Net me

Ace your homework & exams now with Quizwiz!

Which of the following is an example of a non-routable IP address?

10.0.0.1 10.0.0.0 - 10.255.255.255, 172.16.0.0 - 172.31.255.255, 192.168.0.0 - 192.168.255.255

is an IPv4 loop back address

127.0.0.1

The maximum number of bytes that can be transmitted in the data payload of an Ethernet frame is

1500

The number of bits in the suffix portion of a class A address is

24

The length of an IP address in IPv4 is _____ binary bits.

32

The minimum length of the data payload that can be transmitted in an Ethernet frame is _____ bytes

46

What is the size of the largest data payload that can be carried by a single UDP datagram?

65527 octets

What is the length of a UDP header?

8 octets

What is the size of the largest header that can be in a TCP segment?

? Not 32 NOT 128

What is the size of the largest header that can be in an IP packet?

? Not 64 NOT 16

At which layer of the OSI model would you find a file transfer service?

Application

Each entry in a DNS database consists of three items: a domain name, a record type, and a value. The record type specifies how the value is to be interpreted. An entry type that provides an alias for another DNS entry is the ___ type.

CNAME

Each entry in a DNS database consists of three items: a domain name, a record type, and a value. The record type specifies how the value is to be interpreted. An entry type that provides an alias for another DNS entry is the ___ type.

CName

Protocol which is an extension of BOOTP

DHCP

Which technology is standardized in the IEEE 802.3 specification?

Ethernet LANs

If we were to pluck an Ethernet frame off of the wire with our magic snooping scope and look at it's contents, if the destination address in the frame header was a broadcast and our magic snooping scope printed it out in hexadecimal the destination address would look like

FFFFFFFFFFFF

A DHCP server is required on every level 2 segment where DHCP will be used.

False

Datagrams carrying ICMP messages have a special priority and will be transmitted ahead of regular IP traffic

False

Flow control is the process of making sure data frames are received in the correct order

False

IGMP includes a capability for determining the identities of the members of the multi-cast group.

False

IGMP includes a method for determining the number of current members of a multi-cast group.

False

IP computes a CRC over the data payload in an IP packet.

False

IP computes a CRC over the header in an IP packet.

False

IP computes a checksum over the data payload in an IP packet.

False

IP is a virtual circuit service.

False

If a datagram carrying an ICMP message causes an error, ICMP is used to send an error message reporting this error.

False

RARP packets are encapsulated in IP packets

False

TCP is a connectionless service

False

The ARP protocol has a scheme built-in to provide a security mechanism so that responses to arp requests are guaranteed to come from trusted hosts.

False

The socket API cannot be used to send messages via UDP

False

The socket interface can only be used with TCP/IP.

False

To send a message to a multi-cast group using IGMP a sender must first join the multi-cast group.

False

When a next hop routing decision is made for a datagram, the address of the next hop is placed in the datagram header.

False

A TCP connection creates a ___ communication channel.

Full Duplex

If a router has received so many datagrams that it has no more buffer space available it will need to start discarding subsequently received datagrams. For each datagram discarded the router may send a source quench message to the host that created the discarded datagram. The source quench message is part of the _____ protocol.

ICMP

Protocol that includes an address mask request

ICMP

If a machine was configured with an incorrect netmask it might send packets to a router when in fact it can directly communicate with the destination machine. In this case the router would send a (n) ____ message to the sender notifying it of the situation.

ICMP redirect message

Routing decisions are made by ___.

IP

The information you are attempting to acquire by sending a RARP request is a node's ___ address

IP

Which standards organization developed the OSI model?

ISO

When a DNS server receives a request from a client for which it is not authoritative it in turn becomes a client and contacts another DNS server to resolve the request. When it contacts the other DNS server it makes a (n) ___ lookup request.

Iterative

An algorithm that allows transport protocols to ignore ambiguous round-trip time samples, and thus improve round-trip estimations.

Karn's algorithm

The ___ is an experimental IP Multi-cast-enabled network that exists as part of the Internet. It consists of groups of multi-cast-enabled subnets, connected by routers which are able to "tunnel" multi-cast data over uni-cast connections to other routers which are then able to take the packets and multi-cast them onto their subnet.

Mbone

Technique that allows a collection of computers with non-routable IP addresses to access the Internet through a service running on a computer that has a routable IP address.

NAT

In the designation 10Base5, the 10 stands for 10 ___.

NOT 10 Megabytes Probably Megabits

Network technology which utilizes two counter-rotating rings

NOT IEEE 802.11 NOT IEEE 802.5

In the socket API which of the following functions is not used by a server application

NOT Socket NOT Accept

NAT can be configured to operate in a number of modes. The most commonly used is

Network Address Port Translation

Computers do not all operate at the same speed. Data overrun occurs when a computer sends data across a network faster than the destination can absorb it. Consequently, data is lost. Several techniques are available to handle data overrun. Collectively, the techniques are known as flow control mechanisms. The simplest form of flow control is a stop-and-go system in which the sender waits after transmitting each packet. When the receiver is ready for another packet, the receiver sends a control message, usually a form of acknowledgment. To achieve higher throughput rates TCP/IP utilizes a flow control mechanism known as a

Not lookaside buffer Not write ahead buffer NOT write through cache sliding window ?

Technology which utilizes an IDL

RPC

What type of device would send an address mask reply message

Router

When implementing a concurrent connection-oriented server using sockets we can create apparent concurrency using _____ rather than actually creating multiple threads or separate processes for each connection.

Select

Layer 5 of the ISO OSI network model is called the ___ layer.

Session

A programming interface originally developed for Berkeley UNIX and TCP/IP that encapsulates the transport layer capabilities is the _____ library.

Sockets

In the TCP/IP protocol suite the protocol that provides a virtual circuit service

TCP

File transfer protocol intended for use in disk-less workstations by having the code burned into PROM chips. Thus, it was made extremely simple so the code could be extremely small.

TFTP

Which TCP/IP utility could be used to log into a UNIX host over a network?

TelNet

When IP fragments are sent to a router

They are forwarded

To guarantee that connections are established and terminated reliably, TCP utilizes a scheme known as a _____ to establish a connection.

Three way handshake

ICMP can be used to implement a trick to create a program that traces the route between two machines. This trick involves manipulating the _____ field in the IP header.

Time to Live

At which layer of the OSI model does TCP/IP handle error checking and retransmission of bad data?

Transport

An ARP message utilizes a different Ethernet frame type designator from an IP packet.

True

DHCP provides a way for a host to receive the address of its default router.

True

ICMP adds its own header in addition to the IP header for the packet. ICMP encapsulates messages in IP for transmission

True

ICMP encapsulates messages in IP for transmission

True

IP computes a checksum over the header in an IP packet.

True

Lost SYN and FIN segments are retransmitted.

True

The IP protocol has a time-stamp option that that can be used to have each router along a path taken by an IP packet to append to a list the router's IP address and a time-stamp indicating when the IP packet was processed by the router.

True

The IP protocol has an option for specifying the exact sequence of addresses that must be taken in a path from source to destination.

True

The IP protocol has an option to cause each router to append its IP to a list inside the IP header that will show the route taken by a packet from source to destination.

True

The first step in the DHCP protocol is for the client to find a DHCP server. This requires a level 2 broadcast capability.

True

When data is sent by TCP the header fields ACKNOWLEDGEMENT NUMBER and WINDOW refer to incoming data stream.

True

DNS does not distinguish between names in upper or lower case.

True, case insensitive

BOOTP uses ____ to carry messages

UDP

In the TCP/IP protocol suite the protocol that provides a datagram service is

UDP

A technique which encrypts IP or other types of level three packets and transmits the encrypted packets as data inside an IP packet.

VPN

The Network Virtual Terminal defined for use by the Telnet application defines the standard line termination to be

a two character sequence CR-LF

The standard network byte ordering defined for TCP/IP is

big Endian

Standard network byte ordering is

big endian

To detect errors, network systems usually send a small amount of additional information with the data. A sender computes the value of the additional information from the data, and a receiver performs the same computation to verify that the packet was transmitted without error. Two schemes commonly used to perform this integrity check are

checksum and CRC

TCP considers packet loss to be indicative of _____ in the network.

congestion

Duplication, delayed or out-of-order delivery, corruption of data and loss of information are characteristics of a ___ service.

datagram ? I think

In order to create a capability for foreign agent discovery to be used by mobile IP the designers of IP

extended the existing ICMP router solicitation messages

To obtain the local address associated with a socket you would call the socket library routine _____

getsocketname

The Socket API call that places a socket into passive mode is

listen

The technique used by IP routers when searching a routing table.

longest-prefix matching

When IGMP memberships are established at an IGMP enabled router they are created on a

per computer basis

When a client application makes a DNS request, for example by calling gethostbyname, it typically requests a(n) ___ lookup.

recursive

To compute an adaptive timeout value for unreceived acknowledgments TCP uses a weighted average computed as a linear combination of the estimated mean and variance of the ____ for each active connection.

round-trip time

In the CIDR style notation that appends a slash and a number such as 140.160.140.0/16, the number after the slash indicates

the number of bits in the prefix ? i think

Guaranteed delivery is a characteristic of a ___ service.

virtual circuit


Related study sets

Praxis:Principles of Learning and Teaching (PLT): Grades K-6 (5622)

View Set

Microsoft Windows 10 Configuring Windows Devices - Midterm

View Set

ch 69 Neurologic Infections, Autoimmune Disorders, and Neuropathies prepU

View Set

Lecture 12 (21/4) - Risk Management

View Set

Marketing Final Short Answer, Marketing Final Exam - Study Guide

View Set

Organizational Behavior (OB) | Chapter 5 - Motivation Theories (Multiple Choice Questions)

View Set

Directions Review and Quiz Listening: Conversations

View Set

Traditional indemnity health insurance commercial insurance carriers

View Set