Consider The 6
Consider The 6
2. Consider the following multiple access protocols that we've studied: (1) TDMA, and FDMA (2)
CSMA (3) Aloha and Slotted Aloha, and (4) polling. Which of these protocols are collision-free
(e.g., collisions will never happen)?
5. Match characteristics of a general approach to routing with the name of that approach.
6. Match a description of how the approach towards implementing a control plane works with of
the name this approach.
7. We've now learned about both IPv4 addresses and MAC addresses. Consider the address
properties below. Which of these properties is a property of both IPv4 addresses and MAC
addresses.
8. Consider the following multiple access protocols that we've studied: (1) TDMA, and FDMA (2)
CSMA (3) Aloha and Slotted Aloha, and (4) polling. For which of these protocols is the maximum
channel utilization 1 (or very close to 1)?
9. Which one of the following statements is FALSE:
10. Given the Ethernet address 01011010 00010001 01010101 00011000 10101010 00001111 in
binary, what is the address in hexadecimal notation?
11. We've now learned about both IPv4 addresses and MAC addresses. Consider the address
properties below. Which of these properties is only a property of IPv4 addresses (and therefore
is not a property of MAC addresses - careful!).
12. Which of the following statements is TRUE about channel partitioning protocols?
13. Consider the SDN layering shown below. Match each layer name below with a layer label (a), (b)
or (c) as shown in the diagram.
14. Which of the following statements is TRUE about a two-dimensional parity check (2D-parity)
computed over a payload?
15. Which of the following services may be implemented in a link-layer protocol? Select one or
more statements.
16. Which of the following statements correctly identify the differences between routing and
forwarding. Select one or more statements.
- Routing refers to determining the route taken by packets from source to destination, and is
implemented in the control plane.
- Forwarding refers to moving packets from a router’s input to appropriate router output, and is
implemented in the data plane.
17. Match the function/purpose of a field within an Ethernet frame with the name of the field.
18. Check the one or more of the following statements about the OSPF protocol that are TRUE.
19. Consider the OSPF routing protocol. Which of the following characteristics are associated with
OSPF (as opposed to BGP)?
20. Consider Dijkstra’s link-state routing algorithm that is computing a least-cost path from node a
to other nodes b, c, d, e, f. Which of the following statements is true. (Refer to Section 5.2 in
the text for notation.)
21. What is the last byte of the Preamble field in an Ethernet frame's header?
22. Which one of the following statements is NOT TRUE about generalized forwarding?
23. In an iterartion of the loop of Dijkstra's Algorithm, what is the first thing needed to do before
updating the costs of paths from the source router to others?
24. We've now learned about both IPv4 addresses and MAC addresses. Consider the address
properties below. Which of these properties is (are) ONLY a property of MAC addresses (and
therefore is not a property of IPv4 addresses)?
27. For each of the actions below, select those actions below that are primarily in the network-layer
data plane. The other actions that you don't select below then correspond to control-plane
actions.
28. We've seen that there are two approaches towards implementing the network control plane - a
per-router control-plane approach and a software-defined networking (SDN) control-plane
approach. Which of the following actions occur in a per-router control-plane approach? The
other actions that you don't select below then correspond to actions in an SDN control plane.
29. Which of the following quality-of-service guarantees are part of the Internet’s best-effort service
model? Check all that apply.
30. Match the names of the principal router components (A,B,C,D below) with their function and
whether they are in the network-layer data plane or control plane
31. Where in a router is the destination IP address looked up in a forwarding table to determine the
appropriate output port to which the datagram should be directed?
32. Where in a router does "match plus action" happen to determine the appropriate output port to
which the arriving datagram should be directed?
33. Suppose a datagram is switched through the switching fabric and arrives to its appropriate
output to find that there are no free buffers. In this case:
35. What are the principal components of the IPv4 protocol (check all that apply)?
36. Match each of the following fields in the IP header with its description, function or use.
37. Which of the following statements is true regarding an IP address? (Zero, one or more of the
following statements is true).
38. What is meant by an IP subnet? (Check zero, one or more of the following characteristics of an
IP subnet).
39. What is meant by saying that DHCP is a "plug and play" protocol?
40. Which of the following statements about a DHCP request message are true (check all that are
true). Hint: check out Figure 4.24 in the 7th and 8th edition of our textbook.
41. Which of the following fields occur ONLY in the IPv6 datagram header (i.e., appear in the IPv6
header but not in the IPv4 header)? Check all that apply.
48. What protocol (or protocols) constitutes the "thin waist" of the Internet protocol stack? Check
all that apply.
49. Which of the statements below are true statements regarding the "end-to-end principle"?
Check all that apply.
50. In the US, which of the following services has been regulated by the Federal Communications
Commission (FCC) going back into the 20th century?
- Telecommunication services.
51. Which of the following services may be implemented in a link-layer protocol? Select one or
more statements.
52. Which of the following statements is true about a two-dimensional parity check (2D-parity)
computed over a payload?
- 2D-parity can detect and correct any case of two bit flips in the payload .
53. Which of the following statements is true about channel partitioning protocols?
54. Which of the following statements is true about both Pure Aloha, and CSMA (both with and
without collision detection?
55. Which of the following statements is true about polling and token-passing protocols?
56. Suppose an Ethernet frame arrives to an Ethernet switch, and the Ethernet switch does not
know which of its switch ports leads to the node with the given destination MAC address? In
this case, what does the switch do?
57. Which of the following statements are true about a self learning switch?
58. Which of the following statements are true about MAC (link-layer) addresses? Select one or
more statements below.
59. Which of the following statements correctly identify the differences between routing and
forwarding. Select one or more statements
- Routing refers to determining the route taken by packets from source to
destination, and is implemented in the control plane.
- Forwarding refers to moving packets from a router’s input to appropriate router
output, and is implemented in the data plane.
60. What is the definition of a “good” path for a routing protocol? Chose the best single answer.
61. Consider Dijkstra’s link-state routing algorithm that is computing a least-cost path from node a
to other nodes b, c, d, e, f. Which of the following statements is true. (Refer to Section 5.2 in
the text for notation.)
62. Match the name of a general approach to routing with characteristics of that approach.
63. Match the terms "interdomain routing" and intradomain routing" with their definitions. Recall
that in Internet parlance, an “AS” refers to “Autonomous System” – a network under the control
of a single organization.
- Interdomain routing
64. Among the following protocols, terminology or considerations, indicate those that are
associated with "routing within a single network (typically owned and operated by one
organization)."
65. Which of the functions below belong in the controller layer labeled "Interface, abstractions for
network control apps"? Check all below that apply.
66. Which of the functions below belong in the controller layer labeled "Network-wide distributed,
robust state management"? Check all below that apply.
67. Which of the functions below belong in the controller layer labeled "Communication to/from
controlled device"? Check all below that apply.
68. Which of the statements below about ICMP are true?