Telecom test 2 (b)

studied byStudied by 2 people
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 204

flashcard set

Earn XP

Description and Tags

205 Terms

1
The ____________ layer links the application layer with the network layer is responsible for end-to-end delivery of messages.

b. transport
New cards
2
__________ is not an important function of the transport layer.

c. routing
New cards
3
_______ is the dominant network protocol today.

d. TCP/IP
New cards
4
Transmission Control Protocol/Internet Protocol was developed for ________ in 1974.

a. ARPANET
New cards
5
TCP/IP:

b. performs packetizing, as well as routing and addressing functions
New cards
6
A typical TCP packet has a _______ header of control information.

d. 192-bit
New cards
7
The source destination port identifier tells the destination station _____________.

c. which application layer process the packet is from.
New cards
8
TCP uses _____________ so that the destination station can reassemble the packets into the correct order.

b. sequence numbers
New cards
9
The older version of IP has a ________ header of control information.

b. 192-bit
New cards
10
IP:

d. performs routing functions
New cards
11
The newer form of IP, version 6 (Ipv6):

c. has an increased address size from 32 bits to 128 bits
New cards
12
Assume that more than one application program is using the same communications line on a particular computer. To be able to decide to which application program a message should be delivered on this computer, TCP/IP relies on the:

b. port address
New cards
13
The transport layer must break messages from the application layer into several _____ that can be sent to the data link layer.

d. packets
New cards
14
The negotiation by the transport layer at the sender with the transport layer at the receiver to determine what size packets should be set up is done via establishing a(n) ___________ between the sender and receiver.

d. TCP connection
New cards
15
A TCP connection is established in the ___________ routing method.

b. connection-oriented
New cards
16
_____________ routing is a method of routing in which each packet makes its own way through the network.

d. Connectionless
New cards
17
Which of the following is not a protocol used at the application layer.

e. UDP
New cards
18
______________ routing is most commonly used when the application data or message can fit into one single packet.

c. Connectionless
New cards
19
UDP is not commonly used for:

d. HTTP requests
New cards
20
With QoS routing different __________ are defined, each with different priorities.

a. classes of service
New cards
21
An application layer address using TCP/IPv4 looks like:

b. www.cba.uga.edu
New cards
22
A client computer is assigned a data link layer address is by:

a. hardware manufacturers
New cards
23
ICANN:

c. approves which network layer addresses (usually, approved or assigned in groups or classes) can be used by an organization for its computers that will connect to the Internet
New cards
24
IPv6 is based upon _________ -byte addresses.

d. 16
New cards
25
IPv4 uses ________ bytes per Internet address.

a. 4
New cards
26
A(n) ________ refers to a group of computers that are logically grouped together by IP number.

b. subnet
New cards
27
A subnet mask of ___________ means that all computers with only the same first two bytes in their IPv4 addresses are on the same subnet.

d. 255.255.0.0
New cards
28
Dynamic addressing:

e. can solve many updating headaches for network managers who have large, growing, changing networks
New cards
29
___________ is the translation of application layer addresses into IP addresses.

c. Server name resolution
New cards
30
Server name resolution is done using the:

e. Domain Name Service
New cards
31
When TCP/IP translates an application layer address into an IP address, it sends a special __________ to the nearest DNS server.

b. DNS request packet
New cards
32
When TCP/IP translates a network layer address into a data link layer address, it sends a special ____________ to all computers in the subnet.

d. broadcast message
New cards
33
_________ is a specially formatted request used to perform IP address to data link address resolution.

a. Address Resolution Protocol
New cards
34
___________ is the process of determining the path that a message will travel from sending computer to receiving computer.

a. Routing
New cards
35
The _____________ is used by a computer to determine how messages will travel through the network.

a. routing table
New cards
36
In its simplest form, the __________ has two columns: the first column lists every computer and device in the network, while the second column lists the computer or device to which that computer should send messages, if they are destined for the computer in the first column.

b. routing table
New cards
37
The three fundamental approaches to routing are:

e. centralized, static routing, and dynamic routing
New cards
38
An advantage of centralized routing is:

router in the network than dynamic routing
c. routing decisions are simple
New cards
39
With ________ routing, computers or routers count the number of hops along a route and periodically exchange information on the hop count with their neighbors.

c. distance vector
New cards
40
____________ refers to the type of routing in which the routing table is developed by the network manager and modifications are made only when computers are added to or removed from the network.

c. Static routing
New cards
41
_______________ is a type of dynamic routing.

d. Link state
New cards
42
One drawback to dynamic routing is:

static routing.
c. The transmission of status information "wastes" network capacity that could be used to send user messages
New cards
43
The ping command uses the most basic interior routing protocol on the Internet, which is the:

b. Internet Control Message Protocol
New cards
44
A type of message that is used when sending a message from one computer to another computer is called a:


e. radiated message
a. unicast message
New cards
45
A special type of message that is used when sending the same message to a specific group of computers is called a:

b. multicast message
New cards
46
A special type of message that is used when sending the same message to all computers on a specific LAN or subnet is called a:

c. broadcast message
New cards
47
IGMP refers to:

d. Internet Group Management Protocol
New cards
48
Which of the following is not given to a client computer when it is first installed on a TCP/IP network so that it has the appropriate routing/addressing information?

a. application layer address
New cards
49
Which of the following is not a component of a router?

d. Keyboard
New cards
50
A majority of routers use the following operating system:

d. Cisco Internetwork Operating System
New cards
51
The ______ defines what type of packets should be routed and what types of packets should be discarded.

a. ACL
New cards
52
_________created a service that allows organizations to transfer IPv4 addresses they don't need to another organization.

c. ARIN
New cards
53
IPv4 provides ___________ IP addresses.

a. 4.3 billion
New cards
54
The _____ address range is reserved for a computer to communicate with itself and is called the loopback.

b. 127
New cards
55
IP addresses from 224 to 239 belong to Class D and are reserved for

c. multicasting
New cards
56
Which of the following is not a step under the traditional network design approach?

b. An analyst takes the traffic on the current network and then multiplies that by a factor of 3.65 to come up with the estimate of the total traffic for the new network.
New cards
57
The traditional network design approach does not work well for _________ networks.

b. rapidly growing
New cards
58
Which of the following is not making the traditional design approach less appropriate for today's networks?

e. The most expensive part of any network is the hardware
New cards
59
Which of the following is not contributing to the dramatic increase in network traffic today?

d. Client computers today can have 2GB of RAM, a 300 GB hard drive, and 2 Ghz processors.
New cards
60
Which of the following is false about staff costs for a network?

e. When a variety of devices are used in a network, it takes less time to perform network management activities
New cards
61
The building block design approach is sometimes called:

b. narrow and deep
New cards
62
Nowadays, most organizations use a simpler approach to network design called the ___________ approach.

a. building-block
New cards
63
Which of the following is not a step used in newer types of network design processes?

c. implementation
New cards
64
In __________, the network designer attempts to understand the fundamental current and future network needs of the various users, departments, and applications.

b. needs analysis
New cards
65
In __________, the network designer examines the available technologies and assesses which options will meet the users' needs.

a. technology design
New cards
66
In __________, the network designer considers the relative cost of the technologies.

d. cost assessment
New cards
67
Which of the following is not true about network design?

d. In designing LAN networks, network designers tend to err on the side of building too small a network
New cards
68
In needs analysis:

b. the goal is to understand what users and applications the network will support
New cards
69
Gaining an understanding of the current application system and messages provides a _________ against which future design requirements can be gauged.

b. baseline
New cards
70
The goal of the needs analysis step is to produce a ___________, or a statement of the network elements necessary to meet the needs of the organization.

e. logical network design
New cards
71
__________ is not an important consideration when network designers review old and new applications.

a. Reviewing the NFL scores
New cards
72
Which of the following is not an example of identifying protocols that are needed to support hardware and software requirements of applications that will use the network?


e. an application will have drop down menu choices
New cards
73
Which of the following is not a way in which network requirements, identified in the needs analysis of the network design process, are organized?

a. non-necessary requirements
New cards
74
Which of the following is not included in the key deliverable for the needs assessment stage, the set of logical network diagrams?

d. specific routers that have been chosen to implement the proposed network
New cards
75
Which of the following is not an example of a building block used in technology design?

e. specifications for a particular lighting fixture in the network operating center
New cards
76
Once the needs have been defined in the logical network design, the next step is to develop a(n) __________.

c. technology design
New cards
77
Which of the following is a type of protocol that needs to be considered in technology design?

a. Ethernet
New cards
78
Estimating the size and type of the "standard" and "advanced" network circuits is called _________.

d. capacity planning
New cards
79
Which of the following would not be a type of circuit that needs to be considered when planning for technology design capacity?

b. Ethernet
New cards
80
In the technology design stage of network design,

d. the decisions for fundamental technology/protocols and circuit capacity are interrelated
New cards
81
___________ refers to the amount of data transmitted on a circuit.

a. Circuit loading
New cards
82
__________ is an estimate of the highest data volume on a link.

c. Peak circuit traffic
New cards
83
To establish circuit loading, the designer usually starts with the:

a. total characters transmitted per day on each circuit, or, if possible, the number of characters transmitted per two-second intervals if peaks must be met
New cards
84
According to one rule of thumb, ______ percent of circuit loading information is easy to gather.

c. 80
New cards
85
A _________ results when a network is used to a greater extent than was originally anticipated by the network designer.

c. turnpike effect
New cards
86
There are some network modeling tools that can ________ the existing network.

a. discover
New cards
87
________ is used to model the behavior of the planned communication network once the proposed network map is complete.

d. Simulation
New cards
88
Which of the following are not costs that are generally considered during the cost assessment stage of the network design process?

a. cost of advertising brochures for new products to be offered by an organization
New cards
89
Which of the following is not a main item for which network designers estimate costs for the proposed network?

d. ergonomic chairs for users
New cards
90
To estimate costs for large network purchases, organizations often:

e. issue an RFP to vendors
New cards
91
RFP stands for:

a. Request for Proposal
New cards
92
Estimating the cost of a network is ______ complex than estimating the cost of one new piece of data processing hardware.

a. much more
New cards
93
Which of the following is a way to sell the network proposal to management?

d. focus on the growth in network use
New cards
94
Which of the following is not a key deliverable for the cost assessment step?

b. list of wish list requirements
New cards
95
The large network purchases are done:

d. after the vendor(s) are selected
New cards
96
The network architecture component which enables users to access the network is the

a. LAN
New cards
97
The network architecture component that is sometimes referred to as the distribution layer is the

b. building backbone
New cards
98
The network architecture component which contains the organization's servers is called the

c. data center
New cards
99
The network architecture component that is a special LAN with a group of servers that enables electronic data exchange of between the organization and the external entities it does business with is called the

e. e-commerce edge
New cards
100
A circuit that is filled almost to its capacity and thus is the critical point that determines whether users get good or bad response times is referred to as a(n)

a. bottleneck
New cards

Explore top notes

note Note
studied byStudied by 369 people
936 days ago
5.0(5)
note Note
studied byStudied by 3 people
189 days ago
4.0(1)
note Note
studied byStudied by 4 people
32 days ago
5.0(1)
note Note
studied byStudied by 10 people
690 days ago
5.0(1)
note Note
studied byStudied by 42 people
616 days ago
5.0(1)
note Note
studied byStudied by 329 people
694 days ago
5.0(2)
note Note
studied byStudied by 16 people
726 days ago
5.0(1)
note Note
studied byStudied by 423 people
709 days ago
5.0(1)

Explore top flashcards

flashcards Flashcard (36)
studied byStudied by 4 people
786 days ago
5.0(1)
flashcards Flashcard (63)
studied byStudied by 2 people
13 days ago
5.0(1)
flashcards Flashcard (24)
studied byStudied by 864 people
185 days ago
4.5(18)
flashcards Flashcard (77)
studied byStudied by 50 people
25 days ago
5.0(1)
flashcards Flashcard (266)
studied byStudied by 8 people
819 days ago
5.0(1)
flashcards Flashcard (39)
studied byStudied by 49 people
902 days ago
5.0(1)
flashcards Flashcard (36)
studied byStudied by 1 person
171 days ago
5.0(1)
flashcards Flashcard (45)
studied byStudied by 6 people
824 days ago
5.0(1)
robot