2nd term exam Flashcards

(107 cards)

1
Q

The layer in the TCP/IP protocol suite that resides between the network layer and the application layer. It is responsible for providing services to the application layer and receives services from the network layer.

A

Transport Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A connectionless protocol used in the transport layer.

A

UDP (User Datagram Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A connection-oriented protocol used in the transport layer.

A

TCP (Transmission Control Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A transport-layer protocol used to handle multimedia and stream traffic.

A

SCTP (Stream Control Transmission Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The transport layer provides _____ communication. An example is communication between a web server process and a web browser process.

A

Process-to-Process Communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Identifies a process running on a computer.

A

Port Number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Determines the host computer or the network interface card of the computer.

A

IP Address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The combination of an IP address and a port number.

A

Socket Address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The process where the transport layer adds header information to data coming from the application layer.

A

Encapsulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The process where the transport layer reads and removes header information from a packet as it delivers it to a process at the application layer.

A

Decapsulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The ability to transport or send multiple packets of data from different processes to their respective destinations without getting mixed up.

A

Multiplexing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The ability to correctly retrieve multiple packets of data that are destined for different processes at the application layer.

A

Demultiplexing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Methods to control the arrival of packets so that the receiver is not overwhelmed. Achieved, for example, by using acknowledgements (ACK).

A

Flow Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Mechanisms to handle errors in data transmission, such as automatic repeat request (ARQ).

A

Error Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Techniques to improve network performance by addressing congestion (open loop - prevention; closed loop - removal).

A

Congestion Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A type of transport layer service (like UDP).

A

Connectionless Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A type of transport layer service (like TCP).

A

Connection-Oriented Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q
  • ____means the producer delivers the items when they are produced. ____means the consumer takes the items when it is ready to do so.
A

Pushing; Pulling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

The sender requests data.

A

Pulling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

An error control mechanism involving automatic repeat of transmission of a packet for expired or missed acknowledgement or automatic request of repeat of transmission for erroneously received packet.

A

ARQ (Automatic Repeat Request)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

A connectionless protocol that provides neither flow nor error control.

A

Simple Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A protocol where flow control is achieved by forcing the sender to wait for an acknowledgment, and error control is achieved by discarding corrupted packets and having the sender resend unacknowledged packets.

A

Stop-and-Wait Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

A protocol where the acknowledgment is cumulative and defines the sequence number of the next packet expected to arrive.

A

Go-Back-N Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

A protocol that uses a series of acknowledgments that defines the sequence number of the error-free packet received.

A

Selective-Repeat Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
* **Provide services to the transport layer and receives services from the link layer. Concerned with packetizing, routing, and forwarding of packets** * The layer responsible for packetizing, forwarding, and delivering packets in a network.
Network Layer
26
**A mode of data transmission in which a message is broken into a number of parts which are sent independently, over whatever route is optimum for each packet, and reassembled at the destination**
Packet Switching
27
A connectionless packet-switched network.
Datagram
28
A connection-oriented packet-switched network.
Virtual Circuit
29
The amount of data transferred in a given amount of time (bits per second).
Throughput
30
The sum of transmission delay, propagation delay, processing delay, and queuing delay.
Delay
31
Dropped or corrupted packets due to noise, collision, or channel fading.
Packet Loss
32
* **An internet addressing technique that uses 32 bits** * A 32-bit address that uniquely and universally defines the connection of a device to the Internet.
IPv4
33
* **An internet addressing technique that uses 128 bits to solve issues in the limited number of addresses in 32-bit addressing scheme** * A 128-bit address that uniquely and universally defines the connection of a device to the Internet.
IPv6
34
An IP addressing architecture that divides IP addresses into classes (A, B, C, D, E) based on the first few bits of the address.
Classful Addressing
35
A method where variable-length blocks are used, and addresses do not belong to fixed classes.
Classless Addressing (CIDR)
36
The number of bits in the network prefix in CIDR notation.
Prefix Length
37
* **The practice of dividing a network into two or more networks** * Dividing an IP network into smaller sub-networks or subnets.
Subnetting
38
Combining blocks of addresses to create a larger block.
Address Aggregation/Summarization
39
Defines a single interface; a packet is routed to the intended recipient.
Unicast
40
Defines a group of computers with a single address; a packet is routed to the most reachable member.
Anycast
41
Defines a group of computers; a packet is routed to each member of the group.
Multicast
42
**To direct and deliver a datagram from its source to its destination(s).**
Routing
43
**One-to-one delivery: a datagram is directed and delivered to only one destination**
Unicast Routing
44
One-to-many delivery.
Multicast Routing
45
Protocols that build forwarding/routing tables.
Routing Protocols
46
The route or tree with the lowest cost.
Least-Cost Path/Least-Cost Trees
47
* **A routing algorithm that determines the best or least-cost routes by creating least-cost trees with the information a node has about its immediate neighbors. The incomplete trees are exchanged between immediate neighbors to make the trees more and more complete.** * A routing algorithm based on the Bellman-Ford algorithm.
Distance Vector Routing
48
A routing algorithm based on Dijkstra's algorithm.
Link-State Routing
49
A routing algorithm based on the Bellman-Ford algorithm plus policy.
Path Vector Routing
50
The main protocol responsible for packetizing, forwarding, and delivery of a packet at the network layer.
Internet Protocol V4 (IPv4)
51
A protocol that handles some errors that may occur in network-layer delivery.
Internet Control Message Protocol version 4 (ICMPv4)
52
A protocol that helps IPv4 in multicasting.
Internet Group Management Protocol (IGMP)
53
A protocol that maps network-layer addresses to link-layer addresses (and vice versa).
Address Resolution Protocol (ARP)
54
A 32-bit address, represented in dotted decimal notation (e.g., 128.11.3.31).
IPV4 Address
55
A binary digit, which can be 0 or 1. The document uses binary notation (e.g., 10000000.00001011.00000011.00011111) to represent IPv4 addresses.
Bit
56
A way of representing numbers using base-10. IPv4 addresses are commonly represented in decimal notation, with each 8-bit section separated by a dot.
Decimal Notation
57
A way of representing numbers using base-2. The document provides examples of converting between decimal and binary notations.
Binary Notation
58
A way of representing numbers using base-16. The document briefly mentions hexadecimal notation (e.g., 80.0B.03.1F).
Hexadecimal Notation
59
A method of representing IP addresses and their associated subnet masks using a slash followed by the number of bits in the network address (e.g., /16).
Classless Addressing (Slash Notation)
60
A sequence of 32 bits used to identify the network portion of an IP address. In slash notation, it's the number after the slash.
Netmask
61
A division of a network into smaller, logical subnetworks.
Subnet
62
A mask used to divide an IP address into subnets.
Subnet Mask
63
The address that identifies a specific network.
Network Address
64
The address assigned to a specific device within a network.
Host Address
65
An 8-bit section of an IP address. IPv4 addresses are divided into four _____.
Octet
66
**A mode of data transmission in which a message is broken into a number of parts which are sent independently, over whatever route is optimum for each packet, and reassembled at the destination**
Connectionless-oriented packet switching
67
**Virtual circuit: a packet forwarding technique that is based on a label**
Connection-oriented packet switching
68
**The host address in IPv4**
0.0.0.0/32
69
**Criteria at which network layer is measured**
Delay, throughput, and packet loss
70
**Loop-back address in IPv4**
127.0.0.0/8
71
**The total number of addresses used by the protocol**
Address Space
72
**In the selective-repeat protocol, negative acknowledgement is for individual packet. True or False?**
True
73
**In the Go-Back-N protocol, Acknowledgement type is cumulative. True or False?**
True
74
**A client program normally uses ____ port number. A server program normally uses ____ port number.**
an ephemeral; a well-known
75
**One of the main duties of the transport layer is to provide ____ communication.**
process-to-process
76
**In the selective-repeat protocol, only the suspected or damaged frames are retransmitted. True or False?**
True
77
**In the stop-and-wait protocol, the sender sends one data packet to the receiver and then stops and waits for the receiver to acknowledge it. True or False?**
True
78
**In the Go-Back-N protocol, if a sent frame is found suspected or damaged then all the frames are retransmitted till the packet before the last successfully received packet. True or False**
True
79
**A socket address is a combination of ____**
an IP address and a port number
80
**____means accepting items from more than one source. ____means delivering items to more than one destination.**
Multiplexing; Demultiplexing
81
**In the stop-and-wait protocol acknowledgement type is for individual packet. True or false?**
True
82
**UDP and TCP are two protocols at the ____ layer.**
Transport
83
**The source port number on the UDP user datagram header defines ____**
the process running on the sending computer
84
**UDP is a ____ transport protocol.**
connectionless, unreliable
85
**At the transport layer, to define the processes, we need two identifiers called ______**
port addresses
86
**Communication at the transport layer is ____**
end-to-end
87
**Which of the following does UDP provide? (a) Flow control (b) Connection-oriented delivery (c) Error control (d) All of the above (e) None of the above**
E
88
**The ports ranging from 0 to 1,023 are called the ____ ports. The ports ranging from 1,024 to 49,151 are called the ____ ports. The ports ranging from 49,152 to 65,535 are called the ____ ports.**
well-known; registered; dynamic or private
89
**To use the services of UDP, we need ____ socket addresses.**
One
90
**UDP and TCP are two protocols at the ____ layer.**
transport
91
**UDP is an acronym for**
User Datagram Protocol
92
**A port number is ____ bits long.**
16
93
**UDP packets are called**
datagram
94
**In TCP's ____ algorithm the size of the congestion window increases additively until congestion is detected.**
congestion avoidance
95
**In the slow start algorithm, the size of the congestion window grows ____ until ____**
exponentially; it reaches a threshold
96
**The connection establishment procedure in TCP is susceptible to a serious security problem called the ____ attack.**
SYN flooding
97
**TCP is a ____ transport protocol**
connection-oriented, reliable
98
**In TCP, an ACK segments that carry no data consumes ____ sequence number(s)**
One
99
**The inclusion of the checksum in the TCP segment is ____**
mandatory
100
**TCP is a(n) _____ transport**
reliable
101
**In the congestion avoidance algorithm, the size of the congestion window grows ____ until ____**
additively; congestion is detected
102
**Communication in TCP is**
full-duplex
103
**In TCP's ____ algorithm the size of the congestion window increases exponentially until it reaches a threshold.**
slow start
104
**TCP groups a number of bytes together into a packet called a ____**
segment
105
**____ control refers to the mechanisms and techniques to keep the load below the capacity.**
Congestion
106
**TCP is a ____ protocol.**
byte-oriented
107
**TCP uses ____ to check the safe and sound arrival of data.**
an acknowledgment mechanism