Networks Exam 2 - Tao Shu

0.0(0)
Studied by 108 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/251

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 4:52 PM on 4/6/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

252 Terms

1
New cards

Ethernet (IEEE 802.3) uses CSMA/CD as its MAC protocol.

True

2
New cards

What does CSMA/CD stand for?

Carrier Sense Multiple Access with Collision Detection

3
New cards

What does CSMA/CA stand for?

Carrier Sense Multiple Access with Collision Avoidance

4
New cards

The IEEE standard number for Ethernet is 802.11.

False — Ethernet is IEEE 802.3; 802.11 is Wi-Fi (WLAN).

5
New cards

In Ethernet the minimum frame size (excluding the preamble) is 512 bits (64 bytes).

True

6
New cards

What is the purpose of the 64-bit preamble in an Ethernet frame?

It allows the receiver to synchronize with the incoming signal using a sequence of alternating 0s and 1s.

7
New cards

Each Ethernet address (MAC address) is 32 bits long.

False — Ethernet MAC addresses are 48 bits long.

8
New cards

An Ethernet address in which all 48 bits are set to 1 is a broadcast address.

True

9
New cards

An Ethernet address whose first bit is 1 (but is not all 1s) is a multicast address.

True

10
New cards

What is the maximum data payload size in a standard Ethernet frame?

1500 bytes

11
New cards

What is the minimum data payload size in a standard Ethernet frame and why?

46 bytes — the frame must be long enough (512 bits total minimum) for collision detection to work.

12
New cards

The maximum number of repeaters between any two hosts in classic Ethernet is 4 (giving 5 segments).

True

13
New cards

In classic Ethernet each segment can be at most 500 meters long so the maximum network span is 2500 meters.

True

14
New cards

The Ethernet CRC field is 16 bits long.

False — the Ethernet CRC (FCS) field is 32 bits long.

15
New cards

The Packet Type field in an Ethernet frame is 16 bits and serves as a demultiplexing key to identify the higher-level protocol.

True

16
New cards

The Ethernet frame format is implemented in software at the operating system level.

False — it is implemented in hardware on the network adaptor.

17
New cards

The minimum distance between Ethernet transceivers is 2.5 meters.

True

18
New cards

The maximum number of hosts supported per classic Ethernet segment is 1024.

True

19
New cards

In Ethernet every adaptor on the segment receives every transmitted frame regardless of the destination address.

True

20
New cards

An Ethernet adaptor accepts frames addressed to its own address and frames addressed to the broadcast address and frames addressed to an instructed multicast address.

True

21
New cards

Every Ethernet manufacturer is assigned a unique 24-bit prefix for MAC addresses to ensure global uniqueness.

True

22
New cards

Ethernet was originally based on a bus topology and later evolved to hub-based and then switch-based topologies.

True

23
New cards

A hub-based Ethernet creates separate collision domains for each connected device.

False — a hub-based Ethernet keeps all connected devices in the same collision domain; switches create separate collision domains.

24
New cards

A switch-based Ethernet uses a tree topology and connections between devices are dynamically configured.

True

25
New cards

In nonpersistent CSMA a station that finds the medium busy will continuously listen until the medium becomes idle then transmit immediately.

False — in nonpersistent CSMA the station backs off for a random time and then re-senses. Continuous listening and immediate transmission describes 1-persistent CSMA.

26
New cards

Which CSMA variant transmits immediately with probability 1 as soon as the medium becomes idle? (A) Nonpersistent CSMA (B) 1-Persistent CSMA (C) p-Persistent CSMA (D) CSMA/CA

(B) 1-Persistent CSMA

27
New cards

In 1-persistent CSMA if two or more stations become ready while the medium is busy a collision is guaranteed when the medium becomes idle.

True

28
New cards

In p-persistent CSMA time is divided into slots where each slot duration typically equals the maximum propagation delay.

True

29
New cards

In p-persistent CSMA a station that finds the medium idle transmits with probability p or defers one slot with probability (1 − p).

True

30
New cards

Nonpersistent CSMA stations are considered selfish because they immediately transmit when the medium becomes idle.

False — nonpersistent stations are considered deferential; 1-persistent stations are selfish.

31
New cards

Which CSMA variant wastes bandwidth because its random backoff may keep the channel idle even when stations have frames to send? (A) 1-persistent (B) p-persistent (C) Nonpersistent (D) All of the above

(C) Nonpersistent CSMA

32
New cards

p-persistent CSMA combines the advantages of both nonpersistent (reducing collisions) and 1-persistent (reducing idle time).

True

33
New cards

What happens when a collision is detected in Ethernet (CSMA/CD)?

The adapter stops transmitting immediately and uses an exponential backoff algorithm — it picks a random delay and retries.

34
New cards

In Ethernet exponential backoff for the nth retry the adapter selects a random k between 0 and 2^n − 1 and waits k × 51.2 μs.

True

35
New cards

On the 1st retry attempt in Ethernet exponential backoff the station randomly chooses either 0 or 1 slots.

True

36
New cards

On the 2nd retry attempt in Ethernet exponential backoff the station randomly chooses from 0 to 3 slots.

True

37
New cards

On the 3rd retry attempt in Ethernet exponential backoff the station randomly selects from 0 to 7 slots.

True

38
New cards

What is the worst-case time for a node to detect a collision in Ethernet?

2 × t_prop (twice the maximum one-way propagation delay between the two farthest stations).

39
New cards

The vulnerable time for collision detection in Ethernet equals the one-way maximum propagation delay.

False — it equals twice the maximum propagation delay (2 × t_prop).

40
New cards

In a 10 Mbps Ethernet the slot time is 51.2 μs which corresponds to 512 bits.

True

41
New cards

The minimum frame size of 512 bits exists to ensure that a transmitting station can always detect a collision before it finishes sending the frame.

True

42
New cards

In the worst-case collision scenario station A begins transmitting and A's frame arrives at distant station B at time t_prop. Station B begins transmitting just before receiving A's frame and B's collision signal arrives back at A at time 2 × t_prop.

True

43
New cards

Why is the maximum Ethernet segment length limited to 2500 meters?

Because the farther apart two nodes are the longer the propagation delay and the network is vulnerable to undetected collisions. The 512-bit minimum frame at 10 Mbps requires the round-trip time not to exceed 51.2 μs.

44
New cards

Collision detection is performed only while the node is actively transmitting.

True

45
New cards

What is the IEEE standard number for wireless LAN (Wi-Fi)?

IEEE 802.11

46
New cards

IEEE 802.11 networks operate over licensed spectrum bands.

False — 802.11 operates over unlicensed ISM (Industrial Scientific and Medical) spectrum bands.

47
New cards

Which two frequency bands are most commonly used by 802.11 Wi-Fi? (A) 900 MHz and 1.8 GHz (B) 2.4 GHz and 5 GHz (C) 700 MHz and 3.5 GHz (D) 5 GHz and 28 GHz

(B) 2.4 GHz and 5 GHz

48
New cards

What are the two modes of operation for IEEE 802.11 networks?

Infrastructure mode (using an Access Point within a BSS) and Ad Hoc mode (IBSS — Independent Basic Service Set with no AP).

49
New cards

What does BSS stand for in 802.11?

Basic Service Set

50
New cards

What does IBSS stand for?

Independent Basic Service Set — the technical name for an 802.11 ad hoc network.

51
New cards

In infrastructure mode the Access Point broadcasts beacons containing its SSID.

True

52
New cards

The Point Coordination Function (PCF) in 802.11 can be used in both ad hoc and infrastructure modes.

False — PCF can only be used in infrastructure mode. DCF can be used in both modes.

53
New cards

Which 802.11 MAC function is contention-free and uses polling by the access point? (A) DCF (B) PCF (C) CSMA/CA (D) RTS/CTS

(B) PCF — Point Coordination Function

54
New cards

PCF is intended for time-sensitive traffic such as voice and video.

True

55
New cards

The Distributed Coordination Function (DCF) is a contention-based protocol based on CSMA/CA.

True

56
New cards

DCF is appropriate for delay-tolerant applications such as file transfer and web browsing.

True

57
New cards

In 802.11 CSMA/CA a node detects collisions by monitoring its own transmission on the medium just like Ethernet CD.

False — in wireless CSMA/CA collision detection during transmission is infeasible due to high signal attenuation; 802.11 relies on ACKs to determine if a collision occurred.

58
New cards

Why is collision detection (CD) infeasible in wireless networks?

The high attenuation of the colliding signal relative to the node's own strong transmission renders the collision undetectable at the transmitting node.

59
New cards

In 802.11 CSMA/CA a node's backoff timer is decremented while the channel is idle and frozen while the channel is busy.

True

60
New cards

In 802.11 CSMA/CA after a successful transmission the contention window is doubled.

False — after a successful transmission the contention window is reset to CW_min. It is doubled only after a failed transmission.

61
New cards

After a collision in 802.11 CSMA/CA the contention window is doubled up to CW_max.

True

62
New cards

A node in CSMA/CA must wait for a DIFS period after the channel becomes idle before starting its backoff countdown.

True

63
New cards

What does DIFS stand for in 802.11?

DCF Inter-Frame Space — the mandatory waiting period after the channel becomes idle before a station begins its backoff countdown.

64
New cards

What does SIFS stand for in 802.11?

Short Inter-Frame Space — a shorter interval used between control/response frames like RTS→CTS and DATA→ACK.

65
New cards

SIFS is longer than DIFS in 802.11.

False — SIFS is shorter than DIFS which gives higher priority to response frames (CTS ACK) over new data transmissions.

66
New cards

The correct frame exchange ordering in 802.11 with virtual carrier sensing is: RTS → SIFS → CTS → SIFS → DATA → SIFS → ACK.

True

67
New cards

What is the hidden terminal problem?

A node X cannot hear another transmitting node A because they are out of range but both reach a common receiver B. X senses the medium as free and transmits causing a collision at B.

68
New cards

What is the exposed terminal problem?

A node X hears a nearby transmitter A and defers its own transmission even though X's intended receiver Y is out of range of A and the transmission would not cause interference.

69
New cards

In the hidden terminal problem no carrier sensed means it is safe to transmit.

False — the hidden terminal problem exists precisely because no carrier does NOT mean it is safe to transmit.

70
New cards

In the exposed terminal problem the presence of carrier always means transmission should be deferred.

False — in the exposed terminal problem presence of carrier does NOT necessarily mean transmission should be held off.

71
New cards

What does RTS stand for in 802.11?

Request to Send

72
New cards

What does CTS stand for in 802.11?

Clear to Send

73
New cards

What does NAV stand for in 802.11?

Network Allocation Vector — a duration value embedded in RTS and CTS frames telling other nodes how long to defer.

74
New cards

The RTS/CTS mechanism in 802.11 is mandatory for all transmissions.

False — RTS/CTS virtual carrier sensing is optional and used only for unicast transmissions.

75
New cards

How does RTS/CTS help with the hidden terminal problem?

The receiver's CTS is heard by hidden nodes near the receiver causing them to defer for the NAV duration preventing collisions at the receiver.

76
New cards

RTS/CTS completely eliminates the hidden terminal problem.

False — hidden terminals can persist if a node does not successfully receive the CTS (e.g. it is out of range of the receiver).

77
New cards

Any node that hears an RTS defers medium access.

True

78
New cards

Any node that hears a CTS defers medium access.

True

79
New cards

In 802.11 the RTS/CTS exchange helps address the exposed terminal problem because a node that hears an RTS but not the corresponding CTS knows it is safe to transmit.

True

80
New cards

What was the Busy-Tone solution proposed by Kleinrock (1975)?

The receiver transmits a busy tone on a separate channel while receiving. All nodes hearing the busy tone remain silent. It fixes both hidden and exposed terminal problems but requires a separate out-of-band channel.

81
New cards

What is ZigZag decoding?

A technique to recover packets from repeated collisions between two hidden terminals by exploiting different random timing offsets in 802.11 retransmissions to iteratively decode interference-free bits.

82
New cards

ZigZag exploits the fact that Δ1 ≠ Δ2 (timing offsets differ between collisions) so each collision begins with some interference-free bits.

True

83
New cards

The 802.11b standard operates at 2.4 GHz with a maximum data rate of 11 Mbps using DSSS modulation.

True

84
New cards

The 802.11a standard operates at 2.4 GHz.

False — 802.11a operates at 5 GHz using OFDM modulation.

85
New cards

802.11g operates at 2.4 GHz with a maximum data rate of 54 Mbps.

True

86
New cards

Which 802.11 standard introduced operation at both 2.4 GHz and 5 GHz with speeds up to 540 Mbps? (A) 802.11a (B) 802.11g (C) 802.11n (D) 802.11b

(C) 802.11n

87
New cards

Wireless networks are standardized by the IEEE 802 LAN and MAN standards committee.

True

88
New cards

The 802.11 MAC and PHY correspond to the Data Link and Physical layers of the OSI model.

True

89
New cards

The 802.11 DCF uses CSMA/CA with optional extensions for RTS/CTS.

True

90
New cards

In 802.11 after the channel becomes idle a station waits DIFS then counts down its random backoff. If the channel becomes busy the station freezes its counter and resumes after another DIFS idle.

True

91
New cards

Ethernet uses acknowledgments (ACKs) to confirm successful frame delivery.

False — standard Ethernet does not use ACKs at the MAC layer. 802.11 Wi-Fi uses ACKs.

92
New cards

What is the key difference between datagram (connectionless) switching and virtual circuit (connection-oriented) switching?

In datagram switching each packet carries the full destination address and is independently routed. In VC switching a connection is established first and data packets follow the path using short VCI labels.

93
New cards

In datagram switching all packets of the same flow are guaranteed to follow the same path.

False — packets may follow independent paths and can arrive out of order.

94
New cards

Datagram switching is more resilient to switch failures than VC switching because alternative paths can be used without re-establishing a connection.

True

95
New cards

In virtual circuit switching the VCI has global scope and is the same on every link along the path.

False — the VCI has link-local scope and typically changes at each switch.

96
New cards

What are the four fields in a virtual circuit (VC) table entry?

Incoming Interface — Incoming VCI — Outgoing Interface — Outgoing VCI.

97
New cards

What is a Permanent Virtual Circuit (PVC)?

A virtual circuit set up manually by an administrator with a permanent VC table configuration.

98
New cards

What is a Switched Virtual Circuit (SVC)?

A virtual circuit established dynamically through signaling and torn down after data transmission completes.

99
New cards

In SVC setup the initial setup message contains the full destination address but subsequent data packets need only the short VCI number.

True

100
New cards

During SVC setup the outgoing VCI values at each switch are filled in during the ACK phase (reverse direction) not during the forward setup phase.

True