chapter 14

0.0(0)
studied byStudied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/46

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 5:00 PM on 1/26/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

47 Terms

1
New cards

what are protocols

set rules for data transmission which are agreed by the sender and receiver 

2
New cards

what are some features of a protocol stack

Each layer can only accept input from the layer higher or lower than it. A layer may have sub-layers; only the bottom layer is hardware/ has direct access to the hardware, and user interactions occur with the first layer’s protocols in place

3
New cards

what is the files transfer protocol (FTP)

it’s used to transfer files between a client/server over the internet, and its only job is the application protocol for the transfer of files

4
New cards

what is the hypertext transfer protocol (HTTP)

it transfers web pages from the WWW to web servers to clients, it’s in charge of transferring the correct data and it uses client/server protocol

5
New cards

what is a pro of HTTP 

it uses secure addresses that have been encrypted 

6
New cards

what is a client/server protocol 

when request messages are sent to the web server which then responds 

7
New cards

what is the simple mail transfer protocol (SMTP)

It’s text-based and connection based, used when sending emails, and it doesn’t handle binary files; it’s computer-readable only

8
New cards

what extension is needed for binary files

A multi-purpose internet email extension (MIME) for media/images / music 

9
New cards

what is SMTP sometimes known as

a push protocol, a client opens a connection to a server - which is kept active - then the client uploads a new email to the server 

10
New cards

the layers of TCP/IP protocols

the application layer, transport layer, internet/network layer and the data-link layer 

11
New cards

what is post office and internet message access protocol (P0P3 & IMAP)

it’s used when receiving emails from the email server, where mail is held by a remote server until you download it and uses pull protocol 

12
New cards

what is a pull protocol 

when a client connects to a server, checks for downloads and new emails, and then the connection is closed. this is repeated to ensure the client is updated 

13
New cards

how does POP3 work compared to IMAP 

it doesn’t keep the server and client synchronised so when emails are downloaded they are deleted by the server / no longer updates 

14
New cards

how does IMAP work compared to POP3

it’s more recent, keeping the client/ server synchronised as clients download a copy while the server holds the original until the client deletes it 

15
New cards

what is the application layer 

it contains all the programs that exchange data and it sends files to the transport layer. It allows applications to access services used in other layers and defines the protocols that any app uses 

16
New cards

what is the transport layer

It monitors network connections and it’s where data is broken into packets and sent to the internet/ network layer. It ensures packets arrive in sequence and without errors via acknowledgements and retransmission 

17
New cards

what is the internet/ network layer

it identifies the intended network and host

18
New cards

what layers mainly use what protocol

the internet/network layer and the link-data layer’s main protocol is the internet protocol (IP)

19
New cards

what is the network/data-link layer

it encapsulates packets into frames for transmission, maps IP addresses to MAC addresses to ensure correct protocols are followed, and identifies network protocols in the packet header before delivering them to the network

20
New cards

what are MAC addresses

physical addresses

21
New cards

what is the transmission control protocol (TCP)

it’s connection-oriented and responsible for delivering packets safely. It uses retransmission that automatically resends data packets if a positivie acknowledgement isn’t received  

22
New cards

what is TCP sometimes known as and why

a host-to-host transmission protocol because it establishes an end-to-end connection between two host computers using handshakes

23
New cards

what’s a function of the internet protocol (IP)

it adds headers to packets, which include the IP addresses of the sender/ recipient, ensures correct routing of packets, and sends datagrams to the data-link layer

24
New cards

what are ethernet protocols

it’s used to control the movement of frames between devices and to avoid simultaneous transmission. It’s a local protocol

25
New cards

what are wireless protocols

they’re used by wireless LANs. One is a MAC protocol called CSMA/CA which ensures the security and integrity of data being sent over a wireless network

26
New cards

what is the BitTorrent protocol

a protocol based on the P2P networking concept, it’s the most used protocol because it allows files to be shared quickly/ directly to other user computers rather than a web server 

27
New cards

what’s the difference between P2P file sharing and BitTorrent protocol 

P2P is better for a small number of computers while BitTorrent can be used by thousands of users who connect together over the internet 

28
New cards

how does the BitTorrent protocol work 

a bitTorrent client saves a .torrent file and contacts a tracker specified in the file. Once connected the client downloads bits of the file in small pieces and uploads the data to other bitTorrent clients in the swarm. Each downloader contributes upload bandwidth to other downloads, letting the torrent stay fast

29
New cards

what is a swarm

a group of peers

30
New cards

what is a seed

a peer that downloads a file and makes it available to other peers in the swarm

31
New cards

what’s a tracker

a central server that stores details about other computers that make up the swarm , allowing peers to locate each other

32
New cards

what is a leech

a peer that has a neg impact on the swarm by downloading more than they are uploading 

33
New cards

what is a lurker

a peer that downloads files but doesn’t make any new content

34
New cards

when is circuit switching used

PTSN

35
New cards

how does circuit switching work 

a dedicated channel is established, data transfer takes place, and once complete, the connection is terminated. 

36
New cards

what are some pros of circuit switching

Data transfer is quicker than it is with packet switching, frames arrive in the same order they were sent, a packet of data can’t get lost because all follow the same sequence along a singular route, and it works better for real-time applications

37
New cards

what are some cons of circuit switching

It has to use a single/dedicated line and will send empty frames (not flexible). No one else can connect to the channel, even when it’s idle. If there’s a failure on the dedicated line, there’s no alternative routing. Establishing the link can take a while, and it charges users based on distance and duration of connection 

38
New cards

when is circuit switching best used

for voice communication that requires real-time services without much delay 

39
New cards

where is packet switching used 

VoIP

40
New cards

what is packet switching 

when a message is broken up into several packets that can be sent independently before being reassembled at the destination. It doesn’t need to establish a connection and it's available to many but may lead to congestion in the network

41
New cards

what are the pros of packet switiching

doesn’t tie up the communication line, can re-route if the line fails or is faulty, easy to expand traffic usage, only charges users for duration of connection, and uses digital  networks so digital data is transmitted directly to destination 

42
New cards

what are the cons of packet switching 

Protocols can be more complicated than circuit switching, if a packet is lost the user must re-send which wastes time, it doesn’t work well with real-time data streams, it needs a large amount of RAM when handling large data and there are delays when packets need to reassemble 

43
New cards

when is packet switching best used

for data and voice applications that require non-real-time scenarios

44
New cards

what may occur when transmitting packets to routers

They may get lost and stuck in a loop from bouncing from one router to the next, overtime this would clog the system. To overcome this, hopping is used

45
New cards

what is hopping

when a hop number is added to the header of each data packet. Everytime a router is passed this number is decreased, and when it’s 0, it will be deleted at the next router.

46
New cards

what is the function of a router

it examines the packet header, reads the IP address of destination and decides the best route/ sends the packets on its next hop

47
New cards

what are some different ways packets are called

segments at the transport layer, datagrams at the internet layer, and frames at the data-link layer