Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Defination: Subnet mask OSI layers (this is a big one) know the layers, their pu

ID: 3587065 • Letter: D

Question

Defination:

Subnet mask

OSI layers (this is a big one) know the layers, their purpose, encapsulation, addressing

Bandwidth vs throughput

UTP cable types and their purposes

Data link sublayers and what they do

Functions of a switch

Cut-through switching

Store-and-forward switching

IP vs. MAC addressing from device to device

NVRAM

IP addressing & default gateway

ANDing

Private address ranges

IPv6 link local address range

Ping vs. tracert

Subnetting (big one)

# of networks, # of hosts

VLSM (concept and process)

TCP vs. UDP

Windowing (also called sliding window)

Protocols (know what they are, port#, & which layer)

Peer-to-peer operation

HTTP messages

Network packet captures

Device security commands

Logical vs physical topology

Media types

Parts of routing table and how it functions

Commands to configure an interface (including prompts):

Reliability:

Subnet mask

OSI layers (this is a big one) know the layers, their purpose, encapsulation, addressing

Bandwidth vs throughput

UTP cable types and their purposes

Data link sublayers and what they do

Functions of a switch

Cut-through switching

Store-and-forward switching

IP vs. MAC addressing from device to device

NVRAM

IP addressing & default gateway

ANDing

Private address ranges

IPv6 link local address range

Ping vs. tracert

Subnetting (big one)

# of networks, # of hosts

VLSM (concept and process)

TCP vs. UDP

Windowing (also called sliding window)

Protocols (know what they are, port#, & which layer)

Peer-to-peer operation

HTTP messages

Network packet captures

Device security commands

Logical vs physical topology

Media types

Parts of routing table and how it functions

Explanation / Answer

1. Subnet Mask:  A Subnet mask is a 32-bit number which is used to find the network id of an IP address (subnet). It divides the IP address into a network address and host address. Subnet Mask consists of "1"s in all network bit and "0"s in all host bits. We can find the network id by performing bitwise AND operation of an IP address and subnet mask.

2. OSI layers: OSI stands for open system interconnection. OSI reference model consists of seven layers (bottom to top):

Physical Layer: This layer is used to transmit the bit stream of data through electrical, optical or radio wave medium.

This layer deals with electrical hardware used for the channel, type of medium, type of signal between sender and receiver.

Data Link Layer: This layer setup logical link over the physical network and transform the packet coming from network layer into data frames. This layer performs flow control error control, efficient channel utilization.This layer divided into two sub-layers, the Logical Link Control Layer and the Media Access Control Layer.

Network Layer: This layer performs routing of data over the network. It also handles IP addressing of sender and receiver. It transforms data segments coming from transport layer into data packets.

Transport Layer: This layer manages segmentization of data. It performs end to end delivery of data, fragmentation, error control, flow control. TCP and UDP provide these services on the internet.

Session Layer:  This layer handles the session manipulation services and dialog control. Also, provide services like authentication and reconnection after an interruption.

Presentation Layer: This layer is usually part of an operating system (OS) and transforms incoming and outgoing data from one presentation format to another. It also validates the semantic of data format.

Application Layer: This layer represents the process which runs on a machine. It interacts with the client and performs required operations on data.

3. Bandwidth is the capacity of the communications channel to move data through that channel. Bandwidth is in the simplest terms the number of packets that can travel together through a link.

Throughput, on the other hand, is the actual amount of data that gets transmitted from your system, through the network in a single unit of time.

4. Unshielded Twisted Pair (UTP) cables are most popular transmission medium.There are seven different types of UTP categories :

CAT 1: It is twisted pair cable type. It has maximum data rate is 1Mbps. CAT1 is typically used for telephone wire. This type of wire is not capable of supporting computer network traffic.

CAT 1: It is twisted pair cable type. It has maximum data rate is 1Mbps. CAT1 is typically used for telephone wire. This type of wire is not capable of supporting computer network traffic.

CAT 2: It is twisted pair cable type. It has maximum data rate is 4Mbps. CAT2 used in the token ring. This type of wire can support computer network and telephone traffic.

CAT 3: It has 4 pairs of twisted copper wires. It has maximum data rate is 10Mbps and has maximum length 100 mtrs. This type of wire can support computer network and telephone traffic.

CAT 4: It has 4 pairs of twisted copper wires. It has maximum data rate is 16Mbps and has maximum length 100 mtrs. This type of wire can support computer network and telephone traffic.

CAT 5: It has 4 pairs of twisted copper wires. It has maximum data rate is 100Mbps and has maximum length 100 mtrs. This type of wire can support computer network and telephone traffic. CAT5 used in Ethernet,Fast Ethernet and token ring.

CAT 5e: It has 4 pairs of twisted copper wires. It has maximum data rate is 1Gbps and has maximum length 100 mtrs. This type of wire can support computer network and telephone traffic. CAT5e used in GigabitEthernet. CAT5e is the most widely used cabling specification world-wide.

CAT 6: It has 4 pairs of twisted copper wires. It has maximum data rate is 10Gbps and has maximum length 100 mtrs. It is similar to CAT5e wire, but contains a physical separator between the four pairs to further reduce electromagnetic interference. CAT6 is the most widely used cabling specification world-wide.

CAT 7: It has 4 pairs of twisted copper wires. CAT7 is a newer copper cable specification designed to support speeds of 10Gbps at lengths of up to 100 meters. To achieve this, the cable features four individually shielded pairs plus an additional cable shield to protect the signals from crosstalk and electromagnetic interference.

5. Data Link Layer: setup logical link over the physical network and transform the packet coming from network layer into data frames. This layer performs flow control error control, efficient channel utilization.This layer divided into two sub-layers, the Logical Link Control Layer and the Media Access Control Layer.

The LLC sublayer handles communications between devices over a single link of a network. This sublayer supports fields in link-layer frames that enable multiple higher-layer protocols to share a single physical link.

The MAC sublayer governs protocol access to the physical network medium.It act as an interface between LLC sublayer and Physical Layer.The MAC sublayer uses MAC protocols to prevent collisions.

6. Functions of switch: A Switch is a building block of computer network that connects two networks and/or two network devices together.

The basic functionality of switch is to receive data from any source connected to it and dispatch that data to the appropriate destination only.

Switch store and verify each packet of data then forward it to appropriate destination.

7. Cut Through: The switch verifies the portion of the packet header up to the hardware address of frame before it is forwarded. They may have to stick to the store and forward procedure if the outgoing port is engaged when the packet enters.

8. Store and Forward: Switch store and verify each packet of data then forword it to appropriate destination.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote