IETF Standards and Network Basics
191 Questions
0 Views

IETF Standards and Network Basics

Created by
@FineEllipsis

Questions and Answers

Which of the following tasks is not done by data link layer?

  • Flow control
  • Error control
  • Framing
  • Channel coding (correct)
  • Which sublayer of the data link layer performs data link functions that depend upon the type of medium?

  • Media access control sublayer (correct)
  • Network interface control sublayer
  • Error control sublayer
  • Logical link control sublayer
  • Header of a frame generally contains:

  • Addresses
  • Frame identifier
  • All of the mentioned (correct)
  • Synchronization bytes
  • Automatic repeat request error management mechanism is provided by:

    <p>Logical link control sublayer</p> Signup and view all the answers

    When 2 or more bits in a data unit have been changed during transmission, the error is called:

    <p>Burst error</p> Signup and view all the answers

    CRC stands for:

    <p>Cyclic redundancy check</p> Signup and view all the answers

    Which of the following is a data link protocol?

    <p>All of the mentioned</p> Signup and view all the answers

    Which of the following is the multiple access protocol for channel access control?

    <p>Both CSMA/CD &amp; CSMA/CA</p> Signup and view all the answers

    The technique of temporarily delaying outgoing acknowledgements so that they can be hooked onto the next outgoing data frame is called:

    <p>Piggybacking</p> Signup and view all the answers

    Transport layer aggregates data from different applications into a single stream before passing it to:

    <p>Network layer</p> Signup and view all the answers

    Which of the following are transport layer protocols used in networking?

    <p>TCP and UDP</p> Signup and view all the answers

    User Datagram Protocol is called connectionless because:

    <p>All UDP packets are treated independently by transport layer</p> Signup and view all the answers

    Transmission Control Protocol:

    <p>All of the mentioned</p> Signup and view all the answers

    An endpoint of an inter-process communication flow across a computer network is called:

    <p>Socket</p> Signup and view all the answers

    Socket-style API for Windows is called:

    <p>Winsock</p> Signup and view all the answers

    Which one of the following is a version of UDP with congestion control?

    <p>Datagram Congestion Control Protocol</p> Signup and view all the answers

    A _____ is a TCP name for a transport service access point.

    <p>Port</p> Signup and view all the answers

    Transport layer protocols deal with:

    <p>Process to process communication</p> Signup and view all the answers

    Which of the following is a transport layer protocol?

    <p>Stream Control Transmission Protocol</p> Signup and view all the answers

    The network layer is concerned with:

    <p>Packets</p> Signup and view all the answers

    Which one of the following is not a function of the network layer?

    <p>Error control</p> Signup and view all the answers

    A 4 byte IP address consists of:

    <p>Network address &amp; host address</p> Signup and view all the answers

    In a virtual circuit network, each packet contains:

    <p>A short VC number</p> Signup and view all the answers

    Which of the following routing algorithms can be used for network layer design?

    <p>All of the mentioned</p> Signup and view all the answers

    Which of the following is not correct concerning multi-destination routing?

    <p>Data is not sent by packets</p> Signup and view all the answers

    A subset of a network that includes all the routers but contains no loops is called:

    <p>Spanning tree</p> Signup and view all the answers

    Which one of the following algorithms is not used for congestion control?

    <p>Routing Information Protocol</p> Signup and view all the answers

    The network layer protocol for the internet is:

    <p>Internet Protocol</p> Signup and view all the answers

    ICMP is primarily used for:

    <p>Error and diagnostic functions</p> Signup and view all the answers

    Which is not an application layer protocol?

    <p>TCP</p> Signup and view all the answers

    The packet of information at the application layer is called:

    <p>Message</p> Signup and view all the answers

    Which one of the following is an architecture paradigm?

    <p>Both Peer-to-Peer &amp; Client-Server</p> Signup and view all the answers

    Application developer has permission to decide the following on transport layer side:

    <p>Both Transport layer protocol and Maximum buffer size</p> Signup and view all the answers

    Application layer offers _______ service.

    <p>End to end</p> Signup and view all the answers

    E-mail is _________

    <p>Elastic application</p> Signup and view all the answers

    Pick the odd one out.

    <p>Interactive games</p> Signup and view all the answers

    Which of the following is an application layer service?

    <p>All of the mentioned</p> Signup and view all the answers

    To deliver a message to the correct application program running on a host, the _______ address must be consulted.

    <p>Port</p> Signup and view all the answers

    Which is a time-sensitive service?

    <p>Internet telephony</p> Signup and view all the answers

    Transport services available to applications in one or another form ________.

    <p>All of the mentioned</p> Signup and view all the answers

    Electronic mail uses which Application layer protocol?

    <p>SMTP</p> Signup and view all the answers

    The entire hostname has a maximum of __________.

    <p>255 characters</p> Signup and view all the answers

    A DNS client is called _________.

    <p>DNS resolver</p> Signup and view all the answers

    Servers handle requests for other domains _______.

    <p>By contacting remote DNS server</p> Signup and view all the answers

    DNS database contains _______.

    <p>All of the mentioned</p> Signup and view all the answers

    If a server has no clue about where to find the address for a hostname, then _______.

    <p>Server asks to the root server</p> Signup and view all the answers

    Which one of the following allows clients to update their DNS entry as their IP address changes?

    <p>Dynamic DNS</p> Signup and view all the answers

    Wildcard domain names start with label _______.

    <ul> <li></li> </ul> Signup and view all the answers

    The right to use a domain name is delegated by domain name registrars which are accredited by _______.

    <p>Internet corporation for assigned names and numbers</p> Signup and view all the answers

    The domain name system is maintained by _______.

    <p>Distributed database system</p> Signup and view all the answers

    Which one of the following is not true?

    <p>A single hostname may correspond to a single IP address</p> Signup and view all the answers

    A piece of icon or image on a web page associated with another webpage is called ______.

    <p>Hyperlink</p> Signup and view all the answers

    Dynamic web page ______.

    <p>Generates on demand by a program or a request from browser</p> Signup and view all the answers

    What is a web browser?

    <p>All of the mentioned</p> Signup and view all the answers

    Common gateway interface is used to _______.

    <p>Generate executable files from web content by web server</p> Signup and view all the answers

    URL stands for ________.

    <p>Uniform resource locator</p> Signup and view all the answers

    A web cookie is a small piece of data that is _______.

    <p>Sent from a website and stored in user’s web browser while a user is browsing a website</p> Signup and view all the answers

    Which one of the following is not used to generate dynamic web pages?

    <p>CSS</p> Signup and view all the answers

    An alternative to JavaScript on Windows platform is _______.

    <p>VBScript</p> Signup and view all the answers

    What is document object model (DOM)?

    <p>Convention for representing and interacting with objects in HTML documents</p> Signup and view all the answers

    The TTL field has value 10. How many routers (max) can process this datagram?

    <p>10</p> Signup and view all the answers

    If the value in the protocol field is 17, the transport layer protocol used is _____________.

    <p>UDP</p> Signup and view all the answers

    The data field cannot carry which of the following?

    <p>ICMP messages</p> Signup and view all the answers

    What should be the flag value to indicate the last fragment?

    <p>0</p> Signup and view all the answers

    Which of these is not applicable for IP protocol?

    <p>Offer reliable service</p> Signup and view all the answers

    Which of the following demerits does fragmentation have?

    <p>All of the mentioned</p> Signup and view all the answers

    Which field helps to check the rearrangement of the fragments?

    <p>Offset</p> Signup and view all the answers

    The IETF standards documents are called ________

    <p>RFC</p> Signup and view all the answers

    In the layer hierarchy as the data packet moves from the upper to the lower layers, headers are ___________

    <p>Added</p> Signup and view all the answers

    The structure or format of data is called ___________

    <p>Syntax</p> Signup and view all the answers

    Communication between a computer and a keyboard involves ______________ transmission.

    <p>Simplex</p> Signup and view all the answers

    The first Network was called ________

    <p>ARPANET</p> Signup and view all the answers

    A _______ is the physical path over which a message travels.

    <p>Medium</p> Signup and view all the answers

    Which organization has authority over interstate and international commerce in the communications field?

    <p>FCC</p> Signup and view all the answers

    Which of this is not a network edge device?

    <p>Switch</p> Signup and view all the answers

    A _________ set of rules that governs data communication.

    <p>Protocols</p> Signup and view all the answers

    Three or more devices share a link in ________ connection.

    <p>Multipoint</p> Signup and view all the answers

    When a collection of various computers seems a single coherent system to its client, then it is called _________

    <p>Distributed system</p> Signup and view all the answers

    Two devices are in a network if __________

    <p>A process in one device is able to exchange information with a process in another device</p> Signup and view all the answers

    Which of the following computer networks is built on the top of another network?

    <p>Overlay network</p> Signup and view all the answers

    In computer networks, nodes are _________

    <p>All of the mentioned</p> Signup and view all the answers

    Communication channel is shared by all the machines on the network in ________

    <p>Broadcast network</p> Signup and view all the answers

    Bluetooth is an example of __________

    <p>Personal area network</p> Signup and view all the answers

    A __________ is a device that forwards packets between networks by processing the routing information included in the packet.

    <p>Router</p> Signup and view all the answers

    A list of protocols used by a system, one protocol per layer, is called ________

    <p>Protocol stack</p> Signup and view all the answers

    Network congestion occurs _________

    <p>In case of traffic overloading</p> Signup and view all the answers

    Which of the following networks extends a private network across public networks?

    <p>Virtual private network</p> Signup and view all the answers

    Which of this is not a constituent of residential telephone line?

    <p>A low-speed downstream channel</p> Signup and view all the answers

    DSL telcos provide which of the following services?

    <p>Wired phone access and ISP</p> Signup and view all the answers

    The function of DSLAM is to __________

    <p>Convert analog signals into digital signals</p> Signup and view all the answers

    Which of the following terms is not associated with DSL?

    <p>CMTS</p> Signup and view all the answers

    HFC contains _______

    <p>A combination of Fibre cable and Coaxial cable</p> Signup and view all the answers

    Which of the following statements is not applicable for cable internet access?

    <p>Analog signal is converted to digital signal in DSLAM</p> Signup and view all the answers

    Among the optical-distribution architectures that are essentially switched ethernet is __________

    <p>AON</p> Signup and view all the answers

    StarBand provides __________

    <p>Satellite access</p> Signup and view all the answers

    Home Access is provided by __________

    <p>All of the mentioned</p> Signup and view all the answers

    ONT is connected to the splitter using _________

    <p>Optical cable</p> Signup and view all the answers

    Which of the following factors affect transmission rate in DSL?

    <p>The gauge of the twisted-pair line and degree of electrical interference</p> Signup and view all the answers

    How many layers are present in the Internet protocol stack (TCP/IP model)?

    <p>5</p> Signup and view all the answers

    The number of layers in ISO OSI reference model is __________

    <p>7</p> Signup and view all the answers

    Which of the following layers is an addition to the OSI model when compared with the TCP/IP model?

    <p>Session and Presentation layer</p> Signup and view all the answers

    Application layer is implemented in ____________

    <p>End system</p> Signup and view all the answers

    Transport layer is implemented in ______________

    <p>End system</p> Signup and view all the answers

    The functionalities of the presentation layer include ____________

    <p>All of the mentioned</p> Signup and view all the answers

    Delimiting and synchronization of data exchange is provided by __________

    <p>Session layer</p> Signup and view all the answers

    In OSI model, when data is sent from device A to device B, the 5th layer to receive data at B is _________

    <p>Session layer</p> Signup and view all the answers

    In TCP/IP Model, when data is sent from device A to device B, the 5th layer to receive data at B is ____________

    <p>Application layer</p> Signup and view all the answers

    In the OSI model, as a data packet moves from the lower to the upper layers, headers are _______

    <p>Removed</p> Signup and view all the answers

    Which of the following statements can be associated with OSI model?

    <p>Functionality at one layer no way requires information from another layer</p> Signup and view all the answers

    OSI stands for __________

    <p>Open System Interconnection</p> Signup and view all the answers

    The number of layers in ISO OSI reference model is __________

    <p>7</p> Signup and view all the answers

    TCP/IP model does not have ______ layer but OSI model have this layer.

    <p>Session layer</p> Signup and view all the answers

    Which layer is used to link the network support layers and user support layers?

    <p>Transport layer</p> Signup and view all the answers

    Which address is used on the internet for employing the TCP/IP protocols?

    <p>All of the mentioned</p> Signup and view all the answers

    TCP/IP model was developed _____ the OSI model.

    <p>Prior to</p> Signup and view all the answers

    Which layer is responsible for process to process delivery in a general network model?

    <p>Transport layer</p> Signup and view all the answers

    Which address is used to identify a process on a host by the transport layer?

    <p>Port address</p> Signup and view all the answers

    Which layer provides the services to the user?

    <p>Application layer</p> Signup and view all the answers

    Transmission data rate is decided by ____________

    <p>Physical layer</p> Signup and view all the answers

    The physical layer is concerned with ___________

    <p>Bit-by-bit delivery</p> Signup and view all the answers

    Which transmission media provides the highest transmission speed in a network?

    <p>Optical fiber</p> Signup and view all the answers

    Bits can be sent over guided and unguided media as analog signal by ___________

    <p>Digital modulation</p> Signup and view all the answers

    The portion of the physical layer that interfaces with the media access control sublayer is called ___________

    <p>Physical signaling sublayer</p> Signup and view all the answers

    The physical layer provides __________

    <p>All of the mentioned</p> Signup and view all the answers

    In asynchronous serial communication the physical layer provides ___________

    <p>Both start &amp; stop signaling and flow control</p> Signup and view all the answers

    The physical layer is responsible for __________

    <p>All of the mentioned</p> Signup and view all the answers

    The physical layer translates logical communication requests from the ______ into hardware specific operations.

    <p>Data link layer</p> Signup and view all the answers

    A single channel is shared by multiple signals by ____________

    <p>Multiplexing</p> Signup and view all the answers

    Wireless transmission of signals can be done via ___________

    <p>All of the mentioned</p> Signup and view all the answers

    The data link layer takes the packets from _________ and encapsulates them into frames for transmission.

    <p>Network layer</p> Signup and view all the answers

    In classless addressing, there are no classes but addresses are still granted in ______.

    <p>Blocks</p> Signup and view all the answers

    In IPv4 Addresses, classful addressing is replaced with ________.

    <p>Classless Addressing</p> Signup and view all the answers

    First address in a block is used as network address that represents the ________.

    <p>Organization</p> Signup and view all the answers

    In classful addressing, a large part of available addresses are ________.

    <p>Wasted</p> Signup and view all the answers

    Network addresses are a very important concept of ________.

    <p>IP Addressing</p> Signup and view all the answers

    Which of this is not a class of IP address? ______.

    <p>Class F</p> Signup and view all the answers

    A local telephone network is an example of a _______ network.

    <p>Circuit switched</p> Signup and view all the answers

    Most packet switches use this principle ____________.

    <p>Store and forward</p> Signup and view all the answers

    If there are N routers from source to destination, the total end to end delay in sending packet P (L->number of bits in the packet R->transmission rate) is equal to ______________.

    <p>(N*L)/R</p> Signup and view all the answers

    What are the Methods to move data through a network of links and switches? ______.

    <p>Packet switching and Circuit switching</p> Signup and view all the answers

    The required resources for communication between end systems are reserved for the duration of the session between end systems in ________ method.

    <p>Circuit switching</p> Signup and view all the answers

    As the resources are reserved between two communicating end systems in circuit switching, ___________ is achieved.

    <p>Guaranteed constant rate</p> Signup and view all the answers

    In _________ systems, resources are allocated on demand.

    <p>Packet switching</p> Signup and view all the answers

    Which of the following is not an application layer service? ______.

    <p>Error control</p> Signup and view all the answers

    _____________ allows LAN users to share computer programs and data.

    <p>File server</p> Signup and view all the answers

    With respect to physical media, STP cables stands for _________.

    <p>Shielded Twisted Pair Cable</p> Signup and view all the answers

    A standalone program that has been modified to work on a LAN by including concurrency controls such as file and record locking is an example of ___________.

    <p>LAN intrinsic software</p> Signup and view all the answers

    The __________ portion of LAN management software restricts access, records user activities and audit data, etc.

    <p>Security management</p> Signup and view all the answers

    What is the max length of the Shielded twisted pair cable?

    <p>100 m</p> Signup and view all the answers

    Which connector does the STP cable use?

    <p>RJ-45</p> Signup and view all the answers

    What is the central device in star topology?

    <p>Hub/switch</p> Signup and view all the answers

    Which of the following architecture uses the CSMA/CD access method?

    <p>Ethernet</p> Signup and view all the answers

    Which type of Ethernet framing is used for TCP/IP and DEC net?

    <p>Ethernet II</p> Signup and view all the answers

    Novell’s implementation of RIP updates routing tables every _________ seconds.

    <p>60</p> Signup and view all the answers

    Open Shortest Path First (OSPF) is also called as _____________.

    <p>Link state protocol</p> Signup and view all the answers

    The computation of the shortest path in OSPF is usually done by ____________.

    <p>Dijkstra’s algorithm</p> Signup and view all the answers

    Ethernet frame consists of ____________.

    <p>MAC address</p> Signup and view all the answers

    What is start frame delimiter (SFD) in ethernet frame?

    <p>10101011</p> Signup and view all the answers

    MAC address is of ___________.

    <p>48 bits</p> Signup and view all the answers

    What is autonegotiation?

    <p>A procedure by which two connected devices choose common transmission parameters.</p> Signup and view all the answers

    A point-to-point protocol over ethernet is a network protocol for __________.

    <p>Encapsulating PPP frames inside Ethernet frames.</p> Signup and view all the answers

    High speed and long ethernet works on _________.

    <p>Optical fiber</p> Signup and view all the answers

    The maximum size of payload field in ethernet frame is __________.

    <p>1500 bytes</p> Signup and view all the answers

    EIGRP is a routing protocol designed by Cisco.

    <p>True</p> Signup and view all the answers

    Administrative distance for internal EIGRP is ______.

    <p>90</p> Signup and view all the answers

    For default gateway, which of the following commands will you use on a Cisco router?

    <p>IP default network</p> Signup and view all the answers

    Administrative distance for external EIGRP route is _______.

    <p>170</p> Signup and view all the answers

    EIGRP uses the ____________ algorithm for finding shortest path.

    <p>DUAL</p> Signup and view all the answers

    In EIGRP best path is known as the successor, whereas backup path is known as __________.

    <p>Feasible successor</p> Signup and view all the answers

    DHCP (Dynamic Host Configuration Protocol) provides __________ to the client.

    <p>IP address</p> Signup and view all the answers

    DHCP is used for ________.

    <p>Both IPv6 and IPv4</p> Signup and view all the answers

    The DHCP server ________.

    <p>All of the mentioned</p> Signup and view all the answers

    IP assigned for a client by DHCP server is ______.

    <p>For a limited period</p> Signup and view all the answers

    DHCP uses UDP port _________ for sending data to the server.

    <p>67</p> Signup and view all the answers

    The DHCP server can provide the _______ of the IP addresses.

    <p>All of the mentioned</p> Signup and view all the answers

    DHCP client and servers on the same subnet communicate via ________.

    <p>UDP broadcast</p> Signup and view all the answers

    After obtaining the IP address, to prevent the IP conflict the client may use ________.

    <p>Address resolution protocol</p> Signup and view all the answers

    What is DHCP snooping?

    <p>Techniques applied to ensure the security of an existing DHCP infrastructure.</p> Signup and view all the answers

    If DHCP snooping is configured on a LAN switch, then clients having specific ______ can access the network.

    <p>Both MAC address and IP address</p> Signup and view all the answers

    Based on the information given, what is the minimum number of computers that you’ll need to create a network?

    <p>Two</p> Signup and view all the answers

    To access the intranet with an FTP site, which protocol needs to be installed on your computer?

    <p>TCP/IP</p> Signup and view all the answers

    What type of network model is being used in an organization where you have sole responsibility of managing resources across a secure server room?

    <p>Centralized</p> Signup and view all the answers

    Given multiple networked resources across different floors, what type of network model is being utilized?

    <p>Client/Server</p> Signup and view all the answers

    What type of network model is reflected if users can perform limited administration on clustered servers?

    <p>Decentralized</p> Signup and view all the answers

    What is the fastest type of connection recommended to connect two networks in different cities?

    <p>T1</p> Signup and view all the answers

    What types of networks are being used in an environment where sales appointments are synced with the PDAs when staff enters the main reception?

    <p>MAN</p> Signup and view all the answers

    Which topology is being used if all computers are connected together using a single cable?

    <p>Bus</p> Signup and view all the answers

    Looking at a scenario where computers in different buildings are interconnected, which topology is being used?

    <p>Wireless</p> Signup and view all the answers

    If a new file server is introduced with 110 m of cable resulting in corrupt data issues, what likely caused the problem?

    <p>Attenuation</p> Signup and view all the answers

    In examining a network where electromagnetic interference is present, what is the most probable cause?

    <p>Electromagnetic interference</p> Signup and view all the answers

    What is the most susceptible type of transmission to errors caused by crosstalk?

    <p>UTP</p> Signup and view all the answers

    Study Notes

    IETF Standards and Protocols

    • IETF standards documents are known as RFC (Request For Comments).
    • Each layer in data packet hierarchy adds its own header as the packet moves downwards.

    Data Structure and Communication

    • The structure or format of data is termed syntax.
    • Communication between devices can be simplex, where data flows in one direction.

    Network History and Basics

    • The first network to use TCP/IP protocol was ARPANET, established in 1969.
    • A medium is defined as the physical path for data transmission, which can be wired or wireless.

    Network Organizations

    • The Federal Communications Commission (FCC) regulates interstate and international communications.
    • Network edge devices include PCs, smartphones, and servers, whereas switches are not categorized as edge devices.

    Networking Concepts

    • A set of rules governing data communication is called protocols, critical for proper network functionality.
    • Multipoint connections occur when three or more devices share a link.
    • A distributed system presents a collection of interconnected computers as a single coherent system.

    Network Nodes and Overlays

    • In networks, nodes include devices capable of sending, receiving, or routing data.
    • An overlay network operates on top of another network, examples include VPNs and Peer-to-Peer networks.

    Communication Methods and Models

    • In a broadcast network, the communication channel is shared by all machines.
    • Bluetooth technology exemplifies a personal area network.

    Router and Transmission Methods

    • Routers forward packets between networks based on routing information.
    • Network congestion arises from traffic overload, necessitating congestion control techniques.

    Internet Access and DSL

    • Virtual private networks (VPNs) extend private networks across public networks, enhancing security and anonymity.
    • DSL services combine wired phone access and internet service provision.

    Signal Conversion and Cable Types

    • DSLAM converts analog signals to digital signals.
    • Hybrid Fiber-Coaxial (HFC) networks utilize both fiber and coaxial cables.

    TCP/IP and OSI Models

    • The Internet protocol stack, known as TCP/IP, comprises five layers: Application, Transport, Network, Data Link, and Physical.
    • The OSI reference model consists of seven layers: Application, Presentation, Session, Transport, Network, Data Link, and Physical.

    Layer Functions and Implementations

    • The presentation layer handles data compression, encryption, and translation between machine and human-readable formats.
    • In OSI, as data moves from lower to upper layers, headers are removed, while the reverse adds headers.

    Characteristics and Purpose of OSI

    • OSI stands for Open System Interconnection, providing a structured approach for network communication.
    • Each layer in OSI uses protocols tailored for its functionality, ensuring systematic communication.

    Summary of Model Differences

    • The OSI model includes presentation and session layers, which are not separately defined in the TCP/IP model.
    • Each implementation layer operates in the respective end systems, emphasizing the importance of processing and communication efficiency.

    Further Insights

    • Factors influencing DSL transmission rates include the gauge of the twisted-pair line and electrical interference.
    • The ONT connects to a splitter via optical cable, which is critical for converting light signals into usable electric signals for networking devices.### OSI and TCP/IP Models
    • The OSI reference model includes a session layer not present in the TCP/IP model.
    • Functions of the presentation and session layers in OSI are managed by the transport layer in TCP/IP.

    Transport Layer

    • Acts as a link between network support layers (physical, data link, network) and user support layers (session, presentation, application).
    • Responsible for process-to-process delivery using protocols like TCP and UDP.
    • Segments data and uses port numbers to identify processes on a host.

    Addressing in TCP/IP

    • Various addresses used include physical (MAC), logical, port, and specific addresses.
    • TCP/IP addresses focus on internet implementation; all addressing schemes apply to both TCP/IP and OSI models.

    Development Timeline

    • TCP/IP model was developed prior to the OSI model, with prototypes emerging from 1978-1983, while OSI was introduced in 1984.

    Physical Layer Functions

    • Deals with bit-by-bit delivery, encompassing transmission standards involving cables and connections.
    • Determines transmission data rate; optical fiber cables provide the highest speed (~1000Mb/s).

    Wireless Transmission

    • Possible through radio waves, microwaves, and infrared.
    • Each medium has distinct properties regarding wall penetration and usage in communications.
    • Receives packets from the network layer and encapsulates them into frames for transmission.
    • Handles framing, error control, and flow control; channel coding is a physical layer function.

    Automatic Repeat Request (ARQ)

    • Managed by the logical link control sublayer for error handling in data communication.

    Socket and APIs

    • A socket serves as the endpoint in network communication.
    • Winsock is the socket-style API for Windows, governing internet application requests.

    Transport Layer Protocols

    • Major protocols: TCP (connection-oriented) and UDP (connectionless).
    • TCP ensures reliable delivery with a three-way handshake while UDP prioritizes speed over reliability.

    Network Layer Responsibilities

    • Manages packets of data, ensuring appropriate encapsulation and transmission from higher layers down to the physical layer.

    Multiplexing and Error Management

    • Multiplexing allows multiple signals to share a single channel.
    • Techniques like piggybacking enhance efficiency by combining acknowledgments with data frames.

    Concepts of Data Integrity

    • Burst errors occur when multiple bits in a data unit change during transmission.
    • Cyclic Redundancy Check (CRC) helps detect these errors in transmitted data but not correct them.

    Conclusion

    • Different layers of network models serve distinct roles in ensuring data is efficiently transmitted and received while maintaining integrity and communication reliability.### Routing and Layer Functions
    • In the OSI model, the network layer (third layer) provides data routing paths for network communications.
    • Error control is managed at the data link layer and transport layer.

    IP Address Structure

    • A 4-byte (32 bits) IP address comprises both a network address and a host address, depending on the address class.

    Virtual Circuit Networks

    • In virtual circuit networks, each packet contains a short VC number (Virtual Circuit Identifier), facilitating data transfer across a larger packet-switched network.

    Routing Algorithms

    • Routing algorithms like shortest path, distance vector, and link state routing all can be utilized for network layer design.

    Multi-Destination Routing

    • Multi-destination routing involves multiple receivers, with routes identified by the routing algorithm; it often overlaps with broadcast routing.

    Spanning Tree Protocol

    • A spanning tree is a subset of a network that includes all routers but contains no loops, used to maintain efficient network topology.

    Congestion Control

    • Congestion control techniques include traffic-aware routing, admission control, and load shedding; routing information protocol does not contribute to congestion control.

    Network Layer Protocols

    • The primary network layer protocol for the internet is the Internet Protocol (IP).

    ICMP Functionality

    • Internet Control Message Protocol (ICMP) is primarily used for error and diagnostic functions in networking.

    Application Layer Protocols

    • Protocols like HTTP, SMTP, and FTP operate at the application layer; however, TCP belongs to the transport layer.

    Data Packet Structure

    • In the application layer, the packet of information is referred to as a "Message"; different layers have different data formats such as segments and frames.

    Service Architectures

    • Application services can be structured as client-server or peer-to-peer models.

    Application Layer Services

    • The application layer offers end-to-end services, including file transfer, mail services, and network virtual terminal services.

    Domain Name System (DNS)

    • A hostname can be a maximum of 255 characters, and the DNS database contains hostname-to-address records and name server records.
    • Dynamic DNS allows clients to update their DNS entries automatically as their IPs change.

    Routers and DNS Resolution

    • When a server is uncertain of a hostname's address, it queries the root server for resolution.

    Wildcard Domain Names

    • Wildcard domain names start with an asterisk (*) and match requests to non-existent domain names.

    Internet Standards and Governance

    • Domain name registration is overseen by ICANN (Internet Corporation for Assigned Names and Numbers).

    Document Object Model (DOM)

    • The DOM is a hierarchical representation of HTML or XML documents, allowing interaction with various document objects.

    Data Transmission Dynamics

    • The TTL (Time to Live) field in a packet indicates how many routers (or hops) can process the datagram before it is discarded.

    Fragmentation Rule

    • Fragmentation can complicate router operations and is vulnerable to certain types of attacks, such as DoS attacks.

    IP Protocol Characteristics

    • The IP protocol is inherently connectionless, offers unreliable service, and does not provide error reporting.

    Web Cookies

    • Web cookies are small data pieces sent from a website and stored in the user's browser, enhancing the browsing experience.

    Dynamic Web Pages

    • Dynamic web pages generate content based on user interaction or events and utilize technologies such as JavaScript and server-side scripts.

    Common Gateway Interface (CGI)

    • CGI is used to execute console-based files on a web server, generating dynamic content in response to HTTP requests.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    This quiz covers IETF standards, data structure, and the history of networking. Test your knowledge on TCP/IP protocols and communication methods used in networks. Whether you're familiar with RFCs or the basic principles of networking, this quiz will assess your understanding.

    More Quizzes Like This

    Use Quizgecko on...
    Browser
    Browser