a signal transmitted on one channel of a transmission system creates an undesired effect in another circuit or channel
13
New cards
Specifications of Cat 6 cable
* Backward compatible * Specifications against crosstalk and noise * performance of up to 250 MHz * RJ-45 connectors when used as patch cable
14
New cards
Specifications of Cat 6a cable (augmented)
* Unshielded and Foiled * defines the standard at frequencies up to 500 MHz * rates up to 10 Gbps
15
New cards
Specifications of Shielded Twisted Pair (STP)
* Better transmission characteristics than UTP * Shielding is applied to all pairs individually and an additional overall shielding is also added.
16
New cards
Specifications of Cat 7 and 7A cables
* It allows 10 Gigabit Ethernet * Up to 1000 MHz
17
New cards
Specifications of Cat 8 cables
* It allows 40 Gigabit Ethernet * Up to 2000 MHz
18
New cards
Transmission problems - ATTENUATION
Attenuation is the gradual loss of signal intensity through a medium
19
New cards
Transmission problems - DELAY or LATENCY
* It depends on the operating frequency * a measure of the time delay experienced by a system * The delay of a network specifies how long it takes for a bit of data to travel acrossthe network from one node or endpoint to another.
* temperature-dependant * it adds White noise to signal and can distort it
21
New cards
Transmission problems - INTERMODULTION NOISE– NONLINEAR SYSTEMS (Pink noise)
* Combined frequencies (f1+f2, f1-f2) * Pink noise can interfere with the transmitted signal and degrade its quality.
22
New cards
Transmission problems - PULSES
pulses problems are short time and
irregulars
23
New cards
Describe Optical Fiber
* flexible, transparent fiber made by drawing glass (silica) or plastic to a diameter slightly thicker than that of a human hair * used most often as a means to transmit light between the two ends of the fiber and find wide usage in fiber-optic communications * they permit transmission over longer distances and at higher bandwidths (data rates)than electrical cables * Signals travel along them with less loss * Fibers are immune to electromagnetic interference
24
New cards
In optical fiber light is kept in
the core (by the phenomenon of total internal reflection)
25
New cards
Optical fibers typically include a core surrounded by
a transparent cladding material with a lower index of refraction. (so that light be kept inside of it)
26
New cards
\ To confine the optical signal in the core of optical fiber the refractive index of the core must be SMALLER/GREATER than that of the cladding.
Greater
27
New cards
Fibers that support a single mode are called single-mode fibers (SMF). While Fibers that support many propagation paths or transverse modes are called
multi-mode fibers
28
New cards
Multi-mode fibers generally have a WIDER/NARROWER core diameter and are used for LONG-DISTANCE/SHORT-DISTANCE communication links and for applications where high power must be transmitted.
Wider, Short distance
29
New cards
Single-mode fibers are used for most communication links longer than
1000 meters
30
New cards
Power over Ethernet (PoE) is a technology for implementing
wired Ethernet local area networks (LANs) that enables the electrical current necessary for operating each device to be carried by Ethernet data cables instead of standard electrical power cords and wiring.
31
New cards
PoE (Power over Ethernet) specifics
* Powered via distributor * Power and data is transmitted * Standard IEEE 802.3af PoE
32
New cards
A collision domain is
a network segment connected by a shared medium or through repeaters where data packets may collide with one another while being sent. The collision domain applies particularly in wireless networks, but also affected early versions of Ethernet.
33
New cards
Carrier-sense multiple access with collision detection (CSMA/CD) is
a media access control method
34
New cards
In OSI model Host Layers include
Data and segments
35
New cards
In OSI model Media Layers include
Packets, frames, bits
36
New cards
OSI vs TCP/IP diagram
37
New cards
OSI vs TCP/IP diagram
38
New cards
A trunk port is
a port that is assigned to carry traffic for all the VLANs that areaccessible by a specific switch, a process known as trunking.
39
New cards
4 Basic processes in the network layer:
* Addressing
* Encapsulation * Routing * Decapsulation
40
New cards
Networks can be grouped by:
* Geographic location * Purpose * Ownership
41
New cards
Why do we need to separate hosts in networks?
* avoid degradation in performance * Security * Addressing management
42
New cards
VLAN is a
subnet, broadcast domain
(virtual local area network)
43
New cards
\ VLANs are able to logically segment switched networks, based on
* Physical location * organizations
44
New cards
Switches are level 2 devices which are able to understand (IP or MAC ) addresses
MAC
45
New cards
VLANs provide segmentation based on
broadcast domains
46
New cards
hosts in different subnets will be able to communicate with each other through
a Router
47
New cards
VLANs are assigned in the switch and are associated to the
hosts’ IP addresses
48
New cards
Ports assigned to the same VLAN share the same broadcast domain. TRUE/FALSE
TRUE
49
New cards
Members of static VLANs are known as
port based
50
New cards
Routable protocols VS Routing protocols
Routable protocols:- IP, IPX/SPX
Routing protocols:- RIP, EIGRP, OSPF
51
New cards
Routable Protocols VS Routing protocols definitions
* Routable protocols:
A communications protocol that contains a network address as well as a device address. It allows packets to be forwarded from network to another.
* Routing protocols:
They specify how routers communicate with each other, distributinginformation that enables them to select routes between any two nodes ona computer network. Routing algorithms determine the specific choice ofroute.
52
New cards
By default, L3 switches don’t operate in layer 3. That’s why, first of all, to activate it X is required
\ IP routing
53
New cards
To save the configuration backups we use
TFTP (Trivial File Transfer Protocol)
54
New cards
DNS is a
Domain Name System
55
New cards
Zone Authority is the part of a (X) on which a server is responsible
Name Space
56
New cards
What Name Server does?
* replies to all the client questions * keeps the names assignment for all IP addresses of the area.
57
New cards
What has static vs dynamic IP addresses?
* Static IP addresses
Servers, Switches, routers
* Dynamic IP addresses
Clients (end devices)
58
New cards
What does DHCP (Dynamic Host Configuration Protocol) automate?
DHCP enables the network devices to obtain IP address automatically andsome additional information from a DHCP server. This software serviceautomates the IP addresses, subnet masks and gateways allocation
59
New cards
Wireless security types
* Wired Equivalent Privacy (WEP) * Wi-Fi Protected Access (WPA) best one now si WPA3 = improved WEP * pre-shared key (PSK) * TKIP - no longer considered secure * AES-CCMP = encryption
A bus is a subsystem that is used to connect computer components and transfer data between them.
64
New cards
System bus is made of 3 components
Control Bus, address bus, data bus
65
New cards
Types of operating systems:
Mainframes● Servers● Multiprocessors● Personal Computers● Handheld (Mobile)● Embedded● Sensor Node● Real Time● Smart Cards
66
New cards
What is a kernel?
It is the main layer between the OS and underlying computer hardware, and it helps with tasks such as process and memory management, file systems, device control and networking
67
New cards
What is the purpose of a Kernel?
1\. It provides the interfaces needed for users and applications to interact with the computer.
2\. It launches and manages applications.
3\. It manages the underlying system hardware devices
68
New cards
What is scheduling?
The process scheduling is the activity of the process manager that handles the removal of the running process from the CPU and the selection of another process on the basis of a particular strategy.
69
New cards
Goals of a scheduler:
* maximizing throughput * minimizing wait time * \
70
New cards
What is race conditions?
When two or more processes are reading or writing some shared data and the final result depends on who runs precisely when, are called race conditions.
71
New cards
What are critical regions?
It is the resource that is being shared between the processes.
72
New cards
How to solve problem with critical regions?
* No two processes may be simultaneously inside their critical regions. * No assumptions may be made about speeds or the number of CPUs. * No process running outside its critical region may block any process. * No process should have to wait forever to enter its critical region.
73
New cards
What is memory management?
The task of subdividing the memory among different processes is called memory management.
74
New cards
Memory management algorithms:
* First fit (In the first fit, the first available free hole fulfills the requirement of the process allocated.) * Best fit (In the best fit, allocate the smallest hole that is big enough to process requirements. For this, we search the entire list, unless the list is ordered by size.) * Worst fit (Allocate the largest available hole to process. This method produces the largest