Chap 1 - Network Fundamentals - Part 1 Flashcards
1-1: At which of the following layers of the OSI model do the protocols on a typical LAN use MAC addresses to identify computers on the network?
Physical
Data link
Network
Transport
Data link
1-2: Which of the following organizations developed the OSI model?
International Telecommunication Union (ITU-T)
Comite Consultatif International Trelgraphique et Telephonique (CCITT)
American National Standards Institute (ANSI)
Institute of Electrical and Electronics Engineers (IEEE)
International Organization for Standadizations (ISO)
International Organization for Standadizations (ISO)
1-3: Which layer of the OSI model is responsible for the logical addressing of end systems and routing of datagrams on a network?
Physical
Data link
Network
Transport
Session
Presentation
Application
Network
1-4: On a TCP/IP network, which layers of the OSI model contain protocols that are responsible for encapsulating the data generated by an application, creating the payload for a packet that will be transmitted over a network? (Choose all that apply)
Physical
Data link
Network
Transport
Session
Presentation
Application
Data link
Network
Transport
1-5: Which layer of the OSI model is responsible for translating and formatting information?
Physical
Data link
Network
Transport
Session
Presentation
Application
Presentation
note: only the presentation layer does this
1-6: Which of the following devices typically operates at the network layer of the OSI model?
Proxy Server
Hub
Network Interface Adapter
Router
Router
1-7: Which layer of the OSI model provies an entrance point to the protocol stack for applications?
Physical
Data link
Network
Transport
Session
Presentation
Application
Application
1-8: Which layer of the OSI model is responsible for dialogue control between two communicating end systems?
Physical
Data link
Network
Transport
Session
Presentation
Application
Session
1-9: Some switches can pefrom functions associated with two layers of the OSI model. Which two of the following layers are often associated with network switching? (choose two)
Physical
Data link
Network
Transport
Data link
Network
1-10: At which later of the OSI model are there TCP/IP protocols that can provide either connectionless or connection-orientated services to applications?
Physical
Data link
Network
Transport
Session
Presentation
Application
Transport
1-11: Which of the following layers of the OSI model typically have dedicated physical hardware devices associated with them? (Choose all that apply)
Physical
Data link
Network
Transport
Session
Presentation
Application
Physical
* hubs
* cables
* network interface adapters
Data link
* bridges
* switches
Network
* routers
1-12: At which layer of the OSI model is there a protocol that adds both a header and a footer to the information that is passed down from an upper layer, thus creating a frame?
Physical
Data link
Network
Transport
Session
Presentation
Application
Data link
1-13: Identify the layer of the OSI model that controls the addressing, transmission, and reception of Ethernet frames, and also identify the media access control method that Ethernet uses.
Physical layer; Carrier Sense Multiple Access with Collision Detection (CSMA/CD)
Physical layer; Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA)
Data link layer; CSMA/CD
Data link layer; CSMA/CA
Data link layer; CSMA/CD
What media access control method does Ethernet use?
Carrier Sense Multiple Access with Collision Detection (CSMA/CD)
CSMA/CD stands for Carrier-Sense Multiple Access with Collision Detection. It is an obsolete access method that was used in wired LAN (Local Area Network) technologies, particularly Ethernet systems. This method allowed frames of data to flow through the network to their intended destination addresses. In a CSMA/CD network, hosts would first listen to the network to determine if any data was currently being transmitted. If the network was clear, the hosts would proceed to send out their data. However, if a collision occurred—meaning that two hosts attempted to send data at the same time—both hosts would then wait for a randomly determined time period before attempting to retransmit their data. The development and adoption of full-duplex Ethernet, which allows for simultaneous bidirectional data transmission, rendered CSMA/CD obsolete
Ethernet uses the Carrier-Sense Multiple Access with Collision Detection (CSMA/CD) method for media access control. This system allows devices on a network to share the same cable and determines which machine should send data at any given time. Before sending a data frame, each node on the network checks the cable to see if another machine is already using it. If the cable is in use, the node waits a few milliseconds and checks again. If no traffic is detected, the node sends out its frame. This method ensures that all machines have equal access to the wire on a first-come, first-served basis. CSMA/CD was mapped to the IEEE 802.3 standard for Ethernet networks, although it is disabled in modern full-duplex networks
1-14: At which layer of the OSI model do you find the protocol reponsible for the delivery of data to its ultimate destination?
Data link
Network
Session
Application
Network
1-15: Which of the following is not a protocol operating at the network layer of the OSI model?
IP
ICMP
IGMP
IMAP
IMAP
IMAP (Internet Message Access Protocol) is the protocol among the options provided that does not operate at the network layer of the OSI model. IMAP is used for email retrieval and operates at the application layer. The other protocols mentioned, IP (Internet Protocol), ICMP (Internet Control Message Protocol), and IGMP (Internet Group Management Protocol), all operate at the network layer.
IGMP
Internet Group Management Protocol
- protocol in IP networking that enables the management of multicast group memberships
- Longer: is a protocol used by routers to communicate with hosts to determine group membership for multicasting purposes. It helps identify which computers wish to receive a multicast. Once a multicast has begun, IGMP is responsible for maintaining the multicast and also for terminating it upon completion
1-16: Ed is a software developer who has been given the task of creating an application that requires guaranteed delivery of information between end systems. At which layer of the OSI model does the protocol that provides guaranteed delivery run, and what type of protocol must Ed use?
Data link layer; connectionless
Network layer; connection-orientated
Transport layer; connection-orientated
Application layer; connectionless
Transport layer; connection-orientated
1-17: Which of the following devices operates only at the physical layer of the OSI model?
Hub
Bridge
Switch
Router
Hub
1-19: Which layers of the OSI model do not have protocols in the TCP/IP suite which exclusively dedicated to them? (choose all that apply)
Physical
Data link
Network
Transport
Session
Presentation
Application
Session
Presentation
1-20: The protocols at which layer of the OSI model use port numbers to identify the applications that are the source and the desitnation of the data in the packets?
Application
Presentation
Transport
Network
Transport
1-22: At which of the OSI model layers do switches and bridges perform their basic functions?
Physical
Data link
Network
Transport
Data link
1-23: On a TCP/IP Network flow control is a function implemented in protocols operating at which layer of the OSI model?
Presentation
Sessions
Transport
Network
Transport
1-25: Which of the OSI model layers is responsible for syntax translation and compression or encryption?
Data link
Network
Session
Presentation
Application
Presentation
Flow Control
- transport layer (layer 4)
- manages the pace of data transmission between two devices to prevent a fast sender from overwhelming a slow receiver
- allows a receiving device to control the amount of data sent by a sender, ensuring that the buffer of the receiving device does not overflow, leading to loss of data.
1-27: Specify the layer of the OSI model at which the Internet Protocol (IP) operates and whether it is connection-orientated or connectionless
Network; connection-orientated
Network; connectionless
Transport; connection-orientated
Transport; connectionless
Network; connectionless
There are no connection orientated protocols on the Network Layer
TCP: Transport Layer, Connection-orientated
UDP: Transport Layer, Connectionless
1-29: Which of the following protocols operate at the application layer of the OSI model? (choose all that apply)
HTTP
SNMP
ICMP
IGMP
UDP
HTTP
SNMP
What layer of the OSI model does ICMP operate at?
What does it stand for and what does it do?
- Network Layer (Layer 3)
- Internet Control Message Protocol
- used by network devices, including routers, to send error messages and operational information indicating the status of the network
ICMP is used for diagnostics and troubleshooting purposes, to report issues back to the source when a device does not reach its intended destination
What layer of the OSI model does IGMP operate at?
What does it stand for and what does it do?
- Network Layer (Layer 3)
- Internet Group Management Protocol (IGMP)
- IGMP plays a crucial role in managing multicast IP traffic across networks
It allows routers to communicate effectively with hosts and switches to establish and maintain group memberships for multicast distribution. In essence, IGMP helps in determining which hosts are interested in receiving multicast traffic and which are not.
What layer of the OSI model does UDP operate at?
What does it stand for and what does it do?
- Transport Layer (Layer 4)
- User Datagram Protocol
- used for programs that require a simple, connectionless communication model where the delivery of data is not guaranteed
UDP is part of the Internet Protocol Suite, which is used for programs that require a simple, connectionless communication model where the delivery of data is not guaranteed. UDP is often referred to as a “fire and forget” protocol because it sends data (datagrams) without establishing a connection between the communication partners and does not provide any guarantee that the data sent will be received by the target. This makes UDP faster and more efficient for certain types of applications, where speed is critical and occasional data loss is acceptable
1-30: Which layer of the OSI model would be responsible for converting a text file encoded using EBCDIC on the sending system into ASCII code, when required by the receiving system?
Application
Presentation
Session
Physical
Presentation
1-31: Which of the follwoing protocols operates at the Network Layer of the OSI model, but does not encapsulate data generated by an upper layer protocol for transmission over the network?
IP
UDP
ARP
ICMP
TCP
ICMP
What layer of the OSI model does ARP operate at?
What does it stand for and what does it do?
Data link Layer (Layer 2)
Address Resolution Protocol
The Address Resolution Protocol (ARP) operates in IPv4 environments to translate IP addresses to the corresponding physical MAC (Media Access Control) addresses, facilitating communication within a network
What layer of the OSI model does TCP operate at?
What does it stand for and what does it do?
Transport Layer (Layer 4)
Transport Control Protocol
TCP is a core protocol of the Internet Protocol Suite. It operates at the transport layer and is used to provide reliable, ordered, and error-checked delivery of a stream of bytes between applications running on hosts communicating via an IP network
1-32: A client on a TCP/IP Network is attempting to establish a session with a server. Which of the following correctly lists the order of the TCP flags raised in TCP session establishment messages?
SYN, ACK, SYN, ACK
SYN, SYN, ACK, ACK
SYN/ACK, SYN,ACK
SYN, SYN/ACK, ACK
SYN, SYN/ACK, ACK
What is the MTU size for Ethernet?
1500 bytes
actually 1518, 18 bytes are used for header and footer data
MTU
Maximum Transmission Unit
The Maximum Transmission Unit (MTU) refers to the largest size of a data unit that can be transmitted in a communications protocol, such as Ethernet. This value is crucial because it determines the maximum size of packets or frames that can be sent over the network without requiring fragmentation
1-34: Which of the following TCP control bits is set to 1 to intiate the termination of a session?
SYN
URG
FIN
END
PSH
FIN
SYN packet
The ‘SYN’ is the first packet sent from a client to a server; it literally asks a server to open a connection with it.
URG packet
The URG (Urgent) flag is used to signal “urgent” data that should be prioritized over non-urgent data. This is used to send so-called “out-of-band data,” which is treated in a special way by the operating system and usually signals some kind of exception in the application protocol.
PSH packet
The PSH (push) flags instruct the operating system to send (for the sending side) and receive (for the receiving side) the data immediately.
FIN packet
A FIN packet is typically associated with the TCP/IP protocol suite and is used to terminate an established TCP connection. It’s part of the process of gracefully closing a TCP connection between two endpoints.
1-35: An electrician installing a new light fixture accidential servers one of the LAN cables running through the dropped ceiling space. With which topology would the severed cable cause the greatest amount of disturbance to the network?
Bus
Star
Logical Ring
Mesh
Bus
Bus
A bus network topology uses a single bus cable to connect all the computers in a line. In this topology, networks must be terminated at both ends to prevent signal reflection. It’s important to note that true bus topologies are no longer commonly used in modern network designs..
Requires the installation of terminating resistors at two locations
Star
- also referred to as a hub-and-spoke topology
- involves a central connection point (like a hub or switch) to which all the computers and devices on the network are connected directly.
longer:
This setup offers significant fault tolerance advantages over other topologies such as bus and ring networks. In a star topology, if one of the cables connecting a device to the central hub fails, only that particular device is affected, and the rest of the network continues to function normally. This resilience to failures made star topologies a popular choice despite the initial challenges in transitioning from older network designs
Logical Ring
- Logical ring networks form a circular data flow, managed to resemble a ring structure despite physical variations.
- Token Ring networks utilize token-passing, pioneered by IBM, for orderly data transmission among devices.
- Logical ring networks prioritize efficient data flow but face disruption risks from single node failures without failover mechanisms.
- Today, logical ring networks are less common, with networks favoring more resilient topologies like star or mesh configurations.
Mesh
- A type of network topology where every device (or node) is interconnected with one another, allowing for data to be transmitted across multiple paths
- Types: Partially Meshed: In a partially meshed network, not all devices are directly connected to each other. At least two devices have redundant connections, creating multiple paths for data transmission but not necessarily a direct link between every pair of devices in the network.
- Fully Meshed: In a fully meshed network, every device is directly connected to every other device. This allows for the most redundancy and reliability, as there are multiple paths for data to travel between any two points in the network. If one path fails, data can be rerouted through another path
Hybrid Topology
A network that uses two or more basic topologies, connected together so that each workstation can communicate with all other workstations.
Example: 4 switches connected via bus topology, this combines four star networks in such a way that all workstations are inconnected
1-40: Which of the following topologies requires the installation of terminating resistors at two locations?
Bus
Star
Ring
Mesh
Bus
Hierarchical Star
A hierarchical star network, often referred to in the context of hybrid topologies, combines elements of both star and another topology (like ring or bus) to form a network structure that leverages the benefits of a star topology while maintaining the characteristics of the secondary topology in terms of data flow or signal transmission.
SDWAN
Software Defined Wide Area Network
automates the configuration of WAN routers based on the current mix of traffic
Z-Wave
- proprietary wireless communications protocol designed specifically for home automation
- operates in a mesh network of low-powered devices
- allowes for the integration and control of appliances, lighting, HVAC systems, and security systems, among others.
- Supports a network of up to 232 devices and operates at the 908- and 916-MHz frequency bands.
- This protocol is known for its reliability, low power consumption, and ease of integration, making it a popular choice for smart home ecosystems
Ad-Hoc Wifi Topology
devices communicate directly with each other
Infrastucture Wifi Topology
wireless devices connect to an access point
1-45: Which of the following cabling topologies was used by the first Ethernet networks?
Bus
Ring
Star
Mesh
Bus
1-46: On an Ethernet network using the star topology, which of the following devices that can function as the cabling nexus that forms the figurative center of the star? (choose all that apply)
Hub
Router
Switch
Access Point
Hub
Switch
1-50: Dense Wave Division Multiplexing (DWDM) is a signaling technology that has become a popular choice in the construction of which of the following types of provider links?
DSL
Metro-optical
Satellite
Cable
Metro-optical
1-51: Which of the following statements is true about the differences between peer-to-peer network and client-server network?
Peer-to-peer networks are inherently less secure than client-server networks
Peer-to-peer networks are illegal, which client-server networks are legal
On peer-to-peer networks, every workstation is capable of authenticating users
On a peer-to-peer network, all workstations must share their resources
On peer-to-peer networks, every workstation is capable of authenticating users
1-54: Which of the following WAN technologies uses broadband signalling?
Digital Subcriber Line (DSL)
Synchronous Optical Network (SONET)
Integrated Services Digital Network (ISDN)
Cable TV (CATV)
Cable TV (CATV)
SONET
Synchronous Optical Network
physical layer standard that defines fiber optic connections
What is the speed of a T-3 dedicated lease line?
44.735 Mbps
PSTN
Public Switched Telephone Network
analog circuit switched network
1-59: What are the two main factors that affect DSL transmission rates? (Choose all that apply)
Signal termination
Distance to the nearest central office
Line Conditions
Line Reflection
Distance to the nearest central office
Line Conditions
1-60: Which of the following best describes the function of a decmarcation point or demarc?
- The vertical cross-connect that links horizontal networks together
- The place where an outside service enters the building
- A switch or hub that connects computers in a particular work are together, forming a horizontal network
- The place in a telecommunications room where a patch panel is located
The place where an outside service enters the building
1-62: Which of the following hardware components is typically found at the demarcation point (demarc) of a leased line, such as a T-1, or a T-3?
Terminator
Punchdown Block
110 block
Smartjack
CSU/DSU
Smartjack
110 Block
A 110 block is a connection gridwork used to link UTP (Unshielded Twisted Pair) and STP (Shielded Twisted Pair) cables behind an RJ-45 jack or patch panel. It is also known as a 110-punchdown block