COSC 41547

subject Type Homework Help
subject Pages 25
subject Words 2672
subject Authors William Stallings

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
In a rate based scheme any node along the path of the connection can reduce the data
rate limit in a control message to the source.
Answer:
If dynamic or alternate routing is used the potential exists for a datagram to loop
indefinitely through the internet.
Answer:
The choice for transmission medium and topology is critical in LAN design.
Answer:
Inelastic traffic easily adapts to changes in delay and throughput across an internet.
Answer:
page-pf2
Together, MIMO and OFDM technologies are the cornerstone of emerging broadband
wireless networks.
Answer:
The most commonly used medium in the telephone network is twisted pair.
Answer:
The advantages of digital signaling are that it is generally cheaper than analog signaling
and is less susceptible to noise interference.
Answer:
The host portion of an IP address is used by routers to move a datagram from the source
page-pf3
computer to the network to which the target computer is attached.
Answer:
A router is not required to link from one VLAN to another.
Answer:
Only digital signals can be used to convey information in the communications
environment.
Answer:
A connectionless internet service is not good for connectionless transport protocols
because it imposes unnecessary overhead.
Answer:
page-pf4
An error detection code simply detects the presence of an error.
Answer:
Even though cells are sufficiently distant from each other, they still need to be assigned
different frequencies to avoid interference or crosstalk.
Answer:
The most widely used second generation CDMA scheme is IS-95.
Answer:
In virtually all packet-switching networks some sort of adaptive routing technique is
used.
page-pf5
Answer:
With a nonsystematic code it is more difficult to determine a technique for generating a
codeword from a block of data bits.
Answer:
For unguided transmission it is virtually impossible to transmit baseband signals.
Answer:
Growth in services and growth in traffic capacity go hand in hand.
Answer:
page-pf6
Some transmission media, such as optical fiber and unguided media, will only
propagate analog signals.
Answer:
Procedures needed to allow data to traverse multiple interconnected networks is found
in the internet layer of the TCP/IP protocol architecture.
Answer:
Proxies are not useful for enforcing policy.
Answer:
A compromise that attempts to reduce collisions, like nonpersistent, and reduce idle
time, like 1-persistent, is p-persistent.
page-pf7
Answer:
Coaxial cable can be used over longer distances and support more stations on a shared
line than twisted pair.
Answer:
The principal techniques for modulation using analog data are amplitude modulation,
frequency modulation, and phase modulation.
Answer:
Compression refers to the ability of a number of devices to share a transmission facility.
Answer:
page-pf8
Redundant bits are not used by the receiver for error detection.
Answer:
The area to be covered in a cellular network is divided into cells in a pentagonal tile
pattern that provide full coverage of the area and
equidistant antennas.
Answer:
A disadvantage of Ethernet technology is the lack of availability of reliable and
interoperable networking products from vendors.
Answer:
Ethernet has both a medium access control layer and a physical layer.
page-pf9
Answer:
A variety of routing algorithms have been developed for packet- switching, frame relay
and ATM networks.
Answer:
A membership query message is sent by a multicast router.
Answer:
In TDD, data are transmitted in both directions at the same time.
Answer:
page-pfa
RFC 824 is the format for use in constructing messages for transmission via SMTP.
Answer:
The key parameters in any medium access control technique are ________.
A) when and where
B) where and how
C) how and when
D) why and how
Answer:
A ________ is a distinguishable stream of related IP packets that results from a single
user activity and requires the same QoS.
A) transport connection
B) routing algorithm
C) flow
D) jitter
page-pfb
Answer:
The ________ is intended to provide QoS transport over IP-based internets.
A) AS
B) PHB
C) ISA
D) IRP
Answer:
The ________ topologies are passive sections of cable to which stations are attached.
A) tree and ring
B) tree and bus
C) star and tree
D) bus and ring
Answer:
page-pfc
A(n) ________ signal is a continuously varying electromagnetic wave that may be
propagated over a variety of media, depending on spectrum. Examples are wire media
and fiber optic cable.
A) digital
B) periodic
C) aperiodic
D) analog
Answer:
The values in the __________ enable senders, receivers, and network managers to
monitor conditions on the network as they relate to a particular session.
A) Sender Report
B) RTCP
C) Timestamp
D) Note
Answer:
The OpenFlow protocol supports ____________ messages.
A) controller-to-switch
page-pfd
B) asynchronous
C) symmetric
D) all of the above
Answer:
A ________ is used to identify the user and register its location.
A) page
B) handoff
C) handshake
D) reflection
Answer:
MIMO exploits the space dimension to improve wireless systems in terms of
_________.
A) range
B) capacity
C) reliability
D) all of the above
page-pfe
Answer:
On a network, the switching devices whose purpose is to provide communication are
called ________. These are connected to one another in some topology by transmission
links.
A) routers
B) bridges
C) stations
D) nodes
Answer:
In the HDLC frame structure the FCS and flag fields following the data field are
referred to as a ________.
A) header
B) trailer
C) bit stuffing
D) information frames
Answer:
page-pff
The simplest criterion in the selection of a route is to choose the _______.
A) network resources
B) maximum hop route
C) minimum hop route
D) maximum nodes available
Answer:
________ messages are used to create, change, and delete label mappings for FECs.
A) Session establishment and maintenance
B) Discovery
C) Advertisement
D) Notification
Answer:
In IPv6 ________ may only be performed by source nodes, not by routers, along a
page-pf10
packet's delivery path.
A) bridging
B) reassembly
C) fragmentation
D) ordered delivery
Answer:
An example of ________ traffic is real time traffic such as voice and video.
A) delay variation
B) elastic
C) multimedia information
D) inelastic
Answer:
The principle driving requirement for ________ is the increase in Internet and intranet
traffic.
A) 10 Gigabit Ethernet
B) 100BASE-LX
page-pf11
C) 10BASE-T
D) 10BASE-5
Answer:
________ switching involves the partitioning of a lower speed bit stream into pieces
that share a higher speed stream with other bit streams. The individual pieces are
manipulated by control logic to route data from input to output.
A) Packet
B) Time division
C) Circuit
D) Space division
Answer:
For higher speeds, a technology known as ________ is superior to spread spectrum.
A) ODC
B) OFDM
C) DCIR
D) DBIR
page-pf12
Answer:
A ________ fills at a constant rate up to the capacity of the bucket and empties at a rate
dictated by the input data stream while the bucket is not empty.
A) leaky bucket
B) choke packet
C) slow start
D) token bucket
Answer:
In ordinary ________ transmission over an internet, in which each datagram has a
unique destination network, the task of each router is to forward the datagram along the
shortest path from that router to the destination network.
A) multicast
B) multimedia
C) unicast
D) teleconferencing
Answer:
page-pf13
__________ describe packet forwarding, packet modification, and group table
processing operations.
A) Actions
B) Cookies
C) Data planes
D) Flows
Answer:
In the ________ approach in packet switching each packet is treated independently with
no reference to packets that have gone before.
A) datagram
B) media gateway
C) softswitch
D) virtual circuit
Answer:
Packets are labeled for service handling by means of the 6-bit DS field in the IPv4
header or the IPv6 header. The value of the DS field, referred to as the ________, is the
label used to classify packets for differentiated services.
page-pf14
A) DS boundary node
B) classifier
C) marking
D) DS codepoint
Answer:
A good example of the ________ style is for an audio teleconference with multiple
sites.
A) DS
B) FS
C) FF
D) WF
Answer:
A ____________ code takes a fixed-length input and produces a fixed-length
check code.
A) cyclic error-correcting
B) cyclic redundancy check
page-pf15
C) cyclic logic check
D) none of the above
Answer:
Analog data in electrical form can be transmitted as ________ signals easily and
cheaply with voice transmission over voice grade lines.
A) carrier
B) broadband
C) baseband
D) modulating
Answer:
The simplest error detecting scheme is to append a parity bit to the end of a block of
data.
Answer:
page-pf16
RR and RNR are examples of an ________.
A) error repair request
B) acknowledgment frame
C) open acknowledgment frame
D) interior window
Answer:
DWDM enables capacities of ________ per second.
A) terabits
B) picobits
C) megabits
D) gigabits
Answer:
The form of error control based on sliding-window flow control that is most commonly
used is:
A) ACK-ARQ
page-pf17
B) selective-reject ARQ
C) go-back-N ARQ
D) piggybacking
Answer:
A problem with ________ is that capacity is wasted because the medium will generally
remain idle following the end of a transmission, even if there are one or more stations
waiting to transmit.
A) p-persistent CSMA
B) nonpersistent CSMA
C) 1-persistent CSMA
D) slotted ALOHA
Answer:
A device attached to one of the networks of an internet that is used to support end user
applications or services is ________.
A) an end system
B) a router
C) a subnet
page-pf18
D) an intermediate system
Answer:
The key elements of a simple communications model are ________.
A) source, transmission, destination
B) signal, transmission, receiver
C) source, signal, destination
D) source, signal, receiver
Answer:
With __________ , each bit in the original signal is represented by multiple bits in the
transmitted signal, using a spreading code.
A) IFFT
B) DSSS
C) CDMA
D) FHSS
page-pf19
Answer:
In ________, the two binary values are represented by two different amplitudes of the
carrier frequency. Commonly, one of the amplitudes is zero. One binary digit is
represented by the presence, at constant amplitude, of the carrier, the other by the
absence of the carrier.
A) amplitude shift keying
B) phase shift keying
C) frequency shift keying
D) high density bipolar-3 zeros
Answer:
A ________ consists of a shared transmission medium and a set of hardware and
software for interfacing devices to the medium and regulating the orderly access to the
medium.
Answer:
Communication via circuit switching involves three phases: circuit establishment, data
transfer and ________.
page-pf1a
Answer:
A ________ is the layered structure of hardware and software that supports the
exchange of data between systems and supports distributed applications such as
electronic mail and file transfer.
Answer:
Prior to the routing and delivery of packets in a given FEC, a path through the network,
known as a ________, must be defined and the QoS parameters along that path must be
established.
Answer:
A ________ is a contract between a network provider and a customer that
defines specific aspects of the service that is to be provided.
Answer:
page-pf1b
A ________ emulates a point-to-point or point-to-multipoint link and provides a single
service that is perceived by its user as an unshared link or circuit of the chosen service.
Answer:
The signal processing for OFDM involves two functions known as fast Fourier
transform and ______________ .
Answer:
If two stations exchange data each needs to maintain two windows, one for transmit and
one for receive, and each side needs to send the data and acknowledgments to the other.
To provide efficient support for this requirement a feature known as ________ is
typically provided.
Answer:
page-pf1c
In ________ signaling one logic state is represented by a positive voltage level and the
other by a negative voltage level.
Answer:
In the differential ________ scheme a binary 0 is represented by sending a signal burst
of the same phase as the previous signal burst sent. A binary 1 is represented by sending
a signal burst of opposite phase to the preceding one.
Answer:
The ________ level deals with the physical interface between an attached station and
the link that attaches that station to the packet switching node.
Answer:
The ________ function seeks to design routes through the network for individual pairs
of communicating end nodes so that the network is used efficiently.
page-pf1d
Answer:
________ control refers to mechanisms that detect and correct errors that occur in the
transmission of frames.
Answer:
________ is a modern technology designed to provide high speed digital
data transmission over ordinary telephone wire.
Answer:
Each station in a network connects to a node, and the collection of nodes is referred to
as a ________ network.
Answer:
page-pf1e
________ is an effective congestion control technique in connectionless, or datagram,
configurations, such as datagram packet-switching networks and IP-based internets.
Answer:
In most cases, spread spectrum LANs operate in the ________ microwave bands so that
no Federal Communications Commission licensing is required for their use in the
United States.
Answer:
A _________ empties at a constant rate while the bucket is not empty and fills at a rate
dictated by the input stream up to the capacity of the bucket.
Answer:
________ measures the time the transport machine will continue to await
an acknowledgment of a transmitted segment after the segment has been retransmitted
the maximum number of times. When the timer expires, the transport entity assumes
page-pf1f
that the other transport entity or intervening network has failed, closes the connection,
and signals an abnormal close to the TS user.
Answer:

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.