100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

Computer Networks Full Cheat Sheet

Rating
-
Sold
-
Pages
5
Grade
A
Uploaded on
11-04-2025
Written in
2024/2025

Are you struggling with computer networking concepts? This comprehensive cheat sheet distills complex networking fundamentals into clear, easy-to-reference information. Perfect for: Students preparing for networking exams IT professionals needing quick protocol references Network administrators troubleshooting connectivity issues Anyone looking to strengthen their understanding of network architecture This cheat sheet covers essential topics including: OSI and TCP/IP network models Common protocols (HTTP, DNS, DHCP, FTP) IPv4 and IPv6 addressing Subnetting techniques Network security fundamentals Wireless networking standards Routing and switching concepts Save hours of studying with this concise, visually organized reference guide. Whether you're cramming for certification exams or need a quick refresher during critical network troubleshooting, this cheat sheet provides the information you need at your fingertips. Download now and transform your networking knowledge!

Show more Read less
Institution
Course









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Course

Document information

Uploaded on
April 11, 2025
Number of pages
5
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

HW3
HW1:
1) To support streaming multimedia content over the Internet, service providers often use CDN overlay architecture.
1) In the OSI model, the network layer lies between the link layer and the transport layer.
2) Real-time/ Interactive audio/video describes the type of multimedia applications such as Skype.
2) The OSI =__4___ layers.
3) Layer 2 = from a node to its adjacent node. (Link Layer) 3) Network jitter is one of the imporant issues that multimedia applications.
4) Layer _3_ = the delivery of PDUs from one network to another network. 4) Buffering is a technique that a client-side application can use to mitigate network delay jitter.
5) Layer _4_ = the delivery of PDUs from a process on source node to destination node. 5) The main reason for streaming video files from online servers instead of downloading them is their large sizes.
6) In the layered protocol model, L3 gives L4. L5 gets from L4. 6) Delayed playback is a technique that a multimedia application can use to mitigate network delay.
7) Network layer = _router_ / link layer = _switch_. 7) Packet interleaving is a common AL technique used to mitigate packet loss in multimedia applications.
8) OSI model: Data synchronization and checkpointing = session layer 8) Packet loss is one of the imporant issues that multimedia applications must address in today's Internet.
9) A typical PDU comprises a header and a payload.
10) Hubs = L1_ devices / Ethernet switches = L2 / Routers = L-3 HW4+Q4
11) A protocol defines the syntax,{ semantics }, and timing. 1) S&W ARQ < GBN ARQ < SR protocol.
12) AL uses _NAME_ / TL uses _PORT_ / LL uses _MAC_ / NL uses IP 2) GBN ARQ protocol can use cumulative ACKs instead of individual ACKs.
13) If the _payload/data_ size is large relative to the overall PDU size then the protocol is said to be efficient. 3) SR ARQ uses a timer for every outstanding packet, GBN uses a single timer for the oldest outstanding packet.
14) All the devices in a LAN share the same network address as their gateway router 4) UDP is a lean protocol. Its segment has only 4 header fields.
15) In the _star_ network topology, if one central element is down then the entire network is down. 5) UDP is not a reliable protocol, yet it uses 16-bit checksum for error detection.
16) In the _connectionless_ = may suffer from out-of-order arrivals. 6) In the third leg of TCP's three-way handshake, the SYN flag is set to 0.
17) In the _DATAGRAM_ = may experience random queuing 7) In the first leg of TCP's three-way handshake, the ACK flag is set to 0.
18) A typical architecture of an institutional LAN comprises a hierarchy of _access_switches and _core_ switches. 8) TCP is a transport layer protocol that gives a connection-oriented service to the application layer.
19) Host IP address consists of NetId and HostId. 9) In the UDP/TCP header, the source and destination port numbers are 16-bit long fields
20) The collection of devices attached to a single router port is known as LAN. 10) TCP uses a 32-bit field in its header for the sequence numbers of segments / numbering acknowledgments.
21) The mesh network topology is known to be susceptible to an excessive number of links when the number of users is 11) The ReceiveWindow field in the TCP header is used for flow control.
large. 12) Maximum UDP segment length is 65536 bytes.
22) TCP gives the AL process a _CONNECTION-ORIENTED_ service, while UDP gives it a connectionless service 13) The ReceiveWindow field in the TCP header is used for flow control.
14) In the first/second leg of TCP's three-way handshake, the SYN flag is set to 1.
QZ1 15) TCP is a complex protocol. Its standard header has 20 bytes.
1) AL = MESSAGE_. TL = SEGMENT_. LL = FRAME_. NL = DATAGRAM_. 16) In GBN/SR ARQ protocol, the sender and receiver windows have different/same sizes.
2) The TL segments are encapsulated at the source node and _DECAPSULATED_ at the destination node. 17) TCP header can have optional bytes. The maximum size of the options field is 40 bytes.
3) The _MESH_ network topology provides a direct and dedicated link between any two nodes in the network. 18) TCP header can have optional bytes. The maximum header size is 60 bytes.
4) The _DATAGRAM_ packet switching model does not require a setup phase before data is exchanged. 19) Ports:HTTP-80,HTTPS-443,SMTP-25,POP3-110,DNS-53
5) The collection of ISP routers form what is known as a _WAN_.
6) The _DATAGRAM_ packet switching model is a connectionless model. HW5+Q5
7) The _VC_ packet switching model is a connection-oriented model. 1) A typical IP router architecture comprises a routing processor, several I/O ports, and a switch fabric.
8) In the OSI model, physical layer = transmits data as a stream of bits 3) The main functions of IP routers are routing and forwarding.
9) The bus network topology is known to be susceptible to collision. 4) The devices that implement the network layer inside the internet core are called routers
10) Telecom carriers use a mix of point-to-point connections and _switched_ connections in their WANs 5) The second row of an IPv4 datagram header is dedicated to the process of fragmentation.
11). The OSI model -> 7 layers. TCP/IP model(PLNTA) -> 5 layers. 6) IPv4 addresses are 32-bit long whereas IPv6 addresses are 128-bit.
7) The network layer ensures that two hosts, even on different networks, can still exchange packets
HW2 8) If the address block 10.x.y.z/24 is used by an organization, a NAT router must be used before being forwarded into the
1) HTTP/2 allows a web server to push/send page content public internet.
2) HTTP/2 is faster and more secure than HTTP/1. 9) In DV routing, X receives an update about a cost from different/same neighbors, then X takes the smallest/latest
3) HTTP/3 fixes the HOL/head of line blocking problem that HTTP/1 and HTTP/2 suffer from. value of the cost.
4) HTTP request message header starts with a field called method. 10) DHCP process, the client sends a DHCP discover message, to which the server replies with a DHCP offer
5) The most common port number for HTTPS servers is 443, and for HTTP servers is 80 message.
6) Reliable data transfer service guarantees the data does not suffer any errors, packet loss, or out-of-order arrivals. 11) Ping is an application that uses on ICMP Echo Request and Echo Reply messages
7) In the client-server model, socket address => port number and the IP address. 12) Routing is a control plane function whereas forwarding is a data plane function.
8) SMTP = push protocol and POP/ IMAP = pull protocol 13) In the SDN approach, remote controllers implement the control plane functions.
9) SMTP servers = port number 25 14) The M flag in the header of an IPv4 datagram is set to 1/0 in the FIRST/LAST of many fragments.
10) Mail server A receiving an email from mail server B acts as an SMTP server. 15) The network layer that follows the datagram service model gives a best-effort, connectionless service to the
11) Mail server A receiving an email from a user agent acts as an SMTP server. transport layer.
12) Mail server A receiving a request to retrieve emails from a user agent acts as an IMAP server. 16) The D flag in the header of an IPv4 datagram is set to 1 if the datagram is not to be fragmented.
13) Network throughput is affected by the network congestion, network delays, bit error rate, and packet loss. 17) IPv6 address obtained from the shortened notation AABB::A00:B10:E11 is
14) The propogation delay depends on the physical distance and the travel speed of the electomagnetic wave. aabb:0000:0000:0000:0000:0a00:0b10:0e11.
15) The transmission delay depends on the packet size and the node bit rate. 18) The three important types of IPv6 addresses are unicast addresses, anycast addresses, and multicast
16) The end-to-end delay, delivering packets through the first link and delivering the last packet through the remaining addresses.
(N-1) links. 19) The shortest notation of the IPv6 address AB11:0:0:BB11:0:0:0:EE11 is AB11:0:0:BB11::EE11.
17) A local DNS server is not strictly part of the DNS server hierarchy but plays an important role in practice. 20) In the classful IPv4 addressing, the default subnet mask for the address 45.3.2.1 is /8.
18) Delay jitter is mostly due to the variability of queuing delays that packets experience at network routers. 21) In the classful IPv4 addressing, the default subnet mask for the address 193.3.2.1 is /24.
19) Reliable data transfer service guarantees the data does not suffer any errors, packet loss, or out of order arrivals. 22) IPv6 address AABB:CCDD:EEFF:0:0:0:AAAA:BBBB is AABB:CCDD:EEFF::AAAA:BBBB.
20) In the client-server model, the client process always initiates the connection, server process is always on waiting for a 23) In the DHCP discover message, the source IP address is 0.0.0.0 and the destination IP address is 255.255.255.255.
connection request. 24) ICMP is a protocol used for query messaging and error reporting by the network layer.
21) A network application running on a particular network host, is uniquely identified by a pair of numbers, that together 25) Like poisoned reverse, Split Horizon is a technique that could be used to mitigate the Count-To- Infinity (CTI)
are referred to as the socket address. instability problem.
26) RIP is a standard IETF routing protocol that uses the DV(Distance Vector) algorithm to find the Least Cost Paths
QZ2 (LCPs).
1) A server in charge of resolving all aus.edu names is called a _EDUCAUSE_ DNS server. 27) DV/EIGRP/RIP algorithm is used by decentralized routing protocols. They simply rely on updates from their
2) The nodal delay comprises the processing delay, the propagation delay, the queuing delay, and the _TRANSMIT_ delay immediate neighbors.
3) Root servers are the highest in the hierarchy of DNS servers. 28) LS/link state/OSPF/Dijsktra algorithm is used by global routing protocols.
4) Client does not require a permanent address. Server typically uses a permanent and well-known address.
29) EIGRP is a routing protocol that uses a composite metric that is based on delay, bandwidth, reliability, and load.
5) HTTP response message header contains an important field called a status code.
30) EIGRP is a Cisco proprietary routing protocol that uses DV algorithm to find the LCPs in a network.
31) CTI is a two-node instability problem that networks running RIP protocol can sufffer from.
32) In a network that runs OSPF routing protocol, the link cost is inversely proportional to its bit rate.
33) In a network that runs RIP routing protocol, the maximum number of hops is 15.
34) Traceroute is an application that uses ICMP error-reporting messages to determine the number of routers between a
source and a destination.

, 35) The network layer that follows the DATAGRAM_ service model gives a best-effort, connectionless service to the
transport layer.
36) The TTL header field in an IPv4 datagram is used to prevent lost packets from staying inside the network indefinitely.
37) The TOS field in the header of an IPv4 datagram can be used to provide different classes of service inside the network.
$6.49
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
suyamti

Get to know the seller

Seller avatar
suyamti University Of California - Los Angeles (UCLA)
Follow You need to be logged in order to follow users or courses
Sold
0
Member since
8 months
Number of followers
0
Documents
10
Last sold
-

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions