Peer-to-Peer Protocols and Local Area Networks Coursera Quiz Answers

All Weeks Peer-to-Peer Protocols and Local Area Networks Coursera Quiz Answers

In this course, we discuss peer-to-peer protocols and local area networks. Part one in this course is to answer the question of how does a peer-to-peer protocol delivers reliable data transfer service across unreliable transmission lines or networks.

We focus on several medium access control protocols and their performance analysis. In the second part, we discuss how medium access control protocols coordinate the access to the communication channel so that information gets through from a source to a destination in the same broadcast local area network. We further discuss local area networks and wireless LANs.

Enroll on Coursera

Peer-to-Peer Protocols and Local Area Networks Week 01 Quiz Answers

Practice Assessment – Peer-to-Peer Protocols

Q1. In networks where errors are infrequent, which approach is favored for efficiency?

  • Hop-by-hop approach
  • End-to-end approach
  • Either one of the above
  • Neither one of the above

Q2. Which of the following statements is true about the stop-and-wait ARQ protocol?

  • Stop-and-wait is only efficient if the link delay-bandwidth product is large
  • Stop-and-wait is only efficient if the link bandwidth is high
  • Stop-and-wait is only efficient if the link bandwidth is low
  • Stop-and-wait is only efficient if the link delay-bandwidth product is small

Q3. Consider a situation where an interactive application produces a packet to send each keystroke from the client and the server echoes each keystroke that it receives from the client. Which of following strategies for sending ACK frames in a Go-Back-N is appropriate for the situation?

  • send an ACK frame immediately after each frame is received
  • send an ACK frame after every other frame is received
  • send an ACK frame when the next piggyback opportunity arises
  • Any one of the above

Q4. Consider a bulk data transfer application where a server sends a large file that is segmented in a number of full-size packets that are to be transferred to the client. Assume the channel has a low probability of error. Which of following strategies for sending ACK frames in a Go-Back-N is appropriate for the situation?

  • send an ACK frame when the next piggyback opportunity arises
  • Any one of the above
  • send an ACK frame after every other frame is received
  • send an ACK frame immediately after each frame is received

Q5. Consider Selective Repeat ARQ flow control protocol. In the following scenario, what should be the value of frame number x at receiver B?

  • 3
  • 2
  • 4
  • None of the above

Q6. ARQ protocols combine error detection, retransmission and sequence numbering to provide reliability

  • True
  • False

Q7. A service model specifies a level of performance that can be expected in the transfer of information.

  • True
  • False

Q8. A service offered at a given layer can include which of the following feature(s)

  • Sequencing
  • Reliability
  • Timing
  • All of the above

Q9. Digital communication technologies may introduce errors in communication, which of the following can be used to provide reliable communication

  • UDP
  • TCP
  • DNS
  • HDLC

Q10. Ensuring that information is not altered during transfer is associated with

  • Confidentiality
  • Availability
  • Integrity
  • Authentication

Graded Assessment – Peer-to-Peer Protocols

Q1. Given 3 bits for sequence numbers, what is the maximum sliding window size at the receiver in Go Back 3 ARQ?

  • 3
  • 7
  • 8
  • None of the above

Q2. Given 3 bits for sequence numbers in Selective Repeat ARQ. If the sender already set the sliding window size to be 4, what is the maximum sliding window size at the receiver?

  • 3
  • 8
  • 7
  • None of the above

Q3. Consider Selective Repeat ARQ flow control protocol. In the following scenario, what should be the value of frame number x at receiver B?

  • 3
  • 2
  • 4
  • None of the above

Q4. In the scenario above, what should be the value of frame number y at receiver B?

  • 3
  • 8
  • 7
  • None of the above

Q5. If the probability of error is very low in a communication link, which of the following statements is true about performance of ARQ protocol?

  • Stop-and-wait and Go-back-N ARQ protocols have similar performance
  • Stop-and-wait and Selective Repeat ARQ protocols have similar performance
  • Go-back-N ARQ and Selective Repeat ARQ protocols have similar performance
  • None of the above

Q6. In peer-to-peer protocol, the purpose of Automatic Repeat Request is

  • to ensure a sequence of information packet is delivered with an ACK request
  • to ensure a sequence of information packet is delivered without errors or duplication despite transmission errors and losses
  • to ensure a sequence of information packet is delivered in order
  • to ensure a sequence of information packet is delivered out-of-order

Q7. Which of the basic elements of ARQ is associated with negative acknowledgement

  • Timeout mechanism
  • NAKs
  • ACKs
  • Error detecting code

Q8. In Go-Back-N ARQ, a procedure where transmission of a new frame is begun before the completion of time of the previous frame transmission is called

  • Transitioning
  • Pipelining
  • Channeling
  • None of the above

Q9. In Stop-and-Wait protocol, sequence number are not required

  • True
  • False

Q10. The disadvantage of Stop-and-Wait protocol

  • Error free communication channel does not exist
  • Acknowledgement may get lost
  • Deadlock situation may occur
  • All of the above

Peer-to-Peer Protocols and Local Area Networks Week 02 Quiz Answers

Q1. Which of the following statements are true for the best-effort service of IP?

  • Packets can arrive with errors or be lost
  • Packets can arrive out-of-order
  • Packets can arrive after very long delays
  • All of the above

Q2. Which of following services belong to the data link layer?

  • Insert framing information into the transmitted stream to indicate the boundaries that define frames
  • Provide error control to ensure reliable transmission
  • Provide flow control to prevent the transmitter from overrunning the receiver buffer
  • All of the above

Q3. Which ARQ flow control protocol is used by TCP?

  • Stop-and-Wait
  • Selective Repeat
  • Go-back-N
  • None of the above

Q4. By framing, frame boundaries can be determined using

  • Character Counts
  • Control Characters
  • Flags
  • All of the above

Q5. Which of following statements are true about framing protocols?

  • PPP uses character-based framing which requires byte stuffing
  • HDLC uses Flag-based framing which required bit stuffing
  • All of the above
  • None of the above

Q6. In IP network, which of the following statement is incorrect

  • Packets can arrive out-of-order
  • Packets can arrive with errors or be lost
  • Packets can arrive after long delays
  • Packets always arrive on time

Q7. Framing involves identifying the beginning and end of a block of information within a digital stream

  • True
  • False

Q8. Which of the following statements are true for PPP byte stuffing

  • Malicious users may inflate bandwidth
  • Size of frame varies unpredictably due to byte insertion
  • All of the above
  • None of the above

Q9. In PPP authentication, which of the following is true for Password Authentication Protocol

  • After several attempts, LCP closes link
  • Transmitted unencrypted, susceptible to eavesdropping
  • Initiator must send ID and password
  • Initiator and authenticator share a secret key

Q10. In HDLC frame format, flag is used to identify secondary station (1 or more octets)

  • True
  • False

Q1. Perform the bit stuffing procedure for the following binary sequence: 1101111111011111110101. What is the outcome?

  • 110111110110111110110101
  • 110111111101111111010100
  • 0010000000100000001010
  • None of the above

Q2. Perform bit de-stuffing for the following sequence: 11101111101111100111110.

  • 11101111111111011111
  • 00010000010000011000001
  • 11100111111110011111
  • None of the above

Q3. PPP is a data link protocol for point-to-point lines in Internet. Its framing is based on which of the following?

  • Byte stuffing
  • Bit stuffing
  • Word stuffing
  • None of the above

Q4. HDLC is another data link control protocol widely in use. Its framing is based on which of the following?

  • Byte stuffing
  • Bit stuffing
  • Word stuffing
  • None of the above

Q5. Which of following statements are true for HDLC?

  • supports various data transfer modes
  • supports multi-point links and point to point links
  • implements error control and flow control mechanisms
  • All of the above

Q6. In PPP authentication, which of the following is true for Challenge-Handshake Authentication Protocol (CHAP)

  • After several attempts, LCP closes link
  • Authenticator can reissue challenge during session
  • Initiator and authenticator share a secret key
  • Initiator must send ID and password

Q7. In error detection and loss recovery, which of the following statement is correct

  • Frames may undergo errors in transmission
  • CRCs detect errors and such frames treated as lost
  • Frames lost due to loss-of-synchronization or receiver buffer overflow
  • All of the above

Q8. In multiplexing, Last IN First Out (LIFO) is used to determine the order of packet transmission

  • True
  • False

Q9. Generic Framing Procedure (GFP) allows the implementation of multiple transport modes that may coexist within the same transport channel

  • True
  • False

Q10. In Generic Framing Procedure (GFP), which of the following sentences are correct

  • GFP uses a variation of HEC-based self delineation technique
  • GFP uses an explicit payload length indicator provided in its frame header to accommodate variable length PDUs
  • GFP provides flexible encapsulation framework that supports either a fixed or variable length frame structure
  • GFP rely on byte-stuffing mechanism to delineate protocol data units (PDUs)

Peer-to-Peer Protocols and Local Area Networks Week 03 Quiz Answers

Practice Assessment – Medium Access Controls

Q1. What is the primary function of medium access control?

  • It is to deal with the flow control of a shared communication link.
  • It is to minimize or eliminate the incidence of collisions of a shared communication link.
  • It is to deal with the congestion control of a shared communication link.
  • None of the above

Q2. What is the primary benefit provided by the Slotted ALOHA compared to ALOHA?

  • Higher maximum throughput
  • Lower access delay
  • Both of the above
  • None of the above

Q3. What is the vulnerable period of collisions in ALOHA?

  • Round-trip propagation delay
  • One frame transmission time
  • Two frame transmission time
  • None of the above

Q4. What is the vulnerable period of collisions in Slotted ALOHA?

  • Round-trip propagation delay
  • One frame transmission time
  • Two frame transmission time
  • None of the above

Q5. What is the vulnerable period of collisions in Carrier Sense Multiple Access (CSMA)?

  • Round-trip propagation delay
  • None of the above
  • One frame transmission time
  • One propagation delay

Q6. The primary function of Media Access Control is to minimize or eliminate the instance of the collisions to achieve a reasonable utilization of the medium

  • True
  • False

Q7. In media sharing techniques, which of the following are channelization approaches

  • Code Division Multiple Access
  • Data Division Multiple Access
  • Frequency Division Multiple Access
  • Time Division Multiple Access

Q8. Corresponding box of Carrier Sense Multiple Access/Collision Detection can be replaced by one of the

  • P-persistent process
  • I-persistent process
  • Persistent process
  • Non-persistent process

Q9. Random access is also called the

  • Controlled access
  • Channelization
  • Authentication
  • Contention methods

Q10. In Carrier Sense Multiple Access (CSMA), possibility of collision still exist because of

  • Propagation delay
  • Collision delay
  • Transmit delay
  • None of the above

Graded Assessment – Medium Access Controls

Q1. Polling is a scheduling approach for dynamic medium access control. Which of following statements are correct?

  • Polling can provide bounds on access delay to the shared medium
  • Polling performance can deteriorate with large delay-bandwidth product
  • Polling can provide fairness through regulated access opportunities
  • All of the above

Q2. In a collision-free reservation system that has a large number of light-traffic stations, and the delay-bandwidth product is larger than 1. Which of following MAC protocol is a good fit for stations to reserve mini-slots?

  • 1-persistent CSMA
  • Slotted ALOHA
  • CSMA/CD
  • None of the above

Q3. In Carrier Sense Multiple Access with collision detection (CSMA-CD), how long will it take a collision to be detected and resolved?

  • Round-trip propagation delay
  • One propagation delay
  • One frame transmission time
  • None of the above

Q4. Suppose that the ALOHA protocol is used to share a 56 kbps satellite channel. Suppose that frames are 1000 bits long. What is the maximum throughput of the system in number of frames per second.

  • 1 frame per second
  • 10 frames per second
  • 100 frames per second
  • None of the above

Q5. Consider building a CSMA/CD network running at 1Gbps over a 1-km cable. The signal speed in the cable is 200,000 km/sec. What is the minimum frame size?

  • 64 Bytes
  • 640 Bytes
  • 1250 Bytes
  • None of the above

Q6. In media access control, which of the following statements are true for Channelization

  • Widely used in internet traffic
  • Inflexible in allocating bandwidth to users with different requirements
  • Inefficient for bursty traffic
  • Does not scale well to large numbers of users

Q7. Time-out period is equal to maximum possible propagation delay of

  • Round-trip
  • Triangle-trip
  • Square-trip
  • Rectangle-trip

Q8. In Carrier Sense Multiple Access (CSMA), if station senses medium before trying to use it then chance of collision can be

  • Increased
  • Reduced
  • Doubled
  • Highlighted

Q9. Carrier Sense Multiple Access (CSMA) is based on medium called

  • Listen before sending
  • Sense before Collision
  • Listen before talk
  • Sense before transmit

Q10. Which of the following is not true for MAC scheduling

  • Can provide fairness to stations
  • More efficient channel utilization
  • Reduced computational or procedural complexity
  • Less variability in delays

Peer-to-Peer Protocols and Local Area Networks Week 04 Quiz Answers

Practice Assessment – Local Area Networks

Q1. Which of following features are typically true for local area networks?2

  • All of the above
  • Low error rate
  • Low round-trip delay
  • High speed

Q2. Use HDLC and Ethernet to identify similarities between medium access control and data link control protocols. Which of following statements are true?

  • Both contains framing information that delineates the beginning and end of each frame.
  • Both check the CRC in the received frames for errors
  • Both implement error control and flow control for reliable transmission.
  • None of the above

Q3. Use IEEE 802.3 and IEEE 802.11 to discuss differences between wired and wireless LANs. Which of following statements are true about the differences?

  • Error rate
  • All of the above
  • Station mobility
  • Collision detection

Q4. Which of following is not a primary responsibility of the MAC sublayer in LANs?

  • Protocol data unit addressing
  • Reliable connection-oriented service
  • Fragmentation and reassembly of MAC service data unit
  • Channel access

Q5. In Ethernet, slot time that is at least the round-trip propagation delay, is the critical system parameter for

  • All of the above
  • upper bound on time to detect collision
  • upper bound on time to acquire channel
  • quantum for re-transmission scheduling

Q6. Which one of the following event is not possible in wireless LAN.

  • Acknowledgement of data frames
  • Collision avoidance
  • Multi-mode data transfer
  • Collision detection

Q7. In 802.11 protocol, MAC can alternate between Contention Periods (CPs) and Contention-Free Periods (CFPs)

  • True
  • False

Q8. CSMA/CD is not used in DCF because

  • a station is unable to listen to the channel for collisions while transmitting
  • physical carrier sense detects the presence of other WLAN users
  • in idle state, a station is unable to listen to the channel for collisions
  • None of the above

Q9. In infrastructure network supporting voice and data traffic, data traffic is transported through the CP and voice traffic through the CFP

  • True
  • False

Q10. In 802.11 protocol, which of the following statements are true for Basic Service Set (BSS)

  • Location in a Basic Service Area (BSA)
  • Stations in BSS can communicate with each other
  • Distinct collocated BSS’s cannot coexist
  • Multiple BSSs interconnected by Central System (CS)

Graded Assessment – Local Area Networks

Q1. Consider a Gigabit Ethernet hub with stations at a 100-meter distance and average frame size of 512 bytes. Assume the propagation speed is at 2/3 of light speed. What is the value of normalized delay-bandwidth product?

  • 0.0122
  • 0.122
  • 1.22
  • None of the above

Q2. Wireless data communication is compelling, because of

  • Its easy and low-cost deployment
  • Its support to personal and mobile devices
  • Its high reliability to noise and interference
  • All of the above

Q3. Why not use CSMA/CD in a wireless LAN? The primary reason is

  • The round-trip delay in a wireless LAN is too large
  • The frame is usually very small in a wireless LAN
  • The hidden station problem
  • All of the above

Q4. In IEEE 802.11 MAC for wireless LANs, which of following inter-frame space (IFS) is used to transmit high-priority frames such as ACKs?

  • PIFS
  • None of the above
  • SIFS
  • DIFS

Q5. Which of following statements identifies the similarity between HDLC (data link control) and Ethernet (medium access control)

  • Both implement error control and flow control functions to provide reliable transmission
  • Both provide connection-oriented packet transfer services to the network layer
  • Both contain framing information that delineates the beginning and end of each frame
  • All of the above

Q6. Which multiple access technique is used by IEEE 802.11 standard for wireless LAN?

  • CSMA/CA
  • CSMA/CD
  • CDMA
  • ALOHA

Q7. Which of the following are management services offered by the MAC sublayer in wireless LAN

  • Network management
  • Roaming within ESS
  • Power management
  • Storage management

Q8. In CSMA/CA, An amount of time divided into slots called

  • Contention procedure
  • Contention energy
  • Contention signals
  • Contention window

Q9. In medium access control sublayer, medium usage is mediated by the access control during contention period

  • True
  • False

Q10. In Carrier Sense Multiple Access/Collision Detection (CSMA/CD), to continue transmission process we use a

  • Signal
  • Loop
  • Access point
  • Station
Peer-to-Peer Protocols and Local Area Networks Coursera Course Review:

In our experience, we suggest you enroll in Peer-to-Peer Protocols and Local Area Networks courses and gain some new skills from Professionals completely free and we assure you will be worth it.

Peer-to-Peer Protocols and Local Area Networks course is available on Coursera for free, if you are stuck anywhere between quiz or graded assessment quiz, just visit Networking Funda to get Peer-to-Peer Protocols and Local Area Networks Coursera Quiz Answers.

Conclusion:

I hope this Peer-to-Peer Protocols and Local Area Networks Coursera Quiz Answers would be useful for you to learn something new from this Course. If it helped you then don’t forget to bookmark our site for more Coursera Quiz Answers.

This course is intended for audiences of all experiences who are interested in learning about new skills in a business context; there are no prerequisite courses.

Keep Learning!

Get All Course Quiz Answers of Computer Communications Specialization

Fundamentals of Network Communication Coursera Quiz Answers

Peer-to-Peer Protocols and Local Area Networks Coursera Quiz Answers

Packet Switching Networks and Algorithms Coursera Quiz Answers

TCP/IP and Advanced Topics Coursera Quiz Answers

Leave a Reply

error: Content is protected !!