The amount of time the network is working properly.
The rate at which packets accepted by the network are delivered
to their destinations.
Love is the beast, eating your heart. Love is the vampire,
drunk on your blood.
(Yes/No) Is Ethernet a half-duplex link?
When is selective repeat particularly better than alternating
bit and go back N?
With small packet sizes and low latencies and high error
rates.
With small packet sizes and high latencies and high error
rates.
With large packet sizes and low latencies and low error rates.
With large packet sizes and high latencies and low error
rates.
Suppose I send a box holding 100 data tapes at 2 gigaBYTES
each. How many DAYS would a T1 line (1.54 megaBITS/second) to transmit
the same data. Show work for partial credit. _____________________________________________________________________________
Which is a good use of datagrams?
Continus streaming very high data rate video transmissions.
Bank transactions such as check clearing or ATM machines.
Industrial control applications such as atomic power plant
monitoring.
Got a bottle of Tequila, who needs friends. I know
a hundred games of solitaire.
Which OSI network layer describes how long a voltage must
be placed upon an ethernet wire to represent a single bit?
Physical
Data Link
Network
Application
They could talk talk talk forever ... they probably will.
Which OSI network layer manipulates the most bytes?
Physical
Data Link
Network
Application
Which OSI network layer describes how long an unacknowledged
Ethernet packet can go before a retransmission is sent?
Physical
Data Link
Network
Application
Consider the function call gethotsbyname(). Which system
does gethostbyname() access.
NFS (Network file system).
ARP (Address resolution protocol).
DNS (Domain name system).
None or all of the above.
How many possible internet addresses are there? Ignore
the multicast addresses, just use the normal single-host addresses.
Show work of partial credit. Hint: It's not 2^32 nor 2^31.
___________________________________________________________________________
___________________________________________________________________________
(Y/N) The telnet port is port 23. Does this mean that
the data representing my keystrokes are sent over port 23. Assume
I'm actually using telnet as intended.
Which are advantages of Ethernet like protocols (put an E)
and which are advantages of Token Ring like protocols (put a T) or equal
(put an EQ)?
Known delays
Small latencies for lightly loaded network
High efficiency for heavily loaded network
Easier and simpler to implement
Can be used by TCP/IP
Can be used to transmit http data
(Y/N) Consider virtual circuits and virtual circuit type
routing. Can packets arrive in a different order than they are sent?
List two factors that should be used as a weighting or cost
function for Dijkstra spanning tree algorithm when used for routing decisions.
___________________________________________________________________
_______ Using HTTP/0.9 (the old one), how many data items
can be requested over a single connection?
_______ Consider Netscape (a web client) and Apache (a web
server). Both are written in C for UNIX. Which of them MUST have
a listen() system call?
Please name one file system operation besides delete that
cannot be made idempotent
________________________________________________________________________
Which type of attack on a crypt system is the strongest (provides
the most data to the decryption effort).
Cyphertext only attack
Chosen plaintext attack
Known plaintext attack
He was the ghost of a Texas Lady's Man.
(2 pts) Which operations should I do to send secret
data to Jeff using public key crypt, and what does he do to read it.
You may assume that we both know everybody's public key, and that we each
know our own private key.
Me:_____________________________ Jeff:_______________________________________
________________________________
_______________________________________
________________________________
_______________________________________
________________________________
_______________________________________
Suppose I want to sign something electronically, and give
to Jeff. Which key should I use?
My private key
My public key
Jeff's private key
Jeff's public key.
What is the best route and cost from A to I? _______________________________________
What is the best route and cost from O to B?________________________________________
(Talker question) Why does ethernet use an adaptive random
delay for retransmissions? Why not just use a random delay with a
fixed distribution, for instance a linear distribution between 10 and 100
ms.
(Talker Question) Consider an enviornment that has very high
latency and high bandwidth. Which would transmit data faster, a series
of http requests in parallel or a series of http requests one after the
other? Why?