Network+ Guide to Networks, Fourth Edition

Slides:



Advertisements
Similar presentations
CCNA – Network Fundamentals
Advertisements

Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin APPENDIX B NETWORKS AND TELECOMMUNI CATIONS APPENDIX B NETWORKS.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Network+ Guide to Networks, Fourth Edition
CompTIA Network+ Chapter 2
Institute of Technology Sligo - Dept of Computing Layer 7 The Application Layer Chapter Review.
Network Layer and Transport Layer.
Chapter 2 Network Models.
1ISM - © 2010 Houman Younessi Lecture 5 Convener: Houman Younessi Information Systems Spring 2011.
Jacob Boston Josh Pfeifer. Definition of HyperText Transfer Protocol How HTTP works How Websites work GoDaddy.com OSI Model Networking.
Chapter 15 – Part 2 Networks The Internal Operating System The Architecture of Computer Hardware and Systems Software: An Information Technology Approach.
OSI Model.
Understanding Networks. Objectives Compare client and network operating systems Learn about local area network technologies, including Ethernet, Token.
OSI Reference Model An overview. Standards and the internet International Organization for Standardization ISO 70’s.
Data Networking Fundamentals Unit 7 7/2/ Modified by: Brierley.
Network+ Guide to Networks, Fourth Edition Chapter 1 An Introduction to Networking.
Core 3: Communication Systems. On any network there are two types of computers present – servers and clients. By definition Client-Server architecture.
COMPUTER NETWORKS.
 The Open Systems Interconnection model (OSI model) is a product of the Open Systems Interconnection effort at the International Organization for Standardization.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Communicating over the Network Network Fundamentals – Chapter 2.
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—1-1 Building a Simple Network Understanding the Host-to-Host Communications Model.
©Brooks/Cole, 2003 Chapter 6 Computer Networks. ©Brooks/Cole, 2003 Understand the rationale for the existence of networks. Distinguish between the three.
Lecturer: Tamanna Haque Nipa
OSI Model. Open Systems Interconnection (OSI) is a set of internationally recognized, non-proprietary standards for networking and for operating system.
Network+ Guide to Networks, Fourth Edition Chapter 1 An Introduction to Networking.
Network+ Guide to Networks 6 th Edition Chapter 1 An Introduction to Networking.
Networks and Telecommunications
Lecture 1 The OSI Model Reference: TCP/IP Protocol Suite, 4 th Edition (chapter 2) 1.
NetworkProtocols. Objectives Identify characteristics of TCP/IP, IPX/SPX, NetBIOS, and AppleTalk Understand position of network protocols in OSI Model.
Lecture 2 TCP/IP Protocol Suite Reference: TCP/IP Protocol Suite, 4 th Edition (chapter 2) 1.
University of the Western Cape Chapter 15 – Application Layer The application layer is responsible for the following: Identifying and establishing the.
THE OSI MODEL AND THE TCP/IP PROTOCOL SUITE CS 1202 Lectur3 part2.
Networks – Network Architecture Network architecture is specification of design principles (including data formats and procedures) for creating a network.
Computer Communication & Networks Lecture # 02 Nadeem Majeed Choudhary
The OSI Model An ISO (International standard Organization) that covers all aspects of network communications is the Open System Interconnection (OSI) model.
The OSI Model and the TCP/IP Protocol Suite Outline: 1.Protocol Layers 2.OSI Model 3.TCP/IP Model 4.Addressing 1.
Internet Model. Interfaces Between Layers The passing of the data and network information down through the layers of the sending device and back up.
The OSI Model.
NETWORKING. OBJECTIVES Identify network topologies Identify hardware components of a network.
Protocols Rules governing the communication process, the language of the deal between the devices, must reflect Layers protocols define format, order of.
Chapter 15 – Part 2 Networks The Internal Operating System The Architecture of Computer Hardware and Systems Software: An Information Technology Approach.
1 Kyung Hee University Chapter 2 Network Models. 2 Kyung Hee University 2.1 LAYERED TASKS We use the concept of layers in our daily life. As an example,
Data Networking Fundamentals Chapter 7. Objectives In this chapter, you will learn to: Discuss basic networking concepts, including the elements common.
An Introduction to Networking
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
Chapter 2 Network Models
Network Models.
نظام المحاضرات الالكترونينظام المحاضرات الالكتروني.
Prepared by:Ronnel P. Agulto, CpE Objectives Different types of topologies; Their advantages & disadvantages How to choose an appropriate topologies in.
ISDS 4120 Project 1 DWAYNE CARRAL JR 3/27/15. There are seven layers which make up the OSI (Open Systems Interconnection Model) which is the model for.
SYSTEM ADMINISTRATION Chapter 2 The OSI Model. The OSI Model was designed by the International Standards Organization (ISO) as a structural framework.
Sy Le CS 147.  Process of transferring information between computers virtually anywhere in the world.
N ETWORKING Standards and Protocols. S TANDARDS AND P ROTOCOLS The OSI Model.
Data Communication Network Models
The OSI Model An overview of the media layer (Physical, Data Link, Network) By Luke Shiffner.
Network Models. The OSI Model Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO). Model for understanding.
Computer Network Lab. 1 3 장 OSI 기본 참조 모델 n OSI : Open System Interconnection n Basic Reference Model : ISO-7498 n Purpose of OSI Model ~ is to open communication.
Lecture # 02 Network Models Course Instructor: Engr. Sana Ziafat.
The OSI Model. History of OSI Model ISO began developing the OSI model in It is widely accepted as a model for understanding network communication.
IST 201 Chapter 11 Lecture 2. Ports Used by TCP & UDP Keep track of different types of transmissions crossing the network simultaneously. Combination.
The OSI Model and the TCP/IP Protocol Suite
Data Networking Fundamentals
The OSI Model and the TCP/IP Protocol Suite
Data and Computer Communications by William Stallings Eighth Edition
Chapter 3: Open Systems Interconnection (OSI) Model
The OSI Model and the TCP/IP Protocol Suite
The OSI Model and the TCP/IP Protocol Suite
OSI Model The Seven Layers
The OSI Model and the TCP/IP Protocol Suite
INFORMATION FLOW ACROSS THE INTERNET
Presentation transcript:

Network+ Guide to Networks, Fourth Edition Chapter 1 & 2 Checkup

True or False A common way to share resources on a peer-to-peer network is by modifying the file-sharing controls via the computer’s operating system. Resource sharing is controlled by a central computer or authority. Clients on a client/server network share their resources directly with each other. Networks are usually only arranged in a ring, bus, or star formation and hybrid combinations of these patterns are not possible. Protocols ensure that data are transferred whole, in sequence, and without error from one node on the network to another. Every process that occurs during network communications can be associated with a layer of the OSI Model. Among the Session layer’s functions are establishing and keeping alive the communications link for the duration of the session, keeping the communication secure, synchronizing the dialogue between the two nodes, determining whether communications have been cut off, and, if so, figuring out where to restart transmission, and terminating communications. The primary function of protocols at the session layer is to translate network addresses into their physical counterparts and decide how to route data from the sender to the receiver. Addressing is a system for assigning unique identification numbers to devices on a network. Connectivity devices such as hubs and repeaters operate at the Presentation layer of the OSI Model.

True or False A common way to share resources on a peer-to-peer network is by modifying the file-sharing controls via the computer’s operating system. Resource sharing is controlled by a central computer or authority. Clients on a client/server network share their resources directly with each other. Networks are usually only arranged in a ring, bus, or star formation and hybrid combinations of these patterns are not possible. Protocols ensure that data are transferred whole, in sequence, and without error from one node on the network to another. Every process that occurs during network communications can be associated with a layer of the OSI Model. Among the Session layer’s functions are establishing and keeping alive the communications link for the duration of the session, keeping the communication secure, synchronizing the dialogue between the two nodes, determining whether communications have been cut off, and, if so, figuring out where to restart transmission, and terminating communications. The primary function of protocols at the session layer is to translate network addresses into their physical counterparts and decide how to route data from the sender to the receiver. Addressing is a system for assigning unique identification numbers to devices on a network. Connectivity devices such as hubs and repeaters operate at the Presentation layer of the OSI Model.

Multiple Choice 1. A(n) ____ is a group of computers and other devices that are connected by some type of transmission media. a. access server c. NOS b. network d. NIC 2. In a(n) ____ network, every computer can communicate directly with every other computer. a. LAN c. WAN b. client/server d. peer-to-peer 3. The ____ is the software that runs on a server and enables the server to manage data, users, groups, security, applications, and other networking functions. a. NIC c. Web server b. network operating system d. WAN 4. A(n) ____ is a client, server, or other device that can communicate over a network and is identified by a unique number, known as its network address. a. host c. segment b. node d. connectivity device 5. The physical layout of a computer network is known as its ____. a. protocol c. connectivity b. topology d. addressing

Multiple Choice 6. The scheme used to assign a unique identifying number to every node on a network is known as ____. a. addressing c. security b. transmission d. protocol 7. Another term for a remote access server is ____. a. client/server c. data server b. mail server d. communications server 8. A(n) ____ is a computer installed with the appropriate software to supply Web pages to many different clients upon demand. a. Web server c. WAN b. node d. LAN 9. Through ____ layer protocols, software applications negotiate their formatting, procedural, security, synchronization, and other requirements with the network. a. Session c. Data link b. Application d. Transport 10. ____ is the process of gauging the appropriate rate of transmission based on how fast the recipient can accept data. a. Flow control c. Segmentation b. Routing d. Virtual addressing

Multiple Choice 1. A(n) ____ is a group of computers and other devices that are connected by some type of transmission media. a. access server c. NOS b. network d. NIC 2. In a(n) ____ network, every computer can communicate directly with every other computer. a. LAN c. WAN b. client/server d. peer-to-peer 3. The ____ is the software that runs on a server and enables the server to manage data, users, groups, security, applications, and other networking functions. a. NIC c. Web server b. network operating system d. WAN 4. A(n) ____ is a client, server, or other device that can communicate over a network and is identified by a unique number, known as its network address. a. host c. segment b. node d. connectivity device 5. The physical layout of a computer network is known as its ____. a. protocol c. connectivity b. topology d. addressing

Multiple Choice 6. The scheme used to assign a unique identifying number to every node on a network is known as ____. a. addressing c. security b. transmission d. protocol 7. Another term for a remote access server is ____. a. client/server c. data server b. mail server d. communications server 8. A(n) ____ is a computer installed with the appropriate software to supply Web pages to many different clients upon demand. a. Web server c. WAN b. node d. LAN 9. Through ____ layer protocols, software applications negotiate their formatting, procedural, security, synchronization, and other requirements with the network. a. Session c. Data link b. Application d. Transport 10. ____ is the process of gauging the appropriate rate of transmission based on how fast the recipient can accept data. a. Flow control c. Segmentation b. Routing d. Virtual addressing