Examen Flashcards

1
Q

Protocol layering, packet switching, routing and data streaming are the principles on which:

A

Computer Networks are based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The computers and other devices that use the network for communication proposes are referred to as:

A

Hosts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

This is the delay that occurs after a send operation is executed before data starts to arrive at the destination computer in network performance

A

Latency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

This term is used to refer to any computer or switching device attached to a network

A

Node

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

This is the speed at which data can be transferred between two computers in the network once transmission has begun.

A

Data transfer rate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

This is a single communication subsystem providing communication between all of the hosts that are connected to it, where the internet is constructed form many subnets.

A

The Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

They carry messages at lower speeds between nodes that
are often in different organizations and may be separated by
large distances.

A

Wide Area Networks (WAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The end-to-end communication must provide totally errorfree; the detection of communication errors and their
correction is what we call:

A

Reliability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

This is a sequence of binary data (an array of bits or bytes) of restricted length, together with addressing information
sufficient to identify the source and destination of computers

A

The simples form of packet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

This is a unit of routing (delivering data from one part of the internet to another)

A

Subnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

This is a type of network is based on the high bandwidth copper and fiber optic cabling recently installed in some
towns and cities for the transmission of video, voice and other data over distances up to 50 kilometers.

A

Metropolitan Area Networks (MANs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

This is defined as the ability to meet deadlines when transmitting and processing streams of real-time multimedia
data

A

Quality of service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

This is a communication subsystem in which several networks are linked together to provide common data communication facilities that overlay the technologies and
protocols of the individual component networks and the methods used for the interconnection.

A

Internetworks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

This is why many network technologies support the simultaneous transmission of messages to several recipients

A

Multicasting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The IEEE 802.16 WiMAX standard is targeted at this class of network. It aims to provide an alternative to wired connections to home and office buildings

A

Wireless Metropolitan Area Networks (WMANs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

This is referred to as the transmission and display of audio and video in real time. It requires much higher bandwidths than most other forms of communication in distributed systems

A

Streaming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

They are composed of a number of personal devices such as mobile phones, tablets, digital cameras, music players and so on that are now carried by many people.

A

Wireless personal area networks
(WPANs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

They are generally used to hold the video frames, but because the flow is continuous as opposed to the intermittent traffic generated by typical client-server interactions and are handled somewhat differently

A

UDP internet packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

In this type of network, most mobile phone networks are based on digital wireless network technologies such as the GSM standard, which is used in most countries of the world

A

Wireless wide area networks (WWANs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

They are specifically designed to provide high bandwidth and low latencies and to support quality of service by the reservation of network resources.

A

ATM Networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

This is a transmission technique that involves no switching, everything is transmitted to every node, and it is up to
potential receivers to notice transmissions addressed to them.

A

Broadcasting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

In this type of switching, each packet arriving at a node is first stored in memory at the node and then processed by a
program that transmit it on outgoing circuit, which transfers the packet to another node that is closer to its ultimate
destination.

A

Packet switching

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Their operation was simple to understand, when a caller dialed a number, the pair of wires from her phone to the local exchange was connected by an automatic switch at the exchange to the pir of wires connected to the other party´s
phone.

A

Circuit switching

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

This is used to refer to a well-know set of rules and formats to be used for communication between processes in order to perform a given task

A

The term protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

The task of dividing messages into packets before transmission and reassembling them at the receiving computer is usually performed in the transport layer.

A

Packet assembly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

They are software-defined destinations points at a host computer. They are attached to a processes, enabling data
transmission to be addressed to a specific process at a destination node.

A

Ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

This is a numeric identifier that uniquely identifies a host
computer and enables it to be located by nodes that are
responsible for routing data to it.

A

A network address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

When a pair of nodes connected to two separate networks
need to communicate through another type of network or
over an alien protocol, they can do so by constructing a
protocol under a scheme of:

A

Tunneling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

This is a function that is required in all networks except
those LANs, such as the Ethernet, that provide direct
connections between all pairs of attached hosts.

A

Routing

30
Q

A unified addressing scheme between different networks
that enables packets to be addressed to any host connected
to any subnet is a necessary element to build:

A

Internetwork

31
Q

This must lend itself to the development of a flexible and
efficient routing scheme, but the addresses themselves
cannot contain very much of the information needed to
route a packet to its destination.

A

Addressing scheme

32
Q

The determination of routes for the transmission of packets to their destinations is the responsibility of
this procedure, which has two parts:

A

a routing algorithm

33
Q

It is a based upon the permanent allocation of a normal IP
address to each mobile host on a subnet in its home domain.

A

Mobile IP

34
Q

The purpose of this is to monitor and control all communication into and out of a intranet.

A

A Firewall

35
Q

Message passing between a pair of processes can be
supported by two message communication operations

A

Send and receive operations

36
Q

In this form of communication, the use of the send
operation is non-blocking, receive operation can have
blocking and non-blocking variants

A

The asynchronous form of
communication

37
Q

We can describe this as the guaranteed to deliver the
message despite a reasonable number of packets being
dropped or lost

A

Reliability

38
Q

Both forms of communication (UDP and TCP) use ______,
which provides an endpoint for communication between
processes

A

The socket abstaction

39
Q

In this form of communication, the sending and receiving
processes synchronize at every message. In this case, both
send and receive are blocking operations

A

The synchronous communication

40
Q

Any process may make use of multiple of these elements to
receive messages, but a process cannot share them with
other processes on the same computer.

A

Ports

41
Q

The internet protocols, and the local port pairs define the:

A

Message destination

42
Q

This consist of transmitting a message between a socket in
one process and a socket in another process

A

Interprocess communication

43
Q

This is sent by UDP is transmitted from a sending process to
a receive process without acknowledgment or retries

A

A datagram

44
Q

Messages may be dropped occasionally, either because of a
checksum error or because no buffer space is available at
the source or destination, it’s called:

A

Omission failures

45
Q

This defines reliable communication for channels in terms of
two properties: integrity and validity

A

Failure Mode

46
Q

This was originated from BSD 4.x UNIX and provides the
abstraction of a stream of bytes to which data may be
written and from which data may be read

A

The API to the TCP Protocol

47
Q

This assume that when a pair of processes are establishing a
connection, one of them plays the client role and another
plays the server role, but thereafter they could be peers

A

The API for stream
communication

48
Q

The TCP protocol uses an acknowledgement scheme. If the
sender does not receive an acknowledgement with a time
out, it retransmit the message and this performed when:

A

Lost messages

49
Q

The TCP protocol attempts to match the speeds of the
processes that read from and write to a stream, this is
called:

A

Flow control

50
Q

These items transmitted in messages can be data values of
many different types and not all computers store primitive
values such as integers in the same order.

A

The individual primitive data

51
Q

This is the process of taking a collection of data items and
assembling or disassembling (respectively) into a form
suitable for transmission in a message.

A

Marshalling and Unmarshalling

52
Q

They are three alternative approaches to external data
representation

A

XML, CORBA and Java´s object
serialization

53
Q

The first one was designed for defining the appearance of
web pages while the second one was designed for writing
structured documents for the web

A

HTML and XML

54
Q

They are tagged with ‘markup’ strings. The tags are used to
describe the logical structure of the data and to associate
attribute-value pairs with logical structures.

A

XML data items

55
Q

XML is _____ in the sense that users can define their own
tags, in contrast to HTML, which uses a fixed set of tags

A

Extensible

56
Q

This is a markup language that was defined by the World
Wide Web Consortium (W3C) for general use on the web

A

XML

57
Q

The structure of an XML document is defined by pairs of
these elements enclosed in angle brackets

A

Tags

58
Q

They define the name of values associate to tags in XML schemes

A

XML Attributes

59
Q

This is used to enable clients to communicate with web
services and for defining the interfaces and other properties
of web services

A

XML Service

60
Q

All the information in XML elements must be expressed as character data.
But the question is: how do we represent encrypted elements or secures hashes?

A

Binary data

61
Q

Every start tag has matched end tag and all tags are correctly
nested, these are

A

Basic rules of XML

62
Q

Every XML document must have this as its first line and must
at least specify the version of XML in use (chich is currently
1.0)

A

Prolog

63
Q

This is a set of names for a collection of element types and
attributes that is referenced by a URL

A

XML Namespace

64
Q

This defines the elements and attributes that can appear in a document, how the elements are nested and the order and number of elements, and whether an element is empty or can include text

A

XML Schema

65
Q

This protocol is based on a trio of communication primitives:
doOperation, getRequested and sendReplay

A

The request-reply protocol

66
Q

This scheme involves the management of messages and requires that each message have a unique element by which it may be referenced

A

Messages identifiers

67
Q

As its name indicates. It is a mechanism to call a procedure or a function available on a remote computer

A

RPC

68
Q

This uses the HTTP protocol to pass information from a
client computer to a server computer and uses a small XML
vocabulary to describe the nature of requests and responses

A

XML RPC

69
Q

This specifies a procedure name and parameters in the XML
request, and the server returns either a fault or a response
in the XML response

A

XML-RPC client

70
Q

Data model, request structures and response structures are
parts of

A

XML RPC Structure

71
Q

Ther are a simple list of types and content – structs and
arrays are the most complex types available

A

XML RPC parameters