Question 1
Question
Packet loss can occur at router output ports and this loss can be prevented by increasing the switch fabric speed.
Question 2
Question
What is the name of a network-layer packet?
Answer
-
Frame
-
Datagram
-
Segment
-
All are correct
Question 3
Question
The 8-bit protocol field in the IP datagram contains information about which transport layer protocol (TCP or UDP) the destination host should pass the segment to.
Question 4
Question
A data plane is responsible for
Answer
-
All are correct
-
b. the data plane’s input ports perform physical layer function of terminating an incoming physical link at a router,
-
c. performs link-layer function to interoperate with the link layer at the other side of the incoming link,
-
d. perform lookup function at the input ports
Question 5
Question
A control plane is responsible for
Answer
-
a. communicating with remote controllers,
-
b. responding to attached links that go up or down,
-
c. All are correct.
-
d. performing management functions.
-
e. executing routing protocols,
Question 6
Question
Which of these packet queueing disciplines ensure that all packets depart in the order in which they arrived?
Question 7
Question
Packet loss can be eliminated if the switching fabric speed is at least n times as fast as the input line speed, where n is the number of input ports.
Question 8
Question
A datagram with a private network address should be able to be present in the larger public Internet.
Question 9
Question
Type-of-Service field in the IP header can be used to ensure that a packet is forwarded through no more than N routers?
Answer
-
a. Type-of-Service
-
b. Header Length
-
c. Upper-layer-protocol
-
d. Time-to-live
Question 10
Question
The main function of the control plane is forwarding, which is to determine the paths a packet takes from its source to its destination.
Question 11
Question
A link-layer switch forwards a packet based on the packet’s MAC (layer 2) address.
Question 12
Question
The main function of the data plane is packet routing, which is to route datagrams from their input links to their output links.
Question 13
Question
Suppose there are three routers between a source host and a destination host. Ignoring fragmentation, an IP datagram sent from the source host to the destination host will travel over how many interfaces? How many forwarding tables will be indexed to move the datagram from the source to the destination?
Answer
-
a. 8 interfaces; 3 forwarding tables
-
b. 3 interfaces; 8 forwarding tables
-
c. 5 interfaces; 4 forwarding tables
-
d. 4 interfaces; 5 forwarding tables
Question 14
Question
Forwarding is a router’s local action of transferring packets from its input interfaces to its output interfaces, and forwarding takes place at very short timescales (typically a few nanoseconds), and thus is typically implemented in hardware.
Question 15
Question
Suppose that an arriving packet matches two or more entries in a router’s forwarding table. With traditional destination-based forwarding, what rule does a router apply to determine which of these rules should be applied to determine the output port to which the arriving packet should be switched?
Answer
-
a. Find exact prefix matching to forward the packet
-
b. To save time, find shortest prefix matching to forward the packet.
-
c.Use longest prefix matching to determine which link interface to forward the packet
-
d. None of these rules.
Question 16
Question
What two types of ICMP messages are received at the sending host executing the Traceroute program?
Answer
-
a.ICMP warning message (type 11 code 0) and a destination host unknown ICMP message (type 3 code 7).
-
b. ICMP warning message (type 11 code 0) and a destination port unreachable ICMP message (type 3 code 3).
-
c. ICMP warning message (type 9 code 0) and a destination port unreachable ICMP message (type 3 code 3).
-
d. ICMP Bad IP Header (type 12 code 0) and a destination host unknown ICMP message (type 3 code 7).
Question 17
Question
True or false: Link state algorithms: Computes the least-cost path between source and destination using complete, global knowledge about the network.
Question 18
Question
What is the purpose of the SNMP trap message?
Answer
-
a. A response to a managed device for which the device’s managing server requires notification.
-
b.A response to a request on a managed device for which the device’s managing server requires notification.
-
c. All are correct.
-
d.It is used for notifying a managing server of an exceptional situation (e.g., a link interface going up or down) that has resulted in changes to MIB object values.
Question 19
Question
Suppose you wanted to implement a new routing protocol in the SDN network. At which layer would you implement that protocol?
Answer
-
a.SDN’s network-control Controller (network operating system) layer
-
b. Added to all three layers.
-
c. SDN’s network-control application layer
-
d. SDN’s network-control data plane layer
Question 20
Question
What are the main network considerations for inter-AS and intra-AS protocols used in the Internet?
Answer
-
a.
Performance
-
b.
Scale
-
c.
All are correct.
-
d.
Policy
Question 21
Question
Routers use the AS-PATH attribute to detect and prevent looping advertisements; they also use it in choosing among multiple paths to the same prefix.
Question 22
Question
The NEXT-HOP attribute indicates the IP address of the first router along an advertised path (outside of the AS receiving the advertisement) to a given prefix. When configuring its forwarding table, a router uses the NEXT-HOP attribute.
Question 23
Question
Logically centralized control means that a logically central routing controller computes and distributes the forwarding tables to be used by each and every router, and each router does not compute its forwarding table, unlike the per-router control.
Question 24
Question
True or false: When an OSPF route sends its link state information, it is sent only to those nodes directly attached neighbors.
Question 25
Question
Define the following terms: subnet
Answer
-
a.
All are correct.
-
b.
A subnet does not contain a router;
-
c.
A subnet is a portion of a larger network;
-
d.
Its boundaries are defined by the router and host interfaces.
Question 26
Question
In the case of logically centralized control, the data plane and control plane are implemented in separate devices; the control plane is implemented in a central server or multiple servers, and the data plane is implemented in each router.
Question 27
Question
A distributed routing algorithm calculates the lease-cost path in an iterative, distributed manner by the routers. With a decentralized algorithm, no node has the complete information about the costs of all network links
Question 28
Question
If we using the analogy of cocktail party interactions, for polling protocol, there isn’t a discussion leader, but there is wine glass that the participants take turns holding. A participant is only allowed to talk if the participant is holding the wine glass.
Question 29
Question
What are some of the possible services that a link-layer protocol can offer to the network layer?
Question 30
Question
What is the maximum number of VLANs that can be configured on a switch supporting the 802.1Q protocol?
Answer
-
a. 2048 VLAN
-
b. 1024 VLAN
-
c. 4096 VLAN
-
d. 9192 VLAN
Question 31
Question
With IP, datagrams in the same TCP connection can take different routes in the network, and therefore arrive out of order. TCP is still needed to provide the receiving end of the application the byte stream in the correct order.
Question 32
Question
If we using the analogy of cocktail party interactions, in Token Ring protocol, a discussion leader allows only one participant to talk at a time, with each participant getting a chance to talk in a round-robin fashion.
Question 33
Question
Suppose nodes A, B, and C each attach to the same broadcast LAN (through their adapters). If A sends thousands of IP datagrams to B with each encapsulating frame addressed to the MAC address of B, what will C’s adapter process do for these frames?
Answer
-
C’s adapter will not process the frames, but the adapter will pass the datagrams up the protocol stack
-
C’s adapter will not process the frames, and the adapter will not pass the datagrams up the protocol stack
-
C’s adapter will process the frames, but the adapter will not pass the datagrams up the protocol stack
-
C’s adapter will process the frames, but the adapter will pass the datagrams up the protocol stack
Question 34
Question
How big is the MAC address space?
Answer
-
a. 2^128 Bits
-
b. 2^64 Bits
-
c. 2^32 Bits
-
d. 2^48 Bits
Question 35
Question
Although each link guarantees that an IP datagram sent over the link will be received at the other end of the link without errors, it is not guaranteed that IP datagrams will arrive at the ultimate destination in the proper order.
Question 36
Question
Suppose nodes A, B, and C each attach to the same broadcast LAN (through their adapters). If A sends thousands of IP datagrams to B with frames with the MAC broadcast address of B, what will C’s adapter process these frames in this case?
Answer
-
C’s adapter will not process the frames, and the adapter will not pass the datagrams up the protocol stack
-
C’s adapter will process the frames, but the adapter will not pass the datagrams up the protocol stack
-
C’s adapter will both process the frames, and pass the datagrams up the protocol stack
-
C’s adapter will not process the frames, but the adapter will pass the datagrams up the protocol stack
Question 37
Question
How big is the IPv6 address space?
Answer
-
a. 2^48 Bits
-
b. 2^64 Bits
-
c. 2^32 Bits
-
d. 2^128 Bits