How Do You Communicate with Other Computers? LESSON In this lesson, Jordan, our military hacker, is on assignment in a remote location. He is tasked with setting up a secret network that is not connected to any other network he owns. You will follow right beside him on his mission. ASSIGNMENT The student will answer a series of multiple choice or True/False questions on the content of this lesson. OBJECTIVES After completing this lesson, you will understand clients and server operations how hardware/software connection devices impact connection speed Internet communication and remote access protocols the evolution of the Open Systems Interconnection (OSI) model Damage Control or Damage Prevention © 2013 Intel Free Press Jordan uses many devices in his role as a white hat hacker. Not only does he need to use software to keep security in place to protect his country's data, he also uses many peripherals to accomplish this. A router is key to his entire network structure. Most everything he uses is wireless: the printer for reports, the laptops and tablets in use by the security teams, as well as the cell phones. The access points he installed on board the ship allow him to access his secret wireless network from anywhere on the ship and anywhere within a mile of the ship on open water. Troubleshooting peripherals is a part of his daily life, not the most fun part of Jordan's job, but it has to be done. Fortunately, Jordan can do a lot of tracking just from his own laptop. He can run reports to check signal strength. He receives a warning when an access point is down. Jordan sometimes has to physically trace the connecting wires to make sure everything is properly connected. The Magic Is in the Model Jordan is taking a class on OSI (Open Systems Interconnection), a model that visually explains how electronic communications are made between one computer and another. Think of it like this: when you make a peanut butter and jelly sandwich, you don't just layer things in a random order. First you need a plate to support the bread. After that, you can start layering peanut butter on the bread, which is sitting on the plate. As long as you maintain a logical order of layers, the PBJ will make its way successfully to the end user, which in this case is your mouth. It's the same way with computers. The model groups similar communication functions into seven layers. Each layer serves the layer above it and is served by the layer below it. For example, a layer that provides error-free communications across a network provides the path needed by applications above it, while it calls the next lower layer to send and receive packets that make up the contents of that path. Two instances at one layer are connected by a horizontal connectionon that layer. OSI begins with you, the User. Each time you use the Internet, or send an email, you begin implementing the OSI protocol. Going to a website, opening up a browser, or selecting "Send" in an email starts the process rolling. The Physical Link is what happens when electrical impulses trigger code, protocols, routing of data and more to accomplish your requests almost instantly. Question 1 (True/False Worth 3 points) (01.03 MC) Checking signal strength is not part of troubleshooting for peripherals. True False Question 2 (Multiple Choice Worth 3 points) (01.03 MC) What would happen if a layer of the OSI was removed? The path would not function information would be sent Information would slowly come through Only pieces of the A network would identify the problem and fix it Question 3 (Multiple Choice Worth 3 points) (01.03 LC) How is the OSI protocol implemented? By accessing the internet setting up a network Deleting a message When you turn on a device While Question 4 (Multiple Choice Worth 3 points) (01.03 LC) What are some devices that can be connected to a local network? Laptop, desktop, tablet, smartphone telephone, DSL, smartphone Laptop, ISP, tablet, cable modem Laptop, landline Laptop, landline telephone, TV, cable modem Question 5 (Multiple Choice Worth 3 points) (01.03 LC) How does networked computing help users? Enhanced security connections Multiple devices can access them Users are familiar with the software They use hardwire for
© Copyright 2026 Paperzz