Data Telecom Final pt 2 Ch 4-6
Networks requirements can be divided into mandatory, desirable and wish list requirements. True False
True
The most expensive part of the network today is the staff who design, operate, and maintain it t/f
True
The three fundamental approaches to routing are centralized, static routing, and dynamic routing t/f
True
Today, many organizations design networks using the building block approach t/f
True
With roll-call polling, a server polls clients in a consecutive, pre-arranged priority list. True False
True
The network architecture component that is sometimes referred to as the distribution layer is the
Building backbone
IPv6 is based upon _________ -byte addresses. a. 32 b. 24 c. 4 d. 16 e. 8
D
Server name resolution is done using the
Domain Name Service
IPv4 provides ___________ IP addresses.
4.3 billion
With _____________ messaging, each UDP segment makes its own way through the network without the use of sequence numbers or acknowledgements. frequency division connection-oriented PCMCIA connectionless application net
connectionless
IP addresses from 224 to 239 belong to Class D and are reserved for the government t/f
False
The data link protocol SDLC does not have any error detection capabilities. True False
False
The data link protocol SDLC does not have any error detection capabilities. t/f
False
The network layer provides guaranteed end-to-end delivery of the message. True False
False
There are four fundamental approaches to routing: centralized, static routing, dynamic routing, and monitor routing t/f
False
There are three commonly used controlled access techniques: access requests, access demands, and polling t/f
False
When using dynamic routing, routing decisions are always made by a central host or server t/f
False
With contention, a computer does not have to wait before it can transmit. A computer can transmit at any time. t/f
False
A client computer is typically assigned a data link layer address by a:
Hardware Manufacturer
The ping command uses the most basic interior routing protocol on the Internet, which is the
Internet Control Message Protocol
Which of the following is true about the data link protocol, PPP?
It is commonly used in Wans
Which of the following is true with respect to the data link layer?
It performs error detection.
-------- is the process of sending a signal to a client that gives its permission to transmit or asks it to receive
Polling
Which of the following is not an error detection method used in the data link layer?
Pulse code checking
The traditional network design approach does not work well for ----- networks
Rapidly growing
_____________ is an effective way to prevent impulse noise, cross talk, and intermodulation noise. Shielding wires Adding fluorescent lights Adding repeaters to a circuit Adding amplifiers to a circuit Shorting a circuit
Shielding wires
In designing LAN networks, network designers tend to err on the side of providing for more capacity than what is currently necessary t/f
True
In technology design, a network designer looks at available technologies to see which options will satisfy users' needs. t/f
True
The data link layer accepts messages from the network layer and controls the hardware that transmits them. t/f
True
The data link protocol, PPP is commonly used in WANs. True False
True
The emphasis is on network designs that reduce staff time needed to operate them t/f
True
When the signals from two circuits combine to form a new signal that falls into a frequency band reserved for another signal, this is called intermodulation noise. t/f
True
The three fundamental approaches to routing are:
centralized, static routing, and dynamic routing
The network architecture component which contains the organization's servers is called the LAN building backbone data center enterprise edge WAN
data center
The network architecture component that is a special LAN with a group of servers that enables electronic data exchange of between the organization and the external entities it does business with is called the
e-commerce edge
Cyclical redundancy check is one of the most popular polynomial error-checking schemes t/f
True
With contention:
computers wait until the circuit is free before they send data
A subnet mask of ----- means that all computers with only the same first two bytes in their IPv4 addresses are on the same subnet.
255.255.0.0
----- address range is reserved for a computer to communicate with itself and is called the loopback
127
Server name resolution is done using the: Address Resolution Protocol Border Gateway Protocol Internet Control Message Protocol Routing Information Protocol Domain Name Service
Domain Name Service
A subnet mask of 255.0.0.0 means that all computers with only the same first two bytes in their IPv4 addresses are on the same subnet. True False
False
A subnet mask of 255.0.0.0 means that all computers with only the same first two bytes in their IPv4 addresses are on the same subnet. t/f
False
A subnet mask of 255.255.0.0 means that all computers with only the same first two bytes in their x IPv4 addresses are on the same subnet. t/f
False
FTP is not a protocol used at the application layer t/f
False
The network architecture component which enables users to access the network is the
LAN
The goal of the needs analysis step is to produce ------- or a statement of the network elements necessary to meet the needs of the organization.
Logical network design
The data link layer uses the ________ to recognize the source and destination addresses. MAC address IP address URL Email address Local router
MAC address
Which of the following is not directly contributing to the dramatic increase in network traffic today?
Much of the video processing on computers can be off-loaded from the CPU onto high-end video cards.
One drawback to dynamic routing is: Routing usually does not reflect changing network conditions, such as computers that are overloaded by many messages It cannot be used with non-government networks The transmission of status information "wastes" network capacity that could be used to send user messages It is the job of the network manager, not the computers or devices themselves, to maintain the routing table. It requires less processing by each computer than static routing.
The transmission of status information "wastes" network capacity that could be used to send user messages
A traditional network design approach follows a structured systems analysis and design process similar to that used in building applications. True False
True
An autonomous system is a network operated by one organization. t/f
True
Because there is a limit on the length of a frame that the data link layer can transmit from node to node, the transport layer breaks up the message from the application layer into several smaller segments. t/f
True
Capacity planning is used to design circuit capacity t/f
True
ARQ means that:
a receiver that detects an error in a message simply asks the sender to retransmit t message until it is received without error
In a ------ more than one data bit is changed by the error-causing condition
burst error
Asynchronous transmission:
each character is transmitted independently of all other characters
Synchronous transmission:
is used to transmit a "frame" or "packet" of data at a time.
Optical media is:
less likely to suffer from noise than electrical media
The two sublayers of the data link layer consist of the media access control sublayer and the
logical link control sublayer
The two sublayers of the data link layer consist of the media access control sublayer and the________. logical link control sublayer network control sublayer session sublayer physical sublayer transport sublayer
logical link control sublayer
Estimating the cost of a network is data processing hardware is --------- complex than estimating the cost of one new piece of data processing hardware
much more
The building block design approach is sometimes called
narrow and deep
TCP/IP: is the least commonly used network protocol for LANs because it cannot be combined with Ethernet performs packetizing, as well as routing and addressing functions is not very efficient and is prone to errors is compatible with only one type of data link protocol, SDLC refers to Telephone Control Procedures/Inter-exchange Procedures
performs packetizing, as well as routing and addressing functions
Assume that more than one application program is using the same communications line on a particular computer. To be able to decide to which application program a message should be delivered on this computer, TCP/IP relies on the
port address
The _____________ is used by a computer to determine how messages will travel through the network. routing table configuration listing linking loader bus header assignment list file allocation table
routing table
Once the needs have been defined in the logical network design, the next step is to develop a(n) __________. application baseline technology design turnpike design backplane design
technology design
To establish circuit loading, the designer usually starts with the
total characters transmitted per day on each circuit, or, if possible, the number of characters transmitted per two-second intervals if peaks must be met
In general, controlled approaches: work better than contention approaches for small networks that have low usage. work better than contention approaches for large networks that have high usage. work better than contention approaches for all sizes of networks. do not require a host, server, or active monitor to assign media access control. have many collisions.
work better than contention approaches for large networks that have high usage.