1. Consider the 6-node network shown below, with the given link costs.
2. Consider the following multiple access protocols that we've studied: (1) TDMA, and FDMA (2)
   CSMA (3) Aloha and Slotted Aloha, and (4) polling. Which of these protocols are collision-free
   (e.g., collisions will never happen)?
3. What is the function of Address Resolution Protocol?
4. What is the definition of a “good” path for a routing protocol? Chose the best single answer.
5. Match characteristics of a general approach to routing with the name of that approach.
6. Match a description of how the approach towards implementing a control plane works with of
   the name this approach.
7. We've now learned about both IPv4 addresses and MAC addresses. Consider the address
   properties below. Which of these properties is a property of both IPv4 addresses and MAC
   addresses.
8. Consider the following multiple access protocols that we've studied: (1) TDMA, and FDMA (2)
   CSMA (3) Aloha and Slotted Aloha, and (4) polling. For which of these protocols is the maximum
   channel utilization 1 (or very close to 1)?
9. Which one of the following statements is FALSE:
10. Given the Ethernet address 01011010 00010001 01010101 00011000 10101010 00001111 in
    binary, what is the address in hexadecimal notation?
11. We've now learned about both IPv4 addresses and MAC addresses. Consider the address
    properties below. Which of these properties is only a property of IPv4 addresses (and therefore
    is not a property of MAC addresses - careful!).
12. Which of the following statements is TRUE about channel partitioning protocols?
13. Consider the SDN layering shown below. Match each layer name below with a layer label (a), (b)
    or (c) as shown in the diagram.
14. Which of the following statements is TRUE about a two-dimensional parity check (2D-parity)
    computed over a payload?
15. Which of the following services may be implemented in a link-layer protocol? Select one or
    more statements.
16. Which of the following statements correctly identify the differences between routing and
    forwarding. Select one or more statements.
    - Routing refers to determining the route taken by packets from source to destination, and is
    implemented in the control plane.
    - Forwarding refers to moving packets from a router’s input to appropriate router output, and is
    implemented in the data plane.
17. Match the function/purpose of a field within an Ethernet frame with the name of the field.
18. Check the one or more of the following statements about the OSPF protocol that are TRUE.
19. Consider the OSPF routing protocol. Which of the following characteristics are associated with
    OSPF (as opposed to BGP)?
20. Consider Dijkstra’s link-state routing algorithm that is computing a least-cost path from node a
    to other nodes b, c, d, e, f. Which of the following statements is true. (Refer to Section 5.2 in
    the text for notation.)
21. What is the last byte of the Preamble field in an Ethernet frame's header?
22. Which one of the following statements is NOT TRUE about generalized forwarding?
23. In an iterartion of the loop of Dijkstra's Algorithm, what is the first thing needed to do before
    updating the costs of paths from the source router to others?
24. We've now learned about both IPv4 addresses and MAC addresses. Consider the address
    properties below. Which of these properties is (are) ONLY a property of MAC addresses (and
    therefore is not a property of IPv4 addresses)?
25. Which of the statements below about ICMP are true?
26. Check all of the statements below about where (in the network) the network layer is
    implemented that are true.
27. For each of the actions below, select those actions below that are primarily in the network-layer
    data plane. The other actions that you don't select below then correspond to control-plane
    actions.
28. We've seen that there are two approaches towards implementing the network control plane - a
    per-router control-plane approach and a software-defined networking (SDN) control-plane
    approach. Which of the following actions occur in a per-router control-plane approach? The
    other actions that you don't select below then correspond to actions in an SDN control plane.
29. Which of the following quality-of-service guarantees are part of the Internet’s best-effort service
    model? Check all that apply.
30. Match the names of the principal router components (A,B,C,D below) with their function and
    whether they are in the network-layer data plane or control plane
31. Where in a router is the destination IP address looked up in a forwarding table to determine the
    appropriate output port to which the datagram should be directed?
32. Where in a router does "match plus action" happen to determine the appropriate output port to
    which the arriving datagram should be directed?
33. Suppose a datagram is switched through the switching fabric and arrives to its appropriate
    output to find that there are no free buffers. In this case:
34. What is meant by Head of the Line (HOL) blocking?
35. What are the principal components of the IPv4 protocol (check all that apply)?
36. Match each of the following fields in the IP header with its description, function or use.
37. Which of the following statements is true regarding an IP address? (Zero, one or more of the
    following statements is true).
38. What is meant by an IP subnet? (Check zero, one or more of the following characteristics of an
    IP subnet).
39. What is meant by saying that DHCP is a "plug and play" protocol?
40. Which of the following statements about a DHCP request message are true (check all that are
    true). Hint: check out Figure 4.24 in the 7th and 8th edition of our textbook.
41. Which of the following fields occur ONLY in the IPv6 datagram header (i.e., appear in the IPv6
    header but not in the IPv4 header)? Check all that apply.
42. What is the purpose of the Dynamic Host Configuration Protocol?
43. Destination-based forwarding, which we studied in section 4.2, is a specific instance of
    match+action and generalized forwarding. Select the phrase below which best completes the
    following sentence: "In destination-based forwarding, ..."
    - after matching on the destination IP address in the datagram header, the action taken is to
    forward the datagram to the output port associated with that destination IP address.
44. Which of the following match+actions can be taken in the generalized OpenFlow 1.0
    match+action paradigm that we studied in Section 4.4? Check all that apply.
45. Which of the following fields in the frame/datagram/segment/application-layer message can be
    matched in OpenFlow 1.0? Check all that apply.
46. What is meant by generalized forwarding (as opposed to destination-based forwarding) in a
    router or switch?
47. Which of the following network devices can be thought of as a "middlebox"? Check all that
    apply.
48. What protocol (or protocols) constitutes the "thin waist" of the Internet protocol stack? Check
    all that apply.
49. Which of the statements below are true statements regarding the "end-to-end principle"?
    Check all that apply.
50. In the US, which of the following services has been regulated by the Federal Communications
    Commission (FCC) going back into the 20th century?
    - Telecommunication               services.
51. Which of the following services may be implemented in a link-layer protocol? Select one or
    more statements.
52. Which of the following statements is true about a two-dimensional parity check (2D-parity)
    computed over a payload?
    - 2D-parity can detect and correct any case of two bit flips in the payload .
53. Which of the following statements is true about channel partitioning protocols?
54. Which of the following statements is true about both Pure Aloha, and CSMA (both with and
    without collision detection?
55. Which of the following statements is true about polling and token-passing protocols?
56. Suppose an Ethernet frame arrives to an Ethernet switch, and the Ethernet switch does not
    know which of its switch ports leads to the node with the given destination MAC address? In
    this case, what does the switch do?
57. Which of the following statements are true about a self learning switch?
58. Which of the following statements are true about MAC (link-layer) addresses? Select one or
    more statements below.
59. Which of the following statements correctly identify the differences between routing and
    forwarding. Select one or more statements
    - Routing refers to determining the route taken by packets from source to
    destination, and is implemented in the control plane.
    - Forwarding refers to moving packets from a router’s input to appropriate router
    output, and is implemented in the data plane.
60. What is the definition of a “good” path for a routing protocol? Chose the best single answer.
61. Consider Dijkstra’s link-state routing algorithm that is computing a least-cost path from node a
    to other nodes b, c, d, e, f. Which of the following statements is true. (Refer to Section 5.2 in
   the text for notation.)
62. Match the name of a general approach to routing with characteristics of that approach.
63. Match the terms "interdomain routing" and intradomain routing" with their definitions. Recall
    that in Internet parlance, an “AS” refers to “Autonomous System” – a network under the control
    of a single organization.
    - Interdomain routing
64. Among the following protocols, terminology or considerations, indicate those that are
    associated with "routing within a single network (typically owned and operated by one
    organization)."
65. Which of the functions below belong in the controller layer labeled "Interface, abstractions for
    network control apps"? Check all below that apply.
66. Which of the functions below belong in the controller layer labeled "Network-wide distributed,
    robust state management"? Check all below that apply.
67. Which of the functions below belong in the controller layer labeled "Communication to/from
    controlled device"? Check all below that apply.
68. Which of the statements below about ICMP are true?