Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

CNIT 344 Exam 1: OSI Model and Communication Fundamentals, Exams of Advanced Education

A comprehensive overview of the open systems interconnection (osi) model, a foundational concept in computer networking. It delves into the seven layers of the osi model, explaining their functions, responsibilities, and relationships. The document also explores various communication concepts, including transmission modes, modulation techniques, and multiplexing methods, providing a solid foundation for understanding network communication principles.

Typology: Exams

2024/2025

Available from 11/16/2024

Academician
Academician ๐Ÿ‡บ๐Ÿ‡ธ

4.5

(14)

3.9K documents

1 / 19

Toggle sidebar

Related documents


Partial preview of the text

Download CNIT 344 Exam 1: OSI Model and Communication Fundamentals and more Exams Advanced Education in PDF only on Docsity!

CNIT 344 Exam 1 Latest Update

With Complete Solutions.

Components of Communication - โœ”โœ”โœ” - Message Source - > Encoder - > Transmitter - > Transmission Medium "The Channel" - > Receiver - > Decoder - > Message Destination What ISO Standard is the OSI Model? - โœ”โœ”โœ” - ISO Standard 7498. (ITU-T specifies X.200-X.299 Recommendations). What does OSI stand for? - โœ”โœ”โœ” - Open System Interconnection. What does the OSI Model do? - โœ”โœ”โœ” - It defines 7 layers that describe the complete application-based communications between any two systems. It provides open interconnections between layers, such that multi-vendor environments can be supported. What are the Rules for Communication for the OSI Model? - โœ”โœ”โœ” - 1. The communication between layers is handled in a specified (defined) manner.

  1. Each layer is only able to communicate with its adjacent layers.
  2. Each layer relies on the layers below it to perform their specified function.
  3. Each layer relies on the layers above it to perform their specified function.

What are some benefits to the OSI Model? - โœ”โœ”โœ” - 1. Breaks network communication into smaller, more manageable parts. Prevents changes in one layer from affecting other layers.

  1. Standardizes network components to allow multiple vendor development and support.
  2. Allows different types of network hardware and software to communicate with each other. 1st Layer of the OSI Model - โœ”โœ”โœ” - Physical Layer 2nd Layer of the OSI Model - โœ”โœ”โœ” - Data Link Layer 3rd Layer of the OSI Model - โœ”โœ”โœ” - Network Layer 4th Layer of the OSI Model - โœ”โœ”โœ” - Transport Layer 5th Layer of the OSI Model - โœ”โœ”โœ” - Session Layer 6th Layer of the OSI Model - โœ”โœ”โœ” - Presentation Layer 7th Layer of the OSI Model - โœ”โœ”โœ” - Application Layer List all 7 layers of the OSI Model - โœ”โœ”โœ” - 7. Application
  3. Presentation
  4. Session
  1. Transport
  2. Network
  3. Data Link
  4. Physical What is the physical layer of the OSI model responsible for? - โœ”โœ”โœ” - It is responsible for the transmission and receipt of the bit stream to/from nodes. It is solely concerned with signaling techniques (such as activating, maintaining, and terminating the physical circuit). Where is the physical layer of the OSI model defined? - โœ”โœ”โœ” - X. What is the data link layer of the OSI model responsible for? - โœ”โœ”โœ” - It is responsible for providing point-to-point validity of the data via point-to-point checking/correction, and it is responsible for the procedures and protocols for reliably operating the communication links. It has an independent address architecture from other layers. What does the data link layer convert? - โœ”โœ”โœ” - It converts data into frames. What are the two sub-layers in the data link layer? - โœ”โœ”โœ” - - MAC
  • LLC Where is the data link layer of the OSI model defined? - โœ”โœ”โœ” - X. What is the network layer of the OSI model responsible for? - โœ”โœ”โœ” - It enables internetworking, it provides globally-unique addressing for every node in the network, and it

determines routes between source and destination networks (end-to-end with analysis at each hop). It relies on higher layer protocols for error detection and correction (this is UNRELIABLE). What does the network layer convert? - โœ”โœ”โœ” - It converts data to packets. Packets = reliable. Datagrams = unreliable. What are some routable protocols for the network layer of the OSI model? - โœ”โœ”โœ” - IP, IPX, Appletalk What are some routing protocols for the network layer of the OSI model? - โœ”โœ”โœ” - RIP, OSPF, BGP Where is the network layer of the OSI model defined? - โœ”โœ”โœ” - X. What is the transport layer of the OSI model responsible for? - โœ”โœ”โœ” - It is responsible for host-to-host integrity of transmission. It detects damaged or lost packets and generates re- transmit requests. It re-sequences packets. How do re-transmit requests work? - โœ”โœ”โœ” - By sequence # and ACK. What does the transport layer convert? - โœ”โœ”โœ” - It converts data into messages or segments. Where is the transport layer of the OSI model defined? - โœ”โœ”โœ” - X.

What is the session layer of the OSI model responsible for? - โœ”โœ”โœ” - It establishes, maintains, and terminates host-to-host interactive sessions. It is used to uniquely identify a service, application, or function on a host via ports. What is a socket? - โœ”โœ”โœ” - Port + Layer 3 (Network) Address Where is the session layer of the OSI model defined? - โœ”โœ”โœ” - X. What is the presentation layer of the OSI model responsible for? - โœ”โœ”โœ” - It is responsible for managing the way data is presented. It is NOT the GUI. What are some code conversions/translations? - โœ”โœ”โœ” - ASCII, EBCDIC, Unicode Where is the presentation layer of the OSI model defined? - โœ”โœ”โœ” - X. What is the application layer of the OSI model responsible for? - โœ”โœ”โœ” - It provides the interface between user applications and network's services (usually through network-capable APIs). This does NOT include actual user applications. What are some application protocols that exist at the application layer? - โœ”โœ”โœ” - HTTP, SIP, Telnet/SSH, SMTP, and Routing Protocols.

Where is the application layer of the OSI model defined? - โœ”โœ”โœ” - X. What is logical adjacency? - โœ”โœ”โœ” - The apparent capability of peer-layer protocols to communicate directly. It is made possible through encapsulation and decapsulation. What is the ideal correlation between layers for logical adjacency? - โœ”โœ”โœ” - 1 - 1 Which layer has "true" adjacency? - โœ”โœ”โœ” - Physical layer What is the equation for analog bandwidth? - โœ”โœ”โœ” - ๐‘“๐‘š๐‘Ž๐‘ฅ - ๐‘“๐‘š๐‘–๐‘› What transmission mode transmits one bit at a time? - โœ”โœ”โœ” - Serial What transmission mode transmits multiple bits at a time? - โœ”โœ”โœ” - Parallel What transmission mode transmits time-based (clock-based) with no gaps between data items?

  • โœ”โœ”โœ” - Synchronous What transmission mode transmits time-based (clock-based) but with a fixed gap between the transmission of data items? - โœ”โœ”โœ” - Isochronous What transmission mode transmits signal-based? - โœ”โœ”โœ” - Asynchronous Describe a serial connection. - โœ”โœ”โœ” - Able to send data over long distances.

Nearly all LAN/WAN technologies utilize serial communications. What are common implementations of a serial transmission mode? - โœ”โœ”โœ” - Telco/ISP Links, Ethernet, SATA Describe a parallel connection. - โœ”โœ”โœ” - Able to send data over short distances. Limited by electrical signal interference and degradation by EMI. What are common implementations of a parallel transmission mode? - โœ”โœ”โœ” - PCI, memory bus, many HDD interfaces, older printers, and some scanners. Describe a synchronous transmission mode. - โœ”โœ”โœ” - It is time-based. An internal or external clock provides the synchronization to handle this communication. Timing is maintained regardless of presence of data. Describe an asynchronous transmission mode. - โœ”โœ”โœ” - There is no timing source to control when data is sent. It utilizes start and stop bits to indicate the beginning and end of communication (it may have 1, 1.5, or 2 stop bits for simple RS systems). The synchronization must be re-established for every communication cycle. Examples of serial and synchronous - โœ”โœ”โœ” - T-Carrier system, SONET, frame relay, xDSL, ISDN, USB, Firewire Examples of serial and asynchronous - โœ”โœ”โœ” - Most "terminal" applications, keyboard, mice, ATM, Firewire

Examples of parallel and synchronous - โœ”โœ”โœ” - Internal buses, printers and scanners Examples of parallel and asynchronous - โœ”โœ”โœ” - Not many communications protocols and standards, reviewed for HPC Simplex - โœ”โœ”โœ” - Only unidirectional communication. One device can only transmit and one device can only receive. Example of simplex - โœ”โœ”โœ” - Keyboard can only input, monitor can only output. Half-duplex - โœ”โœ”โœ” - Can transmit and receive, but not at the same time. It is used for when there is no need to communicate in both directions at the same time. Example of half-duplex - โœ”โœ”โœ” - A walkie-talkie sends one message at a time in both directions. Full duplex - โœ”โœ”โœ” - Can transmit and receive simultaneously. It is used when communication in both directions is required all the time. The capacity of the channel must be divided in two directions, however. Example of full duplex - โœ”โœ”โœ” - Telephone network in which communication is occurring between two persons who can talk and listen at the same time. What does duplex mode auto-negotiation do? - โœ”โœ”โœ” - It sets Link Speed and Duplex mode. What is modulation? - โœ”โœ”โœ” - The process of converting digital bits into an analog signal that can be sent over an analog medium.

What is demodulation? - โœ”โœ”โœ” - The process of converting an analog signal into a digital bit stream. What does a modem do? - โœ”โœ”โœ” - A modulator/demodulator performs both modulation and demodulation. What is frequency modulation? - โœ”โœ”โœ” - It manipulates the frequency of the carrier wave in order to indicate data. In true FM, only the frequency changes. What is frequency modulation referred to as in the industry and publications? - โœ”โœ”โœ” - FSK What is phase modulation? - โœ”โœ”โœ” - It manipulates the phase of the carrier wave in order to indicate data. In true PM, only the phase changes. What is phase modulation referred to as in industry and publications? - โœ”โœ”โœ” - PSK What is shift keying? - โœ”โœ”โœ” - The term used when the signal is digital. What is frequency division multiplexing? - โœ”โœ”โœ” - Each source data stream is assigned to a specific sub-frequency of the channel. A guard band is required to minimize adjacent channel interference. What is time division multiplexing? - โœ”โœ”โœ” - Each source data stream is assigned to a timeslot in the channel. Data can only be sent during an assigned timeslot.

What is code division multiplexing? - โœ”โœ”โœ” - Each source data stream is assigned a unique orthogonal code for use in the entire channel. Any overlapping data streams are seen as noise in the system and ignored. What is a wireless LAN? - โœ”โœ”โœ” - An extension of the Ethernet LAN. What is the 802.11 wireless LAN? - โœ”โœ”โœ” - An IEEE standard that defines how radio frequency (RF) in the unlicensed industrial, scientific, and medical (ISM) frequency bands is used for the Physical layer and the MAC sub-layer of wireless links. What is Direct Sequence Spread Spectrum (DSSS)? - โœ”โœ”โœ” - It is the simpler of the modulation techniques and less expensive to implement. What are the DSSS standards? - โœ”โœ”โœ” - 802.11b and 802.11g What is Orthogonal Frequency Division Multiplexing (OFDM)? - โœ”โœ”โœ” - It has faster data rates compared to DSSS. What are the OFDM standards? - โœ”โœ”โœ” - 802.11a, 802.11g, 802.11n What is a wireless NIC? - โœ”โœ”โœ” - The device that makes a client station capable of sending and receiving RF signals. It is most often associated with mobile devices, like laptops. What does CSMA/CA stand for? - โœ”โœ”โœ” - Carrier Sense Multiple Access with Collision Avoidance.

How does CSMA/CA work? - โœ”โœ”โœ” - The devices on a WLAN must sense the medium for energy and wait until the medium is free before sending. What does a wireless router do? - โœ”โœ”โœ” - It performs the role of access point, Ethernet switch, and router. What does SSID stand for? - โœ”โœ”โœ” - Shared service set identifier. What does an SSID do? - โœ”โœ”โœ” - It is a unique identifier that client devices use to distinguish between multiple wireless networks in the same vicinity. What is an Ad Hoc wireless topology? - โœ”โœ”โœ” - It is a wireless network that can operate without access points. What is a Basic Service Sets (BSS) wireless topology? - โœ”โœ”โœ” - It has access points that provide an infrastructure. What is an Extended Service Sets (ESS) wireless topology? - โœ”โœ”โœ” - It is used when BSS provides insufficient RF coverage. What are the primary components of wireless association? - โœ”โœ”โœ” - Beacons, probes, authentication, and association. What is a beacon? - โœ”โœ”โœ” - Frames used by the WLAN network to advertise its presence. What is a probe? - โœ”โœ”โœ” - Frames used by WLAN clients to find their networks.

What is association? - โœ”โœ”โœ” - Establishing the data link between an access point and a WLAN client. What reliable communications does the data link layer provide? - โœ”โœ”โœ” - Error detection, error correction, error control What does the MAC sub-layer of the data link layer do? - โœ”โœ”โœ” - It is used for accessing shared media. What does the LLC sub-layer of the data link layer do? - โœ”โœ”โœ” - It is used for framing (addressing), multiplexing, flow control, and error control. What is circuit switching? - โœ”โœ”โœ” - It has a dedicated channel that is defined from source to destination prior to data forwarding. It has guaranteed resources for duration connection, and no other data is forwarded along the channel. Is circuit switching connection-oriented or connectionless? - โœ”โœ”โœ” - Connection-oriented. What is packet switching? - โœ”โœ”โœ” - It does not have a dedicated channel defined prior to data forwarding. It has no guarantee of resources, and other data is forwarded along portions of the same channel.

What are some sources of transmissions errors? - โœ”โœ”โœ” - Interference, distortion, and attenuation Name the two error correction approaches. - โœ”โœ”โœ” - - Forward Error Correction (FEC) This adds additional information.

  • Automatic Repeat reQuest (ARQ) The sender and receiver exchange the message to ensure all data arrives correctly. What does CRC stand for? - โœ”โœ”โœ” - Cyclic Redundancy Check How does discrete ARQ work? - โœ”โœ”โœ” - Stop and wait How does continuous ARQ work? - โœ”โœ”โœ” - It requires the retransmission of everything in the window from the error forward. It slides the window and sequence numbers. How does selective ARQ work? - โœ”โœ”โœ” - It requires the retransmission of only the error frame. It slides the window and sequence numbers. What is flow control? - โœ”โœ”โœ” - The process of managing the amount of data in transit to a specific destination. The two major approaches are stop and wait, and sliding window. What is the IEEE Ethernet standard? - โœ”โœ”โœ” - 802. What is the IEEE Token Ring standard? - โœ”โœ”โœ” - 802.

What is the IEEE Wireless LAN (Wi-Fi) standard? - โœ”โœ”โœ” - 802. What is the IEEE cable modem standard? - โœ”โœ”โœ” - 802. What is the IEEE Wireless PAN standard? - โœ”โœ”โœ” - 802. How does addressing the frame work? - โœ”โœ”โœ” - It allows data to be sent to an appropriate destination and responses are returned. What is a unicast? - โœ”โœ”โœ” - A unique address that identifies a specific host. What is a multicast? - โœ”โœ”โœ” - An address that is recognized by a specific group of hosts. What is a broadcast? - โœ”โœ”โœ” - An address that is used to send information to all hosts. What does CSMA/CD stand for? - โœ”โœ”โœ” - Carrier Sense Multiple Access with Collision Detection. What is Carrier Sense? - โœ”โœ”โœ” - A process required to test the medium for current activity. What is Multiple Access? - โœ”โœ”โœ” - It is based on the sensing methods, the access to the medium can be seized by any number of hosts.

What is Collision Detection? - โœ”โœ”โœ” - It has a sample carrier and received signals to identify dissimilarities. What is a domain? - โœ”โœ”โœ” - The scope at which a given communication can be received and processed by other hosts. What is a media access domain? - โœ”โœ”โœ” - The scope of multiple devices competing for the same access media. What is a MAC broadcast domain? - โœ”โœ”โœ” - The scope a MAC broadcast can reach. What can a repeater, layer 1 device break? - โœ”โœ”โœ” - It cannot break contention domains or broadcast domains. What can a hub, multiport repeater, layer 1 device break? - โœ”โœ”โœ” - It cannot break contention domains or broadcast domains. What can a bridge, layer 1-2 device break? - โœ”โœ”โœ” - It can break contention domains, but not broadcast domains. What can a switch, typically layer 1-2 device, multiport bridge device break? - โœ”โœ”โœ” - It can break contention domains, but not broadcast domains (unless a VLAN is used). What can a router, layer 1-3 device break? - โœ”โœ”โœ” - It can break contention domains and broadcast domains.

What is LAN segmentation? - โœ”โœ”โœ” - LANs are segmented into a number of smaller collision and broadcast domains using routers and switches. What do switches use MAC addresses for? - โœ”โœ”โœ” - To direct network traffic to the appropriate port. Where was Ethernet designed at? - โœ”โœ”โœ” - Xerox What year was the first Ethernet standard published? - โœ”โœ”โœ” - 1980 When did IEEE modify the Ethernet standard? - โœ”โœ”โœ” - 1985 What is the payload? - โœ”โœ”โœ” - It refers to the "data" portion of the frame (frame body) or service data unit (SDU). What is the MTU? - โœ”โœ”โœ” - The Maximum Transmission Unit. It usually refers to the size of the payload. What is the minimum size for an Ethernet frame? - โœ”โœ”โœ” - 64 bytes What is the maximum size for an Ethernet frame? - โœ”โœ”โœ” - 1518 bytes How many bytes is the preamble of an Ethernet frame? - โœ”โœ”โœ” - 7 bytes How many bytes is the size of the start of frame delimiter? - โœ”โœ”โœ” - 1 byte

What is the preamble and start of frame delimiter? - โœ”โœ”โœ” - It is used to synchronize the NIC with the media in preparation for receiving a frame. It is NOT considered the part of the frame length. It will not appear in any capture of the frame. How many bytes is the size of the destination MAC address? - โœ”โœ”โœ” - 6 bytes What is the destination MAC address? - โœ”โœ”โœ” - It identifies the node that is to receive the frame. A receiving device compares its MAC address to the contents of this field. If the addresses match, the frame is accepted. How many bytes is the size of the source MAC address? - โœ”โœ”โœ” - 6 bytes What is the source MAC address? - โœ”โœ”โœ” - It identifies the node that originated the frame. How many bytes is the size of the length/type? - โœ”โœ”โœ” - 2 bytes How many bytes in size is the data/pad? - โœ”โœ”โœ” - 46 - 1500 bytes What is the data/pad? - โœ”โœ”โœ” - It is the encapsulated data from Layer 3. It is most commonly an IPv4 packet. If the total frame length is less than 64 bytes, the field is padded to the right with enough null characters to meet the minimum frame length. How many byte is the size of the frame check sequence? - โœ”โœ”โœ” - 4 bytes

What is the frame check sequence? - โœ”โœ”โœ” - It is used to detect errors in a frame that may have occurred during transmission along the media. At what clock rate does Ethernet operate? - โœ”โœ”โœ” - 20 MHz What is Gigabit Ethernet? - โœ”โœ”โœ” - It is intended to further extend the capabilities of LANs through faster data rates while still maintaining backwards compatibility. What are some Ethernet operations? - โœ”โœ”โœ” - - Data rates vs signaling rates

  • Auto-Negotiation
  • Auto-MDIX
  • Power over Ethernet (PoE) What does VLAN stand for? - โœ”โœ”โœ” - Virtual Local Area Network What do VLANs do? - โœ”โœ”โœ” - They allow for multiple VLANs on a switch, and allow the same VLAN to cross multiple switches through trunking. What are the benefits of VLANs? - โœ”โœ”โœ” - Traffic isolation, cost reduction, higher performance, broadcast storm mitigation, and improved IT staff efficiency What are the types of VLANs? - โœ”โœ”โœ” - - Data VLAN
  • Default VLAN
  • Native VLAN
  • Management VLAN
  • Voice VLAN How are VLAN memberships assigned? - โœ”โœ”โœ” - - by port
  • by MAC addresses
  • by network protocols
  • by IP subnets (L3)
  • by higher layers, such as network services (L4-L7) What is the normal range of VLAN IDs? - โœ”โœ”โœ” - 1 - 1005. 1, 1002-1005 are automatically created. What is the extended range of VLAN IDs? - โœ”โœ”โœ” - 1006 - 4094. What is a trunk? - โœ”โœ”โœ” - A physical and logical connection between two switches across which network traffic travels. What is the responsibility of a trunk link? - โœ”โœ”โœ” - To act as a conduit for VLANs. What is Inter-Switch Link, Cisco Proprietary (ISL)? - โœ”โœ”โœ” - All received packets are expected to be encapsulated with an ISL header. All transmitted packets are sent with an ISL header. Untagged frames received from an ISL trunk port are dropped.