COMP 4320 - Auburn University Biaz M1-9

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

A child starts numbering weeks from 0 (zero) when he get smacked. On Week 0 he got smacked when he asked 20 dollars. Assuming that the child asks for money each week, the child will ask _____ dollars on Week 2.

2

The subnet mask of IP Address 63.20.140.153/26 is _________.

255.255.255.192

The subnet mask of IP Address 200.20.14.53/27 is

255.255.255.224

The subnet mask of IP Address 200.20.14.53/27 is _________.

255.255.255.224

The subnet mask of IP Address 164.200.40.13/29 is _________.

255.255.255.248

Consider a 4-KHz noisy channel with a 20 db SNR. The sender is using the vocabulary set S to communicate. S = {apple, banana}. The maximal bit rate is _________ bps.

26,633

Consider this network of routers A, B, C, and D that are using Distance Vector Routing. Assume that all routers are turned on at the exactly same time 0. At time 0, the routers know only the cost to reach their immediate neighbors. At time 0 (Round 0), all routers send their distance vector to their immediate neighbors. Each 30 seconds, a new round of exchanges occurs. Fill in the table below with the distance vector that Node C sends its neighbors on Round 0. If the distance is not yet known, fill in with the value 99.

2;5;0;3

A class B network can assign unique addresses to up to _______________ hosts.

2^16-2

A hamming code of distance 4 can detect up to _______ corrupted bits in a received word..

3

Consider the following code C to encode this vocabulary L, M, N, and O: L : 0000 0000 M: 0100 0011 N: 1011 0101 O: 1111 1010 The Hamming distance of Code C is _______

3

Consider these two words: W1 = 1001 1000 W2 = 0101 1010 The Hamming distance between W1 and W2 is _____.

3

Consider a 4-KHz noisy channel with a 40 db SNR. The sender is using the vocabulary set S to communicate. S = {apple, banana}. The maximal bit rate is _________ bps.

53,151.42

Consider this code snapshot: String str = new String("CD456"); byte[] a = str.getBytes("UTF-16BE"); The content of a[9] is ___________.

54

A client sends five equal sized segments with sequence numbers 15, 35, 55, 75, 95 Segments with sequence numbers 55 and 75 get lost. The server will likely send a segment with acknowledgement number ______ after receiving segment with sequence number 35.

55

The class of IP Address 128.200.40.13 is _________.

B

The class of IP Address 164.200.40.13 is _________.

B

The class of IP Address 172.202.100.3 is _________.

B

The class of IP Address 191.20.240.213 is _________.

B

The Internet is a network covering typically _____

A planet

A wide area network (WAN) is a network covering typically _____

A planet Country Continent

A class A network can assign unique addresses to up to _______________ hosts. about 16 millions 224 None of these answers 216-2 220

About 16 millions

Based on Nyquist, any medium/channel (even perfect) has a maximal capacity to carry bits. Any signal running through a low-pass filter of bandwidth B will have a maximal data rate max. If the signal consists of V discrete levels. Nyquist theorem states: max = 2 _____ log 2 ( _____ ) bits/s

B V

This (These) protocol(s) use(s) distance vector routing or one of its improved variants.

BGP RIP

IP (Internet Protocol) may get service directly from these protocols.

Bluetooth Wifi Ethernet

Check all concepts/tools/protocols that may be used to modify (update) routing tables. Border Gateway Protocol IEEE 802.3 Open Shortest Path First Medium Access Control None of these answers

Border Gateway Protocol Open Shortest Path First

This (These) protocol(s) is (are) exterior gateway protocol(s) used to update routing tables.

Border Gateway Protocol (BGP)

This (These) protocol(s) is (are) routing protocol(s) (modifying routing tables) that could be used on the Internet backbone.

Border Gateway Protocol (BGP)

Select the best definition for framing.

Breaking a stream of bits into data units

With two or more users emitting/transmitting/talking, the MAC is needed for the following topologies.

Broadcast Half-duplex

The class of IP Address 192.202.100.3 is _________.

C

The class of IP Address 200.20.14.53 is _________.

C

The class of IP Address 212.202.100.3 is _________.

C

The class of IP Address 223.202.100.3 is _________.

C

On an Ethernet frame, the ________ field indicates whether the frame is corrupted.

CRC

These MAC protocols/schemes use Carrier Sense Multiple Access

CSMA CSMA/CD

These multiple access protocols/schemes must sense the medium before transmitting.

CSMA CSMA/CD

These multiple access protocols/schemes must listen to the medium while transmitting.

CSMA/CD

These protocols are multiple access protocols/schemes.

Carrier Sense Multiple Access (CSMA) Slotted Aloha Pure Aloha

In order to detect corrupted messages sent by the sender, these mechanisms may help at the receiver. Timer Checksum Retransmission None of these answers Error detection

Checksum Error Detection

In order to detect lost messages sent by the sender, these mechanisms may help at the sender.

Checksum (Quiz said this was incorrect) NOT None of these answers

A metropolitan area network (MAN) is a network covering typically _____

City

The transport layer may offer these services.

Congestion Control Flow control Reliability

_________ is the design issue that consists of avoiding that a sender overwhelms the receiver and any intermediary nodes.

Congestion control

Most applications on any host on the Internet will use the service offered by this protocol.

DNS

Check all applications that use UDP. IMAP Telnet ssh DNS Trivial FTP

DNS Trivial FTP

Check the protocol(s) that belong(s) to the application layer

DNS SMTP HTTP SSH

Most hosts on the Internet will have these protocols active on them.

DNS client DHCP client TCP

In the OSI Reference Model (computer networks), the MAC is a sublayer of the ________________ layer

Data Link

In the OSI reference model, the physical layer offers service directly to the [name1] layer.

Data Link

This issue is not a network software issue

Energy/Power management ------------------------------- Energy/Power management Addressing, naming Routing Error detection or correction None of these answers

In the OSI reference model, these services are offered by both the transport and data link layers.

Error control Flow control Addressing

_________ ________ is the design issue that consists of correcting errors in the received information.

Error correction

TCP offers these services

Error detection Congestion control Addressing Flow control Reliable in-order delivery Error correction

This (These) protocol(s) are used at the Link layer in the TCP/IP Reference model.

Ethernet IEEE 802.11 DSL (multiple versions - may only have one of these options listed)

A sender wants to send the following payload (message) using Flag Bytes with Byte Stuffing: FLAG Y X FLAG R where letters A-Z represent bytes. The sender must build and send this frame as _________.

FLAG ESC FLAG Y X ESC FLAG R FLAG

A sender wants to send the following payload (message) using Flag Bytes with Byte Stuffing: Y X ESC R where letters A-Z represent bytes. The sender must build and send this frame as _________.

FLAG Y X ESC ESC R FLAG

Select the best answer. A sender wants to send the following payload (message) using Flag Bytes with Byte Stuffing: Y X FLAG R where letters A-Z represent bytes. The sender must build and send this frame as _________.

FLAG Y X ESC FLAG R FLAG

A receiver receives the following frame using Flag Bytes with Byte Stuffing: FLAG ESC FLAG Y X ESC FLAG R FLAG where letters A-Z represent bytes. The payload, i.e., the message, sent (without the stuffing if any) inside this frame is _________.

FLAG Y X FLAG R

A sender wants to send the following payload (message) using Flag Bytes with Byte Stuffing: Y X Z R where letters A-Z represent bytes. The sender must build and send this frame as _________.

FLAG Y X Z R FLAG

Check all applications that use TCP. None of these answers Trivial FTP FTP HTTP SMTP DNS

FTP HTTP SMTP

These application layer protocols use usually TCP at the transport layer.

HTTP SSH FTP

Check all that apply to IEEE 802.5 (Token-Ring)

Has an excellent channel efficiency Guarantees upper bound on delivery time Is a kind of time division multiplexing MA

Check all that apply to contention-based multiple access protocols

Have a good average delivery time Do not offer an upperbound on the delivery time.

In the TCP/IP Reference Model, your wireless router/access point uses this (these) layer(s) when it is forwarding your streaming traffic.

(Partial 3.13/6.25) Data Link / Link Internet / Network Physical

A 125-byte frame is sent at a bitrate of 1 Mbps over a copper cable 1000 kms long. Recall that a copper cable has a propagation speed about 2/3 the speed of light. The propagation time is equal to _________ s.

0.005

Answer this question based congestion control and flow control as performed by TCP. Suppose that a TCP sender 1) has cwnd set to 8,000 bytes 2) has 4,000 bytes available in its own input buffers 3) receives a segment with an advertised window of 0 bytes. The TCP sender will set its offered window Wnd to ________ bytes.

0

Consider this code snapshot: String str = new String("CD456"); byte[] a = str.getBytes("UTF-16"); The content of a[2] is ___________.

0

Consider this code snapshot: String str = new String("CD456"); byte[] a = str.getBytes("UTF-16"); The content of a[6] is ___________.

0

Consider this code snapshot: String str = new String("CD456"); byte[] a = str.getBytes("UTF-16BE"); The content of a[0] is ___________.

0

Consider this code snapshot: String str = new String("CD456"); byte[] a = str.getBytes("UTF-16BE"); The content of a[4] is ___________.

0

A 125-byte frame is sent at a bitrate of 1 Mbps over a copper cable 2000 kms long. Recall that a copper cable has a propagation speed about 2/3 the speed of light. The propagation time is equal to _________ s.

0.01

A 125-byte frame is sent at a bitrate of 1 Mbps over a copper cable 1000 kms long. Recall that a copper cable has a propagation speed about 2/3 the speed of light. The transmission time is equal to _________ s.

0.001

A 1250-byte frame is sent at a bitrate of 10 Mbps over a copper cable 1000 kms long. Recall that a copper cable has a propagation speed about 2/3 the speed of light. The transmission time is equal to _________ s.

0.001

The subnet mask of network N is 255.255.255.240. This network N can assign unique addresses to up to _______________ hosts. 14 6 8 16 None of these answers

14

In the IPv4 header, the _________ field is used to detect corrupted bit(s) in the IP header of an IPv4 packet.

Header Checksum

DNS is a service that maps ______________ to ______________. None of these answers IP Addresses : MAC Addresses MAC Addresses : IP Addresses IP Addresses : Host Names Host Names : IP Addresses

Host Names : IP Addresses

Consider this code snapshot: String str = new String("CD456"); byte[] a = str.getBytes("UTF-16BE"); The content of a[7] is ___________.

None of these answers

Consider this code snapshot: String str = new String("CD456"); byte[] a = str.getBytes(); The content of a[3] is ___________.

None of these answers

Consider this incomplete code snapshot: int a, e; long h; short b, f; byte g; DataOutputStream c; DatagramSocket d; InputStream m; ByteArrayOutStream x = new ByteArrayOutputStream(); c = new DataOutputStream(x); DataInputStream v = new DataInputStream(m); Select any valid statement. None of these answers f = v.readInt(); f = v.readLong(); f = c.readInt(); f = c.readLong();

None of these answers

In order to detect corrupted messages sent by the sender, these mechanisms may help at the sender.

None of these answers

In order to detect lost messages sent by the sender, these mechanisms may help at the receiver.

None of these answers

In the IPv4 header, the _________ field is used to detect corrupted bit(s) in an IPv4 packet. fragment offset None of these answers protocol identification Header Checksum

None of these answers

In the OSI reference model, the transport layer does not provide/perform this (these) service/function(s).

None of these answers

In the TCP/IP model, TCP uses this (these) protocol(s) at the application layer.

None of these answers

In the TCP/IP reference model, UDP belongs to the _______________ layer.

None of these answers

Select the best answer. Assume you just received data is stored in network byte order. Below is a snapshot of the data memory storing data. The first column is the address while second one is the data at that address. The integer (int) variable at address 0x1000 is ___________. Address Content 0x1000 0x34 0x1001 0xB4 0x1002 0x20 0x1003 0xAE 0x1004 0x42 0x1005 0x67 0x1006 0x19 0x1007 0x3C 0x1008 0x8C 0x20AE None of these answers 0x6742AE20 0x20AE4267 0xAE20

None of these answers

The UDP header can have up to _______ bytes for optional fields.

None of these answers

The function call Socket is used by a ________________.

None of these answers

The function call SocketServer is called by a ________________.

None of these answers

The function call socketclient is used by a ________________.

None of these answers

The function call socketserver is called by a ________________. (Pay attention! Java is case sensitive)

None of these answers

The method DatagramPacket(a, b, c, d) returns a result of type _________.

None of these answers

The network ID of IP Address 172.20.14.53 is _________.

None of these answers

The physical layer offers in general these services/functions.

None of these answers

___________ is necessary when _________ at the sender is lower (than at the receiver).

None of these answers

DNS is a service that maps ______________ to ______________. None of these answers Host names : Port Numbers IP Addresses : MAC Addresses MAC Addresses : IP Addresses Port Numbers : Host Names

None of these answers (If it were an option, the answer would be Host names : IP Addresses)

These devices run routing daemons to update routing tables on the Internet.

Routers L3 switches

_________________ is the design issue that consists of finding a path (list of switchs to traverse) between a source host and a destination host.

Routing

Check all concepts/tools/protocols that may be used to modify (update) routing tables. Distance Vector Routing Link State Routing Internet Protocol Routing Information Protocol None of these answers

Routing Information Protocol Distance Vector Routing Link State Routing

This (These) protocol(s) is (are) interior gateway protocol(s) used to update routing tables.

Routing Information Protocol (RIP) Open Shortest Path First (OSPF)

Check the application layer protocol(s) used for the transfer of an email from a Message Transfer Agent to another.

SMTP ESMTP

This (These) protocol(s) are used at the Application layer in the TCP/IP Reference model.

SMTP HTTP RTP DNS (multiple versions - may only have one of these options listed)

A receiver receives the following frame using Flag Bytes with Byte Stuffing: FLAG Y X ESC FLAG R FLAG where letters A-Z represent bytes. The payload, i.e., the message, sent (without the stuffing if any) inside this frame is _________.

Y X FLAG R

The following frame was "sniffed" off an Ethernet network. Below, we removed the preamble. We use only hexadecimal numbers without using "0x" or "h" symbols. This frame certainly carries as payload _______________.

Since the preamble is removed, look at bytes 13 and 14. These will determine payload (google EtherType) 0x0800 - IPv4 0x86DD - IPv6 0x0806 - ARP 0x8035 - RARP

Any TCP client socket program in Java must use this function call to establish a socket.

Socket

Check all true statements about the Weekly Pocket Money Problem.

Some children may not ask for any pocket money on some weeks A child may request and receive all the available weekly allocation B.

TCP and UDP headers share these fields.

Source Port number Destination Port number Checksum

Check the main operations performed to send and receive emails.

Submission Transfer Delivery (All options may not be available)

Check the transport layer protocol(s) used for the submission of an email by the Sender User Agent to the Message Transfer Agent.

TCP

Check the transport layer protocol(s) used for the transfer of an email from a Message Transfer Agent to another.

TCP

In the TCP/IP model, FTP uses most of the time this protocol at the transport layer.

TCP

In the TCP/IP model, HTTP uses most of the time this protocol at the transport layer.

TCP

In the TCP/IP model, SMTP uses most of the time this protocol at the transport layer.

TCP

The Border Gateway Protocol (BGP) uses _______ as its "transport" protocol.

TCP

These protocols are transport layer protocols used over the Internet.

TCP UDP

Match the protocols to their transport protocols they use. BGP OSPF RIP

TCP raw sockets UDP

In the OSI reference model, TCP belongs to the _______________ layer.

Transport

In the OSI reference model, UDP belongs to the _______________ layer.

Transport

In the OSI reference model, the [name1] layer provides service directly to the session layer.

Transport

In the OSI reference model, the [name1] layer receives service directly from the network layer.

Transport

In the OSI reference model, this end-to-end layer deals with addressing and congestion control (besides other functions).

Transport

In the OSI reference model, this end-to-end layer deals with error control and flow control (besides other functions).

Transport

In the OSI reference model, this layer is the lowest end to end layer (closest to the physical layer).

Transport

In the TCP/IP Reference Model, your laptop uses this (these) layer(s) when you are browsing the Internet (using an application like Firefox, Chrome, or Internet Explorer).

Transport Application Link Internet/Network

The TCP/IP Reference Model includes these layers.

Transport Internet Link Application (multiple versions - may only have one of these options listed)

The OSI Reference Model includes this (these) layer(s).

Transport Physical Application

For reliability, a timer is necessary at the sender if the channel can loose packets.

True

In the OSI reference model, A transport protocol data unit (TPDU) is encapsulated inside a network protocol data unit.

True

In the OSI reference model, a network protocol data unit encapsulates a transport protocol data unit.

True

In the TCP/IP reference model, a UDP datagram can be a packet's payload.

True

In the TCP/IP reference model, a packet can be a frame's payload.

True

In the TCP/IP reference model, an application message can be a datagram's payload. True False

True

In the TCP/IP reference model, an application message can be a segment's payload.

True

Routing protocols such as RIP, OSPF or BGP periodically update the routing tables.

True

On an Ethernet frame, the ________ field indicates whether the frame carries an IP, an ARP, or a RARP packet/

Type

This word, sent using odd parity, is received. Word = 1011 1011 0 Was the word corrupted?

Yes

The function call ServerSocket is used by ________________.

a Java TCP Server to establish a TCP server

ARP returns as output ___________________.

a MAC address

The following frame was "sniffed" off an Ethernet network. Below, we removed the preamble and the frame header. We use only hexadecimal numbers without using "0x" or "h" symbols. Below are the IP and TCP headers. Here is the IP packet in network byte order: 46 6F 06 00 01 24 00 00 40 06 56 7A 83 CC 0E 65 83 CC 34 43 23 00 4E 21 5E 32 78 1C 12 67 89 E2 50 10 00 34 67 F1 B3 This IP packet carries ______ . The source port number is _____ . The destination port number is ______.

a TCP segment 5E32 781C

A DNS client uses ________ at the transport layer.

UDP

A DNS server uses ________ at the transport layer.

UDP

In the TCP/IP model, DNS uses most of the time this protocol at the transport layer.

UDP

The Routing Information Protocol (RIP) uses _______ as its "transport" protocol.

UDP

Check the protocol(s) that belong(s) to the transport layer

UDP TCP

This (These) protocol(s) are used at the Transport layer in the TCP/IP Reference model.

UDP TCP (there are multiple versions so there may only be one of these in the list of options)

Match these protocols in the TCP/IP reference model to the (transport) port number they use. Choose "N/A" if the protocol does not use a port number.

UDP -- N/A IMAP -- 143 TCP -- N/A HTTP -- 80 DNS -- 53 Telnet -- 23 IP -- N/A TFTP -- 69 SMTP -- 25 FTP -- 21 ssh -- 22 (May not have all listed)

Match protocols to their original RFCs.

UDP RFC 768 TCP RFC 793 IP RFC 791 ICMP RFC 792

Check all features/services SMTP allows/offers.

Used to transfer data in plain from the Sender User Agent to the Message Transfer Agent Used to transfer data in plain from to a Message Transfer Agent to a Message Transfer Agent Transfers plain ASCII text (May not have all listed)

Pair/Matching related expressions/variables. Flow control Congestion control Offered windows

Wa: Advertised value by the receiver cwnd: A variable maintained by the sender to adapt to network conditions Min(Wa, cwnd)

____________ is a popular wireless MAN protocol.

WiMax

The rules governing the request/delivery of a service between adjacent layers is called _______________.

an interface

A medium impacts a signal it carries in different ways. In general, a coaxial cable __________ a signal that is a pure sine (cosine) wave (i.e., a signal using one frequency only).

attenuates delays

A medium impacts a signal it carries in different ways. In general, a twisted pair cable __________ a signal that is a pure sine (cosine) wave (i.e., a signal using one frequency only).

attenuates delays

A medium impacts a signal it carries in different ways. In general, a medium __________ a signal that is a baseband signal.

attenuates delays distorts

A medium impacts a signal it carries in different ways. In general, a coaxial cable __________ a signal that is a baseband signal.

attenuates distorts delays

A medium impacts a signal it carries in different ways. In general, an optical fiber __________ a signal that is a mix (sum) a signals using different frequencies.

attenuates distorts delays

A medium impacts a signal it carries in different ways. In general, a coaxial cable __________ a signal that is a mix (sum) a signals using different frequencies.

attenuates delays distorts

A medium impacts a signal it carries in different ways. In general, a twisted pair cable __________ a signal that is a mix (sum) a signals using different frequencies.

attenuates delays distorts

Complete the words starting with the indicated first letter. Do not repeat the first letter. The physical layer deals with transporting r__________ b___________

aw; its

In the CSMA/CD acronym, CD stands for ________________.

collision detection

The application layer provides this (these) service(s).

communicates with the end user. allows the end users to use the network services.

Check all features that TCP offers while UDP does NOT.

congestion control error correction (retransmissions) Reliable in-order delivery Flow control (Not all options may appear)

In the TCP/IP Reference Model, your Bluetooth interface uses this (these) layer(s) when you are browsing the Internet.

data Link / Link

In the OSI reference model, the [name1] layer provides service directly to the network layer.

data link

In the OSI reference model, this layer provides service directly to the network layer.

data link

Fill in the blanks. Some words are hinted by the first letter. Do not repeat the first letter. The ______ layer provides service directly to the network layer and has two sublayers: L _____ and M _____

data link ogical link layer edium access control

When implementing a connectionless service, we use ___________________ to carry messages.

datagram

The physical layer provides this (these) service(s).

deals with the mechanical/electrical characteristics of the transmission medium used. transmits on channels raw bits.

A medium impacts a signal it carries in different ways. In general, an optical fiber __________ a signal that is a pure sine (cosine) wave (i.e., a signal using one frequency only).

delays attenuates

A medium impacts a signal it carries in different ways. In general, an optical fiber __________ a signal that is a baseband signal.

delays attenuates distorts

The objective(s) of the physical layer is (are) to ______________.

deploy transmission techniques to optimize the use of a medium specify the electrical and mechanical specifications to establish communications send as many bits per second as possible without corruption or loss

The data link layer provides this (these) service(s).

detects transmission errors. controls the access to the medium.

Check all that apply. Any medium impacts a signal it carries in different ways. In general, a medium __________ a signal that is a mix (sum) a signals using different frequencies. None of these answers delays separates amplifies distorts attenuates

distorts attenuates delays

DNS stands for _____ _____ _____ .

domain name system

This question is about CSMA schemes. When a collision between two or more frames occurs, each station will _____________.

drop all damaged frames even if only one bit is damaged in each.

In the context of computer networks, DHCP stands for _________________.

dynamic host configuration protocol

Select the best answer. Consider this incomplete code snapshot: int a, e; long h; short b, f; byte g; DataOutputStream c; DatagramSocket d; InputStream m; ByteArrayOutStream x = new ByteArrayOutputStream(); c = new DataOutputStream(x); DataInputStream v = new DataInputStream(m); Select any valid statement.

e = v.readInt();

The transport layer offers in general these services/functions.

error control congestion control addressing/naming flow control

________________ consists of correcting errors in the received information.

error correction

_________ ________ is the design issue that consists of finding errors in the received information.

error detection

In TCP/IP reference model, a frame can be a packet's payload.

false

Routing protocols such as IP, RIP, OSPF or BGP periodically update the routing tables.

false

Using Pure Aloha, a station must sense the medium before transmitting.

false

Using Slotted Aloha, a station can transmit any time a frame is ready.

false

During the lecture, we encoded the three boolean members single, rich, and female using one byte b using the following rules as illustrated by this figure: bit 7 bit 6 bit 5 bit 4 bit 3 bit 2 bit 1 bit 0 0 0 0 0 0 female rich single - bit 0 is the least significant bit. bit 0 is set to 1 if the friend is single. - bit 1 is set to 1 if the friend is rich. - bit 2 is set to 1 if the friend is female. Suppose that after encoding the three boolean members single, rich, and female of a friend f into a byte b, we get b = 0x5. Check all that apply about the friend f.

female single

The network layer provides this (these) service(s).

finds paths between senders and receivers. may handle congestion.

___________ is necessary when _________ at the receiver is lower (than at the sender).

flow control : processing speed

In the TCP/IP model, a _________ is for a ________ what a packet is for a segment.

frame:packet

Check the functions/services offered by the logical link layer.

framing flow control addressing error control

Local radio stations use in general ______________ division multiplexing to share the medium (air).

frequency

The GSM (Global System for Mobile applications) uses ____________ division multiplexing.

frequency time

Collision-free (i.e., with dedicated channels) multiple access protocols ____________.

guarantee upper bounds on delivery time

In the context of computer networks, ICMP stands for _________________.

internet control message protocol

Consider this code snapshot: String str = new String("CD456"); byte[] a = str.getBytes(); The content of a[5] is ___________.

invalid

A (TCP or UDP) port _______

is a 16 bit number varies from 0 to 65535

Select the best answer. A garment that is made with only one kind of fabric is like a signal that __________________. cannot be attenuated cannot be delayed None of these answers is a pure sine or cosine (periodical signal with one frequency) is a periodical signal with multiple frequencies

is a pure sine or cosine (periodical signal with one frequency)

The call ServerSocket in Java performs these actions.

it binds to a port it may adjust the incoming queue it creates a socket

The call Socket in Java performs these actions

it creates a socket it may bind to a port it connects to a server

Fill in the words starting with the letters indicated: do not repeat the first letter(s). The physical layer deals with the E___________ and M___________ specifications.

lectrical; echanical

To reduce their design complexity, most networks architectures are organized as ___________.

levels, stacks, layers

The data link layers has two sublayers: -- link and -- control

logical medium access

This service does not belong to the logical link layer.

medium access control

Collision Detection is used to _______________

minimize the time wasted by collisions

Broadcast channels are also referred to as ___________ channels.

multiaccess random access

On a ______________ network, frames (packets) sent by any machine on that link are received (heard) by a subset of machines.

multicast

A header is a message exchange between Layer n and Layer ________.

n

In the OSI reference model, IP (Internet Protocol) belongs to the _________ layer.

network

In the OSI reference model, an instance in the transport layer wants to send a data unit m. The first header added to m will be a header belonging to the ________ layer.

network

A set of layers and protocols is called a _______ __________.

network architecture

In the TCP/IP reference model, an instance in the internet layer wants to send a data unit m. The first header added to m will be a header belonging to the ________ layer.

none of these answers

Two key functions/services offered by the network layer are R___________ and A___________. Do not repeat the first letter(s).

outing; ddressing

In the TCP/IP model, a _________ is for a ________ what a frame is for a packet.

packet : segment

In the TCP/IP model, a _________ is for a ________ what a segment is for a packet.

packet:frame

A protocol defines the communications rules between _________ layers.

peer

Layers at the same level on two communicating machines are called _________ .

peer layers

PSK stands for

phase shift keying

In the OSI reference model, the [name1] layer provides service directly to the data link layer.

physical

Wide area networks (WANs) often use ___________________ channel(s).

point-to-point

In the OSI reference model, an instance in the application layer wants to send a data unit m. The first header added to m will be a header belonging to the ________ layer.

presentation

In the OSI reference model, socket programming functions like ntohs(), htons(), ntohl(), or htonl() belong logically to the [name1] layer.

presentation

In the OSI reference model, the [name1] layer provides service directly to the application layer.

presentation

In the OSI reference model, the [name1] layer receives service directly from the session layer.

presentation

The delay for a frame from sender to receiver depends on the ______________.

propagation speed distance between the sender and the receiver bit rate propagation speed frame size

Peer layers use a [name1] to communicate.

protocol

A list of the protocols used by certain system, one protocol per layer, is called a _______ __________.

protocol stack

Fill in the blanks. Some words are hinted by the first letter. Do not repeat the first letter. The logical link sublayer provides three services: F_____, E_____, and F_____

raming rror control low control

Complete the words (do not repeat the first letter(s) already provided) The functions/services offered by the data link layer are: 1) F___________ 2) E___________ 3) Fl___________

raming; rror control; ow control

Based on the textbook, broadcast channels are sometimes referred as ______________ channels

random access multiaccess

The Open Shortest Path First protocol (OSPF) uses _______ as its "transport" protocol.

raw sockets

Assuming that congestion control is not used, flow control protects the input buffers of these devices from overflowing. sender intermediary nodes receiver links None of these answers

receiver

Assuming that flow control is not used, congestion control may protect the input buffers of these devices from overflowing.

receiver intermediary nodes

In general, an HTTP _________________ is longer than a(n) ________________.

response: HTTP request

Layered design consists of ________________.

restricting communications to adjacent or peer layers layers hiding details from each other dividing a complex task in multiple subtasks

Check all that apply. During the lecture, we encoded the three boolean members single, rich, and female using one byte b using the following rules as illustrated by this figure: bit 7 bit 6 bit 5 bit 4 bit 3 bit 2 bit 1 bit 0 0 0 0 0 0 female rich single - bit 0 is the least significant bit. bit 0 is set to 1 if the friend is single. - bit 1 is set to 1 if the friend is rich. - bit 2 is set to 1 if the friend is female. Suppose that after encoding the three boolean members single, rich, and female of a friend f into a byte b, we get b = 0x6. Check all that apply about the friend f.

rich female

Consider a system with 4 stations X,Y, Z, and W that use CDMA. These four stations use the chip sequences x, y, z and w that are all mutually orthogonal. Stations X, Y, Z, and W send 1, 1, 0, and 1, respectively. The resulting signal S on the medium is equal to ______.

x + y - z + w

The Internet is a _______ switching system.

store-and-forward packet

Any periodic signal can be constructed as the [name1] of a number of cosine and sine waves of different frequencies.

sum

___ connect two or more ___

switches, transmission lines

The acknowledgement (ack) number in the TCP header is ___________________.

the number of the next expected byte (to be received)

The sequence number in the TCP header is ___________________.

the sequence number of the first byte in a segment

A medium attenuates a signal means that ______________.

the signal strength (amplitude) decreases as the signal travels further.

Check all that apply about TCP or UDP port numbers

they are 16 bit numbers they range from 0 to 65535 TCP and UDP ports are independent from each other

Congress representatives (when well behaving) use ____________ division multiplexing to participate in the debate.

time

The propagation time depends on the ______________.

transmission medium propagation speed distance between the sender and the receiver

In the IPv4 header, the Protocol (number) is related to the protocol used by the payload at the__________ layer. Group of answer choices None of these answers network (data) link physical transport

transport

In the OSI reference model, an instance in the session layer wants to send a data unit m. The first header added to m will be a header belonging to the ________ layer.

transport

In the OSI reference model, this layer gets service directly from the network layer.

transport

In the TCP/IP model, an instance in the application layer wants to send a data unit m. The first header added to m will be a header belonging to the ________ layer.

transport

In the TCP/IP model, consider an HTTP request m. The first header added to m will be a header belonging to the ________ layer.

transport

In the TCP/IP reference model, a segment can be a packet's payload.

true

The word 1001 0111 is received using the Hamming code C. The original word that was most likely sent originally (before corruption) was _____________. Code C uses four codewords L, M, N, and O defined as follows: Code C: L : 0000 0000 M: 0100 1011 N: 1011 0101 O: 1111 1010

undetermined

Point-to-point transmission with exactly one sender and exactly one receiver is sometimes called ___________.

unicasting

When tuned to one channel, check all that apply to IEEE 802.11 (Wifi)

uses a contention based multiple access protocol has in general a lower average time delivery than Token-ring

The size of the options field in an IPv4 header is ___________ bytes.

variable

When implementing a connection-oriented service, we use ___________________ to carry messages.

virtual circuits

Numerical answer. Four senders share a 10 Gbps channel using time division multiplexing. Each sender will have a sending bit rate of about ________ Gbps.

#20

Answer this question in the context of the strategy described in class and adopted by each child to manage Weekly Pocket Money Problem. This week, the child asked and received $40. Next week, the child can certainly ask for and receive ______ without being smacked for sure.

$0

Answer this question in the context of the strategy described in class and adopted by each child to manage Weekly Pocket Money Problem. After five years using this strategy, $40 is the average sum received every week by each child in a family with 4 children. The total available weekly allocation is most likely about _______ dollars.

$160

Check the information that a DHCP Client provides.

(It must be None of these answers) NOT IP address of gateway router IP address Subnet mask IP address of DNS server Name of the DNS server

The subnet mask of IP Address 128.200.104.13/19 is _________.

255.255.224.0

The subnet mask of IP Address 172.202.100.3/20 is _________.

255.255.240.0

A client has in its sending buffer these equal sized segments with sequence numbers 15, 25, 35,45, 55, 65, and 75. Based on congestion control and flow control, its offered window is 20 bytes. So far, the client sent segments with Sequence numbers 15, 25, and 35. The highest acknowledgement it received is 25. The next segment that the client could send is segment with Sequence number to __________ . (Answer -1 if the client cannot send anymore new segments).

-1

Suppose that cwnd = 20 bytes. The latest segment received by a client had the advertised window set to 40 bytes. The client has in its sending buffer these equal sized segments with sequence numbers 15, 25, 35,45, 55, 65, and 75. So far, the client sent segments with Sequence numbers 15, 25, and 35. The highest acknowledgement it received is 25. The next segment that the client could send is segment with Sequence number to __________. (Answer -1 if the client cannot send anymore new segments).

-1

Check all that apply to UDP

-UDP offers a minimal service to the application layer -uses a checksum to detect corrupted datagrams

Consider a system with 4 stations X,Y, Z, and W that use CDMA. These four stations use the chip sequences x, y, z and w that are all mutually orthogonal. Stations X, Y, Z, and W send 0, 0, 1, and 0, respectively. The resulting signal S on the medium is equal to ______.

-x-y+z-w

Consider a system with 4 stations X,Y, Z, and W that use CDMA. These four stations use the chip sequences x, y, z and w that are all mutually orthogonal. Stations X, Y, Z, and W send 0, 0, 1, and 0, respectively. If S is the resulting signal S then x.S = ________.

-||x||^2

Consider a system with 4 stations X,Y, Z, and W that use CDMA. These four stations use the chip sequences x, y, z and w that are all mutually orthogonal. Stations X, Y, Z, and W send 0, 0, 1, and 0, respectively. If S is the resulting signal S then y.S = ________.

-||y||^2

For DNS, these domain names are generic . .com .edu .us .net None of these answers .museum .org

.com .edu .net .org .museum

This question is about how the Internet Protocol (IP) handles a packet P and decides where to deliver it. Consider a device D with IP address 134.89.200.145/24. On Device D, IP is handed a packet P with a destination IP address 134.89.200.145. Provide the order in which IP on Device D will perform these actions. The earliest action must be assigned 1. Any action that is incorrect or is not performed must be assigned the number 0. send Packet P to the device with IP address 134.89.200.145 check if Packet P is for Device D read the routing table ask ARP for a MAC address corresponding to IP Address 131.89.200.145 ask ARP for a MAC address corresponding to IP Address 131.89.200.1 hand Packet P to the appropriate protocol at the transport layer. check if the IP destination address of Packet P is local send Packet P to the device with IP address 134.89.200.128

0 1 0 0 0 2 0 0

This question is about how the Internet Protocol (IP) handles a packet P and decides where to deliver it. Consider a device D with IP address 134.89.200.145/24. On Device D, IP is handed a packet P with a destination IP address 131.204.14.65. Provide the order in which IP on Device D will perform these actions. The earliest action must be assigned 1. Any action that is incorrect or is not performed must be assigned the number 0. send Packet P to the device with IP address 134.205.14.65 check if Packet P is for Device D read the routing table ask ARP for a MAC address corresponding to IP Address 131.89.14.65 ask ARP for a MAC address corresponding to IP Address 131.89.200.254 hand Packet P to the appropriate protocol at the transport layer. check if the IP destination address of Packet P is local send Packet P to the device with IP address 134.89.200.254

0 1 3 0 4 0 2 5

Consider a device D with IP address 134.89.200.145/24. On Device D, IP is handed a packet P with a destination IP address 131.204.64.170. Provide the order in which IP on Device D will perform these actions. The earliest action must be assigned 1. Any action that is incorrect or is not performed must be assigned the number 0. SSQs-RoutingTable.png send Packet P to the device with IP address 134.89.200.128 read the routing table ask ARP for the MAC address corresponding to IP Address 134.89.200.54 ask ARP for the MAC address corresponding to IP Address 131.89.200.128 check if the IP destination address of Packet P is local send Packet P to the device with IP address 134.89.200.54

0 2 0 0 1 0

Consider a device D with IP address 134.89.200.145/24. On Device D, IP is handed a packet P with a destination IP address 131.204.65.175. Provide the order in which IP on Device D will perform these actions. The earliest action must be assigned 1. Any action that is incorrect or is not performed must be assigned the number 0. SSQs-RoutingTable.png -send Packet P to the device with IP address 134.89.200.54 -read the routing table -ask ARP for a MAC address corresponding to IP Address 134.89.200.254 -ask ARP for a MAC address corresponding to IP Address 131.89.200.54 -check if the IP destination address of Packet P is local -send Packet P to the device with IP address 134.89.200.254

0 2 0 0 1 0

This question is about how the Internet Protocol (IP) handles a packet P and decides where to deliver it. Consider a device D with IP address 134.89.200.145/24. On Device D, IP is handed a packet P with a destination IP address 131.204.64.170. Provide the order in which IP on Device D will perform these actions. The earliest action must be assigned 1. Any action that is incorrect or is not performed must be assigned the number 0. SSQs-RoutingTable.png send Packet P to the device with IP address 134.89.200.128 read the routing table ask ARP for the MAC address corresponding to IP Address 134.89.200.67 ask ARP for the MAC address corresponding to IP Address 131.89.200.128 check if the IP destination address of Packet P is local send Packet P to the device with IP address 134.89.200.67

0 2 0 0 1 0

This question is about how the Internet Protocol (IP) handles a packet P and decides where to deliver it. Consider a device D with IP address 134.89.200.145/24. On Device D, IP is handed a packet P with a destination IP address 131.204.65.170. Provide the order in which IP on Device D will perform these actions. The earliest action must be assigned 1. Any action that is incorrect or is not performed must be assigned the number 0. send Packet P to the device with IP address 134.89.200.67 read the routing table ask ARP for the MAC address corresponding to IP Address 134.89.200.254 ask ARP for the MAC address corresponding to IP Address 131.89.200.67 check if the IP destination address of Packet P is local send Packet P to the device with IP address 134.89.200.254

0 2 0 0 1 0

This question is about how the Internet Protocol (IP) handles a packet P and decides where to deliver it. Consider a device D with IP address 134.89.200.145/24. On Device D, IP is handed a packet P with a destination IP address 131.204.64.159. Provide the order in which IP on Device D will perform these actions. The earliest action must be assigned 1. Any action that is incorrect or is not performed must be assigned the number 0. send Packet P to the device with IP address 134.89.200.254 read the routing table ask ARP for the MAC address corresponding to IP Address 134.89.200.67 ask ARP for the MAC address corresponding to IP Address 131.89.200.254 check if the IP destination address of Packet P is local send Packet P to the device with IP address 134.89.200.67

0 2 3 0 1 4

This question is about how the Internet Protocol (IP) handles a packet P and decides where to deliver it. Consider a device D with IP address 134.89.200.145/24. On Device D, IP is handed a packet P with a destination IP address 131.204.65.159. Provide the order in which IP on Device D will perform these actions. The earliest action must be assigned 1. Any action that is incorrect or is not performed must be assigned the number 0. send Packet P to the device with IP address 134.89.200.67 read the routing table ask ARP for the MAC address corresponding to IP Address 134.89.200.1 ask ARP for the MAC address corresponding to IP Address 131.89.200.67 check if the IP destination address of Packet P is local send Packet P to the device with IP address 134.89.200.1

0 2 3 0 1 4

This question is about how the Internet Protocol (IP) handles a packet P and decides where to deliver it. Consider a device D with IP address 134.89.200.145/24. On Device D, IP is handed a packet P with a destination IP address 131.204.65.170. Provide the order in which IP on Device D will perform these actions. The earliest action must be assigned 1. Any action that is incorrect or is not performed must be assigned the number 0. send Packet P to the device with IP address 134.89.200.67 read the routing table ask ARP for the MAC address corresponding to IP Address 134.89.200.54 ask ARP for the MAC address corresponding to IP Address 131.89.200.67 check if the IP destination address of Packet P is local send Packet P to the device with IP address 134.89.200.54

0 2 3 0 1 4

A 125-byte frame is sent at a bitrate of 10 Mbps over a copper cable 1000 kms long. Recall that a copper cable has a propagation speed about 2/3 the speed of light. The transmission time is equal to _________ ms.

0.1

A 1250-bits frame is sent at a bitrate of 10 Mbps over a copper cable 1000 kms long. Then the transmission time is _________ ms. Propagation speed on copper is about 2/3 the speed of light. The speed of light is about 300,000 km/s.

0.125

Five senders share a 1 Mbps channel using frequency division multiplexing. Each sender will have a sending bit rate of about ________ Mbps.

0.2

Four senders share a 1 Gbps channel using time division multiplexing. Each sender will have a sending bit rate of about ________ Gbps.

0.25

A sender and a receiver are using a 100 km copper cable to communicate. The propagation speed is about 2/3 the speed of light. They use stop and wait protocol. The frame size is 500 bytes. The bit rate is 250 Kbps. The propagation time is _____ ms. The transmission time is _____ ms. The throughput is _____ Kbps. The efficiency is _____ .

0.50 16.00 235.29 0.94

Fill in multiple blanks. This exercise is about framing. The following character encoding is used in a data link protocol: X: 01000111 Y: 11100111 FLAG: 01111110 ESC:11100111 Show the bit sequence transmitted (in binary) for the four-character frame X Y ESC FLAG when "flag bits with bit stuffing" is used. Pay attention to the order. Fill in the following 8-bit groups. Some groups at the end may have less than 8 bits. If the group is empty, fill it with "-" (ONE minus character).

01111110 ;01000111 ;11010011 ;11101001 ;11011111 ;01001111 ;110 ;-

The following frame was "sniffed" off an Ethernet network. Below, we removed the preamble. We use only hexadecimal numbers without using "0x" or "h" symbols. Here is what was collected in network byte order: 76 3E 56 E2 08 00 08 06 80 35 08 06 08 00 32 7F 4C 2D 5C 4B EE DD .... The source MAC address is ___________________.

08 06 80 35 08 06

Consider this network of routers A, B, C, and D that are using Distance Vector Routing. Assume that all routers are turned on at the exactly same time 0. At time 0, the routers know only the cost to reach their immediate neighbors. At time 0 (Round 0), all routers send their distance vector to their immediate neighbors. Each 30 seconds, a new round of exchanges occurs (Round 1, 2,...). Fill in the table below with the distance vector that Node A sends its neighbors on Round 1. If the distance is not yet known, fill in with the value 99.

0;1;2;2

Consider this network of routers A, B, C, and D that are using Distance Vector Routing. Assume that all routers are turned on at the exactly same time 0. At time 0, the routers know only the cost to reach their immediate neighbors. At time 0 (Round 0), all routers send their distance vector to their immediate neighbors. Each 30 seconds, a new round of exchanges occurs. Fill in the table below with the distance vector that Node A sends its neighbors on Round 0. If the distance is not yet known, fill in with the value 99.

0;1;2;99

Match the TYPE values with the kind of payload. (Some values were not covered in class. Search for them)

0x0800 - IPv4 0x0806 - ARP 0x8035 - RARP 0x8137 - IPX 0x86DD - IPv6

Assume you just received data is stored in network byte order. Below is a snapshot of the data memory storing data. The first column is the address while second one is the data at that address. The integer (short) variable at address 0x1002 is ___________. Address Content 0x1000 0x34 0x1001 0xB4 0x1002 0x20 0x1003 0xAE 0x1004 0x42 0x1005 0x67 0x1006 0x19 0x1007 0x3C 0x1008 0x8C

0x20AE

Assume you just prepared data stored in little endian order. Below is a snapshot of the data memory storing data. The first column is the address while second one is the data at that address. The integer (int) variable at address 0x1004 is ___________. Address Content 0x1000 0x34 0x1001 0xB4 0x1002 0x20 0x1003 0xAE 0x1004 0x42 0x1005 0x67 0x1006 0x19 0x1007 0x3C 0x1008 0x8C

0x3C196742

Select the best answer. Assume you just received data is stored in network byte order. Below is a snapshot of the data memory storing data. The first column is the address while second one is the data at that address. The integer (short) variable at address 0x1004 is ___________. Address Content 0x1000 0x34 0x1001 0xB4 0x1002 0x20 0x1003 0xAE 0x1004 0x42 0x1005 0x67 0x1006 0x19 0x1007 0x3C 0x1008 0x8C

0x4267

Select the best answer. Assume you just prepared data stored in little endian order. Below is a snapshot of the data memory storing data. The first column is the address while second one is the data at that address. The integer (short) variable at address 0x1004 is ___________. Address Content 0x1000 0x34 0x1001 0xB4 0x1002 0x20 0x1003 0xAE 0x1004 0x42 0x1005 0x67 0x1006 0x19 0x1007 0x3C 0x1008 0x8C

0x6742

Select the best answer. Assume you just prepared data stored in little endian order. Below is a snapshot of the data memory storing data. The first column is the address while second one is the data at that address. The integer (int) variable at address 0x1002 is ___________. Address Content 0x1000 0x34 0x1001 0xB4 0x1002 0x20 0x1003 0xAE 0x1004 0x42 0x1005 0x67 0x1006 0x19 0x1007 0x3C 0x1008 0x8C

0x6742AE20

Select the best answer. Assume you just prepared data stored in little endian order. Below is a snapshot of the data memory storing data. The first column is the address while second one is the data at that address. The integer (short) variable at address 0x1002 is ___________. Address Content 0x1000 0x34 0x1001 0xB4 0x1002 0x20 0x1003 0xAE 0x1004 0x42 0x1005 0x67 0x1006 0x19 0x1007 0x3C 0x1008 0x8C

0xAE20

Answer this question in the context of the strategy described in class and adopted by each child to manage Weekly Pocket Money Problem. A child starts numbering weeks from 0 (zero) when he get smacked. On Week 0 he got smacked when he asked 20 dollars. Assuming that the child asks for money each week, the child will ask _____ dollars on Week 1.

1

Assume a recent TCP implementation (TCP Reno and beyond). Let the congestion window be 10 segments and all 10 outstanding segments get lost. The congestion window will then be set by the sender to ________ segment(s).

1

Assume a recent TCP implementation (TCP Reno and beyond). Let the congestion window be 12 segments and all 12 outstanding segments get lost. The congestion window will then be set by the sender to ________ segment(s).

1

Assume a recent TCP implementation (TCP Reno and beyond). Let the congestion window be 16 segments and all 16 outstanding segments get lost. The congestion window will then be set by the sender to ________ segment(s).

1

Numerical answer. A 125-byte frame is sent at a bitrate of 1 Mbps over a copper cable 1000 kms long. Recall that a copper cable has a propagation speed about 2/3 the speed of light. The transmission time is equal to _________ ms.

1

Using DNS, each zone (.e., edu, cisco.com, cs.washington.edu, tamu.edu, cs.tamu.edu, .....) must have at least ________ name server(s).

1

What is the value of the parity bit for this word if we are using even parity? Word = 1000 1010

1

Consider this network of routers A, B, C, and D that are using Distance Vector Routing. Assume that all routers are turned on at the exactly same time 0. At time 0, the routers know only the cost to reach their immediate neighbors. At time 0 (Round 0), all routers send their distance vector to their immediate neighbors. Each 30 seconds, a new round of exchanges occurs (Round 1, 2,...). Fill in the table below with the distance vector that Node B sends its neighbors on Round 1. If the distance is not yet known, fill in with the value 99.

1 0 3 1

A 1 kilobits/s (Kbps) bit rate is _____________ bits per second.

1,000

A 1 megabits/s bit (Mbps) rate is _____________ bits per second.

1,000,000

A 1 gigabits/s (Gbps) bit rate is _____________ bits per second.

1,000,000,000

The network ID of IP Address 1.20.140.153 is _________.

1.0.0.0

The network ID of IP Address 1.20.140.153/17 is _________. 1.20.128.0 None of these answers 1.20.64.0 1.0.0.0 1.20.0.0

1.20.128.0

A 1250-bits frame is sent at a bitrate of 1 Mbps over a copper cable 1000 kms long. Then the transmission time is _________ ms. Propagation speed on copper is about 2/3 the speed of light. The speed of light is about 300,000 km/s.

1.25

A sender and a receiver are using a 250 km copper cable to communicate. The propagation speed is about 2/3 the speed of light. They use stop and wait protocol. The frame size is 1250 bytes. The bit rate is 100 Kbps. The propagation time is ______ ms. The transmission time is _____ ms. The throughput is ______ bps. The efficiency is _____ .

1.25 100.00 97560.97 0.97

Suppose a DNS client must resolve the host name toto.nl. Assign to each name server on the left a sequence number n based on the order it is queried. The first queried name server must be assigned the sequence number 1. Assign 99 to a name server that is not queried. root Nnl Nvu Local name server

1.25/5 99 99 2 1

A 125-byte frame is sent at a bitrate of 1 Mbps over a copper cable 2000 kms long. Recall that a copper cable has a propagation speed about 2/3 the speed of light. The propagation time is equal to _________ ms.

10

A 1250-bits frame is sent at a bitrate of 10 Kbps over a copper cable 2000 kms long. Then the propagation time is _________ ms. Propagation speed on copper is about 2/3 the speed of light. The speed of light is about 300,000 km/s.

10

A client sends multiple equal sized segments with sequence numbers 15, 25, 35,45, and 55. The size of these segments is ________ bytes.

10

A client sends seven equal sized segments with sequence numbers 15, 25, 35,45, 55, 65, and 75. The size of each segment was ________ bytes.

10

Answer this question in the context of the strategy described in class and adopted by each child to manage Weekly Pocket Money Problem. A child starts numbering weeks from 0 (zero) when he get smacked. On Week 0 he got smacked when he asked 16 dollars. Assuming that the child asks for money each week, the child will ask _____ dollars on Week 5.

10

Let S/N be the ratio of the signal S over the noise N. The S/N ratio (in decibel) is 20 decibels (dB). Then S/N = ________.

100

A TCP client receives a segment that contains a segment with 1000 bytes of data with Sequence number 0. This TCP client will acknowledge this segment with an ack number equal to ______

1000

Let S/N be the ratio of the signal S over the noise N. The S/N ratio (in decibel) is 30 decibels (dB). Then S/N = ________.

1000

Let S/N be the ratio of the signal S over the noise N. The S/N ratio (in decibel) is 40 decibels (dB). Then S/N = ________.

10000

A 5x5 word that includes crossed even parity bits is received: 1010 0010 1111 1010 1100 0011 0 The initial (sent) 5x5 word must have been _____________________

1010 0000 1111 1010 1100 0011 0

Answer this question in the context of the strategy described in class and adopted by each child to manage Weekly Pocket Money Problem. A child starts numbering weeks from 0 (zero) when he get smacked. On Week 0 he got smacked when he asked 16 dollars. Assuming that the child asks for money each week, the child will ask _____ dollars on Week 6.

11

Answer this question in the context of the strategy described in class and adopted by each child to manage Weekly Pocket Money Problem. A child starts numbering weeks from 0 (zero) when he get smacked. On Week 0 he got smacked when he asked 20 dollars. Assuming that the child asks for money each week, the child will ask _____ dollars on Week 5.

11.625

A TCP client receives a segment that contains a segment with 100 bytes of data with Sequence number 1000. This TCP client will acknowledge this segment with an ack number equal to ______

1100

The sender wants to send the message 1100001 using odd parity. It will send the frame___________.

11000010

Using even parity, the receiver receives the frames listed below. Check the frames that were certainly corrupted (including the parity bit)

11000010 10000000 11011010

The sender sent this message 110X101 using even parity. The 'X' is a bit that is unknown. The message is received correctly, i.e., it was not corrupted during transmission. The receiver receives the message___________.

1100101

The sender wants to send the message 1101001 using even parity. It will send the frame___________.

11010010

The sender wants to send the message 1101001 using odd parity. It will send the frame___________.

11010011

The sender sent this message 110X101 using odd parity. The 'X' is a bit that is unknown. The message is received correctly, i.e., it was not corrupted during transmission. The receiver receives the message___________.

1101101

The sender sent this message 11X1101 using odd parity. The 'X' is a bit that is unknown. The message is received correctly, i.e., it was not corrupted during transmission. The receiver receives the message___________. 1101101 1111101 None of these answers 1101100 1111100

1101101

The sender wants to send the message 1101101 using even parity. It will send the frame___________.

11011011

Using odd parity, the receiver receives the frames listed below. Check the frames that were certainly corrupted (including the parity bit)

11111111 00000000 11000011

Answer this question based congestion control and flow control as performed by TCP. Suppose that a TCP sender 1) has cwnd set to 18,000 bytes 2) has 10,000 bytes available in its own input buffers 3) receives a segment with an advertised window of 12,000 bytes. The TCP sender will set its offered window Wnd to ________ bytes.

12,000

Check all that apply. A 1250-bits frame is sent at a bitrate of 100 Kbps over a copper cable 1000 kms long. Then the transmission time is _________ ms. Propagation speed on copper is about 2/3 the speed of light. The speed of light is about 300,000 km/s.

12.5

A sender and a receiver are using a 2500 km copper cable to communicate. The propagation speed is about 2/3 the speed of light. They use stop and wait protocol. The frame size is 1500 bytes. The bit rate is 10 Mbps. The propagation time is _____ ms. The transmission time is _____ ms. The throughput is ______ bps. The efficiency is _____ .

12.50 1.20 458015.26 0.04

A 1250-bits frame is sent at a bitrate of 10 Kbps over a copper cable 1000 kms long. Then the transmission time is _________ ms. Propagation speed on copper is about 2/3 the speed of light. The speed of light is about 300,000 km/s.

125

The network ID of IP Address 126.204.40.13/13 is _________. 126.192.0.0 126.128.0.0 126.200.0.0 126.204.0.0 None of these answers

126.200.0.0

Suppose you want to send some packet to the host from which you are sending. You could use this (these) addresse(s).

127.0.0.1 0.0.0.0

An IPv6 address has ______________ bits.

128

The network ID of IP Address 128.200.40.13 is _________.

128.200.0.0

The network ID of IP Address 128.200.104.13/19 is _________.

128.200.96.0

Answer this question in the context of the strategy described in class and adopted by each child to manage Weekly Pocket Money Problem. A child starts numbering weeks from 0 (zero) when he get smacked. On Week 0 he got smacked when he asked 24 dollars. Assuming that the child asks for money each week, the child will ask _____ dollars on Week 5.

13

A host H has IP address 131.204.14.65. Suppose you want to send some packet to all hosts on the same network as H . You could use this (these) addresse(s). 131.255.255.255 131.204.14.255 None of these answers 255.255.14.65 131.204.255.255

131.204.255.255

A 1250-bits frame is sent at a bitrate of 10 Kbps over a copper cable 3000 kms long. Then the propagation time is _________ ms. Propagation speed on copper is about 2/3 the speed of light. The speed of light is about 300,000 km/s.

15

A TCP client receives a segment that contains a segment with 5 bytes of data with Sequence number 10. This TCP client will acknowledge this segment with an ack number equal to ______ 15 16 None of these answers 6 5

15

Assume a recent TCP implementation (TCP Reno and beyond). Suppose that there are 20 outstanding (sent, but not yet acknowledged) segments. The sender will receive at most __________ duplicate acknowledgments if 5 segments get lost.

15

A TCP client receives a segment that contains a segment with 10 bytes of data with Sequence number 6. This TCP client will acknowledge this segment with an ack number equal to ______

16

A TCP port number has ______________ bits.

16

A UDP port number has ______________ bits.

16

Answer this question in the context of the strategy described in class and adopted by each child to manage Weekly Pocket Money Problem. A child starts numbering weeks from 0 (zero) when he get smacked. On Week 0 he got smacked when he asked 32 dollars. Assuming that the child asks for money each week, the child will ask _____ dollars on Week 5.

16

These fields on the TCP header are used to provide reliable in-order delivery.

16-bit checksum 32-bit sequence number 32-bit acknowledgement number

These fields on the TCP header are used to provide flow control.

16-bit window size 32-bit acknowledgement number 32-bit sequence number

Consider a 4-KHz noiseless channel. The sender is using the vocabulary set S to communicate. S = {apple, banana, pear, mango}. The maximal bit rate is _________ bps.

16000

The network ID of IP Address 164.200.40.13 is _________.

164.200.0.0

The network ID of IP Address 164.200.40.13/22 is _________. 164.200.0.0 164.200.32.0 164.200.64.0 164.200.40.0 None of these answers

164.200.40.0

The network ID of IP Address 164.200.40.13/29 is _________.

164.200.40.8

The network ID of IP Address 172.20.14.53/28 is _________.

172.20.14.48

The network ID of IP Address 172.202.100.3 is _________.

172.202.0.0

The network ID of IP Address 172.202.100.3/20 is _________.

172.202.96.0

Answer this question in the context of the strategy described in class and adopted by each child to manage Weekly Pocket Money Problem. A child starts numbering weeks from 0 (zero) when he get smacked. On Week 0 he got smacked when he asked 32 dollars. Assuming that the child asks for money each week, the child will ask _____ dollars on Week 6.

18

Assume a recent TCP implementation (TCP Reno and beyond). Suppose that there are 20 outstanding (sent, but not yet acknowledged) segments. The sender will receive at most __________ duplicate acknowledgments if 2 segments get lost.

18

The network ID of IP Address 191.20.240.213 is _________.

191.20.0.0

The network ID of IP Address 191.20.240.213/18 is _________.

191.20.192.0

The network ID of IP Address 192.202.100.3 is _________.

192.202.100.0

The network ID of IP Address 192.202.100.243/28 is _________.

192.202.100.240

Consider this network of routers A, B, C, and D that are using Distance Vector Routing. Assume that all routers are turned on at the exactly same time 0. At time 0, the routers know only the cost to reach their immediate neighbors. At time 0 (Round 0), all routers send their distance vector to their immediate neighbors. Each 30 seconds, a new round of exchanges occurs. Fill in the table below with the distance vector that Node B sends its neighbors on Round 0. If the distance is not yet known, fill in with the value 99.

1;0;5;1

A client has in its sending buffer these equal sized segments with sequence numbers 15, 25, 35,45, 55, 65, and 75. Based on congestion control and flow control, its offered window is 30 bytes. So far, the client sent segments with Sequence numbers 15, 25, and 35. The highest acknowledgement it received is 35. This client could send up to __________ new segment(s). (Answer -1 if the client cannot send anymore new segments).

2

A client has in its sending buffer these equal sized segments with sequence numbers 15, 25, 35,45, 55, 65, and 75. Based on congestion control and flow control, its offered window is 40 bytes. So far, the client sent segments with Sequence numbers 15, 25, and 35. The highest acknowledgement it received is 25. This client could send up to __________ new segment(s). (Answer -1 if the client cannot send anymore new segments).

2

A client sends seven equal sized segments with sequence numbers 15, 25, 35,45, 55, 65, and 75. Segments with sequence numbers 45 and 65 get lost. The client will receive _______ duplicate acknowledgements after the server received segment #75.

2

A hamming code of distance 6 can detect and correct up to _______ corrupted bits in a received word..

2

Five senders share a 10 Mbps channel using code division multiplexing. Each sender will have a sending bit rate of about ________ Mbps.

2

Let the advertised window Wa (by the received) be 4 segments and the current congestion window cwnd be 32 segments. Supposed that there are 2 outstanding segments (segments sent and not yet acknowledged). The sender can send at most _________ segment(s).

2

Assume that the local name server just started (cache empty). The local name server just resolved the hostname tatiana.robot.cs.washington.edu and right after a DNS client must resolve the host name toto.cs.washington.edu. Assign to each name server on the left a sequence number n based on the order it is queried. The first queried name server must be assigned the sequence number 1. Assign 99 to a name server that is not queried. Ncs Nedu root Nwas Local name server

2 99 99 99 1

Assume that the local name server just started (cache empty). The local name server just resolved the hostname tatiana.robot.cs.washington.edu and right after a DNS client must resolve the host name toto.robot.cs.washington.edu. Assign to each name server on the left a sequence number n based on the order it is queried. The first queried name server must be assigned the sequence number 1. Assign 99 to a name server that is not queried. Ncs Nedu root Nwas Local name server

2 99 99 99 1

The subnet mask of IP Address 164.200.40.13/22 is _________. 255.255.252.0 255.255.248.0 None of these answers 255.255.0.0 255.255.240.0

255.255.252.0

Suppose that cwnd = 1,000 bytes. The latest segment received by a client had the advertised window set to 40 bytes. The client has in its sending buffer these equal sized segments with sequence numbers 15, 25, 35,45, 55, 65, and 75. So far, the client sent segments with Sequence numbers 15, 25, and 35. The highest acknowledgement it received is 25. This client could send up to __________ new segments. (Answer -1 if the client cannot send anymore new segments).

2

Suppose that cwnd = 30 bytes. The latest segment received by a client had the advertised window set to 40 bytes. The client has in its sending buffer these equal sized segments with sequence numbers 15, 25, 35,45, 55, 65, and 75. So far, the client sent segments with Sequence numbers 15, 25, and 35. The highest acknowledgement it received is 35. This client could send up to __________ new segments. (Answer -1 if the client cannot send anymore new segments).

2

Consider this network of routers A, B, C, and D that are using Distance Vector Routing. Assume that all routers are turned on at the exactly same time 0. At time 0, the routers know only the cost to reach their immediate neighbors. At time 0 (Round 0), all routers send their distance vector to their immediate neighbors. Each 30 seconds, a new round of exchanges occurs (Round 1, 2,...). Fill in the table below with the distance vector that Node D sends its neighbors on Round 1. If the distance is not yet known, fill in with the value 99.

2 1 3 0

Consider this network of routers A, B, C, and D that are using Distance Vector Routing. Assume that all routers are turned on at the exactly same time 0. At time 0, the routers know only the cost to reach their immediate neighbors. At time 0 (Round 0), all routers send their distance vector to their immediate neighbors. Each 30 seconds, a new round of exchanges occurs (Round 1, 2,...). Fill in the table below with the distance vector that Node C sends its neighbors on Round 1. If the distance is not yet known, fill in with the value 99.

2 3 0 3

Assume that the local name server just started (cache empty). Suppose a DNS client must resolve the host name toto.vu.nl. Assign to each name server on the left a sequence number n based on the order it is queried. The first queried name server must be assigned the sequence number 1. Assign 99 to a name server that is not queried. root Nnl Nvu Nwas Local name server

2 3 4 99 1

Assume that the local name server just started (cache empty). Suppose a DNS client must resolve the host name toto.jill.acm.org. Assign to each name server on the left a sequence number n based on the order it is queried. The first queried name server must be assigned the sequence number 1. Assign 99 to a name server that is not queried. root Nacm Norg Nwas Local name server

2 4 3 99 1

Assume that the local name server just started (cache empty). Suppose a DNS client must resolve the host name toto.org. Assign to each name server on the left a sequence number n based on the order it is queried. The first queried name server must be assigned the sequence number 1. Assign 99 to a name server that is not queried. root Nacm Norg Local name server

2 99 3 1

Assume that the local name server just started (cache empty). The local name server just resolved the hostname tatiana.cs.washington.edu and right after a DNS client must resolve the host name toto.robot.cs.washington.edu. Assign to each name server on the left a sequence number n based on the order it is queried. The first queried name server must be assigned the sequence number 1. Assign 99 to a name server that is not queried. Ncs Nedu root Nwas Local name server

2 99 99 99 1

Suppose that we transmit symbols belonging to this vocabulary {A, B}. The baud rate is 2,000 bauds. The bit rate is.

2 Kbps

A sender and a receiver are using a 500 km copper cable to communicate. The propagation speed is about 2/3 the speed of light. They use stop and wait protocol. The frame size is 1500 bytes. The bit rate is 1 Mbps. The propagation time is _____ ms. The transmission time is _____ ms. The throughput is _____ bps. The efficiency is _____ .

2.50 12.00 705882.35 0.70

A sender and a receiver are using a 500 km copper cable to communicate. The propagation speed is about 2/3 the speed of light. They use stop and wait protocol. The frame size is 1500 bytes. The bit rate is 100Kbps. The propagation time is _____ ms. The transmission time is _____ ms. The throughput is _____ bps. The efficiency is _____ .

2.50 120.00 96000.00 0.96

A 1250-bits frame is sent at a bitrate of 10 Kbps over a copper cable 4000 kms long. Then the propagation time is _________ ms. Propagation speed on copper is about 2/3 the speed of light. The speed of light is about 300,000 km/s.

20

A client has in its sending buffer these equal sized segments with sequence numbers 15, 25, 35,45, 55, 65, and 75. Based on congestion control and flow control, its offered window is 40 bytes. So far, the client sent segments with Sequence numbers 15, 25, and 35. The highest acknowledgement it received is 25. This client could send up to __________ new byte(s). (Answer -1 if the client cannot send anymore new segments).

20

A client sends five equal sized segments with sequence numbers 15, 35, 55, and 75. The size of each segment was ________ bytes.

20

Let S/N be the ratio of the signal S over the noise N. If S/N = 100 then the SNR is ______ decibels (dB).

20

Suppose that cwnd = 1,000 bytes. The latest segment received by a client had the advertised window set to 40 bytes. The client has in its sending buffer these equal sized segments with sequence numbers 15, 25, 35,45, 55, 65, and 75. So far, the client sent segments with Sequence numbers 15, 25, and 35. The highest acknowledgement it received is 25. This client could send up to __________ new bytes. (Answer -1 if the client cannot send anymore new segments).

20

The length of an IPv4 header is at least ________ bytes.

20

Five senders share a 1 Mbps channel using frequency division multiplexing. Each sender will have a sending bit rate of about ________ Kbps.

200

The network ID of IP Address 200.20.14.53 is _________.

200.20.14.0

The network ID of IP Address 200.20.14.53/27 is _________.

200.20.14.32

A host H has IP address 200.204.14.65. Suppose you want to send some packet to all hosts on the same network as H . You could use this (these) addresses.

200.204.14.255

Five senders share a 10 Mbps channel using code division multiplexing. Each sender will have a sending bit rate of about ________ Kbps.

2000

In the TCP/IP model, FTP uses this (these) port number(s) at the transport layer.

21, 20

The network ID of IP Address 212.202.100.3 is _________.

212.202.100.0

In the TCP/IP model, SSH uses this (these) port number(s) at the transport layer.

22

The network ID of IP Address 223.202.100.3 is _________.

223.202.100.0

The network ID of IP Address 223.202.100.13/30 is _________.

223.202.100.12

In the TCP/IP model, Telnet uses this (these) port number(s) at the transport layer.

23

A client sends seven equal sized segments with sequence numbers 15, 25, 35,45, 55, 65, and 75. Segments with sequence numbers 25 and 65 get lost. The server will send acknowledgement number ______ after receiving segment with sequence number 75.

25

SMTP binds to Port Number _______________. POP3 binds to Port Number _______________. IMAP binds to Port Number _______________.

25 110 143

A sender and a receiver are using a 5,000 km copper cable to communicate. The propagation speed is about 2/3 the speed of light. They use stop and wait protocol. The frame size is 1250 bytes. The bit rate is 1 Mbps. The propagation time is _____ ms. The transmission time is _____ ms. The throughput is _____ bps. The efficiency is _____ .

25.00 10.00 166666.66 0.16

Numerical answer. Four senders share a 1 Gbps channel using time division multiplexing. Each sender will have a sending bit rate of about ________ Mbps.

250

A class C network can assign unique addresses to up to _______________ hosts.

254

The subnet mask of IP Address 45.20.14.53/12 is _________.

255.240.0.0

The subnet mask of IP Address 191.20.240.213/18 is _________.

255.255.192.0

Suppose that cwnd = 40 bytes. The latest segment received by a client had the advertised window set to 80 bytes. The client has in its sending buffer these equal sized segments with sequence numbers 15, 25, 35,45, 55, 65, and 75. So far, the client sent segments with Sequence numbers 15, 25, and 35. The highest acknowledgement it received is 35. This client could send up to __________ new segments. (Answer -1 if the client cannot send anymore new segments).

3

The email architecture involves ________ main operations.

3

Match these encoding schemes for baseband transmission from the most robust to the least robust. Assign 1 to the most robust encoding scheme and 99 to the expressions that are not encoding schemes for baseband transmission. Non-Return to Zero (NRZ) Non-Return to Zero Invert (NRZI) Manchester Amplitude Shift Keying (ASK) Phase Shift Keying (ASK)

3 2 1 99 99

Assume that the local name server just started (cache empty). The local name server just resolved the hostname tatiana.washington.edu and right after a DNS client must resolve the host name toto.robot.cs.washington.edu. Assign to each name server on the left a sequence number n based on the order it is queried. The first queried name server must be assigned the sequence number 1. Assign 99 to a name server that is not queried. Ncs Nedu root Nwas Local name server

3 99 99 2 1

A client has in its sending buffer these equal sized segments with sequence numbers 15, 25, 35,45, 55, 65, and 75. Based on congestion control and flow control, its offered window is 30 bytes. So far, the client sent segments with Sequence numbers 15, 25, and 35. The highest acknowledgement it received is 45. This client could send up to __________ new byte(s). (Answer -1 if the client cannot send anymore new segments).

30

A client has in its sending buffer these equal sized segments with sequence numbers 15, 25, 35,45, 55, 65, and 75. Based on congestion control and flow control, its offered window is 40 bytes. So far, the client sent segments with Sequence numbers 15, 25, and 35. The highest acknowledgement it received is 35. This client could send up to __________ new byte(s). (Answer -1 if the client cannot send anymore new segments).

30

Let the advertised window Wa (by the received) be 40 segments and the current congestion window cwnd be 32 segments. Supposed that there are 2 outstanding segments (segments sent and not yet acknowledged). The sender can send at most _________ segments.

30

Suppose that cwnd = 1,000 bytes. The latest segment received by a client had the advertised window set to 40 bytes. The client has in its sending buffer these equal sized segments with sequence numbers 15, 25, 35,45, 55, 65, and 75. So far, the client sent segments with Sequence numbers 15, 25, and 35. The highest acknowledgement it received is 35. This client could send up to __________ new bytes. (Answer -1 if the client cannot send anymore new segments).

30

Suppose that cwnd = 30 bytes. The latest segment received by a client had the advertised window set to 40 bytes. The client has in its sending buffer these equal sized segments with sequence numbers 15, 25, 35,45, 55, 65, and 75. So far, the client sent segments with Sequence numbers 15, 25, and 35. The highest acknowledgement it received is 45. This client could send up to __________ new bytes. (Answer -1 if the client cannot send anymore new segments).

30

An IPv4 address has ______________ bits.

32

The subnet mask of network N is 255.255.128.0. This network N can assign unique addresses to up to _______________ hosts.

32766

A client sends five equal sized segments with sequence numbers 15, 25, 35,45, 55, 65, and 75. Segments with sequence numbers 35 and 65 get lost. The server will send acknowledgement number ______ after receiving segment with sequence number 55.

35

A client sends five equal sized segments with sequence numbers 15, 35, 55, 75, 95 Segments with sequence numbers 55 and 75 get lost. The server will likely send a segment with acknowledgement number ______ after receiving segment with sequence number 15.

35

A client sends five equal sized segments with sequence numbers 15, 35, 55, 75, 95 Segments with sequence numbers 55 and 75 get lost. The server will send acknowledgement number ______ after receiving segment with sequence number 15.

35

A client sends seven equal sized segments with sequence numbers 15, 25, 35,45, 55, 65, and 75. Segments with sequence numbers 35 and 65 get lost. The server will send acknowledgement number ______ after receiving segment with sequence number 25.

35

Consider a 4-KHz noisy channel with a 30 db SNR. The sender is using the vocabulary set S to communicate. S = {apple, banana}. The maximal bit rate is _________ bps.

39869 Explanation: bit rate = B*log2(1 + S/N) SNR = 30 = 10log10(S/N) S/N = 1000 4000*log2(1001) = 39869

Answer this question in the context of the strategy described in class and adopted by each child to manage Weekly Pocket Money Problem. A child starts numbering weeks from 0 (zero) when he get smacked. On Week 0 he got smacked when he asked 24 dollars. Assuming that the child asks for money each week, the child will ask _____ dollars on Week 3.

4

Answer this question in the context of the strategy described in class and adopted by each child to manage Weekly Pocket Money Problem. A child starts numbering weeks from 0 (zero) when he get smacked. On Week 0 he got smacked when he asked 32 dollars. Assuming that the child asks for money each week, the child will ask _____ dollars on Week 3.

4

Consider these two words: W1 = 1001 1001 W2 = 0101 1010 The Hamming distance between W1 and W2 is _____.

4

In the IPv4 header, the size of the header length (IHL) field on an IPv4 header is ________ bits.

4

The UDP header consists of ______ fields (members) of information. 32 4 None of these answers 8 16

4

The email architecture has ________ components.

4

The number of layers that the TCP/IP Reference Model specifies explicitly is ________ .

4

The size of the version field on an IPv4 header is ________ bits.

4

This question is about how the Internet Protocol (IP) handles a packet P and decides where to deliver it. Consider a device D with IP address 134.89.200.145/24. On Device D, IP is handed a packet P with a destination IP address 134.89.200.24. Provide the order in which IP on Device D will perform these actions. The earliest action must be assigned 1. Any action that is incorrect or is not performed must be assigned the number 0. send Packet P to the device with IP address 134.89.200.24 check if Packet P is for Device D read the routing table ask ARP for a MAC address corresponding to IP Address 134.89.200.24 ask ARP for a MAC address corresponding to IP Address 134.89.200.128 hand Packet P to the appropriate protocol at the transport layer. check if the IP destination address of Packet P is local send Packet P to the device with IP address 134.89.200.18

4 1 0 3 0 0 2 0

Assume that the local name server just started (cache empty). The local name server just resolved the hostname tatiana.edu and right after a DNS client must resolve the host name toto.robot.cs.washington.edu. Assign to each name server on the left a sequence number n based on the order it is queried. The first queried name server must be assigned the sequence number 1. Assign 99 to a name server that is not queried. Ncs Nedu root Nwas Local name server

4 2 99 3 1

Suppose that we transmit symbols belonging to this vocabulary {A, B, C, D}. The baud rate is 2,000 bauds. The bit rate is. 4 Kbps 1 Kbps 2 Kbps 8 Kbps None of these choices

4 Kbps

The OSI reference model has _____ end-to-end layers and _____ point-to-point layers.

4, 3

A client has in its sending buffer these equal sized segments with sequence numbers 15, 25, 35,45, 55, 65, and 75. Based on congestion control and flow control, its offered window is 40 bytes. So far, the client sent segments with Sequence numbers 15, 25, and 35. The highest acknowledgement it received is 45. This client could send new segments with Sequence number up to __________ . (Answer -1 if the client cannot send anymore new segments).

40

Let S/N be the ratio of the signal S over the noise N. If S/N = 10,000, then the SNR is ______ decibels (dB).

40

Suppose that cwnd = 1,000 bytes. The latest segment received by a client had the advertised window set to 40 bytes. The client has in its sending buffer these equal sized segments with sequence numbers 15, 25, 35,45, 55, 65, and 75. So far, the client sent segments with Sequence numbers 15, 25, and 35. The highest acknowledgement it received is 45. This client could send new segments with Sequence number up to __________ . (Answer -1 if the client cannot send anymore new segments).

40

Suppose that cwnd = 1,000 bytes. The latest segment received by a client had the advertised window set to 40 bytes. The client has in its sending buffer these equal sized segments with sequence numbers 15, 25, 35,45, 55, 65, and 75. So far, the client sent segments with Sequence numbers 15, 25, and 35. The highest acknowledgement it received is 45. This client could send up to __________ new bytes. (Answer -1 if the client cannot send anymore new segments).

40

A client has in its sending buffer these equal sized segments with sequence numbers 15, 25, 35,45, 55, 65, and 75. Based on congestion control and flow control, its offered window is 40 bytes. So far, the client sent segments with Sequence numbers 15, 25, and 35. The highest acknowledgement it received is 25. The next segment that the client could send is segment with Sequence number to __________ (answer -1 if the client cannot send anymore new segments).

45

Suppose that cwnd = 30 bytes. The latest segment received by a client had the advertised window set to 40 bytes. The client has in its sending buffer these equal sized segments with sequence numbers 15, 25, 35,45, 55, 65, and 75. So far, the client sent segments with Sequence numbers 15, 25, and 35. The highest acknowledgement it received is 25. The next segment that the client could send is segment with Sequence number to __________ . (Answer -1 if the client cannot send anymore new segments).

45

The network ID of IP Address 45.20.14.53 is _________.

45.0.0.0

The network ID of IP Address 45.20.14.53/12 is _________.

45.16.0.0

A server sends a 1000 bytes segment with sequence number 3500. If everything goes well, it will send the next segment with sequence number _________.

4500

A server sends a 1000 bytes segment with sequence number 3500. The client receives it correctly. The client will respond with acknowledgement number_________.

4500

A 125-byte frame is sent at a bitrate of 1 Mbps over a copper cable 1000 kms long. Recall that a copper cable has a propagation speed about 2/3 the speed of light. The propagation time is equal to _________ ms.

5

A hamming code of distance 6 can detect up to _______ corrupted bits in a received word..

5

Assume a recent TCP implementation (TCP Reno and beyond). Let the congestion window be 10 segments and one segment is lost. The congestion window will then be set by the sender to ________ segment(s).

5

Check all that apply. A 1250-bits frame is sent at a bitrate of 10 Kbps over a copper cable 1000 kms long. Then the propagation time is _________ ms. Propagation speed on copper is about 2/3 the speed of light. The speed of light is about 300,000 km/s.

5

The Hamming distance for Code C is such that 1) the largest distance between any two codewords is 7 2) the smallest distance between any two codewords is 5. The Hamming distance for Code C is ________.

5

The Hamming distance for Code C is such that 1) the largest distance between any two codewords is 7 2) the smallest distance between any two codewords is 5. The Hamming distance for Code C is ________.

5

This question is about how the Internet Protocol (IP) handles a packet P and decides where to deliver it. Consider a device D with IP address 134.89.200.145/24. On Device D, IP is handed a packet P with a destination IP address 131.204.65.14. Provide the order in which IP on Device D will perform these actions. The earliest action must be assigned 1. Any action that is incorrect or is not performed must be assigned the number 0. send Packet P to the device with IP address 134.89.200.1 check if Packet P is for Device D read the routing table ask ARP for a MAC address corresponding to IP Address 134.89.200.1 ask ARP for a MAC address corresponding to IP Address 131.89.200.254 hand Packet P to the appropriate protocol at the transport layer. check if the IP destination address of Packet P is local send Packet P to the device with IP address 134.89.200.254

5 1 3 4 0 0 2 0

Suppose a DNS client must resolve the host name toto.cs.washington.edu. Assign to each name server on the left a sequence number n based on the order it is queried. The first queried name server must be assigned the sequence number 1. Assign 99 to a name server that is not queried. Ncs Nedu root Nacm Nwas Local Name Server

5 3 2 99 4 1

Suppose a DNS client must resolve the host name toto.robot.cs.washington.edu. Assign to each name server on the left a sequence number n based on the order it is queried. The first queried name server must be assigned the sequence number 1. Assign 99 to a name server that is not queried. Ncs Nedu root Nvu Nwas Local name server

5 3 2 99 4 1

A sender and a receiver are using a 1,000 km copper cable to communicate. The propagation speed is about 2/3 the speed of light. They use stop and wait protocol. The frame size is 125 bytes. The bit rate is 1 Mbps. The propagation time is _____ ms. The transmission time is _____ ms. The throughput is _____ bps. The efficiency is _____ .

5.00 1.00 90909.09 0.09

A 1250-bits frame is sent at a bitrate of 10 Kbps over a copper cable 10,000 kms long. Then the propagation time is _________ ms. Propagation speed on copper is about 2/3 the speed of light. The speed of light is about 300,000 km/s.

50

Consider this code snapshot: String str = new String("CD456"); byte[] a = str.getBytes(); The content of a[2] is ___________.

52

A DNS server binds to Port # _______.

53

In the TCP/IP model, DNS uses this (these) port number(s) at the transport layer.

53

A client sends five equal sized segments with sequence numbers 15, 35, 55, 75, 95 Segments with sequence numbers 55 and 75 get lost. The server will likely send a segment with acknowledgement number ______ after receiving segment with sequence number 95.

55

A client sends five equal sized segments with sequence numbers 15, 35, 55, 75, 95 Segments with sequence numbers 55 and 75 get lost. The server will send acknowledgement number ______ after receiving segment with sequence number 35.

55

A client sends five equal sized segments with sequence numbers 15, 35, 55, 75, 95 Segments with sequence numbers 55 and 75 get lost. The server will send acknowledgement number ______ after receiving segment with sequence number 95.

55

A client sends seven equal sized segments with sequence numbers 15, 25, 35,45, 55, 65, and 75. Segments with sequence numbers 55 and 65 get lost. The client will receive the acknowledgement number ______________ after the server receives segment #75.

55

Suppose that cwnd = 1,000 bytes. The latest segment received by a client had the advertised window set to 40 bytes. The client has in its sending buffer these equal sized segments with sequence numbers 15, 25, 35,45, 55, 65, and 75. So far, the client sent segments with Sequence numbers 15, 25, and 35. The highest acknowledgement it received is 25. This client could send new segments with Sequence number up to __________ . (Answer -1 if the client cannot send anymore new segments).

55

Assume a recent TCP implementation (TCP Reno and beyond). Let the congestion window be 12 segments and all 12 outstanding segments get lost. The slow start threshold will then be set by the sender to ________ segment(s).

6

Match each protocol with its protocol number used in the protocol (number) field in the IPv4 header. TCP UDP ICMP Ethernet Wifi (IEEE 802.11) Bluetooth

6 17 1 Not Applicable Not Applicable Not Applicable

Select the best answer. Suppose that we transmit symbols belonging to this vocabulary {A, B, C, D, E, F, G, H}. The baud rate is 2,000 bauds. The bit rate is.

6 Kbps

Let the advertised window Wa (by the received) be 20 segments and the current congestion window cwnd be 8 segments. A timeout occurs. The sender can send up to _______ segments after 5 successful bursts (since the timeout).

6.75

The length of an IPv4 header is at most ________ bytes.

60

The subnet mask of network N is 255.255.255.192. This network N can assign unique addresses to up to _______________ hosts.

62

The network ID of IP Address 63.20.140.153 is _________.

63.0.0.0

The network ID of IP Address 63.20.140.153/26 is _________.

63.20.140.128

Suppose that cwnd = 40 bytes. The latest segment received by a client had the advertised window set to 60 bytes. The client has in its sending buffer these equal sized segments with sequence numbers 15, 25, 35,45, 55, 65, and 75. So far, the client sent segments with Sequence numbers 15, 25, and 35. The highest acknowledgement it received is 35. This client could send new segments with Sequence number up to __________ . (Answer -1 if the client cannot send anymore new segments).

65

The highest TCP port number is __________.

65535

The highest UDP port number is __________.

65535

The total length of an IPv4 packet is at most ________ bytes.

65535

Consider this code snapshot: String str = new String("CD456"); byte[] a = str.getBytes("UTF-16"); The content of a[3] is ___________.

67

Consider this code snapshot: String str = new String("CD456"); byte[] a = str.getBytes(); The content of a[0] is ___________.

67

Select the best answer. Consider this code snapshot: String str = new String("CD456"); byte[] a = str.getBytes("UTF-16BE"); The content of a[1] is ___________.

67

Consider this code snapshot: String str = new String("CD456"); byte[] a = str.getBytes("UTF-16"); The content of a[5] is ___________.

68

Consider this code snapshot: String str = new String("CD456"); byte[] a = str.getBytes("UTF-16BE"); The content of a[3] is ___________.

68

A network is made of a ring of 16 nodes using bidirectional point-to-point links. These nodes use distance vector routing. Suppose these nodes turn on at the same time. How many rounds of communications are needed for all the nodes to update their routing tables with ALL nodes in the network.

7 (round 0 our starting node can communicate to its immediate surroundings, so there are 3. Round 1 it reaches 5, round 2 it reaches 7, etc...)

The following frame was "sniffed" off an Ethernet network. Below, we removed the preamble. We use only hexadecimal numbers without using "0x" or "h" symbols. Here is what was collected in network byte order: 08 06 80 35 08 06 76 3E 56 E2 08 00 08 00 32 7F 4C 2D 5C 4B EE DD .... The source MAC address is ___________________.

76 3E 56 E2 08 00

The following frame was "sniffed" off an Ethernet network. Below, we removed the preamble. We use only hexadecimal numbers without using "0x" or "h" symbols. Here is what was collected in network byte order: 76 3E 56 E2 08 00 08 06 80 35 08 06 08 00 32 7F 4C 2D 5C 4B EE DD .... The destination MAC address is ___________________.

76 3E 56 E2 08 00

Answer this question in the context of the strategy described in class and adopted by each child to manage Weekly Pocket Money Problem. A child starts numbering weeks from 0 (zero) when he get smacked. On Week 0 he got smacked when he asked 16 dollars. Assuming that the child asks for money each week, the child will ask _____ dollars on Week 4.

8

Answer this question in the context of the strategy described in class and adopted by each child to manage Weekly Pocket Money Problem. A child starts numbering weeks from 0 (zero) when he get smacked. On Week 0 he got smacked when he asked 20 dollars. Assuming that the child asks for money each week, the child will ask _____ dollars on Week 4.

8

Assume a recent TCP implementation (TCP Reno and beyond). Let the advertised window Wa (by the received) be 8 segments and the current congestion window cwnd be 16 segments. A timeout occurs. The sender can send up to _______ segments after 5 successful bursts (since the timeout).

8

Assume a recent TCP implementation (TCP Reno and beyond). Let the congestion window be 16 segments and one segment is lost. The congestion window will then be set by the sender to ________ segment(s).

8

The size of a UDP header has ________ bytes. 4 8 16 None of these answers 32

8

Answer this question based congestion control and flow control as performed by TCP. Suppose that a TCP sender 1) has cwnd set to 8,000 bytes 2) has 4,000 bytes available in its own input buffers 3) receives a segment with an advertised window of 12,000 bytes. The TCP sender will set its offered window Wnd to ________ bytes.

8,000

Consider a 4-KHz noiseless channel. The sender is using the vocabulary set S to communicate. S = {apple, banana}. The maximal bit rate is _________ bps.

8,000

In the TCP/IP model, HTTP uses this (these) port number(s) at the transport layer.

80

Match these popular protocols (services) to their port number/transport protocol. HTTP (world wide web) SMTP (early email) Telnet (unsecure remote login) SSH (secure remote login) DNS (Domain Name System)

80 TCP 25 TCP 23 TCP 22 TCP 53 UDP

Consider a 4-KHz noiseless channel. The sender is using the vocabulary set S to communicate. S = {apple, banana}. The maximal bit rate is _________ bps.

8000

Numerical answer. Consider a 4-KHz noiseless channel. The sender is using the vocabulary set S to communicate. S = {apple, banana, pear, mango}. The maximal baud (symbol) rate is _________ bauds.

8000

Assume a recent TCP implementation (TCP Reno and beyond). Let the congestion window be 18 segments and one segment gets lost triggering three dupacks (duplicate acks). The slow start threshold (ssthreshold) is then set to ________ segment(s).

9

Assume a recent TCP implementation (TCP Reno and beyond). Let the advertised window Wa (by the received) be 20 segments and the current congestion window cwnd be 16 segments. A timeout occurs. The sender can send up to _______ segments after 5 successful bursts (since the timeout).

9.78

Match these protocols in the TCP/IP reference model to some protocol they use in the layer below theirs. IP HTTP UDP IMAP DNS

9/11.25 IP - IEEE 802.11 HTTP - UDP UDP - IP IMAP - TCP DNS - UDP

A client sends multiple equal sized segments with sequence numbers 150, 240, 330,420, and 510. The size of these segments is ________ bytes.

90

Consider this network of routers A, B, C, and D that are using Distance Vector Routing. Assume that all routers are turned on at the exactly same time 0. At time 0, the routers know only the cost to reach their immediate neighbors. At time 0 (Round 0), all routers send their distance vector to their immediate neighbors. Each 30 seconds, a new round of exchanges occurs. Fill in the table below with the distance vector that Node D sends its neighbors on Round 0. If the distance is not yet known, fill in with the value 99.

99 1 3 0

Assume that the local name server just started (cache empty). Suppose a DNS client must resolve the host name toto.fluit.cs.vu.nl. Assign to each name server on the left a sequence number n based on the order it is queried. The first queried name server must be assigned the sequence number 1. Assign 99 to a name server that is not queried. Ncs root Nnl Nvu Local name server

99 2 3 4 1

Suppose a DNS client must resolve the host name toto.cs.vu.nl. Assign to each name server on the left a sequence number n based on the order it is queried. The first queried name server must be assigned the sequence number 1. Assign 99 to a name server that is not queried. Ncs root Nnl Nvu local name server

99 2 3 4 1

Assume that the local name server just started (cache empty). The local name server just resolved the hostname tatiana.robot.cs.washington.edu and right after a DNS client must resolve the host name toto.edu. Assign to each name server on the left a sequence number n based on the order it is queried. The first queried name server must be assigned the sequence number 1. Assign 99 to a name server that is not queried. Ncs Nedu root Nwas Local name server

99 2 99 99 1

Assume that the local name server just started (cache empty). Suppose a DNS client must resolve the host name toto.eng.washington.edu. Assign to each name server on the left a sequence number n based on the order it is queried. The first queried name server must be assigned the sequence number 1. Assign 99 to a name server that is not queried. Ncs Nedu root Nwas Local name server

99 3 2 4 1

Suppose a DNS client must resolve the host name toto.washington.edu. Assign to each name server on the left a sequence number n based on the order it is queried. The first queried name server must be assigned the sequence number 1. Assign 99 to a name server that is not queried. Ncs Nedu root Nwas Local name server

99 3 2 4 1

Suppose a DNS client must resolve the host name toto.edu. Assign to each name server on the left a sequence number n based on the order it is queried. The first queried name server must be assigned the sequence number 1. Assign 99 to a name server that is not queried. Ncs Nedu root Nwas local name server

99 3 2 99 1

Assume that the local name server just started (cache empty). The local name server just resolved the hostname tatiana.filts.cs.vu.nl and right after a DNS client must resolve the host name toto.cs.vu.nl. Assign to each name server on the left a sequence number n based on the order it is queried. The first queried name server must be assigned the sequence number 1. Assign 99 to a name server that is not queried. Ncs root Nnl Nvu Local name server

99 99 99 2 1

Assume that the local name server just started (cache empty). The local name server just resolved the hostname tatiana.filts.cs.vu.nl and right after a DNS client must resolve the host name toto.fluit.cs.vu.nl. Assign to each name server on the left a sequence number n based on the order it is queried. The first queried name server must be assigned the sequence number 1. Assign 99 to a name server that is not queried. Ncs root Nnl Nvu Local name server

99 99 99 2 1

Assume that the local name server just started (cache empty). The local name server just resolved the hostname tatiana.fluit.cs.vu.nl and right after a DNS client must resolve the host name toto.fluit.cs.vu.nl. Assign to each name server on the left a sequence number n based on the order it is queried. The first queried name server must be assigned the sequence number 1. Assign 99 to a name server that is not queried. Ncs root Nnl Nvu Local name server

99 99 99 2 1

Assume that the local name server just started (cache empty). The local name server just resolved the hostname tatiana.robot.cs.washington.edu and right after a DNS client must resolve the host name toto.washington.edu. Assign to each name server on the left a sequence number n based on the order it is queried. The first queried name server must be assigned the sequence number 1. Assign 99 to a name server that is not queried. Ncs Nedu root Nwas Local name server

99 99 99 2 1

Assume that the local name server just started (cache empty). The local name server just resolved the hostname tatiana.vu.nl and right after a DNS client must resolve the host name toto.cs.vu.nl. Assign to each name server on the left a sequence number n based on the order it is queried. The first queried name server must be assigned the sequence number 1. Assign 99 to a name server that is not queried. Ncs root Nnl Nvu Local name server

99 99 99 2 1

Wireless communications use ____________________ as a medium.

>>None of these choices<< twisted pairs ethernet cables fiber optic cable

Based on Shannon's Theorem, the capacity of a noiseless channel is ________. infinite less than 1 Gbps. None of these answers null lower than Nyquit's limit with a valence of 2

??

The class of IP Address 1.20.140.153 is _________.

A

The class of IP Address 126.200.40.13 is _________.

A

The class of IP Address 45.20.14.53 is _________. B C None of these answers D A

A

The class of IP Address 63.20.140.153 is _________.

A

The following frame was "sniffed" off an Ethernet network. Below, we removed the preamble and the frame header. We use only hexadecimal numbers without using "0x" or "h" symbols. Below are the IP and TCP headers. Here is the IP packet in network byte order: 46 6F 06 00 01 24 00 00 40 06 56 7A 83 CC 0E 65 83 CC 34 43 23 00 4E 21 78 1C 5E 32 12 67 89 E2 50 10 00 34 67 F1 B3 This IP packet carries _____ . The source port number is _____ . The destination port number is _____ .

A TCP segment 781C 5E32

The key reason(s) why digital signals must be modulated before sent is (are):

A medium treats differently signals using different frequencies

UDP offers these services. Addressing Error Detection Error Correction Flow Control Congestion control

Addressing Error Detection

Opening a TCP connection performs these functions:

Agree on the initial sequence numbers used by server and client Agree on a maximum segment size

ASK stands for -------- -------- --------

Amplitude Shift Keying

In the OSI reference model, the [name1] layer receives service directly from the presentation layer.

Application

In the OSI reference model, this layer is the closest to the "user".

Application

In the TCP/IP reference model, the transport layer provides service directly to the _______ layer.

Application

In the TCP/IP Reference Model, your wireless router/access point uses this (these) layer(s) when you are configuring it using a browser

Application Data Link/Link Transport Internet/Network

The TCP/IP Reference Model includes this (these) layer(s).

Application Transport Link

In the OSI reference model, this layer is an intruder (i.e., it does not belong within this list of options).

Application ------------------------------------------ Physical None of the above Network Application Data Link

In the TCP/IP Reference Model, your laptop uses this (these) layer(s) when you are configuring your wireless router/access point using a browser.

Application Data Link / Link Transport Internet / Network

In the OSI Reference Model, your laptop uses this (these) layer(s) when you are configuring your wireless router/access point using a browser.

Application Presentation Internet / Network Physical Session Transport Data Link / Link

In the OSI reference model, these layers are active on only devices at the end points of a conversation.

Application Transport Session Presentation

In the OSI reference model, this layer is an intruder (i.e., it does not belong within this list of options).

Data Link ------------------------------------------ None of the above Application Presentation Data Link Transport

In the TCP/IP Reference Model, a bridge uses this (these) layer(s) when carrying a conversation.

Data Link / Link

In the TCP/IP Reference Model, an L2 switch uses this (these) layer(s) when carrying a conversation.

Data Link / Link

In the TCP/IP Reference Model, these layers are mostly implemented by hardware on most hosts (clients or servers).

Data Link / Link

In the TCP/IP Reference Model, your Ethernet interface uses this (these) layer(s) when you are browsing the Internet.

Data Link / Link

In the TCP/IP Reference Model, an L3 switch uses this (these) layer(s) when carrying a conversation.

Data Link / Link Internet / Network

In the OSI Reference Model, these layers are mostly implemented by hardware on most hosts (clients or servers).

Data Link / Link Physical

In the OSI Reference Model, your Ethernet interface uses this (these) layer(s) when you are browsing the Internet.

Data Link / Link Physical

In the TCP/IP Reference Model, your wireless network interface uses this (these) layer(s) when you are browsing the Internet.

Data Link/Link Physical NOT Internet / Network **NOTE** I just used these answers and got 0 points

Consider the method p.receive(s) where p = new DatagramSocket(); The type of the parameter s is _____________ .

DatagramPacket

Consider this incomplete code snapshot: int a, e; short b, f; byte g; DataOutputStream c; DatagramSocket d; InputStream w; ByteArrayOutStream x = new ByteArrayOutputStream(); c = new DataOutputStream(x); DataInputStream s = new DataInputStream(w); If I write a statement d.send(m), m is most likely of type __________.

DatagramPacket

Any UDP client socket program in Java must use this function call to establish a socket.

DatagramSocket

Any UDP server socket program in Java must use this function call to establish a socket.

DatagramSocket

The method DatagramSocket() returns a result of type _________.

DatagramSocket

These fields on the TCP header are used for addressing.

Destination Port Number Source Port Number

Match each protocol to the routing algorithm used. Routing Information Protocol Open Shortest Path First Border Gateway Protocol

Distance Vector Routing Link State Routing Path Vector Routing

A receiver receives the following frame using Flag Bytes with Byte Stuffing: FLAG ESC ESC Y X ESC FLAG R FLAG where letters A-Z represent bytes. The payload, i.e., the message, sent (without the stuffing if any) inside this frame is _________.

ESC Y X FLAG R

Check all that apply about connectionless services.

Each item carries all information needed to deliver it even if some links/nodes fail Intermediary nodes do not store any state about the offered service Items of the "same conversation" may take different paths.

BGP is likely used to update routing tables on Auburn University routers.

False

For reliability, a timer is necessary at the receiver if the channel can loose packets.

False

For reliability, a timer is necessary at the receiver if the channel only corrupt packets payloads.

False

For reliability, a timer is necessary at the sender if the channel only corrupts packet payloads.

False

In the OSI Reference model, a transport protocol data unit (TPDU) encapsulates a network protocol data unit.

False

In the TCP/IP model, an application message can be a packet's payload.

False

In the TCP/IP reference model, a UDP datagram can be a frame's payload.

False

In the TCP/IP reference model, an application message can be a frame's payload.

False

Of the routing algorithms we studied, _______________ is the simplest one.

Flooding

With this routing algorithm, the node forwards each (unseen) packet on all outgoing interfaces, except the one the packet came in from.

Flooding

_________ is the design issue that consists of avoiding that a sender overwhelms a receiver.

Flow Control (Congestion Control is Receiver + Nodes)

FSK stands for _____ _____ _____

Frequency Shift Keying

When a packet is successfully delivered without any issue, this (these) protocol(s) would not likely be involved.

ICMP

IP (Internet Protocol) provides service directly to these protocols.

ICMP TCP UDP

Match these protocols in the TCP/IP reference model to some protocol they usually use in the layer below theirs. IP POP3 UDP FTP DNS

IEE 802.11 TCP (Almost certain this is right) IP TCP (Almost certain this is right) UDP (Almost certain this is right)

Check the protocol(s) that belong(s) to the presentation layer

IEEE 754

A wireless LAN uses most likely the ________ standard.

IEEE 802.11

Wifi uses the ____________ standard.

IEEE 802.11

Your wireless network at home (to access the Internet) uses most likely the ________ standard.

IEEE 802.11

Check the protocol(s) that belong(s) to the physical layer

IEEE 802.11 IEEE 802.3

Ethernet uses the ____________ standard.

IEEE 802.3

These (this) protocol(s) are contention based protocols.

IEEE 802.3 IEEE 802.11

Match these protocols in the TCP/IP reference model to some protocol they use in the layer below theirs. IP IMAP TCP Trivial File Transfer Protocol SMTP

IEEE 802.3 TCP IP UDP TCP PARTIAL(2.6/3.25) IP -- POP3 (IEEE 802.3 was not in the option list) IMAP -- TCP UDP -- IP Trivial File Transfer Protocol -- UDP ESMTP -- TCP

Check the protocol(s) that belong(s) to the data link layer

IEEE 802.3 IEEE 802.11

These (this) IEEE 802.x protocol(s) are fully collision free.

IEEE 802.4 IEEE 802.5

A DNS server uses ________ at the network (internet) layer.

IP

The Border Gateway Protocol (BGP) uses _______ as its network protocol.

IP

The Open Shortest Path First protocol (OSPF) uses _______ as its network protocol.

IP

The Routing Information Protocol (RIP) uses _______ as its network protocol.

IP

These are routing mechanisms

IP Hot Potato Early Exit

This (these) protocol(s) are used at the Internet (Network) layer in the TCP/IP Reference model.

IP ICMP (multiple versions - may only have one of these options listed)

These are routing mechanisms.

IP early exit hot potato

Match these protocols to their layers in the TCP/IP reference model. IP UDP TCP HTTP DNS POP3 UDP FTP SMTP

IP -- Internet (network) UDP -- Transport TCP -- Transport HTTP -- Application DNS -- Application POP3 -- Application FTP -- Application SMTP -- Application (Some may not appear)

Check the information that a DHCP Server provides. IP address of DNS server Subnet mask IP address None of these answers Name of the DNS Server IP address of gateway router

IP address IP address of gateway router Subnet mask IP address of DNS server

In the TCP/IP model, TCP uses this (these) protocol(s) at the network (Internet) layer.

IPv4 IPv6

Check all that apply to IP addresses. IPv4 has 32 bits addresses It uniquely identifies a network interface A host cannot have multiple IP addresses at the same time All interfaces on a host have the same IP address IPv6 has 64 bits adresses

IPv4 has 32 bits addresses It uniquely identifies a network interface

Check the protocol(s) that belong(s) to the network layer

IPv6 IPv4

In the TCP/IP model, UDP uses this (these) protocol(s) at the network (Internet) layer.

IPv6 IPv4

Most hosts on the Internet will have these protocols active on them.

IS TCP IS DNS client IS IP (There are other options- 1 more is either UDP or HTTP server) NOT DNS server

Check all statements/method calls that TCP server or client must absolutely include to receive data using I/O streams a and b. The TCP server or client uses the socket variable sock. b.write(...) b.read(......) OutputStream b = sock.getOutputStream(); None of these answers InputStream a = sock.getInputStream();

InputStream a = sock.getInputStream();

In the OSI reference model, adjacent layers use an [name1] to communicate.

Interface

In the TCP/IP reference model, IP belongs to the _______________ layer.

Internet

The TCP/IP Reference Model includes namely this (these) layer(s). Internet Session Transport Link Network

Internet Transport Link

In the TCP/IP model, an instance in the transport layer wants to send a data unit m. The first header added to m will be a header belonging to the ________ layer.

Internet (Network)

In the TCP/IP Reference Model, a router uses this (these) layer(s) when carrying a conversation.

Internet / Network Data Link / Link

In the OSI Reference Model, these layers are mostly implemented by software on most hosts (clients or servers). Physical Link Application Session Internet / Network Transport Presentation

Internet / Network Session Presentation Application Transport

In the OSI Reference Model, an L3 switch uses this (these) layer(s) when carrying a conversation.

Internet / Network Data Link / Link Physical

In the OSI Reference Model, your wireless router/access point uses this (these) layer(s) when you are configuring it using a browser.

Internet / Network Session Physical Presentation Application Transport Data Link / Link

In the TCP/IP Reference Model, the youtube server uses this (these) layer(s) when streaming to you videos.

Internet / Network Transport Application Data Link / Link

In the context of computer networks, IP stands for ______________.

Internet Protocol

Check all that applies to this frame "sniffed" on the medium (expressed in hexadecimal. Preamble is not included): 76 3E 56 E2 08 00 08 06 80 35 08 06 08 00 47 7F 05 4E 5C 4B EE DD 12 11 10 E5 83 CC 0E 37 83 CC 0E 40 27 1A 27 D7 00 00 12 05 10 E2 00 34 ..

It contains an IP packet WITHOUT options It contains an IPv4 packet It contains a UDP datagram

Check all that applies to this frame "sniffed" on the medium (expressed in hexadecimal. Preamble is not included): 76 3E 56 E2 08 00 08 06 80 35 08 06 08 00 45 7F 05 4E 5C 4B EE DD 12 06 10 E5 83 CC 0E 37 83 CC 0E 40 27 1A 27 D7 00 00 12 05 10 E2 00 34 .. Below are the frame and IP headers:

It contains an IP packet WITHOUT options It contains an IPv4 packet It contains a TCP segment

Check all that applies to this frame "sniffed" on the medium (expressed in hexadecimal. Preamble is not included): 76 3E 56 E2 08 00 08 06 80 35 08 06 08 00 47 7F 05 4E 5C 4B EE DD 12 06 10 E5 83 CC 0E 37 83 CC 0E 40 27 1A 27 D7 00 00 12 05 10 E2 00 34 ..

It contains an IPv4 packet It contains a TCP segment

Check all that applies to this frame "sniffed" on the medium (expressed in hexadecimal. Preamble is not included): 76 3E 56 E2 08 00 08 06 80 35 08 06 08 00 45 7F 05 4E 5C 4B EE DD 12 11 10 E5 83 CC 0E 37 83 CC 0E 40 27 1A 27 D7 00 00 12 05 10 E2 00 34 .. Below are the frame and IP headers:

It contains an IPv4 packet It contains an IP packet WITHOUT options It contains a UDP datagram

Check all that applies to this frame "sniffed" on the medium (expressed in hexadecimal. Preamble is not included): 76 3E 56 E2 08 00 08 06 80 35 08 06 86 DD 65 7F 05 4E 5C 4B EE DD 12 11 10 E5 83 CC 0E 37 83 CC 0E 40 27 1A 27 D7 00 00 12 05 10 E2 00 34 ..

It contains an IPv6 packet

Check all that applies to this frame "sniffed" on the medium (expressed in hexadecimal. Preamble is not included): 76 3E 56 E2 08 00 08 06 80 35 08 06 08 00 47 7F 05 4E 5C 4B EE DD 12 11 10 E5 83 CC 0E 37 83 CC 0E 40 27 1A 27 D7 00 00 12 05 10 E2 00 34 ..

It is a DIX frame It contains an IPv4 packet It contains a UDP datagram

Check all that apply to the OSI reference model.

It is a good education tool to understand networks It is an international standard of networks It is a thorough representation of computer networks

Check all that applies to the Nyquist Theorem.

It limits the baud (symbol) rate Its limit is different for different media

Check all that apply to the problem of congestion control.

It may be performed by the transport layer

Check all that apply about connection-oriented service(s).

It requires circuit set up

Check all that applies to the Shannon's Theorem.

Its limit is different for different media It limits the baud (symbol) rate It limits the bit rate It applies to noisy channels

The function call Socket is called by a ________________.

Java TCP Client to initiate a connection with a TCP server

The function call DatagramSocket is used by a ________________.

Java UDP Server to establish a UDP socket Java UDP client to establish a UDP socket

This Internet pioneer was an editor or an author for the original RFCs specifying IP, UDP, TCP, and SMTP

Jon Postel

Your wireless network at home is a _____

LAN

Medium Access Control is important and used mainly for ___________.

LANs (Local Area Networks)

In this (these) distributed routing algorithm(s), each node communicates will all other nodes about its distance to its immediate neighbors only.

Link State Routing

This word, sent using odd parity, is received. Word = 1011 1011 1 Was the word corrupted?

Maybe

In the context of OSI Reference Model (Data Link Layer), the MAC stands for ________________________________.

Medium Access Control

This issue is not a network software issue

Memory footprint --------------------------------------- Scalability None of these answers Confidentiality or authentication Memory footprint Routing

Check components that are part of the email architecture presented in class..

Message Transfer Agent Mailbox

Assume that the channel can corrupt up to one bit. The word 1011 1101 is received using the Hamming code C. The original word that was most likely sent originally (before corruption) was _____________. Code C uses four codewords L, M, N, and O defined as follows: Code C: L : 0000 0000 M: 0100 1011 N: 1011 0101 O: 1111 1010

N: 1011 0101

A host H has IP address A represented in dotted-decimal as 120.204.14.65. Select the instruction that computes the network ID NID of IP Address A.

NID = A & 0xff000000

A host H has IP address A represented in dotted-decimal as 56.204.14.65. Select the instruction that computes the network ID NID of IP Address A.

NID = A & 0xff000000

A host H has IP address A represented in dotted-decimal as 56.204.14.65/9. Select the instruction that computes the network ID NID of IP Address A.

NID = A & 0xff800000

A host H has IP address A represented in dotted-decimal as 120.204.14.65/11. Select the instruction that computes the network ID NID of IP Address A.

NID = A & 0xffe00000

A host H has IP address A represented in dotted-decimal as 56.204.14.65/13. Select the instruction that computes the network ID NID of IP Address A.

NID = A & 0xfff80000

A host H has IP address A represented in dotted-decimal as 56.204.14.65/15. Select the instruction that computes the network ID NID of IP Address A.

NID = A & 0xfffe0000

A host H has IP address A represented in dotted-decimal as 128.204.14.65. Select the instruction that computes the network ID NID of IP Address A.

NID = A & 0xffff0000

A host H has IP address A represented in dotted-decimal as 191.204.14.65. Select the instruction that computes the network ID NID of IP Address A. NID = A & 0x00000000 NID = A & 0xff000000 NID = A & 0xffffff00 None of these answers NID = A & 0xffff0000

NID = A & 0xffff000000

A host H has IP address A represented in dotted-decimal as 191.204.14.65/20. Select the instruction that computes the network ID NID of IP Address A.

NID = A & 0xfffff000

A host H has IP address A represented in dotted-decimal as 200.204.14.65. Select the instruction that computes the network ID NID of IP Address A.

NID = A & 0xffffff00

A host H has IP address A represented in dotted-decimal as 200.204.14.65/26. Select the instruction that computes the network ID NID of IP Address A.

NID = A & 0xffffffc0

A host H has IP address A represented in dotted-decimal as 128.204.14.65/28. Select the instruction that computes the network ID NID of IP Address A.

NID = A & 0xfffffff0

These fields on the TCP header are used to provide network routing.

NOT Destination Port Number 32-bit acknowledgement number Source Port Number 16 bit checksum

The following frame was "sniffed" off an Ethernet network. Below, we removed the preamble and the frame header. We use only hexadecimal numbers without using "0x" or "h" symbols. Below are the IP and TCP headers. Here is the IP packet in network byte order: 45 6F 06 00 01 24 00 00 40 11 56 7A 83 CC 0E 65 83 CC 34 43 4E 4E 21 23 00 78 1C 5E 32 12 67 89 E2 50 10 00 34 F1 B3 This IP packet carries _____. The source port number is _____. The destination port number is _____.

NOT (A TCP segment, 2300, 781C) NOT(a TCP segment, 4E21, 2300) PARTIAL(8.33/12.5) TCP segment 4E21 2300 (I got a correct answer with this exact byte order that was a UDP datagram None of these answers None of these answers )

A client has in its sending buffer these equal sized segments with sequence numbers 15, 25, 35,45, 55, 65, and 75. Based on congestion control and flow control, its offered window is 30 bytes. So far, the client sent segments with Sequence numbers 15, 25, and 35. The highest acknowledgement it received is 45. This client could send new segments with Sequence number up to __________ . (Answer -1 if the client cannot send anymore new segments).

NOT -1

Today, most wired LANS run at speeds from ________ up to ________ .

NOT 1 Mbps up to 100 Gbps (both could be wrong, or just one could be wrong)

Select the best answer from each dropdown menu. Use byte counting to frame the words "I", "Love", "THE", and "Constitution". A frame is made of one word that may contain multiple characters (do not count space characters). Complete the framing of the above words: [blank] I [blank] Love [blank] THE [blank] Constitution

NOT 1,4,3,12 (probably 2,5,4,13)

A network is made of a chain of 10 nodes. These nodes use distance vector routing. Suppose these nodes turn on at the same time. How many rounds of communications are needed for all the nodes to update their routing tables with ALL nodes in the network?

NOT 10

Answer this question in the context of the strategy described in class and adopted by each child to manage Weekly Pocket Money Problem. A child starts numbering weeks from 0 (zero) when he get smacked. On Week 0 he got smacked when he asked 24 dollars. Assuming that the child asks for money each week, the child will ask _____ dollars on Week 5.

NOT 14

Check the transport layer protocol(s) used for the delivery of an email from a Message Transfer Agent to a Receiver User Agent.

NOT SMTP NOT UDP NOT None NOT (POP3, IMAP)

Answer this question in the context of the strategy described in class and adopted by each child to manage Weekly Pocket Money Problem. A child starts numbering weeks from 0 (zero) when he get smacked. On Week 0 he got smacked when he asked 32 dollars. Assuming that the child asks for money each week, the child will ask _____ dollars on Week 7.

NOT 18 (I figured it was because 1=>2=>4=>8=>16=>17=>18)

Suppose that cwnd = 1,000 bytes. The latest segment received by a client had the advertised window set to 40 bytes. The client has in its sending buffer these equal sized segments with sequence numbers 15, 25, 35,45, 55, 65, and 75. So far, the client sent segments with Sequence numbers 15, 25, and 35. The highest acknowledgement it received is 45. This client could send up to __________ new segments. (Answer -1 if the client cannot send anymore new segments).

NOT 2

Suppose that cwnd = 30 bytes. The latest segment received by a client had the advertised window set to 40 bytes. The client has in its sending buffer these equal sized segments with sequence numbers 15, 25, 35,45, 55, 65, and 75. So far, the client sent segments with Sequence numbers 15, 25, and 35. The highest acknowledgement it received is 25. This client could send up to __________ new segments. (Answer -1 if the client cannot send anymore new segments).

NOT 2

A user types the command "arp -a" on the console of the machine csexmac161engauburnedu. The arp command displays (see picture) the content of the ARP cache of the machine csexmac161engauburnedu. Suppose that IP on this machine must send a packet to the interface with IP Address 192.168.1.124. When IP asks ARP for the address 192.168.1.124, ARP will return the MAC address ________________.

NOT 2:f:b5:13:2:ca NOT c8:b3:73:2e:f8:29

A user types the command "arp -a" on the console of the machine csexmac161engauburnedu. The arp command displays (see picture) the content of the ARP cache of the machine csexmac161engauburnedu. Suppose that IP on this machine must send a packet to the interface with IP Address 192.168.1.114. When IP asks ARP for the address 192.168.1.114, ARP will return the MAC address ________________.

NOT 2:f:b5:97:25:12

A client sends seven equal sized segments with sequence numbers 15, 25, 35,45, 55, 65, and 75. Segments with sequence numbers 35 and 65 get lost. The client will receive _______ duplicate acknowledgements after the server received segment #75.

NOT 4

A client sends seven equal sized segments with sequence numbers 15, 25, 35,45, 55, 65, and 75. Segments with sequence numbers 35, 55 and 65 get lost. The client will receive _______ duplicate acknowledgements after the server received segment #75.

NOT 5

A DNS client binds to Port # _______.

NOT 53

A client sends seven equal sized segments with sequence numbers 15, 25, 35,45, 55, 65, and 75. Segments with sequence numbers 45 and 65 get lost. The client will receive the acknowledgement number ______________ after the server receives segment #75.

NOT 55

Suppose that cwnd = 40 bytes. The latest segment received by a client had the advertised window set to 50 bytes. A client has in its sending buffer these equal sized segments with sequence numbers 15, 25, 35,45, 55, 65, and 75. So far, the client sent segments with Sequence numbers 15, 25, and 35. The highest acknowledgement it received is 25. The next segment that the client could send is segment with Sequence number to __________ (answer -1 if the client cannot send anymore new segments).

NOT 55

A client sends seven equal sized segments with sequence numbers 15, 25, 35,45, 55, 65, and 75. Segments with sequence numbers 35 and 65 get lost. The server will send acknowledgement number ______ after receiving segment with sequence number 75.

NOT 65

A network is made of 16 nodes using a broadcast medium. These nodes use distance vector routing. Suppose these nodes turn on at the same time. How many rounds of communications are needed for all the nodes to update their routing tables with ALL nodes in the network.

NOT 8

The class of IP Address 254.20.14.53 is _________.

NOT D (Should be None of these answers)

In the TCP/IP Reference Model, a repeater uses this (these) layer(s) when carrying a conversation.

NOT Data Link / Link NOT Physical

In the OSI Reference Model, your wireless network interface uses this (these) layer(s) when you are browsing the Internet. Application Session Internet / Network Presentation Transport Physical Data Link / Link

NOT Data Link/ Link NOT Internet/ Network Not Internet/Network, Data Link / Link, Transport, & Application

Apart the difference in the layers where they perform, DNS is a service most similar to the _________ service.

NOT IP NOT NAT NOT DHCP

Assuming that congestion control is used, flow control protects the input buffers of these devices from overflowing. sender receiver intermediary nodes None of these answers links

NOT Intermediary Nodes

Assuming that flow control is used, congestion control is necessary to protect the input buffers of these devices from overflowing. intermediary nodes receiver None of these answers sender links

NOT Intermediary nodes, receiver

This (These) protocol(s) is (are) routing protocol(s) (modifying routing tables) that could be used on the Internet backbone. Group of answer choices None of these answers Border Gateway Protocol (BGP) Internet Protocol (IP) Open Shortest Path First (OSPF) Routing Information Protocol (RIP)

NOT Internet Protocol (IP)

In general, these protocols/services may use directly or indirectly a DNS client. SMTP server SMTP client POP3 server telnet client telnet server POP3 client None of these

NOT None of these NOT (HTTP server, ssh Server, DNS server) NOT (ssh client, DNS client)

The checksum on the TCP header covers ________________. (Answers may overlap) None of these answers The TCP payload The IP payload Protocol number (from IP header) The TCP header The full IP header The IP addresses (in the IP header)

NOT None of these Answers

The network ID of IP Address 212.202.100.63/28 is _________. 212.202.100.16 212.202.100.48 None of these answers 212.202.100.32 212.202.100.0

NOT None of these answers

Check all features/services ESMTP allows/offers.

NOT Used to encrypt and transfer data from the Message Transfer Agent to the Receiver User Agent NOT Used to encrypt and transfer encrypted data from the Sender User Agent to the Message Transfer Agent

Check all features/services ESMTP allows/offers.

NOT Used to transfer data in plain from to a Message Transfer Agent to a Message Transfer Agent PARTIAL 5/10 Encrypts and transfers ASCII text Used to transfer data in plain from to a Message Transfer Agent to a Message Transfer Agent Used to encrypt and transfer encrypted data from the Sender User Agent to the Message Transfer Agent PARTIAL (1.5/3) Encrypts and transfers ASCII text

The expression (flags & 4) is of type ____________.

NOT boolean NOT byte NOT None of these Answers

A user types the command "arp -a" on the console of the machine csexmac161engauburnedu. The arp command displays (see picture) the content of the ARP cache of the machine csexmac161engauburnedu. Suppose that IP on this machine must send a packet to the interface with IP Address 192.168.1.144. When IP asks ARP for the address 192.168.1.144, ARP will return the MAC address ________________.

NOT c8:b3:73:2e:f8:29 NOT f4:5c:89:b6:b8:e7

Check all features that TCP offers while UDP does NOT.

NOT congestion control NOT addressing NOT guaranteed throughput

A(n) __________ is a set of rules defining communications between peer layers.

NOT interface Probably protocol

Apart the difference in the layers where they perform, DNS is a service most similar to the _________ service. DHCP IP none of these answers ARP NAT

NOT none of these answers

In the OSI reference model, IP belongs to the _______________ layer.

Network

In the OSI reference model, the [name1] layer provides service directly to the transport layer.

Network

In the OSI reference model, the [name1] layer receives service directly from the data link layer.

Network

Check all applications that UDP uses. Trivial FTP IMAP None of these answers Telnet ssh DNS

None of these Answers

For DNS, the domain name "cisco" is defined under the domain .com (to form cisco.com). These domains can not use the domain cisco under them. edu None of these answers us museum net

None of these Answers

Using DNS, each domain name (i.e., edu, cisco.com, cs.washington.edu, tamu.edu, cs.tamu.edu, .....) must have at least ________ name server(s).

None of these Answers

A client sends five equal sized segments with sequence numbers 15, 35, 55, 75, 95 Segments with sequence numbers 55 and 75 get lost. The server will likely send a segment with sequence number ______ after receiving segment with sequence number 15.

None of these answers

A client sends five equal sized segments with sequence numbers 15, 35, 55, 75, 95 Segments with sequence numbers 55 and 75 get lost. The server will likely send a segment with sequence number ______ after receiving segment with sequence number 35.

None of these answers

A client sends five equal sized segments with sequence numbers 15, 35, 55, 75, 95 Segments with sequence numbers 55 and 75 get lost. The server will likely send a segment with sequence number ______ after receiving segment with sequence number 95. 55 15 115 35 None of these answers

None of these answers

A receiver receives the following frame using Flag Bytes with Byte Stuffing: FLAG FLAG Y X ESC FLAG R FLAG where letters A-Z represent bytes. The payload, i.e., the message, sent (without the stuffing if any) inside this frame is _________. ESC Y X FLAG R Y X ESC ESC R None of these answers Y X FLAG R Y X ESC FLAG R

None of these answers

Check all applications that TCP uses. Trivial FTP None of these answers FTP DNS SMTP HTTP

None of these answers

Check all that apply. During the lecture, we encoded the three boolean members single, rich, and female using one byte b using the following rules as illustrated by this figure: bit 7 bit 6 bit 5 bit 4 bit 3 bit 2 bit 1 bit 0 0 0 0 0 0 female rich single - bit 0 is the least significant bit. bit 0 is set to 1 if the friend is single. - bit 1 is set to 1 if the friend is rich. - bit 2 is set to 1 if the friend is female. Suppose that after encoding the three boolean members single, rich, and female of a friend f into a byte b, we get b = 0x0. Check all that apply about the friend f.

None of these answers

Consider this code snapshot: String str = new String("CD456"); byte[] a = str.getBytes("UTF-16"); The content of a[0] is ___________.

None of these answers

Consider this code snapshot: String str = new String("CD456"); byte[] a = str.getBytes("UTF-16"); The content of a[1] is ___________.

None of these answers

The function call datagramsocket is used by a ________________. Pay attention! Java is case sensitive.

None of these answers (There are multiple questions with different choices, but in my experience they are always "None of these Answers". Double check before proceeding.)

This issue is not a network software issue

None of these answers ------------------------------------ Routing Confidentiality or authentication Scalability None of these answers Congestion or flow control

A host H has IP address 56.204.14.65. Suppose you want to send some packet to all hosts on the same network as H . You could use this (these) addresses. None of these answers 56.204.255.255 56.204.14.255 255.204.14.65 56.204.14.0

None of these answers (I think it would just be 56.255.255.255)

Assume you just received data is stored in network byte order. Below is a snapshot of the data memory storing data. The first column is the address while second one is the data at that address. The integer (short) variable at address 0x1006 is ___________. Address Content 0x1000 0x34 0x1001 0xB4 0x1002 0x20 0x1003 0xAE 0x1004 0x42 0x1005 0x67 0x1006 0x19 0x1007 0x3C 0x1008 0x8C

None of these answers (answer is 193C)

In the OSI reference model, an instance in the network layer wants to send a data unit m. The first header added to m will be a header belonging to the ________ layer.

None of these answers (data link)

Consider a system with 4 stations X,Y, Z, and W that use CDMA. These four stations use the chip sequences x, y, z and w that are all mutually orthogonal. Stations X, Y, Z, and W send 0, 0, 1, and 0, respectively. If S is the resulting signal S then w.S = ________.

None of these answers (would be -||w||^2)

A server sends a 10 bytes segment with sequence number 0. The client receives it correctly. The client will respond with Sequence number_________.

None of these choices

A server sends a 1000 bytes segment with sequence number 3500. The client receives it correctly. The client will respond most likely with Sequence number_________.

None of these choices

Check all that apply to TCP or UDP ports.

None of these choices

Select the best answer. Wireless communications use ____________________ as a medium. fiber optics cable None of these choices twisted pairs ethernet cables

None of these choices

In this (these) distributed routing protocols(s), each node communicates will all other nodes about its distance to its immediate neighbors only.

OSPF

This (These) protocol(s) use(s) link state routing or one of its improved variants.

OSPF

__________________ is an interior gateway protocol using ____________ routing.

OSPF: Link State

This (These) protocol(s) is (are) routing protocol(s) (modifying routing tables) that could be used on autonomous systems (i.e., not on the Internet backbone).

Open Shortest Path First (OSPF) Routing Information Protocol (RIP)

Match these wired transmission media from the one supporting the highest bandwidths to the lowest. Assign 1 to the one that supports the highest bandwidths and 99 to the expressions that are not wired media.

Optical fiber - 1 Coaxial cable - 2 Twisted pairs - 3 Satellite links - 99 Terrestrial microwave - 99

Bluetooth is a technology that could work for these types of networks

PAN (Personal Area Network) LAN (Local Area Network)

______________ links connect individual pairs of machines.

PARTIAL NOT bus

In the TCP/IP Reference Model, these layers are mostly implemented by software on most hosts (clients or servers).

PARTIAL (2.08/6.25) Link Transport Internet/Network PARTIAL (4.17/6.25) Internet/Network Transport

In this (these) distributed routing algorithm(s), each node communicates ONLY with its immediate neighbors to "learn" about the other nodes on the network.

PARTIAL 6.25/12.5 Distance Vector Routing NOT Link State Routing

This question is about how the Internet Protocol (IP) handles a packet P and decides where to deliver it. Consider a device D with IP address 134.89.200.145/24. On Device D, IP is handed a packet P with a destination IP address 131.204.64.170. Provide the order in which IP on Device D will perform these actions. The earliest action must be assigned 1. Any action that is incorrect or is not performed must be assigned the number 0. SSQs-RoutingTable.png send Packet P to the device with IP address 134.89.200.128 read the routing table ask ARP for the MAC address corresponding to IP Address 134.89.200.254 ask ARP for the MAC address corresponding to IP Address 131.89.200.128 check if the IP destination address of Packet P is local send Packet P to the device with IP address 134.89.200.254

PARTIAL (2.67/4) 0 2 0 0 1 0

Suppose a DNS client must resolve the host name toto.acm.org. Assign to each name server on the left a sequence number n based on the order it is queried. The first queried name server must be assigned the sequence number 1. Assign 99 to a name server that is not queried. root Nacm Norg Nwas Local name server

PARTIAL (2/5): 99 99 99 99 1

The following frame was "sniffed" off an Ethernet network. Below, we removed the preamble and the frame header. We use only hexadecimal numbers without using "0x" or "h" symbols. Below are the IP and TCP headers. Here is the IP packet in network byte order: 45 6F 06 00 01 24 00 00 40 06 56 7A 83 CC 0E 65 83 CC 34 43 23 00 4E 21 5E 32 78 1C 12 67 89 E2 50 10 00 34 67 F1 B3 This IP packet carries ______ . The source port number is _____ . The destination port number is .

PARTIAL (3.33/10) a TCP segment 4E21 5E32 PARTIAL (3.33/10) a TCP segment 5E32 781C PARTIAL (3.33/10) a UDP datagram None of these answers 2300 1/3 a TCP segment 5E32 2300 Bottom answer is NOT (5E32, 781C, 2300)

Check the application layer protocol(s) used for the submission of an email by the Sender User Agent to the Message Transfer Agent.

PARTIAL (5/10) SMTP

This question is about how the Internet Protocol (IP) handles a packet P and decides where to deliver it. Consider a device D with IP address 134.89.200.145/24. On Device D, IP is handed a packet P with a destination IP address 131.204.64.159. Provide the order in which IP on Device D will perform these actions. The earliest action must be assigned 1. Any action that is incorrect or is not performed must be assigned the number 0. SSQs-RoutingTable.png send Packet P to the device with IP address 134.89.200.254 read the routing table ask ARP for the MAC address corresponding to IP Address 134.89.200.67 ask ARP for the MAC address corresponding to IP Address 134.89.200.254 check if the IP destination address of Packet P is local send Packet P to the device with IP address 134.89.200.67 ask ARP for the MAC address corresponding to IP Address 131.89.200.254

PARTIAL (5/7) 0 2 0 0 1 0 0

The objective(s) of congestion control is (are) to :

PARTIAL (6.25) maximize throughput

Match each socket function call to the sequence it will appear on a Java TCP server. The first/earliest call is assigned the number 1. The earlier is a function call, the smaller is its assigned number. The statements must be compatible (i.e., use appropriate variables from earlier valid statements). - If a call is NOT absolutely necessary, assign it the number 99. - If a call is NOT applicable to a TCP server socket, assign it the number 77. - If two calls can be interchanged, assign them the same number. b = s.getInputStream(); s = new ServerSocket(..); a = cs.getOutputStream(); s.close() cs = s.accept(); a.read(...)

PARTIAL (7.08/8.5) 77 1 3 99 2 4

Match each socket function call to the sequence it will appear on a Java TCP server. The first/earliest call is assigned the number 1. The earlier is a function call, the smaller is its assigned number. The statements must be compatible (i.e., use appropriate variables from earlier valid statements). - If a call is NOT absolutely necessary, assign it the number 99. - If a call is NOT applicable to a TCP server socket, assign it the number 77. - If two calls can be interchanged, assign them the same number. b = s.getInputStream(); s = new ServerSocket(..); a = cs.getOutputStream(); s.close() cs = s.accept(); a.write(...)

PARTIAL (7.08/8.5) 77 1 3 99 2 5

TCP and UDP headers share these fields.

PARTIAL (8.33/12.5) source port number destination port number

Check all methods that can improve the raw (digital) transmission of bits over long distances. Use encoding schemes such as NRZ, NRZI, or Manchester delay the signal Use wireless channels Use media more prone to interferences Amplify a signal at the source Improve the quality of the medium Modulate the signal

PARTIAL (8.33/12.5): Use encoding schemes such as NRZ, NRZI, or Manchester Improve the quality of the medium

These are the underlying design constraints that resulted in what the OSI Reference Model is today

PARTIAL - 3.13/6.25 The flow of information through interfaces must be minimal NOT The flow of information through protocols must be minimal.

The transport layer provides this (these) service(s).

PARTIAL - 8.33/12.5 handles congestion detects transmission errors NOT finds paths between senders and receivers.

This question is about how the Internet Protocol (IP) handles a packet P and decides where to deliver it. Consider a device D with IP address 134.89.200.145/24. On Device D, IP is handed a packet P with a destination IP address 131.204.65.172. Provide the order in which IP on Device D will perform these actions. The earliest action must be assigned 1. Any action that is incorrect or is not performed must be assigned the number 0. send Packet P to the device with IP address 134.89.200.54 read the routing table ask ARP for a MAC address corresponding to IP Address 134.89.200.67 ask ARP for a MAC address corresponding to IP Address 131.89.200.254 check if the IP destination address of Packet P is local send Packet P to the device with IP address 134.89.200.67

PARTIAL 2.67/4 0 2 0 0 1 0

This question is about how the Internet Protocol (IP) handles a packet P and decides where to deliver it. Consider a device D with IP address 134.89.200.145/24. On Device D, IP is handed a packet P with a destination IP address 131.194.65.170. Provide the order in which IP on Device D will perform these actions. The earliest action must be assigned 1. Any action that is incorrect or is not performed must be assigned the number 0. send Packet P to the device with IP address 134.89.200.128 read the routing table ask ARP for the MAC address corresponding to IP Address 134.89.200.128 ask ARP for the MAC address corresponding to IP Address 131.89.200.54 check if the IP destination address of Packet P is local send Packet P to the device with IP address 134.89.200.54

PARTIAL 2.6l7/4 0 2 0 0 1 0 PARTIAL 6.67/20 0 2 0 3 1 4

This question is about how the Internet Protocol (IP) handles a packet P and decides where to deliver it. Consider a device D with IP address 134.89.200.145/24. On Device D, IP is handed a packet P with a destination IP address 131.204.65.171. Provide the order in which IP on Device D will perform these actions. The earliest action must be assigned 1. Any action that is incorrect or is not performed must be assigned the number 0. send Packet P to the device with IP address 134.89.200.67 read the routing table ask ARP for a MAC address corresponding to IP Address 134.89.200.54 ask ARP for a MAC address corresponding to IP Address 131.89.200.67 check if the IP destination address of Packet P is local send Packet P to the device with IP address 134.89.200.254

PARTIAL 6.67/20 0 2 3 0 1 4 PARTIAL 13.33/20 3 2 0 0 1 0

A local area network (LAN) is a network covering typically _____

PARTIAL(1.67/5): One small campus

The following frame was "sniffed" off an Ethernet network. Below, we removed the preamble and the frame header. We use only hexadecimal numbers without using "0x" or "h" symbols. Below are the IP and TCP headers. Here is the IP packet in network byte order: 46 6F 06 00 01 24 00 00 40 11 56 7A 83 CC 0E 65 83 CC 34 43 23 00 4E 21 78 1C 5E 32 12 67 89 E2 50 10 00 34 67 F1 B3 This IP packet carries _____ . The source port number is _____ . The destination port number is _____ .

PARTIAL(2/3): A TCP segment 781C 5E32 PARTIAL (1/3): a UDP datagram None of these answers 2300

Match each socket function call to the sequence it will appear on a Java UDP client. cs = s.accept() s.receive(p) s = new DatagramSocket(serverPort); s.send(p) p = new DatagramPacket(...) s.close()

PARTIAL(4.25/8.5): cs = s.accept()-77 s.receive(p)-4 s = new DatagramSocket(serverPort);-1 s.send(p)-2 p = new DatagramPacket(...)-3 s.close()-5

Fill in multiple blanks. This exercise is about framing. The following character encoding is used in a data link protocol: X: 01000111 Y: 11100111 FLAG: 01111110 ESC:11100111 Show the bit sequence transmitted (in binary) for the four-character frame X Y ESC FLAG when byte counting is used. Pay attention to the order. Fill in the following 8-bit groups. Some groups at the end may have less than 8 bits. If the group is empty, fill it with "-" (ONE minus character).

PARTIAL(5.36/12.5): 01000111 ;11100111 ;11100111 ;01111110 ;- ;- ;- (Probably 00000101; 01000111 ;11100111 ;11100111 ;01111110 ;- ;-)

The IP address of some URL at Auburn University is (in binary. Nibbles are separated just to help readability) 1000 0011 1100 1100 0110 1110 1001 1110 This IP address is the same as __________________. 131.204.108.156 in dotted decimal notation None of these answers 0x83CC6E9E 131.204.110.158 in dotted decimal notation 0x83CC6C9C

PARTIAL(5/10) 0x83CC6E9E NOT None of these answers

The data link layer offers in general these services/functions.

PARTIAL(9.38/12.5): addressing error control flow control So there is a 4th option which is NOT specialized services to users that lower layers do not offer also not congestion control

Check all applications that use TCP. POP3 DNS Trivial FTP None of these answers HTTP ssh

POP3 HTTP ssh

Check the application layer protocol(s) used for the delivery of an email from a Message Transfer Agent to a Receiver User Agent.

POP3 IMAP

Most hosts on the Internet will have these protocols active on them. DHCP server IP none of these answers UDP DNS server DNS client

Partial (2/3) IP DNS client NOT DHCP server

Check all that apply to TCP.

Partial (5/10) TCP stands for Transmission Control Protocol

Match each socket function call to the sequence it will appear on a Java TCP client....

Partial 1.21/8.5 b = s.getOutputStream(); 77 s = new ServerSocket(..); 1 a = cs.getInputStream(); 3 s.close() 99 cs = s.accept(); 2 b.write(...) 4 s = new Socket(..); 99

In the OSI Reference Model, your Bluetooth interface uses this (these) layer(s) when you are browsing the Internet.

Partial 3.13/6.25 Data Link/Link Other option is NOT Internet/Network

Match each socket function call to the sequence it will appear on a Java UDP server. s = new ServerSocket(.....) s.receive(p) s = new DatagramSocket(serverPort); s.send(p) p = new DatagramPacket(...) s.close()

Partial 7.08/8.5 77 3 1 4 2 77 Partial 7.08/8.5 77 3 1 4 2 5

This Internet pioneer was the first to invent (mention) the concept of a packet (packet switching).

Paul Baran

On an Ethernet frame, the ________ field will consist of an IP packet, an ARP request/response, or some other network protocols data units.

Payload

On an Ethernet frame, the ________ field will contain an IP packet, an ARP request/response, or other network protocols data units. Destination Source Payload Type CRC None of these answers

Payload

In order to detect and correct lost messages sent by the sender, these mechanisms may help at the sender.

Retransmission Timer

In the OSI Reference Model, a repeater uses this (these) layer(s) when carrying a conversation.

Physical

In the OSI Reference Model, a bridge uses this (these) layer(s) when carrying a conversation.

Physical Data Link / Link

In the OSI reference model, these layers are point to point layers.

Physical Data link Network

For a conversation, these layers may be active on all intermediary devices in the OSI reference model

Physical Data Link Network

This (These) layer(s) are part of the OSI Reference Model.

Physical Data Link Network

In the OSI Reference Model, an L2 switch uses this (these) layer(s) when carrying a conversation.

Physical Data Link / Link

In the OSI Reference Model, a router uses this (these) layer(s) when carrying a conversation.

Physical Data Link / Link Internet / Network

In the OSI Reference Model, your wireless router/access point uses this (these) layer(s) when it is forwarding your streaming traffic.

Physical Internet / Network Data Link / Link

In the OSI Reference Model, your laptop uses this (these) layer(s) when you are browsing the Internet (using an application like Firefox, Chrome, or Internet Explorer).

Physical Application Internet / Network Transport Presentation Data Link / Link Session

For a conversation, these layers (OSI reference model) will be active on all endpoints

Physical Transport Data Link Application Network

In the OSI Reference Model, the youtube server uses this (these) layer(s) when streaming to you videos.

Physical Transport Internet / Network Application Data Link / Link Session Presentation

Check all elements somewhat related to DNS. "Related" means that they interact with, use, are used by, or identify DNS. TCP UDP Port 53 Port 35 IP

Port 53 IP UDP

In the TCP/IP reference model, transport layers use ___________ for addressing.

Port numbers

In the OSI reference model, this layer deals with how different machines map data in memory.

Presentation

In the OSI reference model, this layer is an intruder (i.e., it does not belong within this list of options).

Presentation ------------------------------------------ None of the above Network Data Link Presentation Physical

Match each protocol with its original RFC. HTTP 1.1 TCP UDP DNS IP SMTP

RFC 2068 RFC 793 RFC 768 RFC 1034 RFC 791 RFC 821 (May not have all choices)

The original RFC specifying UDP was _________.

RFC 768

The original RFC specifying IP was

RFC 791

The original RFC specifying TCP was _________.

RFC 793

In this (these) distributed routing protocol(s), each node communicates ONLY with its immediate neighbors to "learn" about the other nodes on the network.

RIP BGP

__________________ is an interior gateway protocol using ____________ routing. OSPF:Path Vector RIP: Distance Vector None BGP: Path Vector IGP:Distance Vector

RIP: Distance Vector

Transmission lines on WANs are in general made of _______.

Radio links optical fiber copper wire

These Internet pioneers made the Internet stable (free from congestion collapse).

Raj Jain Van Jacobson

Check components that are part of the email architecture presented in class.

Receiver User Agent Sender User Agent

For DNS, the top-level domains are run by __________________ appointed by ICANN.

Registrars

In order to correct corrupted messages sent by the sender, these mechanisms may help at the sender.

Retransmission

During the opening of a TCP connection, ___________________

Server and client "agree" on the maximum segment size The client initiates the TCP connection Server and client exchange/acknowledge their initial sequence numbers

Any TCP server socket program in Java must use this function call to establish a socket.

ServerSocket

In the OSI reference model, the [name1] layer provides service directly to the presentation layer.

Session

In the OSI reference model, the [name1] layer receives service directly from the transport layer.

Session

In the OSI reference model, the transport layer provides service directly to the _______ layer.

Session

In the OSI reference model, this layer is an intruder (i.e., it does not belong within this list of options).

Session ------------------------------------------ Network Session None of the above Physical Data Link

These OSI reference model layers do not appear explicitly in the TCP/IP model.

Session Presentation Physical

Check all true statements. TCP identifies upper processes (applications) using the port number UDP identifies upper processes (applications) using the port number TCP identifies upper processes (applications) using the IP address UDP identifies upper processes (applications) using the IP address Only one port on a host can be active at a time.

TCP identifies upper processes (applications) using the port number UDP identifies upper processes (applications) using the port number

Check all that apply to TCP

TCP stands for Transmission Control Protocol Is a peer-to-peer communication protocol provides a reliable in-order byte-stream delivery stream Adapts to a slow receiver's speed Adapts to network congestion Adapts to the slowest intermediary node speed (May not have all choices listed)

This course will focus on two reference models.

TCP/IP Reference Model OSI Reference Model

______________ provides service directly to ______________

The medium access control sublayer; logical link sublayer

Check which action(s)/effect(s), if removed, would eliminate distorsion. Check the smallest number of actions/effects to remove in order to eliminate distorsion.

The medium is unfair to signals with different frequencies

Check all true statements about the physical layer in the context of the OSI reference model.

The physical layer offers service directly to the data link layer The physical layer will carry all the messages exchanged peer to peer by all the layers.

A 1250-byte frame is sent at a bitrate of 10 Mbps over a copper cable 1000 kms long. Recall that a copper cable has a propagation speed about 2/3 the speed of light. Check all right statements

The propagation time is 5 ms The total point-to-point (one way) delay is 0.006 s The transmission time is 1,000 microseconds The transmission time is 1 ms (There are 2 different questions with 2 different choices. Also there is another version of this question that randomly doesn't have these as the correct answers. I don't know man)

The key objectives/benefits of a layered design are:

The serviced layer does have to worry about the details belonging to the serving layer (service provider) Simplify a complex function/service by partitioning it into smaller functions

During its "lifetime", a TCP connection will go through these phases

Three way hand-shake Full duplex data exchange Closing

The following frame was "sniffed" off an Ethernet network. Below, we removed the preamble and the frame header. We use only hexadecimal numbers without using "0x" or "h" symbols. Below are the IP and TCP headers. Here is the IP packet in network byte order: 45 6F 06 00 01 24 00 00 40 06 56 7A 83 CC 0E 65 83 CC 34 43 4E 4E 21 23 00 78 1C 5E 32 12 67 89 E2 50 10 00 34 F1 B3 This IP packet carries _____ . The source port number is _____ . The destination port number is _____ .

a TCP segment None of these answers None of these answers

The following frame was "sniffed" off an Ethernet network. Below, we removed the preamble and the frame header. We use only hexadecimal numbers without using "0x" or "h" symbols. Below are the IP and TCP headers. Here is the IP packet in network byte order: 45 6F 06 00 01 24 00 00 40 06 56 7A 83 CC 0E 65 83 CC 34 43 4E 21 23 00 78 1C 5E 32 12 67 89 E2 50 10 00 34 67 F1 B3 This IP packet carries _____ . The source port number is _____ . The destination port number is _____ .

a TCP segment 4E21 2300

The following frame was "sniffed" off an Ethernet network. Below, we removed the preamble and the frame header. We use only hexadecimal numbers without using "0x" or "h" symbols. Below are the IP and TCP headers. Here is the IP packet in network byte order: 45 6F 06 00 01 24 00 00 40 11 56 7A 83 CC 0E 65 83 CC 34 43 4E 21 23 00 78 1C 5E 32 12 67 89 E2 50 10 00 34 67 F1 B3 This IP packet carries . The source port number is . The destination port number is .

a UDP datagram 4E21 2300

Bluetooth is a technology that could work well to connect ______

a central unit (computer) with the standard inputs/outputs Wireless speakers to an entertainment center Audio system to your cellphone in a car

An IP address identifies ___________.

a network interface

The purpose of each layer is to offer services to the layer just ________ it.

above

In the context of computer networks, ARP stands for _________________.

address resolution protocol

_________ is the design issue that consists of identifying the senders and receivers.

addressing

Check the functions/services offered by the data link layer.

addressing medium access control error control framing flow control

The network layer offers these services/functions.

addressing/naming routing congestion control

An interface defines the primitive operations and services between _________ layers.

adjacent

The presentation layer provides this (these) service(s).

allows machines with different data representations to communicate.

These protocols are multiple access protocols/schemes.

aloha slotted aloha CSMA

ARP takes as input ___________________.

an IP address

Match each socket function call to the sequence it will appear on a Java TCP client....

b = s.getInputStream(); - 77 s = new ServerSocket(..); - 1 a = cs.getInputStream(); - 3 s.close() - 99 cs = s.accept(); - 2 a.read(...) - 4

Matching. Match each socket function call to the sequence it will appear on a Java TCP server. The first/earliest call is assigned the number 1. The earlier is a function call, the smaller is its assigned number. The statements must be compatible (i.e., use appropriate variables from earlier valid statements). - If a call is NOT absolutely necessary, assign it the number 99. - If a call is NOT applicable to a TCP server socket, assign it the number 77. - If two calls can be interchanged, assign them the same number. b = s.getInputStream(); s = new ServerSocket(..); a = cs.getInputStream(); s.close() cs = s.accept(); a.read(...)

b = s.getInputStream(); - 77 s = new ServerSocket(..); - 1 a = cs.getInputStream(); - 3 s.close() - 99 cs = s.accept(); - 2 a.read(...) - 4

Check all statements/method calls that TCP server or client must absolutely include to send data using I/O streams a and b. The TCP server or client uses the socket variable sock.

b.write(...) OutputStream b = sock.getOutputStream();

Each layer requests service(s) from the layer just ________ it.

below

Consider this variable: byte flags; The expression ((flags & 4) == 4) is of type ____________.

boolean

On a ______________ medium, frames (packets) sent by any machine on that medium are received (heard) by all other machines on the medium.

broadcast

Wireless local area networks (LANs) often use ___________________ channel(s).

broadcast

Fill multiple blanks. These techniques are used for framing: _____, flag _____ with byte stuffing, flag bits with _____ stuffing, and _____ code violations.

byte count bytes bit physical layer

The type of the parameter a is _____________ assuming that d is a port number.

byte[ ]

Consider the method DatagramPacket(a, b, c, d). The type of the parameter a is _____________ assuming that d is a port number.

byte[]

Consider this code snapshot: int a, e; short b, f; byte g; DataOutputStream c; DataInputStream d; ByteArrayOutStream x = new ByteArrayOutputStream(); c = new DataOutputStream(x); If I write a statement c.write(y,0,8), y is most likely of type __________.

byte[]

Consider this code snapshot: int a, e; short b, f; byte g; DataOutputStream c; DataInputStream d; ByteArrayOutStream x = new ByteArrayOutputStream(); c = new DataOutputStream(x); Select the most likely valid statement to encode data to be sent out using TCP or UDP sockets.

c.writeByte(g);

Consider this code snapshot: int a, e; short b, f; byte g; DataOutputStream c; DataInputStream d; ByteArrayOutStream x = new ByteArrayOutputStream(); c = new DataOutputStream(x); Select the most likely valid statement to encode data to be sent out using TCP or UDP sockets.

c.writeInt(a);

Consider this code snapshot: int a, e; short b, f; byte g; DataOutputStream c; DataInputStream d; ByteArrayOutStream x = new ByteArrayOutputStream(); c = new DataOutputStream(x); Select the most likely valid statement to encode data to be sent out using TCP or UDP sockets.

c.writeShort(b);

Select one. Collision-free (i.e., with dedicated channels) multiple access protocols ____________. are not used on wireless networks have a better average delivery time than contention based MA protocols. work well for wide-area networks (>2,000 km) None of these answers guarantee upper bounds on delivery time

guarantee upper bounds on delivery time

A routing table is similar to a(n) _______________ for a road trip.

guiding (directions) sign at an intersection

Consider this incomplete code snapshot: int a, e; long h; short b, f; byte g; DataOutputStream c; DatagramSocket d; InputStream m; ByteArrayOutStream x = new ByteArrayOutputStream(); c = new DataOutputStream(x); DataInputStream v = new DataInputStream(m); Select any valid statement.

h = v.readLong();

Check all that apply to IEEE 802.3 (Ethernet)

has a contention-based MA protocol has in general a lower average time delivery than Token-ring

On networks, the machines that run users programs (applications) are most likely called ________.

hosts

This question is related to error detection. Increasing the number of check bits to the payload ('message' to send) will ______________.

increase the overhead decrease the probability to misdiagnose a corrupted.

This question is related to error detection. Decreasing the number of check bits to the payload ('message' to send) will ______________.

increase the probability to misdiagnose a corrupted. decrease the overhead

A network is a set of ___________ devices which can communicate.

independent

Consider the method DatagramPacket(a, b, c, d). The type of the parameter c is _____________ assuming that d is a port number.

inetAddress

Consider the method DatagramPacket(a, b, c, d). The type of the parameter b is _____________ assuming that d is a port number.

int

Consider the method DatagramPacket(a, b, c, d). The type of the parameter d is _____________ assuming that d is a port number.

int

The type of the parameter d is _____________ assuming that d is a port number.

int

A(n) __________ is a set of rules defining communications between adjacent layers.

interface

Check all that apply. During the lecture, we encoded the three boolean members single, rich, and female using one byte b using the following rules as illustrated by this figure: bit 7 bit 6 bit 5 bit 4 bit 3 bit 2 bit 1 bit 0 0 0 0 0 0 female rich single - bit 0 is the least significant bit. bit 0 is set to 1 if the friend is single. - bit 1 is set to 1 if the friend is rich. - bit 2 is set to 1 if the friend is female. Suppose that after encoding the three boolean members single, rich, and female of a friend f into a byte b, we get b = 0x7. Check all that apply about the friend f.

rich single female

On WANs, switches are called ___________.

routers

In the IPv4 header, the TtL (Time To Live) is related to the maximum number of _________________.

routers the packet can traverse

These functions services are offered by the network layer.

routing addressing

Designs that continue to perform well when the network gets large are said to be ___________.

scalable

Congestion Control insures that a [Select] does not overwhelms the [Select]

sender, intermediary nodes and receiver

In the OSI reference model, an instance in the presentation layer wants to send a data unit m. The first header added to m will be a header belonging to the ________ layer.

session

The number of layers in the OSI Reference model is ____________ .

seven

During the lecture, we encoded the three boolean members single, rich, and female using one byte b using the following rules as illustrated by this figure: bit 7 bit 6 bit 5 bit 4 bit 3 bit 2 bit 1 bit 0 0 0 0 0 0 female rich single - bit 0 is the least significant bit. bit 0 is set to 1 if the friend is single. - bit 1 is set to 1 if the friend is rich. - bit 2 is set to 1 if the friend is female. Suppose that after encoding the three boolean members single, rich, and female of a friend f into a byte b, we get b = 0x3. Check all that apply about the friend f.

single rich

The application layer offers in general these services/functions.

specialized services to users that lower layers do not offers addressing/naming

Consider a system with 4 stations X,Y, Z, and W that use CDMA. These four stations use the chip sequences x, y, z and w that are all mutually orthogonal. Stations X, Y, Z, and W send 0, 0, 1, and 0, respectively. If S is the resulting signal S then z.S = ________.

||z||^2


Ensembles d'études connexes

El terrible... There are five of us: somos 5 Aunque suene algo raro, una frase como "somos cinco" se traduce literalmente del inglés como "hay cinco de nosotros". Si dices "we are five", ten en cuenta que estás diciendo "tenemos cinco años

View Set

Aircraft Landing Gear Systems Terms

View Set

Chapter 6: Domain Controller & Active Directory Management quiz

View Set

Guide to the LEED Green Associate Exam

View Set

CELL 210 (Stark) Final Content Exam

View Set