Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

The three way TCP handshake between sender and receiver A) requires a SYN packet from the sender to be answered by a SYN, ACK packet

The three way TCP handshake between sender and receiver

A) requires a SYN packet from the sender to be answered by a SYN, ACK packet from the recipeint which is followed by an ACK packet from the sender before data starts to flow B) requires the receiver to send a SYN, ACK packet, followed by the sender's FIN packet and the receiver's STArt packet before data can flow C) requires three devices: the sender, receiver and the router to all exchange messages before data can flow D) requires three packets from the sender to be answered by three ACKnowledgements from the receiver before data can be sent

2.

The OSPF routing protocol

A) is a distance-vector protocol B) is a exterior gateway protocol C) is a link-state protocol D) is a wireless network protocol

3.

Content provider networks (Google, Microsoft, Netflix, Akamai, etc.)

A) are centrally located at the core of the Internet to save bandwidth, regardless of the cost B) are connected to their local/regional ISP or local access ISP C) are often connected to several Tier 1 ISPs as well as to large access ISPs to save on costs and bandwidth D) are only allowed to connect to one tier 1 ISP at a time

4.

TCP Congestion control

A) is based on the KLEENEX protocol, allowing routers to dicharge their congested packets B) is managed by the receiver notifying the sender how much buffer space is available C) is managed by the sender backing down transmission rate if packets are not ACKnowledged, assuming that the network has failed to deliver them due to congestion D) is managed by the sender telling the receiver how much buffer space to allocate

5.

The Internet protocol stack

A) includes application, transport, network, link and physical B) Includes Ethernet, wireless, fiber and twisted pair C) includes users, servers, nodes, workstations and data links D) includes FTP, SMTP, HTTP, TCP, UDP, DNS AND IP

6.

Network layer addressing

A) is assigned by the network administrator B) uses addresses assigned by network card manufacturers C) uses port numbers defined by standard protocols D) uses port numbers that are randomly selected during the connection process

7.

The transport layer protocol TCP

A) provides congestion control by the receiver telling the server how much buffer space it has left B) provides flow control by throttling the sender if the network is overloaded C) provides for dedicated bandwidth and secure communication D) provides reliable transport between the sender and receiver processes

8.

In the DHCP protocol

A) Four messages are sent: Discover, Offer, Request and ACKnoweldgement B) One message is sent from the router to the client, as soon as it joins the network C) Three messages are sent, the SYN, the SYN,ACK and the ACK D) Two messages are sent - the DHCP request and the DHCP answer

9.

Ideally, a server

A) is a host that is always on and accepts requests from clients B) is a host that is only on when it is being used by an end-user C) is dynamically assigned an IP address so it can always get one wherever it is D) should be located outside of the data center for security reasons

10.

The TCP ACKnowledgement number

A) is based on the number of bits sent B) is based on the number of bytes sent C) is based on the number of packets sent D) is derived from the number of SYN packets that have been sent

11.

A routing algorithim

A) runs each time a packet arrives at a router, and determines the best path for the packet to take B) runs each time a packet arrives at a router, creating a table of routers for the packet to take through the network C) runs each time the network configuration changes, and creates a forwarding table that can be used to make forwarding decisions D) Runs once when the network is designed, defining how all packets will traverse the network

12.

Bandwidth

A) is a measurement of how wide the packet has to be to transmit the data B) is the measurement of the circumference of the musician's waistline C) is the measurement of throughput of a data link, generally represented in bits per second D) is the measurment of how wide the physical cable is

13.

In the ARP protocol

A) only the router sends the broadcast looking for other network nodes. All other nodes send ARP requests to the router to update their ARP tables B) only the switch sends the broadcast looking for other nodes. All other nodes send ARP requests to the switch to update their ARP tables C) the ARP response is sent back in a broadcast frame so that all other nodes can update their ARP tables D) the host sends an ethernet broadcast frame asking which layer 2 network device is configured with a specific layer 3 address

14.

Regarding routing and forwarding

A) forwarding is the process of determining the path that data will take and builds the forwarding table; routing uses the forwarding table to send the packet to the next hop in the network B) forwarding is the process of determining the path that data will take and builds the routing table; routing uses the routing table to send the packet to the next hop in the network C) routing is the process of determining the path that data will take and builds the routing algorithm; forwarding uses the forwarding table to send the packet to the next hop in the network D) routing is the process of determining the path that data will take and builds the routing table; forwarding uses the routing table to send the packet to the next hop in the network

15.

A network layer address

A) is 32 bits long in IPv4 B) is 48 bits long in Ethernet C) is 97 bits long in IPv6 D) is often represented as four numbers between 256 and 1024, separated by dots "."

16.

In regards to media

A) guided media needs to be controlled by a controller; unguided media controls itself B) guided media propagates signal in a solid media like copper, fiber and coax; unguided media uses radio signals to propogate signals C) unguided media propagates signal in a solid media like copper, fiber and coax; guided media uses radio signals to propogate signals D) wireless networks need to use guided media to define where signals are sent and receivied; wired networks don't need this help, so they use unguided media

17.

The core of the network includes:

A) hosts, end systems, workstations, servers, smart phones, tablets B) HTML, web pages, electronic mail and network protocols C) routers, switches and internetworking devices D) Users, people or the outside environment

18.

When sending voice or video packet data

A) the TCP protocol is used because it does not provide flow control and re-transmission that would negatively impact the audio and video streams B) the TCP protocol is used because it offers flow control and re-transmission C) the UDP protocol is used because it does not provide flow control and re-transmission that would negatively impact the audio and video streams D) the UDP protocol is used because it offers flow control an re-transmission

19.

This protocol is used to transfer web pages

A) FTP - File Transfer Protocol B) HTML - HyperText Markup Language C) HTTP - HyperText Transfer Protocol D) WPTP - Web Page Transfer Protocol

20.

This protocol is used to transport electonic mail messages between mail servers

A) IMAP - Internet Message Application Protocol B) IMSP - Internet Mail Server Protocol C) POP3 - Post Office Protocol, version 3 D) SMTP - Simple Mail Transport Protocol

21.

This application layer protocol allows for nodes to look up the IP addresses of a given host name

A) ARP - Address Resolution Protocol B) DNS - Domain Name Service C) HLP - Host Lookup Protocol D) IPLP - IP Address Lookup Protocol

22.

The link layer address

A) Is a 128 bit address in IPv6 B) Is a 32 bit address in IPv4 C) is a 48 bit address in Ethernet D) Is assigned by the network administrator

23.

The SSL Protocol

A) Adds bandwidth management to TCP and UDP to provide for smooth video and audio transmission B) Adds security to the Ethernet by adding encyrption C) Adds security to the TCP protocol by adding encryption D) Adds security to the UDP protocol by adding encyrption

24.

UDP is a connectionless protocol, this means

A) UDP data packets don't have destination IP addresses B) UDP packets are sent to the recipient without prior negotiation or handshaking C) UDP packets can be read by any node in the network D) UDP packets have to be requested, otherwise they are discarded

25.

The edge of the network includes:

A) data links, circuits, DSL, Cable modems and Ethernet B) hosts, end systems, workstations, servers, smart phones, tablets C) routers, switches and internetworking devices D) Users, people or the outside environment

26.

In a short paragraph, explain the transmission of data from a client and a server. Explain the content (in general) of each message and the direction (from client to server or server to client).Assume that the client initiates the communication session. Include the exchange of messages in a TCP 3-way handshake.Assume that the client knows the IP address of the server already. Assume that the entire "data" to be transmitted from the client to the server is simply the message "hello" and will fit in one TCP packet.Assume that once the client sends the message successfully, that it tears down the connection and isn't going to leave it open.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Oracle RMAN For Absolute Beginners

Authors: Darl Kuhn

1st Edition

1484207637, 9781484207635

More Books