Quizlet Questions
Quizlet Questions
Quizlet Questions
Computer Network
An interconnection of computers and computing equipment that uses either wires or radio
waves over small or large geographic areas.
Wireless
A shorthand term often used to denote the transmission of signals without the use of wires.
Data Communications
The transfer of digital or analog data using digital or analog signals.
Multiplexing
Transmitting multiple signals on one medium at essentially the same time.
Compression
The process of manipulating data such that it fits into a more compact space.
Voice Network
A type of network that is designed to support standard telephone calls.
Data Network
An interconnection of computers that is designed to transmit computer data.
Convergence
The coming together of multiple communication concepts to form a single point.
Network Management
The design, installation, and support of a network and its hardware and software.
Workstation
A personal computer or microcomputer where users perform computing work.
Server
A computer that stores the network software and shared or private user files.
Switch
A device that is a combination of a hub and a bridge; it can interconnect multiple workstations,
but can also filter out frames, thereby providing segmentation of the network.
Router
The device that connects local area networks to a wide area network and at various transfer
points within a wide area network.
Nodes
The computing devices that allow workstations to connect to the network and that decide which
route a piece of data will follow next.
Sub-Network
The underlying physical system of nodes and communications links that support a network.
Cloud
The network sub structure of nodes (routers and switches) at high-speed links.
Client/Server System
A distributed computing system consisting of a server and one or more clients that request
information from the server.
Computer Terminal
A relatively non-intelligent device that allows a user to input data into a system or displays data
from the system.
Protocol
A set of hardware and/or software procedures that allows communication to take place within a
computer or through a computer network.
Network Architecture
A template that outlines the layers of hardware and software operations for a computer network
and its applications.
Application Layer
The topmost layer in the OSI model and the TCP/IP protocol suite; where the network
application resides.
Telnet
A terminal emulation program for TCP/IP networks, such as the Internet, that allows users to
log in to a remote computer.
Physical Layer
The lowest layer of the OSI model; it handles the transmission of bits over a communications
channel.
Presentation Layer
A layer of the OSI model that performs a series of miscellaneous functions that need to be
carried out in order to present the data package properly to the sender or receiver.
Session Layer
A layer of the OSI model that is responsible for establishing sessions between users and for
handling the service of token management.
Token Management
A system that controls who talks during the current session by passing a software token back
and forth.
Synchronization Point
Some form of backup points that are inserted into a long transmission to serve as markers from
which retransmission can be started, in case of error or failures.
Transport Layer
The layer of software in the TCP/IP protocol suite and OSI model that provides a reliable end-
to-end network connection
Network Layer
A layer in the OSI model and TCP/IP protocol suite that is responsible for creating,
maintaining, and ending network connections.
Frame
A cohesive unit of raw data. A package of data created at the data link layer of the OSI model.
Physical Layer The lowest layer of the OSI model; it handles the transmission of bits over a
communications channel.
Logical Connection
A non-physical connection between sender and receiver that allows an exchange of commands
and responses.
Physical Connection
The actual connection between sender and receiver at the physical layer where the digital
content of a message (actual 1's and 0's) is transmitted.
Encapsulation
The process by which control information is added to a data packet as it moves through the
layers of a communication module such as the OSI model or the TCP/IP protocol suite.
Technological Convergence
The joining of two or more Technologies into a single device.
Protocol Convergence
The joining of two or more protocols into a single protocol.
Industrial Convergence
The merging of two or more companies into a single company.
TCP/IP
Transmission Control Protocol/Internet Protocol.
Chapter 2
The four general functions of any application program are: data storage, data access logic,
application logic and presentation logic. True
The fundamental problem in client- based networks is that all data on the server must travel to
the client for processing True
To interact with the World Wide Web, a client computer needs an application layer software
package called a: Web browser
A _____ is a very large general-purpose computer that is capable of performing very many
functions as if these are done simultaneously, and strong extremely large amounts of data
Mainframe
The software that runs on the mail server is referred to as the ____: Mail transfer agent
With the "thin client" architecture, when an application changes, only the _________ with the
application logic needs to be updated. Server
In a client-server network, the presentation logic is responsibility of the client computer True
In the three tier architecture, the software on the client computer is responsible for the :
Presentation Logic
Host-based and client based networks are similar in that the client computer performs most of
the work: False
A response status code of 404 means: The requested page was not found.
In a client server network, ____ gets software from different vendors to work together.
Middleware
Which of the following is not an example of a mail user agent software package? Microsoft
Word
With ______________, the cloud provider manages the hardware including servers, storage,
and networking components. The organization is responsible for all the software, including
operating system (and virtualization software), database software, and its applications and data.
Iaas
_______, or algorithms or business logic programmed into the application, can be simple or
complex depending on the application Application Logic
Scalability refers to the ability to increase or decrease the capacity of the computing
infrastructure in response to changing capacity needs. True
The simple mail transfer protocol is the least commonly used e-mail standard False
With a client-based network, one fundamental problem is that: All data in the server must
travel to the client for processing.
The application architecture called the distributed computing model uses the "thick" client
approach. False
A _____ is a group of computers linked together so that they appear to act as one computer:
Server Farm
The earliest data communications networks were client server network: False
A(n)______ is the way in which the functions of the application layer software are spread
among the clients and servers in the network: Application Arch
One disadvantage of the ____ architecture is the places a greater load on the network: n-tier
Each server on a network that needs to act as a web server needs an application layer software
package called a (n) ______________. Web Server
True or False: As the demand for more and more network applications grow; host-based
computing becomes the best solution. False
Your typical web browsing scenario where a person using a web browser accesses a web page
from a server on the Internet is a good example of a client-server application architecture.
True
In a two tier client server architecture, a client computer needs to use an application layer
software package called a ______ to send email: mail user agent
________ is a special type of one directional; videoconferencing is which content is sent from
the server to the user. Webcasting
What technique is used by most videoconferencing application to reduce the amount of data
being transmitted: Compression
To get a page from the web, a user must type in a URL, which stands for:
Uniform Resource Locator
The ______ cloud deployment model provides the highest levels of control, privacy and
security: Private
Using the POP standard for client to server e-mail communication, the e-mail messages remain
on the server computer. False
The protocol that makes it possible for macintosh web browser to be able to retrieve a web page
from a Microsoft web server is called the _______ : Hypertext Transfer Protocol
The Standards H320, H323, and MPEG-2 are commonly used with: Videoconferencing
With the two-tier client-server architecture, the client is responsible for the ________ logic.
Data Access
Which is not a general function by any application program? Application access storage.
There are optional and required parts of an HTTP request. They are:
Request line, request header, request body
A "thin client" approach places most of the application logic on the client: False
Chapter 3
What is demultiplexing ?
The process of taking the incoming packet and passing it to the correct socket -> for the process
it is linked to
What is multiplexing ?
The processing of gathering data chunks from different sockets, attaching the appropriate
header information (which is used to demultiplex on the other end) to create segments that are
passed to the network layer
What special fields in a TCP packet identify the appropriate socket to multiplex / demultiplex
through ? The source and destination port numbers
What port range is available for a given host and how are they split up?
There are 16-bits representing all ports on a host, making 65535 ports available. The first 0-
1023 are 'well-known port numbers' and are reserved for common protocols. The rest are free
use
What is pipelining ?
Sending multiple packets before waiting for an acknowledgement of an earlier packet
In Go-Back-N how does the timer operate ? When does it reset ? When does it stop ?
The timer is the time from the oldest received ACK. If an ACK is received but there are still
unacknowledged packets: the timer restarts. If there are no outstanding packets to be
acknowledged: the timer stops.
Why must there be twice as many sequence numbers as there are spots in the window size?
Otherwise there may be overlap causing the receiver to be confused about whether it is
receiving new data or a retransmission of old data
How long does TCP wait before is assumes as sequence number is not possible to be in use in
the system anymore ? 3 minutes
What is MSS ?
Maximum Segment Size - The maximum amount of data that can be placed inside a TCP
segment. Typical MSS is 1460bytes
What is MTU ?
Maximum Transmission Unit - The Length of the largest link-layer frame the can be sent by the
local sending host
What is piggybacking ?
When data is added to an ACK making the packet transmission both function as an ACK and a
SEQ
What are the various TCP States a Host goes through during a transmission?
SYN_SENT - client initiates connection
ESTABLISHED - received SYNACK - sends ACK
FIN_WAIT_1 - client initiates close - sends FIN
FIN_WAIT_2 - receives ACK - sends nothing
TIME_WAIT - receives FIN - sends ACK
CLOSED - wait 30 seconds before entering CLOSED and transmission has terminated
To move data from sending host to recieving host what two network layer functions can be
identified ? Routing and Forwarding
What are the two types of networks that refer to a connection-oriented vs connectionless
network layer? Virtual Circuit and Datagram Network
What happens during Transfer ? Data transfers through the specified set route
How does VC inform the routers about the status / state changes of the connection ?
Signaling Messages and Signaling Protocols
What’s the difference between Virtual Circuits connection and a TCP Connection ?
TCP is only between the two host devices which negotiate how to communicate with each
other. VC though is between all routers along the path who are all aware of the data passing
between them
What makes up a Router ? Input ports, Output Ports, Switching Fabric, Routing Processor
Where are the queue's that overflow and cause packet loss in a router ?
The output port queues
What is a NAT ?
Network Address Translation. Service used by most home routers that creates private IP
numbers so as to supply home networks with IP's for multiple devices. When requests enter and
leave the network NAT is responsible for changing the source IP to the routers IP and the
destination IP to the private IP number.
How does NAT determine Translation values for incoming and outgoing IP'sUsing the NAT
translation table.
It stores the outgoing request's destination IP and port number to refer to when the response
returns to determine who to send the packet to
What are the 2 basic services the Data Link layer provides?
Allows the upper layers to access the media using techniques such as framing
Controls how data is placed onto the media and is received from the media using techniques
such as media access control (MAC) and error detection
List and define the 4 specific terms associated with the Data Link Layer?
Frame - The Data Link layer PDU
Node - The Layer 2 notation for network devices connected to a common medium
Media/medium (physical)* - The physical means for the transfer of information between two
nodes
Network (physical)** - Two or more nodes connected to a common medium
List and define the three elements of a Data Link Layer Frame.
Data - The packet from the Network layer
Header - Contains control information, such addressing, and is located at the beginning of the
PDU
Trailer - Contains control information added to the end of the PDU
What is the most common physical device that is used for the Data Link Layer? NIC
Describe the two sublayers of the Data Link Layer.
The upper sublayer defines the software processes that provide services to the Network layer
protocols.
The lower sublayer defines the media access processes performed by the hardware.
What are the 4 organizations that define the Data Link standards?
International Organization for Standardization (ISO)
Institute of Electrical and Electronics Engineers (IEEE)
American National Standards Institute (ANSI)
International Telecommunication Union (ITU)
What does the method that media access control uses depend on?
Media sharing - If and how the nodes share the media
Topology - How the connection between the nodes appears to the Data Link layer
What are the two basic media access control methods for shared media?
Controlled - Each node has its own time to use the medium
Contention-based - All nodes compete for the use of the medium
What are two examples of controlled media access? Token Ring & FDDI
What are two examples of contention-based media access? Ethernet & Wireless
What is a data collision? When two devices transmit at the same time
Define Full-Duplex.
Both devices can transmit and receive on the media at the same time.
What are the three types of media access control can be used in a multi-access topology?
CSMA/CD, CSMA/CA, or token passing
How does a data flow in a ring network? From node to node until it reaches the destination.
What are the three basic parts of a data link layer frame? Header & Data & Trailer
What are the typical fields in the frame header?
Start Frame field - Indicates the beginning of the frame
Source and Destination address fields - Indicates the source and destination nodes on the media
Priority/Quality of Service field - Indicates a particular type of communication service for
processing
Type field - Indicates the upper layer service contained in the frame
Logical connection control field - Used to establish a logical connection between nodes
Physical link control field - Used to establish the media link
Flow control field - Used to start and stop traffic over the media
Congestion control field - Indicates congestion in the media
Which part the network (WAN/LAN) is the data link address used in delivering? LAN
What is the difference between Data Link Address and Logical Address?
Data Link address only defines the machine it is not logically assigned
Does a point-to-point link need a data link address? No it only has one place to go
How could the CRC be correct and the frame contain errors?
The error bits could cancel each other out