M5 SSQs

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

The following frame was "sniffed" off an Ethernet network. Below, we removed the preamble. We use only hexadecimal numbers without using "0x" or "h" symbols. Here is what was collected in network byte order: 08 06 80 35 08 06 76 3E 56 E2 08 00 08 06 32 7F 4C 2D 5C 4B EE DD .... This frame certainly carries as payload _______________. - An IPv4 packet - An ARP packet - a TCP segment - a UDP datagram - IPv6 packet - None of these answers

- An ARP packet

The following frame was "sniffed" off an Ethernet network. Below, we removed the preamble. We use only hexadecimal numbers without using "0x" or "h" symbols. Here is what was collected in network byte order: 08 06 80 35 08 06 76 3E 56 E2 08 00 08 00 32 7F 4C 2D 5C 4B EE DD .... This frame certainly carries as payload _______________. - An ARP packet - An IPv4 packet - a TCP segment - None of these answers - a UDP datagram - A RARP packet - IPv6 packet

- An IPv4 packet

The following frame was "sniffed" off an Ethernet network. Below, we removed the preamble. We use only hexadecimal numbers without using "0x" or "h" symbols. Here is what was collected in network byte order: 08 06 80 35 08 06 76 3E 56 E2 08 00 08 00 32 7F 4C 2D 5C 4B EE DD .... This frame certainly carries as payload _______________. - a TCP segment - IPv6 packet - An ARP packet - a UDP datagram - An IPv4 packet - None of these answers

- An IPv4 packet

With two or more users emitting/transmitting/talking, the MAC is needed for the following topologies. - Broadcast - One Way channel - None of these answers - Half-duplex - Full Duplex

- Broadcast - Half-duplex

These MAC protocols/schemes use Carrier Sense Multiple Access - Pure Aloha - Collision-Free - CSMA - Slotted Aloha - CSMA/CD

- CSMA - CSMA/CD

These multiple access protocols/schemes must sense the medium before transmitting. - CSMA - Pure Aloha - Slotted Aloha - None of these answers - CSMA/CD

- CSMA - CSMA/CD

These multiple access protocols/schemes must sense the medium before transmitting. - Pure Aloha - Slotted Aloha - None of these answers - CSMA - CSMA/CD

- CSMA - CSMA/CD

These multiple access protocols/schemes must listen to the medium while transmitting. - CSMA/CD - CSMA - None of these answers - Pure Aloha

- CSMA/CD

Check all that apply to contention-based multiple access protocols - Are not used on wireless networks - Guarantee upper bounds on delivery time - Do not offer an upperbound on the delivery time. - Work well for wide-area networks (>2,000 km) - Have a good average delivery time - None of these answers

- Do not offer an upperbound on the delivery time. - Have a good average delivery time

Check all that apply to contention-based multiple access protocols - Are not used on wireless networks - Guarantee upper bounds on delivery time - Work well for wide-area networks (>2,000 km) - Do not offer an upperbound on the delivery time. - None of these answers - Have a good average delivery time

- Do not offer an upperbound on the delivery time. - Have a good average delivery time

Check all that apply to IEEE 802.5 (Token-Ring) - Has an excellent channel efficiency - Guarantees upper bound on delivery time - Has a better average delivery time than Ethernet (IEEE 802.3) - Is a kind of time division multiplexing MA - Is a kind of frequency division multiplexing MA

- Has an excellent channel efficiency - Guarantees upper bound on delivery time - Is a kind of time division multiplexing MA

These (this) protocol(s) are contention based protocols. - IEEE 802.5 - IEEE 802.3 - IEEE 802.4 - IEEE 802.2 - IEEE 802.11

- IEEE 802.3 - IEEE 802.11

These (this) IEEE 802.x protocol(s) are fully collision free. - IEEE 802.3 - IEEE 802.4 - IEEE 802.11 - IEEE 802.5 - None of these answers

- IEEE 802.4 - IEEE 802.5

These protocols are multiple access protocols/schemes. - Slotted Aloha - Carrier Sense Multiple Access (CSMA) - Pure Aloha - Binary access - Adaptive binary protocol

- Slotted Aloha - Carrier Sense Multiple Access (CSMA) - Pure Aloha

Check all that apply to IEEE 802.3 (Ethernet) - is a kind of time division MA - has a contention-based MA protocol - is a kind of frequency division MA - guarantees upper bound on delivery time - has in general a lower average time delivery than Token-ring

- has a contention-based MA protocol - has in general a lower average time delivery than Token-ring

Check all that apply to IEEE 802.3 (Ethernet) - has in general a lower average time delivery than Token-ring - guarantees upper bound on delivery time - has a contention-based MA protocol - is a kind of time division MA - is a kind of frequency division MA

- has in general a lower average time delivery than Token-ring - has a contention-based MA protocol

Based on the textbook, broadcast channels are sometimes referred as ______________ channels - full duplex - multiaccess - random access - None of these answers - half-duplex

- multiaccess - random access

Based on the textbook, broadcast channels are sometimes referred as ______________ channels - random access - multiaccess - full duplex - None of these answers - half-duplex

- random access - multiaccess

Match the TYPE values with the kind of payload. (Some values were not covered in class. Search for them) 0x0800 0x0806 0x8035 0x8137 0x86DD

0x0800 IPv4 (Internet Protocol) 0x0806 ARP (Address Resolution Protocol) 0x8035 RARP (Reverse ARP) 0x8137 IPX (Novell) 0x86DD IPv6

The following frame was "sniffed" off an Ethernet network. Below, we removed the preamble. We use only hexadecimal numbers without using "0x" or "h" symbols. Here is what was collected in network byte order: 08 06 80 35 08 06 76 3E 56 E2 08 00 08 00 32 7F 4C 2D 5C 4B EE DD .... The source MAC address is ___________________. A. 76 3E 56 E2 08 00 B. 08 06 80 35 08 06 C. 76 3E 56 E2 D. None of these answers E. 08 00 08 06

A. 76 3E 56 E2 08 00

On an Ethernet frame, the ________ field will contain an IP packet, an ARP request/response, or other network protocols data units. A. Payload B. Destination C. Type D. CRC E. Source F. None of these answers

A. Payload

On an Ethernet frame, the ________ field indicates whether the frame carries an IP, an ARP, or a RARP packet/ A. Type B. Source C. Destination D. CRC E. None of these answers F. Payload

A. Type

Medium Access Control is important and used mainly for ___________. A. WANs (Wide Area Networks) B. LANs (Local Area Networks) C. full duplex point to point channels D. networks made of full duplex point to point channels E. None of these answers

B. LANs (Local Area Networks)

This question is about CSMA schemes. When a collision between two or more frames occurs, each station will _____________. A. will remove the damaged part only from frames destined to it. B. drop all damaged frames even if only one bit is damaged in each. C. will remove the damaged part and store all truncated frames to use them later to restore them, if necessary. D. will collect the damaged frames and hand them to the logical link layer to repair them. E. None of these answers

B. drop all damaged frames even if only one bit is damaged in each.

Collision-free (i.e., with dedicated channels) multiple access protocols ____________. A. None of these answers B. guarantee upper bounds on delivery time C. are not used on wireless networks D. work well for wide-area networks (>2,000 km) E. have a better average delivery time than contention based MA protocols.

B. guarantee upper bounds on delivery time

Wireless local area networks (LANs) often use ___________________ channel(s). A. point-to-point B. half-duplex C. broadcast D. full duplex E. None of these answers

C. broadcast

This question is about CSMA schemes. When a collision between two or more frames occurs, each station will _____________. A. None of these answers B. will collect the damaged frames and hand them to the logical link layer to repair them. C. drop all damaged frames even if only one bit is damaged in each. D. will remove the damaged part and store all truncated frames to use them later to restore them, if necessary. E. will remove the damaged part only from frames destined to it.

C. drop all damaged frames even if only one bit is damaged in each.

The following frame was "sniffed" off an Ethernet network. Below, we removed the preamble. We use only hexadecimal numbers without using "0x" or "h" symbols. Here is what was collected in network byte order: 08 06 80 35 08 06 76 3E 56 E2 08 00 08 00 32 7F 4C 2D 5C 4B EE DD .... The source MAC address is ___________________. A. 08 00 08 06 B. 76 3E 56 E2 C. 08 06 80 35 08 06 D. 76 3E 56 E2 08 00 E. None of these answers

D. 76 3E 56 E2 08 00

Medium Access Control is important and used mainly for ___________. A. None of these answers B. WANs (Wide Area Networks) C. full duplex point to point channels D. LANs (Local Area Networks) E. networks made of full duplex point to point channels

D. LANs (Local Area Networks)

Collision-free (i.e., with dedicated channels) multiple access protocols ____________. A. have a better average delivery time than contention based MA protocols. B. work well for wide-area networks (>2,000 km) C. None of these answers D. guarantee upper bounds on delivery time E. are not used on wireless networks

D. guarantee upper bounds on delivery time

The following frame was "sniffed" off an Ethernet network. Below, we removed the preamble. We use only hexadecimal numbers without using "0x" or "h" symbols. Here is what was collected in network byte order: 76 3E 56 E2 08 00 08 06 80 35 08 06 08 00 32 7F 4C 2D 5C 4B EE DD .... The source MAC address is ___________________. A. 76 3E 56 E2 B. 76 3E 56 E2 08 00 C. 08 00 08 06 D. None of these answers E. 08 06 80 35 08 06

E. 08 06 80 35 08 06

Wireless local area networks (LANs) often use ___________________ channel(s). A. full duplex B. half-duplex C. point-to-point D. None of these answers E. broadcast

E. broadcast

On an Ethernet frame, the ________ field indicates whether the frame is corrupted. A. Destination B. Type C. Source D. Payload E. None of these answers F. CRC

F. CRC

On an Ethernet frame, the ________ field will contain an IP packet, an ARP request/response, or other network protocols data units. A. Type B. CRC C. None of these answers D. Destination E. Source F. Payload

F. Payload

True or False: Using Pure Aloha, a station must sense the medium before transmitting.

False

True or False: Using Slotted Aloha, a station can transmit any time a frame is ready.

False

In the context of OSI Reference Model (Data Link Layer), the MAC stands for ________________________________.

Medium Access Control

__________________________________ provides service directly to __________________________.

The medium access control sublayer; the logical link sublayer

In the CSMA/CD acronym, CD stands for ________________.

collision detection


संबंधित स्टडी सेट्स

RHCH 43 ,44 Liver, Pancreas, portal HTN, peritonitis

View Set

MN/WK2&3/PEDS SUCCESS CH4 ANTEPARTUM/EX1

View Set

Government Health Insurance Programs

View Set

Unit 5: Into the Cell(s) (BIOL101)

View Set

BUS 101: Chapter 6 Practice Quiz

View Set

Chapter 41: Management of Patients With Intestinal and Rectal Disorders

View Set