CNT 4104

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

IPv4 includes 32 bits source address field but IPv6 includes

128

The header format for TCP is a minimum of ___ octets

20

The SMTP sender takes messages from the outgoing mail queue and transmits them to the proper destination host via SMTP transactions over one or more TCP connections to port ____ on the target hosts.

25

Assume, in a single real-time communication session, the minimum end-to-end delay seen by any packet is 0.4 ms and the maximum is 8 ms. Then, the delay jitter should be ____ ms

7.6

In data communication, an octet contains ___ bits of data

8

The Internet evolved from the ____ which was developed in 1969 by the Advanced Research Projects Agency of the U.S Department of Defense

ARPANET

Which is not true?

An autonomous systems (AS) is a set of networks not including routers

Which shortest path algorithm requires a node to acquire knowledge of the link cost to all neighboring nodes only

Bellman-Ford

To begin a connection establishment a TS user is in a ________ state.

CLOSED

The place where telephone companies terminate customer lines and locate switching equipment to interconnect those lines with other networks is the ___

CO / central office

The _______ is a directory lookup service that provides a mapping between the name of a host on the Internet and its numerical address.

DNS

What shortest path algorithm requires each node to have complete topological information about the network

Dijkstra

The ________ is the foundation protocol of the World Wide Web and can be used in any client/server application involving hypertext

HTTP

Each IP packet includes an unique numeric address of the destination host. This address is referred to as an ________

IP address

Once the Passive Open command is issued, the transport entity creates a connection object of some sort that is in the ________ state

LISTEN

The _________ is responsible for transferring the message from the MHS to the MS.

MDA

________ supplements SMTP and allows the encapsulation of multimedia (nontext) messages inside of a standard SMTP message.

MIME

The ________ relays mail for one application-level hop.

MTA

A _____ is a physical facility that provides the infrastructure to move data between connected networks

NAP / network access provider

_______ are server programs that hold information about a portion of the domain name tree structure and the associated RRs.

Name servers

Individual hosts and LANs are connected to an Internet Service Provider through a ___

POP / point of presence

________ is an Internet standard defined in RFC 1939 that supports the basic functions of download and delete for e-mail retrieval.

POP3

Today's networks can offer differing levels of ______, which include specifications for maximum delay and minimum throughput

QoS / quality of service

The __________ data transfer protocol is used only for the transmission of user data, typically in multicast fashion among all participants in a session

RTP

________ are programs that extract information from name servers in response to client requests.

Resolvers

The protocol that is used for transfer of mail from a user agent to a MTA and from one MTA to another is the _________ .

SMTP

_______ provides a basic electronic mail transport facility

SMTP

The term softphone refers to software operating on a PC that implements _______.

VoIP

The original ARPANET routing algorithm, designed in 1969, is

a distributed adaptive routing algorithm

HTTP is ___________ .

a transaction-oriented client/server protocol, a stateless protocol, and flexible in the formats it can handle

All of the following are ways of the receiving transport entity to cope with the flow control requirement EXCEPT:

accept further segments from the network service

The server side of a connection must use ___________ socket core function to remove one client request from its queue.

accept()

Using fixed length packets and sometimes referred to as cell relay, _______ is a culmination of developments in circuit switching and packet switching. It is so efficient that it can offer a constant data rate channel even though it is using a packet switching technique

asynchronous transfer mode

The _______ domain is dedicated exclusively for private businesses.

biz

________ is when the sending TCP includes a code that is a function of the contents of the remainder of the segment. The receiving TCP performs the same calculation and compares the result with the incoming code. A discrepancy results if there has been some error in transmission.

checksum

In a _____ network, a dedicated communications path is established between two stations through the nodes of the network. The telephone network is the most common example

circuit switching

Whereas traditional telephone networks allocate dedicated circuits for voice communications using _____ switching, VoIP uses _____ switching, allowing the sharing of transmission capacity

circuit/packet

A ___ socket is one computer uses an address to call a _____ socket on another computer

client/server

A dominant architecture in the business environment and the more recent Web-focused intranet trend is _________ computing

client/server

__________ is the process of squeezing the data down so that a lower capacity, cheaper transmission facility can be used to meet a given demand

compression

A ________ service provides for the establishment, maintenance, and termination of a logical connection between TS users. To date this is the most common type of protocol service available and has a wide variety of applications.

connection oriented

The first step in using Sockets

create a new socket

TCP uses a ________ flow control technique.

credit-based

When a data segment arrives that is in sequence, the receiving TCP entity has two options concerning the timing of acknowledgment: Immediate and ________.

cumulative

In socket programming, ____ sockets make use of UDP protocol

datagram

Delay jitter is the maximum variation in __________ experienced by packets in a single real-time communication session.

delay

In the core socket functions of language C, the socket() command includes three parameters. AF_UNIX, AF_INET, and AF_INET6 are possible values of the ____________ parameter.

domain

In order for data processing devices to communicate certain conventions must be decided on. These requirements can collectively be termed _____

exchange management

An _____ extends a company's intranet out onto the Internet to allow selected customers, suppliers, and mobile workers to access the company's private data and applications

extranet

A VoIP system is usually more expensive to operate than an equivalent telephone system with a PBX and conventional telephone network service.

false

A variety of routing algorithms have been developed for packet-switching, frame relay and ATM networks.

false

ARP (Address Resolution) is a protocol defined in the application layer

false

Because VPN (Virtual Private Network) involves the use of public Internet technology, it generally requires higher cost and more complex maintenance than implementing and operating a full private network.

false

Compression refers to the ability of a number of devices to share a transmission facility

false

Developing switching systems with the capacity and rapid response to support the demand requirements with the increased use of fiber optic transmission is no longer a challenge

false

Domains of URL are organized in a network rather than hierarchical structure.

false

Every RTP header always contains a fixed number of fields, which is 96 bits long.

false

Every computer, PC or server, is allowed to have one and only one IP address

false

In a real-time audio communication connection, if the delay jitter of a buffer is already set to 6 ms, then any incoming packets that has experienced a relative of less than this setting would have to be discarded so as not to be played back out of order.

false

It is not necessary for each host on a subnetwork to have an unique global internet (i.e., IP) address.

false

Once an IP address is assigned to a device, the IP address never changes when the device is placed in different location

false

POP3 is more complex than IMAP

false

Sockets programming is a new technology developed for mobile communications applications

false

The software used at the network access layer is not dependent on the type of network used because circuit switching, packet switching and local area networks all have the same standards.

false

UDP is more reliable than TCP protocol

false

DNS allows essentially unlimited levels and uses the comma as the level delimiter in printed names.

false. DNS allows essentially unlimited levels and uses the period as level delimiter in printed names

HTTP is an internet later protocol

false. HTTP is in the application layer

Every IP address is 32-bit long because it is a standard.

false. IPv4 is 32 bits but IPv6 is 128 bits

If an application-level firewall prevents the forwarding of RTP packets, mixer relays should be used to solve the problem.

false. If an application level firewall prevents the forwarding of RTP packets, translator relays should be used to solve this problem.

An internetwork using IP is an example of a reliable network service.

false. Internetworking using IP is an example of unreliable network service

SIP can support only single media in teleconferencing. Multimedia is currently not supported.

false. Multimedia is supported

The values in the RTCP Sender Report enable only the receivers and network managers to monitor the condition on the network as they relate to a particular session.

false. Not only the receivers and network managers, but also the senders

If a network is using fixed routing strategy, then the routes are fixed even when there is a change in the topology of the network.

false. Only change when there is a change in the topology of the network

Frame relay networks are commonly used for terminal-to-computer and computer-to-computer communications

false. Packet-switching networks are commonly used

RTCP receivers can only provide reception quality feedback by using a Receiver Report. Sender Reports are not allowed for this purpose.

false. RTCP receivers provide reception quality feedback using a Sender Report or a Receiver Report.

FTP provides a basic electronic mail transport facility.

false. Simple Mail Transfer Protocol provides a basic electronic mail transport facility

TCP is an internet layer protocol

false. TCP is in the transport layer

The RTP Timestamp is the absolute wall clock time when this RTP header was sent.

false. The NTP Timestamp is the absolute wall clock time when the report was sent

The Payload Type field of a RTP header is 1 bit long

false. The Payload Type field of RTP header is 7 bits

The author MUA processes receive mail for storage and/or display to the recipient user.

false. The recipient MUA processes receive mail for storage and/or display to the recipient users

There is no need for connection establishment and termination procedures to support connection-oriented service with a reliable network service.

false. There is a need because connection oriented allows each end to assure that the other exists, allows exchange or negotiation of optional parameters, triggers allocation of transport entity resources

In a protocol architecture, the transport protocol sits above application and other upper-layer protocols, and just below the network or internetwork layer.

false. Transport protocol sits above network layer and just below application and other upper=layer protocols

A transport protocol can be either connection oriented, such as UDP, or connectionless, such as TCP.

false. UDP is connectionless and TCP is connection oriented

A user agent server (UAS) issues SIP requests.

false. User agent client (UAC) issues SIP request

Wi-Fi is an application layer protocol.

false. Wifi is in the Network access/Data link layer

Because UDP is not a reliable protocol, its header contains no source and destination port numbers

false. both TCP and UDP must contain source and destination port numbers of their host

Computers with server sockets normally keep their TCP or UDP port closed until incoming calls are detected.

false. computers with server sockets keep a TCP or UDP port open. ready for incoming calls.

Two networks with the same subnet mask means they have the same network ID or number.

false. every network must have a unique ID or number

The packet loss values in a RTCP Sender Report give an indication of transient congestion.

false. pack loss values are an indication of persistent congestion

Random routing requires the use of network information.

false. random routing requires the use of no network information

A retransmission timer is the only timer needed for proper functioning of a transport protocol.

false. retransmission timer is only one of the few timers needed.

Typically, for fast transmission, single queries to find IP address of a domain name are carried over TCP and queries for a group of names are carried over UDP.

false. single queries are carried over UDP and queries for a grup pf names are carried over TCP

Because ICMP is a kind of or a part of IP protocol in TCP/IP, every ICMP message contains the source host IP address and destination host IP address.

false. some ICMP messages dont need an IP addresses

Flooding strategy means all nodes that are directly connected to the source node are visited. Those only indirectly connected to the source node will not visited.

false.Directly or indirectly connected to the source will ALL visited

Which routing strategy may cause duplicated packets arrive at a network node?

flooding

______ is required to assure that the source does not overwhelm the destination by sending data faster than they can be processed and absorbed.

flow control

A ________ is a server that appears to the client as if it were an origin server.

gateway

In ________ real-time applications, a deterministic upper bound on jitter and high reliability takes precedence over network utilization considerations.

hard

_____ real-time applications have zero loss tolerate of the communicated data.

hard

In the case of a single network, ________ refers to an attached network device.

host

Providing procedures to allow data to traverse multiple interconnected networks is the function of the _____ layer in TCP/IP protocol architecture

internet

Communicating across arbitrary, multiple, packet-switched networks is _____

internetworking

An _____ uses Internet and Web technology in an isolated facility internal to an enterprise

intranet

Enterprises have formed ____ to reach customers, suppliers, and partners while isolating their proprietary information from unwanted access

intranets and extranets

"Abort connection when no segments are received" is the ________ Transport Protocol Timer.

keepalive

During the neighbor acquisition of BGP, a router must return a ___________ message to accept routing information exchange request indicated by an Open message

keepalive

The four Border Gateway Protocol messages include ___________, Notification, Update, and Open

keepalive

OSPF protocol is an example of a routing protocol that uses

link-state routing

The routing algorithm used in the 2nd generation of ARPANET is called

link-state routing

Which routing approach will advertise the link costs of its network interfaces to all other routers in the internet topology, not just neighboring routers?

link-state routing

Multiple users employing the same transport protocol and distinguished by port numbers or service access points is ________.

multiplexing

When two routers are in different autonomous systems but wish to exchange routing information, they must first to perform a procedure called ________________ via a TCP connection.

neighbor acquisition

Based on our textbook, Ethernet is a commonly used protocol at ________ (or data link) layer of the TCP/IP protocol suite.

network access

The ________ layer is concerned with the exchange of data between an end system and the network to which it is attached.

network access

Transport layer PDU is called segment while network access layer PDU is called ______

packet

A network in which small chunks of data are passed through the network from node to node, and at each node the entire data chunk is received, stored briefly, and then transmitted to the next node, is a _____ network

packet switching

In the TCP/IP protocol architecture, the ________ layer is concerned with specifying the characteristics of the transmission medium, the nature of the signals and the data rate.

physical

The ________ variable represents a particular TS user at the specified host.

port

In socket programming, the concatenation of a TCP or UDP ______ value and an ______ address forms a socket, which is unqiue throughout the Internet

port/IP

In practice, when socket programming is used as an API, a socket is identified by the triple_____, local _____, local process

protocol/address

A _______ is a forwarding agent, receiving a request for a URL object

proxy

Which routing strategy assigns a probability to each outgoing link of a source node?

random routing

The performance metrics of interest of traditional Internet applications such as file transfer and electronic mail are generally throughput and delay. By contrast, ______________ applications are more concerned with timing issues

real-time

In situations in which an information exchange is interrupted due to a fault somewhere in the system, ____ techniques are needed to either resume activity at the point of interruption or to restore systems to their state prior to the beginning of the exchange

recovery

Which is not a core socket function for a stream socket?

recvfrom()

Four elements comprise the DNS: domain name space, DNS database, name servers, and

resolvers

________ (SSH) protocol provides a secure remote logon capability which enables a user at a terminal or personal computer to logon to a remote computer function as if directly connected to that computer.

secure shell

Each application on a computer has an address that is unique within that computer known as ________ Points (SAPs) or ports that allow the transport layer to support multiple applications at each computer.

service access

The ___________ Protocol (SDP) describes the content of sessions, including telephony, Internet radio, and multimedia applications.

session description

The __________, defined in RFC 3261, is an application level control protocol for setting up, modifying, and terminating real-time sessions between participants over an IP data network

session initiation protocol

SIP supports five facets of establishing and terminating multimedia communications: user capabilities, user availability, ____________, session management, and user location.

session setup

In TCP the combination of port and host is referred to as a

socket

The key elements of a simple communications model are

source, transmission, destination

If all blocks of data sent between a pair of sockets need to be guaranteed for delivery and arrive in the order that they were sent, ______ sockets must be considered

stream

DWDM enables capacities of ____ per second

terabits

Connection establishment in TCP always uses a ________.

three-way handshake

The key features of a protocol are: syntax, semantics and ________

timing

The ________ protocol provides an end-to-end transfer service that shields upper-layer protocols from the details of the intervening network or networks.

transport

The communication task can be organized into three relatively independent layers: network access layer, application layer, and _____ layer

transport

A credit scheme is a more effective scheme with an unreliable network service.

true

A modem is required to establish communication between a workstation and a server over a public telephone network

true

A problem with a two-way handshake is the potential loss of segments and the potential presence of obsolete segments.

true

ARP can translate or map an IP address to a corresponding MAC address

true

Adaptive routing algorithms typically rely on the exchange of information about traffic conditions among nodes.

true

Adaptive routing strategies use information from adjacent nodes or all nodes and such strategies can be either centralized or distributed.

true

Because IPsec is located in the IP layer, when it is implemented in a router, there is no need to change applications software on a user or server system.

true

Changes in corporate data traffic patterns are driving the creation of high-speed WANs

true

Compared to random routing strategy, adaptive routing is more complex and the processing burden on network nodes are higher.

true

Data communications deals with the transmission of signals in a reliable and efficient manner

true

Every ICMP header consists of 64 bits of data no matter what type of message it contains.

true

Every router has a MAC address and, when a router is moved from one room to the other or from one building to another building, its MAC address never changes.

true

For most applications running as part of the TCP/IP protocol architecture, the transport layer protocol is TCP

true

IMAP always keeps messages on the server and replicates copies to the clients.

true

It is possible for an application to have multiple socket addresses

true

Procedures needed to allow data to transverse multiple interconnected networks is found in the internet layer of the TCP/IP protocol architecture

true

RFC 824 is the standard protocol for transferring mail between hosts in the TCP/IP suite; it is defined in RFC 821

true

Real-time applications are more concerned with timing issues than non-real-time applications.

true

SMTP is limited to the conversation that takes place between the Message Store (MS) and Message user agent (MUA)

true

SMTP standardizes the message character set as 7-bit ASCII.

true

SSH is an application later protocol in TCP/IP architecture

true

SSH protocol enables the user and the remote authenticate each other

true

TCP header contains a sequence number of the contained segment but UDP does not.

true

TCP is a host-to-host protocol

true

TCP numbers the segments that it sends to a particular destination port sequentially.

true

The IP address 216.85.40.100 is a Class C address.

true

The LAN is owned by the same organization that owns the attached devices

true

The OSI protocol architecture consists of 5 layers: physical, network access, internet, transport, and application

true

The Payload Type field of a RTP header identifies the media type of the payload and the format of the data, including the use of compression or encryption.

true

The SYN segment functions both as a connection request and as a connection acknowledgment.

true

The basic building block of any communications facility is the transmission line

true

The credit-based flow control mechanism of TCP was designed to enable a destination to restrict the flow of segments from a source to avoid buffer overflow at the destination.

true

The development of IP (Internet Protocol) is used at the internet layer to provide the routing function across multiple networks.

true

The jitter measure may provide a warning of increasing congestion before it leads to packet loss.

true

The less the network service provides, the more the transport protocol must do.

true

The receiver needs to adopt some policy concerning the amount of data it permits the sender to transmit.

true

The selection of a route is generally based on some performance criterion and the simplest criterion is to choose the minimum-hop route through the network.

true

The sliding-window technique would work well with a reliable network service.

true

We can use and implement IPsec in a system to include authentication-only function. Encryption is not compulsory.

true

When a TCP entity detects the presence of congestion in the Internet, it reduces the flow of data onto the Internet until it detects an easing in congestion.

true

When the internal operation of the network is datagram, a routing decision is made individually for each packet.

true

network using a standard Class A network number (or ID) can host more computers than Class C.

true

Three intermediate HTTP systems include proxy, gateway, and ______.

tunnel

________ provides a means of informing the destination TCP user that significant data is in the upcoming data stream. It is up to the destination user to determine appropriate action.

urgent data signaling

The full form of UDP is ______ protocol

user datagram

The revised cost function adopted in the 3rd generation of ARPANET is keyed to

utilization rather than delay

VoIP works by encoding ________ information into a digital format, which can be carried across IP networks in discrete packets

voice

Networks that generally cover a large geographical area, require the crossing of public right-of-ways, consists of a number of interconnected switching nodes, and rely on circuits provided by a common carrier are _____

wide area networks

The TCP header ________ field contains the number of data octets, beginning with the sequence number indicated in the acknowledgment field, that the sender is willing to accept.

window

_______ networks provide advantages in the areas of mobility and ease of installation and configuration.

wireless

Each name server is configured with a subset of the domain name space, known as a ________ , which is a collection of one or more subdomains within a domain, along with the associated RRs

zone


Set pelajaran terkait

5 - TCP/IP Protocols - Self Test

View Set

BSC2011 Exam 3 learning catalytics

View Set

Hinduism and Buddhism & India's Caste System

View Set