Académique Documents
Professionnel Documents
Culture Documents
QUIZ 1
CECS 474 Computer Network Interoperability
September 2012
Circle True or False for each of the following true or false questions. (2 points each)
Circle the best answer for each of the following multiple choice questions. (2 points each)
11. All of the following problems can be caused by network hardware malfuntions and must be handled by
network protocols, except:
(a) Bits can be corrupted or destroyed
(b) Users can send the wrong data.
(c) Entire packets can be lost.
(d) Packets can be duplicated.
(e) Packets can be delivered out of order.
(f) None of the above.
12. The phenomenon that occurs during a thunder storm, when we see lightening before we hear the thunder
associated with it, can be best explained by:
(a) RTT.
(b) Queueing and processing delay.
(c) Propagation delay.
(d) Transmission delay.
(e) Latency.
(f) None of the above.
Identify each of the following terms with the phrase that most fully describes it. Each phrase should be used
only once. (2 points each)
14. ____ OSI 7 layer model A. Layer N at the destination sees exactly what layer N at the
source sent.
15. ____ One protocol layer B. The Protocol Stack used in the Internet today.
C. An agreement about how communication should take place.
16. ____ A protocol D. Adding a header to each packet as it is passed down the
protocol stack.
17. ____ TCP/IP E. A theorectical protocol design for computer networks.
F. Dedicated to solving one subproblem.
G. Peer layer protocols.
Identify each of the following terms with the phrase that most fully describes it. Each phrase should be used
only once. (2 points each)
18. ____ API A. An application that uses both Client/Server and P2P.
19. ____ Client B. An application program that is “always on” and waits to be contacted.
20. ____ Peer C. An application program that is both a client and a server.
D. An application program that initiates contact with a server.
E. Used to create a network application without a detailed understanding the
underlying network technologies
21. (4 points) Fill in the following blanks with the names of the TCP/IP protocol layers:
Layer 5 ________________________________
Layer 4 ________________________________
Layer 3 ________________________________
Layer 2 ________________________________
Layer 1 ____________Physical_____________
Circle the best answer for each of the following multiple choice questions. (4 points each)
23. If the bandwidth of a network is 25 Mbps, how much time does it take to transmit one bit?
(a) 0.004 microseconds.
(b) 0.0025 microseconds.
(c) 0.04 microseconds.
(d) 1 microsecond.
(e) 25 microseconds.
(f) None of the above.
24. Assume you have a point-to-point link between CSULB and Disneyland. Suppose you want to send a birthday
email to Mickey Mouse that has total size 1000 bits. If the distance of the link is 16.6 miles (27,000 meters),
the throughput of the link is 1,500,000 bps, and the speed-of-light propagation delay is 2 * 10 8 meters/sec.
What is the propagation delay for a single bit to travel from CSULB to Disneyland?
(a) 7,407.4 sec
(b) 0.018 sec
(c) 1500 sec
(d) 0.000135 sec
(e) 55.55556 sec
(f) 133.333333 sec
(g) 0.00066667 sec
(h) None of the above.
25. Assume you have a point-to-point link between CSULB and Disneyland. Suppose you want to send a birthday
email to Mickey Mouse that has total size 1000 bits. If the distance of the link is 16.6 miles (27,000 meters),
the throughput of the link is 1,500,000 bps, and the speed-of-light propagation delay is 2 * 10 8 meters/sec.
What is the transmit time for the 1000 bit email?
(a) 7,407.4 sec
(b) 0.018 sec
(c) 1500 sec
(d) 0.000135 sec
(e) 55.55556 sec
(f) 133.333333 sec
(g) 0.00066667 sec
(h) None of the above.