exam2 Flashcards

1
Q

Protocol layering, packet switching, routing and data
streaming are the principles on which:

A

Computer Networks are based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The computers and other devices that use the network for
communication proposes are referred to as:

A

Hosts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

This is the delay that occurs after a send operation is
executed before data starts to arrive at the destination
computer in network performance

A

Latency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

This term is used to refer to any computer or switching
device attached to a network

A

Node

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

This is the speed at which data can be transferred between
two computers in the network once transmission has begun.

A

Data transfer rate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

This is a single communication subsystem providing
communication between all of the hosts that are connected
to it, where the internet is constructed form many subnets.

A

The Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

They carry messages at lower speeds between nodes that
are often in different organizations and may be separated by
large distances

A

Wide Area Networks (WAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

he end-to-end communication must provide totally errorfree; the detection of communication errors and their
correction is what we call:

A

Reliability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

This is a sequence of binary data (an array of bits or bytes) of
restricted length, together with addressing information
sufficient to identify the source and destination of
computers

A

The simples form of packet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

This is a unit of routing (delivering data from one part of the
internet to another)

A

Subnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

This is a type of network is based on the high bandwidth
copper and fiber optic cabling recently installed in some
towns and cities for the transmission of video, voice and
other data over distances up to 50 kilometers.

A

Metropolitan Area Networks
(MANs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

This is defined as the ability to meet deadlines when
transmitting and processing streams of real-time multimedia
data.

A

Quality of service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

This is a communication subsystem in which several
networks are linked together to provide common data
communication facilities that overlay the technologies and
protocols of the individual component networks and the
methods used for the interconnection.

A

Internetworks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

This is why many network technologies support the
simultaneous transmission of messages to several recipients.

A

Multicasting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The IEEE 802.16 WiMAX standard is targeted at this class of
network. It aims to provide an alternative to wired
connections to home and office buildings.

A

Wireless Metropolitan Area
Networks (WMANs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

This is referred to as the transmission and display of audio
and video in real time. It requires much higher bandwidths than most other forms of communication in distributed
systems

A

Streaming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

They are composed of a number of personal devices such as
mobile phones, tablets, digital cameras, music players and so
on that are now carried by many people.

A

Wireless personal area networks
(WPANs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

They are generally used to hold the video frames, but
because the flow is continuous as opposed to the
intermittent traffic generated by typical client-server
interactions and are handled somewhat differently

A

UDP internet packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

In this type of network, most mobile phone networks are
based on digital wireless network technologies such as the
GSM standard, which is used in most countries of the world

A

Wireless wide area networks
(WWANs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

They are specifically designed to provide high bandwidth and
low latencies and to support quality of service by the
reservation of network resources

A

ATM Networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

This is a transmission technique that involves no switching,
everything is transmitted to every node, and it is up to
potential receivers to notice transmissions addressed to
them

A

Broadcastin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

In this type of switching, each packet arriving at a node is
first stored in memory at the node and then processed by a
program that transmit it on outgoing circuit, which transfers
the packet to another node that is closer to its ultimate
destination.

A

Packet switching

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Their operation was simple to understand, when a caller
dialed a number, the pair of wires from her phone to the
local exchange was connected by an automatic switch at the
exchange to the pir of wires connected to the other party´s
phone.

A

Circuit switching

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

This is used to refer to a well-know set of rules and formats
to be used for communication between processes in order to
perform a given task

A

The term protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
The task of dividing messages into packets before transmission and reassembling them at the receiving computer is usually performed in the transport layer
Packet assembly
26
They are software-defined destinations points at a host computer. They are attached to a processes, enabling data transmission to be addressed to a specific process at a destination node.
Ports
27
This is a numeric identifier that uniquely identifies a host computer and enables it to be located by nodes that are responsible for routing data to it.
A network address
28
When a pair of nodes connected to two separate networks need to communicate through another type of network or over an alien protocol, they can do so by constructing a protocol under a scheme of
Tunneling
29
This is a function that is required in all networks except those LANs, such as the Ethernet, that provide direct connections between all pairs of attached hosts.
Routing
30
A unified addressing scheme between different networks that enables packets to be addressed to any host connected to any subnet is a necessary element to build:
Internetwork
31
This must lend itself to the development of a flexible and efficient routing scheme, but the addresses themselves cannot contain very much of the information needed to route a packet to its destination.
Addressing scheme
32
It is a based upon the permanent allocation of a normal IP address to each mobile host on a subnet in its home domain.
Mobile IP
33
The purpose of this is to monitor and control all communication into and out of a intranet.
A Firewall
34
Message passing between a pair of processes can be supported by two message communication operations
Send and receive operations
35
In this form of communication, the use of the send operation is non-blocking, receive operation can have blocking and non-blocking variants
The asynchronous form of communication
36
We can describe this as the guaranteed to deliver the message despite a reasonable number of packets being dropped or lost
Reliability
37
Both forms of communication (UDP and TCP) use ______, which provides an endpoint for communication between processes
The socket abstaction
38
In this form of communication, the sending and receiving processes synchronize at every message. In this case, both send and receive are blocking operations
The synchronous communication
39
Any process may make use of multiple of these elements to receive messages, but a process cannot share them with other processes on the same computer.
Ports
40
The internet protocols, and the local port pairs define the:
Message destination
41
This consist of transmitting a message between a socket in one process and a socket in another process
Interprocess communication
42
This is sent by UDP is transmitted from a sending process to a receive process without acknowledgment or retries
A datagram
43
Messages may be dropped occasionally, either because of a checksum error or because no buffer space is available at the source or destination, it’s called:
Omission failures
44
This defines reliable communication for channels in terms of two properties: integrity and validity
Failure Model
45
This was originated from BSD 4.x UNIX and provides the abstraction of a stream of bytes to which data may be written and from which data may be read
The API to the TCP Protocol
46
This assume that when a pair of processes are establishing a connection, one of them plays the client role and another plays the server role, but thereafter they could be peers
The API for stream communication
47
The TCP protocol attempts to match the speeds of the processes that read from and write to a stream, this is called:
Flow control
48
The TCP protocol uses an acknowledgement scheme. If the sender does not receive an acknowledgement with a time out, it retransmit the message and this performed when:
Lost messages
49
These items transmitted in messages can be data values of many different types and not all computers store primitive values such as integers in the same order
The individual primitive data
50
This is the process of taking a collection of data items and assembling or disassembling (respectively) into a form suitable for transmission in a message.
Marshalling and Unmarshalling
51
They are three alternative approaches to external data representation
XML, CORBA and Java´s object serialization
52
The first one was designed for defining the appearance of web pages while the second one was designed for writing structured documents for the web.
HTML and XML
53
They are tagged with ‘markup’ strings. The tags are used to describe the logical structure of the data and to associate attribute-value pairs with logical structures.
XML data items
54
XML is _____ in the sense that users can define their own tags, in contrast to HTML, which uses a fixed set of tags
Extensible
55
This is a markup language that was defined by the World Wide Web Consortium (W3C) for general use on the web
XML
56
The structure of an XML document is defined by pairs of these elements enclosed in angle brackets
Tags
57
They define the name of values associate to tags in XML schemes
XML Attributes
58
This is used to enable clients to communicate with web services and for defining the interfaces and other properties of web services
XML Service
59
All the information in XML elements must be expressed as character data. But the question is: how do we represent encrypted elements or secures hashes?
Binary data
60
Every start tag has matched end tag and all tags are correctly nested, these are
Basic rules of XML
61
Every XML document must have this as its first line and must at least specify the version of XML in use (chich is currently 1.0)
Prolog
62
This is a set of names for a collection of element types and attributes that is referenced by a URL
XML Namespace
63
This defines the elements and attributes that can appear in a document, how the elements are nested and the order and number of elements, and whether an element is empty or can include text
XML Schema
64
This protocol is based on a trio of communication primitives: doOperation, getRequested and sendReplay
The request-reply protocol
65
This scheme involves the management of messages and requires that each message have a unique element by which it may be referenced
Messages identifiers
66
As its name indicates. It is a mechanism to call a procedure or a function available on a remote computer
RPC
67
This uses the HTTP protocol to pass information from a client computer to a server computer and uses a small XML vocabulary to describe the nature of requests and responses
XML RPC Structure
68
This specifies a procedure name and parameters in the XML request, and the server returns either a fault or a response in the XML response
XML RPC parameters
69
Data model, request structures and response structures are parts of
XML RPC
70
Ther are a simple list of types and content – structs and arrays are the most complex types available
The individual primitive data