Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:

SSD8-1

.doc
Скачиваний:
11
Добавлен:
25.02.2016
Размер:
1.23 Mб
Скачать

(a) II only

(b) II and III only

(c) III only

(d) I and II only

Correct answer is (c)

Your score on this question is: 10.00

Feedback:

See section 2.1 of the course notes.

--------------------------------------------------------------------------------

3.

What is the service that TCP provides but UDP does not?

(a) Addressing

(b) Error detection using checksum

(c) API provided to application layer

(d) Congestion control

Correct answer is (d)

Your score on this question is: 10.00

Feedback:

See section 2.1.3 of the course notes.

--------------------------------------------------------------------------------

4.

Most postal systems provide a "COD" service, by which the recipient pays for goods when she picks them up at the post office. For the sender and seller, this incurs a delay in payment between the time the goods are sent and the time the post office returns the customer's payment. In a sense, during this period, the seller is loaning money to the buyer. To limit its credit liability, the seller typically limits the number of COD packages that are outstanding to a particular customer. This means that after ordering N items, the customer may be unable to order any more until at least one of the N items has arrived and been paid for. What would you call N now that you are a networking expert?

(a) Maximum Transfer Unit (MTU)

(b) Store-and-forward buffer

(c) Sliding window size

(d) Retransmit timeout

Correct answer is (c)

Your score on this question is: 0.00

Feedback:

See section 2.1.3 of the course notes.

--------------------------------------------------------------------------------

5.

The Transmission Control Protocol (TCP) differs from the User Data Protocol (UDP) in that

TCP has lower overhead

TCP is a transport-layer protocol

TCP provides reliable transmission

(a) I and II only

(b) II and III only

(c) III only

(d) II only

Correct answer is (c)

Your score on this question is: 10.00

Feedback:

See section 2.1.3 of the course notes.

--------------------------------------------------------------------------------

6.

Computer A has just received a TCP segment with a header that has the values 1500 and 1501 in the ACK and sequence number fields, respectively, from computer B. The TCP segment has one byte of payload. From this, we know the following about the sequence number sendseqno that computer B will send next:

(a) sendseqno <= 1501

(b) sendseqno <= 1502

(c) sendseqno == 1502

(d) sendseqno == 1501

Correct answer is (b)

Your score on this question is: 10.00

Feedback:

See section 2.1.3 of the course notes.

--------------------------------------------------------------------------------

7.

As you access a remote Web site (as you are currently doing), a TCP segment is received from the Web server that advertises a receive window size of 20 Kbytes. From the round trip delay and recent history, your computer's TCP code decides to expand its congestion window to 15 Kbytes, in order to take advantage of an apparent improvement in network conditions. What TCP sending window size will be in effect in your computer at this point?

(a) 5 Kbytes

(b) 35 Kbytes

(c) 20 Kbytes

(d) 15 Kbytes

Correct answer is (d)

Your score on this question is: 10.00

Feedback:

See section 2.1.3 of the course notes.

--------------------------------------------------------------------------------

8.

Because of a faulty routing table, a network provider is temporarily unable to successfully deliver packets from host B to host A, even though packets from A to B experience no problems. This malfunction lasts 15 minutes. At the time the malfunction occurred, the TCP entity at host A was sending a large file to host B. Which of the following is true of the packets that had not yet been sent to B?

(a) No packets will reach B.

(b) All packets will reach B normally.

(c) Some packets will reach B, but most will not.

(d) All packets will reach B at a degraded rate.

Correct answer is (c)

Your score on this question is: 10.00

Feedback:

See section 2.1.1 of the course notes.

--------------------------------------------------------------------------------

9.

A TCP implementation that uses a sliding window for flow control has a coding error that causes it to calculate a window size greater than the ideal. What are some of the likely effects of this error?

Unnecessarily idle network links

Unnecessary packet losses

Greater memory usage in routers

(a) I only

(b) II and III only

(c) II only

(d) I, II, and III

Correct answer is (c)

Your score on this question is: 0.00

Feedback:

See section 2.1.1 of the course notes.

--------------------------------------------------------------------------------

10.

TCP packets may be lost

when the sender runs out of buffer space

when a router runs out of buffer space

when the subnet, running IP, is congested

(a) I, II, and III

(b) II only

(c) III only

(d) II and III only

Correct answer is (a)

Your score on this question is: 10.00

Feedback:

See section 2.1.1 of the course notes.

1.

TCP packets may be lost

when the sender runs out of buffer space

when a router runs out of buffer space

when the subnet, running IP, is congested

(a) II and III only

(b) I, II, and III

(c) II only

(d) III only

Correct answer is (b)

Your score on this question is: 10.00

Feedback:

See section 2.1.1 of the course notes.

--------------------------------------------------------------------------------

2.

The Pittsburgh Supercomputing Center and the San Diego Supercomputing Center are linked to the Internet via very high-speed lines (in 1999, about 622 Mbps). Separated by about 4,000 Km, and several routers, the network installers measured the round trip time between these two sites to be about 50 milliseconds. You want to exchange a large data set between two very fast computers at these sites. The physical network capacity and/or speed of the computers limit the maximum TCP throughput to be about 50 million bytes per second under ideal circumstances. Assuming the channel is free of interference and that very few packets, if any, are dropped, how much memory would you allocate for a TCP connection at the sender in order to maximize throughput without spending money unnecessarily?

(a) none

(b) a few megabytes

(c) as much as possible

(d) a few kilobytes, enough to hold one packet and one acknowledgment

Correct answer is (b)

Your score on this question is: 0.00

Feedback:

See section 2.1.1 of the course notes.

--------------------------------------------------------------------------------

3.

The load offered to a network is the aggregate data rate at which the hosts connected to it attempt to send data. When the offered load increases by 20%, the amount of data successfully transported

may decrease by more than 30%

may decrease by less than 30%

may increase by less than 30%

(a) II and III only

(b) III only

(c) I, II, and III

(d) I and II only

Correct answer is (c)

Your score on this question is: 10.00

Feedback:

See section 2.1.4 of the course notes.

--------------------------------------------------------------------------------

4.

The Transmission Control Protocol (TCP) differs from the User Data Protocol (UDP) in that

TCP is connection-oriented

TCP needs to manage buffer space

TCP addresses are a pair (IP address, port number)

(a) I only

(b) I and II only

(c) I, II, and III

(d) III only

Correct answer is (b)

Your score on this question is: 10.00

Feedback:

See section 2.1.3 of the course notes.

--------------------------------------------------------------------------------

5.

Most postal systems provide a "COD" service, by which the recipient pays for goods when she picks them up at the post office. For the sender and seller, this incurs a delay in payment between the time the goods are sent and the time the post office returns the customer's payment. In a sense, during this period, the seller is loaning money to the buyer. To limit its credit liability, the seller typically limits the number of COD packages that are outstanding to a particular customer. This means that after ordering N items, the customer may be unable to order any more until at least one of the N items has arrived and been paid for. What would you call N now that you are a networking expert?

(a) Maximum Transfer Unit (MTU)

(b) Sliding window size

(c) Retransmit timeout

(d) Store-and-forward buffer

Correct answer is (b)

Your score on this question is: 10.00

Feedback:

See section 2.1.3 of the course notes.

--------------------------------------------------------------------------------

6.

A TCP implementation that uses a sliding window for flow control has a coding error that causes it to calculate a window size greater than the ideal. What are some of the likely effects of this error?

Unnecessarily idle network links

Unnecessary packet losses

Greater memory usage in routers

(a) I only

(b) II and III only

(c) II only

(d) I, II, and III

Correct answer is (c)

Your score on this question is: 10.00

Feedback:

See section 2.1.1 of the course notes.

--------------------------------------------------------------------------------

7.

A 4-port Internet router has been designed with enough buffer space and CPU power to service its four links at their maximum capacity. Which of the following is(are) sufficient to keep the router from becoming congested?

Neighboring routers are similarly designed.

All ports have comparable throughput and latency.

Links to other routers have neither interference nor any losses.

(a) I, II, and III

(b) II and III only

(c) none

(d) I and II only

Correct answer is (c)

Your score on this question is: 10.00

Feedback:

See section 2.1.4 of the course notes.

--------------------------------------------------------------------------------

8.

Computer A has just received a TCP segment with a header that has the values 1500 and 1501 in the ACK and sequence number fields, respectively, from computer B. From this, we know that computer B is waiting for sequence number

(a) 1500

(b) 1501

(c) 1499

(d) 1502

Correct answer is (b)

Your score on this question is: 10.00

Feedback:

See section 2.1.3 of the course notes.

--------------------------------------------------------------------------------

9.

As you access a remote Web site (as you are currently doing), a TCP segment is received from the Web server that advertises a receive window size of 20 Kbytes. From the round trip delay and recent history, your computer's TCP code decides to expand its congestion window to 15 Kbytes, in order to take advantage of an apparent improvement in network conditions. What TCP sending window size will be in effect in your computer at this point?

(a) 5 Kbytes

(b) 15 Kbytes

(c) 20 Kbytes

(d) 35 Kbytes

Correct answer is (b)

Your score on this question is: 10.00

Feedback:

See section 2.1.3 of the course notes.

--------------------------------------------------------------------------------

10.

In a network that is mostly used for HTTP (Web) traffic, which of the following is a reasonable approach to minimizing the amount of wasted bandwidth?

(a) Populate routers with more memory than they will ever need.

(b) Divide the available bandwidth equally among all connections.

(c) Have data sources increase their sending rate until congestion is detected.

(d) Have data sources send data as soon as it is available.

Correct answer is (c)

Your score on this question is: 10.00

Feedback:

See section 2.1.4 of the course notes.

1.

The Transmission Control Protocol (TCP) differs from the User Data Protocol (UDP) in that

TCP has lower overhead

TCP is a transport-layer protocol

TCP provides reliable transmission

(a) II only

(b) II and III only

(c) III only

(d) I and II only

Correct answer is (c)

Your score on this question is: 10.00

Feedback:

See section 2.1.3 of the course notes.

--------------------------------------------------------------------------------

2.

A 4-port Internet router has been designed with enough buffer space and CPU power to service its four links at their maximum capacity. Which of the following is(are) sufficient to keep the router from becoming congested?

Neighboring routers are similarly designed.

All ports have comparable throughput and latency.

Links to other routers have neither interference nor any losses.

(a) I, II, and III

(b) none

(c) I and II only

(d) II and III only

Correct answer is (b)

Your score on this question is: 10.00

Feedback:

See section 2.1.4 of the course notes.

--------------------------------------------------------------------------------

3.

Most postal systems allow customers to request a receipt notification, by which the Postal Service promises to notify the sender when the letter has been delivered to the recipient. This makes the postal system

a reliable network services provider

a reliable transport services provider

a datagram network service provider

(a) III only

(b) II only

(c) I and III only

(d) I only

Correct answer is (a)

Your score on this question is: 10.00

Feedback:

See section 2.1.1 of the course notes.

--------------------------------------------------------------------------------

4.

You are charged with setting up the technology required to transmit a video-conference over an IP-based internetwork. You will have to implement a sending and a receiving application. Where will you handle network congestion?

(a) In both the sending and receiving applications

(b) In neither the sending nor receiving application, because late-arriving video frames are of no use

(c) In the sending application only

(d) In neither the sending nor receiving application, because TCP takes care of it

Correct answer is (a)

Your score on this question is: 10.00

Feedback:

See section 2.1.5 of the course notes.

--------------------------------------------------------------------------------

5.

The load offered to a network is the aggregate data rate at which the hosts connected to it attempt to send data. When the offered load increases by 20%, the amount of data successfully transported

may decrease by more than 30%

may decrease by less than 30%

may increase by less than 30%

(a) III only

(b) I and II only

(c) II and III only

(d) I, II, and III

Correct answer is (d)

Your score on this question is: 10.00

Feedback:

See section 2.1.4 of the course notes.

--------------------------------------------------------------------------------

6.

To improve network performance, a TCP receiver sends some information back to the sender by piggybacking it onto the headers of packets sent from the receiver to the sender. Which of the following can be sent this way?

New retransmission timeout values

Number of the last TCP segment being acknowledged

Available receiver buffer size

(a) II and III only

(b) I only

(c) II only

(d) I and II only

Correct answer is (a)

Your score on this question is: 10.00

Feedback:

See section 2.1.3 of the course notes.

--------------------------------------------------------------------------------

7.

Because of a faulty routing table, a network provider is temporarily unable to successfully deliver packets from host B to host A, even though packets from A to B experience no problems. This malfunction lasts 15 minutes. At the time the malfunction occurred, the TCP entity at host A was sending a large file to host B. Which of the following is true of the packets that had not yet been sent to B?

(a) No packets will reach B.

(b) All packets will reach B at a degraded rate.

(c) Some packets will reach B, but most will not.

(d) All packets will reach B normally.

Correct answer is (c)

Your score on this question is: 10.00

Feedback:

See section 2.1.1 of the course notes.

--------------------------------------------------------------------------------

8.

What is the service that TCP provides but UDP does not?

(a) API provided to application layer

(b) Congestion control

(c) Error detection using checksum

(d) Addressing

Correct answer is (b)

Your score on this question is: 10.00

Feedback:

See section 2.1.3 of the course notes.

--------------------------------------------------------------------------------

9.

You have just written an implementation of a transport protocol. You have aggressively pursued performance. For example, all acknowledgments are piggybacked on top of regular data packets, in order to minimize their overhead. When your company releases your product, however, you get the following complaint:

(a) Many packets are retransmitted many times even though the network is idle.

(b) Packet headers have doubled in size, thereby halving the expected performance gains.

(c) ARP responses take a lot longer than before.

(d) Many more packets than before fail to reach the receiving host.

Correct answer is (a)

Your score on this question is: 10.00

Feedback:

See section 2.1.3 of the course notes.

--------------------------------------------------------------------------------

10.

Computer A has just received a TCP segment with a header that has the values 1500 and 1501 in the ACK and sequence number fields, respectively, from computer B. From this, we know that computer B is waiting for sequence number

(a) 1499

(b) 1500

(c) 1502

(d) 1501

Correct answer is (d)

Your score on this question is: 10.00

Feedback:

See section 2.1.3 of the course notes.

1.

Security problems in mobile code are often dealt with by which of the following techniques:

run-time checking

compile-time checking

precompile checking

predictive checking

(a) II and III only

(b) I, II, III, and IV

(c) IV only

(d) I and II only

Correct answer is (d)

Your score on this question is: 20.00

Feedback:

See section 3.2.2 of the course notes.

--------------------------------------------------------------------------------

2.

To execute transactions that contain multiple statements, a JDBC application must _____.

(a) use begin and end statements

(b) disable auto-commit

(c) open multiple connections

(d) send the statements without a 1 second pause between each pair

Correct answer is (b)

Your score on this question is: 20.00

Feedback:

See section 3.2.3 of the course notes.

--------------------------------------------------------------------------------

3.

In which of the following naming services do lookups correspond to a walk from the root to a node of a name tree?

CORBA's name service

LDAP

SLP

(a) II and III only

(b) I only

(c) I and II only

(d) I, II, and III

Correct answer is (c)

Your score on this question is: 20.00

Feedback:

See section 3.2.4 of the course notes.

--------------------------------------------------------------------------------

4.

How are LDAP names represented?

(a) ASCII strings concatenated with slashes

(b) Ordered lists of attribute-value pairs

(c) ASCII strings concatenated with periods (dots)

(d) Unordered lists of attribute-value pairs

Correct answer is (b)

Your score on this question is: 20.00

Feedback:

See section 3.2.4 of the course notes.

--------------------------------------------------------------------------------

5.

CGI scripts are passed _____ and return _____.

(a) an HTML form, a URL

(b) an ASCII string, an HTML document

(c) A URL, an HTML form

(d) an HTML form, an HTML document

Correct answer is (b)

Your score on this question is: 20.00

Feedback:

See section 3.2.1 of the course notes.

1.

Which of the following statements about routers that use FIFO packet schedulers are true?

Each user has a separate queue in the router.

Users who send at higher rates despite congestion warnings will have the same throughput as users who send at lower rates.

(a) None

(b) II only

(c) I only

(d) I and II

Correct answer is (a)

Your score on this question is: 20.00

Feedback:

See section 2.3.2 of the course notes.

--------------------------------------------------------------------------------

2.

The purpose of token buckets is

(a) to limit the amount of traffic entering a network

(b) to store copies of packets in case some are lost

(c) to combine packets into a smaller number of larger datagrams

(d) to weigh the amount of traffic through a router

Correct answer is (a)

Your score on this question is: 20.00

Feedback:

See section 2.3.2 of the course notes.

--------------------------------------------------------------------------------

3.

When an application submits a request for guaranteed service, which of the following will the signaling protocol contact?

Only the router with the lowest bandwidth along the path that the application will use

Only the first router along the path that the application will use

All routers along the path that the application will use

(a) III only

(b) I only

(c) I and II only

(d) II only

Correct answer is (a)

Your score on this question is: 20.00

Feedback:

See section 2.3.1 of the course notes.

--------------------------------------------------------------------------------

4.

Which of the following are reasons IntServ (the Integrated Services Model) has not been widely deployed?

Concerns about complexity of the service model

Lack of demand for real-time services

Problems scaling to a large environment such as the Internet

(a) I, II, and III

(b) I only

(c) III only

(d) I and III only

Correct answer is (a)

Your score on this question is: 20.00

Feedback:

See section 2.3.3 of the course notes.

--------------------------------------------------------------------------------

5.

Which of the following does the original Internet service model guarantee?

A certain maximum packet delay

A certain minimum bandwidth

(a) None

(b) II only

(c) I only

(d) I and II

Correct answer is (a)

Your score on this question is: 20.00

Feedback:

See section 2.3.1 of the course notes.

1.

A student's desktop system executes a procedure call to a departmental server. Which of the following are true?

A remote procedure call will always take longer than a local call to complete.

A remote procedure call will never take longer than a local call to complete.

A remote procedure call may fail when the same call executed locally would succeed.

(a) I only

(b) II and III only

(c) I and III only

(d) III only

Correct answer is (d)

Your score on this question is: 20.00

Feedback:

See section 2.2.3 of the course notes.

--------------------------------------------------------------------------------

2.

In RPC, the process of encoding parameters and results is called

(a) parameterizing

(b) packetizing

(c) RPCode

(d) marshaling

Correct answer is (d)

Your score on this question is: 20.00

Feedback:

See section 2.2.3 of the course notes.

--------------------------------------------------------------------------------

3.

A Web server is attending to five active requests from five computers. It receives data sent via TCP to

(a) 5 TCP ports

(b) 1 TCP port

(c) 6 TCP ports

(d) 2 TCP ports

Correct answer is (b)

Your score on this question is: 20.00

Feedback:

See section 2.2.1 of the course notes.

--------------------------------------------------------------------------------

4.

High-speed network interfaces for PCs or Macs are typically designed for use in the _____ bus.

(a) ISA

(b) PCMCIA

(c) PCI

(d) SCSI

Correct answer is (c)

Your score on this question is: 20.00

Feedback:

See section 2.2.6 of the course notes.

--------------------------------------------------------------------------------

5.

What C function converts long integers from machine-byte order to network-byte order?

(a) atoin

(b) htonl

(c) endian

(d) bcopy

Correct answer is (b)

Your score on this question is: 20.00

Feedback:

See section 2.2.2 of the course notes.

1.

High-speed network interfaces for PCs or Macs are typically designed for use in the _____ bus.

(a) ISA

(b) PCI

(c) SCSI

(d) PCMCIA

Correct answer is (b)

Your score on this question is: 20.00

Feedback:

See section 2.2.6 of the course notes.

--------------------------------------------------------------------------------

2.

In theory, the minimum RPC time on an Ethernet is 102 microseconds. In practice, getting the RPC time down to 1500 microseconds is a considerable achievement. What causes this difference?

(a) Ethernet has long delay time

(b) Large buffer on network interface card takes a while to fill up

(c) Operating system and protocol overhead

(d) Limited memory bandwidth between processor and network interface card

Correct answer is (c)

Your score on this question is: 20.00

Feedback:

See section 2.2.7 of the course notes.

--------------------------------------------------------------------------------

3.

A Web server is attending to five active requests from five different computers. How many sockets is this server using?

(a) 2

(b) 1

(c) 6

(d) 5

Correct answer is (c)

Your score on this question is: 20.00

Feedback:

One socket is active to receive new requests, and five are active to transfer data. See section 2.2.1 of the course notes.

--------------------------------------------------------------------------------

4.

A Web server is attending to five active requests from five computers. It receives data sent via TCP to

(a) 6 TCP ports

(b) 2 TCP ports

(c) 1 TCP port

(d) 5 TCP ports

Correct answer is (c)

Your score on this question is: 20.00

Feedback:

See section 2.2.1 of the course notes.

--------------------------------------------------------------------------------

5.

Two machines are connected to each other with a 100 megabit/sec fiber connection. The round trip time between the machines is 80 milliseconds. What minimum size must the receive buffer be to allow the machines to utilize the full 100 megabits/sec?

(a) 1 megabyte

(b) 2 megabytes

(c) 500 kilobytes

(d) 8 megabytes

Correct answer is (a)

Your score on this question is: 20.00

Feedback:

See section 2.2.7 of the course notes.

1.

The Internet Protocol (IP)

is the only network-layer protocol

is required of hosts on the Internet

is the body of standard protocols in use on the Internet

(a) I only

(b) II only

(c) II and III only

(d) I and II only

Correct answer is (b)

Your score on this question is: 0.00

Feedback:

See section 1.3.1 of the course notes.

--------------------------------------------------------------------------------

2.

The network interface card of a Web server that you manage has developed sporadic problems. You measure the packet loss rate from your desktop computer and immediately decide to replace the network card. After this simple operation, the Web server successfully rejoins the network, as confirmed by your officemate using her desktop computer. You eagerly go to your desktop to measure the improvement, but find instead that the Web server is not responding to any of your packets. What is your diagnosis?

(a) The Domain Name System (DNS) has not yet updated its entry for the Web server.

(b) The new network card does not work.

(c) Your desktop computer's network card does not work.

(d) Your desktop computer is still trying to contact the server's old network card.

Correct answer is (d)

Your score on this question is: 10.00

Feedback:

See section 1.3.5 of the course notes.

--------------------------------------------------------------------------------

3.

A network uses a routing algorithm that uses paths with the least number of hops. These paths are computed periodically using a shortest-path algorithm. In this network, datagrams

are routed around congested links

may traverse the same router twice

will always reach their destination

(a) I and II only

(b) III only

(c) I and III only

(d) none

Correct answer is (d)

Your score on this question is: 0.00

Feedback:

See section 1.3.2 of the course notes.

--------------------------------------------------------------------------------

4.

Which of the following routing algorithms is the most scalable?

(a) Distance vector routing

(b) Flooding

(c) Link state routing

(d) Datagram broadcast

Correct answer is (a)

Your score on this question is: 10.00

Feedback:

See section 1.3.2 of the course notes.

--------------------------------------------------------------------------------

5.

The Dynamic Host Configuration Protocol (DHCP) may be used to

configure the scheduling policy of a busy server

relieve the saturation of the IP address space

assign a fixed address to a Web server after a reboot

(a) I only

(b) III only

(c) II and III only

(d) II only

Correct answer is (c)

Your score on this question is: 10.00

Feedback:

See section 1.3.6 of the course notes.

--------------------------------------------------------------------------------

6.

A modification is proposed to the IP protocol that would eliminate the "Identification" and "Fragment Offset" fields from the IP header. This could result in nearly a 15% improvement in the throughput of a link used for short transactions. Which other effects would this proposal have?

The resulting internetwork would no longer be able to interconnect subnetworks of any kind.

The scalability of the routing protocol would improve.

Data delivery would be more robust in the presence of congestion.

(a) III only

(b) I and II only

(c) I only

(d) none

Correct answer is (c)

Your score on this question is: 0.00

Feedback:

See section 1.3.4 of the course notes.

--------------------------------------------------------------------------------

7.

Which of the following benefit from "tunneling" IP datagrams by conveying them inside other packets?

Mobile IP

Multicast

Roll-out of IPv6

(a) I, II and III

(b) II only

(c) none

(d) I and III only

Correct answer is (a)

Your score on this question is: 10.00

Feedback:

See section 1.3.8 of the course notes.

--------------------------------------------------------------------------------

8.

The main network engineer of a large corporation is charged with designing and deploying the company's intranet. She has decided to use a connection-oriented network layer. Which of the following concerns do you think motivated her choice?

(a) Cost of short transactions—e.g., credit card charge approval.

(b) Ability to re-route traffic around congested links

(c) Ability to reserve bandwidth—e.g., for important presentations to the Board

(d) Cost of the routers as the network grows

Correct answer is (c)

Your score on this question is: 10.00

Feedback:

See section 1.3.1 of the course notes.

--------------------------------------------------------------------------------

9.

A router is installed to interconnect 4 subnetworks with MTUs of 1024, 2048, 576, and 1556 bytes respectively. Nodes A and B are connected to the first and second subnets, respectively. An application on node A sends a 4096-byte datagram (e.g., using UDP) to an application on node B. How many IP fragments will the router process as a result?

(a) 4

(b) 1

(c) 5

(d) 2

Correct answer is (c)

Your score on this question is: 0.00

Feedback:

See section 1.3.4 of the course notes.

--------------------------------------------------------------------------------

10.

A corporate information systems manager is interested in collecting statistics on the frequency of computer failures within the organization. Most failures result in an automatic reboot, so the failed computer is typically back on the network in less than a minute. The corporate network connects 1,500 computers in far-flung locations to which the average latency of a packet is 40 milliseconds. The manager asks you to write a tool that will collect the times at which failures occurred in which computers. She wants it by tomorrow, so the tool will have to be simple. On which protocol will you base your implementation?

(a) PLM

(b) TCP

(c) ICMP (ping)

(d) SNMP

Correct answer is (d)

Your score on this question is: 0.00

Feedback:

See section 1.3.6 of the course notes.

1.

Which of the following is the most credible threat to the continuing success of the Internet Protocol (IP) as currently deployed?

(a) Big multimedia files will no longer fit into IP datagrams.

(b) Widespread deployment of fiber optics will call for more than 8192 fragments per datagram.

(c) Router memory will become insufficient to keep track of an exponentially increasing number of circuits.

(d) The IP address space will be exhausted.

Correct answer is (d)

Your score on this question is: 10.00

Feedback:

See section 1.3.3 of the course notes.

--------------------------------------------------------------------------------

2.

Tired of inaccurate routing tables, Joe, the network engineer, devises what he thinks is surely the best of all routing algorithms, which calculates the shortest-delay path for each packet. The algorithm works as follows. A routing server periodically polls each router for its full routing table and link delay statistics. This information from all routers is amalgamated into a complete model of the state of the network topology. Using this model, Joe's program selects the shortest delay paths, for which he derives new routing tables and sends to each router. Joe wants to deploy his algorithm immediately, but critics envious of his intelligence have offered the following objections. Which of the objections, if any, deserve attention?

Joe's algorithm is not scalable

Joe's algorithm is not reliable

Joe's algorithm results in inaccurate routing tables

(a) II only

(b) I and II only

(c) III only

(d) I, II, and III

Correct answer is (d)

Your score on this question is: 10.00

Feedback:

See section 1.3.2 of the course notes.

--------------------------------------------------------------------------------

3.

The class B IP network 128.2.x.x has been assigned to Carnegie Mellon University. To relieve congestion in its internal LAN, Carnegie Mellon has decided to subnet this IP network. This will have which of the following consequences?

The configuration of the subnets will have to be announced to routers all over the world by notifying NIC and/or IANA.

A computer may need to change its IP address when moved from one office to another.

Some bridges, hubs, or switches will need to be replaced with routers.

(a) I and III only

(b) I, II, and III

(c) II and III only

(d) III only

Correct answer is (c)

Your score on this question is: 10.00

Feedback:

See section 1.3.3 of the course notes.

--------------------------------------------------------------------------------

4.

At which of the following layers of the OSI protocol stack can the Internet Control Message Protocol be implemented?

Network

Transport

Data link

(a) I or II only

(b) I only

(c) II only

(d) III only

Correct answer is (b)

Your score on this question is: 10.00

Feedback:

See section 1.3.6 of the course notes.

--------------------------------------------------------------------------------

5.

The IP address space is organized in a hierarchy

to make the routing task more scalable

to decrease inefficient fragmentation of the address space

to give institutions managing local-area networks autonomous control over the assignment of addresses to computers

(a) II only

(b) I and III only

(c) none

(d) I only

Correct answer is (b)

Your score on this question is: 10.00

Feedback:

See section 1.3.3 of the course notes.

--------------------------------------------------------------------------------

6.

The Internet Protocol (IP)

is the only network-layer protocol

is required of hosts on the Internet

is the body of standard protocols in use on the Internet

(a) I and II only

(b) II only

(c) I only

(d) II and III only

Correct answer is (b)

Your score on this question is: 10.00

Feedback:

See section 1.3.1 of the course notes.

--------------------------------------------------------------------------------

7.

A modification is proposed to the IP protocol that would eliminate the "Identification" and "Fragment Offset" fields from the IP header. This could result in nearly a 15% improvement in the throughput of a link used for short transactions. Which other effects would this proposal have?

The resulting internetwork would no longer be able to interconnect subnetworks of any kind.

The scalability of the routing protocol would improve.

Data delivery would be more robust in the presence of congestion.

(a) I and II only

(b) none

(c) III only

(d) I only

Correct answer is (d)

Your score on this question is: 10.00

Feedback:

See section 1.3.4 of the course notes.

--------------------------------------------------------------------------------

8.

Which of the following routing algorithms is the most scalable?

(a) Link state routing

(b) Distance vector routing

(c) Datagram broadcast

(d) Flooding

Correct answer is (b)

Соседние файлы в предмете [НЕСОРТИРОВАННОЕ]