Computer Network Overview and OSI Model

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which cable is specifically used for directly connecting computers without an intermediary device?

  • Patch cable
  • Rollover cable
  • Straight through cable
  • Crossover cable (correct)

What sequence represents the proper color code for T568A wiring standard?

  • White/Green, Green, White/Orange, Blue, White/Blue, Orange, White/Brown, Brown
  • White/Green, Green, White/Blue, Blue, White/Orange, Orange, White/Brown, Brown
  • White/Green, Green, White/Orange, Blue, White/Brown, Brown, White/Blue, Orange
  • White/Green, Green, White/Orange, Orange, White/Blue, Blue, White/Brown, Brown (correct)

What distinguishes the T568A wiring standard from T568B?

  • Types of connectors used
  • Number of wires in the cable
  • Differences in color code sequence (correct)
  • Length of the wires used

Which metric is commonly utilized to express data transfer speed?

<p>Mb/s (A)</p> Signup and view all the answers

What does the acronym 'bps' refer to in data transfer terminology?

<p>bits per second (D)</p> Signup and view all the answers

Which layer of the OSI model is responsible for detecting and controlling transmission errors?

<p>Data Link (D)</p> Signup and view all the answers

What function of the data link layer helps prevent fast senders from overwhelming slow receivers?

<p>Regulating the flow of data (A)</p> Signup and view all the answers

What is the term used to describe a data unit at the data link layer?

<p>Frame (D)</p> Signup and view all the answers

What is the correct bit sequence to be transmitted using CRC with G(x) = x3+1 for the original data 10100011?

<p>10100011 101 (A)</p> Signup and view all the answers

Which protocol is used to convert IP addresses to MAC addresses?

<p>ARP (B)</p> Signup and view all the answers

What type of device forwards data based on the destination MAC address?

<p>Switch (A)</p> Signup and view all the answers

Which of the following is a characteristic of a Switch?

<p>Plug-and-play and Self-learning (D)</p> Signup and view all the answers

Which method is commonly applied for managing multiple accesses in a computer network?

<p>Random access (A)</p> Signup and view all the answers

Which random accessing protocol is applied at the MAC layer of a computer network?

<p>ALOHA (A)</p> Signup and view all the answers

Which statement accurately describes the Slotted ALOHA protocol?

<p>Time is divided into slots, and nodes transmit data at the start of each time-slot. (D)</p> Signup and view all the answers

How many bits are there in a MAC address?

<p>48 bits (C)</p> Signup and view all the answers

Which of the following addresses represents a physical address?

<p>0F-1F-2F-3F-4F-5F (A)</p> Signup and view all the answers

What is a unique identifier assigned to a network interface controller?

<p>MAC address (B)</p> Signup and view all the answers

What is the transmitted bit sequence using byte stuffing with the original data 00001111 00110011 01111110 and FLAG = 01111110?

<p>00001111 00001111 00110011 00001111 01111110 (B)</p> Signup and view all the answers

What is the transmitted bit sequence with byte stuffing using the original data 10000011 00001111 01111110?

<p>10000011 00001111 00001111 00001111 01111110 (A)</p> Signup and view all the answers

What is the original data from the received bit sequence 10111110 0000111 00001111 0000111 01111110 00110011?

<p>00001111 10111110 01111110 00110011 (A)</p> Signup and view all the answers

What byte is used as an escape for byte stuffing during framing techniques?

<p>00001111 (B)</p> Signup and view all the answers

Which of the following correctly describes the significance of a FLAG byte in framing techniques?

<p>It marks the beginning of the data frame. (A), It signifies the end of a data frame. (D)</p> Signup and view all the answers

What is the size of all telnet operations sent?

<p>8 bits (B)</p> Signup and view all the answers

Which service is considered time-sensitive?

<p>Internet telephony (A)</p> Signup and view all the answers

Which of the following is NOT a transport service available to applications?

<p>All of the mentioned (B)</p> Signup and view all the answers

What application layer protocol is used by the email service?

<p>SMTP (A)</p> Signup and view all the answers

What translates internet domain and host names to IP addresses?

<p>Domain name system (A)</p> Signup and view all the answers

Which protocol allows users to pass keystrokes from local host to remote host?

<p>TELNET (A)</p> Signup and view all the answers

What does the application layer protocol define?

<p>All of the mentioned (A)</p> Signup and view all the answers

What is the name of the ASCII encoding of binary data?

<p>Base 64 encoding (C)</p> Signup and view all the answers

What is included in the checksum computation of an IPv4 header?

<p>IPv4 header only (A), IP header and Pseudo header (C)</p> Signup and view all the answers

What is the binary format of the IP address 192.168.1.1?

<p>11000000.10101000.00000001.00000001 (D)</p> Signup and view all the answers

Which of the following correctly describes the parts of an IPv4 address?

<p>Network – Host (B)</p> Signup and view all the answers

Which of the following is considered a special IPv4 address?

<p>0.0.0.0 (B)</p> Signup and view all the answers

What is the loopback address of a computer in IPv4?

<p>127.0.0.1 (D)</p> Signup and view all the answers

Which queuing model is applied for packet scheduling inside a router?

<p>First-in-First-out (FIFO) (B)</p> Signup and view all the answers

What does a Time-To-Live (TTL) value of 100 signify for an IPv4 packet?

<p>The IP packet could traverse a maximum of 100 hops (D)</p> Signup and view all the answers

What is the standard size of an IPv4 header?

<p>20 bytes (C)</p> Signup and view all the answers

What is the main problem that the Bellman-Ford routing algorithm can encounter?

<p>Count to Infinity (A)</p> Signup and view all the answers

Which of the following statements accurately describes the construction of distance vectors in Bellman-Ford routing?

<p>Each network node constructs its distance vector based on routing information shared among neighbors. (C)</p> Signup and view all the answers

Which routing protocols are specifically suitable for intra-AS routing?

<p>RIP/OSPF/IGRP (C)</p> Signup and view all the answers

In the Bellman-Ford protocol, how many iterations are needed to reach a stable state if the link cost between nodes changes from 4 to 60?

<p>44 (C)</p> Signup and view all the answers

Which of the following routing protocols is intended for inter-AS routing?

<p>BGP (A)</p> Signup and view all the answers

Which protocol is primarily used for error reporting within a computer network?

<p>ICMP (C)</p> Signup and view all the answers

What is a characteristic of a managed device in a network management framework?

<p>It contains multiple managed objects. (A)</p> Signup and view all the answers

Which of the following is NOT a suitable protocol for intra-AS routing?

<p>BGP (D)</p> Signup and view all the answers

Flashcards

Computer cable type for direct connection

A straight-through cable is used to connect computers directly.

T568A color code

White/Green, Green, White/Orange, Orange, White/Blue, Blue, White/Brown, Brown

T568A vs T568B difference

Different color order assignments in wiring standards.

Data transfer speed measurement

Bits per second (bps), Megabits per second (Mbps), and Terabits per second (Tbps) are used to measure data transfer speeds.

Signup and view all the flashcards

bps meaning

Bits per second.

Signup and view all the flashcards

OSI layer for error control

The Data Link layer is responsible for error control in data transmission.

Signup and view all the flashcards

Data link layer data unit

A data frame.

Signup and view all the flashcards

Data link layer flow control

Mechanism to prevent fast senders from overwhelming slow receivers.

Signup and view all the flashcards

MAC Address Length

A Media Access Control (MAC) address is a unique 48-bit identifier assigned to network interface controllers (NICs).

Signup and view all the flashcards

Physical Address

A physical address is the hardware address used to locate a specific device on a network.

Signup and view all the flashcards

MAC Address

A unique identifier for a network interface controller (NIC).

Signup and view all the flashcards

Byte Stuffing (Framing technique)

A method of inserting special characters into data to prevent confusion with delimiters used to frame data.

Signup and view all the flashcards

Flag Byte

A special byte used to mark the beginning and end of a frame in a framing technique (e.g., byte stuffing).

Signup and view all the flashcards

Byte Stuffing

A framing technique where special characters are used to mark data boundaries within the transmitted data.

Signup and view all the flashcards

Original Data

The data before any modifications for transmission.

Signup and view all the flashcards

Transmitted Bit Sequence

The data after modifications for transmission, including additions of delimiters, in a framing technique.

Signup and view all the flashcards

CRC error detection

A method used to detect errors in data transmitted over a network by adding a redundant code (CRC) to the data.

Signup and view all the flashcards

ARP (Address Resolution Protocol)

A protocol that translates IP addresses to MAC addresses, enabling devices to communicate on a local network.

Signup and view all the flashcards

Switch

A network device that forwards data based on MAC addresses, improving network performance.

Signup and view all the flashcards

Switch characteristics

A switch's key features are plug-and-play capability and self-learning functionality.

Signup and view all the flashcards

Multiple Access Control

Methods to regulate how multiple devices access a shared network resource.

Signup and view all the flashcards

ALOHA protocol

A random access method for computer networks. Data is sent without time slots.

Signup and view all the flashcards

Slotted ALOHA protocol

A variation of ALOHA that improves efficiency by dividing time into equal slots; nodes transmit only at the beginning of a slot.

Signup and view all the flashcards

MAC layer random access protocols

Methods, such as ALOHA and variations (switched), used for media access control in a computer network—how multiple devices share a communication channel.

Signup and view all the flashcards

Telnet Operation Data Size

Telnet uses 8 bits to send all its operations over the network.

Signup and view all the flashcards

Time-sensitive Service

A time-sensitive service requires near real-time communication and low latency, making it crucial to deliver data promptly.

Signup and view all the flashcards

Transport Services

Transport services provide crucial functions for application communication, ensuring reliable data delivery, timing, and security.

Signup and view all the flashcards

Email Protocol

SMTP (Simple Mail Transfer Protocol) handles sending and receiving emails.

Signup and view all the flashcards

Domain Name Resolver

The Domain Name System (DNS) translates user-friendly domain names into numerical IP addresses.

Signup and view all the flashcards

Remote Access Protocol

TELNET provides users with remote access to another computer system, allowing them to send commands and receive responses.

Signup and view all the flashcards

Application Layer Tasks

The Application layer defines the structure and rules for how applications communicate, handling tasks like message formats, semantics, and sending/receiving.

Signup and view all the flashcards

Binary Data Encoding

Base64 encoding converts binary data into a text-based format, making it easier to transmit over email or the web.

Signup and view all the flashcards

IP v4 Header Checksum

The IP v4 header checksum is calculated over the entire IP v4 header, including the header fields and the pseudo-header.

Signup and view all the flashcards

IP v4 Address Binary Format

An IP v4 address in binary format is represented as 32 bits, divided into four octets, where each octet is a group of 8 bits representing decimal values.

Signup and view all the flashcards

IP v4 Address Parts

An IP v4 address represents a network address and a host address within that network. It is structured as Network – Host.

Signup and view all the flashcards

Special IP v4 Addresses

Certain IP v4 addresses have specific purposes and are reserved. 0.0.0.0 is one such address.

Signup and view all the flashcards

Loopback Address

The loopback address, 127.0.0.1, is used for testing network connections on the same computer.

Signup and view all the flashcards

Router Packet Scheduling

Routers use a First-in-First-out (FIFO) queuing model to schedule packets for transmission. This means packets are sent in the order they arrive.

Signup and view all the flashcards

Time-To-Live (TTL) Field

The TTL field in an IP v4 header indicates the maximum number of hops an IP packet can traverse before being discarded. It helps prevent packets from looping endlessly.

Signup and view all the flashcards

IP v4 Header Size

The IP v4 header has a fixed size of 20 bytes.

Signup and view all the flashcards

Bellman-Ford routing

A dynamic routing protocol used in computer networks to determine the shortest path between two nodes. It works by iteratively updating the distance vector of each node based on information from its neighbors.

Signup and view all the flashcards

Distance Vector

A table maintained by each node in a network containing the distances to all other nodes in the network. The distance is calculated based on the cost of the path connecting the nodes.

Signup and view all the flashcards

Routing Algorithm

A set of rules used to determine the path that data packets should take between two nodes in a network. This path is usually chosen based on factors like cost (e.g., distance), bandwidth, or delay.

Signup and view all the flashcards

Count to Infinity Problem

A potential issue in distance vector routing where a faulty route update can cause a node to believe a path is shorter than it actually is, leading to infinite loop scenarios.

Signup and view all the flashcards

Intra-AS Routing

Routing within an autonomous system, like a single network owned and managed by a single organization.

Signup and view all the flashcards

Inter-AS Routing

Routing between different autonomous systems, like connecting networks of different companies.

Signup and view all the flashcards

RIP (Routing Information Protocol)

A distance vector routing protocol common for small networks. It uses a hop count metric to determine the shortest path.

Signup and view all the flashcards

OSPF (Open Shortest Path First)

A link-state routing protocol popular for larger networks. It uses a cost metric to determine the shortest path.

Signup and view all the flashcards

Study Notes

Exam Information

  • Exam title: Computer Network
  • Exam date: 2021-2022
  • Institution: Computer Network (Trường Đại học Công nghệ Thông tin và Truyền thông Việt - Hàn)

General Computer Network Information

  • A computer network is a collection of hardware components and computers interconnected by communication channels.
  • It allows for resource and information sharing.
  • ARPANET is considered the first computer network.

OSI Model Layers

  • The OSI model has seven layers.
  • Host-to-host layers are Transport, Session, Presentation, Application.

OSI Model Layer Detail

  • The presentation layer handles the syntax and semantics of information transmitted.
  • The network layer determines how packets are routed.

TCP/IP Model Layers

  • The TCP/IP model has four layers.

Network Types

  • PAN (Personal Area Network) – within a building or campus
  • LAN (Local Area Network) – within a building or campus
  • MAN (Metropolitan Area Network) – covering a city
  • WAN (Wide Area Network) – spanning states, countries, or the whole world

Data Units

  • Bit is the fundamental unit in the physical layer.
  • Frame is a data unit in the data link layer.
  • Packet is a data unit in the network layer.
  • Segment is a data unit in the transport layer.

Network Hardware

  • Hub operates at the physical layer.
  • Switch operates at the data link layer.
  • Router operates at the network layer.

Common Network Commands

  • Ping tests network reachability of a device.
  • Ipconfig manages IP address assigned to the machine.

Cable Types

  • Twisted pair cables reduce cross-talk interference.
  • Fiber optic cables are not affected by electromagnetic interference

Network Protocols

  • Ethernet is the standard protocol for Ethernet networks
  • Wi-Fi is the standard protocol for Wi-Fi networks

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

OSI Model, TCP, and Data Communication Quiz
10 questions
Networking Lecture 3: OSI and TCP/IP Models
10 questions
Computer Network Fundamentals Exam 2021-2022
44 questions
Modèle OSI et TCP/IP
47 questions

Modèle OSI et TCP/IP

LavishPhotorealism avatar
LavishPhotorealism
Use Quizgecko on...
Browser
Browser