Question

MULTIPLE CHOICE WiMAX is based on the ______ standard. A) IEEE 802.11                      B) IEEE 802.11a C)...

MULTIPLE CHOICE

  1. WiMAX is based on the ______ standard.

A) IEEE 802.11                      B) IEEE 802.11a

C) IEEE 802.13                      D) IEEE 802.16

  1. The key stumbling blocks in installing ______ systems are obtaining permission to use a given frequency band and finding a suitable elevated site for the BS antennas.

A) WBA                      B) BWA

C) WLL                       D) WCL

  1. The set of network functions needed to provide radio access to WiMAX subscribers is:

A) CSN                        B) ASN

C) NAP                        D) NSP

  1. A ________ is a set of network functions that provide IP connectivity services to WiMAX subscribers.

A) Network Service Provider           B) Access Service Network

C) Connectivity Service Network     D) Network Access Provider

  1. _______ applications transmit at a rate that varies with time.

A) RT-VR                   B) UGS

C) ERT-VR                  D) all of the above

  1. The _______ service is to support real-time applications with variable data rates, which require guaranteed data and delay.

A) NRT-VR                 B) ERT- VR

C) FPS                         D) BE

  1. The _______ service is suitable for applcations that can tolerate variable delays and rates.

A) nrtPS                      B) NRT-VR

C) BE                           D) rtPS

  1. _______ employs a single, relatively large, uplink frequency band that is used to transmit a sequence of time slots.

A) DAMA                   B) TDMA

C) LOS                         D) RT-VR

  1. The _________ is an Internet standard protocol for transporting IP datagrams over a point-to-point link.

A) OBEX                      B) TCP/IP      

C) WAP                       D) PPP

  1. A ________ consists of a master and from one to seven active slave devices.

A) piconet                  B) wireless local loop

C) scatternet              D) unsolicited grant service

  1. The header format for all Bluetooth packets consists of ______ fields.

A) four                        B) six

C) eight                       D) ten

  1. Bluetooth defines _______ types of logical data channels designated to carry different types of payload traffic.

A) two                         B) three

C) four                        D) five

  1. A _________ is a set of parameters that indicate a performance level that the transmiter will attempt to achieve.

A) flow specification             B) scatternet

C) piconet                               D) TDMA burst

  1. The _________ is the maximum acceptable delay between transmission of a bit by the sender and its initial transmission over the air, expressed in microseconds.

A) peak bandwidth               B) token rate

C) latency                               D) delay variation

  1. The _________ is the difference, in microseconds, between the maximum and minimum possible delay that a packet will experience.

A) delay variation                  B) latency

C) token rate                          D) peak bandwidth

0 0
Add a comment Improve this question Transcribed image text
Answer #1

ANSWERS:

1. D) IEEE802.16

2. C) WLL

3. B) ASN

4. C) Connectivity service Network

5. D) all the above

6. B) ERT-VR

7. B) NRT-VR

8. B) TDMA

9. D) PPP

10. A) piconet

11. A) four

12. D) five

13. A) flow specification

14. c) latency

15. A) delay variation

Add a comment
Know the answer?
Add Answer to:
MULTIPLE CHOICE WiMAX is based on the ______ standard. A) IEEE 802.11                      B) IEEE 802.11a C)...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Chapter 18: wireless networks TRUE OR FALSE                                    

    Chapter 18: wireless networks TRUE OR FALSE                                                                                                     T          F          1. As the demand for broadband Internet access has grown, providers of wired local loop service have responded with increasing reliance   on optical fiber and coaxial cable. T          F          2. A BWA provider services one or more cells. T          F          3. Wireless systems are more expensive than wired systems. T          F          4. IEEE 802.16 and the associated WiMAX specification now deal with      both fixed and mobile BWA. T          F         ...

  • 1) Select the correct statement(s) regarding IEEE 802.11 WLAN MAC access. a. DCF is a contention-based...

    1) Select the correct statement(s) regarding IEEE 802.11 WLAN MAC access. a. DCF is a contention-based access method in which data collisions can occur b. Frame exchange and four frame exchange protocols are part of the DCF method c. PCF is an optional method in which no data collisions occur d. all statements are correct 2) ZigBee is a WPAN specification which is not part of the IEEE 802.15 family, and is designed to provide connectivity to machine-to-machine devices only....

  • 1. In the IEEE 802.3 Ethernet standard, the MAC layer represents the physical layer specification, while...

    1. In the IEEE 802.3 Ethernet standard, the MAC layer represents the physical layer specification, while the LLC layer describes the data link layer specification. True False 2. What is true regarding the IEEE 802.11 WLAN standard? a. to avoid the crowded ISM spectrum, 802.11 requires the use of licensed frequency channels b. both centralized and decentralized access methods are available in the 802.11 standard c. WLAN communications can only be accomplished using an AP d. there is no method...

  • 26. On which of the following protocols is the Internet based? A) TCP/IP B) FTP C)...

    26. On which of the following protocols is the Internet based? A) TCP/IP B) FTP C) IMAP D) DNS 27. Which of the following is a device that makes possible the translation of digital signals to analog sound signals used by a computer network? A) Local area network B) Modem C) Twisted wire D) TCP/IP 28. A network that covers entire geographical regions is most commonly referred to as an): A) intranet B) peer-to-peer network. C) wide area network. D)...

  • Please answer me as soon as possible Quiz Question 1 (1 point) Saved What metric is...

    Please answer me as soon as possible Quiz Question 1 (1 point) Saved What metric is used to measure bandwidth? Question 1 options: a. msec b. bit/sec c. bytes d. number of packets/sec Question 2 (1 point) Saved Ethernet is one of access network technologies. Question 2 options: True False Question 3 (1 point) Saved Consider two hosts, A and B, connected by a single link of rate R bps. Suppose that the two hosts are separated by m meters,...

  • 1. Which 802.11 standard has the best performing parameters in terms of data rate, range, channel...

    1. Which 802.11 standard has the best performing parameters in terms of data rate, range, channel separation issues and interoperability? 802.11n 802.11b 802.11g 802.11a 2. WPA2 uses IEEE 802.X with the Extensible Authentication Protocol (EAP) to perform mutual authentication, either via a _________ server or by means of a changing key generated on the basis of a shared secret pass-phrase. AES RADIUS WEP Common 3. At the MAC level, 802.11 LANs involve the use of ______ for medium access control....

  • 4. KEY TERMS Multiple Choice Circle the letter of the choice that best matches the definition...

    4. KEY TERMS Multiple Choice Circle the letter of the choice that best matches the definition or answers the question 1. A list of the medical services covered by an insurance policy C. Noncovered services D. Fee-for-service A. Health care claim B. Schedule of benefits 2. Health plans are often referred to as: C. Providers D. Payers A. Policyholders B. Subscribers managed care network of providers under contract to provide services at discounted fees. A. Health Maintenance Organization (HMO) B....

  • Q1 Error detection/correction Can these schemes correct bit errors: Internet checksums, two-dimendional parity, cyclic...

    Q1 Error detection/correction Can these schemes correct bit errors: Internet checksums, two-dimendional parity, cyclic redundancy check (CRC) A. Yes, No, No B. No, Yes, Yes c. No, Yes, No D. No, No, Yes E. Ho, hum, ha Q2 CRC vs Internet checksums Which of these is not true? A. CRC's are commonly used at the link layer B. CRC's can detect any bit error of up to r bits with an r-bit EDC. c. CRC's are more resilient to bursty...

  • 1. Data management, device management and network management of IoT is crucial to data integrity and...

    1. Data management, device management and network management of IoT is crucial to data integrity and transmission. T F 2. An IoT application is a set of wireless devices that act together to perform some sensing and control function. Most applications also provide a user interface, such as a mobile app or cloud-based service. In general, each application is deployed independently of any other applications that may be operating in the area and forms its own separate, cryptographically isolated network....

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT