CS610-Midterm
1 / 50
Most WAN systems include a mechanism that can be used to eliminate the common case of duplication routing is called___________
2 / 50
IEEE LLC/SNAP header is --------, which is used to specify the type of data.
3 / 50
No error detection scheme is perfect because transmission errors can affect the additional information as well as the data.
4 / 50
Basic LAN technologies such as Ethernet, Token Ring, and FDDI use a _____.
5 / 50
A typical port on an ATM switch operates at __________ or higher.
6 / 50
_________is used for compressed audio and video where the data rate depends on the level of compression that can be achieved.
7 / 50
Formally named __________ informally known as the twisted pair Ethernet or TP Ethernet.
8 / 50
----- Program sends a message to a remote computer and orts whether the computer responds.
9 / 50
ATM assigns each VC a _____________ identifier that is divided two parts to produce a hierarchy.
10 / 50
Most LANs that employ ring topology use an access mechanism known as-------
11 / 50
Unlike Frame Relay and ATM, SMDS (Switched multi-megabit Data service) offers_______ .
12 / 50
---------- scheme, which is designed to help detect transmissions errors, send one extra bit of information with each character
13 / 50
One eater _______, two eaters ________ the maximum cable length limitation.
14 / 50
Formally named __________ informally known as the thick wire Ethernet or Thick net.
15 / 50
A bridges function in the _________ layers(s).
16 / 50
_______ computes shortest paths in a graph by using weights on edges as a measure of distance.
17 / 50
The term----- ------- refers to the general concept of a small block of data
18 / 50
------ Program sends a message to a remote computer and orts whether the computer responds.
19 / 50
20 / 50
The product of delay and throughput measures the _____ of data that can be present on the network.
21 / 50
22 / 50
23 / 50
A network uses a ------ if all computers attach to a central point
24 / 50
When an application--------------- data, it makes a copy of the data available to all other computers on the network.
25 / 50
Ethernet uses a ------ bit static addressing scheme in which each device is assigned a unique address by the manufacturer.
26 / 50
27 / 50
Computers attached to an Ethernet use ------ in which a computer waits for the other to be idle before transmitting a frame.
28 / 50
The Fast Ethernet hardware operates at a rate of --------
29 / 50
An interface for twisted pair Ethernet must have an ____________ connector , and must generate signals according to the_____________ specification.
30 / 50
-------------- have advantages arisen from the size and ease of computation.
31 / 50
Which of the following is a connecting device?
32 / 50
A Bridge can ________
33 / 50
FDDI can transmits data at a rate of ----------
34 / 50
------ has no way to determine the cause of the problem.
35 / 50
Computers attached to an Ethernet use ------ in which a computer waits for the ether to be idle before transmitting a frame.
36 / 50
In Point-to-Point topology there are two topologies.
37 / 50
Computer networks are often called -------------- because they use packet technology.
38 / 50
An ------------method, the network hardware designers specify how type information is included in the frame and the value use to identify various frame types.
39 / 50
40 / 50
ATM is designed to work on___________.
41 / 50
Computers attached to an ether use ------ in which a computer waits for the ether to be idle before transmitting a frame.
42 / 50
--------- was especially concerned about the lack of high powered computers.
43 / 50
________ has a jitter zero
44 / 50
he next hop to which a packet is sent depends only on
45 / 50
A network with throughput T and delay D has a total of ________ bit in transit at any time.
46 / 50
47 / 50
In ---------, network occupies larger areas like cities & countries.
48 / 50
49 / 50
50 / 50
Your score is
The average score is 0%
Restart quiz