Module 3 - Protocols & Models Flashcards
There are three elements to any communication, which of the below are NOT one of these elements?
a. Source (sender)
b. Destination (receiver)
c. Channel (media)
d. User (device)
d. User (device)
__________ are the rules that communications will follow.
a. Protocols
b. Keywords
c. Arguments
d. Commands
a. Protocols
Which of the following is NOT a requirement for a network protocol?
a. Message encoding
b. Message decapsulation
c. Message formatting and encapsulation
d. Message size
e. Message timing
f. Message delivery options
b. Message decapsulation
Which of the following is NOT a requirement for a protocol?
a. An identified sender and receiver
b. Common language and grammar
c. An identified host name and user name
d. Speed and timing of delivery
e. Confirmation or acknowledgment requirements
c. An identified host name and user name
____________ is the process of converting information into another acceptable form for transmission.
a. Decoding
b. Recoding
c. Encoding
d. Encapsulation
c. Encoding
(Decoding reverses this process to interpret the information.)
Messages sent across the network are converted to ____
a. bits
b. bytes
c. gigabits
d. packets
a. bits
The bits are encoded into a pattern of light, _______, or electrical impulses.
a. UV
b. Gamma
c. Radio
d. Sound
d. Sound
What is the correct description of Flow Control, in reference to Message Timing?
a. Manages how long a device waits when it does not hear a reply from the destination.
b. Manages the rate of data transmission and defines how much information can be sent and the speed at which it can be delivered.
c. Determines when someone can send a message.
d. Determines how long a message takes to travel over the network
b. Manages the rate of data transmission and defines how much information can be sent and the speed at which it can be delivered.
What is the correct description of Response Timeout, in reference to Message Timing?
a. Manages how long a device waits when it does not hear a reply from the destination.
b. Manages the rate of data transmission and defines how much information can be sent and the speed at which it can be delivered.
c. Determines when someone can send a message.
d. Determines how long a message takes to travel over the network
a. Manages how long a device waits when it does not hear a reply from the destination.
The ____________ host must decode the signals to interpret the message.
a. Source
b. End user
c. Destination
d. Initial user
c. Destination
What is the correct description of Access method, in reference to Message Timing?
a. Manages how long a device waits when it does not hear a reply from the destination.
b. Manages the rate of data transmission and defines how much information can be sent and the speed at which it can be delivered.
c. Determines when someone can send a message.
d. Determines how long a message takes to travel over the network
c. Determines when someone can send a message.
What is the correct description of Unicast Message Delivery
a. One to Many (typically not all)
b. One to All
c. All to All
d. One to One
d. One to One
What is the correct description of Multicast Message Delivery
a. One to Many (typically not all)
b. One to All
c. All to All
d. One to One
a. One to Many (typically not all)
What is the correct description of Broadcast Message Delivery
a. One to Many (typically not all)
b. One to All
c. All to All
d. One to One
b. One to All
What is the correct description for Network Communications?
a. used for the automatic detection of devices or services
b. secure data to provide authentication, data integrity, and data encryption
c. enable two or more devices to communicate over one or more networks
d. enable routers to exchange route information, compare path information, and select best path
c. enable two or more devices to communicate over one or more networks
What is the correct description for Network Security?
a. used for the automatic detection of devices or services
b. secure data to provide authentication, data integrity, and data encryption
c. enable two or more devices to communicate over one or more networks
d. enable routers to exchange route information, compare path information, and select best path
b. secure data to provide authentication, data integrity, and data encryption
What is the correct description for Routing?
a. used for the automatic detection of devices or services
b. secure data to provide authentication, data integrity, and data encryption
c. enable two or more devices to communicate over one or more networks
d. enable routers to exchange route information, compare path information, and select best path
d. enable routers to exchange route information, compare path information, and select best path
What is the correct description for Routing?
a. used for the automatic detection of devices or services
b. secure data to provide authentication, data integrity, and data encryption
c. enable two or more devices to communicate over one or more networks
d. enable routers to exchange route information, compare path information, and select best path
a. used for the automatic detection of devices or services
Match the network protocol function to its description:
Addressing –>
Reliability –>
Flow Control –>
Sequencing –>
Error Detection –>
Application Interface –>
–> Process-to-process communications between network applications
–> Determines if data became corrupted during transmission
–> Uniquely labels each transmitted segment of data
–> Ensures data flows at an efficient rate
–> Provides guaranteed delivery
–> Identifies sender and receiver
Addressing –> Identifies sender and receiver
Reliability –> Provides guaranteed delivery
Flow Control –> Ensures data flows at an efficient rate
Sequencing –> Uniquely labels each transmitted segment of data
Error Detection –> Determines if data became corrupted during transmission
Application Interface –> Process-to-process communications between network applications
Match the protocol to its function:
Hypertext Transfer Protocol (HTTP) –>
Transmission Control Protocol (TCP) –>
Internet Protocol (IP) –>
Ethernet –>
–> Governs the way a web server and a web client interact / Defines content and format
–> Manages the individual conversations / Provides guaranteed delivery / Manages flow control
–> Delivers messages from one NIC to another NIC on the same Ethernet Local Area Network (LAN)
–>Delivers messages globally from the sender to the receiver
Hypertext Transfer Protocol (HTTP) –> Governs the way a web server and a web client interact / Defines content and format
Transmission Control Protocol (TCP) –>Manages the individual conversations / Provides guaranteed delivery / Manages flow control
Internet Protocol (IP) –> Delivers messages globally from the sender to the receiver
Ethernet –> Delivers messages from one NIC to another NIC on the same Ethernet Local Area Network (LAN)
What is a group of inter-related protocols necessary to perform a communication function
a. Protocol suite
b. Protocol system
c. control suite
d. control
a. Protocol suite
The protocols are viewed in terms of layers:
a. Physical layers / Data layers
b. Physical layers / Network layers
c. Data layers / Transport layers
d. Higher layers / lower layers
d. Higher layers / lower layers
(Lower Layers- concerned with moving data and provide services to upper layers)
Internet Protocol Suite or TCP/IP is maintained by which organisation?
a. International Organization for Standardization (ISO)
b. Internet Engineering Task Force (IETF)
c. International Telecommunications Union (ITU)
d. Apple Inc.
b. Internet Engineering Task Force (IETF)
Open Systems Interconnection (OSI) protocols are maintained by which organisations (pick two)?
a. International Organization for Standardization (ISO)
b. Internet Engineering Task Force (IETF)
c. International Telecommunications Union (ITU)
d. Apple Inc.
a. International Organization for Standardization (ISO)
c. International Telecommunications Union (ITU)
What OSI Model Layers do TCP/IP Protocols operate at?
a. physical, transport, and internet layers.
b. Physical, transport, and network layers.
c. application, network, and internet layers.
d. application, transport, and internet layers.
d. application, transport, and internet layers.
The most common network access layer LAN protocols are:
a. Ethernet and WLAN (wireless LAN).
b. Ethernet and VLAN (virtual LAN).
c. Ethernet and WAN
d. Ethernet and PAN
a. Ethernet and WLAN (wireless LAN).
______ is an open standard protocol suite that is freely available to the public and can be used by any vendor
a. DNS
b. IPv6
c. TCP/IP
d. ICMPv4
c. TCP/IP
The TCP/IP communication process starts with a web server encapsulating and sending a web page to a client, and ends with
a. A web server de-encapsulating the web page for the web browser
b. A client de-encapsulating the web page for the web browser
c. A client encapsulating the web page for the web browser
d. A web server encapsulating the web page for the User
b. A client de-encapsulating the web page for the web browser
Match the Internet Standards Organisation to its description:
Internet Society (ISOC)–>
Internet Architecture Board (IAB)–>
Internet Engineering Task Force (IETF)–>
Internet Research Task Force (IRTF)–>
Internet Corporation for Assigned Names and Numbers (ICANN)–>
Internet Assigned Numbers Authority (IANA)–>
–>Promotes the open development and evolution of internet
–>Responsible for management and development of internet standards
–>Develops, updates, and maintains internet and TCP/IP technologies
–>Focused on long-term research related to internet and TCP/IP protocols
–> Oversees and manages IP address allocation, domain name management, and protocol identifiers for ICANN
–> Coordinates IP address allocation, the management of domain names, and assignment of other information
Internet Society (ISOC)- Promotes the open development and evolution of internet
Internet Architecture Board (IAB)- Responsible for management and development of internet standards
Internet Engineering Task Force (IETF)- Develops, updates, and maintains internet and TCP/IP technologies
Internet Research Task Force (IRTF)- Focused on long-term research related to internet and TCP/IP protocols
Internet Corporation for Assigned Names and Numbers (ICANN)- Coordinates IP address allocation, the management of domain names, and assignment of other information
Internet Assigned Numbers Authority (IANA)- Oversees and manages IP address allocation, domain name management, and protocol identifiers for ICANN
Put the 7 layers of the OSI model in the correct order
7.
6.
5.
4.
3.
2.
1.
Network
Data Link
Physical
Transport
Session
Presentation
Application
- Application
- Presentation
- Session
- Transport
- Network
- Data Link
- Physical
Put the 4 layers of the TCP/IP model in the correct order
4.
3.
2.
1.
Internet
Network Access
Application
Transport
- Application
- Transport
- Internet
- Network access
Match the Electronic and Communication Standards Organisation to its description:
Institute of Electrical and Electronics Engineers(IEEE) –>
Electronic Industries Alliance (EIA)
–>
Telecommunications Industry Association (TIA)–>
International Telecommunications Union-Telecommunication Standardization Sector (ITU-T) –>
–>develops standards relating to electrical wiring, connectors, and the 19-inch racks used to mount networking equipment
–>dedicated to creating standards in power and energy, healthcare, telecommunications, and networking
–>develops communication standards in radio equipment, cellular towers, Voice over IP (VoIP) devices, satellite communications, and more
–>defines standards for video compression, Internet Protocol Television (IPTV), and broadband communications, such as a digital subscriber line (DSL)
Institute of Electrical and Electronics Engineers(IEEE) - dedicated to creating standards in power and energy, healthcare, telecommunications, and networking
Electronic Industries Alliance (EIA)- develops standards relating to electrical wiring, connectors, and the 19-inch racks used to mount networking equipment
Telecommunications Industry Association (TIA)- develops communication standards in radio equipment, cellular towers, Voice over IP (VoIP) devices, satellite communications, and more
International Telecommunications Union-Telecommunication Standardization Sector (ITU-T) - defines standards for video compression, Internet Protocol Television (IPTV), and broadband communications, such as a digital subscriber line (DSL)
Match the Protocol Data Unit (PDU) to the OSI layer:
- Application –> Data
- Presentation –> Packets
- Session –> Segments
- Transport –> Bits
- Network –> Frames
- Data Link –>
- Physical –>
- Application –> Data
- Presentation –> Data
- Session –> Data
- Transport –> Segment
- Network –> Packets
- Data Link –> Frames
- Physical –> Bits
Match the Protocol Data Unit (PDU) to the TCP/IP layer:
- Application –> Bits / Frames
- Transport –> Data
- Internet –> Packets
- Network access –> Segment
- Application –> Data
- Transport –> Segment
- Internet –> Packets
- Network access –> Bits / Frames
The OSI model divides the network access layer and the application layer of the TCP/IP model into multiple layers. Correctly match the OSI model to the TCP/IP model:
- Application 4.Application
- Presentation 3. Transport
- Session 2. Internet
- Transport 1. Network access
- Network
- Data Link
- Physical
- Application–> 4.Application
- Presentation–> 4.Application
- Session–> 4.Application
- Transport–>3. Transport
- Network–>2. Internet
- Data Link–>1. Network access
- Physical–>1. Network access
___________ is the process of breaking up messages into smaller units. Multiplexing is the processes of taking multiple streams of segmented data and interleaving them together.
a. Segmenting
b. Separating
c. Dividing
d. Multiplying
a. Segmenting
Segmenting messages has two primary benefits (pick TWO answers):
a. Decreases Server downtime
b. Increases Efficiency
c. Increases Speed
d. Decreases network traffic flow
b. Increases Efficiency
c. Increases Speed
_____________ messages is the process of numbering the segments so that the message may be reassembled at the destination.
a. Detailing
b. Addressing
c. Segmenting
d. Sequencing
d. Sequencing
Both the data link and network layers use addressing to deliver data from source to destination. True or False; The network layer source and destination addresses are responsible for delivering the IP packet from original source to the final destination.
True
True or False; The data link layer source and destination addresses are responsible for delivering the data link frame from one network interface card (NIC) to another NIC on a different network.
False, The data link layer source and destination addresses are responsible for delivering the data link frame from one network interface card (NIC) to another NIC on THE SAME network.
What is a source IP address?
a. The IP address of the sending device, final destination of the packet.
b. The IP address of the sending device, original source of the packet.
c. The MAC address of the receiving device, final destination of the packet.
d. The IP address of the receiving device, final destination of the packet.
b. The IP address of the sending device, original source of the packet.
a.
b.
c.
d.
a.
b.
c.
d.
a.
b.
c.
d.
a.
b.
c.
d.
a.
b.
c.
d.
a.
b.
c.
d.
a.
b.
c.
d.
a.
b.
c.
d.
a.
b.
c.
d.