Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Question 1 The three way TCP handshake between sender and receiver requires a SYN packet from the sender to be answered by a SYN, ACK

Question 1

The three way TCP handshake between sender and receiver

requires a SYN packet from the sender to be answered by a SYN, ACK packet from the recipeint which is followed by an ACK packet from the sender before data starts to flow

requires the receiver to send a SYN, ACK packet, followed by the sender's FIN packet and the receiver's STArt packet before data can flow

requires three devices: the sender, receiver and the router to all exchange messages before data can flow

requires three packets from the sender to be answered by three ACKnowledgements from the receiver before data can be sent

Question 2

The OSPF routing protocol

is a distance-vector protocol

is an exterior gateway protocol

is a link-state protocol

is a wireless network protocol

Question 3

Content provider networks (Google, Microsoft, Netflix, Akamai, etc.)

are centrally located at the core of the internet to save bandwidth, regardless of the cost

are connected to their local/regional ISP or local access ISP

are often connected to several Tier 1 ISPs as well as to large access ISPs to save on costs and bandwidth

are only allowed to connect to one tier 1 ISP at a time

Question 4

TCP Congestion control

is based on the KLEENEX protocol, allowing routers to discharge their congested

is managed by the receiver notifying the sender how much buffer space is available

is managed by the sender backing down transmission rate if packets are not ACKnowledged, assuming that the network has failed to deliver them due to congestion

is managed by the sender telling the receiver how much buffer space to allocate

Question 5

The internet protocol stack

includes application, transport, network, link and physical

includes Ethernet, wireless, fiber and twisted pair

includes users, servers, nodes, workstations and data links

includes FTP, SMTP, HTTP, TCP, UDP, DNS and IP

Question 6

Network layer addressing

is assigned by the network administrator

uses addresses assigned by network card manufacturers

uses port numbers defined by standard protocols

uses port numbers that are randomly selected during the connection process

Question 7

The transport layer protocol TCP

provides congestion control by the receiver telling the server how much buffer space it has left

provides flow control by throttling the sender if the network is overloaded

provides for dedicated bandwidth and secure communication

provides reliable transport between the sender and receiver processes

Question 8

The BGP Protocol

allows for the communication of network routes inside of an organization

allows for the communication of network routes between autonomous systems

is the Boogered Gateway Protocol, which allows for confusing routes

Translates IP address into MAC addresses

Question 9

Ideally, a server

is a host that is always on and accepts requests from clients

is a host that is only on when it is being used by an end-user

is dynamically assigned an IP address so it can always get one wherever it is

should be located outside of the data center for security reasons

Question 10

The TCP ACKnowledgement number

is based on the number of bits received

is based on the number of bytes received

is based on the number of packets received

is derived from the number of SYN packets that have been received

Question 11

A routing algorithm

runs each time a packet arrives at a router, and determines the best path for the packet to take

runs each time a packet arrives at a router, creating a table of routers for the packet to take through the network

runs each time the network configuration changes, and creates a forwarding table that can be used to make forwarding decisions

runs once when the network is designed, defining how all packets will traverse the network

Question 12

Bandwidth

is a measurement of how wide the packet has to be to transmit the data

is the measurement of the circumference of the musician's waistline

is the measurement of throughput of a data link, generally represented in bits per second

is the measurement of how wide the physical cable is

Question 13

Regarding routing and forwarding

forwarding is the process of determining the path that data will take and builds the forwarding table; routing uses the forwarding table to send the packet to the next hop in the network

forwarding is the process of determining the path that data will take and builds the routing table; routing uses the routing table to send the packet to the next hop in the network

routing is the process of determining the path that data will take and builds the forwarding table; forwarding uses the forwarding table to send the packet to the next hop in the network

routing is the process of determining the path that data will take and builds the routing table; forwarding uses the routing table to send the packet to the next hop in the network

Question 14

A network layer address

is 32 bits long in IPv4

is 48 bits long in Ethernet

is 97 bits long in IPv6

is often represented as four numbers between 256 and 1024, separated by dots "."

Question 15

In regards to media

guided media needs to be controlled by a controller; unguided media controls itself

guided media propagates signal in a solid media like copper, fiber and coax; unguided media uses radio signals to propagate signals

unguided media propagates signal in a solid media like copper, fiber and coax; guided media uses radio signals to propogate signals

wireless networks need to use guided media to define where signals are sent and receivied; wired networks don't need this help, so they use unguided media

Question 16

The core of the network includes

hosts, end systems, workstations, servers, smart phones, tablets

HTML, web pages, electronic mail and network protocols

routers, switches and internetworking devides

Users, people or the outside environment

Question 17

When sending voice or video packet data

the TCP protocol is used because it does not provide flow control and re-transmission that would negatively impact the audio and video streams

the TCP protocol is used because it offers flow control and re-transmission

the UDP protocol is used because it does not provide flow control and re-transmission that would negatively impact the audio and video streams

the UDP protocol is used because it offers flow control an re-transmission

Question 18

This protocol is used to transfer web pages

FTP - File Transfer Protocol

HTML - HyperText Markup Language

HTTP - HyperText Transport Protocol

WPTP - Web Page Transfer Protocol

Question 19

This protocol is used to transport electronic mail messages between mail servers

IMAP - Internet Message Access Protocol

IMSP - Internet Mail Server Protocol

POP3 - Post Office Protocol, version 3

SMTP - Simple Mail Transport Protocol

Question 20

This application layer protocol allows for nodes to look up the IP addresses of a given host name

ARP - Address Resolution Protocol

DNS - Domain Name Service

HLP - Host Lookup Protocol

IPLP - IP Address Lookup Protocol

Question 21

An IPv6 Address

is a 128 bits

is a 32 bits

is a 48 bits

is assigned by the hardware manufacturer

Question 22

The number in the CIDR notation (for example the 24 in 192.168.0.0/24) represents the number of ____ in the _____.

bytes; packet header

bits; subnet mask

bytes; subnet mask

digits; IP Address

Question 23

The edge of the network includes:

data links, circuits, DSL, Cable modems and Ethernet

hosts, end systems, workstations, servers, smart phones, tablets

DSL, data links and switches

users, people or the outside environment

Trying to check if my answers are correct. If not, a description of why not would be nice, but that's not necessary.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Database Concepts

Authors: David M Kroenke, David J Auer

6th Edition

0132742926, 978-0132742924

More Books

Students also viewed these Databases questions

Question

What is availability and how is it defined?

Answered: 1 week ago

Question

What types of nonverbal behavior have scholars identifi ed?

Answered: 1 week ago