Computer Networking and Text Encoding
91 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Text encodings are needed to map characters to ______ data.

binary

UTF-8 is a character encoding capable of encoding all characters in the ______ standard.

Unicode

ASCII is limited to ______ characters.

128

We use an ______ address to identify a device on the internet.

<p>IP</p> Signup and view all the answers

Processes are addressed using ______ numbers.

<p>port</p> Signup and view all the answers

TCP ensures that all packets are delivered successfully and in the correct ______.

<p>order</p> Signup and view all the answers

TCP includes ______ to ensure data integrity.

<p>checksums</p> Signup and view all the answers

TCP prevents network congestion by adjusting the ______ rate based on network conditions.

<p>transmission</p> Signup and view all the answers

The request line includes the method, URI, and HTTP ______.

<p>version</p> Signup and view all the answers

HTTP status codes are grouped by their ______ digit.

<p>first</p> Signup and view all the answers

The code 200 indicates a successful ______.

<p>request</p> Signup and view all the answers

Character encoding is important in HTTP to ensure text data is correctly ______.

<p>interpreted</p> Signup and view all the answers

Proxies can improve performance by ______ responses.

<p>caching</p> Signup and view all the answers

The Content-Type header informs the receiver about the data ______.

<p>format</p> Signup and view all the answers

HTML organizes web content into ______ elements using tags.

<p>semantic</p> Signup and view all the answers

The behavior layer is primarily controlled by ______.

<p>JavaScript</p> Signup and view all the answers

GET requests retrieve data, while POST requests send data to the ______.

<p>server</p> Signup and view all the answers

The address 127.0.0.1 is known as the ______ address.

<p>loopback</p> Signup and view all the answers

Reliable transmission in TCP is achieved through a ______ handshake.

<p>Three-Way</p> Signup and view all the answers

The receiver sends an ______ for each successfully received packet in TCP.

<p>ACK</p> Signup and view all the answers

Each byte of data in TCP has a unique ______ number.

<p>sequence</p> Signup and view all the answers

If an ACK is not received within a certain time, TCP performs ______.

<p>retransmissions</p> Signup and view all the answers

Each segment in TCP is validated for integrity using ______.

<p>checksums</p> Signup and view all the answers

Applications that require low latency do not work optimally with ______.

<p>TCP</p> Signup and view all the answers

In video streaming, the delay caused by ______ makes TCP less suited for real-time content.

<p>retransmissions</p> Signup and view all the answers

For real-time communication, such as VoIP, ______ is preferred over TCP.

<p>UDP</p> Signup and view all the answers

The Domain Name Service (DNS) translates domain names into ______ addresses.

<p>IP</p> Signup and view all the answers

The client-side component that queries the DNS server is called a ______ resolver.

<p>DNS</p> Signup and view all the answers

The highest level of DNS servers is known as ______ DNS servers.

<p>Root</p> Signup and view all the answers

TLD servers are responsible for storing information about ______ domains.

<p>second-level</p> Signup and view all the answers

The leftmost bit in a binary number is called the Most Significant ______.

<p>Bit</p> Signup and view all the answers

In binary, the rightmost bit is known as the Least Significant ______.

<p>Bit</p> Signup and view all the answers

To convert binary 1101 into decimal, the result is ______.

<p>13</p> Signup and view all the answers

Negative numbers in one's complement are represented by inverting all the ______ of the binary representation.

<p>bits</p> Signup and view all the answers

Two's complement simplifies arithmetic operations and has only one representation of ______.

<p>zero</p> Signup and view all the answers

A floating point value represents real numbers in a format that uses sign, exponent, and ______.

<p>mantissa</p> Signup and view all the answers

A character set is a collection of characters that a computer can recognize and ______.

<p>process</p> Signup and view all the answers

Character encoding maps characters from a character set to their corresponding ______ values.

<p>binary</p> Signup and view all the answers

UTF-8 supports over ______ million characters from multiple languages.

<p>1.1</p> Signup and view all the answers

The instruction set of a CPU is the complete set of machine-level ______ that the processor can execute.

<p>commands</p> Signup and view all the answers

A program is a static set of instructions, while a process is a program in ______.

<p>execution</p> Signup and view all the answers

An operating system serves as a bridge between hardware and ______.

<p>applications</p> Signup and view all the answers

Programming languages are structured systems of communication that allow developers to write ______ for computers.

<p>instructions</p> Signup and view all the answers

In two's complement, the last step is to add ______ to the inverted bits.

<p>1</p> Signup and view all the answers

Examples of character sets include ______ and Unicode.

<p>ASCII</p> Signup and view all the answers

Process management involves the creation, scheduling, and termination of ______.

<p>processes</p> Signup and view all the answers

Resources in a computer system include CPU, memory, disk, and other ______.

<p>resources</p> Signup and view all the answers

The name 'Internet' comes from the term 'inter-______'

<p>networking</p> Signup and view all the answers

The OSI Model divides communication processes into ______ layers.

<p>seven</p> Signup and view all the answers

The ______ layer in the OSI Model handles routing of packets from source to destination.

<p>Network</p> Signup and view all the answers

An IP address serves two main purposes: identification and ______ addressing.

<p>location</p> Signup and view all the answers

The system can continue functioning even if some nodes fail, which is known as ______.

<p>Fault Tolerance</p> Signup and view all the answers

An IP packet contains several fields, including source IP address, destination IP address, and ______.

<p>payload</p> Signup and view all the answers

New nodes can be added to handle increased demand, demonstrating ______.

<p>Scalability</p> Signup and view all the answers

The maximum data rate a network link can handle is referred to as ______.

<p>bandwidth</p> Signup and view all the answers

Examples of platforms providing cloud services include ______, web applications, and peer-to-peer systems.

<p>cloud computing</p> Signup and view all the answers

The address 127.0.0.1 points to the ______ host.

<p>local</p> Signup and view all the answers

A ______ is a text-based interface where users interact with the operating system by typing commands.

<p>Command Line Interface (CLI)</p> Signup and view all the answers

In TCP, ______ ensures reliable transmission of data.

<p>connection</p> Signup and view all the answers

In Linux, commands such as ls, cd, and mkdir are examples of ______ users may need to memorize.

<p>specific commands</p> Signup and view all the answers

In the OSI model, the ______ layer is responsible for managing how data is presented to the user.

<p>Presentation</p> Signup and view all the answers

IP is considered an ______ protocol, meaning it does not guarantee delivery of packets.

<p>unreliable</p> Signup and view all the answers

______ signals are continuous and vary over time, such as sound waves.

<p>Analog</p> Signup and view all the answers

______ signals represent data as discrete values, often using binary values.

<p>Digital</p> Signup and view all the answers

The layer known for ensuring error checking and recovery is the ______ layer in TCP.

<p>Transport</p> Signup and view all the answers

The total packet size for IPv4 is ______ bytes.

<p>65,535</p> Signup and view all the answers

Transmission of signals through ______ cables is suited for electrical signals.

<p>Copper</p> Signup and view all the answers

Protocols govern communication between devices, such as TCP/IP and ______.

<p>HTTP</p> Signup and view all the answers

Fiber optic cables transmit ______ signals and are used for high-speed communication.

<p>light</p> Signup and view all the answers

Wireless mediums transmit ______ signals such as radio and microwaves.

<p>electromagnetic</p> Signup and view all the answers

The arrangement of nodes and links in a network is referred to as its ______.

<p>topology</p> Signup and view all the answers

In Non-Return-to-Zero encoding, binary 1 is represented by a ______ voltage level.

<p>high</p> Signup and view all the answers

To encode binary data on an analog signal, we use ______ techniques.

<p>modulation</p> Signup and view all the answers

In Amplitude Modulation (AM), a binary 1 corresponds to ______ amplitude.

<p>higher</p> Signup and view all the answers

Phase-Shift Keying (PSK) alters the ______ of the analog wave to represent binary data.

<p>phase</p> Signup and view all the answers

Multiplexing allows multiple signals to be combined and transmitted over a single ______.

<p>communication channel</p> Signup and view all the answers

The receiver sends ______ to confirm the successful receipt of data.

<p>acknowledgments</p> Signup and view all the answers

Each byte in the data stream is assigned a ______ number to ensure proper order.

<p>sequence</p> Signup and view all the answers

If an acknowledgment is not received within a timeout period, TCP performs ______ of the data.

<p>retransmissions</p> Signup and view all the answers

TCP uses ______ to verify data integrity during transmission.

<p>checksums</p> Signup and view all the answers

TCP is not ideal for applications that prioritize ______ and real-time performance over reliability.

<p>speed</p> Signup and view all the answers

Dropped packets are tolerable in ______ as the content is time-sensitive.

<p>video streaming</p> Signup and view all the answers

______ requires low latency and real-time actions to enhance user experience.

<p>Online gaming</p> Signup and view all the answers

Voice over IP (VoIP) needs audio to be delivered with minimal ______.

<p>delay</p> Signup and view all the answers

IPv4 addresses consist of four decimal numbers, each ranging from 0 to ______, separated by periods.

<p>255</p> Signup and view all the answers

IPv6 addresses are written as eight groups of four ______ digits.

<p>hexadecimal</p> Signup and view all the answers

HTTP is a ______, application-layer protocol that forms the foundation of data communication on the World Wide Web.

<p>stateless</p> Signup and view all the answers

A ______ is a standard method for retrieving a resource or its representation through HTTP.

<p>GET request</p> Signup and view all the answers

A URL specifies the location of a resource on the web and how to ______ it.

<p>access</p> Signup and view all the answers

One of the key features of HTTP/2 is ______, which allows multiple requests to be sent over a single connection.

<p>request pipelining</p> Signup and view all the answers

HTTP/2 uses a ______ protocol for more efficient data transmission compared to HTTP/1.1.

<p>binary</p> Signup and view all the answers

Flashcards

Text Encoding

Mapping characters to binary data for computer storage, processing, and transmission.

UTF-8

Character encoding that supports many languages and symbols, using 1-4 bytes per character, and compatible with ASCII.

IP Address

Unique numerical label used to identify a device on a computer network (e.g., the internet).

Port Number

Number that identifies a specific application or service running on a machine.

Signup and view all the flashcards

Socket Address

Combination of IP address and port number used to uniquely identify a process.

Signup and view all the flashcards

TCP

Internet protocol ensuring reliable data transmission (ordering, error-checking, and flow control).

Signup and view all the flashcards

Reliability (in TCP)

TCP guarantees message delivery and correct order.

Signup and view all the flashcards

Error detection (in TCP)

TCP uses checksums to prevent message corruption.

Signup and view all the flashcards

TCP Reliable Transmission

TCP achieves reliable data transmission through a three-way handshake, acknowledgments, sequence numbers, retransmissions, and checksums, guaranteeing delivery and correct ordering.

Signup and view all the flashcards

Three-Way Handshake

TCP establishes a connection to confirm that both sender and receiver are ready for data transfer.

Signup and view all the flashcards

Acknowledgments (ACKs)

Signals confirming that the receiver has successfully received each packet of data. Lack of ACKs triggers retransmissions.

Signup and view all the flashcards

Sequence Numbers

Unique numbers assigned to each byte of data to ensure correct ordering and detection of lost packets.

Signup and view all the flashcards

Retransmissions

TCP re-sends data if an acknowledgment is not received within a specific period, guaranteeing data delivery.

Signup and view all the flashcards

Checksums

Data integrity checks used to detect corrupted data packets, triggering retransmission if necessary.

Signup and view all the flashcards

DNS (Domain Name Service)

Translates human-readable domain names (e.g., www.example.com) into IP addresses.

Signup and view all the flashcards

DNS Resolver

A client-side component that queries DNS servers to resolve domain names.

Signup and view all the flashcards

Boolean Algebra Values

Boolean Algebra uses true (1) and false (0) as its two basic values.

Signup and view all the flashcards

Boolean OR Operator

Outputs true if at least one input is true in Boolean Algebra.

Signup and view all the flashcards

MSB (Most Significant Bit)

The leftmost bit in a binary number with the highest value.

Signup and view all the flashcards

LSB (Least Significant Bit)

The rightmost bit in a binary number with the lowest value.

Signup and view all the flashcards

Binary to Decimal Conversion

Converting binary numbers to their decimal equivalent (positive integers).

Signup and view all the flashcards

Binary Addition Rules

Rules for adding binary digits, considering carry-overs.

Signup and view all the flashcards

One's Complement Representation

A method for representing negative numbers in binary by inverting all bits of the positive value's binary representation. For example, -5 is represented by inverting all bits of 00000101, resulting in 11111010.

Signup and view all the flashcards

Two's Complement Representation

The most common method of representing negative numbers in binary. It is achieved by inverting all bits of the positive value's binary representation and then adding 1 to the result. For example, -5 is calculated by inverting 00000101 to get 11111010 and then adding 1, resulting in 11111011.

Signup and view all the flashcards

Floating-Point Value

A representation of real numbers (including fractions and decimals) in a computer using a sign bit, exponent, and mantissa. The exponent indicates the value's range, and the mantissa represents its precision.

Signup and view all the flashcards

Character Set

A collection of characters that a computer can recognize and process, including letters, digits, special characters, and control characters.

Signup and view all the flashcards

Character Encoding

A system that maps characters from a character set to their corresponding binary values for storage and transmission. Each character is assigned a unique binary code.

Signup and view all the flashcards

Why is UTF-8 better than ASCII or ISO-8859-1 ?

UTF-8 is superior because it supports a wider range of characters (over 1.1 million) from multiple languages, including emojis. It is backward compatible with ASCII, uses variable-length encoding for efficient storage, and is the universal standard for encoding text.

Signup and view all the flashcards

Instruction Set of a CPU

The complete set of machine-level commands that a CPU can execute. These instructions control the processor's operations, such as arithmetic calculations, data movement, and control flow.

Signup and view all the flashcards

Program vs. Process

A program is a static set of instructions written in a programming language, while a process is a program in execution. Processes are dynamic and include the program's code, resources, and execution state.

Signup and view all the flashcards

Why do we need Operating Systems?

Operating systems act as a bridge between hardware and applications, managing resources (CPU, memory, disk), processes, files, security, and providing user interfaces.

Signup and view all the flashcards

Programming Languages: Why do we use them?

Programming languages are systems of communication that allow developers to write instructions (code) for computers to execute tasks. They provide a structured way to express algorithms and control computer behavior.

Signup and view all the flashcards

Computer Network: Key Characteristics

A computer network is a collection of interconnected devices (nodes) that can share resources (hardware, data, software) and communicate with each other. Key features include resource sharing, communication via a network, and distributed processing.

Signup and view all the flashcards

Computer Hardware: Input Devices

Input devices are used to enter data into a computer system. They capture data from the outside world to be processed by the computer.

Signup and view all the flashcards

Computer Hardware: Output Devices

Output devices present processed data from the computer to the user or other external systems.

Signup and view all the flashcards

Computer Hardware: Storage Devices

Storage devices are used to store data and programs for long-term use, allowing for retrieval and preservation of information.

Signup and view all the flashcards

Computer Software: System Software

System software is software that manages and controls the computer hardware and provides basic functionality for the computer system. Operating systems, device drivers, and utilities are examples of system software.

Signup and view all the flashcards

Computer Software: Application Software

Application software is software designed for specific user tasks. It provides tools and services to perform specific functions, such as word processing, web browsing, or gaming.

Signup and view all the flashcards

Network Connectivity

Networks enable communication between multiple devices, allowing them to share data and resources.

Signup and view all the flashcards

Network Scalability

Networks can easily accommodate new devices and users without disrupting existing connections.

Signup and view all the flashcards

Network Reliability

Networks use redundant paths to ensure communication even if part of the network fails.

Signup and view all the flashcards

Network Node

A device connected to a network, such as a computer, router, or switch.

Signup and view all the flashcards

Network Link

The physical or logical connection between two nodes in a network, like a cable or wireless signal.

Signup and view all the flashcards

Network Topology

Arrangement of nodes and links in a network, like a star, bus, or ring.

Signup and view all the flashcards

Network Protocol

Rules that govern communication between devices on a network, ensuring data is transmitted and received correctly.

Signup and view all the flashcards

Network Bandwidth

The maximum data rate that a network link can handle, measured in bits per second (bps).

Signup and view all the flashcards

Network Latency

The delay in data transmission from source to destination.

Signup and view all the flashcards

Internet Origin

The term "Internet" originated from "inter-networking", connecting different computer networks.

Signup and view all the flashcards

OSI Model Layers

The OSI Model divides networking communication into seven layers, each handling different functionalities.

Signup and view all the flashcards

Network Layer's Role

The Network Layer (IP) routes packets across multiple networks using IP Addresses, manages fragmentation, and handles data delivery.

Signup and view all the flashcards

IP Packet Content

An IP packet contains information like source and destination IP addresses, payload, and protocol type.

Signup and view all the flashcards

Fault Tolerance

The ability of a system to continue operating even if some of its components fail. This ensures reliability and resilience in the face of errors.

Signup and view all the flashcards

Scalability

The ability of a system to handle increased workload or user demand by adding more resources (servers, storage, etc.).

Signup and view all the flashcards

Command Line Interface (CLI)

A text-based interface used to interact with an operating system by typing commands. It offers direct and powerful control over functions.

Signup and view all the flashcards

What are some tasks you can do with a CLI?

Using commands, you can manage files, processes, network settings, and perform system administration tasks.

Signup and view all the flashcards

What makes a CLI useful?

CLIs are often favored for their speed, power, and scripting capabilities. They are essential for advanced users and system administrators.

Signup and view all the flashcards

Signal

A representation of data used to communicate information between devices. It can be analog (continuous) or digital (discrete).

Signup and view all the flashcards

Name three mediums for transmitting signals.

Copper cables, fiber optic cables, and wireless mediums are common ways to transmit signals, each with different properties and signal types.

Signup and view all the flashcards

Signal Transmission and Medium

The type of medium used dictates the signal characteristics. Copper for electrical, fiber for light, and wireless for electromagnetic.

Signup and view all the flashcards

Binary Encoding

The process of representing binary values (0 and 1) using specific signal states for transmission.

Signup and view all the flashcards

NRZ Encoding

A simple encoding scheme where a high voltage level represents '1', and a low voltage represents '0'.

Signup and view all the flashcards

Analog Data Encoding

Using modulation techniques to alter an analog signal's properties (amplitude, frequency, phase) to carry binary data.

Signup and view all the flashcards

Amplitude Modulation (AM)

Modulation technique where the amplitude (height) of a carrier wave varies to represent binary data.

Signup and view all the flashcards

Frequency Modulation (FM)

Modulation technique where the frequency (number of waves per unit time) varies to represent binary data.

Signup and view all the flashcards

Phase-Shift Keying (PSK)

Modulation technique where the phase (wave starting position) of a carrier wave changes to represent binary data.

Signup and view all the flashcards

Multiplexing

Combining multiple signals onto a single communication channel to efficiently use bandwidth and resources.

Signup and view all the flashcards

Why is multiplexing important?

Multiplexing allows for efficient bandwidth utilization, cost reduction, and scalable communication by enabling multiple users or signals to share the same channel.

Signup and view all the flashcards

HTTP Status Codes

Numbers indicating the outcome of an HTTP request, categorized by their first digit.

Signup and view all the flashcards

GET vs. POST

GET retrieves data with parameters shown in the URL, while POST sends data with hidden parameters in the body.

Signup and view all the flashcards

Content-Type Header

Informs the receiver about the format of the data being sent, like JSON or HTML.

Signup and view all the flashcards

Content-Length Header

Specifies the size of the message body in bytes, so the receiver knows when it has received all the data.

Signup and view all the flashcards

Proxy

A server acting on behalf of clients, improving performance (e.g., caching) or providing security (e.g., hiding IP addresses).

Signup and view all the flashcards

Gateway

A server-side intermediary that enhances or enforces security for services.

Signup and view all the flashcards

HTML Structure

Organizes web content into semantic elements using tags, defining structure, embedding multimedia, and providing hyperlinks.

Signup and view all the flashcards

Web Content Layers

HTML for content, CSS for styling, and JavaScript for behavior, forming a layered approach to web development.

Signup and view all the flashcards

127.0.0.1 in HTTP

The loopback address used to test web servers and applications locally, without an external network, allowing developers to work directly with the server.

Signup and view all the flashcards

ACKs (Acknowledgments)

Signals sent by the receiver to confirm successful receipt of data packets.

Signup and view all the flashcards

Retransmissions (TCP)

TCP re-sends data packets if an acknowledgment (ACK) is not received within a set timeframe, guaranteeing reliable delivery.

Signup and view all the flashcards

Why TCP Isn't Ideal for Real-time Applications

TCP prioritizes reliability over speed, leading to latency caused by retransmissions, making it unsuitable for time-sensitive applications like video streaming or online gaming.

Signup and view all the flashcards

UDP (User Datagram Protocol)

A faster, less reliable protocol that prioritizes speed over guaranteed delivery, making it a better choice for real-time applications where some data loss is acceptable.

Signup and view all the flashcards

HTTP (Hypertext Transfer Protocol)

A stateless protocol used for communication on the World Wide Web, allowing clients to request and retrieve resources like web pages and images.

Signup and view all the flashcards

Resource (Web)

Any identifiable item on the web accessible via HTTP, such as web pages, documents, images, or videos.

Signup and view all the flashcards

Representation of Resources

The way a resource is presented to the user, like an HTML page or a JSON object, depending on the requested format.

Signup and view all the flashcards

RESTful Architecture

A software architectural style that uses standard HTTP methods like GET, POST, PUT, and DELETE to interact with web resources.

Signup and view all the flashcards

HTTP Methods

Actions performed on web resources, including retrieving (GET), submitting (POST), updating (PUT), and deleting (DELETE).

Signup and view all the flashcards

URL (Uniform Resource Locator)

A web address that specifies the location of a resource and how to access it, containing components like scheme, host, port, path, and query string.

Signup and view all the flashcards

HTTP/2 vs. HTTP/1.1

HTTP/2 offers enhanced performance, security, and efficiency compared to HTTP/1.1, featuring features like request pipelining, server push, and binary encoding.

Signup and view all the flashcards

Study Notes

Text Encodings

  • Text encodings map characters to binary data for computer storage, processing, and transmission.
  • Standardization ensures cross-platform text compatibility.

UTF-8

  • UTF-8 is a variable-length character encoding supporting Unicode characters.
  • It's backward compatible with ASCII, efficient for common characters.
  • Better than ASCII for non-English text and special characters.

Addressing on the Internet

  • Device (Machine): Identified by IP address (IPv4 or IPv6).
  • Process (Application): Identified by a port number, forming a socket address with the IP address.

TCP Solutions

  • TCP provides reliable data transmission, including:
    • Error detection and correction (checksums)
    • Flow control (preventing sender overload)
    • Congestion control (adjusting transmission rate).
    • Packet sequence and acknowledgements for order and error detection.

Reliable TCP Transmission

  • TCP establishes connections using a three-way handshake.
  • Acknowledgments (ACKs) confirm receipt of packets.
  • Sequence numbers ensure correct order and detect lost packets.
  • Retransmissions handle missing acknowledgments.
  • Checksums verify data integrity.

Applications Not Optimal with TCP

  • Some real-time applications (e.g., video streaming, VoIP, online gaming) may use UDP due to TCP's retransmissions and overhead.
  • These applications prioritize low latency over absolute reliability.

Domain Name Service (DNS)

  • DNS translates human-readable domain names (e.g., www.example.com) into IP addresses.
  • Simplifies internet access by providing more accessible URLs.

DNS Structure

  • Resolver: Client-side component querying the DNS server.
  • Root Servers: Top-level servers directing queries to TLD servers.
  • TLD Servers: Handle top-level domains (e.g., .com).
  • Authoritative Servers: Definitive source of DNS records for a domain.
  • DNS Records: Include A (IPv4), AAAA (IPv6), MX (mail), CNAME (alias), TXT (text) records.

Boolean Algebra

  • Boolean Algebra uses True (1) and False (0) as values.

Boolean Operator OR

  • The OR operator returns True (1) if at least one input is True.
    • Truth table:
      A B A OR B
      0 0 0
      0 1 1
      1 0 1
      1 1 1

Binary Numbers

  • MSB (Most Significant Bit): Leftmost bit, highest value.
  • LSB (Least Significant Bit): Rightmost bit, lowest value.

Binary to Decimal Conversion

  • Converting Binary 1101 to decimal: 13.

Binary Addition Rules

  • 0 + 0 = 0
  • 0 + 1 = 1
  • 1 + 0 = 1
  • 1 + 1 = 10 (carry 1)

Signed Number Representation

  • Sign-Magnitude: MSB is the sign bit; remaining bits represent the absolute value (two zeros, +0 & -0).
  • One's Complement: Negative number represented by inverting all bits of its absolute value (two zeros, +0 & -0).
  • Two's Complement: Most common method, negative number represented by inverting all bits and adding 1.

Floating-Point Values

  • Floating-point numbers represent real numbers using sign, exponent, and mantissa.

Character Set

  • A character set is a collection of recognizable characters for computers (letters, digits, symbols, control characters).

Character Encoding

  • Character encoding maps characters to binary values, enabling computer interpretation.
    • Example: ASCII (A=01000001), UTF-8

CPU Instruction Set

  • The CPU instruction set contains machine-level commands, controlling CPU operations.

Program vs. Process

  • Program: Static set of instructions (file).
  • Process: Program in execution (dynamic).

Operating Systems (OS)

  • OS manages hardware resources, processes, files, security, and user interfaces.

Programming Languages

  • Programming languages allow developers to write instructions for computers to perform tasks.

Networks

  • Networks enable connected devices to share resources (hardware, software), communicate (real-time interactions), and maintain reliability with redundancy.

Signal Transmission

  • Signals can be analog (continuous) or digital (discrete).
  • Media for transmission include copper cables, fiber optic cables, and wireless mediums.

Binary Signal Encoding

  • NRZ (Non-Return-to-Zero): 1 is high voltage, 0 is low voltage.
    • Example: 10110 → high-low-high-high-low

Analog Signal Encoding

  • Modulation techniques (AM, FM, PSK) alter analog wave characteristics (amplitude, frequency, phase) based on binary input.
    • AM: Amplitude variations.
    • FM: Frequency variations.
    • PSK: Phase variations.

Multiplexing

  • Multiplexing combines multiple signals into a single communication channel.
    • TDM: Signals take turns by time slots.
    • FDM: Signals occupy separate frequency bands.

Network Elements

  • Nodes: Devices connected to the network.
  • Links: Connections between nodes.
  • Topology: Arrangement of nodes and links.
  • Protocols: Rules for communication.
  • Bandwidth: Network link’s data rate.
  • Latency: Data transmission delay.

Internet Protocol

  • "Internet" refers to the interconnected networking of computer networks.
  • The OSI model standardizes and describes how networking protocols and hardware interact.

OSI Network Layer (IP)

  • IP routes data packets across multiple networks using IP addresses.
  • Handles packet fragmentation.

IP Packet Information

  • IP packets include header metadata (source/destination IP, protocol, total length) and payload (actual data).
  • IPv4 has a max payload of ~65,515 bytes.
  • IPv6 allows a much larger possible payload.

Unreliable IP Nature

  • IP prioritizes speed of delivery over ensuring all packets arrive.

IP Address

  • IP address uniquely identifies a device on the network, used for routing.

Loopback Address

  • 127.0.0.1 refers to the local host, enabling testing without an external network.

TCP

  • TCP provides a connection-oriented, reliable data transmission service.
    • Three-way handshake for connections.
    • Acknowledgements (ACKs) confirm successful packet receipt.
    • Sequence numbers ensure proper order.
    • Retransmissions handle missing packets.

Non-Ideal TCP Applications

  • Applications like video streaming, online gaming, and VoIP may use UDP instead of TCP due to prioritized speed over reliability.

IPv4 Address Identification

  • Four decimal numbers, from 0 to 255, separated by periods (e.g., 192.168.1.1).

IPv6 Address Identification

  • Eight groups of four hexadecimal digits, separated by colons (e.g., 2001:0db8:85a3:0000:0000:8a2e:0370:7334).
  • Can use shortening rules.

HTTP

  • HTTP is a stateless, application-layer protocol for client-server communication on the web.
    • GET, POST, PUT, and DELETE are basic HTTP methods.

Web Resources

  • Web resources are items accessible via HTTP, represented by their data, e.g., files, text, images, etc.

HTTP Methods

  • HTTP methods define actions performed on web resources.
    • GET retrieves resources.
    • POST submits data for modification.

URL Components

  • URLs specify resource locations, including scheme, host, port, path, and query string.

HTTP/2

  • HTTP/2 improves performance and efficiency over HTTP/1.1 by enabling multiplexing, server push, binary data, and header compression.

HTTP Message Structure

  • HTTP messages have a request/status line, headers, and an optional body.
    • Request/status line includes method, URI, protocol version, status code, reason phrase.
    • Headers include metadata about the message (e.g., content type).

HTTP Status Codes

  • HTTP status codes are grouped by their first digit (1xx, 2xx, 3xx, 4xx, 5xx), indicating status categories.
    • 2xx codes indicate success (e.g., 200 OK).
    • 4xx codes indicate client errors (e.g., 404 Not Found).

Character Encoding in HTTP

  • Character encoding (e.g., UTF-8) is crucial in HTTP to correctly handle text characters beyond ASCII.

HTTP Proxies and Gateways

  • HTTP proxies act on behalf of clients.
  • Gateways are intermediaries on the server side.

HTTP Headers (Content-Type / Content-Length)

  • Content-Type specifies the data format.
  • Content-Length provides the size of the data body.

Web Content Layers

  • Web content layers include HTML for structure, CSS for style, and JavaScript for behavior. (HTML, CSS, Javascript)

GET vs. POST

  • GET is primarily for retrieving resources, and POST for sending data to the server.

127.0.0.1 for Testing

  • 127.0.0.1 is the loopback address, useful for testing web applications on the same machine.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Description

This quiz covers essential concepts in computer networking and text encoding, including UTF-8 and TCP solutions. Test your understanding of how text encodings are implemented and the mechanisms that enable reliable data transmission over networks.

More Like This

Basic Economics Concepts Quiz
5 questions
Understanding Encoded Text
28 questions
Text Encoding and Networking Quiz
86 questions
Network Protocols and Text Encoding
90 questions
Use Quizgecko on...
Browser
Browser