Module 7 Flashcards

1
Q

A channel partitioning protocol has which of the following characteristics:

A

all of the above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

In slotted ALOHA with N active nodes, the probability that no node transmits in a given slot is

A

(1-p)^N

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

An ARP query packet is encapsulated in

A

a link-layer broadcast frame

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Ethernet provides which of the following services to the network layer

A

error detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

For Ethernet, if an adapter determines that a frame it has just received is addressed to a different adapter

A

it discards the frame without sending an error message to the network layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

In the Ethernet CSMA/CD protocol, suppose a node constructs a frame and then senses the channel as busy. Then

A

the adapter waits until it senses the channel idle and then begins to transmit the frame.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

In CSMA/CD, after the 3rd collision, what is the probability that the value of K that a node chooses is 2?

A

.125

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A 10BaseT Ethernet LAN has

A

a star topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

When a switch transmits an Ethernet frame, the Ethernet frame has

A

none of the above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The switch poisoning attack involves:

A

sending many packets to the switch with different bogus source MAC addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A cut-through switch has which of the following properties:

A

all of the above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

TF: All link layer protocols that support IP have the same frame structure (i.e., length of frame, number and length of header fields).

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

TF: CRC error detection, as used in Ethernet, is always able to detect whether there is an error in a frame.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

TF: The even parity bit scheme can correct single bit errors.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

TF: With CDMA, each sender uses the same code, cm, m=1,…,M.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

TF: Each LAN adapter has a unique LAN address.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

TF: Consider a router with multiple ARP tables, one for each of its interfaces. No two of these ARP tables can contain the same LAN address.

16
Q

TF: Consider a twisted-pair Ethernet in which all nodes are 50 meters from the hub. The time it takes for a bit to propagate from hub to node for a 10BaseT Ethernet is ten times longer then for a 100BaseT Ethernet.

17
Q

TF: The entries in a switch table need to be configured by the network administrator.

18
Q

TF: PPP excludes certain bit patterns in the network-layer packets that it carries.

19
Q

TF: Consider the switched LAN architecture in Figure 5.24. Assuming all links are full duplex, there are never collisions in this LAN.

20
Q

TF: Consider a computer network consisting of several interconnected 10BaseT hubs, but which does not include any bridges or routers. Then this network has only one collision domain.

21
Q

Which of the following services may be implemented in a link-layer protocol? Select one or more statements.

A

Reliable data transfer between directly connected nodes.

Coordinated access to a shared physical medium.

Bit-level error detection and correction.

Multiplexing down from / multiplexing up to a network-layer protocol.

Flow control between directly connected nodes.

22
Q

Which of the following statements is true about a two-dimensional parity check (2D-parity) computed over a payload?

A

2D-parity can detect any case of a single bit flip in the payload.

2D-parity can detect any case of two bit flips in the payload.

2D-parity can detect and correct any case of a single bit flip in the payload.

23
Q

Which of the following statements is true about channel partitioning protocols?

A

Channel partitioning protocols can achieve 100% channel utilization, in the case that all nodes always have frames to send.

There can be times when the channel is idle, when a node has a frame to send, but is prevented from doing so by the medium access protocol.

24
Q

Which of the following statements is true about both Pure Aloha, and CSMA (both with and without collision detection?

A

Pure Aloha and CSMA can achieve 100% utilization, in the case that there is only one node that always has frames to send

There can be simultaneous transmissions resulting in collisions.

25
Q

Which of the following statements is true about polling and token-passing protocols?

A

These protocol can achieve close 100% utilization, in the case that there is only one node that always has frames to send (the fact that the utilization is close to, but not exactly, 100% is due to a small amount of medium access overhead but not due to collisions)

These protocol can achieve close to 100% channel utilization, in the case that all nodes always have frames to send (the fact that the utilization is close to, but not exactly, 100% is due to a small amount of medium access overhead but not due to collisions)

26
Q

Consider the following multiple access protocols that we’ve studied: (1) TDMA, and FDMA (2) CSMA (3) Aloha, and (4) polling. Which of these protocols are collision-free (e.g., collisions will never happen)?

A

TDMA and FDMA

Polling

(This and the other three similar questions all have the same answers as above.)

27
Q

Consider the following multiple access protocols that we’ve studied: (1) TDMA, and FDMA (2) CSMA (3) Aloha, and (4) polling. Which of these protocols requires some form of centralized control to mediate channel access?

A

TDMA and FDMA

Polling

(This and the other three similar questions all have the same answers as above.)

28
Q

Consider the following multiple access protocols that we’ve studied: (1) TDMA, and FDMA (2) CSMA (3) Aloha, and (4) polling. For which of these protocols is the maximum channel utilization 1 (or very close to 1)?

A

TDMA and FDMA

Polling

(This and the other three similar questions all have the same answers as above.)

29
Q

Consider the following multiple access protocols that we’ve studied: (1) TDMA, and FDMA (2) CSMA (3) Aloha, and (4) polling. For which of these protocols is there a maximum amount of time that a node knows that it will have to wait until it can successfully gain access to the channel?

A

TDMA and FDMA

Polling

(This and the other three similar questions all have the same answers as above.)

30
Q

(A) We’ve now learned about both IPv4 addresses and MAC addresses. Consider the address properties below, and use the pulldown menu to indicate which of these properties is only a property of MAC addresses (and therefore is not a property of IPv4 addresses - careful!).

A

This is a 48-bit address.

This is a link-layer address.

This address remains the same as a host moves from one network to another.

31
Q

(B) We’ve now learned about both IPv4 addresses and MAC addresses. Consider the address properties below, and use the pulldown menu to indicate which of these properties is only a property of IPv4 addresses (and therefore is not a property of MAC addresses - careful!).

A

This is a 32-bit address.

This is a network-layer address.

This address is allocated by DHCP.

32
Q

(C) We’ve now learned about both IPv4 addresses and MAC addresses. Consider the address properties below, and use the pulldown menu to indicate which of these properties is a property of both IPv4 addresses and MAC addresses.

A

This address must be unique among all hosts in a subnet.

33
Q

Use the pulldown menus below to match the name of the field with the function/purpose of a field within an Ethernet frame.

  1. Cyclic redundancy check (CRC) field
  2. Source address field
  3. Data (payload) field
  4. Type field
  5. Sequence number field
A
  1. Used to detect and possibly correct bit-level errors in the frame.
  2. 48-bit MAC address of the sending node.
  3. The contents of this field is typically (bit not always) a network-layer IP datagram.
  4. Used to demultiplex the payload up to a higher level protocol at the receiver.
  5. This field does not exist in the Ethernet frame
34
Q

Suppose an Ethernet frame arrives to an Ethernet switch, and the Ethernet switch does not know which of its switch ports leads to the node with the given destination MAC address? In this case, what does the switch do?

A

Flood the frame on all ports except the port on which the frame arrived.

35
Q

Which of the following statements are true about a self learning switch?

A

A self-learning switch will age-out (forget) a self-learned association of a MAC address x and switch port y if it doesn’t see a frame with MAC address x incoming on switch port y after some amount of time.

A self-learning switch frees a network manager from a least one configuration task that might be associated with managing a switch

A self learning switch associates the source MAC address on an incoming frame with the port on which it arrived, and stores this matching in a table. The switch has now learned the port that leads to that MAC address.

36
Q

Consider the simple star-connected Ethernet LAN shown below, and suppose the Ethernet switch is a learning switch, and that the switch table is initially empty. Suppose C sends an Ethernet frame address to C’ and C ‘ replies back to C. How many of these two frames are also received at B’s interface?

37
Q

Consider the simple star-connected Ethernet LAN shown below, and suppose the switch table contains entries for each of the 6 hosts. How will those entries be removed from the switch table?

A

An entry for a host will be removed if that host doesn’t transmit any frames for a certain amount of time (that is, table entries will timeout).

38
Q

Which of the following statements are true about MAC (link-layer) addresses? Select one or more statements below.

A

Has 48 bits.

Generally stays unchanged as a device moves from one network to another.

Generally does not change, and is associated with a device when it is manufactured/created.

39
Q

An ARP query packet is encapsulated in

A

a link-layer broadcast frame

40
Q

Which one of the statements below is not true about how entries in a switch forwarding table are created?

A

Entered manually

Created by the routing algorithm