Networking Protocols and Functions Quiz
46 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which protocol is responsible for handling the sending of emails?

  • SMTP (correct)
  • IMAP
  • HTTP
  • POP3

What function does the DNS protocol serve in relation to URLs?

  • Transfers files
  • Finds the IP address associated with a URL (correct)
  • Verifies transmission errors
  • Encrypts email

In which layer of the TCP/IP model does TCP operate?

  • Link Layer
  • Transport Layer (correct)
  • Network Layer
  • Application Layer

Which of the following protocols is used for transferring files?

<p>FTP (B)</p> Signup and view all the answers

What role does the Link Layer play in network communication?

<p>Synchronizes devices and controls physical characteristics (D)</p> Signup and view all the answers

What action does HTTP perform when you request a website?

<p>Transmits the request to the Transport Layer (C)</p> Signup and view all the answers

Which protocol is utilized for network management information exchange?

<p>SNMP (C)</p> Signup and view all the answers

Which layer is primarily responsible for creating and routing packets over the network?

<p>Network Layer (D)</p> Signup and view all the answers

What is the primary purpose of the protocol used in Ethernet?

<p>To control the movement of frames and avoid collisions. (D)</p> Signup and view all the answers

In a BitTorrent network, what role does a leech play?

<p>They download files without contributing uploads. (D)</p> Signup and view all the answers

What is one major advantage of circuit switching?

<p>Provides a dedicated channel for the entire transmission. (C)</p> Signup and view all the answers

What happens to data in the transport layer before it is sent?

<p>It is broken down into smaller pieces called packets. (B)</p> Signup and view all the answers

Which of the following is NOT a characteristic of packet switching?

<p>Establishes a fixed communication line. (A)</p> Signup and view all the answers

How does a tracker function in the BitTorrent protocol?

<p>It keeps records of all peers and parts of the file they have. (B)</p> Signup and view all the answers

What is a disadvantage of circuit switching?

<p>The circuit is always reserved even if not in use. (A)</p> Signup and view all the answers

What purpose does a setter serve in a class?

<p>To update the value of a class's property. (A)</p> Signup and view all the answers

What is a potential issue with packet loss during packet switching?

<p>The sender must resend lost packets, which is time-consuming. (C)</p> Signup and view all the answers

What is the primary function of the XOR gate in a full adder circuit?

<p>To generate the sum output from two bits. (D)</p> Signup and view all the answers

Which statement is true about SR flip-flops?

<p>They become unstable when both R and S inputs are 1. (B)</p> Signup and view all the answers

What does polymorphism allow in a derived class?

<p>To redefine methods from the superclass. (B)</p> Signup and view all the answers

In the context of flip-flop circuits, what occurs when both J and K inputs of a JK flip-flop are 1?

<p>The output toggles its state. (A)</p> Signup and view all the answers

What happens to a packet when its hop number reaches zero at a router?

<p>It is deleted. (A)</p> Signup and view all the answers

Which of the following correctly describes the role of TCP in data transmission?

<p>Manages a connection until the data exchange is complete. (D)</p> Signup and view all the answers

How does the architecture of RICS differ from CISC?

<p>RICS has a larger number of simple instructions. (A)</p> Signup and view all the answers

What is the purpose of the packet header in data transmission?

<p>To store the source and destination IP addresses. (C)</p> Signup and view all the answers

Which stage in the pipelining process involves the CPU decoding an instruction?

<p>Instruction Decode (ID) (A)</p> Signup and view all the answers

What is a key difference between CISC and RICS regarding execution time?

<p>CISC has slower execution time due to complex instructions. (C)</p> Signup and view all the answers

Which function of IP is primarily related to routing?

<p>Routing the packets around the network. (A)</p> Signup and view all the answers

What is the primary function of SMTP in the TCP/IP protocol suite?

<p>To send emails through servers (A)</p> Signup and view all the answers

What does the term 'pipelining' refer to in instruction execution?

<p>Breaking down instruction execution into simpler parallel steps. (D)</p> Signup and view all the answers

Which of the following protocols allow emails to remain on the server after being downloaded?

<p>IMAP (A)</p> Signup and view all the answers

What type of addressing does the Internet Layer utilize in the TCP/IP model?

<p>Logical addressing with unique IP addresses (D)</p> Signup and view all the answers

Which protocol is primarily responsible for ensuring reliable data delivery?

<p>TCP (Transmission Control Protocol) (C)</p> Signup and view all the answers

What does CSMA/CD stand for, and in what context is it used?

<p>Carrier Sense Multiple Access with Collision Detection, used in wired networks (C)</p> Signup and view all the answers

What is the function of the Link Layer in the TCP/IP protocol suite?

<p>To manage the physical transmission of data frames over network hardware (A)</p> Signup and view all the answers

Which protocol would be used to transfer files between computers?

<p>FTP (A)</p> Signup and view all the answers

What method does CSMA/CA use to avoid data collisions in wireless networks?

<p>Wait a random amount of time before transmitting when another device is detected (B)</p> Signup and view all the answers

What causes delays in the performance of pipelined processors?

<p>Complex instruction sets needing more clock cycles (D)</p> Signup and view all the answers

What is a benefit of precise interrupt handling in pipelined processors?

<p>Reduces the number of instructions to be re-executed (B)</p> Signup and view all the answers

Which of the following best describes MIMD architecture?

<p>Multiple instructions executed by multiple processors on different data (D)</p> Signup and view all the answers

What is a characteristic feature of massively parallel computers?

<p>Processors are interconnected in a network structure (A)</p> Signup and view all the answers

What does the term 'scalability' refer to in parallel processing?

<p>The ease of adding additional processors for complex computations (A)</p> Signup and view all the answers

Which of the following describes the operation of SIMD?

<p>Multiple processors execute the same instruction on multiple data (C)</p> Signup and view all the answers

How does forwarding help in pipelining?

<p>By providing results of a prior instruction to the current stage without waiting (B)</p> Signup and view all the answers

What is the primary advantage of parallel processing?

<p>Increased efficiency by executing multitasks simultaneously (D)</p> Signup and view all the answers

Signup and view all the answers

Flashcards

Link Layer

A layer that handles the transmission of data over a physical network, managing connections between devices in a local network. It's responsible for sending and receiving data frames via technologies like Ethernet or Wi-Fi.

CSMA/CA

A standard for wireless networks that works by devices listening for signals from other devices before sending data. If a signal is detected, the device waits a random amount of time before resending to avoid collisions.

CSMA/CD

A standard for wired networks that also uses listening before transmitting. If a collision is detected during transmission, both devices stop and wait a random time before resending.

Application Layer

A protocol used by applications to communicate with each other over a network. It facilitates communication between software applications on different devices.

Signup and view all the flashcards

TCP (Transmission Control Protocol)

A protocol that ensures data is delivered reliably. It uses techniques like positive acknowledgements and retransmissions to guarantee data reaches its destination.

Signup and view all the flashcards

Internet Layer

A protocol responsible for routing data packets across a network. It determines the most efficient path for packets to travel based on unique addresses and routing configurations.

Signup and view all the flashcards

UDP (User Datagram Protocol)

A protocol that transmits data without confirming delivery, making it faster but less reliable.

Signup and view all the flashcards

SMTP (Simple Mail Transfer Protocol)

A protocol used for sending emails through servers. It enables the exchange of email messages between different email providers.

Signup and view all the flashcards

Ethernet

A networking system used to connect computers within a local area network (LAN). It uses a protocol to manage frame transmission, preventing collisions and ensuring smooth data flow.

Signup and view all the flashcards

BitTorrent

A client-server technology used for file sharing, allowing multiple users to download and upload parts of a file simultaneously.

Signup and view all the flashcards

Leech

A user who downloads a file from a BitTorrent network.

Signup and view all the flashcards

Seed

A user who has a complete copy of a file and shares those pieces with other peers on a BitTorrent network.

Signup and view all the flashcards

Tracker

A central server in BitTorrent that keeps track of the participating peers and the parts of the file they have.

Signup and view all the flashcards

Circuit Switching

A communication method where a dedicated communication channel is established between the sender and receiver before data transmission.

Signup and view all the flashcards

Packet Switching

A communication method where messages are broken down into packets, sent independently, and reassembled at the destination.

Signup and view all the flashcards

Routing

Data packets sent from source to destination via various routes based on the most effective path determined by routers.

Signup and view all the flashcards

Transport Layer

The Application Layer uses the Transport Layer to manage data transmission. It ensures packet delivery and checks for errors in packets. It's like a package delivery service that handles all the details of getting packages from sender to recipient.

Signup and view all the flashcards

Network/Internet Layer

This layer handles the actual sending and receiving of data based on IP addresses, creating and routing packets. It's like a postal service that delivers mail based on addresses.

Signup and view all the flashcards

HTTP

This protocol is used for transferring files that make up web pages on the internet. It's the communication language for web browsers and servers.

Signup and view all the flashcards

POP3/4

This protocol handles receiving emails, managing the process of downloading emails to your device, like a mailbox for emails.

Signup and view all the flashcards

IMAP

This protocol also handles receiving emails, allowing you to access and organize emails on the server, like a remote email manager.

Signup and view all the flashcards

What does a router do with a packet?

A router determines the next router to send a packet to, using the destination IP address and decreasing the "hop number" by 1 with each hop.

Signup and view all the flashcards

Hop number: What is it?

The maximum number of times a packet can be forwarded before it is discarded.

Signup and view all the flashcards

What are the main functions of TCP?

TCP provides reliable data transfer by breaking data into packets, adding headers, sending and receiving packets, acknowledging receipt, retransmitting lost packets, and reassembling packets in the correct order.

Signup and view all the flashcards

What are the main functions of IP?

IP is responsible for routing packets across the network and assigning unique IP addresses to devices.

Signup and view all the flashcards

What characterizes a CISC processor?

CISC processors have a large number of complex instructions that can be executed in a single clock cycle, resulting in slower execution but more efficiency for complex tasks.

Signup and view all the flashcards

What characterizes a RISC processor?

RISC processors prioritize speed by using a limited set of simple instructions, executing them in a single clock cycle. This makes them faster but less efficient for complex tasks.

Signup and view all the flashcards

What is pipelining?

Pipelining breaks down instruction execution into smaller stages that are executed in parallel, allowing multiple instructions to be processed simultaneously. The stages include instruction fetch, decode, operand fetch, execution, and write-back.

Signup and view all the flashcards

Pipelining: What happens in the IF stage?

The Instruction Fetch stage (IF) reads instructions from memory based on the program counter's current address.

Signup and view all the flashcards

Instance

A specific object created from a class. Think of a class as a blueprint and an instance as the actual house.

Signup and view all the flashcards

Encapsulation

A protective barrier around a class's data and methods. It restricts direct access to the internal workings of the class, enforcing organization and preventing accidental changes.

Signup and view all the flashcards

Getter

A method used to retrieve the value of a private property within a class.

Signup and view all the flashcards

Polymorphism

The ability of an object to take on different forms or behaviors based on its context. Think of it as objects acting differently in different situations.

Signup and view all the flashcards

Pipeline Challenges

Instructions take varying clock cycles causing delays and performance issues.

Signup and view all the flashcards

Branch Prediction

A technique that predicts the next instruction branch and executes it in advance, reducing delays from conditional jumps.

Signup and view all the flashcards

Data Forwarding

Forwarding data from one pipeline stage to another before it reaches its destination, reducing delays.

Signup and view all the flashcards

Interrupt Handling in CISC

Interrupt handling in complex instruction sets(CISC) is more complicated than in RISC architectures due to the nature of their instructions.

Signup and view all the flashcards

Interrupt Handling in Pipelined Processors

When an interrupt occurs, the pipeline is flushed and all instructions are discarded to handle the interrupt efficiently.

Signup and view all the flashcards

Precise Interrupt

A method allowing precise interrupt handling by completing the current instruction's write-back stage before flushing the pipeline, reducing re-execution.

Signup and view all the flashcards

Parallel Processing

Multiple processors working simultaneously to improve performance and reduce overall task completion time.

Signup and view all the flashcards

Distributed Memory

Each processor in a massively parallel computer has its own memory and can communicate with others, enabling efficient data sharing and parallel processing.

Signup and view all the flashcards

Study Notes

Data Representation

  • User-defined data types are categorized as composite and non-composite
  • Composite types include record data types, set data types, and classes
  • Record data types consist of different data types and are used when multiple values need to be stored in a variable
  • Set data types allow programs to create sets and apply mathematical operations. All elements in a set are unique
  • Classes are used in object-oriented programming and include variables and functions

Non-Composite Data Types

  • Enumerate data types define a list of possible values and allow comparisons between countable values
  • Pointer data types relate to the type of variables using the syntax TYPE = ^<TYPE> and represent a pointer

File Organisation

  • Serial files store data in a defined order, with new data added to the end, which may require going through every record
  • Serial files are good for temporary storage and straightforward tasks
  • Serial files are cost-effective but are difficult to access quickly
  • Sequential files provide data integrity and less redundancy. New records are placed in the correct order, with key fields already ordered. Accessing the record is easier with binary search
  • Sequential files are easier to access but still need to traverse every record
  • Direct access files have an index of a key field to speed up access
  • Binary files can be stored using hashing algorithms on a key field

File Types

  • Text files, binary files, random files, and direct access files are examples of file types
  • Random files store records randomly yet are accessed directly, using hashing algorithms on key fields

Floating Point

  • Floating-point representation uses mantissa and exponent
  • The leftmost bit in a mantissa represents negative or positive value
  • The left side of the decimal represents the exponent which is either negative or positive
  • The normalization involves shifting the decimal to the right or left to obtain 1.xxxxx form. Positive fractions start with .1 and negative with 1.0

Turning Fractions into Binary

  • Fractions are converted to binary representation by multiplying the fraction by 2 repeatedly, taking the integer and the fractional part
  • The integer part is the bit for the binary value.
  • The fractional part is used in the next iteration

Why Data Stores in Normalized form?

  • To store maximum range of numbers in minimum bits

Properties of Binary Representation

  • Binary representation is an approximation to real numbers
  • It is a fixed length representation, hence it cannot store very large numbers
  • Binary representation can't exactly represent numbers like 0.2 or 0.4 due to bits being lost during rounding error if there is not enough bits

Overflow and Underflow

  • Overflow occurs if the result is too large to be represented with the available bits
  • Underflow occurs if the result is too small to represent with the available bits

OUTPUT

  • Output values are represented by greater values, increasing the difference between the output result and the actual result
  • The output amount is significant enough to be represented in binary

TCP/IP Protocols

  • TCP/IP has four layers (Application, Transport, Internet, and Link) to transfer data between computers
  • Application layer uses protocols like SMTP, POP3, IMAP, HTTP for tasks like email, web browsing, etc
  • Transport layer protocols like TCP or UDP ensure reliable data transfer and control flow
  • Internet layer protocols like IP provide logical addressing and routing
  • Link layer manages the physical connection and transmission between devices on the network
  • CSMA/CA and CSMA/CD are used to prevent data collisions when multiple devices transmit data on a network simultaneously
  • CSMA/CA: Devices on a wireless network listen to the network before transmitting to prevent collisions by waiting a random amount of time before transmitting again.
  • CSMA/CD: Devices on a wired network listen to the network during transmission. If a collision is detected, both devices stop transmitting and wait a random amount of time before resuming

HTTP, SMTP, POP3, IMAP, DNS, FTP, RIP, SNMP

  • Protocols for transmitting data in network communications

Hardware Types

  • CISC (Complex Instruction Set Computing) has a large number of complex instructions. Complex and lengthy instructions are used and execution takes longer compared to RISC processors
  • RISC (Reduced Instruction Set Computing) has a small number of simple instructions. Simple and short instructions are used, but the execution is faster compared to CISC processors

Pipelining

  • By breaking down instructions into smaller steps and executing them concurrently through different stages of the pipeline, pipelining improves processing speed in RISC processors
  • Difficulties arise when different instructions need different numbers of clock cycles in each step of the pipeline because some clock cycles may be idle between instruction processes
  • Interrupt handling in a pipelined processor may affect the pipeline flushing.

Parallel Processing

  • Parallel processing allows multiple calculations to occur simultaneously across processors (Single Instruction - Single Data (SISD), Single Instruction - Multiple Data (SIMD), Multiple Instruction - Single Data (MISD), Multiple Instruction - Multiple Data (MIMD))
  • Methods of divide and conquer, assign work, and facilitate parallel processing are needed to efficiently handle massive calculations. Parallel processing is used for speed and scaling demands

Massively Parallel Computers

  • Made up of many processors working together in a network structure
  • Scalability allows for continuous expansion of processors
  • Distributed memory provides efficient data sharing
  • Suitable for complex calculations.

Virtual Machine

  • Virtual machines are software emulations enabling multiple operating systems to run on a single computer.
  • Provides flexibility in creating virtual servers and scaling infrastructure
  • Allows multiple operating systems to run on one machine without impacting physical hardware
  • Cons: Performance may be impacted due to extra software layers involved
  • Sharing CPU, memory, or storage can cause performance issues

Differences Between RISC and CISC Processors

  • RISC processors have fixed-length instructions and fewer instructions, use general registers, and have a simpler circuit and fewer addressing modes
  • CISC processors have variable-length instructions and more instructions, use fewer general registers, and have a more complex circuit and more addressing modes

Pipelining in RISC Processors

  • Instructions are divided into subtasks (IF, ID, OF, IE, WB)
  • Each subtask is completed during a clock cycle
  • Multiple instructions can execute concurrently by processing each instruction's subtasks during different clock cycles
  • Differences in the number of clock cycles for each instruction step may cause idle periods

Massively Parallel Computing

  • Large numbers of processors work together
  • Communication between processors requires addressing
  • Suitable algorithms for parallel processing are needed

Guest OS vs Host OS

  • Guest OS run within a VM created and managed by the underlying host OS
  • Host OS controls the physical hardware and manages resources for both itself and the guest OS
  • Guest OS translates requests from applications into instructions to the host OS, utilizing the VM to facilitate the translations.

VM Roles

  • VM creates and manages a virtual machine
  • It facilitates the translation between instructions from a guest OS and the corresponding host OS instructions
  • Provides a hardware emulation environment

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Description

Test your knowledge on various networking protocols and their functions with this quiz. From email sending protocols to the role of the Link Layer in communication, this quiz covers essential concepts in computer networking. Challenge yourself and see how well you understand the foundational elements of network communication.

More Like This

Use Quizgecko on...
Browser
Browser