Lecture Notes - Computer Networking

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/26

flashcard set

Earn XP

Description and Tags

Collection of flashcards covering significant topics in computer networking based on recent lecture notes.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

27 Terms

1
New cards

What is the primary purpose of a Virtual Private Network (VPN)?

To share information and access physical resources securely over various locations.

2
New cards

What does SLA stand for in the context of virtual machines?

Service Level Agreement.

3
New cards

What are the key components of the Internet that enable content delivery?

Content providers, users, and Internet service providers (ISPs).

4
New cards

Define net neutrality.

The principle that ISPs must treat all data on the Internet equally, regardless of the source or destination.

5
New cards

What are some common applications that utilize the World Wide Web (WWW)?

Streaming, gaming, e-commerce, and mobile apps.

6
New cards

What protocol is used for wired network connections?

Ethernet 802.3.

7
New cards

Identify the two types of multiple access methods mentioned in the notes.

Time Division Multiple Access (TDMA) and Carrier Sense Multiple Access (CSMA).

8
New cards

What is OSPF and its role in networking?

Open Shortest Path First, a routing protocol that improves network performance by reducing delay and avoiding congestion.

9
New cards

What is the purpose of the TCP/IP model?

To provide a framework for inter-network communication.

10
New cards

What are the two main types of services provided by network layers?

Connection-oriented services and connectionless services.

11
New cards

Explain the difference between reliable and unreliable protocols.

Reliable protocols guarantee that all information sent is delivered, while unreliable protocols do not ensure delivery.

12
New cards

What are some examples of error detection methods?

Parity bits, checksums, and cyclic redundancy checks (CRCs).

13
New cards

How does a client-server model function in business applications?

Clients make requests to servers for resources or services.

14
New cards

What is the role of the data link layer in networking?

To provide node-to-node data transfer, frame delimitation, and error correction.

15
New cards

What are the statistical multiplexing techniques mentioned?

Frequency Division Multiplexing (FDM), Time Division Multiplexing (TDM), and Code Division Multiple Access (CDMA).

16
New cards

What is the main advantage of using a switch over a hub in a network?

Switches can isolate traffic and create separate collision domains for each port, increasing throughput.

17
New cards

What is the importance of using sequence numbers in data transmission?

They help in identifying the order of packets and managing retransmissions.

18
New cards

Describe the hidden terminal problem in wireless networking.

Occurs when two devices cannot sense each other but transmit to a common receiver, causing collisions.

19
New cards

What are RTS and CTS in the context of wireless communications?

Request to Send (RTS) and Clear to Send (CTS) are control frames used to manage access to the wireless medium.

20
New cards

What does the acronym MAC stand for in networking?

Media Access Control.

21
New cards

What is the main function of the MAC layer in wireless networks?

To manage protocol access to the physical transmission medium.

22
New cards

What is the maximum effective throughput for ALOHA protocols?

Approximately 18.4% for pure ALOHA and 36.8% for slotted ALOHA.

23
New cards

What type of coding does the Manchester encoding scheme use?

It represents each bit as a transition and provides clock recovery.

24
New cards

Explain why twisted pair cables are commonly used in networking.

They minimize electromagnetic interference and are cost-effective.

25
New cards

How does error correction work using Hamming codes?

Hamming codes add redundant bits to detect and correct single-bit errors based on parity checks.

26
New cards

What is the purpose of a checksum in error detection?

To validate the integrity of data by summing the data and checking for discrepancies during transmission.

27
New cards

What is the significance of QoS in networking?

Quality of Service (QoS) ensures different applications receive appropriate bandwidth and latency.