CPSC 353 Final

0.0(0)
studied byStudied by 1 person
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/326

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

327 Terms

1
New cards

Propagation delay (time) is the ratio of ______________________.

distance to propagation speed

2
New cards

The source port number on the UDP user datagram header defines _______.

the process running on the sending computer

3
New cards

The application layer in the TCP/IP protocol suite is usually considered to be the combination of ________ layers in the OSI model

application, presentation, and session

4
New cards

In TCP, the size of the send window is the ________ of rwnd and cwnd.

minimum

5
New cards

Ethernet provides which of the following services to the network layer

error detection

6
New cards

_______ is (are) a channelization protocol.

All the choices are correct. (FDMA, TDMA, CDMA)

7
New cards

The stop-and-wait protocol is highly inefficient when

when there is a large distance between source and destination and the transmission rate is high

8
New cards

How many devices are estimated to be connected to the Internet by 2020

25 billion

9
New cards

Internet Standards are developed by

The Internet Engineering Task Force (IETF)

10
New cards

Traditional Telephone Networks use

circuit switching

11
New cards

Geostationary satellites have a propagation delay of __________ milliseconds

280

12
New cards

The terms "host" and "end system" mean the same thing

True

13
New cards

The acronym "LTE" stands for

Long Term Evolution

14
New cards

The Internet uses

packet switching

15
New cards

The cabling commonly used for computer networks switching a building is

Unshielded Twisted Pair

16
New cards

Transmission Delay is the amount of time a packet traveling on the wire between the source and destination.

False

17
New cards

Processing Delay is the length of time a packet must wait at a router before it is transmitted

False

18
New cards

The amount of time required for a host to push out a packet is the

Transmission Delay

19
New cards

In the TCP/IP protocol suite, which of the following is an application layer protocol?

The Hypertext Transfer Protocol (HTTP)

20
New cards

In the TCP/IP protocol suite, which of the following is a transport layer protocol?

The Transmission Control Protocol (TCP)

21
New cards

In the TCP/IP protocol suite, which of the following is a network layer protocol?

The Internet Protocol (IP)

22
New cards

The most popular social network in China is

WeChat

23
New cards

Which of the following is NOT a type of Denial-of-Service (DoS) Attack?

Phishing Attack

24
New cards

Packet Switching was developed between

1961 and 1972

25
New cards

Malware that require some form of user interaction to infect a user's device are called

Viruses

26
New cards

Malware that can enter a device without any explicit user interaction are called

Worms

27
New cards

_______ was formed to connect universities with no access to ARPAnet.

CSNET

28
New cards

Internet standards are developed by

The Internet Engineering Task Force

29
New cards

In TCP/IP, a logical connection between an entity at the link layer can be made with another entity at the ________ layer.

link

30
New cards

The Internet provides its applications two types of services, a TDM service and a FDM service.

False

31
New cards

In the TCP/IP protocol suite, the physical layer is concerned with the movement of _______ over the physical medium.

individual bits

32
New cards

With a residential DSL service, each subscriber gets more downstream bandwidth than upstream bandwidth.

True

33
New cards

In TCP/IP, a transport layer segment is encapsulated in a packet at the ________ layer.

network

34
New cards

The _________ layer is responsible for the delivery of a message from one process to another.

transport

35
New cards

Propagation delay is the amount of time it takes to push all of a packets bits into the link

False

36
New cards

A local area network (LAN) is _______________.

a wired network using Ethernet

37
New cards

The TCP protocol provides timing guarantees.

False

38
New cards

One of the most compelling features of client-server architectures is their self-scalability

False

39
New cards

Choose the protocols that use the client-server paradigm (give two answers by reponding twice)

HTTP (HyperText Transfer Protocol)

FTP (file transfer protocol)

40
New cards

In a client-server paradigm, a _______ program provides services to a (another) _______ program

server; client

41
New cards

A process sends messages into, and receives messages from, the network through a software interface called a __________

socket

42
New cards

In a client-server paradigm

the server must be running all the time but the client needs to be running only when it is needed.

43
New cards

Choose the protocols that use the peer-to-peer paradigm

BitTorrent

Skype

44
New cards

An HTTP server maintains no information about its clients

True

45
New cards

HTTP can use both persistent and non-persistent connections

True

46
New cards

HTTP uses TCP as its underlying transport layer protocol

True

47
New cards

Each line in an HTTP request message, before the entity body, is terminated with

An ASCII 13 character followed by an ASCII 10 character

48
New cards

The HTTP protocol is stateless, but a web server can identify users by using

cookies

49
New cards

SMTP is primarily a __________ protocol.

push

50
New cards

When an SMTP connection is established, the first message is passed

from the client to the server

51
New cards

The components of the Internet mail system include:

user agents

mail servers

the Simple Mail Transfer Protocol

all of the above

all of the above

52
New cards

The standard port for connecting to an SMTP server is

25

53
New cards

SMTP restricts the body of all mail messages to simple 7-bit ASCII

True

54
New cards

To close an SMTP session, the client will send the message _________ to the server

QUIT

55
New cards

___________ is more efficient over a low-bandwidth connection

POP3

56
New cards

The main purpose of DNS is to translate IP addresses into host names

False

57
New cards

A host with a complicated hostname can have one or more alias names. The real hostname is said to be a _____________ hostname

canonical

58
New cards

The number or root name servers in the world is about

400

59
New cards

DNS can use a combination of Iterative Queries and Recursive Queries

True

60
New cards

The DNS protocol runs primarily over _ and uses port ___

UDP; 53

61
New cards

The "com" Top Level Domain servers are maintained by

Verisign

62
New cards

Choose the best answer:

The DNS is a distributed database implemented in a hierarchy of DNS servers

The DNS is an application layer protocol that allows hosts to query the distributed database

The DNS servers are often UNIX machines running the Berkeley Internet Name Domain (BIND) software.

All of the above

All of the above

63
New cards

The unchoked peers are the ________ peers from which a BitTorrent client is receiving data at the highest rate.

four

64
New cards

Compressed Internet video typically ranges from ____ kbps for low-quality video to ___ Mbps for streaming high-definition movies

100, 3

65
New cards

The two typical server placement philosophies adopted by Content Distribution Networks are ___ and ___

enter deep, bring home

66
New cards

The collection of all BitTorrent peers participating in the distribution of a particular file is called a

torrent

67
New cards

When a peer joins a torrent, it registers itself with an infrastructure node called a ___________ and periodically informs this node that it is still in the torrent.

tracker

68
New cards

It is possible for a mail client to send e-mail messages over HTTP rather than SMTP.

True

69
New cards

An e-mail message contains a ________ and a __________.

header; body

70
New cards

In BitTorrent, a peer's instantaneous download rate can never exceed its instantaneous upload rate.

False

71
New cards

The Date: header in the HTTP response message indicates when the object in the response was last modified.

False

72
New cards

Skype relay nodes are typically peers under the control of Skype users.

True

73
New cards

A _______ server is a computer that, when it receives a DNS reply, temporarily stores the mapping in its local memory.

caching

74
New cards

A registrar, a commercial entity accredited by ________, verifies the uniqueness of a domain name request and enters the domain into the DNS database.

ICANN

75
New cards

In the domain name space, a full domain name is a sequence of labels separated by ________.

Dots

76
New cards

A server that holds the publicly accessible DNS records that map the names of an organizations publicly accessible hosts to their IP addresses is called a ___________ server

Authoritative DNS

77
New cards

The first section of a URL identifier is the __________.

protocol

78
New cards

A message access protocol is a ________ protocol.

pull

79
New cards

Congestion control is provided by

TCP

80
New cards

Transport layer packets are known as tranport layer _____________ in Internet terminology

segments

81
New cards

TCP provides ___________ service to the invoking application

reliable, connection-oriented

82
New cards

The job of delivering the data in a transport-layer segment to the correct socket is called multiplexing

False

83
New cards

A transport layer protocol provides logical communication between

processes

84
New cards

Web servers can use one process for multiple client connections.

True

85
New cards

The port numbers from 0 to _____ are called well-known port numbers

1023

86
New cards

The job of gathering data chunks at the source host from different sockets, encapsulating each data chunk with header information to create segments, and passing the segments to the network layer is called _____________________

multiplexing

87
New cards

The UDP header has _____ fields

four

88
New cards

UDP provides finer application-level control over what data is sent, and when, than TCP

True

89
New cards

A reliable transport protocol is always preferable to an unreliable one.

False

90
New cards

UDP (User Datagram Protoc) provides ___________ service to the invoking application

unreliable, connectionless

91
New cards

A port number is _______ bits long.

16

92
New cards

Pipelining requires which of the following:

transmitting many packets before receiving acknowledgements

unique sequence numbers for each in-transit packet

sender-side buffering of unacknowledged packets

all of the above

all of the above

93
New cards

GBN stands for __________

Go Back N

94
New cards

An ARQ protocol requires:

Error detection

Receiver Feedback

Retransmission

All of the above

All of the above

95
New cards

A solution to the problem of duplicate packets is to add a new field to the data packet and have the sender number its data packets by putting a __________ number into this field

sequence

96
New cards

To handle the presence of bit errors, an ARQ protocol requires:

Error detection

Receiver feedback

Retransmission

All of the above

All of the above

97
New cards

TCP uses _________________ to check the safe and sound arrival of data.

an acknowledgment mechanism

98
New cards

A TCP connection provides __________ duplex service

full

99
New cards

There are _____ bits in the TCP sequence number field

32

100
New cards

The __________ state in Reno TCP is a state somehow between the slow start and the congestion avoidance states.

congestion recovery

congestion detection

slow recovery

None of the choices are correct

None of the choices are correct