exam2 Flashcards

1
Q

Protocol layering, packet switching, routing and data
streaming are the principles on which:

A

Computer Networks are based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The computers and other devices that use the network for
communication proposes are referred to as:

A

Hosts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

This is the delay that occurs after a send operation is
executed before data starts to arrive at the destination
computer in network performance

A

Latency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

This term is used to refer to any computer or switching
device attached to a network

A

Node

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

This is the speed at which data can be transferred between
two computers in the network once transmission has begun.

A

Data transfer rate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

This is a single communication subsystem providing
communication between all of the hosts that are connected
to it, where the internet is constructed form many subnets.

A

The Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

They carry messages at lower speeds between nodes that
are often in different organizations and may be separated by
large distances

A

Wide Area Networks (WAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

he end-to-end communication must provide totally errorfree; the detection of communication errors and their
correction is what we call:

A

Reliability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

This is a sequence of binary data (an array of bits or bytes) of
restricted length, together with addressing information
sufficient to identify the source and destination of
computers

A

The simples form of packet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

This is a unit of routing (delivering data from one part of the
internet to another)

A

Subnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

This is a type of network is based on the high bandwidth
copper and fiber optic cabling recently installed in some
towns and cities for the transmission of video, voice and
other data over distances up to 50 kilometers.

A

Metropolitan Area Networks
(MANs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

This is defined as the ability to meet deadlines when
transmitting and processing streams of real-time multimedia
data.

A

Quality of service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

This is a communication subsystem in which several
networks are linked together to provide common data
communication facilities that overlay the technologies and
protocols of the individual component networks and the
methods used for the interconnection.

A

Internetworks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

This is why many network technologies support the
simultaneous transmission of messages to several recipients.

A

Multicasting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The IEEE 802.16 WiMAX standard is targeted at this class of
network. It aims to provide an alternative to wired
connections to home and office buildings.

A

Wireless Metropolitan Area
Networks (WMANs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

This is referred to as the transmission and display of audio
and video in real time. It requires much higher bandwidths than most other forms of communication in distributed
systems

A

Streaming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

They are composed of a number of personal devices such as
mobile phones, tablets, digital cameras, music players and so
on that are now carried by many people.

A

Wireless personal area networks
(WPANs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

They are generally used to hold the video frames, but
because the flow is continuous as opposed to the
intermittent traffic generated by typical client-server
interactions and are handled somewhat differently

A

UDP internet packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

In this type of network, most mobile phone networks are
based on digital wireless network technologies such as the
GSM standard, which is used in most countries of the world

A

Wireless wide area networks
(WWANs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

They are specifically designed to provide high bandwidth and
low latencies and to support quality of service by the
reservation of network resources

A

ATM Networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

This is a transmission technique that involves no switching,
everything is transmitted to every node, and it is up to
potential receivers to notice transmissions addressed to
them

A

Broadcastin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

In this type of switching, each packet arriving at a node is
first stored in memory at the node and then processed by a
program that transmit it on outgoing circuit, which transfers
the packet to another node that is closer to its ultimate
destination.

A

Packet switching

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Their operation was simple to understand, when a caller
dialed a number, the pair of wires from her phone to the
local exchange was connected by an automatic switch at the
exchange to the pir of wires connected to the other party´s
phone.

A

Circuit switching

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

This is used to refer to a well-know set of rules and formats
to be used for communication between processes in order to
perform a given task

A

The term protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

The task of dividing messages into packets before
transmission and reassembling them at the receiving
computer is usually performed in the transport layer

A

Packet assembly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

They are software-defined destinations points at a host
computer. They are attached to a processes, enabling data
transmission to be addressed to a specific process at a
destination node.

A

Ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

This is a numeric identifier that uniquely identifies a host
computer and enables it to be located by nodes that are
responsible for routing data to it.

A

A network address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

When a pair of nodes connected to two separate networks
need to communicate through another type of network or
over an alien protocol, they can do so by constructing a
protocol under a scheme of

A

Tunneling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

This is a function that is required in all networks except
those LANs, such as the Ethernet, that provide direct
connections between all pairs of attached hosts.

A

Routing

30
Q

A unified addressing scheme between different networks
that enables packets to be addressed to any host connected
to any subnet is a necessary element to build:

A

Internetwork

31
Q

This must lend itself to the development of a flexible and
efficient routing scheme, but the addresses themselves
cannot contain very much of the information needed to
route a packet to its destination.

A

Addressing scheme

32
Q

It is a based upon the permanent allocation of a normal IP
address to each mobile host on a subnet in its home domain.

A

Mobile IP

33
Q

The purpose of this is to monitor and control all communication into and out of a intranet.

A

A Firewall

34
Q

Message passing between a pair of processes can be
supported by two message communication operations

A

Send and receive operations

35
Q

In this form of communication, the use of the send
operation is non-blocking, receive operation can have
blocking and non-blocking variants

A

The asynchronous form of
communication

36
Q

We can describe this as the guaranteed to deliver the
message despite a reasonable number of packets being
dropped or lost

A

Reliability

37
Q

Both forms of communication (UDP and TCP) use ______,
which provides an endpoint for communication between
processes

A

The socket abstaction

38
Q

In this form of communication, the sending and receiving
processes synchronize at every message. In this case, both
send and receive are blocking operations

A

The synchronous communication

39
Q

Any process may make use of multiple of these elements to
receive messages, but a process cannot share them with
other processes on the same computer.

A

Ports

40
Q

The internet protocols, and the local port pairs define the:

A

Message destination

41
Q

This consist of transmitting a message between a socket in
one process and a socket in another process

A

Interprocess communication

42
Q

This is sent by UDP is transmitted from a sending process to
a receive process without acknowledgment or retries

A

A datagram

43
Q

Messages may be dropped occasionally, either because of a
checksum error or because no buffer space is available at
the source or destination, it’s called:

A

Omission failures

44
Q

This defines reliable communication for channels in terms of
two properties: integrity and validity

A

Failure Model

45
Q

This was originated from BSD 4.x UNIX and provides the
abstraction of a stream of bytes to which data may be
written and from which data may be read

A

The API to the TCP Protocol

46
Q

This assume that when a pair of processes are establishing a
connection, one of them plays the client role and another
plays the server role, but thereafter they could be peers

A

The API for stream
communication

47
Q

The TCP protocol attempts to match the speeds of the
processes that read from and write to a stream, this is
called:

A

Flow control

48
Q

The TCP protocol uses an acknowledgement scheme. If the
sender does not receive an acknowledgement with a time
out, it retransmit the message and this performed when:

A

Lost messages

49
Q

These items transmitted in messages can be data values of
many different types and not all computers store primitive
values such as integers in the same order

A

The individual primitive data

50
Q

This is the process of taking a collection of data items and
assembling or disassembling (respectively) into a form
suitable for transmission in a message.

A

Marshalling and Unmarshalling

51
Q

They are three alternative approaches to external data
representation

A

XML, CORBA and Java´s object
serialization

52
Q

The first one was designed for defining the appearance of
web pages while the second one was designed for writing
structured documents for the web.

A

HTML and XML

53
Q

They are tagged with ‘markup’ strings. The tags are used to
describe the logical structure of the data and to associate
attribute-value pairs with logical structures.

A

XML data items

54
Q

XML is _____ in the sense that users can define their own
tags, in contrast to HTML, which uses a fixed set of tags

A

Extensible

55
Q

This is a markup language that was defined by the World
Wide Web Consortium (W3C) for general use on the web

A

XML

56
Q

The structure of an XML document is defined by pairs of
these elements enclosed in angle brackets

A

Tags

57
Q

They define the name of values associate to tags in XML
schemes

A

XML Attributes

58
Q

This is used to enable clients to communicate with web
services and for defining the interfaces and other properties
of web services

A

XML Service

59
Q

All the information in XML elements must be expressed as
character data.
But the question is: how do we represent encrypted
elements or secures hashes?

A

Binary data

60
Q

Every start tag has matched end tag and all tags are correctly
nested, these are

A

Basic rules of XML

61
Q

Every XML document must have this as its first line and must
at least specify the version of XML in use (chich is currently
1.0)

A

Prolog

62
Q

This is a set of names for a collection of element types and
attributes that is referenced by a URL

A

XML Namespace

63
Q

This defines the elements and attributes that can appear in a
document, how the elements are nested and the order and number of elements, and whether an element is empty or
can include text

A

XML Schema

64
Q

This protocol is based on a trio of communication primitives:
doOperation, getRequested and sendReplay

A

The request-reply protocol

65
Q

This scheme involves the management of messages and
requires that each message have a unique element by which
it may be referenced

A

Messages identifiers

66
Q

As its name indicates. It is a mechanism to call a procedure
or a function available on a remote computer

A

RPC

67
Q

This uses the HTTP protocol to pass information from a
client computer to a server computer and uses a small XML
vocabulary to describe the nature of requests and responses

A

XML RPC Structure

68
Q

This specifies a procedure name and parameters in the XML
request, and the server returns either a fault or a response
in the XML response

A

XML RPC parameters

69
Q

Data model, request structures and response structures are
parts of

A

XML RPC

70
Q

Ther are a simple list of types and content – structs and
arrays are the most complex types available

A

The individual primitive data