hello quizlet
Home
Subjects
Expert solutions
Create
Study sets, textbooks, questions
Log in
Sign up
Upgrade to remove ads
Only $35.99/year
Science
Computer Science
476 Comprehensive
Flashcards
Learn
Test
Match
Flashcards
Learn
Test
Match
Terms in this set (137)
TEST 1 MULTIPLE CHOICE
TEST 1 MULTIPLE CHOICE
Which TCP/IP layer is responsible for transferring a packet from one host to another host?
Network
DNS is a _____ layer protocol
Application
A browser requests the file index.html which contains links for three images in an environment where non-persistent connections are used. How many connections will be needed to download the index.html and the associated images
Four connections, one for the HTML document and one for each of the images
A browser requests the file index.html which contains links for three images in an environment where persistent connections are used. How many connections will be needed to download the index.html and the associated images
One connection will be needed. It will be used for the HTML document and all the images
Which of the following applications is most suitable for implementation using UDP
Podcast streaming
TEST 2 MULTIPLE CHOICE
TEST 2 MULTIPLE CHOICE
Simple Network Management Protocol (SNMP) is a ______ layer protocol
Application
Which TCP/IP layer is responsible for delivering data to the correct destination process
Transport
Which of the following layers are implemented on network core routers
Network, Data Link, Physical
All computers on the campus local area network must travel through a single campus gateway. The transmission rate from local campus hosts to the gateway is R1. The campus gateway is connected to a regional ISP using a single access link with a bandwidth R2. R1 is much greater than R2 and there is virtually no delay from the hosts to the gateway. If web access to off-campus servers is extremely slow, which of the following options is most likely to be the most efficient strategy to increase web access speeds
Adding a computer to the local area network to be used as a proxy server.
The current rate that data is being received using a link capable of transferring at 5 Gbps is only 2.3 Gbps . This measure of the current rate is known as
Instantaneous throughput
Which of the following is not a TCP header field
IP Address
Protocol that allows all the host on a local network to share a single public IP address
NAT
IP is a ____ layer protocol
Network
____ is the foundation on which all the internet-based protocols and internetworking is based
IP
Responsible for delivering datagrams from one node to a physically adjacent node over a link
Link
Number of bytes in an IPV6 Address
16
The Slotted Aloha is a _____ protocol
random access
The most typical use of ICMP is _____
error reporting
When a router in a network using a DV routing protocol detects a link change, it will___
send its updated routing table to all neighbors
Listen before transmitting and if the channel is idle send entire frame otherwise defer transmission
CSMA
TEST 3 MULTIPLE CHOICE
TEST 3 MULTIPLE CHOICE
Wireless Link between a mobile device and a base station. It also allocates IP addresses to mobile devices
Radio acess network
The last LTE element that a datagram originating at a mobile device encounter before entering the larger Internet
Packet Data Network Gateway (P-GW)
With the 892.11 CSMA/CA Protool, a station transmits its frame after it senses the channel idle and waiting a short period of time called the
Distributed Inter-frame Space (DIFS)
A cellular network is partitioned into several geographic coverage areas, known as:
cells
The token ring is a _____ protocol
Taking turns
The globally unique 64 bit identifier attached to a mobile device
IMSI
Ethernet switches are _____ layer devices
Link
Physical obstructions in the environment that may prevent nodes from hearing each other's transmissions
Hidden Terminal Problem
What can bad actors do on a network?
Eavesdrop, DOS, Hijacking, Impersonation
Which of the following attacks describes when the attacker has a copy of the plaintext and corresponding cipher text?
Known plaintext attack
Maintains a database in the mobile devices home network that stores information about the mobile devices in that network
Home Subscriber Server (HSS)
Coordinator for mobile device services: authentication, mobility management
Mobility Management Entity (MME)
Only the sender and intended receiver should be able to understand the contents of the transmitted message
Confidentiality
Actions to establish who you are
Identification
Symmetric key encryption algorithm
RSA
The CDMA is a ____ protocol
Channel Partitioning
Sits at the "edge" of the carrier's network and is responsible for managing the wireless radio resources and the mobile devices with its coverage area
Base Station
The payload in th elink-layer frame is a
datagram
TEST 1 FILL IN THE BLANK
TEST 1 FILL IN THE BLANK
The process that TCP uses to establish a connection is called a
3-way handshake
_____ is the protocol used to transfer data from one mail server to another
SMTP
___ is used by TCP to detect lost/dropped packets
Timer
A protocol defines the ____ and the ____ of messages exchanged between two or more communication entities, as well as the ___ taken on the transmission and/or receipt of a message or other event
format, order, actions
Since TCP/IP uses encapsulation a network layer datagram will consist of two major parts
TCP Header, TCP Segment
_____ is used by TCP flow control to indicate at any point in time how much data the receiver can potentially receive from the sender
Receive Window
TEST 2 FILL IN THE BLANK
TEST 2 FILL IN THE BLANK
_____ is where the routing information produced by the Control Plane is stored for use by the Data Plane forwarding operation
Forwarding Table
___ is the major router component that implements the control plane
Routing processor
_____ finds the corresponding IP address for a a hostname/URL
DNS
A ____ occurs when a packet at the front of a router input queue cannot be processed through the switch fabric because of a conflict, but something further down the queue could be processed but is prevented because it must wait for the packet at the front.
Head-of-line block
______ is a group of routers that are under the same administrative control. These routers run the same routing algorithm and are often the routers in an ISP
Autonomous System
With generalized forwarding the flow table consists of two major entries: a match rule and a corresponding ___
action
_____ is arguably the most important of all the Internet protocols that is described as the "glue that holds the Internet together"
BGP
____ is the most versatile of the switch fabric technologies
Crossbar
TEST 3 FILL IN THE BLANK
TEST 3 FILL IN THE BLANK
___ carries frames between VLANs defined over multiple physical switches
Trunk Port
___ is a number that a protocol will use only once in a lifetime
Nonce
An ___ network, wireless hosts do not have abase station that they can connect to, and must provide services like routing for themselves
Ad hoc
A ___ is any physical location where a wireless station receives a sufficiently strong signal from two or more APs
Wifi Jungle
___ is a random-access protocol for 802.11 wireless LANs
CSMA/CA
The two modes of wireless network operation are ___ which includes an Access Point and Ad hoc where devices/hosts communicate directly with each other
Infrastructure
___ propagation occurs when portions of the electromagnetic wave reflect off objects and the ground, taking paths of different lengths between a sender and receiver
Multi-path
TEST 1 TRUE FALSE
TEST 1 TRUE FALSE
SMTP or HTML can be used to send a message from a user agent to the sender's mail server
True
HTTP is a stateless protocol
True
A single link configured to use circuit switching cannot service more than one simultaneous connection
False
Peer-To-Peer networks do not scale well because there are no dedicated servers
False
Because of DNS limitations, hostnames for mail servers cannot be aliased
False
TCP does not rely on IP addresses
True
TCP uses positive and negative acknowledgements
False
UDP performs no error checking since it is a best effort protocol
False
An HTTP request will always initiate a TCP three-way handshake
True
Checksum can detect one and two bit transmission errors
False
TCP sequence numbers start at zero and increase up to the size of the message being transmitted
False
Request for Comments is the mechanism for standardizing new protocols
True
Circuit switching is typically more efficient than packet switching when network traffic is very dense
False
UDP gives hosts more control over the timing of events than TCP
False
An application can be programmed for reliable data transfer using UDP at the transport layer
False
TCP can be used to connect three or more hosts in a single session
True
UDP performs no error correction since it is a best effort protocol
True
WiFi is a form of guided media
False
Checksum can always detect one bit transmission errors
True
TEST 2 TRUE FALSE
TEST 2 TRUE FALSE
IPV6 has a 32-bit address space
False
All IPv4 datagram headers will be the same size
False
Link State are centralized routing algorithms
True
Routers are limited to one interface
False
TDM and FDM allow multiple packets to be sent simultaneously on the same link
True
If the value 11101101 is being transmitted using even parity, then the parity bit will be set to 0
True
CRC is a quicker and simpler error detection algorithm as compared with parity checks
False
The route selected through the internet for a packet is often dictated by policy and not efficiency
True
The Link layer is implemented in software and hardware
True
IP is a best effort protocol
True
The crossbar allows multiple packets to be forwarded to different router output ports at the same time
True
MAC addresses are typically represented by 12 hex digits
True
Routers and Link Layer switches require setup configuration by the system admin.
False
TDM and FDM are both taking turns protocols
False
The Link Layer spans the gap between network hardware and software
True
Switches are transparent to the other network devices on a LAN
True
The route selected through the Internet for a packet is often dictated by policy and not efficiency
True
Like an IP address, the MAC address of a computer will change when moved to a different network
False
IP is a reliable protocol
False
TEST 3 TRUE FALSE
TEST 3 TRUE FALSE
Bluetooth networks are also known as piconets
True
For a given SNR, a modulation technique with a higher bit transmission rate will have a higher BER
True
Passive scanning occurs when a wireless device broadcasts a probe that will be received by all APs in its range
False
A digital certificate binds a public key to a particular entity
True
Switches are transparent to the end hosts
True
MAC addresses on mobile devices are changed when the host moves from one network to the other
False
802.11 does not detect collisions
True
The Mobility Management Entity is a control-plane element within the 4G/5G infrastructure
True
The RTS/CTS reservation scheme addresses the hidden terminals problem
True
Ethernet and 802.11 use the same frame structure
False
Lowering power levels decreases SNR thus decreasing the BIT error rate
False
Firewalls are not always practical because they must analyze the application payload of each packet
False
Intrusion Detection Systems can be classified in three categories: traditional, packet filets, stateful filter, and application gateways
False
PGP is an encryption tool used to. secure web commerce transactions
False
TLS is the successor to SSL
True
Modern symmetric encryption algorithms(Triple DES) will group plain text bits into equal sized blocks as part of the encryption process
True
When a network administrator installs an AP, the administrator assigns a one-or two-word Service Set Identifier (SSID) to the access point
True
CSMA/CA is a wireless strategy for solving the hidden terminal problem
True
TEST 1 SHORT ANSWER
TEST 1 SHORT ANSWER
Time it takes before the first bit is transferred to the transmission medium because other packets that arrived before it must be handled first
Queueing Delay
Time before that last bit of the packet is on the transmission medium
Transmission delay
First bit of the packet arrives at the next router
Propagation delay
What is one advantage and one disadvantage of the selective repeat protocol over Go-Back=N protocol
SR runs timers on every packet which takes longer than GBN, but is more effective at handling errors since it only retransmits the corrupted packet rather than every packet in the window
What is the major function of DNS
DNS retrieves the IP address equivalent of a given host name
Suppose users share a 100 Mbps link. Also suppose each user requires 200 kbps when transmitting, but each user transmits only 15 percent of the time.
When circuit switching is used, how many users can be supported?
Find the probability that a given user is transmitting(Packet switching)
Suppose there are 50 users. Find that probability that at any given time, exactly 20 users are transmitting simultaneously
(100 * 1000) / 200 = 500 users
15%
(50/20)p^(20)(1-p)^(50-20)
MSS of 1000 using TCP. A starting SN = 54, B starting SN = 320
SN. AN
A 54. 320
B. 320. 1054
A.1054. 1320
2000 KM Link
Transmission rate of 400 kbps
80 GB file
Propagation speed 4.0*10^8
Transmission delay = packet length / transmission rate
(80 GB) / (400 kbps)
Propagation delay = distance / propagation speed
(2000 KM) / (4.0 * 10^8)
Total delay = Transmission delay + Propagation delay
Briefly describe the difference between TCP congestion control and flow control
In flow control, traffic is controlled while flowing from sender to receiver whereas in Congestion Control, traffic is controlled entering the network
What is store and forward transmission
The packet switch must receive the entire packet before it can begin to transmit the first bit of the packet onto the outbound link
TEST 2 SHORT ANSWER
TEST 2 SHORT ANSWER
TEST 3 SHORT ANSWER
TEST 3 SHORT ANSWER
Other sets by this creator
National Flags
196 terms
flags of the world
228 terms
Philosophy Questions
265 terms
Verified questions
physics
Strontium-90 is produced as a nuclear fission product of uranium in both reactors and atomic bombs. Look at its location in the periodic table to see what other elements it might be similar to chemically, and tell why you think it might be dangerous to ingest. It has too many neutrons, and it decays with a half-life of about 29 yr. How long will we have to wait for the amount of $^{90} _{38} \mathrm{Sr}$ on the Earth's surface to reach 1% of its current level, assuming no new material is scattered about? Write down the decay reaction, including the daughter nucleus. The daughter is radioactive: write down its decay.
chemistry
Which of the following equations correctly represent the chemical reaction in which graphite combines with sulfur to form carbon disulfide gas $\left[\mathrm{CS_2}(g)\right]$? (Select all that apply.) (a) $\mathrm{C}(graphite)+2\;\mathrm{S}(s)\longrightarrow\mathrm{CS_2}(g)$ (b) $\mathrm{C}(graphite)+\mathrm{S_2}(s)\longrightarrow\mathrm{CS_2}(g)$ (c) $\mathrm{C}(graphite)+\mathrm{S_8}(s)\longrightarrow\mathrm{CS_8}(g)$ (d) $\mathrm{C}(graphite)+\frac{1}{4}\;\mathrm{S_8}(s)\longrightarrow\mathrm{CS_2}(g)$ (e) $4\;\mathrm{C}(graphite)+\mathrm{S_8}(s)\longrightarrow4\;\mathrm{CS_2}(g)$
biology
Explain how Bicoid and Nanos set up a gradient of Hunchback protein in the embryo to ensure proper division of the embryo into segments.
health
**Give the medical names of the following bones.** breastbone \_____________________________________________
Other Quizlet sets
NCLEX BOOK-SAFE AND EFFECTIVE CARE ENVIRONMENT: MA…
11 terms
Exam 2
19 terms
Units 1-8 Real Estate Exams Part 1
100 terms
Professional Responsibility Review
66 terms