HW1:
1) To support streaming multimedia content over the Internet, service providers often use CDN overlay architecture.
1) In the OSI model, the network layer lies between the link layer and the transport layer.
2) Real-time/ Interactive audio/video describes the type of multimedia applications such as Skype.
2) The OSI =__4___ layers.
3) Layer 2 = from a node to its adjacent node. (Link Layer) 3) Network jitter is one of the imporant issues that multimedia applications.
4) Layer _3_ = the delivery of PDUs from one network to another network. 4) Buffering is a technique that a client-side application can use to mitigate network delay jitter.
5) Layer _4_ = the delivery of PDUs from a process on source node to destination node. 5) The main reason for streaming video files from online servers instead of downloading them is their large sizes.
6) In the layered protocol model, L3 gives L4. L5 gets from L4. 6) Delayed playback is a technique that a multimedia application can use to mitigate network delay.
7) Network layer = _router_ / link layer = _switch_. 7) Packet interleaving is a common AL technique used to mitigate packet loss in multimedia applications.
8) OSI model: Data synchronization and checkpointing = session layer 8) Packet loss is one of the imporant issues that multimedia applications must address in today's Internet.
9) A typical PDU comprises a header and a payload.
10) Hubs = L1_ devices / Ethernet switches = L2 / Routers = L-3 HW4+Q4
11) A protocol defines the syntax,{ semantics }, and timing. 1) S&W ARQ < GBN ARQ < SR protocol.
12) AL uses _NAME_ / TL uses _PORT_ / LL uses _MAC_ / NL uses IP 2) GBN ARQ protocol can use cumulative ACKs instead of individual ACKs.
13) If the _payload/data_ size is large relative to the overall PDU size then the protocol is said to be efficient. 3) SR ARQ uses a timer for every outstanding packet, GBN uses a single timer for the oldest outstanding packet.
14) All the devices in a LAN share the same network address as their gateway router 4) UDP is a lean protocol. Its segment has only 4 header fields.
15) In the _star_ network topology, if one central element is down then the entire network is down. 5) UDP is not a reliable protocol, yet it uses 16-bit checksum for error detection.
16) In the _connectionless_ = may suffer from out-of-order arrivals. 6) In the third leg of TCP's three-way handshake, the SYN flag is set to 0.
17) In the _DATAGRAM_ = may experience random queuing 7) In the first leg of TCP's three-way handshake, the ACK flag is set to 0.
18) A typical architecture of an institutional LAN comprises a hierarchy of _access_switches and _core_ switches. 8) TCP is a transport layer protocol that gives a connection-oriented service to the application layer.
19) Host IP address consists of NetId and HostId. 9) In the UDP/TCP header, the source and destination port numbers are 16-bit long fields
20) The collection of devices attached to a single router port is known as LAN. 10) TCP uses a 32-bit field in its header for the sequence numbers of segments / numbering acknowledgments.
21) The mesh network topology is known to be susceptible to an excessive number of links when the number of users is 11) The ReceiveWindow field in the TCP header is used for flow control.
large. 12) Maximum UDP segment length is 65536 bytes.
22) TCP gives the AL process a _CONNECTION-ORIENTED_ service, while UDP gives it a connectionless service 13) The ReceiveWindow field in the TCP header is used for flow control.
14) In the first/second leg of TCP's three-way handshake, the SYN flag is set to 1.
QZ1 15) TCP is a complex protocol. Its standard header has 20 bytes.
1) AL = MESSAGE_. TL = SEGMENT_. LL = FRAME_. NL = DATAGRAM_. 16) In GBN/SR ARQ protocol, the sender and receiver windows have different/same sizes.
2) The TL segments are encapsulated at the source node and _DECAPSULATED_ at the destination node. 17) TCP header can have optional bytes. The maximum size of the options field is 40 bytes.
3) The _MESH_ network topology provides a direct and dedicated link between any two nodes in the network. 18) TCP header can have optional bytes. The maximum header size is 60 bytes.
4) The _DATAGRAM_ packet switching model does not require a setup phase before data is exchanged. 19) Ports:HTTP-80,HTTPS-443,SMTP-25,POP3-110,DNS-53
5) The collection of ISP routers form what is known as a _WAN_.
6) The _DATAGRAM_ packet switching model is a connectionless model. HW5+Q5
7) The _VC_ packet switching model is a connection-oriented model. 1) A typical IP router architecture comprises a routing processor, several I/O ports, and a switch fabric.
8) In the OSI model, physical layer = transmits data as a stream of bits 3) The main functions of IP routers are routing and forwarding.
9) The bus network topology is known to be susceptible to collision. 4) The devices that implement the network layer inside the internet core are called routers
10) Telecom carriers use a mix of point-to-point connections and _switched_ connections in their WANs 5) The second row of an IPv4 datagram header is dedicated to the process of fragmentation.
11). The OSI model -> 7 layers. TCP/IP model(PLNTA) -> 5 layers. 6) IPv4 addresses are 32-bit long whereas IPv6 addresses are 128-bit.
7) The network layer ensures that two hosts, even on different networks, can still exchange packets
HW2 8) If the address block 10.x.y.z/24 is used by an organization, a NAT router must be used before being forwarded into the
1) HTTP/2 allows a web server to push/send page content public internet.
2) HTTP/2 is faster and more secure than HTTP/1. 9) In DV routing, X receives an update about a cost from different/same neighbors, then X takes the smallest/latest
3) HTTP/3 fixes the HOL/head of line blocking problem that HTTP/1 and HTTP/2 suffer from. value of the cost.
4) HTTP request message header starts with a field called method. 10) DHCP process, the client sends a DHCP discover message, to which the server replies with a DHCP offer
5) The most common port number for HTTPS servers is 443, and for HTTP servers is 80 message.
6) Reliable data transfer service guarantees the data does not suffer any errors, packet loss, or out-of-order arrivals. 11) Ping is an application that uses on ICMP Echo Request and Echo Reply messages
7) In the client-server model, socket address => port number and the IP address. 12) Routing is a control plane function whereas forwarding is a data plane function.
8) SMTP = push protocol and POP/ IMAP = pull protocol 13) In the SDN approach, remote controllers implement the control plane functions.
9) SMTP servers = port number 25 14) The M flag in the header of an IPv4 datagram is set to 1/0 in the FIRST/LAST of many fragments.
10) Mail server A receiving an email from mail server B acts as an SMTP server. 15) The network layer that follows the datagram service model gives a best-effort, connectionless service to the
11) Mail server A receiving an email from a user agent acts as an SMTP server. transport layer.
12) Mail server A receiving a request to retrieve emails from a user agent acts as an IMAP server. 16) The D flag in the header of an IPv4 datagram is set to 1 if the datagram is not to be fragmented.
13) Network throughput is affected by the network congestion, network delays, bit error rate, and packet loss. 17) IPv6 address obtained from the shortened notation AABB::A00:B10:E11 is
14) The propogation delay depends on the physical distance and the travel speed of the electomagnetic wave. aabb:0000:0000:0000:0000:0a00:0b10:0e11.
15) The transmission delay depends on the packet size and the node bit rate. 18) The three important types of IPv6 addresses are unicast addresses, anycast addresses, and multicast
16) The end-to-end delay, delivering packets through the first link and delivering the last packet through the remaining addresses.
(N-1) links. 19) The shortest notation of the IPv6 address AB11:0:0:BB11:0:0:0:EE11 is AB11:0:0:BB11::EE11.
17) A local DNS server is not strictly part of the DNS server hierarchy but plays an important role in practice. 20) In the classful IPv4 addressing, the default subnet mask for the address 45.3.2.1 is /8.
18) Delay jitter is mostly due to the variability of queuing delays that packets experience at network routers. 21) In the classful IPv4 addressing, the default subnet mask for the address 193.3.2.1 is /24.
19) Reliable data transfer service guarantees the data does not suffer any errors, packet loss, or out of order arrivals. 22) IPv6 address AABB:CCDD:EEFF:0:0:0:AAAA:BBBB is AABB:CCDD:EEFF::AAAA:BBBB.
20) In the client-server model, the client process always initiates the connection, server process is always on waiting for a 23) In the DHCP discover message, the source IP address is 0.0.0.0 and the destination IP address is 255.255.255.255.
connection request. 24) ICMP is a protocol used for query messaging and error reporting by the network layer.
21) A network application running on a particular network host, is uniquely identified by a pair of numbers, that together 25) Like poisoned reverse, Split Horizon is a technique that could be used to mitigate the Count-To- Infinity (CTI)
are referred to as the socket address. instability problem.
26) RIP is a standard IETF routing protocol that uses the DV(Distance Vector) algorithm to find the Least Cost Paths
QZ2 (LCPs).
1) A server in charge of resolving all aus.edu names is called a _EDUCAUSE_ DNS server. 27) DV/EIGRP/RIP algorithm is used by decentralized routing protocols. They simply rely on updates from their
2) The nodal delay comprises the processing delay, the propagation delay, the queuing delay, and the _TRANSMIT_ delay immediate neighbors.
3) Root servers are the highest in the hierarchy of DNS servers. 28) LS/link state/OSPF/Dijsktra algorithm is used by global routing protocols.
4) Client does not require a permanent address. Server typically uses a permanent and well-known address.
29) EIGRP is a routing protocol that uses a composite metric that is based on delay, bandwidth, reliability, and load.
5) HTTP response message header contains an important field called a status code.
30) EIGRP is a Cisco proprietary routing protocol that uses DV algorithm to find the LCPs in a network.
31) CTI is a two-node instability problem that networks running RIP protocol can sufffer from.
32) In a network that runs OSPF routing protocol, the link cost is inversely proportional to its bit rate.
33) In a network that runs RIP routing protocol, the maximum number of hops is 15.
34) Traceroute is an application that uses ICMP error-reporting messages to determine the number of routers between a
source and a destination.
, 35) The network layer that follows the DATAGRAM_ service model gives a best-effort, connectionless service to the
transport layer.
36) The TTL header field in an IPv4 datagram is used to prevent lost packets from staying inside the network indefinitely.
37) The TOS field in the header of an IPv4 datagram can be used to provide different classes of service inside the network.