Professional Documents
Culture Documents
Pre-Final Attempt 1
Pre-Final Attempt 1
CST311-30_SU18:Intro to Computer
Networks
Home / My courses / Summer 18 / CST311-30_SU18:Intro to Computer Networks / Week 7 / Pre-Final
Question 1
Flag
question Answer: message
Question 2
Flag
question Answer: segments
Question 3
1.00
Flag
question Answer: datagram
Question 4
Flag
question Answer: frame
Question 5
Complete Consider the scenario in the figure below, in which three hosts are each
Mark 1.00 out of connected to a router by a 100 Mbps link, with an near-zero ms propagation
1.00 delay. That router in turn is connected to another router over a 30 Mbps link with
Flag a 50 ms propagation delay, and that latter router is connected to two remote
question
logging servers, each over a 20 Mbps link with a 10 ms propagation delay.
Suppose one of the hosts sends a message directly to one of the remote
logging servers. The message is 10K bits long. What is the end-to-end delay
from when the message is first transmitted by the host to when it is received at
the remote server? Assume that the request goes directly to the server, that there
are no queueing delays, and that node (router) packet-processing delays are also
zero.
Select one:
a. .000933
b. .050933
c. .060933
d. .001866
e. .101866
Question 6
b. DNS
c. ARP
d. MAC
e. SMTP
f. PING
g. Trace Route
h. NAT
Question 7
Complete Suppose Alice, with a Web-based e-mail account (such as Hotmail or gmail),
Marked out of sends a message to Bob, who accesses his mail from his mail server using
1.00 POP3. Discuss how the message gets from Alice’s host to Bob’s host. Be sure to
Flag list the series of application-layer protocols that are used to move the message
question
between the two hosts.
1. Alice
2. HTTP
3. Web-based mail server
4. SMTP
5. Bob's mail server
6. POP3
7. Bob
ANSWER is in 2.4.4
Question 8
Complete Suppose Host A sends a few TCP segments back to back to Host B over a TCP
Mark 1.00 out of connection. The first segment has sequence number 90; the second has sequence number
1.00 110.
Flag
question
How much data is in the first segment?
Select one:
a. 20
b. 45
c. 90
d. 110
e. 200
Question 9
Complete Continuing with the above question #8 - suppose that the first segment is lost but the
Mark 1.00 out of second segment arrives at B. In the acknowledgment that Host B sends to Host A, what
1.00 will be the acknowledgment number?
Flag
question
Select one:
a. 20
b. 45
c. 90
d. 110
e. 200
Question 10
Complete Suppose that a Web server runs in Host C on port 80. Suppose this Web server uses
Marked out of persistent connections, and is currently receiving requests from two different Hosts, A
1.00 and B. Are all of the requests being sent through the same socket at Host C? If they are
Flag being passed through different sockets, do both of the sockets have port 80? Discuss and
question
explain
With a persistent connection, the web server creates a separate connection socket.
The four-tuple connection socket for each connection will contain the source IP
address, source port number, destination IP address, and destination port number.
The request from host A and B pass through different sockets, because of how host C
reads the IP datagram. When host C receives the IP datagram it reads the four
tuples that were created in the persistent connection, which as created a separate
connection for each. Even though the socket will have 80 as is destination port the
identifiers for these sockets have different values for the source IP address.
Question 11
Complete We have said that an application may choose UDP for a transport protocol
Marked out of because UDP offers finer application control (than TCP) of what data is sent in a
1.00 segment and when. (a). Why does an application have more control of what data
Flag is sent in a segment? (b). Why does an application have more control on when
question
a.) With UDP protocol the application has more control over what data is sent
because the data can be assigned directly by the application to the sending segment
before it is sent.
b.) With UDP protocol the application has more control over when the segment is sent
because of the simplicity of UDP which will send the data as soon as possible
allowing it to be more predictable.
Question 12
Complete In Section 2.7, the UDPserver described needed only one socket, whereas the
Marked out of TCPserver needed two sockets. Why? If the TCPserver were to support 5
1.00 simultaneous connections, each from a different client host, how many sockets
Flag would the TCPserver need?
question
For TCP, the welcoming socket is present unlike in UDP. Therefore, a socket is
created for each client to initiate a connection to the server.
In order to support 5 simultaneous connection, the TCP server will need 6 sockets,
one more for the welcome socket.
Question 13
Complete A new computer has been installed and needs to have an IP address assigned to
Mark 1.00 out of it. What is used to get it’s address.
1.00
Flag
question
Select one:
a. ARP
b. NAT
c. MAC
d. DHCP
e. DNS
f. PING
g. SMTP
h. Trace Route
Question 14
b. 11010011.00001100.00001000.00000110
c. 11010011.00000111.00001001.00000100
d. 11010011.00001100.00001000.00000101
e. 11010110.00001011.00001000.00000100
f. No answer is correct
Question 15
Complete IP address is 211.12.8.6/8, what is the network portion in the address in #3?
Mark 1.00 out of
1.00
b. 12.8
c. 12
d. 8.6
e. 211
f. No answer is correct
Question 16
Complete IP address is 211.12.8.6/8, what is the host portion in the address in #3?
Mark 1.00 out of
1.00
b. 8.6
c. 12.8.6
d. 211
e. 211.12.8.0
f. No answer is correct
Question 17
Complete Write the largest possible subnet mask if three computers 223.2.7.6, 223.2.7.1
Mark 0.00 out of and 223.2.7.5 are all in the same subnet.
1.00
Remove flag
Select one:
a. 8 bits
b. 16 bits
c. 23 bits
d. 28 bits
e. 29 bits
f. 32 bits
Question 18
Complete Describe how packet loss can occur at input ports. Describe how packet loss at
Marked out of input ports can be eliminated (without using infinite buffers).
1.00
Flag
question
Packet loss at input ports can occur by the size of the queue becoming too large.
When the speed of the switching fabric slows down the queue size will increase which
will fill up the buffer space of the router.
To eliminate packet loss we can increase the switching fabric speed by the number of
input ports times the input line speed.
Question 19
Complete Describe how packet loss can occur at output ports. Can this loss be prevented
Marked out of by increasing the switch fabric speed?
1.00
Flag
question
Packet loss can occur at output ports when the size of the queue at the output ports
become too large and the outgoing speed slows down. With the increase in the size
of the queue, the buffering space of the router will fill up as the queue increases.
Question 20
Complete What prevents a packet from moving in an infinite loop trying to reach its
Mark 1.00 out of destination?
1.00
Flag
question
Select one:
a. CIDR
b. PING
c. TTL
d. Segment offset
Question 21
Complete Link state algorithm is more compute complex than distance vector routing
Mark 1.00 out of protocol.
1.00
Flag
question
Select one:
True
False
Question 22
Select one:
True
False
Question 23
Complete Fragmentation can occur due to different MTU sizes on different routers along
Mark 0.00 out of the path a packet is sent; and reassembly of the fragments occurs at each router
1.00 along the path
Remove flag
Select one:
True
False
Question 24
False
Question 25
False
Question 26
b. NAT
c. MAC
d. DHCP
e. DNS
f. PING
g. SMTP
h. Trace Route
Question 27
Select one:
a. IP address 111.111.111.111 and MAC address 74-29-9C-E8-FF-55 of Host
A
Question 28
Complete Why is an ARP query sent within a broadcast frame? Why is an ARP response
Marked out of sent within a frame with a specific destination MAC address?
1.00
Flag
question
An ARP is sent in a broadcast frame because the host does not know the IP
address of the corresponding adapter. Whereas the response, the sending node
knows the adapter address for where it's being sent and therefore doesn't need to be
sent in a broadcast frame.
Question 29
Complete Can you “decrypt” a hash of a message to get the original message? Explain
Marked out of your answer
1.00
Flag
question
No, because a hash function is a one-way function. With a hash function, the hash
value of the original message cannot be recovered.
Question 30
Complete List and explain two important difference between a symmetric-key system and a
Marked out of public-key system?
1.00
Flag
question
Symmetric-key system:
Both the sender and receiver must know the same secret key.
The same key is used for both encryption and decryption.
Public-key system:
The encryption key is known by the entire world, but the decryption key is known
only by the receiver.
The encryption and decryption keys are different.
Question 31
Complete In what way does the public-key encrypted message hash provide a better digital
Marked out of signature than the public-key encrypted message?
1.00
Flag
question
A public-key signed message digest is "better" in that one need only encrypt (using
the private key) a short message digest, rather than the entire message. Since public
key encryption with a technique like RSA is expensive, it's desirable to have to sign
(encrypt) a smaller amount of data than a larger amount of data.
Question 32
Complete What does it mean for a signed document to be verifiable and non-forgeable
Marked out of
1.00
Flag To be verifiable the receiver must be able to convince themselves that the
question
document was sent by the sender.
Question 33
Complete Suppose Alice has a message that she is ready to send to anyone who asks.
Marked out of Thousands of people want to obtain Alice’s message, but each wants to be sure
1.00 of the integrity of the message. In this context, do you think a MAC-based or a
Flag digital-signature-based integrity scheme is more suitable? Why ?
question
A digital signature based integrity scheme is more suitable because Alice can use the
same digital signature for all receivers. Also, a digital signature based integrity
scheme is verifiable and non-forgeable.
Finish review
QUIZ NAVIGATION
Patrick Gonzalez
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19
20 21 22 23 24 25 26 27 28 29 30 31 32 33
Finish review
◄ Study Guide
Jump to...
Jump to...
Help
IT Help Desk
Login/Password
iLearn for Faculty
iLearn for Students
Technology for Students
Browser Test
Resources
Library
Bookstore
Class schedule