Download as pdf or txt
Download as pdf or txt
You are on page 1of 16

Pre-Final

iLearn     Patrick Gonzalez

CST311-30_SU18:Intro to Computer
Networks
Home / My courses / Summer 18 / CST311-30_SU18:Intro to Computer Networks / Week 7 / Pre-Final

Started on Monday, 11 June 2018, 10:21 AM


State Finished
Completed on Tuesday, 12 June 2018, 3:04 PM
Time taken 1 day 4 hours
Grade Not yet graded

Question 1

Complete The name of the packet in the Application layer is


Mark 1.00 out of
1.00

Flag
question Answer: message

Question 2

Complete The name of the packet in the Transport layer is


Mark 1.00 out of
1.00

Flag
question Answer: segments

Question 3

Complete The name of the packet in the Network layer is 


Mark 1.00 out of

https://ilearn.csumb.edu/mod/quiz/review.php?attempt=788207&cmid=636060[6/12/2018 3:11:29 PM]


Pre-Final

1.00

Flag
question Answer: datagram

Question 4

Complete The name of the packet in the Link layer is


Mark 1.00 out of
1.00

Flag
question Answer: frame

Question 5

Complete Consider the scenario in the figure below, in which three hosts are each
Mark 1.00 out of connected to a router by a 100 Mbps link, with an near-zero ms propagation
1.00 delay. That router in turn is connected to another router over a 30 Mbps link with
Flag a 50 ms propagation delay, and that latter router is connected to two remote
question
logging servers, each over a 20 Mbps link with a 10 ms propagation delay.

Suppose one of the hosts sends a message directly to one of the remote
logging servers. The message is 10K bits long. What is the end-to-end delay
from when the message is first transmitted by the host to when it is received at
the remote server? Assume that the request goes directly to the server, that there
are no queueing delays, and that node (router) packet-processing delays are also
zero. 

https://ilearn.csumb.edu/mod/quiz/review.php?attempt=788207&cmid=636060[6/12/2018 3:11:29 PM]


Pre-Final

Select one:
a. .000933

b. .050933

c. .060933

d. .001866

e. .101866

Your answer is correct.

Question 6

Complete What technology is used to translate a domain name to its IP address?


Mark 1.00 out of
1.00

Flag Select one:


question
a. DHCP

b. DNS

c. ARP

d. MAC

e. SMTP

f. PING

g. Trace Route

h. NAT

Your answer is correct.

Question 7

Complete Suppose Alice, with a Web-based e-mail account (such as Hotmail or gmail),
Marked out of sends a message to Bob, who accesses his mail from his mail server using
1.00 POP3. Discuss how the message gets from Alice’s host to Bob’s host. Be sure to
Flag list the series of application-layer protocols that are used to move the message
question
between the two hosts.

https://ilearn.csumb.edu/mod/quiz/review.php?attempt=788207&cmid=636060[6/12/2018 3:11:29 PM]


Pre-Final

1. Alice
2. HTTP
3. Web-based mail server
4. SMTP
5. Bob's mail server
6. POP3
7. Bob

ANSWER is in 2.4.4

Question 8

Complete Suppose Host A sends a few TCP segments back to back to Host B over a TCP
Mark 1.00 out of connection. The first segment has sequence number 90; the second has sequence number
1.00 110.
Flag
question
How much data is in the first segment?

Select one:
a. 20

b. 45

c. 90

d. 110

e. 200

Your answer is correct.

Question 9

Complete Continuing with the above question #8 - suppose that the first segment is lost but the
Mark 1.00 out of second segment arrives at B. In the acknowledgment that Host B sends to Host A, what
1.00 will be the acknowledgment number?
Flag
question

https://ilearn.csumb.edu/mod/quiz/review.php?attempt=788207&cmid=636060[6/12/2018 3:11:29 PM]


Pre-Final

Select one:
a. 20

b. 45

c. 90

d. 110

e. 200

Your answer is correct.

Question 10

Complete Suppose that a Web server runs in Host C on port 80. Suppose this Web server uses
Marked out of persistent connections, and is currently receiving requests from two different Hosts, A
1.00 and B. Are all of the requests being sent through the same socket at Host C? If they are
Flag being passed through different sockets, do both of the sockets have port 80? Discuss and
question
explain

 With a persistent connection, the web server creates a separate connection socket.
The four-tuple connection socket for each connection will contain the source IP
address, source port number, destination IP address, and destination port number. 

The request from host A and B pass through different sockets, because of how host C
reads the IP datagram. When host C receives the IP datagram it reads the four
tuples that were created in the persistent connection, which as created a separate
connection for each. Even though the socket will have 80 as is destination port the
identifiers for these sockets have different values for the source IP address. 

 Answer in 3.2 Web Servers and TCP

Question 11

Complete We have said that an application may choose UDP for a transport protocol
Marked out of because UDP offers finer application control (than TCP) of what data is sent in a
1.00 segment and when. (a). Why does an application have more control of what data
Flag is sent in a segment? (b). Why does an application have more control on when
question

https://ilearn.csumb.edu/mod/quiz/review.php?attempt=788207&cmid=636060[6/12/2018 3:11:29 PM]


Pre-Final

the segment is sent?

a.)  With UDP protocol the application has more control over what data is sent
because the data can be assigned directly by the application to the sending segment
before it is sent. 

b.) With UDP protocol the application has more control over when the segment is sent
because of the simplicity of UDP which will send the data as soon as possible
allowing it to be more predictable. 

Answer in 3.3 Connectionless Transport: UDP

Question 12

Complete In Section 2.7, the UDPserver described needed only one socket, whereas the
Marked out of TCPserver needed two sockets. Why? If the TCPserver were to support 5
1.00 simultaneous connections, each from a different client host, how many sockets
Flag would the TCPserver need?
question

For TCP, the welcoming socket is present unlike in UDP. Therefore, a socket is
created for each client to initiate a connection to the server. 

In order to support 5 simultaneous connection, the TCP server will need 6 sockets,
one more for the welcome socket. 

Answer in 2.7.2 Socket Programming with TCP

Question 13

Complete A new computer has been installed and needs to have an IP address assigned to
Mark 1.00 out of it. What is used to get it’s address.
1.00

Flag
question
Select one:
a. ARP

https://ilearn.csumb.edu/mod/quiz/review.php?attempt=788207&cmid=636060[6/12/2018 3:11:29 PM]


Pre-Final

b. NAT

c. MAC

d. DHCP

e. DNS

f. PING

g. SMTP

h. Trace Route

Your answer is correct.

Question 14

Complete IP address is 211.12.8.6/8, what is the binary equivalent ?


Mark 1.00 out of
1.00

Flag Select one:


question
a. 11000011.00001011.00000100.00000110

b. 11010011.00001100.00001000.00000110

c. 11010011.00000111.00001001.00000100

d. 11010011.00001100.00001000.00000101

e. 11010110.00001011.00001000.00000100

f. No answer is correct

Your answer is correct.

Question 15

Complete IP address is 211.12.8.6/8, what is the network portion in the address in #3?
Mark 1.00 out of
1.00

Flag Select one:


question
a. 211.12.8

b. 12.8

https://ilearn.csumb.edu/mod/quiz/review.php?attempt=788207&cmid=636060[6/12/2018 3:11:29 PM]


Pre-Final

c. 12

d. 8.6

e. 211

f. No answer is correct

Your answer is correct.

Question 16

Complete IP address is 211.12.8.6/8, what is the host portion in the address in #3?
Mark 1.00 out of
1.00

Flag Select one:


question
a. 6

b. 8.6

c. 12.8.6

d. 211

e. 211.12.8.0

f. No answer is correct

Your answer is correct.

Question 17

Complete Write the largest possible subnet mask if three computers 223.2.7.6, 223.2.7.1
Mark 0.00 out of and 223.2.7.5 are all in the same subnet.
1.00

Remove flag

Select one:
a. 8 bits

b. 16 bits

c. 23 bits

https://ilearn.csumb.edu/mod/quiz/review.php?attempt=788207&cmid=636060[6/12/2018 3:11:29 PM]


Pre-Final

d. 28 bits

e. 29 bits

f. 32 bits

Your answer is incorrect.

Question 18

Complete Describe how packet loss can occur at input ports. Describe how packet loss at
Marked out of input ports can be eliminated (without using infinite buffers).
1.00

Flag
question
Packet loss at input ports can occur by the size of the queue becoming too large.
When the speed of the switching fabric slows down the queue size will increase which
will fill up the buffer space of the router.

To eliminate packet loss we can increase the switching fabric speed by the number of
input ports times the input line speed. 

Answer in 4.3.4 Where Does Queueing Occur?

Question 19

Complete Describe how packet loss can occur at output ports. Can this loss be prevented
Marked out of by increasing the switch fabric speed?
1.00

Flag
question
Packet loss can occur at output ports when the size of the queue at the output ports
become too large and the outgoing speed slows down. With the increase in the size
of the queue, the buffering space of the router will fill up as the queue increases. 

This can not be prevented by increasing the switch fabric speed. 

Answer in 4.3.4 Where Does Queueing Occur?

https://ilearn.csumb.edu/mod/quiz/review.php?attempt=788207&cmid=636060[6/12/2018 3:11:29 PM]


Pre-Final

Question 20

Complete What prevents a packet from moving in an infinite loop trying to reach its
Mark 1.00 out of destination?
1.00

Flag
question
Select one:
a. CIDR

b. PING

c. TTL

d. Segment offset

Your answer is correct.

Question 21

Complete Link state algorithm is more compute complex than distance vector routing
Mark 1.00 out of protocol.
1.00

Flag
question
Select one:
True

False

Question 22

Complete NAT translates: an internal addresses in a non-routable address space, with a


Mark 1.00 out of reserved, private number network such as 10.0.0/24, that is used internally along
1.00 with a port number - to a routable address with a different port number to connect
Flag externally; when packets return, NAT does a lookup and translates back to what
question
the internal address and original port number was and sends the packet to the
sender

Select one:
True

False

https://ilearn.csumb.edu/mod/quiz/review.php?attempt=788207&cmid=636060[6/12/2018 3:11:29 PM]


Pre-Final

Question 23

Complete Fragmentation can occur due to different MTU sizes on different routers along
Mark 0.00 out of the path a packet is sent; and reassembly of the fragments occurs at each router
1.00 along the path
Remove flag

Select one:
True

False

Question 24

Complete  A router is a layer 3 device


Mark 0.00 out of
1.00

Remove flag Select one:


True

False

Question 25

Complete  A switch is a layer 2 device.


Mark 1.00 out of
1.00

Flag Select one:


question
True

False

Question 26

Complete What technology is used to translate IP addresses to link layer addresses?


Mark 1.00 out of
1.00

Flag Select one:


question
a. ARP

https://ilearn.csumb.edu/mod/quiz/review.php?attempt=788207&cmid=636060[6/12/2018 3:11:29 PM]


Pre-Final

b. NAT

c. MAC

d. DHCP

e. DNS

f. PING

g. SMTP

h. Trace Route

Your answer is correct.

Question 27

Complete Host A with IP address 111.111.111.111 wants to send a datagram to Host B


Mark 0.00 out of with IP address 222.222.222.222 in the diagram below. What destination IP
1.00 address and MAC address does Host A put in it’s datagram to send to Host B?
Remove flag

Select one:
a. IP address 111.111.111.111 and MAC address 74-29-9C-E8-FF-55 of Host
A

b. IP address 222.222.222.222 and MAC address 49-BD-D2-C7-56-2A of Host


B

c. IP address 111.111.111.111 of Host A and MAC address 49-BD-D2-C7-56-


2A of Host B

d. IP address 222.222.222.222 of Host B and MAC address E6-E9-00-17-BB-


4B of Router

e. IP address 222.222.222.222 of Host B and MAC address 1A-23-F9-CD-06-


9B of Router

https://ilearn.csumb.edu/mod/quiz/review.php?attempt=788207&cmid=636060[6/12/2018 3:11:29 PM]


Pre-Final

Your answer is incorrect.

Question 28

Complete Why is an ARP query sent within a broadcast frame? Why is an ARP response
Marked out of sent within a frame with a specific destination MAC address?
1.00

Flag
question
An ARP is sent in a broadcast frame because the host does not know the IP
address of the corresponding adapter. Whereas the response, the sending node
knows the adapter address for where it's being sent and therefore doesn't need to be
sent in a broadcast frame. 

 Answer is in 5.4.1 Address Resolution Protocol (ARP)

Question 29

Complete Can you “decrypt” a hash of a message to get the original message? Explain
Marked out of your answer
1.00

Flag
question
No, because a hash function is a one-way function. With a hash function, the hash
value of the original message cannot be recovered. 

Answer is in 8.3.1 Cryptographic Hash Functions

Question 30

Complete List and explain two important difference between a symmetric-key system and a
Marked out of public-key system?
1.00

Flag
question
Symmetric-key system:

https://ilearn.csumb.edu/mod/quiz/review.php?attempt=788207&cmid=636060[6/12/2018 3:11:29 PM]


Pre-Final

Both the sender and receiver must know the same secret key.
The same key is used for both encryption and decryption. 

Public-key system:

 The encryption key is known by the entire world, but the decryption key is known
only by the receiver. 
The encryption and decryption keys are different.

Answer in 8.2.2 Public Key Encryption

Question 31

Complete In what way does the public-key encrypted message hash provide a better digital
Marked out of signature than the public-key encrypted message?
1.00

Flag
question
A public-key signed message digest is "better" in that one need only encrypt (using
the private key) a short message digest, rather than the entire message. Since public
key encryption with a technique like RSA is expensive, it's desirable to have to sign
(encrypt) a smaller amount of data than a larger amount of data.

Answer is in 8.3.3 Digital signatures

Question 32

Complete What does it mean for a signed document to be verifiable and non-forgeable
Marked out of
1.00

Flag To be verifiable the receiver must be able to convince themselves that the
question
document was sent by the sender.

To be non-forgeable the receiver must be able to convene themselves the document


could only have been sent by the sender and not anyone else. 

Answer is in 8.3.3 Digital signatures

https://ilearn.csumb.edu/mod/quiz/review.php?attempt=788207&cmid=636060[6/12/2018 3:11:29 PM]


Pre-Final

Question 33

Complete Suppose Alice has a message that she is ready to send to anyone who asks.
Marked out of Thousands of people want to obtain Alice’s message, but each wants to be sure
1.00 of the integrity of the message. In this context, do you think a MAC-based or a
Flag digital-signature-based integrity scheme is more suitable? Why ?
question

A digital signature based integrity scheme is more suitable because Alice can use the
same digital signature for all receivers. Also, a digital signature based integrity
scheme is verifiable and non-forgeable. 

Answer in 8.3.2 - 8.3.3

Finish review

QUIZ NAVIGATION

Patrick Gonzalez

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19

20 21 22 23 24 25 26 27 28 29 30 31 32 33

Finish review

https://ilearn.csumb.edu/mod/quiz/review.php?attempt=788207&cmid=636060[6/12/2018 3:11:29 PM]


Pre-Final

◄ Study Guide
Jump to...
Jump to...

You are logged in as Patrick Gonzalez (Log out)


CST311-30_SU18

Help
IT Help Desk
Login/Password
iLearn for Faculty
iLearn for Students
Technology for Students
Browser Test
Resources
Library
Bookstore
Class schedule

Get the mobile app


Policies

https://ilearn.csumb.edu/mod/quiz/review.php?attempt=788207&cmid=636060[6/12/2018 3:11:29 PM]

You might also like