Network Topologies Quiz

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

What is a characteristic of a star topology?

  • It is primarily based on a hierarchical structure.
  • All devices share a single communication line.
  • There is a central hub that connects all nodes. (correct)
  • Each node is directly connected to one another.

Which network topology is primarily logical and not physical?

  • Star
  • Mesh
  • Chain
  • Tree (correct)

What best describes a bus topology?

  • Nodes are connected to a single communication line. (correct)
  • It features a central node that controls the network.
  • Each node communicates directly with every other node.
  • All nodes are connected in a loop.

In which topology can each node connect to any number of other nodes?

<p>Mesh (C)</p> Signup and view all the answers

Which topology is most likely to be used in a linear fashion?

<p>Chain (D)</p> Signup and view all the answers

What does an adjacency matrix represent in a network?

<p>The connections and relationships between nodes. (C)</p> Signup and view all the answers

Which topology allows for redundancy in connections between nodes?

<p>Mesh (C)</p> Signup and view all the answers

What is a key disadvantage of a bus topology?

<p>Failure of the main cable brings down the entire network. (B)</p> Signup and view all the answers

What is the primary function of the sequence number in a WLAN data frame?

<p>To detect missing frames and sort incoming frames (A)</p> Signup and view all the answers

Why does WLAN require layer 2 acknowledgments unlike Ethernet?

<p>The transmission medium in WLAN is too unreliable (D)</p> Signup and view all the answers

In the context of the WLAN data frame, what is indicated by the 'ToDS' and 'FromDS' bits?

<p>Indication of the transmission source and destination (D)</p> Signup and view all the answers

What type of frame is primarily utilized in the infrastructure mode of WLAN?

<p>Data frame (D)</p> Signup and view all the answers

What is the significance of the Frame Check Sequence (FCS) in the context of a WLAN data frame?

<p>To perform error detection on the transmitted data (D)</p> Signup and view all the answers

What operation defines the sum of two polynomials a(x) and b(x) in Fq[x]?

<p>Bitwise XOR of coefficients (D)</p> Signup and view all the answers

What happens when the medium is busy in the CSMA/CD protocol?

<p>The transmitter waits for a random amount of time. (A)</p> Signup and view all the answers

Which property must the reduction polynomial r(x) possess in polynomial multiplication involving n?

<p>It must have a degree equal to n (B)</p> Signup and view all the answers

What is the key requirement for the successful operation of CSMA/CD?

<p>Collisions must be detected while transmitting. (A)</p> Signup and view all the answers

In the context of F4[x], what does it mean for a polynomial to be irreducible?

<p>It cannot be expressed as a product of two polynomials of lower degree (A)</p> Signup and view all the answers

How does CSMA/CD handle a detected collision?

<p>A jam signal is sent and retransmission occurs. (A)</p> Signup and view all the answers

What is the purpose of performing a modulo operation in polynomial multiplication?

<p>To ensure the product polynomial degree remains less than n (A)</p> Signup and view all the answers

What is the minimum message size required to detect collisions in CSMA/CD over a distance d?

<p>2d / r (C)</p> Signup and view all the answers

Which of the following represents the polynomial addition over F4[x]?

<p>Bitwise XOR between monomials of the same degree (B)</p> Signup and view all the answers

What is a limitation of using 1-persistent CSMA in the event of a collision?

<p>It causes both stations to retransmit simultaneously. (B)</p> Signup and view all the answers

How is the coefficient sum ai + bi defined in GF(2)?

<p>Using bitwise XOR operation (C)</p> Signup and view all the answers

What does the acronym MAC in MAC addresses stand for?

<p>Media Access Control (C)</p> Signup and view all the answers

Why is CSMA/CD not suitable when the probability of random transmission errors is high?

<p>It cannot detect errors after transmission. (A)</p> Signup and view all the answers

What is the outcome when multiplying two polynomials a(x) and b(x) if the degree of their product exceeds n?

<p>A reduction polynomial is used to adjust the degree (B)</p> Signup and view all the answers

Which format is used for MAC addresses in IEEE 802 standards?

<p>OUI and Device ID (D)</p> Signup and view all the answers

What is the main function of polynomial division in the context of finite fields?

<p>To find the remainder which maintains degree restrictions (A)</p> Signup and view all the answers

Which of the following is NOT a type of address used in layer 2?

<p>Gateway Address (B)</p> Signup and view all the answers

Which condition is necessary for successful collision detection in CSMA/CD?

<p>Messages must be large enough to be detected. (B)</p> Signup and view all the answers

What occurs after a successful transmission in CSMA/CD?

<p>The system keeps silent. (A)</p> Signup and view all the answers

What is a requirement for addresses on layer 2 within local area networks?

<p>They must be unique within each local area network. (C)</p> Signup and view all the answers

How are multicast addresses treated in many layer 2 situations?

<p>They are handled like broadcasts. (C)</p> Signup and view all the answers

Where is the MAC address of a network card typically stored?

<p>In read-only memory (ROM) (C)</p> Signup and view all the answers

In the MAC address format, what does a '1' in the least significant bit indicate?

<p>Locally administered address (D)</p> Signup and view all the answers

Which of the following statements about addressing in local area networks is false?

<p>Local area networks require routing. (D)</p> Signup and view all the answers

What is the typical choice for the reduction polynomial r(x) in CRC?

<p>p(x)(x + 1) (A)</p> Signup and view all the answers

What type of errors can be detected by the choice of r(x) = p(x)(x + 1)?

<p>All odd-numbered bit errors (B)</p> Signup and view all the answers

What does appending n zeros to the message m(x) create?

<p>m'(x) (D)</p> Signup and view all the answers

What properties are determined by the choice of the reduction polynomial r(x)?

<p>The length of the checksum and error detection capabilities (A)</p> Signup and view all the answers

Which of the following signifies that r(x) is not an irreducible polynomial?

<p>It can be expressed as a product of two or more polynomials. (D)</p> Signup and view all the answers

What is the maximum degree of valid code words a ∈ Fq[x] when using a reduction polynomial of degree n?

<p>n - 1 (B)</p> Signup and view all the answers

Which polynomial is used for CRC32 in Ethernet?

<p>x^32 + x^26 + x^23 + x^22 + x^16 + x^12 + x^11 + x^10 + x^8 + x^7 + x^5 + x^4 + x^2 + x + 1 (A)</p> Signup and view all the answers

What is the result of determining the remainder c(x) = m'(x) mod r(x)?

<p>The checksum representing the encoded data (D)</p> Signup and view all the answers

Flashcards

Mesh Topology

A network topology where each device is directly connected to every other device.

Star Topology

A network topology where each device is connected to a central hub or switch.

Bus Topology

A network topology where devices are connected in a linear fashion, with a single cable running through each device.

Tree Topology

A network topology where devices are connected in a hierarchical tree-like structure.

Signup and view all the flashcards

Chain Topology

A network topology where each device is connected to one or two other devices, forming a chain.

Signup and view all the flashcards

Point-to-Point Topology

A network topology where each device has a dedicated connection to another device.

Signup and view all the flashcards

Adjacency Matrix

A square matrix where each entry represents the presence or absence of a connection between two specific nodes in a network.

Signup and view all the flashcards

Distance Matrix

A matrix where each entry represents the shortest distance between two nodes in a network.

Signup and view all the flashcards

Addition in GF(2)[x]

Addition in GF(2)[x] is performed by adding the coefficients of corresponding powers of x using bitwise XOR.

Signup and view all the flashcards

Multiplication in GF(2)[x]

Multiplication in GF(2)[x] involves a standard polynomial multiplication followed by a modulo operation with a reduction polynomial r(x) to ensure the degree of the result stays within the bounds of the field.

Signup and view all the flashcards

Reduction Polynomial (r(x)) in GF(2)[x]

The reduction polynomial (r(x)) used in multiplication in GF(2)[x] is chosen to have a degree equal to the desired size of the field (n).

Signup and view all the flashcards

Irreducible Polynomial

A polynomial is irreducible if it cannot be factored into two polynomials of strictly lower degree.

Signup and view all the flashcards

Modulo Operation in GF(2)[x]

In GF(2)[x], the modulo operation with a reduction polynomial r(x) involves polynomial division, where the remainder is the result.

Signup and view all the flashcards

GF(2)[x]

A finite field where the elements are polynomials with coefficients from GF(2), i.e., binary coefficients.

Signup and view all the flashcards

Finite Field

A field containing a finite number of elements.

Signup and view all the flashcards

Field with Reduction Polynomial

A field where multiplication is defined by a modulo operation with respect to a reduction polynomial.

Signup and view all the flashcards

Layer 2 Addressing

Addresses on layer 2 are used to uniquely identify devices within a local area network (LAN), allowing them to communicate directly without routing.

Signup and view all the flashcards

Broadcast Address

A special address that sends data to all devices in a local area network (LAN).

Signup and view all the flashcards

Multicast Address

Addresses that target specific groups of devices within a LAN, allowing for efficient data delivery to a subset of recipients.

Signup and view all the flashcards

MAC Address (Media Access Control)

A unique identifier assigned to a network interface card (NIC), enabling devices to communicate on a LAN.

Signup and view all the flashcards

OUI (Organizationally Unique Identifier)

The portion of a MAC address that identifies the manufacturer of the network card.

Signup and view all the flashcards

Device ID

A specific portion of a MAC address that differentiates one device from another within a network.

Signup and view all the flashcards

Globally Unique vs. Locally Administered

A flag in a MAC address indicating whether a specific device is intended to be globally unique or locally administered.

Signup and view all the flashcards

Multicast Address (Layer 2)

A special type of MAC address used to send targeted messages to specific groups of devices within a network.

Signup and view all the flashcards

CSMA (Carrier Sense Multiple Access)

A method for accessing a shared communication channel where stations listen before transmitting. If the medium is idle, they transmit. If the medium is busy, they wait a random amount of time and then try again.

Signup and view all the flashcards

CSMA/CD (Carrier Sense Multiple Access with Collision Detection)

An extension of CSMA that includes collision detection. Stations listen for collisions during transmission and if one occurs, they abort the transmission and send a jam signal. They then wait a random amount of time before trying to transmit again.

Signup and view all the flashcards

CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance)

A variation of CSMA that is used in wireless networks. It works by detecting the presence of other stations wanting to transmit. If a station detects another station wanting to transmit, it will wait a random amount of time before trying again.

Signup and view all the flashcards

Minimum Message Size for CSMA/CD

The minimum size of a message needed for collision detection in CSMA/CD. This ensures that a transmitting station can detect a collision before it has finished transmitting the entire message.

Signup and view all the flashcards

Jam Signal in CSMA/CD

When a collision occurs in CSMA/CD, both stations involved in the collision stop transmitting and send a jam signal. This ensures that other stations are aware of the collision and can avoid transmitting until the medium becomes idle again.

Signup and view all the flashcards

Retransmission in CSMA/CD

The process of transmitting a message multiple times in CSMA/CD after a collision occurs. This is done to ensure that the message is successfully received by the destination.

Signup and view all the flashcards

Why does WLAN use acknowledgements on layer 2?

WLAN uses acknowledgements on layer 2 because the transmission medium is unreliable. This ensures higher layer protocols can operate effectively, as it addresses the inherent unreliability of the wireless environment.

Signup and view all the flashcards

What is the purpose of the Sequence Control field in a WLAN frame?

The sequence number in a WLAN frame helps identify missing frames and organize incoming frames for proper processing.

Signup and view all the flashcards

What does the "Version" field in a WLAN frame identify?

The 2-bit Version field indicates the version of the 802.11 standard used for the frame. Currently, versions 0 and 1 are defined in the 802.11 standard.

Signup and view all the flashcards

What does the "Type" field in a WLAN frame represent?

The "Type" field categorizes the frame, specifying whether it's a management frame, a data frame, or a control frame. This helps devices quickly recognize the frame's purpose.

Signup and view all the flashcards

How does the "SubType" field further categorize frames?

The "SubType" field distinguishes frames within the same type. For example, within data frames, it indicates whether it's a data frame, a QoS data frame, or a null data frame.

Signup and view all the flashcards

Modular Division

The process of dividing a polynomial m'(x) by a reduction polynomial r(x) and obtaining the remainder c(x). This remainder is the checksum, which is used to detect errors in the transmitted data.

Signup and view all the flashcards

Reduction Polynomial

The polynomial used in CRC to compute the checksum. It determines the length of the checksum and the types of errors that can be detected.

Signup and view all the flashcards

Appended Message

A message m(x) that has been appended with n zeros to the right (m(x) * xn) before being used in CRC. This appending creates a space for the checksum.

Signup and view all the flashcards

Code Word

A polynomial representation of data bits in a CRC system. Code words are used when calculating and verifying the checksum.

Signup and view all the flashcards

Checksum

The checksum calculated in CRC represents potential errors detected during transmission. This is the remainder obtained from the modular division of m'(x) by r(x).

Signup and view all the flashcards

Choosing r(x) for CRC

A common way to choose the reduction polynomial in CRC. It is a product of a polynomial p(x) and (x + 1), resulting in a non-irreducible polynomial. This allows detection of all odd-numbered bit errors in the data.

Signup and view all the flashcards

CRC32

A standard CRC algorithm that has a reduction polynomial with 32 terms (coefficients). Used in Ethernet for error detection in data communication.

Signup and view all the flashcards

Study Notes

Course Information

  • Course title: Computer Networking and IT Security (CNS)
  • Course code: INHN0012
  • Semester: WiSe 2024/25
  • Instructor: Prof. Dr.-Ing. Stephan Günther
  • Institution: Technical University of Munich (TUM)
  • Date: Saturday 2nd November, 2024
  • Topic: Representation of networks as graphs
  • Subtopic: Directed graphs
    • Directed graphs are used to represent network topologies and node connections
    • Nodes are vertices in the network
    • Directed arcs connect two vertices
    • Example: If one vertex connects to others with a line and arrow, it represents a directed connection and can be noted with (1,2),(2,3)
  • Subtopic: Undirected graphs
    • Undirected graphs represent symmetric connections
    • Edges connect two vertices without direction, e.g. (1,2) is equivalent to (2,1)
  • Topic: Paths in networks
    • A path is a set of edges connecting 2 nodes, e.g. (1,4), (4,2), (2,5) is one path between nodes (1,5)
    • Path cost is the sum of the costs of edges within the path, e.g. (3+1+4=8)
    • Path length is the number of intermediate nodes, e.g. |(1,4)(4,2)(2,5)| = 3
  • Topic: Network topologies
    • Point-to-Point
    • Chain
    • Star
    • Mesh
    • Tree (mostly a logical topology)
    • Bus
  • Topic: Adjacency and distance matrix
    • Networks can be represented as matrices
    • The adjacency matrix shows whether node i is directly connected to node j. Values are either 1 or 0
    • The distance matrix shows the cost of paths of length 1 between all pairs of nodes
    • It has elements either Cij (if there is a direct connection) or ∞ ( if there is no direct connection)
  • Topic: Creating tree structures
    • Trees are connected, loop-free graphs
    • Shortest Path Tree (SPT): Connects a root to all other nodes with minimal costs
    • Minimum Spanning Tree (MST): Connects all nodes with minimal costs
  • Topic: Characterizing connections, multiple access, and access control
    • Media access
      • ALOHA and slotted ALOHA
      • CSMA, CSMA/CD, CSMA/CA
    • Token Passing
  • Subtopic: Addressing within local area networks
    • Frame receiving by multiple nodes in bus/wireless network
    • Receivers must decide to which frame was addressed
  • Topic: Framing, addressing, and error detection
    • Frame boundary detection and code transparency
    • Addressing and error detection
  • Topic: Connecting nodes on Layers 1 and 2
    • Hubs, bridges, and switches
    • WLAN access points
  • Topic: Security Considerations
    • CAM poisoning
    • Denial of Service

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Use Quizgecko on...
Browser
Browser