Networks 2nd PDF Flashcards

1
Q

a description of layered communications and computer network protocol and transmission design

A

OSI Model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

OSI

A

Open System Interconnection Reference Model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

This provides a standardized approach to understanding how data is transmitted across networks.

A

OSI Model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

This is a conceptual model and not a physical implementation

A

OSI Model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

7 Layers of OSI Model

A

Layer 7: Application
Layer 6: Presentation
Layer 5: Session
Layer 4: Transport
Layer 3: Network
Layer 2: Data Link
Layer 1: Physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Software Layer

A

Layer 7: Application
Layer 6: Presentation
Layer 5: Session

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Hardware Layer

A

Layer 3: Network
Layer 2: Data Link
Layer 1: Physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Sequence of layers when transmitting data

A

Layer 7 to /Application to Physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Sequence of layers when receiving data

A

Layer 1 to 7/Physical to Application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

This is responsible for the transmission of raw bit streams over a physical medium.

A

Physical Layer/Layer 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Physical Layer Functions

A

Bit Transmission
Physical Connection
Signal Encoding
Bit Synchronization
Error Detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

This converts digital data into electrical signal or light pulses suitable for transmission.

A

Bit Transmission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

This defines the physical characteristics of the network, such as cables, connectors, and interfaces.

A

Physical Connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

This determines how bits are represented as signals

A

Signal Encoding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

This ensures that the sender and receiver clocks are synchronized

A

Bit Synchronization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

This implements basic error detection techniques like parity checking

A

Error Detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

This is responsible for reliable data transfer between nodes on a network segment

A

Data Link/Layer 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

This bridges the gap between the physical layer’s raw bit transmission and the network layer’s logical addressing

A

Data Link/Layer 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Data Link Functions

A

Framing
Physical Addressing
Error Detection and Correction
Flow Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

This divides the data into smaller units called frames

A

Framing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

This adds a header and trailer to each frame, containing control information like source and destination addresses, error-checking codes, and sequence numbers

A

Framing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

This assigns unique physical addresses (MAC Addresses) to each Network Interface Card (NIC).

A

Physical Addressing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

This uses addresses to identify devices on the same network segment

A

Physical Addressing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

This employs techniques like Cyclic Redundancy Check (CRC) to detect errors in transmitted data.

A

Error Detection and Correction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
This may use error correction method like Automatic Repeat Request (ARQ) to retransmit damaged or lost frames.
Error Detection and Correction
26
Regulates the rate of data transmission to prevent the receiver from being overwhelmed.
Flow Control
27
This uses techniques like sliding window protocol to control the number of frames that can be transmitted before acknowledgement.
Flow Control
28
This is responsible for logical addressing and routing data packets across different networks.
Network Layer/Layer 3
29
This directs packets from source to destination
Network Layer/Layer 3
30
Network Layer Functions
Logical Addressing Packet Switching Routing Congestion Control
31
This assigns unique logical addresses (IP addresses) to each device on a network. These addresses are used to identify devices across different networks.
Logical Addressing
32
This breaks data into smaller packets for efficient transmission. Each packet contains source and destination IP addresses, allowing routers to forward them independently.
Packet Switching
33
This determines the best path for packets to travel from source to destination.
Routing
34
Routing protocols like _______ are used to exchange routing information between routers
RIP, OSPF, and BGP
35
RIP
Routing Information Protocol
36
OSPF
Open Shortest Path First
37
BGP
Border Gateway Protocol
38
This manages networks traffic to prevent congestion and ensure efficient data flow
Congestion Control
39
Multiple devices can have the same MAC address True or False?
False
40
OSPF Protocol is used in which layer?
Network Layer/Layer 3
41
MAC addresses are used in which layer?
Data Link/Layer 2
42
The fundamental protocol used to route data packets across the internet
IPV4 (Internet Protocol version 4)
43
This assigns unique addresses to devices connected to the network enabling communication between them.
IP
44
IP
Internet Protocol
45
Each IPV4 address is a ________ number
32-bit
46
Originally, IP addresses were divided into five different categories called
classes
47
Each address class defines a different number of bits for its
Network Prefix (Network Address) and Host Number (Host Address)
48
This specifies the unique number which is assigned to your network
Network Address
49
This is a specific address number assigned to each host machine
Host Address
50
This uses fixed-length subnet masks and categorizes IP addresses into five classes (A, B, C, D, E)
Classful Addressing (1981)
51
This is also called CIDR, uses VLSM and allows for flexible allocation of bits to network ID and host ID
Classless Addressing (1993)
52
CIDR
Classless Inter-Domain Routing
53
VLSM
Variable-Length Subnet Masks
54
these have to do with the size of networks as they are assigned from IANA
Classful and Classless
55
these have to do with how you allocate your IP space within your networks
FLSM and VLSM
56
FLSM
fixed-length subnet mask
57
In a word, Classless Addressing can be summarized as:
Efficient
58
This is the practice of dividing a network into two or more networks
Subnetting
59
Taking a network and dividing it into sub-networks is?
Subnetting
60
This offers a compact and extremely useful way to represent IP addresses and their associated subnet masks
CIDR Notation