Week 9 Summary Flashcards

1
Q

ICMP messages are carried within the payload of IP datagrams.

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

In network graph terminology, [a] represent routers.

A

Nodes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

For a TCP/IP datagram leaving a home network through a NAPT device, which of the following header fields (IP and/or TCP) are altered?
Source IP Address
Source Port
Header Checksum

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

It is the responsibility of a routing algorithm to correlate MAC addresses with IP addresses.

A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Network address translation has ameliorated the IP address shortage problem.

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

For a TCP/IP datagram coming into a home network through a NAPT device, which of the following header fields (IP and/or TCP) are altered? (Check all that apply)
Destination Port
Destination IP address
Header Checksum

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

If an IP datagram is fragmented into 1000-byte fragments, and later encounters a link with an 800-byte MTU, a special procedure (other than standard IP fragmentation) must be used.

A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The path MTU is the smallest MTU on a path from sender to receiver.

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
Select all features explicit in IPv6 which are not explicitly available in IPv4. 
 Flow Labeling
 128-bit Addresses
 Extension Headers
 Payload Length
A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

When encountering an IPv4-only router, an IPv6 datagram is [ Select ] an IPv4 datagram, with the [ Select ] as its destination.

encapsulated in

next in-line IPv6 router

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

In IPv6, there is no datagram fragmentation performed in the network core..

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

It is the responsibility of a routing algorithm to determine a datagram’s next hop information.

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

In IPv6, datagram fragmentation is handled at the

A

network edge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Already available in IPv4

A

Source/Destination Address, Hop Limit, Version, Traffic Type,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Random Access Schemes

A

ALOHA, CSMA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

It is the responsibility of a routing algorithm to find a datagram’s path through a network.

A

TRUE

17
Q

A link-layer link between only two adjacent nodes is called a/an point to point link.

A

TRUE

18
Q

To retrieve an adjacent node’s MAC address, ______ is used.

A

ARP

19
Q

Taking Turns schemes

A

Polling Multiple Access, Token Ring Multiple Access

20
Q

Bus Ethernet uses a random access scheme.

A

TRUE

21
Q

A “collision” is best described as…

A

when a node receives two or more frames at the same time.

22
Q

On the sending or receiving host, most of the protocol tasks “below” the application layer of the protocol stack (data encapsulation, IP addressing, etc. ) are handled by

A

the network interface controller (NIC)

23
Q

The method by which a MAC protocol coordinates access to a broadcast medium to prevent and/or reduce collisions is most commonly called ________

A

multiple access

24
Q

The data-link layer provides logical communications between [ Select ] and [ Select ] .

A

adjacent node, adjacent node

25
Q

Which are functions of the Ethernet preamble?

A

Clock synchronization
Start signal
Circuit wake-up

26
Q

A link-layer link between more than two adjacent nodes is called a/an [ Select ] link.

A

broadcast

27
Q

In Random Access multiple access schemes, no two nodes will ever transmit at the same time.

A

FALSE

28
Q

Which of the following are used in a wired Ethernet network?
Carrier Sense Multi-Access (CSMA)
Collision Detection (CD)
Exponential back-off/retry for collision resolution

A

TRUE

29
Q

In a CSMA/CD system, when a collision is detected, …

A

the sender will cut off transmission and wait some time before retransmitting.