Podcast
Questions and Answers
It is the user interface that internet users interact with to send or receive data through email, online games, peer to peer file transfer, and other applications.
It is the user interface that internet users interact with to send or receive data through email, online games, peer to peer file transfer, and other applications.
It establishes a “mechanism for opening, closing and managing a session between end-user application processes and responses”.
It establishes a “mechanism for opening, closing and managing a session between end-user application processes and responses”.
One device transmits at a time until all the information has been completely sent.
One device transmits at a time until all the information has been completely sent.
It seeks for the best-known path to route information to reach its destination similar to searching for an address on a GPS.
It seeks for the best-known path to route information to reach its destination similar to searching for an address on a GPS.
Signup and view all the answers
When the device can transmit and receive information simultaneously, such as in phone conversation.
When the device can transmit and receive information simultaneously, such as in phone conversation.
Signup and view all the answers
NOT only defines how data is sent, but also provides validation and firewall security.
NOT only defines how data is sent, but also provides validation and firewall security.
Signup and view all the answers
It is a layer that ensures that a transmission occurs without any errors.
It is a layer that ensures that a transmission occurs without any errors.
Signup and view all the answers
It is also known as the physical address of a computer 48-bit address burnt onto the network interface card (NIC)
It is also known as the physical address of a computer 48-bit address burnt onto the network interface card (NIC)
Signup and view all the answers
It consists of the physical components in a Local Area Network (LAN) such as networking hardware and Ethernet cables.
It consists of the physical components in a Local Area Network (LAN) such as networking hardware and Ethernet cables.
Signup and view all the answers
Is an abstract description for layered communications and computer network protocol design.
Is an abstract description for layered communications and computer network protocol design.
Signup and view all the answers
There are (7) seven layers of OSI model.
There are (7) seven layers of OSI model.
Signup and view all the answers
OSI model utilizes the TCP/IP protocol.
OSI model utilizes the TCP/IP protocol.
Signup and view all the answers
Network layer defines how data is sent, but also provides validation and firewall security.
Network layer defines how data is sent, but also provides validation and firewall security.
Signup and view all the answers
Transport layer seeks for the best-known path to route information to reach its destination similar to searching for an address on a GPS.
Transport layer seeks for the best-known path to route information to reach its destination similar to searching for an address on a GPS.
Signup and view all the answers
Physical layer ensures that a transmission occurs without any errors.
Physical layer ensures that a transmission occurs without any errors.
Signup and view all the answers
It is a surface mounted box used in a commercial and industrial building to cleanly attach network cables.
It is a surface mounted box used in a commercial and industrial building to cleanly attach network cables.
Signup and view all the answers
This ensures that a transmission occurs without any errors.
This ensures that a transmission occurs without any errors.
Signup and view all the answers
This layer translates the commands received from the application layer into universal, well-known networking formats.
This layer translates the commands received from the application layer into universal, well-known networking formats.
Signup and view all the answers
This layer establishes a “mechanism for opening, closing and managing a session between end-user application processes and responses” in order for a packet to reach its destination.
This layer establishes a “mechanism for opening, closing and managing a session between end-user application processes and responses” in order for a packet to reach its destination.
Signup and view all the answers
This OSI layer defines how data is sent, but also provides validation and firewall security.
This OSI layer defines how data is sent, but also provides validation and firewall security.
Signup and view all the answers
This type of connector is designed to make secure and reliable input/output connections.
This type of connector is designed to make secure and reliable input/output connections.
Signup and view all the answers
It will transmit at a time until all the information has been completely sent.
It will transmit at a time until all the information has been completely sent.
Signup and view all the answers
Device that takes turns transmitting such as occurs when speaking through walkie talkies.
Device that takes turns transmitting such as occurs when speaking through walkie talkies.
Signup and view all the answers
This is used when the device can transmit and receive information simultaneously.
This is used when the device can transmit and receive information simultaneously.
Signup and view all the answers
It is an example of common protocols associated with the application layer.
It is an example of common protocols associated with the application layer.
Signup and view all the answers
These virtual IP addressing help packets navigate a network to reach their destination using IPv4 or IPv6 protocols.
These virtual IP addressing help packets navigate a network to reach their destination using IPv4 or IPv6 protocols.
Signup and view all the answers
Study Notes
Technical and Vocational Livelihood Information and Communication Technology Computer Systems Servicing Quarter 2 Module 4: OSI Layers
- OSI Model (Open Systems Interconnection Model): A layered framework for describing network communication protocols. Consists of seven layers.
- Application Layer (Layer 7): The user interface for internet activities (email, games, file transfer).
- Presentation Layer (Layer 6): Translates application layer commands into universal formats. Handles data encryption and conversion. Examples are JPEG, GIF, TIFF, MPEG.
- Session Layer (Layer 5): Establishes, manages, and terminates sessions between applications.
- Transport Layer (Layer 4): Defines data transmission, error handling, and security. Uses TCP (Transmission Control Protocol) or UDP (User Datagram Protocol).
- Network Layer (Layer 3): Determines the best route for data to reach destination. Defines logical addressing (IP addresses).
- Data Link Layer (Layer 2): Ensures error-free transmission between nodes. Uses Logical Link Control (LLC) and Media Access Control (MAC) to achieve this. Physical addressing is done at this layer.
- Physical Layer (Layer 1): Handles the physical connection (hardware and cabling). Transmits raw bits.
- MODULAR JACK (Ethernet): A type of connector designed for secure and reliable connections, often used in many applications.
- Common Protocols: Hypertext Transfer Protocol (HTTP), HTTPS, Telnet, SSH, File Transfer Protocol (FTP), Trivial File Transfer Protocol (TFTP), Simple Mail Transfer Protocol (SMTP), Post Office Protocol 3 (POP3), Domain Name System (DNS), Network Time Protocol (NTP), Ethernet, Token Ring, Fiber Distributed Data Interface (FDDI), Point-to-Point Protocol (PPP), and many others.
Additional Information
- Single Mode: A transmission mode where one device transmits at a time until all information is sent.
- Half Duplex Mode: An alternate transmission method where devices take turns transmitting.
- Full Duplex Mode: A transmission method where devices can transmit and receive information simultaneously.
- Logical Addressing: virtual IP addresses.
- MAC Addresses: Physical addresses that uniquely identify a network interface card.
- IP Addresses: Logical addresses used to identify devices on a network.
- Data Encapsulation: Enclosing data in headers for transmission through the network.
- Fragmentation and Re-assembly: Dividing large packets into smaller pieces for transmission and reassembling them at the destination.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
Explore the OSI model in this quiz, which highlights the seven layers of network communication protocols. Learn about the specific functions of each layer, ranging from application to physical. Test your knowledge and understanding of how these layers facilitate seamless internet activities and data transmission.