Ch. 17 - Data Network Design.csv Flashcards Preview

BICSI > Ch. 17 - Data Network Design.csv > Flashcards

Flashcards in Ch. 17 - Data Network Design.csv Deck (48):
2

Functional design is also known as

top-down design
(17-1)

3

Physical design is also known as

bottom-up design
(17-2)

4

Ethernet was developed in the

1970's
(17-3)

5

In 1978 the International Organization for Standardization (ISO) introduced the

OSI Model ( formally called Open Systems Interconnection)
(17-5)

6

Objective of the OSI Model

to provide a structured approach
(17-5)

7

Layer 7

Application
-Applications running on dissimiliar systems
-"file transfer"
(17-8)

8

Layer 6

Presentation
-Data conversion, translation, data compression, encryption
(tions)
(17-8)

9

Layer 5

Session
-Synchronization, Stop, Start, Re-Start
(all S's)
(17-8)

10

Layer 4

Transport
-"Billing"
Quality/Class of Service
(hook-UPS will transport your package w/quality class of service but will bill you")
(17-8)

11

Layer 3

Network (PIGS)
-"Inter-network" "Data transfer"
-Packets:Routers
(17-8)

12

Layer 2

Data Link
-LLC = Logical link control
-"error correction ability" (provide a common format)
-MAC = Medium Access Control
-"error detection ability" (access granted)
-frames: switch/bridge
(17-8)

13

Layer 1

Physical (BIG)
-Transfer of bits/signal is generated
Bits:Hub
(17-8)

14

In the OSI model, which layer is responsible for synchronizing & managing data transfer?

Layer 5 - Session
(17-8)

15

PAN

-Individual workspace
-33' radius
(figure 17.6 pic on test)
(17-11)

16

LAN

within a building
(17-12)

17

CAN

two or more buildings
(figure 17.8 pic on test)
(17-13)

18

MAN

within a city
(figure 17.9 pic on test)
(17-14)

19

WAN

Geographic distances
(figure 17.10 pic on test)
(17-15)

20

IEEE 802.3ah

ethernet in the first mile (at home)
(figure 17.11 pic on test)
(17-17)

21

Unicast

1 person
(vanilla thunder)
(17-26)

22

Broadcast

all devices at once
(mass email)
(17-26)

23

Multicast

select group/devices
(small group/interface)
(17-26)

24

The unicast message is also referred to as _________transfer.

Point-to-Point
(17-27)

25

In unicast messaging, when a device needs to send the same message to multiple destinations, it must perform a _______ unicast.

Replicated
(17-27)

26

Part of an IP address is sometimes described using the term:

Network Identification & Host Identification
(17-34)

27

The term _______ is used to describe the placing of datagrams containing IP addresses into frames.

Encapsulation
(17-36)

28

**The correct number of bits in a MAC address are:

48
( I picked 16 in Oct)

29

IEEE 802.11

Wireless
(11 represents two towers)
(17-41)

30

IEEE 802.5

Token Ring
(fiiivvveee golden rings, 4..., 3 french hens)
(17-41)

31

IEEE 802.4

Token bus
( 4 tires on a bus)
(17-41)

32

IEEE 802.6

MAN
(Dr. J, #6, The Man)
17-41)

33

IEEE 802.7

Broadband technical advisory group (BBTAG)
(bond-007, gets the broad in the end)
(17-41)

34

IEEE 802.8

Fiber optic advisory group
(figure 8-slack span)
(17-41)

35

IEEE 802.14

Cable modem
(started in cable at 14)
(17-41)

36

ICANN

Internet naming & addressing
(17-42)

37

Hardwire component that connects a station to the network medium _________

NIC
(17-46)

38

When operating in _______ network cards are capable of sending & receiving messages at the same time.

Full-duplex
(17-47)

39

Link aggregarion

multiple NIC's
(17-54)

40

Clustering

two or more servers
(17-55)

41

Print servers commonly use a technique called ___________

spooling
(17-56)

42

Hub port

shared connection
(17-68)

43

Switch port

dedicated
(17-68)

44

A router is a combination of

hardware & software
(17-72)

45

VOIP standard G.711

converting speech
(17-88)

46

What is the most demanding resource of all network applications?

Videoconferencing
(17-94)

47

Videoconferencing gateway

Communications
(17-95)

48

Videoconferencing gatekeeper

operation
(17-95)

49

Videoconferencing multiport control (MCU)

sessions
(17-95)