Which of the following statements is correct for the use of packet switching?
A.
the subdivision of information into individuallyaddressed packets in conjunction with alternativerouting arrangementenabled the transmission path
to be alteredin the event of congestionor individual link failure
B.
the employment of additional intelligence within the network enabled more sophisticatederror control and link control procedures tobe applied
C.
by employing wide bandwidth circuits for thetrunk networks substantial economies through extensive sharing of capacity could be achieved.
D.
All of theabove
E.
None of the above

1 Answer

Answer :

All of theabove

Related questions

Description : The packets switching concept was first proposed A. in the late1980s for the Defense Ministry of US. B. in the early 1960s for military communication systems, mainly to handle speech C. in the late 1950s for Defense Ministry of US D. All of theabove E. None of the above

Last Answer : in the early 1960s for military communication systems, mainly to handle speech

Description : Which one of the following statements is FALSE? a. Packet switching leads to better utilization of bandwidth resources than circuit switching. b. Packet switching results in less variation ... than circuit switching d. Packet switching can lead to reordering unlike in circuit switching

Last Answer : Packet switching results in less variation in delay than circuit switching.

Description : A __________ is a device that forwards packets between networks by processing the routing information included in the packet. a) bridge b) firewall c) router d) hub

Last Answer : c) router

Description : Satellite-Switched Time-Division Multiple Access (SS/TDMA) is A. the method of determining whichdevice has access tothe transmission medium at any time. B. a medium access control technique for ... switching is used to dynamically changethechannel assignments D. All of theabove E. None of the above

Last Answer : a form of TDMA in which circuit switching is used to dynamically changethechannel assignments

Description : In most Wide Area Networks, the subnet consists of two distinct components: which are they? A. Transmission Lines and Switching Elements. B. host and subnet C. Transmission Lines and host D. subnet and Switching Elements.

Last Answer : A. Transmission Lines and Switching Elements.

Description : Which of the following assertions is FALSE about the Internet Protocol (IP)? a. It is possible for a computer to have multiple IP addresses b. IP packets from the same source to the same ... outgoing packets; the route is determined only by the routing tables in the routers on the way

Last Answer : d. The packet source cannot set the route of an outgoing packets; the route is determined only by the routing tables in the routers on the way

Description : _____ is used for transmission of packets in the cellular switched architecture. a) Packet switching techniques b) Circuit switching techniques c) Packet and circuit switched technique d) Datagram technique

Last Answer : a) Packet switching techniques

Description : Which transmission technique guarantees that data packets will be received by the receiver in the same order in which they were sent by the sender? (A) Broadcasting (B) Unicasting (C) Packet Switching (D) Circuit Switching

Last Answer : (D) Circuit Switching

Description : The data link layer takes the packets from _________ and encapsulates them into frames for transmission. a) network layer b) physical layer c) transport layer d) application layer

Last Answer : a) network layer

Description : Which of the following approaches to switching share networks resource? a. Circuit switching b. Packet switching c. Both A and B d. None of these

Last Answer : b. Packet switching

Description : In computer networks _________ is a characteristic that a flow needs where Lack of it means losing a packet or acknowledgment, which entails retransmission. A. Reliability B. Delay C. Jitter D. Bandwidth

Last Answer : A. Reliability

Description : Internet-like networks between a company and its businesspartners. Select the best fit for answer: A. Bandwidth alternatives B. Switching alternating C. Inter organizational networks D. Extranets

Last Answer : Extranets

Description : Telecommunication networks frequently interconnect an organization with its customers and suppliers. Select the best fit foranswer: A. Bandwidth alternatives B. Switching alternating C. Inter organizational networks D. Extranets

Last Answer : Inter organizational networks

Description : Station A uses 32 byte packets to transmit messages to Station B using a sliding window protocol. The round trip delay between A and B is 80 milliseconds and the bottleneck bandwidth on the path between A and B ... What is the optimal window size that A should use? a. 20 b. 40 c. 160 d. 320

Last Answer : b. 40

Description : In a packet switching network, if the message size is 48 bytes and each packet contains a header of 3 bytes. If 24 packets are required to transmit the message, the packet size is ................ (1) 2 bytes (2) 1 byte (3) 4 bytes (4) 5 bytes

Last Answer : (4) 5 bytes 

Description : Consider a link with packet loss probability of 0.2. What is the expected number of transmissions it would take to transfer 200 packets given that the stop and wait protocol is used? a. 125 b. 250 c. 225

Last Answer : b. 250

Description : The information tobe communicated ina data communications system is the_______. A) Medium B) Protocol C) Message D) Transmission

Last Answer : Message

Description : Which of the following statement is False about the efficiency of the given channel? a. If we want to send big packets on the channel, then Stop and Wait is good choice. b. If length ... is directly proportional to efficiency of channel. d. Efficient might be less if capacity of channel is high

Last Answer : Distance between sender and receiver is directly proportional to efficiency of channel.

Description : For which one of the following reasons does Internet Protocol (IP) use the time-to- live (TTL) field in the IP datagram header? a. Ensure packets reach destination within that time b. ... packets from looping indefinitely d. Limit the time for which a packet gets queued in intermediate routers.

Last Answer : c. Prevent packets from looping indefinitely

Description : What is one advantage of setting up a DMZ(Demilitarized Zone) with two firewalls? a. You can control where traffic goes in the three networks b. You can do stateful packet filtering c. You can do load balancing d. Improve network performance

Last Answer : a. You can control where traffic goes in the three networks

Description : The Internet Control Message Protocol (ICMP) A. allows gateways to send error acontrol messages toother gateways or hosts B. provides communication between the Internet Protocol Software on one machine ... and takeaction to correct theproblem D. All of theabove E. None of the above

Last Answer : All of theabove

Description : Which of the following technique isused for encapsulation? A. a technique used inbest-effort delivery systems toavoid endlessly loopingpackets. B. a technique used by protocols in which a lower level ... network that cannothandle the originaldatagram size D. All of theabove E. None of the above

Last Answer : a technique used by protocols in which a lower level protocol accepts a message from ahigher level protocol and places it in the data portion of the low level frame

Description : Which of the following technique isused for fragment? A. a technique used inbest-effort delivery systems toavoid endlessly loopingpackets B. a technique used by protocols in which a lower level protocol ... network that cannothandle the originaldatagram size D. All of theabove E. None of the above

Last Answer : one of the pieces that results when an IP gateway divides an IP datagram into smallerpieces for transmission acrossa network that cannothandle the originaldatagram size

Description : ______ eliminates the varying delay times associated withdifferent-size packets. A) X.25 B) Frame Relay C) ATM D) all of theabove

Last Answer : ATM

Description : The ________is a network layer Internet protocol that provides message packets to report errors and other information regarding IP packet processing back to the source: a) Internet Control Message ... Standard Flexible Message Protocol c) Internet Dynamic Chartered Message Protocol d) None of These

Last Answer : a) Internet Control Message Protocol

Description : Internet-like networks within an enterprise. A. Intranets B. Switching alternating C. Inter organizational networks D. Extranets

Last Answer : Intranets

Description : A repeater is a connecting devicethat operates in the _______ layer of theInternet model. A) physical B) data link C) network D) all of theabove

Last Answer : physical

Description : An IP datagram of size 1000 bytes arrives at a router. The router has to forward this packet on a link whose MTU (maximum transmission unit) is 100 bytes. Assume that the size of the IP header is 20 bytes ... the IP datagram will be divided into for transmission is : a. 10 b. 50 c. 12 d. 13

Last Answer : d. 13

Description : An error-detectingcode inserted asa field in a blockof data tobe transmitted is known as A. Frame check sequence B. Error detecting code C. Checksum D. flow control E. None of the above

Last Answer : Frame check sequence

Description : ______ can be applied whenthe bandwidth of a link (in hertz) is greater than the combined bandwidths of the signals to be transmitted. A) TDM B) FDM C) Both (a)or (b) D) Neither (a) or (b)

Last Answer : FDM

Description : State weather the following statement is true or false for IPV6 Addressing 1). IPV6 is a routable protocol that addresses, routes, fragments, and reassembles packets 2).IPV6 is a connectionless, unreliable datagram protocol. 3). ... C. 1. false, 2. false, 3. false D. 1.false, 2. true, 3. true

Last Answer : A. 1. True, 2. true, 3. true

Description : ______ is a static algorithm in which every incoming packet is sent out on every outgoing line except the one it arrives on. This method usually generates vast number of duplicate packets.. A. Flooding B. Wait and watch C. congestion D. both a and c

Last Answer : A. Flooding

Description : In Go-Back-N window, when the timer of the packet times out, several packets have to be resent even some may have arrived safe. Whereas in Selective Repeat window, the sender resends ___________ A ... lost B. Only those packets which are lost or corrupted C. Packet from starting D. All the packets

Last Answer : B. Only those packets which are lost or corrupted

Description : In open-loop control, policies are applied to __________ A. Remove after congestion occurs B. Remove after sometime C. Prevent before congestion occurs D. Prevent before sending packets

Last Answer : C. Prevent before congestion occurs

Description : User datagram protocol is called connectionless because _____________ a. all UDP packets are treated independently by transport layer b. it sends data as a stream of related packets c. it is received ... order d. it sends data very quickly Answer: Option(a) 4. Transmission control protocol ____

Last Answer : a. all UDP packets are treated independently by transport layer

Description : Station A uses 32 byte packets to transmit messages to station B using sliding window protocol. The round trip delay between A and B is 40 milli seconds and the bottleneck bandwidth on the path between A and B is 64 kbps. The optimal window size of A is (1) 20 (2) 10 (3) 30 (4) 40

Last Answer : (2) 10

Description : In _________, thereis no resource allocation for a packet. A) datagram switching B) circuit switching C) frame switching D) none of the above

Last Answer : datagram switching

Description : The taskof moving the packet from theinput queue to the output queuein a router is done by_________. A) input and output ports B) routing processor C) switching fabrics D) none of the above

Last Answer : switching fabrics

Description : The required resources for communication between end systems are reserved for the duration of the session between end systems in ________ method. a) Packet switching b) Circuit switching c) Line switching d) Frequency switching

Last Answer : b) Circuit switching

Description : Explain the two approaches of packet switching techniques.

Last Answer : _ Datagram approach _ Virtual circuit approach _ Switched virtual circuit(SVC) _ Permanent virtual circuit(PVC) _ Circuit – switched connection versus virtual – circuit connection _ Path versus route _ Dedicated versus shared

Description : What is circuit switching and packet switching?

Last Answer : Circuit Switching is a strategy for switching data through a network. It involves establishing a dedicated path (circuit) between the source and destination. Packet Switching is also a ... the switch interconnects. It uses store and forward switching of discrete data units called packets.

Description : Packet switching is used for (A) Credit card verification (B) Automated Teller Machine (C) The internet and the World Wide Web (D) All of the above

Last Answer : (D) All of the above

Description : Packet-switched networks can alsobe divided into ______subcategories: virtual-circuit networks and datagram networks A) four B) three C) two D) five

Last Answer : two

Description : The synchronous modems are more costly than the asynchronous modems because a. they produce large volume of data b. they contain clock recovery circuits c. they transmit the data with stop and start bits d. they operate with a larger bandwidth e. none of above

Last Answer : they contain clock recovery circuits

Description : Data switching systems. A. improve the efficiency of data transfer B. are limited to small data networks C. required additional lines D. are not used in data system

Last Answer : A. improve the efficiency of data transfer

Description : Compared to analog signals, digital signals A. allow faster transmission B. are moreaccurate C. both (a)and (b) D. All of theabove E. None of the above

Last Answer : both (a)and (b)

Description : What network model enables engineer managers to schedule, monitor and control large and complex projects by employing three time estimates per activity a. Forecasting b. Program evaluation review technique c. Critical path method d. simulation

Last Answer : b. Program evaluation review technique