Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

terms

Quiz yourself by thinking what should be in each of the black spaces below before clicking on it to display the answer.
        Help!  

Question
Answer
standards   documented agreements containing technical specifications  
🗑
OSI model   used to describe network communications from computer to computer  
🗑
ANSI   prescribes the kind of NIC that the consumer needs to accept wireless connections  
🗑
IEEE   prescribes how the network will ensure that different parts of a communication sent thru the atmosphere gets where it needs to be  
🗑
standards   refers to the minimal acceptable performance  
🗑
ieee   standards involve communication protocols  
🗑
ansi   standards apply to the nic  
🗑
ansi and iee   set wireless standards  
🗑
eia and tia   focuses on standards for information technology,wireless,satellite,fiber optics and telephone equipment  
🗑
iso   collection of standards organizations representing 162 countries  
🗑
iso authority applies to   textiles,packaging,distribution of goods,  
🗑
iso authority applies to   energy production,utilization,shipbuilding,banking and financial services  
🗑
itu   pertain more to global communications issues than to industry technical specifications  
🗑
isoc   helps to establish technical standards for the internet  
🗑
iab   interested in overseeing the internets design and management  
🗑
ietf   sets standards for how systems communicate over the internet,how protocols operate and interact  
🗑
ip address   address used to identify computers on the internet  
🗑
iana   group that kept records of available and reserved ip addresses.determined how addresses were doled out  
🗑
rir   manages the distribution of ip addresses to private and public entities  
🗑
icann   responsible for ip addressing and domain management  
🗑
isp provider   business that provides organizations and individuals with access to the internet  
🗑
an isp in turn arranges with its rir   for the right to use certain ip addresses on its network  
🗑
regional internet registries   arin apnic ripe  
🗑
the rir obtains the rights to dole out   addresses from icann  
🗑
the rir coordinates with iana to ensure that   the addresses are associated with devices connected to the isp's network  
🗑
osi   open systems interconnection model  
🗑
physical   level one  
🗑
data link   level two  
🗑
network   level three  
🗑
transport   level four  
🗑
session   level five  
🗑
presentation   level six  
🗑
application   level seven  
🗑
application layer   protocols interact with the software used,email  
🗑
physical layer   services act on the networking cables and connectors to issue and receive signals  
🗑
protocols   rules by which computers communicate  
🗑
osi model   theoretical representation of what happens between two nodes communicating on a network  
🗑
osi model   does not prescribe the type of hardware or software that should support each layer  
🗑
application layer   protocol data units  
🗑
application layer   seperates data into discrete amounts of data  
🗑
application layer   facilites communication between software applications and lower layer network services  
🗑
application layer   network interprets application request  
🗑
application layer   application interprets data sent from the network  
🗑
application layer protocol   http  
🗑
application programming interface   set of routines that make up part of the software  
🗑
presentation layer   translator  
🗑
presentation layer   data and format it so that one type of application and host can understand data from another host  
🗑
presentation layer   manage data encryption and decryption  
🗑
session layer   coordinate and maintain communication between two nodes on the network  
🗑
session   refers to the connection for ongoing data exchange between two parties  
🗑
session layer   if connection is lost it will try to reconnect  
🗑
session layer   ensures only authorized nodes can acces the session  
🗑
presentation layer   secure sockets layer, gif,jpg,mpeg,quick time  
🗑
transport layer   ensures data is delivered from point a to point b  
🗑
transport layer   manages end to end delivery of data in correct sequence with no errors  
🗑
transport layer   services needed in order to have data verified or interpreted by its recipient  
🗑
transport layer   flow control  
🗑
node   any device connected to the network  
🗑
flow control   process of gauging the appropriate rate of transmission based on how fast the recipient can receive data  
🗑
transport layer protocols   ensure data arrives exactly as it was sent  
🗑
transport layer protocols   tcp  
🗑
three way handshake   syn packet- syn-ack - ack  
🗑
connection oriented   establish connection before transmit  
🗑
syn packet   requests connection  
🗑
syn ack   confirms it is willing to connect  
🗑
ack   client responds data was delivered  
🗑
three way handshake   connection established  
🗑
a connection oriented protocol   expects a confirmation for every data unit a node sends  
🗑
if no confirmation is received   client assumes data was not sent and resends  
🗑
check sum   a character string that allows the receiving node to determine the data unit matches the source  
🗑
connectionless protocols   used when need to transfer data quickly  
🗑
connectionless protocols   no data verification process  
🗑
connectionless protocols   used for live video or video transmission  
🗑
connectionless protocols   unreliable,do not establish a connection before sending data  
🗑
transport layer protocols   break down large units of data received from the session layer into smaller units called segments  
🗑
transport layer protocols   perform a discovery routine upon establishing a connection in order to determine a networks mtu  
🗑
transport layer   performs segmentation,reassembly and sequencing methods  
🗑
transport functions   accept data from session  
🗑
transport functions   manage end to end delivery  
🗑
transport functions   handle flow control  
🗑
sequencing   method of identifying segments that belong to the same group of subdivided data  
🗑
network layer   translate network address into their physical counterparts and decided how to route data from sender to receiver  
🗑
addressing   system for assigning unique identification numbers to devices on the network  
🗑
network layer addresses   logical and virtual  
🗑
hierarchial addressing scheme   contain subsets of data that incrementally narrows down the location of the node  
🗑
network layer   the data unit becomes a packet  
🗑
logical address   network address  
🗑
network address   a unique identifying number for a network node that turns the data into a packet  
🗑
virtual address   network address  
🗑
routing   determing the best path  
🗑
routers   devices that connect network segments and direct data  
🗑
network layer protocol   internet protocol  
🗑
accomplished the same task at the network layer that segmentation performs at the transport layer   fragmentation  
🗑
fragmentation   subdivides the segments it receives from the transport layer into smaller packets  
🗑
time to live   mechanism that limits the lifespan or lifetime of data in a computer or network.  
🗑
IP   protocol that instructs the network where the http request is coming from and going  
🗑
mtu   maximum transmission unit  
🗑
mtu   largest data unit network will carry  
🗑
differentiated services code point pg.51   defines the way routers should queue packets while they are waiting to be forwarded  
🗑
identification (data packet) pg.51   16-bit number which together with the source address uniquely identifies this packet - used during reassembly of fragmented datagrams)  
🗑
flags pg.51   (a sequence of three flags (one of the 4 bits is unused) used to control whether routers are allowed to fragment a packet (i.e. the Don't Fragment, DF, flag), and to indicate the parts of a packet to the receiver)  
🗑
Fragmentation Offset pg.51   a byte count from the start of the original sent packet, set by any router which performs IP router fragmentation  
🗑
time to live pg.51   Number of hops /links which the packet may be routed over, decremented by most routers - used to prevent accidental routing loops  
🗑
Protocol in an ip packet pg.51   Service Access Point (SAP) which indicates the type of transport packet being carried (e.g. 1 = ICMP; 2= IGMP; 6 = TCP; 17= UDP).  
🗑
header checksum   (A 1's complement checksum inserted by the sender and updated whenever the packet header is modified by a router -  
🗑
header checksum   Used to detect processing errors introduced into the packet inside a router or bridge where the packet is not protected by a link layer cyclic redundancy check. Packets with an invalid checksum are discarded by all nodes in an IP network)  
🗑
physical address   mac address  
🗑
types of address   physical network  
🗑
quality of service   an example , some packets may require faster more reliable delivery  
🗑
frame   structured package for moving data that includes not only the raw data,the senders and receivers network address,error checking and control info  
🗑
data link layer   divide data they receive from the network layer into distinct frames that can be transmitted by the physical layer  
🗑
address   tells the network where to deliver the frame  
🗑
data link protocol   find out that information has been dropped and asks the first computer to retransmit the message  
🗑
process of error checking   find out that information has been dropped and asks the first computer to retransmit the message  
🗑
frame check sequence field   purpose is to ensure that the data at the destination exactly match the data issued from the source  
🗑
cyclic redundancy check   takes the values of all the preceding fields in the frame and generates a unique 4 byte number the fcs  
🗑
data link layer   controls the flow of this information allowing the nic to process data without error  
🗑
logical link control sublayer   provides an interface to the network layer protocols,manages control flow control and issues requests for transmission for data that have suffered errrors  
🗑
media access control sublayer   manages access to the physical medium  
🗑
mac address data link layer address   hardware address  
🗑
nics physical addres   mac address  
🗑
two parts of a physical address   OUI block id  
🗑
OUI and    
🗑


   

Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
 
To hide a column, click on the column name.
 
To hide the entire table, click on the "Hide All" button.
 
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
 
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.

 
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how
Created by: cgeaski
Popular Computers sets