Parc 2 Flashcards

1
Q

Protocol layering, packet switching, routing and data streaming are the principles on which

A

Distributed Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The computers and other devices that use the network for communication purposes are referred
to as

A

Host

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

This is the delay that occurs after a send operation is executed before data starts to arrive at the
destination computer in network performance

A

Latency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

This term is used to refer to any computer or switching device attached to a network

A

Node

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

This is the speed at which data can be transferred between two computersin the network once
transmission has begun.

A

Data transfer rate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

This is a single communication subsystem providing communication between all of the hosts that
are connected to it, where the internet is constructed from many subnets.

A

Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

They carry messages at lower speeds between nodes that are often in different organizations and
may be separated by large distances.

A

Wans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The end-to-end communication must provide totally error-free, the detection of communication
errors and their correction is that we call

A

Reliability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

This is a sequence of binary data (an array of bits or bytes) of restricted length, together with
addressing information sufficient to identify the source and destination computers.

A

simplest form of packet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

This is a unit of routing (delivering data from one part of the Internet to another)

A

Subnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

This type of network is based on the high handwidth copper and fibre optic cabling recently
installed in some towns and cities for the transmission of video, voice and other data over
distances of up to 50 kilometers

A

Man’s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

This is defined as the ability to meet deadlines when transmitting and processing streams of real
time multimedia data.

A

Quality of service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

This is a communication subsystem in which several networks are linked together to provide
common data communication facilities that overlay the technologies and protocols of the
individual component networks and the methods used for their interconnection.

A

Internetwork

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

This is why many network technologies support the simultaneous transmission of messages to
several recipients.

A

Multicasting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The IEEE 802.16 WIMAX standard is targeted at this class of network. It aims to provide an
alternative to wired connections to home and office buildings

A

WMANS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

This is referred to as the transmission and display of audio and video in real time. It requires much
higher bandwidths than most other forms of

A

communication in distributed systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Message passing between a pair of processes can be supported by two message communication
operations:

A

send and receive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

In this form of communication, the use of the send operation is non- blocking, the receive
operation can have blocking and non-blocking variants.

A

asynchronous

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

We can describe this as the guaranteed to be deliver the message despite a reasonable number of
packets being dropped or lost.

A

Reliability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Both forms of communication (UDP and TCP) use Which provides an endpoint for communication
between processes

A

socket abstraction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

In this form of communication, the sending and receiving processes synchronize at every message.
In this case, both send and receive are blocking operations

A

synchronous

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Any process may make use of multiple of these elements to receive messages, but a process
cannot share them with other processes on the same computer.

A

Ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

This consist of transmitting a message between a socket in one process and a socket in another
process.

A

Interprocess communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

This is sent by UDP is transmitted from a sending process to a receive process without
acknowledgement or retries.

A

Datagram

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Messages may be dropped occasionally, either because of a checksum error or because no buffer
space is available at the source or destination, it’s called

A

Omission failures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

This defines reliable communication for channels in terms of two properties. integrity and validity

A

Failure model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

This was originated from BSD 4.x UNIX and provides the abstraction of a stream of bytes to which
data may be written and from which data may be read

A

API to the TCP protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

This assume that when a pair of processes are establishing a connection, one of them plays the
client role and another plays the server role, but thereafter they could be peers

A

API for stream communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

The TCP protocol uses an acknowledgement scheme. If the sender does not receive an
acknowledgement with a time out, it retransmits the message and this is performed when

A

Lost messages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

The TCP protocol attempts to match the speeds of the processes that read from and write to a
stream, this is called:

A

Flow contro

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

These items transmitted in messages can be data values of many different types, and not all
computers store primitive values such as integers in the same order

A

individual primitive

32
Q

This is the process of taking a collection of data items and assembling or disassembling
(respectively) into a form suitable for transmission in a message.

A

Marshalling and Unmarshalling

33
Q

They are three alternative approaches to external data representation

A

XML, CORBA’s y Java’s object serialization

34
Q

The first one was designed for defining the appearance of web pages while the second one was
designed for writing structured documents for the Web

A

HTML was designed

35
Q

They are tagged with ‘markup strings. The tags are used to describe the logical structure of the
data and to associate attribute-value pairs with logical structures

A

XML data items are tagged with ‘markup’ strings

36
Q

XML is in the sense that users can define their own tags, in contrast to HTML, which uses a fixed
set of tags

A

XML is extensible

37
Q

They are composed of a number of personal devices such as mobile phones, tablets, digital
cameras, music players and so on that are now carried by many people.

A

WPANs

38
Q

They are generally used to hold the video frames, but because the flow is continuous as opposed
to the intermittent traffic generated by typical client-server interactions and are handled
somewhat differently.

A

UDP internet packets

39
Q

In this type of network, most mobile phone networks are based on digital wireless network
technologies such as the GSM standard, which is used in most countries of the world..They are specifically designed to provide high bandwidth and low latencies and to support quality
of service by the reservation of network resources

A

WWANs

40
Q

This is a transmission technique that involves no switching, everything is transmitted to every
node, and it is up to potential receivers to notice transmissions LNFH-A subnet addressed to them.

A

ATM networks

41
Q

In this type of switching, each packet arriving at a node is first stored in memory at the node and
then processed by a program that transmits it on an outgoing circuit, which transfers the packet to
another node that is closer to its ultimate destination.

A

Packet switching

42
Q

Their operation was simple to understand, when a caller dialed a number, the pair of wires from
her phone to the local exchange was connected by an automatic switch at the exchange to the pair
of wires connected to the other party’s phone

A

Circuit switching

43
Q

This is used to refer to a well-known set of rules and formats to be used for communication
between processes in order to perform a given task

A

term protocol

44
Q

The task of dividing messages into packets before transmission and reassembling them at the
receiving computer is usually performed in the transport layer.

A

Packet assembly

45
Q

They are software-defined destination points at a host computer. They are attached to processes,
enabling data transmission to be addressed to a specific process at a destination node.

A

Ports

46
Q

This is a numeric identifier that uniquely identifies a host computer and it to be located by nodes
that are responsible for routing data to it.

A

network address

47
Q

When a pair of nodes connected to two separate networks need to communicate through another
type of network or over an alien protocol, they can do so by constructing a protocol under a
scheme of:

A

Tunne0

48
Q

This is a function that is required in all networks except those LANs, such Ethemet, that provide
direct connections between all pairs of attached hosts

A

Routing

49
Q

A unified addressing scheme between different networks that enables packets to be addressed to
any host connected to any subnet is an necessary element to build

A

internetwork

50
Q

This must lend itself to the development of a flexible and efficient routing but the addresses
themselves cannot contain very much of the information needed to route a packet to its
destination.

A

addressing scheme

51
Q

It is based upon the permanent allocation of a normal IP address to each mobile host on a subnet
in its home domain.

A

Mobile IP

52
Q

The purpose of this is to monitor and control all communication into and out o fan intranet

A

Firewall

53
Q

This is a markup language that was defined by the World Wide Web Consortium (W3C) for general
use on the Web.

A

XML

54
Q

The structure of an XML document is defined by pairs of these elements enclosed in angle
brackets.

A

HTML

55
Q

They define the name of values associate to tags in XML schemes.

A

R.- defines the elements and attributes that can appear in a document

56
Q

This is used to enable clients to communicate with web services and for defining the interfaces and
other properties of web services.

A

XML

57
Q

All of the information in XML elements must be expressed as character But the question is: how do
we represent encrypted elements or secure hashes?

A

Binary Data

58
Q

Every start tag has a matching end tag and all tags are correctly nested, these are:

A

Basic Rule

59
Q

This is a set of names for a collection of element types and attributes that is referenced by a URL.

A

XML namespace

60
Q

This defines the elements and attributes that can appear in a document. how the elements are
nested and the order and number of elements, and whether an element is empty or can include
text.

A

XML schema

61
Q

This protocol is based on a trio of communication primitives: doOperation, getRequest and
sendReplay.

A

The request-replay protocol

62
Q

This scheme involves the management of messages and requires that each message have a unique
element by which it may be referenced

A

Message Identifiers

63
Q

In this form of communication, the use of the send operation is non- blocking, the receive
operation can have blocking and non-blocking variants.

A

the asynchronous

64
Q

reasonable number of packets being dropped or lost.

A

Reliability

65
Q

Both forms of communication (UDP and TCP) use provides an endpoint for communication
between processes

A

Sockets

66
Q

In this form of communication, the sending and receiving processes synchronize at every message.
In this case, both send and receive are blocking operations

A

the synchronous

67
Q

Any process may make use of multiple of these elements to receive messages, but a process
cannot share them with other processes on the same computer.

A

computer has a large number

68
Q

This consist of transmitting a message between a socket in one process and a socket in another
process.

A

Interprocess communication

69
Q

This is sent by UDP is transmitted from a sending process to a receive process without
acknowledgement or retries.

A

Datagram

70
Q

Messages may be dropped occasionally, either because of a checksum error or because no buffer
space is available at the source or destination, it’s called

A

Omission failures

71
Q

This defines reliable communication for channels in terms of two properties. integrity and validity.
MNES) This was originated from BSD 4.x UNIX and provides the abstraction of a stream of bytes to
which data may be written and from which data may be read

A

Failure Model

72
Q

This assume that when a pair of processes are establishing a connection, one of them plays the
client role and another plays the server role, but thereafter they could be peers

A

API for stream communication

73
Q

The TCP protocol uses an acknowledgement scheme. If the sender does not receive an
acknowledgement with a time out, it retransmits the message and this is performed when

A

Lost messages

74
Q

The TCP protocol attempts to match the speeds of the processes that read from and write to a
stream, this is called:

A

Flow Control

75
Q

These items transmitted in messages can be data values of many different types, and not all
computers store primitive values such as integers in the same order.

A

Individual primitive

76
Q

This is the process of taking a collection of data items and assembling or disassembling
(respectively) into a form suitable for transmission in a message. (20) They are three alternative
approaches to external data representation.

A

Marshalling and Unmarshalling

77
Q

The first one was designed for defining the appearance of web pages while the second one was
designed for writing structured documents for the Web

A

HTML