0% found this document useful (0 votes)
88 views

Networking and Network Devices Reviewer

A Layer 3 switch operates at the Network layer of the OSI model, using microchips for routing and IP addresses to identify devices. A router connects local networks to WANs, routing packets using headers and destination addresses. A wireless access point connects wired and wireless networks via Ethernet, broadcasting signals to wireless clients and offering features like firewalls.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
88 views

Networking and Network Devices Reviewer

A Layer 3 switch operates at the Network layer of the OSI model, using microchips for routing and IP addresses to identify devices. A router connects local networks to WANs, routing packets using headers and destination addresses. A wireless access point connects wired and wireless networks via Ethernet, broadcasting signals to wireless clients and offering features like firewalls.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 14

Networking 1 – Reviewer Midterm

NETWORKING DEVICES • Works within a network only

HUB A Layer 2 switch is a sophisticated hub,


functioning at Layer 2, Data Link layer, using
MAC address for sending and receiving
information, limiting broadcasting to network
systems.

.LAYER 3 CAPABLE SWITCH

• Is a Layer 1 or the Physical layer of the


OSI model
• Connects several systems together
• Sends the received packet to all ports
that have systems connected
• Generates congestion as the traffic is • Is a network device that operates on the
sent to all ports Layer 2+3 of
• Performs no error-checking as it lacks • the OSI model
• Can use IP addresses to route the
intelligence
packets
A hub is a Layer 1 networking device in OSI • Communicates within or outside the
model, allowing multiple systems to connect, but network
obsolete due to shared bandwidth, half-duplex • Can have multiple broadcast domains
• Capabilities depends on vendor and
mode, and inability to assign IP addresses.
price
Hubs can be of two types:
A Layer 3 switch, also known as a multilayer
• Active: Uses a power supply to power switch, operates at the Network layer of the
itself and can work as a repeater. It can OSI model, utilizing microchips for routing
analyze the data packets. They can also and IP addresses for device identification.
amplify the signals.
• Passive: Requires no power supply and ROUTER
cannot amplify signals. It just forwards
the received packets.

LAYER 2 SWITCH

• Is a Network layer, the 3rd layer in the


OSI model, device
• Connects two networks together –
typically the local area
• Is a network device that operates on the • network (LAN) and wide area network
OSI Layer 2 or (WAN)
• the Data Link layer (L2 switches) • Routes the packets based on the
• Receives and sends frames based on destination addresses
their MAC addresses • from the packet’s header
• Sends the traffic only to the required • Has a dynamic routing table
port on which the • Does NOT forward broadcasts
• recipient system is connected
A router is a Layer 3 switch and Network
• Builds a CAM table
layer device that connects local networks to

BY: A.J. CAWAYA 1


Networking 1 – Reviewer Midterm

WAN networks, routing traffic using packet A bridge is a Layer 2 device that connects
headers and destination addresses. wireless and wired networks, separates collision
domains, and uses MAC addresses to send
ACCESS POINT traffic, learning from packets.

WIRELESS LAN CONTROLLER

• Is a network device that operates on the


Layer 2 or the
• Data Link layer
• Connects a wireless LAN to the wired
LAN – acts like a
• bridge between the two
• Allows the wireless clients to connect to
the wireless
• Manages the deployed access points in
• LAN, which is identified by a SSID
a location
• Has additional capabilities like a firewall
• Is the central authority that controls the
and DHCP
existing access points but also
• server
• prevents the deployment of rogue
• Provides a limited range of signals
access points
A wireless access point (WAP) is a Layer 2 • Helps in individual access point
network device that connects wired and monitoring
• Has features like interference detection
wireless networks via Ethernet, broadcasting
and access point status detection
signals to wireless clients and offering
features like firewalls. A Wireless LAN Controller streamlines
enterprise network management by
BRIDGE
centralizing WAP deployment, management,
and maintenance, preventing unauthorized
deployment, and detecting interference and
WAP status.

A Wireless LAN Controller can be deployed


in two ways:
 Centralized: are installed in a
centralized location to manage
several WAPs in premises or a
• Is a network device that operates on the building. This model is typically used
Layer 2 or the when the locations where are WAPs
• Data Link layer are in close proximity.
• Separates the network into multiple
collision domains  Distributed: are installed in a small
• Uses MAC addresses for frame office where the wired and wireless
transfers clients are connected to an access
• Typically has two ports switch.
• Not used in modern networks

BY: A.J. CAWAYA 2


Networking 1 – Reviewer Midterm

• Requires its IP address to be configured


in client’s Web browser
LOAD BALANCER
A proxy server serves as a intermediary
between network clients and the Internet,
filtering websites, logging user requests, and
protecting IP addresses to prevent unwanted
websites.

CABLE MODEM

• Divide the workload amongst the


servers or other network devices
• Helps to achieve optimum utilization of
the server resources
• Helps to provide faster response time
• Can be deployed in the form of software
and hardware
• Can work with different load balancing
algorithms:
o First Come First Served
o Round-Robin
o Weighed Round-Robin • Is used to provide Internet connectivity
• Is mostly used with Web servers to a system using a cable connection
• Needs to be installed at the location
A load balancer distributes workload among where Internet connection is required
servers, ensuring no overloading, and can be • Is mostly used by home users
hardware or software-based, deployed in three • Requires a cable connection to work
ways: First Come First Served, Round-Robin, or
Weighed Round-Robin. Cable service providers offer Internet
connectivity through cable modems, which
PROXY SERVER terminate the cable connection to a coaxial
port and an Ethernet port, making them
popular among home users.

DSL MODEM

• Is responsible for acting like a middle-


man to provide Internet connections to
the systems on a network
• Has several capabilities like:
o Filtering Websites and ports
o Logging user visits
o Caching the visited Webpages • Uses a telephone line to provide Internet
• Hides the internal systems to be visible connectivity
on the Internet

BY: A.J. CAWAYA 3


Networking 1 – Reviewer Midterm

• Receives input from the telephone line • Network (PSTN) to the VoIP
and converts it to an Ethernet infrastructure
connection • Is usually installed at the edge of a
• Displays the connectivity through network
various lights • Collects the VoIP traffic and sends it to
• Sends the Internet traffic to the ISP’s their respective destinations
router
VoIP devices transmit traffic over the internet
DSL modems provide Internet connectivity and connect PSTN to VoIP infrastructure.
through telephone lines and Ethernet ports. Legacy voice devices use PSTN network.
They convert signals for Ethernet cables, Organizations need voice gateways for
connecting systems or wireless routers. DSL geographically dispersed locations.
modems display indicators, indicating status.
They stay in sync with the DSLAM, ensuring MEDIA CONVERTER
internet connectivity.

REPEATER

An organization can create a large network by


connecting two separate networks on fiber and
Ethernet, using a media converter for multimode
• Is a Layer 1 device fiber to Ethernet, fiber to coaxial, or singlemode
• Extends the cable beyond its maximum to multimode fiber.
limit
• Cables have specific length limit after IDS/IPS
which the signal attenuates
• Repeaters reproduce the attenuated
signals to its original strengths
• Has the capability to amplify the signals
• Usually found in wireless networks

Ethernet cables, used in cable television and


wireless networks, have a maximum transmitting
length, with repeaters extending it to restore
original strength.
Intrusion Detection System (IDS)
VOICE GATEWAY  Monitors the network traffic
• Contains rules against which the traffic
is monitored
• Sends an alert to the administrator or a
logging system if a violation occurs
• monitors network traffic, identifying
malicious traffic if it violates rules
• It alerts administrators and sends alerts
to SIEM
• Sends the VoIP traffic over the Internet
• Can connect the Public Switched
Intrusion Prevention System (IPS)
Telephone

BY: A.J. CAWAYA 4


Networking 1 – Reviewer Midterm

• Monitors the network traffic like IDS but network-based, hardware-based firewall,
also blocks the traffic like Cisco Adaptive Security Appliance.
• Performs real-time monitoring
• Can take actions like dropping the
trafficdetects and blocks malicious
traffic, performing real-time monitoring
and actions. Both are available for host
and network.
VPN HEADEND
FIREWALL

• Is the terminating point of a


• VPN tunnel
• Can support route-based or policy-
• Is meant to monitor and filter the
based tunnels
incoming and outgoing traffic
• Are typically deployed in pair for
• Prevents the unauthorized traffic from
redundancy
entering the network
• Supports a single encryption
• Is installed on the edge of a network
• Domain
• Can be categorized as:
• Hardware-based VPN headend terminates VPN connections
• Software-based at service provider end, receiving, decoding,
• Can be of two types:
and forwarding signals.
• Host-based
• Network-based NETWORKED DEVICES
A firewall protects hosts and networks by VOICE OVER INTERNET PROTOCOL (VOIP)
monitoring and filtering traffic based on PHONE
security rules, allowing or dropping access
to specific IP addresses or hosts.
You can categorize the firewalls into two
categories:

Software-based applications, such


as Zone Alarm, Windows Defender
Firewall, and Bit Defender Total
Security, can be standalone or part
of another application or operating
system, providing a comprehensive
security solution.

• Hardware-based firewalls, installed


on network edges, function as
dedicated appliances like Cisco
• Uses the VoIP infrastructure to make or
Adaptive Security Appliance (ASA).
receive calls
A firewall can be a host-based firewall, • Converts the sound to digital packets
like Windows Defender Firewall, or a • Sends them to the recipient
• Converts the digital packets back to
sound at the recipient end

BY: A.J. CAWAYA 5


Networking 1 – Reviewer Midterm

• Uses the Session Initiation Protocol


(SIP) for initiating, establishing, and
terminating the connection
• Can be of two types:
o Hardware-based
o Software-based
o Cloud-based

VoIP phones use IP infrastructure to


send and receive calls, converting
sounds to digital signals. • Are hardware devices that allow or deny
entry to a specific room or location
PRINTER • Are configured with rules to allow or
deny
• entries
• Can be of different types:
o Digital locks
o Card readers
o Biometric devices
o Encrypted badges
o Fobs
• Can be coupled as a multi-factor
authentication

Physical access control devices, such as digital


locks, card readers, biometric devices,
encrypted badges, and fobs, allow or deny entry
• Is a print device that is used for printing based on rules or conditions, and can be used in
• documents multi-factor authentication.
• Can be of different types:
• Inkjet CAMERAS
• Dot-matrix
• Laser
• 3D
• LED
• Can be connected via:
• USB cable
• Over the network
• Wireless

A printer is a hardware device that prints • Are used for surveillance purposes
documents using various types like laser, inkjet, • Can be deployed inside and outside a
dot-matrix, 3D, and LED, accessible via USB facility
ports, network configurations, or wireless • Can capture image or record videos
capabilities. • Can be of different types:
• Fixed
PHYSICAL ACCESS CONTROL DEVICES • Pan-Tilt-Zoom (PTZ)
• CCTV
• IP-based

Cameras are primarily used for clicking


pictures or recording videos, but are also
used for surveillance in the IT world.
Different types of cameras include fixed,

BY: A.J. CAWAYA 6


Networking 1 – Reviewer Midterm

Pan-Tilt-Zoom, CCTV, IP-based, and Power • Can be communicated and controlled


over Ethernet-based cameras. via the Internet
• Send data to a centralized server
HVAC SENSORS • Can be refrigerator, smart speakers,
smart thermostats, smart doorbells, and
Watches

• Are a key component in the Heating, ICS/SCADA


Ventilationand Air Conditioning (HVAC
systems]
• Help you detect:
• Excessive heat
• High or low humidity
• Rising temperature
• Can be of different types, such as:
• Pressure
• Temperature
• Humidity

HVAC systems, which include heating,


ventilation, and air conditioning, are designed to
Industrial Control System (ICS)
use sensors to manage efficiency. • Is a type of command-and-control
HVAC refers to heating, ventilation, and air system
used in industrial plants
conditioning systems in buildings.
 A command-and-control system in
INTERNET OF THINGS (IOT) DEVICES industrial plants, managed by SCADA,
comprising Master Terminal Unit,
Remote Terminal Unit, and Human
Machine Interface.

Supervisory Control and Data Acquisition


(SCADA)
• Manages the ICS systems and provides
complete control over the running
processes and allows them to be
changed in real-time
• Comprises of several components:
o Master Terminal Unit (MTU)
o Remote Terminal Unit (RTU)
• Are hardware devices that have an IP o Human Machine Interface (HMI)
address to communicate over the
Internet or a network
• Have various components, such as
o Software
o Sensors
o Actuators
o Network connectivity

BY: A.J. CAWAYA 7


Networking 1 – Reviewer Midterm

o Class C: 192.168.0.0 –
192.168.255.255

Network Address Translation (Nat)

• Allows the internal hosts to


communicate on the Internet
• Enables several internal IP addresses to
use a single public IP address
• Can be configured on a firewall, a router,
or a dedicated device

Port Address Translation (PAT)


• Is a type of NAT configuration
IP ADDRESSING SCHEMES
• Is also known as overloading that uses
RFC 1918 dynamic NAT
• Uses IPv4 addresses along with the port
• Are the IP addresses that are assigned numbers
to the internal systems in an • Maps private IP addresses to a single
organization public IP address
• Cannot be used on the Internet • Uses different ports
• Has three categories: • Performs many-to-one configuration
• 10.0.0.0 – 10.255.255.255 • PAT or Port Address Translation is a
• 172.16.0.0 – 172.31.255.255 type of NAT.
• 192.168.0.0 – 192.168.255.255 • The NAT device or server reads the port
 An organization uses the private IP information and forwards the traffic to
addresses for the internal systems and the required server.
 Public IP addresses for the exposed • In PAT, you are using different ports in a
systems on the Internet. many-to-one configuration.
 RFC 1918 defines the private IP
addresses that can be used only IPV4 VS. IPV6
internally in an organization. They
cannot be used on the Internet. Automatic Private IP Addressing (APIPA)
 A system on the Internet must have a • Is an IP address that is assigned to a
unique public IP address. Several system when the DHCP server is not
organizations use private IP addresses. available
For example, organizationA can use the • Uses the following:
192.168.10.0 series, and organization B Range:169.254.0.1 through
can use the same. Therefore, the RFC 169.254.255.254
1918 IP addresses are reserved only for Subnet Mask: Class B – 255.255.0.0
the internal systems. • Is not a routable IP address

IP addresses are divided into three Extended Unique Identifier (EUI-64)


categories, known as classes: • Allows a host to assign an IPv6 address
• Is obtained through a 48-bit MAC
o Class A: 10.0.0.0 – address
10.255.255.255 • Completes 64-bit address with the
insertion of
o Class B: 172.16.0.0 – • 16-bit 0xFFFE
172.31.255.255 • The 48-bit is split into 2x24-bits

BY: A.J. CAWAYA 8


Networking 1 – Reviewer Midterm

• 16-bit 0xFFFE is inserted in the middle o 64-bit interface identifier that is


of both 24-bits used for identifying a host
computer’s network interface
Multicast Anycast
• Identifies multiple interfaces • Identifies multiple interfaces
• Is used for one-to-many communication • Is used for one-to-one-many
• Is always used as the destination • communication
address • Delivers packets to a single interface
• Starts with FF • Delivers packets to nearest interface
• Uses Format Prefix 1111 1111 • An anycast interface is used to identify
• A multicast address is used to identify multiple interfaces.
multiple interfaces used for one-to-many • Anycast works like the multicast
communication. addresses.
• Format Prefix 1111 1111 is used to • An anycast packet is delivered to only
identify a multicast address. one address, the first IPv6 address.
• A multicast address always begins with
FF. Link Local
• A multicast address is never a source • Is a unicast address
address, but always an address that • Is used for communication by nodes that
defines a destination. • exist on the same link
• Is equivalent to Automatic Private IP
A multicast address has several fields • Addressing (APIPA) IPv4 address
that are: • Is limited to the local link
Format Prefix: is 1111 1111. • Is used by the Neighbor Discovery
T: a value of 0 defines that the multicast processes
address is permanently assigned. A • Begins with FE80
value is 1: the multicast address is • A node uses a link-local address to
temporary. communicate with the neighboring
Scope: This is the scope of an IPv6 nodes present on the same link.
network used by the router to determine • It is important to note that the link-local
whether the router can forward the addresses are limited to the local link.
traffic. Different values are used: • Some of the key characteristics of link-
1: node-local scope local address are: • It can be used to
2: link-local scope communicate with the devices on the
8: organization-local same link • Are not routable • Must be
E: global scope unique on the same link • Must exist on
Group ID: – Identifies the multicast an IPv6 device
group that is unique within the scope. It
contains the reserved addresses from Loopback
FF01:: to FF0F::. • Denoted with 0:0:0:0:0:0:0:1 or ::1
• Used for identifying a loopback interface
Unicast • Used to enable an interface to send
• Identifies a single interface within the packets to itself
• region of the IPv6 network. • Is equivalent of IPv4 address,127.0.0.1
• Sends the packets to a single interface • The loopback address is denoted with
• when they are addressed to a unicast 0:0:0:0:0:0:0:1 or double colon (“::”)1. It
• address. is used for identifying a loopback
• Comprises two parts: interface. This address is used to enable
o 64-bit network prefix that is used an interface to send packets to itself.
for routing • You can compare this address with IPv4
address, which is 127.0.0.1. This

BY: A.J. CAWAYA 9


Networking 1 – Reviewer Midterm

address can never be used to send number of hosts per network is also displayed,
traffic to a link or a destination address. with two addresses excluded.

Default Gateway Classless Inter-Domain Routing (CIDR)


• Is a node or system that allows the Notation
systems from one network to  Is used for allocation of IP
communicate with a node on another addresses
network  Is based on VLSM
• Acts as a last resort to the traffic that
 Breaks the IP addresses into two
does not have destination on the same
parts:
network
o Network address: Is used as
Examples:
a prefix
• Home DSL router
o Remaining address: Is used
as a suffix with the
 number of bits remaining in the
address
 Overall improves the efficiency of
IPV4 SUBNETTING IPv4 allocation without
 wasting IP addresses
Classless (Variable-length Subnet Mask)
 Subnet Mask: Let’s simplify the concept of CIDR. You know
o Determine if a host is on the that there are three classes of IP addresses:
same network or not • Class A - 16 million hosts
o Is a 32-bit address • Class B - 65,535 hosts
• Class C - 254 hosts
 Variable-length Subnet Mask (VLSM)
o Allows subnets to be variable in
size
o Allows hosts to be variable in
numbers in each subnet
o Uses only classless routing
protocols
o Uses different configurations for
different subnet masks

Classful

The slide shows IP addresses categorized into IPV6 CONCEPTS


five classes: Class A to Class E, with only Class
A to C used. It reveals the starting and ending
addresses of each class, with Class A having Tunneling
fewer networks but more hosts per network. The  Encapsulates the IPv6 packets with an
IPv4 header

BY: A.J. CAWAYA 10


Networking 1 – Reviewer Midterm

 Allows the IPv6 packets to be sent to an • Uses the prefix information from the
IPv4 network. router and appends the MAC address of
 Sets the Protocol field to 41 indicative of the device using NDP
an encapsulated
 IPv6 packet
o Source field: IPv4 address VIRTUAL IP (VIP)
o Destination field: IPv4 address
 Need to configure the tunnel endpoints
manually or automatically.
Virtual IPs (VIPs)
Dual Stack • Is substitution of a public IP address
• Is a migration strategy with private IP addresses of a NIC
• Allows the devices and applications to • Is the public IP address that is NOT
be configured with IPv4 and IPv6 assigned to the NIC
• Requires gradual movement to the IPv6 • Can be configured with NAT using
Shorthand Notation routers or firewall

• Leading zeros are removed in a 16-bit


block.
• Each block must have a minimum one
digit.
• Original address: SUBINTERFACES
o 21DA:00D3:0000:2F3B:02AA:00
FF:FE28:9C5A Subinterfaces
• With leading zeros removed:
o 21DA:D3:0:2F3B:2AA:FF:FE28:9 • Divide a single physical NIC into two or
more interfaces
C5A
• Is a virtual interface that is part of the
• Zeros in contiguous sets can be
physical interface
removed and replaced with “::” (double
• Is configured like a physical interface
colon).
• Example:
o A Cisco router with one physical
Router Advertisement o NIC that is divided into two
o subnets for routing the data
• Is sent by the router to provide network
ID to the hosts When a physical NIC interface is divided into
• Is a response to Router Solicitation multiple interfaces, it is the subinterfaces you
message have created. It is possible to configure multiple
subinterfaces on a physical interface. For
Stateless Address Autoconfiguration (SLAAC) example, you have a router with one NIC but
must configure three subnets. You can create
• Assigns a network device with a link- subinterfaces. If the interface is
local unicast address and a global FastEthernet0/0, the subinterfaces would be
unicast address like:
• Does not require a DHCP
• FastEthernet0/0.1

BY: A.J. CAWAYA 11


Networking 1 – Reviewer Midterm

• FastEthernet0/0.2 Core
• FastEthernet0/0.3
• Is responsible for routing the traffic
DHCP o Into the network
o Out of the network
• Is made up of routers that perform
Scope, Exclusion Range, and Reservation the routing
• Can also have switches depending
• DHCP Scope on the network architecture
o Is a range of consecutive IP o Perform fast switching
addresses that are leased to • Contains high-speed devices with
the clients full hardware redundancy
• Exclusion Range
o Is a range of IP addresses Distribution/Aggregation
that are defined within a • Is the second tier
DHCP scope • Is responsible for filtering the traffic
o Are excluded from being o Uses access control lists
leased to the clients • Is the tier where network policies are
• Reservation defined
o Is used to assign the same IP • Can contain Layer 3 switches and
address to the client firewall
o Is tied to the client’s MAC • Has hardware and network
address redundancy
o Prevents the same IP • Connect with the access switches
address to be assigned to using high-speed uplinks
other hosts
Access/Edge
Dynamic and Static Assignment
• Contains access switches that
• Dynamic o Connect client systems
o Is assigned using DHCP o Connect servers
o Is used when there are a • Is responsible for segregating the
large number of clients traffic to be sent to appropriate
VLAN
• Static • Allows users to access network
o Is manually assigned to the services
clients
o Is assigned on the servers
o Is used when there are a
small number of systems

THREE-TIERED
Three-tier network architecture is commonly
used when you have a large amount of
ingress and egress traffic.

BY: A.J. CAWAYA 12


Networking 1 – Reviewer Midterm

12. Handles message acknowledgment and


traffic control. End-to-end Message
Delivery
13. Is responsible for: End-to-end message
delivery and error checking Transport
Layer
14. It receives the information from the
Transport layer and then passes it to the
Data Link layer, which works with the MAC
or the physical address unique to every
network interface card. Network Layer
15. Packets arrive without duplication or
corruption, and in the correct order Error
checking
16. Receive data from the transport layer and
passes it over to the data link layer Network
Layer
17. Responsible for: Address conversion,
Source-to-destination delivery, Routing
Network Layer
18. The ____ sublayer determines whether the
communication is connection-oriented or
connectionless. Logical Link Control
19. The _____ sublayer contains the MAC
address, the physical address of a network
1. Composed of cables. Connectors, NIC, interface card, which is eventually used for
repeaters, and Hubs Physical Layer communication with the other nodes on the
2. Does encoding and decoding Physical networks. MAC
Layer 20. The mediator of data transmission between
3. In charge of sending digital bits from source the Transport and the Data Link layers.
to destination device Physical Layer Network Layer
4. Is responsible for communication between 21. Compresses data for transmission
Network and Physical layer. Data Link Presentation Layer
Layer 22. Contains some of the following protocols:
5. It has to be present in the source and NetBIOS, DNS, RPC, and NFS Session
destination devices during the Layer
communication. Physical Layer 23. Encrypts data for security purposes
6. It receives the information from the Network Presentation Layer
layer and passes it to the Physical layer. 24. Ensures all security concerns are met
Data Link Layer Session Layer
7. Sends electrical impulses made up of 1s 25. Is also known as the “translation layer”
and 0s Physical Layer Session Layer
8. Sublayers of Data Link Layer LLC (Logical 26. Is the layer where the user interacts with the
Link Control sublayer and MAC sublayer) devices Application Layer
9. This is the first layer, stacked at the bottom 27. Manages communication between two
of the OSI model. Physical Layer devices on a network Session Layer
10. Accepts services from the session layer and 28. Manages dialog control, such as: ___,
passes them to the network layer below. _____, ______ Session Layer (Simplex,
Transport Layer Half-duplex, Full duplex)
11. Contains the TCP and UDP protocols 29. Regulates the start, continuation, and end of
Transport Layer a session Application Layer

BY: A.J. CAWAYA 13


Networking 1 – Reviewer Midterm

30. Represents data in a uniform format to an


application Presentation Layer
31. Serves as an interface for the applications,
such as: Email applications and Web
browsers Presentation Layer
32. Uses – ASCII and XML Presentation Layer
33. The communication between two devices is
done in a format known as ______, which
contains the information that needs to be
transferred from the source to the
destination system. Frames
34. The _______, on which the communication
needs to occur, creates frames by dividing
the information. Ethernet Header
35. Each frame transmitted over the Ethernet v4
network contains an _____, which contains
static and dynamic values. IP Header
36. It contains static values like the _____. It
also contains dynamic values, such as ____,
that are changed or modified while the frame
is in transit. IP version, TTL (TIME TO
LIVE)
37. It resides at the OSI model’s layer 4, the
Transport layer. It is a connection-oriented
protocol. TCP Protocol
38. Is the largest maximum frame or packet for
given network MTU

BY: A.J. CAWAYA 14

You might also like