Pass exam take two Flashcards
What names pages on the web, gives location and how to access a web page?
Uniform Resource Locator(URL)
In the OSI model, the hyperlink uses a(n) _____ to name the pages on the web.
- Uniform Resource Locator
- Session Initiation Protocol
- Domain Name System
- Open Systems Interconnection
Uniform Resource Locator
Which of the following is the most accurate description of clients in client/server architecture?
- Desktop computers with a wired connection and laptop computers with a wireless connection
- All devices connected to a network
- Hardware devices which provide end users with access to data and services on the server
- Computers connected to a network used for downloading data from a server
Hardware devices which provide end users with access to data and services on the server
Which layer is the application layer on the Open Systems Interconnect (OSI)?
7
Which layer is the presentation layer on the Open Systems Interconnect (OSI)?
6
Which layer is the session layer on the Open Systems Interconnect (OSI)?
5
Which layer is the physical layer on the Open Systems Interconnect (OSI)?
1
Which layer is the datalink layer on the Open Systems Interconnect (OSI)?
2
Which layer is the transport layer on the Open Systems Interconnect (OSI)?
4
Which layer is the network layer on the Open Systems Interconnect (OSI)?
3
Which layer in the OSI model provides access to available network resources?
7 - Application Layer
Which layer in the OSI model translates, encrypts and compresses data?
6 - Presentation Layer
Which layer establishes, manages and terminates communicative sessions in the OSI model?
5 - Session Layer
Which layer provides reliable proccess-to-process message delivery and error recovery in the OSI model?
4 - Transport Layer
moves packets from source to destination, by providing internetworking capabilities
3 - Network Layer
organizes bits into frames providing node-to-node delivery
2 - Data Link Layer
transmits bits over a medium, establishing mechanical and electrical specifications
1 - Physical Layer
Open Systems Interconnect (OSI)
has seven layers that each perform a specific & supportive commincative task
protocol
presentation layer
a standard set of guidelines under which the network operates
Presentation Layer functions?
- character-code translation
- data conversion data compression
- data encryption and decryption
- data translation
Presentation layer sub layers?
CASE and SASE
1- CASE
sublayer of presentation layer
Common Application Service Element
Provides application layer services and makes service requests of the session layer
2 - SASE
sublayer of presentation layer
Specific Application Service Element
provides application services/protocols
Networking
A grouping of two or more computers being linked together to exchange data
Session Layer (4)
primary responsibilites of session layer protocols are to set up, control, maintain, and close communicative sessions.
Coordinate active applications on various hosts using assigned protocols
Network Basic Input/Output System (NETBIOS)
Common Session Layer API
allows applications on separate computers to communicate and establish sessions to access shared resourcs over a local area network (LAN)
Transfer Control Protocol/Internet Protocol (TCP/IP)
Common Session/Transport Layer API
Standardizes communications
Common Session Layer Protocols
Name 6
- Network File System (NFS)
- Structured Query Lanuguage (SQL)
- Remote Procedure Call (RPC)
- X Window System
- AppleTalk Session Protocol (ASP)
- DEC Session Control Protocol (SCP)
What does layer five of the OSI model do?
* Provides access to available network resources.
* Establishes, manages and terminates communicative sessions.
* Organizes bits into frames providing node-to-node delivery.
* Moves packets from source to destination providing internetworking capabilities.
Session Layer - Establishes, manages and terminates communicative sessions.
The session layer provides communicative support to which two OSI layers?
- Data link and transport
- Application and physical
- Presentation and transport
- Network and application
Presentation and transport
The API that allows applications on separate computers to communicate over a LAN is:
* IP
* NetBIOS
* TCP/IP
* TCP
NetBIOS
Which of the following identifies the protocol or protocols available to the session layer for standardizing communications on a network?
- TCP/IP
- IP/NetBIOS
- OSI
- NetBIOS
TCP/IP
the lowest layer in the OSI model and is used for transmitting data in its basic form: bit-level
Physical Layer (1)
Physical Layer transmission medium is______ or ______
wired or wireless
Physical Layer components in a wired model include ____
Physical Layer
bolts and connectors to carry data from one place to another by using (cables) electromagnetic signals that translates to a stream of bits
NIC - Network interface cards, connectors and interfaces and cables
Physical Layer components in a wireless model include ____
Physical Layer
Cellular Wifi and bluetooth
Types of cables in networking
Physical Layer
- Coaxial
- Sheilded Twisted Pair
- Unsheilded Twisted Pair
Shielded Twisted Pair (STP)
Physical Layer
foil shielding around pairs of twisted wires to prevent electromagnetic interfaces
Acts as a ground to the phone cable to carry data faster
Unshielded Twisted Pair (UTP)
Physical Layer
made the same as a shielded twisted pair but without the extra foil shielding around the wire
Most popular commonly used
A networking cable that is a wire covered by alternative conducting and insulating shields (more reliable):
Physical Layer
Coaxial Cable
hooks up to modem
RJ-45
Physical Layer
8-wire connectors used specifically for connecting LAN or Ethernet cables
Most common UTP connector cable
Fiber ST, SC
Physical Layer
fiber cable connectors that are always used in pairs; one wire is for transmitting data, and the other is for receiving it
used for fiber optic cables and transmission of optical signals
Physical Layer
Fiber LC
Data transmitted in a single direction in the Physical Layer:
Simplex
Half-duplex
Physical Layer
Data can be transmitted in both directions, but not at the same time
Full-duplex
Physical Layer
Data can be transmitted in both directions at the same time
Which connector is NOT used in a network cable?
- RJ-11
- Fiber ST
- RJ-45
- Fiber LC
Physical Layer (1)
Rj-11
An NIC is used for which of the following?
- Connecting a telephone to the network.
- Connecting a computer to a network.
- Securing a computer in a network.
- Using as a telephone wire.
Physical Layer (1)
Connecting a computer to a network
In the OSI physical layer, data is transmitted in the form of _.
* optical signals
- infrared rays
- both optical and electromagnetic signals
- electromagnetic signals
both optical and electromagnetic signals
What does bandwidth mean?
* Bandwidth is the theoretical minimum speed of your data
* Bandwidth is the actual speed of your data
* Bandwidth is the theoretical maximum speed of your data
* Bandwidth does not apply to network speed
Bandwidth is the theoretical maximum speed of your data
What does throughput mean?
* Throughput is the slowest speed your data can travel on the network
* Throughput is the actual amount of data you get in a certain amount of time
- Throughput is the delay between the moment you demand data and the time you eventually get it
- Throughput is the fastest speed your data can travel on the network
Throughput is the actual amount of data you get in a certain amount of time
Which of these statements is true?
* You should rarely expect delays when you ask for data
* Data always travels the same speed on the network
* You can expect to get just as much throughput as you ask for
* You should expect an average throughput which is less than the maximum speed, and you should expect an average delay called latency
You should expect an average throughput which is less than the maximum speed, and you should expect an average delay called latency
What are the 3 basic cable types in networking?
- Twisted pairs
- Coaxial
- Fiber optics
Twisted pair cable types (9)
Networking
- Cat1 - Cat5
- Cat5e
- Cat6
- CAt6a
- Cat7
Cat1 - Cat3
Not standard anymore
Cat4
- Token ring networks
- 16 mbps
- range 100 meters
CAT5
- Ethernet-based Newtorks
- Two twisted pairs
- 100 Mbps
- range up to 100 meters
Most common in homes
Cat 5e
- Four twisted pairs over an ethernet connection
- 1000 Mbps
- up to 100 meters
Cat6, Cat6a, cat7
- four twisted pairs
- future standard
- 10 gbps
- 100 meters
Fiber Optic Cables
the new network connection standard and are so fast that they can carry light speeds, thus allowing for gigabit networks
Over 1000 mbps
More secure than coaxial
thinner, faster, more bandwidth, stays cool, less interference
Fiber Optic Cable Types
- Single - mode
- Multi - mode
- Plastic Optical Fiber
Single-Mode (SMF)
- used to transmit data over much longer distances than the other two types
- high bandwidth/performance
- lighter
- less bulky
- resistance to corrosion
- more secure
- immune to electromagnetic interference
from city to city
- used for sending data over short distances
- larger in diameter
- less expensive
Multi-Mode (MMF)
office building floor to floor
Plastic Optical Fiber
consumer optical fiber cable
** Which of these is the most common cable type to connect a home network to a cable modem using an internet service provider?**
Unshielded twisted pair
Fiber optic
CAT2
Coaxial
Coaxial
** In unshielded twisted pair cables, which category starts being able to push gigabit network speeds (1000+ Mbps)?**
CAT4
CAT5
CAT7
CAT5e
Cat5e
What is the main purpose of having a twisted pair cable?
To cut down on costs
To double the transfer rate of data
To make installation easier
To reduce electromagnetic interference from outside sources
To reduce electromagnetic interference from outside sources
When internet service providers use fiber optic cables, which cable type are they most likely to use for home networks?
Multi-mode
Plastic optical cable
Single-mode
None of these answer are correct
Plastic optical cable
What is the main advantage of using a shielded twisted pair (STP) cable for a network connection?
To focus the network connection in a large room
To cut back on electrical interference
There is no advantage to using one
To enhance the network connection in a small room
To cut back on electrical interference
optical fiber
a very thin strand of plastic or glass that is used to transmit messages via light
The type of fiber used typically for long distance runs is:
Wave-division multiplexing fiber
Serial fiber
Multi-mode
Single-mode
Single-Mode
An advantage of optical fiber over traditional copper wiring is:
Less bulk
Lower cost
You can pull it tighter
It can bend at greater angles than copper
Less bulk
User Datagram Protocol (UDP)
David Reed with RFC 768
Speed over efficiency
Printers, streaming media, Larger files
jenny.myconference.com which is the host name
jenny
URL is an acronym for __________.
Uniform Reference Link
Unique Reference Link
Uniform Resource Locator
Unique Reference Location
Uniform Resource Locator
Access a website by entering the _____ or _____ into the address bar of the Internet browser.
host name, URL
domain name, URI
HTML, network
URL, IP address
URL, IP address
Domain Name System (DNS)
- a unique string associated with an IP address
- a network of directories on the internet used to resolve host names into machine-readable IP addresses
gingername.com
Top name domain servers
.com
.org
.net
Which of the following statements is true?
Recursive name servers respond to queries from authoritative servers
Recursive name servers respond to queries from TLD name servers
Authoritative name servers respond to queries from recursive name servers
Local DNS cache respond to queries from root servers
Authoritative name servers respond to queries from recursive name servers
_____ is an example of a TLD name.
gingernameclub.com
www.gingernameclub.com
www.com
.com
www.gingernameclub.com
DNS servers use _____ servers to help resolve IP addresses to Domain Names
IP servers
Authentication servers
Caching servers
Authoritative servers
Authoritative servers
Which of the following statements is true when a user first makes a DNS query by typing the domain name into the web browser?
A DNS query answer is returned from the authoritative servers
A request is sent to the respective root nameservers
A request is sent to an ISP recursive server
The local DNS cache is queried
The local DNS cache is queried
Prefix identifies what 172.16.254.1
172.16. network
IP address
- unique identifier in the field of networking that identifies the physical coordinates of a device that is connected online
- dotted-decimal notation
- 32 bits total (1 byte = 8 bits)
- 172.16.254.1 = 10101100.00010000.11111110.000000001
Suffix identifies what 172.16.254.1
254.1 device
Routing class A
IP Addresses
0 - 127
examples 10.1.7.242, 10.253.20.17
For large number of hosts
Routing class B
IP Addresses
128-191
172.16.47.18, 172.16.250.241
Medium Sized Networks
Routing class C
IP Addresses
192-223
192.16.1.1, 192.168.45.253
small networks
Routing class D
IP Addresses
224-239
Multi-tasking
227.26.6.173
Routing class E
IP Addresses
240-254
Research and develpment
243.164.89.28
IPv4
- more devices than addresses
- finite number of addresses
- solution non-routable
Network Address Translation (NAT)
IP addresses
is used to provide an alias for the device; the router translates that alias back to the device’s IP.
internet service provider (ISP)
IPv6
gives your home location a physical IP address that can be traced back to your modem via coordinates
IPv6 format
- 128 bits (binary digits)
- hexadecimal format and 0s 1s
- 6e3d:e161:de2a:eb9e:28af:86bc:55a3:e5ce.
Fixed Header
IPv6
- Source address
- Destination address
- Version/IP version
- Traffic class
- Flow label
- Payload length
- Next header
- Hop limit
Source address
IPv6 Header
The original 128-bit source address for an IPv6 node packet.
Destination Address
Ipv6 Header
The 128-bit recipient address from the IPv6 node packet.
Version/IP version
IPv6 Header
The 4-bit identifier for the version that is being used, in the case of IPv6, that number is going to be 6.
Traffic Class
Ipv6 Header
An 8-bit field that is used to determine a packet’s level of priority.
Flow Label
IPv6 Header
A 20-bit field for defining the packets of the flow. This is useful for the router to determine which packets belong to a particular flow of information. This is mainly used for multimedia or video communications etc.
Payload Length
IPv6 Header
A 16-bit field that states the overall length of a packet payload, which can go up to 64 kilobytes if needed.
Next Header
IPv6 Header
This indicates the type of extension header (if exists) or the upper layer PDU (such as TCP).
Hop Limit
IPv6 Header
An 8-bit field that discards the packet after an absolute limit of time has passed.
IPv6 Addressing types
IPv6
- Unicast
- Multicast
- Anycast
- Broadcast
Unicast
IPv6 Addressing Types
A packet is delivered only to one interface.
Multicast
IPv6 Addressing Types
A packet is delivered to multiple interfaces.
Anycast
IPv6 Addressing Types
A packet is delivered to one of the multiple interfaces, but only based on the nearest routing location.
Broadcast
IPv6 Addressing Types
This is used in IPv4 to send a single packet to multiple hosts at once. IPv6 does not make use of this technology, making it an old address type not suitable for the future of networking.
Is a unique identifier assigned to a computer system (host) on a network with which it can be identified and accessed easily. Simply put, it is the computer system’s name or an alias or domain name.
Hostname
Hostname Resolution
Host file
Hostname resolution
Exists in the ‘‘SYSTEM32\DRIVERS\ETC’’ directory under the Windows root directory (i.e., \WINDOWS or \WINNT)
Hostname Resolution
Refers to the process through which an assigned hostname is converted or resolved to its mapped IP Address so that networked hosts can communicate with each other.
What protocol do computer systems (hosts) use when communicating with each other on a network?
OSI Models
URLs
IP Addresses
IP Servers
IP Addresses
How are hostnames resolved?
* Hostnames are resolved through an Internationally designated body saddled with the task.
* Hostnames are resolved locally and remotely on a servers.
* Hostnames are already in-built in the computer systems and hence are resolved on their own.
* Hostnames can be resolved either locally or remotely through the use of hosts file configured on a computer host locally or one designated for that purpose remotely.
Hostnames can be resolved either locally or remotely through the use of hosts file configured on a computer host locally or one designated for that purpose remotely.
- Why is it necessary for computer systems (hosts) to have a hostname or domain name?
- It is necessary because it is an international standard which must be followed.
- It is necessary because it makes managing large numbers of computers located within a big office space or network easier to identify and accessed.
- It is necessary because every device has a name and so this should not be different.
- It is necessary because it differentiates it from other people’s computer systems.
It is necessary because it makes managing large numbers of computers located within a big office space or network easier to identify and accessed.
What is a hostname or domain name used for?
* It is a name given to a website and the server.
* It is used for naming a device or computer system.
* It is used to uniquely identify a computer system (host) located on a computer network for easy referencing.
* It is a security requirement.
It is used to uniquely identify a computer system (host) located on a computer network for easy referencing.
What is Hostname Resolution?
* It is the process through which hostnames are reserved for use on another network.
* It is the process through which an assigned hostname is resolved to its mapped IP Address for communication purposes.
* It is the process through which hosts on a network communicate with another.
* It is the process through which hostnames are separated from each other using a router.
It is the process through which an assigned hostname is resolved to its mapped IP Address for communication purposes.
addresses work along with IP addresses on a network device for communication. The device must have the necessary functioning hardware to communicate on the network. With NIC
Media Access Control (MAC)
MAC address
- NIC 48 bit numbers
- The MAC address is a hardwired number, permanent and unique to a device’s NIC.
- example 00-14-22-01-23-45
How does the MAC Address differ from an IP address?
- The MAC address operates in the Network layer of the TCP/IP stack.
- The MAC address is a hardwired number, permanent and unique to a device’s NIC.
- The MAC address carries only network addressing information.
- The MAC address is dynamically assigned each time a device establishes a new connection in a network.
The MAC address is a hardwired number, permanent and unique to a device’s NIC.
IP Addresses operate within the _ layer of the TCP/IP protocol.
Data Link Layer
Application Layer
Physical Layer
Network Layer
Network Layer
What is an IP address?
- An IP (Internet Protocol) address is used to identify a computer.
- An IP (Internet Protocol) address is used to identify a NIC.
- An IP (Internet Protocol) address is a series of numbers which is used to identify a device within a network environment.
- An IP (Internet Protocol) address is a series of hardwired numbers which is used to identify a network environment.
An IP (Internet Protocol) address is a series of numbers which is used to identify a device within a network environment.
Which of the following statements is true?
- NICs are hardwired with IP and MAC addresses.
- MAC and IP addresses need to work in parallel for effective communication.
- MAC and IP addresses can both work independently depending on the environment.
- MAC addresses can route data packets over the internet independent of IP addresses.
MAC and IP addresses need to work in parallel for effective communication.
Why are addresses important in networking?
- They identify the layers in the TCP/IP Stack.
- They are used to reveal the name of the device.
- They are used to identify both the network to which the device is connected to as well as the device itself.
- They are used to establish the network layer of the operating environment.
They are used to identify both the network to which the device is connected to as well as the device itself.
IPv4 (Internet Protocol version 4)
Advanced Research Project Agency or ARPA developed ARPANET
(later known as DARPA due to defense contracts) and began working on networking in the late ’60s.
The Network Control Protocol
which was the predecessor to TCP/IP v4, was created by ARPANET and first used in 1971.
TCP/IP v4
was finalized in 1981 as part of RFC 791.
What is variable length subnet masking used for?
- It allows an IP address space to be divided into subnets of different sizes.
- It is used to introduce complexity to networks.
- It is used to issue addresses to systems.
- It is used to make numbers larger.
It allows an IP address space to be divided into subnets of different sizes.
Who was responsible for the creation of IPv4 protocols?
IBM
Lycos
DARPA
DARPA
A class A network has how many network bits set to on?
8
16
24
3
8
**In dotted decimal, which network numbering segment is reserved for loopback?
**
192.168.x.x
172.x.x.x
127.x.x.x
0.x.x.x
127.x.x.x