Chapter 5 2 The three fundamental approaches to routing are

subject Type Homework Help
subject Pages 9
subject Words 2064
subject Authors Alan Dennis, Alexandra Durcikova, Jerry FitzGerald

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
21.
An application layer address using TCP/IPv4 looks like:
a. 128.192.78.5
b. www.cba.uga.edu
c. user@cba.uga.edu
d. 00-0F-00-81-14-00
e. Building 4, Room 2, User 3
22.
A client computer is assigned a data link layer address is by:
a. hardware manufacturers
b. software manufacturers
c. middleware manufacturers
d. network managers who configure a file in a computer’s network layer software
package
e. ISO
23.
ICANN:
a. developed the IPX/SPX network layer protocol
b. assigns data link layer addresses
c. approves which network layer addresses (usually, approved or assigned in groups or
classes) can be used by an organization for its computers that will connect to the
Internet
d. developed X.25 network layer protocol
e. refers to Interchange Computer Addressing Networks and Nodes
24.
IPv6 is based upon _________ -byte addresses.
a. 32
b. 24
c. 4
d. 16
e. 8
page-pf2
25.
IPv4 uses ________ bytes per Internet address.
a. 4
b. 32
c. 8
d. 24
e. 16
26.
A(n) ________ refers to a group of computers that are logically grouped together by IP
number.
a. IPv6 group
b. subnet
c. data link group
d. TCP group
e. application net
27.
A subnet mask of ___________ means that all computers with only the same first two bytes
in their IPv4 addresses are on the same subnet.
a. 11111111.0.0.0
b. 255.255.255.0
c. 255.0.0.0
d. 255.255.0.0
e. 255.255.255.255
28.
Dynamic addressing:
a. assigns a permanent network layer address to a client computer in a network
b. makes network management more complicated in dial-up networks
c. has only one standard, bootp
d. is always performed for servers only
e. can solve many updating headaches for network managers who have large, growing,
changing networks
page-pf3
29.
___________ is the translation of application layer addresses into IP addresses.
a. Network interface card reversal
b. IPv6
c. Server name resolution
d. Subnet masking
e. Name service coding
30.
Server name resolution is done using the:
a. Address Resolution Protocol
b. Border Gateway Protocol
c. Internet Control Message Protocol
d. Routing Information Protocol
e. Domain Name Service
31.
When TCP/IP translates an application layer address into an IP address, it sends a special
__________ to the nearest DNS server.
a. broadcast message
b. DNS request packet
c. SNA packet
d. IPX message
e. X.25 packet
L.O.: Be familiar with addressing
32.
When TCP/IP translates a network layer address into a data link layer address, it sends a
special ____________ to all computers in the subnet.
a. physical layer packet
b. multicast message
c. X.25 message
d. broadcast message
e. application layer packet
page-pf4
33.
_________ is a specially formatted request used to perform IP address to data link address
resolution.
a. Address Resolution Protocol
b. Domain Service Request
c. HTTP request
d. Link state request
e. Autonomous System Request
34.
___________ is the process of determining the path that a message will travel from sending
computer to receiving computer.
a. Routing
b. Addressing
c. Interfacing
d. Broadcasting
e. Packetizing
35.
The _____________ is used by a computer to determine how messages will travel through
the network.
a. routing table
b. configuration listing
c. linking loader
d. bus header assignment list
e. file allocation table
36.
In its simplest form, the __________ has two columns: the first column lists every computer
and device in the network, while the second column lists the computer or device to which
that computer should send messages, if they are destined for the computer in the first column.
a. linking loader
b. routing table
c. configuration listing
d. bus header assignment list
e. file allocation table
page-pf5
37.
The three fundamental approaches to routing are:
a. circuitous, flat, and direct routing
b. connectionless, static, and connection-oriented
c. subordinate, master, and insubordinate routing
d. host, client, and client-server routing
e. centralized, static routing, and dynamic routing
38.
An advantage of centralized routing is:
a. routing does reflect changing network conditions, such as computers that are
overloaded by many messages
b. if anything happens to the computer developing the routing table, the routing tables
cannot be changed until that computer is fixed, or until a new computer is selected to
perform the function
c. routing decisions are simple
d. the routing tables are stored at all computers in the network
e. it requires more processing by each computer or router in the network than dynamic
routing
39.
With ________ routing, computers or routers count the number of hops along a route and
periodically exchange information on the hop count with their neighbors.
a. circuitous
b. decentralized
c. distance vector
d. indirect
e. link state
40.
____________ refers to the type of routing in which the routing table is developed by the
network manager and modifications are made only when computers are added to or removed
from the network.
a. Adaptive routing
b. Dynamic routing
c. Static routing
d. Distance vector routing
e. Link state routing
page-pf6
41.
_______________ is a type of dynamic routing.
a. Static routing
b. Circuitous routing
c. Centralized routing
d. Link state
e. X.25 routing
42.
One drawback to dynamic routing is:
a. Routing usually does not reflect changing network conditions, such as computers
that are overloaded by many messages
b. It cannot be used with non-government networks
c. The transmission of status information “wastes” network capacity that could be used
to send user messages
d. It is the job of the network manager, not the computers or devices themselves, to
maintain the routing table.
e. It requires less processing by each computer than static routing.
43.
The ping command uses the most basic interior routing protocol on the Internet, which is the:
a. Border Gateway Protocol
b. Internet Control Message Protocol
c. Routing Information Protocol
d. Enhanced Interior Gateway Routing Protocol
e. Open Shortest Path First
44.
A type of message that is used when sending a message from one computer to another
computer is called a:
a. unicast message
b. multicast message
c. broadcast message
d. guided message
e. radiated message
page-pf7
45.
A special type of message that is used when sending the same message to a specific group of
computers is called a:
a. unicast message
b. multicast message
c. broadcast message
d. guided message
e. radiated message
46.
A special type of message that is used when sending the same message to all computers on a
specific LAN or subnet is called a:
a. unicast message
b. multicast message
c. broadcast message
d. guided message
e. radiated message
47.
IGMP refers to:
a. Internet Giga Memory Parameters
b. Interchange Group Management Parameters
c. Internet Guided Meta Protocol
d. Internet Group Management Protocol
e. Interchange Guided Meta Protocol
48.
Which of the following is not given to a client computer when it is first installed on a TCP/IP
network so that it has the appropriate routing/addressing information?
a. application layer address
b. subnet mask
c. its own IP address
d. IP address of its DNS server
e. IP address of a gateway, router, or a switch outside of its subnet
49. Which of the following is not a component of a router?
a. CPU
b. Interface
c. Memory
page-pf8
d. Keyboard
e. Port
50. A majority of routers use the following operating system:
a. Windows 95
b. Red Hat Linux
c. Windows Server 2008
d. Cisco Internetwork Operating System
e. Linksys OSI System
51. The ______ defines what type of packets should be routed and what types of packets
should be discarded.
a. ACL
b. AFL
c. TCP
d. IOS
e. OSI
52. _________created a service that allows organizations to transfer IPv4 addresses they
don’t need to another organization.
a. TCP/IP
b. ARPANET
c. ARIN
d. AIS
e. OSPF
53. IPv4 provides ___________ IP addresses.
a. a. 4.3 billion
b. b. 144 million
c. c. 64 billion
d. d. 3.14 billion
e. e. 1 million
page-pf9
54. The _____ address range is reserved for a computer to communicate with itself and is
called the loopback.
a. 121
b. 127
c. 239
d. 254
e. 111
55. IP addresses from 224 to 239 belong to Class D and are reserved for
a. the government
b. ISPs
c. multicasting
d. broadcasting
e. private networks
Short Answer and Essay Questions
1. What does the network layer do? Where does it sit in relationship to the other four
layers of our simplified network model?
2. What are the parts of TCP/IP and what do they do? Who is the primary user of
TCP/IP?
3. Compare and contrast the three types of addresses used in a network.
4. What are the different classes of Internet addresses and how are they different?
5. What is a subnet and why do networks need them? What is a subnet mask?
6. How does dynamic addressing work? What benefits and problems does dynamic
addressing provide?
7. What is address resolution? How does TCP/IP perform address resolution for
network layer addresses? How does TCP/IP perform address resolution for data
link layer addresses?
8. What is routing? How does decentralized routing differ from centralized routing?
How does static routing differ from dynamic routing? When would you use static
routing? When would you use dynamic routing? How does static routing differ
from dynamic routing? When would you use static routing? When would you use
dynamic routing?
9. What are the differences between connectionless and connection-oriented routing?
Discuss this in detail. When might UDP be used? TCP? What is a virtual
circuit? What is Quality of Service routing and why is it useful?
10. Compare and contrast unicast, broadcast, and multicast messages. Explain how
multicasting works.
11. Explain how the client computer in the LAN figure in the book (Figure 5.15)
would obtain the data link layer address of its subnet gateway.
12. Explain how TCP/IP works in a high level way, using a detailed diagram
including the different roles of TCP vs. IP, and the times at which each function is
utilized in the process.
13. List and describe five reasons why TCP/IP has become the predominant protocol
for Internet level transport applications. What do you think is the future market
share potential for proprietary standards? What are some limitations of TCP/IP in
terms of future Internet growth capabilities?
14. What is a routing table? What is the simplest form of a routing table?
15. What is a virtual circuit?
16. Suppose a client computer wants to access a web page on a web server. Assume
that it knows all of the IP addresses and data link layer addresses in the network,
except those for the web server itself. Describe how the client would obtain the IP
address for the web server.
17. What is ARP and how and why does it work? What is MAC address resolution
and how does it work?
18. Suppose a client computer wants to access a web page on a web server. Assume
that it knows all of the IP addresses and data link layer addresses in the network,
except those for the web server itself. If the web server was on the same subnet as
the client, how would the client obtain the data link layer address for the web
server?
19. Under what conditions does decentralized dynamic routing provide better
performance than decentralized static routing?
20. What is DHCP and why would network managers want to use it?
21. What four pieces of information does a computer using TCP/IP need in order to
send messages using TCP/IP. Explain why each of these is required.
22. Suppose your manager asks you to discuss how the company’s backbone network
functions in just about four paragraphs to take to senior management. How would
you answer the question? Discuss two or three major points. Your manager
doesn't understand technical terms so be sure to explain any jargon you use.
23. What is the difference between centralized routing and decentralized routing?
What is the difference between static routing and dynamic routing? What is a
distance vector algorithm and what is a link state algorithm? What is interior
routing and what is exterior routing? Define and describe RIP, OSPF, EIGRP,
BGP protocols using these terms.
24. Be able to convert back and forth between binary and decimal notation for IPv4
addresses.
25. Describe how Domain Name Server works and is hierarchically organized. What
happens if a URL is not in a local DNS server?
26. List and describe the three ways that a network manager can connect to a router
and configure and maintain it.

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.