Chapter 1 - Introduction to Computer Networks
Which statement is true? 1. Protocols define the rules and formats a computer must use when sending information to itself. 2. Wide Area Networks (WANs) interconnect LANs in a specific geographic region, such as a county of city. 3. A frame is a packet with the source and destination MAC addresses added to it. 4. The Internet can be described as a worldwide private network.
A frame is a packet with the source and destination MAC addresses added to it.
The following statements are correct about multicore CPUs except: A multicore CPU is like a person with a brain Multicore CPUs enable computers to carry out multiple instructions simultaneously Results in better overall performance Multicore CPUs enable computers to carry out multiple instructions
A multicore CPU is like a person with a brain
A ________________ is the computer or network software that requests network data and a ____________ is the computer or network software that makes the network data available to requesting clients
Client; server
In network communication, the ______________ address is used to deliver a frame to the correct computer on the network while a ______________ message is used to determine whether a computer is listening on the network.
MAC, ping
Which definition is incorrect about Protocol Data Unit (PDU) names at different layers in the TCP/IP suite: Segment - Transport Layer PDU Packet - Application Layer PDU Frame - Network Access Layer PDU Bits - A PDU used when physically transmitting data over the medium
Packet - Application Layer PDU
00-1E-37-D0-E9-36
Physical/ MAC address
In this screen shot of the command prompt, the red rectangle is covering the word/phrase: (The parenthesis on IPv4 address)
Preferred
Step 1 of Network communication Step 2 of Network communication Step 3 of Network communication Step 4 of Network communication
1. An application requests to access a network. 2. Network client software recognizes the request and forwards it to the appropriate network protocol. 3. The network protocol packages the message into a format appropriate for navigating the network and then forwards it to the NIC driver 4. The NIC driver sends the packaged message to the NIC card which physically sends the data to the network
18000 bytes is equivalent to:
144000 bits
Choose the correct order for the process of a user attempting to access network resources: 1. Network protocol 2. Application 3. Network client 4. NIC driver
2,3,1,4
When you run the ipconfig /all command in the command prompt, a physical address is one of the lines of information included - similar to which of the following: TTL=53 192.168.107.169 90-B1-1C-9E-8D-55 FE80:CD00:0:CDE:1257:0:211E:729C
90-B1-1C-9E-8D-55
Interconnecting Device
Allows two or more computers to communicate on the network without having to be connected directly to one another.
- Perform a POST - Begin the boot procedure. These tasks are usually performed by the:
BIOS
Which statement is false? 1. A device driver may be installed to allow the OS to communicate with the new NIC 2. Basic computer functions include Processing, Internet access, Input, Output and E-mail 3. The Network client requests information stored on another computer 4. The CPU executes instructions provided by computer programs
Basic computer functions include Processing, Internet access, Input, Output and E-mail
One of the following is not a layer of the network communication process: user application network software device driver network protocol
Device Driver
A __________________ is a collection of users and computers whose accounts are managed by Windows servers.
Domain
All the following are required to turn a standalone computer into a networked computer except: IP Address Network interface card Interconnecting device Network medium
IP address
A device interconnects five computers and a printer in a single office so that users can share the printer. This configuration is an example of which of the following?
LAN
The four terms used to describe networks of different scope are:
LAN, Internetwork, WAN, and MAN
When you run the ipconfig /all command in the command prompt, a section/category is named Ethernet adapter Ethernet. One of the following is not included in this section/category:
Lease Enabled
The _____________________ is the lowest layer of the TCP/IP protocol hierarchy. The protocols in this layer provide the means for the system to deliver data to the other devices on a directly attached network.
Network Access Layer
What is the second and third layer?
Network software; Network protocol
When data has to be transmitted, it is broken down into similar structures of data before transmission, called ______________________, which are reassembled to the original data chunk once they reach their destination.
Packets
TCP is a reliable, connection-oriented, byte-stream protocol. Let's look at each of these characteristics in more detail. TCP provides reliability with a mechanism called _______________________
Positive Acknowledgment with Re-transmission (PAR)
A complete communication process includes these steps
Segmentation and encapsulation of data as it passes down the protocol stack in the source end device Transportation of the data through the internetwork, which consists of media and any intermediary devices Generation of the data onto the media at the network access layer of the stack
A computer becomes a ______________ when software is installed on it that provides a network service to ______________ computers
Server; client
Two main categories of storage:
Short-term storage and Long-term storage
Which of the following were associated limitations of early networks that used a daisy-chain method of connecting computers?
Total number of computers that could be connected; Cable length
___________ use the services of third-party communication providers to carry network traffic from one location to another
WANS
TCP is ___________________. It establishes a logical end-to-end connection between the two communicating hosts. Control information, called a ________________, is exchanged between the two endpoints to establish a dialogue before data is transmitted.
connection-oriented; handshake
As a packet travels through the TCP/IP protocol stack, the protocols at each layer either add or remove fields from the basic header. When a protocol on the sending system adds data to the packet header, the process is called ___________________
data encapsulation
When one user requires data from another user or a server over a network, the user most probably first ____________________________________________
goes through an application that creates a message which attempts to access the user's network
The information in this screen shot was generated using which command:
ipconfig
The information in this screen shot was generated using which command:
ping