export_week 9 summary exercises Flashcards

1
Q

The largest amount of data, in bytes, which can be accomodated by a particilar network, link, or physical-layer is called the [a].

A

Maximum Transmission Unit (MTU)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

If an IP datagram is fragmented into 1000-byte fragments, and later encounters a link with an 800-byte MTU, a special procedure (other than standard IP fragmentation) must be used.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

NAPT devices translate IP address and port numbers.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

For a TCP/IP datagram leaving a home network through a NAPT device, which of the following header fields (IP and/or TCP) are altered? (Check all that apply)

A
  • Source IP Address
  • Source Port
  • Header Checksum
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

If hosting a server inside a NATed network, how do clients outside the NAPT router connect to the server? (Check all that apply)

A
  • Using Universal Plug and Play (UPnP)
  • Through a connection relay service
  • By using the NAPT devices IP address, and a port number pre-configured to correspond to the server.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

ICMP can carry messages from… (Check all that apply)

A
  • Destination Host to Source Host
  • Router to Router
  • Source Host to Destination Host
  • Router to Sender Host
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

In network graph terminology, [a] represent routers.

A

Nodes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

When a destination host’s IP fragment timer expires, it drops all accumulated fragments corresponding to that timer.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Select all features explicitly available in IPv6 which were already available explicitly in IPv4.

A
  • Source/Destination Addressing
  • Version
  • Traffic Type
  • Hop Limit
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Select all features explicit in IPv6 which are not explicitly available in IPv4. (Check all that apply)

A
  • Explicit Payload Length
  • 128-bit addresses
  • Flow labeling
  • Extension Headers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

In IPv6, there is no datagram fragmentation performed in the network core..

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The IPv6 address size is 128 bits.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

When encountering an IPv4-only router, an IPv6 datagram is dropped.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

In IPv6, datagram fragmentation is_____.

A

handled at the network edge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Convert the following IPv4 address to its corresponding IPv6-mapped address, with proper formatting.

114.18.222.10

A

::ffff:7212:de0a

::ffff:114.18.222.10

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

1234:0a03::abcd is a valid preferred-format IPv6 address.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

1234::a03::abcd is a valid preferred-format IPv6 address.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which of the following are used in a wired Ethernet network? (Check all that apply)

A
  • Collision Detection (CD)
  • Carrier Sense Multi-Access (CSMA)
  • Exponential back-off/retry for collision resolution
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Given the following received byte on an odd-parity machine, there is definitely at least one error.

01001101

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Select all “Taking Turns” schemes below.

A
  • Token Ring Multiple Access

* Polling Multiple Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Select all Channel Partitioning schemes below.

A
  • WDMA
  • TDMA
  • FDMA
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

The method by which a MAC protocol coordinates access to a broadcast medium to prevent and/or reduce collisions is most commonly called ________

A

Multiple Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

A link-layer link between only two adjacent nodes is called a/an point to point link.

A

Point to point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

A link-layer link between more than two adjacent nodes is called a/an _____ link.

A

Broadcast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
A switch is a network-layer device.
False
26
Star Ethernet uses the same multiple access control as Bus Ethernet.
False
27
It is fairly easy to detect collisions in wireless networks.
False
28
A network with a _____ topology must terminate the endpoints, but in with a ______ topology they are connected so there is no endpoint.
* Bus | * Ring
29
The link-layer device at the center of an ethernet star is a ______________.
Switch
30
When sending a message to all devices on a link, you would send it to the broadcast MAC address: 00-00-00-00-00-00
False
31
Given the following received byte on an even-parity machine, there is definitely at least one error. 01001101
False
32
A multiple access scheme which divides the usable medium into "chunks" and allows each device sole acces to some number of "chunks" is called...
Channel Partitioning Protocol
33
A multiple access scheme which uses a master node to poll each slave node, and control who has 'permission' to transmit at any given time is called...
"Taking Turns" Protocol
34
On the sending or receiving host, most of the protocol tasks "below" the application layer of the protocol stack (data encapsulation, IP addressing, etc. ) are handled by
The Network Interface Controller (NIC)
35
Ethernet Provides...
Error detection via CRC check
36
There are reserved MAC addresses unusable for devices.
True
37
A protocol designed to control access to a medium is most commonly called a 
Multiple Access Protocol
38
https://s3.amazonaws.com/classconnection/350/flashcards/1550350/jpg/capture-16240C0E828144EC555.jpg
1. D's IP address 2. RouterA's NIC#1 IP address 3. RouterA's NIC#1 MAC Address 4. RouterA's NIC#1 MAC Address 5. D's IP Address 6. D's IP Address 7. D's MAC Address 8. D's MAC Address 9. D's IP Address
39
In network graph terminology, [a] represent costs.
Weights
40
ICMP messages are carried within the payload of IP datagrams.
True
41
If hosting a server inside a NATed network, how do clients outside the NAPT router connect to the server? (Check all that apply)
* Through a connection relay service * Using Universal Plug and Play (UPnP) * By using the NAPT devices IP address, and a port number pre-configured to correspond to the server.
42
Given an internet represented as a weighted undirected graph, the shortest path between node X and node Y is the path that...
has the smallest sum of edge weights
43
ICMP can carry messages from... (Check all that apply)
* Source Host to Destination Host * Router to Sender Host * Destination Host to Source Host * Router to Router
44
In a prefix-matching network, a routing table stores... (Check all that apply)
* Next-Hop Link Information | * IP Prefixes
45
The "traceroute" application (on Windows) sends UDP messages by default.
False
46
The "time to live" field in a modern IPv4 datagram header specifies...
the number of remaining hops before the datagram is dropped. 
47
IPv6 datagrams cannot be converted to IPv4 datagrams without losing any information.
True
48
The IPv6 header does not have a checksum.
True
49
In IPv6, datagram fragmentation is ______.
handled at the network edge
50
The transition from IPv4 to IPv6 requires that ____________. (Check all that apply)
* IPv4 routers still in use must “tunnel” IPv6 datagrams, by fragmenting/encapsulating them in IPv4 datagrams
51
The IPv6 address size is 120 bits.
False
52
When encountering an IPv4-only router, an IPv6 datagram is dropped.
False
53
1234:0a03::abcd is a valid preferred-format IPv6 address.
False
54
1234:aac:a03::abcd is a valid preferred-format IPv6 address.
True
55
::ffff:ffff:fffff is a valid preferred-format IPv6 host address.
False 
56
https://s3.amazonaws.com/classconnection/350/flashcards/1550350/jpg/capture-16240C85B6570EA407B.jpg
* 2 | * 4
57
Given the following received byte on an odd-parity machine, there is definitely at least one error. 01001101
True
58
A "collision" is best described as...
when a node receives two or more frames at the same time. 
59
On the sending or receiving host, most of the protocol tasks "below" the application layer of the protocol stack (data encapsulation, IP addressing, etc. ) are handled by
the network interface controller (NIC) 
60
In Random Access multiple access schemes, no two nodes will ever transmit at the same time.
False
61
A protocol designed to control access to a medium is most commonly called a 
multiple access protocol 
62
ETHERNET FRAME QUESTION | https://s3.amazonaws.com/classconnection/350/flashcards/1550350/jpg/capture-16240CC620771D470AD.jpg
* Hardware framing characters * hardware frame header * IP header * TCP/UDP header
63
Select all Random Access schemes below.
* ALOHA | * CSMA
64
A MAC address was originally designed to be permanent and unique.
True
65
Which are functions of the Ethernet preamble? (Check all that apply)
* Clock synchronization * Circuit wake-up * Start Signal
66
When sending a message to all devices on a link, you would send it to the broadcast MAC address: 00-00-00-00-00-00
False
67
https://s3.amazonaws.com/classconnection/350/flashcards/1550350/jpg/capture-16240CE682E4584C77B.jpg
* Parity | * Parity
68
A switch is a network-layer device.
False
69
There are reserved MAC addresses unusable for devices.
True 
70
It is fairly easy to detect collisions in wireless networks.
False
71
A multiple access scheme which listens to the channel to make sure it is empty, prior to transmitting, is called...
Carrier sense protocol 
72
A MAC address is permanent and unique.
False
73
A link-layer link between more than two adjacent nodes is called a/an _____ link.
Broadcast
74
Select all Channel Partitioning schemes below.
* FDMA * WDMA * TDMA
75
In a CSMA/CD system, when a collision is detected, ...
the sender will cut off transmission and wait some time before retransmitting. 
76
https://s3.amazonaws.com/classconnection/350/flashcards/1550350/jpg/capture-16240D09C2A75541E51.jpg
D's IP address RouterA's NIC#1 IP address RouterA's NIC#1 MAC address RouterA's NIC#1 MAC address D's IP address D's IP address D's MAC address D's MAC address D's IP address
77
When encountering an IPv4-only router, an IPv6 datagram is _____ an IPv4 datagram, with the _____ as its destination.
1. encapsulated in | 2. next in-line IPv6 router
78
1234::a03:abcd is a valid preferred-format IPv6 address.
True
79
Most modern Ethernet LANs use a _____ topology.
Star
80
Bus Ethernet uses a random access scheme.
True