Version 2 4&5 Key
.docx
keyboard_arrow_up
School
California State University, Fullerton *
*We aren’t endorsed by this school
Course
409
Subject
Computer Science
Date
Jun 7, 2024
Type
docx
Pages
5
Uploaded by MagistrateJellyfish20290
1.
The transport layer must break messages from the application layer into several _____ that can be sent to the network layer.
a.
bits
b.
bytes
c.
frames
d.
segments
e.
strings
2.
When a signal is reflected back to the transmitting equipment, it is called a(n) _________.
a.
white noise
b.
echo
c.
crosstalk
d.
attenuation
e.
impulse noise
3.
____________ is an effective way to prevent attenuation.
a.
Shielding wires
b.
Adding fluorescent lights
c.
Adding repeaters or amplifiers to a circuit
d.
Changing multiplexing techniques
e.
Shorting a circuit
4.
Media access control:
a.
is not very important in point-to-point with full duplex configuration.
b.
is not very important in local area networks.
c.
is not very important in a point-to-point with a half-duplex configuration.
d.
is not very important in a multipoint configuration.
e.
does not control when computers transmit.
5.
With _____________ messaging, each UDP segment makes its own way through the network without the use of sequence numbers or acknowledgements.
a.
frequency division
b.
connection-oriented
c.
PCMCIA
d.
connectionless
e.
application net
6.
A subnet mask of ___________ means that all computers with only the same first two bytes in their IPv4 addresses are on the same subnet.
a.
11111111.0.0.0
b.
255.255.255.0
c.
255.0.0.0
d.
255.255.0.0
e.
255.255.255.255
7.
____________ is not a function of a data link protocol.
a.
Media access control
b.
Message delineation
c.
Amplitude shift keying
d.
Indicating when a message starts and stops
e.
Error control
8.
In general, controlled approaches:
a.
work better than contention approaches for small networks that have low usage.
b.
work better than contention approaches for large networks that have high usage.
c.
work better than contention approaches for all sizes of networks.
d.
do not require a host, server, or active monitor to assign media access control.
e.
have many collisions.
9.
Which of the following media is least susceptible to noise?
a.
fiber optic cable
b.
coaxial cable
c.
twisted pair
d.
unshielded twisted pair
e.
shielded twisted pair
10. On digital circuits, we use _________ to reshape the incoming signal and prevent attenuation.
a.
amplifiers
b.
repeaters
c.
multiplexers
d.
digitizers
e.
Modems
11. ______________ is a type of dynamic routing.
a.
Static routing
b.
Circuitous routing
c.
Centralized routing
d.
Link state
e.
X.25 routing
12. Using parity, the probability for detecting an error, given that one has occurred, is:
a.
about 50% for either even or odd parity.
b.
about 70% for even parity and 30% for odd parity.
c.
about 30% for even parity and 70% for odd parity.
d.
about 0% for either even or odd parity.
e.
about 100% for either even or odd parity.
13. With __________ ARQ, the sender immediately sends the next message or packet of data.
a.
continuous
b.
immediate
c.
open window
d.
stop-and-wait
e.
halt and be recognized (HBR)
14. Calculating the actual throughput of a data communication network is:
a.
not normally required for synchronous networks because they are so fast
b.
complex because many factors affect throughput
c.
simple because packet size is the primary factor affecting throughput
d.
not needed for satellite-based networks
e.
far less complicated if the system operates on a contention basis
15. _________________ is defined as the total number of information bits divided by the total number of bits in the transmission.
a.
Asynchronous rate
b.
Protocol percentage
c.
Throughput
d.
Transmission Rate of Information Bits
e.
Transmission efficiency
16. TCP/IP:
a.
is the least commonly used network protocol for LANs because it cannot be combined with Ethernet
b.
performs packetizing, as well as routing and addressing functions
c.
is not very efficient and is prone to errors
d.
is compatible with only one type of data link protocol, SDLC
e.
refers to Telephone Control Procedures/Inter-exchange Procedures
17. The data link layer uses the ________ to recognize the source and destination addresses.
a.
MAC address
b.
IP address
c.
URL
d.
Email address
e.
Local router
18. The older version of IP has a ________ header of control information.
a.
128-bit
b.
192-bit
c.
1024-bit
d.
120-bit
e.
320-bit
19. ICANN:
a.
developed the IPX/SPX network layer protocol
b.
assigns data link layer addresses
c.
approves which network layer addresses (usually, approved or assigned in groups or classes) can be used by an organization for its computers that will connect to the Internet
d.
developed X.25 network layer protocol
e.
refers to Interchange Computer Addressing Networks and Nodes
20. The _____________ is used by a computer to determine how messages will travel through the network.
a.
routing table
b.
configuration listing
c.
linking loader
d.
bus header assignment list
e.
file allocation table
21. ____________ refers to the type of routing in which the routing table is developed by the network manager and
modifications are made only when computers are added to or removed from the network.
a.
Adaptive routing
b.
Dynamic routing
c.
Static routing
d.
Distance vector routing
e.
Link state routing
22. The data link layer uses the ________ to recognize the source and destination addresses.
a.
MAC address
b.
IP address
c.
URL
d.
Email address
e.
Local router
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Questions
Computer Networks:
arrow_forward
Which of the following are data-link layer issues?
a) routing
b) flow control
c) synchronization
d) framing
(b) and (c) only.
(b) and (d) only.
(a), (b) and (c) only.
(a) and (b) only.
(a), (b), (c) and (d).
(b), (c) and (d) only.
arrow_forward
[ ] As the data packet moves from the lower to the upper layers, headers are added.
[ ] Every network device implements the transport layer.
[ ] In the Ring topology, each computer acts as repeater make error detection and boosts the signal before sending it on.
[ ] In bus topology network media is inexpensive and easy to work with, so it is easier to trouble shoot than other topology.
[ ] Error control only detects errors
[ ] Ethernet is a LAN so it is placed in the second layer of the OSI reference model.
[ ] UDP provides connectionless service and delivers packets quickly. In case of packet loss, UDP does not provide retransmission.
[ ] UDP is the preferred over TCP for transferring a real-time voice over IP networks.
[ ] In a bus topology, each station on the network is connected to two other stations, forming a loop or ring.
[ ] IEEE international Telecommunication Union for creating protocols of internet.
[ ] TCP protocol is slower than UDP?
arrow_forward
6.
On an Ethernet network, this is the unit of data that is transmitted between network points. It has explicit minimum and maximum lengths and a set of required pieces of information that must appear within it.
a.
data-chunk
b.
frame
c.
data packet
d.
packet
arrow_forward
The data plane and the control plane are two different parts of the network layer. What is the difference?
arrow_forward
Match the following
List-l
(Protocol Layers)
A- Application layer
B- Network layer
C- Data link layer
List-ll
(Type of address used)
1- IP address
2- Port address
3- MAC address
arrow_forward
Paralell computing
Consider the following: the latency of an interconnect is 2 seconds, and the bandwidth is 64 bytes per second.
Calculate the time it takes to transmit a message of size 256 bytes ?
arrow_forward
What is the difference between a virtual channel and a virtual path?
arrow_forward
A network has a data transmission bandwidth of 20 × 106 bits per second. It uses CSMA/CD in the MAC layer. The maximum signal propagation time from one node to another node is 40 microseconds. The minimum size of a frame in the network is(bytes).
arrow_forward
What does the transport layer use to make sure that a message is reassembled correctly on the receiving device?
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you
Systems Architecture
Computer Science
ISBN:9781305080195
Author:Stephen D. Burd
Publisher:Cengage Learning
Fundamentals of Information Systems
Computer Science
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Principles of Information Security (MindTap Cours...
Computer Science
ISBN:9781337102063
Author:Michael E. Whitman, Herbert J. Mattord
Publisher:Cengage Learning
Related Questions
- Computer Networks:arrow_forwardWhich of the following are data-link layer issues? a) routing b) flow control c) synchronization d) framing (b) and (c) only. (b) and (d) only. (a), (b) and (c) only. (a) and (b) only. (a), (b), (c) and (d). (b), (c) and (d) only.arrow_forward[ ] As the data packet moves from the lower to the upper layers, headers are added. [ ] Every network device implements the transport layer. [ ] In the Ring topology, each computer acts as repeater make error detection and boosts the signal before sending it on. [ ] In bus topology network media is inexpensive and easy to work with, so it is easier to trouble shoot than other topology. [ ] Error control only detects errors [ ] Ethernet is a LAN so it is placed in the second layer of the OSI reference model. [ ] UDP provides connectionless service and delivers packets quickly. In case of packet loss, UDP does not provide retransmission. [ ] UDP is the preferred over TCP for transferring a real-time voice over IP networks. [ ] In a bus topology, each station on the network is connected to two other stations, forming a loop or ring. [ ] IEEE international Telecommunication Union for creating protocols of internet. [ ] TCP protocol is slower than UDP?arrow_forward
- 6. On an Ethernet network, this is the unit of data that is transmitted between network points. It has explicit minimum and maximum lengths and a set of required pieces of information that must appear within it. a. data-chunk b. frame c. data packet d. packetarrow_forwardThe data plane and the control plane are two different parts of the network layer. What is the difference?arrow_forwardMatch the following List-l (Protocol Layers) A- Application layer B- Network layer C- Data link layer List-ll (Type of address used) 1- IP address 2- Port address 3- MAC addressarrow_forward
- Paralell computing Consider the following: the latency of an interconnect is 2 seconds, and the bandwidth is 64 bytes per second. Calculate the time it takes to transmit a message of size 256 bytes ?arrow_forwardWhat is the difference between a virtual channel and a virtual path?arrow_forwardA network has a data transmission bandwidth of 20 × 106 bits per second. It uses CSMA/CD in the MAC layer. The maximum signal propagation time from one node to another node is 40 microseconds. The minimum size of a frame in the network is(bytes).arrow_forward
arrow_back_ios
arrow_forward_ios
Recommended textbooks for you
- Systems ArchitectureComputer ScienceISBN:9781305080195Author:Stephen D. BurdPublisher:Cengage LearningFundamentals of Information SystemsComputer ScienceISBN:9781337097536Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningPrinciples of Information Security (MindTap Cours...Computer ScienceISBN:9781337102063Author:Michael E. Whitman, Herbert J. MattordPublisher:Cengage Learning
Systems Architecture
Computer Science
ISBN:9781305080195
Author:Stephen D. Burd
Publisher:Cengage Learning
Fundamentals of Information Systems
Computer Science
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Principles of Information Security (MindTap Cours...
Computer Science
ISBN:9781337102063
Author:Michael E. Whitman, Herbert J. Mattord
Publisher:Cengage Learning