Computer Networking Protocols Quiz
48 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the primary difference between Go-Back-N and Stop-And-Wait protocols in terms of complexity?

  • Go-Back-N requires more memory at the transmitter. (correct)
  • Go-Back-N requires more complex error detection mechanisms.
  • Go-Back-N requires a larger number of sequence numbers to distinguish data units.
  • Go-Back-N requires more memory at the receiver.

Which of the following is NOT a characteristic of Aloha and S-Aloha protocols?

  • They are prone to low efficiency due to potential collisions.
  • They lack preventive mechanisms to avoid collisions.
  • They handle collisions by retransmitting data after a random delay.
  • They employ fixed time intervals for transmission to avoid interference. (correct)

How many layers are present in the Internet protocol architecture?

  • Four (correct)
  • Six
  • It has no defined layers.
  • Seven

What kind of feedback does the TCP receiver send?

<p>Cumulative acknowledgments for all received segments. (A)</p> Signup and view all the answers

How does Go-Back-N differ from Stop-And-Wait in terms of receiver window size?

<p>Both protocols have the same receiver window size. (C)</p> Signup and view all the answers

Which of the following is a characteristic of S-Aloha protocol that distinguishes it from Aloha?

<p>S-Aloha handles collisions by retransmitting data after a predetermined delay. (B)</p> Signup and view all the answers

Which layer in the Internet protocol stack is responsible for providing end-to-end connectivity?

<p>Transport layer (A)</p> Signup and view all the answers

How does TCP achieve reliable data delivery?

<p>By implementing a sliding window protocol with cumulative acknowledgments. (A)</p> Signup and view all the answers

How does the TCP protocol ensure the reliability of data transmission?

<p>By using a checksum to detect errors and retransmitting lost or corrupted segments. (B)</p> Signup and view all the answers

What is the purpose of the P/F (Poll/Final) bit in the LAPB protocol?

<p>To request a response from a secondary station. (B)</p> Signup and view all the answers

Which protocol does NOT explicitly define data unit boundaries?

<p>IEEE 802.2 LLC (D)</p> Signup and view all the answers

Which of the following is NOT a feature of the TCP protocol?

<p>Data encryption (D)</p> Signup and view all the answers

What is the primary function of the checksum in the TCP protocol?

<p>To detect errors in data transmission. (A)</p> Signup and view all the answers

Which protocol is used for domestic access to the internet?

<p>PPP (D)</p> Signup and view all the answers

What is the primary purpose of the IEEE 802.2 LLC layer in a network?

<p>To provide logical addressing and flow control. (C)</p> Signup and view all the answers

What is the essential requirement for Ethernet to operate in 'full-duplex' mode?

<p>A network switch with full-duplex capabilities. (C)</p> Signup and view all the answers

What is a characteristic of the TCP segment header size?

<p>It is of variable size depending on the options present (B)</p> Signup and view all the answers

How are logical addresses in the Internet organized?

<p>They are organized into domains (B)</p> Signup and view all the answers

Which routing protocol is used for inter-AS routing?

<p>EGP (Exterior Gateway Protocol) (C)</p> Signup and view all the answers

In the OSI model, an (N)-connection can be realized by which of the following?

<p>One or more (N-1) connections (A)</p> Signup and view all the answers

What modification was made to the MAC protocol in the transition from 10Mbit/s to 100Mbit/s Ethernet?

<p>A new mechanism was introduced to avoid collisions (D)</p> Signup and view all the answers

What does the metric (cost) in a routing algorithm represent?

<p>The weight assigned to a link in path selection (D)</p> Signup and view all the answers

What is NOT an advantage of virtual circuit type services over datagram type services?

<p>Allows for a simpler routing mechanism (C)</p> Signup and view all the answers

Which statement regarding the TCP header options is correct?

<p>Options have a variable size and may be omitted (C)</p> Signup and view all the answers

What is a key advantage of virtual circuit services over datagram services?

<p>Less variability in packet delays, routing only at connection opening phase (C)</p> Signup and view all the answers

Which technique is employed by IEEE 802.1d Transparent Bridges for routing?

<p>Routing follows 'backward learning' and flooding criteria (C)</p> Signup and view all the answers

How does Ethernet at 1 Gb/s ensure effective collision detection compared to Fast Ethernet at 100 Mb/s?

<p>By increasing the minimum size of PDUs (A)</p> Signup and view all the answers

What distinguishes VBR (Variable Bit Rate) type sources from CBR (Constant Bit Rate) sources?

<p>VBR allows a larger variation between maximum and minimum transmission speed (C)</p> Signup and view all the answers

At what level is end-to-end error recovery managed in the Internet environment?

<p>At the Transport layer (A)</p> Signup and view all the answers

Which statement about CBR is correct?

<p>CBR sources typically have a fixed transmission speed (A)</p> Signup and view all the answers

What implication does the switch from Fast Ethernet to Gigabit Ethernet have on network design?

<p>Minimum distances between hosts must be maintained to detect collisions (D)</p> Signup and view all the answers

In what way does VBR typically affect network performance compared to CBR?

<p>VBR sources introduce greater potential delay variability (D)</p> Signup and view all the answers

Which of the following enhances the possibility of parallelization and reduces the probability of error on a packet?

<p>Better possibility of parallelization, lower packetization delay, lower probability of error on packet (B)</p> Signup and view all the answers

What is the primary service provided by the transport layer in the OSI model?

<p>Based on the services provided by the network layer (C)</p> Signup and view all the answers

Which of the following statements is TRUE in the context of the ISO/OSI reference model?

<p>One (N)-entity can be associated with two different (N-1)-addresses. (B)</p> Signup and view all the answers

In a Go-Back-N type window protocol, when is it advantageous to increase the size of the transmission window?

<p>When transmission speed increases at equal data unit size and equal data unit transfer delays between transmitter and receiver (B)</p> Signup and view all the answers

Which of the following factors directly influences the length of a packet?

<p>The degree of parallelization and the packetization delay (D)</p> Signup and view all the answers

Why are short packets beneficial for voice traffic over a packet network?

<p>They minimize the delay in transmitting voice data, ensuring real-time communication. (C)</p> Signup and view all the answers

What is the primary reason for increasing the size of the transmission window in a Go-Back-N protocol?

<p>To improve the efficiency of the protocol by reducing the time spent waiting for acknowledgements (C)</p> Signup and view all the answers

What is the relationship between packetization delay and the efficiency of a window protocol?

<p>A lower packetization delay increases the efficiency of the protocol (C)</p> Signup and view all the answers

What is a key characteristic of a full-duplex physical medium?

<p>The capability to transmit and receive packets simultaneously. (D)</p> Signup and view all the answers

What is the defining feature of a full-duplex physical medium, as described in the text?

<p>The ability to simultaneously receive and transmit packets. (A)</p> Signup and view all the answers

Which of the following describes the characteristics of a tree topology?

<p>Low channel count, poor fault tolerance, easy routing. (A)</p> Signup and view all the answers

Which of the following statements about IPv4 addresses is correct?

<p>IPv4 addresses have a fixed total length, with a variable length network identifier and a variable length host identifier. (D)</p> Signup and view all the answers

In Store-and-Forward packet-switched networks, what effect do large PDUs (packets) have on information transfer delay?

<p>Increases the overall information transfer delay because each node must receive the entire PDU before it can send it on the next channel. (C)</p> Signup and view all the answers

What is the relationship between transmission window size (Wt) and reception window size (Wr) in a Selective Repeat protocol?

<p>The sum of Wt and Wr should always be less than or equal to 2^k, where k is the number of bits used for packet numbering. (A)</p> Signup and view all the answers

What is a primary advantage of using small packets in Store-and-Forward packet-switched networks?

<p>Minimizes the storage time at each node. (C)</p> Signup and view all the answers

Which of these network topologies is characterized by low channel count, poor fault tolerance, and easy routing?

<p>Tree Topology (D)</p> Signup and view all the answers

Flashcards

Short Packet Advantages

Short packets enable parallel transmission across multiple communication channels, reduce packetization delay for real-time traffic like voice, and minimize control information overhead.

Transport Layer Reliance

The Transport Layer in the OSI model relies on services provided by the Network Layer below it for data transmission.

Entity Addressing

Within the OSI model, a single entity at a specific layer can have multiple addresses at the layer below it.

Go-Back-N Window Size

Increasing the transmission speed while maintaining the same data unit size and delay allows for a larger window size in Go-Back-N protocols to improve efficiency.

Signup and view all the flashcards

Go-Back-N Efficiency

The efficiency of a Go-Back-N protocol is affected by the ratio of transmission time (tx) to propagation delay (tp). Increasing the transmission speed, which reduces tx, necessitates a larger window size to maintain efficiency.

Signup and view all the flashcards

Long Packet Efficiency

Longer packets reduce the proportion of control information, leading to increased efficiency in transferring large data units (SDUs).

Signup and view all the flashcards

Packet Length Factors

Packet length is influenced by the feasibility of parallelization (pipelining), packetization delay, and the proportion of control information.

Signup and view all the flashcards

Communication Efficiency Factors

Parallelization, packetization delay, and the probability of errors on packets are critical factors in determining the effectiveness of a communication method.

Signup and view all the flashcards

Cumulative ACK

A window protocol where the receiver acknowledges the receipt of data segments cumulatively, meaning it acknowledges the highest-numbered segment received in order. This simplifies receiver implementation.

Signup and view all the flashcards

Stop-and-Wait Protocol

A type of communication protocol where the sender waits for an acknowledgment (ACK) after each data unit is sent before transmitting the next unit. This is simple but inefficient for high-bandwidth connections.

Signup and view all the flashcards

Go-Back-N Protocol

A type of communication protocol that allows the sender to transmit multiple data units before waiting for an acknowledgment. This improves efficiency but requires more complex buffering and sequencing mechanisms.

Signup and view all the flashcards

Aloha Protocol

A method of accessing a shared communication channel where users transmit data without coordinating. Collisions can occur, and a random backoff mechanism is used to resolve them.

Signup and view all the flashcards

Slotted Aloha Protocol

A variation of the Aloha protocol where users are assigned fixed time intervals for transmission, helping to reduce collisions and improve overall efficiency.

Signup and view all the flashcards

Internet Protocol Architecture

The internet's layered architecture, consisting of four layers, each responsible for specific functions: application, transport, internetwork, and network access. This modular design allows for flexibility and adaptability.

Signup and view all the flashcards

TCP (Transmission Control Protocol)

A protocol that provides reliable, ordered delivery of data over an unreliable network. It uses a sliding window mechanism to optimize transmission efficiency and handle packet loss or corruption.

Signup and view all the flashcards

TCP Header Size

The TCP header has a variable size due to its "Options" field, which can include additional information depending on the transmission needs.

Signup and view all the flashcards

Internet Logical Addresses

Logical addresses in the Internet are organized into domains, which are hierarchical structures that enable efficient routing and management.

Signup and view all the flashcards

Routing Between ASs

The Exterior Gateway Protocol (EGP) is used for routing information between Autonomous Systems (ASs), which are independent network domains.

Signup and view all the flashcards

OSI Model Connections

In the OSI model, an (N)-connection, representing a connection at layer N, can be realized by one or more connections at layer (N-1).

Signup and view all the flashcards

100Mbit/s Ethernet MAC Protocol

In the 100Mbit/s Ethernet standard, the MAC protocol remains unchanged compared to the 10Mbit/s version. While collisions are still possible, the larger bandwidth offers a wider 'collision domain.'

Signup and view all the flashcards

Routing Algorithm Metric

In routing algorithms, the metric (cost) represents the weight assigned to a link in path selection, reflecting factors like network capacity or signal strength.

Signup and view all the flashcards

Virtual Circuit vs. Datagram

Virtual circuit type services provide a dedicated connection between endpoints, offering higher reliability and guaranteed bandwidth compared to datagram services, which utilize a best-effort approach.

Signup and view all the flashcards

Routing Algorithm Metric

The metric (cost) in a routing algorithm represents the estimated cost or weight associated with a specific link in the network, which helps the routing algorithm choose the most efficient path.

Signup and view all the flashcards

Virtual Circuit Services

Virtual circuit services offer predictable data delivery with consistent route and minimal delay variation. They are established at connection opening and route information is maintained throughout the connection.

Signup and view all the flashcards

Datagram Services

Datagram services allow packets to travel independently, choosing their own routes. This has no guarantee of delivery order or consistent timing. Each packet's route is determined individually.

Signup and view all the flashcards

IEEE 802.1d Transparent Bridges

Transparent Bridges in IEEE 802.1d learn routes by listening to network traffic and forward packets based on learned information.

Signup and view all the flashcards

Collision Detection in Fast Ethernet

Fast Ethernet at 100 Mb/s uses a smaller packet size, allowing sufficient time for collision detection within the network.

Signup and view all the flashcards

Collision Detection in Gigabit Ethernet

The increased transmission speed of Gigabit Ethernet requires larger packet sizes to maintain sufficient time for collision detection.

Signup and view all the flashcards

VBR vs CBR

VBR (Variable Bit Rate) sources, often used in streaming and file transfer, exhibit a wider range of transmission speeds compared to CBR (Constant Bit Rate) sources, used in video conferencing.

Signup and view all the flashcards

End-to-end Error Recovery

End-to-end error recovery ensures reliable data delivery and is typically implemented at the Transport level.

Signup and view all the flashcards

Transport Level Functions

The Transport level (e.g., TCP) handles communication between applications and ensures data integrity and transmission reliability. It can implement error recovery mechanisms.

Signup and view all the flashcards

Full-Duplex

The ability to simultaneously send and receive data packets, allowing for more efficient data transfer.

Signup and view all the flashcards

Star Topology

A network topology where each node is connected to a central hub, offering easy setup and management but lacking resilience to failures.

Signup and view all the flashcards

Bus Topology

A network topology where nodes are connected in a linear chain, simple to setup but vulnerable to single-point failures.

Signup and view all the flashcards

Store-And-Forward

A data transmission technique where the entire data packet is received and stored by a node before being forwarded.

Signup and view all the flashcards

Packet Switching

A data transmission protocol where data is sent in fixed-size units called packets.

Signup and view all the flashcards

Tree Topology

A network topology resembling a tree with branching connections, offering good organization but requiring careful routing.

Signup and view all the flashcards

Selective Repeat

A communication protocol that allows for retransmitting lost packets, improving reliability.

Signup and view all the flashcards

Go-Back-N

A communication protocol that allows for retransmitting lost packets, but relies on sending all packets in a sequence again.

Signup and view all the flashcards

TCP Checksum

A value calculated from segment data that allows detection of errors during transmission. The receiving device recalculates the checksum and compares it to the received value to identify errors.

Signup and view all the flashcards

Poll/Final Bit (P/F)

A single bit field in the LaPB protocol used by the primary station to request a response from secondary stations, and by secondary stations to indicate the end of a response.

Signup and view all the flashcards

IEEE 802.2 Logical Link Control

This protocol does not implement data unit boundary functions because it relies on a higher layer protocol, like MAC, to provide delimiters.

Signup and view all the flashcards

Full-Duplex Ethernet

A communication mode where two devices can transmit data simultaneously without collisions, enabling faster data exchange.

Signup and view all the flashcards

TCP Acknowledgement

A crucial component of TCP, involving the sending device confirming the successful receipt of data segments by the receiver. This mechanism ensures reliable data delivery.

Signup and view all the flashcards

TCP Error Recovery

TCP's capability to recover from errors by retransmitting lost or corrupted data segments. This ensures reliable data delivery despite network challenges.

Signup and view all the flashcards

PPP (Point-to-Point Protocol)

A protocol used in domestic access to the internet that provides error detection and correction through checksums and retransmissions.

Signup and view all the flashcards

LaPB (Link access Procedure Balanced)

A protocol used in ISDN B-channel networks for data transmission, and it includes mechanisms for detecting and correcting errors within data units.

Signup and view all the flashcards

Study Notes

Computer Networks Quiz

  • Telegram bot version: https://t.me/networks_quiz bot
  • Additional quizzes: Drive 02 Drop
  • Editing file: Do not edit the file for personal purposes. Editing will break the bot.
  • Contributing to quizzes: Respect correct formatting when contributing to quizzes. Compare your answers with the network group connected to the telegram bot (t.me/inginf bot) to ensure accuracy.

Exercise 1: Common Channel Signaling

  • Requirement: Common channel signaling requires control apparatuses of switching stations to exchange packet-switched signaling information.
  • Separate channels: User information and signaling information travel on separate channels.
  • Single signaling channel: A single signaling channel controls all user channels. This channel operates as a packet.

Exercise 2: Fully Connected Mesh Topology

  • Characteristics: A fully connected mesh topology has a high channel count, good fault tolerance, and easy routing.

Exercise 3: Conversational Interactive Telecommunications Services

  • Characteristics: Conversational interactive telecommunications services are characterized by real-time information transfer.

Exercise 4: Packet-Switched Networks

  • Factors for choosing small packets:
    • Lower incidence of control information.
    • Higher efficiency in transferring larger data units (SDUs).
    • Better parallelization possibilities.
    • Lower transfer delay.
    • Lower error probability on bits and packets.

Exercise 5: OSI Model - Transport Layer

  • Service reliance: The transport layer relies on services provided by the network layer.

Exercise 6: OSI Reference Model

  • N-entity and address: One N-entity can be associated with two different N-1 addresses.

Exercise 7: Window Protocol

  • No increase in complexity: The Go-Back-N protocol does not require increased complexity compared to Stop-and-Wait regarding memory required at the receiver.

Exercise 8: Aloha and S-Aloha Protocols

  • No preventive control: Aloha and S-Aloha protocols do not implement preventive control but only take action (retransmitting after a random delay) in case of interference (collision).

Exercise 9: Ethernet Standards

  • Collision detection (100Mb/s vs 1Gb/s): 1Gb/s Ethernet needs larger PDUs (packets) to meet time constraints on collision detection, whereas in 100Mb/s cases the time constraints are satisfied by decreasing the distance between nodes and by using fiber optic lines.

Exercise 10: Internet Protocol Architecture

  • Architecture: The Internet protocol architecture is organized into four layers.

Exercise 11: TCP Receiver

  • Feedback mechanism: The TCP receiver sends an acknowledgement (ACK) related to each segment received.

Exercise 12: TCP Header

  • Variable size: The header of a TCP segment has a variable size, depending on the options present, and is not fixed at 20 or 40 bytes.

Exercise 13: Logical Addresses in the Internet

  • Organization: Logical addresses in the Internet are organized into domains.

Exercise 14: Routing Protocol

  • AS routing: The Exterior Gateway Protocol (EGP) is used for routing between Autonomous Systems (AS).

Exercise 15: OSI connections

  • N-Connections: An N-connection can be realized through one or more N+1 connections.

Exercise 16/17: MAC Protocol Comparison

  • Efficiency and time constraints (10Mb/s to 100Mb/s Ethernet): The MAC protocol for 100Mb/s Ethernet has been modified to efficiently detect collisions, improve performance, and support real-time services via a smaller collision domain.

Exercise 18: Virtual Circuit vs. Datagram Services

  • Variability in delay: Virtual circuit services have less variability in packet delays and maintain packet sequence.

Exercise 19: IEEE 802.1d Transparent Bridges

  • Routing criteria: Routing follows "backward learning" and flooding criteria in transparent bridges.

Exercise 20: Ethernet at 1Gbit/s

  • Smaller Minimum PDUs: 1Gb/s Ethernet increases the minimum size of PDUs to enhance transmission time, allowing better detection of collisions.

Exercise 21: Types of Sources

  • CBR vs. VBR: VBR sources (e.g., video conferencing) have a greater difference between maximum and minimum transmission speeds which impacts the transmission delay compared to CBR sources, which has less delay variance.

Exercise 22: End-to-End Error Recovery

  • Transport layer: End-to-end error recovery in the Internet is primarily handled at the transport layer.

Exercise 23: POP3 Protocol

  • E-mail transfer: POP3 is used for transferring e-mail messages from a server to an email client.

Exercise 24: Collision Domain

  • Definition: The collision domain in Ethernet is the portion of the network within which a collision is detected.

Exercise 25: IP Subnet (Logical IP Subnet)

  • Hosts in subnet: Hosts share the same network prefix.

Exercise 26: OSI Reference Model

  • N-PCI content: An N-PCI can contain N-addresses in the OSI Model.

Exercise 27: TCP Protocol

  • Error Detection: TCP employs checksums for error detection on data within each segment.

Exercise 28: Poll/Final Bit

  • Acknowledgement: The P/F (Poll/Final) bit in the LaPB Layer 2 protocol allows you to prompt the receiver to send an acknowledgement.

... (and so on, for all the remaining exercises)

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

Computer Networks Quiz PDF

Description

Test your knowledge on key concepts of computer networking protocols, focusing on Go-Back-N, Stop-And-Wait, Aloha, and TCP. This quiz covers important characteristics, functionalities, and protocol features to help you understand the complexities of networking. Perfect for students and professionals looking to sharpen their understanding of these protocols.

Use Quizgecko on...
Browser
Browser