Physical Layer (Layer 1)
Deals with raw data transmission (bits) over physical media (cables, wireless signals).
Includes hardware like network cables, hubs, and repeaters.
Data Link Layer (Layer 2)
Manages error detection and correction in data transmission.
Uses MAC (Media Access Control) addresses.
Includes switches and bridges.
Network Layer (Layer 3)
Handles logical addressing (IP addresses) and routing of data packets.
Uses routers to determine the best path for data.
Transport Layer (Layer 4)
Ensures reliable data transfer between devices using protocols like TCP and UDP.
Manages segmentation, flow control, and error recovery.
Session Layer (Layer 5)
Establishes, maintains, and terminates communication sessions between applications.
Presentation Layer (Layer 6)
Translates data between different formats (encryption, compression, encoding).
Ensures data is readable by the receiving application.
Application Layer (Layer 7)
Provides network services directly to end users (e.g., web browsing, email, file transfers).
Includes protocols like HTTP, FTP, SMTP, and DNS.
In data communication, _____ refers to integrating voice, video, and data so that multimedia information can be used for decision making. Why is security concerned when using a wireless network?
Group of answer choices
Wireless networks use inferior protocols to those used by wired networks.
Wireless transmission uses air as a medium so that it can be intercepted easily.
Wireless networks provide limited throughput.
Wireless networks allow any user to connect.
Which of the following could prevent third parties from reading the data transmitted through your home wireless AP?
Enable network encryption to WPA2.
For a business network keeping connectivity even in the failure of one or several nodes is critical. Which network topology is more adequate to address the requirement?
Mesh topology
Application | End-user applications and services | Web browser (Chrome, Firefox), Email (Gmail, Outlook) |
Presentation | Data translation, encryption, compression | File formats (JPEG, MP3, PNG), SSL encryption |
Session | Manages sessions and connections | Logging into a website (user authentication) |
Transport | Reliable/unreliable data delivery | TCP (email, web), UDP (video streaming, VoIP) |
Network | Routing, addressing (IP addresses) | Routers, IP addresses, sending data across the internet |
Data Link | MAC addresses, error detection | Ethernet, switches, Wi-Fi (802.11) |
Physical | Physical transmission of bits | Cables, fiber optics, radio signals |
Planning | Define project goals, feasibility, resources | A company decides to develop a mobile app and checks budget & market demand |
Analysis | Gather requirements, identify risks | Interviewing users & stakeholders to understand needs |
Design | Create system architecture, UI/UX | Drawing wireframes, database schema, and deciding on programming languages |
Implementation (Coding) | Developers write and build the software | Writing code using Python, Java, or C++ |
Testing | Find and fix bugs, ensure functionality | Running test cases, debugging, quality assurance |
Deployment | Release software for users | Launching an app on the Play Store or rolling out a website |
Maintenance | Update, fix bugs, and improve features | Releasing updates, patching security flaws |