CH 4&5 T_F Key

docx

School

California State University, Fullerton *

*We aren’t endorsed by this school

Course

409

Subject

Electrical Engineering

Date

Jun 21, 2024

Type

docx

Pages

10

Uploaded by MagistrateJellyfish20290

Report
1. Media access controls refer to the need to control when computers transmit. a. True b. False 2. The data link layer accepts messages from the network layer and controls the hardware that transmits them. a. True b. False 3. Only the sender of a data transmission needs to be concerned about the rules or protocols that govern how it communicates with the receiver. a. True b. False 4. Most computer networks managed by a host mainframe computer tend to use a form of media access control called contention. a. True b. False 5. Polling is the process of permitting all clients to transmit or receive at any time. a. True b. False 6. With roll-call polling, a server polls clients in a consecutive, pre-arranged priority list. a. True b. False 7. Token passing is a term that refers to hub polling, in which one computer starts a poll and passes it to the next computer on a multipoint circuit. a. True b. False 8. With contention, a computer does not have to wait before it can transmit. A computer can transmit at any time. a. True b. False 9. Contention is widely used with Ethernet local area networks. a. True b. False 10. Controlled access MAC approaches work well in a large network with high usage. a. True b. False 11. There are three commonly used controlled access techniques: access requests, access demands, and polling. a. True b. False 12. The two categories of network errors are lost data and delimited data. a. True b. False 13. If a computer transmits a message containing “ABC” and the destination computer receives “abc” as the message, the message is corrupted. a. True b. False 14. Data transmission errors typically are distributed uniformly in time. a. True b. False 15. Undesirable stray electrical voltage can cause data communication errors. a. True b. False
16. Gaussian noise is a special type of attenuation. a. True b. False 17. The thermal agitation of electrons causes impulse noise. a. True b. False 18. Crosstalk occurs when the signal transmitted on one circuit or channel of a transmission system creates an undesired effect in another circuit or channel. a. True b. False 19. Attenuation refers to the loss of signal strength. a. True b. False 20. When the signals from two circuits combine to form a new signal that falls into a frequency band reserved for another signal, this is called intermodulation noise. a. True b. False 21. The physical and data link layers of wired Ethernet have been refined over the years as a collection of standards under the IEEE 802.3 workgroup. a. True b. False 22. The distance between repeaters or amplifiers on a telephone circuit is determined by the amount of power gained per unit length of the transmission. a. True b. False 23. When we amplify the signal on an analog circuit, we also amplify any noise that is present on the circuit. a. True b. False 24. For effective error detection and correction, extra error detection “data” must be included with each message a. True b. False 25. In an odd parity-checking scheme, the parity bit is set to make the total number of ones in the byte (including the parity bit) an even number. a. True b. False 26. Parity checking can only detect an error when an even number of bits are switched. a. True b. False 27. Cyclical redundancy check is one of the most popular polynomial error-checking schemes. a. True b. False 28. The simplest method for error correction is retransmission. a. True b. False 29. Another term for continuous ARQ is sliding window. a. True b. False 30. One type of forward error correction is the Hamming code. a. True b. False
31. Forward error correction is commonly used in satellite transmission. a. True b. False 32. HDLC is very similar to the SDLC synchronous data link protocol. a. True b. False 33. Overhead bits are used for error checking and marking the start and end of characters and packets. a. True b. False 34. Transmission efficiency refers to the percentage of bits transmitted without errors. a. True b. False 35. The data link layer accepts streams of bits from the application layer. a. True b. False 36. The data link layer is responsible for encoding the bit-stream as a series of electronic voltages. a. True b. False 37. The data link layer performs error detection. a. True b. False 38. The data link layer performs routing functions. a. True b. False 39. The data link layer organizes data from the physical layer and passes these coherent messages directly to the application layer. a. True b. False 40. Media access control is not very important in point-to-point with full duplex configuration. a. True b. False 41. Media access control is not very important in local area networks. a. True b. False 42. Media access control is not very important in a point-to-point with a half-duplex configuration. a. True b. False 43. Media access control is not very important in a multipoint configuration. a. True b. False 44. Media access control does not control when computers transmit. a. True b. False 45. Roll call polling cannot be modified to increase priority of clients or terminals. a. True b. False 46. Roll call polling does not require a server, host, or special device that performs the polling. a. True b. False 47. Roll call polling is also called token passing. a. True b. False
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
48. Roll call polling is a type of contention approach to media access control. a. True b. False 49. Roll call polling typically involves some waiting because the server has to wait for a response from the polled client or terminal. a. True b. False 50. In general, controlled approaches work better than contention approaches for small networks that have low usage. a. True b. False 51. In general, controlled approaches work better than contention approaches for large networks that have high usage. a. True b. False 52. In general, controlled approaches work better than contention approaches for all sizes of networks. a. True b. False 53. In general, controlled approaches do not require a host, server, or active monitor to assign media access control. a. True b. False 54. In general, controlled approaches have many collisions. a. True b. False 55. Using parity, the probability for detecting an error, given that one has occurred, is about 50% for either even or odd parity. a. True b. False 56. Using parity, the probability for detecting an error, given that one has occurred, is about 25% for either even or odd parity. a. True b. False 57. Using parity, the probability for detecting an error, given that one has occurred, is about 70% for even parity and 30% for odd parity. a. True b. False 58. Using parity, the probability for detecting an error, given that one has occurred, is about 30% for even parity and 70% for odd parity. a. True b. False 59. Using parity, the probability for detecting an error, given that one has occurred, is about 20% for either even or odd parity. a. True b. False 60. Using parity, the probability for detecting an error, given that one has occurred, is about 100% for either even or odd parity. a. True b. False 61. Synchronous transmission cannot be used on multipoint circuits. a. True b. False
62. Synchronous transmission is used to send one character at a time. a. True b. False 63. Synchronous transmission uses start bits before each character to be sent. a. True b. False 64. Synchronous transmission uses stop bits after each character to be sent. a. True b. False 65. Synchronous transmission is used to transmit a “frame” or “packet” of data at a time. a. True b. False 66. The data link protocol SDLC is a client-server protocol developed by Compaq in 1996. a. True b. False 67. The data link protocol SDLC transmits each character independently of one another and includes start and stop bits for each character sent. a. True b. False 68. The data link protocol SDLC uses a special bit pattern called a flag at the beginning and end of every frame (or packet). a. True b. False 69. The data link protocol SDLC does not have any error detection capabilities. a. True b. False 70. The data link protocol SDLC It uses a contention media access control protocol and is used in most LANs today. a. True b. False 71. The data link protocol, Ethernet (IEEE 802.3) is not very popular. a. True b. False 72. The data link protocol, Ethernet (IEEE 802.3) is a bit-oriented protocol. a. True b. False 73. The data link protocol, Ethernet (IEEE 802.3) uses block check characters for error detection. a. True b. False 74. Regarding the data link protocol, Ethernet (IEEE 802.3), newer version permits jumbo frames. a. True b. False 75. The data link protocol, Ethernet (IEEE 802.3) uses parity bits for error detection. a. True b. False 76. The data link protocol, PPP is commonly used in WANs. a. True b. False 77. The data link protocol, PPP is a bit-oriented protocol. a. True b. False
78. The data link protocol, PPP uses block check characters for error detection. a. True b. False 79. The data link protocol, PPP was developed in the 1960s. a. True b. False 80. The data link protocol, PPP uses parity bits for error detection. a. True b. False 81. TCP/IP is a data link protocol that is used on the Internet. a. True b. False 82. The network layer sits directly between the application layer and the data link layer in the Internet five-layer network model. a. True b. False 83. The network layer provides guaranteed end-to-end delivery of the message. a. True b. False 84. The transport layer routes messages through the network selecting the best path from the source to the destination station. a. True b. False 85. The transport layer process running on the destination computer, reassembles the fragmented application message before passing it up to the application layer a. True b. False 86. TCP is the network layer protocol used on the Internet today. a. True b. False 87. IP is responsible for error-free delivery of packets on a TCP/IP network. a. True b. False 88. The TCP portion of TCP/IP performs linking to the application layer. a. True b. False 89. The source port identifier in the TCP header tells the TCP software on the destination computer which application on the destination it should pass the packet to. a. True b. False 90. TCP includes a sequence number so that the packets can be reassembled at the destination in the correct order. a. True b. False 91. The latest version of IP is IPv7, which increases the address space from 128 bits to 256 bits. a. True b. False 92. A destination port number at the transport layer identifies which application on a computer should receive the data transmission. a. True b. False
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
93. Source port address is the logical address used to identify the application that is sending the data. a. True b. False 94. The standard port number for Telnet is 53. a. True b. False 95. Because there is a limit on the length of a frame that the data link layer can transmit from node to node, the transport layer breaks up the message from the application layer into several smaller segments. a. True b. False 96. Connectionless routing sets up a TCP connection, or virtual circuit between a sender and receiver. a. True b. False 97. TCP/IP operates only as connection-oriented. a. True b. False 98. Quality of Service routing is a special type of routing in which different connections are assigned different priorities. a. True b. False 99. An example of an application layer address is www.indiana.edu . a. True b. False 100. The network layer address for IP is ten bytes long when using IPv4. a. True b. False 101. The data link layer address is generally encoded in a network card by the card’s manufacturer. a. True b. False 102. IPv4 addresses offer unlimited opportunity for expansion and growth on the Internet. a. True b. False 103. Subnet masks tell computers what part of an IP address is to be used to determine whether a destination is in the same subnet or in a different subnet. a. True b. False 104. The most common protocol for dynamic addressing in TCP/IP networks is the Dynamic Host Configuration Protocol. a. True b. False 105. Translating an application layer address to a network layer address and finally to a data link layer address is called address resolution. a. True b. False 106. Part of the function of address resolution is translating the application layer address of the destination into a network layer address. a. True b. False
107. Domain Name Servers provide the resolution of application layer addresses to their corresponding network layer address. a. True b. False 108. An Address Resolution Protocol message is broadcast to all computers in a subnet to find the data link layer address of a host whose IP address is known but whose MAC address is unknown. a. True b. False 109. Routing is the process of determining the path or route through the network that a particular message will follow from the sender to the recipient. a. True b. False 110. There are four fundamental approaches to routing: centralized, static routing, dynamic routing, and monitor routing. a. True b. False 111. When using dynamic routing, routing decisions are always made by a central host or server. a. True b. False 112. A hop in a routing calculation is defined as one link or circuit. a. True b. False 113. An autonomous system is a network operated by one organization. a. True b. False 114. A routing protocol used inside an autonomous system is called an exterior routing protocol. a. True b. False 115. The Enhanced Interior Gateway Routing Protocol is an interior routing protocol originally developed by Cisco. a. True b. False 116. A multicast message can be used to send a message to a maximum of two other computers. a. True b. False 117. Connections on a router, to the Internet and other routers for example, are called applications. a. True b. False 118. Another term for stop-and-wait ARQ is sliding window. a. True b. False 119. HTTP is not a protocol used at the application layer. a. True b. False 120. SMTP is not a protocol used at the application layer. a. True b. False 121. FTP is not a protocol used at the application layer. a. True b. False
122. Telnet is not a protocol used at the application layer. a. True b. False 123. UDP is not a protocol used at the application layer. a. True b. False 124. A subnet mask of 11111111.0.0.0 means that all computers with only the same first two bytes in their IPv4 addresses are on the same subnet. a. True b. False 125. A subnet mask of 255.255.255.255 means that all computers with only the same first two bytes in their IPv4 addresses are on the same subnet. a. True b. False 126. A subnet mask of 255.255.255.0 means that all computers with only the same first two bytes in their IPv4 addresses are on the same subnet. a. True b. False 127. A subnet mask of 255.0.0.0 means that all computers with only the same first two bytes in their IPv4 addresses are on the same subnet. a. True b. False 128. A subnet mask of 255.255.0.0 means that all computers with only the same first two bytes in their IPv4 addresses are on the same subnet. a. True b. False 129. The three fundamental approaches to routing are circuitous, flat, and direct routing. a. True b. False 130. The three fundamental approaches to routing are connectionless, static, and connection- oriented. a. True b. False 131. The three fundamental approaches to routing are subordinate, master, and insubordinate routing. a. True b. False 132. The three fundamental approaches to routing are host, client, and client-server routing. a. True b. False 133. The three fundamental approaches to routing are centralized, static routing, and dynamic routing. a. True b. False 134. Circuitous routing is a type of dynamic routing. a. True b. False 135. Centralized routing is a type of dynamic routing. a. True b. False 136. Link state is a type of dynamic routing. a. True
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
b. False 137. X.25 routing is a type of dynamic routing. a. True b. False 138. IP addresses from 224 to 239 belong to Class D and are reserved for multicasting. a. True b. False 139. IP addresses from 224 to 239 belong to Class D and are reserved for education. a. True b. False 140. IP addresses from 224 to 239 belong to Class D and are reserved for the government. a. True b. False 141. IP addresses from 224 to 239 belong to Class D and are reserved for international firms. a. True b. False 142. IP addresses from 224 to 239 belong to Class D and are reserved for private networks. a. True b. False