JMU
Sample Questions for Exam 2


  1. Answer the questions from homeworks 4, 5, 6 and 7.
  2. Answer the questions from chapters 3-4 in the textbook.
  3. Choose the best answer to each of the following:
    (1) _____ A /27 CIDR network contains at most:
    1. 16 hosts
    2. 32 hosts
    3. 64 hosts
    4. 128 hosts
    5. None of the above
    (2) _____ The mask 11111111.11111111.11111000.00000000 corresponds to a:
    1. A /11 CIDR network
    2. A /21 CIDR network
    3. A /24 CIDR network
    4. All of the above
    5. None of the above
  4. Carefully define each of the following terms (as we have used them in this course):
    Persistence (in the sense of HTTP)


    Graph


  5. Explain the difference between connection-oriented and connectionless transport layer protocols. Is this the same as the differene between stream-oriented and message-oriented protocols?
  6. Compare and contrast UDP, TCP and SCTP.
  7. When we discussed TCP we used a state diagram. When we discussed UDP we didn't. Why?
  8. Explain why, in TCP, the client must acknowledge the SYNACK (also known as the ACKofSYN) sent by the server.
  9. The following sequence diagram illustrates a particular example of sliding window flow control. Suppose that sequence numbers are 3 bits and that the initial window size is 7. Show both the transmitter's and receiver's window at every important time.
    sliding-window.png
  10. In the following timing diagram, how long is the propagation delay and how long is the transmission delay for the first frame?
    stop-and-wait.png
  11. When is stop-and-wait flow control particularly inefficient? Why?
  12. Convert the IP address 198.58.104.19 to binary. How can you use the binary representation to determine that this is a class C address?
  13. Consider a device with an address of 212.43.43.33 and a mask of 255.255.255.224.
    1. What is the subnetwork for this device?
    2. What is the corresponding CIDR address?
  14. Explain why IP fragmentation tends to increase the overall amount of data that is transmitted.
  15. Given the following illustration of a directed graph (where the numbers next to an edge/link represent its "length"):
    network-with-tables.png

    calculate the "shortest" path from vertex/node 0 to vertex/node 8 using the Dijkstra's label setting algorithm (as discussed in lecture). Show your work in the tables next to each vertex/node (i.e., each time you change the label associated with a vertex/node you must add a row to the associated table that contains the new label and the new predecessor).

  16. Consider the following network in which all of the edges are bi-directional.

    network.png

    Show that the "shortest" path from vertex/node 1 to vertex/node 11 is 1-5-6-10-13-11 which has a "length" of 35. You must use Dijkstra's label setting algorithm (as discussed in lecture). Show all of your work in the table below (where iterations 0 and 1 have already been completed).

    shortest-path-table.png

  17. Imagine a system in which each message consists of two data bits and one parity bit. Suppose the probability that an individual bit is corrupted is given by \(p\), and that the probability that one bit is corrupted is independent of the probability that any other bit is corrupted.

    Now, suppose that a message of 00 is transmitted with a (correct) parity bit of 0. What is the probability that the message is corrupted and that the error is not detected? (Hint: Carefully list all of the outcomes/events and assign probabilities to them.)

Copyright 2013