Escolar Documentos
Profissional Documentos
Cultura Documentos
Course-wide Content
Lab Assignments
Quizzes
(See related pages)
Chapter 11
Quizzes
Quizzes Results Reporter
More Resources
Java Applets
Student Solutions Out of 20 questions, you answered 10 correctly with a final grade of 50%
10 correct (50%)
10 incorrect (50%)
0 unanswered (0%)
Your Results:
The correct answer for each question is indicated by a .
2 CORRECT The shortest frame in HDLC protocol is usually the _______ frame.
A) information
B) management
C) supervisory
3 CORRECT The address field of a frame in HDLC protocol contains the address of the _______ station.
A) primary
B) secondary
C) tertiary
D) primary or secondary
4 CORRECT The HDLC _______ field defines the beginning and end of a frame.
A) control
B) flag
C) FCS
A) N(R)
B) N(S)
C) Code bits
D) P/F bit
6 CORRECT According to the PPP transition-phase diagram, options are negotiated in the _______ state.
A) networking
B) terminating
C) establishing
D) authenticating
7 CORRECT According to the PPP transition-phase diagram, verification of user identification occurs in the _______ state.
A) networking
B) terminating
C) establishing
D) authenticating
8 CORRECT In the PPP frame, the _______ field defines the contents of the data field.
A) FCS
B) flag
C) control
D) protocol
9 In the PPP frame, the _______ field is similar to that of the U-frame in HDLC.
INCORRECT
A) flag
B) protocol
C) FCS
D) control
10 In the PPP frame, the _______ field has a value of 11111111 to indicate the broadcast address of HDLC.
INCORRECT
A) protocol
B) address
C) control
D) FCS
B) Termination
C) Option negotiation
B) flag
C) control
D) protocol
13 For CHAP authentication, the user takes the system’s _______ and its own _______ to create a result that is then sent to the system.
INCORRECT
A) authentication identification; password
B) ESC byte
C) null byte
15 In bit stuffing, we sometimes need to add an extra ___________ bit in the payload.
CORRECT
A) 0’s
B) 1’s
C) 0’s or 1’s
B) bit
C) byte or bit
B) bit
C) byte or bit
B) the receiver
19 In PPP, the ___________ field defines the type of payload encapsulated in the frame.
INCORRECT
A) address
B) control
C) protocol
20 In PPP, the CHAP protocol uses ____________ steps to authenticate the parties in communication.
INCORRECT
A) one
B) two
C) three
Date: Fri Dec 08 2017 12:41:33 GMT-0500 (EST)Fri Dec 08 2017 12:22:16 GMT-0500 (EST)
My name:
Section ID:
E-mail these results to:
E-mail address: Format:
Me: HTML
My Instructor: HTML
My TA: HTML
Other: HTML
To learn more about the book this website supports, please visit its Information Center.
Copyright 2017 McGraw-Hill Global Education Holdings, LLC. All rights reserved.
Any use is subject to the Terms of Use and Privacy Center | Report Piracy
Home > Chapter 17 > Quizzes
Course-wide Content
Lab Assignments
Quizzes
(See related pages)
Chapter 17
Quizzes
Quizzes Results Reporter
More Resources
Java Applets
Student Solutions Out of 10 questions, you answered 7 correctly with a final grade of 70%
7 correct (70%)
3 incorrect (30%)
0 unanswered (0%)
Your Results:
The correct answer for each question is indicated by a .
A) software
B) physical wiring
A) physical
3 CORRECT A link-layer switch is a connecting device that operates in the _______ layer(s).
A) physical
A) physical
A) repeater
B) link-layer switch
C) router
A) repeater
B) link-layer switch
C) router
B) network-layer
C) transport-layer
B) network-layer
C) transport-layer
B) spanning-tree
C) forwarding
B) MAC addresses
C) IP addresses
Date: Fri Dec 08 2017 12:45:34 GMT-0500 (EST)Fri Dec 08 2017 12:41:54 GMT-0500 (EST)
My name:
Section ID:
E-mail these results to:
E-mail address: Format:
Me: HTML
My Instructor: HTML
My TA: HTML
Other: HTML
To learn more about the book this website supports, please visit its Information Center.
Copyright 2017 McGraw-Hill Global Education Holdings, LLC. All rights reserved.
Any use is subject to the Terms of Use and Privacy Center | Report Piracy
Home > Chapter 18 > Quizzes
Course-wide Content
Lab Assignments
Quizzes
(See related pages)
Chapter 18
Quizzes
Quizzes Results Reporter
More Resources
Java Applets
Student Solutions Out of 26 questions, you answered 13 correctly with a final grade of 50%
13 correct (50%)
13 incorrect (50%)
0 unanswered (0%)
Your Results:
The correct answer for each question is indicated by a .
4 CORRECT In a virtual-circuit approach, the forwarding decision is based on the value of the _____________ field
in the packet header.
A) source address
B) destination address
C) label
5 CORRECT In a datagram approach, the forwarding decision is based on the value of the _____________ field in
the packet header.
A) source address
B) destination address
C) label
A) delay
B) throughput
C) packet loss
9 CORRECT When the load in the network reaches the network capacity, the packet delay ___________ and the
network throughput reaches ______________.
A) increases sharply; its minimum
B) choke packet
C) implicit signaling
B) choke packet
C) discarding policy
B) 256
C) 10
14 In classful addressing, the IPv4 address space is divided into _______ classes.
INCORRECT
A) 3
B) 4
C) 5
C) must be a power of 2
B) be a multiple of 128
C) be divisible by 128
B) 8
C) 16
B) 8
C) 16
B) 8
C) 16
B) transport
C) network
D) data-link
22 In DHCP, the client uses ________ port and the server uses _________port.
INCORRECT
A) an ephemeral; a well-known
B) a well-known; a well-known
C) a well-known; an ephemeral
B) TCP
C) IP
24 _________ allows a site to use a set of private addresses for internal communication and a set of global
CORRECT Internet addresses for communication with the rest of the world.
A) DHCP
B) NAT
C) IMCP
25 The idea of address aggregation was designed to alleviate the increase in routing table entries when
CORRECT using ________ addressing.
A)
classful
B) classless
C) classful or classless
26 The use of hierarchy in routing tables can ________ the size of the routing tables.
INCORRECT
A) reduce
B) increase
Date: Fri Dec 08 2017 12:50:17 GMT-0500 (EST)Fri Dec 08 2017 12:45:39 GMT-0500 (EST)
My name:
Section ID:
E-mail these results to:
E-mail address: Format:
Me: HTML
My Instructor: HTML
My TA: HTML
Other: HTML
To learn more about the book this website supports, please visit its Information Center.
Copyright 2017 McGraw-Hill Global Education Holdings, LLC. All rights reserved.
Any use is subject to the Terms of Use and Privacy Center | Report Piracy
Home > Chapter 19 > Quizzes
Course-wide Content
Lab Assignments
Quizzes
(See related pages)
Chapter 19
Quizzes
Quizzes Results Reporter
More Resources
Java Applets
Student Solutions Out of 17 questions, you answered 3 correctly with a final grade of 18%
3 correct (18%)
14 incorrect (82%)
0 unanswered (0%)
Your Results:
The correct answer for each question is indicated by a .
1 IP is a _________ protocol.
INCORRECT
A) connection-oriented unreliable
B) connection-oriented reliable
C) connectionless unreliable
D) connectionless reliable
B) total length
B) 20
C) 60
B) datagrams
C) frames
7 The total length field defines the total length of the datagram _________.
INCORRECT
A)
including the header
B) excluding the header
8 When a datagram is encapsulated in a frame, the total size of the datagram must be less than the
INCORRECT _______.
A) MUT
B) MAT
C) MTU
C) network-layer protocol
11 When a host moves to a new network, its original address is referred to as __________.
CORRECT
A) home
B) care-of
C) foreign
B) care-of
C) foreign
B) two
C) three
B) registration
C) data transfer
B) registration
C) data transfer
B) registration
C) data transfer
17 In mobile IP communication, inefficiency in triangle routing is ________ the one in double crossing.
INCORRECT
A) more severe than
Date: Fri Dec 08 2017 12:52:15 GMT-0500 (EST)Fri Dec 08 2017 12:50:25 GMT-0500 (EST)
My name:
Section ID:
E-mail these results to:
E-mail address: Format:
Me: HTML
My Instructor: HTML
My TA: HTML
Other: HTML
To learn more about the book this website supports, please visit its Information Center.
Copyright 2017 McGraw-Hill Global Education Holdings, LLC. All rights reserved.
Any use is subject to the Terms of Use and Privacy Center | Report Piracy
Home > Chapter 23 > Quizzes
Course-wide Content
Lab Assignments
Quizzes
(See related pages)
Chapter 23
Quizzes
Quizzes Results Reporter
More Resources
Java Applets
Student Solutions Out of 20 questions, you answered 7 correctly with a final grade of 35%
7 correct (35%)
13 incorrect (65%)
0 unanswered (0%)
Your Results:
The correct answer for each question is indicated by a .
1 CORRECT One of the main duties of the transport layer is to provide ____________ communication.
A) node-to-node
B) host-to-host
C) process-to-process
2 CORRECT A client program normally uses ____________ port number. A server program normally uses
__________ port number.
A) a well-known; an ephemeral
B) an ephemeral; a well-known
C) a private; a well-known
4 CORRECT ______________ means accepting items from more than one source. ______________ means
delivering items to more than one source.
A) Demultiplexing; Multiplexing
B) Multiplexing; Demultiplexing
C) Encapsulation; Decapsulation
D) Pulling; Pushing
5 ________ means the producer delivers the items when they are produced. _______ means the
INCORRECT consumer takes the items when it is ready to do so.
A) Pushing; Pulling
B) Pulling; Pushing
C) Forwarding; Accepting
6 In the stop-and-wait protocol, the maximum send window size is ______ and the maximum receive
INCORRECT window size is _______, where m is the number of bits in the sequence.
A) 1; 1
B) 2m; 1
C) 1; 2m
D) 2m; 2m
7 CORRECT In the Go-Back-N protocol, the maximum send window size is ______ and the maximum receive
window size is _______, where m is related to the number of bits in the sequence number.
A)
1; 1
B) 1; 2m
C) 2m − 1; 1
D) 2m − 1; 2m − 1
8 In the selective-repeat protocol, the maximum send window size is ______ and the maximum receive
INCORRECT window size is _______, where m is the number of bits in the sequence.
A) 1; 1
B) 1; 2m − 1
C) 2m − 1; 1
D) 2m − 1; 2m − 1
A) connectionless, reliable
B) connection-oriented, unreliable
C) connectionless, unreliable
11 At the transport layer, to define the processes, we need two identifiers called ____________.
INCORRECT
A) logical addresses
B) physical addresses
C) port addresses
12 The ports ranging from 0 to 1,023 are called the ___________ ports. The ports ranging from 1,024 to
INCORRECT 49,151 are called ___________ ports. The ports ranging from 49,152 to 65,535 are called the
___________ ports.
A) well-known; registered; dynamic or private
B) network
C) transport
D) application
B) 16
C) 32
D) 64
B) end-to-end
C) node-to-host
D) host-to-node
16 In Go-Back-N, the values of Sf = 3 and Sn = 7, after receiving a packet with ackNo = 6, the value of Sf
INCORRECT is _______________.
A) 6
B) 7
C) 5
17 In Go-Back-N, the values of Sf = 3 and Sn = 7, after receiving a packet with ackNo = 6, the value of Sn
CORRECT is _______________.
A) 6
B) 7
C) 5
18 In Go-Back-N, the values of Sf = 3 and Sn = 7, after receiving a packet with ackNo = 5, the window
INCORRECT ________.
A) slides two slots
19 In Selective Repeat, the values of Sf = 3 and Sn = 7, after receiving a packet with ackNo = 5, the
INCORRECT window ________.
A) slides two slots
B) started
Date: Fri Dec 08 2017 12:54:00 GMT-0500 (EST)Fri Dec 08 2017 12:52:20 GMT-0500 (EST)
My name:
Section ID:
E-mail these results to:
E-mail address: Format:
Me: HTML
My Instructor: HTML
My TA: HTML
Other: HTML
To learn more about the book this website supports, please visit its Information Center.
Copyright 2017 McGraw-Hill Global Education Holdings, LLC. All rights reserved.
Any use is subject to the Terms of Use and Privacy Center | Report Piracy