1/326
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Propagation delay (time) is the ratio of ______________________.
distance to propagation speed
The source port number on the UDP user datagram header defines _______.
the process running on the sending computer
The application layer in the TCP/IP protocol suite is usually considered to be the combination of ________ layers in the OSI model
application, presentation, and session
In TCP, the size of the send window is the ________ of rwnd and cwnd.
minimum
Ethernet provides which of the following services to the network layer
error detection
_______ is (are) a channelization protocol.
All the choices are correct. (FDMA, TDMA, CDMA)
The stop-and-wait protocol is highly inefficient when
when there is a large distance between source and destination and the transmission rate is high
How many devices are estimated to be connected to the Internet by 2020
25 billion
Internet Standards are developed by
The Internet Engineering Task Force (IETF)
Traditional Telephone Networks use
circuit switching
Geostationary satellites have a propagation delay of __________ milliseconds
280
The terms "host" and "end system" mean the same thing
True
The acronym "LTE" stands for
Long Term Evolution
The Internet uses
packet switching
The cabling commonly used for computer networks switching a building is
Unshielded Twisted Pair
Transmission Delay is the amount of time a packet traveling on the wire between the source and destination.
False
Processing Delay is the length of time a packet must wait at a router before it is transmitted
False
The amount of time required for a host to push out a packet is the
Transmission Delay
In the TCP/IP protocol suite, which of the following is an application layer protocol?
The Hypertext Transfer Protocol (HTTP)
In the TCP/IP protocol suite, which of the following is a transport layer protocol?
The Transmission Control Protocol (TCP)
In the TCP/IP protocol suite, which of the following is a network layer protocol?
The Internet Protocol (IP)
The most popular social network in China is
Which of the following is NOT a type of Denial-of-Service (DoS) Attack?
Phishing Attack
Packet Switching was developed between
1961 and 1972
Malware that require some form of user interaction to infect a user's device are called
Viruses
Malware that can enter a device without any explicit user interaction are called
Worms
_______ was formed to connect universities with no access to ARPAnet.
CSNET
Internet standards are developed by
The Internet Engineering Task Force
In TCP/IP, a logical connection between an entity at the link layer can be made with another entity at the ________ layer.
link
The Internet provides its applications two types of services, a TDM service and a FDM service.
False
In the TCP/IP protocol suite, the physical layer is concerned with the movement of _______ over the physical medium.
individual bits
With a residential DSL service, each subscriber gets more downstream bandwidth than upstream bandwidth.
True
In TCP/IP, a transport layer segment is encapsulated in a packet at the ________ layer.
network
The _________ layer is responsible for the delivery of a message from one process to another.
transport
Propagation delay is the amount of time it takes to push all of a packets bits into the link
False
A local area network (LAN) is _______________.
a wired network using Ethernet
The TCP protocol provides timing guarantees.
False
One of the most compelling features of client-server architectures is their self-scalability
False
Choose the protocols that use the client-server paradigm (give two answers by reponding twice)
HTTP (HyperText Transfer Protocol)
FTP (file transfer protocol)
In a client-server paradigm, a _______ program provides services to a (another) _______ program
server; client
A process sends messages into, and receives messages from, the network through a software interface called a __________
socket
In a client-server paradigm
the server must be running all the time but the client needs to be running only when it is needed.
Choose the protocols that use the peer-to-peer paradigm
BitTorrent
Skype
An HTTP server maintains no information about its clients
True
HTTP can use both persistent and non-persistent connections
True
HTTP uses TCP as its underlying transport layer protocol
True
Each line in an HTTP request message, before the entity body, is terminated with
An ASCII 13 character followed by an ASCII 10 character
The HTTP protocol is stateless, but a web server can identify users by using
cookies
SMTP is primarily a __________ protocol.
push
When an SMTP connection is established, the first message is passed
from the client to the server
The components of the Internet mail system include:
user agents
mail servers
the Simple Mail Transfer Protocol
all of the above
all of the above
The standard port for connecting to an SMTP server is
25
SMTP restricts the body of all mail messages to simple 7-bit ASCII
True
To close an SMTP session, the client will send the message _________ to the server
QUIT
___________ is more efficient over a low-bandwidth connection
POP3
The main purpose of DNS is to translate IP addresses into host names
False
A host with a complicated hostname can have one or more alias names. The real hostname is said to be a _____________ hostname
canonical
The number or root name servers in the world is about
400
DNS can use a combination of Iterative Queries and Recursive Queries
True
The DNS protocol runs primarily over _ and uses port ___
UDP; 53
The "com" Top Level Domain servers are maintained by
Verisign
Choose the best answer:
The DNS is a distributed database implemented in a hierarchy of DNS servers
The DNS is an application layer protocol that allows hosts to query the distributed database
The DNS servers are often UNIX machines running the Berkeley Internet Name Domain (BIND) software.
All of the above
All of the above
The unchoked peers are the ________ peers from which a BitTorrent client is receiving data at the highest rate.
four
Compressed Internet video typically ranges from ____ kbps for low-quality video to ___ Mbps for streaming high-definition movies
100, 3
The two typical server placement philosophies adopted by Content Distribution Networks are ___ and ___
enter deep, bring home
The collection of all BitTorrent peers participating in the distribution of a particular file is called a
torrent
When a peer joins a torrent, it registers itself with an infrastructure node called a ___________ and periodically informs this node that it is still in the torrent.
tracker
It is possible for a mail client to send e-mail messages over HTTP rather than SMTP.
True
An e-mail message contains a ________ and a __________.
header; body
In BitTorrent, a peer's instantaneous download rate can never exceed its instantaneous upload rate.
False
The Date: header in the HTTP response message indicates when the object in the response was last modified.
False
Skype relay nodes are typically peers under the control of Skype users.
True
A _______ server is a computer that, when it receives a DNS reply, temporarily stores the mapping in its local memory.
caching
A registrar, a commercial entity accredited by ________, verifies the uniqueness of a domain name request and enters the domain into the DNS database.
ICANN
In the domain name space, a full domain name is a sequence of labels separated by ________.
Dots
A server that holds the publicly accessible DNS records that map the names of an organizations publicly accessible hosts to their IP addresses is called a ___________ server
Authoritative DNS
The first section of a URL identifier is the __________.
protocol
A message access protocol is a ________ protocol.
pull
Congestion control is provided by
TCP
Transport layer packets are known as tranport layer _____________ in Internet terminology
segments
TCP provides ___________ service to the invoking application
reliable, connection-oriented
The job of delivering the data in a transport-layer segment to the correct socket is called multiplexing
False
A transport layer protocol provides logical communication between
processes
Web servers can use one process for multiple client connections.
True
The port numbers from 0 to _____ are called well-known port numbers
1023
The job of gathering data chunks at the source host from different sockets, encapsulating each data chunk with header information to create segments, and passing the segments to the network layer is called _____________________
multiplexing
The UDP header has _____ fields
four
UDP provides finer application-level control over what data is sent, and when, than TCP
True
A reliable transport protocol is always preferable to an unreliable one.
False
UDP (User Datagram Protoc) provides ___________ service to the invoking application
unreliable, connectionless
A port number is _______ bits long.
16
Pipelining requires which of the following:
transmitting many packets before receiving acknowledgements
unique sequence numbers for each in-transit packet
sender-side buffering of unacknowledged packets
all of the above
all of the above
GBN stands for __________
Go Back N
An ARQ protocol requires:
Error detection
Receiver Feedback
Retransmission
All of the above
All of the above
A solution to the problem of duplicate packets is to add a new field to the data packet and have the sender number its data packets by putting a __________ number into this field
sequence
To handle the presence of bit errors, an ARQ protocol requires:
Error detection
Receiver feedback
Retransmission
All of the above
All of the above
TCP uses _________________ to check the safe and sound arrival of data.
an acknowledgment mechanism
A TCP connection provides __________ duplex service
full
There are _____ bits in the TCP sequence number field
32
The __________ state in Reno TCP is a state somehow between the slow start and the congestion avoidance states.
congestion recovery
congestion detection
slow recovery
None of the choices are correct
None of the choices are correct