Computer Networks Lecture 4: Application Models and Security

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

Which layer will be discussed in the lecture?

  • Network Layer
  • Transport Layer
  • Data Link Layer
  • Application Layer (correct)

Which of the following is an example of a program run on the application layer?

  • E-mail (correct)
  • IP Addressing
  • UDP
  • Routing Protocol

What is the protocol used for file transfer at the application layer?

  • TCP
  • FTP (correct)
  • SMTP
  • HTTP

Which of the following is not an example of an application layer program?

<p>Switches (B)</p>
Signup and view all the answers

What are the two application models mentioned in the text?

<p>Client-Server and Peer-to-Peer (D)</p>
Signup and view all the answers

What type of protocol is HTTP at the application layer?

<p>Hypertext Transfer Protocol (C)</p>
Signup and view all the answers

What is a characteristic of the client in a Client-Server network model?

<p>It may be intermittently connected (C)</p>
Signup and view all the answers

What does the server do in the Client-Server network model?

<p>It stores and responds to data requested by clients (B)</p>
Signup and view all the answers

In Peer-to-Peer (P2P) network model, what does each node function as?

<p>Client and server (A)</p>
Signup and view all the answers

What is a characteristic of Peer-to-Peer (P2P) network model in comparison to Client-Server model?

<p>Each peer has its own centralized data storage (D)</p>
Signup and view all the answers

How do processes within the same host communicate in the Peer-to-Peer (P2P) model?

<p>By directly communicating with each other (D)</p>
Signup and view all the answers

What differentiates the clients and servers in the Client-Server network model?

<p>They are not differentiated (B)</p>
Signup and view all the answers

What is a characteristic of clients in the Peer-to-Peer (P2P) model?

<p>They can provide service in return to other peers (B)</p>
Signup and view all the answers

What is a characteristic of Peer-to-Peer (P2P) networks in comparison to Client-Server networks?

<p>New peers do not bring new service capacity in P2P networks (A)</p>
Signup and view all the answers

What characterizes the communication of two processes within the same host in the Peer-to-Peer (P2P) model?

<p>Direct communication without going through a separate server (B)</p>
Signup and view all the answers

What do applications with P2P architectures have in the Peer-to-Peer model?

<p>Both client processes &amp; server processes (C)</p>
Signup and view all the answers

What is the responsibility of the data link layer in a computer network?

<p>Transferring datagram from one node to physically adjacent node over a link (A)</p>
Signup and view all the answers

Which hardware is an example of the implementation of the data link layer?

<p>Ethernet card (D)</p>
Signup and view all the answers

What does the data-link layer do with the packets from the network layer?

<p>Encapsulates them into frames and sends each frame bit-by-bit on the hardware (A)</p>
Signup and view all the answers

What is the main function of the framing process in the data link layer?

<p>To encapsulate packets from the network layer into frames (B)</p>
Signup and view all the answers

In a computer network, what role does the data link layer play at each network node?

<p>Transferring datagram from one node to physically adjacent node over a link (D)</p>
Signup and view all the answers

What represents an example of datagram transferred by different link protocols over different links?

<p>Ethernet on one link, 802.11 on another link (C)</p>
Signup and view all the answers

What is the responsibility of the Logical Link Control (LLC) sublayer of the data link layer?

<p>Dealing with framing, flow of data, and error detection/correction (A)</p>
Signup and view all the answers

Which type of error means that two or more bits in the data unit have changed from 0 to 1 or vice-versa?

<p>Burst error (C)</p>
Signup and view all the answers

What is the primary purpose of using a redundant bit in the simple parity check mechanism for error detection?

<p>To ensure the overall number of bits is even (A)</p>
Signup and view all the answers

What does the Media Access Control (MAC) sublayer of the data link layer primarily handle?

<p>Handling hardware addressing and media access control (C)</p>
Signup and view all the answers

What is a characteristic of burst errors in data units?

<p>Two or more bits in the data unit have changed from 0 to 1 or vice-versa (B)</p>
Signup and view all the answers

What differentiates the Two-dimensions Parity Check from the simple parity check mechanism?

<p>It calculates parity check bits for each row and column, aiding in improved performance and error correction (C)</p>
Signup and view all the answers

Which mechanism is considered the most common and least expensive for error detection in data units?

<p>Simple Parity Checking or One-dimension Parity Check (A)</p>
Signup and view all the answers

What is primarily responsible for controlling physical media access in the data link layer?

<p>Handling hardware addressing and media access control (D)</p>
Signup and view all the answers

What is the primary purpose of using Cyclic Redundancy Check (CRC) as an error detection mechanism?

<p>To detect errors caused by signal attenuation and noise (A)</p>
Signup and view all the answers

What is a potential benefit of using Two-dimensions Parity Check over simple parity check for error detection?

<p>It organizes the block of bits in a table for improved performance (A)</p>
Signup and view all the answers

Flashcards are hidden until you start studying

More Like This

Use Quizgecko on...
Browser
Browser