Midterm Flashcards
Which of the following applications are naturally suitable for P2Parchitectures?
A. Distributed Computing
B. Instant Messaging
C. Video Streaming
D. None of the above
A-B-C
Consider a HTTP client wants to retrieve a Web document at a given URL. The IP address of the HTTP server is initially unknown. WhatApplication-layer and Transport-layer protocols besides HTTP are needed in this scenario?
A. UDP for DNS and TCP for HTTP
B. UDP for both DNS and HTTP
C. TCP for both DNS and HTTP
D. UDP for HTTP and TCP for DN
B
If 10 files are being transferred using FTP from server A to client Bin the same session. The number of TCP connections between A and B is:
A. 1
B. 10
C. 11
D. 2
C (1 control 10 data)
Which one of the following protocols delivers/stores mail to receiver mail server?
A. SMTP
B. POP3
C. IMAP
D. HTTP
A
In a router, queuing can occur:
A. in the input ports
B. in an interconnection network
C. in the output ports
D. all of the above
D
Telnet is a protocol for the ________ layer (i.e., one of the layers for the internet/OSI model)
Apllication
_________, refers to the per-router action of moving a packet arriving at an input port to the appropriate output port
Forwarding
________, refers to the process of determining the end-to-end path that a packet will take through the network
Routing
In a P2P system, nodes that take resources from a system without contributing in kind are called _______
Free-riders
In BitTorrent, a ________ is a server that maintains a list of all the peers that are actively downloading and uploading the file. The group of peers exchanging chunks of a file is referred to as _________
Tracker - Torrent
HTTP is a stateless protocol. However, using ______, web applications can keep stateful information about user’s activity.
Cookies
List 1 advantage and 1 disadvantage of having international standards for network protocols.
One advantage is that if everyone uses the standard, everyone can talk to everyone and people can create networking systems and products that interoperate.
A disadvantage is that once a standard has been widely adopted, it is difficult to change, even if new and better techniques or methods are dis-covered. Also, by the time it has been accepted, it may be obsolete.
List, in order, the layers of the TCP/IP stack, starting with the layer thatis part of your program implementation
Application Transport Network Link Physical
What is encapsulation and why is it important for the operation of a protocol stack?
Encapsulation is the concept of wrapping data from an upper layer’s protocol with a new header for the current layer and treating the upper layer’s data as uninterpreted. Encapsulation allows us to isolate the functionalityof a layer and change layer information without aecting the rest of theprotocol stack
Suppose the algorithms used to implement the operations at layer k is changed. How does this impact operations at layers k-1 and k+ 1?
This has no impact on the operations at layers k-1 or k+ 1.