click below
click below
Normal Size Small Size show me how
Computer Networks
| Question | Answer |
|---|---|
| Data which an application wants to send and passed onto the next layer is included as part of the: | Application-layer message |
| Network-layer datagram: encapsulates transport-layer segment with a network-layer header | True |
| Which layers in the Internet protocol stack does a link-layer switch process? | Routers process link and physical layers |
| Most of the content providers created and maintained their own networks. | False |
| List five tasks that a layer can perform: error control, ______, segmentation and reassembly, multiplexing, and connection setup. | flow control |
| The popular wireless Internet access technologies today are: | Wi-Fi in wireless LAN and 3G and 4G Wide-Area network |
| There is no difference between a host and an end system, the words "host" and "end system are used interchangeably. | True |
| Standards are important for protocols so that people can create networking systems and products that interoperate. | True |
| Which access technologies is classified as Enterprise access? | 100 Mbps switched Ethernet. |
| True or False? ADSL: up to 24 Mbps downstream and 2.5 Mbps upstream, bandwidth is shared | False |
| Which of the following should be considered as network end system(s)? | All in the list: PDAs, Workstations, PCs, Web Servers |
| Which layers in the Internet protocol stack does a router process? | Routers process network, link and physical layers. |
| End Sys A sends a large file to End Sys B; A break the file into chunks, adds a header to each chunk, generating multiple packets from the file. What info will need to be included in the header to deliver each chunk of data? | IP address |
| A packet-switched network provides a guarantee bandwidth for the duration of the call. | False |
| T or F? HFC, rates up to 42.8 Mbps and upstream rates of up to 30.7 Mbps, bandwidth is shared | True |
| Link-layer frame: encapsulates network-layer datagram with a link-layer header | True |
| What are the layers in the Internet Protocol stack? | All in the list: physical, application, network, transport, link |
| The following are the network delay components, which are a variable delay? | queuing delays |
| In the mail download and keep configuration, messages are deleted after the user retrieves the messages | False |
| In the P2P file-sharing application, the peer that is receiving the file is typically the client and the peer that is sending the file is typically the server | True |
| An organization's mail server and Web serer cannot have the same alias for a host name. The DNS record is used to track and map different mail server's hot name to its IP address. | False |
| Web caching can reduce delay for all objects, even objects that are not cached, since caching reduces the traffic on links. | True |
| List the broad classes of services that a transport protocol can provide | All in the list: confidentiality, guarantee that a certain value for throughput maintained, reliable data transfer, guarantee data delivered within a specific amount of time. |
| Besides network-related considerations such as delay, loss, and bandwidth performance, there are other important factors that go into designing a CDN server selection strategy. What are they? | All in the list: Load-balancing, variations across DNS servers within a network, need to alleviate hot-spots that arise due to popular video content, ISP delivery cost, limited availability of rarely accessed video. |
| Suppose you wanted to do a transaction from a remote client to a server as fast as possible. TCP should be used. | False |
| What information is used by a process running on one host to identify a process on another host? | Destination IP Address and Socket Port number |
| Alice (web-based email) sends message to Bob (accesses using POP3). How does the message get from Alice's host to Bob's? list the series of application-layer protocols used to move the message between the two hosts | sent from Alice's host to her mail server over HTTP > Alice mail server to Bob's over SMTP > Bob then transfers message from his mail server to is host over POP3. |
| For the client-server application over UDP, the client program may be executed before the server program? | True |
| For each of the service classes, indicate which TCP provides such a service. | Reliable data transfer |
| If the application developer wants TCP to be enhanced with SSL, the developer has to include the SSL code in the application. | True |
| For the client-server application over TCP described, the server program must be executed before the client program? | True |
| Which application(s) run on top of TCP rather than UDP? | All in the list: HTTP, POP3, SMTP |
| In BitTorrent, suppose Alice provides chunks to Bob throughout a 30-second interval. Will Bob necessarily return the favor and provide chunks to Alice in this same interval? | All in the list: It is not necessary that Bob will also provide chunks to Alice, Alice has to be in the top 4 neighbors of Bob for bob to send chunks to her, and this might now occur even if Alice provides chunks to Bob throughout a 30-second interval. |
| An e-commerce site could use cookies to keep a purchase record of each of its customers | True |
| For a communication session between a pair of processes, which process is the client and which is the server? The process which initiates is the client; the process taht waits to be contacted is the server. | True |
| If the TCP server were to support n simultaneous connections, each from a different client host, how many sockets would the TCP server need? | n + 1 |