CS610-Midterm
1 / 50
------ Program sends a message to a remote computer and orts whether the computer responds.
2 / 50
In Point-to-Point topology there are two topologies.
3 / 50
In ---------, network occupies larger areas like cities & countries.
4 / 50
The product of delay and throughput measures the _____ of data that can be present on the network.
5 / 50
One eater _______, two eaters ________ the maximum cable length limitation.
6 / 50
A bridges function in the _________ layers(s).
7 / 50
Local Talk is a LAN technology that employs -------------
8 / 50
-------------- have advantages arisen from the size and ease of computation.
9 / 50
An interface for twisted pair Ethernet must have an ____________ connector , and must generate signals according to the_____________ specification.
10 / 50
Formally named __________ informally known as the twisted pair Ethernet or TP Ethernet.
11 / 50
The term -------- is used to denote the definition of a packet used with a specific type of network.
12 / 50
_______ computes shortest paths in a graph by using weights on edges as a measure of distance.
13 / 50
17 A network with throughput T and delay D has a total of ________ bit in transit at any time.
14 / 50
Computers attached to an Ethernet use ------ in which a computer waits for the ether to be idle before transmitting a frame.
15 / 50
--------- was especially concerned about the lack of high powered computers.
16 / 50
Ethernet uses a ------ bit static addressing scheme in which each device is assigned a unique address by the manufacturer.
17 / 50
A typical port on an ATM switch operates at __________ or higher.
18 / 50
_________is used for compressed audio and video where the data rate depends on the level of compression that can be achieved.
19 / 50
The term----- ------- refers to the general concept of a small block of data
20 / 50
Computers attached to an Ethernet use ------ in which a computer waits for the other to be idle before transmitting a frame.
21 / 50
A network with throughput T and delay D has a total of ________ bit in transit at any time.
22 / 50
In -------------, network occupies the smaller area like a room a floor or a building
23 / 50
Most LANs that employ ring topology use an access mechanism known as-------
24 / 50
The Fast Ethernet hardware operates at a rate of --------
25 / 50
26 / 50
Basic LAN technologies such as Ethernet, Token Ring, and FDDI use a _____.
27 / 50
FDDI can transmits data at a rate of ----------
28 / 50
29 / 50
___________ is used for audio and video, since these have predefined maximum data rates
30 / 50
Computers attached to an ether use ------ in which a computer waits for the ether to be idle before transmitting a frame.
31 / 50
Most WAN systems include a mechanism that can be used to eliminate the common case of duplication routing is called___________
32 / 50
Unlike Frame Relay and ATM, SMDS (Switched multi-megabit Data service) offers_______ .
33 / 50
A Bridge forwards or filters a frame by comparing the information in its address table to the frame’s_____
34 / 50
35 / 50
Computer networks are often called -------------- because they use packet technology.
36 / 50
37 / 50
FDDI can transmits data at a rate of -----
38 / 50
39 / 50
40 / 50
A Bridge can ________
41 / 50
42 / 50
__________is used for compressed audio and video where the data rate depends on the level of compression that can be achieved.
43 / 50
------ has no way to determine the cause of the problem.
44 / 50
The third field of the header consists of ------ bit Ethernet frame type.
45 / 50
46 / 50
47 / 50
ATM is designed to work on___________.
48 / 50
IEEE LLC/SNAP header is --------, which is used to specify the type of data.
49 / 50
Formally named __________ informally known as the thick wire Ethernet or Thick net.
50 / 50
Your score is
The average score is 0%
Restart quiz