Networking Basics Quiz
45 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

In a ring topology, a break in the ring can disable the entire network.

True (A)

A tree topology has multiple paths for data transmission between nodes.

False (B)

A Personal Area Network (PAN) is designed for connecting devices over a broad geographical area.

False (B)

The network core is composed solely of clients and servers.

<p>False (B)</p> Signup and view all the answers

A local area network (LAN) connects computers within a limited area such as an office or university campus.

<p>True (A)</p> Signup and view all the answers

Protocols only define the format of messages and not the order in which they are sent.

<p>False (B)</p> Signup and view all the answers

Wireless local area networks (WLANs) enable mobile access through technologies like WiFi.

<p>True (A)</p> Signup and view all the answers

A master device in a PAN serves as a gateway to connect to higher-level networks.

<p>True (A)</p> Signup and view all the answers

Wireless local area networks (WLANs) typically have a transmission range of approximately 100 miles.

<p>False (B)</p> Signup and view all the answers

A link's transmission delay is calculated using the formula Packet transmission delay = L/R, where L is the packet size in bits and R is the transmission rate.

<p>True (A)</p> Signup and view all the answers

Guided media refers to signals that propagate freely through the air.

<p>False (B)</p> Signup and view all the answers

The main concept of packet switching involves reserving end-to-end resources for a communication call between two parties.

<p>False (B)</p> Signup and view all the answers

If the arrival rate to a link exceeds the transmission rate, packets may be queued or dropped in routers.

<p>True (A)</p> Signup and view all the answers

Terrestrial microwave is a type of unguided media used for wireless communication.

<p>False (B)</p> Signup and view all the answers

The network core is a mesh of interconnected routers responsible for forwarding packets.

<p>True (A)</p> Signup and view all the answers

Reflection and interference are examples of propagation effects for radio signals.

<p>True (A)</p> Signup and view all the answers

A server in the Client-Server paradigm has a dynamic IP address.

<p>False (B)</p> Signup and view all the answers

In a Peer-to-Peer architecture, peers communicate directly with each other to provide services.

<p>True (A)</p> Signup and view all the answers

Inter-process communication can occur between processes running on different hosts without message exchange.

<p>False (B)</p> Signup and view all the answers

Application-layer protocols define the types of messages and their syntax.

<p>True (A)</p> Signup and view all the answers

Transmission delay can be calculated using the formula $dtrans = L/R$ where $L$ is the packet length in bits and $R$ is the link transmission rate in bps.

<p>True (A)</p> Signup and view all the answers

All applications require 100% reliable data transfer regardless of their function.

<p>False (B)</p> Signup and view all the answers

Propagation delay is higher when the length of the physical link decreases.

<p>False (B)</p> Signup and view all the answers

Malware can enter a host through a virus that requires user interaction to activate.

<p>True (A)</p> Signup and view all the answers

Proprietary protocols are defined in RFCs and are open for public access.

<p>False (B)</p> Signup and view all the answers

Spyware malware is designed to enhance the performance of the computer by optimizing resource usage.

<p>False (B)</p> Signup and view all the answers

Transport services needed by applications include security measures such as encryption.

<p>True (A)</p> Signup and view all the answers

Denial of Service (DoS) attacks work by making legitimate resources available to attackers.

<p>False (B)</p> Signup and view all the answers

Modularization in systems improves their maintenance and updating capabilities.

<p>True (A)</p> Signup and view all the answers

IP spoofing involves sending packets with a legitimate source address.

<p>False (B)</p> Signup and view all the answers

Queueing delay is not affected by the congestion level of a router.

<p>False (B)</p> Signup and view all the answers

The Internet protocol stack includes five layers, with the physical layer responsible for transmitting bits over a physical medium.

<p>True (A)</p> Signup and view all the answers

Web caching is primarily designed to involve the origin server in servicing client requests.

<p>False (B)</p> Signup and view all the answers

HTTP/2 introduces the capability to send unrequested objects to the client.

<p>True (A)</p> Signup and view all the answers

A conditional GET request will always result in an object transmission, regardless of the cache status.

<p>False (B)</p> Signup and view all the answers

Web caches can be positioned to reduce the distance between the server and the client.

<p>True (A)</p> Signup and view all the answers

HTTP/1.1's object transmission is prioritized based on the size of the objects being sent.

<p>False (B)</p> Signup and view all the answers

TCP provides reliability, flow control, and congestion control.

<p>True (A)</p> Signup and view all the answers

UDP guarantees the delivery of data packets between sender and receiver.

<p>False (B)</p> Signup and view all the answers

In non-persistent HTTP, multiple objects require a single TCP connection.

<p>False (B)</p> Signup and view all the answers

The HTTP HEAD method is used to download the entire content of a web page.

<p>False (B)</p> Signup and view all the answers

A 404 Not Found status code indicates that the requested document exists on the server.

<p>False (B)</p> Signup and view all the answers

The POST method sends user input in the URL of the HTTP request message.

<p>False (B)</p> Signup and view all the answers

Persistent HTTP allows multiple objects to be sent over a single TCP connection.

<p>True (A)</p> Signup and view all the answers

Cookies are used to store user preferences and session information in web applications.

<p>True (A)</p> Signup and view all the answers

Flashcards

Packet Transmission Delay

The time it takes to transmit a packet of data over a network link.

Physical Link

The connection between a transmitter and receiver in a network.

Packet Switching

Breaking application messages into smaller packets and forwarding them across a network.

Packet Queuing and Loss

If the rate of incoming packets exceeds the transmission rate of a link, packets wait in a queue, potentially getting lost.

Signup and view all the flashcards

Network Core

The interconnected network of routers that form the backbone of a network.

Signup and view all the flashcards

Forwarding

The router's local action to move packets from input to output links.

Signup and view all the flashcards

Routing

The global action that determines the best path for packets through the network.

Signup and view all the flashcards

Circuit Switching

Establishing a dedicated connection between two points for communication.

Signup and view all the flashcards

Ring Topology

A network topology where devices are connected in a closed loop, and data travels in one direction only.

Signup and view all the flashcards

Ring Topology Fault

A break in the ring (e.g., a disabled device) disrupts the entire network.

Signup and view all the flashcards

Tree Topology

A hierarchical network topology with a central hub (trunk) and branches connected to it.

Signup and view all the flashcards

PAN (Personal Area Network)

A network connecting personal devices like smartphones, computers, and tablets.

Signup and view all the flashcards

LAN (Local Area Network)

A network connecting computers within a small geographic area.

Signup and view all the flashcards

Network Protocol

Rules governing data transmission and reception between network devices. Specifies the format and order of messages.

Signup and view all the flashcards

Packet Delay Components

Packet delay is the time it takes for a packet to travel from source to destination. It is comprised of processing, queueing, transmission, and propagation delays.

Signup and view all the flashcards

Transmission Delay

The time to transmit a packet over a link; calculated as packet length (bits) divided by link transmission rate (bps).

Signup and view all the flashcards

Queueing Delay

The time a packet waits at a router's output link before transmission, depending on network congestion.

Signup and view all the flashcards

Propagation Delay

The time for a bit to travel from source to destination over the link, calculated by dividing the link length by propagation speed.

Signup and view all the flashcards

Throughput

The rate at which bits are sent from sender to receiver, either instantaneous or average over time.

Signup and view all the flashcards

Malware - Virus

A self-replicating infection that spreads by receiving/executing an object, like an email attachment.

Signup and view all the flashcards

Malware - Worm

A self-replicating infection that passively receives an object that gets executed.

Signup and view all the flashcards

Denial-of-Service (DoS) Attack

A cyberattack that makes resources (servers, bandwidth) unavailable to legitimate traffic by overwhelming them with bogus traffic.

Signup and view all the flashcards

Client-Server Paradigm: Server

A server is a computer system that is always running, has a permanent IP address, often located in data centers, for scalability reasons. It provides services to other computers (clients).

Signup and view all the flashcards

Client-Server Paradigm: Client

A client is a computer system that requests services from a server. It may connect intermittently and have a dynamic IP address.

Signup and view all the flashcards

Peer-to-Peer Architecture

In a P2P system, computers (peers) directly communicate with each other, requesting and providing services. They are often intermittently connected with changing IP addresses.

Signup and view all the flashcards

Process

A running program within a computer system.

Signup and view all the flashcards

Inter-Process Communication (IPC)

The way processes communicate within the same computer.

Signup and view all the flashcards

Sockets

The connection point for a process to send or receive messages with another process.

Signup and view all the flashcards

Application-Layer Protocol

Rules that define how two processes communicate; including message types, syntax, semantics, and timing.

Signup and view all the flashcards

Transport Services Needs

Different applications have different needs from the transport layer, e.g. reliable data transfer, low delay, and sufficient throughput (or flexibility).

Signup and view all the flashcards

Web Cache Goal

To satisfy client requests without involving the origin server, reducing response time and network traffic.

Signup and view all the flashcards

Conditional GET

A method to avoid transmitting an object if the cache already has a current version. The client provides information about its cached copy’s age to the server.

Signup and view all the flashcards

HTTP 1.1 Pipelining

Multiple GET requests sent over a single TCP connection, but the server responds sequentially, potentially causing delay for smaller objects due to larger ones before them.

Signup and view all the flashcards

HTTP/2 Goal

Improve response time in multi-object web requests compared to HTTP/1.1 by providing flexibility in how objects are transmitted and handling transmission order appropriately.

Signup and view all the flashcards

Email Components

User agents (apps), mail servers (holding emails), and SMTP (Simple Mail Transfer Protocol - the method for sending/receiving).

Signup and view all the flashcards

TCP service

A reliable transport method for processes to communicate, ensuring data integrity, flow control, and congestion control, but offering no timing or security guarantees.

Signup and view all the flashcards

UDP service

An unreliable data transfer method between processes without guarantees of delivery or order, offering speed over reliability and not requiring connection setup.

Signup and view all the flashcards

Non-persistent HTTP

A type of HTTP connection where a new TCP connection is established for each object transferred.

Signup and view all the flashcards

Persistent HTTP

A type of HTTP connection that keeps a TCP connection open for multiple objects, allowing for faster data transfer between client and server.

Signup and view all the flashcards

HTTP response time (non-persistent)

The time it takes to receive an object via a non-persistent HTTP connection, composed of 2 round-trip times (RTT) and the object/file transmission time.

Signup and view all the flashcards

HTTP request methods (POST)

A method used to send data to a server, typically used with web forms, where the data is included in the request body.

Signup and view all the flashcards

HTTP request methods (GET)

A method used to retrieve data from a server, often used to fetch resources. Data can be sent through the URL itself using parameters.

Signup and view all the flashcards

HTTP response status code (200)

Indicates that the request was successful, and the requested resource is included with the response.

Signup and view all the flashcards

Study Notes

Client and Server

  • A client is any computer hardware or software that requests a service from a server.
  • A server is a computer program or device that provides a service to another computer program or user.

Network Devices

  • Switch: Connects network devices, responsible for directing data to the correct destination device.
  • Router: Directs data packets to their intended destination.

Communication Types

  • Simplex: One-way communication (e.g., television).
  • Half-duplex: Two-way communication, but only one device can send data at a time (e.g., walkie-talkie).
  • Full-duplex: Two-way communication where both devices can send data simultaneously (e.g., telephone).

Mesh Topology

  • A fully connected mesh network.
  • Formula for calculating the number of physical connections: [n(n-1)] / 2
  • Disadvantages:
    • Installation and reconfiguration are difficult.
    • Requires more wiring than other topologies, potentially exceeding available space.
    • Expensive hardware for connections.

Star Topology

  • Advantages:
    • Cheaper than a mesh topology.
    • Easy to install.
    • Easy to identify faults.
  • Disadvantages:
    • If the central controller fails, the entire network will go down.
    • Needs more cables than a ring or tree topology.

Bus Topology

  • One cable, the backbone, connects all devices.
  • Devices connect to the main cable through drop lines and taps.
  • Advantages:
    • Easy to Install
    • Requires less cable compared to a mesh, star and tree topology.
  • Disadvantages:
    • Difficult reconfiguration and fault isolation.
    • A break in the cable disrupts transmission for all devices on the same side.

Ring Topology

  • Each device is connected to its two neighboring devices only.
  • Advantages:
    • Relatively easy to install.
    • Adding or deleting a device modifies two connections only.
  • Disadvantages:
    • A break in the ring disrupts transmission for all devices.

Tree Topology

  • A central node (the trunk) with several branches.
  • Each node connects to the central node through a single path.

PAN and LAN

  • PAN (Personal Area Network): Connects personal devices (e.g., computers, smartphones, tablets)
  • LAN (Local Area Network): Interconnects computers within a limited area (e.g., residence, school).

Internet from a Service View

  • Infrastructure for web, video streaming, email, games, e-commerce, social media, and inter-connected appliances.
  • Provides a programming interface to distribute applications.

Network Edge and Core

  • Network Edge: Hosts (clients and servers), often in data centers.
  • Network Core: Interconnected routers.

Packet Switching

  • Hosts break application-layer messages into packets.
  • Packets are forwarded from one router to the next, across links on the path to the destination.
  • Each packet is transmitted at maximum link capacity.

Packet Queuing and Loss

  • If packet arrival rate exceeds transmission rate, packets will queue.
  • Packets can be dropped if the memory buffer fills up.

Circuit Switching

  • End-to-end resources allocated to a call.
  • Common in traditional telephone networks.
  • Frequency Division Multiplexing (FDM): Divides electromagnetic frequencies into narrow bands for each call.
  • Time Division Multiplexing (TDM): Divides time into slots for calls.

Modern Internet Structure

  • Tier-1 ISPs (global transit ISPs) connect to each other.
  • Regional ISPs connect to Tier-1 ISPs.
  • Access ISPs connect to regional ISPs, providing access to end users.
  • IXPs (Internet Exchange Points) are meeting points for ISPs to exchange traffic between networks.

Malware

  • Viruses: Self-replicating infections.
  • Worms: Self-replicating infections that actively spread.
  • Spyware: Records keystrokes and visits websites, potentially uploading this data or enrolling the host in a botnet.
  • Denial of Service (DoS): Overwhelms resources (servers, bandwidth).

Packet Delay

  • Nodal Processing: Checking bits, determining the output link (<1 msec).
  • Queuing Delay: Waiting at output link (depends on congestion level).
  • Transmission Delay: Packet length (bits)/link transmission rate (bps).
  • Propagation Delay: Distance/propagation speed (~2x10^8 m/s).

Throughput

  • Rate of bits sent from sender to receiver.
  • Can be instantaneous or average.
  • In end-to-end throughput—the minimum rate among the links is the rate between end systems.

HTTP Connections

  • Non-Persistent HTTP: Opens a new TCP connection for each object requested.
  • Persistent HTTP: Uses a single TCP connection for multiple objects.

HTTP Response Time

  • Non-persistent HTTP: 2 round-trip times (RTTs) + file transmission time.

HTTP Request Types

  • GET: Retrieve data from URL.
  • POST: Submit data to a server.
  • PUT: Upload data to a specific URL.
  • HEAD: Retrieve HTTP headers (only).

HTTP Response Codes

  • Common codes like 200 OK, 301 Moved Permanently, 400 Bad Request, 404 Not Found, 505 HTTP Version Not Supported.

Cookies

  • Web sites store state between transactions on clients via cookies
  • Clients use cookies to maintain a state between transactions.

Web Caching

  • Caching acts as both a client and server for the original request.
  • Reduces response time for clients and reduces traffic on the institution’s access link.

Conditional GET

  • Avoids unnecessary transmissions if the cached version is up-to-date.

HTTP/1.1 with Multiple Object Pipelining

  • Introduces multiple pipelined GETs (First Come First Served),
  • Possible head-of-line (HOL) blocking; objects behind large objects will have to wait.

HTTP/2 Goal

  • Multi-object requests with decreased delay
  • Flexible transmission of objects to mitigate HOL blocking. Objects transmitted in order based on priority.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

Description

Test your knowledge of networking concepts including clients, servers, common communication types, and network topologies such as mesh. This quiz covers fundamental principles that are essential for understanding how different network devices interact. Challenge yourself to see how well you grasp these key concepts!

More Like This

Networking Concepts Quiz
39 questions

Networking Concepts Quiz

AttractiveAzurite2094 avatar
AttractiveAzurite2094
Computer Networking Concepts
23 questions
Networking Concepts and Client Types
42 questions
Use Quizgecko on...
Browser
Browser