TECH 2520
To what aspects of networking does data communications refer to - ANS-Data communications
refers to the study of low-level mechanisms and technologies used to send information across a
physical communication medium, such as a wire, radio wave, or light beam. Data
communications, focused on to utilize physical phenomena to transfer information, is primarily
the domain of electrical engineering.
What is packet-switching, and why is packet switching relevant to the Internet? - ANS-Packet
Switching was developed in the 1960s, networks had evolved from telegraph and telephone
systems that connected a physical pair of wires between two parties to form a communication
circuit. Package switching is relevant to the internet because package data divides data into
small blocks called packets and includes an identification of the intended recipient in each
packet.
What is a protocol to a suite, and what is the advantage of a suite - ANS-Protocols that are
constructed correctly to ensure that the resulting communications system is both complete and
efficient is called a protocol suite. The advantage of a suite is that the protocol in a suite handles
one aspect of communication. Together the protocols in a suite cover all communication in
addition to hardware failures and other exceptional conditions.
List the layers in TCP/IP model, and give a brief explanation of each. TCP - Transmission
Control Protocol IP - Internet Protocol - ANS-Layer 1: Physical - In the physical layer, protocols
specify details of the underlying transmission medium and the associated hardware.
Layer 2: Network Interface - In this specific layer, protocols specify details about communication
over a single network and the interface between the network hardware and Internet Layer.
Layer 3: Internet - In layer 3 protocols determine the communication between two computers
across that Internet. It divides the larger Internet packet into smaller packets for transmission
and mechanisms for reporting errors belong to this layer.
Layer 4: Transport - The transport layer provides communication from one application program
to another. It controls the maximum rate a receiver can accept data, mechanisms to avoid
network congestion and techniques to assure that all data is received correctly
Layer 5: Application - protocols in this layer specify how a pair of applications interacts when
they communicate.
List the steps in the transition in graphics presentation from the early Internet to the current
Internet. - ANS-Text - Graphics Images - Video Clips - High Def. Video
What Internet technology is the telephone system using? - ANS-The internet technology the
telephone system is using is called VoIP (Move from Analog to Voice over IP)
, Describe Internet applications that you use regularly that were not available to your parents
when they were your age. - ANS-Social Networking - Facebook, Snapchat, Instagram
Online Banking and Payments - Bank Application, Toyota Financial (car payments), Target
Redcard.
What are the two basic communication paradigms used in the Internet? - ANS-Stream
Paradigm: Connection-oriented, 1-to-1 Communication, Sender transfers a sequence of
Individual bytes, Arbitrary length transfer, Used by most Applications, and Runs over TCP.
Message Paradigm: Connectionless, Many-to-many communication, Sender transfers a
sequence of discrete messages, Each message limited to 64 Kbytes, Used for multimedia
applications, and Runs over UDP.
Give six characteristics of Internet stream communication. - ANS-Stream Paradigm:
Connection-oriented, 1-to-1 Communication, Sender transfers a sequence of Individual bytes,
Arbitrary length transfer, Used by most Applications, and Runs over TCP.
When two applications communicate over the Internet, which one is the server? - ANS-When
two applications communicate over the internet, the applications that starts first and waits
passively and arbitrarily long for contact from the client is known as a server.
What two identifiers are used to specify a particular server? - ANS-An identifier that specifies the
computer on which a server runs and an identifier that specifies a particular service on the
computer.
What details does an application protocol specify? - ANS-The programmer specifies details
such as:
- The syntax and semantics of messages that can be exchanged.
- Whether the client or server initiates interaction.
- Actions to be taken if an error arises
- How the two sides know when to terminate communication.
When a user requests an FTP directory listing, how many TCP connections are formed?
Explain. - ANS-When a user requests FTP (File Transfer Protocol) two TCP connections are
formed Control Connection and Data Connection.
The client establishes a connection to an FTP server and sends a series of requests to which
the server responds. FTP servers do not respond to requests over the same connection .
Instead the connection that the client creates, called a control connection, is reserved for
commands. After it has been used for one etransfer, the data connection is closed. If the client
was to send another request, the server opens a new data connection.
What are the two main email access protocols? - ANS-The two standard email access protocols
are POP3 (Post Office Protocol Version 3) and IMAP (Internet Mail Access Protocol).
To what aspects of networking does data communications refer to - ANS-Data communications
refers to the study of low-level mechanisms and technologies used to send information across a
physical communication medium, such as a wire, radio wave, or light beam. Data
communications, focused on to utilize physical phenomena to transfer information, is primarily
the domain of electrical engineering.
What is packet-switching, and why is packet switching relevant to the Internet? - ANS-Packet
Switching was developed in the 1960s, networks had evolved from telegraph and telephone
systems that connected a physical pair of wires between two parties to form a communication
circuit. Package switching is relevant to the internet because package data divides data into
small blocks called packets and includes an identification of the intended recipient in each
packet.
What is a protocol to a suite, and what is the advantage of a suite - ANS-Protocols that are
constructed correctly to ensure that the resulting communications system is both complete and
efficient is called a protocol suite. The advantage of a suite is that the protocol in a suite handles
one aspect of communication. Together the protocols in a suite cover all communication in
addition to hardware failures and other exceptional conditions.
List the layers in TCP/IP model, and give a brief explanation of each. TCP - Transmission
Control Protocol IP - Internet Protocol - ANS-Layer 1: Physical - In the physical layer, protocols
specify details of the underlying transmission medium and the associated hardware.
Layer 2: Network Interface - In this specific layer, protocols specify details about communication
over a single network and the interface between the network hardware and Internet Layer.
Layer 3: Internet - In layer 3 protocols determine the communication between two computers
across that Internet. It divides the larger Internet packet into smaller packets for transmission
and mechanisms for reporting errors belong to this layer.
Layer 4: Transport - The transport layer provides communication from one application program
to another. It controls the maximum rate a receiver can accept data, mechanisms to avoid
network congestion and techniques to assure that all data is received correctly
Layer 5: Application - protocols in this layer specify how a pair of applications interacts when
they communicate.
List the steps in the transition in graphics presentation from the early Internet to the current
Internet. - ANS-Text - Graphics Images - Video Clips - High Def. Video
What Internet technology is the telephone system using? - ANS-The internet technology the
telephone system is using is called VoIP (Move from Analog to Voice over IP)
, Describe Internet applications that you use regularly that were not available to your parents
when they were your age. - ANS-Social Networking - Facebook, Snapchat, Instagram
Online Banking and Payments - Bank Application, Toyota Financial (car payments), Target
Redcard.
What are the two basic communication paradigms used in the Internet? - ANS-Stream
Paradigm: Connection-oriented, 1-to-1 Communication, Sender transfers a sequence of
Individual bytes, Arbitrary length transfer, Used by most Applications, and Runs over TCP.
Message Paradigm: Connectionless, Many-to-many communication, Sender transfers a
sequence of discrete messages, Each message limited to 64 Kbytes, Used for multimedia
applications, and Runs over UDP.
Give six characteristics of Internet stream communication. - ANS-Stream Paradigm:
Connection-oriented, 1-to-1 Communication, Sender transfers a sequence of Individual bytes,
Arbitrary length transfer, Used by most Applications, and Runs over TCP.
When two applications communicate over the Internet, which one is the server? - ANS-When
two applications communicate over the internet, the applications that starts first and waits
passively and arbitrarily long for contact from the client is known as a server.
What two identifiers are used to specify a particular server? - ANS-An identifier that specifies the
computer on which a server runs and an identifier that specifies a particular service on the
computer.
What details does an application protocol specify? - ANS-The programmer specifies details
such as:
- The syntax and semantics of messages that can be exchanged.
- Whether the client or server initiates interaction.
- Actions to be taken if an error arises
- How the two sides know when to terminate communication.
When a user requests an FTP directory listing, how many TCP connections are formed?
Explain. - ANS-When a user requests FTP (File Transfer Protocol) two TCP connections are
formed Control Connection and Data Connection.
The client establishes a connection to an FTP server and sends a series of requests to which
the server responds. FTP servers do not respond to requests over the same connection .
Instead the connection that the client creates, called a control connection, is reserved for
commands. After it has been used for one etransfer, the data connection is closed. If the client
was to send another request, the server opens a new data connection.
What are the two main email access protocols? - ANS-The two standard email access protocols
are POP3 (Post Office Protocol Version 3) and IMAP (Internet Mail Access Protocol).