Module 1: Practice Quiz Flashcards

(5 cards)

1
Q

Does implementing basic error correction in data link layer protocols like 802.11 violate the end-to-end principle?

A

No

Violations of the end-to-end principle typically refer to scenarios where functionality cannot be implemented entirely at the end hosts, such as NAT and firewalls. Error checking at a lower level is acceptable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following are ramifications of the ‘hourglass shape of the internet’?
* Many technologies that were not originally designed for the internet have been modified so that they have versions that can communicate over the internet (such as Radio over IP).
* It has been a difficult and slow process to transition to IPv6, despite the shortage of public IPv4 addresses.
* Applications like BitTorrent leverage peer-to-peer networking instead of a more traditional client-server model for better performance.

A
  • Many technologies that were not originally designed for the internet have been modified for internet communication
  • It has been a difficult and slow process to transition to IPv6 due to the shortage of public IPv4 addresses

  • A is correct; Modifying a technology so that it is compatible with the rest of the internet (i.e., by making it compatible with IP) greatly enhances market penetration (from the vendor’s perspective), and/or decreases the amount of extra development that would need to happen.
  • Bis correct. A big part of the Internet infrastructure uses IPV4 while the cost of transitioning is high. This reflects as a consequence of the narrow waist.
  • C is not relevant here. The hourglass shape of the Internet refers to Internet architecture in terms of protocols available at the different layers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does the Spanning Tree Algorithm (STA) help to manage in networks?

A

Data flow to prevent overwhelming traffic, known as ‘broadcast storms’

The Spanning Tree Algorithm prevents broadcast storms resulting from loops in the network topology, although broadcast storms can still occur from other issues.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

True or False: In the Spanning Tree Algorithm, the root of the spanning tree is always positioned centrally to minimize the distance to all other network nodes.

A

False

The Spanning Tree Algorithm guarantees a unique spanning tree, but this is not always the optimal tree. Administrators can configure the switch ID for specific spanning tree arrangements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Fill in the blank: When using the Spanning Tree Algorithm, data cannot be sent over a network link that the algorithm has _______.

A

deactivated or put into an inactive state

While the link can receive traffic, it is not utilized for forwarding traffic when inactive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly