Computer Networks Lecture 4: Application Models and Security

LionheartedDada avatar
LionheartedDada
·
·
Download

Start Quiz

Study Flashcards

32 Questions

Which layer will be discussed in the lecture?

Application Layer

Which of the following is an example of a program run on the application layer?

E-mail

What is the protocol used for file transfer at the application layer?

FTP

Which of the following is not an example of an application layer program?

Switches

What are the two application models mentioned in the text?

Client-Server and Peer-to-Peer

What type of protocol is HTTP at the application layer?

Hypertext Transfer Protocol

What is a characteristic of the client in a Client-Server network model?

It may be intermittently connected

What does the server do in the Client-Server network model?

It stores and responds to data requested by clients

In Peer-to-Peer (P2P) network model, what does each node function as?

Client and server

What is a characteristic of Peer-to-Peer (P2P) network model in comparison to Client-Server model?

Each peer has its own centralized data storage

How do processes within the same host communicate in the Peer-to-Peer (P2P) model?

By directly communicating with each other

What differentiates the clients and servers in the Client-Server network model?

They are not differentiated

What is a characteristic of clients in the Peer-to-Peer (P2P) model?

They can provide service in return to other peers

What is a characteristic of Peer-to-Peer (P2P) networks in comparison to Client-Server networks?

New peers do not bring new service capacity in P2P networks

What characterizes the communication of two processes within the same host in the Peer-to-Peer (P2P) model?

Direct communication without going through a separate server

What do applications with P2P architectures have in the Peer-to-Peer model?

Both client processes & server processes

What is the responsibility of the data link layer in a computer network?

Transferring datagram from one node to physically adjacent node over a link

Which hardware is an example of the implementation of the data link layer?

Ethernet card

What does the data-link layer do with the packets from the network layer?

Encapsulates them into frames and sends each frame bit-by-bit on the hardware

What is the main function of the framing process in the data link layer?

To encapsulate packets from the network layer into frames

In a computer network, what role does the data link layer play at each network node?

Transferring datagram from one node to physically adjacent node over a link

What represents an example of datagram transferred by different link protocols over different links?

Ethernet on one link, 802.11 on another link

What is the responsibility of the Logical Link Control (LLC) sublayer of the data link layer?

Dealing with framing, flow of data, and error detection/correction

Which type of error means that two or more bits in the data unit have changed from 0 to 1 or vice-versa?

Burst error

What is the primary purpose of using a redundant bit in the simple parity check mechanism for error detection?

To ensure the overall number of bits is even

What does the Media Access Control (MAC) sublayer of the data link layer primarily handle?

Handling hardware addressing and media access control

What is a characteristic of burst errors in data units?

Two or more bits in the data unit have changed from 0 to 1 or vice-versa

What differentiates the Two-dimensions Parity Check from the simple parity check mechanism?

It calculates parity check bits for each row and column, aiding in improved performance and error correction

Which mechanism is considered the most common and least expensive for error detection in data units?

Simple Parity Checking or One-dimension Parity Check

What is primarily responsible for controlling physical media access in the data link layer?

Handling hardware addressing and media access control

What is the primary purpose of using Cyclic Redundancy Check (CRC) as an error detection mechanism?

To detect errors caused by signal attenuation and noise

What is a potential benefit of using Two-dimensions Parity Check over simple parity check for error detection?

It organizes the block of bits in a table for improved performance

Test your knowledge on application models, process communication, messaging properties, applications requirements, transport layer protocols, and application layer security in computer networking. This quiz is based on material covered in Lecture 4 by Dr. Dina Fawzy and the book 'Computer Networking: A Top Down Approach' by Jim Kurose and Keith Ross, 6th edition.

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

Get started for free
Use Quizgecko on...
Browser
Browser