Which of the following statements is NOT right about the Network layer?
a. The major role of the Network layer is to enable internetworking by creating and moving packets from the source to the destination.
b.Bridges and 2-layer switches are representative network layer devices.
c.The IP address is a logical address used in the Network layer.
d.Both IP and ICMP are Network layer protocols.
Answer: B
Learn More :
Data Communications
- ____ avoids congestion by requiring users to negotiate with the network regarding how much traffic they will be sending, or what resources the network must provide to satisfy the user's needs before the user sends any data.
- In ____, before one node sends a series of n packets to another node, the sending node inquires in advance whether the receiving node has enough buffer space for the n packets.
- With ____, when a frame relay router experiences congestion, it sends a congestion signal forward to the destination station, which in turn tells the originating station to slow down the transfer of data.
- When an application is simply observing its own throughput and not relying on any special types of signals coming from the network, this is called ____ congestion control.
- When a network or a part of a network becomes so saturated with data packets that packet transfer is noticeably impeded, ____ occurs.
- With ____ routing, routing tables are created once, typically when the network is installed, and then never updated again.
- When routing tables adapt to network changes, the routing system is called ____.
- ____ and distributed routing are methods for sending routing information.
- One of the primary advantages of ____ routing is the fact that no single node is responsible for maintaining all routing information.
- ___ routing involves storing all the routing information at one central location.
- ____ is advantageous when a copy of a packet needs to get to all nodes.
- Each time a packet is copied, a counter associated with the packet increases by one. This counter is called the ____.
- A network limit, called the ____, can be placed on how many times any packet is copied.
- A classic algorithm that calculates a least-cost path through a network is ____ algorithm.
- ____ applications do not negotiate a connection, and the transfer of data is rarely, if ever, acknowledged.
- A ____ application does not guarantee the delivery of any information or data.
- A ____ network application provides some guarantee that information traveling through the network will be delivered to the intended receiver in the same order in which it was transmitted.
- A ____ network is the only network that offers a dedicated path.
- ___ and virtual circuit networks require path setup time and cannot dynamically reroute packets should a network problem occur.
- When a node on a wide area network ____ network transmits its data, the data is received by all the other nodes.
- The two types of packet-switched networks are the datagram and the ____.
- To distinguish between a piece of data processed at the data link layer and a piece of data processed at the network layer, the term "____" is used at the data link layer, and the term "packet" is used at the network layer.
- The ____-switched network is most often found in networks designed to transfer computer data (such as the Internet).
- The three basic types of subnetworks are ____, packet-switched, and broadcast.
- The type and number of interconnections between nodes and the way network data is passed from node to node are the responsibility of the ____.