3introduction to networks33

19
Introduction to Networks (Version 5.0) - ITN Chapter 3 Exam Below is the feedback on items for which you did not receive full credit. Some interactive items may not display your response. Subscore: 2 What method can be used by two comp ensure that packets are not dropped too much data is being sent too qui Correct Respons e Your Response encapsulation flow control access method response timeout In order for two computers to be able to communicate effectively, there must be a mechanism that allows bo source and destination to set the timing of the trans receipt of data. Flow control allows for this by ensu data is not sent too fast for it to be received prope This item references content from the following areas: Introduction to Networks 3.1.1 The Rules 3 Which protocol is responsible for controlling the and rate of the HTTP messages exchanged between se and client? Correct Respons e Your Response Dom ain Know ledge -W eighted Score

Upload: jovi46

Post on 29-Nov-2015

261 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: 3Introduction to Networks33

Introduction to Networks (Version 5.0) - ITN Chapter 3 Exam

Below is the feedback on items for which you did not receive full credit. Some interactive items may not display your response.

Subscore:

2 What method can be used by two computers to ensure that packets are not dropped because too much data is being sent too quickly?CorrectResponse

YourResponse

encapsulation

flow control

access method

response timeoutIn order for two computers to be able to communicate effectively, there must be a mechanism that allows both the source and destination to set the timing of the transmission and receipt of data. Flow control allows for this by ensuring that data is not sent too fast for it to be received properly.

This item references content from the following areas:Introduction to Networks

3.1.1 The Rules

3 Which protocol is responsible for controlling the size and rate of the HTTP messages exchanged between server and client?CorrectResponse

YourResponse

HTTP

ARP

TCP

DHCPTCP is the transport protocol that manages the individual conversations between web servers and web clients. It divides the HTTP messages into smaller pieces (segments) and is responsible for controlling the rate of the messages exchanged between a server and a client. ARP is used to determine the MAC address of a destination host. DHCP is used for automatic IP address assignment and the HTTP protocol governs how a web server and a

Domain Know ledge - Weighted Score

Page 2: 3Introduction to Networks33

client can interact.

This item references content from the following areas:Introduction to Networks

3.2.1 Protocols

4 A user is viewing an HTML document located on a web server. What protocol segments the messages and manages the segments in the individual conversation between the web server and the web client?CorrectResponse

YourResponse

DHCP

TCP

HTTP

ARPTCP is responsible for segmenting large messages into smaller segments. It also manages the individual conversations between the web server and client. ARP is used to determine the MAC address of the destination. DHCP is used for automatic address assignment and the HTTP protocol governs how a web server and client interact.

This item references content from the following areas:Introduction to Networks

3.2.1 Protocols

5 A web client is sending a request for a webpage to a web server. From the perspective of the client, what is the correct order of the protocol stack that is used to prepare the request for transmission?CorrectResponse

YourResponse

HTTP, IP, TCP, Ethernet

Page 3: 3Introduction to Networks33

HTTP, TCP, IP, Ethernet

Ethernet, TCP, IP, HTTP

Ethernet, IP, TCP, HTTP1. HTTP governs the way that a web server and client interact.2. TCP manages individual conversations between web servers and clients.3. IP is responsible for delivery across the best path to the destination.4. Ethernet takes the packet from IP and formats it for transmission.

This item references content from the following areas:Introduction to Networks

3.2.1 Protocols

6 What are proprietary protocols?CorrectResponse

YourResponse

protocols developed by private organizations to operate on any vendor hardware

protocols that can be freely used by any organization or vendor

protocols developed by organizations who have control over their definition and operation

a collection of protocols known as the TCP/IP protocol suiteProprietary protocols have their definition and operation controlled by one company or vendor. Some of them can be used by different organizations with permission from the owner. The TCP/IP protocol suite is an open standard, not a proprietary protocol.

This item references content from the following areas:Introduction to Networks

3.2.3 Standards Organizations

8 What is an advantage of network devices using open standard protocols?

Page 4: 3Introduction to Networks33

CorrectResponse

YourResponse

Network communications is confined to data transfers between devices from the same vendor.

A client host and a server running different operating systems can successfully exchange data.

Internet access can be controlled by a single ISP in each market.

Competition and innovation are limited to specific types of products.

An advantage of network devices implementing open standard protocols, such as from the TCP/IP suite, is that clients and servers running different operating systems can communicate with each other. Open standard protocols facilitate innovation and competition between vendors and across markets, and can reduce the occurrence of monopolies in networking markets.

This item references content from the following areas:Introduction to Networks

3.2.3 Standards Organizations

9 What is a function of Layer 4 of the OSI model?CorrectResponse

YourResponse

to specify the packet type to be used by the communications

to apply framing information to the packet, based on the attached media

to represent data to the user, including encoding and dialog control

to describe the ordered and reliable delivery of data between source and destination

Layer 4 of the OSI model (transport layer) describes the general services and functions that can provide the ordered and reliable delivery of data between source and destination hosts. The addition of framing information is described by the data link layer. The type of data packet is specified by the protocol operating at the network layer. The application layer is responsible for representing data to the user including encoding and dialog control.

Page 5: 3Introduction to Networks33

This item references content from the following areas:Introduction to Networks

3.2.4 Reference Models

10 Which statement is true about the TCP/IP and OSI models?CorrectResponse

YourResponse

The TCP/IP transport layer and OSI Layer 4 provide similar services and functions.

The TCP/IP network access layer has similar functions to the OSI network layer.

The OSI Layer 7 and the TCP/IP application layer provide identical functions.

The first three OSI layers describe general services that are also provided by the TCP/IP internet layer.

The TCP/IP internet layer provides the same function as the OSI network layer. The transport layer of both the TCP/IP and OSI models provides the same function. The TCP/IP application layer includes the same functions as OSI Layers 5, 6, and 7.

This item references content from the following areas:Introduction to Networks

3.2.4 Reference Models

11 What is a benefit of using a layered model for network communications?CorrectResponse

YourResponse

fostering competition among device and software vendors by enforcing the compatibility of their products

enhancing network transmission performance by defining targets for each layer

avoiding possible incompatibility issues by using a common set of developing tools

Page 6: 3Introduction to Networks33

simplifying protocol development by limiting every layer to one function

One benefit of using a layered model is to foster competition among vendors because products from different vendors can work together as they perform the same function defined by a specific layer.

This item references content from the following areas:Introduction to Networks

3.2.4 Reference Models

13 Which PDU format is used when bits are received from the network medium by the NIC of a host?CorrectResponse

YourResponse

file

frame

packet

segmentWhen received at the physical layer of a host, the bits are formatted into a frame at the data link layer. A packet is the PDU at the network layer. A segment is the PDU at the transport layer. A file is a data structure that may be used at the application layer.

This item references content from the following areas:Introduction to Networks

3.3.1 Data Encapsulation

16 What statement describes the function of the Address Resolution Protocol?CorrectResponse

YourResponse

ARP is used to discover the IP address of any host on a

Page 7: 3Introduction to Networks33

different network.

ARP is used to discover the IP address of any host on the local network.

ARP is used to discover the MAC address of any host on a different network.

ARP is used to discover the MAC address of any host on the local network.

When a PC wants to send data on the network, it always knows the IP address of the destination. However, it also needs to discover the MAC address of the destination. ARP is the protocol that is used to discover the MAC address of a host that belongs to the same network.

This item references content from the following areas:Introduction to Networks

3.3.2 Accessing Local Resources

18 Which address does a NIC use when deciding whether to accept a frame?CorrectResponse

YourResponse

source IP address

source MAC address

destination IP address

destination MAC address

source Ethernet address

This item references content from the following areas:Introduction to Networks

3.3.2 Accessing Local Resources

19 A user sends an HTTP request to a web server on a remote network. During encapsulation for this request, what information is added to the address

Page 8: 3Introduction to Networks33

field of a frame to indicate the destination?CorrectResponse

YourResponse

the MAC address of the destination host

the IP address of the destination host

the MAC address of the default gateway

the IP address of the default gatewayA frame is encapsulated with source and destination MAC addresses. The source device will not know the MAC address of the remote host. An ARP request will be sent by the source and will be responded to by the router. The router will respond with the MAC address of its interface, the one which is connected to the same network as the source.

This item references content from the following areas:Introduction to Networks

3.3.3 Accessing Remote Resources

Page 9: 3Introduction to Networks33

¿Qué es un beneficio del uso de un modelo en capas para las comunicaciones de red?

simplificar el desarrollo del protocolo mediante la limitación de todas las capas de una función.

Page 10: 3Introduction to Networks33

mejorar el rendimiento de transmisión de la red mediante la definición de objetivos para cada capa.

fomentar la competencia entre los dispositivos y los proveedores de software mediante la aplicación de la compatibilidad de sus productos.

evitando posibles problemas de incompatibilidad con un conjunto común de herramientas de desarrollo

¿Qué método puede ser utilizado por dos ordenadores para garantizar que los paquetes no se descartan porque demasiados datos se están enviando demasiado rápido?

tiempo de espera de respuesta

método de acceso

encapsulación

control de flujo

¿Qué protocolo se encarga de controlar el tamaño y la velocidad de los mensajes HTTP intercambiados entre el servidor y el cliente ?

 ARP TCP DHCP HTTP

Un usuario está viendo un documento HTML ubicado en un servidor Web. ¿Qué segmentos de los mensajes de protocolo y gestiona los segmentos de la conversación individual entre el servidor web y el cliente web?

Page 11: 3Introduction to Networks33

 ARP DHCP TCP HTTP

Un cliente Web envía una solicitud de una página web en un servidor web. Desde la perspectiva del cliente, lo que es el orden correcto de la pila de protocolo que se utiliza para preparar la petición de transmisión?Ethernet, IP, TCP, HTTP.Ethernet, TCP, IP, HTTP.HTTP, IP, TCP, Ethernet.HTTP, TCP, IP, Ethernet

 

Un usuario envía una petición HTTP a un servidor web en una red remota. Durante encapsulación para esta solicitud, la información que se añade a la barra de direcciones del cuadro para indicar el destino?

  la dirección MAC de la puerta de enlace predeterminada  la dirección MAC del host de destino  la dirección IP de la puerta de enlace predeterminada  la dirección IP del host de destino

8.

Page 12: 3Introduction to Networks33

Si la puerta de enlace predeterminada no está configurado correctamente en el host, ¿cuál es el impacto en las comunicaciones?

  El anfitrión es incapaz de comunicarse en la red local.  El host puede comunicarse con otros hosts en redes remotas, pero no es capaz de comunicarse con los hosts de la red local.  No hay impacto en las comunicaciones.  El host puede comunicarse con otros hosts de la red local, pero no es capaz de comunicarse con los hosts en redes remotas.

Page 13: 3Introduction to Networks33

¿Qué afirmación es verdadera acerca de los modelos TCP / IP y OSI ?

 La capa de acceso de red TCP / IP tiene funciones similares a la capa de red OSI . El OSI de 7 y la capa de aplicación TCP / IP proporcionan funciones idénticas . Las tres primeras capas del modelo OSI describe los servicios generales que también son proporcionados por la capa de Internet TCP / IP. La capa de transporte TCP / IP y OSI Layer 4, prestación de servicios y funciones similares.

Un ordenador en una determinada red se comunica con un grupo específico de equipos. ¿Qué tipo de comunicación es esto?

ARPunicasttransmitirHTTPmulticast

¿Qué afirmación describe la función del Protocolo de resolución de direcciones?

  ARP se utiliza para descubrir la dirección MAC de cualquier host en una red diferente.  ARP se utiliza para descubrir la dirección MAC de cualquier host de la red local.  ARP se utiliza para detectar la dirección IP de cualquier máquina en la red local.  ARP se utiliza para detectar la dirección IP de cualquier máquina en una red diferente.

¿Qué formato de PDU se utiliza cuando se reciben los bits desde el medio de red por el NIC de un anfitrión?

  segmento  expediente  marco  paquete

¿Cuál es el término general que se utiliza para describir una porción de datos en cualquier capa de un modelo de red?

  segmento  paquete  marco  unidad de datos de protocolo

Page 14: 3Introduction to Networks33

¿Qué enunciado describe con precisión un proceso de encapsulación TCP / IP cuando un PC está enviando datos a la red?

  Los paquetes son enviados desde la capa de acceso de red a la capa de transporte.  Los datos se envían desde la capa de Internet para la capa de acceso a la red.  Los marcos se envían desde la capa de acceso de red a la capa de Internet.  Los segmentos se envían desde la capa de transporte a la capa de Internet.

En qué capa del modelo OSI se encapsula una dirección lógica?

  capa física.  capa de transporte.  capa de enlace de datos.  capa de red

¿Qué dirección proporciona una dirección de host único para las comunicaciones de datos en la capa de Internet?dirección de enlace de datos.La dirección física.dirección lógica.Capa de dirección 2

¿Qué es una función de la capa 4 del modelo OSI?

  para especificar el tipo de paquete para ser utilizado por las comunicaciones.  para representar los datos para el usuario, incluyendo codificación y control de diálogo.  para describir la entrega ordenada y fiable de datos entre la fuente y el destino.  para aplicar la información encuadre para el paquete, sobre la base de los medios de comunicación adjuntos

¿Cuáles son los protocolos propietarios?una colección de protocolos conocidos como el conjunto de protocolos TCP / IP.protocolos desarrollados por organizaciones que tienen control sobre su definición y funcionamiento.protocolos que pueden ser utilizados libremente por cualquier organización o proveedor.protocolos desarrollados por organizaciones privadas para funcionar en cualquier hardware proveedor

¿Qué estándar IEEE permite una NIC inalámbrica para conectarse a un punto de acceso inalámbrico que es hecho por otro fabricante?

Page 15: 3Introduction to Networks33

  802,1  802.2  802.3  802.11

¿Qué es una ventaja de los dispositivos de red utilizando protocolos estándar abiertos

¿Una máquina cliente y un servidor que ejecuta sistemas operativos diferentes pueden intercambiar datos con éxito

Comunicaciones de red. Se limita a la transferencia de datos entre dispositivos del mismo fabricante

Acceso. Internet puede ser controlado por un solo ISP en cada mercado

. La competencia y la innovación se limitan a determinados tipos de productos.