Summary unavailable.

Questions

Question 1

Which of the following describes the function of a network adapter on the sending side?

View answer and explanation
Question 2

In a two-dimensional even parity scheme, how does a receiver identify and correct a single-bit error?

View answer and explanation
Question 3

What is the maximum efficiency of the slotted ALOHA protocol under the condition of a large number of active nodes?

View answer and explanation
Question 4

How does the CSMA/CD algorithm handle a situation where a node detects a collision while transmitting a frame?

View answer and explanation
Question 5

In a switched LAN environment, what is 'switch poisoning'?

View answer and explanation
Question 6

What is the length in bytes of a MAC address used in Ethernet and 802.11 wireless LANs?

View answer and explanation
Question 7

What is the hexadecimal MAC broadcast address used in LANs like Ethernet?

View answer and explanation
Question 8

According to the text, what is a typical expiration time for an entry in a host's ARP table?

View answer and explanation
Question 9

In an Ethernet frame, what is the total size of the preamble field, and what is its primary purpose?

View answer and explanation
Question 10

What is the primary difference between a network hub and a link-layer switch?

View answer and explanation
Question 11

How does a link-layer switch build its forwarding table?

View answer and explanation
Question 12

What is the function of the 'aging time' in a switch table?

View answer and explanation
Question 13

In a port-based VLAN, how is traffic between different VLANs isolated?

View answer and explanation
Question 14

What information is added to an Ethernet frame when it crosses a VLAN trunk, according to the 802.1Q standard?

View answer and explanation
Question 15

The 802.1Q VLAN tag contains a 12-bit VLAN identifier field. How many unique VLANs can this field theoretically represent?

View answer and explanation
Question 16

What is the primary role of Multiprotocol Label Switching (MPLS) in the context of the link layer?

View answer and explanation
Question 17

In a data center architecture, what is a Top of Rack (TOR) switch?

View answer and explanation
Question 18

What is the role of a load balancer in a data center network?

View answer and explanation
Question 19

What problem in hierarchical data center architectures is solved by increasing connectivity between tiers, such as connecting each TOR switch to multiple tier-2 switches?

View answer and explanation
Question 20

In the 'Day in the Life of a Web Page Request' scenario, what is the first network-related protocol a laptop runs after connecting to the Ethernet cable to get an IP address?

View answer and explanation
Question 21

When a laptop sends its initial DHCP request message, what values are used for the source IP address in the IP datagram and the destination MAC address in the Ethernet frame?

View answer and explanation
Question 22

Why does a checksumming method at the transport layer often differ from an error-detection method at the link layer, such as CRC?

View answer and explanation
Question 23

In the CRC error-detection scheme, if the d-bit data is D and the r+1 bit generator is G, how is the r-bit remainder R calculated by the sender?

View answer and explanation
Question 24

What is the primary drawback of channel partitioning protocols like TDM and FDM?

View answer and explanation
Question 25

What is a 'taking-turns' protocol, and what is one of its primary advantages over random access protocols?

View answer and explanation
Question 26

What is a significant drawback of the polling protocol for multiple access?

View answer and explanation
Question 27

In the DOCSIS standard for cable Internet access, how does a cable modem request upstream transmission slots from the CMTS?

View answer and explanation
Question 28

How does the Address Resolution Protocol (ARP) resolve an IP address for a host on the same subnet?

View answer and explanation
Question 29

When a host needs to send a datagram to a destination off its local subnet, what destination MAC address does it use in the Ethernet frame?

View answer and explanation
Question 30

What is the maximum transmission unit (MTU) of Ethernet, and what happens if an IP datagram exceeds this size?

View answer and explanation
Question 31

What is the purpose of the Type field in the Ethernet frame structure?

View answer and explanation
Question 32

In a modern switch-based Ethernet LAN with full-duplex links, is a MAC protocol like CSMA/CD still necessary?

View answer and explanation
Question 33

What is one key difference between a link-layer switch and a router?

View answer and explanation
Question 34

How many bits are in the CRC field of a standard Ethernet frame?

View answer and explanation
Question 35

According to the text, what is the 'hidden terminal problem' in wireless networks?

View answer and explanation
Question 36

What is the maximum data rate of the IEEE 802.11g standard?

View answer and explanation
Question 37

In the 802.11 architecture, what is a Basic Service Set (BSS)?

View answer and explanation
Question 38

Why does the 802.11 MAC protocol use collision avoidance (CSMA/CA) instead of collision detection (CSMA/CD)?

View answer and explanation
Question 39

What is the purpose of the RTS and CTS frames in the 802.11 MAC protocol?

View answer and explanation
Question 40

How many address fields are there in an IEEE 802.11 frame, and why are more than two needed for infrastructure networks?

View answer and explanation
Question 41

When a mobile host H1 moves from being associated with AP1 to AP2 within the same IP subnet, how can AP2 help update the forwarding table of the upstream switch?

View answer and explanation
Question 42

In a Bluetooth piconet, what is the role of the master node?

View answer and explanation
Question 43

How many active devices can a Bluetooth piconet support, and what is this type of network also known as?

View answer and explanation
Question 44

What does a mobile device in a 4G LTE network do to find and attach to a base station?

View answer and explanation
Question 45

In the 4G LTE architecture, which element is responsible for authenticating a device, setting up data path tunnels, and tracking the device's cell location?

View answer and explanation
Question 46

What is the primary difference between direct and indirect routing for a mobile device?

View answer and explanation
Question 47

What is the 'triangle routing problem' associated with indirect routing for mobile devices?

View answer and explanation
Question 48

During a handover in a 4G/5G network, what is the role of the target base station after it receives a Handover Request from the source base station?

View answer and explanation
Question 49

According to Table 7.3, what is the Mobile IP equivalent of the 4G/5G Home Subscriber Server (HSS)?

View answer and explanation
Question 50

Why can TCP's congestion-control response be problematic in a wireless setting?

View answer and explanation