{[ promptMessage ]}

Bookmark it

{[ promptMessage ]}

CompNetMidtermFall10 - Computer Networks Midterm Prof J-P...

Info icon This preview shows pages 1–4. Sign up to view the full content.

View Full Document Right Arrow Icon
Computer Networks - Midterm Prof. J.-P. Hubaux and Dr. M. H. Manshaei November 9, 2010 Duration: 1:45 hours, closed book. Please write your answers on these sheets in a readable way. Poorly written answers will not be corrected. Use extra sheets if necessary (put your name on them). You may write your answers in English or in French. The total number of points is 40. This document contains 14 pages. First Name (Pr´enom): Last Name (Nom de famille): SCIPER No: Division: 2 Communication Systems 2 Computer Science 2 Other (mention it): . . . . . . . . . Year: 2 Bachelor Year 2 2 Bachelor Year 3 2 Other (mention it): . . . . . . . . . (answers to the questions are shown in italic and blue)
Image of page 1

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
1 Short questions (5 points) For each question, please circle a single best answer . 1. Statistical multiplexing is: (a) a mechanism providing circuit-like behavior in packet-switched networks (b) a method to optimally share files in a peer-to-peer system (c) an algorithm that divides up the frequency spectrum of a link (d) an on-demand form of sharing a transmission link CORRECT 2. The end-to-end delay depends on: (a) the congestion of the network (b) the number of hops between source and destination (c) the application-layer protocols (d) the processing delay in the routers (e) all of the above (f) (a), (b) and (d) CORRECT 3. A tier-2 ISP: 4. HTTP with persistent connections 5. Cookies enable (a) a Web server to infect a user’s machine with malware (b) a Web server to track a user’s activity at its own Web site CORRECT (c) a Web server to know all previous Web pages visited by the user (d) a Web server to learn your full name, e-mail address and credit card information 2
Image of page 2
6. IMAP 7. In a reliable data transfer protocol, duplicate ACK (a) is a technique to increase the probability of successful ACK transmission. (b) is used to decrease the congestion window at the sender. (c) can be used instead of NAK packets. (d) is used to detect packet loss before the timeout. (e) both (c) and (d) CORRECT
Image of page 3

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Image of page 4
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern