ComputerArchitecture

studied byStudied by 49 people
5.0(1)
Get a hint
Hint

1 / 73

flashcard set

Earn XP

Description and Tags

Final Exam prep for computer architecture, networks and OS

74 Terms

1
New cards
2
<p></p>

Networks

New cards
3

Networks is a hierarchical model and has 3 layers:

Access, Distribution, Core

New cards
4

What pulses into pits in physical layer (transmission media) of network?

Voltage, radio frequency or light

New cards
5

Types of wired physical layer

knowt flashcard image
New cards
6

Network can get Interferences

from external signals such as:

- Radio waves

- Electric engines

- Fluorescent tubes

New cards
7

Uses of unshielded twisted pair (UTP)

Ethernet networks, among many other uses (mainly indoor applications)

New cards
8

What advantages does unshielded twisted pair (UTP) have?

Twisted pairs cancel unwanted signals.

New cards
9

Describe physical aspect of unshielded twisted pair (UTP)

Four unshielded twisted pairs with different colours and plastic cover.

New cards
10

What type of performance does Cat (Category) 5e cable provide?

  • 100MHz

  • suitable for10BASE-T, 100BASE-TX (Fast Ethernet), and 1000BASE-T (GigabitEthernet)

New cards
11

What is Cat (Category) 5e cable?

Cable standard

New cards
12

What is crosstalk?

a signal transmitted on one channel of a transmission system creates an undesired effect in another circuit or channel

New cards
13

Specifications of Cat 6 cable

  • Backward compatible

  • Specifications against crosstalk and noise

  • performance of up to 250 MHz

  • RJ-45 connectors when used as patch cable

New cards
14

Specifications of Cat 6a cable (augmented)

  • Unshielded and Foiled

  • defines the standard at frequencies up to 500 MHz

  • rates up to 10 Gbps

New cards
15

Specifications of Shielded Twisted Pair (STP)

  • Better transmission characteristics than UTP

  • Shielding is applied to all pairs individually and an additional overall shielding is also added.

New cards
16

Specifications of Cat 7 and 7A cables

  • It allows 10 Gigabit Ethernet

  • Up to 1000 MHz

New cards
17

Specifications of Cat 8 cables

  • It allows 40 Gigabit Ethernet

  • Up to 2000 MHz

New cards
18

Transmission problems - ATTENUATION

Attenuation is the gradual loss of signal intensity through a medium

New cards
19

Transmission problems - DELAY or LATENCY

  • It depends on the operating frequency

  • a measure of the time delay experienced by a system

  • The delay of a network specifies how long it takes for a bit of data to travel acrossthe network from one node or endpoint to another.

New cards
20

Transmission problems - THERMAL NOISE– ELECTRONS (Thermal agitation)

  • temperature-dependant

  • it adds White noise to signal and can distort it

New cards
21

Transmission problems - INTERMODULTION NOISE– NONLINEAR SYSTEMS (Pink noise)

  • Combined frequencies (f1+f2, f1-f2)

  • Pink noise can interfere with the transmitted signal and degrade its quality.

New cards
22

Transmission problems - PULSES

pulses problems are short time and

irregulars

New cards
23

Describe Optical Fiber

  • flexible, transparent fiber made by drawing glass (silica) or plastic to a diameter slightly thicker than that of a human hair

  • used most often as a means to transmit light between the two ends of the fiber and find wide usage in fiber-optic communications

  • they permit transmission over longer distances and at higher bandwidths (data rates)than electrical cables

  • Signals travel along them with less loss

  • Fibers are immune to electromagnetic interference

New cards
24

In optical fiber light is kept in

the core (by the phenomenon of total internal reflection)

New cards
25

Optical fibers typically include a core surrounded by

a transparent cladding material with a lower index of refraction. (so that light be kept inside of it)

New cards
26

To confine the optical signal in the core of optical fiber the refractive index of the core must be SMALLER/GREATER than that of the cladding.

Greater

New cards
27

Fibers that support a single mode are called single-mode fibers (SMF). While Fibers that support many propagation paths or transverse modes are called

multi-mode fibers

New cards
28
<p>Multi-mode fibers generally have a WIDER/NARROWER core diameter and are used for LONG-DISTANCE/SHORT-DISTANCE communication links and for applications where high power must be transmitted.</p>

Multi-mode fibers generally have a WIDER/NARROWER core diameter and are used for LONG-DISTANCE/SHORT-DISTANCE communication links and for applications where high power must be transmitted.

Wider, Short distance

New cards
29

Single-mode fibers are used for most communication links longer than

1000 meters

New cards
30

Power over Ethernet (PoE) is a technology for implementing

wired Ethernet local area networks (LANs) that enables the electrical current necessary for operating each device to be carried by Ethernet data cables instead of standard electrical power cords and wiring.

New cards
31

PoE (Power over Ethernet) specifics

  • Powered via distributor

  • Power and data is transmitted

  • Standard IEEE 802.3af PoE

New cards
32

A collision domain is

a network segment connected by a shared medium or through repeaters where data packets may collide with one another while being sent. The collision domain applies particularly in wireless networks, but also affected early versions of Ethernet.

New cards
33

Carrier-sense multiple access with collision detection (CSMA/CD) is

a media access control method

New cards
34

In OSI model Host Layers include

Data and segments

<p>Data and segments</p>
New cards
35

In OSI model Media Layers include

Packets, frames, bits

<p>Packets, frames, bits</p>
New cards
36

OSI vs TCP/IP diagram

knowt flashcard image
New cards
37

OSI vs TCP/IP diagram

knowt flashcard image
New cards
38

A trunk port is

a port that is assigned to carry traffic for all the VLANs that areaccessible by a specific switch, a process known as trunking.

New cards
39

4 Basic processes in the network layer:

  • Addressing

  • Encapsulation

  • Routing

  • Decapsulation

New cards
40

Networks can be grouped by:

  • Geographic location

  • Purpose

  • Ownership

New cards
41

Why do we need to separate hosts in networks?

  • avoid degradation in performance

  • Security

  • Addressing management

New cards
42

VLAN is a

subnet, broadcast domain

(virtual local area network)

New cards
43

VLANs are able to logically segment switched networks, based on

  • Physical location

  • organizations

New cards
44

Switches are level 2 devices which are able to understand (IP or MAC ) addresses

MAC

New cards
45

VLANs provide segmentation based on

broadcast domains

New cards
46

hosts in different subnets will be able to communicate with each other through

a Router

New cards
47

VLANs are assigned in the switch and are associated to the

hosts’ IP addresses

New cards
48

Ports assigned to the same VLAN share the same broadcast domain. TRUE/FALSE

TRUE

New cards
49

Members of static VLANs are known as

port based

New cards
50

Routable protocols VS Routing protocols

Routable protocols:- IP, IPX/SPX

Routing protocols:- RIP, EIGRP, OSPF

New cards
51

Routable Protocols VS Routing protocols definitions

  • Routable protocols:

A communications protocol that contains a network address as well as a device address. It allows packets to be forwarded from network to another.

  • Routing protocols:

They specify how routers communicate with each other, distributinginformation that enables them to select routes between any two nodes ona computer network. Routing algorithms determine the specific choice ofroute.

New cards
52

By default, L3 switches don’t operate in layer 3. That’s why, first of all, to activate it X is required

IP routing

New cards
53

To save the configuration backups we use

TFTP (Trivial File Transfer Protocol)

New cards
54

DNS is a

Domain Name System

New cards
55

Zone Authority is the part of a (X) on which a server is responsible

Name Space

New cards
56

What Name Server does?

  • replies to all the client questions

  • keeps the names assignment for all IP addresses of the area.

New cards
57

What has static vs dynamic IP addresses?

  • Static IP addresses

Servers, Switches, routers

  • Dynamic IP addresses

Clients (end devices)

New cards
58

What does DHCP (Dynamic Host Configuration Protocol) automate?

DHCP enables the network devices to obtain IP address automatically andsome additional information from a DHCP server. This software serviceautomates the IP addresses, subnet masks and gateways allocation

New cards
59

Wireless security types

  • Wired Equivalent Privacy (WEP)

  • Wi-Fi Protected Access (WPA) best one now si WPA3 = improved WEP

  • pre-shared key (PSK)

  • TKIP - no longer considered secure

  • AES-CCMP = encryption

    protocol (better than WEP)

  • Extensible Authentication Protocol (EAP) = authentication

    framework

  • Remote Authentication Dial-In User Service (RADIUS) = networking protocol

New cards
60

Operating system is USER/KERNEL mode?

KERNEL

New cards
61

Driver is a

group of files that enable one or more hardware devices to communicate with the computer's operating system.

New cards
62

What resources does the operating system manage?

Processorsâ—Ź Memoriesâ—Ź Timersâ—Ź Disksâ—Ź Miceâ—Ź Network Interfaces

New cards
63

What is a system bus?

A bus is a subsystem that is used to connect computer components and transfer data between them.

New cards
64

System bus is made of 3 components

Control Bus, address bus, data bus

New cards
65

Types of operating systems:

Mainframesâ—Ź Serversâ—Ź Multiprocessorsâ—Ź Personal Computersâ—Ź Handheld (Mobile)â—Ź Embeddedâ—Ź Sensor Nodeâ—Ź Real Timeâ—Ź Smart Cards

New cards
66

What is a kernel?

It is the main layer between the OS and underlying computer hardware, and it helps with tasks such as process and memory management, file systems, device control and networking

New cards
67

What is the purpose of a Kernel?

1. It provides the interfaces needed for users and applications to interact with the computer.

2. It launches and manages applications.

3. It manages the underlying system hardware devices

New cards
68

What is scheduling?

The process scheduling is the activity of the process manager that handles the removal of the running process from the CPU and the selection of another process on the basis of a particular strategy.

New cards
69

Goals of a scheduler:

  • maximizing throughput

  • minimizing wait time

New cards
70

What is race conditions?

When two or more processes are reading or writing some shared data and the final result depends on who runs precisely when, are called race conditions.

New cards
71

What are critical regions?

It is the resource that is being shared between the processes.

New cards
72

How to solve problem with critical regions?

  • No two processes may be simultaneously inside their critical regions.

  • No assumptions may be made about speeds or the number of CPUs.

  • No process running outside its critical region may block any process.

  • No process should have to wait forever to enter its critical region.

New cards
73

What is memory management?

The task of subdividing the memory among different processes is called memory management.

New cards
74

Memory management algorithms:

  • First fit (In the first fit, the first available free hole fulfills the requirement of the process allocated.)

  • Best fit (In the best fit, allocate the smallest hole that is big enough to process requirements. For this, we search the entire list, unless the list is ordered by size.)

  • Worst fit (Allocate the largest available hole to process. This method produces the largest

    leftover hole.)

New cards

Explore top notes

note Note
studied byStudied by 68 people
... ago
5.0(1)
note Note
studied byStudied by 21 people
... ago
4.0(4)
note Note
studied byStudied by 11 people
... ago
5.0(1)
note Note
studied byStudied by 1 person
... ago
5.0(1)
note Note
studied byStudied by 8 people
... ago
5.0(1)
note Note
studied byStudied by 213 people
... ago
4.5(2)
note Note
studied byStudied by 15 people
... ago
5.0(1)
note Note
studied byStudied by 305 people
... ago
5.0(5)

Explore top flashcards

flashcards Flashcard (31)
studied byStudied by 19 people
... ago
5.0(2)
flashcards Flashcard (128)
studied byStudied by 7 people
... ago
5.0(1)
flashcards Flashcard (81)
studied byStudied by 34 people
... ago
5.0(1)
flashcards Flashcard (41)
studied byStudied by 28 people
... ago
5.0(1)
flashcards Flashcard (39)
studied byStudied by 8 people
... ago
5.0(1)
flashcards Flashcard (27)
studied byStudied by 8 people
... ago
5.0(1)
flashcards Flashcard (20)
studied byStudied by 23 people
... ago
5.0(1)
flashcards Flashcard (100)
studied byStudied by 36 people
... ago
4.0(1)
robot