Define line configuration and give its types

1 Answer

Answer :

It refers the way two or more communication devices attach to a link.  
A network consists of 2 or more computers directly connected by a physical medium.  Types:  
i. Point to point – physical links are limited to a pair of nodes.  
ii. Multipoint – more than two nodes share a single physical link.

Related questions

Description : Find out the components of DHCP: 1) A protocol that delivers host-specific configuration parameters from a server to a host. 2) The client determines its own hardware address; this is normally in a ROM on the hardware. 3) ... or permanent network addresses to hosts. A. 1,2 B. 1,3 C. 2,3 D. 1,2,3

Last Answer : B. 1,3

Description : What is the process of copying software programs from secondary storage mediato the hard disk called? (A) Configuration (B) Download (C) Storage (D) Upload (E) Installation

Last Answer : Upload

Description : What cangreatly reduce TCP/IP configuration problems? A. WINS Server B. WINS Proxy C. DHCP Server D. PDC E. None of the above

Last Answer : DHCP Server

Description : State whether the following is True or False. i) In bus topology, heavy Network traffic slows down the bus speed. ii) It is multipoint configuration. A) True, True B) B) True, False C) False, True D) False, False

Last Answer : A) True, True

Description : Which of the following is a transport layer protocol? a. stream control transmission protocol b. internet control message protocol c. neighbor discovery protocol d. dynamic host configuration protocol

Last Answer : a. stream control transmission protocol

Description : Which operational mode/s of HDLC support/s the balanced configuration by governing point to point link connectivity in addition to the primary as well as secondary functions performed by the station? a. NRM b. ABM c. Both a & b d. None of the above

Last Answer : b. ABM

Description : At the time Linux 2.0 kernel configuration the option…………………... adds TCP/IP networking to the kernel. A. CONFIG_IP_ACCT B. CONFIG_INET C. CONFIG_INET_PCTCP D. CONFIG_IP_FORWARD

Last Answer : B. CONFIG_INET

Description : . In a kernel configuration feature, . if ……………...is selected, the dynamically loadable module is loaded the first time a call is made to the kernel that requires the module. A. "m" B. "Y" C. "n" D. "r"

Last Answer : A. "m"

Description : The …………… command customizes the kernel configuration and generates the files needed to compile and link the kernel. A. ping B. ifconfig C. make config D. finger

Last Answer : C. make config

Description : The kernel configuration file is normally changed only when you wish to: A. Produce a smaller, more efficient kernel by removing unneeded items. B. Add a new device C. Modify a system parameter D. all of the above.

Last Answer : D. all of the above.

Description : The …………………... command can set or display the configuration values for a network interface. A. ping B. traceroute C. ifconfig D. finger

Last Answer : C. ifconfig

Description : DHCP stands for……………………………….. A. Dynamic Host Control Protocol B. Diskless Hosts Control protocol C. Diskless Hosts Configuration protocol D. Dynamic Host configuration Protocol

Last Answer : D. Dynamic Host configuration Protocol

Description : ……………………………. extends …………………………. to provide the full set of configuration parameters defined in the Requirements for Internet Hosts RFC. A. DHCP, BOOTP B. BOOTP, DHCP C. RARP, BOOTP D. DHCP, RARP

Last Answer : A. DHCP, BOOTP

Description : Which of the following is a transport layer protocol? A. stream control transmission protocol B. internet control message protocol C. neighbor discovery protocol D. dynamic host configuration protocol

Last Answer : A. stream control transmission protocol

Description : State weather the following statement is true or false for Sendmail. 1).Sendmail is a command-line tool designed for most UNIX-like operating systems. 2).It define a method of transferring mail, and acts as a client/server ... . false C. 1. false, 2. false, 3. false D. 1. true, 2. true, 3. false

Last Answer : A. 1. True, 2. False, 3. true

Description : Define Error Detection and Correction. Mention the types of errors.

Last Answer : Data can be corrupted during transmission. For reliable communication, errors must be detected and corrected. Single bit error: The only one bit of a given data unit (such as byte character/data unit or packet) is ... error: 2 or more bits in the data unit have changed from 1 to 0 from 0 to 1.

Description : Define topology and mention the types of topologies

Last Answer : Topology defines the physical or logical arrangement of links in a network. Types of topology : - Mesh - Star - Tree - Bus - Ring

Description : The two basic types of record-access methods are a. Sequential and random b. Sequential and indexed c. Direct and immediate d. On-line and real time

Last Answer : Sequential and random

Description : Prostaglandins: a. contains 20 carbon atoms b. are unsaturated fatty acids containing a cyclopentane ring c. the different types of prostaglandins are classified according to the configuration of the cyclopentane ring d. all above

Last Answer : all above

Description : In________framing, we need adelimiter (flag) to define the boundary of two frames. A) fixed-size B) variable-size C) standard D) none of the above

Last Answer : variable-size

Description : In IGMP, the general query message ___________________ group. A) doesnot define a particular B) explicitly defines a C) candefine more thanone D) noneof the above

Last Answer : doesnot define a particular

Description : It is more accurate to define a _____ as a variety of different recordtypes that aretreated as asingle unit A. Database B. Table C. Record D. Flat File E. None of the above

Last Answer : Database

Description : There arecertain packages that allow people to define data items, place these items in particular records, combine therecords into designated files and then manipulate and retrieve the storeddata. What arethey ... (DBMS) C. Batch processingsystem D. Data communication package E. None of the above

Last Answer : Database management system (DBMS)

Description : The _______ domains define registered hosts according to their general behavior. A. generic B. country C. inverse D. none of the above

Last Answer : A. generic

Description : The local host and the remote host are defined using IP addresses. To define the processes, we need second identifiers called ____________ A. UDP addresses B. transport addresses C. port addresses D. none of the above

Last Answer : C. port addresses

Description : Define PGP and SSH

Last Answer : Pretty Good Privacy is used to provide security for electronic mail. It provides authentication, confidentiality, data integrity, and non repudiation. A collection of public domain software ... commands and transfer files and also provide strong client/server authentication / message integrity.

Description : Define Gateway.

Last Answer : A device used to connect two separate networks that use different communication protocols.

Description : Define Congestion Control.

Last Answer : It involves preventing too much data from being injected into the network, thereby causing switches or links to become overloaded. Thus flow control is an end to an end issue, while congestion control is concerned with how hosts and networks interact.

Description : Define Subnetting

Last Answer : Subnetting provides an elegantly way to reduce the total number of network numbers that are assigned. It takes a single IP network number and allocate the IP address with that network to several physical networks, which are referred as subnets.

Description : Define Reliable flooding.

Last Answer : It is the process of making sure that all the nodes participating in the routing protocol get a copy of the link state information from all the other nodes.

Description : Define Routing. What is distance vector routing?

Last Answer : The process by which nodes exchange topological information to build correct forwarding tables. A lowest cost path algorithm used in routing. Each node advertises reachability information and associated costs ... , uses the updates it receives to construct its forwarding table. RIP uses it.

Description : Define ICMP.

Last Answer : Internet Control Message Protocol is a collection of error messages that are sent back to the source host whenever a router or host is unable to process an IP datagram successfully.

Description : Define flowcontrol. Mention the categories of it.

Last Answer : Flowcontrol refers to a set of procedures usedtorestrict the amount ofdata.Thesender cansenddata before waiting for acknowledgment.

Description : Define checksum. What are the steps followedinchecksumgenerator?

Last Answer : The error detection method used by the higher layer protocol iscalledchecksum. Checksumisbased on redundancy. a) Units are divided into k sections eachof n bits. b) All sectionsareaddedtogetherusing ... get the sum. c) The sumis complemented andbecomethechecksum.d)Thechecksumissent with the data.

Description : Inthe _________ method, after the station finds the lineidle, it sends its frame immediately. If the line isnot idle, it continuously senses theline until it finds it idle. A) nonpersistent B) 1-persistent C) p-persistent D) none of the above

Last Answer : 1-persistent

Description : The sharing of a medium and its link by two or more devices is called _______. A) modulation B) encoding C) line discipline D) multiplexing

Last Answer : multiplexing

Description : The ______ layer is responsible for the movementof a signal from its optical source to its optical destination. A) section B) line C) path D) photonic

Last Answer : line

Description : Which most popular input device is used today for interactive processing and for the one line entry of data for batch processing? a. Mouse b. Magnetic disk c. Visual display terminal d. Card punch

Last Answer : Mouse

Description : Which of the printers used in conjunction with computers uses dry ink power? a. Daisy wheel printer b. Line printer c. Laser printer d. Thermal printer

Last Answer : Laser printer

Description : An approach that permits the computer to work on several programs instead of one is a. On-line thesaurus b. Multiprogramming c. Over lapped processing d. Outline processor

Last Answer : Over lapped processing

Description : An approach that permits the computer to work on several programs instead of one is a. On-line thesaurus b. Multiprogramming c. Over lapped processing d. Outline processor

Last Answer : Over lapped processing

Description : In the third generation of computers: a. Distributed data processing first became popular b. An operating system was first developed c. High-level prcedu7ral languages were firs used d. On-line, real time systems first became popular

Last Answer : On-line, real time systems first became popular

Description : An example of an analog communication method is a. laser beam b. microwave c. voice grade telephone line d. all of the above

Last Answer : all of the above

Description : A remote batch-processing operation in which data is solely input to a central computer would require a. telegraphp line b. simplex lines c. mixed bad channel d. all of above

Last Answer : simplex lines

Description : A communications device that combines transmissions from several I/O devices into one line is a a. concentrator b. modifier c. multiplexer d. full-duplex line

Last Answer : multiplexer

Description : Which of the following statement is incorrect? a. Multiplexers are designed to accept data from several I/O devices and transmit a unified stream of data on one communication line b. HDLC is a standard ... indicates that it is ready to accept data d. RTS/CTS is the way the terminal indicates ringing

Last Answer : RTS/CTS is the way the DTE indicates that it is ready to transmit data and the way the DCW indicates that it is ready to accept data

Description : Which of the following does not allow multiple uses or devices to share one communication line? a. doubleplexer b. multiplexer c. concentrator d. controller

Last Answer : concentrator

Description : Which of the following statement is incorrect? a. The difference between synchronous and asynchronous transmission is the clocking derived from the data in synchronous transmission. b. Half ... in online activities d. Batch processing is the prefered processing mode for telecommunication operation.

Last Answer : Batch processing is the prefered processing mode for telecommunication operation.

Description : Inthe _______method, after thestation finds the line idle it sends or refrainfrom sending based on the outcome ofa random number generator. If the line is busy, it tries again A) nonpersistent B) 1-persistent C) p-persistent D) none of the above

Last Answer : p-persistent