Book Appointment Now

Peer-to-Peer Protocols and Local Area Networks Coursera Quiz Answers

All Weeks Peer-to-Peer Protocols and Local Area Networks Coursera Quiz Answers

Peer-to-Peer Protocols and Local Area Networks Week 01 Quiz Answers

Practice Assessment – Peer-to-Peer Protocols

Q1. In networks where errors are infrequent, which approach is favored for efficiency?

  • Hop-by-hop approach
  • End-to-end approach
  • Either one of the above
  • Neither one of the above

Q2. Which of the following statements is true about the stop-and-wait ARQ protocol?

  • Stop-and-wait is only efficient if the link delay-bandwidth product is large
  • Stop-and-wait is only efficient if the link bandwidth is high
  • Stop-and-wait is only efficient if the link bandwidth is low
  • Stop-and-wait is only efficient if the link delay-bandwidth product is small

Q3. Consider a situation where an interactive application produces a packet to send each keystroke from the client and the server echoes each keystroke that it receives from the client. Which of following strategies for sending ACK frames in a Go-Back-N is appropriate for the situation?

  • send an ACK frame immediately after each frame is received
  • send an ACK frame after every other frame is received
  • send an ACK frame when the next piggyback opportunity arises
  • Any one of the above

Q4. Consider a bulk data transfer application where a server sends a large file that is segmented in a number of full-size packets that are to be transferred to the client. Assume the channel has a low probability of error. Which of following strategies for sending ACK frames in a Go-Back-N is appropriate for the situation?

  • send an ACK frame when the next piggyback opportunity arises
  • Any one of the above
  • send an ACK frame after every other frame is received
  • send an ACK frame immediately after each frame is received

Q5. Consider Selective Repeat ARQ flow control protocol. In the following scenario, what should be the value of frame number x at receiver B?Peer-to-Peer Protocols and Local Area Networks Coursera Quiz Answers

  • 3
  • 2
  • 4
  • None of the above

Q6. ARQ protocols combine error detection, retransmission and sequence numbering to provide reliability

  • True
  • False

Q7. A service model specifies a level of performance that can be expected in the transfer of information.

  • True
  • False

Q8. A service offered at a given layer can include which of the following feature(s)

  • Sequencing
  • Reliability
  • Timing
  • All of the above

Q9. Digital communication technologies may introduce errors in communication, which of the following can be used to provide reliable communication

  • UDP
  • TCP
  • DNS
  • HDLC

Q10. Ensuring that information is not altered during transfer is associated with

  • Confidentiality
  • Availability
  • Integrity
  • Authentication

Graded Assessment – Peer-to-Peer Protocols

Q1. Given 3 bits for sequence numbers, what is the maximum sliding window size at the receiver in Go Back 3 ARQ?

  • 3
  • 7
  • 8
  • None of the above

Q2. Given 3 bits for sequence numbers in Selective Repeat ARQ. If the sender already set the sliding window size to be 4, what is the maximum sliding window size at the receiver?

  • 3
  • 8
  • 7
  • None of the above

Q3. Consider Selective Repeat ARQ flow control protocol. In the following scenario, what should be the value of frame number x at receiver B?Peer-to-Peer Protocols and Local Area Networks Coursera Quiz Answers

  • 3
  • 2
  • 4
  • None of the above

Q4. In the scenario above, what should be the value of frame number y at receiver B?

  • 3
  • 8
  • 7
  • None of the above

Q5. If the probability of error is very low in a communication link, which of the following statements is true about performance of ARQ protocol?

  • Stop-and-wait and Go-back-N ARQ protocols have similar performance
  • Stop-and-wait and Selective Repeat ARQ protocols have similar performance
  • Go-back-N ARQ and Selective Repeat ARQ protocols have similar performance
  • None of the above

Q6. In peer-to-peer protocol, the purpose of Automatic Repeat Request is

  • to ensure a sequence of information packet is delivered with an ACK request
  • to ensure a sequence of information packet is delivered without errors or duplication despite transmission errors and losses
  • to ensure a sequence of information packet is delivered in order
  • to ensure a sequence of information packet is delivered out-of-order

Q7. Which of the basic elements of ARQ is associated with negative acknowledgement

  • Timeout mechanism
  • NAKs
  • ACKs
  • Error detecting code

Q8. In Go-Back-N ARQ, a procedure where transmission of a new frame is begun before the completion of time of the previous frame transmission is called

  • Transitioning
  • Pipelining
  • Channeling
  • None of the above

Q9. In Stop-and-Wait protocol, sequence number are not required

  • True
  • False

Q10. The disadvantage of Stop-and-Wait protocol

  • Error free communication channel does not exist
  • Acknowledgement may get lost
  • Deadlock situation may occur
  • All of the above

Peer-to-Peer Protocols and Local Area Networks Week 02 Quiz Answers

Q1. Which of the following statements are true for the best-effort service of IP?

  • Packets can arrive with errors or be lost
  • Packets can arrive out-of-order
  • Packets can arrive after very long delays
  • All of the above

Q2. Which of following services belong to the data link layer?

  • Insert framing information into the transmitted stream to indicate the boundaries that define frames
  • Provide error control to ensure reliable transmission
  • Provide flow control to prevent the transmitter from overrunning the receiver buffer
  • All of the above

Q3. Which ARQ flow control protocol is used by TCP?

  • Stop-and-Wait
  • Selective Repeat
  • Go-back-N
  • None of the above

Q4. By framing, frame boundaries can be determined using

  • Character Counts
  • Control Characters
  • Flags
  • All of the above

Q5. Which of following statements are true about framing protocols?

  • PPP uses character-based framing which requires byte stuffing
  • HDLC uses Flag-based framing which required bit stuffing
  • All of the above
  • None of the above

Q6. In IP network, which of the following statement is incorrect

  • Packets can arrive out-of-order
  • Packets can arrive with errors or be lost
  • Packets can arrive after long delays
  • Packets always arrive on time

Q7. Framing involves identifying the beginning and end of a block of information within a digital stream

  • True
  • False

Q8. Which of the following statements are true for PPP byte stuffing

  • Malicious users may inflate bandwidth
  • Size of frame varies unpredictably due to byte insertion
  • All of the above
  • None of the above

Q9. In PPP authentication, which of the following is true for Password Authentication Protocol

  • After several attempts, LCP closes link
  • Transmitted unencrypted, susceptible to eavesdropping
  • Initiator must send ID and password
  • Initiator and authenticator share a secret key

Q10. In HDLC frame format, flag is used to identify secondary station (1 or more octets)

  • True
  • False

Q1. Perform the bit stuffing procedure for the following binary sequence: 1101111111011111110101. What is the outcome?

  • 110111110110111110110101
  • 110111111101111111010100
  • 0010000000100000001010
  • None of the above

Q2. Perform bit de-stuffing for the following sequence: 11101111101111100111110.

  • 11101111111111011111
  • 00010000010000011000001
  • 11100111111110011111
  • None of the above

Q3. PPP is a data link protocol for point-to-point lines in Internet. Its framing is based on which of the following?

  • Byte stuffing
  • Bit stuffing
  • Word stuffing
  • None of the above

Q4. HDLC is another data link control protocol widely in use. Its framing is based on which of the following?

  • Byte stuffing
  • Bit stuffing
  • Word stuffing
  • None of the above

Q5. Which of following statements are true for HDLC?

  • supports various data transfer modes
  • supports multi-point links and point to point links
  • implements error control and flow control mechanisms
  • All of the above

Q6. In PPP authentication, which of the following is true for Challenge-Handshake Authentication Protocol (CHAP)

  • After several attempts, LCP closes link
  • Authenticator can reissue challenge during session
  • Initiator and authenticator share a secret key
  • Initiator must send ID and password

Q7. In error detection and loss recovery, which of the following statement is correct

  • Frames may undergo errors in transmission
  • CRCs detect errors and such frames treated as lost
  • Frames lost due to loss-of-synchronization or receiver buffer overflow
  • All of the above

Q8. In multiplexing, Last IN First Out (LIFO) is used to determine the order of packet transmission

  • True
  • False

Q9. Generic Framing Procedure (GFP) allows the implementation of multiple transport modes that may coexist within the same transport channel

  • True
  • False

Q10. In Generic Framing Procedure (GFP), which of the following sentences are correct

  • GFP uses a variation of HEC-based self delineation technique
  • GFP uses an explicit payload length indicator provided in its frame header to accommodate variable length PDUs
  • GFP provides flexible encapsulation framework that supports either a fixed or variable length frame structure
  • GFP rely on byte-stuffing mechanism to delineate protocol data units (PDUs)

Peer-to-Peer Protocols and Local Area Networks Week 03 Quiz Answers

Practice Assessment – Medium Access Controls

Q1. What is the primary function of medium access control?

  • It is to deal with the flow control of a shared communication link.
  • It is to minimize or eliminate the incidence of collisions of a shared communication link.
  • It is to deal with the congestion control of a shared communication link.
  • None of the above

Q2. What is the primary benefit provided by the Slotted ALOHA compared to ALOHA?

  • Higher maximum throughput
  • Lower access delay
  • Both of the above
  • None of the above

Q3. What is the vulnerable period of collisions in ALOHA?

  • Round-trip propagation delay
  • One frame transmission time
  • Two frame transmission time
  • None of the above

Q4. What is the vulnerable period of collisions in Slotted ALOHA?

  • Round-trip propagation delay
  • One frame transmission time
  • Two frame transmission time
  • None of the above

Q5. What is the vulnerable period of collisions in Carrier Sense Multiple Access (CSMA)?

  • Round-trip propagation delay
  • None of the above
  • One frame transmission time
  • One propagation delay

Q6. The primary function of Media Access Control is to minimize or eliminate the instance of the collisions to achieve a reasonable utilization of the medium

  • True
  • False

Q7. In media sharing techniques, which of the following are channelization approaches

  • Code Division Multiple Access
  • Data Division Multiple Access
  • Frequency Division Multiple Access
  • Time Division Multiple Access

Q8. Corresponding box of Carrier Sense Multiple Access/Collision Detection can be replaced by one of the

  • P-persistent process
  • I-persistent process
  • Persistent process
  • Non-persistent process

Q9. Random access is also called the

  • Controlled access
  • Channelization
  • Authentication
  • Contention methods

Q10. In Carrier Sense Multiple Access (CSMA), possibility of collision still exist because of

  • Propagation delay
  • Collision delay
  • Transmit delay
  • None of the above

Graded Assessment – Medium Access Controls

Q1. Polling is a scheduling approach for dynamic medium access control. Which of following statements are correct?

  • Polling can provide bounds on access delay to the shared medium
  • Polling performance can deteriorate with large delay-bandwidth product
  • Polling can provide fairness through regulated access opportunities
  • All of the above

Q2. In a collision-free reservation system that has a large number of light-traffic stations, and the delay-bandwidth product is larger than 1. Which of following MAC protocol is a good fit for stations to reserve mini-slots?

  • 1-persistent CSMA
  • Slotted ALOHA
  • CSMA/CD
  • None of the above

Q3. In Carrier Sense Multiple Access with collision detection (CSMA-CD), how long will it take a collision to be detected and resolved?

  • Round-trip propagation delay
  • One propagation delay
  • One frame transmission time
  • None of the above

Q4. Suppose that the ALOHA protocol is used to share a 56 kbps satellite channel. Suppose that frames are 1000 bits long. What is the maximum throughput of the system in number of frames per second.

  • 1 frame per second
  • 10 frames per second
  • 100 frames per second
  • None of the above

Q5. Consider building a CSMA/CD network running at 1Gbps over a 1-km cable. The signal speed in the cable is 200,000 km/sec. What is the minimum frame size?

  • 64 Bytes
  • 640 Bytes
  • 1250 Bytes
  • None of the above

Q6. In media access control, which of the following statements are true for Channelization

  • Widely used in internet traffic
  • Inflexible in allocating bandwidth to users with different requirements
  • Inefficient for bursty traffic
  • Does not scale well to large numbers of users

Q7. Time-out period is equal to maximum possible propagation delay of

  • Round-trip
  • Triangle-trip
  • Square-trip
  • Rectangle-trip

Q8. In Carrier Sense Multiple Access (CSMA), if station senses medium before trying to use it then chance of collision can be

  • Increased
  • Reduced
  • Doubled
  • Highlighted

Q9. Carrier Sense Multiple Access (CSMA) is based on medium called

  • Listen before sending
  • Sense before Collision
  • Listen before talk
  • Sense before transmit

Q10. Which of the following is not true for MAC scheduling

  • Can provide fairness to stations
  • More efficient channel utilization
  • Reduced computational or procedural complexity
  • Less variability in delays

Peer-to-Peer Protocols and Local Area Networks Week 04 Quiz Answers

Practice Assessment – Local Area Networks

Q1. Which of following features are typically true for local area networks?2

  • All of the above
  • Low error rate
  • Low round-trip delay
  • High speed

Q2. Use HDLC and Ethernet to identify similarities between medium access control and data link control protocols. Which of following statements are true?

  • Both contains framing information that delineates the beginning and end of each frame.
  • Both check the CRC in the received frames for errors
  • Both implement error control and flow control for reliable transmission.
  • None of the above

Q3. Use IEEE 802.3 and IEEE 802.11 to discuss differences between wired and wireless LANs. Which of following statements are true about the differences?

  • Error rate
  • All of the above
  • Station mobility
  • Collision detection

Q4. Which of following is not a primary responsibility of the MAC sublayer in LANs?

  • Protocol data unit addressing
  • Reliable connection-oriented service
  • Fragmentation and reassembly of MAC service data unit
  • Channel access

Q5. In Ethernet, slot time that is at least the round-trip propagation delay, is the critical system parameter for

  • All of the above
  • upper bound on time to detect collision
  • upper bound on time to acquire channel
  • quantum for re-transmission scheduling

Q6. Which one of the following event is not possible in wireless LAN.

  • Acknowledgement of data frames
  • Collision avoidance
  • Multi-mode data transfer
  • Collision detection

Q7. In 802.11 protocol, MAC can alternate between Contention Periods (CPs) and Contention-Free Periods (CFPs)

  • True
  • False

Q8. CSMA/CD is not used in DCF because

  • a station is unable to listen to the channel for collisions while transmitting
  • physical carrier sense detects the presence of other WLAN users
  • in idle state, a station is unable to listen to the channel for collisions
  • None of the above

Q9. In infrastructure network supporting voice and data traffic, data traffic is transported through the CP and voice traffic through the CFP

  • True
  • False

Q10. In 802.11 protocol, which of the following statements are true for Basic Service Set (BSS)

  • Location in a Basic Service Area (BSA)
  • Stations in BSS can communicate with each other
  • Distinct collocated BSS’s cannot coexist
  • Multiple BSSs interconnected by Central System (CS)

Graded Assessment – Local Area Networks

Q1. Consider a Gigabit Ethernet hub with stations at a 100-meter distance and average frame size of 512 bytes. Assume the propagation speed is at 2/3 of light speed. What is the value of normalized delay-bandwidth product?

  • 0.0122
  • 0.122
  • 1.22
  • None of the above

Q2. Wireless data communication is compelling, because of

  • Its easy and low-cost deployment
  • Its support to personal and mobile devices
  • Its high reliability to noise and interference
  • All of the above

Q3. Why not use CSMA/CD in a wireless LAN? The primary reason is

  • The round-trip delay in a wireless LAN is too large
  • The frame is usually very small in a wireless LAN
  • The hidden station problem
  • All of the above

Q4. In IEEE 802.11 MAC for wireless LANs, which of following inter-frame space (IFS) is used to transmit high-priority frames such as ACKs?

  • PIFS
  • None of the above
  • SIFS
  • DIFS

Q5. Which of following statements identifies the similarity between HDLC (data link control) and Ethernet (medium access control)

  • Both implement error control and flow control functions to provide reliable transmission
  • Both provide connection-oriented packet transfer services to the network layer
  • Both contain framing information that delineates the beginning and end of each frame
  • All of the above

Q6. Which multiple access technique is used by IEEE 802.11 standard for wireless LAN?

  • CSMA/CA
  • CSMA/CD
  • CDMA
  • ALOHA

Q7. Which of the following are management services offered by the MAC sublayer in wireless LAN

  • Network management
  • Roaming within ESS
  • Power management
  • Storage management

Q8. In CSMA/CA, An amount of time divided into slots called

  • Contention procedure
  • Contention energy
  • Contention signals
  • Contention window

Q9. In medium access control sublayer, medium usage is mediated by the access control during contention period

  • True
  • False

Q10. In Carrier Sense Multiple Access/Collision Detection (CSMA/CD), to continue transmission process we use a

  • Signal
  • Loop
  • Access point
  • Station
Get All Course Quiz Answers of Computer Communications Specialization

Fundamentals of Network Communication Coursera Quiz Answers

Peer-to-Peer Protocols and Local Area Networks Coursera Quiz Answers

Packet Switching Networks and Algorithms Coursera Quiz Answers

TCP/IP and Advanced Topics Coursera Quiz Answers

Share your love

Newsletter Updates

Enter your email address below and subscribe to our newsletter

Leave a Reply

Your email address will not be published. Required fields are marked *