Module 5: Communication Principles Flashcards

Explain the importance of standards and protocols in network communications.

1
Q

5.1.1 Communication Protocols

Communication in our daily lives takes many forms and occurs in many environments. We have different expectations depending on whether we are chatting via the internet or participating in a job interview. Each situation has its corresponding expected behaviors and styles.

Before beginning to communicate with each other, we establish rules or agreements to govern the conversation. These agreements include the following:

  1. What method of communication should we use?
  2. What language should we use?
  3. Do we need to confirm that our messages are received?
A

Noted

Method, Language, and Confirmation Strategies

Before communication can begin, we may have to reach an agreement on the method used.

Before communication can begin, we may have to reach an agreement on the language used.

Communication is successful when the intended message has been received and confirmed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

These rules, or ___, must be followed in order for the message to be successfully delivered and understood.

A

protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Among the protocols that govern successful human communication are these:

  • An identified sender and receiver
  • Agreed upon method of communicating (face-to-face, telephone, letter, photograph)
  • Common language and grammar
  • Speed and timing of delivery
  • Confirmation or acknowledgment requirements
  • The techniques that are used in network communications share these fundamentals with human conversations.

Think about the commonly accepted protocols for sending text messages to your friends.

A

Noted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Just like humans, computers use ___, or ___, to communicate.

A

rules, protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

___ are required for computers to properly communicate across the network.

A

Protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

In both a wired and wireless environment, a ___ is defined as an area where all hosts must “speak the same language,” which, in computer terms means they must “share a common protocol.”

A

local network

If everyone in the same room spoke a different language, they would not be able to communicate. Likewise, if devices in a local network did not use the same protocols, they would not be able to communicate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

___ define many aspects of communication over the local network. These include message format, message size, timing, encoding, encapsulation, and message patterns.

A

Networking protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Protocol Characteristic

When a message is sent, it must use a specific ___ or structure. These depend on the type of message and the channel that is used to deliver the message.

A

Message format

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Protocol Characteristic

The rules that govern the ___ of the pieces communicated across the network are very strict. They can also be different, depending on the channel used.

When a long message is sent from one host to another over a network, it may be necessary to break the message into smaller pieces in order to ensure that the message can be delivered reliably.

A

Message size

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Protocol Characteristic

Many network communication functions are dependent on ___. It determines the speed at which the bits are transmitted across the network. It also affects when an individual host can send data and the total amount of data that can be sent in any one transmission.

A

Timing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Protocol Characteristic

Messages sent across the network are first converted into bits by the sending host. Each bit is ___ into a pattern of sounds, light waves, or electrical impulses depending on the network media over which the bits are transmitted. The destination host receives and decodes the signals in order to interpret the message.

A

Encoding (encoded)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Protocol Characteristic

Each message transmitted on a network must include a header that contains addressing information that identifies the source and destination hosts, otherwise it cannot be delivered.

___ is the process of adding this information to the pieces of data that make up the message. In addition to addressing, there may be other information in the header that ensures that the message is delivered to the correct application on the destination host.

A

Encapsulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Protocol Characteristic

Some messages require an acknowledgment before the next message can be sent. This type of request/response ___ is a common aspect of many networking protocols. However, there are other types of messages that may be simply streamed across the network, without concern as to whether they reach their destination.

A

Message pattern

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

5.1.3 Check Your Understanding - Communication Protocols

Bianka, a Polish traveler in Hanoi, Vietnam, stops and asks Nguyệt for directions to the Ngoc Son Temple. They verbally communicate and determine that they both speak English. After receiving directions in English to the temple, Bianka repeats them to Nguyệt. Nguyệt says, “Yes, that is correct.” Select the order of the communications protocols used in this scenario?

◯ method, language, confirmation

◯ method, confirmation, language

◯ confirmation, method, language

◯ language, method, confirmation

A

method, language, confirmation

Bianka and Nguyệt first decided on the method of communication (verbal). Then they determined the that both speak English (language). Finally, Bianka repeated the directions (confirmation).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

5.1.3 Check Your Understanding - Communication Protocols

Rory is studying the fields inside an Ethernet frame for an upcoming test and notices that the destination Media Access Control (MAC) address is listed first before the source MAC address. Which of the following protocol characteristics is Rory investigating?

◯ encoding

◯ message pattern

◯ message timing

◯ timing

◯ encapsulation

A

encapsulation

Networking protocols often have some type of addressing information to indicate the source and destination for the message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

5.1.3 Check Your Understanding - Communication Protocols

As Rory continues to study Ethernet, he discovers that a frame can typically be 64 to 1518 bytes of information that is converted into a series of bits before being sent out on the network. Which two protocol characteristics did Rory learn about for Ethernet?

▢ message pattern

▢ encapsulation

▢ encoding

▢ message size

▢ timing

A

encoding

message size

Networking protocols typically specify the maximum size for a message. In the case of Ethernet, there is also a minimum size of 64 bytes. In addition, Ethernet specifies a method for encoding the bits so that the destination can decode the message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

5.2.2 The Internet and Standards

With the increasing number of new devices and technologies coming online, how is it possible to manage all the changes and still reliably deliver services such as email? The answer is internet standards.

A standard is a set of rules that determines how something must be done. Networking and internet standards ensure that all devices connecting to the network implement the same set of rules or protocols in the same manner. Using standards, it is possible for different types of devices to send information to each other over the internet.

For example, the way in which an email is formatted, forwarded, and received by all devices is done according to a standard. If one person sends an email via a personal computer, another person can use a mobile phone to receive and read the email as long as the mobile phone uses the same standards as the personal computer.

A

Noted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A ___ is a set of rules that determines how something must be done.

A

standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

___ and ___ standards ensure that all devices connecting to the network implement the same set of rules or protocols in the same manner.

A

Networking, internet

Using standards, it is possible for different types of devices to send information to each other over the internet.

For example, the way in which an email is formatted, forwarded, and received by all devices is done according to a standard. If one person sends an email via a personal computer, another person can use a mobile phone to receive and read the email as long as the mobile phone uses the same standards as the personal computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

5.2.3 Network Standards Organizations

An internet standard is the end result of a comprehensive cycle of discussion, problem solving, and testing. These different standards are developed, published, and maintained by a variety of organizations.

When a new standard is proposed, each stage of the development and approval process is recorded in a numbered Request for Comments (RFC) document so that the evolution of the standard is tracked. RFCs for internet standards are published and managed by the Internet Engineering Task Force (IETF).

Other standards organizations that support the internet include:
* IEEE (Institute of Electrical and Electronics Engineers)
* IANA (Internet Assigned Numbers Authority)
* ICANN (Internet Corporation for Assigned Names and Numbers)
* IETF (Internet Engineering Task Force)
* ITU (International Telecommunication Union)
* TIA (Telecommunications Industry Association)

A

Noted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

When a new standard is proposed, each stage of the development and approval process is recorded in a numbered ___ document so that the evolution of the standard is tracked.

A

Request for Comments (RFC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

RFCs for internet standards are published and managed by the ___.

A

Internet Engineering Task Force (IETF)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

5.2.4 Check Your Understanding - Communications Standards

The rules that govern network communications including the message format, message size, timing, and encapsulation, are known as network:

◯ messaging

◯ protocols

◯ signaling

◯ encoding

A

protocols

Protocols are the rules that govern network communications including the message format, message size, timing and encapsulation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

5.2.4 Check Your Understanding - Communications Standards

The IETF (Internet Engineering Task Force) records and publishes internet standards in documents known as:

◯ Internet Specification Standards (ISS)

◯ Internet Protocol Standards (IPS)

◯ Request for Comments (RFC)

◯ IETF Standards Documents (ISD)

A

Request for Comments (RFC)

The IETF publishes internet standards known as RFCs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Here are the common protocols that make up computer messages:

  • Ethernet (Defines wired network communication at the data link layer)
  • IP (Internet Protocol – Handles addressing and routing of packets across networks)
  • TCP (Transmission Control Protocol – Ensures reliable, ordered, and error-checked delivery of data)
  • HTTP (Hypertext Transfer Protocol – Facilitates communication between web browsers and servers)
A

Noted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

The ___ protocol governs network interface card to network interface card communication in the same network.

A

Ethernet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

___ governs communication from the original source all the way to the final destination. It ensures that the message gets there, and routers along the way determine where the packet is going.

A

IP (Internet Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

___ makes sure the information gets there reliably. If packets arrive out of order, it ensures they are reassembled in the correct sequence.

A

TCP (Transmission Control Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

___ governs the exchange or transfer of HTML. When we request or download a webpage, the message contains all of these protocols.

A

HTTP (Hypertext Transfer Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

5.3.2 Video - The Protocol Stack

Successful communication requires the use of several protocols. When a device sends a message, it actually uses multiple protocols. This is known as a Protocol Stack. Here, I am showing the TCP/IP model, which consists of different layers: the Network Access Layer, Internet Layer, Transport Layer, and Application Layer.

When a device creates a message, it utilizes protocols from different layers. For example, at the Network Access Layer, the Ethernet protocol is used for communication within the same network. Next, at the Internet Layer, the IP protocol (either IPv4 or IPv6) ensures that the message reaches its final destination, whether within the same network or across multiple networks.

At the Transport Layer, the TCP (Transmission Control Protocol) ensures reliable communication. Finally, at the Application Layer, protocols such as HTTP (Hypertext Transfer Protocol) facilitate the transfer of HTML content.

As you can see, sending a message requires multiple protocols working together within the protocol stack.

A

Noted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

5.3.3 The TCP/IP Model

Layered models help us visualize how the various protocols work together to enable network communications. A layered model depicts the operation of the protocols occurring within each layer, as well as the interaction with the layers above and below it. The layered model has many benefits:

  • Assists in protocol design, because protocols that operate at a specific layer have defined information that they act upon and a defined interface to the layers above and below.
  • Fosters competition because products from different vendors can work together.
  • Enables technology changes to occur at one level without affecting the other levels.
  • Provides a common language to describe networking functions and capabilities.

The first layered model for internetwork communications was created in the early 1970s and is referred to as the internet model. It defines four categories of functions (Application, Transport, Internet, Network Access) that must occur in order for communications to be successful. The suite of TCP/IP protocols that are used for internet communications follows the structure of this model. Because of this, the internet model is commonly referred to as the TCP/IP model.

32
Q

___ help us visualize how the various protocols work together to enable network communications.

A

Layered models

33
Q

A ___ depicts the operation of the protocols occurring within each layer, as well as the interaction with the layers above and below it.

A

layered model

34
Q

The first layered model for internetwork communications was created in the early 1970s and is referred to as the ___.

A

internet model

35
Q

The first layered model for internetwork communications was created in the early 1970s and is referred to as the internet model. It defines four categories of functions (Application, Transport, Internet, Network Access) that must occur in order for communications to be successful.

The suite of TCP/IP protocols that are used for internet communications follows the structure of this model. Because of this, the internet model is commonly referred to as the ___.

A

TCP/IP model

36
Q

TCP/IP Model Layer

TCP/IP Model Layer
* Application - Represents data to the user, plus encoding and dialog control.
* Transport - Supports communication between various devices across diverse networks.
* Internet - Determines the best path through the network.
* Network Access - Controls the hardware devices and media that make up the network.

37
Q

TCP/IP Model Layer

A
  • Application - Represents data to the user, plus encoding and dialog control.
  • Transport - Supports communication between various devices across diverse networks.
  • Internet - Determines the best path through the network.
  • Network Access - Controls the hardware devices and media that make up the network.
38
Q

TCP/IP Model Layer

Represents data to the user, plus encoding and dialog control.

A

Application

39
Q

TCP/IP Model Layer

Supports communication between various devices across diverse networks.

40
Q

TCP/IP Model Layer

Determines the best path through the network.

41
Q

TCP/IP Model Layer

Controls the hardware devices and media that make up the network.

A

Network Access

42
Q

5.3.4 The OSI Reference Model
There are two basic types of models that we use to describe the functions that must occur in order for network communications to be successful: protocol models and reference models.

  • Protocol model - This model closely matches the structure of a particular protocol suite. A protocol suite includes the set of related protocols that typically provide all the functionality required for people to communicate with the data network. The TCP/IP model is a protocol model because it describes the functions that occur at each layer of protocols within the TCP/IP suite.
  • Reference model - This type of model describes the functions that must be completed at a particular layer, but does not specify exactly how a function should be accomplished. A reference model is not intended to provide a sufficient level of detail to define precisely how each protocol should work at each layer. The primary purpose of a reference model is to aid in clearer understanding of the functions and processes necessary for network communications.

The most widely known internetwork reference model was created by the Open Systems Interconnection (OSI) project at the International Organization for Standardization (ISO). It is used for data network design, operation specifications, and troubleshooting. This model is commonly referred to as the OSl model.

43
Q

There are two basic types of models that we use to describe the functions that must occur in order for network communications to be successful: ___ models and ___ models.

A

protocol, reference

44
Q

This model closely matches the structure of a particular protocol suite. A protocol suite includes the set of related protocols that typically provide all the functionality required for people to communicate with the data network.

A

Protocol model

The TCP/IP model is a protocol model of this because it describes the functions that occur at each layer of protocols within the TCP/IP suite.

45
Q

A ___ includes the set of related protocols that typically provide all the functionality required for people to communicate with the data network.

A

protocol suite

46
Q

This type of model describes the functions that must be completed at a particular layer, but does not specify exactly how a function should be accomplished.

A

Reference model

This is not intended to provide a sufficient level of detail to define precisely how each protocol should work at each layer. The primary purpose of this is to aid in clearer understanding of the functions and processes necessary for network communications.

47
Q

The most widely known internetwork reference model was created by the ___ project at the International Organization for Standardization (ISO).

A

Open Systems Interconnection (OSI)

It is used for data network design, operation specifications, and troubleshooting. This model is commonly referred to as the OSl model.

48
Q

OSI Model Layer
7 - Application
The application layer contains protocols used for process-to-process communications.
6 - Presentation
The presentation layer provides for common representation of the data transferred between application layer services.
5 - Session
The session layer provides services to the presentation layer to organize its dialogue and to manage data exchange.
4 - Transport
The transport layer defines services to segment, transfer, and reassemble the data for individual communications between the end devices.
3 - Network
The network layer provides services to exchange the individual pieces of data over the network between identified end devices.
2 - Data Link
The data link layer protocols describe methods for exchanging data frames between devices over a common media.
1 - Physical
The physical layer protocols describe the mechanical, electrical, functional, and procedural means to activate, maintain, and de-activate physical connections for a bit transmission to and from a network device.

49
Q

OSI Model Layer

A

7 - Application
The application layer contains protocols used for process-to-process communications.
6 - Presentation
The presentation layer provides for common representation of the data transferred between application layer services.
5 - Session
The session layer provides services to the presentation layer to organize its dialogue and to manage data exchange.
4 - Transport
The transport layer defines services to segment, transfer, and reassemble the data for individual communications between the end devices.
3 - Network
The network layer provides services to exchange the individual pieces of data over the network between identified end devices.
2 - Data Link
The data link layer protocols describe methods for exchanging data frames between devices over a common media.
1 - Physical
The physical layer protocols describe the mechanical, electrical, functional, and procedural means to activate, maintain, and de-activate physical connections for a bit transmission to and from a network device.

50
Q

OSI Model Layer

Contains protocols used for process-to-process communications.

A

7 - Application

51
Q

OSI Model Layer

Provides for common representation of the data transferred between application layer services.

A

6 - Presentation

52
Q

OSI Model Layer

Provides services to the presentation layer to organize its dialogue and to manage data exchange.

A

5 - Session

53
Q

OSI Model Layer

Defines services to segment, transfer, and reassemble the data for individual communications between the end devices.

A

4 - Transport

54
Q

OSI Model Layer

Provides services to exchange the individual pieces of data over the network between identified end devices.

A

3 - Network

55
Q

OSI Model Layer

Protocols describe methods for exchanging data frames between devices over a common media.

A

2 - Data Link

56
Q

OSI Model Layer

Protocols describe the mechanical, electrical, functional, and procedural means to activate, maintain, and de-activate physical connections for a bit transmission to and from a network device.

A

1 - Physical

57
Q

5.3.5 OSI Model and TCP/IP Model Comparison

Because TCP/IP is the protocol suite in use for internet communications, why do we need to learn the OSI model as well?

The TCP/IP model is a method of visualizing the interactions of the various protocols that make up the TCP/IP protocol suite. It does not describe general functions that are necessary for all networking communications. It describes the networking functions specific to those protocols in use in the TCP/IP protocol suite.

For example, at the network access layer, the TCP/IP protocol suite does not specify which protocols to use when transmitting over a physical medium, nor the method of encoding the signals for transmission. OSI Layers 1 and 2 discuss the necessary procedures to access the media and the physical means to send data over a network.

The protocols that make up the TCP/IP protocol suite can be described in terms of the OSI reference model. The functions that occur at the internet layer in the TCP/IP model are contained in the network layer of the OSI Model, as shown in the figure. The transport layer functionality is the same between both models. However, the network access layer and the application layer of the TCP/IP model are further divided in the OSI model to describe discrete functions that must occur at these layers.

A

Noted

Application (TCP/IP model)
Application (OSI model)
Presentation (OSI model)
Session (OSI model)
///
Transport (TCP/IP model)
Transport (OSI model)
///
Internet (TCP/IP model)
Network (OSI model)
///
Network Access (TCP/IP model)
Data Link (OSI model)
Physical (OSI model)

58
Q

The key similarities are in the transport and network layers; however, the two models differ in how they relate to the layers above and below each layer:

  • OSI Layer 3, the network layer, maps directly to the TCP/IP internet layer. This layer is used to describe protocols that address and route messages through an internetwork.
  • OSI Layer 4, the transport layer, maps directly to the TCP/IP transport layer. This layer describes general services and functions that provide ordered and reliable delivery of data between source and destination hosts.
  • The TCP/IP application layer includes several protocols that provide specific functionality to a variety of end user applications. The OSI model Layers 5, 6, and 7 are used as references for application software developers and vendors to produce applications that operate on networks.
  • Both the TCP/IP and OSI models are commonly used when referring to protocols at various layers. Because the OSI model separates the data link layer from the physical layer, it is commonly used when referring to these lower layers.

Application (TCP/IP model)
Application (OSI model)
Presentation (OSI model)
Session (OSI model)
///
Transport (TCP/IP model)
Transport (OSI model)
///
Internet (TCP/IP model)
Network (OSI model)
///
Network Access (TCP/IP model)
Data Link (OSI model)
Physical (OSI model)

59
Q

5.3.6 Check Your Understanding - Network Communication Models

Which protocol is responsible for guaranteeing reliable delivery?

◯ TCP

◯ IP

◯ Ethernet

◯ HTTP

A

TCP

Transport Control Protocol (TCP) is responsible for guaranteeing reliable delivery.

60
Q

5.3.6 Check Your Understanding - Network Communication Models

Which protocol is used by routers to forward messages?

◯ TCP

◯ Ethernet

◯ IP

◯ HTTP

A

IP

Internet Protocol (IP) is used by routers to forward messages.

61
Q

5.3.6 Check Your Understanding - Network Communication Models

Which two layers of the OSI Model maps directly as the single network access layer in the TCP/IP model? (Choose two)

▢ session

▢ application

▢ data link

▢ network

▢ physical

▢ transport

▢ presentation

A

data link

physical

The OSI model data link and network layers correspond to the network access layer in the TCP/IP model.

62
Q

5.3.6 Check Your Understanding - Network Communication Models

IP addressing occurs at what layer of the OSI Model?

◯ transport

◯ network

◯ session

◯ application

◯ data link

◯ physical

◯ presentation

A

network

IP addressing occurs at the network layer.

63
Q

5.4 Communication Principles Summary

Communication Protocol

Protocols are required for computers to properly communicate across the network. These include message format, message size, timing, encoding, encapsulation, and message patterns.

  • Message format - When a message is sent, it must use a specific format or structure.
  • Message size - The rules that govern the size of the pieces communicated across the network are very strict. They can also be different, depending on the channel used.
  • Timing - Timing determines the speed at which the bits are transmitted across the network. It also affects when an individual host can send data and the total amount of data that can be sent in any one transmission.
  • Encoding - Messages sent across the network are first converted into bits by the sending host. Each bit is encoded into a pattern of sounds, light waves, or electrical impulses depending on the network media over which the bits are transmitted.
  • Encapsulation - Each message transmitted on a network must include a header that contains addressing information that identifies the source and destination hosts. Encapsulation is the process of adding this information to the pieces of data that make up the message.
  • Message pattern - Some messages require an acknowledgment before the next message can be sent. This type of request/response pattern is a common aspect of many networking protocols. However, there are other types of messages that may be simply streamed across the network, without concern as to whether they reach their destination.
64
Q

5.4 Communication Principles Summary

Communication Standards

Topologies allow us to see the networking using representation of end devices and intermediary devices. How does a device see a network? Think of a device in a bubble. The only thing a device sees is its own addressing information. How does the device know it is on the same network as another device? The answer is network protocols. Most network communications are broken up into smaller data units, or packets.

A standard is a set of rules that determines how something must be done. Networking and internet standards ensure that all devices connecting to the network implement the same set of rules or protocols in the same manner. Using standards, it is possible for different types of devices to send information to each other over the internet.

An internet standard is the end result of a comprehensive cycle of discussion, problem solving, and testing. These different standards are developed, published, and maintained by a variety of organizations. When a new standard is proposed, each stage of the development and approval process is recorded in a numbered RFC document so that the evolution of the standard is tracked. RFCs for internet standards are published and managed by the IETF.

65
Q

5.4 Communication Principles Summary

Network Communication Models

Protocols are the rules that govern communications. Successful communication between hosts requires interaction between a number of protocols. Protocols include HTTP, TCP, IP, and Ethernet. These protocols are implemented in software and hardware that are installed on each host and networking device.

The interaction between the different protocols on a device can be illustrated as a protocol stack. A stack illustrates the protocols as a layered hierarchy, with each higher-level protocol depending on the services of the protocols shown in the lower levels. The separation of functions enables each layer in the stack to operate independently of others.

The suite of TCP/IP protocols that are used for internet communications follows the structure of this model:

  • Application - Represents data to the user, plus encoding and dialog control
  • Transport -Supports communication between various devices across diverse networks
  • Internet - Determines the best path through the network
  • Network Access - The hardware devices and media that make up the network.

A reference model describes the functions that must be completed at a particular layer but does not specify exactly how a function should be accomplished. The primary purpose of a reference model is to aid in clearer understanding of the functions and processes necessary for network communications.

The most widely known internetwork reference model was created by the OSI project at the International ISO. It is used for data network design, operation specifications, and troubleshooting. This model is commonly referred to as the OSI model.

66
Q

5.4 Communication Principles Summary

OSI Model Layer Description

  • 7 – Application - The application layer contains protocols used for process-to-process communications.
  • 6 – Presentation - The presentation layer provides for common representation of the data transferred between application layer services.
  • 5 – Session - The session layer provides services to the presentation layer to organize its dialogue and to manage data exchange.
  • 4 – Transport - The transport layer defines services to segment, transfer, and reassemble the data for individual communications between the end devices.
  • 3 – Network - The network layer provides services to exchange the individual pieces of data over the network between identified end devices.
  • 2 - Data Link - The data link layer protocols describe methods for exchanging data frames between devices over a common media
  • 1 – Physical - The physical layer protocols describe the mechanical, electrical, functional, and procedural means to activate, maintain, and de-activate physical connections for a bit transmission to and from a network device.
67
Q

5.4.3 Communications Principles Quiz

What is the purpose of the OSI physical layer?

◯ controlling access to media

◯ transmitting bits across the local media

◯ performing error detection on received frames

◯ exchanging frames between nodes over physical network media

A

transmitting bits across the local media

68
Q

5.4.3 Communications Principles Quiz

Which statement is correct about network protocols?

◯ Network protocols define the type of hardware that is used and how it is mounted in racks.

◯ They define how messages are exchanged between the source and the destination.

◯ They all function in the network access layer of TCP/IP.

◯ They are only required for exchange of messages between devices on remote networks.

A

They define how messages are exchanged between the source and the destination.

69
Q

5.4.3 Communications Principles Quiz

Which three acronyms/initialisms represent standards organizations? (Choose three.)

▢ IANA

▢ TCP/IP

▢ IEEE

▢ IETF

▢ OSI

▢ MAC

A

IANA

IEEE

IETF

70
Q

5.4.3 Communications Principles Quiz

What networking term describes a particular set of rules at one layer that govern communication at that layer?

◯ duplex

◯ encapsulation

◯ error checking

◯ protocol

71
Q

5.4.3 Communications Principles Quiz

Which layer of the OSI model defines services to segment and reassemble data for individual communications between end devices?

◯ application

◯ presentation

◯ session

◯ transport

◯ network

72
Q

5.4.3 Communications Principles Quiz

What is the purpose of protocols in data communications?

◯ specifying the bandwidth of the channel or medium for each type of communication

◯ specifying the device operating systems that will support the communication

◯ providing the rules required for a specific type of communication to occur

◯ dictating the content of the message sent during communication

A

providing the rules required for a specific type of communication to occur

73
Q

5.4.3 Communications Principles Quiz

Which term refers to the set of rules that define how a network operates?

◯ standard

◯ protocol

◯ model

◯ domain

74
Q

5.4.3 Communications Principles Quiz

Which three layers of the OSI model make up the application layer of the TCP/IP model? (Choose three.)

▢ data link

▢ network

▢ transport

▢ session

▢ presentation

▢ application

A

session
presentation
application

75
Q

5.4.3 Communications Principles Quiz

Which organization publishes and manages the Request for Comments (RFC) documents?

◯ IEEE

◯ ISO

◯ IETF

◯ TIA/EIA

76
Q

5.4.3 Communications Principles Quiz

Which two OSI model layers have the same functionality as a single layer of the TCP/IP model? (Choose two.)

▢ data link

▢ network

▢ physical

▢ session

▢ transport

A

data link

physical