export_week 9 summary exercises Flashcards
The largest amount of data, in bytes, which can be accomodated by a particilar network, link, or physical-layer is called the [a].
Maximum Transmission Unit (MTU)
If an IP datagram is fragmented into 1000-byte fragments, and later encounters a link with an 800-byte MTU, a special procedure (other than standard IP fragmentation) must be used.
False
NAPT devices translate IP address and port numbers.
True
For a TCP/IP datagram leaving a home network through a NAPT device, which of the following header fields (IP and/or TCP) are altered? (Check all that apply)
- Source IP Address
- Source Port
- Header Checksum
If hosting a server inside a NATed network, how do clients outside the NAPT router connect to the server? (Check all that apply)
- Using Universal Plug and Play (UPnP)
- Through a connection relay service
- By using the NAPT devices IP address, and a port number pre-configured to correspond to the server.
ICMP can carry messages from… (Check all that apply)
- Destination Host to Source Host
- Router to Router
- Source Host to Destination Host
- Router to Sender Host
In network graph terminology, [a] represent routers.
Nodes
When a destination host’s IP fragment timer expires, it drops all accumulated fragments corresponding to that timer.
True
Select all features explicitly available in IPv6 which were already available explicitly in IPv4.
- Source/Destination Addressing
- Version
- Traffic Type
- Hop Limit
Select all features explicit in IPv6 which are not explicitly available in IPv4. (Check all that apply)
- Explicit Payload Length
- 128-bit addresses
- Flow labeling
- Extension Headers
In IPv6, there is no datagram fragmentation performed in the network core..
True
The IPv6 address size is 128 bits.
True
When encountering an IPv4-only router, an IPv6 datagram is dropped.
False
In IPv6, datagram fragmentation is_____.
handled at the network edge
Convert the following IPv4 address to its corresponding IPv6-mapped address, with proper formatting.
114.18.222.10
::ffff:7212:de0a
::ffff:114.18.222.10
1234:0a03::abcd is a valid preferred-format IPv6 address.
False
1234::a03::abcd is a valid preferred-format IPv6 address.
False
Which of the following are used in a wired Ethernet network? (Check all that apply)
- Collision Detection (CD)
- Carrier Sense Multi-Access (CSMA)
- Exponential back-off/retry for collision resolution
Given the following received byte on an odd-parity machine, there is definitely at least one error.
01001101
True
Select all “Taking Turns” schemes below.
- Token Ring Multiple Access
* Polling Multiple Access
Select all Channel Partitioning schemes below.
- WDMA
- TDMA
- FDMA
The method by which a MAC protocol coordinates access to a broadcast medium to prevent and/or reduce collisions is most commonly called ________
Multiple Access
A link-layer link between only two adjacent nodes is called a/an point to point link.
Point to point
A link-layer link between more than two adjacent nodes is called a/an _____ link.
Broadcast
A switch is a network-layer device.
False
Star Ethernet uses the same multiple access control as Bus Ethernet.
False
It is fairly easy to detect collisions in wireless networks.
False
A network with a _____ topology must terminate the endpoints, but in with a ______ topology they are connected so there is no endpoint.
- Bus
* Ring
The link-layer device at the center of an ethernet star is a ______________.
Switch
When sending a message to all devices on a link, you would send it to the broadcast MAC address: 00-00-00-00-00-00
False
Given the following received byte on an even-parity machine, there is definitely at least one error.
01001101
False
A multiple access scheme which divides the usable medium into “chunks” and allows each device sole acces to some number of “chunks” is called…
Channel Partitioning Protocol
A multiple access scheme which uses a master node to poll each slave node, and control who has ‘permission’ to transmit at any given time is called…
“Taking Turns” Protocol
On the sending or receiving host, most of the protocol tasks “below” the application layer of the protocol stack (data encapsulation, IP addressing, etc. ) are handled by
The Network Interface Controller (NIC)
Ethernet Provides…
Error detection via CRC check
There are reserved MAC addresses unusable for devices.
True
A protocol designed to control access to a medium is most commonly called a
Multiple Access Protocol
https://s3.amazonaws.com/classconnection/350/flashcards/1550350/jpg/capture-16240C0E828144EC555.jpg
- D’s IP address
- RouterA’s NIC#1 IP address
- RouterA’s NIC#1 MAC Address
- RouterA’s NIC#1 MAC Address
- D’s IP Address
- D’s IP Address
- D’s MAC Address
- D’s MAC Address
- D’s IP Address
In network graph terminology, [a] represent costs.
Weights
ICMP messages are carried within the payload of IP datagrams.
True
If hosting a server inside a NATed network, how do clients outside the NAPT router connect to the server? (Check all that apply)
- Through a connection relay service
- Using Universal Plug and Play (UPnP)
- By using the NAPT devices IP address, and a port number pre-configured to correspond to the server.
Given an internet represented as a weighted undirected graph, the shortest path between node X and node Y is the path that…
has the smallest sum of edge weights
ICMP can carry messages from… (Check all that apply)
- Source Host to Destination Host
- Router to Sender Host
- Destination Host to Source Host
- Router to Router
In a prefix-matching network, a routing table stores… (Check all that apply)
- Next-Hop Link Information
* IP Prefixes
The “traceroute” application (on Windows) sends UDP messages by default.
False
The “time to live” field in a modern IPv4 datagram header specifies…
the number of remaining hops before the datagram is dropped.
IPv6 datagrams cannot be converted to IPv4 datagrams without losing any information.
True
The IPv6 header does not have a checksum.
True
In IPv6, datagram fragmentation is ______.
handled at the network edge
The transition from IPv4 to IPv6 requires that ____________. (Check all that apply)
- IPv4 routers still in use must “tunnel” IPv6 datagrams, by fragmenting/encapsulating them in IPv4 datagrams
The IPv6 address size is 120 bits.
False
When encountering an IPv4-only router, an IPv6 datagram is dropped.
False
1234:0a03::abcd is a valid preferred-format IPv6 address.
False
1234:aac:a03::abcd is a valid preferred-format IPv6 address.
True
::ffff:ffff:fffff is a valid preferred-format IPv6 host address.
False
https://s3.amazonaws.com/classconnection/350/flashcards/1550350/jpg/capture-16240C85B6570EA407B.jpg
- 2
* 4
Given the following received byte on an odd-parity machine, there is definitely at least one error.
01001101
True
A “collision” is best described as…
when a node receives two or more frames at the same time.
On the sending or receiving host, most of the protocol tasks “below” the application layer of the protocol stack (data encapsulation, IP addressing, etc. ) are handled by
the network interface controller (NIC)
In Random Access multiple access schemes, no two nodes will ever transmit at the same time.
False
A protocol designed to control access to a medium is most commonly called a
multiple access protocol
ETHERNET FRAME QUESTION
https://s3.amazonaws.com/classconnection/350/flashcards/1550350/jpg/capture-16240CC620771D470AD.jpg
- Hardware framing characters
- hardware frame header
- IP header
- TCP/UDP header
Select all Random Access schemes below.
- ALOHA
* CSMA
A MAC address was originally designed to be permanent and unique.
True
Which are functions of the Ethernet preamble? (Check all that apply)
- Clock synchronization
- Circuit wake-up
- Start Signal
When sending a message to all devices on a link, you would send it to the broadcast MAC address: 00-00-00-00-00-00
False
https://s3.amazonaws.com/classconnection/350/flashcards/1550350/jpg/capture-16240CE682E4584C77B.jpg
- Parity
* Parity
A switch is a network-layer device.
False
There are reserved MAC addresses unusable for devices.
True
It is fairly easy to detect collisions in wireless networks.
False
A multiple access scheme which listens to the channel to make sure it is empty, prior to transmitting, is called…
Carrier sense protocol
A MAC address is permanent and unique.
False
A link-layer link between more than two adjacent nodes is called a/an _____ link.
Broadcast
Select all Channel Partitioning schemes below.
- FDMA
- WDMA
- TDMA
In a CSMA/CD system, when a collision is detected, …
the sender will cut off transmission and wait some time before retransmitting.
https://s3.amazonaws.com/classconnection/350/flashcards/1550350/jpg/capture-16240D09C2A75541E51.jpg
D’s IP address RouterA’s NIC#1 IP address RouterA’s NIC#1 MAC address RouterA’s NIC#1 MAC address D’s IP address D’s IP address D’s MAC address D’s MAC address
D’s IP address
When encountering an IPv4-only router, an IPv6 datagram is _____ an IPv4 datagram, with the _____ as its destination.
- encapsulated in
2. next in-line IPv6 router
1234::a03:abcd is a valid preferred-format IPv6 address.
True
Most modern Ethernet LANs use a _____ topology.
Star
Bus Ethernet uses a random access scheme.
True