Question
Question 1 The three way TCP handshake between sender and receiver requires a SYN packet from the sender to be answered by a SYN, ACK
Question 1
The three way TCP handshake between sender and receiver
requires a SYN packet from the sender to be answered by a SYN, ACK packet from the recipeint which is followed by an ACK packet from the sender before data starts to flow
requires the receiver to send a SYN, ACK packet, followed by the sender's FIN packet and the receiver's STArt packet before data can flow
requires three devices: the sender, receiver and the router to all exchange messages before data can flow
requires three packets from the sender to be answered by three ACKnowledgements from the receiver before data can be sent
Question 2
The OSPF routing protocol
is a distance-vector protocol
is an exterior gateway protocol
is a link-state protocol
is a wireless network protocol
Question 3
Content provider networks (Google, Microsoft, Netflix, Akamai, etc.)
are centrally located at the core of the internet to save bandwidth, regardless of the cost
are connected to their local/regional ISP or local access ISP
are often connected to several Tier 1 ISPs as well as to large access ISPs to save on costs and bandwidth
are only allowed to connect to one tier 1 ISP at a time
Question 4
TCP Congestion control
is based on the KLEENEX protocol, allowing routers to discharge their congested
is managed by the receiver notifying the sender how much buffer space is available
is managed by the sender backing down transmission rate if packets are not ACKnowledged, assuming that the network has failed to deliver them due to congestion
is managed by the sender telling the receiver how much buffer space to allocate
Question 5
The internet protocol stack
includes application, transport, network, link and physical
includes Ethernet, wireless, fiber and twisted pair
includes users, servers, nodes, workstations and data links
includes FTP, SMTP, HTTP, TCP, UDP, DNS and IP
Question 6
Network layer addressing
is assigned by the network administrator
uses addresses assigned by network card manufacturers
uses port numbers defined by standard protocols
uses port numbers that are randomly selected during the connection process
Question 7
The transport layer protocol TCP
provides congestion control by the receiver telling the server how much buffer space it has left
provides flow control by throttling the sender if the network is overloaded
provides for dedicated bandwidth and secure communication
provides reliable transport between the sender and receiver processes
Question 8
The BGP Protocol
allows for the communication of network routes inside of an organization
allows for the communication of network routes between autonomous systems
is the Boogered Gateway Protocol, which allows for confusing routes
Translates IP address into MAC addresses
Question 9
Ideally, a server
is a host that is always on and accepts requests from clients
is a host that is only on when it is being used by an end-user
is dynamically assigned an IP address so it can always get one wherever it is
should be located outside of the data center for security reasons
Question 10
The TCP ACKnowledgement number
is based on the number of bits received
is based on the number of bytes received
is based on the number of packets received
is derived from the number of SYN packets that have been received
Question 11
A routing algorithm
runs each time a packet arrives at a router, and determines the best path for the packet to take
runs each time a packet arrives at a router, creating a table of routers for the packet to take through the network
runs each time the network configuration changes, and creates a forwarding table that can be used to make forwarding decisions
runs once when the network is designed, defining how all packets will traverse the network
Question 12
Bandwidth
is a measurement of how wide the packet has to be to transmit the data
is the measurement of the circumference of the musician's waistline
is the measurement of throughput of a data link, generally represented in bits per second
is the measurement of how wide the physical cable is
Question 13
Regarding routing and forwarding
forwarding is the process of determining the path that data will take and builds the forwarding table; routing uses the forwarding table to send the packet to the next hop in the network
forwarding is the process of determining the path that data will take and builds the routing table; routing uses the routing table to send the packet to the next hop in the network
routing is the process of determining the path that data will take and builds the forwarding table; forwarding uses the forwarding table to send the packet to the next hop in the network
routing is the process of determining the path that data will take and builds the routing table; forwarding uses the routing table to send the packet to the next hop in the network
Question 14
A network layer address
is 32 bits long in IPv4
is 48 bits long in Ethernet
is 97 bits long in IPv6
is often represented as four numbers between 256 and 1024, separated by dots "."
Question 15
In regards to media
guided media needs to be controlled by a controller; unguided media controls itself
guided media propagates signal in a solid media like copper, fiber and coax; unguided media uses radio signals to propagate signals
unguided media propagates signal in a solid media like copper, fiber and coax; guided media uses radio signals to propogate signals
wireless networks need to use guided media to define where signals are sent and receivied; wired networks don't need this help, so they use unguided media
Question 16
The core of the network includes
hosts, end systems, workstations, servers, smart phones, tablets
HTML, web pages, electronic mail and network protocols
routers, switches and internetworking devides
Users, people or the outside environment
Question 17
When sending voice or video packet data
the TCP protocol is used because it does not provide flow control and re-transmission that would negatively impact the audio and video streams
the TCP protocol is used because it offers flow control and re-transmission
the UDP protocol is used because it does not provide flow control and re-transmission that would negatively impact the audio and video streams
the UDP protocol is used because it offers flow control an re-transmission
Question 18
This protocol is used to transfer web pages
FTP - File Transfer Protocol
HTML - HyperText Markup Language
HTTP - HyperText Transport Protocol
WPTP - Web Page Transfer Protocol
Question 19
This protocol is used to transport electronic mail messages between mail servers
IMAP - Internet Message Access Protocol
IMSP - Internet Mail Server Protocol
POP3 - Post Office Protocol, version 3
SMTP - Simple Mail Transport Protocol
Question 20
This application layer protocol allows for nodes to look up the IP addresses of a given host name
ARP - Address Resolution Protocol
DNS - Domain Name Service
HLP - Host Lookup Protocol
IPLP - IP Address Lookup Protocol
Question 21
An IPv6 Address
is a 128 bits
is a 32 bits
is a 48 bits
is assigned by the hardware manufacturer
Question 22
The number in the CIDR notation (for example the 24 in 192.168.0.0/24) represents the number of ____ in the _____.
bytes; packet header
bits; subnet mask
bytes; subnet mask
digits; IP Address
Question 23
The edge of the network includes:
data links, circuits, DSL, Cable modems and Ethernet
hosts, end systems, workstations, servers, smart phones, tablets
DSL, data links and switches
users, people or the outside environment
Trying to check if my answers are correct. If not, a description of why not would be nice, but that's not necessary.
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started