Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
2019
Class Year: 2019/2020 Time Allowed: 30 minutes.
Year: Third No. of Pages: 3
Subject Name: Networks No. of Questions: 20
Department: Information Technology Form: 1
Answer the following questions: [20 points]
3. Which two characteristics are associated with UDP sessions? (Choose two.)
a) Destination devices receive traffic with minimal delay
b) Destination devices reassemble messages and pass them to an application.
c) Received data is unacknowledged.
d) Unacknowledged data packets are retransmitted.
6. A host device needs to send a large video file across the network while providing data
communication to other users. Which feature will allow different communication streams to occur
at the same time, without having a single data stream using all available bandwidth?
a) window size
b) multiplexing
c) port numbers
d) acknowledgments
Form: 1 1
7. Why does HTTP use TCP as the transport layer protocol?
a) to ensure the fastest possible download speed
b) because HTTP is a best-effort protocol
c) because transmission errors can be tolerated easily
d) because HTTP requires reliable delivery
8. A host device is receiving live streaming video. How does the device account for video data that is
lost during transmission?
a) The device will immediately request a retransmission of the missing data.
b) The device will use sequence numbers to pause the video stream until the correct data
arrives.
c) The device will delay the streaming video until the entire video stream is received.
d) The device will continue receiving the streaming video, but there may be a momentary
disruption.
9. A user accessed the game site www.nogamename.com last week. The night before the user
accesses the game site again, the site administrator changes the site IP address. What will be the
consequence of that action for the user?
a) The user will not be able to access the site.
b) The user will access the site without problems
c) The user will have to modify the DNS server address on the local PC in order to access the
site.
d) The user will have to issue a ping to this new IP address to be sure that the domain name
remained the same.
11. Host A is sending Host B a large file over a TCP connection. Assume Host B has no data to send
Host A. Host B will not send acknowledgments to Host A because Host B cannot Piggyback the
acknowledgments on data. Explain.
a) True
b) False
Piggyback is only for efficiency. If there's no data packet to be piggybacked to, then B will
just send the acknowledgement packet
12. A user requests a Web page that consists of some text and three images. For this page, the client
will send one request message and receive four response messages. Explain.
a) True
Form: 1 2
b) False
There are four connections since each connection transports exactly one request message and
one response message. So, each object will have its one request message instead of there being
only one request message.
13. Two distinct Web pages (for example, www.mit.edu/research .html and
www.mit.edu/students.html ) can be sent over the same persistent connection. Explain.
a) True
b) False
True. It is because both of these web pages are on the same physical server (www.mit.edu).
14. Suppose that the UDP receiver computes the Internet checksum for the received UDP segment and
finds that it matches the value carried in the checksum field. Can the receiver be absolutely certain
that no bit errors have occurred? Explain.
a) Yes
b) No
No, the receiver cannot be absolutely certain that no bit errors have occurred. This is because of
the manner in which the checksum for the packet is calculated. If the corresponding bits (that
would be added together) of two 16-bit words in the packet were 0 and 1 then even if these get
flipped to 1 and 0 respectively, the sum still remains the same. Hence, the 1s complement the
receiver calculates will also be the same. This means the checksum will verify even if there was
transmission error
15. Is it possible for an application to enjoy reliable data transfer even when the application runs over
UDP? If so, how?
a) Yes
b) No
Yes. The application developer can put reliable data transfer into the application layer protocol.
This would require a significant amount of work and debugging, however.
Form: 1 3