Section 1 Flashcards

Exploring the Functions of Networking

1
Q

What is a network?

A

A network is a collection of devices and end systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What four major categories make up the physical components of a network?

A
  • Endpoints
  • Interconnections
  • Switches
  • Routers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the four major resources that are shared on a computer network?

A
  • Data and Applications
  • Endpoint Resources (printers, cameras, etc.)
  • Network Storage
  • Backup Devices
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are common network user applications on today’s networks?

A
  • Email
  • Web (Internet and web apps)
  • Instant messaging
  • Video/collaboration
  • Databases
  • File Sharing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

List three categories of network applications

A
  • Batch applications (started by a person and complete with no interaction. FTP, TFTP)
  • Interactive applications (A person requests data and
  • Real-time applications
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the three types of network-monitoring software?

A
  • Protocol Analyzers
  • Sniffers
  • Availability and Performance Programs
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Your company wants to provide streaming video services to all branches and sales representatives. What two network characteristics are the most critical to achieving this goal?

A

Bandwidth and Latency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

When describing the characteristics of a network, what does speed refer to?

A

Speed refers to how fast data is transmitted over the network.
Today’s networks consist of speeds of 100Mbps, 1Gbps, 10 Gbps, 40 Gbps, and 100 Gbps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

When describing the characteristics of a network, what does cost refer to?

A

Cost refers to the general financial value of network components, installation, and maintenance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

When describing the characteristics of a network, what does security refer to?

A

Security refers to protecting the network devices and data from both internal and external sources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

When describing the characteristics of a network, what does availability refer to?

A

Availability is the measurement of network uptime compared to its downtime.

Network availability percentage can be calculated using the following formula:
([525,600 - Minutes downtime] / [525,600]) * 100

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Your CIO wants to know the network availability of your company’s network for the past year. During the past year, the company was down for 30 minutes. What was the total availability of the network?

A

The total availability was 99.994%

([525,600 - 30] / [525,600]) * 100 = 99.994

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

When describing the characteristics of a network, what does scalability refer to?

A

Scalability refers to how well the network can accommodate more users and more data – in other words, how easily the network can grow and expand.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

When describing the characteristics of a network, what does reliability refer to?

A

Reliability refers to the dependability of the devices that make up the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the difference between the physical and logical network topology?

A

Physical topology defines the physical layout of devices and network media and how these components are physically connected and configured.

Logical topology refers to the data path or logical paths of the network in which data accesses the media and transmits packets across it. This includes IP addresses as well as routing paths.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the six types of physical topologies implemented in today’s networks?

A
  • Star
  • Extended Star
  • Mesh
  • Partial Mesh
  • Bus
  • Ring
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What physical network topology connects all devices to one cable?

A

The Bus topology connects all devices to one cable.

This cable connects one computer to another. In a logical bus topology, only one packet can be transmitted at a time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Describe a ring physical network topology.

A

In a ring topology, all hosts and devices are connected in the form of a ring or circle.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Describe a star and extended star topology.

A

Star and extended star physical topologies are made up of a central connection point, such as a hub or switch, where are cable segments connect. A startopology resembles spokes in a bicycle wheel and is the network topology of choice in Ethernet networks.

When multiple star topologies are connected to a common indipendent centralized device, it is called an extended star topology.

20
Q

What physical network topology connects all devices to each other?

A

A mesh network topology connects all devices to each other for fault tolerance and redundancy.

21
Q

What is the difference between a full-mesh and a partial-mesh topology?

A

A full-mesh topology connects all nodes to one another for full redundancy. In a partial-mesh topology, at least one node maintains multiple connections to all other devices and one node cannot connect to all other nodes as well.

22
Q

What are the seven layers of the OSI reference model? Include the layer number and name of each layer in your answer.

A

The seven layers of the OSI reference model are as follows:

  • Layer 7: Application layer
  • Layer 6: Presentation layer
  • Layer 5: Session layer
  • Layer 4: Transport layer
  • Layer 3: Network layer
  • Layer 2: Data Link layer
  • Layer 1: Physical layer
23
Q

What are six reasons that the OSI reference model was created?

A

1: To ensure that different vendors’ products can work together.
2: To create standards to enable ease of interoperability by defining standards for the operations at each level.
3: To clarify general functions of internetworking
4: To divide the complexity of networking into smaller, more manageable sublayers
5: To simplify troubleshooter
6: To enable developers to modify or improve components at one layer without having to rewrite and entire protocol stack.

24
Q

What is the function of the physical layers (layer 1) in the OSI model? Give some examples of physical layer implementation.

A

The physical layer defines the physical medium. It defines the media type, the connector type, and the signaling type. The physical layer is responsible for converting frames into electronic bits of data, which are then sent or received across the physical medium.

25
Q

What is the responsibility of the data link layer (Layer 2)?

A

The Data Link layer defines how data is formatted from transmission and how access to the media is controlled. This layer also typically includes error correction to ensure reliable delivery of data.
The Data Link layer translates messages from the network layer into bits for the physical layer.

26
Q

The Institute of Electrical and Electronics Engineers (IEEE) defines what sublayer of the data link layer?

A

The IEEE defines the Media Access Control (MAC) sublayer of the data link layer.

27
Q

What functions does the Media Access Control (MAC) sublayer provide?

A

The MAC sublayer specifies how data is placed and transported over the physical wire. It controls access to the physical medium.

The MAC sublayer communicates downward directly to the physical layer. Physical addressing (MAC addresses), network topologies, error notification, and delivery of frames are defined at the MAC sublayer.

28
Q

What are examples of network devices that operate at the data link layer (Layer 2)?

A

Bridges and switches operate at the data link layer.

Both devices make decisions about what traffic to forward or drop by MAC addresses.

29
Q

Describe the function of the network layer (Layer 3) of the OSI model. Give some examples of network layer implementations.

A

The network layer provides internetwork routing and logical network addresses. It defines how to transport traffic between devices that are not locally attached.
The network layer also supports connection-oriented and connectionless service from higher-layer protocols.
Routers and multilayer switches operate at the network layer. IP and IPv6 are examples of network layer implementations.

30
Q

Are network layer addresses physical or logical?

A

Network layer address are logical.

31
Q

What is the transport layer (Layer 4) of the OSI model responsible for? Give some examples of transport layer implementations.

A

The transport layer segments and reassembles data from upper-layer applications into data streams. It provides reliable data transmission to upper layers.

End-to-end communications, flow control, multiplexing, error detection and correction, and virtual circuit management are typical transport layer functions. Some examples include TCP and UDP.

32
Q

What layer of the OSI model handles the reliability of network communications between hosts using flow control, sequencing, and acknowledgments?

A

The transport layer handles this reliability.
The transport layer uses acknowledgments and sequence numbers for reliable delivery of data. Flow control is used to avoid network and host congestion.

33
Q

What is flow control, and what are three methods of implementing it?

A

Flow control is the method of controlling the rate at which a computer sends data, thus preventing network congestion.
The three methods of flow control are: Buffering, Congestion Avoidance, and Windowing.

34
Q

How do network devices use buffering for flow control?

A

Buffering is used by network devices to temporarily store bursts of extra data in memory until they can be processed and sent. Buffering can handle occasional data bursts; however, buffer overflows can occur if data bursts are continuous.

35
Q

What are the functions of the Session layer (Layer 5) of the OSI model? Provide some examples.

A

The session layer is responsible for creating, managing, and ending communications between presentation layer entities.
These sessions consist of service requests and responses that develop between applications located on different network devices. Some examples include SQL, RPC, and SSL.

36
Q

What is the responsibility of the presentation layer (Layer 6)? Give some examples of Layer 6 implementations.

A

Also known as the translator, the presentation layer provides coding and conversion functions to application layer data. This guarantees that the application layer on one system can read data transferred from the application layer of a different system.
Some examples are: Compression, decompression and encryption.

37
Q

What does the Application layer (layer 7) of the OSI model do? and what are some examples of this layer?

A

The application layer is the layer that is closest to the user. This means that this layer interacts directly with the software application. The application layer’s main functions are to identify and establish communication partners, determine resource availability, and synchronize communication.
Some examples include: Telnet, FTP, SMTP, and HTTP

38
Q

How do the different layers of the OSI model communicate with each other?

A

Each layer of the OSI model can communicate only with the layer above it, below it, and parallel to it (a peer layer on a remote host).

39
Q

Which layer of the OSI model uses the hardware address of a device to ensure proper message delivery to a host on a LAN?

A

The Data Link layer

40
Q

Which network layer protocols are responsible for path determination and traffic switching?

A

Routing protocols

41
Q

At which layer on the OSI model is a logical path created between two host systems?

A

The network layer creates a logical path between two host systems.

42
Q

At which layers of the OSI model do WANs operate?

A

WANs operate at the data link and physical layers.
The physical and data link layers work together to deliver data across a variety of types of physical networks like LANs, MANs, and WANs.

43
Q

What are the four layers of the TCP/IP stack?

A

The four layers of the TCP/IP stack are:

  • Application
  • Transport
  • Internet
  • Network Access
44
Q

On what layer are physical data rates, connectors, and MAC addresses located int he TCP/IP stack?

A

The Network Access layer.

45
Q

What are some protocols that operate at the TCP/IP Internet layer?

A
  • IP
  • ICMP (internet Control Message Protocol)
  • ARP (Address Resolution Protocol)
  • RARP (Reverse Address Resolution Protocol)
46
Q

What is data encapsulation as it relates to the OSI model?

A

Encapsulation wraps data with the necessary protocol information before network transmission.
A protocol data unit (PDU) can include different information as it goes up or down the OSI model.
-Session layer or higher: Data
-Transport layer: Segment
-Network layer: Packet
-Data Link layer: Frame
-Physical layer: bits

47
Q

What is the process that data goes through when a host transmits data across a network to another host?

A

This process is known as encapsulation.