Deck 9: Introduction to Metropolitan Area Networks and Wide Area Networks

Full screen (f)
exit full mode
Question
Many of the same technologies and communications protocols found in local area networks are used to create metropolitan area networks.
Use Space or
up arrow
down arrow
to flip the card.
Question
A wide area network would not exist without a sub-network.
Question
The path in a circuit-switched network exists only in the software.
Question
Wide area networks share a few characteristics with local area networks.
Question
You can assign many meanings to the weights in a weighted network graph.
Question
Broadcast networks are as common as circuit-switched and packet-switched networks.
Question
To provide a reliable service,the network requires that a logical connection be established between the two endpoints.
Question
Circuit-switched networks were designed primarily for voice signals.
Question
A wide area network's sub-network,or cloud,may be categorized by the way it transfers information from one end of the sub-network to the other.
Question
Wide area networks carry both data and voice.
Question
A common example of a connection-oriented network application is DNS.
Question
Most MANs are supported by Ethernet ring technology.
Question
The sub-network of a wide area network is the logical infrastructure and thus consists of nodes and various types of interconnecting media.
Question
LANs cover much greater distances than MANs do.
Question
A wide area network's underlying sub-network consists of multiple nodes,each with multiple possible connections to other nodes within the sub-network.
Question
Local area network Ethernet allows users to set their own data transfer rates.
Question
A virtual circuit breaks a large amount of data into n packets.
Question
The underlying sub-network of a connectionless application cannot be a circuit-switched network.
Question
Some MAN topologies are based on a ring.
Question
SONET was designed to support multiple streams of voice channels.
Question
One disadvantage of distributed routing is related to the problems that arise if the routing tables need to be updated.
Question
The major disadvantage of flooding is the large number of copied packets distributed throughout the network.
Question
The first routing algorithm used within the Internet was called a distance vector routing algorithm.
Question
Compared to Dijkstra's least-cost routing algorithm,the flooding technique seems more complex.
Question
____ area networks can cover large geographic distances,including the entire Earth.

A) Personal
B) Local
C) Wide
D) Universal
Question
Most wide area networks use some form of Dijkstra's algorithm to determine a least-cost route through a network.
Question
The SONET network topology is a ____.

A) star
B) ring
C) bus
D) star-bus
Question
Any network is as strong as its strongest link.
Question
When all the routing information is in one place,it is difficult to make updates to the routing information.
Question
A feature that is fairly common in ____ is the ability of a user to dynamically allocate more bandwidth on demand.

A) PANs
B) LANs
C) MANs
D) WANs
Question
CSMA/CD is the only network technology that successfully supports connection admission control and quality of service.
Question
MANs are almost exclusively ____ networks,and thus capable of supporting data rates into the tens of millions and hundreds of millions of bits per second.

A) fiber-optic
B) copper-wired
C) twisted-paired
D) coaxial-cabled
Question
Some congestion control methods are based on simple techniques such as the flow control methods.
Question
Ciccuit-switched networks will someday replace packet-switched networks.
Question
Almost all MANs are based on one of two basic forms of supporting technology: ____ or Ethernet.

A) SONET
B) SOHO
C) GALNET
D) SWNET
Question
A network that expands beyond a metropolitan area is a ____ area network.

A) personal
B) local
C) metropolitan
D) wide
Question
When a user stores data in "the cloud",the data is stored on the user's premise in what is called a "cloud server".
Question
____ are advertised as networks with very low error rates and extremely high throughput.

A) PANs
B) UANs
C) GANs
D) MANs
Question
A ____ area network is typically confined to a single building or a couple floors within one building.

A) personal
B) local
C) metropolitan
D) wide
Question
SONET rings typically have a failover time of ____ milliseconds.

A) 20
B) 30
C) 40
D) 50
Question
A ____ network is the only network that offers a dedicated path.

A) packet-switched
B) broadcast
C) virtual circuit
D) circuit-switched
Question
____ is advantageous when a copy of a packet needs to get to all nodes.

A) Flooding
B) Dijkstra's least-cost
C) Dijkstra's shortest-path
D) Dijkstra's maximum-cost
Question
A network limit,called the ____,can be placed on how many times any packet is copied.

A) hop limit
B) hop count
C) time to live
D) time to hop
Question
A classic algorithm that calculates a least-cost path through a network is ____ algorithm.

A) Dijkstra's maximum-cost
B) Dijkstra's longest-path
C) Turing's longest-path
D) Dijkstra's least-cost
Question
A wide area network connects its workstations through the use of a ____ design and requires routing to transfer data across the network.

A) bus
B) star
C) mesh
D) ring
Question
____ applications do not negotiate a connection,and the transfer of data is rarely,if ever,acknowledged.

A) FTP
B) Connectionless
C) Connection-oriented
D) Reliable service
Question
All wide area networks are collections of at least two basic types of equipment: a station and a ____.

A) link
B) server
C) workstation
D) node
Question
The three basic types of subnetworks are ____,packet-switched,and broadcast.

A) multicast
B) protocol-switched
C) circuit-switched
D) unicast
Question
A local area network works as a ____ network in that clusters of workstations are connected to a central point (hub or switch)through which workstations can transmit messages to one another.

A) star-based
B) bus-based
C) ring-based
D) star-ring-based
Question
A network that is connected in a ____ is one in which neighbors are connected only to neighbors.

A) star
B) mesh
C) bus
D) star-bus
Question
The type and number of interconnections between nodes and the way network data is passed from node to node are the responsibility of the ____.

A) sub-network
B) station
C) server
D) client
Question
Each time a packet is copied,a counter associated with the packet increases by one.This counter is called the ____.

A) hop limit
B) time to live
C) TTL count
D) hop count
Question
A ____ profile describes various characteristics about the connection,such as basic data transfer rates,basic burst rates,excess data transfer rates,and excess burst rates.

A) bandwidth
B) server
C) client
D) router
Question
The two types of packet-switched networks are the datagram and the ____.

A) static circuit
B) fixed circuit
C) standard circuit
D) virtual circuit
Question
____ and virtual circuit networks require path setup time and cannot dynamically reroute packets should a network problem occur.

A) Broadcast
B) Wireless
C) Circuit-switched
D) Datagram
Question
When a node on a wide area network ____ network transmits its data,the data is received by all the other nodes.

A) broadcast
B) packet-switched
C) circuit-switched
D) datagram packet-switched
Question
To distinguish between a piece of data processed at the data link layer and a piece of data processed at the network layer,the term "____" is used at the data link layer,and the term "packet" is used at the network layer.

A) load
B) product
C) frame
D) payload
Question
A ____ network application provides some guarantee that information traveling through the network will be delivered to the intended receiver in the same order in which it was transmitted.

A) connectionless
B) connection-oriented
C) virtual circuit
D) packet-switched
Question
A ____ application does not guarantee the delivery of any information or data.

A) connectionless
B) connection-oriented
C) virtual circuit
D) packet-switched
Question
The ____-switched network is most often found in networks designed to transfer computer data (such as the Internet).

A) circuit
B) packet
C) protocol
D) port
Question
____ avoids congestion by requiring users to negotiate with the network regarding how much traffic they will be sending,or what resources the network must provide to satisfy the user's needs before the user sends any data.

A) Explicit congestion control
B) Implicit congestion control
C) Connection admission control
D) Buffer preallocation
Question
A(n)____________________ is a large surge of data that's transmitted for a short period of time.
Question
A(n)____________________ is a device that a user interacts with to access a network,and it contains the software application that allows someone to use the network for a particular purpose.
Question
____________________ is a data transfer service that can connect your business to another business (or businesses)using a standard Ethernet connection.
Question
When a network or a part of a network becomes so saturated with data packets that packet transfer is noticeably impeded,____ occurs.

A) network flowing
B) packet control
C) frame control
D) network congestion
Question
One of the primary advantages of ____ routing is the fact that no single node is responsible for maintaining all routing information.

A) centralized
B) focalized
C) distributed
D) local
Question
A ____ is a legally binding,written document,that can include service parameters offered in the service,various types of service/support options,incentives if the service levels are exceeded,and penalties if service levels are not met.

A) connection admission control
B) service level agreement
C) software license agreement
D) congestion control
Question
A network that expands into a metropolitan area and exhibits high data rates,high reliability,and low data loss is called a(n)___________________________________.
Question
____ routing involves storing all the routing information at one central location.

A) Distributed
B) Centralized
C) Remote
D) Fixed
Question
The speed at which a failover is performed is the ____________________.
Question
When an application is simply observing its own throughput and not relying on any special types of signals coming from the network,this is called ____ congestion control.

A) explicit
B) implicit
C) forward explicit
D) backward explicit
Question
With ____ routing,routing tables are created once,typically when the network is installed,and then never updated again.

A) fixed
B) adaptive
C) changing
D) modifying
Question
____________________ is a synchronous time division multiplexing technique that is capable of sending data at hundreds of millions of bits per second.
Question
When routing tables adapt to network changes,the routing system is called ____.

A) fixed
B) local
C) adaptive
D) static
Question
With ____,when a frame relay router experiences congestion,it sends a congestion signal forward to the destination station,which in turn tells the originating station to slow down the transfer of data.

A) forward explicit congestion notification (FECN)
B) backward explicit congestion notification (BECN)
C) implicit congestion control
D) remote congestion control
Question
A company that has a connection with Metro Ethernet can create a(n)____________________ for that connection.
Question
In ____,before one node sends a series of n packets to another node,the sending node inquires in advance whether the receiving node has enough buffer space for the n packets.

A) explicit congestion control
B) implicit congestion control
C) connection admission control
D) buffer preallocation
Question
____ and distributed routing are methods for controlling routing information.

A) Distributed
B) Adaptive
C) Fixed
D) Centralized
Question
The ability to reroute in the event of a failure is called ____________________.
Question
A(n)_________________________ is a collection of computers and computer-related equipment interconnected to perform a given function or functions and typically using local and long-distance telecommunications systems.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/101
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 9: Introduction to Metropolitan Area Networks and Wide Area Networks
1
Many of the same technologies and communications protocols found in local area networks are used to create metropolitan area networks.
True
2
A wide area network would not exist without a sub-network.
True
3
The path in a circuit-switched network exists only in the software.
False
4
Wide area networks share a few characteristics with local area networks.
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
5
You can assign many meanings to the weights in a weighted network graph.
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
6
Broadcast networks are as common as circuit-switched and packet-switched networks.
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
7
To provide a reliable service,the network requires that a logical connection be established between the two endpoints.
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
8
Circuit-switched networks were designed primarily for voice signals.
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
9
A wide area network's sub-network,or cloud,may be categorized by the way it transfers information from one end of the sub-network to the other.
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
10
Wide area networks carry both data and voice.
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
11
A common example of a connection-oriented network application is DNS.
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
12
Most MANs are supported by Ethernet ring technology.
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
13
The sub-network of a wide area network is the logical infrastructure and thus consists of nodes and various types of interconnecting media.
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
14
LANs cover much greater distances than MANs do.
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
15
A wide area network's underlying sub-network consists of multiple nodes,each with multiple possible connections to other nodes within the sub-network.
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
16
Local area network Ethernet allows users to set their own data transfer rates.
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
17
A virtual circuit breaks a large amount of data into n packets.
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
18
The underlying sub-network of a connectionless application cannot be a circuit-switched network.
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
19
Some MAN topologies are based on a ring.
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
20
SONET was designed to support multiple streams of voice channels.
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
21
One disadvantage of distributed routing is related to the problems that arise if the routing tables need to be updated.
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
22
The major disadvantage of flooding is the large number of copied packets distributed throughout the network.
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
23
The first routing algorithm used within the Internet was called a distance vector routing algorithm.
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
24
Compared to Dijkstra's least-cost routing algorithm,the flooding technique seems more complex.
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
25
____ area networks can cover large geographic distances,including the entire Earth.

A) Personal
B) Local
C) Wide
D) Universal
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
26
Most wide area networks use some form of Dijkstra's algorithm to determine a least-cost route through a network.
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
27
The SONET network topology is a ____.

A) star
B) ring
C) bus
D) star-bus
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
28
Any network is as strong as its strongest link.
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
29
When all the routing information is in one place,it is difficult to make updates to the routing information.
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
30
A feature that is fairly common in ____ is the ability of a user to dynamically allocate more bandwidth on demand.

A) PANs
B) LANs
C) MANs
D) WANs
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
31
CSMA/CD is the only network technology that successfully supports connection admission control and quality of service.
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
32
MANs are almost exclusively ____ networks,and thus capable of supporting data rates into the tens of millions and hundreds of millions of bits per second.

A) fiber-optic
B) copper-wired
C) twisted-paired
D) coaxial-cabled
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
33
Some congestion control methods are based on simple techniques such as the flow control methods.
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
34
Ciccuit-switched networks will someday replace packet-switched networks.
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
35
Almost all MANs are based on one of two basic forms of supporting technology: ____ or Ethernet.

A) SONET
B) SOHO
C) GALNET
D) SWNET
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
36
A network that expands beyond a metropolitan area is a ____ area network.

A) personal
B) local
C) metropolitan
D) wide
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
37
When a user stores data in "the cloud",the data is stored on the user's premise in what is called a "cloud server".
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
38
____ are advertised as networks with very low error rates and extremely high throughput.

A) PANs
B) UANs
C) GANs
D) MANs
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
39
A ____ area network is typically confined to a single building or a couple floors within one building.

A) personal
B) local
C) metropolitan
D) wide
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
40
SONET rings typically have a failover time of ____ milliseconds.

A) 20
B) 30
C) 40
D) 50
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
41
A ____ network is the only network that offers a dedicated path.

A) packet-switched
B) broadcast
C) virtual circuit
D) circuit-switched
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
42
____ is advantageous when a copy of a packet needs to get to all nodes.

A) Flooding
B) Dijkstra's least-cost
C) Dijkstra's shortest-path
D) Dijkstra's maximum-cost
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
43
A network limit,called the ____,can be placed on how many times any packet is copied.

A) hop limit
B) hop count
C) time to live
D) time to hop
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
44
A classic algorithm that calculates a least-cost path through a network is ____ algorithm.

A) Dijkstra's maximum-cost
B) Dijkstra's longest-path
C) Turing's longest-path
D) Dijkstra's least-cost
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
45
A wide area network connects its workstations through the use of a ____ design and requires routing to transfer data across the network.

A) bus
B) star
C) mesh
D) ring
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
46
____ applications do not negotiate a connection,and the transfer of data is rarely,if ever,acknowledged.

A) FTP
B) Connectionless
C) Connection-oriented
D) Reliable service
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
47
All wide area networks are collections of at least two basic types of equipment: a station and a ____.

A) link
B) server
C) workstation
D) node
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
48
The three basic types of subnetworks are ____,packet-switched,and broadcast.

A) multicast
B) protocol-switched
C) circuit-switched
D) unicast
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
49
A local area network works as a ____ network in that clusters of workstations are connected to a central point (hub or switch)through which workstations can transmit messages to one another.

A) star-based
B) bus-based
C) ring-based
D) star-ring-based
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
50
A network that is connected in a ____ is one in which neighbors are connected only to neighbors.

A) star
B) mesh
C) bus
D) star-bus
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
51
The type and number of interconnections between nodes and the way network data is passed from node to node are the responsibility of the ____.

A) sub-network
B) station
C) server
D) client
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
52
Each time a packet is copied,a counter associated with the packet increases by one.This counter is called the ____.

A) hop limit
B) time to live
C) TTL count
D) hop count
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
53
A ____ profile describes various characteristics about the connection,such as basic data transfer rates,basic burst rates,excess data transfer rates,and excess burst rates.

A) bandwidth
B) server
C) client
D) router
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
54
The two types of packet-switched networks are the datagram and the ____.

A) static circuit
B) fixed circuit
C) standard circuit
D) virtual circuit
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
55
____ and virtual circuit networks require path setup time and cannot dynamically reroute packets should a network problem occur.

A) Broadcast
B) Wireless
C) Circuit-switched
D) Datagram
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
56
When a node on a wide area network ____ network transmits its data,the data is received by all the other nodes.

A) broadcast
B) packet-switched
C) circuit-switched
D) datagram packet-switched
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
57
To distinguish between a piece of data processed at the data link layer and a piece of data processed at the network layer,the term "____" is used at the data link layer,and the term "packet" is used at the network layer.

A) load
B) product
C) frame
D) payload
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
58
A ____ network application provides some guarantee that information traveling through the network will be delivered to the intended receiver in the same order in which it was transmitted.

A) connectionless
B) connection-oriented
C) virtual circuit
D) packet-switched
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
59
A ____ application does not guarantee the delivery of any information or data.

A) connectionless
B) connection-oriented
C) virtual circuit
D) packet-switched
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
60
The ____-switched network is most often found in networks designed to transfer computer data (such as the Internet).

A) circuit
B) packet
C) protocol
D) port
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
61
____ avoids congestion by requiring users to negotiate with the network regarding how much traffic they will be sending,or what resources the network must provide to satisfy the user's needs before the user sends any data.

A) Explicit congestion control
B) Implicit congestion control
C) Connection admission control
D) Buffer preallocation
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
62
A(n)____________________ is a large surge of data that's transmitted for a short period of time.
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
63
A(n)____________________ is a device that a user interacts with to access a network,and it contains the software application that allows someone to use the network for a particular purpose.
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
64
____________________ is a data transfer service that can connect your business to another business (or businesses)using a standard Ethernet connection.
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
65
When a network or a part of a network becomes so saturated with data packets that packet transfer is noticeably impeded,____ occurs.

A) network flowing
B) packet control
C) frame control
D) network congestion
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
66
One of the primary advantages of ____ routing is the fact that no single node is responsible for maintaining all routing information.

A) centralized
B) focalized
C) distributed
D) local
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
67
A ____ is a legally binding,written document,that can include service parameters offered in the service,various types of service/support options,incentives if the service levels are exceeded,and penalties if service levels are not met.

A) connection admission control
B) service level agreement
C) software license agreement
D) congestion control
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
68
A network that expands into a metropolitan area and exhibits high data rates,high reliability,and low data loss is called a(n)___________________________________.
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
69
____ routing involves storing all the routing information at one central location.

A) Distributed
B) Centralized
C) Remote
D) Fixed
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
70
The speed at which a failover is performed is the ____________________.
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
71
When an application is simply observing its own throughput and not relying on any special types of signals coming from the network,this is called ____ congestion control.

A) explicit
B) implicit
C) forward explicit
D) backward explicit
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
72
With ____ routing,routing tables are created once,typically when the network is installed,and then never updated again.

A) fixed
B) adaptive
C) changing
D) modifying
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
73
____________________ is a synchronous time division multiplexing technique that is capable of sending data at hundreds of millions of bits per second.
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
74
When routing tables adapt to network changes,the routing system is called ____.

A) fixed
B) local
C) adaptive
D) static
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
75
With ____,when a frame relay router experiences congestion,it sends a congestion signal forward to the destination station,which in turn tells the originating station to slow down the transfer of data.

A) forward explicit congestion notification (FECN)
B) backward explicit congestion notification (BECN)
C) implicit congestion control
D) remote congestion control
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
76
A company that has a connection with Metro Ethernet can create a(n)____________________ for that connection.
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
77
In ____,before one node sends a series of n packets to another node,the sending node inquires in advance whether the receiving node has enough buffer space for the n packets.

A) explicit congestion control
B) implicit congestion control
C) connection admission control
D) buffer preallocation
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
78
____ and distributed routing are methods for controlling routing information.

A) Distributed
B) Adaptive
C) Fixed
D) Centralized
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
79
The ability to reroute in the event of a failure is called ____________________.
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
80
A(n)_________________________ is a collection of computers and computer-related equipment interconnected to perform a given function or functions and typically using local and long-distance telecommunications systems.
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 101 flashcards in this deck.