NWC203c - Full
a - ANS-A service model specifies a level of performance that can be expected in the transfer of
information.
a. True
b. False
a - ANS-An API allows application programs to access certain resources through a predefined
interface?
point
a. True
b. False
a - ANS-ARQ protocols combine error detection, retransmission and sequence numbering to
provide reliability
a. True
b. False
a - ANS-Attackers attempt to gain unauthorized access to server. What type of network security
threat it imposes?
point
a. Client imposter
b. Server imposter
c. Man-in-Middle
d. None of the above
a - ANS-Based on traffic granularity, which of the following levels is traffic management not
usually classified into?
point
a. Byte level
b. Flow-aggregated level
c. Flow level
d. Packet level
a - ANS-By Random Early Detection (RED), when a given source transmits at a higher rate than
others, the source will
point
a. Suffers a higher packet-dropping rate
b. Achieves a lower waiting delay
c. Suffers a lower packet-dropping rate
d. Achieves a higher bandwidth
,a - ANS-Consider a three hop network from the source to the destination. Let m be the message
transmission time at each hop. Let n be the propagation delay of each hop. Assume there is no
queueing delay and processing time at each hop. Based on cut-through switching, what is the
total time for three packets to be transmitted to the destination?
point
a. 3m + 3n
b. 5m + 3n
c. 9m + 9n
d. None of the above
a - ANS-Consider the network as shown in the figure. We use the Dijkstra's algorithm to find the
set of shortest paths from all nodes to the destination node 4. In Dijkstra's algorithm, each
iteration the next closet node is added to the set with the root node.
At the first iteration, which node will be added to the set N?
point
a. 2
b. 3
c. 1
d. 5
a - ANS-CSMA/CD is not used in DCF because
a. a station is unable to listen to the channel for collisions while transmitting
b. physical carrier sense detects the presence of other WLAN users
c. in idle state, a station is unable to listen to the channel for collisions
d. None of the above
a - ANS-Find parity bit for 1001011
point
a. 0
b. 1
c. 2
d. None of the above
a - ANS-Framing involves identifying the beginning and end of a block of information within a
digital stream
a. True
b. False
a - ANS-Generic Framing Procedure (GFP) allows the implementation of multiple transport
modes that may coexist within the same transport channel
a. True
,b. False
a - ANS-In 802.11 protocol, MAC can alternate between Contention Periods (CPs) and
Contention-Free Periods (CFPs)
a. True
b. False
a - ANS-In a virtual-circuit packet network, routing is determined during connection set-up
point
a. True
b. False
a - ANS-In an OSPF network, routers in area only knows complete topology inside area and
limits the flooding of link-state information to area
point
a. True
b. False
a - ANS-In ASCII, a single parity bit code can detect ________ errors.
point
a. An odd number of
b. Two
c. No errors
d. An even number of
a - ANS-In BSD socket API, which system call is used to assign a network address to the
socket?
points
a. bind()
b. connect()
c. None of the above
d. listen()
a - ANS-In BSD socket API, which type of socket is used to create a TCP socket?
points
a. SOCK_STREAM
b. SOCK_RAW
c. SOCK_DGRAM
d. None of the above
a - ANS-In Carrier Sense Multiple Access (CSMA), possibility of collision still exist because of
a. Propagation delay
b. Collision delay
c. Transmit delay
, d. None of the above
a - ANS-In Carrier Sense Multiple Access with collision detection (CSMA-CD), how long will it
take a collision to be detected and resolved?
a. Round-trip propagation delay
b. One propagation delay
c. One frame transmission time
d. None of the above
a - ANS-In congestion warning, the feedback mechanism can be implicit or explicit. Which of the
following is an example of implicit feedback
point
a. A time-out due to missing acknowledgement
b. The warning bit in ACKs
c. Choke packets to the source
d. None of the above
a - ANS-In digital transmission, long distance digital communications require the use of a
generator to recover original data sequence and re-transmits on next segment
point
a. True
b. False
a - ANS-In IEEE 802.11 MAC for wireless LANs, which of following inter-frame space (IFS) is
used to transmit high-priority frames such as ACKs?
a. SIFS
b. DIFS
c. PIFS
d. None of the above
a - ANS-In Reverse Path Forwarding, router receives a packet and extracts the
point
a. Source address
b. Protocol address
c. IP address
d. Standard address
a - ANS-In Routing Information Protocol (RIP), the use of max number limited to 15 limits the
count-to-infinity problem
point
a. True
b. False
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller TUTORSON. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $7.99. You're not tied to anything after your purchase.