Preview

data networking study guide

Powerful Essays
Open Document
Open Document
3819 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
data networking study guide
Format: 20-30 MC; 6pages of short answers
Review – labs




Travel over the internet; TCP/UDP is from end to end, IP is in the middle, between hops o Write email – this is data o Data is sent to the transport layer and is SEGMENTED, adds s/d PORT # and sequence number o Network layer turns these into packets with s/d ip address o Data link layer turns these into frames with s/d mac address for default gateway o Frames go to switch and switch checks source mac and learns it if it doesn’t o Switch checks destination mac (default gateway mac) and port floods if it doesn’t know
 Switch does NOT OPEN frame; just reads frame because switch is same layer as frame o Switch forwards to router/default gateway o Router gets rid of frames and checks ip address, router REFRAMES with next hop dest. Mac address o Next device looks at dest mac address and see if mac address matches its mac address o Runs crc (cyclic redun. Check) and compares to fcf (frame check seq.), accepts frames and open them up o Packets are sent to network layer, sent to transport layer o Transport layer puts it in right order and passes to application layer
Intro/chapter 1 o Data storage – stored in digital binary o 8 bits make 1 byte o Know how to translate binary! o ASCII only supports English char set (0-127) o Duo bit/Unicode supports other languages with bigger char sets
 UTF 8/16;
 ASCII and UTF share same codes for 0-127
 Larger than 127: leading byte has two or more 1’s followed by
0’s, continuation bytes start with 10 o Data sizes – what’s here
 8 bits = 1 byte (B)
 1 kilobyte = 1024 B
 1 megabyte = 1,048,576 B
 1 gigabyte = 1,073,741,824 B
 1 terabyte = 10^12 B
 Peta, exa, zetta, yotta o Hardware
 Cpu – processing unit

o

o

o

o

o o o o  Modem – de/modulate; digital analog phone lines
 Network interface card – connects to network
 Sound/video car – expands capabilities of computer
Buying a computer – starting

You May Also Find These Documents Helpful

  • Powerful Essays

    Nt 2580 Project Part 2

    • 1249 Words
    • 5 Pages

    Switches are much like a bridge where they can connect networks that use the same protocols. They are used to direct traffic over multiple networks. Some switches will check the data packets for errors before sending them to their final destination. This is for a low to medium traffic network. A higher traffic network may want to use a cross point switch which will just forward the data packets to their final destination.…

    • 1249 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    2. When a switch receives an Ethernet frame to a destination MAC address which is not in the devices MAC address table the switch applies the following logic: ____________________?…

    • 901 Words
    • 3 Pages
    Powerful Essays
  • Powerful Essays

    Nt1310 Unit 9

    • 1048 Words
    • 5 Pages

    It accepts Layer 3 packets and decides the path by which to forward a frame to a host on a remote network.…

    • 1048 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    Mt1310 Unit 7 Essay

    • 1045 Words
    • 5 Pages

    The Message Transfer Part (MTP) is divided into three levels. The lowest level, MTP Level 1, is equivalent to the OSI Physical Layer. MTP Level 1 defines the physical, electrical and functional characteristics of the digital signalling link. Physical interfaces defined include E-1 (2048 kb/s; 32 64 kb/s channels), DS-1 (1544 kb/s; 24 64kb/s channels), V.35 (64 kb/s), DS-0 (64 kb/s) and DS-0A (56 kb/s).…

    • 1045 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Nt1330 Unit 4

    • 920 Words
    • 4 Pages

    2. Which of the following statements describes part of the process of how a LAN switch…

    • 920 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Nt1210 Lab 3.1 Essay

    • 453 Words
    • 2 Pages

    At the point when information is transmitted between two separate has the OSI process must be differentiated and sent in distinctive portions. Consequently the accepting host must get these sections. The deencapsulation is the methodology differentiating the information into workable stages that the accepting host can transform in place for the application to translate it legitimately.…

    • 453 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    4. The data link layer strips the data-link header and trailer, and then passes the remaining data up to the network layer.…

    • 648 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    nt1210 lab3

    • 324 Words
    • 2 Pages

    Sends frames to and from with flow control, error control and sync; also addresses topology and medias.…

    • 324 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Gives system addressing and routing, and does so in such a manner as additionally to give a regular address space across numerous lower-level protocols. This makes conceivable the interconnection of systems that describes the Internet. The IP protocol works at this level.…

    • 1263 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    - each switch has to determine the destination MAC address of the frame, check it MAC address table, and forward the frame out the appropriate port…

    • 688 Words
    • 3 Pages
    Powerful Essays
  • Satisfactory Essays

    Unit 8 Assignment 1

    • 349 Words
    • 1 Page

    IP routing: The process of forwarding an IP packet from end to end through a TCP/IP network, as well as the logic used on an individual host or router as its part of the forwarding of the packet to its end destination.…

    • 349 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    IEEE802 standard series protocol, the data link layer includes a logical link control (LLC) sublayer and the media access control (MAC) sub-layer which is located between the MAC layer and the physical LLC, which allows adaptation to different LLC media access technology and physical media. MAC sublayer as a separate, they will not change the impact of the media access method and higher level protocols. MAC disassembly of data and media access management of two modules, the completion of the data frame encapsulation, re-opened send and receive functions. Ethernet frame encapsulation format as shown in Table 1, where the destination address, source address, length / type field and the data generated by the four layer protocol module when transmitting data frames, data encapsulation module automatically adding data to be transmitted in the first seven bytes of preamble and a delimiter byte and add at the end of the data transfer byte sent four cyclic redundancy check code, if the data length is less than 46 bytes , the data is automatically filled in order to achieve the minimum length required when receiving data frame, the data will be automatically discarded removable module preamble and delimiter two fields.…

    • 312 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    nt2640 week1

    • 1824 Words
    • 8 Pages

    3. The process of HTTP asking TCP to send some data and make sure that it is received correctly is an example of what?…

    • 1824 Words
    • 8 Pages
    Good Essays
  • Satisfactory Essays

    STurner Assignment Unit3

    • 560 Words
    • 3 Pages

    The Internet is a bunch of interconnected networks that encompass the globe, where routers and switches establish connections between them.…

    • 560 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    OSI Model Key Terms Table

    • 552 Words
    • 3 Pages

    | This Layer is what makes up the Data Link Layer of the OSI mode.…

    • 552 Words
    • 3 Pages
    Satisfactory Essays