Networking Basics Quiz
45 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

In a ring topology, a break in the ring can disable the entire network.

True

A tree topology has multiple paths for data transmission between nodes.

False

A Personal Area Network (PAN) is designed for connecting devices over a broad geographical area.

False

The network core is composed solely of clients and servers.

<p>False</p> Signup and view all the answers

A local area network (LAN) connects computers within a limited area such as an office or university campus.

<p>True</p> Signup and view all the answers

Protocols only define the format of messages and not the order in which they are sent.

<p>False</p> Signup and view all the answers

Wireless local area networks (WLANs) enable mobile access through technologies like WiFi.

<p>True</p> Signup and view all the answers

A master device in a PAN serves as a gateway to connect to higher-level networks.

<p>True</p> Signup and view all the answers

Wireless local area networks (WLANs) typically have a transmission range of approximately 100 miles.

<p>False</p> Signup and view all the answers

A link's transmission delay is calculated using the formula Packet transmission delay = L/R, where L is the packet size in bits and R is the transmission rate.

<p>True</p> Signup and view all the answers

Guided media refers to signals that propagate freely through the air.

<p>False</p> Signup and view all the answers

The main concept of packet switching involves reserving end-to-end resources for a communication call between two parties.

<p>False</p> Signup and view all the answers

If the arrival rate to a link exceeds the transmission rate, packets may be queued or dropped in routers.

<p>True</p> Signup and view all the answers

Terrestrial microwave is a type of unguided media used for wireless communication.

<p>False</p> Signup and view all the answers

The network core is a mesh of interconnected routers responsible for forwarding packets.

<p>True</p> Signup and view all the answers

Reflection and interference are examples of propagation effects for radio signals.

<p>True</p> Signup and view all the answers

A server in the Client-Server paradigm has a dynamic IP address.

<p>False</p> Signup and view all the answers

In a Peer-to-Peer architecture, peers communicate directly with each other to provide services.

<p>True</p> Signup and view all the answers

Inter-process communication can occur between processes running on different hosts without message exchange.

<p>False</p> Signup and view all the answers

Application-layer protocols define the types of messages and their syntax.

<p>True</p> Signup and view all the answers

Transmission delay can be calculated using the formula $dtrans = L/R$ where $L$ is the packet length in bits and $R$ is the link transmission rate in bps.

<p>True</p> Signup and view all the answers

All applications require 100% reliable data transfer regardless of their function.

<p>False</p> Signup and view all the answers

Propagation delay is higher when the length of the physical link decreases.

<p>False</p> Signup and view all the answers

Malware can enter a host through a virus that requires user interaction to activate.

<p>True</p> Signup and view all the answers

Proprietary protocols are defined in RFCs and are open for public access.

<p>False</p> Signup and view all the answers

Spyware malware is designed to enhance the performance of the computer by optimizing resource usage.

<p>False</p> Signup and view all the answers

Transport services needed by applications include security measures such as encryption.

<p>True</p> Signup and view all the answers

Denial of Service (DoS) attacks work by making legitimate resources available to attackers.

<p>False</p> Signup and view all the answers

Modularization in systems improves their maintenance and updating capabilities.

<p>True</p> Signup and view all the answers

IP spoofing involves sending packets with a legitimate source address.

<p>False</p> Signup and view all the answers

Queueing delay is not affected by the congestion level of a router.

<p>False</p> Signup and view all the answers

The Internet protocol stack includes five layers, with the physical layer responsible for transmitting bits over a physical medium.

<p>True</p> Signup and view all the answers

Web caching is primarily designed to involve the origin server in servicing client requests.

<p>False</p> Signup and view all the answers

HTTP/2 introduces the capability to send unrequested objects to the client.

<p>True</p> Signup and view all the answers

A conditional GET request will always result in an object transmission, regardless of the cache status.

<p>False</p> Signup and view all the answers

Web caches can be positioned to reduce the distance between the server and the client.

<p>True</p> Signup and view all the answers

HTTP/1.1's object transmission is prioritized based on the size of the objects being sent.

<p>False</p> Signup and view all the answers

TCP provides reliability, flow control, and congestion control.

<p>True</p> Signup and view all the answers

UDP guarantees the delivery of data packets between sender and receiver.

<p>False</p> Signup and view all the answers

In non-persistent HTTP, multiple objects require a single TCP connection.

<p>False</p> Signup and view all the answers

The HTTP HEAD method is used to download the entire content of a web page.

<p>False</p> Signup and view all the answers

A 404 Not Found status code indicates that the requested document exists on the server.

<p>False</p> Signup and view all the answers

The POST method sends user input in the URL of the HTTP request message.

<p>False</p> Signup and view all the answers

Persistent HTTP allows multiple objects to be sent over a single TCP connection.

<p>True</p> Signup and view all the answers

Cookies are used to store user preferences and session information in web applications.

<p>True</p> Signup and view all the answers

Study Notes

Client and Server

  • A client is any computer hardware or software that requests a service from a server.
  • A server is a computer program or device that provides a service to another computer program or user.

Network Devices

  • Switch: Connects network devices, responsible for directing data to the correct destination device.
  • Router: Directs data packets to their intended destination.

Communication Types

  • Simplex: One-way communication (e.g., television).
  • Half-duplex: Two-way communication, but only one device can send data at a time (e.g., walkie-talkie).
  • Full-duplex: Two-way communication where both devices can send data simultaneously (e.g., telephone).

Mesh Topology

  • A fully connected mesh network.
  • Formula for calculating the number of physical connections: [n(n-1)] / 2
  • Disadvantages:
    • Installation and reconfiguration are difficult.
    • Requires more wiring than other topologies, potentially exceeding available space.
    • Expensive hardware for connections.

Star Topology

  • Advantages:
    • Cheaper than a mesh topology.
    • Easy to install.
    • Easy to identify faults.
  • Disadvantages:
    • If the central controller fails, the entire network will go down.
    • Needs more cables than a ring or tree topology.

Bus Topology

  • One cable, the backbone, connects all devices.
  • Devices connect to the main cable through drop lines and taps.
  • Advantages:
    • Easy to Install
    • Requires less cable compared to a mesh, star and tree topology.
  • Disadvantages:
    • Difficult reconfiguration and fault isolation.
    • A break in the cable disrupts transmission for all devices on the same side.

Ring Topology

  • Each device is connected to its two neighboring devices only.
  • Advantages:
    • Relatively easy to install.
    • Adding or deleting a device modifies two connections only.
  • Disadvantages:
    • A break in the ring disrupts transmission for all devices.

Tree Topology

  • A central node (the trunk) with several branches.
  • Each node connects to the central node through a single path.

PAN and LAN

  • PAN (Personal Area Network): Connects personal devices (e.g., computers, smartphones, tablets)
  • LAN (Local Area Network): Interconnects computers within a limited area (e.g., residence, school).

Internet from a Service View

  • Infrastructure for web, video streaming, email, games, e-commerce, social media, and inter-connected appliances.
  • Provides a programming interface to distribute applications.

Network Edge and Core

  • Network Edge: Hosts (clients and servers), often in data centers.
  • Network Core: Interconnected routers.

Packet Switching

  • Hosts break application-layer messages into packets.
  • Packets are forwarded from one router to the next, across links on the path to the destination.
  • Each packet is transmitted at maximum link capacity.

Packet Queuing and Loss

  • If packet arrival rate exceeds transmission rate, packets will queue.
  • Packets can be dropped if the memory buffer fills up.

Circuit Switching

  • End-to-end resources allocated to a call.
  • Common in traditional telephone networks.
  • Frequency Division Multiplexing (FDM): Divides electromagnetic frequencies into narrow bands for each call.
  • Time Division Multiplexing (TDM): Divides time into slots for calls.

Modern Internet Structure

  • Tier-1 ISPs (global transit ISPs) connect to each other.
  • Regional ISPs connect to Tier-1 ISPs.
  • Access ISPs connect to regional ISPs, providing access to end users.
  • IXPs (Internet Exchange Points) are meeting points for ISPs to exchange traffic between networks.

Malware

  • Viruses: Self-replicating infections.
  • Worms: Self-replicating infections that actively spread.
  • Spyware: Records keystrokes and visits websites, potentially uploading this data or enrolling the host in a botnet.
  • Denial of Service (DoS): Overwhelms resources (servers, bandwidth).

Packet Delay

  • Nodal Processing: Checking bits, determining the output link (<1 msec).
  • Queuing Delay: Waiting at output link (depends on congestion level).
  • Transmission Delay: Packet length (bits)/link transmission rate (bps).
  • Propagation Delay: Distance/propagation speed (~2x10^8 m/s).

Throughput

  • Rate of bits sent from sender to receiver.
  • Can be instantaneous or average.
  • In end-to-end throughput—the minimum rate among the links is the rate between end systems.

HTTP Connections

  • Non-Persistent HTTP: Opens a new TCP connection for each object requested.
  • Persistent HTTP: Uses a single TCP connection for multiple objects.

HTTP Response Time

  • Non-persistent HTTP: 2 round-trip times (RTTs) + file transmission time.

HTTP Request Types

  • GET: Retrieve data from URL.
  • POST: Submit data to a server.
  • PUT: Upload data to a specific URL.
  • HEAD: Retrieve HTTP headers (only).

HTTP Response Codes

  • Common codes like 200 OK, 301 Moved Permanently, 400 Bad Request, 404 Not Found, 505 HTTP Version Not Supported.

Cookies

  • Web sites store state between transactions on clients via cookies
  • Clients use cookies to maintain a state between transactions.

Web Caching

  • Caching acts as both a client and server for the original request.
  • Reduces response time for clients and reduces traffic on the institution’s access link.

Conditional GET

  • Avoids unnecessary transmissions if the cached version is up-to-date.

HTTP/1.1 with Multiple Object Pipelining

  • Introduces multiple pipelined GETs (First Come First Served),
  • Possible head-of-line (HOL) blocking; objects behind large objects will have to wait.

HTTP/2 Goal

  • Multi-object requests with decreased delay
  • Flexible transmission of objects to mitigate HOL blocking. Objects transmitted in order based on priority.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

Description

Test your knowledge of networking concepts including clients, servers, common communication types, and network topologies such as mesh. This quiz covers fundamental principles that are essential for understanding how different network devices interact. Challenge yourself to see how well you grasp these key concepts!

More Like This

Networking Concepts Overview
10 questions
Networking Concepts Quiz
39 questions

Networking Concepts Quiz

AttractiveAzurite2094 avatar
AttractiveAzurite2094
Networking Concepts and Types
40 questions
Use Quizgecko on...
Browser
Browser