in bytes) that the transmitting machine is allowed to send without receiving an acknowledgment for them is called.p37

A

window

20
Q

a technique that requires a receiving machine to communicate with the transmitting source by sending an acknowledgment message back to the sender when it receives data. p38

A

positive acknowledgment with retransmission

21
Q

The following network devices operate at all seven layers of the OSI model:p39

A

Network management stations (NMSs)
Web and application servers
Gateways (not default gateways)
Network hosts

22
Q

These devices manipulate mainly the physical aspects of a network data stream (such as the voltages, signal direction, and signal strength). The most popular of these are the following:p39

A

Network Interface Cards (NICs)
Transceivers
Repeaters
Hubs

23
Q

What is a Network Layer.p39

A

manages device addressing, tracks the location of devices on the network, and determines the best way to move data, which means that the Network layer must trans- port traffic between devices that aren’t locally attached.

24
Q

Two types of packets are used at the Network layer: p40

A

Data packets

Route-update packets

25
Q

What are some points about routers that you should definitely commit to memory: p41

A

Routers, by default, won’t forward any broadcast or multicast packets
Routers use the logical address in a Network-layer header to determine the next hop router to forward the packet to.
Routers can use access lists, created by an administrator, to control security on the types of packets that are allowed to enter or exit an interface
Routers can provide Layer 2 bridging functions if needed and can simultaneously route through the same interface.
Layer 3 devices (routers, in this case) provide connections between virtual LANs (VLANs).
Routers can provide quality of service (QoS) for specific types of network traffic

26
Q

provides the physical transmission of the data and handles error notification, network topology, and flow control.p42

A

Data Link layer

27
Q

The Data Link layer formats the message into pieces, each called p42

A

data frame

28
Q

The IEEE Ethernet Data Link layer has two sublayers:p43

A

Media Access Control (MAC)

Logical Link Control (LLC)

29
Q

Physical layer, which does two important things: p44

A

It sends bits and receives bits