Study sets, textbooks, questions
Upgrade to remove ads
Terms in this set (120)
Which of the following is not true about ITU-T:
Its membership is limited to U.S telephone companies.
Which of the following is not true about a server?
can only perform one function on a network.
Which of the following is not an important future trend in communication and networking?
Development of online batch systems
Which of the following is not true about de jure standards?
They are always developed before de facto standards.
In the Internet model, the application layer corresponds to the ________ layer(s) of the OSI model.
session, presentation and application
American National Standards Institute (ANSI)
is the coordinating organization for the United States' national system of standards
Which of the following would be a standard or protocol used at the Data Link layer of the Internet or OSI model?
The _________ layer performs error checking which is redundant to some extent with the function of the _________ layer.
transport, data link
The primary reason for networking standards is to:
ensure that hardware and software produced by different vendors can work together
When a developer creates an application for each type of device that might be used, this is referred to as
A native app
Which of the following is not a data link layer standard?
Which standards body is responsible for the development of local area network (LAN) standards?
The fourth layer of the OSI model is called the __________ layer.
A local area network is:
a group of personal computers or terminals located in the same general area and connected by a common cable (communication circuit) so they can exchange information such as a set of rooms, a single building, or a set of well-connected buildings.
The network layer of the Internet model uses the _____________ protocol to route messages though the network.
Which of the following is true about ISO:
All of the above
Which of the following is not a property of a WAN:
connects a group of computers in a small geographic area such as room, floor, building or campus.
___________ is an orderly close to a dialogue between end users.
The _________ layer is responsible for routing of messages from the sender to the final destination.
The Internet standards organization that will allow anyone to join is __________________.
The room that contains the cable termination points and the distribution frames is referred to as
______ is a modem standard that uses Lempel-Ziv encoding to compress data.
With which type of digital signaling does the signal always return to zero volts after each bit?
Which is not true about point-to-point circuits?
point-to-point circuits reduce the amount of cable required and use the circuit more efficiently than multipoint circuits.
In general, older networks and local loops designed to transmit voice data are likely to be ________.
Which type of digital signaling would experience fewer errors because it has more distinct signals?
Which of the following media has the lowest error rates and the highest transmission speeds?
fiber optic cable
differ widely among media
Which of the following is not an important factor to consider when selecting media to be used in a network?
prestige value of the type of media
Time (non-statistical) division multiplexing differs from frequency division multiplexing because it:
splits the communication circuit vertically (with time slots) instead of horizontally
The acronym, Modem, stands for _________________.
The _____________ of a circuit determines a circuit's capacity.
When you send an email from the US to Europe, it likely is transmitted from one continent to another through one of the ______ that connect America and Europe.
When sending four bits at a time using frequency modulation, the number of different frequency levels that would be needed would be _______.
If each sample uses 16 bits and the number of samples taken each second is 8000; then the transmission speed on the circuit is?
____________ is a modulation technique that combines two different amplitude combinations with eight different phase combinations modulation to send four bits per symbol.
quadrature amplitude modulation
The height of a sound wave is called its:
The direction in which the sound wave begins is known as:
Another term for the weakening of a signal over distance is:
___________ is commonly used to transmit phone conversations over digital networks.
Which of the following statements is correct?
Serial transmission is slower than parallel transmission.
The earliest type of fiber optic systems were:
The two basic types of media are:
guided and wireless (radiated)
The typical range of human hearing is:
20 to 14,000 Hz
With respect to converting digital data into analog signals, AM stands for:
__________ is a software-enabled technique that can change the hardcoded MAC address to any MAC address and thus overcome MAC address filtering.
MAC address spoofing
Which of the following is way to reduce or eliminate crosstalk on a circuit?
physically separating the cables from other communication cables
Which of the following is not an error detection method used in the data link layer?
pulse code checking
The probability of detecting an error, given that one has occurred, using parity checking is about:
_____________ is an effective way to prevent impulse noise, cross talk, and intermodulation noise.
Calculating the actual throughput of a data communication network is:
complex because many factors affect throughput
______________ controls errors by detecting and correcting them at the receiving end without retransmission of the original message.
_________________ is defined as the total number of information bits divided by the total number of bits in the transmission.
Which of the following is not a controlled access method of media access control?
In general, controlled approaches:
work better than contention approaches for large networks that have high usage
In ARQ, a NAK:
is sent by the recipient if the message contains an error
Media access control:
is not very important in point-to-point with full duplex configuration
each character is transmitted independently of all other characters
With odd parity (assume that the parity bit (in bold) has been placed at the end of each of the following) and a 7-bit ASCII code, which of the following is incorrect?
__________can obliterate a group of bits, causing a burst error.
The probability of detecting an error, provided that one has occurred, using cyclic redundancy checking is about:
The familiar background static on radios and telephones is called:
Which of the following is true about the data link protocol, Ethernet (IEEE 802.3)?
newer version permits jumbo frames
Using parity, the probability for detecting an error, given that one has occurred, is:
about 50% for either even or odd parity
Which of the following is true about the data link protocol, PPP?
it is commonly used in WANs
________ has essentially replaced SDLC and offers a larger sliding window.
When a signal is reflected back to the transmitting equipment, it is called a(n) _________.
Which of the following is true with respect to the data link layer?
It performs error detection.
Which of the following is not a type of synchronous protocol?
Which of the following is true about the data link protocol, SDLC:
It uses a special bit pattern called a flag at the beginning and end of every frame (or packet).
Stop-and-wait ARQ uses ___________ type of data flow.
The older version of IP has a ________ header of control information.
Which of the following is not given to a client computer when it is first installed on a TCP/IP network so that it has the appropriate routing/addressing information?
application layer address
A client computer is typically assigned a data link layer address by a:
The ______ defines what type of packets should be routed and what types of packets should be discarded.
IPv6 is based upon _________ -byte addresses.
IP addresses from 224 to 239 belong to Class D and are reserved for
__________ is not an important function of the transport layer.
A TCP three-way handshake is used to establish a ___________ messaging method.
is utilized during routing functions
Which of the following is not a component of a router?
The newer form of IP, version 6 (IPv6):
has an increased address size from 32 bits to 128 bits
When TCP/IP translates a network layer address into a data link layer address, it sends a special ____________ to all computers in the subnet.
The ____________ layer links the application layer with the network layer is responsible for end-to-end delivery of messages.
A subnet mask of ___________ means that all computers with only the same first two bytes in their IPv4 addresses are on the same subnet.
The source port identifier of the received TCP segment tells the destination station _____________.
which application layer process the packet is from.
______________ communication is most commonly used when the application data or message can fit into one single packet.
One drawback to dynamic routing is:
The transmission of status information "wastes" network capacity that could be used to send user messages.
A(n) _________ is a specially formatted request used to perform IP address to data link address resolution.
Address Resolution Protocol request
With QoS routing different __________ are defined, each with different priorities.
classes of service
In its simplest form, the __________ has two columns: the first column lists every destination network, while the second column lists the interface on which that computer should send messages, if they are destined for the network in the first column.
___________ is the process of determining the path that a message will travel from sending computer to receiving computer.
A(n) ________ refers to a group of computers that are logically grouped together by IP number.
IGMP refers to:
Internet Group Management Protocol
The _____________ is used by a computer to determine how messages will travel through the network.
In the __________ step of the building-block process to network design, the network designer examines the available technologies and assesses which options will meet the users' needs.
Which of the following is false about staff costs for a network?
When a variety of devices from different vendors are used in a network, it takes less time to perform network management activities
To estimate costs for large network purchases, organizations often:
issue an RFP to vendors
The large network purchases are done:
after the vendor(s) are selected
The network architecture component which contains the organization's servers is called the
There are some network modeling tools that can ________ the existing network.
Once the needs have been defined in the logical network design, the next step is to develop a(n) __________.
Which of the following is not included in the key deliverable for the needs assessment stage of the building-block network design process, the set of logical network diagrams?
specific routers that have been chosen to implement the proposed network
Which of the following is not an example of identifying protocols that are needed to support hardware and software requirements of applications that will use the network?
an application will have drop down menu choices
RFP stands for:
Request for Proposal
Which of the following is not a way in which network requirements, identified in the needs analysis of the building-block network design process, are organized?
Which of the following is not one of the three major steps used in of the building-block process to network design?
implementation and maintenance
Gaining an understanding of the current application system and messages provides a _________ against which future design requirements can be gauged.
Which of the following is not a main item for which network designers estimate costs for the proposed network?
ergonomic chairs for users
Which of the following is a way to sell the network proposal to management?
focus on the growth in network use
Which of the following is not a current trend that is making the traditional design approach less appropriate for today's networks?
The most expensive part of any network is the hardware
Which of the following is not directly contributing to the dramatic increase in network traffic today?
Much of the video processing on computers can be off-loaded from the CPU onto high-end video cards.
The network architecture component that is sometimes referred to as the distribution layer is the
The traditional network design approach does not work well for _________ networks.
To establish circuit loading, the designer usually starts with the:
total characters transmitted per day on each circuit, or, if possible, the number of characters transmitted per two-second intervals if peaks must be met
In the __________ step of the building-block process to network design, the network designer attempts to understand the fundamental current and future network needs of the various users, departments, and applications.
The building block design approach is sometimes called:
narrow and deep
In the technology design stage of network design,
the decisions for fundamental technology/protocols and circuit capacity are interrelated
__________ is an estimate of the highest data volume on a link.
Peak circuit traffic
According to one rule of thumb, ______ percent of circuit loading information is easy to gather.
Sets with similar terms
ISYS 310 Exam 2 Quiz Questions
Other Quizlet sets
1.6 Quiz Child develop
Civics Ch4 L2 Quiz for 10/9/20