CS 2204 Communications and Networking - Term 1, 2018-2019

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

The link-state flooding algorithm avoids the usual problems of broadcast in the presence of loops by:

discarding old or duplicate Link State Advertisements or None of the above

If the IPv4 "Don't Fragment" (DF header flag) is set to 1 by the sender, then a router must not fragment the packet and must _____ instead.

drop it

Two things are gained from station "A " doing gratuitous ARP on starting up: first, all stations that had A in their cache are now updated with A's most current LAN address, and second:

duplicate IP address may be detected

A possible Internet compatibility issue is that a packet is too large for a given network. IPv4 handles this by supporting:

fragmentation

ARP-cache entries eventually expire and the timeout interval is on the order of:

from half a minute to a few minutes

Generally speaking, IPv6 addresses consist of a 64-bit network prefix (perhaps including subnet bits) followed by a 64-bit part called:

interface identifier

The IPv6 address ::1 (i.e. 127 0-bits followed by a 1-bit) is called the:

loopback address

IPv4 class D addresses are used for:

multicast traffic

An essential feature of IPv4 (and IPv6) addresses is that they can be divided into 2 parts:

network part and host part

The use of _________ lets the base station receive CDMA messages from unsynchronized mobile phones.

pseudorandom sequences

What enables an Internet site to appear to the outside world as a single IP network, but further IP-layer routing to be supported inside the site?

subnets

CIDR has essentially eliminated the IPv4 Class A/B/C mechanism from the:

the Internet backbone

A link-state routing algorithm computes routes from the network map using:

the Shortest Path First algorithm

The checksum field in the IPv4 packet header is the "Internet checksum" applied to:

the header only

All else being equal, the data rate achievable with a radio signal is proportional to:

the width of the frequency band

The CIDR longest-match rule for choosing the routing table entry to be used means:

using the most specific matching prefix

The telephone system is tightly intertwined with (wide area) computer networks. The limiting factor for networking purposes turns out to be:

"the last mile" over which telephone customers connect

Bluetooth is a low-power network; for many applications the working range is about:

10 m

Which one of the following IPv4 addresses can be used as a valid host IP address?

10.0.0.80/24

Category 5 UTP cable is often used in which networks?

100 Mbps Ethernet

A common recommendation is to have no more than _____ hosts per LAN or VLAN

1000

What is the bandwidth delay to get 1500 bytes onto the wire for Gigabit Ethernet?

12 microseconds

In order to fix the slow-convergence problem, most flavors of the RIP protocol use a value of "infinity" set to:

16

What are the frequency bands used by Wi-Fi 802.11n?

2.4 GHz and 5 GHz

The IPv6 fixed header is twice the size of the IPv4 header, so it amounts to:

40 bytes

Fast (100 Mbps) Ethernet uses the following encoding:

4B/5B

The number of bits in the network part of IPv4 class A, B, C addresses are:

8, 16, 24 respectively

An example of distance-vector routing-update algorithms that eliminate routing loops is:

A and B Only (a. Destination-Sequenced Distance Vector, b. Enhanced Interior Gateway Routing Protocol)

Wi-Fi WPA2 uses the presumptively stronger encryption system called:

Advanced Encryption Standard (AES)

Wi-Fi designers can improve throughput through a variety of techniques, including:

All of the above [FIX_ME]

In 4B/5B encoding, some symbols are used for signaling rather than data. The following provide an example of these:

All of the above [Start, End, Reset]

Different VLANs can usually be connected together via:

An IP router

Which of the following IPv4 addresses is NOT a private address? A) 10.0.0.1 B) 24.4.202.93 C) 172.16.1.1 D) 192.168.11.12

B)

AMI (Alternate Mark Inversion) still has synchronization problems with long runs of 0-bits. The solution used on North American T1 lines (1.544 Mbps) is known as

B8ZS

The physical layer is concerned with the transmission of _______ over the physical medium.

Bits

The job of handling exterior routing (that is handling exchange of routing information between Autonomous Systems) is done by the following protocol:

Border Gateway Protocol

How is an Ethernet card (or network interface) assigned a unique MAC address?

By the Ethernet card manufacturer

In the Internet, most packet losses are due to:

Congestion

In datagram switching, packets are addressed by destination. In virtual-circuit switching, packets are "addressed" by a connection ID. So, datagram switching and virtual-circuit switching are examples of:

Connectionless, connection-oriented services respectively

The term "frames" normally refers to data packets at which layer?

Data Link (e.g. Ethernet)

Manchester encoding is principally designed to

Ensure that a transition occurs in the centre of each bit period

Which of the following is not a key element of a protocol

Entities

The terms "throughput" and "data rate" are considered to mean the same thing

FALSE

True or False: A store-and-forward switch or router begins forwarding a packet before it has fully arrived.

FALSE

True or False: ARP (Address Resolution Protocol) takes advantage of the existence of LAN-level multicast frames.

FALSE

True or False: According to Nyquist, a perfect (noiseless) channel has infinite transmission capacity.

FALSE

True or False: An IPv6 address has 2 times the number of bits compared to IPv4.

FALSE

True or False: IPv4 addresses are half the size of IPv6 addresses.

FALSE

True or False: IPv6 routers periodically send Router Advertisement (RA) packets to the IPv6 broadcast address.

FALSE

True or False: If a given IPv4 destination address matches the first k bits of one of the host's addresses (w.x.y.z/k), the destination is on the local LAN.

FALSE

True or False: Short Message Service (SMS) first became available on 3G mobile phones.

FALSE

True or False: The IEEE 802.1Q 32-bit VLAN tag is required to be added to frames with source and destination ports on the same switch.

FALSE

True or False: The IPv4 Time-to-Live (TTL) header field is incremented by 1 at each router; if it reaches 10, the packet is discarded.

FALSE

True or False: The Internet Checksum is usually better than CRC at detecting transposition errors.

FALSE

True or False: The Wi-Fi 5 GHz band (vs. 2.4 GHz) has increased ability to penetrate walls, often resulting in a higher effective range.

FALSE

True or False: The popular USB (Universal Serial Bus) standard for connecting computer peripherals uses Manchester encoding.

FALSE

True or False: The preferred Wi-Fi encryption standard is Wired-Equivalent Privacy, or WEP.

FALSE

True or False: The subnet mask for an IPv4 147.126.16.0/20 subnet would be 255.255.224.0.

FALSE

True or False: With IPv6, routers can use CIDR (Classless Internet Domain Routing) but must base forwarding decisions on prefixes longer than /64.

FALSE

True or Fasle: Routers have the option of fallback-to-flooding for unknown destinations (i.e. those which are not in their routing table).

FALSE

True or Fasle: Subnetting allows aggregation of IP address blocks in a way that is visible to the Internet backbone.

FALSE

If an Ethernet switch does not have an entry for a particular destination, it will:

Fall back to flooding

ATM packets are often called cells which are of the following size:

Fixed-size 53 bytes

In the IPv6 fixed header, the IPv4 header Time To Live (TTL) field has become the:

Hop Limit

Which of the following is not supported by IPv6?

LAN broadcast

What kind of routing-update algorithm is a preferred choice for networks such as those of ISPs?

Link State Routing

For the Internet Checksum, the value 0000 in the checksum represents:

No checksum calculated

Wi-Fi Link-Layer ACKs contain the following information:

None [FIX_ME?]

Gigabit Ethernet 1000Base-T uses the following encoding:

PAM-5

The documents that contain all the formal Internet protocol standards are referred to as:

Request For Comments (RFCs)

Ethernet switches have incorporated a switch-to-switch protocol to construct a subset of the switch-connections graph that has no loops and yet allows reachability of every host. This protocol is called:

Spanning Tree

True or False: A VLAN looks like a single LAN and all VLAN members will see broadcast packets sent by other members.

TRUE

True or False: ATM Adaptation Layer AAL 5 uses a CRC-32 checksum and is able to detect lost ATM cells.

TRUE

True or False: All Ethernet devices also agree on a broadcast address of all 1's: a packet sent to the broadcast address will be delivered to all attached hosts.

TRUE

True or False: At the LAN layer, traffic-engineering mechanisms are historically/generally limited.

TRUE

True or False: Bandwidth delay is more significant than propagation delay within a small LAN.

TRUE

True or False: Ethernet LAN-layer addresses are most often called MAC addresses.

TRUE

True or False: Ethernet switches have an additional privacy advantage in that traffic does not flow where it does not need to flow.

TRUE

True or False: Ethernet-like collision detection is no longer feasible over radio communications:

TRUE

True or False: Fast Ethernet introduced the concept of full-duplex Ethernet which is entirely collision-free.

TRUE

True or False: For long (multi-kilometer) electrical serial lines, in addition to the clock-related serial-line requirements, we also want the average voltage to be zero.

TRUE

True or False: Gigabit Ethernet slot time is largely irrelevant, as full-duplex (bidirectional) operation is almost always supported.

TRUE

True or False: IP is a best effort system; there are no IP-layer acknowledgments or retransmissions.

TRUE

True or False: IPv6's extension headers must be processed in order.

TRUE

True or False: IPv6's link-local addresses are intended to be used only within a LAN and never routed.

TRUE

True or False: If Wi-Fi error rates or collision rates are high, a sender can send a large packet as multiple fragments, each receiving its own link-layer ACK.

TRUE

True or False: In the context of data networking, a protocol is a formal set of rules and conventions that governs how computers exchange information over a network medium. A protocol implements the functions of one or more of the OSI layers.

TRUE

True or False: In unswitched Ethernets, every packet is received by every host and it is up to the network card in each host to determine if the arriving packet is addressed to that host.

TRUE

True or False: One thing DNS makes possible is changing a website's IP address while leaving the fully qualified domain name (FQDN) alone.

TRUE

True or False: The Internet protocols use big-endian byte order (also referred to as network byte order).

TRUE

True or False: The network layer interacts with the Wi-Fi LAN exactly as it does with Ethernet; no changes are required.

TRUE

True or False: Token Ring LAN is a simple multiple-access mechanism that is not only collision-free, but which supports fairness in the sense that if N stations wish to send then each will receive 1/N of the opportunities.

TRUE

True or False: Wi-Fi MAC (physical) addresses have the same 48-bit size as Ethernets and the same internal structure.

TRUE

True or Fasle: BGP speakers exchange with neighbors only the routes they (and thus their AS) use themselves.

TRUE

True or Fasle: The Split Horizon fix to the slow-convergence problem prevents all linear routing loops.

TRUE

True or Fasle: The terms autonomous system (AS) and routing domain are used to refer to a set of routers under common administration, using a common link-cost assignment.

TRUE

A virtual private network, or VPN, supports creation of virtual links that join far-flung nodes via:

The Internet

What is the fundamental alternative to datagram stateless forwarding?

Virtual circuits

Baseband transmission may be defined as the transmission of a signal over a link:

Without any change in frequency

If an IPv4 address has all 1-bits for the host bits, it is of type:

broadcast


Set pelajaran terkait

Chapter 10 Disorders of Nutritional Status PrepU Mastery

View Set

Legal Environment of Business Exam 2

View Set

Introduction to Mobile Application and Mobile Application Development

View Set

HW 1 Data Fundamentals: BUSN 5000

View Set