Examen Flashcards

(71 cards)

1
Q

Protocol layering, packet switching, routing and data streaming are the principles on which:

A

Computer Networks are based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The computers and other devices that use the network for communication proposes are referred to as:

A

Hosts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

This is the delay that occurs after a send operation is executed before data starts to arrive at the destination computer in network performance

A

Latency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

This term is used to refer to any computer or switching device attached to a network

A

Node

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

This is the speed at which data can be transferred between two computers in the network once transmission has begun.

A

Data transfer rate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

This is a single communication subsystem providing communication between all of the hosts that are connected to it, where the internet is constructed form many subnets.

A

The Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

They carry messages at lower speeds between nodes that
are often in different organizations and may be separated by
large distances.

A

Wide Area Networks (WAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The end-to-end communication must provide totally errorfree; the detection of communication errors and their
correction is what we call:

A

Reliability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

This is a sequence of binary data (an array of bits or bytes) of restricted length, together with addressing information
sufficient to identify the source and destination of computers

A

The simples form of packet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

This is a unit of routing (delivering data from one part of the internet to another)

A

Subnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

This is a type of network is based on the high bandwidth copper and fiber optic cabling recently installed in some
towns and cities for the transmission of video, voice and other data over distances up to 50 kilometers.

A

Metropolitan Area Networks (MANs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

This is defined as the ability to meet deadlines when transmitting and processing streams of real-time multimedia
data

A

Quality of service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

This is a communication subsystem in which several networks are linked together to provide common data communication facilities that overlay the technologies and
protocols of the individual component networks and the methods used for the interconnection.

A

Internetworks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

This is why many network technologies support the simultaneous transmission of messages to several recipients

A

Multicasting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The IEEE 802.16 WiMAX standard is targeted at this class of network. It aims to provide an alternative to wired connections to home and office buildings

A

Wireless Metropolitan Area Networks (WMANs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

This is referred to as the transmission and display of audio and video in real time. It requires much higher bandwidths than most other forms of communication in distributed systems

A

Streaming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

They are composed of a number of personal devices such as mobile phones, tablets, digital cameras, music players and so on that are now carried by many people.

A

Wireless personal area networks
(WPANs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

They are generally used to hold the video frames, but because the flow is continuous as opposed to the intermittent traffic generated by typical client-server interactions and are handled somewhat differently

A

UDP internet packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

In this type of network, most mobile phone networks are based on digital wireless network technologies such as the GSM standard, which is used in most countries of the world

A

Wireless wide area networks (WWANs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

They are specifically designed to provide high bandwidth and low latencies and to support quality of service by the reservation of network resources.

A

ATM Networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

This is a transmission technique that involves no switching, everything is transmitted to every node, and it is up to
potential receivers to notice transmissions addressed to them.

A

Broadcasting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

In this type of switching, each packet arriving at a node is first stored in memory at the node and then processed by a
program that transmit it on outgoing circuit, which transfers the packet to another node that is closer to its ultimate
destination.

A

Packet switching

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Their operation was simple to understand, when a caller dialed a number, the pair of wires from her phone to the local exchange was connected by an automatic switch at the exchange to the pir of wires connected to the other party´s
phone.

A

Circuit switching

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

This is used to refer to a well-know set of rules and formats to be used for communication between processes in order to perform a given task

A

The term protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
The task of dividing messages into packets before transmission and reassembling them at the receiving computer is usually performed in the transport layer.
Packet assembly
26
They are software-defined destinations points at a host computer. They are attached to a processes, enabling data transmission to be addressed to a specific process at a destination node.
Ports
27
This is a numeric identifier that uniquely identifies a host computer and enables it to be located by nodes that are responsible for routing data to it.
A network address
28
When a pair of nodes connected to two separate networks need to communicate through another type of network or over an alien protocol, they can do so by constructing a protocol under a scheme of:
Tunneling
29
This is a function that is required in all networks except those LANs, such as the Ethernet, that provide direct connections between all pairs of attached hosts.
Routing
30
A unified addressing scheme between different networks that enables packets to be addressed to any host connected to any subnet is a necessary element to build:
Internetwork
31
This must lend itself to the development of a flexible and efficient routing scheme, but the addresses themselves cannot contain very much of the information needed to route a packet to its destination.
Addressing scheme
32
The determination of routes for the transmission of packets to their destinations is the responsibility of this procedure, which has two parts:
a routing algorithm
33
It is a based upon the permanent allocation of a normal IP address to each mobile host on a subnet in its home domain.
Mobile IP
34
The purpose of this is to monitor and control all communication into and out of a intranet.
A Firewall
35
Message passing between a pair of processes can be supported by two message communication operations
Send and receive operations
36
In this form of communication, the use of the send operation is non-blocking, receive operation can have blocking and non-blocking variants
The asynchronous form of communication
37
We can describe this as the guaranteed to deliver the message despite a reasonable number of packets being dropped or lost
Reliability
38
Both forms of communication (UDP and TCP) use ______, which provides an endpoint for communication between processes
The socket abstaction
39
In this form of communication, the sending and receiving processes synchronize at every message. In this case, both send and receive are blocking operations
The synchronous communication
40
Any process may make use of multiple of these elements to receive messages, but a process cannot share them with other processes on the same computer.
Ports
41
The internet protocols, and the local port pairs define the:
Message destination
42
This consist of transmitting a message between a socket in one process and a socket in another process
Interprocess communication
43
This is sent by UDP is transmitted from a sending process to a receive process without acknowledgment or retries
A datagram
44
Messages may be dropped occasionally, either because of a checksum error or because no buffer space is available at the source or destination, it’s called:
Omission failures
45
This defines reliable communication for channels in terms of two properties: integrity and validity
Failure Mode
46
This was originated from BSD 4.x UNIX and provides the abstraction of a stream of bytes to which data may be written and from which data may be read
The API to the TCP Protocol
47
This assume that when a pair of processes are establishing a connection, one of them plays the client role and another plays the server role, but thereafter they could be peers
The API for stream communication
48
The TCP protocol uses an acknowledgement scheme. If the sender does not receive an acknowledgement with a time out, it retransmit the message and this performed when:
Lost messages
49
The TCP protocol attempts to match the speeds of the processes that read from and write to a stream, this is called:
Flow control
50
These items transmitted in messages can be data values of many different types and not all computers store primitive values such as integers in the same order.
The individual primitive data
51
This is the process of taking a collection of data items and assembling or disassembling (respectively) into a form suitable for transmission in a message.
Marshalling and Unmarshalling
52
They are three alternative approaches to external data representation
XML, CORBA and Java´s object serialization
53
The first one was designed for defining the appearance of web pages while the second one was designed for writing structured documents for the web
HTML and XML
54
They are tagged with ‘markup’ strings. The tags are used to describe the logical structure of the data and to associate attribute-value pairs with logical structures.
XML data items
55
XML is _____ in the sense that users can define their own tags, in contrast to HTML, which uses a fixed set of tags
Extensible
56
This is a markup language that was defined by the World Wide Web Consortium (W3C) for general use on the web
XML
57
The structure of an XML document is defined by pairs of these elements enclosed in angle brackets
Tags
58
They define the name of values associate to tags in XML schemes
XML Attributes
59
This is used to enable clients to communicate with web services and for defining the interfaces and other properties of web services
XML Service
60
All the information in XML elements must be expressed as character data. But the question is: how do we represent encrypted elements or secures hashes?
Binary data
61
Every start tag has matched end tag and all tags are correctly nested, these are
Basic rules of XML
62
Every XML document must have this as its first line and must at least specify the version of XML in use (chich is currently 1.0)
Prolog
63
This is a set of names for a collection of element types and attributes that is referenced by a URL
XML Namespace
64
This defines the elements and attributes that can appear in a document, how the elements are nested and the order and number of elements, and whether an element is empty or can include text
XML Schema
65
This protocol is based on a trio of communication primitives: doOperation, getRequested and sendReplay
The request-reply protocol
66
This scheme involves the management of messages and requires that each message have a unique element by which it may be referenced
Messages identifiers
67
As its name indicates. It is a mechanism to call a procedure or a function available on a remote computer
RPC
68
This uses the HTTP protocol to pass information from a client computer to a server computer and uses a small XML vocabulary to describe the nature of requests and responses
XML RPC
69
This specifies a procedure name and parameters in the XML request, and the server returns either a fault or a response in the XML response
XML-RPC client
70
Data model, request structures and response structures are parts of
XML RPC Structure
71
Ther are a simple list of types and content – structs and arrays are the most complex types available
XML RPC parameters