100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
CS6250 - Computer Networks Practice Questions and Answers Graded A+ $7.99   Add to cart

Exam (elaborations)

CS6250 - Computer Networks Practice Questions and Answers Graded A+

 6 views  0 purchase
  • Course
  • Computer Networking
  • Institution
  • Computer Networking

CS6250 - Computer Networks Practice Questions and Answers Graded A+ What are advantages and disadvantages of a layered architecture? - Answers Separation of concerns among logical layers promotes flexibility, scalibility, and maintainability. Multiple applications can reuse the components. It enab...

[Show more]

Preview 3 out of 19  pages

  • October 12, 2024
  • 19
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • Computer Networking
  • Computer Networking
avatar-seller
TutorJosh
CS6250 - Computer Networks Practice Questions and Answers Graded A+

What are advantages and disadvantages of a layered architecture? - Answers Separation of concerns
among logical layers promotes flexibility, scalibility, and maintainability. Multiple applications can reuse
the components. It enables teams to work on different parts with minimal dependencies on other teams

What are the similarities of the OSI model and five-layered Internet model? - Answers They are both
based on layered architecture.

The are comparable to each other - see image 1

Both are networking standards

What are the differences of the OSI model and five-layered Internet model? - Answers OSI is a generic
model based on the functions of each layer. TCP is a protocol oriented standard.



OSI uses 3 upper layers (application, presentation, and session) while TCP just uses application.



Likewise, OSI uses 2 Lower layers (Physical and DataLink) while TCP just uses Link

What is a socket? - Answers A socket is one endpoint of a two-way communication link between two
programs running on the network.



A socket is bound to a port number so that the TCP layer can identify the application that data is
destined to be sent to.

Physical Layer - Answers The lowest, or first, layer of the OSI model. Protocols in this layer generate and
detect signals so as to transmit and receive data over a network medium. These protocols also set the
data transmission rate and monitor data error rates, but do not provide error correction.



The lowest layer of the OSI Model is concerned with electrically or optically transmitting raw
unstructured data bits across the network from the physical layer of the sending device to the physical
layer of the receiving device. It can include specifications such as voltages, pin layout, cabling, and radio
frequencies. At the physical layer, one might find "physical" resources such as network hubs, cabling,
repeaters, network adapters or modems.

OSI Data Link Layer - Answers At the data link layer, directly connected nodes are used to perform node-
to-node data transfer where data is packaged into frames. The data link layer also corrects errors that
may have occurred at the physical layer.

,The data link layer encompasses two sub-layers of its own. The first, media access control (MAC),
provides flow control and multiplexing for device transmissions over a network. The second, the logical
link control (LLC), provides flow and error control over the physical medium as well as identifies line
protocols.

OSI Network Layer - Answers The network layer is responsible for receiving frames from the data link
layer, and delivering them to their intended destinations among based on the addresses contained
inside the frame. The network layer finds the destination by using logical addresses, such as IP (internet
protocol). At this layer, routers are a crucial component used to quite literally route information where it
needs to go between networks.

OSI Transport Layer - Answers The transport layer manages the delivery and error checking of data
packets. It regulates the size, sequencing, and ultimately the transfer of data between systems and
hosts. One of the most common examples of the transport layer is TCP or the Transmission Control
Protocol.

OSI Session Layer - Answers The session layer controls the conversations between different computers.
A session or connection between machines is set up, managed, and termined at layer 5. Session layer
services also include authentication and reconnections.

OSI Presentation Layer - Answers The presentation layer formats or translates data for the application
layer based on the syntax or semantics that the application accepts. Because of this, it at times also
called the syntax layer. This layer can also handle the encryption and decryption required by the
application layer.

OSI Application Layer - Answers At this layer, both the end user and the application layer interact
directly with the software application. This layer sees network services provided to end-user applications
such as a web browser or Office 365. The application layer identifies communication partners, resource
availability, and synchronizes communication.

5 Layer Internet Model - Application Layer - Answers As you might have guessed, the Application layer is
where applications requiring network communications live. Examples of these applications include email
clients and web browsers. These applications use the Transport Layer to send requests to connect to
remote hosts.

5 Layer Internet Model - Transport Layer - Answers The Transport layer establishes the connection
between applications running on different hosts. It uses TCP for reliable connections and UDP for fast
connections. It keeps track of the processes running in the applications above it by assigning port
numbers to them and uses the Network layer to access the TCP/IP network.

5 Layer Internet Model - Network Layer - Answers The Network layer is responsible for creating the
packets that move across the network. It uses IP addresses to identify the packet's source and
destination.

, 5 Layer Internet Model - Data Link Layer - Answers The Data Link layer is responsible for creating the
frames that move across the network. These frames encapsulate the packets and use MAC addresses to
identify the source and destination.

5 Layer Internet Model - Physical Layer - Answers The Physical layer encodes and decodes the bits found
in a frame and includes the transceiver that drives and receives the signals on the network.

What is encapsulation, and how is it used in a layered model? - Answers In networking model, the terms
encapsulation and de-encapsulation refer to a process in which protocol information is added to the
data and removed from the data when it passes through the layers.

Protocol information can be added before and after the data. If information is added before the data, it
is known as header. If information is added after the data, it is known as trailer.

What is the end-to-end (e2e) principle? - Answers When a function has to be supported in a networked
system, the designer often asks if it should be implemented at the end systems; or should it be
implemented within the communication subsystem that interconnects all the end systems. The end-to-
end argument or principle states that it's proper to implement the function in the end systems. The
communication system itself may provide a partial implementation but only as a performance
enhancement.



The architecture and growth of the Internet was shaped by the end-to-end principle. It allowed us to
keep the Internet simple and add features quickly to end systems. The principle enabled innovation.

End to End Principle Example - Answers An example of the end-to-end principle is that of an arbitrarily
reliable file transfer between two endpoints in a distributed network of a varying, nontrivial size:[3] The
only way two endpoints can obtain a completely reliable transfer is by transmitting and acknowledging a
checksum for the entire data stream; in such a setting, lesser checksum and acknowledgment
(ACK/NACK) protocols are justified only for the purpose of optimizing performance - they are useful to
the vast majority of clients, but are not enough to fulfill the reliability requirement of this particular
application. A thorough checksum is hence best done at the endpoints, and the network maintains a
relatively low level of complexity and reasonable performance for all clients

What is the EvoArch model? - Answers an hourglass model that consists of six protocol and application
layers that originate from a single bubble - IPv4

What are the ramifications of the hourglass shape of the internet - Answers

Repeater - Answers Physical Layer - A repeater operates at the physical layer. Its job is to regenerate the
signal over the same network before the signal becomes too weak or corrupted so as to extend the
length to which the signal can be transmitted over the same network. An important point to be noted
about repeaters is that they do not amplify the signal. When the signal becomes weak, they copy the
signal bit by bit and regenerate it at the original strength. It is a 2 port device.

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller TutorJosh. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $7.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

75323 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$7.99
  • (0)
  Add to cart