Data Telecom Final pt 2 Ch 4-6

Ace your homework & exams now with Quizwiz!

Networks requirements can be divided into mandatory, desirable and wish list requirements. True False

True

The most expensive part of the network today is the staff who design, operate, and maintain it t/f

True

The three fundamental approaches to routing are centralized, static routing, and dynamic routing t/f

True

Today, many organizations design networks using the building block approach t/f

True

With roll-call polling, a server polls clients in a consecutive, pre-arranged priority list. True False

True

The network architecture component that is sometimes referred to as the distribution layer is the

Building backbone

IPv6 is based upon _________ -byte addresses. a. 32 b. 24 c. 4 d. 16 e. 8

D

Server name resolution is done using the

Domain Name Service

IPv4 provides ___________ IP addresses.

4.3 billion

With _____________ messaging, each UDP segment makes its own way through the network without the use of sequence numbers or acknowledgements. frequency division connection-oriented PCMCIA connectionless application net

connectionless

IP addresses from 224 to 239 belong to Class D and are reserved for the government t/f

False

The data link protocol SDLC does not have any error detection capabilities. True False

False

The data link protocol SDLC does not have any error detection capabilities. t/f

False

The network layer provides guaranteed end-to-end delivery of the message. True False

False

There are four fundamental approaches to routing: centralized, static routing, dynamic routing, and monitor routing t/f

False

There are three commonly used controlled access techniques: access requests, access demands, and polling t/f

False

When using dynamic routing, routing decisions are always made by a central host or server t/f

False

With contention, a computer does not have to wait before it can transmit. A computer can transmit at any time. t/f

False

A client computer is typically assigned a data link layer address by a:

Hardware Manufacturer

The ping command uses the most basic interior routing protocol on the Internet, which is the

Internet Control Message Protocol

Which of the following is true about the data link protocol, PPP?

It is commonly used in Wans

Which of the following is true with respect to the data link layer?

It performs error detection.

-------- is the process of sending a signal to a client that gives its permission to transmit or asks it to receive

Polling

Which of the following is not an error detection method used in the data link layer?

Pulse code checking

The traditional network design approach does not work well for ----- networks

Rapidly growing

_____________ is an effective way to prevent impulse noise, cross talk, and intermodulation noise. Shielding wires Adding fluorescent lights Adding repeaters to a circuit Adding amplifiers to a circuit Shorting a circuit

Shielding wires

In designing LAN networks, network designers tend to err on the side of providing for more capacity than what is currently necessary t/f

True

In technology design, a network designer looks at available technologies to see which options will satisfy users' needs. t/f

True

The data link layer accepts messages from the network layer and controls the hardware that transmits them. t/f

True

The data link protocol, PPP is commonly used in WANs. True False

True

The emphasis is on network designs that reduce staff time needed to operate them t/f

True

When the signals from two circuits combine to form a new signal that falls into a frequency band reserved for another signal, this is called intermodulation noise. t/f

True

The three fundamental approaches to routing are:

centralized, static routing, and dynamic routing

The network architecture component which contains the organization's servers is called the LAN building backbone data center enterprise edge WAN

data center

The network architecture component that is a special LAN with a group of servers that enables electronic data exchange of between the organization and the external entities it does business with is called the

e-commerce edge

Cyclical redundancy check is one of the most popular polynomial error-checking schemes t/f

True

With contention:

computers wait until the circuit is free before they send data

A subnet mask of ----- means that all computers with only the same first two bytes in their IPv4 addresses are on the same subnet.

255.255.0.0

----- address range is reserved for a computer to communicate with itself and is called the loopback

127

Server name resolution is done using the: Address Resolution Protocol Border Gateway Protocol Internet Control Message Protocol Routing Information Protocol Domain Name Service

Domain Name Service

A subnet mask of 255.0.0.0 means that all computers with only the same first two bytes in their IPv4 addresses are on the same subnet. True False

False

A subnet mask of 255.0.0.0 means that all computers with only the same first two bytes in their IPv4 addresses are on the same subnet. t/f

False

A subnet mask of 255.255.0.0 means that all computers with only the same first two bytes in their x IPv4 addresses are on the same subnet. t/f

False

FTP is not a protocol used at the application layer t/f

False

The network architecture component which enables users to access the network is the

LAN

The goal of the needs analysis step is to produce ------- or a statement of the network elements necessary to meet the needs of the organization.

Logical network design

The data link layer uses the ________ to recognize the source and destination addresses. MAC address IP address URL Email address Local router

MAC address

Which of the following is not directly contributing to the dramatic increase in network traffic today?

Much of the video processing on computers can be off-loaded from the CPU onto high-end video cards.

One drawback to dynamic routing is: Routing usually does not reflect changing network conditions, such as computers that are overloaded by many messages It cannot be used with non-government networks The transmission of status information "wastes" network capacity that could be used to send user messages It is the job of the network manager, not the computers or devices themselves, to maintain the routing table. It requires less processing by each computer than static routing.

The transmission of status information "wastes" network capacity that could be used to send user messages

A traditional network design approach follows a structured systems analysis and design process similar to that used in building applications. True False

True

An autonomous system is a network operated by one organization. t/f

True

Because there is a limit on the length of a frame that the data link layer can transmit from node to node, the transport layer breaks up the message from the application layer into several smaller segments. t/f

True

Capacity planning is used to design circuit capacity t/f

True

ARQ means that:

a receiver that detects an error in a message simply asks the sender to retransmit t message until it is received without error

In a ------ more than one data bit is changed by the error-causing condition

burst error

Asynchronous transmission:

each character is transmitted independently of all other characters

Synchronous transmission:

is used to transmit a "frame" or "packet" of data at a time.

Optical media is:

less likely to suffer from noise than electrical media

The two sublayers of the data link layer consist of the media access control sublayer and the

logical link control sublayer

The two sublayers of the data link layer consist of the media access control sublayer and the________. logical link control sublayer network control sublayer session sublayer physical sublayer transport sublayer

logical link control sublayer

Estimating the cost of a network is data processing hardware is --------- complex than estimating the cost of one new piece of data processing hardware

much more

The building block design approach is sometimes called

narrow and deep

TCP/IP: is the least commonly used network protocol for LANs because it cannot be combined with Ethernet performs packetizing, as well as routing and addressing functions is not very efficient and is prone to errors is compatible with only one type of data link protocol, SDLC refers to Telephone Control Procedures/Inter-exchange Procedures

performs packetizing, as well as routing and addressing functions

Assume that more than one application program is using the same communications line on a particular computer. To be able to decide to which application program a message should be delivered on this computer, TCP/IP relies on the

port address

The _____________ is used by a computer to determine how messages will travel through the network. routing table configuration listing linking loader bus header assignment list file allocation table

routing table

Once the needs have been defined in the logical network design, the next step is to develop a(n) __________. application baseline technology design turnpike design backplane design

technology design

To establish circuit loading, the designer usually starts with the

total characters transmitted per day on each circuit, or, if possible, the number of characters transmitted per two-second intervals if peaks must be met

In general, controlled approaches: work better than contention approaches for small networks that have low usage. work better than contention approaches for large networks that have high usage. work better than contention approaches for all sizes of networks. do not require a host, server, or active monitor to assign media access control. have many collisions.

work better than contention approaches for large networks that have high usage.


Related study sets

Business Ethics and Organizational Culture

View Set

COM 110 A01 Midterm/Final Review

View Set

Male Reproductive and Genitourinary Tumors

View Set

Cardiovascular Medications NCLEX

View Set

Northwestern Mutual Life Insurance Exam

View Set

Chapter 1 - Taking Risks and Making Profits within the Dynamic Business Environment

View Set

8:2 - Treating Tobacco Dependence: Addiction & Tobacco Effects

View Set

sampling distribution of the sample mean

View Set

English4: Middle Ages Test Review

View Set