Comp Network pre-study- Ethernet, wireless LAN, socket programming, & distributed applications Flashcards

1
Q

Fast Ethernet extends traditional Ethernet performance up to 100 Mbps, and Gigabit Ethernet, up to _____ Mbps. Although they aren’t available to the average consumer, 10 Gigabit Ethernet (10,000 Mbps) now powers the networks of some businesses, data centers, and Internet2 entities. Generally, however, the expense limits its widespread adoption.

A

1,000

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Ethernet cables likewise are manufactured to any of several standard specifications. The most popular Ethernet cable in use, Category 5 (CAT5 cable) supports both traditional and Fast Ethernet. Category 5e (CAT5e) and CAT6 cables support _______ _____.

Some devices without Ethernet support can support Ethernet connections using dongles such as USB-to-Ethernet adapters. Ethernet cables use connectors that look like the RJ-45 connector used with traditional telephones.

A

Gigabit Ethernet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Traditional Ethernet employs a bus topology, meaning that all devices or hosts on the network use the same shared communication line. Each device possesses an Ethernet address, also known as a ______ _______. Sending devices use Ethernet addresses to specify the intended recipients of messages.

A

MAC address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Data sent over Ethernet exists in the form of _____. An Ethernet frame contains a header, a data section, and a footer with a combined length of no more than 1,518 bytes. The Ethernet header contains the addresses of both the intended recipient and the sender.

A

frames

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Data sent over the Ethernet is automatically broadcast to all devices on the network. By comparing the Ethernet address against the address in the frame header, each Ethernet device tests each frame to determine if it was intended for it and reads or discards the frame as appropriate. ___ ____ incorporate this function into their hardware.

A

Network adapters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Devices that want to transmit on an Ethernet network first perform a preliminary check to determine whether the _______ is available or if a transmission is in progress. If the Ethernet is available, the sending device transmits onto the wire. It’s possible, however, that two devices will perform this test at approximately the same time and both _______ simultaneously.

A

medium
transmit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

By design, as a performance tradeoff, the Ethernet standard does not prevent multiple simultaneous transmissions. These so-called collisions, when they occur, cause both transmissions to fail and require both sending devices to retransmit. ______ uses an algorithm based on random delay times to determine the proper waiting period between retransmissions. The network adapter also implements this algorithm.

A

Ethernet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

protocol for broadcasting, listening, and detecting collisions is known as CSMA/CD (carrier sense multiple access/collision detection). Some newer forms of Ethernet do not use CSMA/CD. Instead, they use the _________ Ethernet protocol, which supports point-to-point simultaneous sending and receiving with no listening required.

A

full-duplex

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Ethernet cables are limited in their reach, and those distances (as short as 100 meters) are insufficient to cover medium and large network installations. A repeater in Ethernet networking allows multiple cables to be joined and greater distances to be spanned. A ______ ______ can join an Ethernet to another network of a different type, such as a wireless network. One popular type of repeater device is an ______ _____. Other devices sometimes confused with hubs are switches and routers.

A

bridge device
Ethernet hub

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

_____ _____ _____ also exist in multiple forms. Computers and game consoles feature built-in Ethernet adapters. USB-to-Ethernet adapters and wireless Ethernet adapters also can be configured to work with many devices.

A

Ethernet network adapters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How does a WLAN work?

Like broadcast media, a WLAN transmits information over _____ _____. Data is sent in packets. The packets contain layers with labels and instructions that, along with the unique MAC (Media Access Control) addresses assigned to endpoints, enable ______ to intended locations.

A

radio waves
routing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A WLAN can be configured in one of two ways:

A

A home or office Wi-Fi network is an example of a WLAN set up in infrastructure mode. The endpoints are all connected and communicate with each other through a base station, which may also provide internet access.

A basic infrastructure WLAN can be set up with just a few parts: a wireless router, which acts as the base station, and endpoints, which can be computers, mobile devices, printers, and other devices. In most cases, the wireless router is also the internet connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A WLAN is more vulnerable to being breached than a physical network. With a wired network, a bad actor must gain physical access to an internal network or breach an external firewall. To access a WLAN, a bad actor must simply be within range of the network.

The most basic method of securing a WLAN is to use _____ addresses to disallow unauthorized stations. However, determined adversaries may be able to join networks by _____ an authorized address.

The most common security method for a WLAN is encryption, including _____ _____ _____ (WEP) and Wi-Fi Protected Access (WPA), with WPA2 as the standard authentication method.

A

MAC
spoofing
Wired Equivalent Privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How does roaming work on a WLAN?

A

For any sized network, access points can extend the area of access.

Wi-Fi standards are designed to allow a nonstationary user’s connection to jump from one access point to another, though some users and applications may experience brief dropouts. Even with nonoverlapping access points, a user’s connection is simply paused until connection with the next access point.

Additional access points can be wired or wireless. When access points overlap, they can be configured to help optimize the network by sharing and managing loads.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A _____ _____ extends a WLAN’s reach and performance, through the use of numerous access points that connect with each other wirelessly. A mesh network provides multiple transmission paths; with intelligent algorithms, it can manage routing to improve performance.

A

mesh network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

WLAN architecture

_______ are components that connect wirelessly to networks. They are either access points or endpoints, each identified with a unique network address.

A

Stations

17
Q

WLAN architecture

A ____ ____ ____ (____) is a group of stations that connects to the network. In ad hoc networks, the group of stations is called an Independent BSS (IBSS). A set of connected BSSs, as in a network with multiple access points, is called an Extended Service Set (ESS).

A

basic service set (BSS)

18
Q

WLAN architecture

The _____ ______ connects access points in an ESS. The connections can be wired or wireless. A wireless distribution system (WDS) can use mesh or its own WDS protocol. Fixed wireless is a specialized form of radio transmission for connecting a geographically distant access point.

A

distribution system

19
Q

WLAN architecture

The _______ ______ is the base station that serves as a hub to which other stations connect. The “access” is that of the stations to the network, but it may also mean internet access, since many routers double as internet modems. In an ESS, access points may be connected with Ethernet cables or wirelessly.

A

access point

20
Q

WLAN architecture

The ______ is used to connect a WLAN to a LAN or to an access point.

A

bridge

21
Q

WLAN architecture

The ________ is any end-user station, such as a computer, mobile device, printer, or Internet of Things (IoT) device.

A

endpoint

22
Q

________ in computer networks are used for allowing the transmission of information between two processes of the same machines or different machines in the network. The socket is the combination of IP address and software port number used for communication between multiple processes. Socket helps to recognize the address of the application to which data is to be sent using the IP address and port number.

A

sockets

23
Q

Sockets allow communication of two processes that are running on the same or different machines. ______ are the end of two-way communication between two programs that are running on the networks.

A

Sockets

24
Q

Sockets are mostly used in ____-____ architecture for communication between multiple applications.

A

client-server

25
Q

Socket programming tells us how we can use socket _____ for creating communication between local and remote processes.

A

API

26
Q

The socket is created by the combination of the IP address and _____ _____ of the software. With this combination, the process knows the system address and address of the application where data is to be sent.

A

port number

27
Q

: is used to separate ____ ____ and _____ ______.
For eg: 192.168.1.67:80, 155.2.12.23:77, etc.

A

IP address and port number

28
Q

Connection-oriented service involves connection establishment before transmitting the data and connection termination after data transmission. Connection-less service does not require any connection establishment and connection termination for transmitting the data over the network.

A

For connection-less socket programming, DatagramSocket and DatagramPacket classes are used.

For connection-oriented socket programming, Socket and ServerSocket classes are used.

29
Q

_____________ class represents a connectionless socket for transmitting datagram packets.

A

DatagramSocket

30
Q

____________ is a message transmitted between two communicating parties. DatagramPacket is just like a data container that carries data between two communicating parties. When multiple datagram packets are sent over the network they may arrive in any order irrespective of their sending order.

A

DatagramPacket

31
Q

TCP stands for Transmission Control Protocol. TCP is a reliable connection-oriented protocol of the transport layer. TCP establishes the connection before data transmission. Steps for TCP socket programming for establishing TCP socket at the client-side:

A

The first step is to create a socket and use the socket() function to create a socket.

Use the connect() function for connecting the socket to the server address.

Transmit data between two communicating parties using read() and write() functions.

After data transmission completion close the connection using close() function.

Following are steps to be followed for establishing a TCP socket on the server-side:

Use socket() for establishing a socket.

Use the bind() function for binding the socket to an address.

Then for listening client connections use listen() function.

The accept() function is used for accepting the connection of the client.

Transmit data with the help of the read() and write() function.

32
Q

UDP stands for User Datagram Protocol. UDP is a connection-less and unreliable protocol of transport layer. UDP does not establish a connection between two communicating parties before transmitting the data. Following are the steps given that are to be followed for establishing UDP socket connection on the client-side

A

Use socket() function for creating socket;

recvfrom() and sendto() functions are used for transmitting data between two communicating parties.

Steps to be followed for establishing UDP socket connection at the server-side.

Create a socket using the socket() function.

Use the bind() function for the binding socket to an address.

Transmit data with the help of the recvfrom() function and sendto().

33
Q

Socket Programming Interface Type

______ ______ the most common type of socket programming interface. The communicating parties first establish a socket connection between them, so that any data passed through the connection will arrive in the order in which it was sent by the sender because of the connection-oriented service.

A

stream socket

34
Q

Socket Programming Interface Type

_______ _______: Provides connection-less services. No connection is established before data transmission. Communicating party transmits the datagrams as required or waits for the response. Data can be lost during the transmission or may arrive out of order. Implementing a datagram provides more flexibility in comparison to using stream sockets.

A

Datagram sockets

35
Q

Socket Programming Interface Type

_____ _____: This socket interface Bypasses the library’s built-in support for standard protocols such as UDP( User Datagram Protocol) and TCP( Transmission Control Protocol). Raw sockets are socket programming interfaces that are used for custom low-level protocol development.

A

Raw sockets

36
Q

A _______ _______ is a program that runs on one or more computers simultaneously and communicates through a network

A

distributed application

37
Q
A