CAS CS 36442

subject Type Homework Help
subject Pages 24
subject Words 2445
subject Authors William Stallings

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
Twisted pair may only be used to transmit analog and digital signals.
Answer:
An individual cell of an IR LAN is limited to a single room because infrared light does
not penetrate opaque walls.
Answer:
Second generation cellular networks were analog.
Answer:
One of the strengths of the Fast Ethernet approach is that it readily supports a mixture
of existing 10-Mbps LANs, 100-Mbps LANs, and newer 16-Gpbs LANs.
Answer:
page-pf2
Time to Live is similar to a hop count.
Answer:
A VoIP system is usually cheaper to operate than an equivalent telephone system with a
PBX and conventional telephone network service.
Answer:
The sparse-mode protocol is appropriate for intra-AS multicast routing and may be
viewed as a potential alternative to a multicast version of OSPF known as MOSPF.
Answer:
CRC-32 is not used in IEEE 802 LAN standards.
page-pf3
Answer:
Convergence refers to the merger of previously distinct telephony and information
technologies and markets.
Answer:
The transmission media that are used to convey information can be classified as guided
or unguided.
Answer:
If there is a single host-node link over which all virtual circuits are multiplexed, the
throughput of a transport connection can exceed
the data rate of that link.
Answer:
page-pf4
Path calculation is a signaling protocol to reserve the resources for a traffic flow and to
establish the LSP for a traffic flow.
Answer:
The most familiar use of transmitting digital data using analog signals is the public
telephone network.
Answer:
A wireless LAN must meet the same sort of requirements typical of any LAN, including
high capacity, ability to cover short distances,
full connectivity among attached stations, and broadcast capability.
Answer:
page-pf5
The requirements of real-time traffic differ from those of high-speed but non-real-time
traffic.
Answer:
The routers in an internet are responsible for receiving and forwarding packets through
the interconnected set of networks.
Answer:
An algorithm is needed with CSMA to specify what a station should do if the medium
is found busy.
Answer:
Synchronous TDM is called synchronous because synchronous transmission is used.
page-pf6
Answer:
Multiprotocol Label Switching is well suited to implementing virtual private networks.
Answer:
Frame relay networks are commonly used for terminal-to-computer and
computer-to-computer communications.
Answer:
SMTP standardizes the message character set as 7-bit ASCII.
Answer:
page-pf7
The software used at the network access layer is not dependent on the type of network
used because circuit switching, packet switching and local area networks all have the
same standards.
Answer:
A wireless cellular system limits the opportunity to use the same frequency for different
communications because the signals can interfere with one another even if
geographically separated.
Answer:
Token bucket is used in the Bluetooth specification.
Answer:
The SDN controller defines the data flows that occur in the SDN data plane.
page-pf8
Answer:
IP does not guarantee that all data will be delivered or that the data that are delivered
will arrive in the proper order.
Answer:
SSB is a variant of AM that requires only half of the bandwidth.
Answer:
A major technical problem for cellular networks is fading.
Answer:
page-pf9
Hard real-time applications impose fewer requirements on the network, and it is
therefore permissible to focus on maximizing network utilization.
Answer:
Important characteristics of Barker sequences are their robustness against interference
and their insensitivity to multipath propagation.
Answer:
RS codes are well suited for burst error correction.
Answer:
Burst errors can be caused by impulse noise.
Answer:
page-pfa
The p-persistent algorithm with binary exponential backoff is efficient over a wide
range of loads.
Answer:
Each router must determine multicast routing paths on the basis of both source and
destination addresses.
Answer:
The SYN segment functions both as a connection request and as a connection
acknowledgment.
Answer:
page-pfb
There are several fundamental differences between data processing and data
communications.
Answer:
Error correction is best used with wireless applications.
Answer:
The ________ protocol architecture is a result of protocol research and development
conducted on the experimental packet switched network ARPANET.
A) internet
B) physical
C) host-to-host
D) network access
Answer:
page-pfc
The ________ standard defines a set of services and physical layer options for wireless
LANs.
A) IEEE 802.3
B) IEEE 802.11
C) IEEE 811.2
D) IEEE 802.10
Answer:
In the high level data link control frame structure the flag, address, and control fields
that precede the information field are known as a ________.
A) header
B) trailer
C) FAC
D) ARQ
Answer:
SIP incorporates the use of a _________ , which defines session content using a set of
types similar to those used in MIME.
A) SDP
page-pfd
B) PBX
C) UAC
D) DNS
Answer:
The ________ class is targeted for support of next generation applications beyond
10-Gbps Ethernet.
A) Category 5e/Class D
B) Category 6A/Class EA
C) Category 6/Class E
D) Category 7/Class F
Answer:
The ________ of a signal is the range of frequencies that it contains.
A) spectrum
B) effective bandwidth
C) bandwidth
D) wavelength
page-pfe
Answer:
A guided transmission medium is ________ if it provides a direct link between two
devices and those are the only two devices sharing the medium.
A) multipoint
B) simplex
C) point-to-point
D) wireless
Answer:
With the ________ approach a bit is set in a data packet as it is forwarded by the
congested node.
A) forward
B) binary
C) credit based
D) rate based
Answer:
page-pff
The ________ scheme uses advance digital signal processing techniques to distribute
the data over multiple carriers at precise frequencies.
A) SC-FDMA
B) OFDM
C) OFDMA
D) CDMA
Answer:
The principle conditions that influence routing decisions are ________.
A) complexity and node malfunctions
B) failure and congestion
C) overhead and bandwidth
D) route distance and amount of nodes
Answer:
With ________ the routing decision is made by the source station, rather than by a
page-pf10
network node, and is then communicated to the network. This allows the user to dictate
a route through the network that meets criteria local to that user.
A) source routing
B) customer routing
C) user routing
D) station routing
Answer:
Wireless transmission occurring through the atmosphere, outer space or water is an
example of ________.
A) guided media
B) bandwidth
C) wavelength
D) unguided media
Answer:
A number of changes are made in 802.11n in the radio transmission scheme to increase
capacity. The most significant of these techniques is ________.
A) channel bonding
page-pf11
B) diffusion
C) interconnection
D) spread spectrum
Answer:
The __________ d(v1, v2) between two n -bit binary sequencesv1 and v2 is the number
of bits in which v1 and v2 disagree.
A) check bits
B) FCS
C) ECC
D) Hamming distance
Answer:
The ________ is a means of uniquely identifying an end-system-originated datagram.
A) protocol layer number
B) source address
C) Data Unit Identifier
D) protocol identifier
page-pf12
Answer:
The heart of the call placement process for VoIP is the __________ .
A) PBX
B) SIP
C) RTP
D) none of the above
Answer:
The lower sublayer of the MAC layer is the ________ which uses a contention
algorithm to provide access to all traffic.
A) PCF
B) IFS
C) DCF
D) LLC
Answer:
page-pf13
Once an interface is established ________ is required for communication.
A) digital conversion
B) signal generation
C) synchronization
D) transmission
Answer:
The CSMA/CD algorithm used in the IEEE 802.3 standard is ________.
A) ALOHA
B) nonpersistent
C) 1-persistent
D) p-persistent
Answer:
The dominant technology for third generation systems is ________.
A) IMT-TC
B) UMTS
page-pf14
C) CDMA
D) TDMA
Answer:
Frequency modulation and phase modulation are special cases of ________ modulation.
A) PM
B) FM
C) angle
D) amplitude
Answer:
In situations in which an information exchange is interrupted due to a fault somewhere
in the system, ________ techniques are needed to either resume activity at the point of
interruption or to restore systems to their state prior to the beginning of the exchange.
A) flow control
B) routing control
C) recovery
D) error correction
page-pf15
Answer:
________ are programs that extract information from name servers in response to client
requests.
A) Resolvers
B) DNS databases
C) Domain name spaces
D) MIME
Answer:
With ________ queuing each incoming packet is placed in a queue for its flow and
serviced in a round robin fashion, taking one packet from each nonempty queue in turn.
A) FIFO
B) WFQ
C) simple fair
D) guaranteed
Answer:
page-pf16
________ are used to exchange information having to do with setting up and
maintaining calls and with establishing a relationship between a mobile unit and the
nearest base station.
A) Advanced Mobile Phone Services
B) Mobile initialization units
C) Traffic channels
D) Control channels
Answer:
The ________ primitive is used to request transmission of a data unit.
A) Send
B) Source Routing
C) Transmit
D) Request
Answer:
page-pf17
"Because all routes are tried, at least one copy of the packet to arrive at the destination
will have used a minimum-hop route" is a property of
________.
A) fixed routing
B) flooding
C) adaptive routing
D) random routing
Answer:
The rate in bits per second at which data can be communicated is the ________.
A) analog transmission
B) data rate
C) digital transmission
D) channel capacity
Answer:
When the internal operation of the network is ________, a routing decision is made
individually for each packet.
A) datagram
page-pf18
B) robust
C) internal virtual circuit
D) virtual circuit
Answer:
__________ is a basic characteristic of a signal used for modulation.
A) Frequency
B) Amplitude
C) Phase
D) All of the above
Answer:
The term ________ is used to refer to the transmission path between two devices in
which signals propagate directly from transmitter to receiver with no intermediate
devices other than amplifiers or repeaters used to increase signal strength.
A) direct link
B) unguided media
C) wireless
page-pf19
D) guided
Answer:
Three approaches are in common use for coping with data transmission errors:
error-detection codes, error-correction codes, and __________ protocols.
Answer:
Spatial diversity can be used when transmitting conditions are favorable and for
relatively short distances compared to spatial multiplexing.
Answer:
IEEE ________ embodies changes in three general areas: use of MIMO, enhancements
in radio transmission, and MAC enhancements.
page-pf1a
Answer:
A way of viewing the CRC process is to express all values as ________ in a
dummy variable X with binary coefficients.
Answer:
In the ________ topology each station is directly connected to a common central node,
typically via two point-to-point links, one for transmission and one for reception.
Answer:
The IFFT operation has the effect of ensuring that the subcarriers do not interfere with
each other.
Answer:
page-pf1b
Each application on a computer has an address that is unique within that computer
known as ________ or ports that allow the transport layer to support multiple
applications at each computer.
Answer:
When the useful bandwidth of the transmission medium exceeds the
required bandwidth of signals to be transmitted, ________ multiplexing is possible.
Answer:
Within the United States, the FCC has authorized two unlicensed applications within
the ISM band: ________ systems and very low power systems.
Answer:
________ is the maximum variation in delay experienced by packets in a single session.
page-pf1c
Answer:
A token bucket traffic specification consists of two parameters: a token replenishment
rate and a _________ .
Answer:
A generalization of the minimum-hop criterion is ________ routing.
Answer:
For each forwarding equivalence class a specific path through the network of LSRs is
defined. This is called a ________ path.
Answer:
page-pf1d
The current version of IGMP defines two message types: Membership Query and
________ .
Answer:
FEC codes are designed not just to detect but correct errors, avoiding the need for
__________.
Answer:
Ethernet is now the preferred carrier wire line vehicle for bridging wireless technologies
such as WiFi and WiMAX into local Ethernet networks.
Answer:
The form of flow control where A and B are connected via a full-duplex link and
A maintains a list of sequence numbers that it is allowed to send without receiving any
acknowledgment and B maintains a list of sequence numbers that it is prepared to
receive is ________ flow control.
Answer:

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.