In Go-Back-N window, when the timer of the packet times out, several packets have to be resent even some may have arrived safe. Whereas in Selective Repeat window, the sender resends ___________
1.Packet which are not lost
2.Only those packets which are lost or corrupted
3.Packet from starting
4.All the packets
________________ plays an important role in determining the blocking probability of a network.
1.CGA algorithm
2.Semi-pristine environment
3.RWA algorithm
4.Pass key protocol
A family of network control protocols (NCPs) ____________
1.Are a series of independently defined protocols that provide a dynamic
2.Are a series of independently-defined protocols that encapsulate
3.Are a series of independently defined protocols that provide transparent
4.The same as NFS
A Link Control Protocol (LCP) is used for ____________
1.Establishing, configuring and testing the data-link connection
2.Establishing and configuring different network-layer protocols
3.Testing the different network-layer protocols
4.Provides for multiplexing of different network-layer protocols
A list of protocols used by a system, one protocol per layer, is called ________
1.protocol architecture
2.protocol stack
3.protocol suite
4.protocol system
A __________ is a device that forwards packets between networks by processing the routing information included in the packet.
1.bridge
2.firewall
3.router
4.hub
Among the optical-distribution architectures that are essentially switched ethernet is __________
1.AON
2.PON
3.NON
4.MON
An endpoint of an inter-process communication flow across a computer network is called __________
1.socket
2.pipe
3.port
4.machine
Bluetooth is an example of __________
1.personal area network
2.local area network
3.virtual private network
4.wide area network
Both HDLC and PPP are Data link layer protocols.
1.True
2. False
Closed-Loop control mechanisms try to _________
1.Remove after congestion occurs
2.Remove after sometime
3.Prevent before congestion occurs
4.Prevent before sending packets
Discarding policy is mainly done by _______
1.Sender
2.Receiver
3.Router
4.Switch
Ethernet frame consists of ____________
1.MAC address
2.IP address
3.Default mask
4.Network address
High speed ethernet works on _________
1.coaxial cable
2.twisted pair cable
3.optical fiber
4.unshielded twisted pair cable
Home Access is provided by __________
1.DSL
2.FTTP
3.Cable
4.All of the mentioned
How many methods are used to determine the effective cutoff wavelength?
1.Two
2.One
3.Four
4.Three
How many switching layers are possessed by MG-OXC?
1.Two
2.Three
3.One
4.Six
How many techniques of implementation are there for routing wavelength assignment (RWA)?
1.Two
2.Six
3.Three
4.Four
How many types of hopping are present?
1.Two
2.One
3.Three
4. Four
In computer network nodes are _________
1.the computer that originates the data
2.the computer that routes the data
3.the computer that terminates the data
4.all of the mentioned
In open-loop control, policies are applied to __________
1.Remove after congestion occurs
2.Remove after sometime
3.Prevent before congestion occurs
4.Prevent before sending packets
Individual wavelength channels and wavebands are terminated through ________________ layers.
1.WXC and PXC
2.WXC and FXC
3.BXC and FXC
4.WXC and BXC
MAC address is of ___________
1.24 bits
2.36 bits
3.42 bits
4.48 bits
Network congestion occurs _________
1.in case of traffic overloading
2.when a system terminates
3.when connection between two nodes terminates
4.in case of transfer failure
ONT is connected to splitter using _________
1.High speed fibre cable
2.HFC
3.Optical cable
4.Twisted pair cable
Socket-style API for windows is called ____________
1.wsock
2.winsock
3.wins
4.sockwi
SONET stands for ___________
1.synchronous optical network
2.synchronous operational network
3.stream optical network
4.shell operational network
StarBand provides __________
1.FTTH internet access
2.Cable access
3.Telephone access
4.Satellite access
Static RWA problem is also known as _____________
1.Routing problem
2.Virtual topology problem
3.Static wavelength problem
4.Light path problem
Static RWA technique is semi-permanent.
1.True
2.False
The function of DSLAM is to __________
1.Convert analog signals into digital signals
2.Convert digital signals into analog signals
3.Amplify digital signals
4.De-amplify digital signals
The main contents of the routing table in datagram networks are ___________
1.Source and Destination address
2.Destination address and Output port
3.Source address and Output port
4.Input port and Output port
The maximum size of payload field in ethernet frame is __________
1.1000 bytes
2.1200 bytes
3.1300 bytes
4.1500 bytes
The PPP encapsulation ____________
1.Provides for multiplexing of different network-layer protocols
2.Requires framing to indicate the beginning and end of the encapsulation
3.Establishing, configuring and testing the data-link connection
4.Provides interface for handling the capabilities of the connection/link on the network
The routing and wavelength assignment problem addresses the core issue of _____________
1.Traffic patterns in a network
2.Wavelength adjustment
3.Wavelength continuity constraint
4.Design problem
The _________ wavelength is defined as the wavelength greater than which the ratio of the total power and the fundamental mode power has to be decreased to less than 0.1dB.
1.Magnetic
2.Quasi
3.Cut-off
4.EIA
The ___________ provides information about the physical path and wavelength assignment for all active light paths.
1.Network state
2.RWA
3.LAN topology
4. Secluded communication protocol
Transmission control protocol ___________
1.is a connection-oriented protocol
2.uses a three way handshake to establish a connection
3.receives data from application as a single stream
4.all of the mentioned
Transport layer aggregates data from different applications into a single stream before passing it to ____________
1.network layer
2.data link layer
3.application layer
4.physical layer
Transport layer protocols deals with ____________
1.application to application communication
2.process to process communication
3.node to node communication
4.man to man communication
Two devices are in network if __________
1.a process in one device is able to exchange information with a process in another device
2.a process is running on both devices
3.PIDs of the processes running of different devices are same
4.a process is active and another is inactive
User datagram protocol is called connectionless because _____________
1.all UDP packets are treated independently by transport layer
2.it sends data as a stream of related packets
3.it is received in the same order as sent order
4.it sends data very quickly
Wavelength assignment in RWA is independent on the network topology.
1.True
2.False
What is the name of the test used to determine the efficient values of the effective cutoff wavelength?
1.Round robin test
2.Mandarin test
3.Hough Werner test
4.Fulton test
When collection of various computers seems a single coherent system to its client, then it is called _________
1.computer network
2.distributed system
3.networking system
4.mail system
Which of the following are transport layer protocols used in networking?
1.TCP and FTP
2.UDP and HTTP
3.TCP and UDP
4.HTTP and FTP
Which of the following factors affect transmission rate in DSL?
1.The gauge of the twisted-pair line
2.Degree of electrical interfernece
3.Shadow fading
4.The gauge of the twisted-pair line and degree of electrical interference
Which of the following is used to provide wavelength signal service among the nodes?
1.Regularization
2.Optical enhancing
3.Hopping
4.Pulse breakdown
____________ deals with establishing the light path in frequently varying traffic patterns.
1.Wavelength routing
2.Wavelength multiplexing
3.Static RWA
4.Dynamic RWA
_____________ supports a great number of wavelength channels and reduces the number of switches within the optical network.
1.Waveband switching
2.Optical remuneration
3.Optical genesis
4.Wavelength multiplexing