CS 89708

subject Type Homework Help
subject Pages 24
subject Words 2364
subject Authors William Stallings

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
Traffic on a network or internet can be divided into two broad categories: elastic and
inelastic.
Answer:
One of the things that may happen when network congestion occurs is packets are
discarded.
Answer:
SIP is based on an HTTP-like request/response transaction model.
Answer:
The frequency is the rate at which the signal repeats.
Answer:
page-pf2
The encoding scheme is the mapping from data bits to signal elements.
Answer:
With the exception of the repeat-accumulate code, the LDCP code is systematic.
Answer:
PCM starts with a continuous time, continuous amplitude signal from which a digital
signal is produced.
Answer:
A reservation scheme is an integral part of ATM networks.
page-pf3
Answer:
Congestion is only a critical problem for certain types of switched data networks.
Answer:
SIP can support any type of single media or multimedia session, including
teleconferencing.
Answer:
The sending station must not send frames at a rate faster than the receiving stations can
absorb them.
Answer:
page-pf4
DNS allows essentially unlimited levels and uses the comma as the level delimiter in
printed names.
Answer:
Hop-by-hop routing does not readily support traffic engineering or policy routing.
Answer:
Route selection refers to the selection of an LSP for a particular FEC.
Answer:
Modulation does not permit frequency-division multiplexing.
page-pf5
Answer:
IMAP always keeps messages on the server and replicates copies to the clients.
Answer:
The modulation rate of a signal is the rate, in bits per second, that data are transmitted.
Answer:
A hub topology, with a MAC algorithm such as CSMA to control, is appropriate for
ad-hoc LANs.
Answer:
page-pf6
An example of a choke packet is the ICMP Source Quench packet.
Answer:
There are no fundamental differences among data, voice, and video communications.
Answer:
Each packet contains some portion of the user data plus control information needed for
proper functioning of the network.
Answer:
Each protocol provides a set of rules for the exchange of data between systems.
Answer:
page-pf7
A category of encoding techniques known as multilevel binary addresses some of the
deficiencies of the NRZ codes.
Answer:
Secure Shell (SSH) enables the user and the remote server to authenticate each other.
Answer:
A key design issue in switched networks is routing.
Answer:
Enabling an employee returning from a trip to transfer data from a personal portable
computer to a server in the office is an example of Nomadic access.
page-pf8
Answer:
Random routing requires the use of network information.
Answer:
A credit scheme is a more effective scheme with an unreliable network service.
Answer:
Using two different voltage levels for the two binary digits is a difficult way to transmit
digital signals.
Answer:
page-pf9
Another well known application of circuit switching is the PBX.
Answer:
Synchronization and interfacing techniques are sufficient by themselves.
Answer:
All first and second generation cellular networks provide encryption.
Answer:
The syndrome indicates which of the individual parity-check equations do not equal 0.
Answer:
page-pfa
The basic building block of any communications facility is the transmission line.
Answer:
The designer who seeks robustness does not need to cope with the requirement for
stability.
Answer:
The parabolic reflective antenna is a type of antenna used in terrestrial microwave and
satellite applications.
Answer:
________ is determined by whether the routing decision is made on a packet or virtual
page-pfb
circuit basis.
A) Place
B) Update timing
C) Decision time
D) VCC
Answer:
The ________ time is the time it takes for a bit to traverse the link between source and
destination.
A) relay
B) flow
C) transmission
D) propagation
Answer:
_________ is a desirable property for real-time communication.
A) Low overhead in header bits per packet
B) Modest buffer requirements within the network
page-pfc
C) Low jitter
D) All of the above
Answer:
The __________ is the reduction, in decibels, to achieve a specified BER of an
error-correcting coded system compared to an uncoded system using the same
modulation.
A) FEC
B) Hamming distance
C) coding gain
D) checksum
Answer:
A wireless LAN linked into a wired LAN on the same premises is referred to as a LAN
________.
A) interconnection
B) handoff
C) ad hoc
D) extension
page-pfd
Answer:
To support data transfer to and from a cable modem, a cable TV provider dedicates
________ channels.
A) one
B) two
C) four
D) three
Answer:
In FDM, because multiple carriers are to be used, each is referred to as a ________.
A) subcarrier
B) channel
C) WDM
D) subscriber
Answer:
page-pfe
The ________ code has been specified for the IEEE 802.3 (Ethernet) standard for
baseband coaxial cable and twisted pair bus LANs.
A) Manchester
B) HDB3
C) differential Manchester
D) NRZ
Answer:
__________ proposed an approach for the construction of LDPC codes by defining the
LDPC parity-check matrix.
A) MacKay
B) Reed
C) Gallager
D) Neal
Answer:
In a(n) ________ there is a cluster of bits in which a number of errors occur, although
not necessarily all of the bits in the cluster suffer an error.
page-pff
A) error burst
B) single-bit error
C) idle state
D) error detection
Answer:
A cellular network uses multiple low power ________.
A) frequencies
B) receivers
C) antennas
D) transmitters
Answer:
Third generation wireless communication supports ________.
A) voice but not multimedia data
B) multimedia but not voice
C) multimedia and voice
D) voice but not video
page-pf10
Answer:
In the United States, ________ microwave bands have been set aside for unlicensed
spread spectrum use.
A) 2
B) 3
C) 6
D) 4
Answer:
A ________ local area network consists of a closed loop of repeaters that allow data to
circulate around the ring.
A) FDDI
B) ring
C) star
D) tree
Answer:
page-pf11
__________ codes are among the most powerful cyclic block codes and are widely
used in wireless applications.
A) Parity check
B) B) BCH
C) LPDC
D) Repeat-accumulate
Answer:
The guaranteed service is the most demanding service provided by ISA.
Answer:
________ focuses on the architecture and techniques for constraint-based path
computation.
A) CCAMP
B) PCE
C) 12vpn
page-pf12
D) Pwe3
Answer:
A _________ is a facility that may store previous requests and responses for handling
new requests.
A) cache
B) gateway
C) proxy
D) tunnel
Answer:
The ________ is the maximum value or strength of the signal over time; typically this
value is measured in volts.
A) period
B) phase
C) frequency
D) peak amplitude
page-pf13
Answer:
The binary 1 represented by the absence of a line signal and the binary 0 by alternating
positive and negative pulses is ________.
A) pseudoternary
B) NRZ-L
C) bipolar-AMI
D) differential Manchester
Answer:
Synchronous time division multiplexing can be used with ________ signals.
A) analog
B) digital signals or analog signals carrying digital data
C) digital
D) digital signals carrying digital data
Answer:
page-pf14
_________ is a subtype of a membership query message.
A) General query
B) Group-specific query
C) Group-and-source specific query
D) All of the above
Answer:
Each label switching router builds a table, called a ________, to specify how a packet
must be treated and forwarded.
A) LIB
B) LSP
C) ECN
D) FEC
Answer:
The objective of __________ is to maintain the number of packets within the network
below the level at which performance falls off dramatically.
A) fast restraint
B) traffic management
page-pf15
C) window management
D) congestion control
Answer:
In order for data processing devices to communicate certain conventions must be
decided on. These requirements can collectively be termed ________.
A) synchronization
B) transmission systems
C) exchange management
D) flow control
Answer:
_________ explicit congestion signaling approaches notify the user that congestion
avoidance procedures should be initiated where applicable for traffic in the same
direction as the received notification.
A) Datagram
B) Dynamic
C) Forward
D) All of the above
page-pf16
Answer:
________ multiplexing is commonly used for multiplexing digitized voice streams and
data streams.
A) Time division
B) Frequency division
C) Statistical time division
D) Synchronous time division
Answer:
With ________, routing decisions that are made change as conditions on the network
change.
A) fixed routing
B) flooding
C) adaptive routing
D) random routing
Answer:
page-pf17
The essence of MPLS functionality is that traffic is grouped into ________.
A) FECs
B) ECN
C) LIBs
D) LSPs
Answer:
A form of attenuation known as ________ is when a transmitted signal attenuates over
distance because the signal is being spread over a larger and larger area.
Answer:
The place where telephone companies terminate customer lines and locate switching
equipment to interconnect those lines with other networks is the ________.
A) CO
B) ISP
C) POP
page-pf18
D) NAP
Answer:
_________ is a common modulation scheme used with OFDM.
A) QPSK
B) FFT
C) IFFT
D) ISI
Answer:
Nonselective, or ________, is the type of fading in which all frequency components of
the received signal fluctuate in the same proportions simultaneously.
A) slow fading
B) fast fading
C) diverse fading
D) flat fading
page-pf19
Answer:
Circuit switching connections ________.
A) require manual intervention
B) are opaque
C) require one time automated set up
D) are transparent
Answer:
________ is aimed at smoothing out traffic flow by reducing packet clumping that leads
to fluctuations in buffer occupancy.
Answer:
A ________ is a private network that is configured within a public network in order to
take advantage of the economies of scale and management facilities of large networks.
page-pf1a
Answer:
__________ has been defined as the process of combining an input signal m(t) and a
carrier at frequency fc to produce a signal s(t) whose bandwidth is (usually) centered on
fc.
Answer:
An important design goal for all three generation systems is to limit channel usage to 5
MHz.
Answer:
________ control is achieved by retransmission of damaged frames that have not been
acknowledged or for which the other side requests a retransmission.
Answer:
page-pf1b
The ________ bandwidth of a signal is the width of the spectrum.
Answer:
Reed-Solomon is an example of a ________ code.
Answer:
An example of _________ signaling is the explicit congestion notification capability
provided in IP and TCP and defined in RFC 3168.
Answer:
The _______ is designed to support digital and analog phones and connect to IP-based
networks using VoIP, as well as provide if needed a connection to the public switched
telephone network using traditional technology.
page-pf1c
Answer:
The ________ connects calls between mobile units, makes connections between a fixed
subscriber to the public network and a mobile subscriber to the cellular network,
assigns the voice channel to each call, performs handoffs, and monitors the call for
billing information.
Answer:
The three MAC frame types are control frames, data frames, and ________ frames.
Answer:
With ________, a packet is sent by a source node to every one of its neighbors. At each
node, an incoming packet is retransmitted on all outgoing links except for the link on
which it arrived.
Answer:
page-pf1d
A distinction needs to be made between data rate (expressed in bits per second and
________ rate )expressed in baud when signal encoding techniques are used.
Answer:
An application-level firewall may prevent the forwarding of RTP packets.
Answer:
Spread spectrum is an important form of encoding for wireless communications.
Answer:
The three basic encoding or modulation techniques for transforming digital data into
analog signals are amplitude shift keying, phase shift keying, and ________.
page-pf1e
Answer:
_______ is a multiplexing technique used with spread spectrum.
Answer:
The ________ standards identify a number of categories of cabling and associated
components that can be used for premises and campus-wide data distribution.
Answer:

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.