Networking & Storage Flashcards

1
Q

Computer Network

A

Collection of computers and network devices that use communication channels for communication and resource sharing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Network Topology

A

How different computers and network devices are arranged physically.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Point-to-point topology

A

Direct communication between two devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Line Topology

A

Data is passed between nodes in a sequential order.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Ring Topology

A

Connection of devices through other intermediate devices so there is no direct communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Mesh Topology

A

No specific arrangement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Star Topology

A

Uses one intermediate device that connects all the other devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Fully Connected Topology

A

All devices are connected directly to each other.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Tree Topology

A

Devices are connected in a hierarchical way to achieve different access levels.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Bus Topology

A

All the devices are connected to one base line.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

OSI Model

A

Method of how computers communicate with each other over a network. This method contains a stake of protocols to support the duties of each layer’s task.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The OSI Model in the order of the sender transmitting Data

A

Application layer
Presentation layer
Session layer
Transport layer
Network layer
Data Link layer
Physical layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The OSI Model in the order of the Receiver receiving data

A

Physical layer
Data Link layer
Network layer
Transport layer
Session layer
Presentation layer
Application layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Application layer

A

Works with web applications and handles the data so it is converted to a format that can be humanly readable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Presentation layer

A
  1. Translation
  2. Data compression
  3. Encryption
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Session Layer

A
  1. Authentication
  2. Authorization
  3. Manages the session
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Transport Layer

A
  1. Handles segments
  2. Flow control
  3. Error handling
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Protocols in the Transport Layer

A
  • TCP (Transmission Control Protocol)
  • UDP (User Datagram Protocol)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

TCP

A

Connection oriented protocol where a direct communication pathway is created.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Process of TCP

A
  1. Sender requests the establishment of communication pathway from Receiver.
  2. Receiver sends an notification of agreement.
  3. Sender sends the data.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Advantages of TCP

A
  • High security
  • High reliability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Disadvantage of TCP

A
  • Slower
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

UDP

A

Connectionless oriented protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Advantages of UDP

A

Faster due to the lack of proper pathway establishment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Disadvantages of UDP

A
  • Less secure
  • Less reliable
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Network Layer

A
  1. IP Addressing
  2. Path determination
  3. Routing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What are the additions to the segment in the Network Layer and what does it become?

A
  • Source IP Address
  • Destination IP Address

(Becomes a packet)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Protocol of the Network Layer

A

Internet Protocol

29
Q

Data Link Layer

A
  1. Handles frames
  2. Responsible for sending the data to the actual physical device
  3. Handles Errors
30
Q

What are the additions to the packet at the Data Link Layer and what does it become?

A
  • Source MAC Address
  • Destination MAC Address

(Becomes a frame)

31
Q

How does the Data Link Layer handle errors?

A

Back Tracking

32
Q

What happens to the frames when their physical location changes?

A

There source MAC and destination MAC changes according to each location.

33
Q

Protocol used in the Data Link Layer

A

Physical addressing

34
Q

Physical layer

A

Converts digital data into electrical or optical signals.

35
Q

Primary memory characteristics

A
  • Volatile
  • Temporarily stores data and instructions that the CPU requires
  • Fast Access
36
Q

Examples of Primary Memory

A
  • RAM
  • Cache Memory
  • Registers
37
Q

Secondary Memory Characteristics

A
  • Non-volatile
  • Long-term storage for files, applications and operating systems.
  • Long-term access
38
Q

Examples of secondary memory

A
  • HDD
  • SSD
  • Optical disc
  • USB
39
Q

Hard Disk Drives Characteristics

A
  • Magnetic
  • Consists of spinning platters coated with magnetic material
40
Q

Advantage of HDD

41
Q

Disadvantages of HDD

A
  • Slower
  • Creates large amounts of heat
42
Q

Solid State Drive Characteristics

A
  • Flash Memory
  • No moving parts
43
Q

Advantages of SSD

A
  • Faster access
  • Better durability
44
Q

Disadvantages of SSD

A
  • Expensive
  • Generates less heat
45
Q

Optical Disk Characteristics

A
  • Uses optical technology - pits and lands that represent binary
46
Q

Advantage of OD

A

Inexpensive long-term storage

47
Q

Disadvantage of OD

A

Slower Access

48
Q

USB Advantage

A

Small and portable

49
Q

USB Disadvantage

A

Limited storage capacity

50
Q

Registers

A

Are the smallest and fastest memory unit within the CPU

51
Q

Function of Registers

A

Provides the CPU with direct access to critical data and instructions.

52
Q

Data Registers

A

Used to temporarily store information that needs to be processed.

53
Q

Address registers

A

Temporarily stores memory addresses.

54
Q

Control Registers

A

Temporarily stores instructions and control signals generated by the CPU.

55
Q

General purpose register

A

Can be used to temporarily store any type of data.

56
Q

Pointer registers

A

Points towards the memory address where the data is processed.

57
Q

Index registers

A

Stores index calculations and addressing.

58
Q

Segment registers

A

Stores different segments of processing
- instructions
- data
- return addresses

59
Q

Flag registers

A

Sends and receives data using user instructions.

60
Q

DMA

A

Direct Memory Access

61
Q

Function of DMA

A

Allows peripheral devices to directly access the internal storage without the CPU.

62
Q

DMA Controller Process

A
  1. CPU delegates authority to DMA
  2. Peripheral devices access the memory through the DMA
63
Q

Lossy File Compression

A

A type of compression which reduces bits by removing unnecessary or less important information.

64
Q

Lossless Data Compression

A

Is a type of compression that reduces bits by identifying and eliminatingstatistical redundancy.

65
Q

SAN

A

Storage Area Network

66
Q

Function of SAN

A

Is a specialized, high-speed network that attaches servers and storage devices.

67
Q

Characteristics of SAN

A
  • Eliminates the traditional dedicated connection between a server and storage.
  • Eliminates any restriction to the amount of data that a server can access.
68
Q

Benefits of SAN

A
  • Storage is independent of applications and accessible through multiple data paths for better reliability, availability, and serviceability.
  • Higher application performance
  • Data transfer and vaulting to remote sites
  • Simplified centralized management