Which of the following descriptions below correspond to a "nuts-and-bolts" view of the Internet?
A collection of hardware and software components executing protocols that define the format and the order of messages exchanged between two or more communicating entities, as well as the actions taken on the transmission and/or receipt of a message or other event.
A collection of billions of computing devices, and packet switches interconnected by links.
A "network of networks".
Which of the following descriptions below correspond to a "services" view of the Internet?
A place I go for information, entertainment, and to communicate with people.
A platform for building network applications.
Which of the following human scenarios involve a protocol (recall: "Protocols define the format, order of messages sent and received among network entities, and actions taken on message transmission, receipt")?
Two people introducing themselves to each other.
A student raising her/his hand to ask a really insightful question, followed by the teaching acknowledging the student, listening carefully to the question, and responding with a clear, insightful answer. And then thanking the student for the question, since teachers love to get questions.
One person asking, and getting, the time to/from another person.
Match the access network with the approximate speeds that a subscriber might experience. (Note: if you look these up, do so in the 8E textbook, slides,or video -- not in the 7E or earlier versions, since link access speeds are always increasing over the years).
Wired. Up to 100's Gbps per link.
Wireless. 10βs to 100βs of Mbps per device.
Wired. Up to 10βs to 100βs of Mbps downstream per user.
Wired. Up to 10βs of Mbps downstream per user.
Wireless. Up to 10βs Mbps per device.
Which of the following physical layer technologies has the highest transmission rate and lowest bit error rate in practice?
Fiber optic cable
Choose one the following two definitions that makes the correct distinction between routing versus forwarding.
Forwarding is the local action of moving arriving packets from routerβs input link to appropriate router output link, while routing is the global action of determining the source-destination paths taken by packets.
Which of the characteristics below are associated with the technique of packet switching?
This technique is used in the Internet.
Congestion loss and variable end-end delays are possible with this technique.
Resources are used on demand, not reserved in advance.
Data may be queued before being transmitted due to other userβs data thatβs also queueing for transmission.
Which of the characteristics below are associated with the technique of circuit switching?
Reserves resources needed for a call from source to destination.
This technique was the basis for the telephone call switching during the 20th century and into the beginning of this current century.
Frequency Division Multiplexing (FDM) and Time Division Multiplexing (TDM) are two approaches for implementing this technique.
Consider the circuit-switched network shown in the figure below, with four circuit switches A, B, C, and D. Suppose there are 20 circuits between A and B, 19 circuits between B and C, 15 circuits between C and D, and 16 circuits between D and A.
What is the maximum number of connections that can be ongoing in the network at any one time?
[Note: you can find more questions like this one here.
Just add them all up
70
Perform a traceroute from your computer (on whatever network you happen to be on) to gaia.cs.umass.edu. Use traceroute (on Mac terminal) or tracert (on Windows command line) or tracepath (on a Linux command line). Enter the missing part of the name of the router just before the host gaia.cs.umass.edu is reached: ??.cs.umass.edu
Note: Routing may change, so the answer here may not be correct anymore. Also, if you are a Verizon user, there are known problems using traceroute with Verizon - if traceroute shows you two hops only to gaia.cs.umass.edu or any destination, skip this question.
nscs1bbs1
When we say that the Internet is a βnetwork of networks,β we mean? Check all that apply (hint: check two or more).
The Internet is made up of access networks at the edge, tier-1 networks at the core, and interconnected regional and content provider networks as well.
The Internet is made up of a lot of different networks that are interconnected to each other.
Consider a scenario in which 5 users are being multiplexed over a channel of 10 Mbps. Under the various scenarios below, match the scenario to whether circuit switching or packet switching is better.
Neither works well in this overload scenario
Circuit switching
Packet switching
Match the description of each component of packet delay to its name in the pull down list.
Processing delay
Queueing delay
Transmission delay
Propagation delay
Suppose a packet is L = 1500 bytes long (one byte = 8 bits), and link transmits at R = 1 Gbps (i.e., a link can transmit bits 1,000,000,000 bits per second). What is the transmission delay for this packet? [Note: you can find more problems like this one here.]
Equation = L/R
L = 1500 * 8 bits
R = 1,000,000,000 bps
.000012 secs
Suppose a packet is L = 1200 bytes long (one byte = 8 bits), and link transmits at R = 100 Mbps (i.e., a link can transmit bits 100,000,000 bits per second). What is the transmission delay for this packet? [Note: you can find more problems like this one here.]
Equation = L/R
L = 1200 * 8 bits
R = 100,000,000 bps
.000096 secs
Consider the network shown in the figure below, with three links, each with the specified transmission rate and link length. Assume the length of a packet is 8000 bits.
What is the transmission delay at link 2? [Note: you can find more problems like this one here.]
Transmition delay
L/R
L = 8000 bits
R = 100 Mbps
8 x 10^(-5) secs
Consider the network shown in the figure below, with three links, each with the specified transmission rate and link length. Assume the length of a packet is 8000 bits. The speed of light propagation delay on each link is 3x10^8 m/sec
What is the propagation delay at (along) link 2?
Distance/Material delay
(Make sure units match)
Distance = 1000km
Material = 3x10^8 m/sec
.0033 secs
What is the maximum throughput achievable between sender and receiver in the scenario shown below?
Throughput is the bottleneck
1.5 Mbps
Consider the scenario shown below, with four different servers connected to four different clients over four three-hop paths. The four pairs share a common middle hop with a transmission capacity of R = 300 Mbps. The four links from the servers to the shared link have a transmission capacity of RS = 50 Mbps. Each of the four links from the shared middle link to a client has a transmission capacity of RC = 90 Mbps.
What is the maximum achievable end-end throughput (an integer value, in Mbps) for each of four client-to-server pairs, assuming that the middle link is fairly shared (divides its transmission rate equally) and all servers are trying to send at their maximum rate? Your answer: [A] Mbps
Throughput is the bottleneck
Also the question asked each of server/client not altogether
50
Consider the scenario shown below, with four different servers connected to four different clients over four three-hop paths. The four pairs share a common middle hop with a transmission capacity of R = 300 Mbps. The four links from the servers to the shared link have a transmission capacity of RS = 50 Mbps. Each of the four links from the shared middle link to a client has a transmission capacity of RC = 90 Mbps.
Assuming that the servers are all sending at their maximum rate possible, what are the link utilizations for the server links (with transmission capacity RS)? Enter your answer in a decimal form of 1.00 (if the utilization is 1) or 0.xx (if the utilization is less than 1, rounded to the closest xx).
Your answer: The utilization of the server links is: [A]
Bottleneck/(client/server link)
bottleneck = 200
server link = 200
1.00
Consider the scenario shown below, with four different servers connected to four different clients over four three-hop paths. The four pairs share a common middle hop with a transmission capacity of R = 300 Mbps. The four links from the servers to the shared link have a transmission capacity of RS = 50 Mbps. Each of the four links from the shared middle link to a client has a transmission capacity of RC = 90 Mbps.
Assuming that the servers are all sending at their maximum rate possible, what are the link utilizations of the shared link (with transmission capacity R)? Enter your answer in a decimal form of 1.00 (if the utilization is 1) or 0.xx (if the utilization is less than 1, rounded to the closest xx).
Your answer: The utilization of shared link is: [A]
Bottleneck send max(50*4) / shared
Server send rate = 200Mbps
shared link = 300Mbps
0.67
Consider the scenario shown below, with four different servers connected to four different clients over four three-hop paths. The four pairs share a common middle hop with a transmission capacity of R = 300 Mbps. The four links from the servers to the shared link have a transmission capacity of RS = 50 Mbps. Each of the four links from the shared middle link to a client has a transmission capacity of RC = 90 Mbps.
Assuming that the servers are all sending at their maximum rate possible, what are the link utilizations of the client links (with transmission capacity RC)? Enter your answer in a decimal form of 1.00 (if the utilization is 1) or 0.xx (if the utilization is less than 1, rounded to the closest xx).
Your answer: The utilization of client link is: [A]
Bottleneck / client
bottleneck = 50
client = 90
0.56
Match the function of a layer in the Internet protocol stack to its its name in the pulldown menu.
Application Layer
Transport layer
Network layer
Link layer
Physical layer
Match the name of an Internet layer with unit of data that is exchanged among protocol entities at that layer, using the pulldown menu.
Message
Segment
Datagram
Frame
Bit
Consider the figure below, showing a link-layer frame heading from a host to a router. There are three header fields shown. Match the name of a header with a header label shown in the figure.
Link layer
Network layer
Transport layer
Which of the definitions below describe what is meant by the term "encapsulation"?
Taking data from the layer above, adding header fields appropriate for this layer, and then placing the data in the payload field of the βpacketβ for that layer.
Match the description of a security defense with its name.
Firewall
Encryption
Digital signatures
Access control
Authentication
Match the networking event with the time frame when the event occurred.
Early 1960's
Late 1960's
1970's
Early 1980's
Late 1980's
1990's
2000 - 2010
2010 - 2020
Match an organization name below with the role of the organization in Internet governance. To answer this question youβll need to watch the Chapter 1 supplemental video on βWho Controls the Internet?β.
A multistakeholder deliberation body, convened by the United Nations, that does not make decisions but informs and inspires those who do.
Sets the technical standards for Internet infrastructure -- particularly protocols, device requirements, and data formats -- in more than 9000 Request for Comments (RFCs).
Sets the technical standards for 3G, 4G, and 5G mobile cellular system.
Handles (assigns, adjudicates) Internet names, and manages the root level of the DNS.
Sets the technical standard for Ethernet and WiFi link-layer standards.
In 2021, the International Telecommunications Union (ITU) reported that 61.6% of the worldsβs population are βInternet usersβ. What does it mean to be an βInternet userβ according to the ITU? To answer this question youβll need to watch the chapter 1 supplemental video on βWho Uses the Internet?β
That someone has used the Internet at least once in the last three months.
Between 2010 and 2018, which of the following digital divides has changed the least in the US? To answer this question youβll need to watch the chapter 1 supplemental video on βWho Uses the Internet?β To answer this question youβll need to watch the chapter 1 supplemental video on βWho Uses the Internet?β
The gap in Internet use between Black and Hispanic populations versus White populations in the US.
Which of the characteristics below are associated with a client-server approach to structuring network applications (as opposed to a P2P approach)?
There is a server that is always on.
HTTP uses this application structure.
There is a server with a well known server IP address.
Which of the characteristics below are associated with a P2P approach to structuring network applications (as opposed to a client-server approach)?
There is not a server that is always on.
A process requests service from those it contacts and will provide service to processes that contact it.
When an application uses a UDP socket, what transport services are provided to the application by UDP? Check all that apply.
Best effort service. The service will make a best effort to deliver data to the destination but makes no guarantees that any particular segment of data will actually get there.
When an application uses a TCP socket, what transport services are provided to the application by TCP? Check all that apply.
Flow Control. The provided service will ensure that the sender does not send so fast as to overflow receiver buffers.
Congestion control. The service will control senders so that the senders do not collectively send more data than links in the network can handle.
Loss-free data transfer. The service will reliably transfer all data to the receiver, recovering from packets dropped in the network due to router buffer overflow.
What do we mean when we say βHTTP is statelessβ? In answering this question, assume that cookies are not used. Check all answers that apply.
An HTTP server does not remember anything about what happened during earlier steps in interacting with this HTTP client.
What is an HTTP cookie used for?
A cookie is a code used by a server, carried on a clientβs HTTP request, to access information the server had earlier stored about an earlier interaction with this Web browser. [Think about the distinction between a browser and a person.]
What is the purpose of the HTTP GET message?
The HTTP GET request message is used by a web client to request a web server to send the requested object from the server to the client.
What is the purpose of the conditional HTTP GET request message?
To allow a server to only send the requested object to the client if this object has changed since the server last sent this object to the client.
Suppose a client is sending an HTTP GET request message to a web server, gaia.cs.umass.edu. Suppose the client-to-server HTTP GET message is the following:
GET /kurose_ross_sandbox/interactive/quotation2.htm πHTTP/1.1
Host: gaia.cs.umass.edu
Accept: text/plain, text/html, text/xml, image/jpeg, image/gif, audio/mpeg, audio/mp4, video/wmv, video/mp4,
Accept-Language: en-us, en-gb;q=0.1, en;q=0.7, fr, fr-ch, da, de, fi
If-Modified-Since: Wed, 09 Sep 2020 16:06:01 -0700
User Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.11 (KHTML, like Gecko) Chrome/17.0.963.56 Safari/535.11
What version of HTTP is the client using? [Note: you can find additional questions similar to this here.]
1.1
Again, suppose a client is sending an HTTP GET request message to a web server, gaia.cs.umass.edu. The client-to-server HTTP GET message is the following (same as in previous problem):
GET /kurose_ross_sandbox/interactive/quotation2.htm HTTP/1.1
Host: gaia.cs.umass.edu
Accept: text/plain, text/html, text/xml, image/jpeg, image/gif, audio/mpeg, audio/mp4, video/wmv, video/mp4,
Accept-Language: πen-us, en-gb
;q=0.1, en;q=0.7, fr, fr-ch, da, de, fi
If-Modified-Since: Wed, 09 Sep 2020 16:06:01 -0700
User Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.11 (KHTML, like Gecko) Chrome/17.0.963.56 Safari/535.11
What is the language in which the client would least prefer to get a response? [You may have to search around the Web a bit to answer this.]
[Note: you can find additional questions similar to this here.]
Aprrently en-US does not equal US English
United Kingdom English
Again, suppose a client is sending an HTTP GET request message to a web server, gaia.cs.umass.edu. Suppose the client-to-server HTTP GET message is the following (same as in previous problem):
GET /kurose_ross_sandbox/interactive/quotation2.htm HTTP/1.1
Host: gaia.cs.umass.edu
Accept: text/plain, text/html, text/xml, image/jpeg, image/gif, audio/mpeg, audio/mp4, video/wmv, video/mp4,
Accept-Language: en-us, en-gb;q=0.1, en;q=0.7, fr, fr-ch, da, de, fi
πIf-Modified-Since: Wed, 09 Sep 2020 16:06:01 -0700
User Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.11 (KHTML, like Gecko) Chrome/17.0.963.56 Safari/535.11
Does the client have a cached copy of the object being requested?
[Note: you can find additional questions similar to this here.]
Yes, because this is a conditional GET, as evidenced by the If-Modified-Since field.
Suppose now the server sends the following HTTP response message the client:
πHTTP/1.0 200 OK
Date: Wed, 09 Sep 2020 23:46:21 +0000
Server: Apache/2.2.3 (CentOS)
Last-Modified: Wed, 09 Sep 2020 23:51:41 +0000
ETag:17dc6-a5c-bf716880.
Content-Length: 418
Connection: Close
Content-type: image/html
Will the web server close the TCP connection after sending this message? [Note: you can find more questions like this one here.]
Yes, the server will close this connection because version 1.0 of HTTP is being used, and TCP connections do not stay open persistently.
Which of the following are advantages of using a web cache? Sselect one or more answers.
Caching uses less bandwidth coming into an institutional network where the client is located, if the cache is also located in that institutional network.
Caching generally provides for a faster page load time at the client, if the web cache is in the clientβs institutional network, because the page is loaded from the nearby cache rather than from the distant server.
Which of the following are changes between HTTP 1.1 and HTTP/2? Note: select one or more answers.
HTTP/2 allows a large object to be broken down into smaller pieces, and the transmission of those pieces to be interleaved with transmission other smaller objects, thus preventing a large object from forcing many smaller objects to wait their turn for transmission.
HTTP/2 allows objects in a persistent connection to be sent in a client-specified priority order.
Which of the following pieces of information will appear in a serverβs application-level HTTP reply message? (Check all that apply.)
A response code
A response phrase associated with a response code
What is the purpose of the If-Modified-Since field in a HTTP GET request message
To indicate to the server that the client has cached this object from a previous GET, and the time it was cached.
What is the purpose of a cookie value in the HTTP GET request?
The cookie value itself doesn't mean anything. It is just a value that was returned by a web server to this client during an earlier interaction.
Suppose a client is sending an HTTP GET message to a web server, gaia.cs.umass.edu. Suppose the client-to-server HTTP GET message is the following:
GET /kurose_ross_sandbox/interactive/quotation2.htm HTTP/1.1
Host: gaia.cs.umass.edu
Accept: text/plain, text/html, text/xml, image/jpeg, image/gif, audio/mpeg, audio/mp4, video/wmv, video/mp4,
Accept-Language: en-us, en-gb;q=0.1, en;q=0.7, fr, fr-ch, da, de, fi
πIf-Modified-Since: Wed, 09 Sep 2020 16:06:01 -0700
User Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.11 (KHTML, like Gecko) Chrome/17.0.963.56 Safari/535.11
Does the client have a cached copy of the object being requested?
Yes, because this is a conditional GET.
Suppose an HTTP server sends the following HTTP response message a client:
πHTTP/1.0 200 OK
Date: Wed, 09 Sep 2020 23:46:21 +0000
Server: Apache/2.2.3 (CentOS)
Last-Modified: Wed, 09 Sep 2020 23:51:41 +0000
ETag:17dc6-a5c-bf716880.
Content-Length: 418
Connection: Close
Content-type: image/html
Will the web server close the TCP connection after sending this message?
Yes, because this is HTTP 1.0
How many RTTs are there from when a client first contacts an email server (by initiating a TCP session) to when the client can begin sending the email message itself β that is following all initial TCP or SMTP handshaking required? Recall the figure below from our class notes:
3
Which of the following characteristics apply to HTTP only (and do not apply to SMTP)? Note: check one or more of the characteristics below.
Uses a blank line (CRLF) to indicate end of request header.
Operates mostly as a βclient pullβ protocol.
Uses server port 80.
Which of the following characteristics apply to SMTP only (and do not apply to HTTP)? Note: check one or more of the characteristics below.
Operates mostly as a βclient pushβ protocol.
Uses CRLF.CRLF to indicate end of message.
Uses server port 25.
Which of the following characteristics apply to both HTTP and SMTP? Note: check one or more of the characteristics below.
Has ASCII command/response interaction, status codes.
Is able to use a persistent TCP connection to transfer multiple objects.
Match the functionality of a protocol with the name of a the email protocol (if any) that implements that functionality.
SMTP
Neither SMTP nore IMAP does this
IMAP
. Match the function of a server to a given type of DNS server in the DNS server hierarchy.
Authoritative DNS server
Local DNS server
Top Level Domain (TLD) servers
DNS root servers
What is the value of caching in the local DNS name server? Check all that apply.
DNS caching results in less load elsewhere in DNS, when the reply to a query is found in the local cache.
DNS caching provides for faster replies, if the reply to the query is found in the cache.
What information does the type βAβ resource record hold in the DNS database? Check all that apply.
A hostname and an IP address.
Suppose that the local DNS server caches all information coming in from all root, TLD, and authoritative DNS servers for 20 time units. (Thus, for example, when a root server returns the name and address of a TLD server for .com, the cache remembers that this is the TLD server to use to resolve a .com name). Assume also that the local cache is initially empty, that iterative DNS queries are always used, that DNS requests are just for name-to-IP-address translation, that 1 time unit is needed for each server-to-server or host-to-server (one way) request/response, and that there is only one authoritative name server (each) for any .edu or .com domain.
Consider the following DNS requests, made by the local host at the given times:
t=0, the local host requests that the name gaia.cs.umass.edu be resolved to an IP address.
t=1, the local host requests that the name icann.org be resolved to an IP address.
t=5, the local host requests that the name cs.umd.edu be resolved to an IP address. (Hint: be careful!)
t=10, the local host again requests that the name gaia.cs.umass.edu be resolved to an IP address.
t=12, the local host requests that the name cs.mit.edu be resolved to an IP address.
t=30, the local host again requests that the name gaia.cs.umass.edu be resolved to an IP address. (Hint: be careful!)
Which of the requests require 8 time units to be resolved?
The request at t=30.
The request at t=0.
The request at t=1.
Suppose that the local DNS server caches all information coming in from all root, TLD, and authoritative DNS servers for 20 time units. (Thus, for example, when a root server returns the name and address of a TLD server for .com, the cache remembers that this is the TLD server to use to resolve a .com name). Assume also that the local cache is initially empty, that iterative DNS queries are always used, that DNS requests are just for name-to-IP-address translation, that 1 time unit is needed for each server-to-server or host-to-server (one way) request/response, and that there is only one authoritative name server (each) for any .edu or .com domain.
Consider the following DNS requests, made by the local host at the given times:
t=0, the local host requests that the name gaia.cs.umass.edu be resolved to an IP address.
t=1, the local host requests that the name icann.org be resolved to an IP address.
t=5, the local host requests that the name cs.umd.edu be resolved to an IP address. (Hint: be careful!)
t=10, the local host again requests that the name gaia.cs.umass.edu be resolved to an IP address.
t=12, the local host requests that the name cs.mit.edu be resolved to an IP address.
t=30, the local host again requests that the name gaia.cs.umass.edu be resolved to an IP address. (Hint: be careful!)
Which of the requests require 6 time units to be resolved?
The request at t=12.
The request at t=5.
Suppose that the local DNS server caches all information coming in from all root, TLD, and authoritative DNS servers for 20 time units. (Thus, for example, when a root server returns the name and address of a TLD server for .com, the cache remembers that this is the TLD server to use to resolve a .com name). Assume also that the local cache is initially empty, that iterative DNS queries are always used, that DNS requests are just for name-to-IP-address translation, that 1 time unit is needed for each server-to-server or host-to-server (one way) request/response, and that there is only one authoritative name server (each) for any .edu or .com domain.
Consider the following DNS requests, made by the local host at the given times:
t=0, the local host requests that the name gaia.cs.umass.edu be resolved to an IP address.
t=1, the local host requests that the name icann.org be resolved to an IP address.
t=5, the local host requests that the name cs.umd.edu be resolved to an IP address. (Hint: be careful!)
t=10, the local host again requests that the name gaia.cs.umass.edu be resolved to an IP address.
t=12, the local host requests that the name cs.mit.edu be resolved to an IP address.
t=30, the local host again requests that the name gaia.cs.umass.edu be resolved to an IP address. (Hint: be careful!)
Which of the requests require 2 time units to be resolved?
The request at t=10.
Check all of the phrases below that state a true property of a local DNS server.
The local DNS server record for a remote host is sometimes different from that of the authoritative server for that host.
The local DNS server can decrease the name-to-IP-address resolution time experienced by a querying local host over the case when a DNS is resolved via querying into the DNS hierarchy.
What is the role of an authoritative name server in the DNS? (Check all that apply)
It provides the definitive answer to the query with respect to a name in the authoritative name server's domain.
We learned that in HTTP web browser caching, HTTP local web server caching, and in local DNS caching, that a user benefits (e.g., shorter delays over the case of no caching) from finding a local/nearby copy of a requested item. In which of the following forms of caching does a user benefit from its not only from its own recent requests (and cached replies) but also from recent requests made from other users?
Local DNS server caching
What approach is taken by a CDN to stream content to hundreds of thousands of simultaneous users?
Store/serve multiple copies of videos at multiple geographically distributed sites.
. Match the definition/function of an element or approach in a networked streaming video system, with its name.
Chunk
Manifest
DASH
Enter deep
In DASH (Dynamic, Adaptive Streaming over HTTP), a server divides a video file into chunks that ... (pick best completion from below)
... are stored, each encoded at multiple rates (video quality). The client plays the video chunk-by-chunk, with each chunk requested at encoding rate that fits the available bandwidth at the time.
Manifest file. What is the purpose of a manifest file in a streaming multimedia setting?
To let a client know where it can retrieve different video segments, encoded at different rates
Which of the following characteristics below are associated with a UDP socket? Check one or more that apply.
socket(AF_INET, SOCK_DGRAM) creates this type of socket
the application must explicitly specify the IP destination address and port number for each group of bytes written into a socket
provides unreliable transfer of a groups of bytes (βa datagramβ), from client to server
data from different clients can be received on the same socket
Which of the following characteristics below are associated with a TCP socket? Check one or more that apply.
when contacted, the server will create a new server-side socket to communicate with that client
socket(AF_INET, SOCK_STREAM) creates this type of socket
a server can perform an accept() on this type of socket
provides reliable, in-order byte-stream transfer (a βpipeβ), from client to server
How does the networked application running on a server know the client IP address and the port number to reply to in response to a received datagram?
The application code at the server determines client IP address and port # from the initial segment sent by client, and must explicitly specify these values when sending into a socket back to that client.
Suppose a Web server has five ongoing connections that use TCP receiver port 80, and assume there are no other TCP connections (open or being opened or closed) at that server. How many TCP sockets are in use at this server?
6
What happens when a socket connect() procedure is called/invoked?
This procedure creates a new socket at the client, and connects that socket to the specified server.
Where is transport-layer functionality primarily implemented?
Transport layer functions are implemented primarily at the hosts at the βedgeβ of the network.
True or False: The transport layer provides for host-to-host delivery service?
True.
Check all of the services below that are provided by the TCP protocol.
A flow-control service that ensures that a sender will not send at such a high rate so as to overflow receiving host buffers.
Reliable data delivery.
In-order data delivery
A congestion control service to ensure that multiple senders do not overload network links.
A byte stream abstraction, that does not preserve boundaries between message data sent in different socket send calls at the sender.
Check all of the services below that are provided by the UDP protocol.
A message abstraction, that preserves boundaries between message data sent in different socket send calls at the sender.
The transport layer sits on top of the network layer, and provides its services using the services provided to it by the network layer. Thus itβs important that we know what is meant by the network layerβs βbest effortβ delivery service. True or False:
The network layerβs best-effort delivery service means that IP makes its βbest effortβ to deliver segments between communicating hosts, but it makes no guarantees. In particular, it does not guarantee segment delivery, it does not guarantee orderly delivery of segments, and it does not guarantee the integrity of the data in the segments.
Correct! The network layerβs best effort service doesnβt really provide much service at all, does it?
What is meant by transport-layer demultiplexing?
Receiving a transport-layer segment from the network layer, extracting the payload (data) and delivering the data to the correct socket.
What is meant by transport-layer multiplexing?
Taking data from one socket (one of possibly many sockets), encapsulating a data chuck with header information β thereby creating a transport layer segment β and eventually passing this segment to the network layer.
True or False: When multiple UDP clients send UDP segments to the same destination port number at a receiving host, those segments (from different senders) will always be directed to the same socket at the receiving host.
True
True or False: When multiple TCP clients send TCP segments to the same destination port number at a receiving host, those segments (from different senders) will always be directed to the same socket at the receiving host.
False
True or False: It is possible for two UDP segments to be sent from the same socket with source port 5723 at a server to two different clients.
True
True or False: It is possible for two TCP segments with source port 80 to be sent by the sending host to different clients.
True
True or False: On the sending side, the UDP sender will take each application-layer chunk of data written into a UDP socket and send it in a distinct UDP datagram. And then on the receiving side, UDP will deliver a segmentβs payload into the appropriate socket, preserving the application-defined message boundary.
True
Which of the fields below are in a UDP segment header? [Hint: note the use of the word "header" in this question statement.]
Internet checksum
Destination port number
Length (of UDP header plus payload)
Source port number
Why is the UDP header length field needed?
Because the payload section can be of variable length, and this lets UDP know where the segment ends.
Over what set of bytes is the checksum field in the UDP header computed over?
The entire UDP segment, except the checksum field itself, and the IP sender and receive address fields
Which of the following statements are true about a checksum? Hint: more than one statement is true.
A checksum is computed at a sender by considering each byte within a packet as a number, and then adding these numbers (each number representing a bytes) together to compute a sum (which is known as a checksum).
The receiver of a packet with a checksum field will add up the received bytes, just as the sender did, and compare this locally-computed checksum with the checksum value in the packet header. If these two values are different then the receiverknows that one of the bits in the received packet has been changed during transmission from sender to receiver.
The sender-computed checksum value is often included in a checksum field within a packet header.
Compute the Internet checksum value for these two 16-bit words: 11110101 11010011 and 10110011 01000100 [Note: you can find more problems like this one here.]
Just add them up and flip
01010110 11100111
Compute the Internet checksum value for these two 16-bit words: 01000001 11000100 and 00100000 00101011 [Note: you can find more problems like this one here.]
10011110 00010000
True or False: When computing the Internet checksum for two numbers, a single flipped bit (i.e., in just one of the two numbers) will always result in a changed checksum.
True
True or False: When computing the Internet checksum for two numbers, a single flipped bit in each of the two numbers will always result in a changed checksum.
False
Suppose a UDP segment (A in the figure below) arrives at a host with an IP address of 128.119.40.186. The source port in the UDP segment is 4829 and the destination port is 3546. The IP address of the sending host is 60.54.75.24.
Now consider the UDP datagram (and the IP datagram that will encapsulate it) sent in reply by the application on host 128.119.40.186 to the original sender host, labeled B in the figure above. Complete the sentences below ...
What are the source and destination port numbers and IP addresses? (Enter the integer port number or the 4-part dotted decimal IP address, included the period)
The source port number of the UDP segment (B) sent in reply is:
The source IP address of the IP datagram containing the UDP segment (B) sent in reply is:
The destination port number of the UDP segment (B) sent in reply is:
The destination IP address of the IP datagram containing the UDP segment (B) sent in reply is:
[Note: you can find more problems like this one here.]
3546
128.119.40.186
4829
60.54.75.24
Consider the purposes/goals/use of different reliable data transfer protocol mechanisms. For the given purpose/goal/use match it to the RDT mechanism that is used to implement the given purpose/goal/use.
NAK
Checksum
Sequence number
ACK
Retransmission
Consider the rdt 2.0 sender and receiver shown below, with FSM transitions at the sender labeled S1, S2, and S3; and receiver transitions labeled R1 and R2.
Which of the following sequences of transitions could possibly occur as a result of an initial rdt_send() call at the sender, and possible later message corruption and subsequent error recovery.
S1, R1, S2
S1, R2, S3
S1, R1, S2, R2,S3
Consider the rdt2.1 sender and receiver FSMs shown below, with labeled transitions S1 through S6 at the sender, and transitions R1 through R6 at the receiver. The sender and receiver start in the βWait for call 0 from aboveβ and βWait for 0 from belowβ states, respectively.
Suppose that no channel errors occur. A sequence of interleaved sender and receiver transitions is given below. Transitions S1 and S4 are already provided. Choose the sender or receiver transition for the unlabeled transitions x1, x2, x3, and x4 below to indicate the time-ordered sequence of transitions (interleaved sender and receiver transitions) that will result in two messages being delivered at the receiver, with the sender and receiver returning to their initial states (again, given that no channel errors occur).
S1, x1, x2, S4, x3, x4
R1
S3
R4
S6
Consider the rdt2.1 sender and receiver FSMs shown below, with labeled transitions S1 through S6 at the sender, and transitions R1 through R6 at the receiver. The sender and receiver start in the βWait for call 0 from aboveβ and βWait for 0 from belowβ states, respectively.
Suppose that the initial message transmission by the sender is corrupted, but that no other message transmissions are corrupted. Match the unlabeled transitions x1, x2, x3, x4, x5 in the time-ordered sequence of transitions below (interleaved sender and receiver transitions) that will occur following the initial S1 transition (which is corrupted), that will result in two messages being delivered at the receiver, with the sender and receiver returning to their initial states (again, given that the initial message transmission by the sender is corrupted). Note that transitions S1, S4, and S6 are already provided below.
S1 (message corrupted), x1, x2, x3, x4, S4, x5, S6.
R6
S2
R1
S3
R4
Consider the rdt2.1 sender and receiver FSMs shown below, with labeled transitions S1 through S6 at the sender, and transitions R1 through R6 at the receiver. The sender and receiver start in the βWait for call 0 from aboveβ and βWait for 0 from belowβ states, respectively.
Suppose that the first packet from the sender is correctly received at the receiver but that ACK message sent from receiver-to-sender is corrupted; all other messages (before or after that ACK) are transmitted error-free. Match the unlabeled transitions x1, x2, x3, x4, x5 in the time-ordered sequence of transitions below (interleaved sender and receiver transitions) that will occur following the initial S1 transition, which is followed by a corrupted ACK transmission, that will result in a message being delivered at the receiver, with the sender and receiver returning to their initial states. Note that some transitions are already provided below.
S1, x1 (ACK corrupted), x2, x3, x4, S4, x5, S6.
R1
S2
R3
S3
R4
What is meant by a cumulative acknowledgment, ACK(n)?
A cumulative ACK(n) acks all packets with a sequence number up to and including n as being received.
Suppose a packet is 10K bits long, the channel transmission rate connecting a sender and receiver is 10 Mbps, and the round-trip propagation delay is 10 ms. What is the maximum channel utilization of a stop-and-wait protocol for this channel?
.1
Suppose a packet is 10K bits long, the channel transmission rate connecting a sender and receiver is 10 Mbps, and the round-trip propagation delay is 10 ms. What is the channel utilization of a pipelined protocol with an arbitrarily high level of pipelining for this channel?
1.0
Suppose a packet is 10K bits long, the channel transmission rate connecting a sender and receiver is 10 Mbps, and the round-trip propagation delay is 10 ms. How many packets can the sender transmit before it starts receiving acknowledgments back?
10
Which of the following statements about pipelining are true? One or more statements may be true.
With a pipelined sender, there may be transmitted packets βin flightβ β propagating through the channel β packets that the sender has sent but that the receiver has not yet received.
A pipelined sender can have transmitted multiple packets for which the sender has yet to receive an ACK from the receiver.
What are some reasons for discarding received-but- out-of-sequence packets at the receiver in GBN? Indicate one or more of the following statements that are correct.
Discarding an out of sequence packet will really force the sender to retransmit.
πThe sender will resend that packet in any case.
If some packets are in error, then its likely that other packets are in error as well.
πThe implementation at the receiver is simpler.
What are some reasons for not discarding received-but- out-of-sequence packets at the receiver in GBN? Indicate one or more of the following statements that are correct.
Even though that packet will be retransmitted, its next retransmission could be corrupted, so donβt discard a perfectly well-received packet, silly!
In the SR receiver window (see diagram below, taken from PPT slides and video), why havenβt the red packets been delivered yet? Check the one or more reasons below that apply.
There is a packet with a lower sequence number than any of the red packets that has yet to be received, so in-order delivery of data in the red packets up to the application layer is not possible.
In SR, why does the receiver have to acknowledge packets with sequence numbers that are less than (and to the left of) those in its window, which starts at rcv_base.
Because the sender may not have received an ACK for that packet yet.
True or False: On the sending side, the TCP sender will take each application-layer chunk of data written into a TCP socket and send it in a distinct TCP segment. And then on the receiving side, TCP will deliver a segmentβs payload into the appropriate socket, preserving the application-defined message boundary.
False.
For the given function of a field in the TCP segment, select the name of that field from the pull-down list.
Source port number
Data (or payload)
Sequence number
ACK number field
ACK bit
Receiver advertised window
Checksum
Header length field
Consider the TCP Telnet scenario below (from Fig. 3.31 in text). Why is it that the receiver sends an ACK that is one larger than the sequence number in the received datagram?
Because the send-to receiver segment carries only one byte of data, and after that segment is received, the next expected byte of data is just the next byte (i.e., has an index that is one larger) in the data stream.
Suppose that as shown in the figure below, a TCP sender is sending segments with 100 bytes of payload. The TCP sender sends five segments with sequence numbers 100, 200, 300, 400, and 500. Suppose that the segment with sequence number 300 is lost. The TCP receiver will buffer correctly-received but not-yet-in-order segments for later delivery to the application layer (once missing segments are later received).
Complete the sentences below ....
200
300
300, a duplicate ACK
600
400
Consider TCP use of an exponentially weighted moving average (EWMA) to compute the nth value of the estimated RTT:
EstimatedRTTn = (1- a)EstimatedRTTn-1 + aSampleRTTn
True or False: with this EWMA algorithm the value of EstimatedRTTn has no dependence on the earlier sample, SampleRTTn-1
False
Consider the TCP Telnet scenario below (from Fig. 3.36 in text). What timer-related action does the sender take on the receipt of ACK 120?
Cancels any running timers.
True or False: with TCPβs flow control mechanism, where the receiver tells the sender how much free buffer space it has (and the sender always limits the amount of outstanding, unACKed, in-flight data to less than this amount), it is not possible for the sender to send more data than the receiver has room to buffer.
True
Match the description of a TCP connection management message with the name of the message used to accomplish that function.
SYN message
SYNACK message
FIN message
FINACK message
RESET message
Consider TCPβs Fast Retransmit optimization (see Figure 3.37 from the text, below). Of course, the sender doesn't know for sure that the segment with sequence # 100 is actually lost (it canβt see into the channel). Can a sender get three duplicate ACKs for a segment that in fact has not been lost? Which of the following statements are true? Suppose a channel can lose, but will not corrupt, messages.
Both of them is the answer
If the channel cannot reorder messages, a triple duplicate ACK indicates to the sender that a segment loss has happened for sure. Actually (again assuming the channel cannot corrupt or reorder messages), even a single duplicate ACK would indicate that a segment loss has happed for sure.
If the channel can reorder messages, a triple duplicate ACK can occur even though a message is not lost; since it's possible that a message has just been reordered and has not yet arrived when the three duplicate ACKs were generated.
Consider the five images below. Indicate which of these images suggest the need for flow control (the others would suggest the need for congestion control).
A glass overflowing
A talking head
Consider the figure below, which shows the application-to-application throughput achieved when two senders are competing at a shared bottleneck link. Suppose that when the overall arrival rate, lambdain' (for each sender) is close to R/2, the throughput to the application layer (at each receiver), lambdaout, is equal to 0.8 * lambdain'.
What fraction of the packets transmitted at the sender are retransmissions?
.20
Which of the following actions are used in network-assisted congestion control (say versus end-end congestion control) to signal congestion. Check all that apply.
A router marks a field in the datagram header at a congested router.
A router sends an ICMP message to a host telling it to slow down its sending rate.
Which of the following actions are associated with end-end congestion control (say versus network-assisted congestion control). Check all that apply.
A sender decreases its sending rate in response to packet loss detected via its transport-layer ACKing.
The transport-layer sender decreases its sending rate in response to a measured increase in the RTT.
A router drops a packet at a congested router, which causes the transport-layer sender to infer that there is congestion due to the missing ACK for the lost packet.
A datagram experiences delay at a congested network router, which is then measured by the sender and used to decrease the sending rate.
Use the pulldown menu to match a congestion control approach to how the sender detects congestion.
end-end
network-assisted
delay-based
Which of the following statements about TCPβs Additive-increase-multiplicative-decrease (AIMD) algorithm are true? Check all that are true.
AIMD cuts the congestion window size, cwnd, in half whenever loss is detected by a triple duplicate ACK.
AIMD is a end-end approach to congestion control.
AIMD cuts the congestion window size,cwnd, i to 1 whenever a timeout occurs.
How is the sending rate typically regulated in a TCP implementation?
By keeping a window of size cwnd over the sequence number space, and making sure that no more than cwnd bytes of data are outstanding (i.e, unACKnowledged). The size of cwnd is regulated by AIMD.
Which of the following best completes this sentence: "In the absence of loss, TCP slow start increases the sending rate ... "
" ... faster than AIMD. In fact, slowstart increases the sending rate exponentially fast per RTT."
Consider the transport-layer flows interacting at a congested link. In the face of such congestion, what happens at this link to a transport-layer flow that does not cut back on its sending rate?
Nothing different from the other flows crossing the congested link.
Assuming that the congestion window size,cwnd, has not yet reached Wmax, TCP CUBIC will ... (check all that apply)
... always have a window size, cwnd, and hence a sending rate, higher than that of AIMD (assuming a given window size, Wmax, at which loss would occur).
... increase its sending rate faster than AIMD when cwnd is far away from Wmax, but increase slower than AIMD when cwnd is closer to Wmax
For delay-based congestion control, match the sender action to the relationship of the currently measured throughput to the value of cwnd/RTTmin
This should never happen
increase the sending rate
decrease the sending rate
What are advantages of the streams concept in QUIC? Select all that apply.
Since each stream has its own error control, if one stream experiences an error (e.g., lost or damaged segment), the other streams are unaffected.
Streams allow concurrent retrieval of web objects, while avoiding Head of the Line (HOL) blocking.
What are advantages of implementing transport-layer functionality in QUIC at the application layer? Select all that apply.
As an application-layer protocol, QUIC can be updated/modified at βapp frequencyβ rather than at the frequency of operating system updates.
QUIC can establish all connection parameters (security, reliability, flow and congestion control)in just one handshake rather than separately in two.
Check all of the statements below about where (in the network) the network layer is implemented that are true.
The network layer is implemented in routers in the network core.
The network layer is implemented in hosts at the network's edge.
Consider the travel analogy discussed in the textbook - some actions we take on a trip correspond to forwarding and other actions we take on a trip correspond to routing. Which of the following travel actions below correspond to forwarding? The other travel actions that you don't select below then correspond to routing.
A car takes the 3rd exit from a roundabout.
A car stops at an intersection to βgas-upβ and take a βbathroom breakβ
A car waits at light and then turns left at the intersection.
For each of the actions below, select those actions below that are primarily in the network-layer data plane. The other actions that you don't select below then correspond to control-plane actions.
Moving an arriving datagram from a routerβs input port to output port
Dropping a datagram due to a congested (full) output buffer.
Looking up address bits in an arriving datagram header in the forwarding table.
We've seen that there are two approaches towards implementing the network control plane - a per-router control-plane approach and a software-defined networking (SDN) control-plane approach. Which of the following actions occur in a per-router control-plane approach? The other actions that you don't select below then correspond to actions in an SDN control plane.
A router exchanges messages with another router, indicating the cost for it (the sending router) to reach a destination host.
Routers send information about their incoming and outgoing links to other routers in the network.
Which of the following quality-of-service guarantees are part of the Internetβs best-effort service model? Check all that apply.
None of the other services listed here are part of the best-effort service model. Evidently, best-effort service really means no guarantees at all!
Match the names of the principal router components (A,B,C,D below) with their function and whether they are in the network-layer data plane or control plane.
input ports, operating primarily in the data plane.
the switching fabric, operating primarily in the data plane.
output ports, operating primarily in the data plane.
the routing processor, operating primarily in the control plane.
Where in a router is the destination IP address looked up in a forwarding table to determine the appropriate output port to which the datagram should be directed?
At the input port where a packet arrives.
Where in a router does "match plus action" happen to determine the appropriate output port to which the arriving datagram should be directed?
At the input port where a packet arrives.
Consider the following forwarding table below. Indicate the output to link interface to which a datagram with the destination addresses below will be forwarded under longest prefix matching. (Note: The list of addresses is ordered below. If two addresses map to the same output link interface, map the first of these two addresses to the first instance of that link interface.) [Note: You can find more examples of problems similar to this here.]
Note:
Since this is in order, just set which ever come first at the top to be first destination.
This is the first destination address in the list that maps to output port 0
This is the first destination address in the list that maps to output port 1.
This is the first destination address in the list that maps to output port 2.
This is the first destination address in the list that maps to output port 3.
This is the second destination address in the list that maps to output port 1.
This is the second destination address in the list that maps to output port 0.
This is the second destination address in the list that maps to output port 2.
Suppose a datagram is switched through the switching fabric and arrives to its appropriate output to find that there are no free buffers. In this case:
The packet will either be dropped or another packet will be removed (lost) from the buffer to make room for this packet, depending on policy. But the packet will definitely not be be sent back to the input port.
What is meant by Head of the Line (HOL) blocking?
A queued datagram waiting for service at the front of a queue prevents other datagrams in queue from moving forward in the queue.
Consider the pattern of red and green packet arrivals to a routerβs output port queue, shown below. Suppose each packet takes one time slot to be transmitted, and can only begin transmission at the beginning of a time slot after its arrival. Indicate the sequence of departing packet numbers (at t = 1, 2, 3, 4, 5, 7, 8) under FCFS scheduling. Give your answer as 7 ordered digits (each corresponding to the packet number of a departing packet), with a single space between each digit, and no spaces before the first or after the last digit, e.g., in a form like 7 6 5 4 3 2 1). [Note: You can find more examples of problems similar to this here.]
Note:
First come first serve
1 2 3 4 5 6 7
Consider the pattern of red and green packet arrivals to a routerβs output port queue, shown below. Suppose each packet takes one time slot to be transmitted, and can only begin transmission at the beginning of a time slot after its arrival. Indicate the sequence of departing packet numbers (at t = 1, 2, 3, 4, 5, 7, 8) under priority scheduling, where red packets have higher priority. Give your answer as 7 ordered digits (each corresponding to the packet number of a departing packet), with a single space between each digit, and no spaces before the first or after the last digit, e.g., in a form like 7 6 5 4 3 2 1).
Note:
Red has more priority than green
1 2 3 5 4 7 6
Consider the pattern of red and green packet arrivals to a routerβs output port queue, shown below. Suppose each packet takes one time slot to be transmitted, and can only begin transmission at the beginning of a time slot after its arrival. Indicate the sequence of departing packet numbers (at t = 1, 2, 3, 4, 5, 7, 8) under round robin scheduling, where red starts a round if there are both red and green packets ready to transmit after an empty slot. Give your answer as 7 ordered digits (each corresponding to the packet number of a departing packet), with a single space between each digit, and no spaces before the first or after the last digit, e.g., in a form like 7 6 5 4 3 2 1).
Note:
Alternate between red and green
1 3 2 4 5 7 6
Consider the pattern of red and green packet arrivals to a routerβs output port queue, shown below. Suppose each packet takes one time slot to be transmitted, and can only begin transmission at the beginning of a time slot after its arrival. Indicate the sequence of departing packet numbers (at t = 1, 2, 3, 4, 5, 7, 8) under FCFS scheduling. Give your answer as 7 ordered digits (each corresponding to the packet number of a departing packet), with a single space between each digit, and no spaces before the first or after the last digit, e.g., in a form like 7 6 5 4 3 2 1).
1 2 3 4 5 6 7
Consider the pattern of red and green packet arrivals to a routerβs output port queue, shown below. Suppose each packet takes one time slot to be transmitted, and can only begin transmission at the beginning of a time slot after its arrival. Indicate the sequence of departing packet numbers (at t = 1, 2, 3, 4, 5, 7, 8) under priority scheduling, where red packets have higher priority. Give your answer as 7 ordered digits (each corresponding to the packet number of a departing packet), with a single space between each digit, and no spaces before the first or after the last digit, e.g., in a form like 7 6 5 4 3 2 1).
1 2 4 3 5 6 7
Consider the pattern of red and green packet arrivals to a routerβs output port queue, shown below. Suppose each packet takes one time slot to be transmitted, and can only begin transmission at the beginning of a time slot after its arrival. Indicate the sequence of departing packet numbers (at t = 1, 2, 3, 4, 5, 7, 8) under round robin scheduling, where red starts a round if there are both red and green packets ready to transmit after an empty slot. Give your answer as 7 ordered digits (each corresponding to the packet number of a departing packet), with a single space between each digit, and no spaces before the first or after the last digit, e.g., in a form like 7 6 5 4 3 2 1).
1 2 4 3 5 6 7
What are the principal components of the IPv4 protocol (check all that apply)?
IPv4 datagram format.
Packet handling conventions at routers (e.g., segmentation/reassembly)
IPv4 addressing conventions
Match each of the following fields in the IP header with its description, function or use.
This field contains the IP protocol version number.
This field contains ECN and differentiated service bits.
This field is used for datagram fragmentation/reassembly.
The value in this field is decremented at each router; when it reaches zero, the packet must be dropped.
This field contains the Internet checksum of this datagram's header fields.
This field contains the "protocol number" for the transport-layer protocol to which this datagram's payload will be demultiplexed - UDP or TCP, for example
This field _contains_ a UDP or TCP segment, for example
This field indicates the total number of bytes in datagram.
Which of the following statements is true regarding an IP address? (Zero, one or more of the following statements is true).
If a router has more than one interface, then it has more that one IP address at which it can be reached.
An IP address is associated with an interface.
If a host has more than one interface, then it has more that one IP address at which it can be reached
What is meant by an IP subnet? (Check zero, one or more of the following characteristics of an IP subnet).
A set of devices that have a common set of leading high order bits in their IP address.
A set of device interfaces that can physically reach each other without passing through an intervening router.
Consider the three subnets in the diagram below.
What is the maximum # of interfaces in the 223.1.2/24 network?
256
Consider the three subnets in the diagram below.
What is the maximum # of interfaces in the 223.1.3/29 network?
8
Consider the three subnets in the diagram below.
Which of the following addresses can not be used by an interface in the 223.1.3/29 network? Check all that apply.
223.1.2.6
223.1.3.16
223.1.3.28
What is meant by saying that DHCP is a "plug and play" protocol?
No manual configuration is needed for the host to join the network.
Which of the following statements about a DHCP request message are true (check all that are true). Hint: check out Figure 4.24 in the 7th and 8th edition of our textbook.
The transaction ID in a DHCP request message will be used to associate this message with future DHCP messages sent from, or to, this client.
A DHCP request message may contain the IP address that the client will use.
A DHCP request message is sent broadcast, using the 255.255.255.255 IP destination address.
Which of the following fields occur ONLY in the IPv6 datagram header (i.e., appear in the IPv6 header but not in the IPv4 header)? Check all that apply.
The flow label field.
128-bit source and destination IP addresses.
What is the purpose of the Dynamic Host Configuration Protocol?
To obtain an IP address for a host attaching to an IP network.
Destination-based forwarding, which we studied in section 4.2, is a specific instance of match+action and generalized forwarding. Select the phrase below which best completes the following sentence: "In destination-based forwarding, ..."
... after matching on the destination IP address in the datagram header, the action taken is to forward the datagram to the output port associated with that destination IP address.
Which of the following match+actions can be taken in the generalized OpenFlow 1.0 match+action paradigm that we studied in Section 4.4? Check all that apply.
... after matching on the 48-bit link-layer destination MAC address, the action taken is to forward the datagram to the output port associated with that link-layer address.
... after matching on the destination IP address in the datagram header, the action taken is to forward the datagram to the output port associated with that destination IP address.
... after matching on the port number in the segment's header, the action taken is to decide whether or not to drop that datagram containing that segment.
... after matching on the port number in the segment's header, the action taken is to forward the datagram to the output port associated with that destination IP address.
... after matching on the source and destination IP address in the datagram header, the action taken is to forward the datagram to the output port associated with that source and destination IP address pair.
... after matching on the destination IP address in the datagram header, the action taken is to decide whether or not to drop that datagram.
Which of the following fields in the frame/datagram/segment/application-layer message can be matched in OpenFlow 1.0? Check all that apply.
IP destination address
IP source address
IP type-of-service field
Upper layer protocol field
Source and/or destination port number
Consider the figure below that shows the generalized forwarding table in a router. Recall that a * represents a wildcard value. Now consider an arriving datagram with the IP source and destination address fields indicated below. For each source/destination IP address pair, indicate which rule is matched. Note: assume that a rule that is earlier in the table takes priority over a rule that is later in the table and that a datagram that matches none of the table entries is dropped.
Source: 1.2.56.32 Destination:128.116.40.186
Rule 2, with action _drop_
Source: 65.92.15.27 Destination: 3.4.65.76
Rule 1, with action _forward(2)_
Source: 10.1.2.3 Destination: 7.8.9.2
Rule 3, with action _send to controller_
Source: 10.1.34.56 Destination: 54.72.29.90
No match to any rule.
Consider the network below. We want to specify the match+action rules at s3 so that only the following network-wide behavior is allowed:
Input port: 3; Dest: 128.119/16 Action: forward(1)
Input port:1 ; Dest: 137.220/16 Action: forward(2)
Input port: 1; Dest: 67.56/16 Action: forward(3)
Input port: 2; Dest: 128.119/16 Action: forward(1)
Consider the network below. We want to specify the match+action rules at s3 so that s3 acts only as a relay for traffic between 137.220/16 and 67.56/16. In particular s3 should not accept/forward and traffic to/from 128.119/16. From the list of match+action rules below, select the rules to include in s3's flow table to implement this forwarding behavior. Assume that if a packet arrives and finds no ddmatch rule, it is dropped.
Input port: 2; Dest: 67.56/16 Action: forward(3)
Input port: 3; Dest: 137.220/16 Action: forward(2)
What is meant by generalized forwarding (as opposed to destination-based forwarding) in a router or switch?
Any of several actions (including drop (block), forward to a given interface, or duplicate-and-forward) can be made based on the contents of one or more packet header fields.
Which of the following network devices can be thought of as a "middlebox"? Check all that apply.
Network Address Translation box
HTTP load balancer
HTTP cache
What protocol (or protocols) constitutes the "thin waist" of the Internet protocol stack? Check all that apply.
IP
Which of the statements below are true statements regarding the "end-to-end principle"? Check all that apply.
The end-to-end argument advocates placing functionality at the network edge because some functionality cannot be completely and correctly implemented in the network, and so needs to be placed at the edge in any case, making in-network implementation redundant.
The end-to-end argument allows that some redundant functionality might be placed both in-network and at the network edge in order to enhance performance.
What is meant when it is said that the Internet has an βhourglassβ architecture? See the picture below if you are unfamiliar with an "hourglass".
The Internet protocol stack has a βthin waistβ in the middle, like an hourglass. The Internet Protocol (IP) is the only network-layer protocol in the middle layer of the stack. Every other layer has multiple protocols at that layer.
In the US, which of the following services has been regulated by the Federal Communications Commission (FCC) going back into the 20th century?
Telecommunication services.
Which of the following statements correctly identify the differences between routing and forwarding. Select one or more statements.
Forwarding refers to moving packets from a routerβs input to appropriate router output, and is implemented in the data plane.
Routing refers to determining the route taken by packets from source to destination, and is implemented in the control plane.
Match the name of the approach towards implementing a control plane with a description of how this approach works.
Individual routing algorithm components - with a component operating in each and every router - interact with each other in the control plane. The individual routing algorithm component executing in a given router computes the local fowarding table fir that router.
A (typically) remote controller gathers information from routers, and then computes and installs the forwarding tables in routers.
What is the definition of a βgoodβ path for a routing protocol? Chose the best single answer.
Routing algorithms typically work with abstract link weights that could represent any of, or combinations of, all of the other answers.
Consider Dijkstraβs link-state routing algorithm that is computing a least-cost path from node a to other nodes b, c, d, e, f. Which of the following statements is true. (Refer to Section 5.2 in the text for notation.)
The values computed in the vector D(v), the currently known least cost of a path from a to any node v, will never increase following an iteration.
In the initialization step, the initial cost from a to each of these destinations is initialized to either the cost of a link directly connecting a to a direct neighbor, or infinity otherwise.
Suppose nodes b, c, and d are in the set Nβ. These nodes will remain in Nβ for the rest of the algorithm, since the least-cost paths from a to b, c, and d are known.
Match the name of a general approach to routing with characteristics of that approach.
All routers have complete topology, and link cost information.
An iterative process of computation, exchange of informatoin with neighbors. Routers may initially only know link costs to directly-attached neighbors.
Routes change slowly over time.
Routing changes quickly over time.
Consider the graph shown below and the use of Dijkstraβs algorithm to compute a least cost path from a to all destinations. Suppose that nodes b and d have already been added to Nβ. What is the next node to be added to N' (refer to the text for an explanation of notation).
e
Consider the graph shown below and the use of Dijkstraβs algorithm to compute a least cost path from a to all destinations. Suppose that nodes b and d have already been added to Nβ. What is the path cost to the next node to be added to N' (refer to the text for an explanation of notation).
4
Match the terms "interdomain routing" and intradomain routing" with their definitions. Recall that in Internet parlance, an βASβ refers to βAutonomous Systemβ β a network under the control of a single organization.
Routing among different ASes (βnetworksβ).
Routing among routers within same AS (βnetworkβ).
Check the one or more of the following statements about the OSPF protocol that are true.
OSPF implements hierarchical routing
OSFP uses a Dijkstra-like algorithm to implement least cost path routing.
OSPF is an intra-domain routing protocol.
Consider the OSPF routing protocol. Which of the following characteristics are associated with OSPF (as opposed to BGP)?
Finds a least cost path from source to destination.
Is an intra-domain routing protocol.
Floods link state control information.
Among the following protocols, terminology or considerations, indicate those that are associated with "routing within a single network (typically owned and operated by one organization)."
intra-AS routing
intra-domain routing
OSPF
Driven more by performance than by routing policy
Suppose a provider network only wants to carry traffic to/from its customer networks (i.e., to provide no transit service), and customer networks only want to carry traffic to/from itself. Consider the figure below. To implement this policy, to which of the following networks would network C advertise the path Cy?
B
A
x
Again, suppose a provider network only wants to carry traffic to/from its customer networks (i.e., to provide no transit service), and customer networks only want to carry traffic to/from itself. Suppose C has advertised path Cy to A. To implement this policy, to which of the following networks would network A advertise the path ACy?
w
Again, suppose a provider network only wants to carry traffic to/from its customer networks (i.e., to provide no transit service), and customer networks only want to carry traffic to/from itself. Suppose C has advertised path Cy to x. To implement this policy, to which of the following networks would network x advertise the path xCy?
None of these other networks
Consider routers 2c and 2d in Autonomous System AS2 in the figure below. Indicate the flavor of BGP and the router from which each of 2c and 2d learns about the path to destination x
From 3a via eBGP.
From 2c via iBGP.
Consider the SDN layering shown below. Match each layer name below with a layer label (a), (b) or (c) as shown in the diagram
(b)
(c)
(a)
Which of the functions below belong in the controller layer labeled "Interface, abstractions for network control apps"? Check all below that apply.
Network graph
Intent
Which of the functions below belong in the controller layer labeled "Network-wide distributed, robust state management"? Check all below that apply
Link-state information
Host information
Flow tables
Switch information
Statistics
Which of the functions below belong in the controller layer labeled "Communication to/from controlled device"? Check all below that apply.
OpenFlow protocol
Which of the statements below about ICMP are true?
ICMP is used by hosts and routers to communicate network-level information.
The TTL-expired message type in ICMP is used by the traceroute program.
ICMP messages are carried directly in IP datagrams rather than as payload in UDP or TCP segments.
Which of the following services may be implemented in a link-layer protocol? Select one or more statements.
Multiplexing down from / multiplexing up to a network-layer protocol.
Coordinated access to a shared physical medium.
Bit-level error detection and correction.
Reliable data transfer between directly connected nodes.
Flow control between directly connected nodes.
Which of the following statements is true about a two-dimensional parity check (2D-parity) computed over a payload?
2D-parity can detect and correct any case of a single bit flip in the payload.
2D-parity can detect any case of a single bit flip in the payload.
2D-parity can detect any case of two bit flips in the payload.
Which of the following statements is true about channel partitioning protocols?
Channel partitioning protocols can achieve 100% channel utilization, in the case that all nodes always have frames to send.
There can be times when the channel is idle, when a node has a frame to send, but is prevented from doing so by the medium access protocol.
Which of the following statements is true about both Pure Aloha, and CSMA (both with and without collision detection?
Pure Aloha and CSMA can achieve 100% utilization, in the case that there is only one node that always has frames to send
There can be simultaneous transmissions resulting in collisions
Which of the following statements is true about polling and token-passing protocols?
These protocol can achieve close to 100% channel utilization, in the case that all nodes always have frames to send (the fact that the utilization is close to, but not exactly, 100% is due to a small amount of medium access overhead but not due to collisions)
These protocol can achieve close 100% utilization, in the case that there is only one node that always has frames to send (the fact that the utilization is close to, but not exactly, 100% is due to a small amount of medium access overhead but not due to collisions)
Consider the following multiple access protocols that we've studied: (1) TDMA, and FDMA (2) CSMA (3) Aloha, and (4) polling. Which of these protocols are collision-free (e.g., collisions will never happen)?
Polling
TDMA and FDMA
Consider the following multiple access protocols that we've studied: (1) TDMA, and FDMA (2) CSMA (3) Aloha, and (4) polling. Which of these protocols requires some form of centralized control to mediate channel access?
Polling
TDMA and FDMA
Consider the following multiple access protocols that we've studied: (1) TDMA, and FDMA (2) CSMA (3) Aloha, and (4) polling. For which of these protocols is the maximum channel utilization 1 (or very close to 1)?
Polling
TDMA and FDMA
Consider the following multiple access protocols that we've studied: (1) TDMA, and FDMA (2) CSMA (3) Aloha, and (4) polling. For which of these protocols is there a maximum amount of time that a node knows that it will have to wait until it can successfully gain access to the channel?
Polling
TDMA and FDMA
We've now learned about both IPv4 addresses and MAC addresses. Consider the address properties below, and use the pulldown menu to indicate which of these properties is only a property of MAC addresses (and therefore is not a property of IPv4 addresses - careful!).
This is a 48-bit address.
This is a link-layer address.
This address remains the same as a host moves from one network to another.
We've now learned about both IPv4 addresses and MAC addresses. Consider the address properties below, and use the pulldown menu to indicate which of these properties is only a property of IPv4 addresses (and therefore is not a property of MAC addresses - careful!).
This is a network-layer address.
This address is allocated by DHCP.
This is a 32-bit address.
We've now learned about both IPv4 addresses and MAC addresses. Consider the address properties below, and use the pulldown menu to indicate which of these properties is a property of both IPv4 addresses and MAC addresses.
This address must be unique among all hosts in a subnet.
Use the pulldown menus below to match the name of the field with the function/purpose of a field within an Ethernet frame.
Used to detect and possibly correct bit-level errors in the frame.
48-bit MAC address of the sending node
The contents of this field is typically (bit not always) a network-layer IP datagram.
Used to demultiplex the payload up to a higher level protocol at the receiver.
This field does not exist in the Ethernet frame
Suppose an Ethernet frame arrives to an Ethernet switch, and the Ethernet switch does not know which of its switch ports leads to the node with the given destination MAC address? In this case, what does the switch do?
Flood the frame on all ports except the port on which the frame arrived.
Which of the following statements are true about a self learning switch?
A self-learning switch will age-out (forget) a self-learned association of a MAC address x and switch port y if it doesnβt see a frame with MAC address x incoming on switch port y after some amount of time.
A self learning switch associates the source MAC address on an incoming frame with the port on which it arrived, and stores this matching in a table. The switch has now learned the port that leads to that MAC address.
A self-learning switch frees a network manager from a least one configuration task that might be associated with managing a switch
Consider the simple star-connected Ethernet LAN shown below, and suppose the Ethernet switch is a learning switch, and that the switch table is initially empty. Suppose C sends an Ethernet frame address to C' and C ' replies back to C. How many of these two frames are also received at B's interface?
1
Consider the simple star-connected Ethernet LAN shown below, and suppose the switch table contains entries for each of the 6 hosts. How will those entries be removed from the switch table?
An entry for a hostwill be removed if that host doesn't transmit any frames for a certain amount of time (that is, table entries will timeout).
Which of the following statements are true about MAC (link-layer) addresses? Select one or more statements below.
Generally stays unchanged as a device moves from one network to another.
Generally does not change, and is associated with a device when it is manufactured/created.
Has 48 bits.