ComputerArchitecture

studied byStudied by 26 people
5.0(1)
get a hint
hint

1 / 73

Tags & Description

Final Exam prep for computer architecture, networks and OS

Studying Progress

0%
New cards
74
Still learning
0
Almost done
0
Mastered
0
74 Terms
1
New cards
New cards
2
<p></p>
New cards
<p></p>

Networks

New cards
3
New cards

Networks is a hierarchical model and has 3 layers:

Access, Distribution, Core

New cards
4
New cards

What pulses into pits in physical layer (transmission media) of network?

Voltage, radio frequency or light

New cards
5
New cards

Types of wired physical layer

knowt flashcard image
knowt flashcard image
New cards
6
New cards

Network can get Interferences

from external signals such as:

- Radio waves

- Electric engines

- Fluorescent tubes

New cards
7
New cards

Uses of unshielded twisted pair (UTP)

Ethernet networks, among many other uses (mainly indoor applications)

New cards
8
New cards

What advantages does unshielded twisted pair (UTP) have?

Twisted pairs cancel unwanted signals.

New cards
9
New cards

Describe physical aspect of unshielded twisted pair (UTP)

Four unshielded twisted pairs with different colours and plastic cover.

New cards
10
New cards

What type of performance does Cat (Category) 5e cable provide?

  • 100MHz

  • suitable for10BASE-T, 100BASE-TX (Fast Ethernet), and 1000BASE-T (GigabitEthernet)

New cards
11
New cards

What is Cat (Category) 5e cable?

Cable standard

New cards
12
New cards

What is crosstalk?

a signal transmitted on one channel of a transmission system creates an undesired effect in another circuit or channel

New cards
13
New cards

Specifications of Cat 6 cable

  • Backward compatible

  • Specifications against crosstalk and noise

  • performance of up to 250 MHz

  • RJ-45 connectors when used as patch cable

New cards
14
New cards

Specifications of Cat 6a cable (augmented)

  • Unshielded and Foiled

  • defines the standard at frequencies up to 500 MHz

  • rates up to 10 Gbps

New cards
15
New cards

Specifications of Shielded Twisted Pair (STP)

  • Better transmission characteristics than UTP

  • Shielding is applied to all pairs individually and an additional overall shielding is also added.

New cards
16
New cards

Specifications of Cat 7 and 7A cables

  • It allows 10 Gigabit Ethernet

  • Up to 1000 MHz

New cards
17
New cards

Specifications of Cat 8 cables

  • It allows 40 Gigabit Ethernet

  • Up to 2000 MHz

New cards
18
New cards

Transmission problems - ATTENUATION

Attenuation is the gradual loss of signal intensity through a medium

New cards
19
New cards

Transmission problems - DELAY or LATENCY

  • It depends on the operating frequency

  • a measure of the time delay experienced by a system

  • The delay of a network specifies how long it takes for a bit of data to travel acrossthe network from one node or endpoint to another.

New cards
20
New cards

Transmission problems - THERMAL NOISE– ELECTRONS (Thermal agitation)

  • temperature-dependant

  • it adds White noise to signal and can distort it

New cards
21
New cards

Transmission problems - INTERMODULTION NOISE– NONLINEAR SYSTEMS (Pink noise)

  • Combined frequencies (f1+f2, f1-f2)

  • Pink noise can interfere with the transmitted signal and degrade its quality.

New cards
22
New cards

Transmission problems - PULSES

pulses problems are short time and

irregulars

New cards
23
New cards

Describe Optical Fiber

  • flexible, transparent fiber made by drawing glass (silica) or plastic to a diameter slightly thicker than that of a human hair

  • used most often as a means to transmit light between the two ends of the fiber and find wide usage in fiber-optic communications

  • they permit transmission over longer distances and at higher bandwidths (data rates)than electrical cables

  • Signals travel along them with less loss

  • Fibers are immune to electromagnetic interference

New cards
24
New cards

In optical fiber light is kept in

the core (by the phenomenon of total internal reflection)

New cards
25
New cards

Optical fibers typically include a core surrounded by

a transparent cladding material with a lower index of refraction. (so that light be kept inside of it)

New cards
26
New cards

To confine the optical signal in the core of optical fiber the refractive index of the core must be SMALLER/GREATER than that of the cladding.

Greater

New cards
27
New cards

Fibers that support a single mode are called single-mode fibers (SMF). While Fibers that support many propagation paths or transverse modes are called

multi-mode fibers

New cards
28
<p>Multi-mode fibers generally have a WIDER/NARROWER core diameter and are used for LONG-DISTANCE/SHORT-DISTANCE communication links and for applications where high power must be transmitted.</p>
New cards
<p>Multi-mode fibers generally have a WIDER/NARROWER core diameter and are used for LONG-DISTANCE/SHORT-DISTANCE communication links and for applications where high power must be transmitted.</p>

Multi-mode fibers generally have a WIDER/NARROWER core diameter and are used for LONG-DISTANCE/SHORT-DISTANCE communication links and for applications where high power must be transmitted.

Wider, Short distance

New cards
29
New cards

Single-mode fibers are used for most communication links longer than

1000 meters

New cards
30
New cards

Power over Ethernet (PoE) is a technology for implementing

wired Ethernet local area networks (LANs) that enables the electrical current necessary for operating each device to be carried by Ethernet data cables instead of standard electrical power cords and wiring.

New cards
31
New cards

PoE (Power over Ethernet) specifics

  • Powered via distributor

  • Power and data is transmitted

  • Standard IEEE 802.3af PoE

New cards
32
New cards

A collision domain is

a network segment connected by a shared medium or through repeaters where data packets may collide with one another while being sent. The collision domain applies particularly in wireless networks, but also affected early versions of Ethernet.

New cards
33
New cards

Carrier-sense multiple access with collision detection (CSMA/CD) is

a media access control method

New cards
34
New cards

In OSI model Host Layers include

<p>Data and segments</p>

Data and segments

<p>Data and segments</p>
New cards
35
New cards

In OSI model Media Layers include

<p>Packets, frames, bits</p>

Packets, frames, bits

<p>Packets, frames, bits</p>
New cards
36
New cards

OSI vs TCP/IP diagram

knowt flashcard image
knowt flashcard image
New cards
37
New cards

OSI vs TCP/IP diagram

knowt flashcard image
knowt flashcard image
New cards
38
New cards

A trunk port is

a port that is assigned to carry traffic for all the VLANs that areaccessible by a specific switch, a process known as trunking.

New cards
39
New cards

4 Basic processes in the network layer:

  • Addressing

  • Encapsulation

  • Routing

  • Decapsulation

New cards
40
New cards

Networks can be grouped by:

  • Geographic location

  • Purpose

  • Ownership

New cards
41
New cards

Why do we need to separate hosts in networks?

  • avoid degradation in performance

  • Security

  • Addressing management

New cards
42
New cards

VLAN is a

subnet, broadcast domain

(virtual local area network)

New cards
43
New cards

VLANs are able to logically segment switched networks, based on

  • Physical location

  • organizations

New cards
44
New cards

Switches are level 2 devices which are able to understand (IP or MAC ) addresses

MAC

New cards
45
New cards

VLANs provide segmentation based on

broadcast domains

New cards
46
New cards

hosts in different subnets will be able to communicate with each other through

a Router

New cards
47
New cards

VLANs are assigned in the switch and are associated to the

hosts’ IP addresses

New cards
48
New cards

Ports assigned to the same VLAN share the same broadcast domain. TRUE/FALSE

TRUE

New cards
49
New cards

Members of static VLANs are known as

port based

New cards
50
New cards

Routable protocols VS Routing protocols

Routable protocols:- IP, IPX/SPX

Routing protocols:- RIP, EIGRP, OSPF

New cards
51
New cards

Routable Protocols VS Routing protocols definitions

  • Routable protocols:

A communications protocol that contains a network address as well as a device address. It allows packets to be forwarded from network to another.

  • Routing protocols:

They specify how routers communicate with each other, distributinginformation that enables them to select routes between any two nodes ona computer network. Routing algorithms determine the specific choice ofroute.

New cards
52
New cards

By default, L3 switches don’t operate in layer 3. That’s why, first of all, to activate it X is required

IP routing

New cards
53
New cards

To save the configuration backups we use

TFTP (Trivial File Transfer Protocol)

New cards
54
New cards

DNS is a

Domain Name System

New cards
55
New cards

Zone Authority is the part of a (X) on which a server is responsible

Name Space

New cards
56
New cards

What Name Server does?

  • replies to all the client questions

  • keeps the names assignment for all IP addresses of the area.

New cards
57
New cards

What has static vs dynamic IP addresses?

  • Static IP addresses

Servers, Switches, routers

  • Dynamic IP addresses

Clients (end devices)

New cards
58
New cards

What does DHCP (Dynamic Host Configuration Protocol) automate?

DHCP enables the network devices to obtain IP address automatically andsome additional information from a DHCP server. This software serviceautomates the IP addresses, subnet masks and gateways allocation

New cards
59
New cards

Wireless security types

  • Wired Equivalent Privacy (WEP)

  • Wi-Fi Protected Access (WPA) best one now si WPA3 = improved WEP

  • pre-shared key (PSK)

  • TKIP - no longer considered secure

  • AES-CCMP = encryption

    protocol (better than WEP)

  • Extensible Authentication Protocol (EAP) = authentication

    framework

  • Remote Authentication Dial-In User Service (RADIUS) = networking protocol

New cards
60
New cards

Operating system is USER/KERNEL mode?

KERNEL

New cards
61
New cards

Driver is a

group of files that enable one or more hardware devices to communicate with the computer's operating system.

New cards
62
New cards

What resources does the operating system manage?

Processors● Memories● Timers● Disks● Mice● Network Interfaces

New cards
63
New cards

What is a system bus?

A bus is a subsystem that is used to connect computer components and transfer data between them.

New cards
64
New cards

System bus is made of 3 components

Control Bus, address bus, data bus

New cards
65
New cards

Types of operating systems:

Mainframes● Servers● Multiprocessors● Personal Computers● Handheld (Mobile)● Embedded● Sensor Node● Real Time● Smart Cards

New cards
66
New cards

What is a kernel?

It is the main layer between the OS and underlying computer hardware, and it helps with tasks such as process and memory management, file systems, device control and networking

New cards
67
New cards

What is the purpose of a Kernel?

1. It provides the interfaces needed for users and applications to interact with the computer.

2. It launches and manages applications.

3. It manages the underlying system hardware devices

New cards
68
New cards

What is scheduling?

The process scheduling is the activity of the process manager that handles the removal of the running process from the CPU and the selection of another process on the basis of a particular strategy.

New cards
69
New cards

Goals of a scheduler:

  • maximizing throughput

  • minimizing wait time

New cards
70
New cards

What is race conditions?

When two or more processes are reading or writing some shared data and the final result depends on who runs precisely when, are called race conditions.

New cards
71
New cards

What are critical regions?

It is the resource that is being shared between the processes.

New cards
72
New cards

How to solve problem with critical regions?

  • No two processes may be simultaneously inside their critical regions.

  • No assumptions may be made about speeds or the number of CPUs.

  • No process running outside its critical region may block any process.

  • No process should have to wait forever to enter its critical region.

New cards
73
New cards

What is memory management?

The task of subdividing the memory among different processes is called memory management.

New cards
74
New cards

Memory management algorithms:

  • First fit (In the first fit, the first available free hole fulfills the requirement of the process allocated.)

  • Best fit (In the best fit, allocate the smallest hole that is big enough to process requirements. For this, we search the entire list, unless the list is ordered by size.)

  • Worst fit (Allocate the largest available hole to process. This method produces the largest

    leftover hole.)

New cards

Explore top notes

note Note
studied byStudied by 4 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 9 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 14 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 4 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 25 people
Updated ... ago
5.0 Stars(2)
note Note
studied byStudied by 28 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 19 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 657 people
Updated ... ago
5.0 Stars(7)

Explore top flashcards

flashcards Flashcard30 terms
studied byStudied by 2 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard171 terms
studied byStudied by 30 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard70 terms
studied byStudied by 31 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard37 terms
studied byStudied by 295 people
Updated ... ago
4.5 Stars(2)
flashcards Flashcard105 terms
studied byStudied by 5 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard48 terms
studied byStudied by 6 people
Updated ... ago
5.0 Stars(3)
flashcards Flashcard70 terms
studied byStudied by 6 people
Updated ... ago
4.0 Stars(1)
flashcards Flashcard83 terms
studied byStudied by 90 people
Updated ... ago
5.0 Stars(1)