Trusted by Students Everywhere
Why Choose Us?
0% AI Guarantee

Human-written only.

24/7 Support

Anytime, anywhere.

Plagiarism Free

100% Original.

Expert Tutors

Masters & PhDs.

100% Confidential

Your privacy matters.

On-Time Delivery

Never miss a deadline.

Florida Gulf Coast University GEB 3250 Chapter 15 Quiz 1)A one-to-all communication between one source and all hosts on a network is classified as a   communication

Business Jul 03, 2021

Florida Gulf Coast University

GEB 3250

Chapter 15 Quiz

1)A one-to-all communication between one source and all hosts on a network is classified as a  

communication.

  1. unicast
  2. multicast
  3. broadcast
  4. none of the above
  1. ) one-to-many communication between one source and a specific group of hosts is classified as a

                    communication.

 

  1. unicast
  2. multicast
  3. broadcast
  4. none of the above
  1. )A one-to-one communication between one source and one destination is classified as a

 

 
   
 

 

ommunication.

  1. unicast
  2. multicast
  3. broadcast
  4. none of the above
  1. )In                  , the router forwards the received packet through only one of its interfaces.
  1. unicasting
  2. multicasting
  3. broadcasting
  4. none of the above
  1. )In                     , the router may forward the received packet through several of its interfaces.
  1. unicasting
  2. multicasting
  3. broadcasting
  4. none of the above
  1. )Emulation of                            through                                  is not efficient and may create long delays.
  1. unicasting; multiple unicasting
  2. multicasting; multiple unicasting
  3. broadcasting; multicasting
  4. none of the above
  1. )In unicast routing, each router in the domain has a table that defines a                                     path tree to possible

destinations.

  1. average
  2. longest
  3. shortest
  4. none of the above
  1. )In multicast routing, each involved router needs to construct a                                        path tree for each group.
  1. average
  2. longest
  3. shortest
  4. none of the above
  1. )In the                       tree approach, each router needs to have one shortest path tree for each group.
  1. group-shared
  2. source-based
  3. a or b
  4. none of the above
  1. )In the group-shared tree approach,                                   involved in multicasting.

 

  1. only the core router is
  2. all routers are
  3. only some routers are
  4. none of the above
  1. )Multicast link state routing uses the                              tree approach.
  1. source-based
  2. group-shared
  3. a or b
  4. none of the above
  1. )The Multicast Open Shortest Path First (MOSPF) protocol is an extension of the OSPF protocol that

uses multicast routing to create source-based trees. The protocol is based on                                     

routing.

  1. distance vector
  2. link state
  3. path vector
  4. none of the above
  1. )MOSPF is a                           protocol.
  1. data-driven
  2. command-driven
  3. both a and b
  4. none of the above
  1. )                         broadcasts packets, but creates loops in the systems.
  1. Forwarding
  2. Flooding
  3. Backwarding
  4. none of the above
  1. )In RPF, a router forwards only the copy that has traveled the                                      path from the source to the

router.

  1. shortest
  2. longest
  3. average
  4. none of the above
  1. )RPF eliminates the                              in the flooding process.
  1. forwarding
  2. backwarding
  3. flooding
  4. none of the above
  1. )RPF guarantees that each network receives only                         of the multicast packet.
  1. one copy
  2. two copies
  3. a or b
  4. none of the above
  1. )RPB creates a shortest path                             tree from the source to each destination.
  1. unicast

 

  1. multicast
  2. broadcast
  3. none of the above
  1. )RPB guarantees that each destination receives                                     of the packet.
  1. one copy
  2. no copies
  3. multiple copies
  4. none of the above
  1. )In                        , the multicast packet must reach only those networks that have active members for that

particular group.

  1. RPF
  2. RPB
  3. RPM
  4. none of the above
  1. )                    adds pruning and grafting to                              to create a multicast shortest path tree that supports

dynamic membership changes.

  1. RPM; RPB
  2. RPB; RPM
  3. RPF: RPM
  4. none of the above
  1. )                            is an implementation of multicast distance vector routing. It is a source- based routing

protocol, based on RIP.

  1. MOSPF
  2. DVMRP
  3. CBT
  4. none of the above
  1. )DVMRP is a                            routing protocol, based on RIP.
  1. source-based
  2. group-shared
  3. both a and b
  4. none of the above
  1. )Pruning and grafting are strategies used in                                .
  1. RPF
  2. RPB
  3. RPM
  4. none of the above
  1. )A                      message tells an upstream router to stop sending multicast messages for a specific group

through a specific router.

  1. weed
  2. graft
  3. prune
  4. none of the above

 

  1. )A                      message tells an upstream router to start sending multicast messages for a specific group

through a specific router.

  1. weed
  2. graft
  3. prune
  4. none of the above
  1. )CBT is a                             protocol that uses a core as the root of the tree.
  1. source-based
  2. group-shared
  3. a or b
  4. none of the above
  1. )PIM-DM is used in a                            multicast environment, such as a LAN.
  1. dense
  2. sparse
  3. a or b
  4. none of the above
  1. )PIM-SM is used in a                           multicast environment such as a WAN.
  1. dense
  2. sparse
  3. a or b
  4. none of the above
  1. )In                     , a logical tunnel is established by encapsulating the multicast packet inside a unicast

packet.

  1. UNIBONE
  2. MULTBONE
  3. MBONE
  4. none of the above

 

Archived Solution
Unlocked Solution

You have full access to this solution. To save a copy with all formatting and attachments, use the button below.

Already a member? Sign In
Important Note: This solution is from our archive and has been purchased by others. Submitting it as-is may trigger plagiarism detection. Use it for reference only.

For ready-to-submit work, please order a fresh solution below.

Or get 100% fresh solution
Get Custom Quote
Secure Payment