export_week 5 Flashcards
When it comes to pushing data into the internet, is the more effective protocol.
UDP
A simple checksum can detect some 2-bit errors.
True
UDP implements network fairness.
False
UDP uses an additive-increase multiplicative-decrease (AIMD) system to manage flows.
False
What are some causes of network congestion? (Check all that apply)
Reliable Data Transfer schemes.
Typical Internet Usage.
Parallel TCP Connections.
High utilization.
Dropped TCP Packets.
The rate of CongWin size increase (in terms of MSS) while in TCP’s Slow-Start phase is
Exponential
In congestion control, flags may be set during transit which indicate the presence and/or level of congestion in certain portions of the network.
network - assisted
In congestion is detected based on delayed and/or dropped packets.
host-inferred
The process of determining a path through the internet is handled by the
routing algorithm
In a datagram network, the responsibilities of the network layer include: (check all that apply).
- packet routing
- packet forwarding
- host-to-host communication
A router’s routing table is output by a
routing algorithm
Given a router with 5 input ports and 5 output ports. If the switching fabric is 5 times as fast as the input/output line speed, queueing (can or can not) occur at an input port
can
The process of determining a path through the internet is called
routing
The process of moving a datagram from a router’s input port to output port is handled by the
switching fabric
The Internet Protocol (IP) header may be 21 bytes long.
false
The network layer manages communications from _____ to _____
host to host
A network with a connectionless network layer is called a
datagram network
The Internet Protocol (IP) implements data reliability services.
False
Put the steps in the most correct order for closing a TCP Connection
- Client sends segment with FIN bit set
Server sends ACK of received segment
Server sends segment with FIN bit set
Client sends ACK of received segment
The UDP protocol uses a [ Select ] [“2”, “1”, “32”, “16”, “8”] -bit, [ Select ] [“16”, “2”, “1”, “32”, “8”] ‘s complement of the [ Select ] [“2”, “16”, “32”, “1”, “8”] ‘s complement sum to compute the checksum.
16
1
1
In congestion control, congestion is detected based on delayed and/or dropped packets.
host-inferred
UDP implements network fairness
False
What are some causes of network congestion? (Check all that apply)
- Dropped TCp Packets
- Reliable Data Transfer Schemes
- Parallel TCP Connections
- Typical Internet Usage
- High Utilization
UDP uses an additive-increase multiplicative-decrease (AIMD) system to manage flows.
False
TCP implements network fairness indirectly.
True
The Internet Protocol (IP) implements congestion control.
False
In addition to a “default” entry, routing tables in an internet store…
the “first hop” in a path to each of the networks known to the router
The “time to live” field in a modern IPv4 datagram header specifies..
the number of remaining hops before the datagram is dropped.
The Internet Protocol (IP) header may be 21 bytes long.
False
Which of the following are benefits of a virtual circuit network? (Check all that apply)
- Guaranteed timing
- Guaranteed bandwidth
- Connection states are preserved
What can cause queueing at a router’s input ports? (Check all that apply)
- Head of Line blocking
- Output port contention
- Slow outbound link transmission rate
When a host in a network needs to obtain a valid IP address for itself, it broadcasts a “discover” message that can be handled by a server, which will “offer” an IP address within the correct domain.
Dynamic Host Configuration
In a link between Host A, and Host B, we have three intermediary routers:
Host A —– Router Snucky —— Router Jumpy —— Router Po ——- Host B
Host A’s first hop router is Router
Snucky
Given a router with 5 input ports and 5 output ports. If the switching fabric is 5 times as fast as the input/output line speed, queueing [ Select ] [“can not”, “can”] occur at an output port.
Can
The Internet Protocol (IP) implements flow control.
False
A simple checksum can detect some 2-bit errors.
True
The transport layer manages communications from
Process to Process
If I want to be reasonably sure the recipient received my transmitted information, I would use the ______ protocol.
TCP
It is acceptable to create two TCP connections on the same server/port doublet from the same client/port doublet.
False
The TCP protocol provides error detection and correction.
False
When it comes to pushing data into the internet, _____ is the more effective protocol.
UDP
The UDP protocol provides unreliable, connectionless service.
True
If I want to be fair about my usage of internet resources, I would use the _____ protocol.
TCP
The TCP protocol provides reliable, connection-oriented service.
True
The UDP protocol provides reliable, connectionless service.
False
The TCP protocol provides reliable, connectionless service.
False
Suppose that a client application sends a request to a server application at port 80 on a remote server. The server responds to the client’s address at
a port number assigned by the client’s operating system; this number is not used directly by the client application, but is sent to the server along with the original request.
The UDP protocol provides error detection.
True
The UDP protocol provides error detection and correction.
False
A simple checksum can detect all 1-bit errors.
True
f I want to be sure I don’t overwhelm the receive host with too much information, I would use the ______ protocol
TCP
Which of the following best describes reliable data transfer in the internet (using networking terminology)?
The ability to send and receive information that you are reasonably sure is what was sent, without losing any information.
It is acceptable to create two TCP connections on the same server/port doublet from the same client/port doublet.
False
If I want to be fair about my usage of internet resources, I would use the ___________ protocol.
TCP
Retransmitting a missing segment before the segment’s countdown timer expires is called…
fast retransmission
In a __________ acknowledgement scheme, a received ACK indicates only that the ACK’d segment was received.
Selective
Put the steps in the most correct order for TCP Connection initialization.
- Client sends segment with SYN set to 1.
- Server sends segment with SYN set to 1 and ACK set to the Client’s SeqNum + 1
- Client sends segment with SYN set to 0 and ACK set to the Server’s SeqNum + 1
In a ________ acknowledgement scheme, a received ACK indicates all segments prior to the ACK’d segment were received.
Cumulative
What is the maximum UDP header size?
8 bytes
A ______ -type retransmission protocol will retransmit all un-ACK’d segments upon a countdown timer interrupt.
Go-back-N
What is the minimum TCP header size?
20 bytes
Put the steps in the most correct order for closing a TCP Connection.
Client sends ACK of received segment
Server sends ACK of received segment
Server sends segment with FIN bit set
Client sends segment with FIN bit set
- Client sends segment with FIN bit set
- Server sends ACK of received segment
- Server sends segment with FIN bit set
- Client sends ACK of received segment