Podcast
Questions and Answers
What is the primary function of the Data Link Layer?
What is the primary function of the Data Link Layer?
Ethernet is a protocol primarily used for WAN connections.
Ethernet is a protocol primarily used for WAN connections.
False
What are the two sublayers of the Data Link Layer?
What are the two sublayers of the Data Link Layer?
MAC and LLC
The ________ translates private IP addresses into public IP addresses for internet access.
The ________ translates private IP addresses into public IP addresses for internet access.
Signup and view all the answers
Match the cable types with their common uses:
Match the cable types with their common uses:
Signup and view all the answers
Which of the following accurately describes Full Duplex mode?
Which of the following accurately describes Full Duplex mode?
Signup and view all the answers
IPv6 addresses are 32 bits long.
IPv6 addresses are 32 bits long.
Signup and view all the answers
What does a subnet mask do?
What does a subnet mask do?
Signup and view all the answers
Which of the following networks spans a small to medium area, typically covering a maximum range of about 100 meters?
Which of the following networks spans a small to medium area, typically covering a maximum range of about 100 meters?
Signup and view all the answers
The OSI Model consists of 4 layers.
The OSI Model consists of 4 layers.
Signup and view all the answers
What is the primary role of IANA?
What is the primary role of IANA?
Signup and view all the answers
In a _____ transmission, communication occurs both ways but only one at a time.
In a _____ transmission, communication occurs both ways but only one at a time.
Signup and view all the answers
Match the following transmission media with their characteristics:
Match the following transmission media with their characteristics:
Signup and view all the answers
Which of the following describes a Wide Area Network (WAN)?
Which of the following describes a Wide Area Network (WAN)?
Signup and view all the answers
Full duplex transmission allows two-way communication simultaneously.
Full duplex transmission allows two-way communication simultaneously.
Signup and view all the answers
What are the seven layers of the OSI model?
What are the seven layers of the OSI model?
Signup and view all the answers
What is a key feature of TCP?
What is a key feature of TCP?
Signup and view all the answers
UDP guarantees that all data is received correctly.
UDP guarantees that all data is received correctly.
Signup and view all the answers
What is the purpose of DNS?
What is the purpose of DNS?
Signup and view all the answers
HTTP uses port number __________.
HTTP uses port number __________.
Signup and view all the answers
Match the following protocols with their functions:
Match the following protocols with their functions:
Signup and view all the answers
Which type of architecture allows each node to act as both client and server?
Which type of architecture allows each node to act as both client and server?
Signup and view all the answers
Well-known ports range from 0 to 1023.
Well-known ports range from 0 to 1023.
Signup and view all the answers
What are the main steps in troubleshooting?
What are the main steps in troubleshooting?
Signup and view all the answers
Study Notes
Network Types
- Personal Area Network (PAN): Covers a small range (3-5 meters) and connects devices like phones, smartwatches, and headphones. Bluetooth is a common example.
- Local Area Network (LAN): Covers small to medium areas (up to 100 meters). Primarily uses Ethernet for wired and wireless connections, commonly found in homes and small offices.
- Campus Area Network (CAN): Larger networks connecting multiple buildings across a campus, commonly seen in schools and universities.
- Wide Area Network (WAN): Spans across large distances, connecting cities, countries, and continents.
OSI vs. TCP/IP Model
-
OSI Model: Consists of 7 layers, each with a specific function:
- Application (7): Manages network requests from software applications.
- Physical (1): Deals with raw bits and physical hardware.
-
TCP/IP Model: Consists of 4 layers, focusing on practical networking needs:
- Network Access: Handles hardware and media access.
- Internet: Routing and addressing (IP).
- Transport: Data transmission (TCP, UDP).
- Application: Network-facing applications.
Standards and Organizations
- IANA: Assigns IP addresses.
- IEEE: Sets standards for physical equipment, including MAC addresses.
- ANSI, ITU, ISO: Manage international and US standards for technology, ensuring compatibility.
Physical Layer (Layer 1)
- Sends and receives raw bits (0s and 1s) over a medium. Deals with hardware like cables and voltage.
-
Transmission Types:
- Simplex: One-way transmission (e.g., radio).
- Half-Duplex: Two-way communication, one at a time (e.g., walkie-talkies).
- Full Duplex: Simultaneous two-way communication (e.g., phone call).
-
Transmission Media:
- Copper (Twisted Pair): Common for Ethernet, inexpensive but susceptible to interference. Available in unshielded (UTP) and shielded (STP) forms.
-
Fiber Optic: Fast and long-range.
- Single-Mode: Long distances, high speeds.
- Multi-Mode: Shorter distances.
- Wireless: Uses radio frequencies for communication (e.g., Wi-Fi, Bluetooth).
-
Connectors:
- RJ-45: Main connector for Ethernet cables.
- RJ-11: Smaller, used for landlines.
Data Link Layer (Layer 2)
- Manages data transfer within the same network.
-
Sublayers:
- MAC (Media Access Control): Handles hardware-level network access.
- LLC (Logical Link Control): Ensures correct data formatting for Layer 3.
-
Switching and Frame Structure:
- Switches: Intelligent devices using MAC addresses to directly send data to the intended device.
- Hubs: "Dumb" devices that send data to all connected devices.
- Frame Structure: Each frame has a header with MAC addresses and a trailer with error-check information.
-
Key Protocols:
- Ethernet: Standard for most local networks, using MAC addresses.
- HDLC (High-Level Data Link Control): Commonly used on leased lines for WAN connections.
- MPLS (Multi-Protocol Label Switching): Speeds up data flow by using labels instead of IP addresses.
- Spanning Tree Protocol (STP): Prevents network loops by blocking unnecessary links.
Network Layer (Layer 3)
- Routes data between different networks based on IP addresses.
-
IPv4 and IPv6:
- IPv4: 32-bit addresses (e.g., 192.168.1.1). Has limited available addresses.
- IPv6: 128-bit addresses (e.g., 2001:0db8::85a3). Offers significantly more address space.
-
Subnetting and Addressing:
- Subnet Mask: Divides an IP address into network and host sections (e.g., 255.255.255.0).
- CIDR Notation: A more efficient way to represent subnets (e.g., /24 for 255.255.255.0).
- NAT (Network Address Translation): Translates private IPs (e.g., 192.168.x.x) to a public IP for Internet access.
Transport Layer (Layer 4)
- Ensures reliable or fast data transmission from source to destination.
-
Key Protocols:
- TCP (Transmission Control Protocol): Reliable, establishes connections using a three-way handshake, and resends lost data. Suitable for applications that require high reliability (e.g., file transfers).
- UDP (User Datagram Protocol): Fast but doesn't check for lost data. Ideal for applications where occasional data loss is acceptable (e.g., streaming).
-
Ports:
- Ports: Numbers identifying specific applications. (e.g., HTTP is port 80, HTTPS is port 443).
- Well-Known Ports (0-1023): Used by major protocols.
- Registered Ports (1024-49151): Managed by IANA for specific services.
- Dynamic/Private Ports (49152-65535): Used temporarily by devices.
Application Layer (Layer 7)
-
Common Protocols:
- HTTP/HTTPS: For web traffic; HTTPS is the secure version.
- DNS: Translates domain names (e.g., google.com) to IP addresses.
- DHCP: Automatically assigns IP addresses to devices on a network.
- FTP: Transfers files; secure versions (FTPS/SFTP) add encryption.
-
Architectures:
- Client-Server: Centralized server provides services; clients connect to it (e.g., Google Drive).
- Peer-to-Peer: Decentralized; each node can act as both client and server (e.g., torrenting).
Troubleshooting Methodology
-
Troubleshooting steps:
- Identify the Problem: Gather information, replicate the issue if possible.
- Establish a Theory: Form a hypothesis about the cause.
- Test the Theory: Verify the hypothesis; if not, try another.
- Implement Solution: If the theory is correct, apply the fix.
- Verify Full System Functionality: Ensure everything is working as expected.
- Document Findings: Record the issue and its resolution for future reference.
-
Useful Tools:
- Packet Sniffer (Wireshark): Captures and analyzes network data.
- Ping & Traceroute: Test connection and paths to other devices.
- Protocol Analyzer: Checks protocol activity and functionality.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
This quiz covers the different types of networks including Personal Area Network (PAN), Local Area Network (LAN), Campus Area Network (CAN), and Wide Area Network (WAN). It also explores the OSI and TCP/IP models, detailing their respective layers and functions. Test your knowledge on these fundamental concepts of networking!