answer by true or false: For a specific Ethernet LAN switch, users connected with this switch can transmit at a fixed transmission rate. (  ) Two ISPs at the same level of the hierarchy often peer with each other. A lower layer ISP often connects with one or two higher layer ISPs. (  ) With persistent connections between browser and origin server, it is possible for a single TCP segment to carry two distinct HTTP request messages.

Computer Networking: A Top-Down Approach (7th Edition)
7th Edition
ISBN:9780133594140
Author:James Kurose, Keith Ross
Publisher:James Kurose, Keith Ross
Chapter1: Computer Networks And The Internet
Section: Chapter Questions
Problem R1RQ: What is the difference between a host and an end system? List several different types of end...
icon
Related questions
Question

answer by true or false:

  1. For a specific Ethernet LAN switch, users connected with this switch can transmit at a fixed transmission rate.

(  )

  1. Two ISPs at the same level of the hierarchy often peer with each other. A lower layer ISP often connects with one or two higher layer ISPs.

(  )

  1. With persistent connections between browser and origin server, it is possible for a single TCP segment to carry two distinct HTTP request messages.

(  )

  1. Suppose you wanted to do a transaction from a remote client to a server as reliable as possible, it would be better if you use TCP, because TCP provides reliable transport service.

(  )

  1. A local DNS server can be an Authoritative DNS server.                                                       

(  )

  1. Host A is sending Host B a large file over a TCP connection. Assume Host B has no data to send Host A. Host B will also send acknowledgments to Host A.

(  )

  1. It is impossible for a program to run client and server side code at the same time.

(  )

  1. Suppose Host A is sending Host B a large file over a TCP connection. The number of unacknowledged bytes that A sends can exceed the size of the receive buffer.

(  )

  1. In client-server architecture, there is an always-on host, called the server, which services requests from many other hosts, called clients.

(  )

  1. Network Address Translation is used because it expands the available device address space through use of port numbers.

(  )

  1. The voice and video traffic is often sent over TCP rather than UDP in today’s Internet,because most of these traffic is send over HTTP.

(  )

  1. If a router malfunctions, using Link-State protocols, node can advertise incorrect link cost.

(  )

  1. A protocol defines the format and the order of messages exchanged between two or more communicating entities, as well as the actions taken on the transmission and/or receipt of a message or other event.

(  )

  1. The checksum of an IP packet doesn’t need to be recomputed and stored again at each router, even as the TTL field, and possibly the options field as well, may change.

(  )

  1. Consider congestion control in TCP. When the timer expires at the sender, the value of ssthresh is set to one half of its previous value.

(  )

15 Round-trip time (RTT) is the time it takes for a small packet to travel from client to server.

(  )

16 Throughput is the amount of a product or service that a network can produce and deliver to a client within a specified period of time.                                         

(  )

17 DNS provides a few other important services in addition to translating hostnames to IP addresses: Host aliasing, Mail server aliasing, Load distribution.                       

(  )

18 At the sending host, an application-layer message is passed to the transport layer in the Operating System.

(  )

19 All DNS query and reply messages are sent within TCP datagrams to port 53.

(  )

20 DNS extensively exploits DNS caching in order to improve the delay performance.

(  )

21 A TCP/IP network, makes two distinct transport-layer protocols available to the application layer. One of these protocols is UDP and the second of these protocols is TCP.

(  )

22 Every router has a forwarding table. A router forwards a packet by examining the value of a field in the arriving packet’s header, and then using this header value (destination IP) to index into the router’s forwarding table.

(  )

23 FM radio is an example of frequency-division multiplexing (FDM)

(  )

24 Datagrams are rarely larger than 1,500 bytes. Because they must be encapsulated in linker layer frames and restrained by the length of the frame.

(  )

25 The link layer at a host is refer to network interface. With the help of hardware driver, this interface is bundled with operating system.

(  )

26 Subnet: 223.1.1.0/24, where the /24 notation, sometimes known as a subnet mask, indicates that the leftmost 24 bits of the 32-bit quantity define the subnet address. And the rightmost 8 bits define the host address.

(  )

27 Host addresses can only be configured using the Dynamic Host Configuration Protocol (DHCP).

(  )

28 Hosts belong to the same subnet must share the same subnet address and there is no intermediate router between them.

(  )

29 Gateway routers in an AS have two tasks—obtaining reachability information from neighboring ASs and propagating the reachability information to all routers internal to the AS

(  )

30 For the most part, the link layer is implemented in a network adapter, also sometimes known as a network interface card (NIC).

(  )

Expert Solution
trending now

Trending now

This is a popular solution!

steps

Step by step

Solved in 4 steps

Blurred answer
Knowledge Booster
OSI model devices
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-engineering and related others by exploring similar questions and additional content below.
Recommended textbooks for you
Computer Networking: A Top-Down Approach (7th Edi…
Computer Networking: A Top-Down Approach (7th Edi…
Computer Engineering
ISBN:
9780133594140
Author:
James Kurose, Keith Ross
Publisher:
PEARSON
Computer Organization and Design MIPS Edition, Fi…
Computer Organization and Design MIPS Edition, Fi…
Computer Engineering
ISBN:
9780124077263
Author:
David A. Patterson, John L. Hennessy
Publisher:
Elsevier Science
Network+ Guide to Networks (MindTap Course List)
Network+ Guide to Networks (MindTap Course List)
Computer Engineering
ISBN:
9781337569330
Author:
Jill West, Tamara Dean, Jean Andrews
Publisher:
Cengage Learning
Concepts of Database Management
Concepts of Database Management
Computer Engineering
ISBN:
9781337093422
Author:
Joy L. Starks, Philip J. Pratt, Mary Z. Last
Publisher:
Cengage Learning
Prelude to Programming
Prelude to Programming
Computer Engineering
ISBN:
9780133750423
Author:
VENIT, Stewart
Publisher:
Pearson Education
Sc Business Data Communications and Networking, T…
Sc Business Data Communications and Networking, T…
Computer Engineering
ISBN:
9781119368830
Author:
FITZGERALD
Publisher:
WILEY