CCNA Guide to Cisco Networking, Third Edition

Similar documents
Data Communication and Network. Introducing Networks

ITEC 3800 Data Communication and Network. Introducing Networks

ISO/OSI Model and Collision Domain NETWORK INFRASTRUCTURES NETKIT - LECTURE 1 MANUEL CAMPO, MARCO SPAZIANI

CS-461 Internetworking. Dr. Mohamed Aboutabl

Chapter 7. OSI Data Link Layer

Chapter 7. OSI Data Link Layer. CCNA1-1 Chapter 7

The OSI Model. Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO).

Network Reference Models

Guide to Networking Essentials, 6 th Edition. Chapter 6: Network Reference Models and Standards

Network.... communication system for connecting end- systems. End-systems a.k.a. hosts PCs, workstations dedicated computers network components

Chapter 2. Communicating Over The Network. CCNA1-1 Chapter 2

Computer Network : Lecture Notes Nepal Engineering College Compiled by: Junior Professor: Daya Ram Budhathoki Nepal Engineering college, Changunarayan

Network Fundamentals Chapter 2 Modified by Tony Chen 05/20/2008

Defining Networks with the OSI Model. Module 2

Chapter 2. Communicating Over The Network

Communicating over the Network

products. OSI is an ISO Standard: OSI was officially adopted as an international standard by the International Organisation of Standards (ISO).

Network Models. Behrouz A. Forouzan Data communication and Networking Fourth edition

Essay MCQ Total Midterm Exam Computer Networks. Model answer 0X April minutes ID: Name:

Internetwork Basic. Possible causes of LAN traffic congestion are

Course 6. Internetworking Routing 1/33

ES623 Networked Embedded Systems

Internetworking Concepts Overview. 2000, Cisco Systems, Inc. 2-1

Network Models. Presentation by Dr.S.Radha HOD / ECE SSN College of Engineering

System Programming. Introduction to computer networks

BABU MADHAV INSTITUTE OF INFORMATION TECHNOLOGY, UTU 2017

Cross Layer Protocol Design. Radio Communication III

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet

Objectives. Network Structure. Network Structure

Chapter -4 OSI Reference Model

CCNA Exploration1 Chapter 7: OSI Data Link Layer

MODULE: NETWORKS MODULE CODE: CAN1102C. Duration: 2 Hours 15 Mins. Instructions to Candidates:

Data and Computer Communications. Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based Applications

The Data Link Layer. 32 PART I Networking Basics

Data Encapsulation & OSI & TCP/IP Models Week 2. Lecturer: Lucy White Office : 324

Layering in Networked computing. OSI Model TCP/IP Model Protocols at each layer

Revision of Previous Lectures

Networking Models OSI Model Created by International Organization Standardization

Lecture (03) Networking Model (TCP/IP) Networking Standard (OSI) cont.,..

Networking Applications

Layered Architecture

1: Review Of Semester Provide an overview of encapsulation.

Network Protocols. Terms you ll need to understand: Techniques you ll need to master:

Chapter 2 Network Models 2.1

Copyleft 2005, Binnur Kurt. Objectives

Network+ Guide to Networks, 6 th Edition. Chapter 2 Solutions

Objectives. Upon completion you will be able to: Understand how the Internet came into being

Open Systems Interconnection Model

OSI ISO, OSI Reference Model

In multiple-hub networks, demand priority ensures fairness of access for all nodes and guarantees access time for multimedia applications.

Chapter 12. Network Organization and Architecture. Chapter 12 Objectives Introduction Introduction

Network Architecture Models

Chapter 1. What is Data Communications 8/19/2010. The Data Communications Industry. Approach to Data Communications

The OSI Model and the TCP/IP Protocol Suite Outline: 1. Protocol Layers 2. OSI Model 3. TCP/IP Model 4. Addressing

Configuring your VLAN. Presented by Gregory Laffoon

Overview of TCP/IP Overview of TCP/IP protocol: TCP/IP architectural models TCP protocol layers.

Architectures of Communication Subsystems

1. Data Link Layer (Layer 2)

Computer Networks Question Bank

Lecture Outline. Lecture 2. OSI model and networking. The OSI model and networking. The OSI model and networking. The OSI model and networking

CCNA 1: Chapter 2 Exam Answer v %

Position of IP and other network-layer protocols in TCP/IP protocol suite

Introduction to Open System Interconnection Reference Model

The History and the layers of the OSI Model 30 - October

Networking and Health Information Exchange Unit 1a ISO Open Systems Interconnection (OSI) Slide 1. Slide 2. Slide 3

Networks: Access Management


1. IPv6 is the latest version of the TCP/IP protocol. What are some of the important IPv6 requirements?

Network Model: Each layer has a specific function.

Computer Facilities and Network Management BUS3150 Tutorial - Week 13

Chapter 2 Communicating Over the Network

E&CE 358: Tutorial 1. Instructor: Sherman (Xuemin) Shen TA: Miao Wang

MEBS Utilities services M.Sc.(Eng) in building services Faculty of Engineering University of Hong Kong

Networking and Health Information Exchange: ISO Open System Interconnection (OSI)

Concept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space that is provided.

OSI Data Link Layer. Network Fundamentals Chapter Cisco Systems, Inc. All rights reserved. Cisco Public 1

CS3600 SYSTEMS AND NETWORKS

The MAC Address Format

Chapter 2 Network Models

Computer Communication & Networks / Data Communication & Computer Networks Week # 03

Computer Networks (Introduction to TCP/IP Protocols)

Fundamentals of Networking. OSI & TCP/IP Model. Kuldeep Sonar 1

CPEG514 Advanced Computer Networks. Atef Abu Salim University of Nizwa Spring 2013/2014

CN1047 INTRODUCTION TO COMPUTER NETWORKING CHAPTER 6 OSI MODEL TRANSPORT LAYER

Communicating over the Network. Network Fundamentals. ITE PC v4.0 Chapter Cisco Systems, Inc. All rights reserved.

The OSI Model. Level 3 Unit 9 Computer Networks

Refer to the exhibit. Which set of devices contains only end devices? A,C,D B,E,G,H C,D,G,H,I,J D,E,F,H,I,J E,F,H,I,J

Monash University SAMPLE EXAM. Faculty Of Information Technology. Computer Facilities and Network Management

Lecture (03) Network Model

2. What is a characteristic of a contention-based access method?

MiPDF.COM. 1. Convert the decimal number 231 into its binary equivalent. Select the correct answer from the list below.

Imi :... Data:... Nazwisko:... Stron:...

CCNA 1 Chapter 5 v5.0 Exam Answers 2013

EITF25 Internet Techniques and Applications L7: Internet. Stefan Höst

QUESTION BANK ENGINEERS ACADEMY. Computer Networks Computer Network Basics Segentation is done in. 12. Session layer is used for

Chapter 3: Network Protocols and Communications. Introduction to Networks v5.1

Internet Protocol (IP)

OSI Layer OSI Name Units Implementation Description 7 Application Data PCs Network services such as file, print,

Time : 3 hours. Full Marks: 70. The figures in the margin indicate full marks. Answer from all the Groups are directed. Group A.

COMS Introduction to Computers. Networking

Transcription:

Review Questions 1. Which of the following best describes the Presentation layer? b. Translates, encrypts, or prepares data from the Application layer for network transmission c. Handles routing information for data packets d. Provides the electrical and mechanical transmission of data e. Handles link control and uses the MAC address on the network interface card (NIC) 2. Which of the following best describes the Network layer? a. Handles routing information for data packets b. Provides the electrical and mechanical transmission of data c. Handles link control and uses the MAC address on the NIC d. Establishes, maintains, and manages sessions between applications e. Translates, encrypts, or prepares data from the Application layer for network transmission 3. Which of the following best describes the Session layer? a. Translates, encrypts, or prepares data from the Application layer for network transmission b. Handles routing information for data packets c. Provides the electrical and mechanical transmission of data d. Handles link control and uses the MAC address on the NIC e. Establishes, maintains, and manages sessions between applications 4. Which of the following best describes the Transport layer? a. Provides the electrical and mechanical transmission of data b. Handles link control and uses the MAC address on the NIC c. Establishes, maintains, and manages sessions between applications d. Segments and reassembles data and provides either connection-oriented or connectionless communications e. Translates, encrypts, or prepares data from the Application layer for network transmission 5. Which of the following best describes the Data Link layer? a. Provides the electrical and mechanical transmission of data b. Handles link control and uses the MAC address on the NIC c. Establishes, maintains, and manages sessions between applications d. Translates, encrypts, or prepares data from the Application layer for network transmission e. Handles routing information for data packets 6. Which of the following best describes the Physical layer? b. Translates, encrypts, or prepares data from the Application layer for network transmission c. Provides the electrical and mechanical transmission of data d. Handles link control and uses the MAC address on the NIC e. Provides network services to the user 7. Which of the following best describes the Application layer? b. Translates, encrypts, or prepares data for network transmission c. Provides network services to the user d. Handles routing information for data packets e. Provides the electrical and mechanical transmission of data 8. Which of the following accurately describe the Media Access Control (MAC) address? (Choose all that apply.) a. It is a physical number set during the manufacturing process. b. This address is a layer in a network segment. c. MAC addresses contain 12 hexadecimal numbers. 1

d. Computers use this address to uniquely identify themselves on the network. e. An IP address is one example of this type of address. 9. Which of the following accurately describe the network address? (Choose all that apply.) a. It is a physical number set during the manufacturing process. b. This address is used when routing communications between different network segments. c. The Data Link layer uses this address. d. This address is set at layer 3 of the OSI model. e. An example of this type of address is an IP address. 10. Connection-oriented services are also known as services. a. reliable b. unreliable c. datagram 11. Connectionless services are also called services. a. reliable b. acknowledgment c. unreliable 12. Which of the following services receive an acknowledgment from the destination? (Choose all that apply.) a. Datagram b. Reliable c. Connection-oriented d. Connectionless e. Unreliable 13. Place the following steps of data encapsulation in their correct descending order: a. Frame headers and trailers added b. Segment header added c. Bit transmission d. Packet creation and network header e. Data conversion The correct order is e, b, d, a, c. 14. Which of the following correctly defines a WAN? a. A network contained within a single geographic location and usually connected by a privately maintained medium b. A network spread over multiple geographic areas and usually connected by publicly and privately maintained media c. A network spread over a single metropolitan area 15. Which of the following best describes a LAN? a. A network that is contained in a single geographic area such as a building or floor in a building b. A countywide network that spans multiple geographic locations c. A large network that is connected by both publicly and privately maintained cabling spread over multiple geographic regions 16. Which of the following reasons for providing a layered OSI architecture are correct? (Choose all that apply.) a. To provide design modularity, which allows upgrades to a specific layer to remain separate from the other layers b. To simplify the networking model by dividing it into 14 layers and 12 sublayers c. To discourage interoperability between disparate networking models d. To enable programmers to specialize in a particular layer e. To allow for standardized interfaces from networking vendors 17. On a network, computers must use a common in order for communication to occur. 2

a. protocol b. operating system c. manufacturer d. hardware platform 18. Before networks, what did people use to transfer files? a. Sneakernet b. Protocols c. Interface cards d. Ethernet 19. A protocol is to a computer as a(n) is to a person. a. identity b. personality c. language d. personal philosophy 20. Which of the following are network hardware? (Choose all that apply.) a. NIC b. NOS c. LLC d. Network media e. Connectors 21. Which of the following are network software? (Choose all that apply.) a. Components that map to the Application layer of the OSI model b. NIC c. NOS d. Media connectors 22. All networking vendors follow the OSI model and design seven-layer architectures. True or False? 23. Communications on a network originate at the. a. destination b. breaker c. peak d. source 24. Transmitted signals are bound for a computer. a. destination b. breaker c. peak d. source 25. Information transmitted on a network is called a(n). a. package b. expresser c. data destination d. data packet e. E-pack 26. Which of the following are layers of the OSI model? (Choose all that apply.) a. OSI b. Physical c. IEEE d. Data Link 27. Which layer of the OSI model is responsible for media access and packaging data into frames? a. Network layer b. Physical layer c. Data Link layer 3

d. Transport layer 28. At which layer of the OSI model will encryption and compression occur? a. Presentation layer b. Session layer c. Application layer d. Network layer 29. Which of the following lists the layers of the OSI model from layer 7 to layer 1? a. Application, Session, Transport, Network, Presentation, Data Link, Physical b. Physical, Data Link, Network, Transport, Session, Presentation, Application c. Application, Presentation, Session, Transport, Network, Data Link, Physical d. Presentation, Application, Session, Network, Transport, Data Link, Physical 30. The layer is responsible for finding the best path to route packets within an internetwork. a. Transport b. Network c. Session d. Data Link Case Projects Case Project 1 Moe may not realize that without using the OSI reference model as a discussion tool, he probably could not have learned enough about protocols to pass the Network+ exam. Learning about network operation without this frame of reference would be nearly impossible. Also, this knowledge often helps in troubleshooting the network. If something goes wrong on the network, understanding the layer at which the nonfunctioning element is associated can help you solve the problem. Case Project 2 Although data encapsulation is often described in terms of the application, transport, network, data link, and physical layers, it can actually occur at all layers. Encapsulation is the process of wrapping the header information from the higher layer with the header of the next-lower layer. The five steps of data encapsulation are: i) data conversion at the upper layers (5,6,7) ii) segmentation at layer 4 iii) packet creation at layer 3 iv) frame encapsulates packet at layer 2 v) bit transmission at layer 1 Case Project 3 The data link layer controls access to the physical media, however, it is not part of the physical layer. This is especially confusing since the MAC address is also known as the hardware or physical address. The MAC address is called the hardware or physical address because it is burned onto the NIC and cannot be changed. The only way to change the MAC address of a device is to change the NIC card in the device. The MAC address is more specifically operating at the MAC sublayer of the data link layer. There is also the logical link control (LLC) sublayer in the data link layer. The LLC is concerned with the linking function between the lower layers and upper layer protocols. Case Project 4 From 1 to 7: "Please do not throw sausage pizza away." From 7 to 1: "All people seem to need data processing." Physical: encoding, bit transmission, signal Data Link: frame, MAC address, access method Network: packet, routing, best path Transport: segmentation, connection-oriented vs. connectionless, error-free delivery Session: synchronization, half-duplex/full duplex, communications setup and teardown Presentation: formatting, compression, encryption 4

Application: user/application services, communications origination, FTP/Telnet Case Project 5 Students could draw two OSI models side by side. An arrow could come down from the top of the first model (source) to the physical layer and then back up the second model (destination) to the application layer. In some way it could be illustrated that the data "grows" as it is encapsulated with information with each successive layer as it goes down the first stack. Then, the headers are stripped off one by one as the data travels up the second (destination) stack until it reaches the user on top of the second model. 5