Network Concepts: Revision Questions

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What primarily contributes to the file transfer overhead when transferring a file across a network?

  • User permissions settings
  • Header information and error-checking mechanisms (correct)
  • Data encoding techniques
  • File compression methods

What is the purpose of the Cyclic Redundancy Check (CRC) in data transmission?

  • To compress data
  • To encrypt data
  • To detect errors (correct)
  • To enhance the transmission speed

In the OSI model, port and sequence numbers are associated with which layer?

  • Transport Layer (correct)
  • Data Link Layer
  • Application Layer
  • Network Layer

Which of the following addresses is classified as a loopback address?

<p>127.0.0.1 (A)</p> Signup and view all the answers

What is the length of an IPv6 address?

<p>128 bits (B)</p> Signup and view all the answers

Which protocol is used to resolve an IP address to its corresponding MAC address?

<p>ARP (B)</p> Signup and view all the answers

Which layer of the TCP/IP model does an IPv4 address belong to?

<p>Internet Layer (B)</p> Signup and view all the answers

What type of addressing does the MAC broadcast address FF-FF-FF-FF-FF-FF apply to?

<p>Broadcast (B)</p> Signup and view all the answers

Flashcards

What do switches use to make forwarding decisions?

MAC addresses are used by switches to identify devices on a network and forward data accordingly.

What is the purpose of the FTP protocol?

The purpose of the FTP protocol is to transfer files between devices over a network.

What is the purpose of the CRC in data transmission?

The Cyclic Redundancy Check (CRC) is a method used to detect errors in data transmission. It calculates a checksum value based on the data sent and verifies the checksum at the receiving end.

What technology adds security to HTTP connections?

Secure Sockets Layer (SSL) adds security to HTTP connections by encrypting the data exchanged between the client and server.

Signup and view all the flashcards

What happens to IP addresses in data headers when they pass through a router?

When data passes through a router, the source and destination IP addresses in the data headers are changed to reflect the data's journey across the network.

Signup and view all the flashcards

How many bits are in an IPv6 address?

An IPv6 address, used for network communication, is 128 bits long, offering a larger address space compared to IPv4.

Signup and view all the flashcards

What are loopback addresses used for?

Loopback addresses, like 127.0.0.1 (IPv4) and ::1 (IPv6), are used for testing network connections and configurations on a single device.

Signup and view all the flashcards

What is the MAC broadcast address used for?

The MAC broadcast address, FF-FF-FF-FF-FF-FF, is used to send a message to all devices on a network. This is useful for sending a message to everyone, so everyone receives it.

Signup and view all the flashcards

Study Notes

Network Concepts: Revision Questions

  • (i) When transferring a 1KB file, more than 1KB of data is transferred due to overhead (e.g., headers, error checking).

  • (ii) MAC addresses contain hexadecimal letters (0-9, A-F). A typical MAC address has 6 sets of 2 hexadecimal characters (e.g., 00:1B:44:00:E2:90).

  • (iii) Network switches use MAC addresses for forwarding decisions.

  • (iv) The File Transfer Protocol (FTP) enables transferring files between computers.

  • (v) Cyclic Redundancy Checks (CRCs) are error detection mechanisms.

  • (vi) The Secure Sockets Layer (SSL) enhances HTTP security, adding encryption.

  • (vii) When data passes through a router, the source and destination IP addresses change.

  • (viii) An IPv6 address has 128 bits.

  • (ix) Loopback addresses (127.0.0.1 and ::1) are used for testing and communicating within the same machine.

  • (x) The MAC broadcast address (FF-FF-FF-FF-FF-FF) is used for communicating with all devices on the network.

  • (xi) Port numbers and sequence numbers reside in the Transport Layer of the OSI model.

  • (xii) Port numbers and sequence numbers reside in the Transport Layer of the TCP/IP model.

  • (xiii) IPv4 addresses are placed in the Network Layer of the OSI model.

  • (xiv) IPv6 addresses are placed in the Internet Layer of the TCP/IP model.

  • (xv) TCP windowing manages data transmission efficiency. Windowing controls the amount of data a sender can transmit before receiving an acknowledgement from the receiver. This prevents overwhelming the network or the receiver.

  • (xvi) Sending data from one to some devices is called multicasting.

  • (xvii) Multicasting uses a class D IPv4 address range.

  • (xviii) Switches and routers operate in the Data Link and Network layers of the OSI model.

  • (xix) CRC, FCS, and MD5 are hashing algorithms; they ensure the integrity of data by providing a checksum signature, used for error detection.

  • (xx) Address Resolution Protocol (ARP) converts IP addresses to MAC addresses. It is crucial for mapping IP addresses to MAC addresses, allowing communication between devices on a network.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

IMG_1656.jpeg

More Like This

Networking Concepts Quiz
67 questions

Networking Concepts Quiz

BrainiestDouglasFir avatar
BrainiestDouglasFir
Networking Concepts Quiz
12 questions
Networking Concepts and Commands Quiz
15 questions

Networking Concepts and Commands Quiz

SustainableAntigorite1088 avatar
SustainableAntigorite1088
Operating System and Networking Concepts
40 questions
Use Quizgecko on...
Browser
Browser