Site MapHelpFeedbackQuizzes
Quizzes
(See related pages)

1
In a centralized P2P network, the directory system uses the ________paradigm; the storing and downloading of the files are done using __________ paradigm.
A)client-server; client-server
B)peer-to-peer; client-server
C)client-server; peer-to-peer
D)peer-to-peer; peer-to-peer
2
Napster is an example of a ____________ peer-to-peer network.
A)centralized
B)structured-decentralized
C)unstructured-decentralized
D)None of the choices are correct
3
Gnutella is an example of a ____________ peer-to-peer network.
A)centralized
B)structured-decentralized
C)unstructured-decentralized
D)None of the choices are correct
4
BitTorrent is an example of a ____________ peer-to-peer network.
A)centralized
B)structured-decentralized
C)unstructured-decentralized
D)None of the choices are correct
5
In a structured-decentralized P2P network ________________.
A)the directory system is kept in a center
B)a query to find a file must be flooded through the network
C)a pre-defined set of rules is used to link nodes so that a query can be effectively and efficiently resolved
D)None of the choices are correct
6
In a DHT-based network, each peer
A)has a partial knowledge about the whole network.
B)has a complete knowledge about the whole network.
C)only has knowledge about its successor.
D)None of the choices are correct
7
The finger table is the routing table used in ______________.
A)Gnutella
B)Pastry
C)Kademlia
D)None of the choices are correct
8
Which of the following is not a Chord interface?
A)Lookup
B)Fix node
C)Stabilize
D)Join
9
In__________ a key is stored in a node whose identifier is numerically closest to the key.
A)Chord
B)Pastry
C)Kademlia
D)None of the choices are correct
10
To resolve a query, _________ uses two entities: a routing table and a leaf set.
A)Chord
B)Pastry
C)Kademlia
D)None of the choices are correct
11
In Kademlia, the distance between the two identifiers (nodes or keys) is measured as the bitwise- ___________ between them.
A)AND
B)NOR
C)OR
D)None of the choices are correct
12
In________, nodes and data items are m-bit identifiers that create an identifier space of 2m points distributed at the leaves of a binary tree.
A)Chord
B)Pastry
C)Kademlia
D)None of the choices are correct
13
In Kademlia, each node in the network divides the binary tree into m subtrees that___________.
A)include the node itself
B)do not include the node itself
C)include the node itself and the successor node
D)None of the choices are correct
14
Trackerless BitTorrent uses __________ DHT to do the job of tracking.
A)Chord
B)Pastry
C)Kademlia
D)None of the choices are correct
15
Finger tables are used by __________.
A)Chord
B)Pastry
C)Kademlia
D)None of the choices are correct







Data Comm. and NetworkingOnline Learning Center

Home > Chapter 29 > Quizzes