How Do You Communicate with Other Computers?

How Do You Communicate with Other
Computers?
LESSON
In this lesson, Jordan, our military hacker, is on assignment in a remote location. He is tasked with
setting up a secret network that is not connected to any other network he owns. You will follow right
beside him on his mission.
ASSIGNMENT
The student will answer a series of multiple choice or True/False questions on the content of this
lesson.
OBJECTIVES
After completing this lesson, you will understand
 clients and server operations
 how hardware/software connection devices impact connection speed
 Internet communication and remote access protocols
 the evolution of the Open Systems Interconnection (OSI) model
Damage Control or Damage Prevention
© 2013 Intel Free Press
Jordan uses many devices in his role as a white hat hacker. Not only does he need to use software
to keep security in place to protect his country's data, he also uses many peripherals to accomplish
this. A router is key to his entire network structure. Most everything he uses is wireless: the printer
for reports, the laptops and tablets in use by the security teams, as well as the cell phones. The
access points he installed on board the ship allow him to access his secret wireless network from
anywhere on the ship and anywhere within a mile of the ship on open water.
Troubleshooting peripherals is a part of his daily life, not the most fun part of Jordan's job, but it has
to be done. Fortunately, Jordan can do a lot of tracking just from his own laptop. He can run reports
to check signal strength. He receives a warning when an access point is down. Jordan sometimes
has to physically trace the connecting wires to make sure everything is properly connected.
The Magic Is in the Model
Jordan is taking a class on OSI (Open Systems Interconnection), a model that visually explains how
electronic communications are made between one computer and another. Think of it like this: when
you make a peanut butter and jelly sandwich, you don't just layer things in a random order. First you
need a plate to support the bread. After that, you can start layering peanut butter on the bread,
which is sitting on the plate. As long as you maintain a logical order of layers, the PBJ will make its
way successfully to the end user, which in this case is your mouth. It's the same way with
computers.
The model groups similar communication functions into seven layers. Each layer serves the layer
above it and is served by the layer below it. For example, a layer that provides error-free
communications across a network provides the path needed by applications above it, while it calls
the next lower layer to send and receive packets that make up the contents of that path. Two
instances at one layer are connected by a horizontal connectionon that layer.
OSI begins with you, the User. Each time you use the Internet, or send an email, you begin
implementing the OSI protocol. Going to a website, opening up a browser, or selecting "Send" in an
email starts the process rolling. The Physical Link is what happens when electrical impulses trigger
code, protocols, routing of data and more to accomplish your requests almost instantly.
Question 1 (True/False Worth 3 points)
(01.03 MC)
Checking signal strength is not part of troubleshooting for peripherals.
True
False
Question 2 (Multiple Choice Worth 3 points)
(01.03 MC)
What would happen if a layer of the OSI was removed?
The path would not function
information would be sent
Information would slowly come through
Only pieces of the
A network would identify the problem and fix it
Question 3 (Multiple Choice Worth 3 points)
(01.03 LC)
How is the OSI protocol implemented?
By accessing the internet
setting up a network
Deleting a message
When you turn on a device
While
Question 4 (Multiple Choice Worth 3 points)
(01.03 LC)
What are some devices that can be connected to a local network?
Laptop, desktop, tablet, smartphone
telephone, DSL, smartphone
Laptop, ISP, tablet, cable modem
Laptop, landline
Laptop, landline telephone, TV, cable modem
Question 5 (Multiple Choice Worth 3 points)
(01.03 LC)
How does networked computing help users?
Enhanced security
connections
Multiple devices can access them
Users are familiar with the software
They use hardwire for