Upgrade to remove ads
Computer Networks Final Review.
Terms in this set (44)
Cookies are ID numbers given by client computers. (T/F)
Once created, cookies sent in every packet between a client and a server. (T/F)
A proxy server is used to cut congestion in the Internet.(T/F)
A proxy server is used to speed up requests in the Internet.(T/F)
POP3 mail access protocol is used when you want to add folders to the email software to store your email and view it from other computers.(T/F)
UTRGV uses POP3 for students to read their email. (T/F)
Sockets are hardware ports where packets enter a server. (T/F)
TCP is a protocol which transfers the data packets over the network routers to the server and back.(T/F)
UDP is a protocol which transfers the data packets over the network routers to the server and back.(T/F)
The application layer uses a socket through a process to access the transport layer.(T/F)
If there is a printer in a domain not with your domain and you want to use it, what type of group would be best for you to be placed in?
If three domains, A, B, C want to share a printer in domain A, what type of group would be best for domain A to place the three domains in?
2 Hosts and 64 Subnets
You are given the IP Address of 220.127.116.11 /24 and need 50 Subnets. How many hosts per network, and total networks do you get once subnetted.
Write the IP address 18.104.22.168 subnet mask 255.255.248.0 in CIDR notation.
Http uses _____________ protocol as the transport protocol.
Network communication channel that remains open for further HTTP requests and responses rather than closing after a single exchange.Define "a persistent connection".
http is a stateless protocol
means that the connection between the browser and the server is lost once the transaction ends.
A occurs when a client wants to alert the server of an upcoming request from the client (get the server's attention).
RTT (round trip time)
is the time it takes for a packet to travel from a client to server and then back to the client.
Time required to examine the packet's header and determine where to direct it
Amount of time required to push all of the packet's bits into a link
Time required to travel from the exit port of one router to the input port of the other router
Amount of time a packet spends at a router waiting to be transmitted
Occurs when a packet is discarded at a router when the queue has no room for it
Program used to find the routers in a path for a message
A packet is called this in the application layer
A packet is called this in the transport layer
A packet is called this in the network layer
A packet is called this in the link layer
The layer at which bits are transmitted
Putting several items into one package
A virus where all computers in a network are infected by one computer
denial of service
A virus where the computers are not usable
A passive receiver that records a copy of every packet that passes by
Placing packets into the Internet with false source addresses
A process sends messages into and receives messages from the network through an interface called a ______
The rate at which the sending process can deliver bits to the receiving process is called
Used to identify the receiving socket running on the host
reliable data transfer
Guaranteed delivery of a packet
A type of protocol that offers reliable data delivery and connection-oriented service is
A type of protocol that offers minimal lightweight unreliable service is
HTTP, SMTP, email are examples of the ___________ layer
check services and discovery mode
If you cannot see both the client and server in the network part of the file explorer, you need to
The _____________________ server IP address needs to be a part of the IP address scheme of both the client and server in a domain.
YOU MIGHT ALSO LIKE...
Informatics 101 Chapter 7: TCP/IP Layers, Informat…
CIS 337 Chapter 5
CCNA 1 Chapter 3
OTHER SETS BY THIS CREATOR
The Periodic Table of the Elements
Programming Languages Review
OTHER QUIZLET SETS
Lesson 4 Study Guide
ITC Chap 5
ITC Chap 13