Week 9 Summary Flashcards
ICMP messages are carried within the payload of IP datagrams.
TRUE
In network graph terminology, [a] represent routers.
Nodes
For a TCP/IP datagram leaving a home network through a NAPT device, which of the following header fields (IP and/or TCP) are altered?
Source IP Address
Source Port
Header Checksum
TRUE
It is the responsibility of a routing algorithm to correlate MAC addresses with IP addresses.
FALSE
Network address translation has ameliorated the IP address shortage problem.
TRUE
For a TCP/IP datagram coming into a home network through a NAPT device, which of the following header fields (IP and/or TCP) are altered? (Check all that apply)
Destination Port
Destination IP address
Header Checksum
TRUE
If an IP datagram is fragmented into 1000-byte fragments, and later encounters a link with an 800-byte MTU, a special procedure (other than standard IP fragmentation) must be used.
FALSE
The path MTU is the smallest MTU on a path from sender to receiver.
TRUE
Select all features explicit in IPv6 which are not explicitly available in IPv4. Flow Labeling 128-bit Addresses Extension Headers Payload Length
TRUE
When encountering an IPv4-only router, an IPv6 datagram is [ Select ] an IPv4 datagram, with the [ Select ] as its destination.
encapsulated in
next in-line IPv6 router
TRUE
In IPv6, there is no datagram fragmentation performed in the network core..
TRUE
It is the responsibility of a routing algorithm to determine a datagram’s next hop information.
TRUE
In IPv6, datagram fragmentation is handled at the
network edge
Already available in IPv4
Source/Destination Address, Hop Limit, Version, Traffic Type,
Random Access Schemes
ALOHA, CSMA
It is the responsibility of a routing algorithm to find a datagram’s path through a network.
TRUE
A link-layer link between only two adjacent nodes is called a/an point to point link.
TRUE
To retrieve an adjacent node’s MAC address, ______ is used.
ARP
Taking Turns schemes
Polling Multiple Access, Token Ring Multiple Access
Bus Ethernet uses a random access scheme.
TRUE
A “collision” is best described as…
when a node receives two or more frames at the same time.
On the sending or receiving host, most of the protocol tasks “below” the application layer of the protocol stack (data encapsulation, IP addressing, etc. ) are handled by
the network interface controller (NIC)
The method by which a MAC protocol coordinates access to a broadcast medium to prevent and/or reduce collisions is most commonly called ________
multiple access
The data-link layer provides logical communications between [ Select ] and [ Select ] .
adjacent node, adjacent node
Which are functions of the Ethernet preamble?
Clock synchronization
Start signal
Circuit wake-up
A link-layer link between more than two adjacent nodes is called a/an [ Select ] link.
broadcast
In Random Access multiple access schemes, no two nodes will ever transmit at the same time.
FALSE
Which of the following are used in a wired Ethernet network?
Carrier Sense Multi-Access (CSMA)
Collision Detection (CD)
Exponential back-off/retry for collision resolution
TRUE
In a CSMA/CD system, when a collision is detected, …
the sender will cut off transmission and wait some time before retransmitting.