export_week 9 summary exercises Flashcards

1
Q

The largest amount of data, in bytes, which can be accomodated by a particilar network, link, or physical-layer is called the [a].

A

Maximum Transmission Unit (MTU)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

If an IP datagram is fragmented into 1000-byte fragments, and later encounters a link with an 800-byte MTU, a special procedure (other than standard IP fragmentation) must be used.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

NAPT devices translate IP address and port numbers.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

For a TCP/IP datagram leaving a home network through a NAPT device, which of the following header fields (IP and/or TCP) are altered? (Check all that apply)

A
  • Source IP Address
  • Source Port
  • Header Checksum
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

If hosting a server inside a NATed network, how do clients outside the NAPT router connect to the server? (Check all that apply)

A
  • Using Universal Plug and Play (UPnP)
  • Through a connection relay service
  • By using the NAPT devices IP address, and a port number pre-configured to correspond to the server.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

ICMP can carry messages from… (Check all that apply)

A
  • Destination Host to Source Host
  • Router to Router
  • Source Host to Destination Host
  • Router to Sender Host
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

In network graph terminology, [a] represent routers.

A

Nodes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

When a destination host’s IP fragment timer expires, it drops all accumulated fragments corresponding to that timer.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Select all features explicitly available in IPv6 which were already available explicitly in IPv4.

A
  • Source/Destination Addressing
  • Version
  • Traffic Type
  • Hop Limit
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Select all features explicit in IPv6 which are not explicitly available in IPv4. (Check all that apply)

A
  • Explicit Payload Length
  • 128-bit addresses
  • Flow labeling
  • Extension Headers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

In IPv6, there is no datagram fragmentation performed in the network core..

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The IPv6 address size is 128 bits.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

When encountering an IPv4-only router, an IPv6 datagram is dropped.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

In IPv6, datagram fragmentation is_____.

A

handled at the network edge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Convert the following IPv4 address to its corresponding IPv6-mapped address, with proper formatting.

114.18.222.10

A

::ffff:7212:de0a

::ffff:114.18.222.10

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

1234:0a03::abcd is a valid preferred-format IPv6 address.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

1234::a03::abcd is a valid preferred-format IPv6 address.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which of the following are used in a wired Ethernet network? (Check all that apply)

A
  • Collision Detection (CD)
  • Carrier Sense Multi-Access (CSMA)
  • Exponential back-off/retry for collision resolution
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Given the following received byte on an odd-parity machine, there is definitely at least one error.

01001101

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Select all “Taking Turns” schemes below.

A
  • Token Ring Multiple Access

* Polling Multiple Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Select all Channel Partitioning schemes below.

A
  • WDMA
  • TDMA
  • FDMA
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

The method by which a MAC protocol coordinates access to a broadcast medium to prevent and/or reduce collisions is most commonly called ________

A

Multiple Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

A link-layer link between only two adjacent nodes is called a/an point to point link.

A

Point to point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

A link-layer link between more than two adjacent nodes is called a/an _____ link.

A

Broadcast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

A switch is a network-layer device.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Star Ethernet uses the same multiple access control as Bus Ethernet.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

It is fairly easy to detect collisions in wireless networks.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

A network with a _____ topology must terminate the endpoints, but in with a ______ topology they are connected so there is no endpoint.

A
  • Bus

* Ring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

The link-layer device at the center of an ethernet star is a ______________.

A

Switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

When sending a message to all devices on a link, you would send it to the broadcast MAC address: 00-00-00-00-00-00

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Given the following received byte on an even-parity machine, there is definitely at least one error.

01001101

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

A multiple access scheme which divides the usable medium into “chunks” and allows each device sole acces to some number of “chunks” is called…

A

Channel Partitioning Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

A multiple access scheme which uses a master node to poll each slave node, and control who has ‘permission’ to transmit at any given time is called…

A

“Taking Turns” Protocol

34
Q

On the sending or receiving host, most of the protocol tasks “below” the application layer of the protocol stack (data encapsulation, IP addressing, etc. ) are handled by

A

The Network Interface Controller (NIC)

35
Q

Ethernet Provides…

A

Error detection via CRC check

36
Q

There are reserved MAC addresses unusable for devices.

A

True

37
Q

A protocol designed to control access to a medium is most commonly called a

A

Multiple Access Protocol

38
Q

https://s3.amazonaws.com/classconnection/350/flashcards/1550350/jpg/capture-16240C0E828144EC555.jpg

A
  1. D’s IP address
  2. RouterA’s NIC#1 IP address
  3. RouterA’s NIC#1 MAC Address
  4. RouterA’s NIC#1 MAC Address
  5. D’s IP Address
  6. D’s IP Address
  7. D’s MAC Address
  8. D’s MAC Address
  9. D’s IP Address
39
Q

In network graph terminology, [a] represent costs.

A

Weights

40
Q

ICMP messages are carried within the payload of IP datagrams.

A

True

41
Q

If hosting a server inside a NATed network, how do clients outside the NAPT router connect to the server? (Check all that apply)

A
  • Through a connection relay service
  • Using Universal Plug and Play (UPnP)
  • By using the NAPT devices IP address, and a port number pre-configured to correspond to the server.
42
Q

Given an internet represented as a weighted undirected graph, the shortest path between node X and node Y is the path that…

A

has the smallest sum of edge weights

43
Q

ICMP can carry messages from… (Check all that apply)

A
  • Source Host to Destination Host
  • Router to Sender Host
  • Destination Host to Source Host
  • Router to Router
44
Q

In a prefix-matching network, a routing table stores… (Check all that apply)

A
  • Next-Hop Link Information

* IP Prefixes

45
Q

The “traceroute” application (on Windows) sends UDP messages by default.

A

False

46
Q

The “time to live” field in a modern IPv4 datagram header specifies…

A

the number of remaining hops before the datagram is dropped.

47
Q

IPv6 datagrams cannot be converted to IPv4 datagrams without losing any information.

A

True

48
Q

The IPv6 header does not have a checksum.

A

True

49
Q

In IPv6, datagram fragmentation is ______.

A

handled at the network edge

50
Q

The transition from IPv4 to IPv6 requires that ____________. (Check all that apply)

A
  • IPv4 routers still in use must “tunnel” IPv6 datagrams, by fragmenting/encapsulating them in IPv4 datagrams
51
Q

The IPv6 address size is 120 bits.

A

False

52
Q

When encountering an IPv4-only router, an IPv6 datagram is dropped.

A

False

53
Q

1234:0a03::abcd is a valid preferred-format IPv6 address.

A

False

54
Q

1234:aac:a03::abcd is a valid preferred-format IPv6 address.

A

True

55
Q

::ffff:ffff:fffff is a valid preferred-format IPv6 host address.

A

False

56
Q

https://s3.amazonaws.com/classconnection/350/flashcards/1550350/jpg/capture-16240C85B6570EA407B.jpg

A
  • 2

* 4

57
Q

Given the following received byte on an odd-parity machine, there is definitely at least one error.

01001101

A

True

58
Q

A “collision” is best described as…

A

when a node receives two or more frames at the same time.

59
Q

On the sending or receiving host, most of the protocol tasks “below” the application layer of the protocol stack (data encapsulation, IP addressing, etc. ) are handled by

A

the network interface controller (NIC)

60
Q

In Random Access multiple access schemes, no two nodes will ever transmit at the same time.

A

False

61
Q

A protocol designed to control access to a medium is most commonly called a

A

multiple access protocol

62
Q

ETHERNET FRAME QUESTION

https://s3.amazonaws.com/classconnection/350/flashcards/1550350/jpg/capture-16240CC620771D470AD.jpg

A
  • Hardware framing characters
  • hardware frame header
  • IP header
  • TCP/UDP header
63
Q

Select all Random Access schemes below.

A
  • ALOHA

* CSMA

64
Q

A MAC address was originally designed to be permanent and unique.

A

True

65
Q

Which are functions of the Ethernet preamble? (Check all that apply)

A
  • Clock synchronization
  • Circuit wake-up
  • Start Signal
66
Q

When sending a message to all devices on a link, you would send it to the broadcast MAC address: 00-00-00-00-00-00

A

False

67
Q

https://s3.amazonaws.com/classconnection/350/flashcards/1550350/jpg/capture-16240CE682E4584C77B.jpg

A
  • Parity

* Parity

68
Q

A switch is a network-layer device.

A

False

69
Q

There are reserved MAC addresses unusable for devices.

A

True

70
Q

It is fairly easy to detect collisions in wireless networks.

A

False

71
Q

A multiple access scheme which listens to the channel to make sure it is empty, prior to transmitting, is called…

A

Carrier sense protocol

72
Q

A MAC address is permanent and unique.

A

False

73
Q

A link-layer link between more than two adjacent nodes is called a/an _____ link.

A

Broadcast

74
Q

Select all Channel Partitioning schemes below.

A
  • FDMA
  • WDMA
  • TDMA
75
Q

In a CSMA/CD system, when a collision is detected, …

A

the sender will cut off transmission and wait some time before retransmitting.

76
Q

https://s3.amazonaws.com/classconnection/350/flashcards/1550350/jpg/capture-16240D09C2A75541E51.jpg

A

D’s IP address RouterA’s NIC#1 IP address RouterA’s NIC#1 MAC address RouterA’s NIC#1 MAC address D’s IP address D’s IP address D’s MAC address D’s MAC address
D’s IP address

77
Q

When encountering an IPv4-only router, an IPv6 datagram is _____ an IPv4 datagram, with the _____ as its destination.

A
  1. encapsulated in

2. next in-line IPv6 router

78
Q

1234::a03:abcd is a valid preferred-format IPv6 address.

A

True

79
Q

Most modern Ethernet LANs use a _____ topology.

A

Star

80
Q

Bus Ethernet uses a random access scheme.

A

True