Deck 16: Understanding the Layers of the TCP/IP Protocol Stack
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/31
Play
Full screen (f)
Deck 16: Understanding the Layers of the TCP/IP Protocol Stack
1
Which of the following statement about layers of the TCP/IP protocol stack is false?
A) Each layer provides functionality for the layers above it.
B) Layers ease the development, debugging and maintenance of network applications.
C) Each layer can be implemented by following one or more protocols.
D) Each layer can be used independently to perform network communication.
A) Each layer provides functionality for the layers above it.
B) Layers ease the development, debugging and maintenance of network applications.
C) Each layer can be implemented by following one or more protocols.
D) Each layer can be used independently to perform network communication.
Each layer can be used independently to perform network communication.
2
A __________ network is the most fault tolerant network.
A) ring network
B) tree network
C) star network
D) fully-connected mesh network
A) ring network
B) tree network
C) star network
D) fully-connected mesh network
fully-connected mesh network
3
A(n) __________ is not a network topology.
A) crossbar-switch network
B) mesh network
C) bus network
D) ad hoc network
A) crossbar-switch network
B) mesh network
C) bus network
D) ad hoc network
crossbar-switch network
4
Which of the following is not a benefit of a LAN over a WAN?
A) LANs are independent from larger networks, allowing them to be reorganized or upgraded at the discretion of the local administrator.
B) LANs are autonomous, so they can be customized to meet the needs of a particular group.
C) LANs deal with homogenous components, making it easier to handle its connections.
D) LANs are not as susceptible to congestion that occurs in larger networks.
A) LANs are independent from larger networks, allowing them to be reorganized or upgraded at the discretion of the local administrator.
B) LANs are autonomous, so they can be customized to meet the needs of a particular group.
C) LANs deal with homogenous components, making it easier to handle its connections.
D) LANs are not as susceptible to congestion that occurs in larger networks.
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
5
A WAN __________.
A) is managed by a single company
B) connects computers over vast geographic distances
C) is often implemented as a star network
D) Both b and c.
A) is managed by a single company
B) connects computers over vast geographic distances
C) is often implemented as a star network
D) Both b and c.
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
6
The four layers of the TCP/IP protocol stack, in order from highest to lowest, are __________, __________, __________ and __________.
A) application, transport, network, link
B) application, network, transport, link
C) network, link, application, transport
D) link, transport, application, network
A) application, transport, network, link
B) application, network, transport, link
C) network, link, application, transport
D) link, transport, application, network
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
7
Control information can be placed __________ a message.
A) in front of
B) at the back of
C) anywhere in
D) Both a and b.
A) in front of
B) at the back of
C) anywhere in
D) Both a and b.
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
8
__________ is not a part of most URLs.
A) port
B) layer
C) protocol
D) host
A) port
B) layer
C) protocol
D) host
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
9
HTTP typically connects at port __________.
A) 20
B) 21
C) 80
D) 81
A) 20
B) 21
C) 80
D) 81
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
10
A multipurpose internet mail extension (MIME) __________.
A) is a protocol for sending and receiving e-mail.
B) defines the type of data transferred by HTTP.
C) allows HTTP to interact with the lower layers of the TCP/IP protocol stack.
D) defines how to address a resource on a remote host.
A) is a protocol for sending and receiving e-mail.
B) defines the type of data transferred by HTTP.
C) allows HTTP to interact with the lower layers of the TCP/IP protocol stack.
D) defines how to address a resource on a remote host.
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
11
HTTP implements the __________ layer of the TCP/IP protocol stack.
A) link
B) network
C) transport
D) application
A) link
B) network
C) transport
D) application
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
12
The __________ is not an FTP command.
A) CWD
B) DELE
C) DIR
D) QUIT
A) CWD
B) DELE
C) DIR
D) QUIT
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
13
The primary goal of FTP is to __________.
A) transfer Web pages
B) enable the sending and receiving of e-mail
C) allow the transfer of files between remote hosts
D) provide a secure means of transferring data
A) transfer Web pages
B) enable the sending and receiving of e-mail
C) allow the transfer of files between remote hosts
D) provide a secure means of transferring data
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
14
In the presence of unreliable network communication, __________.
A) datagrams can arrive in a different order from which it was sent
B) multiple datagrams can arrive
C) datagrams could be returned to the sender if the receiver is unavailable
D) datagrams could be lost
A) datagrams can arrive in a different order from which it was sent
B) multiple datagrams can arrive
C) datagrams could be returned to the sender if the receiver is unavailable
D) datagrams could be lost
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
15
Connection-oriented services __________.
A) require more overhead than connectionless services
B) ensure reliability whereas connectionless services rely on the underlying network
C) send information to initiate and terminate communication whereas connectionless services send no such information
D) All of the above.
A) require more overhead than connectionless services
B) ensure reliability whereas connectionless services rely on the underlying network
C) send information to initiate and terminate communication whereas connectionless services send no such information
D) All of the above.
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
16
What is the correct order for the segments sent during TCP's three-way handshake?
A) SYN, ACK, SYN/ACK
B) SYN, SYN/ACK, ACK
C) SYN/ACK, SYN, ACK
D) ACK, SYN, SYN/ACK
A) SYN, ACK, SYN/ACK
B) SYN, SYN/ACK, ACK
C) SYN/ACK, SYN, ACK
D) ACK, SYN, SYN/ACK
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
17
Which of the following is not true about TCP's windowing mechanism?
A) The window is calculated once for the connection and not changed.
B) Windowing allows TCP to implement both congestion control and flow control.
C) A small window reduces throughput and can result in network underutilization.
D) A large window can cause network congestion or overflow a receiver.
A) The window is calculated once for the connection and not changed.
B) Windowing allows TCP to implement both congestion control and flow control.
C) A small window reduces throughput and can result in network underutilization.
D) A large window can cause network congestion or overflow a receiver.
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
18
If a datagram was lost in a streaming video application using UDP, __________.
A) the application would fail
B) the user would experience a short pause in the video playback
C) the application would wait for the lost datagram to be retransmitted
D) nothing would happen
A) the application would fail
B) the user would experience a short pause in the video playback
C) the application would wait for the lost datagram to be retransmitted
D) nothing would happen
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
19
Unreliable communication is not acceptable if __________.
A) the network is heavily congested, because unreliable communication requires less overhead
B) the application can tolerate occasional datagram loss and still function properly
C) the application implements its own reliability mechanism
D) the underlying network guarantees reliability
A) the network is heavily congested, because unreliable communication requires less overhead
B) the application can tolerate occasional datagram loss and still function properly
C) the application implements its own reliability mechanism
D) the underlying network guarantees reliability
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
20
Routing __________.
A) determines on which computer a resource resides.
B) is a means to add security to network communication.
C) converts a datagram into a format to be sent over a physical link.
D) is the process of determining the next host for a datagram and sending the datagram to that host.
A) determines on which computer a resource resides.
B) is a means to add security to network communication.
C) converts a datagram into a format to be sent over a physical link.
D) is the process of determining the next host for a datagram and sending the datagram to that host.
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
21
__________ is a routing protocol?
A) HTTP
B) TCP
C) RIP
D) UDP
A) HTTP
B) TCP
C) RIP
D) UDP
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
22
An IP address is __________.
A) a unique destination on the Internet.
B) is the location of a resource on the Internet.
C) is a component of a computer where datagrams are directed to be sent over a network.
D) is another name for a hub in a star network.
A) a unique destination on the Internet.
B) is the location of a resource on the Internet.
C) is a component of a computer where datagrams are directed to be sent over a network.
D) is another name for a hub in a star network.
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
23
__________ is not a type of IPv6 address.
A) Anycast
B) Multicast
C) Unicast
D) Broadcast
A) Anycast
B) Multicast
C) Unicast
D) Broadcast
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
24
The purpose of a checksum is __________.
A) to specify the number of bits in a frame
B) to determine if a frame was corrupted
C) to notify the sender that a frame was received
D) to encrypt the bits in a fram
A) to specify the number of bits in a frame
B) to determine if a frame was corrupted
C) to notify the sender that a frame was received
D) to encrypt the bits in a fram
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
25
__________ is not an example of a network transmission medium.
A) Water
B) Copper wiring
C) Optical fiber
D) Air
A) Water
B) Copper wiring
C) Optical fiber
D) Air
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
26
What happens immediately after a transceiver detects a collision in CSMA/CD?
A) It waits for a certain amount of time before trying to resend the frame.
B) It stops sending data.
C) It notifies the user that there is a problem.
D) It continues to send bits, to ensure that the collision is detected by all transceivers.
A) It waits for a certain amount of time before trying to resend the frame.
B) It stops sending data.
C) It notifies the user that there is a problem.
D) It continues to send bits, to ensure that the collision is detected by all transceivers.
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
27
The random delay in CSMA/CD Ethernet communication is __________.
A) the amount of time it takes for a frame to be transmitted across an Ethernet link
B) the amount of time it takes for a transceiver to detect a collision
C) the amount of time a transceiver will wait after a collision before attempting to transmit the frame again
D) the amount of time it takes to transmit an entire Ethernet frame, including possible retransmissions
A) the amount of time it takes for a frame to be transmitted across an Ethernet link
B) the amount of time it takes for a transceiver to detect a collision
C) the amount of time a transceiver will wait after a collision before attempting to transmit the frame again
D) the amount of time it takes to transmit an entire Ethernet frame, including possible retransmissions
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
28
In a Token Ring network, a host must __________ before transmitting a message.
A) request the token from another host currently holding the token
B) test the medium for any current transmissions
C) nothing; the host can transmit immediately
D) wait to receive the empty frame
A) request the token from another host currently holding the token
B) test the medium for any current transmissions
C) nothing; the host can transmit immediately
D) wait to receive the empty frame
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
29
How does FDDI differ from a Token Ring?
A) FDDI uses only one ring; a Token Ring uses two.
B) FDDI operates over optical fiber; Token Ring operates over copper wiring.
C) Token Rings circulate tokens clockwise; FDDI circulates tokens counterclockwise.
D) FDDI is only used in WANs; Token Rings only in LANs.
A) FDDI uses only one ring; a Token Ring uses two.
B) FDDI operates over optical fiber; Token Ring operates over copper wiring.
C) Token Rings circulate tokens clockwise; FDDI circulates tokens counterclockwise.
D) FDDI is only used in WANs; Token Rings only in LANs.
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
30
In the IEEE 802.11 specification, which of the following is a sequence of events that occurs in chronological order?
A) RTS, transmission of message, CTS.
B) RTS, CTS, transmission of message.
C) CTS, RTS, transmission of message.
D) transmission of message, CTS, RTS.
A) RTS, transmission of message, CTS.
B) RTS, CTS, transmission of message.
C) CTS, RTS, transmission of message.
D) transmission of message, CTS, RTS.
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck
31
The __________ is a tier in a three-tier system.
A) client tier
B) application logic tier
C) data tier
D) All of the above.
A) client tier
B) application logic tier
C) data tier
D) All of the above.
Unlock Deck
Unlock for access to all 31 flashcards in this deck.
Unlock Deck
k this deck