____ avoids congestion by requiring users to negotiate with the network regarding how much traffic they will be sending, or what resources the network must provide to satisfy the user's needs before the user sends any data.

____ avoids congestion by requiring users to negotiate with the network regarding how much traffic they will be sending, or what resources the network must provide to satisfy the user's needs before the user sends any data.



a. Explicit congestion control c. Connection admission control
b. Implicit congestion control d. Buffer preallocation


Answer: C

In ____, before one node sends a series of n packets to another node, the sending node inquires in advance whether the receiving node has enough buffer space for the n packets.

In ____, before one node sends a series of n packets to another node, the sending node inquires in advance whether the receiving node has enough buffer space for the n packets.



a. explicit congestion control c. connection admission control
b. implicit congestion control d. buffer preallocation


Answer: D

With ____, when a frame relay router experiences congestion, it sends a congestion signal forward to the destination station, which in turn tells the originating station to slow down the transfer of data.

With ____, when a frame relay router experiences congestion, it sends a congestion signal forward to the destination station, which in turn tells the originating station to slow down the transfer of data.



a. forward explicit congestion notification (FECN)
b. backward explicit congestion notification (BECN)
c. implicit congestion control
d. remote congestion control


Answer: A

A ____ network application provides some guarantee that information traveling through the network will be delivered to the intended receiver in the same order in which it was transmitted.

A ____ network application provides some guarantee that information traveling through the network will be delivered to the intended receiver in the same order in which it was transmitted.



a. connectionless c. virtual circuit
b. connection-oriented d. packet-switched


Answer: B

To distinguish between a piece of data processed at the data link layer and a piece of data processed at the network layer, the term "____" is used at the data link layer, and the term "packet" is used at the network layer.

To distinguish between a piece of data processed at the data link layer and a piece of data processed at the network layer, the term "____" is used at the data link layer, and the term "packet" is used at the network layer.



a. load c. frame
b. product d. payload


Answer: C

A local area network works as a ____ network in that clusters of workstations are connected to a central point (hub or switch) through which workstations can transmit messages to one another.

A local area network works as a ____ network in that clusters of workstations are connected to a central point (hub or switch) through which workstations can transmit messages to one another.



a. star-based c. ring-based
b. bus-based d. star-ring-based


Answer: B

A ____ is a device that interconnects two or more workstations in a star-wired bus local area network and immediately retransmits the data it receives from any workstation out to all other workstations connected.

A ____ is a device that interconnects two or more workstations in a star-wired bus local area network and immediately retransmits the data it receives from any workstation out to all other workstations connected.



a. hub c. router
b. switch d. repeater


Answer: A

The most popular contention-based protocol is ____.

The most popular contention-based protocol is ____.



a. token ring
b. round-robin
c. carrier sense multiple access with collision avoidance (CSMA/CA)
d. carrier sense multiple access with collision detection (CSMA/CD)


Answer: D

The local area network software called a ____ server provides workstations with the authorization to access a particular printer, accepts and queues prints jobs, prints cover sheets, and allows users access to the job queue for routine administrative functions.

The local area network software called a ____ server provides workstations with the authorization to access a particular printer, accepts and queues prints jobs, prints cover sheets, and allows users access to the job queue for routine administrative functions.



a. application c. file
b. database d. print


Answer: D

For a receiver to be able to fix an error—in a process called ____—redundant information must be present so that the receiver knows which bit or bits are in error and what their original values were.

For a receiver to be able to fix an error—in a process called ____—redundant information must be present so that the receiver knows which bit or bits are in error and what their original values were.



a. forward error correction c. backward error correction
b. forward error detection d. backward error detection


Answer: A

___ is probably the most common form of error control.

___ is probably the most common form of error control.



a. Do nothing
b. Correct the error without retransmission
c. Sending a message back to the transmitter
d. Correct the error with retransmission


Answer: C

____ multiplexes multiple data streams onto a single fiber-optic line.

____ multiplexes multiple data streams onto a single fiber-optic line.



a. Statistical time division multiplexing (Stat TDM)
b. Wavelength division multiplexing (WDM)
c. Time division multiplexing (TDM)
d. Channel division multiplexing (CDM)


Answer: B

A T-1 system multiplexes _______ into each frame.

A T-1 system multiplexes _______ into each frame.



a. a single ASCII character c. a single SYNC bit
b. a single LENGTH byte d. a single SYNC byte


Answer: C