OSI and TCP/IP Model Flashcards
In the OSI model, what is the primary function of the network layer?
– Allows applications to establish, use, and end a connection
– Ensures that packets are delivered with no loss or Duplication
– Routers messages between networks
– Transmit data frames
– Routers messages between networks
You are an application developer and a writing a program to exchange video files through a TCP/IP network. You need to select a transport protocol that will guarantee delivery.
Which TCP/IP protocol when you implement that provide this capability?
FTP TCP TFTP UDP RIP IP
TCP - transmission control protocol
What is the basic purpose of the OSI physical layer?
– Coordinates rules for managing network servers
– Coordinates rules for routing packets
– Coordinates rules for transmitting bits
– Defines basic physical structures such as disks
– Coordinates rules for transmitting bits
Which two of the following are included as a part of the data link layer specifications? Select two.
– Synchronizing individual bits as they are transmitted through the network
– Composition of electrical signals as they pass through the transmission medium
– Identifying physical network devices
– Controlling how messages are propagated through the network
– Identifying physical network devices
– Controlling how messages are propagated through the network
Which of the following are functions of the Mac sublayer? Select two.
– Creating routing tables based on Mac addresses
– Defining a unique hardware address for each device on network
– Letting devices on the network have access to the LAN
– Mapping hardware addresses to the link layer addresses
– Defining a unique hardware address for each device on network
– Letting devices on the network have access to the LAN
In the OSI model, which of the following functions are performed at the presentation layer? Select two.
– Specified data format such as file formats
– Maintain separate client connections
–Transmit data frames
– Encrypt and compressed data
– Provide network services
– Handle general network access, flow control, and error recovery
– Specified data format such as file formats
– Encrypt and compressed data
Which of the following tasks is associated with the session layer?
– Host ID number assignment
–Connection establishment
– Acknowledgment coordination
– Transmission synchronization
–Connection establishment
The you’d UDP transport protocol provides which of the following features? Select two.
– Guaranteed delivery
–sequence numbers and acknowledgments
– Connections diagram service
– Low overhead
– Connections diagram service
– Low overhead
Which of the following protocols includes extensive error checking to ensure that a transmission is sent and received without mistakes?
UDB
UDP
TCP
UCP
TCP
The data link layer of the OSI model is comprised of two sub layers. What are they? Select two.
LAT DLC MAC LLC SAN
MAC - media access control
LLC - logical link control
Which three of the following functions are performed by the OSI transport layer? Select three.
–Consistent data formatting between dissimilar systems
– End to End flow control
– Reliable message delivery
–format packets for delivery through the media
– Data segmentation and reassembly
– Path identification and selection
– Control media access, logical topology, and device identification
– End to End flow control
– Reliable message delivery
– Data segmentation and reassembly
Which of the following functions are performed at the physical layer of the OSI model?
– Data translation –enablement of network services – Conversation identification – Provision of an environment in which to run network applications – Movement of data across network cables
– Movement of data across network cables
Which OSI model there is responsible for guaranteeing reliable message delivery?
– Transport
– Datalink
– Application
– session
– Transport
In the OSI model, which of the following functions are performed at the application layer? Select two.
– Data translation
– Enabling communication between network clients and services
– Integration of network functionality into the host operating system
– Conversation identification
– Enabling communication between network clients and services
– Integration of network functionality into the host operating system