Issuu on Google+

Full file at http://testbank360.eu/test-bank-data-and-computer-communications-9th-edition-william-stallings

TRUE/FALSE. Write 'T' if the statement is true and 'F' if the statement is false. Each protocol provides a set of rules for the exchange of data between systems.

1

1) _______ 2 The OSI protocol architecture consists of five layers: physical, network access, internet, transport and application. 2) _______ 3 Procedures needed to allow data to traverse multiple interconnected networks is found in the internet layer of the TCP/IP protocol architecture. 3) _______ 4 The primary function of a gateway is to relay data from one network to the other on its route from the source to the destination end system. 4) _______

For most applications running as part of the TCP/IP protocol architecture, the transport layer protocol is TCP.

5

5) _______ 6 VoIP, streaming audio, and streaming video are not considered multimedia applications because each involves a single media type. 6) _______ 7 The software used at the network access layer is not dependent on the type of network used because circuit switching, packet switching and local area networks all have the same standards. 7)


Full file at http://testbank360.eu/test-bank-data-and-computer-communications-9th-edition-william-stallings

_______

Traffic on a network or internet can be divided into two broad categories: elastic and inelastic.

8

8) _______

FTP provides a basic electronic mail transport facility.

9

9) _______

Secure Shell (SSH) enables the user and the remote server to authenticate each other.

1

10) ______

Distributed data communications can be said to involve three agents: applications, computers, and networks.

1

11) ______

The driving force behind the development of IP was the need for more addresses.

1

12) ______

It is not necessary for each host on a subnet to have an unique global internet address.

1

13) ______

TCP numbers the segments that it sends to a particular destination port sequentially. 14) ______

1


Full file at http://testbank360.eu/test-bank-data-and-computer-communications-9th-edition-william-stallings

15) In the application layer of TCP/IP, for each different type of application, a separate module is needed that is peculiar to that application. 15) ______ MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question. 1 In a ________ the modules are arranged in a vertical stack. Each layer in the stack performs a related subset of the functions required to communicate with another system. 16) ______ A) protocol data unit B) NSP C) frame relay D) protocol architecture

Facsimile, computer aided design, publishing and medical imaging are all ________ based applications.

1

17) ______ A) image B) text C) video D) audio 1


Full file at http://testbank360.eu/test-bank-data-and-computer-communications-9th-edition-william-stallings

The ________ layer contains the logic needed to support the various user applications. 18) ______ A) internet B) application C) transport D) physical

The key features of a protocol are: syntax, semantics and ________.

1

19) ______ A) peer layering B) presentation C) timing D) network access

The ________ protocol architecture is a result of protocol research and development conducted on the experimental packet switched network ARPANET. 20)

2

______ A) OSI B)


Full file at http://testbank360.eu/test-bank-data-and-computer-communications-9th-edition-william-stallings

TCP/IP C) HTTP D) TFTP 2 The ________ layer is concerned with the exchange of data between an end system and the network to which it is attached. 21) ______ A) host-to-host B) network access C) internet D) physical

An example of ________ traffic is real time traffic such as voice and video.

2

22) ______ A) delay variation B) multimedia information C) elastic D) inelastic


Full file at http://testbank360.eu/test-bank-data-and-computer-communications-9th-edition-william-stallings

Human-computer interaction involving text, graphics, voice and video is ________.

2

23) ______ A) media B) multimedia C) elastic traffic D) information delivery 2 The primitive issued by a service provider to either indicate that a procedure has been invoked by the peer service user on the connection and to provide the associated parameters or notify the service user of a provider initiated action is ________. 24) ______ A) confirm B) request C) indication D) response

Information that can be entered via a keyboard and is directly readable and printable is ________. 25) ______ A) graphic

2


Full file at http://testbank360.eu/test-bank-data-and-computer-communications-9th-edition-william-stallings

B) video C) audio D) text

The header format for TCP is a minimum of ________ octets.

2

26) ______ A) 160 B) 16 C) 8 D) 20

________ provides a basic electronic mail transport facility.

2

27) ______ A) SMTP B) UDP C) TELNET


Full file at http://testbank360.eu/test-bank-data-and-computer-communications-9th-edition-william-stallings

D) SNMP

Electronic mail, remote logon, network management and Web access are examples of ________ applications.

2

28) ______ A) transport B) file transfer C) elastic D) real-time 2 The communication task can be organized into three relatively independent layers: network access layer, application layer, and ________ layer. 29) ______ A) media B) physical C) processing D) transport 3 Computer games, multiplayer network games, infotainment, and interactive audio visual productions are examples of applications in the ________ domain of multimedia systems.


Full file at http://testbank360.eu/test-bank-data-and-computer-communications-9th-edition-william-stallings

30) ______ A) entertainment B) information publishing C) information management D) telecommunication SHORT ANSWER. Write the word or phrase that best completes each statement or answers the question. 3 A ________ is the layered structure of hardware and software that supports the exchange of data between systems and supports distributed applications such as electronic mail and file transfer. 31) _____________ 3 The most widely used protocol architecture is the ________ protocol suite, which consists of physical, network access, internet, transport, and application layers. 32) _____________ 3 In the TCP/IP protocol architecture, the ________ layer is concerned with specifying the characteristics of the transmission medium, the nature of the signals and the data rate. 33) _____________ 3 Traffic that can adjust to changes in delay and throughput across an internet and still meet the needs of its applications is ________ traffic. 34) _____________ 3 Databases, information kiosks, hypertexts, electronic books, and multimedia expert systems are examples of multimedia ________ systems..


Full file at http://testbank360.eu/test-bank-data-and-computer-communications-9th-edition-william-stallings

35) _____________ 3 ________ provides a secure remote logon capability which enables a user at a terminal or personal computer to logon to a remote computer function as if directly connected to that computer. 36) _____________ 3 The services between adjacent layers in a protocol architecture are expressed in terms of ________ and parameters. 37) _____________ 3 If the initiator receives confirmation that the requested service has had the desired effect at the other end, it is referred to as a ________ service. 38) _____________ 3 Each application on a computer has an address that is unique within that computer known as ________ or ports that allow the transport layer to support multiple applications at each computer. 39) _____________

The addiction of control information to data is referred to as ________.

4

40) _____________

In the TCP/IP architecture constituent networks are referred to as ________.

4

41) _____________ 4 ________ is when the sending TCP includes a code that is a function of the contents of the remainder of the segment. The


Full file at http://testbank360.eu/test-bank-data-and-computer-communications-9th-edition-william-stallings

receiving TCP performs the same calculation and compares the result with the incoming code. A discrepancy results if there has been some error in transmission. 42) _____________

The standard network management protocol for TCP/IP networks is ________.

4

43) _____________ 4 The two commonly used transport level protocols used as part of the TCP/IP protocol suite are TCP and ________. 44) _____________

IPv6 includes ________ bit source and destination address fields. 45) _____________

1)

TRUE 2) FALSE 3) TRUE 4) FALSE 5) TRUE 6) FALSE 7) FALSE 8) TRUE 9) FALSE 10) TRUE 11) TRUE

4


Full file at http://testbank360.eu/test-bank-data-and-computer-communications-9th-edition-william-stallings

12) FALSE 13) FALSE 14) TRUE 15) TRUE 16) D 17) A 18) B 19) C 20) B 21) B 22) D 23) B 24) C 25) D 26) D 27) A 28) C 29) D 30) A 31) protocol architecture 32) TCP/IP 33) physical 34) elastic 35) information 36) Secure Shell (SSH) 37)


Full file at http://testbank360.eu/test-bank-data-and-computer-communications-9th-edition-william-stallings

primitives 38) confirmed 39) Service Access Points (SAPs) 40) encapsulation 41) subnetworks 42) Checksum 43) Simple Network Management Protocol (SNMP) 44) User Datagram Protocol (UDP) 45) 128


Test bank data and computer communications 9th edition william stallings