Computer Network Concepts and Models

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

In which layer of the OSI model does a Switch operate?

  • Physical layer
  • Data link layer (correct)
  • Transport layer
  • Network layer

Which OSI model layer does a Router function within?

  • Network layer (correct)
  • Physical layer
  • Transport layer
  • Data link layer

What is the purpose of the Ping command?

  • To test if a device on the network is reachable (correct)
  • To test a bug in an application
  • To test printer quality
  • To test a hard disk fault

Which command is used to manage the IP address assigned to a machine?

<p>Ipconfig (A)</p> Signup and view all the answers

What is known as a data unit on the physical layer?

<p>Bit (B)</p> Signup and view all the answers

Which OSI layer functions similarly to the Internet layer of the TCP/IP model?

<p>Network (C)</p> Signup and view all the answers

How many pairs of cables does UTP have?

<p>4 pairs (B)</p> Signup and view all the answers

What is the main purpose of twisting the wires in a twisted pair cable?

<p>Reduce cross-talk interference (C)</p> Signup and view all the answers

Which of the following services uses TCP?

<p>SMTP (C)</p> Signup and view all the answers

Which layer is responsible for process to process delivery in the OSI model?

<p>Transport layer (A)</p> Signup and view all the answers

Which protocols does the transport layer use for communication over the Internet?

<p>Both TCP and UDP (D)</p> Signup and view all the answers

In the FTP protocol, a client contacts a server using which transport protocol?

<p>Transmission Control Protocol (A)</p> Signup and view all the answers

Which of the following statements is true for TCP?

<p>All of the mentioned (C)</p> Signup and view all the answers

An endpoint of an inter-process communication flow across a computer network is known as what?

<p>Socket (A)</p> Signup and view all the answers

Socket-style API for Windows is known as what?

<p>winsock (A)</p> Signup and view all the answers

What is the main advantage of using UDP?

<p>Low overhead (C)</p> Signup and view all the answers

What components are included in the checksum computation for an IP v4 header?

<p>IP v4 header only (C), IP header and Pseudo header (D)</p> Signup and view all the answers

Which binary format corresponds to the IP address 192.168.1.1?

<ol start="11000000"> <li> <ol start="10101000"> <li> <ol> <li>00000001 (A)</li> </ol> </li> </ol> </li> </ol> Signup and view all the answers

What is the correct identification of the parts of an IP v4 address?

<p>Network – Host (A)</p> Signup and view all the answers

Which IP v4 address is considered a special address?

<p>0.0.0.0 (A)</p> Signup and view all the answers

Which address is recognized as the loopback address for a computer?

<p>127.0.0.1 (D)</p> Signup and view all the answers

What queuing model is typically used for packet scheduling inside a router?

<p>First-in-First-out (FIFO) (C)</p> Signup and view all the answers

What does a Time-To-Live (TTL) value of 100 in an IP v4 header signify?

<p>The packet could traverse a maximum of 100 hops (C)</p> Signup and view all the answers

What is the size of an IP v4 header?

<p>20 bytes (A)</p> Signup and view all the answers

What does Address Resolution Protocol (ARP) primarily do?

<p>It is used to translate IP addresses to MAC addresses. (C)</p> Signup and view all the answers

In Slotted ALOHA, when can collisions occur?

<p>At the beginning of the slot. (A)</p> Signup and view all the answers

How does the maximum efficiency of Slotted ALOHA compare to ALOHA?

<p>The maximum efficiency of the Slotted ALOHA is double that of ALOHA. (B)</p> Signup and view all the answers

Which algorithm is used by a network node running CSMA/CA to delay transmission and avoid collision?

<p>The exponential back-off algorithm. (B)</p> Signup and view all the answers

In FDMA, what is the method to handle an assigned frequency band with no data for transmission?

<p>Let it idle. (B)</p> Signup and view all the answers

How are time slots allocated in TDMA?

<p>Divided into fixed-length time slots. (A)</p> Signup and view all the answers

What does CSMA/CD stand for, and what is its primary purpose?

<p>Carrier Sense Multiple Access with Collision Detection, intended to prevent collisions. (D)</p> Signup and view all the answers

What is a defining feature of the ALOHA protocol that increases the chance of collision?

<p>The lack of a signal for transmission. (A)</p> Signup and view all the answers

What is the total number of bits in a MAC address?

<p>48 bits (B)</p> Signup and view all the answers

Which option represents a valid physical address?

<p>0F-1F-2F-3F-4F-5F (D)</p> Signup and view all the answers

What is the role of a MAC address?

<p>To uniquely identify a network interface controller. (B)</p> Signup and view all the answers

Determine the transmitted bit sequence using byte stuffing with FLAG = 01111110 and ESC = 00001111 from the original data 00001111 00110011 01111110.

<p>00001111 00001111 00110011 00001111 01111110 (C)</p> Signup and view all the answers

From the original data 10000011 00001111 01111110, what is the resulting bit sequence using byte stuffing?

<p>10000011 00001111 00001111 00001111 01111110 (B)</p> Signup and view all the answers

Given the received bit sequence 10111110 0000111 00001111 0000111 01111110 00110011, what is the original data after applying byte stuffing?

<p>10111110 00001111 01111110 00110011 (B)</p> Signup and view all the answers

What issue does the Bellman-Ford routing algorithm potentially encounter?

<p>Count to infinity (A)</p> Signup and view all the answers

How do network nodes determine their distance vector in the Bellman-Ford routing protocol?

<p>By sharing information with neighboring nodes (A)</p> Signup and view all the answers

Which set of protocols is primarily used for intra-AS routing?

<p>RIP/OSPF/IGRP (B)</p> Signup and view all the answers

What is the correct protocol to use for error reporting in a computer network?

<p>ICMP (D)</p> Signup and view all the answers

Which routing protocol is suitable for inter-AS routing?

<p>BGP (B)</p> Signup and view all the answers

In a scenario where the link cost changes from 4 to 60, how many iterations are needed for the Bellman-Ford protocol to stabilize?

<p>44 (B)</p> Signup and view all the answers

Which of the following is a true statement about a managed device in a network management framework?

<p>A managed device can contain multiple managed objects. (C)</p> Signup and view all the answers

Which phenomenon can lead to routing oscillation in computer networks?

<p>Change in link cost (A)</p> Signup and view all the answers

Flashcards

Switch OSI Layer

A switch operates in the Data Link layer (Layer 2) of the OSI model.

Router OSI Layer

A router operates in the Network layer (Layer 3) of the OSI model.

Ping Command

A command used to test network connectivity, verifying a device is reachable.

IPconfig command

Used to display current TCP/IP network configuration of a computer.

Signup and view all the flashcards

Physical Layer Data Unit

A bit is the data unit used on the physical layer.

Signup and view all the flashcards

OSI Network Layer Equivalent

The network layer in the OSI model corresponds to the internet layer in the TCP/IP model.

Signup and view all the flashcards

UTP Cable Pairs

UTP cables contain 4 pairs of wires.

Signup and view all the flashcards

Twisted Pair Cable Purpose

Twisting wires in twisted-pair cables reduces cross-talk interference and improves signal quality.

Signup and view all the flashcards

MAC address length

A Media Access Control address is a unique 48-bit identifier for network interfaces.

Signup and view all the flashcards

Physical Address

A MAC address is a physical address assigned to devices on a network.

Signup and view all the flashcards

Unique Network Interface Identifier

A network interface controller (NIC) is identified by a unique MAC address.

Signup and view all the flashcards

Flag byte framing

A method for data transmission where specific bytes (flags) mark the beginning and end of a data frame.

Signup and view all the flashcards

Byte stuffing

If the data contains a flag byte, an escape byte is inserted to avoid misinterpretation.

Signup and view all the flashcards

Escape byte

A special byte used in byte stuffing to avoid confusion between data bytes and framing control bytes.

Signup and view all the flashcards

Data framing using flags

A data framing technique using flag bytes to mark the start and end of a frame and byte stuffing to avoid errors.

Signup and view all the flashcards

Original data recovery

Converting a transmitted data sequence with byte stuffing back to the original form.

Signup and view all the flashcards

ARP Function

ARP (Address Resolution Protocol) translates IP addresses into physical MAC addresses. This allows devices on a local network to communicate with each other.

Signup and view all the flashcards

Slotted ALOHA Collisions

In Slotted ALOHA, collisions can only occur at the beginning of a time slot. This is because all devices synchronize their transmissions to the start of the slot.

Signup and view all the flashcards

Slotted ALOHA vs. ALOHA

Slotted ALOHA has a higher maximum efficiency compared to ALOHA. This is because the time slots help reduce the chances of collisions.

Signup and view all the flashcards

CSMA/CA Delay Algorithm

The exponential back-off algorithm is used in CSMA/CA to delay transmission attempts after a collision. It increases the delay exponentially with each subsequent collision.

Signup and view all the flashcards

FDMA Unused Frequency

In FDMA, if a frequency band is assigned to a station but has no data to transmit, it remains idle. The frequency band isn't removed or shared.

Signup and view all the flashcards

TDMA Time Slot Assignment

In TDMA, each station is allocated a fixed-length time slot in which it can transmit data. These time slots are distributed among all stations.

Signup and view all the flashcards

IP v4 Checksum

The IP v4 header checksum is calculated using only the IP v4 header, not including the data payload.

Signup and view all the flashcards

IP Address to Binary

To convert an IP address to binary, convert each octet (group of 8 bits) to its binary equivalent.

Signup and view all the flashcards

IP Address Format

An IP address is split into two parts: a network portion and a host portion, identifying the network and specific device.

Signup and view all the flashcards

Special IP Address

The IP address 0.0.0.0 is a special address used for different purposes, including network default routing or indicating an unknown source.

Signup and view all the flashcards

Loopback Address

The IP address 127.0.0.1 is the loopback address used to test network connectivity within the same device.

Signup and view all the flashcards

Router Queuing Model

Routers use a First-In-First-Out (FIFO) queuing model for packet scheduling, meaning packets are processed in the order they arrive.

Signup and view all the flashcards

IP v4 TTL

The Time-To-Live (TTL) field in the IP v4 header sets a limit on how many hops a packet can traverse.

Signup and view all the flashcards

IP v4 Header Size

The IP v4 header is always 20 bytes in size.

Signup and view all the flashcards

Bellman-Ford Routing

A dynamic routing protocol that calculates the shortest paths between network nodes. It uses distance vectors, which are updated based on information exchanged between neighboring nodes.

Signup and view all the flashcards

Distance Vector

A data structure used in Bellman-Ford routing that represents the shortest distances from a particular node to all other nodes in the network.

Signup and view all the flashcards

Count to Infinity Problem

A potential issue in Bellman-Ford routing where, due to network loops or incorrect information, the algorithm might falsely calculate infinite distances.

Signup and view all the flashcards

Intra-AS Routing

Routing within an Autonomous System (AS), a group of networks under a single administrative domain.

Signup and view all the flashcards

Inter-AS Routing

Routing between different Autonomous Systems (ASs), allowing communication across different administrative domains.

Signup and view all the flashcards

RIP (Routing Information Protocol)

A distance-vector routing protocol commonly used for intra-AS routing. It uses a hop count as a metric to determine the shortest path.

Signup and view all the flashcards

OSPF (Open Shortest Path First)

A link-state routing protocol that calculates shortest paths based on link costs. It is used for intra-AS routing.

Signup and view all the flashcards

BGP (Border Gateway Protocol)

A path-vector routing protocol primarily used for inter-AS routing. It exchanges routing information between different Autonomous Systems.

Signup and view all the flashcards

TCP Service

TCP (Transmission Control Protocol) is a reliable, connection-oriented protocol that ensures data is delivered in order and without loss. It's widely used for applications like email (SMTP) and file transfer (FTP).

Signup and view all the flashcards

Transport Layer's Role

The Transport Layer in the OSI model is responsible for end-to-end data transfer between applications running on different hosts. It ensures reliable and ordered delivery of data segments.

Signup and view all the flashcards

Transport Layer Protocols

The Transport Layer uses both TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) for communication over the internet. TCP is connection-oriented and reliable, while UDP is connectionless and best effort.

Signup and view all the flashcards

FTP's Transport Protocol

FTP (File Transfer Protocol) uses TCP (Transmission Control Protocol) as its underlying transport protocol, enabling reliable and ordered data transfer for file exchange.

Signup and view all the flashcards

TCP Characteristics

TCP is a connection-oriented protocol that establishes a connection using a three-way handshake. It receives data from applications as a single stream, ensuring data integrity and sequence.

Signup and view all the flashcards

Socket

A socket is an endpoint of a communication flow between two processes running on different hosts. It acts as the interface for data exchange between applications.

Signup and view all the flashcards

Windows Socket API

Winsock is a socket-style API (Application Programming Interface) used in Windows operating systems to provide a common interface for network programming.

Signup and view all the flashcards

UDP Advantage

UDP (User Datagram Protocol) offers low overhead compared to TCP, making it efficient for applications that don't require guaranteed delivery or ordered data, like streaming or gaming.

Signup and view all the flashcards

Study Notes

Exam Information

  • Exam title: Computer Network
  • Exam date: 2021-2022
  • Institution: University of Information Technology and Communication (Viet-Han)

Computer Network Concepts

  • Computer network is a collection of hardware components and computers interconnected by communication channels for sharing resources and information.
  • ARPANET is considered the first computer network.

OSI Model Layers

  • The OSI model has 7 layers.
  • Host-to-host layers are Transport, Session, Presentation, and Application layers.

TCP/IP Model Layers

  • The TCP/IP model has 4 layers.

Network Types

  • A computer network operating within a building or campus is a LAN.
  • A computer network operating spanning states, countries, or the whole world is a WAN.

Data Unit Arrangement

  • Data, Segment, Packet, Frame, Bit is the correct arrangement of data units in the OSI model from top-down.

Network Classification

  • Networks are classified by scale (PAN, LAN, MAN, WAN) and by function (peer-to-peer, client-server).

OSI Model Data Layer

  • The data link layer provides error detection and correction.
  • Defines the electrical characteristics of signals passed between the computer and communication devices.
  • Provides error detection and correction.

OSI Model Physical Layer

  • The physical layer is responsible for the electrical characteristics of signals.

OSI Model Network Layer

  • The network layer determines how packets are routed from source to destination.

TCP/IP Model Internet Layer

  • Operating as the same function as the Internet layer.

Data Unit Types

  • Bit, Frame, Packet, Segment
  • Bit is the data unit in the physical layer.
  • Frame is the data unit in the data link layer.

Network Cable Types

  • UTP cable is commonly used in Ethernet networks.
  • Twisted pair cable is used to reduce cross-talk interference.
  • Fiber optic cable is a cable that is not affected by electromagnetic interference.

Network Protocols

  • ARP (Address Resolution Protocol) translates IP addresses to MAC addresses.
  • DHCP (Dynamic Host Configuration Protocol) automatically assigns IP addresses to computers in a network.
  • SMTP (Simple Mail Transfer Protocol) is used for transferring mail.
  • TCP, UDP in transport layer

Network Devices and Protocols

  • Hub operates at the physical layer.
  • Switch operates at the data link layer.
  • Router operates at the network layer.
  • Repeater increases signal strength.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Network Types and Models Quiz
16 questions
Network Types and Models Overview
24 questions
OSI and TCP/IP Models Quiz
10 questions

OSI and TCP/IP Models Quiz

WarmheartedMoscovium5725 avatar
WarmheartedMoscovium5725
Use Quizgecko on...
Browser
Browser