The required resources for communication between end systems are
reserved for theduration of the session between end systems in
method.
a. Packet switched
b. Bit switched
c. Line switched
d. Circuit switched

1 Answer

Answer :

d. Circuit switched

Related questions

Description : The required resources for communication between end systems are reserved for the duration of the session between end systems in ________ method. a) Packet switching b) Circuit switching c) Line switching d) Frequency switching

Last Answer : b) Circuit switching

Description : BSNL land line telephone network is an example of a network. A. Packet switched B. Circuit switched C. Bit switched D. Line switched

Last Answer : B. Circuit switched

Description : A local telephone network is an example of a _______ network. a) Packet switched b) Circuit switched c) Bit switched d) Line switched

Last Answer : b) Circuit switched

Description : A local telephone network is an example of a network. a. Packet switched b. Circuit switched c. Bit switched d. Line switched

Last Answer : b. Circuit switched

Description : As the resources are reserved between two communicating end systems in circuit switching, ___________ is achieved. a) authentication b) guaranteed constant rate c) reliability d) store and forward

Last Answer : b) guaranteed constant rate

Description : There are two types of designs for communication subnets: they are ………… A. Point-to-Point channels and Broadcast channels B. packet-switched subnet and store-and-forward C. Multicasting and Broadcasting D. Point-to-Point channels and store-and-forward

Last Answer : A. Point-to-Point channels and Broadcast channels

Description : A local telephone network isan example of a_______ network. A) packet-switched B) circuit-switched C) message-switched D) none of the above

Last Answer : circuit-switched

Description : A _________ network is across between a circuit-switchednetworkand a datagram network. It has some characteristics ofboth. A) virtual-circuit B) packet-switched C) frame-switched D) none of the above

Last Answer : virtual-circui

Description : Packet-switched networks can alsobe divided into ______subcategories: virtual-circuit networks and datagram networks A) four B) three C) two D) five

Last Answer : two

Description : A network is a cross between a circuit-switched network and a datagram network. It has some characteristics of both. a. virtual-circuit b. packet-switched c. None of the Given d. frame-switched

Last Answer : a. virtual-circuit

Description : Which one of the following statements is FALSE? a. Packet switching leads to better utilization of bandwidth resources than circuit switching. b. Packet switching results in less variation ... than circuit switching d. Packet switching can lead to reordering unlike in circuit switching

Last Answer : Packet switching results in less variation in delay than circuit switching.

Description : Satellite-Switched Time-Division Multiple Access (SS/TDMA) is A. the method of determining whichdevice has access tothe transmission medium at any time. B. a medium access control technique for ... switching is used to dynamically changethechannel assignments D. All of theabove E. None of the above

Last Answer : a form of TDMA in which circuit switching is used to dynamically changethechannel assignments

Description : A ________network is made of a set of switches connected by physical links, in which each link is divided into nchannels. A) line-switched B) frame-switched C) circuit-switched D) none of the above

Last Answer : circuit-switched

Description : The ________is a circuit-switched network, while the ______is a packet-switched network. (A) Telephone, ATM (B) SONET and FDDI (C) Satellite, Telephone (D) FDDI and SONET

Last Answer : (A) Telephone, ATM

Description : _____ is used for transmission of packets in the cellular switched architecture. a) Packet switching techniques b) Circuit switching techniques c) Packet and circuit switched technique d) Datagram technique

Last Answer : a) Packet switching techniques

Description : ______ is a static algorithm in which every incoming packet is sent out on every outgoing line except the one it arrives on. This method usually generates vast number of duplicate packets.. A. Flooding B. Wait and watch C. congestion D. both a and c

Last Answer : A. Flooding

Description : Which among the below stated datagram discard code fields in ICMP is/are generated if a router fails to forward a packet due to administrative filtering? a. Source Route Failed b. Communication Administratively Prohibited c. Host Precedence Violation d. Precedence Cut-off in Effect

Last Answer : b. Communication Administratively Prohibited

Description : The network layer in the Internet isdesigned as a __________network. A) virtual-circuit B) datagram C) circuit-switched D) none of the above

Last Answer : datagram

Description : In a ________ network, twotypes of addressing are involved: global and local. A) virtual-circuit B) datagram C) circuit-switched D) none of the above

Last Answer : virtual-circuit

Description : A switched WAN is normally implemented as a _______ network. A) virtual-circuit B) datagram C) circuit-switched D) none of the above

Last Answer : virtual-circuit

Description : The network layer in the Internet is designed as anetwork. a. datagram b. none c. virtual-circuit d. circuit-switched

Last Answer : a. datagram

Description : Differentiate switched virtual circuit and Permanent virtual circuit.

Last Answer : Switched virtual circuit format is comparable conceptually to dial-up line in circuit switching. In this method, a virtual circuit is created whenever it is needed and exits only for the duration of ... provided between two uses on a continuous basis. The circuit is dedicated to the specific uses.

Description : The ____ layer establishes, maintains, and synchronizes the interaction between communicating systems. a. network b. transport c. session d. presentation

Last Answer : c. session

Description : In _________, thereis no resource allocation for a packet. A) datagram switching B) circuit switching C) frame switching D) none of the above

Last Answer : datagram switching

Description : In virtual circuit network each packet contains ___________ a. full source and destination address b. a short VC number c. only source address d. only destination address

Last Answer : b. a short VC number

Description : Which of the following approaches to switching share networks resource? a. Circuit switching b. Packet switching c. Both A and B d. None of these

Last Answer : b. Packet switching

Description : In virtual circuit network each packet contains ___________ A. full source and destination address B. a short VC number C. only source address D. only destination address

Last Answer : B. a short VC number

Description : What is circuit switching and packet switching?

Last Answer : Circuit Switching is a strategy for switching data through a network. It involves establishing a dedicated path (circuit) between the source and destination. Packet Switching is also a ... the switch interconnects. It uses store and forward switching of discrete data units called packets.

Description : In........................mode, a common technique in packet-switched networks consists of wrapping a packet in a new one. A) Tunneling B) Encapsulation C) Both A and B D) None of the above

Last Answer : C) Both A and B

Description : In ……………………. mode, a common technique in packet-switched networks consists of wrapping a packet in a new one. A) Tunneling B) Encapsulation C) Both A and B D) None of the above

Last Answer : C) Both A and B

Description : Which of the following feature makes impossible to eavesdrop on GSM radio transmission? a) SIM b) On the air privacy c) SMS d) Packet switched traffic

Last Answer : b) On the air privacy

Description : Which of the following comes under supplementary ISDN services? a) Emergency calling b) Packet switched protocols c) Call diversion d) Standard mobile telephony

Last Answer : c) Call diversion

Description : Which of the following does not come under the teleservices of GSM? a) Standard mobile telephony b) Mobile originated traffic c) Base originated traffic d) Packet switched traffic

Last Answer : d) Packet switched traffic

Description : Inthe _________ method, a special packet called a ______ circulates through the ring. A) reservation: control frame B) polling: poll request C) token passing: token D) none of the above

Last Answer : token passing: token

Description : Suppose transmission rate of a channel is 32 kbps. If there are ‘8’ routes from source to destination and each packet p contains 8000 bits. Total end to end delay in sending packet P is _____. a. 2 sec b. 3 sec c. 4 sec d. 1 sec

Last Answer : a. 2 sec

Description : Application layer is implemented in _______ a. End system b. NIC c. Ethernet d. Packet transport

Last Answer : a. End system

Description : Application layer is implemented in ____________ a) End system b) NIC c) Ethernet d) Packet transport

Last Answer : a) End system

Description : HDLC isan acronym for _______. A) High-duplex line communication B) High-leveldata link control C) Half-duplex digital link combination D) Hostdouble-level circuit

Last Answer : High-leveldata link control

Description : An example of an analog communication method is a. laser beam b. microwave c. voice grade telephone line d. all of the above

Last Answer : all of the above

Description : An example of ananalog communication method is A. laser beam B. microwave C. voice grade telephone line D. All of theabove E. None of the above

Last Answer : All of theabove

Description : High-level Data Link Control (HDLC) is a _______ protocol for communication over point-to-pointand multipoint links. A) bit-oriented B) byte-oriented C) character-oriented D) none of the above

Last Answer : bit-oriented

Description : How many 8-bit characters can be transmitted per second over a 9600 baud serial communication link using asynchronous mode of transmission with one start bit, eight data bits, two stop bits, and one parity bit ? a. 600 b. 800 c. 876 d. 1200

Last Answer : b. 800

Description : State weather the following statement is true or false for Sendmail. 1).Sendmail is a command-line tool designed for most UNIX-like operating systems. 2).It define a method of transferring mail, and acts as a client/server ... . false C. 1. false, 2. false, 3. false D. 1. true, 2. true, 3. false

Last Answer : A. 1. True, 2. False, 3. true

Description : “““.are words that aprogramming language has set asidefor its own use. (A) Control words (B) Control structures (C) Reserved words (D) Reserved keys (E) None of these

Last Answer : Reserved words

Description : State the following statement is true or false. I. In class B addresses a total of more than 1 billion addresses can be formed. II. Class E addresses are reserved for future or experimental use. a. True, False b. True, True c. False, True d. False, False

Last Answer : b. True, True

Description : addresses are reserved for multicasting. a. Class B b. Class C c. Class D d. Class E

Last Answer : c. Class D

Description : An example of a medium speed, switched communications service is a. series 1000 b. data phone 50 c. DDD d. All of the above

Last Answer : DDD

Description : Thetwo most common digital services are ________ service and______. A) switched/56; switched/64 B) switched/56; DDS C) DDS; swiched 64 D) leased; out-of-band

Last Answer : switched/56; DDS

Description : Telephone companiesprovidetwotypes of analog services: analog _______services andanalog _____services. A) switched; in-band B) out-of-band; in-band C) switched; leased D) leased; out-of-band

Last Answer : switched; leased

Description : A network that needs human beings to manually route signals is called.... A) Fiber Optic Network B) Bus Network C) T-switched network D) Ring network

Last Answer : C) T-switched network