Deck 9: Network Organization Concepts

ملء الشاشة (f)
exit full mode
سؤال
Star topology permits easy routing.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
In the virtual circuit approach, the destination and packet sequence number are not added to the information identifying the packet's message.
سؤال
A MAN is a high-speed network often configured using a physical ring topology.
سؤال
A common goal of all networked systems is to provide a convenient way to share resources while controlling users' access to them.
سؤال
When using RIP the entire table is updated only when changes have occurred; this decreases internetwork traffic and positively affects the delivery of messages.
سؤال
Typically, a host at one site, called the client, has resources that a host at another site, called the server, wants to use.
سؤال
A WLAN typically poses security vulnerabilities because of its open architecture and the inherent difficulty of keeping out unauthorized intruders.
سؤال
Packet switching is very similar to circuit switching.
سؤال
The objective of a hybrid configuration is to select among the strong points of each topology and combine them to meet that system's communications requirements most effectively.
سؤال
In a ring topology each packet is passed from node to node in both directions, and the destination station copies the data into a local buffer.
سؤال
A router is an internetworking device, primarily software driven, which directs traffic between two different types of LANs or two network segments with different protocol addresses.
سؤال
The IEEE standard 802.11b is not compatible with 802.11g.
سؤال
The tree topology is a collection of rings.
سؤال
In a bus topology, devices are physically connected by means of cables that run between them, and the cables pass through a centralized controller mechanism called the bus.
سؤال
Ethernet is the most widely known CSMA/CD protocol.
سؤال
Round robin is an inefficient technique when there are many nodes transmitting over long periods of time.
سؤال
Circuit switching is a communication model in which a dedicated communication path is established between two hosts.
سؤال
The physical topology of a network may not reflect its logical topology.
سؤال
Addressing protocols are normally unrelated to the network topology and geographic location of each site.
سؤال
A local area network is generally owned, used, and operated by a single organization and allows computers to communicate directly through a common communication line.
سؤال
Layer 6 of the OSI model is responsible for providing a user-oriented connection service and transferring data over the communication lines.
سؤال
Bridging between two homogeneous networks occurs at the data link level.
سؤال
A token-passing network always uses a star topology.
سؤال
When using a ring topology, a ____ can be used to connect to another network.

A) star
B) central controller
C) router
D) bridge
سؤال
When using RIP, the path ____ is chosen.

A) with the fastest server
B) that is most secure
C) with the shortest response time
D) with the smallest number of hops
سؤال
In the address someone@icarus.lis.pitt.edu, the host name in this address is ____.

A) someone
B) icarus
C) lis
D) pitt
سؤال
A ____ is the specific set of rules used to control the flow of messages through the network.

A) topology
B) protocol
C) system
D) configuration
سؤال
Usually, the term "____" indicates a specific location in a network containing one or more computer systems.

A) site
B) host
C) node
D) remote
سؤال
The Internet layer is equivalent to the data link layer of the OSI model.
سؤال
When deciding which configuration to use, designers should keep in mind four criteria: ____.

A) equipment cost, time to implement, reliability, and scalability
B) equipment cost, time to implement, throughput, and security
C) basic cost, communication cost, reliability, and user's environment
D) basic cost, scalability, reliability, and user's environment
سؤال
The geometric arrangement of connections (cables, wireless, or both) that link the nodes is called a ____.

A) layout
B) topology
C) map
D) physical network
سؤال
The maximum circumference for a MAN is ____.

A) 10 miles
B) 50 kilometers
C) 100 kilometers
D) 200 miles
سؤال
A ____ is an internetworking device, primarily software driven, which directs traffic between two different types of LANs or two network segments with different protocol addresses.

A) router
B) bridge
C) gateway
D) bus
سؤال
When using the distributed-queue, dual bus (DQDB) protocol, transmission on each bus consists of a steady stream of fixed-size slots.
سؤال
The ____ is the most vulnerable to security breaches.

A) LAN
B) MAN
C) WAN
D) WLAN
سؤال
In the ____ topology, hosts are connected to one another in a linear fashion.

A) bus
B) ring
C) star
D) gateway
سؤال
High-speed LANs have a data rate that varies from 100 megabits per second to more than ____ per second.

A) 1000 megabits
B) 20 gigabits
C) 40 gigabits
D) 100 gigabits
سؤال
A ____ is typically a cluster of personal computers or workstations located in the same general area.

A) LAN
B) MAN
C) WAN
D) PAN
سؤال
When using a bus topology, ____ sites can successfully send a message at a time.

A) 1
B) 10
C) 100
D) an unlimited number
سؤال
In the ____ topology configuration hosts are connected to each other through a central controller which assumes all responsibility for routing messages to the appropriate host.

A) bus
B) spiral
C) ring
D) star
سؤال
In the OSI transport protocol model, Layer Six is ____.

A) physical
B) network
C) presentation
D) application
سؤال
The distributed-queue, dual bus (DQDB) protocol is intended for use with a dual-bus configuration, where each bus transports data in only one direction, and has been standardized by one of the IEEE committees as part of its ____ standards.

A) token ring
B) MAN
C) LAN
D) ISO
سؤال
____ is a good example of a circuit-switched network.

A) A telephone system
B) The Internet
C) The United States Postal Service
D) A local area network
سؤال
In the TCP/IP model, the ____ layer is equivalent to the transport and session layers of the OSI model.

A) host-host
B) Internet
C) network access
D) process/application
سؤال
There are ____ layers in the TCP/IP model.

A) two
B) four
C) seven
D) ten
سؤال
Carrier sense multiple access (CSMA) is a ____-based protocol.

A) round robin
B) reservation
C) contention
D) detection
سؤال
____ is true of packet switching.

A) Preferred in low volume networks
B) Easily overloaded
C) Reduced line efficiency
D) Shared by many transmissions
سؤال
In the OSI model, Layer ____ provides the interface to users and is responsible for formatting user data before passing it to the lower layers for transmission to a remote host.

A) Three
B) Four
C) Six
D) Seven
سؤال
In the ____ approach, the destination and sequence number of the packet is added to the information uniquely identifying the message to which the packet belongs; each packet is then handled independently and a route is selected as each packet is accepted into the network.

A) physical circuit
B) datagram
C) telegram
D) virtual circuit
سؤال
When using CSMA/CD, and a collision occurs, a jamming signal is sent immediately to both sending nodes, which then wait ____ before trying again.

A) one millisecond
B) one second
C) one minute
D) a random period
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 9: Network Organization Concepts
1
Star topology permits easy routing.
True
2
In the virtual circuit approach, the destination and packet sequence number are not added to the information identifying the packet's message.
True
3
A MAN is a high-speed network often configured using a physical ring topology.
False
4
A common goal of all networked systems is to provide a convenient way to share resources while controlling users' access to them.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
5
When using RIP the entire table is updated only when changes have occurred; this decreases internetwork traffic and positively affects the delivery of messages.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
6
Typically, a host at one site, called the client, has resources that a host at another site, called the server, wants to use.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
7
A WLAN typically poses security vulnerabilities because of its open architecture and the inherent difficulty of keeping out unauthorized intruders.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
8
Packet switching is very similar to circuit switching.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
9
The objective of a hybrid configuration is to select among the strong points of each topology and combine them to meet that system's communications requirements most effectively.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
10
In a ring topology each packet is passed from node to node in both directions, and the destination station copies the data into a local buffer.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
11
A router is an internetworking device, primarily software driven, which directs traffic between two different types of LANs or two network segments with different protocol addresses.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
12
The IEEE standard 802.11b is not compatible with 802.11g.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
13
The tree topology is a collection of rings.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
14
In a bus topology, devices are physically connected by means of cables that run between them, and the cables pass through a centralized controller mechanism called the bus.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
15
Ethernet is the most widely known CSMA/CD protocol.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
16
Round robin is an inefficient technique when there are many nodes transmitting over long periods of time.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
17
Circuit switching is a communication model in which a dedicated communication path is established between two hosts.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
18
The physical topology of a network may not reflect its logical topology.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
19
Addressing protocols are normally unrelated to the network topology and geographic location of each site.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
20
A local area network is generally owned, used, and operated by a single organization and allows computers to communicate directly through a common communication line.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
21
Layer 6 of the OSI model is responsible for providing a user-oriented connection service and transferring data over the communication lines.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
22
Bridging between two homogeneous networks occurs at the data link level.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
23
A token-passing network always uses a star topology.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
24
When using a ring topology, a ____ can be used to connect to another network.

A) star
B) central controller
C) router
D) bridge
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
25
When using RIP, the path ____ is chosen.

A) with the fastest server
B) that is most secure
C) with the shortest response time
D) with the smallest number of hops
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
26
In the address someone@icarus.lis.pitt.edu, the host name in this address is ____.

A) someone
B) icarus
C) lis
D) pitt
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
27
A ____ is the specific set of rules used to control the flow of messages through the network.

A) topology
B) protocol
C) system
D) configuration
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
28
Usually, the term "____" indicates a specific location in a network containing one or more computer systems.

A) site
B) host
C) node
D) remote
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
29
The Internet layer is equivalent to the data link layer of the OSI model.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
30
When deciding which configuration to use, designers should keep in mind four criteria: ____.

A) equipment cost, time to implement, reliability, and scalability
B) equipment cost, time to implement, throughput, and security
C) basic cost, communication cost, reliability, and user's environment
D) basic cost, scalability, reliability, and user's environment
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
31
The geometric arrangement of connections (cables, wireless, or both) that link the nodes is called a ____.

A) layout
B) topology
C) map
D) physical network
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
32
The maximum circumference for a MAN is ____.

A) 10 miles
B) 50 kilometers
C) 100 kilometers
D) 200 miles
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
33
A ____ is an internetworking device, primarily software driven, which directs traffic between two different types of LANs or two network segments with different protocol addresses.

A) router
B) bridge
C) gateway
D) bus
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
34
When using the distributed-queue, dual bus (DQDB) protocol, transmission on each bus consists of a steady stream of fixed-size slots.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
35
The ____ is the most vulnerable to security breaches.

A) LAN
B) MAN
C) WAN
D) WLAN
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
36
In the ____ topology, hosts are connected to one another in a linear fashion.

A) bus
B) ring
C) star
D) gateway
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
37
High-speed LANs have a data rate that varies from 100 megabits per second to more than ____ per second.

A) 1000 megabits
B) 20 gigabits
C) 40 gigabits
D) 100 gigabits
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
38
A ____ is typically a cluster of personal computers or workstations located in the same general area.

A) LAN
B) MAN
C) WAN
D) PAN
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
39
When using a bus topology, ____ sites can successfully send a message at a time.

A) 1
B) 10
C) 100
D) an unlimited number
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
40
In the ____ topology configuration hosts are connected to each other through a central controller which assumes all responsibility for routing messages to the appropriate host.

A) bus
B) spiral
C) ring
D) star
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
41
In the OSI transport protocol model, Layer Six is ____.

A) physical
B) network
C) presentation
D) application
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
42
The distributed-queue, dual bus (DQDB) protocol is intended for use with a dual-bus configuration, where each bus transports data in only one direction, and has been standardized by one of the IEEE committees as part of its ____ standards.

A) token ring
B) MAN
C) LAN
D) ISO
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
43
____ is a good example of a circuit-switched network.

A) A telephone system
B) The Internet
C) The United States Postal Service
D) A local area network
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
44
In the TCP/IP model, the ____ layer is equivalent to the transport and session layers of the OSI model.

A) host-host
B) Internet
C) network access
D) process/application
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
45
There are ____ layers in the TCP/IP model.

A) two
B) four
C) seven
D) ten
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
46
Carrier sense multiple access (CSMA) is a ____-based protocol.

A) round robin
B) reservation
C) contention
D) detection
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
47
____ is true of packet switching.

A) Preferred in low volume networks
B) Easily overloaded
C) Reduced line efficiency
D) Shared by many transmissions
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
48
In the OSI model, Layer ____ provides the interface to users and is responsible for formatting user data before passing it to the lower layers for transmission to a remote host.

A) Three
B) Four
C) Six
D) Seven
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
49
In the ____ approach, the destination and sequence number of the packet is added to the information uniquely identifying the message to which the packet belongs; each packet is then handled independently and a route is selected as each packet is accepted into the network.

A) physical circuit
B) datagram
C) telegram
D) virtual circuit
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
50
When using CSMA/CD, and a collision occurs, a jamming signal is sent immediately to both sending nodes, which then wait ____ before trying again.

A) one millisecond
B) one second
C) one minute
D) a random period
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.