Module 3 - Protocols & Models Flashcards
(50 cards)
There are three elements to any communication, which of the below are NOT one of these elements?
a. Source (sender)
b. Destination (receiver)
c. Channel (media)
d. User (device)
d. User (device)
__________ are the rules that communications will follow.
a. Protocols
b. Keywords
c. Arguments
d. Commands
a. Protocols
Which of the following is NOT a requirement for a network protocol?
a. Message encoding
b. Message decapsulation
c. Message formatting and encapsulation
d. Message size
e. Message timing
f. Message delivery options
b. Message decapsulation
Which of the following is NOT a requirement for a protocol?
a. An identified sender and receiver
b. Common language and grammar
c. An identified host name and user name
d. Speed and timing of delivery
e. Confirmation or acknowledgment requirements
c. An identified host name and user name
____________ is the process of converting information into another acceptable form for transmission.
a. Decoding
b. Recoding
c. Encoding
d. Encapsulation
c. Encoding
(Decoding reverses this process to interpret the information.)
Messages sent across the network are converted to ____
a. bits
b. bytes
c. gigabits
d. packets
a. bits
The bits are encoded into a pattern of light, _______, or electrical impulses.
a. UV
b. Gamma
c. Radio
d. Sound
d. Sound
What is the correct description of Flow Control, in reference to Message Timing?
a. Manages how long a device waits when it does not hear a reply from the destination.
b. Manages the rate of data transmission and defines how much information can be sent and the speed at which it can be delivered.
c. Determines when someone can send a message.
d. Determines how long a message takes to travel over the network
b. Manages the rate of data transmission and defines how much information can be sent and the speed at which it can be delivered.
What is the correct description of Response Timeout, in reference to Message Timing?
a. Manages how long a device waits when it does not hear a reply from the destination.
b. Manages the rate of data transmission and defines how much information can be sent and the speed at which it can be delivered.
c. Determines when someone can send a message.
d. Determines how long a message takes to travel over the network
a. Manages how long a device waits when it does not hear a reply from the destination.
The ____________ host must decode the signals to interpret the message.
a. Source
b. End user
c. Destination
d. Initial user
c. Destination
What is the correct description of Access method, in reference to Message Timing?
a. Manages how long a device waits when it does not hear a reply from the destination.
b. Manages the rate of data transmission and defines how much information can be sent and the speed at which it can be delivered.
c. Determines when someone can send a message.
d. Determines how long a message takes to travel over the network
c. Determines when someone can send a message.
What is the correct description of Unicast Message Delivery
a. One to Many (typically not all)
b. One to All
c. All to All
d. One to One
d. One to One
What is the correct description of Multicast Message Delivery
a. One to Many (typically not all)
b. One to All
c. All to All
d. One to One
a. One to Many (typically not all)
What is the correct description of Broadcast Message Delivery
a. One to Many (typically not all)
b. One to All
c. All to All
d. One to One
b. One to All
What is the correct description for Network Communications?
a. used for the automatic detection of devices or services
b. secure data to provide authentication, data integrity, and data encryption
c. enable two or more devices to communicate over one or more networks
d. enable routers to exchange route information, compare path information, and select best path
c. enable two or more devices to communicate over one or more networks
What is the correct description for Network Security?
a. used for the automatic detection of devices or services
b. secure data to provide authentication, data integrity, and data encryption
c. enable two or more devices to communicate over one or more networks
d. enable routers to exchange route information, compare path information, and select best path
b. secure data to provide authentication, data integrity, and data encryption
What is the correct description for Routing?
a. used for the automatic detection of devices or services
b. secure data to provide authentication, data integrity, and data encryption
c. enable two or more devices to communicate over one or more networks
d. enable routers to exchange route information, compare path information, and select best path
d. enable routers to exchange route information, compare path information, and select best path
What is the correct description for Routing?
a. used for the automatic detection of devices or services
b. secure data to provide authentication, data integrity, and data encryption
c. enable two or more devices to communicate over one or more networks
d. enable routers to exchange route information, compare path information, and select best path
a. used for the automatic detection of devices or services
Match the network protocol function to its description:
Addressing –>
Reliability –>
Flow Control –>
Sequencing –>
Error Detection –>
Application Interface –>
–> Process-to-process communications between network applications
–> Determines if data became corrupted during transmission
–> Uniquely labels each transmitted segment of data
–> Ensures data flows at an efficient rate
–> Provides guaranteed delivery
–> Identifies sender and receiver
Addressing –> Identifies sender and receiver
Reliability –> Provides guaranteed delivery
Flow Control –> Ensures data flows at an efficient rate
Sequencing –> Uniquely labels each transmitted segment of data
Error Detection –> Determines if data became corrupted during transmission
Application Interface –> Process-to-process communications between network applications
Match the protocol to its function:
Hypertext Transfer Protocol (HTTP) –>
Transmission Control Protocol (TCP) –>
Internet Protocol (IP) –>
Ethernet –>
–> Governs the way a web server and a web client interact / Defines content and format
–> Manages the individual conversations / Provides guaranteed delivery / Manages flow control
–> Delivers messages from one NIC to another NIC on the same Ethernet Local Area Network (LAN)
–>Delivers messages globally from the sender to the receiver
Hypertext Transfer Protocol (HTTP) –> Governs the way a web server and a web client interact / Defines content and format
Transmission Control Protocol (TCP) –>Manages the individual conversations / Provides guaranteed delivery / Manages flow control
Internet Protocol (IP) –> Delivers messages globally from the sender to the receiver
Ethernet –> Delivers messages from one NIC to another NIC on the same Ethernet Local Area Network (LAN)
What is a group of inter-related protocols necessary to perform a communication function
a. Protocol suite
b. Protocol system
c. control suite
d. control
a. Protocol suite
The protocols are viewed in terms of layers:
a. Physical layers / Data layers
b. Physical layers / Network layers
c. Data layers / Transport layers
d. Higher layers / lower layers
d. Higher layers / lower layers
(Lower Layers- concerned with moving data and provide services to upper layers)
Internet Protocol Suite or TCP/IP is maintained by which organisation?
a. International Organization for Standardization (ISO)
b. Internet Engineering Task Force (IETF)
c. International Telecommunications Union (ITU)
d. Apple Inc.
b. Internet Engineering Task Force (IETF)
Open Systems Interconnection (OSI) protocols are maintained by which organisations (pick two)?
a. International Organization for Standardization (ISO)
b. Internet Engineering Task Force (IETF)
c. International Telecommunications Union (ITU)
d. Apple Inc.
a. International Organization for Standardization (ISO)
c. International Telecommunications Union (ITU)