______ eliminates the varying delay times associated withdifferent-size packets.
A)
X.25
B)
Frame Relay
C)
ATM
D)
all of theabove

1 Answer

Answer :

ATM

Related questions

Description : ______ is the cell relay protocol designed by the corresponding Forum and adopted by the ITU-T. A) X.25 B) Frame Relay C) ATM D) none of the above

Last Answer : ATM

Description : ________ is a virtual-circuit wide-area network that was designed in response to demands fora new type of WAN in thelate1980s and early 1990s. A) X.25 B) Frame Relay C) ATM D) none of the above

Last Answer : Frame Relay

Description : In ATM,______ is for packets requiring no sequencing and noerror control mechanism. A) AAL1 B) AAL2 C) AAL3/4 D) AAL5

Last Answer : AAL5

Description : Choose the Protocols working in the Data Link Control Layer of OSI model below. a. ATM (Asynchronous Transfer Mode), Frame Relay b. HDLC (High Level Data Link Control), SDLC (Synchronous Data Link Control) c. ARP (Address Resolution Protocol), IEEE802.3 d. All the above

Last Answer : d. All the above

Description : Station A uses 32 byte packets to transmit messages to Station B using a sliding window protocol. The round trip delay between A and B is 80 milliseconds and the bottleneck bandwidth on the path between A and B ... What is the optimal window size that A should use? a. 20 b. 40 c. 160 d. 320

Last Answer : b. 40

Description : The packets switching concept was first proposed A. in the late1980s for the Defense Ministry of US. B. in the early 1960s for military communication systems, mainly to handle speech C. in the late 1950s for Defense Ministry of US D. All of theabove E. None of the above

Last Answer : in the early 1960s for military communication systems, mainly to handle speech

Description : Which of the following technique isused for encapsulation? A. a technique used inbest-effort delivery systems toavoid endlessly loopingpackets. B. a technique used by protocols in which a lower level ... network that cannothandle the originaldatagram size D. All of theabove E. None of the above

Last Answer : a technique used by protocols in which a lower level protocol accepts a message from ahigher level protocol and places it in the data portion of the low level frame

Description : Which of the following technique isused for fragment? A. a technique used inbest-effort delivery systems toavoid endlessly loopingpackets B. a technique used by protocols in which a lower level protocol ... network that cannothandle the originaldatagram size D. All of theabove E. None of the above

Last Answer : one of the pieces that results when an IP gateway divides an IP datagram into smallerpieces for transmission acrossa network that cannothandle the originaldatagram size

Description : In ATM, connection between two endpoints is accomplishedthrough_______. A) TPs B) VPs C) VCs D) all of theabove

Last Answer : all of theabove

Description : Which protocols adopted the standards of HDLC (High Level Link Control) protocol? a. X.25 protocol as LAPB (Link Access Procedure Balanced, V.42 protocol as LAPM (Link Access Procedure for ... Services Digital Network) protocol as LAPD (Link Access Procedure on D channel) d. All the above

Last Answer : d. All the above

Description : In Frame Relay, when. ______ is selected, it requires establishing andterminatingphases A) a PVC B) an SVC C) either (a) or (b) D) neither (a) nor (b)

Last Answer : an SVC

Description : VCIs in Frame Relay arecalled ______. A) PVC B) SVC C) DLCIs D) none of the above

Last Answer : DLCIs

Description : In ATM,_______is for short packets. A) AAL1 B) AAL2 C) AAL3/4 D) AAL5

Last Answer : AAL2

Description : The subnet gets increasingly loaded with packets causing increase in delay in the delivery of packets, which can lead to more retransmission, and ultimately increasing more and more traffic. This is a concept called as _________ A. blockage B. Traffic jam. C. Congestion D. both a and b

Last Answer : C. Congestion

Description : Suppose that the one-way propagation delay for a 100 Mbps Ethernet having 48-bit jamming signal is 1.04 micro-seconds. The minimum frame size in bits is: a. 112 b. 160 c. 208 d. 256

Last Answer : d. 256

Description : A sender uses the Stop-and-Wait ARQ protocol for reliable transmission of frames. Frames are of size 1000 bytes and the transmission rate at the sender is 80 Kbps (1Kbps = 1000 bits/second). Size of ... is lost, the sender throughput is __________ bytes/second. a. 2500 b. 2000 c. 1500 d. 500

Last Answer : a. 2500

Description : Suppose the round trip propagation delay for a 10 Mbps Ethernet having 48-bit jamming signal is 46.4 ms. The minimum frame size is a. 94 b. 416 c. 464

Last Answer : c. 464

Description : Which of the following is widely used inside the telephone system for longhaul data traffic ? (A) ISDN (B) ATM (C) Frame Relay (D) ISTN

Last Answer : (B) ATM

Description : If an Ethernet destination address is08:07:06:05:44:33, then this is a ______ address. A) unicast B) multicast C) broadcast D) any of theabove

Last Answer : unicast

Description : f an Ethernet destination address is07:01:02:03:04:05, then this is a ______ address. A) unicast B) multicast C) broadcast D) any of theabove

Last Answer : multicast

Description : The distance between two stations M and N is L kilometers. All frames are K bits long. The propagation delay per kilometer is t seconds. Let R bits/second be the channel capacity. Assuming that processing ... maximum utilization, when the sliding window protocol used is: a. A b. B c. C d. D

Last Answer : c. C

Description : Which consequences are more likely to occur during the frame transmission in StopandWait ARQ mechanism? a. Loss of frame or an acknowledgement b. Delay in an acknowledgement c. Normal operation d. All of the above

Last Answer : d. All of the above

Description : Station A uses 32 byte packets to transmit messages to station B using sliding window protocol. The round trip delay between A and B is 40 milli seconds and the bottleneck bandwidth on the path between A and B is 64 kbps. The optimal window size of A is (1) 20 (2) 10 (3) 30 (4) 40

Last Answer : (2) 10

Description : ______ is a static algorithm in which every incoming packet is sent out on every outgoing line except the one it arrives on. This method usually generates vast number of duplicate packets.. A. Flooding B. Wait and watch C. congestion D. both a and c

Last Answer : A. Flooding

Description : - MAC is to Ethernet what ________ is to Frame Relay. A. DLCI B. LCI C. PVC D. None of the above

Last Answer : DLCI

Description : Frame Relay networks offer an optioncalled ______________that sends voice through the network. A) VOFR B) FRAD C) MUX D) none of the above

Last Answer : VOFR

Description : To handleframesarrivingfrom other protocols, Frame Relay uses adevice calleda _________. A) VOFR B) FRAD C) MUX D) none of the above

Last Answer : FRAD

Description : In Frame Relay, the EA field defines thenumber of bytes; it is _____ in the last byte of the address. A) 0 B) 1 C) 2 D) 3

Last Answer : 1

Description : In Frame Relay, an address can be________ bytes. A) only 2 B) 2 to 3 C) 2 to 4 D) none of the above

Last Answer : 2 to 4

Description : Frame Relay has_______. A) only the physical layer B) only thedata link C) the physical and data link layers D) the physical, data link, andnetwork layers

Last Answer : the physical and data link layers

Description : In Frame Relay, when a _____ is selected, the correspondingtable entry is recorded for all switches by the administrator A) PVC B) SVC C) either (a) or (b) D) neither (a) nor (b)

Last Answer : PVC

Description : Frame Relay provides ________. A) PVCs B) SVCs C) either (a) or (b) D) neither (a) nor (b)

Last Answer : Frame Relay

Description : Inslotted ALOHA, the vulnerable time is ______ the frame transmissiontime. A) the sameas B) two times C) three times D) none of the above

Last Answer : the sameas

Description : In ATM,______ is for constant-bit-ratedata. A) AAL1 B) AAL2 C) AAL3/4 D) AAL5

Last Answer : AAL1

Description : In ATM, the ______ layerprovides routing, traffic management, switching, and multiplexing services. A) physical B) ATM C) AAL D) none of the above

Last Answer : ATM

Description : A(n) ______ is theinterface between auser and an ATM switch. A) UNI B) NNI C) NNN D) None of the above

Last Answer : UNI

Description : RPF eliminates the ________ in theflooding process. A) forwarding B) backwarding C) flooding D) none of the above

Last Answer : none of the above

Description : Each IP address can identify the ………... or ………... of IP packets. A. source, destination B. length, size C. source, length D. Size , destination

Last Answer : A. source, destination

Description : In Go-Back-N window, when the timer of the packet times out, several packets have to be resent even some may have arrived safe. Whereas in Selective Repeat window, the sender resends ___________ A ... lost B. Only those packets which are lost or corrupted C. Packet from starting D. All the packets

Last Answer : B. Only those packets which are lost or corrupted

Description : Inthe _________ method, a special packet called a ______ circulates through the ring. A) reservation: control frame B) polling: poll request C) token passing: token D) none of the above

Last Answer : token passing: token

Description : Time during which a job is processed by the computer is a. Delay times b. Real time c. Execution time d. Down time

Last Answer : Execution time

Description : Time during which a job is processed by the computer is a. Delay times b. Real time c. Execution time d. Down time

Last Answer : Execution time

Description : Membership in a VLAN can be based on _________. A) port numbers B) MAC addresses C) IP addresses D) all of theabove

Last Answer : all of theabove

Description : A repeater is a connecting devicethat operates in the _______ layer of theInternet model. A) physical B) data link C) network D) all of theabove

Last Answer : physical

Description : In Go-Back-N ARQ, if frames 4,5, and 6 are received successfully, thereceiver may send an ACK _______ to thesender. A) 5 B) 6 C) 7 D) any of theabove

Last Answer : 7

Description : In______ schemes, the voltagesare on the both sidesof the time axis. Forexample, thevoltage level for 0 can bepositive and thevoltage level for 1 can be negative. A) polar B) bipolar C) unipolar D) all of theabove

Last Answer : polar

Description : Ina _____scheme,all the signal levels are onone sideof the time axis,either above or below. A) polar B) bipolar C) unipolar D) all of theabove

Last Answer : unipolar