Water Industry Process Automation & Control Monthly - April 2024
Chapter 5 - The Network Layer: Control Plane
1. Home Self-Assessment Multiple Choice Quiz Chapter 5
1
2
Self-Assessment Multiple Choice Quiz
Chapter 5: The Network Layer: Control Plane
The link-state algorithm in Section 4.5 has the following properties:
Suppose that c(E,F) = 6 instead of 2 in Figure 4.27. Then the link state algorithm nds
the shortest path to F in
In routing among ASs which of the following issues dominants:
Computer Networking: a Top-Down
Approach, 7th Edition
Kurose • Ross
COMPANION WEBSITE Help Sign out
it requires the source node to know the costs between every pair of adjacentit requires the source node to know the costs between every pair of adjacent
nodes in the graphnodes in the graph
after theafter the kkth iteration, the least-cost paths are known toth iteration, the least-cost paths are known to kk nodesnodes
it determines the shortest path from the source node to all other nodesit determines the shortest path from the source node to all other nodes
all of the aboveall of the above
step 6step 6
step 5step 5
step 3step 3
step 4step 4
2. 3
4
5
In routing among ASs, which of the following issues dominants:
The ICMP protocol
As part of hierarchical routing, hot-potato routing does the following:
number of ASs traversednumber of ASs traversed
geographical distance between ASsgeographical distance between ASs
current congestion levels in the ASscurrent congestion levels in the ASs
policypolicy
runs on top of UDPruns on top of UDP
runs on top of TCPruns on top of TCP
runs directly on top of IPruns directly on top of IP
none of the abovenone of the above
Provides information to a router about the existence of external networks.Provides information to a router about the existence of external networks.
Determines the number of ASes in the shortest AS path from router toDetermines the number of ASes in the shortest AS path from router to
destination.destination.
Chooses the gateway that has the smallest cost.Chooses the gateway that has the smallest cost.
Labels suspicious packets as “hot”.Labels suspicious packets as “hot”.
3. 6
7
8
Which of the following statements best describes the purpose of the SNMP protocol:
What is the purpose of the SNMP SetRequest message?
Suppose a network manager wanted to query the value of the number of TCP
segments received by a host running the Microsoft Windows 2000 operating system
in a US-based company. What would be the pre x (leading digits) of the MIB variable
that should be queried:
What is the maximum number of received UDP datagrams that can be counted
The SNMP protocol specifies the actions a network manager should take inThe SNMP protocol specifies the actions a network manager should take in
response to a specific set of network fault conditions.response to a specific set of network fault conditions.
The SNMP protocol is a tool for gathering data about network conditions andThe SNMP protocol is a tool for gathering data about network conditions and
executing remote actions at remote managed devicesexecuting remote actions at remote managed devices
The SNMP protocol is used by the network manager to provision resources,The SNMP protocol is used by the network manager to provision resources,
such as bandwidth, server capacity and other computational/communicationsuch as bandwidth, server capacity and other computational/communication
resources needed to meet the mission-specific needs of an enterpriseresources needed to meet the mission-specific needs of an enterprise
To allow a managing entity to query the value of a set of MIB object values in aTo allow a managing entity to query the value of a set of MIB object values in a
managed device.managed device.
To allow a managing entity to set the value of one or more MIB objects in aTo allow a managing entity to set the value of one or more MIB objects in a
managed device.managed device.
To allow a managed device to request and receive a set of initial values for MIBTo allow a managed device to request and receive a set of initial values for MIB
objects in the managed deviceobjects in the managed device
1.2.8401.2.840
1.3.6.1.2.1.11.3.6.1.2.1.1
1.2.840.113561.2.840.11356