Network Elements, Routing Flashcards
The factors that determine the nature of a LAN are
1) Topology
2) Transmission medium
3) Medium access control technique
All of them
LAN relates to ______ w.r.t ISO model
1) higher layer protocols
2) lower layer protocols
2) lower layer protocols
(higher layer protocols are independent of network architecture)
The functions associated with providing service to the LAN users comprise
1) LLC
2) MAC
3) both
4) none
both
MAC: Medium Access Control
LLC: Logical Link Control
A special type of tree topology
1) star
2) bus
3) ring
bus
tree can be considered as multiple interconnected bus networks
To implement ring network topology, one uses
1) FDDI
2) SONET
3) Token Ring
All of them
FDDI: Fiber Distributed Data Interface
SONET: Synchronous Optical Network
In _________ topolgy, medium access control is needed to determine when each station may insert frames
1) star
2) bus
3) ring
4) tree
ring
The two alternatives for the operation of the central node in star topology
1) to operate in broadcast fashion
2) ________
to act as a frame switching device
The two alternatives for the operation of the central node in star topology
1) ________
2) to act as a frame switching device
to operate in broadcast fashion
MAC (Medium Access Control) can be implemented in
1) centralized fashion
2) distributed fashion
both
Round robin is
1) centralized fashion
2) distributed fashion
may be centralized or distributed
Polling is an example of
1) centralized fashion
2) distributed fashion
centralized fashion
Reservation is
1) centralized fashion
2) distributed fashion
may be centralized or distributed
For bursty traffic, an appropriate MAC technique is
1) round robin
2) reservation
3) contention
contention
The MAC frame includes
1) LLC PDU
2) CRC
both
LLC: Logical Link Control
CRC : The cyclic redundancy check field ( also known as the frame check
sequence, FCS, field)
MAC and LLC stand for
MAC: Medium Access Control
LLC: Logical Link Control
The ________ layer is responsible for detecting errors and discarding any frames that are in error
1) MAC
2) LLC
MAC layer
The ____ layer optionally keeps track of which frames have been successfully
received and retransmits unsuccessful frames
1) MAC
2) LLC
LLC layer
Ethernet access method
1) CDMA
2) CSMA
3) CSMA/CD
3) CSMA/CD
Carrier Sense Multiple Access/Collision Detect
IEEE 802.3 Medium Access Control
_______ include a repeater function
1) Passive hubs
2) active hubs
active hubs
Advantages of the newer 10 BaseT hubs are
1) Each port has exclusive access to its bandwidth (no CSMA/ CD)
2) Hubs may be cascaded to add additional ports
3) include an SNMP (Simple Network Management Protocol) agent
4) used to connect workgroup hubs to form a larger network
1,2,3
4 is for switch
SNMP stands for
Simple Network Management Protocol
They establish logical connections between ports based on MAC
addresses
1) layer-2 switches
2) layer-3 switches
layer-2 switches
?? (layer-2 switches: network address)
Use ______ switches for segmenting existing network into smaller collision domains to improve performance
1) layer-2 switches
2) layer-3 switches
layer-2 switches
____ are based on routing
technologies
1) layer-2 switches
2) layer-3 switches
layer-3 switches
(layer-2 switches are based on bridging technologies)
____ are based on bridging
technologies
1) layer-2 switches
2) layer-3 switches
layer-2 switches
(layer-3 switches are based on routing technologies)
They establish logical connections between ports based on network
addresses
1) layer-2 switches
2) layer-3 switches
layer-3 switches
(layer-2: MAC address)
The IEEE ______ specification is the
standard for bridges.
1) 802.1A
2) 802.1B
3) 802.1C
4) 802.1D
802.1D
________ interconnect Ethernet segments.
1) Hubs
2) Bridges
3) Switches
Bridges
it is _________ (possible/not possible) to interconnect different segments which use different MAC protocols
possible
bridges work at the MAC layer
layer-2
layer-3
layer-2
MAC layer
Bridges work at the _____________ of the OSI model.
1) Physical
2) Data Link
3) Network
4) Transport
Data Link layer
bridges use _______ addresses to create routing table
1) source
2) destination
source addresses
If a bridge knows the location of the destination node, it forwards the packet to it. If it does not know the destination,
1) it blocks the packet
2) it forwards the packet to all segments.
it forwards the packet to all segments.
small delays can be introduced using bridges (T/F)
T
Routers work at the _____________ of the OSI model.
1) Physical
2) Data Link
3) Network
4) Transport
Network (or higher)
The routing table maintained by a bridge contains _____ for each node
1) Media Access Control sublayer addresses
2) network numbers
Media Access Control sublayer addresses
The routing table maintained by a router contains
1) Media Access Control sublayer addresses
2) network numbers
network numbers
(router works at network layer or higher)
Routers _________ broadcast messages
1) forward
2) don’t forward
don’t forward
(broadcast storms can be isolated)
a router _______ (can/cannot) route a packet from a TCP/IP Ethernet network to a server on a TCP/IP Token Ring Network
can route
(As packets are passed from router to router, Data Link layer source and
destination addresses are stripped off and then recreated)
Routers look at
1) destination node address
2) network address
3) both
network address only
which of the following protocols are non-routable
1) XNS
2) LAT
3) IPX
4) NetBEUI
all of them
remote administration and configuration via
1) HSL
2) SNMP
3) OSPF
1) SNMP
In routing, the ________ the metric, the better is the path
1) smaller
2) higher
smaller
__________ cost router are faster routes
1) lower
2) higher
lower
Routing through links with greater
bandwidth _____ provide the best routes
T/F
F
does not always. If high-speed link is busy, low-speed link might be faster at that time.
distance vector routing and link state routing are
1) static routing algorithms
2) dynamic routing algorithms
dynamic routing algorithms
IP RIP is an example of
1) distance vector routing
2) link state routing
distance vector routing
________do not take line bandwidth into account when choosing the routes
1) distance vector routing
2) link state routing
distance vector routing
routers with _______ routing has no knowledge of distant routers and how they interconnect
1) distance vector routing
2) link state routing
distance vector routing
_____algorithm maintain a complex database of topology information
1) distance vector routing
2) link state routing
ink state routing
(also known as shortest path first (SPF)
shortest path first (SPF) refers to
1) distance vector routing
2) link state routing
link state routing
Examples of link state routing protocols
1) OSPF
2) RIP
3) NLSP
4) IS-IS
1,3,4 (IRP is distance vector)
OSPF: Open shortest path first
NLSP: NetWare Link Services Protocol
IS-IS: Intermediate System-to-Intermediate System
In link state routing _______ are passed from one router to neighboring router
1) copies of routing tables
2) link state packets
link state packets
In distance vector routing, _______ are passed from one router to neighboring router
1) copies of routing tables
2) link state packets
copies of routing tables
______ has faster convergence
1) distance vector routing
2) link state routing
link state routing
Interior routing protocols
1) OSPF
2) RIP
3) BGP
OSPF and RIP
(Routing Information Protocol)
(BGP is exterior routing)
Exterior routing protocols
1) OSPF
2) RIP
3) BGP
BGP
In routing, the ________ the hop count, the better is the path
1) lower
2) higher
lower
A conglomeration of variables that change with
internetwork conditions, delay is common and useful metric
T
distributed Bellman-Ford routing algorithm and the Ford-Fulkerson algorithm are the names of
1) distance vector routing
2) link state routing
distance vector routing algorithm
It was the original ARPANET routing algorithm and was also used in the Internet under the name RIP
1) distance vector routing
2) link state routing
distance vector routing
___ do not take line bandwidth into account when choosing the routes
1) distance vector routing
2) link state routing
distance vector routing
Updates are triggered by events. Results in
faster convergence
1) distance vector routing
2) link state routing
link state routing
Periodic & Frequent Updates results in
slow convergence
1) distance vector routing
2) link state routing
Distance vector routing
____ is of concern to service providers and other large or complex networks
1) Interior Routing
2) Exterior Routing
Exterior Routing