CMSC 204 Final Exam

5.0(1)
studied byStudied by 8 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/94

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

95 Terms

1
New cards

What is a VLAN?

A virtual local area network (VLAN) is a LAN configured by software, not by physical wiring. Advantages include a cost (less hardware) and time (easy to switch membership) reduction, creating virtual work groups, and security.

2
New cards

What are the three ways VLANS can be configured?

Manually - Use software to manually assign someone to a group, and change someone from one group to another

Semiautomatically - Typically initializing is done manually and migrations done automatically

Automatically - Devices automatically connect or disconnect from aa VLAN using criteria defined by the administrator

Switches communicate the VLAN using tables (table maintenance), frame tagging, and time-division-multiplexing

3
New cards

What algorithm can be used to eliminate looping problems in a set of switches?

Spanning tree algorithm - find the shortest path from the root to every other device and block all other paths to that device

4
New cards

How is membership in a VLAN determined (3 ways)?

Interface numbers - Switch interface numbers (i.e. stations connecting to ports 1, 5, and 8 are all in one VLAN and 2, 3, 4, 6, 7 are a different VLAN)

MAC addresses

Combination

5
New cards

What impacts the performance of a network?

Delay

Throughput - the number of bits passing through the point in a second

Packet Loss

Congestion Control - improves performance

6
New cards

What are the four types of delay?

Transmission - can’t send a packet instantaneously, putting the packet on the line

Propagation - time it takes for a bit to travel form point A to point B

Processing - receive from input port, remove header, error detection, deliver to output port

Queuing - waiting

7
New cards

How is an IPv4 address normally represented in dotted-decimal notation?

Dotted-decimal notation is base 265 and it takes 8 bits and turns it into one number (0-255) (4 numbers total)

8
New cards

How many classes is IPv4 addressing divided into in classful addressing?

5 class - A, B, C, D, E

D is for multicast and E is reserved for future use

9
New cards

What is DHCP?  What layer do we find DHCP?  What services does DHCP use?

Dynamic Host Control Protocol (DHCP) is a protocol the automatically provides a device using internet protocol with an IP address. DHCP is considered an application layer protocol, and uses services such as DSN and any communication protocols based on UDP or TCP.

10
New cards

What is NAT?  What is ICMP? What layer do these protocols operate in?

Network Address Translation (NAT) maps multiple private IP addresses in a network to one public IP address. Internet Control Message Protocol (ICMP) compensates for IPv4’s lack of error reporting and correcting mechanisms. They operate at the network layer.

11
New cards

Is IP connection-oriented or connectionless, reliable or unreliable?

IP is a unreliable connectionless protocol

12
New cards

What is an IPv6 address?  How many bits long?  How many octets?

IPv6 allows for more addresses because they are 128 bits or 16 bytes (octets) long.

13
New cards

How many bits is a MAC address?

48 bits long

14
New cards

What are the services of the network layer (7)?

Packetizing - Encapsulating and decapsulating the payload in a network layer packet

Routing - Routing and forwarding

Error control - Can be implemented at this layer, but is inefficient

Flow control - Regulates the amount of data a source 

Congestion control - Rate of traffic from the sender to the network

Quality of Service - Mostly implemented in the upper layer

Security

15
New cards

What are the differences between IPv4 and IPv6?

Different options (no record route, no timestamp, source route calls source rout extension header, fragmentations fields in the base header moved to fragmentation extension header new authentication extension header, new encrypted security payload extension header)

IPv6 has only ICMP, no other things

16
New cards

What methods are used while the world is switching from IPv4 to IPv6?

Dual Stack - Run IPv4 and IPv6 simultaneously

Tunneling - IPv6 packet is encapsulated in and IPv4 packet to get through a section of IPv4 internet

Header Translation - IPv6 header converted to IPv4 header

17
New cards

What is distance-vector routing?

Each node creates a least-cost tree with immediate neighbors, exchange incomplete trees with neighbors to make the trees more complete, a router constantly tells all of its neighbors what it knows about the whole internet (a table of the least-cost from one node to every other node)

18
New cards

What is path-vector routing?

Can avoid certain nodes, using a spanning tree created with the help of its neighbors

19
New cards

What is link-state routing?

The costs associated with an edge defines the state of the link, no direct link means infinity

20
New cards

What is RIP?

Routing Information Protocol (RIP) - intradomain based on distance-vector routing, advertises the cost of reaching different networks (not hosts within the network), uses the services of UDP (port 520),  runs at the application layer but creates forwarding tables for IP at the network layer

21
New cards

What is OSPF?

Open Shortest Path First (OSPF) - intradomain  based on link-state routing, cost calculated from the source router to the destination network but each link can be assigned a weight (based on throughput, round-trip time, reliability, and so on)

22
New cards

What is BGP?

Border Gateway Protocol (BGD) - only interdomain routing protocol used in the Internet today, based on path-vector routing

23
New cards

What is he difference between unicast, multicast and broadcast traffic?

Unicast - One-to-one, each router in the path of the datagram tries to forward the packet to one and only one of its interfaces

Multicast - One-to-many, (sent to multiple interfaces if there are group members in those inerfaces)

Broadcast - One-to-all, sent to every inbterface

24
New cards

What is the primary role of the transport layer?

Provide process-to-process communication between two application layers

25
New cards

What is the client-server model?

A process on the local host (client) needs services from a process usually on the remote host (server)

26
New cards

What is multiplexing/demultiplexing?

Multiplexing - many to one

Demultiplexing - one to many

27
New cards

What is encapsulation/decapsulation?

Encapsulation - occurs at sender cite

Decapsulation - occurs at receiver site

28
New cards

What is pulling/pushing?

Pulling - when the producer delivers an item after the consumer has requested it

Pushing - delivering an item when ever it is produced with out a prior request from the consumer

29
New cards

What is UDP?

User Datagram Protocol (UDP) is an unreliable connectionless transport-layer protocol used for its simplicity and efficiency in applications where error control can be provided by the application-layer process

30
New cards

What is TCP?

Transmission Control Protocol (TCP) is a reliable connection-oriented protocol that can be used in any application where reliability is important

31
New cards

Is TCP simplex, half-duplex or full-duplex?

Full-duplex

32
New cards

What is congestion on a network?  How is it kept in check? 

Congestion occurs when the sender says more packets than the receiver can handle. This is kept in check using different congestion control methods, including sending and receiving windows. Timeout timers and three duplicate ACKs alert to congestion.

33
New cards

What are errors on a network, how are the managed?

Errors occur when packets arrive out of order, or they are duplicated or lost in transmission. Checksum and acknowledgements are used. Lost segments are retransmitted, out-of-order segments are stored in a queue

34
New cards

What is a connectionless service?

There is no relation between chunks of data

35
New cards

What is connection-oriented service?

The client and the server first need to establish a logical connection between themselves. The data exchange can only happen after the connection establishment.

36
New cards

What is the client-server paradigm?

Traditional paradigm, server process runs continuously, waiting for the client process to make a connection and ask for service

37
New cards

HTTP uses what type of services?

HTTP is a client-server protocol, and the client typically uses TCP.

38
New cards

What is a persistent connection?

There server maintains the connection even after the data is sent.

39
New cards

What are the key components of an e-mail?

There is first an envelope, then the message that consists of a header and the body

40
New cards

What are the key components of an e-mail address?

Mailbox address of the recipient and the domain name of the mail server

41
New cards

What is MIME?

Multipurpose Mail Extension (MIME) - allows email to send non-ASCII data

42
New cards

SMTP is push, pull, push and pull?

Push

43
New cards

What is TELNET?

TELNET allows a user on one computer to long in remotely to another computer.

44
New cards

What server has authority over a name space?

DNS servers

45
New cards

What type of abbreviations are used for country domains?

Typically two or three letters (us, fr, uk, ect.)

46
New cards

What are the primary forms of peer-to-peer networks?

Centralized networks - directory uses the client-server paradigm, storing and downloading of the files are done using the peer-to-peer paradigm (Napster)

Decentralized network - doesn’t depend on a centralized directory system (BitTorrent)

47
New cards

What is HTTP?

HyperText Transfer Protocol (HTTP), defines how the client-server programs can be written to retrieve web pages from the Web

48
New cards

What is HTTPS?

HTTP run over the Secure Socket Layer (SSL), provides confidentiality, client and server authentication, and data integrity

49
New cards

What is FTP?

File Transfer Protocol (FTP), standard protocol provided by TCP/IP for copying a file from one host to another

50
New cards

What is DNS?

Domain Name System (DNS), directory system that can map a name to an address

51
New cards

What is the difference between lossless and lossy compression?

Lossless - integrity of the data is preserved because the compression and decompression algorithms are exact inverses of each other, no part of the data is lost in the process (text)

Lossy - Sacrifice some accuracy to increase the compression rate, some data is lost in the process (images, video, audio)

52
New cards

What is the difference between streaming live and streaming stored video?

Stored video - files are compressed and stored on a server, the client downloads the files through the internet

Streaming - User listens to a broadcast audio and video through the internet.

53
New cards

What application layer protocol manages a multimedia session?

Session Initiation Protocol (SIP)

54
New cards

What is H.323?

H.323 - allows public telephone networks to talk with computers on the Internet

55
New cards

What is SIP, H.323, RTP, SRTP?

Application layer protocols for real-time interactive multimedia

56
New cards

Network management is composed of what?

Configuration management - know, at any time, the status of each entity and its relationship to other entities (reconfiguration and documentation)

Fault management - ensure proper operation of each component individually and in relation to each other (reactive and proactive fault management)

Performance management - monitor and control the network to ensure it is running as efficiently as possible (capacity, traffic, throughput, response times)

Security management - controlling access to the network based on predefined policy

Accounting management - controlling of users’ access to network resources through charges

57
New cards

What is the difference between the server and client in SNMP?

The servers, called managers, collect and process information about devices on the network. The clients, called agents, are any type of device or device component connected to the network.

58
New cards

What is the goal of cybersecurity?

Confidentiality - hidden from unauthorized access

Integrity - protected from unauthorized change

Availability - available to an authorized entity when it is needed

59
New cards
60
New cards

What types of attacks threaten confidentiality, integrity & availability?

Confidentiality - snooping and traffic analysis

Integrity - modification, masquerading, replaying, repudiation

Availability - denial of service

61
New cards

What is the difference between Steganography & Cryptography?

Cryptography - “secret writing”, concealing the contents of a message by enciphering

Steganography - “covered writing”, concealing the message itself with something else

62
New cards

What are the four characteristics data communications depends on?

Delivery - Delivered to the correct destination, only received by the intended user

Accuracy - Accurate, unaltered data

Timeliness - Deliver data in a timely manner

Jitter - Deliver data packets at the same speed

63
New cards

What are the five components of a data communications system?

Message - Information/data

Sender - Device that sends the message

Receiver - Device that receives the message

Transmission medium - Physical path the message takes to get from the sender to the receiver (twisted-pair, fiber-optic, radio waves, ect.)

Protocol - Set of rules that govern data communications

64
New cards

What is simplex, half-duplex, full-duplex?

Simplex - communication flows in one direction (one device is always the sender, the other is always the receiver

Half-duplex - communication flows in both directions but not at the same time

Full-duplex - communication flows in both directions and can happen at the same time

65
New cards

What are three network criteria?

Performance - Many ways to measure, such as transit and response times. Depends on things like number of user, type of transmission medium, ect.

Reliability - Measured by the frequency of failure, the time it takes to recover from failure, robustness

Security - Protecting data from unauthorized access and damage and development, implementing policies and procedures for recovery from breaches and data losses.

66
New cards

What are the two possible types of connection in a network?

Point-to-point - Dedicated link between two devices

Multipoint - More than two devices share a single link

67
New cards

What is physical topology and what are the four basic topologies?

Physical topology refers to the way a network is laid out physically.

Mesh - Every device has a dedicated point-to-point connection with every other device

Star - Each device has a dedicated point-to-point link only to a central controller, usually a hub

Bus - One long cable that acts as a backbone, devices connect to this cable via drop lines and taps, multipoint

Ring - Each device has a dedicated point-to-point connection with only the two devices on either side, the signal is passed from device to device around the ring in one direction until it gets to its destination

68
New cards

What are three causes of signal impairment?

Attenuation - Loss of energy, fixed by amplification

Distortion - Signal changes form or shape

Noise

69
New cards

What things measure network performance?

Bandwidth

Throughput - How fast data can actually be sent through a network

Latency (Delay)

Jitter - Different data packets having different delays

70
New cards

What three techniques are used in digital-to-digital conversion?

Line Coding - Process of converting digital data to digital signals

Block Coding - Adds redundancy to ensure synchronization and provide inherent error detecting

Scrambling

71
New cards

What two techniques are used in analog-to-digital conversion?

Pulse-Code Modulation (PCM) - A PCM encoder samples the signal every T seconds, quantizes the signal, and decodes the values as streams of bits.

Delta Modulation (DM) - Similar to PCM, but instead of finding the value of the amplitude, it finds the change from the previous sample

72
New cards

What are the three types of digital-to-analog conversion?

Amplitude Shift Keying (ASK), Frequency Shift Keying (FSK), Phase Shift Keying (PSK)

73
New cards

What are the three types of analog-to-analog conversion?

Amplitude Modulation (AM), Frequency Modulation (FM), Phase Modulation (PM)

74
New cards

What are three examples of guided transmission media?

Twisted-Pair Cable - Two conductors, each with its one plastic insulation, twisted together, can be shielded or unshielded, used in telephone lines for voice and data channels

Coaxial Cable - Carries signals with higher frequency ranges that twisted-pair cables, central core enclosed in an insulating sheath, used for cable TV

Fiber-Optic Cable - Made of glass or plastic and transmits signs in the form of light, backbone of networks

75
New cards

What are three examples of unguided transmission media?

Radio Waves - 3kHz to 1GHz, omnidirectional

Microwaves - 1 GHz to 300 GHz, unidirectional

Infrared - 300 GHz to 400 THz, short-range communication

76
New cards

What are the two sublayers in the data-link layer?

Data-link control (DLC), Media access control (MAC) (only in a broadcast link)

77
New cards

What are some examples of random access protocols in the MAC sublayer?

ALOHA - Stations send data and wait for an acknowledgment from the receiver, if it doesn’t receive an acknowledgment it assumes there was a collision and resends it

CMSA - Every station has to listen to the medium before sending, reducing the possibility of collision

CMSA/CD - A station monitors the medium after it sends a Fram to see if the transmission was successful, resends if collision is detected

CMSA/CA - Used for wireless networks

78
New cards

What are some examples of controlled access protocols in the MAC sublayer?

Reservation - Stations reserve a slot of time to send their data

Polling - A primary device controls the link and decides which device is allowed to use the channel at a given time

Token Passing - If you have the token and need to send data, you send it, if you don’t need to send data, you pass the token on

79
New cards

What are the four types of Ethernet and what are their data rates?

Standard - 10 Mbps

Fast - 100 Mbps

Gigabit - 1 Gbps

10 Gigabit - 10 Gbps

80
New cards

What is the IEEE standard for WiFi?

IEEE 802.11

81
New cards

What is Bluetooth?

A ad hoc wireless LAN designed to connect devices of different functions when they are at a short distance from each other

Piconet - up to eight stations, 1 and 1 only primary

Scatternet - multiple piconets, the secondary station in one piconet can be a primary in another

10 meter range, 1 Mbps

82
New cards

What is auto-negotiation?

Allows two incompatible devices to negotiate the mode or data rate of transmission and connect to one another

83
New cards

 What are the three major components of a telephone network?

Local Loops - A twisted-pair cable that connect the subscriber telephone to the nearest end office or local central office

Trunks - Transmission media that handle the communication between offices

Switching Offices - Connects several local loops or trunks and allows a connection between different subscribers

84
New cards

What are Intra and Inter-LATA services?

Intra - Services offered by the common carriers (telephone companies) inside the LATA, carrier is called a local exchange carrier (LEC) (ILEC - incumbent local exchange carrier, CLEC - competitive local exchange carriers)

Inter - Services between LATAs that are handle by interexchange carriers (IXCs, also called long-distance companies), provide communication services between two customers in different LATAs

85
New cards

What is a point of presence (POP)?

Allows people in a LATA to connect to an IXC, companies must have a POP in a LATA if they want to provide service there, the LEC provides connection to the POPs

86
New cards

How does a traditional cable network work?

A receiving antenna at the head end receives video signals from broadcasting stations and feeds the signals into coaxial cables, amplifiers are used throughout the line, a splitter splits the cable that go into different areas, and houses connect to these split lines via drop cables and taps, one-way communication

87
New cards

How does a hybrid fiber-coaxial (HFC) network work?

A regional cable head (RCH) feeds distribution hubs, the signals are sent through fiber-optic cable, the fiber-optic cable is split and changes to coax at a fiber node, and the house connect to the coax, there is less need for amplifiers, the network is bidirectional

88
New cards

What is cellular telephony used for?

Provides communication between to moving units (mobile stations (MSs)) or between on MS and one stationary unit (land unit)

89
New cards

How does transmitting work in cellular telephony?

Caller enters a phone number, the MS seeks a setup channel with a strong signal, sends the phone number to the closest BS, BS relays the phone number to the MSC, MSC sends it to the telephone central office

90
New cards

How does receiving work in cellular telephony?

Telephone central office sends number to the MSC, MSC searches for location of MS by sending query signals to each cell, once the MS is found the MCS transmit a ringing signal, when the MS answers, the MSC assigns a voice channel to the call and communication can begin

91
New cards

What is handoff?

Mobile stations move from one cell to another, the MSC changes the channel carrying the call, hard handoff - communication must be broken creating a rough transition, soft handoff - MS and communicate with two BS at the same time

92
New cards

What is roaming?

A user can have access to communication or can be reached where there is coverage, service providers have an agreement to provide extended coverage

93
New cards

What are the generations?

1st - analog signals

2nd - digitized

3rd - 14 Mbps

4th - 100Mbps, Long Term Evolution (LTE)

5th - Currently 10Gbps, designed for 20 Gbps

94
New cards

What are the three ways a satellite can orbit the earth?

Equatorial, inclined, or polar

95
New cards

What are the three categories of satellites, and what is the reason for them?

Geostationary Earth orbit (GEO) - 35,786 km, always above the same point on earth following the rotation of the earth

Medium-Earth-orbit (MEO) - 5,000 to 15,000 km, 6 to 8 hours to circle the earth, GPS

Low-Earth-orbit (LEO) - below 2,000 km, polar orbits, circle the earthen 90 to 120 minutes, cellular type of access similar the the cellular telephone system, a system is made up of a constellation of satellites working together, Starlink (a lot more satellites than competitors

There are two Van Allen belts where satellites will be destroyed if they stay there