Network 2 exam

Ace your homework & exams now with Quizwiz!

general approach to routing with characteristics of that approach: Centralized, global routing.

- all routers have complete topology, and link cost information

Which of the functions below belong in the controller layer labeled "Interface, abstractions for network control apps"?

- internet - network graph

Link-layer services. Which of the following services may be implemented in a link-layer protocol?

- reliable data transfer between directly connected nodes. - Flow control between directly connected nodes. - Coordinated access to a shared physical medium - Bit-level error detection and correction. - Multiplexing down from / multiplexing up to a network-layer protocol.

Which of the functions below belong in the controller layer labeled "Network-wide distributed, robust state management"?

- statistics - host information - flow tables - link-state information - switch information

Network-control applications

(a) top SDN layer - routing, access control, load balance

SDN Controller (network operating system)

(b) middle SDN layer - northbound API

SDN-controlled switches

(c) bottom SDN layer - data plane and southbound API

RTS/CTS frames. What is the purpose of RTS (request to send) and CTS (clear to send) frames in WiFi (802.11) networks? Select one or more of the answers below. [Hint: check two answers below].

- A CTS that is sent allows a receiver to force other nodes (other than the intended sender who sent the RTS) to refrain from transmitting, thus allowing the sender who sent the RTS to then transmit a frame with less likelihood of a collision. - RTC/CTS frames helps nodes in a wireless network mitigate the effects of the hidden terminal problem.

Use of ACKs in WiFi. Why are link-layer ACKs used in WiFi (802.11) networks? [Hint: check two of the boxes below].

- Because of the hidden terminal problem, a node that is transmitting and hears no collisions still doesn't know if there was a collision at the receiver. - Wireless links are noisier than wired links, and so bit level errors are more likely to occur, making link-layer error recovery more valuable that in less-noisy wired links.

Which of the following statements correctly identify the differences between routing and forwarding. Select one or more statements.

- Forwarding refers to moving packets from a router's input to appropriate router output, and is implemented in the data plane. - Routing refers to determining the route taken by packets from source to destination, and is implemented in the control plane.

Consider Dijkstra's link-state routing algorithm that is computing a least-cost path from node a to other nodes b, c, d, e, f. Which of the following statements is true.

- In the initialization step, the initial cost from a to each of these destinations is initialized to either the cost of a link directly connecting a to a direct neighbor, or infinity otherwise. - Suppose nodes b, c, and d are in the set N'. These nodes will remain in N' for the rest of the algorithm, since the least-cost paths from a to b, c, and d are known. - The values computed in the vector D(v), the currently known least cost of a path from a to any node v, will never increase following an iteration.

Check the one or more of the following statements about the OSPF protocol that are true.

- OSPF implements hierarchical routing - OSPF is an intra-domain routing protocol. - OSFP uses a Dijkstra-like algorithm to implement least cost path routing.

Characteristics of wireless links. WHich of the following statements about the characteristics of wireless links are true?

- Path loss refers to the decrease in the strength of a radio signal as it propagates through space. - The bit error rate (BER) of a wireless channel decreases as the signal-to-noise ratio (SNR) increases. - The "hidden terminal problem" happens when A sends to B over a wireless channel, and an observer, C (that can be even closer to A than B), does not detect/receive A's transmission because of physical obstacles in the path between A and C. - Multipath propagation occurs when portions of the electromagnetic wave reflect off objects and the ground taking paths of different lengths between the sender and a receiver, and thus arriving at the receiver at slightly different points in time.

Consider the simple star-connected Ethernet LAN shown below, and suppose the Ethernet switch is a learning switch, and that the switch table is initially empty. Suppose C sends an Ethernet frame address to C' and C ' replies back to C. How many of these two frames are also received at B's interface?

1

transmission rate with the the wireless technology that achieves that rate: 5G cellular

10 Gbps

transmission rate with the the wireless technology that achieves that rate.: 802.11 ax

14 Gbps

transmission rate with the the wireless technology that achieves that rate: Bluetooth

2 Mbps

transmission rate with the the wireless technology that achieves that rate: 802.11 ac

3.5 Gbps

Source address field

48-bit MAC address of the sending node.

transmission rate with the the wireless technology that achieves that rate: 802.11 g

54 Mbps

Beacon Frames. What is the purpose of a beacon frame in WiFi (802.11) networks?

A beacon frame allows an access point to advertise its existence, and the frequency channel it is operating on, to devices that want to connect to an access point.

Self-learning switches. Which of the following statements are true about a self learning switch?

A self learning switch associates the source MAC address on an incoming frame with the port on which it arrived, and stores this matching in a table. The switch has now learned the port that leads to that MAC address. A self-learning switch will age-out (forget) a self-learned association of a MAC address x and switch port y if it doesn't see a frame with MAC address x incoming on switch port y after some amount of time. A self-learning switch frees a network manager from a least one configuration task that might be associated with managing a switch

Limiting use of resources or capabilities to given users.

Access control

Learning switch state removal. Consider the simple star-connected Ethernet LAN shown below, and suppose the switch table contains entries for each of the 6 hosts. How will those entries be removed from the switch table?

An entry for a host will be removed if that host doesn't transmit any frames for a certain amount of time (that is, table entries will timeout).

IMSI. In 4G LTE cellular systems, what is an International Mobile SubscriberIdentity (IMSI)?

Assigned by a mobile carrier network to a device, when the device attaches to the radio access network, serving a similar link-layer role as MAC addresses in a wired network.

Proving you are who you say you are

Authentication

Suppose a provider network only wants to carry traffic to/from its customer networks (i.e., to provide no transit service), and customer networks only want to carry traffic to/from itself. Consider the figure below. To implement this policy, to which of the following networks would network C advertise the path Cy?

B, A, x

Why three addresses? Why does the WiFi (802.11) link-layer frame have three addresses? [Note: WiFi actually has four MAC addresses in the frame, but we're only focusing here on the three widely used ones].

Because both the access point that will relay this frame to the intended link-layer receiving host or router interface, as well as that intended destination host or router interface need to be specified.

Bluetooth. Which of the following statement are true about the Bluetooth protocol?

Bluetooth uses TDM, FDM, polling, error detection and correction, and has sleep modes to conserve device power. Pretty sophisticated for a consumer technology!

Reliable data transfer at the link layer. Which of the following statements is true about the link-level service of reliable data transfer (using ACKs) in WiFi (802.11) networks and in 4G cellular networks?

Both WiFi and LTE provide link-level reliable data transfer.

Infrastructure Mode. What is meant when we say that a network of devices is operating in "infrastructure mode"?

Devices communicate with each other and to the larger outside world via a base station (also known as an access point).

Used to detect tampering/changing of message contents, and to identify the originator of a message.

Digital signature

Provides confidentiality by encoding contents

Encryption

Specialized "middleboxes" filtering or blocking traffic, inspecting packet contents inspections

Firewall

Switch forwarding and filtering. Suppose an Ethernet frame arrives to an Ethernet switch, and the Ethernet switch does not know which of its switch ports leads to the node with the given destination MAC address? In this case, what does the switch do?

Flood the frame on all ports except the port on which the frame arrived.

Consider the OSPF routing protocol. Which of the following characteristics are associated with OSPF (as opposed to BGP)?

Is an intra-domain routing protocol. Finds a least cost path from source to destination. Is an inter-domain routing protocol.

Among the following protocols, terminology or considerations, indicate those that are associated with "routing within a single network (typically owned and operated by one organization)."

OSPF inter-domain routing intra-domain routing Driven more by performance than by routing policy

Link-layer services. Which of the following services may be implemented in a link-layer protocol? Select one or more statements.

Reliable data transfer between directly connected nodes. Flow control between directly connected nodes Coordinated access to a shared physical medium. Bit-level error detection and correction. Multiplexing down from / multiplexing up to a network-layer protocol.

What is the definition of a "good" path for a routing protocol? Chose the best single answer.

Routing algorithms typically work with abstract link weights that could represent any of, or combinations of, all of the other answers.

Characteristics of Multiple Access Protocols (a). Consider the following multiple access protocols that we've studied: (1) TDMA, and FDMA (2) CSMA (3) Aloha, and (4) polling. Which of these protocols are collision-free (e.g., collisions will never happen)?

TDMA and FDMA Polling

Characteristics of Multiple Access Protocols (b). Consider the following multiple access protocols that we've studied: (1) TDMA, and FDMA (2) CSMA (3) Aloha, and (4) polling. Which of these protocols requires some form of centralized control to mediate channel access?

TDMA and FDMA Polling

Characteristics of Multiple Access Protocols (c). Consider the following multiple access protocols that we've studied: (1) TDMA, and FDMA (2) CSMA (3) Aloha, and (4) polling. For which of these protocols is the maximum channel utilization 1 (or very close to 1)?

TDMA and FDMA Polling

Characteristics of Multiple Access Protocols (d). Consider the following multiple access protocols that we've studied: (1) TDMA, and FDMA (2) CSMA (3) Aloha, and (4) polling. For which of these protocols ss there a maximum amount of time that a node knows that it will have to wait until it can successfully gain access to the channel?

TDMA and FDMA Polling

The 802.11 Media Access Control protocol. Which of the following statement are true about the 802.11 (WiFi) MAC protocol?

The 802.11 MAC protocol performs collision avoidance. That is, an 802.11 sender and receiver can use approaches such as RTS/CTS, inter-frame spacing, and explicit acknowledgments to try avoid, rather than detect, colliding transmissions from another node.

Data (payload) field

The contents of this field is typically (bit not always) a network-layer IP datagram.

Pure Aloha and CSMA. Which of the following statements is true about both Pure Aloha, and CSMA (both with and without collision detection?

There can be simultaneous transmissions resulting in collisions. Pure Aloha and CSMA can achieve 100% utilization, in the case that there is only one node that always has frames to send

Which of the following statements is true about channel partitioning protocols?

There can be times when the channel is idle, when a node has a frame to send, but is prevented from doing so by the medium access protocol. Channel partitioning protocols can achieve 100% channel utilization, in the case that all nodes always have frames to send.

Polling and token-passing protocols. Which of the following statements is true about polling and token-passing protocols?

These protocol can achieve close to 100% channel utilization, in the case that all nodes always have frames to send (the fact that the utilization is close to, but not exactly, 100% is due to a small amount of medium access overhead but not due to collisions) These protocol can achieve close 100% utilization, in the case that there is only one node that always has frames to send (the fact that the utilization is close to, but not exactly, 100% is due to a small amount of medium access overhead but not due to collisions)

Different types of addressing (c). We've now learned about both IPv4 addresses and MAC addresses. Consider the address properties below, and use the pulldown menu to indicate which of these properties is a property of both IPv4 addresses and MAC addresses.

This address must be unique among all hosts in a subnet.

Sequence number field

This field does not exist in the Ethernet frame

Different types of addressing (b). We've now learned about both IPv4 addresses and MAC addresses. Consider the address properties below, and use the pulldown menu to indicate which of these properties is only a property of IPv4 addresses (and therefore is not a property of MAC addresses - careful!).

This is a 32-bit address. This is a network-layer address. This address is allocated by DHCP.

Different types of addressing (a). We've now learned about both IPv4 addresses and MAC addresses. Consider the address properties below, and use the pulldown menu to indicate which of these properties is only a property of MAC addresses (and therefore is not a property of IPv4 addresses - careful!).

This is a 48-bit address. This is a link-layer address. This address remains the same as a host moves from one network to another.

Type field.

Used to demultiplex the payload up to a higher level protocol at the receiver.

Cyclic redundancy check (CRC) field

Used to detect and possibly correct bit-level errors in the frame.

general approach to routing with characteristics of that approach: Decentralized routing.

an interative process of computation, exchange of information with neighbors. Routers may initially only know link costs to

How does router 2d learn of the path AS3, X to destination network X?

from 2c via iBGP

How does router 2c learn of the path AS3, X to destination network X?

from 3a via eBGP

transmission rate with the the wireless technology that achieves that rate; 4G LTE

hundreds of Mbps

Again, suppose a provider network only wants to carry traffic to/from its customer networks (i.e., to provide no transit service), and customer networks only want to carry traffic to/from itself. Suppose C has advertised path Cy to x. To implement this policy, to which of the following networks would network x advertise the path xCy?

none of the networks

Which of the functions below belong in the controller layer labeled "Communication to/from controlled device"?

openflow protocol

intradomain routing

rounding among routers within same AS ("network")

general approach to routing with characteristics of that approach: static routing

routes change slowly over time

Interdomain routing

routing among different ASes ("networks")

general approach to routing with characteristics of that approach: dynamic routing

routing changes quickly over time

Again, suppose a provider network only wants to carry traffic to/from its customer networks (i.e., to provide no transit service), and customer networks only want to carry traffic to/from itself. Suppose C has advertised path Cy to A. To implement this policy, to which of the following networks would network A advertise the path ACy?

w


Related study sets

variable or fixed/ direct or indirect

View Set

C#/Visual Studio/Visual Studio Code -Concepts and Fundamentals

View Set

HESI PN Obstetrics/Maternity Practice Exam

View Set

Artificial Intelligence: A Modern Approach Chapter 3: Solving Problems By Searching

View Set

Ch 27: Nursing Care of the child Born with a Physical or Developmental Challenge

View Set