____ avoids congestion by requiring users to negotiate with the network regarding how much traffic they will be sending, or what resources the network...
In ____, before one node sends a series of n packets to another node, the sending node inquires in advance whether the receiving node has enough buffer space for the n packets.
In ____, before one node sends a series of n packets to another node, the sending node inquires in advance whether the receiving node has enough buffer...
With ____, when a frame relay router experiences congestion, it sends a congestion signal forward to the destination station, which in turn tells the originating station to slow down the transfer of data.
With ____, when a frame relay router experiences congestion, it sends a congestion signal forward to the destination station, which in turn tells the...
When an application is simply observing its own throughput and not relying on any special types of signals coming from the network, this is called ____ congestion control.
When an application is simply observing its own throughput and not relying on any special types of signals coming from the network, this is called ____...
When a network or a part of a network becomes so saturated with data packets that packet transfer is noticeably impeded, ____ occurs.
When a network or a part of a network becomes so saturated with data packets that packet transfer is noticeably impeded, ____ occurs.
a. network flowing...
With ____ routing, routing tables are created once, typically when the network is installed, and then never updated again.
With ____ routing, routing tables are created once, typically when the network is installed, and then never updated again.
a. fixed c. changing
b....
When routing tables adapt to network changes, the routing system is called ____.
When routing tables adapt to network changes, the routing system is called ____.
a. fixed c. adaptive
b. local d. static
Answer: ...
____ and distributed routing are methods for sending routing information.
____ and distributed routing are methods for sending routing information.
a. Distributed c. Fixed
b. Adaptive d. Centralized
Answer: ...
One of the primary advantages of ____ routing is the fact that no single node is responsible for maintaining all routing information.
One of the primary advantages of ____ routing is the fact that no single node is responsible for maintaining all routing information.
a. centralized...
___ routing involves storing all the routing information at one central location.
___ routing involves storing all the routing information at one central location.
a. Distributed c. Remote
b. Centralized d. Fixed
Answer: ...
____ is advantageous when a copy of a packet needs to get to all nodes.
____ is advantageous when a copy of a packet needs to get to all nodes.
a. Flooding c. Dijkstra's shortest-path
b. Dijkstra's least-cost d. Dijkstra's...
Each time a packet is copied, a counter associated with the packet increases by one. This counter is called the ____.
Each time a packet is copied, a counter associated with the packet increases by one. This counter is called the ____.
a. hop limit c. TTL count
b....
A network limit, called the ____, can be placed on how many times any packet is copied.
A network limit, called the ____, can be placed on how many times any packet is copied.
a. hop limit c. time to live
b. hop count d. time to hop
...
A classic algorithm that calculates a least-cost path through a network is ____ algorithm.
A classic algorithm that calculates a least-cost path through a network is ____ algorithm.
a. Dijkstra's maximum-cost c. Turing's longest-path
b....
____ applications do not negotiate a connection, and the transfer of data is rarely, if ever, acknowledged.
____ applications do not negotiate a connection, and the transfer of data is rarely, if ever, acknowledged.
a. FTP c. Connection-oriented
b. Connectionless...
A ____ application does not guarantee the delivery of any information or data.
A ____ application does not guarantee the delivery of any information or data.
a. connectionless c. virtual circuit
b. connection-oriented d. pac...
A ____ network application provides some guarantee that information traveling through the network will be delivered to the intended receiver in the same order in which it was transmitted.
A ____ network application provides some guarantee that information traveling through the network will be delivered to the intended receiver in the...
A ____ network is the only network that offers a dedicated path.
A ____ network is the only network that offers a dedicated path.
a. packet-switched c. virtual circuit
b. broadcast d. circuit-switched
Answer:...
___ and virtual circuit networks require path setup time and cannot dynamically reroute packets should a network problem occur.
___ and virtual circuit networks require path setup time and cannot dynamically reroute packets should a network problem occur.
a. Broadcast c. Circuit-switched
b....
When a node on a wide area network ____ network transmits its data, the data is received by all the other nodes.
When a node on a wide area network ____ network transmits its data, the data is received by all the other nodes.
a. broadcast c. circuit-switched
b....
The two types of packet-switched networks are the datagram and the ____.
The two types of packet-switched networks are the datagram and the ____.
a. static circuit c. standard circuit
b. fixed circuit d. virtual circui...
To distinguish between a piece of data processed at the data link layer and a piece of data processed at the network layer, the term "____" is used at the data link layer, and the term "packet" is used at the network layer.
To distinguish between a piece of data processed at the data link layer and a piece of data processed at the network layer, the term "____" is used...
The ____-switched network is most often found in networks designed to transfer computer data (such as the Internet).
The ____-switched network is most often found in networks designed to transfer computer data (such as the Internet).
a. circuit c. protocol
b. packet...
The three basic types of subnetworks are ____, packet-switched, and broadcast.
The three basic types of subnetworks are ____, packet-switched, and broadcast.
a. multicast c. circuit-switched
b. protocol-switched d. unicast
...
The type and number of interconnections between nodes and the way network data is passed from node to node are the responsibility of the ____.
The type and number of interconnections between nodes and the way network data is passed from node to node are the responsibility of the ____.
a....
All wide area networks are collections of at least two basic types of equipment: a station and a ____.
All wide area networks are collections of at least two basic types of equipment: a station and a ____.
a. link c. workstation
b. server d. node
...
A network that is connected in a ____ is one in which neighbors are connected only to neighbors.
A network that is connected in a ____ is one in which neighbors are connected only to neighbors.
a. star c. bus
b. mesh d. star-bus
Answer:&nbs...
A wide area network connects its workstations through the use of a ____ design and requires routing to transfer data across the network.
A wide area network connects its workstations through the use of a ____ design and requires routing to transfer data across the network.
a. bus c....
A local area network works as a ____ network in that clusters of workstations are connected to a central point (hub or switch) through which workstations can transmit messages to one another.
A local area network works as a ____ network in that clusters of workstations are connected to a central point (hub or switch) through which workstations...
A ____ profile describes various characteristics about the connection, such as basic data transfer rates, basic burst rates, excess data transfer rates, and excess burst rates.
A ____ profile describes various characteristics about the connection, such as basic data transfer rates, basic burst rates, excess data transfer rates,...
SONET rings typically have a failover time of ____ milliseconds.
SONET rings typically have a failover time of ____ milliseconds.
a. 20 c. 40
b. 30 d. 50
Answer: ...
The SONET network topology is a ____.
The SONET network topology is a ____.
a. star c. bus
b. ring d. star-bus
Answer: ...
Almost all MANs are based on one of two basic forms of supporting technology: ____ or Ethernet.
Almost all MANs are based on one of two basic forms of supporting technology: ____ or Ethernet.
a. SONET c. GALNET
b. SOHO d. SWNET
Answer:&nbs...
A feature that is fairly common in ____ is the ability of a user to dynamically allocate more bandwidth on demand.
A feature that is fairly common in ____ is the ability of a user to dynamically allocate more bandwidth on demand.
a. PANs c. MANs
b. LANs d. WAN...
___ are advertised as networks with very low error rates and extremely high throughput.
____ are advertised as networks with very low error rates and extremely high throughput.
a. PANs c. GANs
b. UANs d. MANs
Answer: ...
MANs are almost exclusively ____ networks, and thus capable of supporting data rates into the tens of millions and hundreds of millions of bits per second.
MANs are almost exclusively ____ networks, and thus capable of supporting data rates into the tens of millions and hundreds of millions of bits per...
___ area networks can cover large geographic distances, including the entire Earth.
___ area networks can cover large geographic distances, including the entire Earth.
a. Personal c. Wide
b. Local d. Universal
Answer: ...
A network that expands beyond a metropolitan area is a ____ area network.
A network that expands beyond a metropolitan area is a ____ area network.
a. personal c. metropolitan
b. local d. wide
Answer: ...
A ____ area network is typically confined to a single building or a couple floors within one building.
A ____ area network is typically confined to a single building or a couple floors within one building.
a. personal c. metropolitan
b. local d. wi...
Whether shared or dedicated segments are involved, the primary goal of a(n) ____ is to isolate a particular pattern of traffic from other patterns of traffic or from the remainder of the network.
Whether shared or dedicated segments are involved, the primary goal of a(n) ____ is to isolate a particular pattern of traffic from other patterns of...
A relatively new standard, IEEE ____, was designed to allow multiple devices to intercommunicate and work together to create a virtual LAN.
A relatively new standard, IEEE ____, was designed to allow multiple devices to intercommunicate and work together to create a virtual LAN.
a. 802.1a...
One of the more interesting applications for a dedicated segment network and a switch is creating a ____.
One of the more interesting applications for a dedicated segment network and a switch is creating a ____.
a. virtual LAN c. shared LAN
b. dedicated...
In ____ segment networks, a switch may be directly connected to a workstation, and the switch connects to the hub.
In ____ segment networks, a switch may be directly connected to a workstation, and the switch connects to the hub.
a. shared c. distributed
b. dedicated...
Depending on user requirements, a switch can interconnect two different types of CSMA/CD network segments: ____ segments and dedicated segments.
Depending on user requirements, a switch can interconnect two different types of CSMA/CD network segments: ____ segments and dedicated segments.
a....
If a switch has eight 100-Mbps ports, the backplane has to support a total of ____ Mbps.
If a switch has eight 100-Mbps ports, the backplane has to support a total of ____ Mbps.
a. 200 c. 600
b. 400 d. 800
Answer: ...
In a ____ architecture, the data frame begins to exit the switch almost as soon as it begins to enter the switch.
In a ____ architecture, the data frame begins to exit the switch almost as soon as it begins to enter the switch.
a. forward c. cut-through
b. backward...
The switch operates in place of a ____.
The switch operates in place of a ____.
a. repeater c. router
b. bridge d. hub
Answer: ...
A transparent bridge creates the internal port table by using a form of ____.
A transparent bridge creates the internal port table by using a form of ____.
a. forward learning c. backward learning
b. backward correction d. forward...
A ____ is a device that interconnects two segments of local area networks and acts as a filter.
A ____ is a device that interconnects two segments of local area networks and acts as a filter.
a. hub c. router
b. switch d. satellite
Answer:...
A ____ is a device that interconnects two or more workstations in a star-wired bus local area network and immediately retransmits the data it receives from any workstation out to all other workstations connected.
A ____ is a device that interconnects two or more workstations in a star-wired bus local area network and immediately retransmits the data it receives...
The ____ is used to connect local area networks to wide area networks.
The ____ is used to connect local area networks to wide area networks.
a. hub c. router
b. repeater d. bridge
Answer: ...
The ____ LAN is geared toward the small office or home office.
The ____ LAN is geared toward the small office or home office.
a. SMART c. GRID
b. SOHO d. Gigabit
Answer: ...
The IEEE ____ standard is said to be capable of 100 Mbps wireless transmissions.
The IEEE ____ standard is said to be capable of 100 Mbps wireless transmissions.
a. 802.11a c. 802.11g
b. 802.11b d. 802.11n
Answer: ...
With ____, you can send electrical power over the Ethernet connection.
With ____, you can send electrical power over the Ethernet connection.
a. 1Base5 c. 10GBase-fiber
b. power over Ethernet (PoE) d. FDDI
Answer:&...
The IEEE 802.3z standards are also known as ____ Ethernet.
The IEEE 802.3z standards are also known as ____ Ethernet.
a. Switch c. Gigabit
b. Fast d. Terabit
Answer: ...
____ was the standard created for fiber-optic systems.
____ was the standard created for fiber-optic systems.
a. 1Base5 c. 100BaseTX
b. 10BaseTX d. 100BaseFX
Answer: ...
IEEE created the 100-Mbps Ethernet 802.3u protocol also called ____ Ethernet.
IEEE created the 100-Mbps Ethernet 802.3u protocol also called ____ Ethernet.
a. Fast c. Terabit
b. Gigabit d. FDDI
Answer: ...
A ____ system transmits 10-Mbps baseband (digital) signals over twisted pair for a maximum of 100 meters per segment length.
A ____ system transmits 10-Mbps baseband (digital) signals over twisted pair for a maximum of 100 meters per segment length.
a. 1Base5 c. 10BaseT
b....
____ was a system designed for twisted pair wiring, but with only a 1-Mbps data transfer rate for 500 meters.
____ was a system designed for twisted pair wiring, but with only a 1-Mbps data transfer rate for 500 meters.
a. 10BaseT c. 100BaseTX
b. 10Broad36...
The ____ standard was one of the first Ethernet standards approved.
The ____ standard was one of the first Ethernet standards approved.
a. 10Broad36 c. 100BaseTX
b. 10Base5 d. 100BaseT4
Answer: ...
____ was the first commercially available local area network system and remains, without a doubt, the most popular local area network system today.
____ was the first commercially available local area network system and remains, without a doubt, the most popular local area network system today.
a....
The ____ sublayer is primarily responsible for logical addressing and providing error control and flow control information.
The ____ sublayer is primarily responsible for logical addressing and providing error control and flow control information.
a. medium access control...
The ____ sublayer contains a header, computer (physical) addresses, error-detection codes, and control information.
The ____ sublayer contains a header, computer (physical) addresses, error-detection codes, and control information.
a. logical link control (LLC)...
In CSMA/CA, the amount of time a device is made to wait before it can transmit is called the ____.
In CSMA/CA, the amount of time a device is made to wait before it can transmit is called the ____.
a. frame space (FS) c. interframe space (IFS)
b....
The interval during which the signals propagate down the bus and back is the ____.
The interval during which the signals propagate down the bus and back is the ____.
a. exponential backoff c. attenuation
b. collision window d. bounce...
The most popular contention-based protocol is ____.
The most popular contention-based protocol is ____.
a. token ring
b. round-robin
c. carrier sense multiple access with collision avoidance (CSMA/CA)
d....
A(n) ____ protocol is the software that allows a workstation to place data onto a local area network.
A(n) ____ protocol is the software that allows a workstation to place data onto a local area network.
a. error control c. medium access control
b....
____, a European standard, is capable of transmitting data at a theoretical 54 Mbps using the 5-GHz frequency range.
____, a European standard, is capable of transmitting data at a theoretical 54 Mbps using the 5-GHz frequency range.
a. WiMAX c. WiLAN/3
b. HiperLAN/2...
In the ____, or ad hoc, layouts configuration, there is no access point at the center of a cell.
In the ____, or ad hoc, layouts configuration, there is no access point at the center of a cell.
a. peer-to-peer c. single-cell
b. multiple-cell d....
In the ____ layout configuration, multiple cells are supported by multiple access points, as in a cellular telephone network.
In the ____ layout configuration, multiple cells are supported by multiple access points, as in a cellular telephone network.
a. multiple-cell c....
The ____ is essentially the interface device between the wireless user device and the wired local area network.
The ____ is essentially the interface device between the wireless user device and the wired local area network.
a. wireless server c. NIC
b. wireless...
A local area network that is not based primarily on physical wiring but uses wireless transmissions between workstations is a(n) ____.
A local area network that is not based primarily on physical wiring but uses wireless transmissions between workstations is a(n) ____.
a. FDDI c....
When two or more hubs are interconnected and a workstation transmits data, all the workstations connected to all the hubs receive the data. This is an example of a(n) ____.
When two or more hubs are interconnected and a workstation transmits data, all the workstations connected to all the hubs receive the data. This is...
___ cabling has become the preferred medium for star-wired bus topologies.
___ cabling has become the preferred medium for star-wired bus topologies.
a. Twisted pair c. Fiber-optic
b. Coaxial d. FDDI
Answer: ...
The ____ design of a network determines how the data moves around the network from workstation to workstation.
The ____ design of a network determines how the data moves around the network from workstation to workstation.
a. electrical c. physical
b. data d....
The most popular configuration for a local area network is the ____ topology.
The most popular configuration for a local area network is the ____ topology.
a. ring c. bus
b. star-wired bus d. tree
Answer: ...
More complex bus topologies consisting of multiple interconnected cable segments are termed ____.
More complex bus topologies consisting of multiple interconnected cable segments are termed ____.
a. tokens c. rings
b. stars d. trees
Answer:&...
Two different signaling technologies can be used with a bus network: baseband signaling and ____ signaling.
Two different signaling technologies can be used with a bus network: baseband signaling and ____ signaling.
a. multiband c. uniband
b. broadband d....
In a bus/tree topology, connecting to the cable requires a simple device called a(n) ____.
In a bus/tree topology, connecting to the cable requires a simple device called a(n) ____.
a. hub c. tap
b. router d. echo suppressor
Answer:&n...
The ____ topology consists of a simple cable, or bus, to which all devices attach.
The ____ topology consists of a simple cable, or bus, to which all devices attach.
a. bus/tree c. ring star
b. token ring d. star
Answer: ...
The local area network software called a ____ server provides workstations with the authorization to access a particular printer, accepts and queues prints jobs, prints cover sheets, and allows users access to the job queue for routine administrative functions.
The local area network software called a ____ server provides workstations with the authorization to access a particular printer, accepts and queues...
A local area network performs file serving when it's connected to a workstation with a large storage disk drive that acts as a central storage repository, or ____ server.
A local area network performs file serving when it's connected to a workstation with a large storage disk drive that acts as a central storage repository,...
Early local area networks transmitted data at only ____ million bits per second.
Early local area networks transmitted data at only ____ million bits per second.
a. 1 c. 100
b. 10 d. 1000
Answer: ...
If a receiver has just received one packet of data with bytes numbered 600 to 700, it will respond immediately with ____.
If a receiver has just received one packet of data with bytes numbered 600 to 700, it will respond immediately with ____.
a. an ACK of 700 c. an ACK...
If a receiver correctly receives packets 2, 3, and 4, it will respond with a(an) ____ .
If a receiver correctly receives packets 2, 3, and 4, it will respond with a(an) ____ .
a. ACK 3 c. ACK 5
b. ACK 4 d. NAK
Answer: ...
For a receiver to be able to fix an error—in a process called ____—redundant information must be present so that the receiver knows which bit or bits are in error and what their original values were.
For a receiver to be able to fix an error—in a process called ____—redundant information must be present so that the receiver knows which bit or bits...
A ____ protocol's function is simply to inform the transmitter what piece of data is expected next.
A ____ protocol's function is simply to inform the transmitter what piece of data is expected next.
a. CRC-16 c. stop-and-wait
b. CRC-32 d. sliding...
With the sliding window protocol, a station that had a maximum window size of 7 could transmit only ____ data packets at one time before it had to stop and wait for an acknowledgment.
With the sliding window protocol, a station that had a maximum window size of 7 could transmit only ____ data packets at one time before it had to stop...
___ is a flow control scheme that allows a station to transmit a number of data packets at one time before receiving some form of acknowledgment.
___ is a flow control scheme that allows a station to transmit a number of data packets at one time before receiving some form of acknowledgment.
a....
When working with stop-and-wait error control, the amount of time a station waits before retransmitting a packet is called ____.
When working with stop-and-wait error control, the amount of time a station waits before retransmitting a packet is called ____.
a. stop time c. NAK...
____ error control is a technique usually associated with the Stop-and-wait flow control protocol.
____ error control is a technique usually associated with the Stop-and-wait flow control protocol.
a. Stop-and-wait c. Sliding window
b. Timeout d....
___ is probably the most common form of error control.
___ is probably the most common form of error control.
a. Do nothing
b. Correct the error without retransmission
c. Sending a message back to the...
____ cable is the medium least prone to generating errors.
____ cable is the medium least prone to generating errors.
a. Fiber-optic c. Twisted-pair
b. Coaxial d. Copper-based
Answer: ...
____ is offered by telephone companies to transfer data over wide areas.
____ is offered by telephone companies to transfer data over wide areas.
a. RS-232 c. SSL
b. EIA-232F d. Frame Relay
Answer: ...
____ for error control is becoming a mode of operation for some modern wide area network transmission techniques.
____ for error control is becoming a mode of operation for some modern wide area network transmission techniques.
a. Returning a message c. Correcting...
CRC-____ is found in Ethernet LANs.
CRC-____ is found in Ethernet LANs.
a. 5 c. 32
b. 12 d. 64
Answer: ...
The cyclic redundancy checksum (CRC) is also called ____.
The cyclic redundancy checksum (CRC) is also called ____.
a. horizontal parity c. bit parity
b. vertical cyclic parity d. cyclic checksum
Answe...
Longitudinal parity is sometimes called longitudinal redundancy check or ____ parity.
Longitudinal parity is sometimes called longitudinal redundancy check or ____ parity.
a. vertical c. random
b. horizontal d. binary
Answer:&nbs...
Error bursts occur ____ percent of the time.
Error bursts occur ____ percent of the time.
a. 2 to 5 c. 8 to 10
b. 5 to 10 d. 10 to 20
Answer: ...
Isolated single-bit errors occur ____ percent of the time.
Isolated single-bit errors occur ____ percent of the time.
a. 30 to 40 c. 50 to 60
b. 40 to 50 d. 60 to 70
Answer: ...
With ____ parity, the 0 or 1 added to the string produces an even number of binary 1s.
With ____ parity, the 0 or 1 added to the string produces an even number of binary 1s.
a. even c. longitudinal
b. odd d. binary
Answer: ...
The most basic error-detection techniques are parity checks, which are used with ____ connections.
The most basic error-detection techniques are parity checks, which are used with ____ connections.
a. synchronous c. statistical
b. asynchronous d....
Error detection can be performed in several places within a communications model. One of the most common places is the TCP/IP ____ layer.
Error detection can be performed in several places within a communications model. One of the most common places is the TCP/IP ____ layer.
a. network...
Installing proper shielding on cables prevents ____.
Installing proper shielding on cables prevents ____.
a. white noise c. attenuation
b. impulse noise d. crosstalk
Answer: ...
Twisted pair Category 5e/6 cable should not be longer than the recommended 100-meter (300-foot) distance when it's transmitting at ____ Mbps.
Twisted pair Category 5e/6 cable should not be longer than the recommended 100-meter (300-foot) distance when it's transmitting at ____ Mbps.
a. 100...
___ means that if the transmitting modem sends data and the data arrives garbled, the receiving modem may ask the transmitting modem to fall back to a slower transmission speed.
___ means that if the transmitting modem sends data and the data arrives garbled, the receiving modem may ask the transmitting modem to fall back to...
___ is not necessarily a form of error, but can indirectly lead to an increase in errors affecting the transmitted signal.
___ is not necessarily a form of error, but can indirectly lead to an increase in errors affecting the transmitted signal.
a. Impulse noise c. Attenuation
b....
Causes of jitter can include electromagnetic interference, ____, passing the signal through too many repeaters, and the use of lower-quality equipment.
Causes of jitter can include electromagnetic interference, ____, passing the signal through too many repeaters, and the use of lower-quality equipment.
a....
____ is the result of small timing irregularities that become magnified during the transmission of digital signals as the signals are passed from one device to another.
____ is the result of small timing irregularities that become magnified during the transmission of digital signals as the signals are passed from one...
To minimize the effect of echo, a device called a(n) ____ can be attached to a line.
To minimize the effect of echo, a device called a(n) ____ can be attached to a line.
a. echo suppressor c. amplifier
b. repeater d. hub
Answer:...
High humidity and wet weather can cause an increase in electrical ____ over a telephone system.
High humidity and wet weather can cause an increase in electrical ____ over a telephone system.
a. compression c. jitter
b. attenuation d. crosst...
Typically, impulse noise is a(n) ____ burst of energy.
Typically, impulse noise is a(n) ____ burst of energy.
a. digital c. binary
b. analog d. logical
Answer: ...
Impulse noise is also known as ____.
Impulse noise is also known as ____.
a. noise spike c. attenuation
b. jitter d. crosstalk
Answer: ...
White noise is also called thermal noise or ____ noise.
White noise is also called thermal noise or ____ noise.
a. crosstalk c. Gaussian
b. jitter d. spike
Answer: ...
Discrete multitone (DMT) is a multiplexing technique commonly found in _______ systems.
Discrete multitone (DMT) is a multiplexing technique commonly found in _______ systems.
a. TDM c. ATM
b. DSL d. microwave
Answer: ...
MPEG-1 and MPEG-2—or simply MPEG—are common examples of ____ compression.
MPEG-1 and MPEG-2—or simply MPEG—are common examples of ____ compression.
a. wavelength encoding c. code division
b. differential encoding d. frequency...
______ is a technique that is very commonly used to compress video images.
______ is a technique that is very commonly used to compress video images.
a. JPEG c. MP3
b. MPEG d. AAA
Answer: A
...
____, which is an abbreviation for MPEG (Moving Picture Experts Group) Audio Layer-3, is a common form of audio compression.
____, which is an abbreviation for MPEG (Moving Picture Experts Group) Audio Layer-3, is a common form of audio compression.
a. MPEG c. MP3
b. GIF...
A technique that can be used to compress data when a ____ compression is necessary is the Lempel-Ziv technique.
A technique that can be used to compress data when a ____ compression is necessary is the Lempel-Ziv technique.
a. random c. lossy
b. run-length d....
____ replaces any repetitions of the same bit or byte that occur in a sequence of data with a single occurrence of the bit/byte and a run count, or simply with a run count.
____ replaces any repetitions of the same bit or byte that occur in a sequence of data with a single occurrence of the bit/byte and a run count, or...
If a compression technique does lose some of the data as a result of the compression process, then it is referred to as a ____ compression technique.
If a compression technique does lose some of the data as a result of the compression process, then it is referred to as a ____ compression technique.
a....
Code division multiplexing can produce system capacities that are ____ times those of frequency division multiplexing systems.
Code division multiplexing can produce system capacities that are ____ times those of frequency division multiplexing systems.
a. 2 to 4 c. 4 to 8
b....
____ technology is a unique form of multiplexing in that all the subchannels multiplexed together are intended for one user.
____ technology is a unique form of multiplexing in that all the subchannels multiplexed together are intended for one user.
a. Time division c. Frequency...
____ division multiplexing is a good technique for transmitting multiple concurrent signals over a fiber-optic line.
____ division multiplexing is a good technique for transmitting multiple concurrent signals over a fiber-optic line.
a. Statistical time c. Frequency
b....
___ division multiplexing is a good choice for connecting a number of lower-speed devices that do not transmit data on a continuous basis to a remote computer system.
___ division multiplexing is a good choice for connecting a number of lower-speed devices that do not transmit data on a continuous basis to a remote...
Chip spreading codes are ____ bits in length.
Chip spreading codes are ____ bits in length.
a. 32 c. 128
b. 64 d. 256
Answer: ...
____ is a technology that allows a high-speed data signal to traverse a standard copper-based telephone line.
____ is a technology that allows a high-speed data signal to traverse a standard copper-based telephone line.
a. DSL c. EIA-232F
b. RS-232 d. Fir...
____ is the technology behind the popular digital subscriber line (DSL) system.
____ is the technology behind the popular digital subscriber line (DSL) system.
a. Time division c. Wavelength division
b. Amplitude division d. Discrete...
____ is designed for short-distance connections and has only a few lambdas, with a greater space between lambdas.
____ is designed for short-distance connections and has only a few lambdas, with a greater space between lambdas.
a. Dense wavelength division multiplexing...
___ uses different wavelength (frequency) lasers to transmit multiple signals at the same time over a single medium.
___ uses different wavelength (frequency) lasers to transmit multiple signals at the same time over a single medium.
a. Wave division multiplexing...
____ multiplexes multiple data streams onto a single fiber-optic line.
____ multiplexes multiple data streams onto a single fiber-optic line.
a. Statistical time division multiplexing (Stat TDM)
b. Wavelength division...
Statistical time division multiplexing is sometimes called ____ time division multiplexing.
Statistical time division multiplexing is sometimes called ____ time division multiplexing.
a. empirical c. asynchronous
b. random d. synchronous...
The STS-1 signaling level supports ____ frames per second.
The STS-1 signaling level supports ____ frames per second.
a. 8000 c. 32000
b. 16000 d. 64000
Answer: ...
It is relatively simple to multiplex four STS-12 signals into one ____ signal.
It is relatively simple to multiplex four STS-12 signals into one ____ signal.
a. STS-8 c. STS-32
b. STS-16 d. STS-48
Answer: ...
SONET defines a hierarchy of signaling levels, or data transmission rates, called ____.
SONET defines a hierarchy of signaling levels, or data transmission rates, called ____.
a. statistical transport signals (StatTS) c. asynchronous...
SONET and SDH are both ____ multiplexing techniques.
SONET and SDH are both ____ multiplexing techniques.
a. synchronous c. empirical
b. statistical d. random
Answer: ...
SONET was developed in the United States by ____.
SONET was developed in the United States by ____.
a. ISO c. IEEE
b. ANSI d. IETF
Answer: ...
A T-1 system multiplexes _______ into each frame.
A T-1 system multiplexes _______ into each frame.
a. a single ASCII character c. a single SYNC bit
b. a single LENGTH byte d. a single SYNC byte
...
A ____ multiplexes 24 input channels together onto one high-speed telephone line.
A ____ multiplexes 24 input channels together onto one high-speed telephone line.
a. T-1 system c. SDH system
b. SONET system d. congruent system...
____ multiplexing is the multiplexing technique used to support SONET.
____ multiplexing is the multiplexing technique used to support SONET.
a. FDM c. Frequency division
b. ADM d. Synchronous time division
Answer:...
In the 1960s, AT&T created a service known as ____, which multiplexed digital data and digitized voice onto a high-speed telephone line with a data rate of 1.544 megabits per second.
In the 1960s, AT&T created a service known as ____, which multiplexed digital data and digitized voice onto a high-speed telephone line with a data...
Three types of synchronous time division multiplexing that are popular today are T-1 multiplexing, ____ multiplexing, and SDH.
Three types of synchronous time division multiplexing that are popular today are T-1 multiplexing, ____ multiplexing, and SDH.
a. EIA-232F c. SONET
b....
Under normal circumstances, the synchronous time division multiplexor maintains a simple ____ sampling order of the input devices.
Under normal circumstances, the synchronous time division multiplexor maintains a simple ____ sampling order of the input devices.
a. round-robin...
___ gives each incoming source signal a turn to be transmitted, proceeding through the sources in round-robin fashion.
___ gives each incoming source signal a turn to be transmitted, proceeding through the sources in round-robin fashion.
a. Statistical time division...
Since time division multiplexing was introduced, it has split into two roughly parallel but separate technologies: synchronous time division multiplexing and ____ time division multiplexing.
Since time division multiplexing was introduced, it has split into two roughly parallel but separate technologies: synchronous time division multiplexing...
In FDM, ____ take up frequencies that might be used for other data channels, thus introducing a certain level of wastefulness.
In FDM, ____ take up frequencies that might be used for other data channels, thus introducing a certain level of wastefulness.
a. guard bands c. multiplexors
b....
The device that is attached to the receiving end of the medium and splits off each signal to deliver it to the appropriate receiver is called the second multiplexor, or ____.
The device that is attached to the receiving end of the medium and splits off each signal to deliver it to the appropriate receiver is called the second...
First-generation cellular telephone systems allocated channels using frequency ranges within the 800 to ____ megahertz (MHz) spectrum.
First-generation cellular telephone systems allocated channels using frequency ranges within the 800 to ____ megahertz (MHz) spectrum.
a. 830 c. 930
b....
To allow multiple users to share a single medium, FDM assigns each user a separate ____.
To allow multiple users to share a single medium, FDM assigns each user a separate ____.
a. time slot c. channel
b. transmission code d. amplitud...
____ is the assignment of nonoverlapping frequency ranges to each "user" of a medium.
____ is the assignment of nonoverlapping frequency ranges to each "user" of a medium.
a. Time division multiplexing (TDM) c. Amplitude division multiplexing...
Presently, a medium can be divided in three basic ways: a division of ____, a division of time, and a division of transmission codes.
Presently, a medium can be divided in three basic ways: a division of ____, a division of time, and a division of transmission codes.
a. frequencies
b....
Subscribe to:
Posts (Atom)