Podcast
Questions and Answers
In which layer of the OSI model does a Switch operate?
In which layer of the OSI model does a Switch operate?
Which OSI model layer does a Router function within?
Which OSI model layer does a Router function within?
What is the purpose of the Ping command?
What is the purpose of the Ping command?
Which command is used to manage the IP address assigned to a machine?
Which command is used to manage the IP address assigned to a machine?
Signup and view all the answers
What is known as a data unit on the physical layer?
What is known as a data unit on the physical layer?
Signup and view all the answers
Which OSI layer functions similarly to the Internet layer of the TCP/IP model?
Which OSI layer functions similarly to the Internet layer of the TCP/IP model?
Signup and view all the answers
How many pairs of cables does UTP have?
How many pairs of cables does UTP have?
Signup and view all the answers
What is the main purpose of twisting the wires in a twisted pair cable?
What is the main purpose of twisting the wires in a twisted pair cable?
Signup and view all the answers
Which of the following services uses TCP?
Which of the following services uses TCP?
Signup and view all the answers
Which layer is responsible for process to process delivery in the OSI model?
Which layer is responsible for process to process delivery in the OSI model?
Signup and view all the answers
Which protocols does the transport layer use for communication over the Internet?
Which protocols does the transport layer use for communication over the Internet?
Signup and view all the answers
In the FTP protocol, a client contacts a server using which transport protocol?
In the FTP protocol, a client contacts a server using which transport protocol?
Signup and view all the answers
Which of the following statements is true for TCP?
Which of the following statements is true for TCP?
Signup and view all the answers
An endpoint of an inter-process communication flow across a computer network is known as what?
An endpoint of an inter-process communication flow across a computer network is known as what?
Signup and view all the answers
Socket-style API for Windows is known as what?
Socket-style API for Windows is known as what?
Signup and view all the answers
What is the main advantage of using UDP?
What is the main advantage of using UDP?
Signup and view all the answers
What components are included in the checksum computation for an IP v4 header?
What components are included in the checksum computation for an IP v4 header?
Signup and view all the answers
Which binary format corresponds to the IP address 192.168.1.1?
Which binary format corresponds to the IP address 192.168.1.1?
Signup and view all the answers
What is the correct identification of the parts of an IP v4 address?
What is the correct identification of the parts of an IP v4 address?
Signup and view all the answers
Which IP v4 address is considered a special address?
Which IP v4 address is considered a special address?
Signup and view all the answers
Which address is recognized as the loopback address for a computer?
Which address is recognized as the loopback address for a computer?
Signup and view all the answers
What queuing model is typically used for packet scheduling inside a router?
What queuing model is typically used for packet scheduling inside a router?
Signup and view all the answers
What does a Time-To-Live (TTL) value of 100 in an IP v4 header signify?
What does a Time-To-Live (TTL) value of 100 in an IP v4 header signify?
Signup and view all the answers
What is the size of an IP v4 header?
What is the size of an IP v4 header?
Signup and view all the answers
What does Address Resolution Protocol (ARP) primarily do?
What does Address Resolution Protocol (ARP) primarily do?
Signup and view all the answers
In Slotted ALOHA, when can collisions occur?
In Slotted ALOHA, when can collisions occur?
Signup and view all the answers
How does the maximum efficiency of Slotted ALOHA compare to ALOHA?
How does the maximum efficiency of Slotted ALOHA compare to ALOHA?
Signup and view all the answers
Which algorithm is used by a network node running CSMA/CA to delay transmission and avoid collision?
Which algorithm is used by a network node running CSMA/CA to delay transmission and avoid collision?
Signup and view all the answers
In FDMA, what is the method to handle an assigned frequency band with no data for transmission?
In FDMA, what is the method to handle an assigned frequency band with no data for transmission?
Signup and view all the answers
How are time slots allocated in TDMA?
How are time slots allocated in TDMA?
Signup and view all the answers
What does CSMA/CD stand for, and what is its primary purpose?
What does CSMA/CD stand for, and what is its primary purpose?
Signup and view all the answers
What is a defining feature of the ALOHA protocol that increases the chance of collision?
What is a defining feature of the ALOHA protocol that increases the chance of collision?
Signup and view all the answers
What is the total number of bits in a MAC address?
What is the total number of bits in a MAC address?
Signup and view all the answers
Which option represents a valid physical address?
Which option represents a valid physical address?
Signup and view all the answers
What is the role of a MAC address?
What is the role of a MAC address?
Signup and view all the answers
Determine the transmitted bit sequence using byte stuffing with FLAG = 01111110 and ESC = 00001111 from the original data 00001111 00110011 01111110.
Determine the transmitted bit sequence using byte stuffing with FLAG = 01111110 and ESC = 00001111 from the original data 00001111 00110011 01111110.
Signup and view all the answers
From the original data 10000011 00001111 01111110, what is the resulting bit sequence using byte stuffing?
From the original data 10000011 00001111 01111110, what is the resulting bit sequence using byte stuffing?
Signup and view all the answers
Given the received bit sequence 10111110 0000111 00001111 0000111 01111110 00110011, what is the original data after applying byte stuffing?
Given the received bit sequence 10111110 0000111 00001111 0000111 01111110 00110011, what is the original data after applying byte stuffing?
Signup and view all the answers
What issue does the Bellman-Ford routing algorithm potentially encounter?
What issue does the Bellman-Ford routing algorithm potentially encounter?
Signup and view all the answers
How do network nodes determine their distance vector in the Bellman-Ford routing protocol?
How do network nodes determine their distance vector in the Bellman-Ford routing protocol?
Signup and view all the answers
Which set of protocols is primarily used for intra-AS routing?
Which set of protocols is primarily used for intra-AS routing?
Signup and view all the answers
What is the correct protocol to use for error reporting in a computer network?
What is the correct protocol to use for error reporting in a computer network?
Signup and view all the answers
Which routing protocol is suitable for inter-AS routing?
Which routing protocol is suitable for inter-AS routing?
Signup and view all the answers
In a scenario where the link cost changes from 4 to 60, how many iterations are needed for the Bellman-Ford protocol to stabilize?
In a scenario where the link cost changes from 4 to 60, how many iterations are needed for the Bellman-Ford protocol to stabilize?
Signup and view all the answers
Which of the following is a true statement about a managed device in a network management framework?
Which of the following is a true statement about a managed device in a network management framework?
Signup and view all the answers
Which phenomenon can lead to routing oscillation in computer networks?
Which phenomenon can lead to routing oscillation in computer networks?
Signup and view all the answers
Study Notes
Exam Information
- Exam title: Computer Network
- Exam date: 2021-2022
- Institution: University of Information Technology and Communication (Viet-Han)
Computer Network Concepts
- Computer network is a collection of hardware components and computers interconnected by communication channels for sharing resources and information.
- ARPANET is considered the first computer network.
OSI Model Layers
- The OSI model has 7 layers.
- Host-to-host layers are Transport, Session, Presentation, and Application layers.
TCP/IP Model Layers
- The TCP/IP model has 4 layers.
Network Types
- A computer network operating within a building or campus is a LAN.
- A computer network operating spanning states, countries, or the whole world is a WAN.
Data Unit Arrangement
- Data, Segment, Packet, Frame, Bit is the correct arrangement of data units in the OSI model from top-down.
Network Classification
- Networks are classified by scale (PAN, LAN, MAN, WAN) and by function (peer-to-peer, client-server).
OSI Model Data Layer
- The data link layer provides error detection and correction.
Data Link Layer Functions
- Defines the electrical characteristics of signals passed between the computer and communication devices.
- Provides error detection and correction.
OSI Model Physical Layer
- The physical layer is responsible for the electrical characteristics of signals.
OSI Model Network Layer
- The network layer determines how packets are routed from source to destination.
TCP/IP Model Internet Layer
- Operating as the same function as the Internet layer.
Data Unit Types
- Bit, Frame, Packet, Segment
- Bit is the data unit in the physical layer.
- Frame is the data unit in the data link layer.
Network Cable Types
- UTP cable is commonly used in Ethernet networks.
- Twisted pair cable is used to reduce cross-talk interference.
- Fiber optic cable is a cable that is not affected by electromagnetic interference.
Network Protocols
- ARP (Address Resolution Protocol) translates IP addresses to MAC addresses.
- DHCP (Dynamic Host Configuration Protocol) automatically assigns IP addresses to computers in a network.
- SMTP (Simple Mail Transfer Protocol) is used for transferring mail.
- TCP, UDP in transport layer
Network Devices and Protocols
- Hub operates at the physical layer.
- Switch operates at the data link layer.
- Router operates at the network layer.
- Repeater increases signal strength.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
Test your knowledge on key concepts in computer networking, including the OSI and TCP/IP models, network types, and the arrangement of data units. Explore the foundations of how networks operate and their classifications. Perfect for university students in information technology programs.