ComputerArchitecture

studied byStudied by 87 people
5.0(1)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 73

flashcard set

Earn XP

Description and Tags

Final Exam prep for computer architecture, networks and OS

74 Terms

1
New cards
2
\
\
Networks
New cards
3
Networks is a hierarchical model and has 3 layers:
Access, Distribution, Core
New cards
4
What pulses into pits in physical layer (transmission media) of network?
Voltage, radio frequency or light
New cards
5
Types of wired physical layer
knowt flashcard image
New cards
6
Network can get Interferences

from external signals such as:
\- Radio waves

\- Electric engines

\- Fluorescent tubes
New cards
7
Uses of unshielded twisted pair (UTP)
Ethernet networks, among many other uses (mainly indoor applications)
New cards
8
What advantages does unshielded twisted pair (UTP) have?
Twisted pairs cancel unwanted signals.
New cards
9
Describe physical aspect of unshielded twisted pair (UTP)
Four unshielded twisted pairs with different colours and plastic cover.
New cards
10
What type of performance does Cat (Category) 5e cable provide?
  • 100MHz

  • suitable for10BASE-T, 100BASE-TX (Fast Ethernet), and 1000BASE-T (GigabitEthernet)

New cards
11
What is Cat (Category) 5e cable?
Cable standard
New cards
12
What is crosstalk?
a signal transmitted on one channel of a transmission system creates an undesired effect in another circuit or channel
New cards
13
Specifications of Cat 6 cable
  • Backward compatible

  • Specifications against crosstalk and noise

  • performance of up to 250 MHz

  • RJ-45 connectors when used as patch cable

New cards
14
Specifications of Cat 6a cable (augmented)
  • Unshielded and Foiled

  • defines the standard at frequencies up to 500 MHz

  • rates up to 10 Gbps

New cards
15
Specifications of Shielded Twisted Pair (STP)
  • Better transmission characteristics than UTP

  • Shielding is applied to all pairs individually and an additional overall shielding is also added.

New cards
16
Specifications of Cat 7 and 7A cables
  • It allows 10 Gigabit Ethernet

  • Up to 1000 MHz

New cards
17
Specifications of Cat 8 cables
  • It allows 40 Gigabit Ethernet

  • Up to 2000 MHz

New cards
18
Transmission problems - ATTENUATION
Attenuation is the gradual loss of signal intensity through a medium
New cards
19
Transmission problems - DELAY or LATENCY
  • It depends on the operating frequency

  • a measure of the time delay experienced by a system

  • The delay of a network specifies how long it takes for a bit of data to travel acrossthe network from one node or endpoint to another.

New cards
20
Transmission problems - THERMAL NOISE– ELECTRONS (Thermal agitation)
  • temperature-dependant

  • it adds White noise to signal and can distort it

New cards
21
Transmission problems - INTERMODULTION NOISE– NONLINEAR SYSTEMS (Pink noise)
  • Combined frequencies (f1+f2, f1-f2)

  • Pink noise can interfere with the transmitted signal and degrade its quality.

New cards
22
Transmission problems - PULSES
pulses problems are short time and

irregulars
New cards
23
Describe Optical Fiber
  • flexible, transparent fiber made by drawing glass (silica) or plastic to a diameter slightly thicker than that of a human hair

  • used most often as a means to transmit light between the two ends of the fiber and find wide usage in fiber-optic communications

  • they permit transmission over longer distances and at higher bandwidths (data rates)than electrical cables

  • Signals travel along them with less loss

  • Fibers are immune to electromagnetic interference

New cards
24
In optical fiber light is kept in
the core (by the phenomenon of total internal reflection)
New cards
25
Optical fibers typically include a core surrounded by
a transparent cladding material with a lower index of refraction. (so that light be kept inside of it)
New cards
26
\
To confine the optical signal in the core of optical fiber the refractive index of the core must be SMALLER/GREATER than that of the cladding.
Greater
New cards
27
Fibers that support a single mode are called single-mode fibers (SMF). While Fibers that support many propagation paths or transverse modes are called
multi-mode fibers
New cards
28
Multi-mode fibers generally have a WIDER/NARROWER core diameter and are used for LONG-DISTANCE/SHORT-DISTANCE communication links and for applications where high power must be transmitted.
Multi-mode fibers generally have a WIDER/NARROWER core diameter and are used for LONG-DISTANCE/SHORT-DISTANCE communication links and for applications where high power must be transmitted.
Wider, Short distance
New cards
29
Single-mode fibers are used for most communication links longer than
1000 meters
New cards
30
Power over Ethernet (PoE) is a technology for implementing
wired Ethernet local area networks (LANs) that enables the electrical current necessary for operating each device to be carried by Ethernet data cables instead of standard electrical power cords and wiring.
New cards
31
PoE (Power over Ethernet) specifics
  • Powered via distributor

  • Power and data is transmitted

  • Standard IEEE 802.3af PoE

New cards
32
A collision domain is
a network segment connected by a shared medium or through repeaters where data packets may collide with one another while being sent. The collision domain applies particularly in wireless networks, but also affected early versions of Ethernet.
New cards
33
Carrier-sense multiple access with collision detection (CSMA/CD) is
a media access control method
New cards
34
In OSI model Host Layers include
Data and segments
Data and segments
New cards
35
In OSI model Media Layers include
Packets, frames, bits
Packets, frames, bits
New cards
36
OSI vs TCP/IP diagram
knowt flashcard image
New cards
37
OSI vs TCP/IP diagram
knowt flashcard image
New cards
38
A trunk port is
a port that is assigned to carry traffic for all the VLANs that areaccessible by a specific switch, a process known as trunking.
New cards
39
4 Basic processes in the network layer:
  • Addressing

  • Encapsulation

  • Routing

  • Decapsulation

New cards
40
Networks can be grouped by:
  • Geographic location

  • Purpose

  • Ownership

New cards
41
Why do we need to separate hosts in networks?
  • avoid degradation in performance

  • Security

  • Addressing management

New cards
42
VLAN is a
subnet, broadcast domain

(virtual local area network)
New cards
43
\
VLANs are able to logically segment switched networks, based on
  • Physical location

  • organizations

New cards
44
Switches are level 2 devices which are able to understand (IP or MAC ) addresses
MAC
New cards
45
VLANs provide segmentation based on
broadcast domains
New cards
46
hosts in different subnets will be able to communicate with each other through
a Router
New cards
47
VLANs are assigned in the switch and are associated to the
hosts’ IP addresses
New cards
48
Ports assigned to the same VLAN share the same broadcast domain. TRUE/FALSE
TRUE
New cards
49
Members of static VLANs are known as
port based
New cards
50
Routable protocols VS Routing protocols
Routable protocols:- IP, IPX/SPX

Routing protocols:- RIP, EIGRP, OSPF
New cards
51
Routable Protocols VS Routing protocols definitions
  • Routable protocols:

A communications protocol that contains a network address as well as a device address. It allows packets to be forwarded from network to another.

  • Routing protocols:

They specify how routers communicate with each other, distributinginformation that enables them to select routes between any two nodes ona computer network. Routing algorithms determine the specific choice ofroute.

New cards
52
By default, L3 switches don’t operate in layer 3. That’s why, first of all, to activate it X is required
\
IP routing
New cards
53
To save the configuration backups we use
TFTP (Trivial File Transfer Protocol)
New cards
54
DNS is a
Domain Name System
New cards
55
Zone Authority is the part of a (X) on which a server is responsible
Name Space
New cards
56
What Name Server does?
  • replies to all the client questions

  • keeps the names assignment for all IP addresses of the area.

New cards
57
What has static vs dynamic IP addresses?
  • Static IP addresses

Servers, Switches, routers

  • Dynamic IP addresses

Clients (end devices)

New cards
58
What does DHCP (Dynamic Host Configuration Protocol) automate?
DHCP enables the network devices to obtain IP address automatically andsome additional information from a DHCP server. This software serviceautomates the IP addresses, subnet masks and gateways allocation
New cards
59
Wireless security types
  • Wired Equivalent Privacy (WEP)

  • Wi-Fi Protected Access (WPA) best one now si WPA3 = improved WEP

  • pre-shared key (PSK)

  • TKIP - no longer considered secure

  • AES-CCMP = encryption

    protocol (better than WEP)

  • Extensible Authentication Protocol (EAP) = authentication

    framework

  • Remote Authentication Dial-In User Service (RADIUS) = networking protocol

New cards
60
Operating system is USER/KERNEL mode?
KERNEL
New cards
61
Driver is a
group of files that enable one or more hardware devices to communicate with the computer's operating system.
New cards
62
What resources does the operating system manage?
Processors● Memories● Timers● Disks● Mice● Network Interfaces
New cards
63
What is a system bus?
A bus is a subsystem that is used to connect computer components and transfer data between them.
New cards
64
System bus is made of 3 components
Control Bus, address bus, data bus
New cards
65
Types of operating systems:
Mainframes● Servers● Multiprocessors● Personal Computers● Handheld (Mobile)● Embedded● Sensor Node● Real Time● Smart Cards
New cards
66
What is a kernel?
It is the main layer between the OS and underlying computer hardware, and it helps with tasks such as process and memory management, file systems, device control and networking
New cards
67
What is the purpose of a Kernel?
1\. It provides the interfaces needed for users and applications to interact with the computer.

2\. It launches and manages applications.

3\. It manages the underlying system hardware devices
New cards
68
What is scheduling?
The process scheduling is the activity of the process manager that handles the removal of the running process from the CPU and the selection of another process on the basis of a particular strategy.
New cards
69
Goals of a scheduler:
  • maximizing throughput

  • minimizing wait time

New cards
70
What is race conditions?
When two or more processes are reading or writing some shared data and the final result depends on who runs precisely when, are called race conditions.
New cards
71
What are critical regions?
It is the resource that is being shared between the processes.
New cards
72
How to solve problem with critical regions?
  • No two processes may be simultaneously inside their critical regions.

  • No assumptions may be made about speeds or the number of CPUs.

  • No process running outside its critical region may block any process.

  • No process should have to wait forever to enter its critical region.

New cards
73
What is memory management?
The task of subdividing the memory among different processes is called memory management.
New cards
74
Memory management algorithms:
  • First fit (In the first fit, the first available free hole fulfills the requirement of the process allocated.)

  • Best fit (In the best fit, allocate the smallest hole that is big enough to process requirements. For this, we search the entire list, unless the list is ordered by size.)

  • Worst fit (Allocate the largest available hole to process. This method produces the largest

    leftover hole.)

New cards
robot