acknowledgments, Sequencing, and Flow Control Are Characteristics of Which OSI Layer?
acknowledgments, Sequencing, and Flow Control Are Characteristics of Which OSI Layer?
https://quizlet.com/13067655/networking-flash-cards/
http://www.ccna5.net/it-essentials-v4-1-chapter-6-exam/881
http://www.flashcardmachine.com/01introduction-to-networking.html
http://www.indiabix.com/networking/internetworking/002004
http://ecomputernotes.com/computernetworkingnotes/communication-networks/what-are-the-
different-transmission-modes
http://quegrande.org/apuntes/EI/OPT/IT/examenes/07-08/test_chapter_08.pdf
http://www.indiabix.com/computer-science/networking/001004
A) Layer 2 B) Layer 3
C) Layer 4 D) Lawer 7
Answer: C) Layer 4
Explanation:
A reliable Transport layer connection uses acknowledgments to make sure all data is transmitted
and received reliably. A reliable connection is defined by a virtual circuit that uses
acknowledgments, sequencing, and flow control, which are characteristics of the transport layer.
B
2 only
.
C
2 and 3 only
.
D
3 only
.
Answer: Option A
Explanation:
An Ethernet frame has source and destination MAC addresses, an Ether-Type field to identify the
Network layer protocol, the data, and the FCS field that holds the answer to the CRC.
//Which layer of the OSI model offers three different modes of communication : Simplex, half
duplex, and full duplex?
Session layer
//Connectionless means that a session is not established before exchanging data. Unreliable means
that delivery is not guaranteed
//What is TCP?
a set of rules that governs the delivery of data over the Internet or other network that uses
the Internet Protocol, and sets up a connection between the sending and receiving
computers.
2.what is UDP?
The NAK, REJ, or ARQ signal is typically sent by the recipient of a message (destination) back to the
sender (source) after the receipt of an unrecognizable block of data of specific size. When the source
receives a NAK or REJ signal from the destination, the source either repeats the block of data until
the destination station recognizes the protocol and responds with an ACK (acknowledgment or
acknowledged) signal, or else stops transmission entirely. When the source receives an ARQ signal
from the destination, the source retransmits the block of data.
6.what port number does (i)http (ii)FTP(iii) SMTP use?
i)80
ii)21
iii)25
i)Obscure client IP
iii)Block sites
iV)Log activity
In a network transmission unit, a header precedes the data or control signals and describes
something about the file or transmission unit, such as its length and whether there are other files or
transmission units logically or physically associated with this one
A cyclic redundancy check (CRC) is an error-detecting code commonly used in digital networks and
storage devices to detect accidental changes to raw data. Blocks of data entering these systems get a
short check value attached, based on the remainder of a polynomial division of their contents. On
retrieval, the calculation is repeated and, in the event the check values do not match, corrective
action can be taken against data corruption.
The main advantage of IPv6 over IPv4 is its larger address space. The length of an IPv6
address is 128 bits, compared with 32 bits in IPv4. The address space therefore has 2128 or
approximately3.41038addresses.
Class E 240.0.0.0 to 254.255.255.254 Reserved for future use, or Research and Devel
https://www.hmailserver.com/documentation/v4.2/?page=whatis_pop3imapsmtp
http://searchnetworking.techtarget.com/definition/ICMP
http://castle.eiu.edu/~a_illia/cis3700/notes/CIS3700Class5-2.pdf
http://www.idc-
online.com/technical_references/pdfs/data_communications/Remote_Login_Protocols.pdf
Telnet. Telnet is a popular protocol from a kinder, gentler age when security was less
critical. It should only be used if you cannot use SSH because data transmitted in a Telnet
session is not encrypted.
Rlogin. Although turned off by default, your Freedom server also provides support for the
use of the rlogin (remote login) protocol. Rlogin allows you to log into a Freedom account
from a remote machine, similar to the way it would be done via Telnet, but with the added
advantage of allowing specific users on specific machines to login without authenticating
with a password. This method should not be considered secure however, because the
communication is not encrypted and because the identity of remote users and servers
can easily be falsified or "spoofed."
Rshell. Although turned off by default, your Freedom server also provides support for the
use of the rshell (remote shell) protocol. Rshell allows you to issue command from a
remote computer that you are logged into. Like rlogin, it can be configured to allow
specific users on specific machines to execute commands without authenticating with a
password. Also like rlogin, this method should not be considered secure because the
communication is not encrypted and because the identity of remote users and servers
can easily be falsified or ""spoofed.'
ICMP means Internet Control Message Protocol and is always coupled with the IPprotocol
(There's 2 ICMP variants one for IPv4 and one for IPv6.) echo request and echo response
are the two operation codes of ICMP used to implement ping
Architecture type
-Centralized
-Decentralized
- Distributed
P2p/Client-server
Topology
-Stat
Bus
Ring
LAN STANDARD
Standards
-TCP/IP,OSI
Media
-TP
-Coax
-Fibre
Subnet calculate
-Hubs,swtches,rotuers
FUTURETOPICS
Topology
Lan standards
Cabling
HEader
Extremely large data sets that may be analyzed computationally to reveal patterns, trends, and
associations, especially relating to human behavior and interactions.
Data analytics refers to qualitative and quantitative techniques and processes used to enhance
productivity and business gain. Data is extracted and categorized to identify and analyze behavioral
data and patterns, and techniques vary according to organizational requirements.
Predictive modeling is a process that uses data mining and probability to forecast outcomes. For
instance, banks use predictive modelling to calculate the probability of a clients default chances
before approving a loan.
Where is it implemented?
-Retail
-Health Insurance
-Manufacturing
http://publish.uwo.ca/~pdeelen/netnotes6.html
https://www.safaribooksonline.com/library/view/ccna-cisco-certified/9781118088050/c01-anchor-
10.xhtml
https://quizlet.com/5850067/chapter-2-review-questions-flash-cards/
http://www.flashcardmachine.com/ch4-introductiontotcpipprotocols.html
Ethernet networks can be cabled in a number of topologies, depending on what works best in
each environment. As more nodes are added, the efficiency of Ethernet decreases. Select the
best answer as to why Ethernet becomes less efficient as size increases.
A
Network collisions occur
.
http://jodies.de/ipcalc?host=192.168.0.0&mask1=16&mask2=255.255.255.0
https://quizlet.com/31324521/comptia-network-flash-cards/
___________________ is a very high-bandwidth, high performance system that uses a uniform 53-
byte cell. (ATM)