Description : ______ is the cell relay protocol designed by the corresponding Forum and adopted by the ITU-T. A) X.25 B) Frame Relay C) ATM D) none of the above
Last Answer : ATM
Description : ________ is a virtual-circuit wide-area network that was designed in response to demands fora new type of WAN in thelate1980s and early 1990s. A) X.25 B) Frame Relay C) ATM D) none of the above
Last Answer : Frame Relay
Description : In ATM,______ is for packets requiring no sequencing and noerror control mechanism. A) AAL1 B) AAL2 C) AAL3/4 D) AAL5
Last Answer : AAL5
Description : Choose the Protocols working in the Data Link Control Layer of OSI model below. a. ATM (Asynchronous Transfer Mode), Frame Relay b. HDLC (High Level Data Link Control), SDLC (Synchronous Data Link Control) c. ARP (Address Resolution Protocol), IEEE802.3 d. All the above
Last Answer : d. All the above
Description : Station A uses 32 byte packets to transmit messages to Station B using a sliding window protocol. The round trip delay between A and B is 80 milliseconds and the bottleneck bandwidth on the path between A and B ... What is the optimal window size that A should use? a. 20 b. 40 c. 160 d. 320
Last Answer : b. 40
Description : The packets switching concept was first proposed A. in the late1980s for the Defense Ministry of US. B. in the early 1960s for military communication systems, mainly to handle speech C. in the late 1950s for Defense Ministry of US D. All of theabove E. None of the above
Last Answer : in the early 1960s for military communication systems, mainly to handle speech
Description : Which of the following statements is correct for the use of packet switching? A. the subdivision of information into individuallyaddressed packets in conjunction with alternativerouting arrangementenabled the transmission path ... capacity could be achieved. D. All of theabove E. None of the above
Last Answer : All of theabove
Description : Which of the following technique isused for encapsulation? A. a technique used inbest-effort delivery systems toavoid endlessly loopingpackets. B. a technique used by protocols in which a lower level ... network that cannothandle the originaldatagram size D. All of theabove E. None of the above
Last Answer : a technique used by protocols in which a lower level protocol accepts a message from ahigher level protocol and places it in the data portion of the low level frame
Description : Which of the following technique isused for fragment? A. a technique used inbest-effort delivery systems toavoid endlessly loopingpackets B. a technique used by protocols in which a lower level protocol ... network that cannothandle the originaldatagram size D. All of theabove E. None of the above
Last Answer : one of the pieces that results when an IP gateway divides an IP datagram into smallerpieces for transmission acrossa network that cannothandle the originaldatagram size
Description : In ATM, connection between two endpoints is accomplishedthrough_______. A) TPs B) VPs C) VCs D) all of theabove
Last Answer : all of theabove
Description : Which protocols adopted the standards of HDLC (High Level Link Control) protocol? a. X.25 protocol as LAPB (Link Access Procedure Balanced, V.42 protocol as LAPM (Link Access Procedure for ... Services Digital Network) protocol as LAPD (Link Access Procedure on D channel) d. All the above
Description : In Frame Relay, when. ______ is selected, it requires establishing andterminatingphases A) a PVC B) an SVC C) either (a) or (b) D) neither (a) nor (b)
Last Answer : an SVC
Description : VCIs in Frame Relay arecalled ______. A) PVC B) SVC C) DLCIs D) none of the above
Last Answer : DLCIs
Description : In ATM,_______is for short packets. A) AAL1 B) AAL2 C) AAL3/4 D) AAL5
Last Answer : AAL2
Description : The subnet gets increasingly loaded with packets causing increase in delay in the delivery of packets, which can lead to more retransmission, and ultimately increasing more and more traffic. This is a concept called as _________ A. blockage B. Traffic jam. C. Congestion D. both a and b
Last Answer : C. Congestion
Description : Suppose that the one-way propagation delay for a 100 Mbps Ethernet having 48-bit jamming signal is 1.04 micro-seconds. The minimum frame size in bits is: a. 112 b. 160 c. 208 d. 256
Last Answer : d. 256
Description : A sender uses the Stop-and-Wait ARQ protocol for reliable transmission of frames. Frames are of size 1000 bytes and the transmission rate at the sender is 80 Kbps (1Kbps = 1000 bits/second). Size of ... is lost, the sender throughput is __________ bytes/second. a. 2500 b. 2000 c. 1500 d. 500
Last Answer : a. 2500
Description : Suppose the round trip propagation delay for a 10 Mbps Ethernet having 48-bit jamming signal is 46.4 ms. The minimum frame size is a. 94 b. 416 c. 464
Last Answer : c. 464
Description : Which of the following is widely used inside the telephone system for longhaul data traffic ? (A) ISDN (B) ATM (C) Frame Relay (D) ISTN
Last Answer : (B) ATM
Description : If an Ethernet destination address is08:07:06:05:44:33, then this is a ______ address. A) unicast B) multicast C) broadcast D) any of theabove
Last Answer : unicast
Description : f an Ethernet destination address is07:01:02:03:04:05, then this is a ______ address. A) unicast B) multicast C) broadcast D) any of theabove
Last Answer : multicast
Description : The distance between two stations M and N is L kilometers. All frames are K bits long. The propagation delay per kilometer is t seconds. Let R bits/second be the channel capacity. Assuming that processing ... maximum utilization, when the sliding window protocol used is: a. A b. B c. C d. D
Last Answer : c. C
Description : Which consequences are more likely to occur during the frame transmission in StopandWait ARQ mechanism? a. Loss of frame or an acknowledgement b. Delay in an acknowledgement c. Normal operation d. All of the above
Last Answer : d. All of the above
Description : Station A uses 32 byte packets to transmit messages to station B using sliding window protocol. The round trip delay between A and B is 40 milli seconds and the bottleneck bandwidth on the path between A and B is 64 kbps. The optimal window size of A is (1) 20 (2) 10 (3) 30 (4) 40
Last Answer : (2) 10
Description : ______ is a static algorithm in which every incoming packet is sent out on every outgoing line except the one it arrives on. This method usually generates vast number of duplicate packets.. A. Flooding B. Wait and watch C. congestion D. both a and c
Last Answer : A. Flooding
Description : - MAC is to Ethernet what ________ is to Frame Relay. A. DLCI B. LCI C. PVC D. None of the above
Last Answer : DLCI
Description : Frame Relay networks offer an optioncalled ______________that sends voice through the network. A) VOFR B) FRAD C) MUX D) none of the above
Last Answer : VOFR
Description : To handleframesarrivingfrom other protocols, Frame Relay uses adevice calleda _________. A) VOFR B) FRAD C) MUX D) none of the above
Last Answer : FRAD
Description : In Frame Relay, the EA field defines thenumber of bytes; it is _____ in the last byte of the address. A) 0 B) 1 C) 2 D) 3
Last Answer : 1
Description : In Frame Relay, an address can be________ bytes. A) only 2 B) 2 to 3 C) 2 to 4 D) none of the above
Last Answer : 2 to 4
Description : Frame Relay has_______. A) only the physical layer B) only thedata link C) the physical and data link layers D) the physical, data link, andnetwork layers
Last Answer : the physical and data link layers
Description : In Frame Relay, when a _____ is selected, the correspondingtable entry is recorded for all switches by the administrator A) PVC B) SVC C) either (a) or (b) D) neither (a) nor (b)
Last Answer : PVC
Description : Frame Relay provides ________. A) PVCs B) SVCs C) either (a) or (b) D) neither (a) nor (b)
Description : Inslotted ALOHA, the vulnerable time is ______ the frame transmissiontime. A) the sameas B) two times C) three times D) none of the above
Last Answer : the sameas
Description : In ATM,______ is for constant-bit-ratedata. A) AAL1 B) AAL2 C) AAL3/4 D) AAL5
Last Answer : AAL1
Description : In ATM, the ______ layerprovides routing, traffic management, switching, and multiplexing services. A) physical B) ATM C) AAL D) none of the above
Description : A(n) ______ is theinterface between auser and an ATM switch. A) UNI B) NNI C) NNN D) None of the above
Last Answer : UNI
Description : RPF eliminates the ________ in theflooding process. A) forwarding B) backwarding C) flooding D) none of the above
Last Answer : none of the above
Description : Consider a source computer(S) transmitting a file of size 106 bits to a destination computer (D)over a network of two routers (R1 and R2) and three links(L1, L2, and L3). L1connects S to R1; L2 connects R1 to ... file from S to D? a. 1005 ms b. 1010 ms c. 3000 ms d. 3003 ms Answer: Option(a)
Last Answer : a. 1005 ms
Description : Each IP address can identify the ………... or ………... of IP packets. A. source, destination B. length, size C. source, length D. Size , destination
Last Answer : A. source, destination
Description : The frame consists of a steel beam welded rigidly to two vertical channels. An eccentric exciter weighing 250 N is attached to the beam, which weighs 10 KN and is used to excite the frame. The unbalance weight of ... ends, magnification factor at resonance is A. 307.5 B. 3.075 C. 30.75 D. 0.3075
Last Answer : C. 30.75
Description : In Go-Back-N window, when the timer of the packet times out, several packets have to be resent even some may have arrived safe. Whereas in Selective Repeat window, the sender resends ___________ A ... lost B. Only those packets which are lost or corrupted C. Packet from starting D. All the packets
Last Answer : B. Only those packets which are lost or corrupted
Description : Inthe _________ method, a special packet called a ______ circulates through the ring. A) reservation: control frame B) polling: poll request C) token passing: token D) none of the above
Last Answer : token passing: token
Description : Time during which a job is processed by the computer is a. Delay times b. Real time c. Execution time d. Down time
Last Answer : Execution time
Description : Membership in a VLAN can be based on _________. A) port numbers B) MAC addresses C) IP addresses D) all of theabove
Description : A repeater is a connecting devicethat operates in the _______ layer of theInternet model. A) physical B) data link C) network D) all of theabove
Last Answer : physical
Description : In Go-Back-N ARQ, if frames 4,5, and 6 are received successfully, thereceiver may send an ACK _______ to thesender. A) 5 B) 6 C) 7 D) any of theabove
Last Answer : 7
Description : In______ schemes, the voltagesare on the both sidesof the time axis. Forexample, thevoltage level for 0 can bepositive and thevoltage level for 1 can be negative. A) polar B) bipolar C) unipolar D) all of theabove
Last Answer : polar
Description : Ina _____scheme,all the signal levels are onone sideof the time axis,either above or below. A) polar B) bipolar C) unipolar D) all of theabove
Last Answer : unipolar