Week 25 Chapter 15 - Pages 15-1 - 15-40 Flashcards

1
Q

Network architecture can be described as the ___ grouping of hardware, software, and applications.

a. Structured
b. Logical
c. Top down
d. Efficient

A

a. Structured

p 15-1

Network architecture can be described as the structured grouping of hardware, software, and applications. The successful integration of these three elements allows for the transfer of all types of information between users, administrators, and devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A(n) ___ can be defined as two or more networked devices and the associated software, peripherals, operators, physical processes, and media that form an autonomous unit capable of processing and transferring data.

a. Network
b. Application
c. System
d. Stack

A

c. System

p 15-3

A system can be defined as two or more networked devices and the associated software, peripherals, operators, physical processes, and media that form
an autonomous unit capable of processing and transferring data.

This broad definition of a system makes it possible to use the OSI model to describe any type of network, from a residential LAN to the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Name the 7 OSI layers

A

(7) Application
(6) Presentation
(5) Session
(4) Transport
(3) Network
(2) Data Link
(1) Physical

Mnemonic Please Do Not Touch Steve’s Pet Alligator to remember the seven layers (starting at Layer 1 and moving up to Layer 7).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The term ___ is also used to describe the improved network reliability enabled by clustering.

a. Failover access
b. Centralized
c. High availability
d. Full flexibility

A

c. High availability

p 15-10

The term high availability is also used to describe the improved network reliability enabled by clustering.

Failure of any single server results in the transfer of all activities from the failed server to one or more of the other servers in the cluster, a process referred to as failover access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Each port on a switch is a separate communications channel, representing a different ___ domain.

a. Collision
b. Broadcast
c. Routing
d. Segment

A

a. Collision

p 15-10

Each port on a switch is a separate communications channel, representing a different collision domain. This makes it possible for multiple devices on a switch-based network to transmit simultaneously as long as they are connected to different ports on the switch.

NOTE: A port on a switch is often described as a dedicated connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

___ layer switching provides increased flexibility to network administrators, making it possible for them to direct, modify, and refine network traffic flows on the basis of organizational priorities.

a. Simplified
b. Higher
c. Lower
d. Data

A

b. Higher

p 15-12

This process is sometimes described as traffic engineering or traffic shaping.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

An incoming frame on a Layer 3 switch is processed on the basis of ___ address information.

a. Routing
b. Switching
c. Layer 2
d. Layer 3

A

d. Layer 3

p 15-12

An incoming frame on a Layer 3 switch is processed on the basis of Layer 3 address information found in the data field of the Layer 2 frame. In some cases, an even greater level of detail can be extracted and used to forward a frame. For example, a Layer 4 switch directs frames on the basis of OSI Layer 4 (Transport layer) protocol information and a Layer 7 (Application layer) switch processes frames on the basis of the applications used to generate the frames.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Layer ___ services make it possible for applications running on dissimilar systems to use a network to exchange information.

a. 1
b. 2
c. 3
d. 4
e. 5
f. 6
g. 7

A

g. 7

p 15-5

Application - Layer 7 services make it possible for applications running on dissimilar systems to use a network to exchange information. Services defined by this layer include file transfer, message handling, and remote management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Layer ___ services are responsible for various forms of data conversion.

a. 1
b. 2
c. 3
d. 4
e. 5
f. 6
g. 7

A

f. 6

p 15-5

Presentation - Layer 6 services are responsible for various forms of data conversion. This layer negotiates and establishes a common form for data representation, which includes character code translations, data compression, and message encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Layer ___ services are responsible for synchronizing and managing data transfer between network devices.

a. 1
b. 2
c. 3
d. 4
e. 5
f. 6
g. 7

A

e. 5

p 15-5

Session - Layer 5 services are responsible for synchronizing and managing data transfer between network devices. For example, a Layer 5 protocol can direct a device to start, stop, restart, or abandon data transfer activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Layer ___ services make it possible to assign various levels of quality to the data transfer process

a. 1
b. 2
c. 3
d. 4
e. 5
f. 6
g. 7

A

d. 4

p 15-5c. 3

p 15-5

Transport - Layer 4 services make it possible to assign various levels of quality to the data transfer process. When a connection is being established between network devices, the Layer 4 protocol can be used to select a particular class of service.

This layer also can monitor the transfer for billing purposes, ensure that the appropriate service quality is maintained, and generate an alert if this quality has been compromised.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Layer ___ services are responsible for internetwork data transfer (e.g., between LANs connected to the Internet).

a. 1
b. 2
c. 3
d. 4
e. 5
f. 6
g. 7

A

c. 3

p 15-5

Network - Layer 3 services are responsible for internetwork data transfer (e.g., between LANs connected to the Internet).

If multiple routes exist between the networks, a Layer 3 protocol can choose the most appropriate one based on such criteria as message priority, route congestion, or route cost.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Layer ___ services are responsible for intranetwork datatransfer (e.g., between devices connected to a LAN).

a. 1
b. 2
c. 3
d. 4
e. 5
f. 6
g. 7

A

b. 2

p 15-5

Data - Layer 2 services are responsible for intranetwork data transfer (e.g., between devices connected to a LAN). Some of the functions of a Layer 2 protocol include device identification and managed access to a shared transmission channel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Layer ___ services are responsible for the transfer of information over various media.

a. 1
b. 2
c. 3
d. 4
e. 5
f. 6
g. 7

A

a. 1

p 15-5

Physical - Layer 1 services are responsible for the transfer of information over various media.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

In regards to videoconferencing, data received before it can be processed by a videoconferencing application is typically stored in an allocated zone in the station’s memory, referred to as a ___.

a. Broadcast
b. Reserve
c. Buffer
d. Domain

A

c. Buffer

p 15-18

Data received before it can be processed by a videoconferencing application is typically stored in an allocated zone in the station’s memory, referred to as a buffer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Class 4 can also be provided without redundancy at the component level. This requires a configuration of:

a. 2(N+1)
b. 2(N+2)
c. 2(N+N)
d. 2N

A

c. 2(N+N)

p 15-24

Class 4 can also be provided without redundancy at the component level. This requires a configuration of 2(N+N) instead of 2(N+1), which is typically the equivalent to two separate Class 3 networks.

17
Q

The OSI model uses an approach called ___ to illustrate and explain the message exchange process.

a. Listing
b. Sequencing
c. Layering
d. Stacking

A

c. Layering

p 15-5

The OSI model uses an approach called layering to illustrate and explain the message exchange process. This approach divides the various functions and services provided by a network into discrete groupings called layers.

18
Q

In the Open Systems Interconnection (OSI) Reference Model, ___ are the connection points between layers.

a. Stacks
b. Service access points
c. Transition layers
d. Peer-to-peer links

A

b. Service access points

p 15-6 & Figure 15-4

Services access points are the connection points between layers.

The layers in the OSI model are commonly described as being connected to each other in vertical form, also called a stack or protocol stack.

19
Q

An excessive number of _____ serves as the practical limit for the total number of devices that can be connected to switches on a local area network (LAN).

a. Applications
b. Retransmissions
c. Broadcasts
d. Collisions

A

c. Broadcasts

p 15-14

The greater the number of devices on a LAN, the greater the number of broadcasts issued. An excessive number of broadcasts serves as a practical limit for the total number of devices that can be connected to a LAN, even when all of the connections are switched.

20
Q

Broadcast domains can also be referred as:

a. Collision domains
b. Internetworks
c. Mesh configurations
d. Subnetworks

A

d. Subnetworks

p 15-10

Routing is used to interconnect various types of LANs at Layer 3 of the OSI model. Routers make it possible to segment an organizational network into multiple broadcast domains, also referred to as subnetworks or subnets, using Layer 3 address assignments

21
Q

Client software is used to link a station’s network interface card (NIC) to the operating system (OS), making it possible for the OS to communicate with the NIC.

a. True
b. False

A

False

p 15-13

Drivers are needed to link a station’s NIC to the OS, making it possible for the OS to communicate with the NIC.

22
Q

When designing a network, the ___ design process is used in cases where detailed network characteristics are not available.

a. Structured
b. Physical
c. Logical
d. Functional

A

b. Physical

p 15-20

Physical design is also referred to as bottom-up design.

Functional design also is referred to as top-down des

23
Q

On a conventional local area network, there is a single broadcast domain, spanning all of the hubs and switches as well as the devices connected to their ports. Such configurations are referred to as _____ networks.

a. Shared
b. Global
c. Logical
d. Flat

A

d. Flat

p 15-14

On a conventional LAN, there is a single broadcast domain, spanning all of the hubs and switches as well as the devices connected to their ports. Such configurations are referred to as flat networks.

24
Q

In a server cluster, failure of any single server results in the transfer of all activities from the failed server to one or more of the other servers in the cluster, a process referred to as:

a. Hot swap
b. Failover access
c. Fault tolerance
d. Switching

A

b. Failover access

p 15-10

Failure of any single server results in the transfer of all activities from the failed server to one or more of the other servers in the cluster, a process referred to as failover access.

25
Q

Based on the number of stations simultaneously receiving video content and the direction of transfer of the video content, _____ types of network video communications can be identified.

a. Eight
b. Six
c. Four
d. Two

A

c. Four

p 15-17

Video services can be classified using the following criteria:
• The number of stations simultaneously receiving the same video content from the sending device, which can be one (i.e., PTP) or more than one (i.e., point-to-multipoint)
• The direction of transfer of the video content, which can be one-way (i.e., unidirectional) or two-way (i.e., bidirectional)

26
Q

Each port on a network switch serves as a separate _____ channel.

a. Collision
b. Network
c. Broadcast
d. Communications

A

d. Communications

p 15-10

Each port on a switch is a separate communications channel, representing a different collision domain.

27
Q

The Open Systems Interconnection (OSI) Reference Model specifies the sequence of _____ required for network message transfer between applications running on different systems.

a. Tasks
b. Communications
c. Processes
d. Steps

A

c. Processes

p 15-4

The objective of the OSI model is to provide a structured approach for the development of all types of networks. The model specifies the sequence of Processes required for network message transfer between applications running on different systems.

28
Q

On a conventional local area network, there is a single _____ domain, spanning all of the switches as well as the devices connected to their ports.

a. Administrative
b. Contention
c. Collision
d. Broadcast

A

d. Broadcast

p 15-14

On a conventional LAN, there is a single broadcast domain, spanning all of the hubs and switches as well as the devices connected to their ports. Such configurations are referred to as flat networks.

29
Q

Which one of the following computer room cabling topologies uses the least amount of cabling?

a. Top-of-rack
b. In-row
c. End-of-row
d. Centralized

A

a. Top-of-rack

p 15-32

The top-of-rack topology uses the least amount of cabling since only a single cable is required from a centralized switch to the switch in each rack or cabinet containing servers and storage devices. However, switches must be installed and managed in every rack or cabinet in the CR.

30
Q

In the Open Systems Interconnection (OSI) Reference Model, each layer provides services to:

a. Any other layer
b. Both the layers above and below
c. The layer below
d. The layer above

A

d. The layer above

p 15-6

In the OSI model, each layer provides services to the layer above while hiding from that layer the processes used to implement the services.

31
Q

In a data center, _____ allows multiple servers to be housed within the same physical host without compromising the benefits of being a separate physical server.

a. Centralization
b. Swapping
c. Clustering
d. Virtualization

A

d. Virtualization

p 15-9

Virtualization allows multiple servers to be housed within the same physical host without compromising the benefits of being a separate physical server.

32
Q

Ideally, changes can be made to any layer in the Open Systems Interconnection (OSI) Reference Model without requiring changes to:

a. Any other layer
b. The layer below
c. The layer above

A

a. Any other layer

p 15-6

In the OSI model, each layer provides services to the layer above while hiding from that layer the processes used to implement the services.

Ideally, changes can be made to any layer without requiring changes to any of the other layers as long as the inputs and outputs of the changed layer remain the same.

33
Q

Routers make it possible to segment an organizational network into multiple _____ domains.

a. Collision
b. Communications
c. Signaling
d. Broadcast

A

d. Broadcast

p 15-10

Routers make it possible to segment an organizational network into multiple broadcast domains, also referred to as subnetworks or subnets, using Layer 3 address assignments.

34
Q

When compared to other computer room topologies, the centralized topology uses ___ switches than the other topologies.

a. More
b. Fewer

A

b. Fewer

p 15-30

35
Q

The Open Systems Interconnection (OSI) Reference Model can be used to describe:

a. Any type of network
b. Local area networks
c. Wide area networks

A

a. Any type of network

p 15-4

This broad definition of a system makes it possible to use the OSI model to describe any type of network, from a residential LAN to the Internet.

36
Q

The physical paths of the access provider connections to a data center entrance room shall be a minimum of _____ apart along their entire routes.

a. 25 m (82 ft)
b. 20 m (66 ft)
c. 15 m (49 ft)
d. 10 m (33 ft)

A

b. 20 m (66 ft)

p 15-22

Typically, service is provided from two different points-of-presence that are at least ≈20 m (66 ft) apart.

The physical paths of the AP connections are then also a minimum of ≈20 m (66 ft) apart along their entire routes.

37
Q

Ideally, changes can be made to any layer in the Open Systems Interconnection (OSI) Reference Model without requiring changes to:

a. Any other layer
b. Both the layers above and below
c. The layer below
d. The layer above

A

a. Any other layer

p 15-6

In the OSI model, each layer provides services to the layer above while hiding from that layer the processes used to implement the services. Ideally, changes can be made to any layer without requiring changes to any of the other layers as long as the inputs and outputs of the changed layer remain the same.

38
Q

Multiple entrance rooms (ERs) are required for ___ data center infrastructures.

a. Class 4
b. Class 3 or higher
c. Class 2 or higher
d. Class 1 or higher

A

b. Class 3 or higher

p 5-23 Figure 15.12

39
Q

Route congestion and message priority are a few of the functions of what layer of the OSI Model?

a. Layer 1
b. Layer 2
c. Layer 3
d. Layer 4

A

c. Layer 3

p 15-5

A Layer 3 protocol can choose the most appropriate one based on such criteria as message priority, route congestion, or route cost.