Thursday 12 April 2018

Windows 7 is a network operating system (NOS).

True / False Questions
 
36. (p. 19) Windows 7 is a network operating system (NOS).
TRUE

37. (p. 15) Two systems on the same network may share the same MAC address.
FALSE

38. (p. 16) In a wired network, a charge on a wire represents a zero while no charge represents a one.
FALSE

39. (p. 17) A NIC is not concerned about the contents of the data part of a frame.
TRUE

40. (p. 17) The network administrator assigns the divisor or the key used in a cyclic redundancy check.
FALSE

41. (p. 17) When a frame arrives at the hub, the hub makes an exact copy of the frame and sends it to every other system on the network.
TRUE

42. (p. 18) When the NIC sends a frame that contains the broadcast address, every NIC on the network processes that frame.
TRUE

43. (p. 24-25) A router allows you to connect networks with different types of cabling or frames.
TRUE

44. (p. 24) Routers use logical addresses as their unique identifiers.
TRUE

45. (p. 23) A network protocol is special software that allows a network to use logical addressing in order to move data from one subnet to another.
TRUE

46. (p. 32) The TCP/IP model consists of six layers.
FALSE

47. (p. 34) Layer 2 of the TCP/IP model maps to the top three layers of the OSI model.
FALSE

48. (p. 33) The Link layer of the TCP/IP model handles physical hardware connections, such as cabling and NICs.
TRUE

49. (p. 33) The Network Interface layer of the TCP/IP model maps to the Network layer of the OSI model.
FALSE

50. (p. 34) The Transport layer of the TCP/IP model uses both connection-oriented and connectionless protocols.
TRUE



Fill in the Blank Questions
 
51. (p. 8) The __________________ is a long-used method to conceptualize the many parts of a network.
Open Systems Interconnection (OSI) seven-layer model

52. (p. 15) The unique identifier burned into a ROM chip in the NIC is known as the ___________________.
Media Access Control (MAC) address

53. (p. 15) A MAC address is usually shown in ____________________ notation.
hexadecimal; hex

54. (p. 15) If you have a Windows system, what program can you run to see the MAC address for your computer?
ipconfig ipconfig/all

55. (p. 16) A(n) ___________________ is a tool that enables you to see electrical pulses.
Oscilloscope

56. (p. 16) A container created at the Data Link layer for carrying discrete chunks of data across a network is called a(n) ____________________.
frame

57. (p. 23) Named after two protocols, _________________ is really several subprotocols, designed to work together.
TCP/IP

58. (p. 24) The decimal value for each 8-bit portion of an IP address can range from _______________.
0 to 255

59. (p. 24) Each system on a TCP/IP network has two unique identifiers, the _____________________.
MAC or physical address, and the IP or logical address

60. (p. 26) When handed to the NIC, each IP packet is enclosed in a(n) ________________.
frame

61. (p. 29) If you want to see how many sessions are running on a TCP/IP network, you should use the ______________ program from the command prompt.
netstat netstat -a

62. (p. 30) _____________ is Adobe's specialized document file format that any system, regardless of the operating system, can read, write, and edit.
Portable Document Format (PDF)

63. (p. 32) On a working network, the software that users employ when accessing the network resides at Layer ______________ in the OSI seven-layer model.
7

64. (p. 31) If you want to view Web pages, you need a(n) __________________.
Web browser

65. (p. 11) What organization developed the OSI model of networking?
The International Organization for Standardization (ISO)

66. (p. 27) The ___________________ layer of the OSI model uses sequencing numbers to assemble and disassemble packets belonging to the same message into the correct order.
Transport

67. (p. 17) The CRC is added to a frame by the __________________.
network interface card (NIC)

68. (p. 14) With a network that uses copper cabling, the _____________ layer defines the rules for turning ones and zeroes into electrical signals.
Physical

69. (p. 14) Although one may argue that the NIC operates at more than one layer of the OSI model, the generally accepted answer is that this device belongs at the _______________ layer.
Data Link

70. (p. 21) A sublayer of the OSI seven-layer model, the _________________ describes the function of a NIC that talks to the network operating system, places data into frames, and creates the CRC on each frame.
Logical Link Control (LLC)

71. (p. 21) At the receiving computer, the ______________ removes the MAC addresses and CRC from incoming frames and provides error checking.
Data Link layer

72. (p. 29) The Session layer initiates sessions, accepts incoming sessions, and _______________ existing sessions.
opens and closes

73. (p. 31) Because of software at the ________________ layer, a user can choose to use one of several programs to access a file over the network.
Application

74. (p. 18) By using the _________________ MAC address, a NIC can send packets that every other computer on the network will process.
broadcast

75. (p. 13) __________________ cabling generally contains eight wires (four pairs), used to transmit data.
Unshielded twisted pair (UTP)

76. (p. 27) The _________________ is the last (topmost) layer that deals directly with hardware.
Network layer Layer 3

77. (p. 12) Layer 6 of the OSI model is called the __________________ layer.
Presentation

78. (p. 17) Most FCSs are _________ bytes long.
four (4)

79. (p. 26) When a router connects a cable network to a home network, the two networks use different types of __________________.
frames

80. (p. 26) An inner frame, or what the text calls "the frame within a frame," is usually called a(n) _______________.
packet

81. (p. 33) The Link layer of the TCP/IP model is also sometimes called the _______________ layer.
Network Interface

82. (p. 35) The _______________ layer of the TCP/IP model uses segments and datagrams as its Protocol Data Units.
Transport

83. (p. 15) The newer term for the MAC addressing scheme, as defined by the IEEE, is __________.
EUI-48

84. (p. 32) 84.The TCP/IP model is a(n) __________ layer model.
four (4)

85. (p. 36) Layer 6 of the OSI model is included in the _____________ layer of the TCP/IP model.
Application

Essay Questions
 
86. (p. 17) Name the four parts that make up a frame. 
The four parts that make up a frame are (1) the MAC address of the destination NIC, (2) the MAC address of the sending NIC, (3) the data, and (4) the cyclic redundancy check (CRC).

87. (p. 17) Explain how a CRC is used to figure out whether the data received is accurate or not. 
The sending NIC divides the data by a divisor or key, and records the remainder. The receiving NIC performs the same operation, using the same key. If the remainders are the same, the data is assumed to be correct. If the remainder is different, the data is corrupted.

88. (p. 18) What happens if the sending NIC does not know the MAC address of the NIC that is to receive data? 
If the sending NIC does not know the MAC address of the receiving NIC, it sends a broadcast frame with the address FF-FF-FF-FF-FF-FF that every NIC on the network will process. The broadcast frame asks for a system's MAC address.

89. (p. 11) Define the term protocol relative to networking. 
A protocol is a set of rules, regulations, standards, and procedures for how hardware and software developers can make devices and applications that function properly.

90. (p. 20) What happens to a frame that arrives at a NIC whose MAC address does not match the destination MAC address? 
When this occurs, the NIC will not process the frame and will erase it, because its destination MAC address does not match that of the receiving NIC.

91. (p. 20) What happens to a frame when it arrives at a NIC whose MAC address matches the destination address? 
If the frame has a destination MAC address that matches that of a receiving NIC, the NIC will process the frame, first using the CRC to verify that the data is correct. If so, it strips off the framing information and sends the data to the network operating system for processing.

92. (p. 11) What are the two basic parts of PC network hardware? 
The two basic parts of PC network hardware are the network cabling and the hubs.

93. (p. 27) Explain the function of the Transport layer. 
The function of the Transport layer is to break up data, which is usually much larger than a single packet, into smaller chunks before placing the data into packets. The Transport layer also assigns sequence numbers to these packets.

94. (p. 24) In most common networks, what identifier does the router use to send a packet to the correct destination? 
In most common networks a router uses the IP address to send a packet to the correct destination.

95. (p. 27) How does the destination system know how to put packets in the correct order? 
Software at the Transport layer on the sending system gives each packet a sequence number. When the packets arrive at the destination, the Transport layer software of the receiving system uses the sequencing numbers to put them back together. On the receiving end, Transport layer software removes the chunks of data and assembles the small chunks into its original data sequence for use by upper-layer software. As such, it is the assembler/disassembler.

96. (p. 30) Describe how standardized data formats have made the Presentation layer the least important of the layers of OSI model. 
The job of the Presentation layer is to convert data into formats that are readable by a system. The advent of standardized data formats, such as Adobe's Portable Document Format (PDF), reduced the need for software working at the Presentation layer.

97. (p. 31-32) In terms of the OSI model, explain why a user who knows nothing about all the parts of a network is still able to use a network. Give at least one example of how such a user may use a network. 
A user does not need to know anything about a network to use it. All the user needs to know is how to use an application that ties into software at the top of the OSI layers—the Application layer (Layer 7). For instance, a user only needs to know how to use a Web browser such as Internet Explorer or Mozilla Firefox in order to browse and view Web pages. Similarly, a user can use a program such as Microsoft Outlook to send and retrieve e-mail messages.

98. (p. 31) Name two popular Web browsers. 
Two popular Web browsers are Microsoft Internet Explorer and Mozilla Firefox.

99. (p. 12) Name the seven layers of the OSI model of networking in order from 7 to 1. 
7 - Application
6 - Presentation
5 - Session
4 - Transport
3 - Network
2 - Data Link
1 - Physical

100. (p. 15) Explain the two parts that make up a unique MAC address. 
A MAC address consists of 12 hexadecimal digits. The first 6 hex digits represent the manufacturer, while the last 6 hex digits are the unique serial number for the NIC, assigned by the manufacturer.

101. (p. 17) Explain what a hub does when it receives a frame from a NIC. 
When a hub receives a frame from a NIC, it makes an exact copy of the frame, and sends the copy to every other system on the network.

102. (p. 12) If you were creating a device that would work at Layer 3 of the OSI model, with which other layers must your device directly interact? 
A device that works at Layer 3 must interact with Layers 2 and 4. The OSI model requires that a device or protocol only work with the layer immediately above and the layer immediately below it.

103. (p. 19-21) What network device (found on every computer connected to a network) creates outgoing frames and destroys incoming frames that do not have a destination address that matches the address of the device? 
A NIC creates outgoing frames and destroys incoming frames that do have a destination address that matches the address of the NIC.

104. (p. 24) What network device do you need to use if you want to connect networks with different types of cables or frame types? 
The network device used to connect networks with different types of cables or frame types is a router.

105. (p. 24) Which part of the TCP/IP protocol works with the unique logical addresses assigned to every system connected to the network? 
The Internet Protocol (IP) is the TCP/IP protocol that works with unique logical addresses assigned to every system connected to the network.

106. (p. 17) What kind of software provides the interconnection between the NICs hardware and the networking software? 
The driver software for the NIC is the interconnection between the hardware and the software.

107. (p. 11) The creation of the OSI model eliminated what problematic situation existing in early networks? 
Early networking devices were proprietary, making it difficult for other companies to create hardware or software that would work with them. The OSI model allowed manufacturers to create hardware and software that could work together, regardless of what company made it.

108. (p. 21) Why are NICs not concerned with the data within the frames they process? 
NICs only concern themselves with moving data from one place to another on the network, regardless of what kind of data it is.

109. (p. 21) Describe the functioning of the Logical Link Control (LLC) sublayer. 
The Logical Link Control (LLC) sublayer of the Data Link layer interacts with the operating system, receiving data from that upper layer and placing the data into frames. This layer also deals with incoming frames, processing those addressed to the NIC, and erasing frames addressed to other machines on the network.

110. (p. 21) Explain the functions of the MAC sublayer of the Data Link layer. 
The Media Access Control (MAC) sublayer of the Data Link layer remembers the NIC's own MAC address and handles the attachment of MAC addresses to frames created by the Logical Link Control sublayer. The MAC also ensures that the completed frames are sent out to the network.

111. (p. 22 and 24) Compare the function of a router to that of a hub. 
A hub works with frames, and a router works with packets. A packet is encapsulated within a frame. A hub forwards frames based on MAC addresses, while a router uses the IP address of a packet to forward packets.

112. (p. 15) Describe the basic function of a NIC. 
A NIC provides the interface between a PC and a network.

113. (p. 15) Explain what would happen to a computer's MAC address if you replaced a bad NIC with a new one. 
Since every NIC in the world has a unique address, replacing a bad NIC with a new one would mean that computer would then be seen on the network with the MAC address of the new NIC.

114. (p. 18) If a NIC uses the address FF-FF-FF-FF-FF-FF, what is this address and what is the NIC requesting? 
This is the broadcast address that goes to all stations on the network when the NIC does not know a system's MAC address. The NIC uses a broadcast frame to request a system's MAC address.

115. (p. 24) How many sets of 8-bit numbers make up an IP address? What separates the sets of numbers? Give an example of an IP address. 
An IP address consists of 32 bits, which are generally represented by four 8-bit numbers, separated by periods. Example: 192.168.132.121.

116. (p. 32-33) Name the four layers of the TCP/IP model, and their corresponding layers in the OSI model. 
The four layers are the Link (Network Interface) layer, which corresponds to the Physical and Data Link layers of OSI; the Internet layer, corresponding to the Network layer; the Transport layer, which also maps to the OSI Transport layer; and finally, the Application layer, which maps to the Session, Presentation, and Application layers of the OSI model.

117. (p. 34) Describe the Transport layer of the TCP/IP model. 
The Transport layer, which maps to the same layer in the OSI model, is concerned with traffic flow and error connection. It uses two primary protocols: TCP, which is a connection-oriented protocol, and UDP, a connectionless protocol. It uses two Protocol Data Units: segments (TCP), and datagrams (UDP).

118. (p. 32-33) Describe the relationship between the four-layer TCP/IP model and the seven-layer OSI model. 
The four-layer TCP/IP model maps to and corresponds with the layers of the OSI model, using the same protocols and services, and performing the same functions.

119. (p. 33-34) Which layers of the TCP/IP model are more concerned with network software than network hardware? 
Layers 2 through 4 deal primarily with network software and their related functions (IP addressing, ports, protocols, services, and applications). Layer 1, the Link layer, is primarily concerned with network hardware, such as cabling, hubs, bridges, and network cards.

120. (p. 36) How are the top three layers of the OSI model mapped in the TCP/IP model? 

Layers 5, 6, and 7 (Session, Presentation, and Application) are mapped to only one layer of the TCP/IP model, Layer 4 (the Application layer). This layer performs all functions associated with session establishment and teardown between applications, presentation of data in different formats, and application layer protocols and data.

No comments:

Post a Comment