COP 96961

subject Type Homework Help
subject Pages 13
subject Words 1674
subject Authors William Stallings

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
The disadvantage of fixed routing is ________.
A) its lack of flexibility
B) its simplicity
C) it does not work with virtual circuits
D) it does not work with datagrams
Answer:
________ is used on the uplink channel to provide multiple access to subscriber
stations.
A) MIMO-MAC
B) MIMO-MU
C) MIMO-DS
D) MIMO-BC
Answer:
________ was developed in the late 1980s by BellCore to provide a more cost effective
means of delivering a T1 data rate.
A) xDSL
B) HDSL
page-pf2
C) QAM
D) DMT
Answer:
The flow control in which the destination can stop the flow of data simply by
withholding acknowledgment of the receipt of a frame is ________ flow control
A) data
B) stop-and-wait
C) frame acknowledgment
D) ARQ
Answer:
A ________ is a system used to interconnect a set of basic service sets and integrated
LANs to create an extended service set.
A) DS
B) MPDU
C) AP
D) MSDU
page-pf3
Answer:
The _______ domain is dedicated exclusively for private businesses.
A) org
B) net
C) com
D) biz
Answer:
Intermediate results sent to all participants is _________ .
A) real-time workgroup
B) multimedia
C) distributed computation
D) teleconferencing
Answer:
page-pf4
With a ________ the traffic of a given enterprise or group passes transparently through
an internet in a way that effectively segregates that traffic from other packets on the
internet.
A) LDP
B) MPLS
C) LSP tunnel
D) VPN
Answer:
Individual hosts and LANs are connected to an Internet Service Provider through a
________.
A) NAP
B) CPE
C) POP
D) NSP
Answer:
All of the following are ways of the receiving transport entity to cope with the flow
control requirement EXCEPT:
page-pf5
A) use a credit scheme
B) do nothing
C) use a fixed sliding-window protocol
D) accept further segments from the network service
Answer:
The objective of ________ is to support link layer interfaces, such as ATM and
Ethernet, for providing VPNs for an MPLS-enabled IP packet switched network.
A) l3vpn
B) PCE
C) l2vpn
D) pwe3
Answer:
Human-computer interaction involving text, graphics, voice and video is _____.
A) elastic traffic
B) multimedia
C) information delivery
page-pf6
D) media
Answer:
To compute an error-locator polynomial and solve for its roots is a technique for BCH
decoding proposed by ________ .
A) Berlekamp
B) Reed-Solomon
C) Bose
D) Chaudhuri
Answer:
Wireless transmission frequencies in the range of 30 MHz to 1 GHz are suitable for
omnidirectional applications and are referred to as the ________ range.
A) radio
B) transponder
C) terrestrial
D) paraboloid
page-pf7
Answer:
________ uses one sideband and a reduced power carrier.
A) SSB
B) DBS
C) VSB
D) BTC
Answer:
The principal feature of ________ is that it can encrypt and/or authenticate all traffic at
the IP level.
A) TCP/UDP
B) IAB
C) VPN
D) IPSec
Answer:
page-pf8
An ________ is a direct point-to-point or multipoint communications
link, predominantly hardware based and designed for high speed over very
short distances. It transfers data between a buffer at the source device and a buffer at the
destination device, moving only the user contents from one device to another without
regard to the format or meaning of the data.
Answer:
Twisted pair, coaxial cable and optical fiber are examples of ________ media.
Answer:
Which of the following is NOT a characteristic of a bridge?
A) The bridge makes no modification to the content or format of the frames it receives.
B) The bridge must contain addressing and routing intelligence.
C) There may not be more than two LANs interconnected by a number of bridges.
D) The bridge should contain enough buffer space to meet peak demands.
Answer:
page-pf9
The schemes for providing high speed digital transmission of the subscriber line are
collectively referred to as ________.
A) DMT/QAM
B) SDSL
C) VDSL
D) xDSL
Answer:
The transmission medium used for television distribution, long distance telephone
transmission, and short run computer system links is ________.
A) coaxial cable
B) unshielded twisted pair
C) shielded twisted pair
D) optical fiber
Answer:
A host or a router is a(n) _________ .
A) link
page-pfa
B) node
C) action
D) foreign agent
Answer:
_________ schemes are common for end-to-end flow control, in which a destination
system uses credit to prevent the source from overflowing the destination buffers.
A) Rate based
B) Backward
C) Binary
D) Credit based
Answer:
The protocol that is used for transfer of mail from a user agent to a MTA and from one
MTA to another is the _________ .
A) SMTP
B) MIME
C) IMAP
page-pfb
D) POP3
Answer:
________ twisted pair is subject to external electromagnetic interference, including
interference from nearby twisted pair and from noise generated in the environment.
A) Standard
B) Shielded
C) Unshielded
D) Coaxial
Answer:
In the case of ________ the central node typically makes use of information obtained
from all nodes.
A) NIS-UT
B) flooding
C) distributed routing
D) centralized routing
page-pfc
Answer:
The ________ specifies the mechanisms for addressing stations across the medium and
for controlling the exchange of data between two users.
A) MAC
B) LLC
C) LAN
D) PDU
Answer:
A ________ consists of two insulated copper wires arranged in a regular spiral pattern.
A) coaxial cable
B) optical fiber
C) cable
D) twisted pair
Answer:
page-pfd
__________ is when a source data stream is divided among the transmitting antennas.
A) SC-FDMA
B) Spatial multiplexing
C) OFDM
D) None of the above
Answer:
Regardless of the design of the transmission system, there will be errors, resulting in the
change of one or more bits in a transmitted block of data.
Answer:
Which of the following is NOT a disadvantage of the first generation routing
algorithm?
A) It responded slowly to congestion and delay increases and was not very accurate.
B) When a node or link fails, it can no longer be used as part of a route.
C) Queue length is an artificial measure of delay because some variable amount of
processing time elapses between the arrival of a packet at a node and its placement in
an outbound queue.
D) The algorithm did not consider line speed, merely queue length.
page-pfe
Answer:
The ________ bandwidth is the band where most of the signal energy is concentrated.
Answer:
LDPC codes exhibit performance in terms of bit error probability that is veryclose to
the ________ limit and can be efficiently implemented for high-speed use.
Answer:
When computing paths for LSPs, ________ considers the topology of the network, the
attributes of the individual links between LSRs, and the attributes of existing LSPs.
Answer:
page-pff
________ is when the sending TCP includes a code that is a function of the contents of
the remainder of the segment. The receiving TCP performs the same calculation and
compares the result with the incoming code. A discrepancy results if there has been
some error in transmission.
Answer:
________ noise is noncontinuous, consisting of irregular pulses or noise spikes of short
duration and of relatively high amplitude. It is generated from a variety of causes such
as lightning and faults and flaws in the communications system.
Answer:
________ defines subchannels that can be allocated to subscriber stations depending on
their channel conditions and data requirements.
Answer:
Because it does not transmit a continuous signal between packets, making it useful in
battery-powered applications, ________ is designed to produce a 100-Mbps data rate
over lower quality Category 3 cable.
page-pf10
Answer:
A means of transmitting analog signals without regard to their content is ________
transmission.
Answer:
IPv6 includes ________ bit source and destination address fields.
Answer:
Because of delay distortion some of the signal components of one bit position will spill
over into other bit positions causing ________ interference, which is a major limitation
to maximum bit rate over a transmission channel.
Answer:
page-pf11
Today's networks can offer differing levels of ________, which include specifications
for maximum delay and minimum throughput.
Answer:
Subchannelization is not useful for battery-powered devices.
Answer:
IPv6 addresses are ________ bits in length.
Answer:
In the IPv4 Header ________ specifies how long, in seconds, a datagram is allowed to
remain in the internet.
page-pf12
Answer:
The ratio of redundant bits to data bits, (n - k)/k, is called the _______ of the code.
Answer:
________ provides a secure remote logon capability which enables a user at a terminal
or personal computer to logon to a remote computer function as if directly connected to
that computer.
Answer:
The least expensive and most widely used guided transmission medium for both analog
and digital signals is ________.
Answer:
page-pf13
The ________ reverses the FFT operation.
Answer:

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.