Computer Networks Lecture 4: Application Models and Security
32 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which layer will be discussed in the lecture?

  • Network Layer
  • Transport Layer
  • Data Link Layer
  • Application Layer (correct)
  • Which of the following is an example of a program run on the application layer?

  • E-mail (correct)
  • IP Addressing
  • UDP
  • Routing Protocol
  • What is the protocol used for file transfer at the application layer?

  • TCP
  • FTP (correct)
  • SMTP
  • HTTP
  • Which of the following is not an example of an application layer program?

    <p>Switches</p> Signup and view all the answers

    What are the two application models mentioned in the text?

    <p>Client-Server and Peer-to-Peer</p> Signup and view all the answers

    What type of protocol is HTTP at the application layer?

    <p>Hypertext Transfer Protocol</p> Signup and view all the answers

    What is a characteristic of the client in a Client-Server network model?

    <p>It may be intermittently connected</p> Signup and view all the answers

    What does the server do in the Client-Server network model?

    <p>It stores and responds to data requested by clients</p> Signup and view all the answers

    In Peer-to-Peer (P2P) network model, what does each node function as?

    <p>Client and server</p> Signup and view all the answers

    What is a characteristic of Peer-to-Peer (P2P) network model in comparison to Client-Server model?

    <p>Each peer has its own centralized data storage</p> Signup and view all the answers

    How do processes within the same host communicate in the Peer-to-Peer (P2P) model?

    <p>By directly communicating with each other</p> Signup and view all the answers

    What differentiates the clients and servers in the Client-Server network model?

    <p>They are not differentiated</p> Signup and view all the answers

    What is a characteristic of clients in the Peer-to-Peer (P2P) model?

    <p>They can provide service in return to other peers</p> Signup and view all the answers

    What is a characteristic of Peer-to-Peer (P2P) networks in comparison to Client-Server networks?

    <p>New peers do not bring new service capacity in P2P networks</p> Signup and view all the answers

    What characterizes the communication of two processes within the same host in the Peer-to-Peer (P2P) model?

    <p>Direct communication without going through a separate server</p> Signup and view all the answers

    What do applications with P2P architectures have in the Peer-to-Peer model?

    <p>Both client processes &amp; server processes</p> Signup and view all the answers

    What is the responsibility of the data link layer in a computer network?

    <p>Transferring datagram from one node to physically adjacent node over a link</p> Signup and view all the answers

    Which hardware is an example of the implementation of the data link layer?

    <p>Ethernet card</p> Signup and view all the answers

    What does the data-link layer do with the packets from the network layer?

    <p>Encapsulates them into frames and sends each frame bit-by-bit on the hardware</p> Signup and view all the answers

    What is the main function of the framing process in the data link layer?

    <p>To encapsulate packets from the network layer into frames</p> Signup and view all the answers

    In a computer network, what role does the data link layer play at each network node?

    <p>Transferring datagram from one node to physically adjacent node over a link</p> Signup and view all the answers

    What represents an example of datagram transferred by different link protocols over different links?

    <p>Ethernet on one link, 802.11 on another link</p> Signup and view all the answers

    What is the responsibility of the Logical Link Control (LLC) sublayer of the data link layer?

    <p>Dealing with framing, flow of data, and error detection/correction</p> Signup and view all the answers

    Which type of error means that two or more bits in the data unit have changed from 0 to 1 or vice-versa?

    <p>Burst error</p> Signup and view all the answers

    What is the primary purpose of using a redundant bit in the simple parity check mechanism for error detection?

    <p>To ensure the overall number of bits is even</p> Signup and view all the answers

    What does the Media Access Control (MAC) sublayer of the data link layer primarily handle?

    <p>Handling hardware addressing and media access control</p> Signup and view all the answers

    What is a characteristic of burst errors in data units?

    <p>Two or more bits in the data unit have changed from 0 to 1 or vice-versa</p> Signup and view all the answers

    What differentiates the Two-dimensions Parity Check from the simple parity check mechanism?

    <p>It calculates parity check bits for each row and column, aiding in improved performance and error correction</p> Signup and view all the answers

    Which mechanism is considered the most common and least expensive for error detection in data units?

    <p>Simple Parity Checking or One-dimension Parity Check</p> Signup and view all the answers

    What is primarily responsible for controlling physical media access in the data link layer?

    <p>Handling hardware addressing and media access control</p> Signup and view all the answers

    What is the primary purpose of using Cyclic Redundancy Check (CRC) as an error detection mechanism?

    <p>To detect errors caused by signal attenuation and noise</p> Signup and view all the answers

    What is a potential benefit of using Two-dimensions Parity Check over simple parity check for error detection?

    <p>It organizes the block of bits in a table for improved performance</p> Signup and view all the answers

    More Like This

    Use Quizgecko on...
    Browser
    Browser