IT - Networking Part2

The flashcards below were created by user Camskie on FreezingBlue Flashcards.

  1. Network Layer - This OSI Layer provides an addressing scheme called ______.
    IP Addressing
  2. The name IP Addressing is based on ____.
    IP Protocol
  3. A set of rules or procedure of carrying out a particular task.
  4. The IP Address is a ____ Bit number.
  5. For any octet, the decimal value can be from __ to ___.
    • 0
    • 255
  6. The octet value can not be more than ___.
  7. The IP Address is divided into ___ classes.
  8. Class A is from __ - ___.
    • 1
    • 127
  9. Class B is from __ - ___.
    • 128
    • 191
  10. Class C is from __ - ___.
    • 192
    • 223
  11. Class D is from __ - ___.
    • 224
    • 239
  12. Class E is from __ - ___.
    • 240
    • onwards
  13. The class of an IP Address is based on ____.
    Based on its 1st octet
  14. Use of Class A, B and C
    Used for Computer Addressing in Networking
  15. Use of Class D
    Used for Multicast Addressing
  16. Use of Class E
    Used for future development.
  17. An IP Address is used to identify what 2 things.
    • The network
    • The computer in that network
  18. Address of the computer = ______ address
  19. To connect to different IP Networks we require a device called ______.
  20. A router's operating system is stored in a ______.
  21. You have to _____ a router before you start using the router.
  22. A router has a small amount of _____.
  23. These use IP Address in their working.
    Layer 3 switches
  24. A device that keeps frames on the local segment local and filters frames that belong to other LAN segments.
  25. Bridge functions at the Data Link Layer of the _____.
    OSI Model
  26. Bridges use _______ to filter the frames.
    MAC Addressing
  27. Layer 4 of OSI Layers
    Transport Layer
  28. Works between the OSI lower layers & OSI upper layers.
    Transport layer
  29. Transport layer is responsible for _____ of transmission
    reliable delivery
  30. To solve this problem, the transport layer uses an identification number called _______.
    Port or Connection Identifier
  31. Port Number of Web Service
  32. Port Number of FTP Service
    20, 21
  33. Port Number of SMTP Service
  34. Port Number of Telnet Service
  35. TCP?
    Transmission Control Protocol
  36. UDP?
    User Datagram Protocol
  37. TCP:
    Before it starts sending the data, the sender computers TCP Protocol contacts the destination computers TCP Protocol in order to establish a connection.

    This connection is called ______.

    This type of communication is called  _____.
    • Virtual Circuit
    • connection-oriented
  38. TCP Protocol also supports ____.
    Flow Control
  39. TCP:
    This type of communication takes care that the data received by the destination is complete & in proper condition.

    This is called _______.

    Thus, this TCP protocol is called a ____.
    • reliable data transfer
    • reliable protocol
  40. The process of controlling the rate at which a computer sends data.
    Flow Control
  41. A method by which the sending and the receiver computer decide how much data will be send during transmission, at any time.
    Flow Control
  42. This makes the TCP Protocol transmissions ____ but ____.
    • very slow
    • reliable
  43. Layer 5 of OSI Layers
    Session Layer
  44. Defines how to start, control, and end conversations.
    Session Layer
  45. Layer 6 of OSI Layers
    Presentation Layer
  46. This layers' main purpose is defining data formats, such as ASCII text, EBCDIC text, binary, BCD, and JPEG.
    Presentation Layer
  47. Also defined by OSI as a presentation by layer service.
  48. A method by which the sender computer & receiving computer convert the actual data format in a predefined format, so that the data can be understood by only the 2 computers.
  49. Before the computers start sending the data, they decide in which format the data will be coded. This format is called as ____________.
    encryption algorithm
  50. The computers use a _____ to encrypt or to lock the data.
    Digital Key
  51. In early days of the encryption a ____ was used.
    single key method
  52. In this method, both the sender computer & the receiver computer should use the same key to lock data & to open it.
    single key method
  53. The method that is used mostly today is called ______.
    Public & Private Key Method
  54. In this method, every computer generates what 2 keys.
    • 1. Private Key
    • 2. Public Key
  55. Can be used to lock (i.e. encrypt) the data, however, once it is locked it cannot be opened by the same Public key.
    Public Key
  56. This data, locked by a Public Key, can be unlocked only by the _____.
    Private Key
  57. The last OSI Layer.
    Application Layer
  58. Refers to communications services to applications.
    Application Layer
  59. Examples of Network Applications.
    • Microsoft Exchange Server
    • Web Server
    • Internet Explorer
    • Outlook Express
    • Microsoft Outlook
    • Telnet
Card Set:
IT - Networking Part2
2015-08-09 17:04:49
IT Networking

Networking part2
Show Answers: