IT-215 Course Study Material: Key Concepts in Computer Networking

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall with Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/83

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No study sessions yet.

84 Terms

1
New cards

In client/server processing, processing is done on the ________.

Neither client nor server

server

client

Both client and server

Both client and server

2
New cards

In P2P applications, most processing is done on the ________.

client (Who plays sometimes as a server!)

3
New cards

Peer-to-peer (P2P) applications

Clients provide service to each other.

- Made possible by growing PC processing power.

4
New cards

Cloud Computing

Resources are outsourced to a provider who is accessed entirely via a network.

- Users only need a PC or other intelligent device.

- Company does not need to maintain servers or applications.

5
New cards

kilobits per second (KBps)

1,000 bps

6
New cards

megabits per second (MBps)

1,000,000 bps

7
New cards

gigabits per second (GBps)

1,000,000,000 bps

8
New cards

Terabits per second (Tbps)

1,000,000,000,000 bps

9
New cards

47,000,000 bps is ________.

47 Mbps

10
New cards

Which of the following uses packet switching?

Neither Dial-up telephone circuits nor Leased line circuits

11
New cards

Breaking down a message into many packets is done on the _______ while the reassembly of packets into a message is done on the _______.

source host, destination host

12
New cards

A ________ is the path that a packet takes across a single switched network and its src and dst physical addresses stay unchanged.

data link

13
New cards

When a packet passes through seven switches between the source and destination hosts (no routers), the number of physical links is ______, while the number of data links is ____.

Eight, One

14
New cards

If two hosts are separated by seven networks, how many packets will there be along the way when a host transmits a packet to another host?

1.

15
New cards

How many data links will there be if a frame passes from a computer through two switches, then through a router, then through two more switches, and then to the destination computer?

Two

16
New cards

In binary, the decimal 13 is equivalent to 1101. What is 14?

1110

17
New cards

Inside a computer, data is represented as

Binary

18
New cards

____________ data sent in discrete "chunks" (packets); each has a path chosen for it.

Packet Switching

19
New cards

Frequency division multiplexing (FDM) is an example of sharing bandwidth under

Circuit Switching

20
New cards

Any home TV must be a " Network Host" ?

False

21
New cards

You need to store your "Data" on a remote server to be able to access it from any place in the world. You are using "Cloud Computing" for your data.

false

22
New cards

A network is a system that permits networked applications on different hosts to work together.

True

23
New cards

Which of the following has greater resistance to transmission errors

Binary signaling.

24
New cards

For bursty data, packet switching is desirable because it ________.

makes transmission more efficient

25
New cards

Packets are carried inside frames.

True

26
New cards

Which standard places packets that arrive out of order in order?

TCP

27
New cards

Ethernet addresses are ________.

48 bits long

28
New cards

Messages (segments, packets or frames) always have data fields.

False

29
New cards

Which of the following have explicit openings and closings?

Connection-oriented protools(TCP)

30
New cards

An 8-bit field can represent ________ alternatives.

256

31
New cards

After the internet "Network" layer process does encapsulation, it passes the IP packet to the ________ layer process.

data link

32
New cards

After the side wishing to close a TCP connection sends a FIN message, it will

only send ACK segments

33
New cards

An HTTP message is encapsulated at the transport layer to become a TCP _____, which in turn is encapsulated at the internet layer to become an IP_____ , which in turn it's encapsulated at the data link layer to become an Ethernet _____.

Segment, Packet Frame

34
New cards

B7-22-DD-6F-C8-AB is a/an ________ address.

Ethernet

35
New cards

Converting application messages (consist of characters) into bits is called ________.

encoding

36
New cards

IP version 6 addresses are ________.

128 bits long

37
New cards

Ethernet detects errors but does not correct them. Therefore, Ethernet is reliable.

False

38
New cards

Headers usually are divided into fields.

True

39
New cards

Host P transmits a SYN to Host Q. If host Q is willing to open the connection, it will transmit a/an ________ segment.

SYN, ACK

40
New cards

How a message is organized is its ________.

syntax

41
New cards

How long are IP (version 4) addresses?

32 bits.

42
New cards

If the destination host receives a segment that is incorrect, it will

it will typically discard the segment and wait for retransmission

43
New cards

(TCP)If the destination host receives a segment that is incorrect, it will

prompting the sender to retransmit the data after a timeout or upon receiving duplicate acknowledgments for the previous segment.

44
New cards

Transport port fields are found in

Both UDP headers and TCP headers

45
New cards

MAC Addresses are ______________octets (bytes).

6

46
New cards

The tool used for network protocol analyzer is called ______________.

Wireshark

47
New cards

The meaning of a message is referred to as the message's ________.

semantics

48
New cards

What is (are) the well-known port number(s) for FTP?

20 and 21.

49
New cards

UDP checks messages for errors but does not correct them. UDP is ________.

unreliable

50
New cards

Which layer process does NOT do encapsulation when an application layer process transmits a message?

Physical.

51
New cards

________ is placing a message in the data field of another message.

Encapsulation

52
New cards

Routing

he route taken by packets from source to destination (involvesall routers)

53
New cards

Forwarding

(aka Switching): the movement of packets from an input interface to an appropriate output interface (involves a single router)

54
New cards

Application-layer protocols

define when and how messages are sent

55
New cards

Network-layer protocols

deliver data from one end-system to another. on every end-system and router

56
New cards

Transport-layer protocols

deliver data between processes on different end-systems. only on end systems

57
New cards

Buffering

required when data grams arrive from fabric faster than the transmission rate

58
New cards

Scheduling discipline

chooses among queued datagrams for transmission

59
New cards

Queuing

if data grams arrive faster than forwarding rate into switch fabric

60
New cards

IP: Internet Protocol (version 4):

transfer IP packets from one host to another. One of the most common protocols today. This is what the Internet is built around.

61
New cards

IPv6: Internet Protocol (version 6)

62
New cards

ICMP: Internet Control Message Protocol (version 4)

This is a protocol toreport common errors and events in the IP, TCP and UDP protocols.

63
New cards

ICMPv6: Internet Control Message Protocol (version 6):

This is a protocolto report common errors and events in the IPv6, TCP and UDP protocols.

64
New cards

IGMP

IP multicasting

65
New cards

HTTP

is connectionless.- Every request-response cycle is independent.

66
New cards

TCP

is connection-oriented.- There is a formal opening of the connection.- Within the connection, messages are sequenced,acknowledged, and retransmitted if necessary.- There is a formal closing of the connection.8

67
New cards

Field lengths may be measured in

bits or bytes

68
New cards

Another name for byte is

octet

69
New cards

MAC addresses

48 bits

70
New cards

Data Field (dozens, hundreds, or thousands of bits)

Often contains a TCP segment

71
New cards

What does the IP packet never have?

Trailer

72
New cards

Where are trailers found?

Layer 2 frames

73
New cards

Do all Layer 2 frames have trailers?

No, many Layer 2 frames do not have trailers

74
New cards

The trailer contains

Frame Check Sequence field for error detection.

75
New cards

IP address

32-bit identifier for host or router interface

76
New cards

Interface

connection betweenhost or router and a physicallink

77
New cards

IP addresses are associated with an

interface, not the host or router

78
New cards

A network (subnet)

the set of hosts reachable without having to traverse a router

79
New cards

Netmask

32-bit number to identify which bits are network prefix inthe IP address

80
New cards

Physical Layer

•Is the physical connection between the sender and the receiver.

•It includes all the hardware devices (computers, modems, and hubs) and physical media (cables and satellites).

•This layer specifies the type of connection and the electrical signals, radio waves, or light pulses that pass through it.

81
New cards

Data Link Layer

•Is responsible for moving a message from one computer to the next computer in the network path from the sender to the receiver. This layer has 3 functions:

-Control the physical layer by deciding when to transmit messages over the media.

-Format the messages by indicating where they start and end.

-Detects and corrects any errors that have occurred during transmission.

82
New cards

Network Layer

-Routing, selecting the next computer to which the message should be sent.

-

-Find the address of that computer if it doesn't already know it.

83
New cards

Transport Layer

-It is responsible for linking the application layer software to the network and establishing end-to-end connections between the sender and receiver when such connections are needed.

-

-It breaks long messages into several smaller messages to make them easier to transmit.

-

-Detect lost messages and request that they be resent.

84
New cards

Application Layer

-This is the application software used by the network user.

-With this layer the user defines what messages are sent over the network.

-Examples of this layer are the internet explorer and web pages.