Deck 9: Network Organization Concepts

Full screen (f)
exit full mode
Question
Star topology permits easy routing.
Use Space or
up arrow
down arrow
to flip the card.
Question
In the virtual circuit approach, the destination and packet sequence number are not added to the information identifying the packet's message.
Question
A MAN is a high-speed network often configured using a physical ring topology.
Question
A common goal of all networked systems is to provide a convenient way to share resources while controlling users' access to them.
Question
When using RIP the entire table is updated only when changes have occurred; this decreases internetwork traffic and positively affects the delivery of messages.
Question
Typically, a host at one site, called the client, has resources that a host at another site, called the server, wants to use.
Question
A WLAN typically poses security vulnerabilities because of its open architecture and the inherent difficulty of keeping out unauthorized intruders.
Question
Packet switching is very similar to circuit switching.
Question
The objective of a hybrid configuration is to select among the strong points of each topology and combine them to meet that system's communications requirements most effectively.
Question
In a ring topology each packet is passed from node to node in both directions, and the destination station copies the data into a local buffer.
Question
A router is an internetworking device, primarily software driven, which directs traffic between two different types of LANs or two network segments with different protocol addresses.
Question
The IEEE standard 802.11b is not compatible with 802.11g.
Question
The tree topology is a collection of rings.
Question
In a bus topology, devices are physically connected by means of cables that run between them, and the cables pass through a centralized controller mechanism called the bus.
Question
Ethernet is the most widely known CSMA/CD protocol.
Question
Round robin is an inefficient technique when there are many nodes transmitting over long periods of time.
Question
Circuit switching is a communication model in which a dedicated communication path is established between two hosts.
Question
The physical topology of a network may not reflect its logical topology.
Question
Addressing protocols are normally unrelated to the network topology and geographic location of each site.
Question
A local area network is generally owned, used, and operated by a single organization and allows computers to communicate directly through a common communication line.
Question
Layer 6 of the OSI model is responsible for providing a user-oriented connection service and transferring data over the communication lines.
Question
Bridging between two homogeneous networks occurs at the data link level.
Question
A token-passing network always uses a star topology.
Question
When using a ring topology, a ____ can be used to connect to another network.

A) star
B) central controller
C) router
D) bridge
Question
When using RIP, the path ____ is chosen.

A) with the fastest server
B) that is most secure
C) with the shortest response time
D) with the smallest number of hops
Question
In the address someone@icarus.lis.pitt.edu, the host name in this address is ____.

A) someone
B) icarus
C) lis
D) pitt
Question
A ____ is the specific set of rules used to control the flow of messages through the network.

A) topology
B) protocol
C) system
D) configuration
Question
Usually, the term "____" indicates a specific location in a network containing one or more computer systems.

A) site
B) host
C) node
D) remote
Question
The Internet layer is equivalent to the data link layer of the OSI model.
Question
When deciding which configuration to use, designers should keep in mind four criteria: ____.

A) equipment cost, time to implement, reliability, and scalability
B) equipment cost, time to implement, throughput, and security
C) basic cost, communication cost, reliability, and user's environment
D) basic cost, scalability, reliability, and user's environment
Question
The geometric arrangement of connections (cables, wireless, or both) that link the nodes is called a ____.

A) layout
B) topology
C) map
D) physical network
Question
The maximum circumference for a MAN is ____.

A) 10 miles
B) 50 kilometers
C) 100 kilometers
D) 200 miles
Question
A ____ is an internetworking device, primarily software driven, which directs traffic between two different types of LANs or two network segments with different protocol addresses.

A) router
B) bridge
C) gateway
D) bus
Question
When using the distributed-queue, dual bus (DQDB) protocol, transmission on each bus consists of a steady stream of fixed-size slots.
Question
The ____ is the most vulnerable to security breaches.

A) LAN
B) MAN
C) WAN
D) WLAN
Question
In the ____ topology, hosts are connected to one another in a linear fashion.

A) bus
B) ring
C) star
D) gateway
Question
High-speed LANs have a data rate that varies from 100 megabits per second to more than ____ per second.

A) 1000 megabits
B) 20 gigabits
C) 40 gigabits
D) 100 gigabits
Question
A ____ is typically a cluster of personal computers or workstations located in the same general area.

A) LAN
B) MAN
C) WAN
D) PAN
Question
When using a bus topology, ____ sites can successfully send a message at a time.

A) 1
B) 10
C) 100
D) an unlimited number
Question
In the ____ topology configuration hosts are connected to each other through a central controller which assumes all responsibility for routing messages to the appropriate host.

A) bus
B) spiral
C) ring
D) star
Question
In the OSI transport protocol model, Layer Six is ____.

A) physical
B) network
C) presentation
D) application
Question
The distributed-queue, dual bus (DQDB) protocol is intended for use with a dual-bus configuration, where each bus transports data in only one direction, and has been standardized by one of the IEEE committees as part of its ____ standards.

A) token ring
B) MAN
C) LAN
D) ISO
Question
____ is a good example of a circuit-switched network.

A) A telephone system
B) The Internet
C) The United States Postal Service
D) A local area network
Question
In the TCP/IP model, the ____ layer is equivalent to the transport and session layers of the OSI model.

A) host-host
B) Internet
C) network access
D) process/application
Question
There are ____ layers in the TCP/IP model.

A) two
B) four
C) seven
D) ten
Question
Carrier sense multiple access (CSMA) is a ____-based protocol.

A) round robin
B) reservation
C) contention
D) detection
Question
____ is true of packet switching.

A) Preferred in low volume networks
B) Easily overloaded
C) Reduced line efficiency
D) Shared by many transmissions
Question
In the OSI model, Layer ____ provides the interface to users and is responsible for formatting user data before passing it to the lower layers for transmission to a remote host.

A) Three
B) Four
C) Six
D) Seven
Question
In the ____ approach, the destination and sequence number of the packet is added to the information uniquely identifying the message to which the packet belongs; each packet is then handled independently and a route is selected as each packet is accepted into the network.

A) physical circuit
B) datagram
C) telegram
D) virtual circuit
Question
When using CSMA/CD, and a collision occurs, a jamming signal is sent immediately to both sending nodes, which then wait ____ before trying again.

A) one millisecond
B) one second
C) one minute
D) a random period
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 9: Network Organization Concepts
1
Star topology permits easy routing.
True
2
In the virtual circuit approach, the destination and packet sequence number are not added to the information identifying the packet's message.
True
3
A MAN is a high-speed network often configured using a physical ring topology.
False
4
A common goal of all networked systems is to provide a convenient way to share resources while controlling users' access to them.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
5
When using RIP the entire table is updated only when changes have occurred; this decreases internetwork traffic and positively affects the delivery of messages.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
6
Typically, a host at one site, called the client, has resources that a host at another site, called the server, wants to use.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
7
A WLAN typically poses security vulnerabilities because of its open architecture and the inherent difficulty of keeping out unauthorized intruders.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
8
Packet switching is very similar to circuit switching.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
9
The objective of a hybrid configuration is to select among the strong points of each topology and combine them to meet that system's communications requirements most effectively.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
10
In a ring topology each packet is passed from node to node in both directions, and the destination station copies the data into a local buffer.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
11
A router is an internetworking device, primarily software driven, which directs traffic between two different types of LANs or two network segments with different protocol addresses.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
12
The IEEE standard 802.11b is not compatible with 802.11g.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
13
The tree topology is a collection of rings.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
14
In a bus topology, devices are physically connected by means of cables that run between them, and the cables pass through a centralized controller mechanism called the bus.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
15
Ethernet is the most widely known CSMA/CD protocol.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
16
Round robin is an inefficient technique when there are many nodes transmitting over long periods of time.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
17
Circuit switching is a communication model in which a dedicated communication path is established between two hosts.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
18
The physical topology of a network may not reflect its logical topology.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
19
Addressing protocols are normally unrelated to the network topology and geographic location of each site.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
20
A local area network is generally owned, used, and operated by a single organization and allows computers to communicate directly through a common communication line.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
21
Layer 6 of the OSI model is responsible for providing a user-oriented connection service and transferring data over the communication lines.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
22
Bridging between two homogeneous networks occurs at the data link level.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
23
A token-passing network always uses a star topology.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
24
When using a ring topology, a ____ can be used to connect to another network.

A) star
B) central controller
C) router
D) bridge
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
25
When using RIP, the path ____ is chosen.

A) with the fastest server
B) that is most secure
C) with the shortest response time
D) with the smallest number of hops
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
26
In the address someone@icarus.lis.pitt.edu, the host name in this address is ____.

A) someone
B) icarus
C) lis
D) pitt
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
27
A ____ is the specific set of rules used to control the flow of messages through the network.

A) topology
B) protocol
C) system
D) configuration
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
28
Usually, the term "____" indicates a specific location in a network containing one or more computer systems.

A) site
B) host
C) node
D) remote
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
29
The Internet layer is equivalent to the data link layer of the OSI model.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
30
When deciding which configuration to use, designers should keep in mind four criteria: ____.

A) equipment cost, time to implement, reliability, and scalability
B) equipment cost, time to implement, throughput, and security
C) basic cost, communication cost, reliability, and user's environment
D) basic cost, scalability, reliability, and user's environment
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
31
The geometric arrangement of connections (cables, wireless, or both) that link the nodes is called a ____.

A) layout
B) topology
C) map
D) physical network
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
32
The maximum circumference for a MAN is ____.

A) 10 miles
B) 50 kilometers
C) 100 kilometers
D) 200 miles
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
33
A ____ is an internetworking device, primarily software driven, which directs traffic between two different types of LANs or two network segments with different protocol addresses.

A) router
B) bridge
C) gateway
D) bus
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
34
When using the distributed-queue, dual bus (DQDB) protocol, transmission on each bus consists of a steady stream of fixed-size slots.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
35
The ____ is the most vulnerable to security breaches.

A) LAN
B) MAN
C) WAN
D) WLAN
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
36
In the ____ topology, hosts are connected to one another in a linear fashion.

A) bus
B) ring
C) star
D) gateway
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
37
High-speed LANs have a data rate that varies from 100 megabits per second to more than ____ per second.

A) 1000 megabits
B) 20 gigabits
C) 40 gigabits
D) 100 gigabits
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
38
A ____ is typically a cluster of personal computers or workstations located in the same general area.

A) LAN
B) MAN
C) WAN
D) PAN
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
39
When using a bus topology, ____ sites can successfully send a message at a time.

A) 1
B) 10
C) 100
D) an unlimited number
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
40
In the ____ topology configuration hosts are connected to each other through a central controller which assumes all responsibility for routing messages to the appropriate host.

A) bus
B) spiral
C) ring
D) star
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
41
In the OSI transport protocol model, Layer Six is ____.

A) physical
B) network
C) presentation
D) application
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
42
The distributed-queue, dual bus (DQDB) protocol is intended for use with a dual-bus configuration, where each bus transports data in only one direction, and has been standardized by one of the IEEE committees as part of its ____ standards.

A) token ring
B) MAN
C) LAN
D) ISO
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
43
____ is a good example of a circuit-switched network.

A) A telephone system
B) The Internet
C) The United States Postal Service
D) A local area network
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
44
In the TCP/IP model, the ____ layer is equivalent to the transport and session layers of the OSI model.

A) host-host
B) Internet
C) network access
D) process/application
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
45
There are ____ layers in the TCP/IP model.

A) two
B) four
C) seven
D) ten
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
46
Carrier sense multiple access (CSMA) is a ____-based protocol.

A) round robin
B) reservation
C) contention
D) detection
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
47
____ is true of packet switching.

A) Preferred in low volume networks
B) Easily overloaded
C) Reduced line efficiency
D) Shared by many transmissions
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
48
In the OSI model, Layer ____ provides the interface to users and is responsible for formatting user data before passing it to the lower layers for transmission to a remote host.

A) Three
B) Four
C) Six
D) Seven
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
49
In the ____ approach, the destination and sequence number of the packet is added to the information uniquely identifying the message to which the packet belongs; each packet is then handled independently and a route is selected as each packet is accepted into the network.

A) physical circuit
B) datagram
C) telegram
D) virtual circuit
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
50
When using CSMA/CD, and a collision occurs, a jamming signal is sent immediately to both sending nodes, which then wait ____ before trying again.

A) one millisecond
B) one second
C) one minute
D) a random period
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 50 flashcards in this deck.