Network+ Chapter 2

¡Supera tus tareas y exámenes ahora con Quizwiz!

MAC Address

A 12-character string that uniquely identifies a network node. The manufacturer hard codes the MAC address into the NIC. This address is composed of the block ID and device ID.

Fragmentation

A Network Layer service that subdivides segments it receives from the Transport Layer into smaller packets.

Session

A connection for data exchange between two parties.

IP (Internet Protocol)

A core protocol in the TCP/IP suite that operates in the Network Layer and provides information about how and where data should be delivered. IP is the subprotocol that enables TCP/IP to internetwork.

Router

A device that connects network segments and directs data based on information contained in the data packet.

Terminal

A device with little (if any) of its own processing or disk capacity that depends on a host to supply it with applications and data-processing services.

Checksum

A method of error checking that determines if the contents of an arriving data unit match the contents of the data unit sent by the source.

Flow Control

A method of gauging the appropriate rate of data transmission based on how fast the recipient can accept data.

Token Ring

A networking technology developed by IBM in the 1980s. It relies upon direct links between nodes and a ring topology, using tokens to allow nodes to transmit data.

Frame

A package for data that includes not only the raw data or payload, but also the sender's and recipient's addressing and control information.

ACK (acknowledgment)

A response generated at the Transport layer of the OSI model that confirms to a sender that its frame was received.

API (Application Program Interface)

A set of routines that make up part of a software application.

Token

A special control frame that indicates to the rest of the network that a particular node has the right to transmit data.

Connection Oriented

A type of Transport Layer protocol that requires the establishment of a connection between communicating nodes before it will transmit data.

Connectionless

A type of Transport Layer protocol that services a request without requiring a verified session and without guaranteeing delivery of data.

Network Address

A unique identifying number for a network node that follows a hierarchical addressing scheme and can be assigned through operating system software. Network addresses are added to data packets and interpreted by protocols at the Network Layer of the OSI model.

PDU (protocol data unit)

A unit of data at any layer of the OSI model

Segment

A unit of data that results from subdividing a larger protocol data unit.

List the different standards organisations.

ANSI - American National Standards Institute IEEE - Institute of Electrical and Electronics Engineers ISO - International Organization for Standardization ISOC - Internet Society

What is the main function of the Presentation Layer of the OSI Model

Allows hosts and applications to use a common language, performs data formatting, encryption, and congestion

HTTP (Hypertext Transfer Protocol)

An Application Layer protocol that formulates and interprets requests between Web clients and servers.

CRC (Cyclic Redundancy Check)

An algorithm used to verify the accurace of data contained in a data frame.

802.16

Broadband wireless metropolitan area networks: The IEEE standard for the atmospheric interface and related functions associated with broadband wireless connectivity, also known as WiMax

Name two different Transport Layer Protocols

Connection Oriented Protocols Connectionless Protocols

What is the main function of the Transport Layer of the OSI Model

Ensures accurate delivery of data through flow control, segmentation and reassembly, error correction, and acknowledgement

What is the main function of the Network Layer of the OSI Model

Establishes network connections, translates network addresses into their physical counterparts and determines routing

What is the main function of the Session Layer of the OSI Model

Establishes, maintains, and terminates user connections

802.3

Ethernet LAN: The IEEE standard for Ethernet networking devices and data handling (using the CSMACD access method

Which technology does the IEEE 802.3 specification describe?

Ethernet LANs

Where are frames generated?

Frames are generated at the Data Link Layer and issues to the network at the Physical Layer.

Give an example of the protocol you will find in the Application Layer of the OSI model

HTTP (Hypertext Transfer Protocol)

Who developed the OSI model?

ISO

802.1

Internetworking: The IEEE standard for routing, bridging, and network to network communication

List some of the functions performed by the Session Layer

Keeping alive the communications link for the duration of the session Keeping the communication secure Synchronizing the dialog between the two nodes Figuring out when to restart communication if it has been cut off Monitors the identification of session participants, ensuring only authorized nodes can access the session

Name the two sublayers of the Data Link Layer

LLC: Logical Link Control MAC: Media Access Control

802.2

Logical Link Control: The IEEE standard for error and flow control in data frames

You have just installed a new NIC in your computer and see the following stamped on it: 000A5E1A8DA2. This unique identifier is an example of what kind of address?

MAC address

What is the main function of the Physical Layer of the OSI Model

Manages signalling to and from physical network connections

802.20

Mobile broadband wireless network: The IEEE standard for packet handling and other specifications for multi vendor, mobile high-speed wireless transmission

What does OSI stand for?

Open Systems Interconnection Model

What is the main function of the Data Link Layer of the OSI Model

Packages data in frames appropriate to network transmission method

List the seven layers of the OSI model.

Physical Layer Data Link Layer Network Layer Transport Layer Session Layer Presentation Layer Application Layer

In which OSI layer is data encryption and decryption managed?

Presentation Layer

What is the main function of the Application Layer in the OSI model?

Provides interface between software applications and network for interpreting applications requests and requirements

802.17

Resilient packet rings: The IEEE standard for access method, physical layer specifications, and management of shared packet-based transmission on resilient rings

What are standards?

Standards are documented agreements containing technical specification or other precise criteria that stipulate how a particular product or service should be designed or performed.

Which of the following standards organisations has established guidelines for installing network cables in commercial buildings? a. TIA / EIA b. ITU c. ANSI d. IEEE

TIA / EIA

IP address

The Network Layer address assigned to nodes to uniquely identify them on a TCP/IP network. IP addresses consist of 32 bits divided into four octets, or bytes.

What is the OSI model?

The OSI model is a theoretical representation of what happens between two nodes communicating on a network.

FCS (Frame Check Sequence)

The field in a frame responsible for ensuring that data carried by the frame arrives intact. It uses an algorithm, such as CRC, to accomplish this verification.

Block ID

The first set of six characters that make up the MAC address and that are unique to a particular manufacturer.

MTU (maximum transmission unit)

The largest data unit a network will accept for transmission.

Sequencing

The process of assigning a placeholder to each piece of a data block to allow the receiving node's Transport Layer to reassemble the data in the correct order.

Segmentation

The process of decreasing the size of data units when moving data from a network that can handle large data units to a network that can handle only smaller data units.

Reassembly

The process of reconstructing data units that have been segmented

Encapsulate

The process of wrapping one layer's PDU with protocol information so that it can be interpreted by a lower layer.

Device ID

The second set of six characters that make up a network device's MAC address. The device ID, which is added at the factory, is based on the device's model and manufacture date.

Why do the different industries make use of standards?

To ensure that products, processes and services suit their purposes; Without standards, it would be very difficult to design a network because you would not be certain that software or hardware from different manufacturers would work together.

802.5

Token Ring LAN: The IEEE standard for token ring networking devices and data handling

Under what circumstances would the transport layer use segmentation?

When the destination node cannot accept the size of the data blocks transmitted by the source node.

802.11

Wireless Networks: The IEEE standard for wireless networking for many different broadcast frequencies and usage techniques

802.15

Wireless personal area networks: The IEEE standard for the coexistence of wireless personal area networks \with other wireless devices in unlicensed frequency bands

802.22

Wireless regional area networks (WRAN): The IEEE standard for wireless broadcast style network to operate in the UHF / VHF frequency bands formerly used for TV channels

Which part of a MAC address is unique to each manufacturer?

block ID

Which layer of the OSI model encapsulates network layer packets?

data link layer

What type of address follows a hierarchical format?

network address

Suppose your network is connected to another network via arouter. Which OSI model layer provides the information necessary to direct data between the two networks?

network layer

In which two layers of the OSI model do NICs belong?

physical and data link layers

Which OSI model layer generates and detects voltage so as to transmit and receive signals carrying data?

physical layer

If the TCP protocol did not receive an acknowledgment for data it transmitted, what would it do?

retransmit the data to the recipient

Which OSI model layer is responsible for keeping open acommunications path between your computer and the server when you dial in to aremote access server?

session layer

Suppose that, at the receiving node, a frame's FCS doesn't match the FCS it was issued at the transmitting node. What happens as a result?

the receiving node's link layer requests a retransmission

What is the purpose of the trailer field added to a frame in the data link layer?

to mark the end of a frame

Which layer of the OSI model is responsible for issuing acknowledgments (ACKs)?

transport layer

Given an example where connection oriented protocols would be more efficient than connectionless protocols

when data integrity has to be ensured; when data has to arrive exactly as it was sent; when data delivery has to be ensured

Give an example where connectionless protocols would be more efficient than connection oriented protocols.

when data needs to be transferred quickly (i.e. video live streaming)


Conjuntos de estudio relacionados

NUR 302 - Chapter 1, Research Ch. 1, Research - Chapter 1

View Set

chapter 1-6 socioemotional development

View Set

ATI Pharmacology -- The Cardiovascular System

View Set

Greatest Common Factor (GCF):, GCF and LCM of Monomials

View Set

Earth's Surface: Water and Wind Erosion

View Set

history/geography 800- unit 2: pt6

View Set

CompTIA Security+ Certification Exam - Port Numbers

View Set