Deck 17: Network Protocols

Full screen (f)
exit full mode
Question
The driving force behind the development of IPv6 was the need for more addresses.
Use Space or
up arrow
down arrow
to flip the card.
Question
The distributed operating system does not rely on a communications architecture for basic communications functions.
Question
Installations using TCP/IP are not expected to migrate from the current IP to IPv6 because the process would take too long to do.
Question
The communications software above the network access layer needs to be concerned about the specifics of the network to be used.
Question
TCP does not provide a reliable connection for the transfer of data between applications.
Question
The _________ provides support for distributed applications such as electronic mail, file transfer, and remote terminal access.

A) distributed operating system
B) user datagram protocol
C) network operating system
D) communications architecture
Question
The leading edge of research and development for distributed systems is in the area of distributed operating systems.
Question
The network access layer is concerned with access to and routing data across a network for two end systems attached to the same network.
Question
__________ accommodates both text and binary files, and is used to send files from one system to another using features that provide controlled access.

A) TELNET
B) SSH
C) FTP
D) SMTP
Question
The logic for actually dealing with the network is put into a separate network access module.
Question
A protocol is used for communication between entities in different systems.
Question
The Header Checksum field is used to detect errors in the header to avoid misdelivery.
Question
Stream sockets make use of UDP, which provides a connection-oriented reliable data transfer.
Question
In the __________ configuration the server machines provide network wide services or applications, such as file storage and printer management.

A) network operating system
B) communications architecture
C) distributed operating system
D) application programming interface
Question
__________ provides a number of functional enhancements designed to accommodate the higher speeds of today's networks and mix of data streams that are becoming more prevalent.

A) IPv6
B) IP
C) UDP
D) SMTP
Question
A _________ looks to its users like an ordinary centralized operating system but provides the user with transparent access to the resources of a number of machines.

A) user datagram protocol
B) datagram socket
C) distributed operating system
D) protocol architecture
Question
Each host on a network must have a unique global internet address.
Question
Linux supports a variety of networking architectures, in particular TCP/IP, by means of Berkeley Sockets.
Question
TELNET makes use of sockets.
Question
UDP guarantees delivery, preservation of sequence, or protection against duplication.
Question
A _________ is a common operating system shared by a network of computers.
Question
The _________ covers the physical interface between a data transmission device and a transmission medium or network.

A) network access layer
B) transport layer
C) physical layer
D) application layer
Question
IPv6 includes _________ source and destination address fields.

A) 32-bit
B) 256-bit
C) 64-bit
D) 128-bit
Question
The _________ is concerned with the exchange of data between an end system and the network to which it is attached.

A) Internet layer
B) transport layer
C) host-to-host layer
D) network access layer
Question
When two or more computers are interconnected via a communication network, the set of computer stations is referred to as a _________ .
Question
The __________ contains the logic needed to support the various user applications.

A) physical layer
B) network access layer
C) transport layer
D) application layer
Question
With __________ delivery is not guaranteed, nor is order necessarily preserved.

A) interface sockets
B) raw sockets
C) datagram sockets
D) stream sockets
Question
The exchange of information between computers for the purpose of cooperative action is generally referred to as __________ .

A) computer network
B) computer communications
C) socket networking
D) program interfacing
Question
The most widely used communications architecture the _________ protocol suite.
Question
The key elements of a protocol are: syntax, timing and _________ .
Question
Each application within a host must have an address, known as a __________ , that is unique within the host that allows the host-to-host protocol to deliver data to the proper process.

A) port
B) socket
C) segment
D) datagram
Question
The _________ provides a basic electronic mail facility.

A) API
B) SMTP
C) UDP
D) FTP
Question
The __________ is concerned with assuring that the two computer systems are active and ready for data transfer, and for keeping track of the data that are being exchanged to assure delivery.
Question
The __________ contains all the logic that is unique to the file transfer application, such as transmitting passwords, file commands, and file records.

A) communications service module
B) network access module
C) file transfer module
D) application programming interface
Question
__________ is implemented in all end systems and routers, and acts as a relay to move a block of data from one host, through one or more routers, to another host.
Question
A __________ is a processor that connects two networks, and whose primary function is to relay data from one network to the other on a route from the source to the destination end system.
Question
A __________ is a set of rules governing the exchange of data between two entities.
Question
The _________ is used at the internet layer to provide the routing function across multiple networks.

A) protocol architecture
B) Internet Protocol
C) transmission control protocol
D) UDP
Question
The structured set of modules that implements the communications function is referred to as a __________ .
Question
The __________ is a configuration in which there is a network of application machines, usually single-user workstations and one or more "server" machines.
Question
___________ is implemented only in the end systems and keeps track of the blocks of data being transferred to assure that all are delivered reliably to the appropriate application.
Question
The Berkeley Sockets Interface is the de facto standard __________ interface for developing networking applications, spanning a wide range of operating systems.
Question
_________ encrypts all traffic in both directions, provides a secure remote logon capability which enables a user at a terminal or personal computer to log on to a remote computer and function as if directly connected to that computer, and supports file transfer between the local host and a remote server.
Question
The concept of _________ was developed in the 1980s in the UNIX environment and enables communication between a client and server process and may be either connection oriented or connectionless.
Question
The TCP/IP protocol architecture contains _________ layers.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/45
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 17: Network Protocols
1
The driving force behind the development of IPv6 was the need for more addresses.
True
2
The distributed operating system does not rely on a communications architecture for basic communications functions.
False
3
Installations using TCP/IP are not expected to migrate from the current IP to IPv6 because the process would take too long to do.
False
4
The communications software above the network access layer needs to be concerned about the specifics of the network to be used.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
5
TCP does not provide a reliable connection for the transfer of data between applications.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
6
The _________ provides support for distributed applications such as electronic mail, file transfer, and remote terminal access.

A) distributed operating system
B) user datagram protocol
C) network operating system
D) communications architecture
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
7
The leading edge of research and development for distributed systems is in the area of distributed operating systems.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
8
The network access layer is concerned with access to and routing data across a network for two end systems attached to the same network.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
9
__________ accommodates both text and binary files, and is used to send files from one system to another using features that provide controlled access.

A) TELNET
B) SSH
C) FTP
D) SMTP
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
10
The logic for actually dealing with the network is put into a separate network access module.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
11
A protocol is used for communication between entities in different systems.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
12
The Header Checksum field is used to detect errors in the header to avoid misdelivery.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
13
Stream sockets make use of UDP, which provides a connection-oriented reliable data transfer.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
14
In the __________ configuration the server machines provide network wide services or applications, such as file storage and printer management.

A) network operating system
B) communications architecture
C) distributed operating system
D) application programming interface
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
15
__________ provides a number of functional enhancements designed to accommodate the higher speeds of today's networks and mix of data streams that are becoming more prevalent.

A) IPv6
B) IP
C) UDP
D) SMTP
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
16
A _________ looks to its users like an ordinary centralized operating system but provides the user with transparent access to the resources of a number of machines.

A) user datagram protocol
B) datagram socket
C) distributed operating system
D) protocol architecture
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
17
Each host on a network must have a unique global internet address.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
18
Linux supports a variety of networking architectures, in particular TCP/IP, by means of Berkeley Sockets.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
19
TELNET makes use of sockets.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
20
UDP guarantees delivery, preservation of sequence, or protection against duplication.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
21
A _________ is a common operating system shared by a network of computers.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
22
The _________ covers the physical interface between a data transmission device and a transmission medium or network.

A) network access layer
B) transport layer
C) physical layer
D) application layer
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
23
IPv6 includes _________ source and destination address fields.

A) 32-bit
B) 256-bit
C) 64-bit
D) 128-bit
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
24
The _________ is concerned with the exchange of data between an end system and the network to which it is attached.

A) Internet layer
B) transport layer
C) host-to-host layer
D) network access layer
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
25
When two or more computers are interconnected via a communication network, the set of computer stations is referred to as a _________ .
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
26
The __________ contains the logic needed to support the various user applications.

A) physical layer
B) network access layer
C) transport layer
D) application layer
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
27
With __________ delivery is not guaranteed, nor is order necessarily preserved.

A) interface sockets
B) raw sockets
C) datagram sockets
D) stream sockets
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
28
The exchange of information between computers for the purpose of cooperative action is generally referred to as __________ .

A) computer network
B) computer communications
C) socket networking
D) program interfacing
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
29
The most widely used communications architecture the _________ protocol suite.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
30
The key elements of a protocol are: syntax, timing and _________ .
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
31
Each application within a host must have an address, known as a __________ , that is unique within the host that allows the host-to-host protocol to deliver data to the proper process.

A) port
B) socket
C) segment
D) datagram
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
32
The _________ provides a basic electronic mail facility.

A) API
B) SMTP
C) UDP
D) FTP
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
33
The __________ is concerned with assuring that the two computer systems are active and ready for data transfer, and for keeping track of the data that are being exchanged to assure delivery.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
34
The __________ contains all the logic that is unique to the file transfer application, such as transmitting passwords, file commands, and file records.

A) communications service module
B) network access module
C) file transfer module
D) application programming interface
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
35
__________ is implemented in all end systems and routers, and acts as a relay to move a block of data from one host, through one or more routers, to another host.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
36
A __________ is a processor that connects two networks, and whose primary function is to relay data from one network to the other on a route from the source to the destination end system.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
37
A __________ is a set of rules governing the exchange of data between two entities.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
38
The _________ is used at the internet layer to provide the routing function across multiple networks.

A) protocol architecture
B) Internet Protocol
C) transmission control protocol
D) UDP
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
39
The structured set of modules that implements the communications function is referred to as a __________ .
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
40
The __________ is a configuration in which there is a network of application machines, usually single-user workstations and one or more "server" machines.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
41
___________ is implemented only in the end systems and keeps track of the blocks of data being transferred to assure that all are delivered reliably to the appropriate application.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
42
The Berkeley Sockets Interface is the de facto standard __________ interface for developing networking applications, spanning a wide range of operating systems.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
43
_________ encrypts all traffic in both directions, provides a secure remote logon capability which enables a user at a terminal or personal computer to log on to a remote computer and function as if directly connected to that computer, and supports file transfer between the local host and a remote server.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
44
The concept of _________ was developed in the 1980s in the UNIX environment and enables communication between a client and server process and may be either connection oriented or connectionless.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
45
The TCP/IP protocol architecture contains _________ layers.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 45 flashcards in this deck.