CS 2204 Networking

Ace your homework & exams now with Quizwiz!

What is the bandwidth delay to get 1500 bytes onto the wire for Gigabit Ethernet?

12 microseconds

The size of the UDP port field is:

16 bits

The IPv6 fixed header is twice the size of the IPv4 header, so it amounts to:

40 bytes

Fast (100 Mbps) Ethernet uses the following encoding:

4B/5B

The Open Shortest Path First (OSPF) protocol is an intra-domain routing protocol based on _______ routing.

link state

A link-state routing algorithm computes routes from the network map using:

the Shortest Path First algorithm

The HTTP Set-Cookie header is used by:

the web server

ATM packets are often called cells which are of the following size:

Fixed-size 53 bytes

In the IPv6 fixed header, the IPv4 header Time To Live (TTL) field has become the:

Hop Limit

Which HTTP header is used by the server to inform the client about how it agrees to use the persistent connection?

Keep-Alive

BGP implements policy through filtering rules which allow rejection of certain routes at three different stages. Which of the following is NOT one of those stages?

Route path optimization

Which information is found in the UDP header?

Source and Destination Port

The UDP 16-bit Internet checksum on the data can be disabled by setting the checksum field to:

all 0 bits

The mobile telephone has a removable chip with account information called ____ card.

Subscriber Identity Module (SIM)

The telephone system is tightly intertwined with (wide area) computer networks. The limiting factor for networking purposes turns out to be:

"the last mile" over which telephone customers connect

A common recommendation is to have no more than _____ hosts per LAN or VLAN

1000

Wi-Fi WPA2 uses the presumptively stronger encryption system called:

Advanced Encryption Standard (AES)

Question text Wi-Fi designers can improve throughput through a variety of techniques, including: a. Improved radio modulation techniques b. Improved error-correcting codes c. Increasing the channel width d. Allowing multiple spatial streams via multiple antennas e. All of the above

All of the above

Different VLANs can usually be connected together via:

An IP router

AMI (Alternate Mark Inversion) still has synchronization problems with long runs of 0-bits. The solution used on North American T1 lines (1.544 Mbps) is known as

B8ZS

Question text The physical layer is concerned with the transmission of _______ over the physical medium.

Bits

How is an Ethernet card (or network interface) assigned a unique MAC address?

By the Ethernet card manufacturer

The legacy mechanism for designating the IPv4 network and host address portions was to make the division according to the rst few bits. Which one of the following is not one of the resulting the IPv4 address classes?

Class E

In datagram switching, packets are addressed by destination. In virtual-circuit switching, packets are "addressed" by a connection ID. So, datagram switching and virtual-circuit switching are examples of:

Connectionless, connection-oriented services respectively

The term "frames" normally refers to data packets at which layer?

Data Link (e.g. Ethernet)

Which of the following is not a key element of a protocol

Entities

Path MTU is the smallest packet size which gets fragmented when sent along a path.

False

The TCP the Congestion Window is just another name for the receiver's Advertised Window.

False

The following protocol assumes that all the e-mail will remain on the server indefinitely in multiple mailboxes:

IMAP

showed that if the cut-o frequency is B Hz, the ltered signal can be reconstructed by making 2B samples. No more, no less.

Nyquist

A network cable lies in the ____________ layer.

Physical

TFTP prevents internal old duplicates simply by not allowing its 16-bit block numbers to wrap around; this is effective, but limits the maximum file size to:

about 32 MB

Home ADSL Internet access run over this type of cable (in most cases):

coaxial

IPv4 addresses are half the size of IPv6 addresses.

false

If a given IPv4 destination address matches the first k bits of one of the host's addresses (w.x.y.z/k), the destination is on the local LAN.

false

The subnet mask for an IPv4 147.126.16.0/20 subnet would be 255.255.224.0.

false

A possible Internet compatibility issue is that a packet is too large for a given network. IPv4 handles this by supporting:

fragmentation

Generally speaking, IPv6 addresses consist of a 64-bit network prefix (perhaps including subnet bits) followed by a 64-bit part called:

interface identifier

The checksum field in the IPv4 packet header is the "Internet checksum" applied to:

the header only

The TCP Persist Timer is used to poll when the window size is zero. This timer is used by:

the sender side

All else being equal, the data rate achievable with a radio signal is proportional to:

the width of the frequency band

The CIDR longest-match rule for choosing the routing table entry to be used means:

using the most specific matching prefix

If Wi-Fi error rates or collision rates are high, a sender can send a large packet as multiple fragments, each receiving its own link-layer ACK.

True

In Asynchronous Transfer Mode (ATM), there is no mechanism for physical (LAN) broadcast.

True

TCP adds its own checksum because data errors can be introduced within routers where Data Link Layer checksums do not protect.

True

The degeneration of a signal over distance on a network cable is called attenuation.

True

The documents that contain all the formal Internet protocol standards are referred to as:

Request For Comments (RFCs)

Distance-vector is the simplest routing-update algorithm and it is used by:

Routing Information Protocol

In terms of the TCP sequence and acknowledgment numbers, which of the following count as 1?

SYN and FIN, but not ACK

In most TCP implementations, data can be sent only after the 3-way handshake completes. Therefore, the delay before any data can be sent is:

1 RTT

Bluetooth is a low-power network; for many applications the working range is about:

10 m

Which one of the following IPv4 addresses can be used as a valid host IP address?

10.0.0.80/24

Category 5 UTP cable is often used in which networks?

100 Mbps Ethernet

What is the size of IPv6 addresses?

128 bits

In order to fix the slow-convergence problem, most flavors of the RIP protocol use a value of "infinity" set to:

16

In the Plain Old Telephone System (POTS), the local loop between customer and local central oce consists of:

2 wires

The TCP TIMEWAIT state is supposed to last for a time equal to:

2 x MSL (maximum segment lifetime)

What are the frequency bands used by Wi-Fi 802.11n?

2.4 GHz and 5 GHz

Wi-Fi uses one or both of the following 2 frequency bands:

2.4 GHz and 5 GHz

Which of the following IPv4 addresses is NOT a private address?

24.4.202.93

How many TCP segments are normally exchanged to complete a normal close (from the ESTABLISHED state)?

3

The number of bits in the network part of IPv4 class A, B, C addresses are:

8, 16, 24 respectively

The 2 types of DNS Resource Records used to encode the IPv4 and IPv6 addresses that correspond to the specified domain name are respectively:

A and AAAA

An example of distance-vector routing-update algorithms that eliminate routing loops is:

A and B Only a. Destination-Sequenced Distance Vector b. Enhanced Interior Gateway Routing Protocol

In 4B/5B encoding, some symbols are used for signaling rather than data. The following provide an example of these: Select one: a. START b. END c. RESET d. All of the above

All of the above

What is the functionality that TCP ports provide?

Allow communication with a specific process within the host

What is the functionality that UDP ports provide?

Allow communication with a specific process within the host

Which layer of the OSI model supplies services that allow users to interface with the network?

Application Layer

A DNS record which comes from a name resolver that manages the record and is thus always correct is called:

Authoritative Record

The job of handling exterior routing (that is handling exchange of routing information between Autonomous Systems) is done by the following protocol:

Border Gateway Protocol

In the Internet, most packet losses are due to:

Congestion

Which of the following message types is NOT a valid TFTP message type?

Connection request

IPv4 multicast addresses remain as the last remnant of the Class A/B/C/... scheme. Multicast addresses are class:

D

What is a possible effect of improperly applying a connector to a network cable?

Data transmitted through that cable may experience signal loss.

Manchester encoding is principally designed to

Ensure that a transition occurs in the centre of each bit period

From the TCP "ESTABLISHED" connection state, what is the next state after the application closes ("active close")?

FIN WAIT 1

If an Ethernet switch does not have an entry for a particular destination, it will:

Fall back to flooding

A TCP connection cannot remain idle for a long period of time without getting terminated by the OS.

False

A store-and-forward switch or router begins forwarding a packet before it has fully arrived.

False

ARP (Address Resolution Protocol) takes advantage of the existence of LAN-level multicast frames.

False

According to Nyquist, a perfect (noiseless) channel has infinite transmission capacity.

False

An IPv6 address has 2 times the number of bits compared to IPv4.

False

At least one MAC sublayer protocol guarantees reliable delivery.

False

Copper wires have lower attenuation compared to fiber optic cables.

False

Fully qualified domain names (FQDN) are case-sensitive.

False

IPv6 routers periodically send Router Advertisement (RA) packets to the IPv6 broadcast address.

False

If a web server receives the line below in an HTTP request, it is missing the desired web page and should send an error back. GET / HTTP/1.1

False

If an 8 KB block of data is sent as a single UDP send operation over Ethernet (without jumbo frames), IP fragmentation is just avoided.

False

If there is no LISTENING TCP socket at the host TCP port to which a SYN request is sent, the response is to ignore the SYN segment and send no reply.

False

In Stop-and-Wait, deadlock can be avoided by the sender side doing retransmit-on-timeout while the receiver does not do retransmissions.

False

In distance-vector routing, each node has a complete view of the network topology.

False

Internet Service Providers (ISPs) always connect to one another directly via high-speed links.

False

MD-5 and SHA-1 secure-hash codes are often used in network errordetection because they are very fast to compute.

False

Making the stack non-executable prevents stack buffer overflow attacks that place a shellcode on the stack and also prevents return-to-libc attacks.

False

Short Message Service (SMS) first became available on 3G mobile phones.

False

Since essentially all links on the Internet have link-layer checksums to protect against data corruption, TCP's own checksum is strictly speaking unnecessary.

False

Subnetting allows aggregation of IP address blocks in a way that is visible to the Internet backbone.

False

Suppose a Sun RPC read() request ends up executing twice. In between successive read() operations, the block of data is updated by another process. So different data is returned. This is failure of idempotence.

False

Switches are used to connect distant LANs whereas a Router is most often used to connect individual computers.

False

TCP is stream-oriented, meaning that the application can write very small or very large messages and the TCP layer will take care of preserving message boundaries on the wire.

False

The DNS protocol runs over UDP but cannot run over TCP

False

The DNS protocol runs over UDP but cannot run over TCP.

False

The IEEE 802.1Q 32-bit VLAN tag is required to be added to frames with source and destination ports on the same switch.

False

The IPv4 Time-to-Live (TTL) header field is incremented by 1 at each router; if it reaches 10, the packet is discarded.

False

The Internet Checksum is usually better than CRC at detecting transposition errors.

False

The Real-time Transport Protocol (RTP) is built on top of UDP because of its packet loss intolerance.

False

The Simple Mail Transfer Protocol (SMTP) is used to retrieve email messages from older email servers.

False

The TCP congestion window update strategy called "Additive Increase, Multiplicative Decrease" (AIMD) is used during the slow-start phase of TCP connections.

False

The popular USB (Universal Serial Bus) standard for connecting computer peripherals uses Manchester encoding.

False

The preferred Wi-Fi encryption standard is Wired-Equivalent Privacy, or WEP.

False

The terms "throughput" and "data rate" are considered to mean the same thing.

False

The terms URI and URL are related: URL is a more specific kind of URI.

False

To avoid stop-and-wait becoming a performance bottleneck, TFTP has an option to allow small window size sliding windows operation.

False

UDP (like TCP) avoids IP fragmentation by relying on the Path MTU Discovery mechanism.

False

UDP packets with spoofed source address are difficult to deliver to the application.

False

UDP ports are considered a shared namespace with TCP ports. Therefore, 2 processes cannot share the same port number even if one process is using UDP and the other is using TCP.

False

WEP Wi-Fi encryption is still considered very strong nowadays.

False

With IPv6, routers can use CIDR (Classless Internet Domain Routing) but must base forwarding decisions on prefixes longer than /64.

False

Without a network connection (no Wi-Fi, no Ethernet, etc.), it is not possible for 2 apps on the same computer to communicate with each other via IP.

False

baud rate = bit rate / N, where N is the number of bits represented by each signal shift.

False

Ethernet switches have incorporated a switch-to-switch protocol to construct a subset of the switch-connections graph that has no loops and yet allows reachability of every host. This protocol is called:

Spanning Tree

What version of IP is the most common in the world?

IPv4

What is the purpose of the preamble in an Ethernet frame?

It is used for timing synchronization with alternating patterns of ones and zeros

Which of the following is not supported by IPv6?

LAN broadcast

What OSI layer identifies the communicating applications?

Layer 4

What kind of routing-update algorithm is a preferred choice for networks such as those of ISPs?

Link State Routing

A TCP connection is defined by the combination of the following:

Local <IP address, port> and remote <IP address, port>

Because of the inability to detect collisions directly, the Wi-Fi protocol has link-layer ____ packets for unicast transmission.

NACK

Which application made the greatest use of early Remote Procedure Call?

Network File System

For the Internet Checksum, the value 0000 in the checksum represents:

No checksum calculated

Wi-Fi Link-Layer ACKs contain the following information:

None

Gigabit Ethernet 1000Base-T uses the following encoding:

PAM-5

A protocol that allows mail users agents to copy email from the email server to the user is:

POP3

The general term for the Protocol Data Unit (PDU) used at the TCP layer is:

Packet

A traditional, land line, telephone network is typically a _______________ network.

Packet Switched

The following TCP segment can be sent by either side at any time to abort the TCP connection:

RST

A virtual private network, or VPN, supports creation of virtual links that join far-flung nodes via:

The Internet

A DNS query issued via IPv4 can only return IPv4 addresses, IPv6 addresses can only be returned if the DNS query is done via IPv6.

True

A TCP receiver can shrink the advertised window size to 0, so that the sender must stop sending data.

True

A VLAN looks like a single LAN and all VLAN members will see broadcast packets sent by other members.

True

ATM Adaptation Layer AAL 5 uses a CRC-32 checksum and is able to detect lost ATM cells.

True

All Ethernet devices also agree on a broadcast address of all 1's: a packet sent to the broadcast address will be delivered to all attached hosts.

True

At the LAN layer, traffic-engineering mechanisms are historically/generally limited.

True

BGP speakers exchange with neighbors only the routes they (and thus their AS) use themselves.

True

Bandwidth delay is more significant than propagation delay within a small LAN.

True

Ethernet LAN-layer addresses are most often called MAC addresses.

True

Ethernet switches have an additional privacy advantage in that traffic does not flow where it does not need to flow.

True

Ethernet-like collision detection is no longer feasible over radio communications:

True

Fast Ethernet introduced the concept of full-duplex Ethernet which is entirely collision-free.

True

For long (multi-kilometer) electrical serial lines, in addition to the clock-related serial-line requirements, we also want the average voltage to be zero.

True

Gigabit Ethernet slot time is largely irrelevant, as full-duplex (bidirectional) operation is almost always supported.

True

HTTP 1.1 supports persistent TCP connections. A persistent connection is a TCP connection over which a client may send several HTTP requests.

True

HTTP is stateless protocol, i.e. the behavior of a request does not depend on previous requests.

True

IMAP assumes that all the e-mail will remain on the server inde nitely in multiple mailboxes.

True

IPv6's extension headers must be processed in order.

True

IPv6's link-local addresses are intended to be used only within a LAN and never routed.

True

In Manchester Encoding, a 0 bit is indicated by the absence of a transition, and a 1 bit is indicated by the presence of a transition.

True

In Wi-Fi, after a collision is presumed to have occurred when the link-layer ACK is not received, there is an exponential-backo mechanism similar to Ethernet's.

True

In a baseband transmission, the entire bandwidth of the cable is consumed by a single signal. In broadband transmission, signals are sent on multiple frequencies, allowing multiple signals to be sent simultaneously.

True

In link-state routing implementations, link-state records must be periodically renewed.

True

In link-state routing, each node keeps a maximum amount of network information about of all nodes and all links.

True

In the context of Sun RPC's at-least-once semantics, duplicate request execution is a possibility.

True

In the context of data networking, a protocol is a formal set of rules and conventions that governs how computers exchange information over a network medium. A protocol implements the functions of one or more of the OSI layers.

True

In the context of data rates, one megabit per second (Mbps) is 1000000 bits per second.

True

In unswitched Ethernets, every packet is received by every host and it is up to the network card in each host to determine if the arriving packet is addressed to that host.

True

No matter the available bandwidth, every TCP connection must go through the slow-start phase.

True

One thing DNS makes possible is changing a website's IP address while leaving the fully qualified domain name (FQDN) alone.

True

Overlapping TCP segments raises the possibility of signature-based detection evasion (the attacker might arrange the packets so that the detection reassembles them one way and the target another way).

True

Routers are used to connect two computers that use dierent connection-oriented transport protocols.

True

Routers have the option of fallback-to-flooding for unknown destinations (i.e. those which are not in their routing table).

True

Sliding Windows can work even if the receiver assumes that the window size is much less than the sender's window size value.

True

Starting from the TCP ESTABLISHED state, the side that closes the connection first (active CLOSE) will end up in the TIME WAIT state.

True

The HTTP Content-Type header value used for HTML pages is text/html.

True

The Internet protocols use big-endian byte order (also referred to as network byte order).

True

The Split Horizon fix to the slow-convergence problem prevents all linear routing loops.

True

The Wi-Fi 5 GHz band (vs. 2.4 GHz) has increased ability to penetrate walls, often resulting in a higher effective range.

True

The essence of DNS is a hierarchical domain-based naming scheme and a distributed database system for implementing this naming scheme.

True

The most common binary data encoding on the Internet - at least below the application layer - is big-endian encoding.

True

The network layer interacts with the Wi-Fi LAN exactly as it does with Ethernet; no changes are required.

True

The reverse address resolution protocol (RARP) allows a host to discover its Internet address when it knows only its physical address.

True

The terms autonomous system (AS) and routing domain are used to refer to a set of routers under common administration, using a common link-cost assignment.

True

To restart the flow after packet loss, TCP uses threshold slow start which transitions to congestion avoidance.

True

Token Ring LAN is a simple multiple-access mechanism that is not only collision-free, but which supports fairness in the sense that if N stations wish to send then each will receive 1/N of the opportunities.

True

UDP is sometimes the protocol of choice for ooding attacks on the Internet because it is easy to send UDP packets with spoofed source address.

True

UDP is used by the Remote Procedure Call (RPC) protocol.

True

Wi-Fi MAC (physical) addresses have the same 48-bit size as Ethernets and the same internal structure.

True

What is the fundamental alternative to datagram stateless forwarding?

Virtual circuits

Baseband transmission may be defined as the transmission of a signal over a link:

Without any change in frequency

Most network intrusion-detection systems (NIDS) detect intrusions based either on traffic anomalies or on pattern-based signatures. Which of the following would fall under "traffic anomalies"?

a. pings directed to non-existent hosts b. TCP connection attempts targeting many different ports c. a large number of ping requests d. all of the above

The Border Gateway Protocol's primary goal is to provide support for choosing routes based on:

administrative input

If an IPv4 address has all 1-bits for the host bits, it is of type:

broadcast

How does a DNS client match the received answer with the question that it has sent?

by the client chosen Id header value which is returned in the response

HDLC (High-level Data Link Control) supports the following method(s) for frame separation:

byte stuffing over asynchronous links, bit stuffing over synchronous links

ATM's small packets (53 bytes) are called ________ and they are forwarded using ________ routing.

cells, virtual-circuit

When no other route to the destination exists, what does a host use to access a host outside of the local network?

default route

A TCP socket application can use setsockopt() with the TCP_NODELAY flag to:

disable the TCP Nagle algorithm for the connection in question

The link-state flooding algorithm avoids the usual problems of broadcast in the presence of loops by:

discarding old or duplicate Link State Advertisements

The Routing Information Protocol (RIP) is an intra-domain routing protocol based on _________ routing

distance vector

If the IPv4 "Don't Fragment" (DF header flag) is set to 1 by the sender, then a router must not fragment the packet and must _____ instead.

drop it

Two things are gained from station "A " doing gratuitous ARP on starting up: first, all stations that had A in their cache are now updated with A's most current LAN address, and second:

duplicate IP address may be detected

The usual approach to prevent eavesdropping on a communication channel is the use of:

encryption

What is the primary reason for the development of IPv6?

expanded addressing capabilities

Bluetooth uses a radio technology called:

frequency hopping spread spectrum

ARP-cache entries eventually expire and the timeout interval is on the order of:

from half a minute to a few minutes

Which of the following is a characteristic of single-mode fiber-optic cable?

generally uses semiconductor lasers as the light source

What makes UDP into a proper transport protocol?

it supports IPv4 and IPv6 addressing

What is the primary reason for the eventual retirement of IPv4?

limited addressing capabilities

The IPv6 address ::1 (i.e. 127 0-bits followed by a 1-bit) is called the:

loopback address

Which is an important characteristic of UDP?

minimal delays in data delivery

IPv4 class D addresses are used for:

multicast traffic

An essential feature of IPv4 (and IPv6) addresses is that they can be divided into 2 parts:

network part and host part

Linux systems support assigning to an unprivileged process any of several "capabilities". One of these is CAP_NET_BIND_SERVICE which allows the following:

opening ("binding" to) a privileged port

In Sliding Windows, once a full timeout has occurred, there are usually no packets remaining in flight and this is referred to as:

pipeline drain

An attack that keeps changing in relatively trivial ways to avoid signature-based detection is sometimes said to be:

polymorphic

The use of _________ lets the base station receive CDMA messages from unsynchronized mobile phones.

pseudorandom sequences

In Sliding Windows, if a sender chooses window size larger than the bandwidth x RTT product, then the RTT simply grows until the bandwidth x RTT matches the chosen window size. RTT increase is due to:

queueing delays

In bridged LANs, the _______ algorithm creates a topology in which each LAN can be reached from any other LAN through one path only.

spanning tree

What enables an Internet site to appear to the outside world as a single IP network, but further IP-layer routing to be supported inside the site?

subnets

In TCP's congestion avoidance phase, the Congestion Window adjustment rule introduced by TCP Tahoe says that, after packet loss has been detected:

the Congestion Window is cut by half

CIDR has essentially eliminated the IPv4 Class A/B/C mechanism from the:

the Internet backbone

Which field of the IPv4 packet header contains a value to identify the contents of the packet body?

the Options Field

If the TFTP client changes its port number on a subsequent connection, but the server does not, what prevents an old duplicate data packet sent by the server from being accepted by the new client?

the old dup packet has the wrong client UDP port number

What characteristic of UTP cable helps reduce the effects of interference?

the twisting of the wires in the cable

In the C language, a stack buffer overflow is not detected at the time it occurs because:

there is no array bounds checking at run-time

What is the primary purpose of ARP?

to resolve IPv4 addresses to MAC addresses

Which statement describes the purpose of a default route?

to transfer data to a host outside the local network when no other route to the destination exists.

When a packet is to be sent via a VPN, it is encrypted, encapsulated and sent along the normal Internet connection to the VPN server. This process is called:

tunneling

In Sliding Windows, the sender is allowed to send up to this many packets (starting with the next packet after the last acknowledged packet):

window size

TCP's congestion management is

window-based


Related study sets

International Organizations - Week 7

View Set

Unit 9 Vocabulary (allocate-spontaneous)

View Set

course 1 final practice exam attempt 3

View Set

Negative Symptoms of Schizophrenia

View Set

Ch 41 Urinary Elimination Review Questions

View Set