Exam 1 Review

advertisement
03/07/16
Exam 1 Review (ISQS 3349)
Chapter 2
Review Focuses
1.
Three network architectures: host-based, client-based, and client-server
2.
Four general functions of network application programs:
Data storage, data access logic, application logic, and presentation logic.
3.
Network terminology
Intranet: an organization's internal network that uses Internet technology
Extranet: The intranet that some of its functions are accessible to the organization's business partners
Client: the input/output hardware device on a network.
Server: the computer provides services to the clients on the network.
Circuit: the pathway through which the messages travel.
Mainframe: a large, general-purpose computer.
Media: is the matter or substance that carries the voice or data transmission.
Front-end processors: a computing device as an extension of mainframe for communication activities.
4.
Internet applications
Web, email, ftp
5.
ISO’s OSI network model and Internet 5-layer model
Short-answer Questions:
1) What is middleware and what does it do?
Middleware is software that sits between the application software on the client and the application
software on the server.
Middleware does two things. First, it provides a standard way of communicating that can translate
between software from different vendors. The second function of middleware is to manage the
message transfer from clients to servers (and vice versa) so that clients need not know the specific
server that contains the application’s data.
2) Which is less expensive: host-based networks or client-server networks? Explain.
Network expenses depend on many factors. In general, the hardware for a client-server network is less
expensive than that required for a host-based network. It is also less expensive to expand a client-server
network to handle increased loads. However, the application software and management of a client-server
network can be more expensive than a host-based network.
3) How does a thin client differ from a fat client?
A “thin client” approach places little or no application logic on the client, while a “fat client” approach
places all or almost all of the application logic on the client. Thin clients are much easier to manage. If an
application changes, only the server with the application logic needs to be updated. With a fat client, the
software on all of the clients would need to be updated.
1
03/07/16
True/False questions:
1.
In a host-based network, the client computer performs the majority of the work.
2.
The work in a network is shared between the clients and servers in a client-server network.
3.
The host-based network is predicted to become the dominant network architecture of the future.
4.
Application logic refers to the processing required to access data.
5. Currently, it is much less expensive to develop and maintain application software for client-server
networks.
Chapter 3
Review focuses:
1.
Three types of data flows: Simplex, half-duplex, and full-duplex.
2.
Transmission media
Guided Media: Coaxial cable, twisted-pair cable, fiber optic cable
Unguided media: radio, infrared light, microwave, satellite
3.
Digital transmission of digital data



4.
Analog transmission of digital data







5.
Modulation: the technique that modifies the form of an electrical signal so the signal can carry
information on a communication medium.
Modem: MOdulator/DEModulator
Amplitude, frequency, and phase.
Types of modulation: AM, FM, PM, QAM (quadrature amplitude modulation, 3-bit by PM and 1
bit by AM), TCM (Trellis-coded modulation, up to 10-bit per symbol).
Bit rate vs. symbol (baud) rate (information rate and signaling speed)
Bandwidth: refers to a range of frequencies.
Data compression has been used by the modem (Huffman encoding, Lempel-Ziv encoding)
Digital transmission of analog data




6.
ASCII and EBCDIC coding
Serial transmission and Parallel transmission
Digital encoding: Bipolar signaling and unipolar signaling, Manchester encoding
CODEC: COder/DECoder are a pair of devices for analog data conversion.
Pulse code modulation (PCM)
V.92 modem
ADSL and cable modem
Multiplexing and multiplexers
A multiplexer is a hardware device that puts several simultaneous transmissions on a single
communication circuit. There are FDM, TDM, STDM and IMUX.
2
03/07/16
Questions
Short-answer questions:
1.
Describe how data could be transmitted using amplitude modulation.
With amplitude modulation (AM), the amplitude or height of the wave is changed. One amplitude is
defined to be zero, and another amplitude is defined to be a one.
2.
What is a modem?
Modem is an acronym for MOdulator/DEModulator. A modem takes the digital electrical pulses received
from a computer, terminal, or microcomputer and converts them into a continuous analog signal that is
needed for transmission over an analog voice grade circuit. Modems are either internal (i.e., inside the
computer) or external (i.e., connected to the computer by a cable).
3.
What is QAM?
One popular technique is quadrature amplitude modulation (QAM). QAM involves splitting the symbol
into eight different phases (three bits) and two different amplitudes (one bit), for a total of 16 different
possible values. Thus, one symbol in QAM can represent four bits.
4.
How do ADSL and cable modem use multiplexing techniques?
ADSL uses FDM and cable modem uses STDM (see slides).
True/False questions:
4. In an analog signal, bandwidth is the difference between the highest and lowest frequencies in a band.
5. Some of the bandwidth of traditional telephone circuits is taken up by guardbands.
Multi-choice questions:
6.
Which of the following is a byte, under the normal definition?
a. 0
b. 1
c. 8 consecutive bits, such as 00011100, that represent one character
d. 325
e. a special character that is used for Apple computers only
7.
Which of the following is not an important characteristic of sound waves?
a. phase
b. frequency
c. amplitude
d. bandwidth
e. all of the above are important characteristics of sound waves
Chapter 4
Review focuses:
3
03/07/16
1.
Three functions of the data link layer:
Media access control, error control, and message delineation
2.
Media access control
X-ON/X-OFF, polling, Contention
3.
Error control in networks
1) Error prevention
2) Error detection
a. parity checking
b. LRC
c. Checksum
d. CRC
3) Error correction
a. Stop-and-wait ARQ
b. Continuous ARQ
c. Forward error correction
4.
Data link protocols
1)
2)
3)
4)
Start-stop
Asynchronous file transfer: XMODEM
Synchronous transmission: SDLC, Ethernet, Token ring, SLIP, PPP
Transparency problem
Key terms:
Attenuation, message delineation, bit-oriented protocol, byte-oriented protocol, byte-count protocol,
burst-error, Hamming code, white noise
Questions:
1.
Briefly describe how even parity and odd parity work.
Even parity is when the seven bits of an ASCII character have an even (2, 4, or 6) number of 1s, and
therefore a 0 is placed in the eighth parity position. Odd parity is when the seven bits of an ASCII character
have an odd (1, 3, 5, or 7) number of 1s, and therefore a 0 is placed in the eighth parity position.
2.
Compare and contrast stop-and-wait ARQ and continuous ARQ.
With stop-and-wait ARQ, the sender stops and waits for a response from the receiver after each message or
data packet. After receiving a packet, the receiver sends either an acknowledgment (ACK) if the message
was received without error, or a negative acknowledgment (NAK) if the message contained an error. If it is
an NAK, the sender resends the previous message. If it is an ACK, the sender continues with the next
message. Stop-and-wait ARQ is by definition, a half duplex transmission technique.
With continuous ARQ, the sender does not wait for an acknowledgment after sending a message; it
immediately sends the next one. While the messages are being transmitted, the sender examines the stream
of returning acknowledgments. If it receives an NAK, the sender retransmits the needed messages.
Continuous ARQ is by definition a full duplex transmission technique, because both the sender and the
4
03/07/16
receiver are transmitting simultaneously (the sender is sending messages, and the receiver is sending ACKs
and NAKs).
3.
What is transparency, and why is this a problem with SDLC?
SDLC and other bit-oriented protocols suffer from a transparency problem; that is, the protocol is not
“transparent” because it cannot automatically send all types of data with any bit patterns. It is possible that
the user’s data to be transmitted contains the same bit pattern as the flag (e.g., 01111110). If this is not
prevented, the receiver will mistakenly believe that this data marks the end of the frame and ignore all the
data that follows it.
4.
How does SDLC overcome their transparency problems?
The solution is called bit stuffing. Anytime the sender encounters five 1’s in a row in the user’s data to be
transmitted, the sender “stuffs” one extra bit, a 0, into the message and continues to transmit. Anytime the
receiver encounters five 1’s followed by a 0 (i.e., 111110), the receiver automatically deletes the 0 and
continues to process the data stream. Conversely, if the received encounters five 1’s followed by a 1 (i.e.,
111111) it knows to expect another zero as part of the flag. This technique works, but increases the
complexity of the protocol.
5
Download