The process of forwarding the packets of information is called…………….
Routing
Switching
Communication
None of the above
Which one of the following is a property of static routing?
It is inflexible
It is done at boot time
It has low network overload
All of the above
According to a bridges Performance, if both the sauces and destination are on the same segment
It forward the frame to the other segment
It does not forward the frame to the other segment
It does not forward the frame to the same segment
It forwards the frame to every other segment
What will be the bandwidth rate for future (possibly 10 Gigabyte) Ethernet?
500 MHz
550 MHz
600 MHz
650 MHz
Asynchronous Transfer Mode uses the concept of …………..
Connection-less network
Connection-oriented network
The fiber-modem converts data into _________ then transmits cover the
optional fiber
Pulses of light
Electrons
Electromagnetic signals
None of these
How many methods exist for computing routing table?
5
4
3
2
To span long distance or many computers, networks must replace shared medium with ………..
Segment transformation
Fiber optics
Packet switches
None of the above
Which of the following statement is true regarding Distance-vector routing?
It is very simple to implement.
Packet switch updates own routing table first
It is used in RIP
All of the above
What will be the bandwidth rate for 1000Base-T Gigabyte or ATM?
100 MHz
150 MHz
200 MHz
250 MHz
CBR stands for…………….
Constant Byte Rate
Constant Bit Rate
Connection break Recovery
None of the above
The routing table in interior and exterior switches has which one of the following?
It should have next hop for each possible destination
The next hop in table must be on shortest path to destination
Both (a) and (b)
None of the above
Which one of the following is a method for computing routing table
information?
Manual entry
Static routing
Boot time routing
None of the above
Which one of the following is the responsibility of Djikstra’ algorithm?
To compute the shortest path between two nodes
To extract next hop information from path information
To insert next hop information into routing table
All of the above
Routing table is used to keep the information about…………….
Destination
Medium of transmission
Routers used in network
All of the above
Frame relay is………………….
Connection oriented service
Connectionless service
It is typically ranges from 5Mbps to 1000Mbps.
None of the above
Which of the following is not a guided medium?
Twisted-pair
cable Fiber-optic cable
Atmosphere
Coaxial cable
Which of the following statement is wrong regarding PVC?
PVC last as long as the customer pay the periodic fee for its use.
Forwarding tables are automatically restored after power of equipment
failure.
Forwarding table entries for PVC’s are dynamically configured.
All of the above are wrong
Which of the following statement is true regarding ATM?
ATM is a single technology that is designed to meet the goals of both LANs and WANs.
ATM uses the concept of connection-oriented networking.
Both (a) and (b)
None of the above
Djikstra’s algorithm is used to compute the……………….
shortest path between two nodes
number of nodes used in the network
distance between different nodes
none of the above
If a link or a packet switch fails then which one of the following would possibly be happened?
Link would be reestablished
Request to change failed hardware would appear
The packet switch will modify the tables
None of the above
The routing contains information about immediately around it
Topology of the network
Destination
Both of the above
None of the above
SMDS is ……………………
Connectionless service
Connection oriented service
Used for delivering blocks of data
None of the above
The process of forwarding the packets of information is called
Routing
Switching
Communication
None of the above
The sharing of a medium and its link by two or more devices is called
modulation
encoding
line discipline
multiplexing
Which multiplexing technique transmits analog signals?
FDM
TDM
WDM
(a) and (c)
Which multiplexing technique transmits digital signals?
FDM
TDM
WDM
None of above
Which multiplexing technique shifts each signal to a different carrier frequency?
FDM
TDM
Both (a) and (b)
None of above
In synchronous TDM, for n signal sources of the same data rate, each frame contains _______ slots.
n
n+1
N-1
O to n
Which multiplexing technique involves signals composed of light beams?
FDM
TDM
WDM
None of above
_________ Utilization is the use of available bandwidth to achieve specific
goals.
Frequency
Bandwidth
Amplitude
None of the above
________ can be achieved by using multiplexing; ______ can be achieved by using spreading.
Efficiency; privacy and antijamming
Privacy and antijamming; efficiency
Privacy and efficiency; antijamming
Efficiency and antijamming; privacy
________ is the set of techniques that allows the simultaneous transmission of multiple signals across a single data link.
1; n
1:1
n;1
n;n
The word ______ refers to the portion of a _______ that carries a transmission.
channel; link
link; channel
line; channel
line; link
______ can be applied when the bandwidth of a link (in hertz) is greater than the combined bandwidths of the signals to be transmitted.
TDM
FDM
Both (a) or (b)
Neither (a) or (b)
FSM is an _________technique.
Analog
Digital
Either (a) or b)
None of the above
____ is designed to use the high bandwidth capability of fiber-optic cable.
FDM
TDM
WDM
None of the above
_____ is a digital multiplexing technique for combining several low-rate channels into one high-rate one.
FDM
TDM
WDM
None of the above
____ is designed to use the high bandwidth capability of fiber-optic cable.
FDM
TDM
WDM
None of the above
______ is an analog multiplexing technique to combine optical signals.
FDM
TDM
WDM
None of the above
_____ is a digital process that allows several connections to share the high bandwidth of a link.
FDM
TDM
WDM
None of the above
_____ is a digital multiplexing technique for combining several low-rate channels into one high-rate one.
FDM
TDM
WDM
None of the above
Djikstra’s algorithm is used to compute the……………….
shortest path between two nodes
number of nodes used in the network
distance between different nodes
none of the above
Which one of the following is the responsibility of Djikstra’ algorithm
To compute the shortest path between two nodes
To extract next hop information from path information
To extract next hop information from path information
None of above
What will be the bandwidth rate for short distance 10Base-T
16mhz
20mhz
100mhz
150mhz
What will be the bandwidth rate for older, low-speed network, and analog telephones
16
20
24
30
How many methods exist for building routing table?
1
2
3
4
Which of the following statement is wrong regarding ATM?
It is a single technology for voice, video and data
it has low jitter and high capacity.
it uses fixed size, small cells, 48 octet’s data
None of the above
In Asynchronous Transfer Mode VPI/VCI fields indentify the cells
Source
Destination
port@
none
The physical addressing in a WAN is similar as in LAN in the way…………….
The data is transmitted in packets equivalent to frames.
Each packet has a format with header.
The packet header includes destination and source addresses.
All of the above
Which one of the following is a method for computing routing table information?
Manual entry
Boot time routing
Static routing
None of the above
Routing table is used to keep the information about…………….
Destination
Medium of transmission
Routers used in network
All of the above
Which of the following statement is true regarding Jitter?
Jitter is used for variance in transmission delays.
Jitter can occur when a packet is delayed.
Jitter is significance for voice, video and data.
All of the above
The maximum cable length of a LAN is _____
Fixed
Unlimited
Fixed and Unlimited in different conditions
None of these
Jitter is significance for ——————
Voice
Video
Data
All of above
The routing table contains information about the ………………immediately around it.
topology of the network
destination
both of the above
none of the above
Which of the following is called virtual channel?
Connection in VCI
Connection in ATM
Connection in virtual circuit
None of the above
If a bridge builds up address list for each segment that consists of physical addresses of the computer attached to that segment. So, when the bridge boots, the size of list will be__ for each segment.
3
2
1
0
Asynchronous Transfer Mode uses small fixed size cell. Each cell consist of ———– octets.
55
53
52
51
Which of the following statement is true regarding ATM?
ATM is a single technology that is designed to meet the goals of both LANs and WANs.
ATM uses the concept of connection-oriented networking.
Both (a) and (b)
None of the above
Frame forwarding of a bridge is based on _________.
Select correct option:
Layer 3 source address
Layer 3 destination address
Layer 2 destination address
Layer 2 Source address
All destinations on same switch have same
Router
Information
Next hop
None of the above
Which of the following statement is wrong regarding ATM?
It is a single technology for voice, video and data
It has low jitter and high capacity.
It uses fixed size, small cells, 48 octet’s data
None of the above
Which one of the following is the responsibility of Djikstra’ algorithm?
To compute the shortest path between two nodes
To extract next hop information from path information
To insert next hop information into routing table
All of the above
Which of the following statement is true regarding Link-state routing?
Network topology is separated from route computation.
Each switch builds its own routing tables.
Link-state routing uses Djikstra’s algorithm.
All of the above
Jitter is significance for ——————
Voice
Video
Data
All of above
The routing table contains information about the ………………immediately around it.
topology of the network
destination
both of the above
none of the above
Which one of the following is a property of dynamic routing?
Select correct option:
It is inflexible
It has low network overload
It can work around network failure
All of the above
An exterior switch is one with which ………………….
Computers are attached
No computer is attached
hubs are attached externally
None of the above
Which of the following statement regarding ATM is true?
Connections in ATM are called virtual channels
The VC is identified by a 24-bit value formed from the VPI
Both (a) and (b)
None of the above
The fiber-modem coverts digital data into _______ then transmits over the optical fiber
Pulses of light
Electrons
Electromagnetic signals
None of these
_______network topology is a bus but wiring topology is a star
10Base-T
Ring
10Base-W
Star
Which of the following is not a guided medium?
Twisted-pair cable
Fiber-optic cable
Atmosphere
Coaxial cable
A system with redundant bridges might have a problem with_______ in the system.
Filters
Spanning Trees
Addressing
Loop
Repeaters are used when ______ communication is carries out
Optical fiber
Twisted Pair
Copper wire
All type of
The mechanism of extending the optical fiber across several kilometers is very successful because delays on optical fiber are very _____ and bandwidth is very _____
Low, High
High, Low
High, High
Low, Low
To span long distances or many computers, networks must replace shared medium with…………
segment transformation
fiber optices
packet switches
None of the above
Which one is incorrect statement?
Hub wiring centralizes electronics and connections. It makes management easier
No Transceiver allows computers to be powered off or disconnected from network without distracting other communication
Transceiver may be located in an inconvenient place in any situation
None of these
An interior switch is one with which ………………….
Computers are attached
No computer is attached
Computers are attached internally
None of the above