CS610-Midterm
1 / 50
IEEE LLC/SNAP header is --------, which is used to specify the type of data.
2 / 50
-------------- have advantages arisen from the size and ease of computation.
3 / 50
------ Program sends a message to a remote computer and orts whether the computer responds.
4 / 50
The maximum size of an Ethernet segment is___________
5 / 50
A Bridge forwards or filters a frame by comparing the information in its address table to the frame’s_____
6 / 50
ATM is designed to work on___________.
7 / 50
Most LANs that employ ring topology use an access mechanism known as-------
8 / 50
Local Talk is a LAN technology that employs -------------
9 / 50
The third field of the header consists of ------ bit Ethernet frame type.
10 / 50
------ has no way to determine the cause of the problem.
11 / 50
The term -------- is used to denote the definition of a packet used with a specific type of network.
12 / 50
FDDI can transmits data at a rate of ----------
13 / 50
No error detection scheme is perfect because transmission errors can affect the additional information as well as the data.
14 / 50
15 / 50
An interface for twisted pair Ethernet must have an ____________ connector , and must generate signals according to the_____________ specification.
16 / 50
The product of delay and throughput measures the _____ of data that can be present on the network.
17 / 50
Formally named __________ informally known as the twisted pair Ethernet or TP Ethernet.
18 / 50
_______ computes shortest paths in a graph by using weights on edges as a measure of distance.
19 / 50
20 / 50
_________is used for compressed audio and video where the data rate depends on the level of compression that can be achieved.
21 / 50
---------- scheme, which is designed to help detect transmissions errors, send one extra bit of information with each character
22 / 50
23 / 50
----- Program sends a message to a remote computer and orts whether the computer responds.
24 / 50
An ------------method, the network hardware designers specify how type information is included in the frame and the value use to identify various frame types.
25 / 50
26 / 50
In Point-to-Point topology there are two topologies.
27 / 50
________ has a jitter zero
28 / 50
Ethernet uses a ------ bit static addressing scheme in which each device is assigned a unique address by the manufacturer.
29 / 50
___________ is used for audio and video, since these have predefined maximum data rates
30 / 50
Computers attached to an Ethernet use ------ in which a computer waits for the other to be idle before transmitting a frame.
31 / 50
Computer networks are often called -------------- because they use packet technology.
32 / 50
One eater _______, two eaters ________ the maximum cable length limitation.
33 / 50
34 / 50
35 / 50
A ---------- provide a mechanism that a customer can use to set a physical address.
36 / 50
--------- was especially concerned about the lack of high powered computers.
37 / 50
A network uses a ------ if all computers attach to a central point
38 / 50
39 / 50
In -------------, network occupies the smaller area like a room a floor or a building
40 / 50
__________is used for compressed audio and video where the data rate depends on the level of compression that can be achieved.
41 / 50
A bridges function in the _________ layers(s).
42 / 50
ATM assigns each VC a _____________ identifier that is divided two parts to produce a hierarchy.
43 / 50
In ---------, network occupies larger areas like cities & countries.
44 / 50
When an application--------------- data, it makes a copy of the data available to all other computers on the network.
45 / 50
46 / 50
A Bridge can ________
47 / 50
Computers attached to an Ethernet use ------ in which a computer waits for the ether to be idle before transmitting a frame.
48 / 50
Most WAN systems include a mechanism that can be used to eliminate the common case of duplication routing is called___________
49 / 50
50 / 50
Your score is
The average score is 0%
Restart quiz