CHAPTER 13: Ethernet and TCP/IP Networking Flashcards
The TCP/IP and OSI models are conceived and implemented as a hierarchical __________, in which each layer at the sending node contributes information that will be used by the corresponding peer layer at the receiving node.
a) rank structure
b) protocol stack
c) proprietary stack
d) communication levels
b) protocol stack
Which of the following is not part of the TCP/IP protocol suite?
a) http
b) ftp
c) SMS
d) ssh
c) SMS
A data packet in an Ethernet network is called a(n)
a) pack.
b) frame.
c) envelope.
d) container.
b) frame.
The data link layer is divided into _____________ and ____________ sublayers.
a) medium access control; logical link control
b) physical access control; logical link control
c) medium access control; virtual link control
d) physical access control; virtual link control
a) medium access control; logical link control
A _____________ occurs when multiple nodes access and send data simultaneously in such a way that their messages become mixed together and garbled.
a) conflict
b) collision
c) confrontation
d) commingling
b) collision
Switched Ethernet does not actually implement the _______________ protocol, because connections are point-to-point and messages can’t become mixed together and garbled.
a) ARP
b) L2TP
c) HDLC
d) CSMA/CD
d) CSMA/CD
What protocol is used to discover the relation between an IP address and a corresponding MAC address?
a) ARP
b) L2TP
c) HDLC
d) CSMA/CD
a) ARP
The amount of time that it takes for a packet to get from one end of the network to the other is called the
a) furthest node travel time.
b) network broadcast delay.
c) network propagation delay.
d) network diameter delay time.
c) network propagation delay.
The ___________ is responsible for the addressing and routing of packets from the source end node through intermediate nodes, step by step, to their proper final destination.
a) transport
b) network layer
c) physical layer
d) Data Link Layer
b) network layer
Remember that the IP datagram may pass through different types of links. For certain types of physical layer connections, it is necessary to further divide the IP datagrams into smaller packets before they are delivered as frames to the data link layer. What are these smaller packets called?
a) pages
b) parcels
c) fragments
d) scatter grams
c) fragments
Although IP attempts to route every datagram to its final destination, it is a connectionless, packet switching service. IP is a(n) _____________ delivery service.
a) reliable best-effort
b) unreliable best-effort
c) reliable and guaranteed
d) unreliable but guaranteed
b) unreliable best-effort
Such network tools as ping and traceroute use the query services of ________ to provide the information that they report.
a) ARP
b) FTP
c) ICMP
d) HTTP
c) ICMP
The purpose of the ___________ layer is to take messages from network applications and provide services that support reliable end-to-end communications.
a) network
b) physical
c) transport
d) Data Link
c) transport
To identify the network application requesting service, the transport protocol identifies the application that created the message and the application that is to receive the message with
a) port numbers.
b) application numbers.
c) network node numbers.
d) application address numbers.
a) port numbers.
For communication between an application and the transport layer, operating systems provide an interface called a(n) ___________, which makes it easy to add a request to the communication services provided by the TCP/IP suite.
a) socket
b) named interface
c) TCP/IP association
d) service association
a) socket
TCP establishes a connection at the request of a network application. To initiate a connection, TCP sends a control packet to TCP at the Web site, requesting a connection; this results in a brief back-and-forth series of requests and acknowledgments known as
a) binding.
b) collaborating
c) handshaking.
d) service handling.
c) handshaking.
A connectionless protocol used instead of TCP for some applications is
a) user packet protocol.
b) user segment protocol.
c) user fragment protocol.
d) user datagram protocol.
d) user datagram protocol.
An alternative to configuring individual workstations is to establish configurations dynamically when the computers connect to the network. What is this approach called?
a) NAT
b) DHCP
c) Masking
d) Dynamic NAT (DNAT)
b) DHCP
What is the abbreviation for the protocol that translates domain names into IP addresses?
a) NAT
b) UDP
c) DNS
d) DHCP
c) DNS
Since DNS request packets are simple and small, ______________ are used for packet transport.
a) IP packets
b) TCP packets
c) UDP datagrams
d) Ethernet frames
c) UDP datagrams
Two additional benefits of DNS services are: 1) permits the use of alias names that share the same IP address and 2) ________________.
a) perform load balancing for replicated servers
b) perform authentication on requesting computers
c) lower cost associated with managing IP addresses
d) enhance performance by caching multiple requests
a) perform load balancing for replicated servers
In part, ___________________ focuses on methods to reserve and prioritize channel capacity to favor packets that require special treatment.
a) DNS
b) QoS
c) TCP/IP
d) Ethernet
b) QoS
The variation in delay from packet to packet is known as _________. It is a particularly important parameter in the transmission of video and audio.
a) QoS
b) jitter
c) packet delay
d) network delay propagation
b) jitter
Modern routers, sometimes called ____________, can prioritize and route packets based on the packet class.
a) QoS routers
b) Edge routers
c) Gateway routers
d) DiffServ capable nodes
d) DiffServ capable nodes