COSC 4325 test 2 review

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

With odd parity and a 7-bit ASCII code, 0110011, what is the parity bit?

1 (with margin: 0)

Convert decimal 126 to 7-bit binary number.

1,111,110

Which of the following is not given to a client computer when it is first installed on a TCP/IP network so that it has the appropriate routing/addressing information? 1. application layer address 2. subnet mask 3. its own IP address 4. IP address of its DNS server 5. IP address of a gateway, router, or a switch outside of its subnet

1. Application layer address

A client computer is typically assigned a data link layer address by a: 1. hardware manufacturer 2. software manufacturer 3. middleware manufacturer 4. network manager who configure a file in a computer's network layer software package 5. ISO

1. Hardware manufacurer

In a _________ , more than one data bit is changed by the error-causing condition. 1. burst error 2. data rate shift 3. Trellis-coded modulation 4. uniform distribution 5. amplitude key shift

1. burst error

Which of the following media is least susceptible to noise? 1. fiber optic cable 2. coaxial cable 3. twisted pair 4. unshielded twisted pair 5. shielded twisted pair

1. fiber optic cable.

_____________ is an effective way to prevent impulse noise, cross talk, and 1. intermodulation noise. 2. Shielding wires 3. Adding fluorescent lights 4. Adding repeaters to a circuit 5. Adding amplifiers to a circuit 6. Shorting a circuit

1. intermodulation noise

Media access control: 1. is not very important in point-to-point with full duplex configuration 2. is not very important in local area networks 3. is not very important in a point-to-point with a half duplex configuration 4. is not very important in a multipoint configuration does not control when computers transmit

1. is not very important in point-to-point with full duplex configuration

Cross-talk: 1. occurs when one circuit picks up signals in another 2. is always bothersome because it has a high signal strength 3. decreases with increased proximity of two wires 4. decreases during wet or damp weather 5. increases with lower frequency signals

1. occurs when one circuit picks up signals in another

Convert 128 into 8-bit binary number.

10,000,000

Convert decimal 191 into 8 bit binary number.

10,111,111

Convert decimal 192 into 8-bit binary number.

11,000,000

Convert decimal 223 into 8-bit binary number.

11,011,111

Convert binary 01111111 to decimal.

127

Convert binary 10000000 to decimal.

128

How many host addresses are available on a /28 network?

14

Convert binary 11000000 to decimal.

192

When a signal is reflected back to the transmitting equipment, it is called a(n) _________. 1. white noise 2. echo 3. crosstalk 4. attenuation 5. impulse noise

2. echo

Convert binary 11001101 to decimal.

205

Convert binary 11011011 to decimal.

219

Consider case study IV (Alpha Corp) on page 106. How many bits per second are generated by web accesses. Give your answer in whole number kbps.

267 (with margin: 0)

Consider case study IV (Alpha Corp) on page 106. How many bits per second are generated by both email and web applications? Give your answer in whole number kbps.

270 (with margin: 0)

A typical TCP segment has a _______ header of control information. 1. 32-bit 2. 64-bit 3. 20-byte 4. 190-bit 5. 32-byte

3. 20 Byte

____________ is not a function of a data link protocol. 1. Media access control 2. Message delineation 3. Amplitude shift keying 4. Indicating when a message starts and stops 5. Error control

3. Amplitude Shift Keying

The newer form of IP, version 6 (IPv6): 1. Is running out of address space to support the growth of the Internet 2. has a 20 byte header 3. has an increased address size from 32 bits to 128 bits 4. does not include version number in its header 5. does not include hop limit in its header

3. Has an increased address size from 32 bits to 128 bits

__________ is not an important function of the transport layer. 1. end-to-end delivery of the message 2. taking messages from the application layer 3. routing 4. breaking long messages into smaller segments 5. interfacing with the network layer

3. Routing

The primary source of error in data communications is: 1. echoes 2. intermodulation noise 3. spikes 4. attenuation 5. cross-talk

3. Spikes

Assume you have been allocated IP address of 208.55.67.0/24 and you create several subnets each with the prefix /29. How many subnets are possible?

32

A subnet mask of ___________ means that all computers with only the same first two bytes in their IPv4 addresses are on the same subnet. 1. 11111111.0.0.0 2. 255.255.255.0 3. 255.0.0.0 4. 255.255.0.0 5. 255.255.255.255

4. 255.255.0.0

A majority of routers use the following operating system: 1. Windows 95 2. Red Hat Linux 3. Windows Server 2008 4. Cisco Internetwork Operating System 5. Linksys OSI System

4. Cisco Internetwork Operating System

With _____________ messaging, each UDP segment makes its own way through the network without the use of sequence numbers or acknowledgements 1. frequency division 2. connection-oriented 3. PCMCIA 4. connectionless 5. application net

4. Connectionless

_______ is the dominant network protocol today and is in use in virtually every LAN and WAN in the world. 1. SDLC 2. SNA 3. IPX/SPX 4. TCP/IP 5. 25

4. TCP/ IP

Asynchronous transmission uses 7 bits for transmitting a character and 1 start bit and 1 parity bit for each character. What is the transmission efficiency in % (rounded to the nearest whole number)?

78 (with margin: 0)

Assume you have been allocated IP address of 208.55.67.0/24 and you create several subnets each with the prefix /29. What is the increment value for each subnet? Remember, the increment value (see page 155 of text) is the amount by which the subnet address increases from one subnet to the next.

8

We transmit 1000 bytes using Ethernet 802.3ac frame (see Figure 4.10a). Assume VLAN tag is not used and the control field is 1 byte long. Ignore interframe spacing. What is the transmission efficiency? Round your answer to the nearest whole number percentage.

97 (with margin: 0)

A multicast message can be used to send a message to a maximum of two other computers.

False

A routing protocol used inside an autonomous system is called an exterior routing protocol.

False

Contention MAC approaches work better in a large network with high usage.

False

IP is responsible for error-free delivery of packets on a TCP/IP network.

False

Impulse noise is caused by the thermal agitation of electrons.

False

Only the sender of a data transmission needs to be concerned about the rules or protocols that govern how it communicates with the receiver.

False

The network layer address for IP is ten bytes long when using IPv4.

False

The source port identifier in the TCP header tells the TCP software on the destination computer, which application on the destination it should pass the packet to.

False

The transport layer routes messages through the network selecting the best path from the source to the destination station.

False

An autonomous system is a network operated by one organization.

True

An example of an application layer address is www.indiana.edu (Links to an external site.).

True

Attenuation refers to the loss of signal strength.

True

Contention is commonly used with Ethernet local area networks.

True

If a computer transmits a message containing "ABC" and the destination computer receives "abc" as the message, the message is corrupted.

True

Routing is the process of determining the path or route through the network that a particular packet will follow from the sender to the recipient.

True

TCP includes a sequence number so that the packets can be reassembled at the destination in the correct order.

True

The data link layer accepts messages from the network layer and controls the hardware that transmits them.

True

With roll-call polling, a server polls clients in a consecutive, pre-arranged priority list.

True


Ensembles d'études connexes

Anatomy and Physiology SBIO-221B

View Set

Mise En Place/ Knife Cuts/Recipe Convertions

View Set

Smartbook Chapter 24: Urinary Stystem

View Set