Does implementing basic error correction in data link layer protocols like 802.11 violate the end-to-end principle?
No
Violations of the end-to-end principle typically refer to scenarios where functionality cannot be implemented entirely at the end hosts, such as NAT and firewalls. Error checking at a lower level is acceptable.
Which of the following are ramifications of the ‘hourglass shape of the internet’?
* Many technologies that were not originally designed for the internet have been modified so that they have versions that can communicate over the internet (such as Radio over IP).
* It has been a difficult and slow process to transition to IPv6, despite the shortage of public IPv4 addresses.
* Applications like BitTorrent leverage peer-to-peer networking instead of a more traditional client-server model for better performance.
What does the Spanning Tree Algorithm (STA) help to manage in networks?
Data flow to prevent overwhelming traffic, known as ‘broadcast storms’
The Spanning Tree Algorithm prevents broadcast storms resulting from loops in the network topology, although broadcast storms can still occur from other issues.
True or False: In the Spanning Tree Algorithm, the root of the spanning tree is always positioned centrally to minimize the distance to all other network nodes.
False
The Spanning Tree Algorithm guarantees a unique spanning tree, but this is not always the optimal tree. Administrators can configure the switch ID for specific spanning tree arrangements.
Fill in the blank: When using the Spanning Tree Algorithm, data cannot be sent over a network link that the algorithm has _______.
deactivated or put into an inactive state
While the link can receive traffic, it is not utilized for forwarding traffic when inactive.