Vous êtes sur la page 1sur 4

Name ______________________________

QUIZ 1
CECS 474 Computer Network Interoperability
September 2012

Circle True or False for each of the following true or false questions. (2 points each)

1. In circuit switching, no set-up control message is needed. True or False


2. Sending data over a Multiple Access link is simplier than sending data over a
point-to-point link. True or False
3. An example of short and bursty messages would be the letters that are generated when
typing on a keyboard. True or False
4. For a network with no overhead: throughput = effective throughput. True or False
5. Round-trip time is the amount of time it takes for a single bit to propagate from
the source to the destination. True or False
6. On a low-speed transmission link, the “width” of each bit will be greater than the
“width” of a bit on a high-speed transmission link. True or False
7. WiFi networks are considered to be Multiple Access Networks. True or False
8. A host machine is a network node that runs a user application. True or False
9. The Internet is a packet-switched network. True or False
10. Encapsulation is the process of capturing and reading data as it travels across the Internet. True or False

Circle the best answer for each of the following multiple choice questions. (2 points each)

11. All of the following problems can be caused by network hardware malfuntions and must be handled by
network protocols, except:
(a) Bits can be corrupted or destroyed
(b) Users can send the wrong data.
(c) Entire packets can be lost.
(d) Packets can be duplicated.
(e) Packets can be delivered out of order.
(f) None of the above.

12. The phenomenon that occurs during a thunder storm, when we see lightening before we hear the thunder
associated with it, can be best explained by:
(a) RTT.
(b) Queueing and processing delay.
(c) Propagation delay.
(d) Transmission delay.
(e) Latency.
(f) None of the above.

Dr. Tracy Bradley Maples (Fall 2012)


13. When using the ping command in Linix, all of the following can be done except:
(a) The number of ping packets being sent can be changed.
(b) The rate at which the ping packets are sent can be changed.
(c) The RTT of a ping packet can be reduced.
(d) The size of the ping packet being sent can be changed.
(f) None of the above.

Identify each of the following terms with the phrase that most fully describes it. Each phrase should be used
only once. (2 points each)

14. ____ OSI 7 layer model A. Layer N at the destination sees exactly what layer N at the
source sent.
15. ____ One protocol layer B. The Protocol Stack used in the Internet today.
C. An agreement about how communication should take place.
16. ____ A protocol D. Adding a header to each packet as it is passed down the
protocol stack.
17. ____ TCP/IP E. A theorectical protocol design for computer networks.
F. Dedicated to solving one subproblem.
G. Peer layer protocols.

Identify each of the following terms with the phrase that most fully describes it. Each phrase should be used
only once. (2 points each)

18. ____ API A. An application that uses both Client/Server and P2P.
19. ____ Client B. An application program that is “always on” and waits to be contacted.
20. ____ Peer C. An application program that is both a client and a server.
D. An application program that initiates contact with a server.
E. Used to create a network application without a detailed understanding the
underlying network technologies

21. (4 points) Fill in the following blanks with the names of the TCP/IP protocol layers:

Layer 5 ________________________________

Layer 4 ________________________________

Layer 3 ________________________________

Layer 2 ________________________________

Layer 1 ____________Physical_____________

Dr. Tracy Bradley Maples (Fall 2012) 2         


22. (4 points) Fill in the following blanks with the names of the OSI 7-layer Network Model:
Layer 7 ________________________________
Layer 6 ________________________________
Layer 5 _____________Session_____________
Layer 4 ________________________________
Layer 3 ____________Network_____________
Layer 2 ________________________________
Layer 1 ____________Physical_____________

Circle the best answer for each of the following multiple choice questions. (4 points each)

23. If the bandwidth of a network is 25 Mbps, how much time does it take to transmit one bit?
(a) 0.004 microseconds.
(b) 0.0025 microseconds.
(c) 0.04 microseconds.
(d) 1 microsecond.
(e) 25 microseconds.
(f) None of the above.

24. Assume you have a point-to-point link between CSULB and Disneyland. Suppose you want to send a birthday
email to Mickey Mouse that has total size 1000 bits. If the distance of the link is 16.6 miles (27,000 meters),
the throughput of the link is 1,500,000 bps, and the speed-of-light propagation delay is 2 * 10 8 meters/sec.
What is the propagation delay for a single bit to travel from CSULB to Disneyland?
(a) 7,407.4 sec
(b) 0.018 sec
(c) 1500 sec
(d) 0.000135 sec
(e) 55.55556 sec
(f) 133.333333 sec
(g) 0.00066667 sec
(h) None of the above.

25. Assume you have a point-to-point link between CSULB and Disneyland. Suppose you want to send a birthday
email to Mickey Mouse that has total size 1000 bits. If the distance of the link is 16.6 miles (27,000 meters),
the throughput of the link is 1,500,000 bps, and the speed-of-light propagation delay is 2 * 10 8 meters/sec.
What is the transmit time for the 1000 bit email?
(a) 7,407.4 sec
(b) 0.018 sec
(c) 1500 sec
(d) 0.000135 sec
(e) 55.55556 sec
(f) 133.333333 sec
(g) 0.00066667 sec
(h) None of the above.

Dr. Tracy Bradley Maples (Fall 2012) 3         


CECS 474 – Quiz 1 – Scratch Paper – NOTE: Nothing on this Page will be graded.

Dr. Tracy Bradley Maples (Fall 2012) 4         

Vous aimerez peut-être aussi