Client-Server and Peer-to-Peer Architectures

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

What is the main function of a server in a network?

  • To send data only to other clients
  • To provide services to client devices (correct)
  • To connect network devices without processing data
  • To request data from client devices

Which statement accurately describes the difference between a switch and a router?

  • Both a switch and a router perform identical tasks in a network.
  • A switch directs packets, while a router connects devices.
  • A switch connects network devices, while a router directs packets to destinations. (correct)
  • A switch routes packets based on IP addresses, and a router connects multiple networks.

In which type of communication can both devices send and receive data simultaneously?

  • Simplex
  • Full-duplex (correct)
  • Half-duplex
  • Unidirectional

What is a significant disadvantage of using mesh topology?

<p>Difficult installation and reconfiguration (D)</p>
Signup and view all the answers

Which of the following is NOT an advantage of star topology?

<p>Requires minimal cabling compared to tree topology (B)</p>
Signup and view all the answers

What is a characteristic of bus topology?

<p>Uses a long cable as a backbone and nodes connect through drop lines. (B)</p>
Signup and view all the answers

What is one major disadvantage of bus topology?

<p>Difficult reconfiguration and fault isolation (C)</p>
Signup and view all the answers

In a full-duplex communication, which of the following is true?

<p>Both devices can send and receive data simultaneously. (B)</p>
Signup and view all the answers

What is one of the primary goals of web caching?

<p>Satisfy client requests without involving the origin server (C)</p>
Signup and view all the answers

How does HTTP/2 aim to mitigate head-of-line (HOL) blocking?

<p>By dividing objects into frames and allowing client priority specification (B)</p>
Signup and view all the answers

What is the purpose of the 'If-modified-since' header in a conditional GET request?

<p>To prevent transmission of an object if the cached version is up-to-date (A)</p>
Signup and view all the answers

What is a key benefit of modularization in complex systems?

<p>Eases maintenance and updating of the system (B)</p>
Signup and view all the answers

Which of the following is NOT a function of cookies?

<p>Storing database records (A)</p>
Signup and view all the answers

In a Client-Server paradigm, which characteristic is true for the server?

<p>Is always on and has a permanent IP address (D)</p>
Signup and view all the answers

Which component of an email system performs the role of sending and receiving messages?

<p>Mail servers (A)</p>
Signup and view all the answers

What is a primary feature of peer-to-peer architecture?

<p>New peers increase service capacity and demands (D)</p>
Signup and view all the answers

What method do processes on the same host use for communication?

<p>Inter-process communication defined by the operating system (B)</p>
Signup and view all the answers

What do open application-layer protocols enable?

<p>Interoperability as they are publicly accessible (A)</p>
Signup and view all the answers

Which transport service is primarily concerned with reliable data transfer?

<p>Data integrity (D)</p>
Signup and view all the answers

What type of application may tolerate some data loss during transmission?

<p>Audio streaming applications (A)</p>
Signup and view all the answers

What is a characteristic of proprietary protocols?

<p>They can limit interoperability between systems (A)</p>
Signup and view all the answers

What defines the transmission delay in packet delay components?

<p>The packet length divided by link transmission rate (A)</p>
Signup and view all the answers

What does 'dprop' represent in the context of packet delay?

<p>Propagation delay along the physical link (D)</p>
Signup and view all the answers

Which of the following describes the purpose of spyware malware?

<p>To record keystrokes and upload information to a collector site (B)</p>
Signup and view all the answers

What defines the denial of service (DoS) attack?

<p>An attack that makes resources unavailable by flooding them with traffic (A)</p>
Signup and view all the answers

What kind of throughput is measured as the rate over a specified longer period of time?

<p>Average throughput (C)</p>
Signup and view all the answers

Which of the following is an example of an application layer protocol?

<p>IMAP (B)</p>
Signup and view all the answers

How can malware spread in the case of a worm?

<p>By passively receiving its payload and self-replicating (A)</p>
Signup and view all the answers

In packet sniffing, what does the attacker do?

<p>Interception and reading of data packets travelling across the network (A)</p>
Signup and view all the answers

What is the main advantage of Frequency Division Multiplexing (FDM)?

<p>Each call can transmit at the maximum rate of its assigned narrow band. (A)</p>
Signup and view all the answers

What differentiates Time Division Multiplexing (TDM) from Frequency Division Multiplexing (FDM)?

<p>TDM gives each call a periodic time slot, while FDM allocates narrow frequency bands. (D)</p>
Signup and view all the answers

What role do Tier-1 ISPs play in the Internet structure?

<p>They connect regional ISPs and do not pay anyone for their connectivity. (C)</p>
Signup and view all the answers

What is an Internet Exchange Point (IXP)?

<p>A meeting point where multiple ISPs can connect and peer. (B)</p>
Signup and view all the answers

How does Google manage its data centers globally?

<p>By interconnecting data centers via its private TCP/IP network. (C)</p>
Signup and view all the answers

What is one of the main financial models for IXPs?

<p>IXPs charge ISPs based on the traffic exchanged. (C)</p>
Signup and view all the answers

Which of the following describes a benefit of peering at IXPs?

<p>It allows ISPs to exchange traffic without incurring transit fees. (A)</p>
Signup and view all the answers

What can be inferred about Google's strategy with lower-tier ISPs?

<p>Google seeks to establish direct connections with lower-tier ISPs. (D)</p>
Signup and view all the answers

What happens in a ring topology if there is a disabled station?

<p>The entire network may become disabled. (B)</p>
Signup and view all the answers

Which of the following describes a PAN?

<p>It provides data transmission among personal devices. (B)</p>
Signup and view all the answers

Which statement about tree topology is accurate?

<p>It has a central node that acts as a trunk. (A)</p>
Signup and view all the answers

What is one disadvantage of ring topology?

<p>A break in the ring can disable the whole network. (D)</p>
Signup and view all the answers

What defines network protocols?

<p>They define the format and order of messages among network entities. (D)</p>
Signup and view all the answers

Which components are typically part of the network edge?

<p>Clients and servers (D)</p>
Signup and view all the answers

How does a local area network (LAN) primarily function?

<p>It operates within a limited area. (D)</p>
Signup and view all the answers

What is the primary role of the central node in a tree topology?

<p>To act as a central point for device connections. (A)</p>
Signup and view all the answers

Flashcards

Client

In a network, a device requesting a service from a server.

Server

A computer program or device providing a service to a client.

Switch (Network)

A network device connecting devices in a network.

Router (Network)

A device that directs data packets on a network.

Signup and view all the flashcards

Simplex Network

Data transmission only in one direction.

Signup and view all the flashcards

Star Topology

Network topology where devices connect to a central device.

Signup and view all the flashcards

Bus Topology

Network topology where devices connect along a single cable.

Signup and view all the flashcards

Mesh Topology

Network topology where each device connects to every other.

Signup and view all the flashcards

Ring Topology

A network topology where devices connect in a closed loop, with data flowing in one direction. Each device is connected to exactly two other devices.

Signup and view all the flashcards

Ring Topology Disadvantage

A break in the ring disrupts the entire network.

Signup and view all the flashcards

Tree Topology

A network topology that branches out from a central node (trunk). Each device connects to the trunk with a single path.

Signup and view all the flashcards

PAN (Personal Area Network)

A network connecting personal devices like computers, smartphones, and tablets for low-level data transmission. Often a master device acts as gateway to a larger network.

Signup and view all the flashcards

LAN (Local Area Network)

A computer network covering a limited area, typically a home, school, office building, or campus.

Signup and view all the flashcards

Network Protocol

A set of rules that dictate how data is formatted, ordered, transmitted, and received among network devices.

Signup and view all the flashcards

Network Edge Components

The part of a network that connects to end-users (clients and servers).

Signup and view all the flashcards

Network Core Components

The part of a network that forms the backbone, connecting various edges and the interconnected routers forming the network of networks.

Signup and view all the flashcards

Packet Delay

The time it takes for a packet to travel from source to destination. It's broken down into four components: processing delay, queuing delay, transmission delay, and propagation delay.

Signup and view all the flashcards

Nodal Processing Delay (dproc)

Time spent by a router processing a packet, including error checking and determining the output link. Typically very short, usually less than a millisecond.

Signup and view all the flashcards

Queueing Delay (dqueue)

Time spent by a packet waiting in a queue at a router's outgoing link. Depends on network congestion: higher congestion leads to longer queues.

Signup and view all the flashcards

FDM

A multiplexing technique where different signals are transmitted on separate frequency bands. Each call gets its own band, allowing for simultaneous transmission within that limited bandwidth.

Signup and view all the flashcards

TDM

A multiplexing technique that divides time into slots. Each call gets allocated specific slots, allowing for transmission only during those slots but at a higher bandwidth.

Signup and view all the flashcards

Transmission Delay (dtrans)

Time required to transmit a packet through a link. Calculated by dividing the packet's length (in bits) by the link's transmission rate (in bits per second).

Signup and view all the flashcards

Propagation Delay (dprop)

Time taken for a packet to travel the physical distance of a link. Determined by dividing the link's length by the signal's propagation speed (approximately 2x10^8 meters per second).

Signup and view all the flashcards

Tier-1 ISP

A large, global Internet Service Provider (ISP) that acts as a backbone for the internet, connecting to other regional ISPs.

Signup and view all the flashcards

Throughput

The rate at which bits are transmitted from sender to receiver. Can be measured instantaneously (at a specific point in time) or averaged over a longer period.

Signup and view all the flashcards

Regional ISP

An Internet Service Provider (ISP) that operates within a specific geographic region and connects to other ISPs, including Tier-1 ISPs.

Signup and view all the flashcards

Internet Exchange Points (IXP)

A physical location where multiple ISPs connect and exchange traffic directly, allowing for faster and cheaper data transfer between them.

Signup and view all the flashcards

Malware

Software designed to harm or disrupt a computer system. It can spread through various means, including email attachments, infected websites, and malicious downloads.

Signup and view all the flashcards

Google as a content-provider network

Google operates a vast network of data centers, interconnected by a private network, that bypasses higher tiers of the internet by peering directly with lower-tier ISPs.

Signup and view all the flashcards

Denial of Service (DoS) Attack

An attack that aims to overwhelm a server or network resource with illegitimate traffic, making it unavailable to legitimate users.

Signup and view all the flashcards

Benefits of IXPs

IXPs provide a cost-effective and efficient way for ISPs to exchange traffic, reducing costs and improving performance for internet users.

Signup and view all the flashcards

How does Google ‘bypass’ the internet?

Google connects with lower-tier ISPs directly or through IXPs, minimizing reliance on higher-tier ISPs, which improves speed and efficiency for their services.

Signup and view all the flashcards

Client-Server Paradigm

A network architecture where clients request services from servers, which are always-on, have permanent IP addresses, and often reside in data centers. Clients are intermittently connected and may have dynamic IP addresses. Clients do not communicate directly with each other.

Signup and view all the flashcards

Peer-to-Peer Architecture

A network architecture where end systems directly communicate, acting as both clients and servers, requesting and providing services to each other. Peers are intermittently connected and may have dynamic IP addresses.

Signup and view all the flashcards

Process

A program running within a host. Processes within the same host communicate using inter-process communication mechanisms, while processes in different hosts communicate by exchanging messages.

Signup and view all the flashcards

Socket

An endpoint for communication between processes. Processes can send and receive messages to/from their sockets.

Signup and view all the flashcards

Application-Layer Protocol

A set of rules that defines the types, syntax, semantics, and rules for exchanging messages between applications. Examples include HTTP, SMTP.

Signup and view all the flashcards

Data Integrity

Ensuring that data transmitted over a network arrives at its destination without any corruption or alteration.

Signup and view all the flashcards

Timing (Network)

The delay experienced by data packets travelling over a network. Some applications require low delays (e.g., real-time communication), while others can tolerate higher delays.

Signup and view all the flashcards

Cookie's Role

Cookies are small files stored on a user's computer, used by websites to maintain state between user interactions. This allows websites to remember preferences, track shopping carts, and maintain authorization.

Signup and view all the flashcards

What is Web Cache?

A Web cache acts as a temporary storage for web content, reducing the need to fetch the same content repeatedly from the origin server. This can be on a client machine or a proxy server, speeding up web access and reducing server load.

Signup and view all the flashcards

Conditional GET

Conditional GET is a technique used in web caching to prevent redundant data transfer. It allows the client to tell the server if it has a current copy of the resource, avoiding unnecessary downloads.

Signup and view all the flashcards

HTTP1.1 Pipelining

HTTP/1.1 enables sending multiple HTTP GET requests over a single TCP connection, allowing for streamlined data transfer. However, this can lead to 'head-of-line blocking' where the transmission of small objects is delayed due to larger objects preceding them.

Signup and view all the flashcards

HTTP/2's Goal

HTTP/2 aims to reduce the delay in multi-object HTTP requests, enhancing web performance. It overcomes the limitations of HTTP/1.1 by enabling flexible order of object transmission, using priorities, and pushing unrequested objects to the client.

Signup and view all the flashcards

Study Notes

Client-Server Paradigm

  • A server is always on and has a permanent IP address, often in data centers
  • Servers are used for scaling issues
  • Clients contact servers, and communicate with servers, but not directly with each other
  • Clients may have dynamic IP addresses
  • Examples of Client-Server paradigms include HTTP, IMAP, and FTP

Peer-to-Peer Architecture

  • End systems communicate directly
  • Peers request service from other peers and provide service in return
  • Peer-to-peer systems offer self-scalability; new peers add new service capacity
  • Peers may connect and disconnect intermittently, and change IP addresses
  • Examples include P2P file sharing

Process Communication

  • A process is a program running within a host
  • Processes on the same host communicate using inter-process communication (defined by the OS)
  • Processes on different hosts communicate by exchanging messages

Sockets

  • A process sends and receives messages through sockets

Application-Layer Protocols

  • Defines message types, syntax, semantics, and rules for message exchange
  • Examples include HTTP, SMTP, and FTP
  • Open protocols, like HTTP, are defined in RFCs (Request For Comments)
  • Proprietary protocols like Skype are not standardized

Transport Services

  • Data integrity: Some apps need reliable data transfer (e.g., file transfer)
  • Timing: Some apps need low delay (e.g., interactive games)
  • Throughput: Some apps need a minimum amount of throughput (e.g., multimedia)

Internet Transport Protocols

  • TCP (Transmission Control Protocol): reliable transport, flow control, congestion control, but not timing or security
  • UDP (User Datagram Protocol): unreliable transport (no guarantees); no flow or congestion control

HTTP Connections

  • Non-persistent HTTP: Each object requires a separate TCP connection
  • Persistent HTTP: Multiple objects can be sent over a single TCP connection

HTTP Response Time

  • Non-persistent HTTP response time is approximately 2 Round Trip Time (RTT) + file transmission time

HTTP Request Types

  • POST: Web page often includes form input – user input is sent in the entity body
  • GET: User data is in the URL field following a '?'
  • HEAD: Returns only request headers (without the object body)

HTTP Response Status Codes

  • 200 OK: Request succeeded
  • 301 Moved Permanently: Requested object has moved to a new location
  • 400 Bad Request: Request message is not understood
  • 404 Not Found: Requested object not found on the server
  • 505 HTTP Version Not Supported: The requested HTTP version is not supported by the server

Cookies

  • Used by websites and clients to maintain some state between transactions, such as cookies for shopping carts

Web Caching

  • Goal: Satisfy client requests without involving the origin server
  • Web caches act as both client/server, reducing response time and overall request loads

Conditional GET

  • Don't send object if the cache has an up-to-date version

HTTP 1.1 with Multiple Object Pipelining

  • Introduced pipelined GETs using TCP connection for faster transmission

HTTP/2 Goal and HOL Blocking Mitigation

  • Goal: Decreased delay in multi-object HTTP requests by allowing servers to send objects to the client
  • Addressing methods, status codes, and header fields – and dividing objects into frames

Email Components

  • User Agents
  • Mail Servers
  • SMTP (Simple Mail Transfer Protocol)

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

ICT Department - Network Applications Quiz
5 questions
Network Architecture Overview
29 questions

Network Architecture Overview

CompliantPlumTree9712 avatar
CompliantPlumTree9712
Network Applications and Architectures
41 questions
Use Quizgecko on...
Browser
Browser