COMP 4320 - Auburn University Biaz M1-9
A child starts numbering weeks from 0 (zero) when he get smacked. On Week 0 he got smacked when he asked 20 dollars. Assuming that the child asks for money each week, the child will ask _____ dollars on Week 2.
2
The subnet mask of IP Address 63.20.140.153/26 is _________.
255.255.255.192
The subnet mask of IP Address 200.20.14.53/27 is
255.255.255.224
The subnet mask of IP Address 200.20.14.53/27 is _________.
255.255.255.224
The subnet mask of IP Address 164.200.40.13/29 is _________.
255.255.255.248
Consider a 4-KHz noisy channel with a 20 db SNR. The sender is using the vocabulary set S to communicate. S = {apple, banana}. The maximal bit rate is _________ bps.
26,633
Consider this network of routers A, B, C, and D that are using Distance Vector Routing. Assume that all routers are turned on at the exactly same time 0. At time 0, the routers know only the cost to reach their immediate neighbors. At time 0 (Round 0), all routers send their distance vector to their immediate neighbors. Each 30 seconds, a new round of exchanges occurs. Fill in the table below with the distance vector that Node C sends its neighbors on Round 0. If the distance is not yet known, fill in with the value 99.
2;5;0;3
A class B network can assign unique addresses to up to _______________ hosts.
2^16-2
A hamming code of distance 4 can detect up to _______ corrupted bits in a received word..
3
Consider the following code C to encode this vocabulary L, M, N, and O: L : 0000 0000 M: 0100 0011 N: 1011 0101 O: 1111 1010 The Hamming distance of Code C is _______
3
Consider these two words: W1 = 1001 1000 W2 = 0101 1010 The Hamming distance between W1 and W2 is _____.
3
Consider a 4-KHz noisy channel with a 40 db SNR. The sender is using the vocabulary set S to communicate. S = {apple, banana}. The maximal bit rate is _________ bps.
53,151.42
Consider this code snapshot: String str = new String("CD456"); byte[] a = str.getBytes("UTF-16BE"); The content of a[9] is ___________.
54
A client sends five equal sized segments with sequence numbers 15, 35, 55, 75, 95 Segments with sequence numbers 55 and 75 get lost. The server will likely send a segment with acknowledgement number ______ after receiving segment with sequence number 35.
55
The class of IP Address 128.200.40.13 is _________.
B
The class of IP Address 164.200.40.13 is _________.
B
The class of IP Address 172.202.100.3 is _________.
B
The class of IP Address 191.20.240.213 is _________.
B
The Internet is a network covering typically _____
A planet
A wide area network (WAN) is a network covering typically _____
A planet Country Continent
A class A network can assign unique addresses to up to _______________ hosts. about 16 millions 224 None of these answers 216-2 220
About 16 millions
Based on Nyquist, any medium/channel (even perfect) has a maximal capacity to carry bits. Any signal running through a low-pass filter of bandwidth B will have a maximal data rate max. If the signal consists of V discrete levels. Nyquist theorem states: max = 2 _____ log 2 ( _____ ) bits/s
B V
This (These) protocol(s) use(s) distance vector routing or one of its improved variants.
BGP RIP
IP (Internet Protocol) may get service directly from these protocols.
Bluetooth Wifi Ethernet
Check all concepts/tools/protocols that may be used to modify (update) routing tables. Border Gateway Protocol IEEE 802.3 Open Shortest Path First Medium Access Control None of these answers
Border Gateway Protocol Open Shortest Path First
This (These) protocol(s) is (are) exterior gateway protocol(s) used to update routing tables.
Border Gateway Protocol (BGP)
This (These) protocol(s) is (are) routing protocol(s) (modifying routing tables) that could be used on the Internet backbone.
Border Gateway Protocol (BGP)
Select the best definition for framing.
Breaking a stream of bits into data units
With two or more users emitting/transmitting/talking, the MAC is needed for the following topologies.
Broadcast Half-duplex
The class of IP Address 192.202.100.3 is _________.
C
The class of IP Address 200.20.14.53 is _________.
C
The class of IP Address 212.202.100.3 is _________.
C
The class of IP Address 223.202.100.3 is _________.
C
On an Ethernet frame, the ________ field indicates whether the frame is corrupted.
CRC
These MAC protocols/schemes use Carrier Sense Multiple Access
CSMA CSMA/CD
These multiple access protocols/schemes must sense the medium before transmitting.
CSMA CSMA/CD
These multiple access protocols/schemes must listen to the medium while transmitting.
CSMA/CD
These protocols are multiple access protocols/schemes.
Carrier Sense Multiple Access (CSMA) Slotted Aloha Pure Aloha
In order to detect corrupted messages sent by the sender, these mechanisms may help at the receiver. Timer Checksum Retransmission None of these answers Error detection
Checksum Error Detection
In order to detect lost messages sent by the sender, these mechanisms may help at the sender.
Checksum (Quiz said this was incorrect) NOT None of these answers
A metropolitan area network (MAN) is a network covering typically _____
City
The transport layer may offer these services.
Congestion Control Flow control Reliability
_________ is the design issue that consists of avoiding that a sender overwhelms the receiver and any intermediary nodes.
Congestion control
Most applications on any host on the Internet will use the service offered by this protocol.
DNS
Check all applications that use UDP. IMAP Telnet ssh DNS Trivial FTP
DNS Trivial FTP
Check the protocol(s) that belong(s) to the application layer
DNS SMTP HTTP SSH
Most hosts on the Internet will have these protocols active on them.
DNS client DHCP client TCP
In the OSI Reference Model (computer networks), the MAC is a sublayer of the ________________ layer
Data Link
In the OSI reference model, the physical layer offers service directly to the [name1] layer.
Data Link
This issue is not a network software issue
Energy/Power management ------------------------------- Energy/Power management Addressing, naming Routing Error detection or correction None of these answers
In the OSI reference model, these services are offered by both the transport and data link layers.
Error control Flow control Addressing
_________ ________ is the design issue that consists of correcting errors in the received information.
Error correction
TCP offers these services
Error detection Congestion control Addressing Flow control Reliable in-order delivery Error correction
This (These) protocol(s) are used at the Link layer in the TCP/IP Reference model.
Ethernet IEEE 802.11 DSL (multiple versions - may only have one of these options listed)
A sender wants to send the following payload (message) using Flag Bytes with Byte Stuffing: FLAG Y X FLAG R where letters A-Z represent bytes. The sender must build and send this frame as _________.
FLAG ESC FLAG Y X ESC FLAG R FLAG
A sender wants to send the following payload (message) using Flag Bytes with Byte Stuffing: Y X ESC R where letters A-Z represent bytes. The sender must build and send this frame as _________.
FLAG Y X ESC ESC R FLAG
Select the best answer. A sender wants to send the following payload (message) using Flag Bytes with Byte Stuffing: Y X FLAG R where letters A-Z represent bytes. The sender must build and send this frame as _________.
FLAG Y X ESC FLAG R FLAG
A receiver receives the following frame using Flag Bytes with Byte Stuffing: FLAG ESC FLAG Y X ESC FLAG R FLAG where letters A-Z represent bytes. The payload, i.e., the message, sent (without the stuffing if any) inside this frame is _________.
FLAG Y X FLAG R
A sender wants to send the following payload (message) using Flag Bytes with Byte Stuffing: Y X Z R where letters A-Z represent bytes. The sender must build and send this frame as _________.
FLAG Y X Z R FLAG
Check all applications that use TCP. None of these answers Trivial FTP FTP HTTP SMTP DNS
FTP HTTP SMTP
These application layer protocols use usually TCP at the transport layer.
HTTP SSH FTP
Check all that apply to IEEE 802.5 (Token-Ring)
Has an excellent channel efficiency Guarantees upper bound on delivery time Is a kind of time division multiplexing MA
Check all that apply to contention-based multiple access protocols
Have a good average delivery time Do not offer an upperbound on the delivery time.
In the TCP/IP Reference Model, your wireless router/access point uses this (these) layer(s) when it is forwarding your streaming traffic.
(Partial 3.13/6.25) Data Link / Link Internet / Network Physical
A 125-byte frame is sent at a bitrate of 1 Mbps over a copper cable 1000 kms long. Recall that a copper cable has a propagation speed about 2/3 the speed of light. The propagation time is equal to _________ s.
0.005
Answer this question based congestion control and flow control as performed by TCP. Suppose that a TCP sender 1) has cwnd set to 8,000 bytes 2) has 4,000 bytes available in its own input buffers 3) receives a segment with an advertised window of 0 bytes. The TCP sender will set its offered window Wnd to ________ bytes.
0
Consider this code snapshot: String str = new String("CD456"); byte[] a = str.getBytes("UTF-16"); The content of a[2] is ___________.
0
Consider this code snapshot: String str = new String("CD456"); byte[] a = str.getBytes("UTF-16"); The content of a[6] is ___________.
0
Consider this code snapshot: String str = new String("CD456"); byte[] a = str.getBytes("UTF-16BE"); The content of a[0] is ___________.
0
Consider this code snapshot: String str = new String("CD456"); byte[] a = str.getBytes("UTF-16BE"); The content of a[4] is ___________.
0
A 125-byte frame is sent at a bitrate of 1 Mbps over a copper cable 2000 kms long. Recall that a copper cable has a propagation speed about 2/3 the speed of light. The propagation time is equal to _________ s.
0.01
A 125-byte frame is sent at a bitrate of 1 Mbps over a copper cable 1000 kms long. Recall that a copper cable has a propagation speed about 2/3 the speed of light. The transmission time is equal to _________ s.
0.001
A 1250-byte frame is sent at a bitrate of 10 Mbps over a copper cable 1000 kms long. Recall that a copper cable has a propagation speed about 2/3 the speed of light. The transmission time is equal to _________ s.
0.001
The subnet mask of network N is 255.255.255.240. This network N can assign unique addresses to up to _______________ hosts. 14 6 8 16 None of these answers
14
In the IPv4 header, the _________ field is used to detect corrupted bit(s) in the IP header of an IPv4 packet.
Header Checksum
DNS is a service that maps ______________ to ______________. None of these answers IP Addresses : MAC Addresses MAC Addresses : IP Addresses IP Addresses : Host Names Host Names : IP Addresses
Host Names : IP Addresses
Consider this code snapshot: String str = new String("CD456"); byte[] a = str.getBytes("UTF-16BE"); The content of a[7] is ___________.
None of these answers
Consider this code snapshot: String str = new String("CD456"); byte[] a = str.getBytes(); The content of a[3] is ___________.
None of these answers
Consider this incomplete code snapshot: int a, e; long h; short b, f; byte g; DataOutputStream c; DatagramSocket d; InputStream m; ByteArrayOutStream x = new ByteArrayOutputStream(); c = new DataOutputStream(x); DataInputStream v = new DataInputStream(m); Select any valid statement. None of these answers f = v.readInt(); f = v.readLong(); f = c.readInt(); f = c.readLong();
None of these answers
In order to detect corrupted messages sent by the sender, these mechanisms may help at the sender.
None of these answers
In order to detect lost messages sent by the sender, these mechanisms may help at the receiver.
None of these answers
In the IPv4 header, the _________ field is used to detect corrupted bit(s) in an IPv4 packet. fragment offset None of these answers protocol identification Header Checksum
None of these answers
In the OSI reference model, the transport layer does not provide/perform this (these) service/function(s).
None of these answers
In the TCP/IP model, TCP uses this (these) protocol(s) at the application layer.
None of these answers
In the TCP/IP reference model, UDP belongs to the _______________ layer.
None of these answers
Select the best answer. Assume you just received data is stored in network byte order. Below is a snapshot of the data memory storing data. The first column is the address while second one is the data at that address. The integer (int) variable at address 0x1000 is ___________. Address Content 0x1000 0x34 0x1001 0xB4 0x1002 0x20 0x1003 0xAE 0x1004 0x42 0x1005 0x67 0x1006 0x19 0x1007 0x3C 0x1008 0x8C 0x20AE None of these answers 0x6742AE20 0x20AE4267 0xAE20
None of these answers
The UDP header can have up to _______ bytes for optional fields.
None of these answers
The function call Socket is used by a ________________.
None of these answers
The function call SocketServer is called by a ________________.
None of these answers
The function call socketclient is used by a ________________.
None of these answers
The function call socketserver is called by a ________________. (Pay attention! Java is case sensitive)
None of these answers
The method DatagramPacket(a, b, c, d) returns a result of type _________.
None of these answers
The network ID of IP Address 172.20.14.53 is _________.
None of these answers
The physical layer offers in general these services/functions.
None of these answers
___________ is necessary when _________ at the sender is lower (than at the receiver).
None of these answers
DNS is a service that maps ______________ to ______________. None of these answers Host names : Port Numbers IP Addresses : MAC Addresses MAC Addresses : IP Addresses Port Numbers : Host Names
None of these answers (If it were an option, the answer would be Host names : IP Addresses)
These devices run routing daemons to update routing tables on the Internet.
Routers L3 switches
_________________ is the design issue that consists of finding a path (list of switchs to traverse) between a source host and a destination host.
Routing
Check all concepts/tools/protocols that may be used to modify (update) routing tables. Distance Vector Routing Link State Routing Internet Protocol Routing Information Protocol None of these answers
Routing Information Protocol Distance Vector Routing Link State Routing
This (These) protocol(s) is (are) interior gateway protocol(s) used to update routing tables.
Routing Information Protocol (RIP) Open Shortest Path First (OSPF)
Check the application layer protocol(s) used for the transfer of an email from a Message Transfer Agent to another.
SMTP ESMTP
This (These) protocol(s) are used at the Application layer in the TCP/IP Reference model.
SMTP HTTP RTP DNS (multiple versions - may only have one of these options listed)
A receiver receives the following frame using Flag Bytes with Byte Stuffing: FLAG Y X ESC FLAG R FLAG where letters A-Z represent bytes. The payload, i.e., the message, sent (without the stuffing if any) inside this frame is _________.
Y X FLAG R
The following frame was "sniffed" off an Ethernet network. Below, we removed the preamble. We use only hexadecimal numbers without using "0x" or "h" symbols. This frame certainly carries as payload _______________.
Since the preamble is removed, look at bytes 13 and 14. These will determine payload (google EtherType) 0x0800 - IPv4 0x86DD - IPv6 0x0806 - ARP 0x8035 - RARP
Any TCP client socket program in Java must use this function call to establish a socket.
Socket
Check all true statements about the Weekly Pocket Money Problem.
Some children may not ask for any pocket money on some weeks A child may request and receive all the available weekly allocation B.
TCP and UDP headers share these fields.
Source Port number Destination Port number Checksum
Check the main operations performed to send and receive emails.
Submission Transfer Delivery (All options may not be available)
Check the transport layer protocol(s) used for the submission of an email by the Sender User Agent to the Message Transfer Agent.
TCP
Check the transport layer protocol(s) used for the transfer of an email from a Message Transfer Agent to another.
TCP
In the TCP/IP model, FTP uses most of the time this protocol at the transport layer.
TCP
In the TCP/IP model, HTTP uses most of the time this protocol at the transport layer.
TCP
In the TCP/IP model, SMTP uses most of the time this protocol at the transport layer.
TCP
The Border Gateway Protocol (BGP) uses _______ as its "transport" protocol.
TCP
These protocols are transport layer protocols used over the Internet.
TCP UDP
Match the protocols to their transport protocols they use. BGP OSPF RIP
TCP raw sockets UDP
In the OSI reference model, TCP belongs to the _______________ layer.
Transport
In the OSI reference model, UDP belongs to the _______________ layer.
Transport
In the OSI reference model, the [name1] layer provides service directly to the session layer.
Transport
In the OSI reference model, the [name1] layer receives service directly from the network layer.
Transport
In the OSI reference model, this end-to-end layer deals with addressing and congestion control (besides other functions).
Transport
In the OSI reference model, this end-to-end layer deals with error control and flow control (besides other functions).
Transport
In the OSI reference model, this layer is the lowest end to end layer (closest to the physical layer).
Transport
In the TCP/IP Reference Model, your laptop uses this (these) layer(s) when you are browsing the Internet (using an application like Firefox, Chrome, or Internet Explorer).
Transport Application Link Internet/Network
The TCP/IP Reference Model includes these layers.
Transport Internet Link Application (multiple versions - may only have one of these options listed)
The OSI Reference Model includes this (these) layer(s).
Transport Physical Application
For reliability, a timer is necessary at the sender if the channel can loose packets.
True
In the OSI reference model, A transport protocol data unit (TPDU) is encapsulated inside a network protocol data unit.
True
In the OSI reference model, a network protocol data unit encapsulates a transport protocol data unit.
True
In the TCP/IP reference model, a UDP datagram can be a packet's payload.
True
In the TCP/IP reference model, a packet can be a frame's payload.
True
In the TCP/IP reference model, an application message can be a datagram's payload. True False
True
In the TCP/IP reference model, an application message can be a segment's payload.
True
Routing protocols such as RIP, OSPF or BGP periodically update the routing tables.
True
On an Ethernet frame, the ________ field indicates whether the frame carries an IP, an ARP, or a RARP packet/
Type
This word, sent using odd parity, is received. Word = 1011 1011 0 Was the word corrupted?
Yes
The function call ServerSocket is used by ________________.
a Java TCP Server to establish a TCP server
ARP returns as output ___________________.
a MAC address
The following frame was "sniffed" off an Ethernet network. Below, we removed the preamble and the frame header. We use only hexadecimal numbers without using "0x" or "h" symbols. Below are the IP and TCP headers. Here is the IP packet in network byte order: 46 6F 06 00 01 24 00 00 40 06 56 7A 83 CC 0E 65 83 CC 34 43 23 00 4E 21 5E 32 78 1C 12 67 89 E2 50 10 00 34 67 F1 B3 This IP packet carries ______ . The source port number is _____ . The destination port number is ______.
a TCP segment 5E32 781C
A DNS client uses ________ at the transport layer.
UDP
A DNS server uses ________ at the transport layer.
UDP
In the TCP/IP model, DNS uses most of the time this protocol at the transport layer.
UDP
The Routing Information Protocol (RIP) uses _______ as its "transport" protocol.
UDP
Check the protocol(s) that belong(s) to the transport layer
UDP TCP
This (These) protocol(s) are used at the Transport layer in the TCP/IP Reference model.
UDP TCP (there are multiple versions so there may only be one of these in the list of options)
Match these protocols in the TCP/IP reference model to the (transport) port number they use. Choose "N/A" if the protocol does not use a port number.
UDP -- N/A IMAP -- 143 TCP -- N/A HTTP -- 80 DNS -- 53 Telnet -- 23 IP -- N/A TFTP -- 69 SMTP -- 25 FTP -- 21 ssh -- 22 (May not have all listed)
Match protocols to their original RFCs.
UDP RFC 768 TCP RFC 793 IP RFC 791 ICMP RFC 792
Check all features/services SMTP allows/offers.
Used to transfer data in plain from the Sender User Agent to the Message Transfer Agent Used to transfer data in plain from to a Message Transfer Agent to a Message Transfer Agent Transfers plain ASCII text (May not have all listed)
Pair/Matching related expressions/variables. Flow control Congestion control Offered windows
Wa: Advertised value by the receiver cwnd: A variable maintained by the sender to adapt to network conditions Min(Wa, cwnd)
____________ is a popular wireless MAN protocol.
WiMax
The rules governing the request/delivery of a service between adjacent layers is called _______________.
an interface
A medium impacts a signal it carries in different ways. In general, a coaxial cable __________ a signal that is a pure sine (cosine) wave (i.e., a signal using one frequency only).
attenuates delays
A medium impacts a signal it carries in different ways. In general, a twisted pair cable __________ a signal that is a pure sine (cosine) wave (i.e., a signal using one frequency only).
attenuates delays
A medium impacts a signal it carries in different ways. In general, a medium __________ a signal that is a baseband signal.
attenuates delays distorts
A medium impacts a signal it carries in different ways. In general, a coaxial cable __________ a signal that is a baseband signal.
attenuates distorts delays
A medium impacts a signal it carries in different ways. In general, an optical fiber __________ a signal that is a mix (sum) a signals using different frequencies.
attenuates distorts delays
A medium impacts a signal it carries in different ways. In general, a coaxial cable __________ a signal that is a mix (sum) a signals using different frequencies.
attenuates delays distorts
A medium impacts a signal it carries in different ways. In general, a twisted pair cable __________ a signal that is a mix (sum) a signals using different frequencies.
attenuates delays distorts
Complete the words starting with the indicated first letter. Do not repeat the first letter. The physical layer deals with transporting r__________ b___________
aw; its
In the CSMA/CD acronym, CD stands for ________________.
collision detection
The application layer provides this (these) service(s).
communicates with the end user. allows the end users to use the network services.
Check all features that TCP offers while UDP does NOT.
congestion control error correction (retransmissions) Reliable in-order delivery Flow control (Not all options may appear)
In the TCP/IP Reference Model, your Bluetooth interface uses this (these) layer(s) when you are browsing the Internet.
data Link / Link
In the OSI reference model, the [name1] layer provides service directly to the network layer.
data link
In the OSI reference model, this layer provides service directly to the network layer.
data link
Fill in the blanks. Some words are hinted by the first letter. Do not repeat the first letter. The ______ layer provides service directly to the network layer and has two sublayers: L _____ and M _____
data link ogical link layer edium access control
When implementing a connectionless service, we use ___________________ to carry messages.
datagram
The physical layer provides this (these) service(s).
deals with the mechanical/electrical characteristics of the transmission medium used. transmits on channels raw bits.
A medium impacts a signal it carries in different ways. In general, an optical fiber __________ a signal that is a pure sine (cosine) wave (i.e., a signal using one frequency only).
delays attenuates
A medium impacts a signal it carries in different ways. In general, an optical fiber __________ a signal that is a baseband signal.
delays attenuates distorts
The objective(s) of the physical layer is (are) to ______________.
deploy transmission techniques to optimize the use of a medium specify the electrical and mechanical specifications to establish communications send as many bits per second as possible without corruption or loss
The data link layer provides this (these) service(s).
detects transmission errors. controls the access to the medium.
Check all that apply. Any medium impacts a signal it carries in different ways. In general, a medium __________ a signal that is a mix (sum) a signals using different frequencies. None of these answers delays separates amplifies distorts attenuates
distorts attenuates delays
DNS stands for _____ _____ _____ .
domain name system
This question is about CSMA schemes. When a collision between two or more frames occurs, each station will _____________.
drop all damaged frames even if only one bit is damaged in each.
In the context of computer networks, DHCP stands for _________________.
dynamic host configuration protocol
Select the best answer. Consider this incomplete code snapshot: int a, e; long h; short b, f; byte g; DataOutputStream c; DatagramSocket d; InputStream m; ByteArrayOutStream x = new ByteArrayOutputStream(); c = new DataOutputStream(x); DataInputStream v = new DataInputStream(m); Select any valid statement.
e = v.readInt();
The transport layer offers in general these services/functions.
error control congestion control addressing/naming flow control
________________ consists of correcting errors in the received information.
error correction
_________ ________ is the design issue that consists of finding errors in the received information.
error detection
In TCP/IP reference model, a frame can be a packet's payload.
false
Routing protocols such as IP, RIP, OSPF or BGP periodically update the routing tables.
false
Using Pure Aloha, a station must sense the medium before transmitting.
false
Using Slotted Aloha, a station can transmit any time a frame is ready.
false
During the lecture, we encoded the three boolean members single, rich, and female using one byte b using the following rules as illustrated by this figure: bit 7 bit 6 bit 5 bit 4 bit 3 bit 2 bit 1 bit 0 0 0 0 0 0 female rich single - bit 0 is the least significant bit. bit 0 is set to 1 if the friend is single. - bit 1 is set to 1 if the friend is rich. - bit 2 is set to 1 if the friend is female. Suppose that after encoding the three boolean members single, rich, and female of a friend f into a byte b, we get b = 0x5. Check all that apply about the friend f.
female single
The network layer provides this (these) service(s).
finds paths between senders and receivers. may handle congestion.
___________ is necessary when _________ at the receiver is lower (than at the sender).
flow control : processing speed
In the TCP/IP model, a _________ is for a ________ what a packet is for a segment.
frame:packet
Check the functions/services offered by the logical link layer.
framing flow control addressing error control
Local radio stations use in general ______________ division multiplexing to share the medium (air).
frequency
The GSM (Global System for Mobile applications) uses ____________ division multiplexing.
frequency time
Collision-free (i.e., with dedicated channels) multiple access protocols ____________.
guarantee upper bounds on delivery time
In the context of computer networks, ICMP stands for _________________.
internet control message protocol
Consider this code snapshot: String str = new String("CD456"); byte[] a = str.getBytes(); The content of a[5] is ___________.
invalid
A (TCP or UDP) port _______
is a 16 bit number varies from 0 to 65535
Select the best answer. A garment that is made with only one kind of fabric is like a signal that __________________. cannot be attenuated cannot be delayed None of these answers is a pure sine or cosine (periodical signal with one frequency) is a periodical signal with multiple frequencies
is a pure sine or cosine (periodical signal with one frequency)
The call ServerSocket in Java performs these actions.
it binds to a port it may adjust the incoming queue it creates a socket
The call Socket in Java performs these actions
it creates a socket it may bind to a port it connects to a server
Fill in the words starting with the letters indicated: do not repeat the first letter(s). The physical layer deals with the E___________ and M___________ specifications.
lectrical; echanical
To reduce their design complexity, most networks architectures are organized as ___________.
levels, stacks, layers
The data link layers has two sublayers: -- link and -- control
logical medium access
This service does not belong to the logical link layer.
medium access control
Collision Detection is used to _______________
minimize the time wasted by collisions
Broadcast channels are also referred to as ___________ channels.
multiaccess random access
On a ______________ network, frames (packets) sent by any machine on that link are received (heard) by a subset of machines.
multicast
A header is a message exchange between Layer n and Layer ________.
n
In the OSI reference model, IP (Internet Protocol) belongs to the _________ layer.
network
In the OSI reference model, an instance in the transport layer wants to send a data unit m. The first header added to m will be a header belonging to the ________ layer.
network
A set of layers and protocols is called a _______ __________.
network architecture
In the TCP/IP reference model, an instance in the internet layer wants to send a data unit m. The first header added to m will be a header belonging to the ________ layer.
none of these answers
Two key functions/services offered by the network layer are R___________ and A___________. Do not repeat the first letter(s).
outing; ddressing
In the TCP/IP model, a _________ is for a ________ what a frame is for a packet.
packet : segment
In the TCP/IP model, a _________ is for a ________ what a segment is for a packet.
packet:frame
A protocol defines the communications rules between _________ layers.
peer
Layers at the same level on two communicating machines are called _________ .
peer layers
PSK stands for
phase shift keying
In the OSI reference model, the [name1] layer provides service directly to the data link layer.
physical
Wide area networks (WANs) often use ___________________ channel(s).
point-to-point
In the OSI reference model, an instance in the application layer wants to send a data unit m. The first header added to m will be a header belonging to the ________ layer.
presentation
In the OSI reference model, socket programming functions like ntohs(), htons(), ntohl(), or htonl() belong logically to the [name1] layer.
presentation
In the OSI reference model, the [name1] layer provides service directly to the application layer.
presentation
In the OSI reference model, the [name1] layer receives service directly from the session layer.
presentation
The delay for a frame from sender to receiver depends on the ______________.
propagation speed distance between the sender and the receiver bit rate propagation speed frame size
Peer layers use a [name1] to communicate.
protocol
A list of the protocols used by certain system, one protocol per layer, is called a _______ __________.
protocol stack
Fill in the blanks. Some words are hinted by the first letter. Do not repeat the first letter. The logical link sublayer provides three services: F_____, E_____, and F_____
raming rror control low control
Complete the words (do not repeat the first letter(s) already provided) The functions/services offered by the data link layer are: 1) F___________ 2) E___________ 3) Fl___________
raming; rror control; ow control
Based on the textbook, broadcast channels are sometimes referred as ______________ channels
random access multiaccess
The Open Shortest Path First protocol (OSPF) uses _______ as its "transport" protocol.
raw sockets
Assuming that congestion control is not used, flow control protects the input buffers of these devices from overflowing. sender intermediary nodes receiver links None of these answers
receiver
Assuming that flow control is not used, congestion control may protect the input buffers of these devices from overflowing.
receiver intermediary nodes
In general, an HTTP _________________ is longer than a(n) ________________.
response: HTTP request
Layered design consists of ________________.
restricting communications to adjacent or peer layers layers hiding details from each other dividing a complex task in multiple subtasks
Check all that apply. During the lecture, we encoded the three boolean members single, rich, and female using one byte b using the following rules as illustrated by this figure: bit 7 bit 6 bit 5 bit 4 bit 3 bit 2 bit 1 bit 0 0 0 0 0 0 female rich single - bit 0 is the least significant bit. bit 0 is set to 1 if the friend is single. - bit 1 is set to 1 if the friend is rich. - bit 2 is set to 1 if the friend is female. Suppose that after encoding the three boolean members single, rich, and female of a friend f into a byte b, we get b = 0x6. Check all that apply about the friend f.
rich female
Consider a system with 4 stations X,Y, Z, and W that use CDMA. These four stations use the chip sequences x, y, z and w that are all mutually orthogonal. Stations X, Y, Z, and W send 1, 1, 0, and 1, respectively. The resulting signal S on the medium is equal to ______.
x + y - z + w
The Internet is a _______ switching system.
store-and-forward packet
Any periodic signal can be constructed as the [name1] of a number of cosine and sine waves of different frequencies.
sum
___ connect two or more ___
switches, transmission lines
The acknowledgement (ack) number in the TCP header is ___________________.
the number of the next expected byte (to be received)
The sequence number in the TCP header is ___________________.
the sequence number of the first byte in a segment
A medium attenuates a signal means that ______________.
the signal strength (amplitude) decreases as the signal travels further.
Check all that apply about TCP or UDP port numbers
they are 16 bit numbers they range from 0 to 65535 TCP and UDP ports are independent from each other
Congress representatives (when well behaving) use ____________ division multiplexing to participate in the debate.
time
The propagation time depends on the ______________.
transmission medium propagation speed distance between the sender and the receiver
In the IPv4 header, the Protocol (number) is related to the protocol used by the payload at the__________ layer. Group of answer choices None of these answers network (data) link physical transport
transport
In the OSI reference model, an instance in the session layer wants to send a data unit m. The first header added to m will be a header belonging to the ________ layer.
transport
In the OSI reference model, this layer gets service directly from the network layer.
transport
In the TCP/IP model, an instance in the application layer wants to send a data unit m. The first header added to m will be a header belonging to the ________ layer.
transport
In the TCP/IP model, consider an HTTP request m. The first header added to m will be a header belonging to the ________ layer.
transport
In the TCP/IP reference model, a segment can be a packet's payload.
true
The word 1001 0111 is received using the Hamming code C. The original word that was most likely sent originally (before corruption) was _____________. Code C uses four codewords L, M, N, and O defined as follows: Code C: L : 0000 0000 M: 0100 1011 N: 1011 0101 O: 1111 1010
undetermined
Point-to-point transmission with exactly one sender and exactly one receiver is sometimes called ___________.
unicasting
When tuned to one channel, check all that apply to IEEE 802.11 (Wifi)
uses a contention based multiple access protocol has in general a lower average time delivery than Token-ring
The size of the options field in an IPv4 header is ___________ bytes.
variable
When implementing a connection-oriented service, we use ___________________ to carry messages.
virtual circuits
Numerical answer. Four senders share a 10 Gbps channel using time division multiplexing. Each sender will have a sending bit rate of about ________ Gbps.
#20
Answer this question in the context of the strategy described in class and adopted by each child to manage Weekly Pocket Money Problem. This week, the child asked and received $40. Next week, the child can certainly ask for and receive ______ without being smacked for sure.
$0
Answer this question in the context of the strategy described in class and adopted by each child to manage Weekly Pocket Money Problem. After five years using this strategy, $40 is the average sum received every week by each child in a family with 4 children. The total available weekly allocation is most likely about _______ dollars.
$160
Check the information that a DHCP Client provides.
(It must be None of these answers) NOT IP address of gateway router IP address Subnet mask IP address of DNS server Name of the DNS server
The subnet mask of IP Address 128.200.104.13/19 is _________.
255.255.224.0
The subnet mask of IP Address 172.202.100.3/20 is _________.
255.255.240.0
A client has in its sending buffer these equal sized segments with sequence numbers 15, 25, 35,45, 55, 65, and 75. Based on congestion control and flow control, its offered window is 20 bytes. So far, the client sent segments with Sequence numbers 15, 25, and 35. The highest acknowledgement it received is 25. The next segment that the client could send is segment with Sequence number to __________ . (Answer -1 if the client cannot send anymore new segments).
-1
Suppose that cwnd = 20 bytes. The latest segment received by a client had the advertised window set to 40 bytes. The client has in its sending buffer these equal sized segments with sequence numbers 15, 25, 35,45, 55, 65, and 75. So far, the client sent segments with Sequence numbers 15, 25, and 35. The highest acknowledgement it received is 25. The next segment that the client could send is segment with Sequence number to __________. (Answer -1 if the client cannot send anymore new segments).
-1
Check all that apply to UDP
-UDP offers a minimal service to the application layer -uses a checksum to detect corrupted datagrams
Consider a system with 4 stations X,Y, Z, and W that use CDMA. These four stations use the chip sequences x, y, z and w that are all mutually orthogonal. Stations X, Y, Z, and W send 0, 0, 1, and 0, respectively. The resulting signal S on the medium is equal to ______.
-x-y+z-w
Consider a system with 4 stations X,Y, Z, and W that use CDMA. These four stations use the chip sequences x, y, z and w that are all mutually orthogonal. Stations X, Y, Z, and W send 0, 0, 1, and 0, respectively. If S is the resulting signal S then x.S = ________.
-||x||^2
Consider a system with 4 stations X,Y, Z, and W that use CDMA. These four stations use the chip sequences x, y, z and w that are all mutually orthogonal. Stations X, Y, Z, and W send 0, 0, 1, and 0, respectively. If S is the resulting signal S then y.S = ________.
-||y||^2
For DNS, these domain names are generic . .com .edu .us .net None of these answers .museum .org
.com .edu .net .org .museum
This question is about how the Internet Protocol (IP) handles a packet P and decides where to deliver it. Consider a device D with IP address 134.89.200.145/24. On Device D, IP is handed a packet P with a destination IP address 134.89.200.145. Provide the order in which IP on Device D will perform these actions. The earliest action must be assigned 1. Any action that is incorrect or is not performed must be assigned the number 0. send Packet P to the device with IP address 134.89.200.145 check if Packet P is for Device D read the routing table ask ARP for a MAC address corresponding to IP Address 131.89.200.145 ask ARP for a MAC address corresponding to IP Address 131.89.200.1 hand Packet P to the appropriate protocol at the transport layer. check if the IP destination address of Packet P is local send Packet P to the device with IP address 134.89.200.128
0 1 0 0 0 2 0 0
This question is about how the Internet Protocol (IP) handles a packet P and decides where to deliver it. Consider a device D with IP address 134.89.200.145/24. On Device D, IP is handed a packet P with a destination IP address 131.204.14.65. Provide the order in which IP on Device D will perform these actions. The earliest action must be assigned 1. Any action that is incorrect or is not performed must be assigned the number 0. send Packet P to the device with IP address 134.205.14.65 check if Packet P is for Device D read the routing table ask ARP for a MAC address corresponding to IP Address 131.89.14.65 ask ARP for a MAC address corresponding to IP Address 131.89.200.254 hand Packet P to the appropriate protocol at the transport layer. check if the IP destination address of Packet P is local send Packet P to the device with IP address 134.89.200.254
0 1 3 0 4 0 2 5
Consider a device D with IP address 134.89.200.145/24. On Device D, IP is handed a packet P with a destination IP address 131.204.64.170. Provide the order in which IP on Device D will perform these actions. The earliest action must be assigned 1. Any action that is incorrect or is not performed must be assigned the number 0. SSQs-RoutingTable.png send Packet P to the device with IP address 134.89.200.128 read the routing table ask ARP for the MAC address corresponding to IP Address 134.89.200.54 ask ARP for the MAC address corresponding to IP Address 131.89.200.128 check if the IP destination address of Packet P is local send Packet P to the device with IP address 134.89.200.54
0 2 0 0 1 0
Consider a device D with IP address 134.89.200.145/24. On Device D, IP is handed a packet P with a destination IP address 131.204.65.175. Provide the order in which IP on Device D will perform these actions. The earliest action must be assigned 1. Any action that is incorrect or is not performed must be assigned the number 0. SSQs-RoutingTable.png -send Packet P to the device with IP address 134.89.200.54 -read the routing table -ask ARP for a MAC address corresponding to IP Address 134.89.200.254 -ask ARP for a MAC address corresponding to IP Address 131.89.200.54 -check if the IP destination address of Packet P is local -send Packet P to the device with IP address 134.89.200.254
0 2 0 0 1 0
This question is about how the Internet Protocol (IP) handles a packet P and decides where to deliver it. Consider a device D with IP address 134.89.200.145/24. On Device D, IP is handed a packet P with a destination IP address 131.204.64.170. Provide the order in which IP on Device D will perform these actions. The earliest action must be assigned 1. Any action that is incorrect or is not performed must be assigned the number 0. SSQs-RoutingTable.png send Packet P to the device with IP address 134.89.200.128 read the routing table ask ARP for the MAC address corresponding to IP Address 134.89.200.67 ask ARP for the MAC address corresponding to IP Address 131.89.200.128 check if the IP destination address of Packet P is local send Packet P to the device with IP address 134.89.200.67
0 2 0 0 1 0
This question is about how the Internet Protocol (IP) handles a packet P and decides where to deliver it. Consider a device D with IP address 134.89.200.145/24. On Device D, IP is handed a packet P with a destination IP address 131.204.65.170. Provide the order in which IP on Device D will perform these actions. The earliest action must be assigned 1. Any action that is incorrect or is not performed must be assigned the number 0. send Packet P to the device with IP address 134.89.200.67 read the routing table ask ARP for the MAC address corresponding to IP Address 134.89.200.254 ask ARP for the MAC address corresponding to IP Address 131.89.200.67 check if the IP destination address of Packet P is local send Packet P to the device with IP address 134.89.200.254
0 2 0 0 1 0
This question is about how the Internet Protocol (IP) handles a packet P and decides where to deliver it. Consider a device D with IP address 134.89.200.145/24. On Device D, IP is handed a packet P with a destination IP address 131.204.64.159. Provide the order in which IP on Device D will perform these actions. The earliest action must be assigned 1. Any action that is incorrect or is not performed must be assigned the number 0. send Packet P to the device with IP address 134.89.200.254 read the routing table ask ARP for the MAC address corresponding to IP Address 134.89.200.67 ask ARP for the MAC address corresponding to IP Address 131.89.200.254 check if the IP destination address of Packet P is local send Packet P to the device with IP address 134.89.200.67
0 2 3 0 1 4
This question is about how the Internet Protocol (IP) handles a packet P and decides where to deliver it. Consider a device D with IP address 134.89.200.145/24. On Device D, IP is handed a packet P with a destination IP address 131.204.65.159. Provide the order in which IP on Device D will perform these actions. The earliest action must be assigned 1. Any action that is incorrect or is not performed must be assigned the number 0. send Packet P to the device with IP address 134.89.200.67 read the routing table ask ARP for the MAC address corresponding to IP Address 134.89.200.1 ask ARP for the MAC address corresponding to IP Address 131.89.200.67 check if the IP destination address of Packet P is local send Packet P to the device with IP address 134.89.200.1
0 2 3 0 1 4
This question is about how the Internet Protocol (IP) handles a packet P and decides where to deliver it. Consider a device D with IP address 134.89.200.145/24. On Device D, IP is handed a packet P with a destination IP address 131.204.65.170. Provide the order in which IP on Device D will perform these actions. The earliest action must be assigned 1. Any action that is incorrect or is not performed must be assigned the number 0. send Packet P to the device with IP address 134.89.200.67 read the routing table ask ARP for the MAC address corresponding to IP Address 134.89.200.54 ask ARP for the MAC address corresponding to IP Address 131.89.200.67 check if the IP destination address of Packet P is local send Packet P to the device with IP address 134.89.200.54
0 2 3 0 1 4
A 125-byte frame is sent at a bitrate of 10 Mbps over a copper cable 1000 kms long. Recall that a copper cable has a propagation speed about 2/3 the speed of light. The transmission time is equal to _________ ms.
0.1
A 1250-bits frame is sent at a bitrate of 10 Mbps over a copper cable 1000 kms long. Then the transmission time is _________ ms. Propagation speed on copper is about 2/3 the speed of light. The speed of light is about 300,000 km/s.
0.125
Five senders share a 1 Mbps channel using frequency division multiplexing. Each sender will have a sending bit rate of about ________ Mbps.
0.2
Four senders share a 1 Gbps channel using time division multiplexing. Each sender will have a sending bit rate of about ________ Gbps.
0.25
A sender and a receiver are using a 100 km copper cable to communicate. The propagation speed is about 2/3 the speed of light. They use stop and wait protocol. The frame size is 500 bytes. The bit rate is 250 Kbps. The propagation time is _____ ms. The transmission time is _____ ms. The throughput is _____ Kbps. The efficiency is _____ .
0.50 16.00 235.29 0.94
Fill in multiple blanks. This exercise is about framing. The following character encoding is used in a data link protocol: X: 01000111 Y: 11100111 FLAG: 01111110 ESC:11100111 Show the bit sequence transmitted (in binary) for the four-character frame X Y ESC FLAG when "flag bits with bit stuffing" is used. Pay attention to the order. Fill in the following 8-bit groups. Some groups at the end may have less than 8 bits. If the group is empty, fill it with "-" (ONE minus character).
01111110 ;01000111 ;11010011 ;11101001 ;11011111 ;01001111 ;110 ;-
The following frame was "sniffed" off an Ethernet network. Below, we removed the preamble. We use only hexadecimal numbers without using "0x" or "h" symbols. Here is what was collected in network byte order: 76 3E 56 E2 08 00 08 06 80 35 08 06 08 00 32 7F 4C 2D 5C 4B EE DD .... The source MAC address is ___________________.
08 06 80 35 08 06
Consider this network of routers A, B, C, and D that are using Distance Vector Routing. Assume that all routers are turned on at the exactly same time 0. At time 0, the routers know only the cost to reach their immediate neighbors. At time 0 (Round 0), all routers send their distance vector to their immediate neighbors. Each 30 seconds, a new round of exchanges occurs (Round 1, 2,...). Fill in the table below with the distance vector that Node A sends its neighbors on Round 1. If the distance is not yet known, fill in with the value 99.
0;1;2;2
Consider this network of routers A, B, C, and D that are using Distance Vector Routing. Assume that all routers are turned on at the exactly same time 0. At time 0, the routers know only the cost to reach their immediate neighbors. At time 0 (Round 0), all routers send their distance vector to their immediate neighbors. Each 30 seconds, a new round of exchanges occurs. Fill in the table below with the distance vector that Node A sends its neighbors on Round 0. If the distance is not yet known, fill in with the value 99.
0;1;2;99
Match the TYPE values with the kind of payload. (Some values were not covered in class. Search for them)
0x0800 - IPv4 0x0806 - ARP 0x8035 - RARP 0x8137 - IPX 0x86DD - IPv6
Assume you just received data is stored in network byte order. Below is a snapshot of the data memory storing data. The first column is the address while second one is the data at that address. The integer (short) variable at address 0x1002 is ___________. Address Content 0x1000 0x34 0x1001 0xB4 0x1002 0x20 0x1003 0xAE 0x1004 0x42 0x1005 0x67 0x1006 0x19 0x1007 0x3C 0x1008 0x8C
0x20AE
Assume you just prepared data stored in little endian order. Below is a snapshot of the data memory storing data. The first column is the address while second one is the data at that address. The integer (int) variable at address 0x1004 is ___________. Address Content 0x1000 0x34 0x1001 0xB4 0x1002 0x20 0x1003 0xAE 0x1004 0x42 0x1005 0x67 0x1006 0x19 0x1007 0x3C 0x1008 0x8C
0x3C196742
Select the best answer. Assume you just received data is stored in network byte order. Below is a snapshot of the data memory storing data. The first column is the address while second one is the data at that address. The integer (short) variable at address 0x1004 is ___________. Address Content 0x1000 0x34 0x1001 0xB4 0x1002 0x20 0x1003 0xAE 0x1004 0x42 0x1005 0x67 0x1006 0x19 0x1007 0x3C 0x1008 0x8C
0x4267
Select the best answer. Assume you just prepared data stored in little endian order. Below is a snapshot of the data memory storing data. The first column is the address while second one is the data at that address. The integer (short) variable at address 0x1004 is ___________. Address Content 0x1000 0x34 0x1001 0xB4 0x1002 0x20 0x1003 0xAE 0x1004 0x42 0x1005 0x67 0x1006 0x19 0x1007 0x3C 0x1008 0x8C
0x6742
Select the best answer. Assume you just prepared data stored in little endian order. Below is a snapshot of the data memory storing data. The first column is the address while second one is the data at that address. The integer (int) variable at address 0x1002 is ___________. Address Content 0x1000 0x34 0x1001 0xB4 0x1002 0x20 0x1003 0xAE 0x1004 0x42 0x1005 0x67 0x1006 0x19 0x1007 0x3C 0x1008 0x8C
0x6742AE20
Select the best answer. Assume you just prepared data stored in little endian order. Below is a snapshot of the data memory storing data. The first column is the address while second one is the data at that address. The integer (short) variable at address 0x1002 is ___________. Address Content 0x1000 0x34 0x1001 0xB4 0x1002 0x20 0x1003 0xAE 0x1004 0x42 0x1005 0x67 0x1006 0x19 0x1007 0x3C 0x1008 0x8C
0xAE20
Answer this question in the context of the strategy described in class and adopted by each child to manage Weekly Pocket Money Problem. A child starts numbering weeks from 0 (zero) when he get smacked. On Week 0 he got smacked when he asked 20 dollars. Assuming that the child asks for money each week, the child will ask _____ dollars on Week 1.
1
Assume a recent TCP implementation (TCP Reno and beyond). Let the congestion window be 10 segments and all 10 outstanding segments get lost. The congestion window will then be set by the sender to ________ segment(s).
1
Assume a recent TCP implementation (TCP Reno and beyond). Let the congestion window be 12 segments and all 12 outstanding segments get lost. The congestion window will then be set by the sender to ________ segment(s).
1
Assume a recent TCP implementation (TCP Reno and beyond). Let the congestion window be 16 segments and all 16 outstanding segments get lost. The congestion window will then be set by the sender to ________ segment(s).
1
Numerical answer. A 125-byte frame is sent at a bitrate of 1 Mbps over a copper cable 1000 kms long. Recall that a copper cable has a propagation speed about 2/3 the speed of light. The transmission time is equal to _________ ms.
1
Using DNS, each zone (.e., edu, cisco.com, cs.washington.edu, tamu.edu, cs.tamu.edu, .....) must have at least ________ name server(s).
1
What is the value of the parity bit for this word if we are using even parity? Word = 1000 1010
1
Consider this network of routers A, B, C, and D that are using Distance Vector Routing. Assume that all routers are turned on at the exactly same time 0. At time 0, the routers know only the cost to reach their immediate neighbors. At time 0 (Round 0), all routers send their distance vector to their immediate neighbors. Each 30 seconds, a new round of exchanges occurs (Round 1, 2,...). Fill in the table below with the distance vector that Node B sends its neighbors on Round 1. If the distance is not yet known, fill in with the value 99.
1 0 3 1
A 1 kilobits/s (Kbps) bit rate is _____________ bits per second.
1,000
A 1 megabits/s bit (Mbps) rate is _____________ bits per second.
1,000,000
A 1 gigabits/s (Gbps) bit rate is _____________ bits per second.
1,000,000,000
The network ID of IP Address 1.20.140.153 is _________.
1.0.0.0
The network ID of IP Address 1.20.140.153/17 is _________. 1.20.128.0 None of these answers 1.20.64.0 1.0.0.0 1.20.0.0
1.20.128.0
A 1250-bits frame is sent at a bitrate of 1 Mbps over a copper cable 1000 kms long. Then the transmission time is _________ ms. Propagation speed on copper is about 2/3 the speed of light. The speed of light is about 300,000 km/s.
1.25
A sender and a receiver are using a 250 km copper cable to communicate. The propagation speed is about 2/3 the speed of light. They use stop and wait protocol. The frame size is 1250 bytes. The bit rate is 100 Kbps. The propagation time is ______ ms. The transmission time is _____ ms. The throughput is ______ bps. The efficiency is _____ .
1.25 100.00 97560.97 0.97
Suppose a DNS client must resolve the host name toto.nl. Assign to each name server on the left a sequence number n based on the order it is queried. The first queried name server must be assigned the sequence number 1. Assign 99 to a name server that is not queried. root Nnl Nvu Local name server
1.25/5 99 99 2 1
A 125-byte frame is sent at a bitrate of 1 Mbps over a copper cable 2000 kms long. Recall that a copper cable has a propagation speed about 2/3 the speed of light. The propagation time is equal to _________ ms.
10
A 1250-bits frame is sent at a bitrate of 10 Kbps over a copper cable 2000 kms long. Then the propagation time is _________ ms. Propagation speed on copper is about 2/3 the speed of light. The speed of light is about 300,000 km/s.
10
A client sends multiple equal sized segments with sequence numbers 15, 25, 35,45, and 55. The size of these segments is ________ bytes.
10
A client sends seven equal sized segments with sequence numbers 15, 25, 35,45, 55, 65, and 75. The size of each segment was ________ bytes.
10
Answer this question in the context of the strategy described in class and adopted by each child to manage Weekly Pocket Money Problem. A child starts numbering weeks from 0 (zero) when he get smacked. On Week 0 he got smacked when he asked 16 dollars. Assuming that the child asks for money each week, the child will ask _____ dollars on Week 5.
10
Let S/N be the ratio of the signal S over the noise N. The S/N ratio (in decibel) is 20 decibels (dB). Then S/N = ________.
100
A TCP client receives a segment that contains a segment with 1000 bytes of data with Sequence number 0. This TCP client will acknowledge this segment with an ack number equal to ______
1000
Let S/N be the ratio of the signal S over the noise N. The S/N ratio (in decibel) is 30 decibels (dB). Then S/N = ________.
1000
Let S/N be the ratio of the signal S over the noise N. The S/N ratio (in decibel) is 40 decibels (dB). Then S/N = ________.
10000
A 5x5 word that includes crossed even parity bits is received: 1010 0010 1111 1010 1100 0011 0 The initial (sent) 5x5 word must have been _____________________
1010 0000 1111 1010 1100 0011 0
Answer this question in the context of the strategy described in class and adopted by each child to manage Weekly Pocket Money Problem. A child starts numbering weeks from 0 (zero) when he get smacked. On Week 0 he got smacked when he asked 16 dollars. Assuming that the child asks for money each week, the child will ask _____ dollars on Week 6.
11
Answer this question in the context of the strategy described in class and adopted by each child to manage Weekly Pocket Money Problem. A child starts numbering weeks from 0 (zero) when he get smacked. On Week 0 he got smacked when he asked 20 dollars. Assuming that the child asks for money each week, the child will ask _____ dollars on Week 5.
11.625
A TCP client receives a segment that contains a segment with 100 bytes of data with Sequence number 1000. This TCP client will acknowledge this segment with an ack number equal to ______
1100
The sender wants to send the message 1100001 using odd parity. It will send the frame___________.
11000010
Using even parity, the receiver receives the frames listed below. Check the frames that were certainly corrupted (including the parity bit)
11000010 10000000 11011010
The sender sent this message 110X101 using even parity. The 'X' is a bit that is unknown. The message is received correctly, i.e., it was not corrupted during transmission. The receiver receives the message___________.
1100101
The sender wants to send the message 1101001 using even parity. It will send the frame___________.
11010010
The sender wants to send the message 1101001 using odd parity. It will send the frame___________.
11010011
The sender sent this message 110X101 using odd parity. The 'X' is a bit that is unknown. The message is received correctly, i.e., it was not corrupted during transmission. The receiver receives the message___________.
1101101
The sender sent this message 11X1101 using odd parity. The 'X' is a bit that is unknown. The message is received correctly, i.e., it was not corrupted during transmission. The receiver receives the message___________. 1101101 1111101 None of these answers 1101100 1111100
1101101
The sender wants to send the message 1101101 using even parity. It will send the frame___________.
11011011
Using odd parity, the receiver receives the frames listed below. Check the frames that were certainly corrupted (including the parity bit)
11111111 00000000 11000011
Answer this question based congestion control and flow control as performed by TCP. Suppose that a TCP sender 1) has cwnd set to 18,000 bytes 2) has 10,000 bytes available in its own input buffers 3) receives a segment with an advertised window of 12,000 bytes. The TCP sender will set its offered window Wnd to ________ bytes.
12,000
Check all that apply. A 1250-bits frame is sent at a bitrate of 100 Kbps over a copper cable 1000 kms long. Then the transmission time is _________ ms. Propagation speed on copper is about 2/3 the speed of light. The speed of light is about 300,000 km/s.
12.5
A sender and a receiver are using a 2500 km copper cable to communicate. The propagation speed is about 2/3 the speed of light. They use stop and wait protocol. The frame size is 1500 bytes. The bit rate is 10 Mbps. The propagation time is _____ ms. The transmission time is _____ ms. The throughput is ______ bps. The efficiency is _____ .
12.50 1.20 458015.26 0.04
A 1250-bits frame is sent at a bitrate of 10 Kbps over a copper cable 1000 kms long. Then the transmission time is _________ ms. Propagation speed on copper is about 2/3 the speed of light. The speed of light is about 300,000 km/s.
125
The network ID of IP Address 126.204.40.13/13 is _________. 126.192.0.0 126.128.0.0 126.200.0.0 126.204.0.0 None of these answers
126.200.0.0
Suppose you want to send some packet to the host from which you are sending. You could use this (these) addresse(s).
127.0.0.1 0.0.0.0
An IPv6 address has ______________ bits.
128
The network ID of IP Address 128.200.40.13 is _________.
128.200.0.0
The network ID of IP Address 128.200.104.13/19 is _________.
128.200.96.0
Answer this question in the context of the strategy described in class and adopted by each child to manage Weekly Pocket Money Problem. A child starts numbering weeks from 0 (zero) when he get smacked. On Week 0 he got smacked when he asked 24 dollars. Assuming that the child asks for money each week, the child will ask _____ dollars on Week 5.
13
A host H has IP address 131.204.14.65. Suppose you want to send some packet to all hosts on the same network as H . You could use this (these) addresse(s). 131.255.255.255 131.204.14.255 None of these answers 255.255.14.65 131.204.255.255
131.204.255.255
A 1250-bits frame is sent at a bitrate of 10 Kbps over a copper cable 3000 kms long. Then the propagation time is _________ ms. Propagation speed on copper is about 2/3 the speed of light. The speed of light is about 300,000 km/s.
15
A TCP client receives a segment that contains a segment with 5 bytes of data with Sequence number 10. This TCP client will acknowledge this segment with an ack number equal to ______ 15 16 None of these answers 6 5
15
Assume a recent TCP implementation (TCP Reno and beyond). Suppose that there are 20 outstanding (sent, but not yet acknowledged) segments. The sender will receive at most __________ duplicate acknowledgments if 5 segments get lost.
15
A TCP client receives a segment that contains a segment with 10 bytes of data with Sequence number 6. This TCP client will acknowledge this segment with an ack number equal to ______
16
A TCP port number has ______________ bits.
16
A UDP port number has ______________ bits.
16
Answer this question in the context of the strategy described in class and adopted by each child to manage Weekly Pocket Money Problem. A child starts numbering weeks from 0 (zero) when he get smacked. On Week 0 he got smacked when he asked 32 dollars. Assuming that the child asks for money each week, the child will ask _____ dollars on Week 5.
16
These fields on the TCP header are used to provide reliable in-order delivery.
16-bit checksum 32-bit sequence number 32-bit acknowledgement number
These fields on the TCP header are used to provide flow control.
16-bit window size 32-bit acknowledgement number 32-bit sequence number
Consider a 4-KHz noiseless channel. The sender is using the vocabulary set S to communicate. S = {apple, banana, pear, mango}. The maximal bit rate is _________ bps.
16000
The network ID of IP Address 164.200.40.13 is _________.
164.200.0.0
The network ID of IP Address 164.200.40.13/22 is _________. 164.200.0.0 164.200.32.0 164.200.64.0 164.200.40.0 None of these answers
164.200.40.0
The network ID of IP Address 164.200.40.13/29 is _________.
164.200.40.8
The network ID of IP Address 172.20.14.53/28 is _________.
172.20.14.48
The network ID of IP Address 172.202.100.3 is _________.
172.202.0.0
The network ID of IP Address 172.202.100.3/20 is _________.
172.202.96.0
Answer this question in the context of the strategy described in class and adopted by each child to manage Weekly Pocket Money Problem. A child starts numbering weeks from 0 (zero) when he get smacked. On Week 0 he got smacked when he asked 32 dollars. Assuming that the child asks for money each week, the child will ask _____ dollars on Week 6.
18
Assume a recent TCP implementation (TCP Reno and beyond). Suppose that there are 20 outstanding (sent, but not yet acknowledged) segments. The sender will receive at most __________ duplicate acknowledgments if 2 segments get lost.
18
The network ID of IP Address 191.20.240.213 is _________.
191.20.0.0
The network ID of IP Address 191.20.240.213/18 is _________.
191.20.192.0
The network ID of IP Address 192.202.100.3 is _________.
192.202.100.0
The network ID of IP Address 192.202.100.243/28 is _________.
192.202.100.240
Consider this network of routers A, B, C, and D that are using Distance Vector Routing. Assume that all routers are turned on at the exactly same time 0. At time 0, the routers know only the cost to reach their immediate neighbors. At time 0 (Round 0), all routers send their distance vector to their immediate neighbors. Each 30 seconds, a new round of exchanges occurs. Fill in the table below with the distance vector that Node B sends its neighbors on Round 0. If the distance is not yet known, fill in with the value 99.
1;0;5;1
A client has in its sending buffer these equal sized segments with sequence numbers 15, 25, 35,45, 55, 65, and 75. Based on congestion control and flow control, its offered window is 30 bytes. So far, the client sent segments with Sequence numbers 15, 25, and 35. The highest acknowledgement it received is 35. This client could send up to __________ new segment(s). (Answer -1 if the client cannot send anymore new segments).
2
A client has in its sending buffer these equal sized segments with sequence numbers 15, 25, 35,45, 55, 65, and 75. Based on congestion control and flow control, its offered window is 40 bytes. So far, the client sent segments with Sequence numbers 15, 25, and 35. The highest acknowledgement it received is 25. This client could send up to __________ new segment(s). (Answer -1 if the client cannot send anymore new segments).
2
A client sends seven equal sized segments with sequence numbers 15, 25, 35,45, 55, 65, and 75. Segments with sequence numbers 45 and 65 get lost. The client will receive _______ duplicate acknowledgements after the server received segment #75.
2
A hamming code of distance 6 can detect and correct up to _______ corrupted bits in a received word..
2
Five senders share a 10 Mbps channel using code division multiplexing. Each sender will have a sending bit rate of about ________ Mbps.
2
Let the advertised window Wa (by the received) be 4 segments and the current congestion window cwnd be 32 segments. Supposed that there are 2 outstanding segments (segments sent and not yet acknowledged). The sender can send at most _________ segment(s).
2
Assume that the local name server just started (cache empty). The local name server just resolved the hostname tatiana.robot.cs.washington.edu and right after a DNS client must resolve the host name toto.cs.washington.edu. Assign to each name server on the left a sequence number n based on the order it is queried. The first queried name server must be assigned the sequence number 1. Assign 99 to a name server that is not queried. Ncs Nedu root Nwas Local name server
2 99 99 99 1
Assume that the local name server just started (cache empty). The local name server just resolved the hostname tatiana.robot.cs.washington.edu and right after a DNS client must resolve the host name toto.robot.cs.washington.edu. Assign to each name server on the left a sequence number n based on the order it is queried. The first queried name server must be assigned the sequence number 1. Assign 99 to a name server that is not queried. Ncs Nedu root Nwas Local name server
2 99 99 99 1
The subnet mask of IP Address 164.200.40.13/22 is _________. 255.255.252.0 255.255.248.0 None of these answers 255.255.0.0 255.255.240.0
255.255.252.0
Suppose that cwnd = 1,000 bytes. The latest segment received by a client had the advertised window set to 40 bytes. The client has in its sending buffer these equal sized segments with sequence numbers 15, 25, 35,45, 55, 65, and 75. So far, the client sent segments with Sequence numbers 15, 25, and 35. The highest acknowledgement it received is 25. This client could send up to __________ new segments. (Answer -1 if the client cannot send anymore new segments).
2
Suppose that cwnd = 30 bytes. The latest segment received by a client had the advertised window set to 40 bytes. The client has in its sending buffer these equal sized segments with sequence numbers 15, 25, 35,45, 55, 65, and 75. So far, the client sent segments with Sequence numbers 15, 25, and 35. The highest acknowledgement it received is 35. This client could send up to __________ new segments. (Answer -1 if the client cannot send anymore new segments).
2
Consider this network of routers A, B, C, and D that are using Distance Vector Routing. Assume that all routers are turned on at the exactly same time 0. At time 0, the routers know only the cost to reach their immediate neighbors. At time 0 (Round 0), all routers send their distance vector to their immediate neighbors. Each 30 seconds, a new round of exchanges occurs (Round 1, 2,...). Fill in the table below with the distance vector that Node D sends its neighbors on Round 1. If the distance is not yet known, fill in with the value 99.
2 1 3 0
Consider this network of routers A, B, C, and D that are using Distance Vector Routing. Assume that all routers are turned on at the exactly same time 0. At time 0, the routers know only the cost to reach their immediate neighbors. At time 0 (Round 0), all routers send their distance vector to their immediate neighbors. Each 30 seconds, a new round of exchanges occurs (Round 1, 2,...). Fill in the table below with the distance vector that Node C sends its neighbors on Round 1. If the distance is not yet known, fill in with the value 99.
2 3 0 3
Assume that the local name server just started (cache empty). Suppose a DNS client must resolve the host name toto.vu.nl. Assign to each name server on the left a sequence number n based on the order it is queried. The first queried name server must be assigned the sequence number 1. Assign 99 to a name server that is not queried. root Nnl Nvu Nwas Local name server
2 3 4 99 1
Assume that the local name server just started (cache empty). Suppose a DNS client must resolve the host name toto.jill.acm.org. Assign to each name server on the left a sequence number n based on the order it is queried. The first queried name server must be assigned the sequence number 1. Assign 99 to a name server that is not queried. root Nacm Norg Nwas Local name server
2 4 3 99 1
Assume that the local name server just started (cache empty). Suppose a DNS client must resolve the host name toto.org. Assign to each name server on the left a sequence number n based on the order it is queried. The first queried name server must be assigned the sequence number 1. Assign 99 to a name server that is not queried. root Nacm Norg Local name server
2 99 3 1
Assume that the local name server just started (cache empty). The local name server just resolved the hostname tatiana.cs.washington.edu and right after a DNS client must resolve the host name toto.robot.cs.washington.edu. Assign to each name server on the left a sequence number n based on the order it is queried. The first queried name server must be assigned the sequence number 1. Assign 99 to a name server that is not queried. Ncs Nedu root Nwas Local name server
2 99 99 99 1
Suppose that we transmit symbols belonging to this vocabulary {A, B}. The baud rate is 2,000 bauds. The bit rate is.
2 Kbps
A sender and a receiver are using a 500 km copper cable to communicate. The propagation speed is about 2/3 the speed of light. They use stop and wait protocol. The frame size is 1500 bytes. The bit rate is 1 Mbps. The propagation time is _____ ms. The transmission time is _____ ms. The throughput is _____ bps. The efficiency is _____ .
2.50 12.00 705882.35 0.70
A sender and a receiver are using a 500 km copper cable to communicate. The propagation speed is about 2/3 the speed of light. They use stop and wait protocol. The frame size is 1500 bytes. The bit rate is 100Kbps. The propagation time is _____ ms. The transmission time is _____ ms. The throughput is _____ bps. The efficiency is _____ .
2.50 120.00 96000.00 0.96
A 1250-bits frame is sent at a bitrate of 10 Kbps over a copper cable 4000 kms long. Then the propagation time is _________ ms. Propagation speed on copper is about 2/3 the speed of light. The speed of light is about 300,000 km/s.
20
A client has in its sending buffer these equal sized segments with sequence numbers 15, 25, 35,45, 55, 65, and 75. Based on congestion control and flow control, its offered window is 40 bytes. So far, the client sent segments with Sequence numbers 15, 25, and 35. The highest acknowledgement it received is 25. This client could send up to __________ new byte(s). (Answer -1 if the client cannot send anymore new segments).
20
A client sends five equal sized segments with sequence numbers 15, 35, 55, and 75. The size of each segment was ________ bytes.
20
Let S/N be the ratio of the signal S over the noise N. If S/N = 100 then the SNR is ______ decibels (dB).
20
Suppose that cwnd = 1,000 bytes. The latest segment received by a client had the advertised window set to 40 bytes. The client has in its sending buffer these equal sized segments with sequence numbers 15, 25, 35,45, 55, 65, and 75. So far, the client sent segments with Sequence numbers 15, 25, and 35. The highest acknowledgement it received is 25. This client could send up to __________ new bytes. (Answer -1 if the client cannot send anymore new segments).
20
The length of an IPv4 header is at least ________ bytes.
20
Five senders share a 1 Mbps channel using frequency division multiplexing. Each sender will have a sending bit rate of about ________ Kbps.
200
The network ID of IP Address 200.20.14.53 is _________.
200.20.14.0
The network ID of IP Address 200.20.14.53/27 is _________.
200.20.14.32
A host H has IP address 200.204.14.65. Suppose you want to send some packet to all hosts on the same network as H . You could use this (these) addresses.
200.204.14.255
Five senders share a 10 Mbps channel using code division multiplexing. Each sender will have a sending bit rate of about ________ Kbps.
2000
In the TCP/IP model, FTP uses this (these) port number(s) at the transport layer.
21, 20
The network ID of IP Address 212.202.100.3 is _________.
212.202.100.0
In the TCP/IP model, SSH uses this (these) port number(s) at the transport layer.
22
The network ID of IP Address 223.202.100.3 is _________.
223.202.100.0
The network ID of IP Address 223.202.100.13/30 is _________.
223.202.100.12
In the TCP/IP model, Telnet uses this (these) port number(s) at the transport layer.
23
A client sends seven equal sized segments with sequence numbers 15, 25, 35,45, 55, 65, and 75. Segments with sequence numbers 25 and 65 get lost. The server will send acknowledgement number ______ after receiving segment with sequence number 75.
25
SMTP binds to Port Number _______________. POP3 binds to Port Number _______________. IMAP binds to Port Number _______________.
25 110 143
A sender and a receiver are using a 5,000 km copper cable to communicate. The propagation speed is about 2/3 the speed of light. They use stop and wait protocol. The frame size is 1250 bytes. The bit rate is 1 Mbps. The propagation time is _____ ms. The transmission time is _____ ms. The throughput is _____ bps. The efficiency is _____ .
25.00 10.00 166666.66 0.16
Numerical answer. Four senders share a 1 Gbps channel using time division multiplexing. Each sender will have a sending bit rate of about ________ Mbps.
250
A class C network can assign unique addresses to up to _______________ hosts.
254
The subnet mask of IP Address 45.20.14.53/12 is _________.
255.240.0.0
The subnet mask of IP Address 191.20.240.213/18 is _________.
255.255.192.0
Suppose that cwnd = 40 bytes. The latest segment received by a client had the advertised window set to 80 bytes. The client has in its sending buffer these equal sized segments with sequence numbers 15, 25, 35,45, 55, 65, and 75. So far, the client sent segments with Sequence numbers 15, 25, and 35. The highest acknowledgement it received is 35. This client could send up to __________ new segments. (Answer -1 if the client cannot send anymore new segments).
3
The email architecture involves ________ main operations.
3
Match these encoding schemes for baseband transmission from the most robust to the least robust. Assign 1 to the most robust encoding scheme and 99 to the expressions that are not encoding schemes for baseband transmission. Non-Return to Zero (NRZ) Non-Return to Zero Invert (NRZI) Manchester Amplitude Shift Keying (ASK) Phase Shift Keying (ASK)
3 2 1 99 99
Assume that the local name server just started (cache empty). The local name server just resolved the hostname tatiana.washington.edu and right after a DNS client must resolve the host name toto.robot.cs.washington.edu. Assign to each name server on the left a sequence number n based on the order it is queried. The first queried name server must be assigned the sequence number 1. Assign 99 to a name server that is not queried. Ncs Nedu root Nwas Local name server
3 99 99 2 1
A client has in its sending buffer these equal sized segments with sequence numbers 15, 25, 35,45, 55, 65, and 75. Based on congestion control and flow control, its offered window is 30 bytes. So far, the client sent segments with Sequence numbers 15, 25, and 35. The highest acknowledgement it received is 45. This client could send up to __________ new byte(s). (Answer -1 if the client cannot send anymore new segments).
30
A client has in its sending buffer these equal sized segments with sequence numbers 15, 25, 35,45, 55, 65, and 75. Based on congestion control and flow control, its offered window is 40 bytes. So far, the client sent segments with Sequence numbers 15, 25, and 35. The highest acknowledgement it received is 35. This client could send up to __________ new byte(s). (Answer -1 if the client cannot send anymore new segments).
30
Let the advertised window Wa (by the received) be 40 segments and the current congestion window cwnd be 32 segments. Supposed that there are 2 outstanding segments (segments sent and not yet acknowledged). The sender can send at most _________ segments.
30
Suppose that cwnd = 1,000 bytes. The latest segment received by a client had the advertised window set to 40 bytes. The client has in its sending buffer these equal sized segments with sequence numbers 15, 25, 35,45, 55, 65, and 75. So far, the client sent segments with Sequence numbers 15, 25, and 35. The highest acknowledgement it received is 35. This client could send up to __________ new bytes. (Answer -1 if the client cannot send anymore new segments).
30
Suppose that cwnd = 30 bytes. The latest segment received by a client had the advertised window set to 40 bytes. The client has in its sending buffer these equal sized segments with sequence numbers 15, 25, 35,45, 55, 65, and 75. So far, the client sent segments with Sequence numbers 15, 25, and 35. The highest acknowledgement it received is 45. This client could send up to __________ new bytes. (Answer -1 if the client cannot send anymore new segments).
30
An IPv4 address has ______________ bits.
32
The subnet mask of network N is 255.255.128.0. This network N can assign unique addresses to up to _______________ hosts.
32766
A client sends five equal sized segments with sequence numbers 15, 25, 35,45, 55, 65, and 75. Segments with sequence numbers 35 and 65 get lost. The server will send acknowledgement number ______ after receiving segment with sequence number 55.
35
A client sends five equal sized segments with sequence numbers 15, 35, 55, 75, 95 Segments with sequence numbers 55 and 75 get lost. The server will likely send a segment with acknowledgement number ______ after receiving segment with sequence number 15.
35
A client sends five equal sized segments with sequence numbers 15, 35, 55, 75, 95 Segments with sequence numbers 55 and 75 get lost. The server will send acknowledgement number ______ after receiving segment with sequence number 15.
35
A client sends seven equal sized segments with sequence numbers 15, 25, 35,45, 55, 65, and 75. Segments with sequence numbers 35 and 65 get lost. The server will send acknowledgement number ______ after receiving segment with sequence number 25.
35
Consider a 4-KHz noisy channel with a 30 db SNR. The sender is using the vocabulary set S to communicate. S = {apple, banana}. The maximal bit rate is _________ bps.
39869 Explanation: bit rate = B*log2(1 + S/N) SNR = 30 = 10log10(S/N) S/N = 1000 4000*log2(1001) = 39869
Answer this question in the context of the strategy described in class and adopted by each child to manage Weekly Pocket Money Problem. A child starts numbering weeks from 0 (zero) when he get smacked. On Week 0 he got smacked when he asked 24 dollars. Assuming that the child asks for money each week, the child will ask _____ dollars on Week 3.
4
Answer this question in the context of the strategy described in class and adopted by each child to manage Weekly Pocket Money Problem. A child starts numbering weeks from 0 (zero) when he get smacked. On Week 0 he got smacked when he asked 32 dollars. Assuming that the child asks for money each week, the child will ask _____ dollars on Week 3.
4
Consider these two words: W1 = 1001 1001 W2 = 0101 1010 The Hamming distance between W1 and W2 is _____.
4
In the IPv4 header, the size of the header length (IHL) field on an IPv4 header is ________ bits.
4
The UDP header consists of ______ fields (members) of information. 32 4 None of these answers 8 16
4
The email architecture has ________ components.
4
The number of layers that the TCP/IP Reference Model specifies explicitly is ________ .
4
The size of the version field on an IPv4 header is ________ bits.
4
This question is about how the Internet Protocol (IP) handles a packet P and decides where to deliver it. Consider a device D with IP address 134.89.200.145/24. On Device D, IP is handed a packet P with a destination IP address 134.89.200.24. Provide the order in which IP on Device D will perform these actions. The earliest action must be assigned 1. Any action that is incorrect or is not performed must be assigned the number 0. send Packet P to the device with IP address 134.89.200.24 check if Packet P is for Device D read the routing table ask ARP for a MAC address corresponding to IP Address 134.89.200.24 ask ARP for a MAC address corresponding to IP Address 134.89.200.128 hand Packet P to the appropriate protocol at the transport layer. check if the IP destination address of Packet P is local send Packet P to the device with IP address 134.89.200.18
4 1 0 3 0 0 2 0
Assume that the local name server just started (cache empty). The local name server just resolved the hostname tatiana.edu and right after a DNS client must resolve the host name toto.robot.cs.washington.edu. Assign to each name server on the left a sequence number n based on the order it is queried. The first queried name server must be assigned the sequence number 1. Assign 99 to a name server that is not queried. Ncs Nedu root Nwas Local name server
4 2 99 3 1
Suppose that we transmit symbols belonging to this vocabulary {A, B, C, D}. The baud rate is 2,000 bauds. The bit rate is. 4 Kbps 1 Kbps 2 Kbps 8 Kbps None of these choices
4 Kbps
The OSI reference model has _____ end-to-end layers and _____ point-to-point layers.
4, 3
A client has in its sending buffer these equal sized segments with sequence numbers 15, 25, 35,45, 55, 65, and 75. Based on congestion control and flow control, its offered window is 40 bytes. So far, the client sent segments with Sequence numbers 15, 25, and 35. The highest acknowledgement it received is 45. This client could send new segments with Sequence number up to __________ . (Answer -1 if the client cannot send anymore new segments).
40
Let S/N be the ratio of the signal S over the noise N. If S/N = 10,000, then the SNR is ______ decibels (dB).
40
Suppose that cwnd = 1,000 bytes. The latest segment received by a client had the advertised window set to 40 bytes. The client has in its sending buffer these equal sized segments with sequence numbers 15, 25, 35,45, 55, 65, and 75. So far, the client sent segments with Sequence numbers 15, 25, and 35. The highest acknowledgement it received is 45. This client could send new segments with Sequence number up to __________ . (Answer -1 if the client cannot send anymore new segments).
40
Suppose that cwnd = 1,000 bytes. The latest segment received by a client had the advertised window set to 40 bytes. The client has in its sending buffer these equal sized segments with sequence numbers 15, 25, 35,45, 55, 65, and 75. So far, the client sent segments with Sequence numbers 15, 25, and 35. The highest acknowledgement it received is 45. This client could send up to __________ new bytes. (Answer -1 if the client cannot send anymore new segments).
40
A client has in its sending buffer these equal sized segments with sequence numbers 15, 25, 35,45, 55, 65, and 75. Based on congestion control and flow control, its offered window is 40 bytes. So far, the client sent segments with Sequence numbers 15, 25, and 35. The highest acknowledgement it received is 25. The next segment that the client could send is segment with Sequence number to __________ (answer -1 if the client cannot send anymore new segments).
45
Suppose that cwnd = 30 bytes. The latest segment received by a client had the advertised window set to 40 bytes. The client has in its sending buffer these equal sized segments with sequence numbers 15, 25, 35,45, 55, 65, and 75. So far, the client sent segments with Sequence numbers 15, 25, and 35. The highest acknowledgement it received is 25. The next segment that the client could send is segment with Sequence number to __________ . (Answer -1 if the client cannot send anymore new segments).
45
The network ID of IP Address 45.20.14.53 is _________.
45.0.0.0
The network ID of IP Address 45.20.14.53/12 is _________.
45.16.0.0
A server sends a 1000 bytes segment with sequence number 3500. If everything goes well, it will send the next segment with sequence number _________.
4500
A server sends a 1000 bytes segment with sequence number 3500. The client receives it correctly. The client will respond with acknowledgement number_________.
4500
A 125-byte frame is sent at a bitrate of 1 Mbps over a copper cable 1000 kms long. Recall that a copper cable has a propagation speed about 2/3 the speed of light. The propagation time is equal to _________ ms.
5
A hamming code of distance 6 can detect up to _______ corrupted bits in a received word..
5
Assume a recent TCP implementation (TCP Reno and beyond). Let the congestion window be 10 segments and one segment is lost. The congestion window will then be set by the sender to ________ segment(s).
5
Check all that apply. A 1250-bits frame is sent at a bitrate of 10 Kbps over a copper cable 1000 kms long. Then the propagation time is _________ ms. Propagation speed on copper is about 2/3 the speed of light. The speed of light is about 300,000 km/s.
5
The Hamming distance for Code C is such that 1) the largest distance between any two codewords is 7 2) the smallest distance between any two codewords is 5. The Hamming distance for Code C is ________.
5
The Hamming distance for Code C is such that 1) the largest distance between any two codewords is 7 2) the smallest distance between any two codewords is 5. The Hamming distance for Code C is ________.
5
This question is about how the Internet Protocol (IP) handles a packet P and decides where to deliver it. Consider a device D with IP address 134.89.200.145/24. On Device D, IP is handed a packet P with a destination IP address 131.204.65.14. Provide the order in which IP on Device D will perform these actions. The earliest action must be assigned 1. Any action that is incorrect or is not performed must be assigned the number 0. send Packet P to the device with IP address 134.89.200.1 check if Packet P is for Device D read the routing table ask ARP for a MAC address corresponding to IP Address 134.89.200.1 ask ARP for a MAC address corresponding to IP Address 131.89.200.254 hand Packet P to the appropriate protocol at the transport layer. check if the IP destination address of Packet P is local send Packet P to the device with IP address 134.89.200.254
5 1 3 4 0 0 2 0
Suppose a DNS client must resolve the host name toto.cs.washington.edu. Assign to each name server on the left a sequence number n based on the order it is queried. The first queried name server must be assigned the sequence number 1. Assign 99 to a name server that is not queried. Ncs Nedu root Nacm Nwas Local Name Server
5 3 2 99 4 1
Suppose a DNS client must resolve the host name toto.robot.cs.washington.edu. Assign to each name server on the left a sequence number n based on the order it is queried. The first queried name server must be assigned the sequence number 1. Assign 99 to a name server that is not queried. Ncs Nedu root Nvu Nwas Local name server
5 3 2 99 4 1
A sender and a receiver are using a 1,000 km copper cable to communicate. The propagation speed is about 2/3 the speed of light. They use stop and wait protocol. The frame size is 125 bytes. The bit rate is 1 Mbps. The propagation time is _____ ms. The transmission time is _____ ms. The throughput is _____ bps. The efficiency is _____ .
5.00 1.00 90909.09 0.09
A 1250-bits frame is sent at a bitrate of 10 Kbps over a copper cable 10,000 kms long. Then the propagation time is _________ ms. Propagation speed on copper is about 2/3 the speed of light. The speed of light is about 300,000 km/s.
50
Consider this code snapshot: String str = new String("CD456"); byte[] a = str.getBytes(); The content of a[2] is ___________.
52
A DNS server binds to Port # _______.
53
In the TCP/IP model, DNS uses this (these) port number(s) at the transport layer.
53
A client sends five equal sized segments with sequence numbers 15, 35, 55, 75, 95 Segments with sequence numbers 55 and 75 get lost. The server will likely send a segment with acknowledgement number ______ after receiving segment with sequence number 95.
55
A client sends five equal sized segments with sequence numbers 15, 35, 55, 75, 95 Segments with sequence numbers 55 and 75 get lost. The server will send acknowledgement number ______ after receiving segment with sequence number 35.
55
A client sends five equal sized segments with sequence numbers 15, 35, 55, 75, 95 Segments with sequence numbers 55 and 75 get lost. The server will send acknowledgement number ______ after receiving segment with sequence number 95.
55
A client sends seven equal sized segments with sequence numbers 15, 25, 35,45, 55, 65, and 75. Segments with sequence numbers 55 and 65 get lost. The client will receive the acknowledgement number ______________ after the server receives segment #75.
55
Suppose that cwnd = 1,000 bytes. The latest segment received by a client had the advertised window set to 40 bytes. The client has in its sending buffer these equal sized segments with sequence numbers 15, 25, 35,45, 55, 65, and 75. So far, the client sent segments with Sequence numbers 15, 25, and 35. The highest acknowledgement it received is 25. This client could send new segments with Sequence number up to __________ . (Answer -1 if the client cannot send anymore new segments).
55
Assume a recent TCP implementation (TCP Reno and beyond). Let the congestion window be 12 segments and all 12 outstanding segments get lost. The slow start threshold will then be set by the sender to ________ segment(s).
6
Match each protocol with its protocol number used in the protocol (number) field in the IPv4 header. TCP UDP ICMP Ethernet Wifi (IEEE 802.11) Bluetooth
6 17 1 Not Applicable Not Applicable Not Applicable
Select the best answer. Suppose that we transmit symbols belonging to this vocabulary {A, B, C, D, E, F, G, H}. The baud rate is 2,000 bauds. The bit rate is.
6 Kbps
Let the advertised window Wa (by the received) be 20 segments and the current congestion window cwnd be 8 segments. A timeout occurs. The sender can send up to _______ segments after 5 successful bursts (since the timeout).
6.75
The length of an IPv4 header is at most ________ bytes.
60
The subnet mask of network N is 255.255.255.192. This network N can assign unique addresses to up to _______________ hosts.
62
The network ID of IP Address 63.20.140.153 is _________.
63.0.0.0
The network ID of IP Address 63.20.140.153/26 is _________.
63.20.140.128
Suppose that cwnd = 40 bytes. The latest segment received by a client had the advertised window set to 60 bytes. The client has in its sending buffer these equal sized segments with sequence numbers 15, 25, 35,45, 55, 65, and 75. So far, the client sent segments with Sequence numbers 15, 25, and 35. The highest acknowledgement it received is 35. This client could send new segments with Sequence number up to __________ . (Answer -1 if the client cannot send anymore new segments).
65
The highest TCP port number is __________.
65535
The highest UDP port number is __________.
65535
The total length of an IPv4 packet is at most ________ bytes.
65535
Consider this code snapshot: String str = new String("CD456"); byte[] a = str.getBytes("UTF-16"); The content of a[3] is ___________.
67
Consider this code snapshot: String str = new String("CD456"); byte[] a = str.getBytes(); The content of a[0] is ___________.
67
Select the best answer. Consider this code snapshot: String str = new String("CD456"); byte[] a = str.getBytes("UTF-16BE"); The content of a[1] is ___________.
67
Consider this code snapshot: String str = new String("CD456"); byte[] a = str.getBytes("UTF-16"); The content of a[5] is ___________.
68
Consider this code snapshot: String str = new String("CD456"); byte[] a = str.getBytes("UTF-16BE"); The content of a[3] is ___________.
68
A network is made of a ring of 16 nodes using bidirectional point-to-point links. These nodes use distance vector routing. Suppose these nodes turn on at the same time. How many rounds of communications are needed for all the nodes to update their routing tables with ALL nodes in the network.
7 (round 0 our starting node can communicate to its immediate surroundings, so there are 3. Round 1 it reaches 5, round 2 it reaches 7, etc...)
The following frame was "sniffed" off an Ethernet network. Below, we removed the preamble. We use only hexadecimal numbers without using "0x" or "h" symbols. Here is what was collected in network byte order: 08 06 80 35 08 06 76 3E 56 E2 08 00 08 00 32 7F 4C 2D 5C 4B EE DD .... The source MAC address is ___________________.
76 3E 56 E2 08 00
The following frame was "sniffed" off an Ethernet network. Below, we removed the preamble. We use only hexadecimal numbers without using "0x" or "h" symbols. Here is what was collected in network byte order: 76 3E 56 E2 08 00 08 06 80 35 08 06 08 00 32 7F 4C 2D 5C 4B EE DD .... The destination MAC address is ___________________.
76 3E 56 E2 08 00
Answer this question in the context of the strategy described in class and adopted by each child to manage Weekly Pocket Money Problem. A child starts numbering weeks from 0 (zero) when he get smacked. On Week 0 he got smacked when he asked 16 dollars. Assuming that the child asks for money each week, the child will ask _____ dollars on Week 4.
8
Answer this question in the context of the strategy described in class and adopted by each child to manage Weekly Pocket Money Problem. A child starts numbering weeks from 0 (zero) when he get smacked. On Week 0 he got smacked when he asked 20 dollars. Assuming that the child asks for money each week, the child will ask _____ dollars on Week 4.
8
Assume a recent TCP implementation (TCP Reno and beyond). Let the advertised window Wa (by the received) be 8 segments and the current congestion window cwnd be 16 segments. A timeout occurs. The sender can send up to _______ segments after 5 successful bursts (since the timeout).
8
Assume a recent TCP implementation (TCP Reno and beyond). Let the congestion window be 16 segments and one segment is lost. The congestion window will then be set by the sender to ________ segment(s).
8
The size of a UDP header has ________ bytes. 4 8 16 None of these answers 32
8
Answer this question based congestion control and flow control as performed by TCP. Suppose that a TCP sender 1) has cwnd set to 8,000 bytes 2) has 4,000 bytes available in its own input buffers 3) receives a segment with an advertised window of 12,000 bytes. The TCP sender will set its offered window Wnd to ________ bytes.
8,000
Consider a 4-KHz noiseless channel. The sender is using the vocabulary set S to communicate. S = {apple, banana}. The maximal bit rate is _________ bps.
8,000
In the TCP/IP model, HTTP uses this (these) port number(s) at the transport layer.
80
Match these popular protocols (services) to their port number/transport protocol. HTTP (world wide web) SMTP (early email) Telnet (unsecure remote login) SSH (secure remote login) DNS (Domain Name System)
80 TCP 25 TCP 23 TCP 22 TCP 53 UDP
Consider a 4-KHz noiseless channel. The sender is using the vocabulary set S to communicate. S = {apple, banana}. The maximal bit rate is _________ bps.
8000
Numerical answer. Consider a 4-KHz noiseless channel. The sender is using the vocabulary set S to communicate. S = {apple, banana, pear, mango}. The maximal baud (symbol) rate is _________ bauds.
8000
Assume a recent TCP implementation (TCP Reno and beyond). Let the congestion window be 18 segments and one segment gets lost triggering three dupacks (duplicate acks). The slow start threshold (ssthreshold) is then set to ________ segment(s).
9
Assume a recent TCP implementation (TCP Reno and beyond). Let the advertised window Wa (by the received) be 20 segments and the current congestion window cwnd be 16 segments. A timeout occurs. The sender can send up to _______ segments after 5 successful bursts (since the timeout).
9.78
Match these protocols in the TCP/IP reference model to some protocol they use in the layer below theirs. IP HTTP UDP IMAP DNS
9/11.25 IP - IEEE 802.11 HTTP - UDP UDP - IP IMAP - TCP DNS - UDP
A client sends multiple equal sized segments with sequence numbers 150, 240, 330,420, and 510. The size of these segments is ________ bytes.
90
Consider this network of routers A, B, C, and D that are using Distance Vector Routing. Assume that all routers are turned on at the exactly same time 0. At time 0, the routers know only the cost to reach their immediate neighbors. At time 0 (Round 0), all routers send their distance vector to their immediate neighbors. Each 30 seconds, a new round of exchanges occurs. Fill in the table below with the distance vector that Node D sends its neighbors on Round 0. If the distance is not yet known, fill in with the value 99.
99 1 3 0
Assume that the local name server just started (cache empty). Suppose a DNS client must resolve the host name toto.fluit.cs.vu.nl. Assign to each name server on the left a sequence number n based on the order it is queried. The first queried name server must be assigned the sequence number 1. Assign 99 to a name server that is not queried. Ncs root Nnl Nvu Local name server
99 2 3 4 1
Suppose a DNS client must resolve the host name toto.cs.vu.nl. Assign to each name server on the left a sequence number n based on the order it is queried. The first queried name server must be assigned the sequence number 1. Assign 99 to a name server that is not queried. Ncs root Nnl Nvu local name server
99 2 3 4 1
Assume that the local name server just started (cache empty). The local name server just resolved the hostname tatiana.robot.cs.washington.edu and right after a DNS client must resolve the host name toto.edu. Assign to each name server on the left a sequence number n based on the order it is queried. The first queried name server must be assigned the sequence number 1. Assign 99 to a name server that is not queried. Ncs Nedu root Nwas Local name server
99 2 99 99 1
Assume that the local name server just started (cache empty). Suppose a DNS client must resolve the host name toto.eng.washington.edu. Assign to each name server on the left a sequence number n based on the order it is queried. The first queried name server must be assigned the sequence number 1. Assign 99 to a name server that is not queried. Ncs Nedu root Nwas Local name server
99 3 2 4 1
Suppose a DNS client must resolve the host name toto.washington.edu. Assign to each name server on the left a sequence number n based on the order it is queried. The first queried name server must be assigned the sequence number 1. Assign 99 to a name server that is not queried. Ncs Nedu root Nwas Local name server
99 3 2 4 1
Suppose a DNS client must resolve the host name toto.edu. Assign to each name server on the left a sequence number n based on the order it is queried. The first queried name server must be assigned the sequence number 1. Assign 99 to a name server that is not queried. Ncs Nedu root Nwas local name server
99 3 2 99 1
Assume that the local name server just started (cache empty). The local name server just resolved the hostname tatiana.filts.cs.vu.nl and right after a DNS client must resolve the host name toto.cs.vu.nl. Assign to each name server on the left a sequence number n based on the order it is queried. The first queried name server must be assigned the sequence number 1. Assign 99 to a name server that is not queried. Ncs root Nnl Nvu Local name server
99 99 99 2 1
Assume that the local name server just started (cache empty). The local name server just resolved the hostname tatiana.filts.cs.vu.nl and right after a DNS client must resolve the host name toto.fluit.cs.vu.nl. Assign to each name server on the left a sequence number n based on the order it is queried. The first queried name server must be assigned the sequence number 1. Assign 99 to a name server that is not queried. Ncs root Nnl Nvu Local name server
99 99 99 2 1
Assume that the local name server just started (cache empty). The local name server just resolved the hostname tatiana.fluit.cs.vu.nl and right after a DNS client must resolve the host name toto.fluit.cs.vu.nl. Assign to each name server on the left a sequence number n based on the order it is queried. The first queried name server must be assigned the sequence number 1. Assign 99 to a name server that is not queried. Ncs root Nnl Nvu Local name server
99 99 99 2 1
Assume that the local name server just started (cache empty). The local name server just resolved the hostname tatiana.robot.cs.washington.edu and right after a DNS client must resolve the host name toto.washington.edu. Assign to each name server on the left a sequence number n based on the order it is queried. The first queried name server must be assigned the sequence number 1. Assign 99 to a name server that is not queried. Ncs Nedu root Nwas Local name server
99 99 99 2 1
Assume that the local name server just started (cache empty). The local name server just resolved the hostname tatiana.vu.nl and right after a DNS client must resolve the host name toto.cs.vu.nl. Assign to each name server on the left a sequence number n based on the order it is queried. The first queried name server must be assigned the sequence number 1. Assign 99 to a name server that is not queried. Ncs root Nnl Nvu Local name server
99 99 99 2 1
Wireless communications use ____________________ as a medium.
>>None of these choices<< twisted pairs ethernet cables fiber optic cable
Based on Shannon's Theorem, the capacity of a noiseless channel is ________. infinite less than 1 Gbps. None of these answers null lower than Nyquit's limit with a valence of 2
??
The class of IP Address 1.20.140.153 is _________.
A
The class of IP Address 126.200.40.13 is _________.
A
The class of IP Address 45.20.14.53 is _________. B C None of these answers D A
A
The class of IP Address 63.20.140.153 is _________.
A
The following frame was "sniffed" off an Ethernet network. Below, we removed the preamble and the frame header. We use only hexadecimal numbers without using "0x" or "h" symbols. Below are the IP and TCP headers. Here is the IP packet in network byte order: 46 6F 06 00 01 24 00 00 40 06 56 7A 83 CC 0E 65 83 CC 34 43 23 00 4E 21 78 1C 5E 32 12 67 89 E2 50 10 00 34 67 F1 B3 This IP packet carries _____ . The source port number is _____ . The destination port number is _____ .
A TCP segment 781C 5E32
The key reason(s) why digital signals must be modulated before sent is (are):
A medium treats differently signals using different frequencies
UDP offers these services. Addressing Error Detection Error Correction Flow Control Congestion control
Addressing Error Detection
Opening a TCP connection performs these functions:
Agree on the initial sequence numbers used by server and client Agree on a maximum segment size
ASK stands for -------- -------- --------
Amplitude Shift Keying
In the OSI reference model, the [name1] layer receives service directly from the presentation layer.
Application
In the OSI reference model, this layer is the closest to the "user".
Application
In the TCP/IP reference model, the transport layer provides service directly to the _______ layer.
Application
In the TCP/IP Reference Model, your wireless router/access point uses this (these) layer(s) when you are configuring it using a browser
Application Data Link/Link Transport Internet/Network
The TCP/IP Reference Model includes this (these) layer(s).
Application Transport Link
In the OSI reference model, this layer is an intruder (i.e., it does not belong within this list of options).
Application ------------------------------------------ Physical None of the above Network Application Data Link
In the TCP/IP Reference Model, your laptop uses this (these) layer(s) when you are configuring your wireless router/access point using a browser.
Application Data Link / Link Transport Internet / Network
In the OSI Reference Model, your laptop uses this (these) layer(s) when you are configuring your wireless router/access point using a browser.
Application Presentation Internet / Network Physical Session Transport Data Link / Link
In the OSI reference model, these layers are active on only devices at the end points of a conversation.
Application Transport Session Presentation
In the OSI reference model, this layer is an intruder (i.e., it does not belong within this list of options).
Data Link ------------------------------------------ None of the above Application Presentation Data Link Transport
In the TCP/IP Reference Model, a bridge uses this (these) layer(s) when carrying a conversation.
Data Link / Link
In the TCP/IP Reference Model, an L2 switch uses this (these) layer(s) when carrying a conversation.
Data Link / Link
In the TCP/IP Reference Model, these layers are mostly implemented by hardware on most hosts (clients or servers).
Data Link / Link
In the TCP/IP Reference Model, your Ethernet interface uses this (these) layer(s) when you are browsing the Internet.
Data Link / Link
In the TCP/IP Reference Model, an L3 switch uses this (these) layer(s) when carrying a conversation.
Data Link / Link Internet / Network
In the OSI Reference Model, these layers are mostly implemented by hardware on most hosts (clients or servers).
Data Link / Link Physical
In the OSI Reference Model, your Ethernet interface uses this (these) layer(s) when you are browsing the Internet.
Data Link / Link Physical
In the TCP/IP Reference Model, your wireless network interface uses this (these) layer(s) when you are browsing the Internet.
Data Link/Link Physical NOT Internet / Network **NOTE** I just used these answers and got 0 points
Consider the method p.receive(s) where p = new DatagramSocket(); The type of the parameter s is _____________ .
DatagramPacket
Consider this incomplete code snapshot: int a, e; short b, f; byte g; DataOutputStream c; DatagramSocket d; InputStream w; ByteArrayOutStream x = new ByteArrayOutputStream(); c = new DataOutputStream(x); DataInputStream s = new DataInputStream(w); If I write a statement d.send(m), m is most likely of type __________.
DatagramPacket
Any UDP client socket program in Java must use this function call to establish a socket.
DatagramSocket
Any UDP server socket program in Java must use this function call to establish a socket.
DatagramSocket
The method DatagramSocket() returns a result of type _________.
DatagramSocket
These fields on the TCP header are used for addressing.
Destination Port Number Source Port Number
Match each protocol to the routing algorithm used. Routing Information Protocol Open Shortest Path First Border Gateway Protocol
Distance Vector Routing Link State Routing Path Vector Routing
A receiver receives the following frame using Flag Bytes with Byte Stuffing: FLAG ESC ESC Y X ESC FLAG R FLAG where letters A-Z represent bytes. The payload, i.e., the message, sent (without the stuffing if any) inside this frame is _________.
ESC Y X FLAG R
Check all that apply about connectionless services.
Each item carries all information needed to deliver it even if some links/nodes fail Intermediary nodes do not store any state about the offered service Items of the "same conversation" may take different paths.
BGP is likely used to update routing tables on Auburn University routers.
False
For reliability, a timer is necessary at the receiver if the channel can loose packets.
False
For reliability, a timer is necessary at the receiver if the channel only corrupt packets payloads.
False
For reliability, a timer is necessary at the sender if the channel only corrupts packet payloads.
False
In the OSI Reference model, a transport protocol data unit (TPDU) encapsulates a network protocol data unit.
False
In the TCP/IP model, an application message can be a packet's payload.
False
In the TCP/IP reference model, a UDP datagram can be a frame's payload.
False
In the TCP/IP reference model, an application message can be a frame's payload.
False
Of the routing algorithms we studied, _______________ is the simplest one.
Flooding
With this routing algorithm, the node forwards each (unseen) packet on all outgoing interfaces, except the one the packet came in from.
Flooding
_________ is the design issue that consists of avoiding that a sender overwhelms a receiver.
Flow Control (Congestion Control is Receiver + Nodes)
FSK stands for _____ _____ _____
Frequency Shift Keying
When a packet is successfully delivered without any issue, this (these) protocol(s) would not likely be involved.
ICMP
IP (Internet Protocol) provides service directly to these protocols.
ICMP TCP UDP
Match these protocols in the TCP/IP reference model to some protocol they usually use in the layer below theirs. IP POP3 UDP FTP DNS
IEE 802.11 TCP (Almost certain this is right) IP TCP (Almost certain this is right) UDP (Almost certain this is right)
Check the protocol(s) that belong(s) to the presentation layer
IEEE 754
A wireless LAN uses most likely the ________ standard.
IEEE 802.11
Wifi uses the ____________ standard.
IEEE 802.11
Your wireless network at home (to access the Internet) uses most likely the ________ standard.
IEEE 802.11
Check the protocol(s) that belong(s) to the physical layer
IEEE 802.11 IEEE 802.3
Ethernet uses the ____________ standard.
IEEE 802.3
These (this) protocol(s) are contention based protocols.
IEEE 802.3 IEEE 802.11
Match these protocols in the TCP/IP reference model to some protocol they use in the layer below theirs. IP IMAP TCP Trivial File Transfer Protocol SMTP
IEEE 802.3 TCP IP UDP TCP PARTIAL(2.6/3.25) IP -- POP3 (IEEE 802.3 was not in the option list) IMAP -- TCP UDP -- IP Trivial File Transfer Protocol -- UDP ESMTP -- TCP
Check the protocol(s) that belong(s) to the data link layer
IEEE 802.3 IEEE 802.11
These (this) IEEE 802.x protocol(s) are fully collision free.
IEEE 802.4 IEEE 802.5
A DNS server uses ________ at the network (internet) layer.
IP
The Border Gateway Protocol (BGP) uses _______ as its network protocol.
IP
The Open Shortest Path First protocol (OSPF) uses _______ as its network protocol.
IP
The Routing Information Protocol (RIP) uses _______ as its network protocol.
IP
These are routing mechanisms
IP Hot Potato Early Exit
This (these) protocol(s) are used at the Internet (Network) layer in the TCP/IP Reference model.
IP ICMP (multiple versions - may only have one of these options listed)
These are routing mechanisms.
IP early exit hot potato
Match these protocols to their layers in the TCP/IP reference model. IP UDP TCP HTTP DNS POP3 UDP FTP SMTP
IP -- Internet (network) UDP -- Transport TCP -- Transport HTTP -- Application DNS -- Application POP3 -- Application FTP -- Application SMTP -- Application (Some may not appear)
Check the information that a DHCP Server provides. IP address of DNS server Subnet mask IP address None of these answers Name of the DNS Server IP address of gateway router
IP address IP address of gateway router Subnet mask IP address of DNS server
In the TCP/IP model, TCP uses this (these) protocol(s) at the network (Internet) layer.
IPv4 IPv6
Check all that apply to IP addresses. IPv4 has 32 bits addresses It uniquely identifies a network interface A host cannot have multiple IP addresses at the same time All interfaces on a host have the same IP address IPv6 has 64 bits adresses
IPv4 has 32 bits addresses It uniquely identifies a network interface
Check the protocol(s) that belong(s) to the network layer
IPv6 IPv4
In the TCP/IP model, UDP uses this (these) protocol(s) at the network (Internet) layer.
IPv6 IPv4
Most hosts on the Internet will have these protocols active on them.
IS TCP IS DNS client IS IP (There are other options- 1 more is either UDP or HTTP server) NOT DNS server
Check all statements/method calls that TCP server or client must absolutely include to receive data using I/O streams a and b. The TCP server or client uses the socket variable sock. b.write(...) b.read(......) OutputStream b = sock.getOutputStream(); None of these answers InputStream a = sock.getInputStream();
InputStream a = sock.getInputStream();
In the OSI reference model, adjacent layers use an [name1] to communicate.
Interface
In the TCP/IP reference model, IP belongs to the _______________ layer.
Internet
The TCP/IP Reference Model includes namely this (these) layer(s). Internet Session Transport Link Network
Internet Transport Link
In the TCP/IP model, an instance in the transport layer wants to send a data unit m. The first header added to m will be a header belonging to the ________ layer.
Internet (Network)
In the TCP/IP Reference Model, a router uses this (these) layer(s) when carrying a conversation.
Internet / Network Data Link / Link
In the OSI Reference Model, these layers are mostly implemented by software on most hosts (clients or servers). Physical Link Application Session Internet / Network Transport Presentation
Internet / Network Session Presentation Application Transport
In the OSI Reference Model, an L3 switch uses this (these) layer(s) when carrying a conversation.
Internet / Network Data Link / Link Physical
In the OSI Reference Model, your wireless router/access point uses this (these) layer(s) when you are configuring it using a browser.
Internet / Network Session Physical Presentation Application Transport Data Link / Link
In the TCP/IP Reference Model, the youtube server uses this (these) layer(s) when streaming to you videos.
Internet / Network Transport Application Data Link / Link
In the context of computer networks, IP stands for ______________.
Internet Protocol
Check all that applies to this frame "sniffed" on the medium (expressed in hexadecimal. Preamble is not included): 76 3E 56 E2 08 00 08 06 80 35 08 06 08 00 47 7F 05 4E 5C 4B EE DD 12 11 10 E5 83 CC 0E 37 83 CC 0E 40 27 1A 27 D7 00 00 12 05 10 E2 00 34 ..
It contains an IP packet WITHOUT options It contains an IPv4 packet It contains a UDP datagram
Check all that applies to this frame "sniffed" on the medium (expressed in hexadecimal. Preamble is not included): 76 3E 56 E2 08 00 08 06 80 35 08 06 08 00 45 7F 05 4E 5C 4B EE DD 12 06 10 E5 83 CC 0E 37 83 CC 0E 40 27 1A 27 D7 00 00 12 05 10 E2 00 34 .. Below are the frame and IP headers:
It contains an IP packet WITHOUT options It contains an IPv4 packet It contains a TCP segment
Check all that applies to this frame "sniffed" on the medium (expressed in hexadecimal. Preamble is not included): 76 3E 56 E2 08 00 08 06 80 35 08 06 08 00 47 7F 05 4E 5C 4B EE DD 12 06 10 E5 83 CC 0E 37 83 CC 0E 40 27 1A 27 D7 00 00 12 05 10 E2 00 34 ..
It contains an IPv4 packet It contains a TCP segment
Check all that applies to this frame "sniffed" on the medium (expressed in hexadecimal. Preamble is not included): 76 3E 56 E2 08 00 08 06 80 35 08 06 08 00 45 7F 05 4E 5C 4B EE DD 12 11 10 E5 83 CC 0E 37 83 CC 0E 40 27 1A 27 D7 00 00 12 05 10 E2 00 34 .. Below are the frame and IP headers:
It contains an IPv4 packet It contains an IP packet WITHOUT options It contains a UDP datagram
Check all that applies to this frame "sniffed" on the medium (expressed in hexadecimal. Preamble is not included): 76 3E 56 E2 08 00 08 06 80 35 08 06 86 DD 65 7F 05 4E 5C 4B EE DD 12 11 10 E5 83 CC 0E 37 83 CC 0E 40 27 1A 27 D7 00 00 12 05 10 E2 00 34 ..
It contains an IPv6 packet
Check all that applies to this frame "sniffed" on the medium (expressed in hexadecimal. Preamble is not included): 76 3E 56 E2 08 00 08 06 80 35 08 06 08 00 47 7F 05 4E 5C 4B EE DD 12 11 10 E5 83 CC 0E 37 83 CC 0E 40 27 1A 27 D7 00 00 12 05 10 E2 00 34 ..
It is a DIX frame It contains an IPv4 packet It contains a UDP datagram
Check all that apply to the OSI reference model.
It is a good education tool to understand networks It is an international standard of networks It is a thorough representation of computer networks
Check all that applies to the Nyquist Theorem.
It limits the baud (symbol) rate Its limit is different for different media
Check all that apply to the problem of congestion control.
It may be performed by the transport layer
Check all that apply about connection-oriented service(s).
It requires circuit set up
Check all that applies to the Shannon's Theorem.
Its limit is different for different media It limits the baud (symbol) rate It limits the bit rate It applies to noisy channels
The function call Socket is called by a ________________.
Java TCP Client to initiate a connection with a TCP server
The function call DatagramSocket is used by a ________________.
Java UDP Server to establish a UDP socket Java UDP client to establish a UDP socket
This Internet pioneer was an editor or an author for the original RFCs specifying IP, UDP, TCP, and SMTP
Jon Postel
Your wireless network at home is a _____
LAN
Medium Access Control is important and used mainly for ___________.
LANs (Local Area Networks)
In this (these) distributed routing algorithm(s), each node communicates will all other nodes about its distance to its immediate neighbors only.
Link State Routing
This word, sent using odd parity, is received. Word = 1011 1011 1 Was the word corrupted?
Maybe
In the context of OSI Reference Model (Data Link Layer), the MAC stands for ________________________________.
Medium Access Control
This issue is not a network software issue
Memory footprint --------------------------------------- Scalability None of these answers Confidentiality or authentication Memory footprint Routing
Check components that are part of the email architecture presented in class..
Message Transfer Agent Mailbox
Assume that the channel can corrupt up to one bit. The word 1011 1101 is received using the Hamming code C. The original word that was most likely sent originally (before corruption) was _____________. Code C uses four codewords L, M, N, and O defined as follows: Code C: L : 0000 0000 M: 0100 1011 N: 1011 0101 O: 1111 1010
N: 1011 0101
A host H has IP address A represented in dotted-decimal as 120.204.14.65. Select the instruction that computes the network ID NID of IP Address A.
NID = A & 0xff000000
A host H has IP address A represented in dotted-decimal as 56.204.14.65. Select the instruction that computes the network ID NID of IP Address A.
NID = A & 0xff000000
A host H has IP address A represented in dotted-decimal as 56.204.14.65/9. Select the instruction that computes the network ID NID of IP Address A.
NID = A & 0xff800000
A host H has IP address A represented in dotted-decimal as 120.204.14.65/11. Select the instruction that computes the network ID NID of IP Address A.
NID = A & 0xffe00000
A host H has IP address A represented in dotted-decimal as 56.204.14.65/13. Select the instruction that computes the network ID NID of IP Address A.
NID = A & 0xfff80000
A host H has IP address A represented in dotted-decimal as 56.204.14.65/15. Select the instruction that computes the network ID NID of IP Address A.
NID = A & 0xfffe0000
A host H has IP address A represented in dotted-decimal as 128.204.14.65. Select the instruction that computes the network ID NID of IP Address A.
NID = A & 0xffff0000
A host H has IP address A represented in dotted-decimal as 191.204.14.65. Select the instruction that computes the network ID NID of IP Address A. NID = A & 0x00000000 NID = A & 0xff000000 NID = A & 0xffffff00 None of these answers NID = A & 0xffff0000
NID = A & 0xffff000000
A host H has IP address A represented in dotted-decimal as 191.204.14.65/20. Select the instruction that computes the network ID NID of IP Address A.
NID = A & 0xfffff000
A host H has IP address A represented in dotted-decimal as 200.204.14.65. Select the instruction that computes the network ID NID of IP Address A.
NID = A & 0xffffff00
A host H has IP address A represented in dotted-decimal as 200.204.14.65/26. Select the instruction that computes the network ID NID of IP Address A.
NID = A & 0xffffffc0
A host H has IP address A represented in dotted-decimal as 128.204.14.65/28. Select the instruction that computes the network ID NID of IP Address A.
NID = A & 0xfffffff0
These fields on the TCP header are used to provide network routing.
NOT Destination Port Number 32-bit acknowledgement number Source Port Number 16 bit checksum
The following frame was "sniffed" off an Ethernet network. Below, we removed the preamble and the frame header. We use only hexadecimal numbers without using "0x" or "h" symbols. Below are the IP and TCP headers. Here is the IP packet in network byte order: 45 6F 06 00 01 24 00 00 40 11 56 7A 83 CC 0E 65 83 CC 34 43 4E 4E 21 23 00 78 1C 5E 32 12 67 89 E2 50 10 00 34 F1 B3 This IP packet carries _____. The source port number is _____. The destination port number is _____.
NOT (A TCP segment, 2300, 781C) NOT(a TCP segment, 4E21, 2300) PARTIAL(8.33/12.5) TCP segment 4E21 2300 (I got a correct answer with this exact byte order that was a UDP datagram None of these answers None of these answers )
A client has in its sending buffer these equal sized segments with sequence numbers 15, 25, 35,45, 55, 65, and 75. Based on congestion control and flow control, its offered window is 30 bytes. So far, the client sent segments with Sequence numbers 15, 25, and 35. The highest acknowledgement it received is 45. This client could send new segments with Sequence number up to __________ . (Answer -1 if the client cannot send anymore new segments).
NOT -1
Today, most wired LANS run at speeds from ________ up to ________ .
NOT 1 Mbps up to 100 Gbps (both could be wrong, or just one could be wrong)
Select the best answer from each dropdown menu. Use byte counting to frame the words "I", "Love", "THE", and "Constitution". A frame is made of one word that may contain multiple characters (do not count space characters). Complete the framing of the above words: [blank] I [blank] Love [blank] THE [blank] Constitution
NOT 1,4,3,12 (probably 2,5,4,13)
A network is made of a chain of 10 nodes. These nodes use distance vector routing. Suppose these nodes turn on at the same time. How many rounds of communications are needed for all the nodes to update their routing tables with ALL nodes in the network?
NOT 10
Answer this question in the context of the strategy described in class and adopted by each child to manage Weekly Pocket Money Problem. A child starts numbering weeks from 0 (zero) when he get smacked. On Week 0 he got smacked when he asked 24 dollars. Assuming that the child asks for money each week, the child will ask _____ dollars on Week 5.
NOT 14
Check the transport layer protocol(s) used for the delivery of an email from a Message Transfer Agent to a Receiver User Agent.
NOT SMTP NOT UDP NOT None NOT (POP3, IMAP)
Answer this question in the context of the strategy described in class and adopted by each child to manage Weekly Pocket Money Problem. A child starts numbering weeks from 0 (zero) when he get smacked. On Week 0 he got smacked when he asked 32 dollars. Assuming that the child asks for money each week, the child will ask _____ dollars on Week 7.
NOT 18 (I figured it was because 1=>2=>4=>8=>16=>17=>18)
Suppose that cwnd = 1,000 bytes. The latest segment received by a client had the advertised window set to 40 bytes. The client has in its sending buffer these equal sized segments with sequence numbers 15, 25, 35,45, 55, 65, and 75. So far, the client sent segments with Sequence numbers 15, 25, and 35. The highest acknowledgement it received is 45. This client could send up to __________ new segments. (Answer -1 if the client cannot send anymore new segments).
NOT 2
Suppose that cwnd = 30 bytes. The latest segment received by a client had the advertised window set to 40 bytes. The client has in its sending buffer these equal sized segments with sequence numbers 15, 25, 35,45, 55, 65, and 75. So far, the client sent segments with Sequence numbers 15, 25, and 35. The highest acknowledgement it received is 25. This client could send up to __________ new segments. (Answer -1 if the client cannot send anymore new segments).
NOT 2
A user types the command "arp -a" on the console of the machine csexmac161engauburnedu. The arp command displays (see picture) the content of the ARP cache of the machine csexmac161engauburnedu. Suppose that IP on this machine must send a packet to the interface with IP Address 192.168.1.124. When IP asks ARP for the address 192.168.1.124, ARP will return the MAC address ________________.
NOT 2:f:b5:13:2:ca NOT c8:b3:73:2e:f8:29
A user types the command "arp -a" on the console of the machine csexmac161engauburnedu. The arp command displays (see picture) the content of the ARP cache of the machine csexmac161engauburnedu. Suppose that IP on this machine must send a packet to the interface with IP Address 192.168.1.114. When IP asks ARP for the address 192.168.1.114, ARP will return the MAC address ________________.
NOT 2:f:b5:97:25:12
A client sends seven equal sized segments with sequence numbers 15, 25, 35,45, 55, 65, and 75. Segments with sequence numbers 35 and 65 get lost. The client will receive _______ duplicate acknowledgements after the server received segment #75.
NOT 4
A client sends seven equal sized segments with sequence numbers 15, 25, 35,45, 55, 65, and 75. Segments with sequence numbers 35, 55 and 65 get lost. The client will receive _______ duplicate acknowledgements after the server received segment #75.
NOT 5
A DNS client binds to Port # _______.
NOT 53
A client sends seven equal sized segments with sequence numbers 15, 25, 35,45, 55, 65, and 75. Segments with sequence numbers 45 and 65 get lost. The client will receive the acknowledgement number ______________ after the server receives segment #75.
NOT 55
Suppose that cwnd = 40 bytes. The latest segment received by a client had the advertised window set to 50 bytes. A client has in its sending buffer these equal sized segments with sequence numbers 15, 25, 35,45, 55, 65, and 75. So far, the client sent segments with Sequence numbers 15, 25, and 35. The highest acknowledgement it received is 25. The next segment that the client could send is segment with Sequence number to __________ (answer -1 if the client cannot send anymore new segments).
NOT 55
A client sends seven equal sized segments with sequence numbers 15, 25, 35,45, 55, 65, and 75. Segments with sequence numbers 35 and 65 get lost. The server will send acknowledgement number ______ after receiving segment with sequence number 75.
NOT 65
A network is made of 16 nodes using a broadcast medium. These nodes use distance vector routing. Suppose these nodes turn on at the same time. How many rounds of communications are needed for all the nodes to update their routing tables with ALL nodes in the network.
NOT 8
The class of IP Address 254.20.14.53 is _________.
NOT D (Should be None of these answers)
In the TCP/IP Reference Model, a repeater uses this (these) layer(s) when carrying a conversation.
NOT Data Link / Link NOT Physical
In the OSI Reference Model, your wireless network interface uses this (these) layer(s) when you are browsing the Internet. Application Session Internet / Network Presentation Transport Physical Data Link / Link
NOT Data Link/ Link NOT Internet/ Network Not Internet/Network, Data Link / Link, Transport, & Application
Apart the difference in the layers where they perform, DNS is a service most similar to the _________ service.
NOT IP NOT NAT NOT DHCP
Assuming that congestion control is used, flow control protects the input buffers of these devices from overflowing. sender receiver intermediary nodes None of these answers links
NOT Intermediary Nodes
Assuming that flow control is used, congestion control is necessary to protect the input buffers of these devices from overflowing. intermediary nodes receiver None of these answers sender links
NOT Intermediary nodes, receiver
This (These) protocol(s) is (are) routing protocol(s) (modifying routing tables) that could be used on the Internet backbone. Group of answer choices None of these answers Border Gateway Protocol (BGP) Internet Protocol (IP) Open Shortest Path First (OSPF) Routing Information Protocol (RIP)
NOT Internet Protocol (IP)
In general, these protocols/services may use directly or indirectly a DNS client. SMTP server SMTP client POP3 server telnet client telnet server POP3 client None of these
NOT None of these NOT (HTTP server, ssh Server, DNS server) NOT (ssh client, DNS client)
The checksum on the TCP header covers ________________. (Answers may overlap) None of these answers The TCP payload The IP payload Protocol number (from IP header) The TCP header The full IP header The IP addresses (in the IP header)
NOT None of these Answers
The network ID of IP Address 212.202.100.63/28 is _________. 212.202.100.16 212.202.100.48 None of these answers 212.202.100.32 212.202.100.0
NOT None of these answers
Check all features/services ESMTP allows/offers.
NOT Used to encrypt and transfer data from the Message Transfer Agent to the Receiver User Agent NOT Used to encrypt and transfer encrypted data from the Sender User Agent to the Message Transfer Agent
Check all features/services ESMTP allows/offers.
NOT Used to transfer data in plain from to a Message Transfer Agent to a Message Transfer Agent PARTIAL 5/10 Encrypts and transfers ASCII text Used to transfer data in plain from to a Message Transfer Agent to a Message Transfer Agent Used to encrypt and transfer encrypted data from the Sender User Agent to the Message Transfer Agent PARTIAL (1.5/3) Encrypts and transfers ASCII text
The expression (flags & 4) is of type ____________.
NOT boolean NOT byte NOT None of these Answers
A user types the command "arp -a" on the console of the machine csexmac161engauburnedu. The arp command displays (see picture) the content of the ARP cache of the machine csexmac161engauburnedu. Suppose that IP on this machine must send a packet to the interface with IP Address 192.168.1.144. When IP asks ARP for the address 192.168.1.144, ARP will return the MAC address ________________.
NOT c8:b3:73:2e:f8:29 NOT f4:5c:89:b6:b8:e7
Check all features that TCP offers while UDP does NOT.
NOT congestion control NOT addressing NOT guaranteed throughput
A(n) __________ is a set of rules defining communications between peer layers.
NOT interface Probably protocol
Apart the difference in the layers where they perform, DNS is a service most similar to the _________ service. DHCP IP none of these answers ARP NAT
NOT none of these answers
In the OSI reference model, IP belongs to the _______________ layer.
Network
In the OSI reference model, the [name1] layer provides service directly to the transport layer.
Network
In the OSI reference model, the [name1] layer receives service directly from the data link layer.
Network
Check all applications that UDP uses. Trivial FTP IMAP None of these answers Telnet ssh DNS
None of these Answers
For DNS, the domain name "cisco" is defined under the domain .com (to form cisco.com). These domains can not use the domain cisco under them. edu None of these answers us museum net
None of these Answers
Using DNS, each domain name (i.e., edu, cisco.com, cs.washington.edu, tamu.edu, cs.tamu.edu, .....) must have at least ________ name server(s).
None of these Answers
A client sends five equal sized segments with sequence numbers 15, 35, 55, 75, 95 Segments with sequence numbers 55 and 75 get lost. The server will likely send a segment with sequence number ______ after receiving segment with sequence number 15.
None of these answers
A client sends five equal sized segments with sequence numbers 15, 35, 55, 75, 95 Segments with sequence numbers 55 and 75 get lost. The server will likely send a segment with sequence number ______ after receiving segment with sequence number 35.
None of these answers
A client sends five equal sized segments with sequence numbers 15, 35, 55, 75, 95 Segments with sequence numbers 55 and 75 get lost. The server will likely send a segment with sequence number ______ after receiving segment with sequence number 95. 55 15 115 35 None of these answers
None of these answers
A receiver receives the following frame using Flag Bytes with Byte Stuffing: FLAG FLAG Y X ESC FLAG R FLAG where letters A-Z represent bytes. The payload, i.e., the message, sent (without the stuffing if any) inside this frame is _________. ESC Y X FLAG R Y X ESC ESC R None of these answers Y X FLAG R Y X ESC FLAG R
None of these answers
Check all applications that TCP uses. Trivial FTP None of these answers FTP DNS SMTP HTTP
None of these answers
Check all that apply. During the lecture, we encoded the three boolean members single, rich, and female using one byte b using the following rules as illustrated by this figure: bit 7 bit 6 bit 5 bit 4 bit 3 bit 2 bit 1 bit 0 0 0 0 0 0 female rich single - bit 0 is the least significant bit. bit 0 is set to 1 if the friend is single. - bit 1 is set to 1 if the friend is rich. - bit 2 is set to 1 if the friend is female. Suppose that after encoding the three boolean members single, rich, and female of a friend f into a byte b, we get b = 0x0. Check all that apply about the friend f.
None of these answers
Consider this code snapshot: String str = new String("CD456"); byte[] a = str.getBytes("UTF-16"); The content of a[0] is ___________.
None of these answers
Consider this code snapshot: String str = new String("CD456"); byte[] a = str.getBytes("UTF-16"); The content of a[1] is ___________.
None of these answers
The function call datagramsocket is used by a ________________. Pay attention! Java is case sensitive.
None of these answers (There are multiple questions with different choices, but in my experience they are always "None of these Answers". Double check before proceeding.)
This issue is not a network software issue
None of these answers ------------------------------------ Routing Confidentiality or authentication Scalability None of these answers Congestion or flow control
A host H has IP address 56.204.14.65. Suppose you want to send some packet to all hosts on the same network as H . You could use this (these) addresses. None of these answers 56.204.255.255 56.204.14.255 255.204.14.65 56.204.14.0
None of these answers (I think it would just be 56.255.255.255)
Assume you just received data is stored in network byte order. Below is a snapshot of the data memory storing data. The first column is the address while second one is the data at that address. The integer (short) variable at address 0x1006 is ___________. Address Content 0x1000 0x34 0x1001 0xB4 0x1002 0x20 0x1003 0xAE 0x1004 0x42 0x1005 0x67 0x1006 0x19 0x1007 0x3C 0x1008 0x8C
None of these answers (answer is 193C)
In the OSI reference model, an instance in the network layer wants to send a data unit m. The first header added to m will be a header belonging to the ________ layer.
None of these answers (data link)
Consider a system with 4 stations X,Y, Z, and W that use CDMA. These four stations use the chip sequences x, y, z and w that are all mutually orthogonal. Stations X, Y, Z, and W send 0, 0, 1, and 0, respectively. If S is the resulting signal S then w.S = ________.
None of these answers (would be -||w||^2)
A server sends a 10 bytes segment with sequence number 0. The client receives it correctly. The client will respond with Sequence number_________.
None of these choices
A server sends a 1000 bytes segment with sequence number 3500. The client receives it correctly. The client will respond most likely with Sequence number_________.
None of these choices
Check all that apply to TCP or UDP ports.
None of these choices
Select the best answer. Wireless communications use ____________________ as a medium. fiber optics cable None of these choices twisted pairs ethernet cables
None of these choices
In this (these) distributed routing protocols(s), each node communicates will all other nodes about its distance to its immediate neighbors only.
OSPF
This (These) protocol(s) use(s) link state routing or one of its improved variants.
OSPF
__________________ is an interior gateway protocol using ____________ routing.
OSPF: Link State
This (These) protocol(s) is (are) routing protocol(s) (modifying routing tables) that could be used on autonomous systems (i.e., not on the Internet backbone).
Open Shortest Path First (OSPF) Routing Information Protocol (RIP)
Match these wired transmission media from the one supporting the highest bandwidths to the lowest. Assign 1 to the one that supports the highest bandwidths and 99 to the expressions that are not wired media.
Optical fiber - 1 Coaxial cable - 2 Twisted pairs - 3 Satellite links - 99 Terrestrial microwave - 99
Bluetooth is a technology that could work for these types of networks
PAN (Personal Area Network) LAN (Local Area Network)
______________ links connect individual pairs of machines.
PARTIAL NOT bus
In the TCP/IP Reference Model, these layers are mostly implemented by software on most hosts (clients or servers).
PARTIAL (2.08/6.25) Link Transport Internet/Network PARTIAL (4.17/6.25) Internet/Network Transport
In this (these) distributed routing algorithm(s), each node communicates ONLY with its immediate neighbors to "learn" about the other nodes on the network.
PARTIAL 6.25/12.5 Distance Vector Routing NOT Link State Routing
This question is about how the Internet Protocol (IP) handles a packet P and decides where to deliver it. Consider a device D with IP address 134.89.200.145/24. On Device D, IP is handed a packet P with a destination IP address 131.204.64.170. Provide the order in which IP on Device D will perform these actions. The earliest action must be assigned 1. Any action that is incorrect or is not performed must be assigned the number 0. SSQs-RoutingTable.png send Packet P to the device with IP address 134.89.200.128 read the routing table ask ARP for the MAC address corresponding to IP Address 134.89.200.254 ask ARP for the MAC address corresponding to IP Address 131.89.200.128 check if the IP destination address of Packet P is local send Packet P to the device with IP address 134.89.200.254
PARTIAL (2.67/4) 0 2 0 0 1 0
Suppose a DNS client must resolve the host name toto.acm.org. Assign to each name server on the left a sequence number n based on the order it is queried. The first queried name server must be assigned the sequence number 1. Assign 99 to a name server that is not queried. root Nacm Norg Nwas Local name server
PARTIAL (2/5): 99 99 99 99 1
The following frame was "sniffed" off an Ethernet network. Below, we removed the preamble and the frame header. We use only hexadecimal numbers without using "0x" or "h" symbols. Below are the IP and TCP headers. Here is the IP packet in network byte order: 45 6F 06 00 01 24 00 00 40 06 56 7A 83 CC 0E 65 83 CC 34 43 23 00 4E 21 5E 32 78 1C 12 67 89 E2 50 10 00 34 67 F1 B3 This IP packet carries ______ . The source port number is _____ . The destination port number is .
PARTIAL (3.33/10) a TCP segment 4E21 5E32 PARTIAL (3.33/10) a TCP segment 5E32 781C PARTIAL (3.33/10) a UDP datagram None of these answers 2300 1/3 a TCP segment 5E32 2300 Bottom answer is NOT (5E32, 781C, 2300)
Check the application layer protocol(s) used for the submission of an email by the Sender User Agent to the Message Transfer Agent.
PARTIAL (5/10) SMTP
This question is about how the Internet Protocol (IP) handles a packet P and decides where to deliver it. Consider a device D with IP address 134.89.200.145/24. On Device D, IP is handed a packet P with a destination IP address 131.204.64.159. Provide the order in which IP on Device D will perform these actions. The earliest action must be assigned 1. Any action that is incorrect or is not performed must be assigned the number 0. SSQs-RoutingTable.png send Packet P to the device with IP address 134.89.200.254 read the routing table ask ARP for the MAC address corresponding to IP Address 134.89.200.67 ask ARP for the MAC address corresponding to IP Address 134.89.200.254 check if the IP destination address of Packet P is local send Packet P to the device with IP address 134.89.200.67 ask ARP for the MAC address corresponding to IP Address 131.89.200.254
PARTIAL (5/7) 0 2 0 0 1 0 0
The objective(s) of congestion control is (are) to :
PARTIAL (6.25) maximize throughput
Match each socket function call to the sequence it will appear on a Java TCP server. The first/earliest call is assigned the number 1. The earlier is a function call, the smaller is its assigned number. The statements must be compatible (i.e., use appropriate variables from earlier valid statements). - If a call is NOT absolutely necessary, assign it the number 99. - If a call is NOT applicable to a TCP server socket, assign it the number 77. - If two calls can be interchanged, assign them the same number. b = s.getInputStream(); s = new ServerSocket(..); a = cs.getOutputStream(); s.close() cs = s.accept(); a.read(...)
PARTIAL (7.08/8.5) 77 1 3 99 2 4
Match each socket function call to the sequence it will appear on a Java TCP server. The first/earliest call is assigned the number 1. The earlier is a function call, the smaller is its assigned number. The statements must be compatible (i.e., use appropriate variables from earlier valid statements). - If a call is NOT absolutely necessary, assign it the number 99. - If a call is NOT applicable to a TCP server socket, assign it the number 77. - If two calls can be interchanged, assign them the same number. b = s.getInputStream(); s = new ServerSocket(..); a = cs.getOutputStream(); s.close() cs = s.accept(); a.write(...)
PARTIAL (7.08/8.5) 77 1 3 99 2 5
TCP and UDP headers share these fields.
PARTIAL (8.33/12.5) source port number destination port number
Check all methods that can improve the raw (digital) transmission of bits over long distances. Use encoding schemes such as NRZ, NRZI, or Manchester delay the signal Use wireless channels Use media more prone to interferences Amplify a signal at the source Improve the quality of the medium Modulate the signal
PARTIAL (8.33/12.5): Use encoding schemes such as NRZ, NRZI, or Manchester Improve the quality of the medium
These are the underlying design constraints that resulted in what the OSI Reference Model is today
PARTIAL - 3.13/6.25 The flow of information through interfaces must be minimal NOT The flow of information through protocols must be minimal.
The transport layer provides this (these) service(s).
PARTIAL - 8.33/12.5 handles congestion detects transmission errors NOT finds paths between senders and receivers.
This question is about how the Internet Protocol (IP) handles a packet P and decides where to deliver it. Consider a device D with IP address 134.89.200.145/24. On Device D, IP is handed a packet P with a destination IP address 131.204.65.172. Provide the order in which IP on Device D will perform these actions. The earliest action must be assigned 1. Any action that is incorrect or is not performed must be assigned the number 0. send Packet P to the device with IP address 134.89.200.54 read the routing table ask ARP for a MAC address corresponding to IP Address 134.89.200.67 ask ARP for a MAC address corresponding to IP Address 131.89.200.254 check if the IP destination address of Packet P is local send Packet P to the device with IP address 134.89.200.67
PARTIAL 2.67/4 0 2 0 0 1 0
This question is about how the Internet Protocol (IP) handles a packet P and decides where to deliver it. Consider a device D with IP address 134.89.200.145/24. On Device D, IP is handed a packet P with a destination IP address 131.194.65.170. Provide the order in which IP on Device D will perform these actions. The earliest action must be assigned 1. Any action that is incorrect or is not performed must be assigned the number 0. send Packet P to the device with IP address 134.89.200.128 read the routing table ask ARP for the MAC address corresponding to IP Address 134.89.200.128 ask ARP for the MAC address corresponding to IP Address 131.89.200.54 check if the IP destination address of Packet P is local send Packet P to the device with IP address 134.89.200.54
PARTIAL 2.6l7/4 0 2 0 0 1 0 PARTIAL 6.67/20 0 2 0 3 1 4
This question is about how the Internet Protocol (IP) handles a packet P and decides where to deliver it. Consider a device D with IP address 134.89.200.145/24. On Device D, IP is handed a packet P with a destination IP address 131.204.65.171. Provide the order in which IP on Device D will perform these actions. The earliest action must be assigned 1. Any action that is incorrect or is not performed must be assigned the number 0. send Packet P to the device with IP address 134.89.200.67 read the routing table ask ARP for a MAC address corresponding to IP Address 134.89.200.54 ask ARP for a MAC address corresponding to IP Address 131.89.200.67 check if the IP destination address of Packet P is local send Packet P to the device with IP address 134.89.200.254
PARTIAL 6.67/20 0 2 3 0 1 4 PARTIAL 13.33/20 3 2 0 0 1 0
A local area network (LAN) is a network covering typically _____
PARTIAL(1.67/5): One small campus
The following frame was "sniffed" off an Ethernet network. Below, we removed the preamble and the frame header. We use only hexadecimal numbers without using "0x" or "h" symbols. Below are the IP and TCP headers. Here is the IP packet in network byte order: 46 6F 06 00 01 24 00 00 40 11 56 7A 83 CC 0E 65 83 CC 34 43 23 00 4E 21 78 1C 5E 32 12 67 89 E2 50 10 00 34 67 F1 B3 This IP packet carries _____ . The source port number is _____ . The destination port number is _____ .
PARTIAL(2/3): A TCP segment 781C 5E32 PARTIAL (1/3): a UDP datagram None of these answers 2300
Match each socket function call to the sequence it will appear on a Java UDP client. cs = s.accept() s.receive(p) s = new DatagramSocket(serverPort); s.send(p) p = new DatagramPacket(...) s.close()
PARTIAL(4.25/8.5): cs = s.accept()-77 s.receive(p)-4 s = new DatagramSocket(serverPort);-1 s.send(p)-2 p = new DatagramPacket(...)-3 s.close()-5
Fill in multiple blanks. This exercise is about framing. The following character encoding is used in a data link protocol: X: 01000111 Y: 11100111 FLAG: 01111110 ESC:11100111 Show the bit sequence transmitted (in binary) for the four-character frame X Y ESC FLAG when byte counting is used. Pay attention to the order. Fill in the following 8-bit groups. Some groups at the end may have less than 8 bits. If the group is empty, fill it with "-" (ONE minus character).
PARTIAL(5.36/12.5): 01000111 ;11100111 ;11100111 ;01111110 ;- ;- ;- (Probably 00000101; 01000111 ;11100111 ;11100111 ;01111110 ;- ;-)
The IP address of some URL at Auburn University is (in binary. Nibbles are separated just to help readability) 1000 0011 1100 1100 0110 1110 1001 1110 This IP address is the same as __________________. 131.204.108.156 in dotted decimal notation None of these answers 0x83CC6E9E 131.204.110.158 in dotted decimal notation 0x83CC6C9C
PARTIAL(5/10) 0x83CC6E9E NOT None of these answers
The data link layer offers in general these services/functions.
PARTIAL(9.38/12.5): addressing error control flow control So there is a 4th option which is NOT specialized services to users that lower layers do not offer also not congestion control
Check all applications that use TCP. POP3 DNS Trivial FTP None of these answers HTTP ssh
POP3 HTTP ssh
Check the application layer protocol(s) used for the delivery of an email from a Message Transfer Agent to a Receiver User Agent.
POP3 IMAP
Most hosts on the Internet will have these protocols active on them. DHCP server IP none of these answers UDP DNS server DNS client
Partial (2/3) IP DNS client NOT DHCP server
Check all that apply to TCP.
Partial (5/10) TCP stands for Transmission Control Protocol
Match each socket function call to the sequence it will appear on a Java TCP client....
Partial 1.21/8.5 b = s.getOutputStream(); 77 s = new ServerSocket(..); 1 a = cs.getInputStream(); 3 s.close() 99 cs = s.accept(); 2 b.write(...) 4 s = new Socket(..); 99
In the OSI Reference Model, your Bluetooth interface uses this (these) layer(s) when you are browsing the Internet.
Partial 3.13/6.25 Data Link/Link Other option is NOT Internet/Network
Match each socket function call to the sequence it will appear on a Java UDP server. s = new ServerSocket(.....) s.receive(p) s = new DatagramSocket(serverPort); s.send(p) p = new DatagramPacket(...) s.close()
Partial 7.08/8.5 77 3 1 4 2 77 Partial 7.08/8.5 77 3 1 4 2 5
This Internet pioneer was the first to invent (mention) the concept of a packet (packet switching).
Paul Baran
On an Ethernet frame, the ________ field will consist of an IP packet, an ARP request/response, or some other network protocols data units.
Payload
On an Ethernet frame, the ________ field will contain an IP packet, an ARP request/response, or other network protocols data units. Destination Source Payload Type CRC None of these answers
Payload
In order to detect and correct lost messages sent by the sender, these mechanisms may help at the sender.
Retransmission Timer
In the OSI Reference Model, a repeater uses this (these) layer(s) when carrying a conversation.
Physical
In the OSI Reference Model, a bridge uses this (these) layer(s) when carrying a conversation.
Physical Data Link / Link
In the OSI reference model, these layers are point to point layers.
Physical Data link Network
For a conversation, these layers may be active on all intermediary devices in the OSI reference model
Physical Data Link Network
This (These) layer(s) are part of the OSI Reference Model.
Physical Data Link Network
In the OSI Reference Model, an L2 switch uses this (these) layer(s) when carrying a conversation.
Physical Data Link / Link
In the OSI Reference Model, a router uses this (these) layer(s) when carrying a conversation.
Physical Data Link / Link Internet / Network
In the OSI Reference Model, your wireless router/access point uses this (these) layer(s) when it is forwarding your streaming traffic.
Physical Internet / Network Data Link / Link
In the OSI Reference Model, your laptop uses this (these) layer(s) when you are browsing the Internet (using an application like Firefox, Chrome, or Internet Explorer).
Physical Application Internet / Network Transport Presentation Data Link / Link Session
For a conversation, these layers (OSI reference model) will be active on all endpoints
Physical Transport Data Link Application Network
In the OSI Reference Model, the youtube server uses this (these) layer(s) when streaming to you videos.
Physical Transport Internet / Network Application Data Link / Link Session Presentation
Check all elements somewhat related to DNS. "Related" means that they interact with, use, are used by, or identify DNS. TCP UDP Port 53 Port 35 IP
Port 53 IP UDP
In the TCP/IP reference model, transport layers use ___________ for addressing.
Port numbers
In the OSI reference model, this layer deals with how different machines map data in memory.
Presentation
In the OSI reference model, this layer is an intruder (i.e., it does not belong within this list of options).
Presentation ------------------------------------------ None of the above Network Data Link Presentation Physical
Match each protocol with its original RFC. HTTP 1.1 TCP UDP DNS IP SMTP
RFC 2068 RFC 793 RFC 768 RFC 1034 RFC 791 RFC 821 (May not have all choices)
The original RFC specifying UDP was _________.
RFC 768
The original RFC specifying IP was
RFC 791
The original RFC specifying TCP was _________.
RFC 793
In this (these) distributed routing protocol(s), each node communicates ONLY with its immediate neighbors to "learn" about the other nodes on the network.
RIP BGP
__________________ is an interior gateway protocol using ____________ routing. OSPF:Path Vector RIP: Distance Vector None BGP: Path Vector IGP:Distance Vector
RIP: Distance Vector
Transmission lines on WANs are in general made of _______.
Radio links optical fiber copper wire
These Internet pioneers made the Internet stable (free from congestion collapse).
Raj Jain Van Jacobson
Check components that are part of the email architecture presented in class.
Receiver User Agent Sender User Agent
For DNS, the top-level domains are run by __________________ appointed by ICANN.
Registrars
In order to correct corrupted messages sent by the sender, these mechanisms may help at the sender.
Retransmission
During the opening of a TCP connection, ___________________
Server and client "agree" on the maximum segment size The client initiates the TCP connection Server and client exchange/acknowledge their initial sequence numbers
Any TCP server socket program in Java must use this function call to establish a socket.
ServerSocket
In the OSI reference model, the [name1] layer provides service directly to the presentation layer.
Session
In the OSI reference model, the [name1] layer receives service directly from the transport layer.
Session
In the OSI reference model, the transport layer provides service directly to the _______ layer.
Session
In the OSI reference model, this layer is an intruder (i.e., it does not belong within this list of options).
Session ------------------------------------------ Network Session None of the above Physical Data Link
These OSI reference model layers do not appear explicitly in the TCP/IP model.
Session Presentation Physical
Check all true statements. TCP identifies upper processes (applications) using the port number UDP identifies upper processes (applications) using the port number TCP identifies upper processes (applications) using the IP address UDP identifies upper processes (applications) using the IP address Only one port on a host can be active at a time.
TCP identifies upper processes (applications) using the port number UDP identifies upper processes (applications) using the port number
Check all that apply to TCP
TCP stands for Transmission Control Protocol Is a peer-to-peer communication protocol provides a reliable in-order byte-stream delivery stream Adapts to a slow receiver's speed Adapts to network congestion Adapts to the slowest intermediary node speed (May not have all choices listed)
This course will focus on two reference models.
TCP/IP Reference Model OSI Reference Model
______________ provides service directly to ______________
The medium access control sublayer; logical link sublayer
Check which action(s)/effect(s), if removed, would eliminate distorsion. Check the smallest number of actions/effects to remove in order to eliminate distorsion.
The medium is unfair to signals with different frequencies
Check all true statements about the physical layer in the context of the OSI reference model.
The physical layer offers service directly to the data link layer The physical layer will carry all the messages exchanged peer to peer by all the layers.
A 1250-byte frame is sent at a bitrate of 10 Mbps over a copper cable 1000 kms long. Recall that a copper cable has a propagation speed about 2/3 the speed of light. Check all right statements
The propagation time is 5 ms The total point-to-point (one way) delay is 0.006 s The transmission time is 1,000 microseconds The transmission time is 1 ms (There are 2 different questions with 2 different choices. Also there is another version of this question that randomly doesn't have these as the correct answers. I don't know man)
The key objectives/benefits of a layered design are:
The serviced layer does have to worry about the details belonging to the serving layer (service provider) Simplify a complex function/service by partitioning it into smaller functions
During its "lifetime", a TCP connection will go through these phases
Three way hand-shake Full duplex data exchange Closing
The following frame was "sniffed" off an Ethernet network. Below, we removed the preamble and the frame header. We use only hexadecimal numbers without using "0x" or "h" symbols. Below are the IP and TCP headers. Here is the IP packet in network byte order: 45 6F 06 00 01 24 00 00 40 06 56 7A 83 CC 0E 65 83 CC 34 43 4E 4E 21 23 00 78 1C 5E 32 12 67 89 E2 50 10 00 34 F1 B3 This IP packet carries _____ . The source port number is _____ . The destination port number is _____ .
a TCP segment None of these answers None of these answers
The following frame was "sniffed" off an Ethernet network. Below, we removed the preamble and the frame header. We use only hexadecimal numbers without using "0x" or "h" symbols. Below are the IP and TCP headers. Here is the IP packet in network byte order: 45 6F 06 00 01 24 00 00 40 06 56 7A 83 CC 0E 65 83 CC 34 43 4E 21 23 00 78 1C 5E 32 12 67 89 E2 50 10 00 34 67 F1 B3 This IP packet carries _____ . The source port number is _____ . The destination port number is _____ .
a TCP segment 4E21 2300
The following frame was "sniffed" off an Ethernet network. Below, we removed the preamble and the frame header. We use only hexadecimal numbers without using "0x" or "h" symbols. Below are the IP and TCP headers. Here is the IP packet in network byte order: 45 6F 06 00 01 24 00 00 40 11 56 7A 83 CC 0E 65 83 CC 34 43 4E 21 23 00 78 1C 5E 32 12 67 89 E2 50 10 00 34 67 F1 B3 This IP packet carries . The source port number is . The destination port number is .
a UDP datagram 4E21 2300
Bluetooth is a technology that could work well to connect ______
a central unit (computer) with the standard inputs/outputs Wireless speakers to an entertainment center Audio system to your cellphone in a car
An IP address identifies ___________.
a network interface
The purpose of each layer is to offer services to the layer just ________ it.
above
In the context of computer networks, ARP stands for _________________.
address resolution protocol
_________ is the design issue that consists of identifying the senders and receivers.
addressing
Check the functions/services offered by the data link layer.
addressing medium access control error control framing flow control
The network layer offers these services/functions.
addressing/naming routing congestion control
An interface defines the primitive operations and services between _________ layers.
adjacent
The presentation layer provides this (these) service(s).
allows machines with different data representations to communicate.
These protocols are multiple access protocols/schemes.
aloha slotted aloha CSMA
ARP takes as input ___________________.
an IP address
Match each socket function call to the sequence it will appear on a Java TCP client....
b = s.getInputStream(); - 77 s = new ServerSocket(..); - 1 a = cs.getInputStream(); - 3 s.close() - 99 cs = s.accept(); - 2 a.read(...) - 4
Matching. Match each socket function call to the sequence it will appear on a Java TCP server. The first/earliest call is assigned the number 1. The earlier is a function call, the smaller is its assigned number. The statements must be compatible (i.e., use appropriate variables from earlier valid statements). - If a call is NOT absolutely necessary, assign it the number 99. - If a call is NOT applicable to a TCP server socket, assign it the number 77. - If two calls can be interchanged, assign them the same number. b = s.getInputStream(); s = new ServerSocket(..); a = cs.getInputStream(); s.close() cs = s.accept(); a.read(...)
b = s.getInputStream(); - 77 s = new ServerSocket(..); - 1 a = cs.getInputStream(); - 3 s.close() - 99 cs = s.accept(); - 2 a.read(...) - 4
Check all statements/method calls that TCP server or client must absolutely include to send data using I/O streams a and b. The TCP server or client uses the socket variable sock.
b.write(...) OutputStream b = sock.getOutputStream();
Each layer requests service(s) from the layer just ________ it.
below
Consider this variable: byte flags; The expression ((flags & 4) == 4) is of type ____________.
boolean
On a ______________ medium, frames (packets) sent by any machine on that medium are received (heard) by all other machines on the medium.
broadcast
Wireless local area networks (LANs) often use ___________________ channel(s).
broadcast
Fill multiple blanks. These techniques are used for framing: _____, flag _____ with byte stuffing, flag bits with _____ stuffing, and _____ code violations.
byte count bytes bit physical layer
The type of the parameter a is _____________ assuming that d is a port number.
byte[ ]
Consider the method DatagramPacket(a, b, c, d). The type of the parameter a is _____________ assuming that d is a port number.
byte[]
Consider this code snapshot: int a, e; short b, f; byte g; DataOutputStream c; DataInputStream d; ByteArrayOutStream x = new ByteArrayOutputStream(); c = new DataOutputStream(x); If I write a statement c.write(y,0,8), y is most likely of type __________.
byte[]
Consider this code snapshot: int a, e; short b, f; byte g; DataOutputStream c; DataInputStream d; ByteArrayOutStream x = new ByteArrayOutputStream(); c = new DataOutputStream(x); Select the most likely valid statement to encode data to be sent out using TCP or UDP sockets.
c.writeByte(g);
Consider this code snapshot: int a, e; short b, f; byte g; DataOutputStream c; DataInputStream d; ByteArrayOutStream x = new ByteArrayOutputStream(); c = new DataOutputStream(x); Select the most likely valid statement to encode data to be sent out using TCP or UDP sockets.
c.writeInt(a);
Consider this code snapshot: int a, e; short b, f; byte g; DataOutputStream c; DataInputStream d; ByteArrayOutStream x = new ByteArrayOutputStream(); c = new DataOutputStream(x); Select the most likely valid statement to encode data to be sent out using TCP or UDP sockets.
c.writeShort(b);
Select one. Collision-free (i.e., with dedicated channels) multiple access protocols ____________. are not used on wireless networks have a better average delivery time than contention based MA protocols. work well for wide-area networks (>2,000 km) None of these answers guarantee upper bounds on delivery time
guarantee upper bounds on delivery time
A routing table is similar to a(n) _______________ for a road trip.
guiding (directions) sign at an intersection
Consider this incomplete code snapshot: int a, e; long h; short b, f; byte g; DataOutputStream c; DatagramSocket d; InputStream m; ByteArrayOutStream x = new ByteArrayOutputStream(); c = new DataOutputStream(x); DataInputStream v = new DataInputStream(m); Select any valid statement.
h = v.readLong();
Check all that apply to IEEE 802.3 (Ethernet)
has a contention-based MA protocol has in general a lower average time delivery than Token-ring
On networks, the machines that run users programs (applications) are most likely called ________.
hosts
This question is related to error detection. Increasing the number of check bits to the payload ('message' to send) will ______________.
increase the overhead decrease the probability to misdiagnose a corrupted.
This question is related to error detection. Decreasing the number of check bits to the payload ('message' to send) will ______________.
increase the probability to misdiagnose a corrupted. decrease the overhead
A network is a set of ___________ devices which can communicate.
independent
Consider the method DatagramPacket(a, b, c, d). The type of the parameter c is _____________ assuming that d is a port number.
inetAddress
Consider the method DatagramPacket(a, b, c, d). The type of the parameter b is _____________ assuming that d is a port number.
int
Consider the method DatagramPacket(a, b, c, d). The type of the parameter d is _____________ assuming that d is a port number.
int
The type of the parameter d is _____________ assuming that d is a port number.
int
A(n) __________ is a set of rules defining communications between adjacent layers.
interface
Check all that apply. During the lecture, we encoded the three boolean members single, rich, and female using one byte b using the following rules as illustrated by this figure: bit 7 bit 6 bit 5 bit 4 bit 3 bit 2 bit 1 bit 0 0 0 0 0 0 female rich single - bit 0 is the least significant bit. bit 0 is set to 1 if the friend is single. - bit 1 is set to 1 if the friend is rich. - bit 2 is set to 1 if the friend is female. Suppose that after encoding the three boolean members single, rich, and female of a friend f into a byte b, we get b = 0x7. Check all that apply about the friend f.
rich single female
On WANs, switches are called ___________.
routers
In the IPv4 header, the TtL (Time To Live) is related to the maximum number of _________________.
routers the packet can traverse
These functions services are offered by the network layer.
routing addressing
Designs that continue to perform well when the network gets large are said to be ___________.
scalable
Congestion Control insures that a [Select] does not overwhelms the [Select]
sender, intermediary nodes and receiver
In the OSI reference model, an instance in the presentation layer wants to send a data unit m. The first header added to m will be a header belonging to the ________ layer.
session
The number of layers in the OSI Reference model is ____________ .
seven
During the lecture, we encoded the three boolean members single, rich, and female using one byte b using the following rules as illustrated by this figure: bit 7 bit 6 bit 5 bit 4 bit 3 bit 2 bit 1 bit 0 0 0 0 0 0 female rich single - bit 0 is the least significant bit. bit 0 is set to 1 if the friend is single. - bit 1 is set to 1 if the friend is rich. - bit 2 is set to 1 if the friend is female. Suppose that after encoding the three boolean members single, rich, and female of a friend f into a byte b, we get b = 0x3. Check all that apply about the friend f.
single rich
The application layer offers in general these services/functions.
specialized services to users that lower layers do not offers addressing/naming
Consider a system with 4 stations X,Y, Z, and W that use CDMA. These four stations use the chip sequences x, y, z and w that are all mutually orthogonal. Stations X, Y, Z, and W send 0, 0, 1, and 0, respectively. If S is the resulting signal S then z.S = ________.
||z||^2