To span long distance or many computers, networks must replace shared medium with ………..
- Segment transformation
- Fiber optics
- Packet switches
- None of the above
Which of the following statement is true regarding Distance-vector routing?
- It is very simple to implement.
- Packet switch updates own routing table first
- It is used in RIP
- All of the above
What will be the bandwidth rate for 1000Base-T Gigabyte or ATM?
- 100 MHz
- 150 MHz
- 200 MHz
- 250 MHz
CBR stands for…………….
- Constant Byte Rate
- Constant Bit Rate
- Connection break Recovery
- None of the above
The routing table in interior and exterior switches has which one of the following?
- It should have next hop for each possible destination
- The next hop in table must be on shortest path to destination
- Both (a) and (b)
- None of the above
Which one of the following is a method for computing routing table information?
- Manual entry
- Static routing
- Boot time routing
- None of the above
Which one of the following is the responsibility of Djikstra’ algorithm?
- To compute the shortest path between two nodes
- To extract next hop information from path information
- To insert next hop information into routing table
- All of the above
Routing table is used to keep the information about…………….
- Destination
- Medium of transmission
- Routers used in network
- All of the above
Frame relay is………………….
- Connection oriented service
- Connectionless service
- It is typically ranges from 5Mbps to 1000Mbps.
- None of the above
Which of the following is not a guided medium?
- Twisted-pair
- cable Fiber-optic cable
- Atmosphere
- Coaxial cable
Which of the following statement is wrong regarding PVC?
- PVC last as long as the customer pay the periodic fee for its use.
- Forwarding tables are automatically restored after power of equipment failure.
- Forwarding table entries for PVC’s are dynamically configured.
- All of the above are wrong
Which of the following statement is true regarding ATM?
- ATM is a single technology that is designed to meet the goals of both LANs and WANs.
- ATM uses the concept of connection-oriented networking.
- Both (a) and (b)
- None of the above
Djikstra’s algorithm is used to compute the……………….
- shortest path between two nodes
- number of nodes used in the network
- distance between different nodes
- none of the above
Routing table is used to keep the information about…………….
- Destination
- Medium of transmission
- Routers used in network
- All of the above
Which of the following statement is true regarding Jitter?
- Jitter is used for variance in transmission delays.
- Jitter can occur when a packet is delayed.
- Jitter is significance for voice, video and data.
- All of the above
The maximum cable length of a LAN is _____
- Fixed
- Unlimited
- Fixed and Unlimited in different conditions
- None of these
Jitter is significance for ——————
- Voice
- Video
- Data
- All of above
The routing table contains information about the ………………immediately around it.
- topology of the network
- destination
- both of the above
- none of the above
Which of the following is called virtual channel?
- Connection in VCI
- Connection in ATM
- Connection in virtual circuit
- None of the above
If a bridge builds up address list for each segment that consists of physical addresses of the computer attached to that segment. So, when the bridge boots, the size of list will be__ for each segment.
Asynchronous Transfer Mode uses small fixed size cell. Each cell consist of ———– octets.
Which of the following statement is true regarding ATM?
- ATM is a single technology that is designed to meet the goals of both LANs and WANs.
- ATM uses the concept of connection-oriented networking.
- Both (a) and (b)
- None of the above
Frame forwarding of a bridge is based on _________.
- Layer 3 source address
- Layer 3 destination address
- Layer 2 destination address
- Layer 2 Source address
The process of forwarding the packets of information is called…………….
- Routing
- Switching
- Communication
- None of the above
Which one of the following is a property of static routing?
- It is inflexible
- It is done at boot time
- It has low network overload
- All of the above
According to a bridges Performance, if both the sauces and destination are on the same segment
- It forward the frame to the other segment
- It does not forward the frame to the other segment
- It does not forward the frame to the same segment
- It forwards the frame to every other segment
What will be the bandwidth rate for future (possibly 10 Gigabyte) Ethernet?
- 500 MHz
- 550 MHz
- 600 MHz
- 650 MHz
Asynchronous Transfer Mode uses the concept of …………..
- Connection-less network
- Connection-oriented network
The fiber-modem converts data into _________ then transmits cover the optional fiber
- Pulses of light
- Electrons
- Electromagnetic signals
- None of these
How many methods exist for computing routing table?
If a link or a packet switch fails then which one of the following would possibly be happened?
- Link would be reestablished
- Request to change failed hardware would appear
- The packet switch will modify the tables
- None of the above
The routing contains information about immediately around it
- Topology of the network
- Destination
- Both of the above
- None of the above
SMDS is ……………………
- Connectionless service
- Connection oriented service
- Used for delivering blocks of data
- None of the above
The process of forwarding the packets of information is called
- Routing
- Switching
- Communication
- None of the above
The sharing of a medium and its link by two or more devices is called
- modulation
- encoding
- line discipline
- multiplexing
Which multiplexing technique transmits analog signals?
Which multiplexing technique transmits digital signals?
Which multiplexing technique shifts each signal to a different carrier frequency?
- FDM
- TDM
- Both (a) and (b)
- None of above
In synchronous TDM, for n signal sources of the same data rate, each frame contains _______ slots.
Which multiplexing technique involves signals composed of light beams?
_________ Utilization is the use of available bandwidth to achieve specific goals.
- Frequency
- Bandwidth
- Amplitude
- None of the above
________ can be achieved by using multiplexing; ______ can be achieved by using spreading.
- Efficiency; privacy and antijamming
- Privacy and antijamming; efficiency
- Privacy and efficiency; antijamming
- Efficiency and antijamming; privacy
________ is the set of techniques that allows the simultaneous transmission of multiple signals across a single data link.
The word ______ refers to the portion of a _______ that carries a transmission.
- channel; link
- link; channel
- line; channel
- line; link
______ can be applied when the bandwidth of a link (in hertz) is greater than the combined bandwidths of the signals to be transmitted.
- TDM
- FDM
- Both (a) or (b)
- Neither (a) or (b)
FSM is an _________technique.
- Analog
- Digital
- Either (a) or b)
- None of the above
____ is designed to use the high bandwidth capability of fiber-optic cable.
- FDM
- TDM
- WDM
- None of the above
____ is a digital multiplexing technique for combining several low-rate channels into one high-rate one.
- FDM
- TDM
- WDM
- None of the above
____ is designed to use the high bandwidth capability of fiber-optic cable.
- FDM
- TDM
- WDM
- None of the above
______ is an analog multiplexing technique to combine optical signals.
- FDM
- TDM
- WDM
- None of the above
_____ is a digital process that allows several connections to share the high bandwidth of a link.
- FDM
- TDM
- WDM
- None of the above
_____ is a digital multiplexing technique for combining several low-rate channels into one high-rate one.
- FDM
- TDM
- WDM
- None of the above
Djikstra’s algorithm is used to compute the……………….
- shortest path between two nodes
- number of nodes used in the network
- distance between different nodes
- none of the above
Which one of the following is the responsibility of Djikstra’ algorithm
- To compute the shortest path between two nodes
- To extract next hop information from path information
- To extract next hop information from path information
- None of above
What will be the bandwidth rate for short distance 10Base-T
What will be the bandwidth rate for older, low-speed network, and analog telephones
How many methods exist for building routing table?
Which of the following statement is wrong regarding ATM?
- It is a single technology for voice, video and data
- it has low jitter and high capacity.
- it uses fixed size, small cells, 48 octet’s data
- None of the above
In Asynchronous Transfer Mode VPI/VCI fields indentify the cells
- Source
- Destination
- port@
- none
The physical addressing in a WAN is similar as in LAN in the way…………….
- The data is transmitted in packets equivalent to frames.
- Each packet has a format with header.
- The packet header includes destination and source addresses.
- All of the above
Which one of the following is a method for computing routing table information?
- Manual entry
- Boot time routing
- Static routing
- None of the above
All destinations on same switch have same
- Router
- Information
- Next hop
- None of the above
Which of the following statement is wrong regarding ATM?
- It is a single technology for voice, video and data
- It has low jitter and high capacity.
- It uses fixed size, small cells, 48 octet’s data
- None of the above
Which one of the following is the responsibility of Djikstra’ algorithm?
- To compute the shortest path between two nodes
- To extract next hop information from path information
- To insert next hop information into routing table
- All of the above
Which of the following statement is true regarding Link-state routing?
- Network topology is separated from route computation.
- Each switch builds its own routing tables.
- Link-state routing uses Djikstra’s algorithm.
- All of the above
Jitter is significance for ——————
- Voice
- Video
- Data
- All of above
The routing table contains information about the ………………immediately around it.
- topology of the network
- destination
- both of the above
- none of the above
Which one of the following is a property of dynamic routing?
- It is inflexible
- It has low network overload
- It can work around network failure
- All of the above
An exterior switch is one with which ………………….
- Computers are attached
- No computer is attached
- hubs are attached externally
- None of the above
Which of the following statement regarding ATM is true?
- Connections in ATM are called virtual channels
- The VC is identified by a 24-bit value formed from the VPI
- Both (a) and (b)
- None of the above
The fiber-modem coverts digital data into _______ then transmits over the optical fiber
- Pulses of light
- Electrons
- Electromagnetic signals
- None of these
_______network topology is a bus but wiring topology is a star
- 10Base-T
- Ring
- 10Base-W
- Star
Which of the following is not a guided medium?
- Twisted-pair cable
- Fiber-optic cable
- Atmosphere
- Coaxial cable
A system with redundant bridges might have a problem with_______ in the system.
- Select correct option:
- Filters
- Spanning Trees
- Addressing
- Loop
Repeaters are used when ______ communication is carries out
- Optical fiber
- Twisted Pair
- Copper wire
- All type of
The mechanism of extending the optical fiber across several kilometers is very successful because delays on optical fiber are very _____ and bandwidth is very _____
- Low, High
- High, Low
- High, High
- Low, Low
To span long distances or many computers, networks must replace shared medium with…………
- segment transformation
- fiber optices
- packet switches
- None of the above
Which one is incorrect statement?
- Hub wiring centralizes electronics and connections. It makes management easier
- No Transceiver allows computers to be powered off or disconnected from network without distracting other communication
- Transceiver may be located in an inconvenient place in any situation
- None of these
An interior switch is one with which ………………….
- Computers are attached
- No computer is attached
- Computers are attached internally
- None of the above