MULTIPLE CHOICE
A) IEEE 802.11 B) IEEE 802.11a
C) IEEE 802.13 D) IEEE 802.16
A) WBA B) BWA
C) WLL D) WCL
A) CSN B) ASN
C) NAP D) NSP
A) Network Service Provider B) Access Service Network
C) Connectivity Service Network D) Network Access Provider
A) RT-VR B) UGS
C) ERT-VR D) all of the above
A) NRT-VR B) ERT- VR
C) FPS D) BE
A) nrtPS B) NRT-VR
C) BE D) rtPS
A) DAMA B) TDMA
C) LOS D) RT-VR
A) OBEX B) TCP/IP
C) WAP D) PPP
A) piconet B) wireless local loop
C) scatternet D) unsolicited grant service
A) four B) six
C) eight D) ten
A) two B) three
C) four D) five
A) flow specification B) scatternet
C) piconet D) TDMA burst
A) peak bandwidth B) token rate
C) latency D) delay variation
A) delay variation B) latency
C) token rate D) peak bandwidth
ANSWERS:
1. D) IEEE802.16
2. C) WLL
3. B) ASN
4. C) Connectivity service Network
5. D) all the above
6. B) ERT-VR
7. B) NRT-VR
8. B) TDMA
9. D) PPP
10. A) piconet
11. A) four
12. D) five
13. A) flow specification
14. c) latency
15. A) delay variation
MULTIPLE CHOICE WiMAX is based on the ______ standard. A) IEEE 802.11 B) IEEE 802.11a C)...
Chapter 18: wireless networks TRUE OR FALSE T F 1. As the demand for broadband Internet access has grown, providers of wired local loop service have responded with increasing reliance on optical fiber and coaxial cable. T F 2. A BWA provider services one or more cells. T F 3. Wireless systems are more expensive than wired systems. T F 4. IEEE 802.16 and the associated WiMAX specification now deal with both fixed and mobile BWA. T F ...
1) Select the correct statement(s) regarding IEEE 802.11 WLAN MAC access. a. DCF is a contention-based access method in which data collisions can occur b. Frame exchange and four frame exchange protocols are part of the DCF method c. PCF is an optional method in which no data collisions occur d. all statements are correct 2) ZigBee is a WPAN specification which is not part of the IEEE 802.15 family, and is designed to provide connectivity to machine-to-machine devices only....
1. In the IEEE 802.3 Ethernet standard, the MAC layer represents the physical layer specification, while the LLC layer describes the data link layer specification. True False 2. What is true regarding the IEEE 802.11 WLAN standard? a. to avoid the crowded ISM spectrum, 802.11 requires the use of licensed frequency channels b. both centralized and decentralized access methods are available in the 802.11 standard c. WLAN communications can only be accomplished using an AP d. there is no method...
26. On which of the following protocols is the Internet based? A) TCP/IP B) FTP C) IMAP D) DNS 27. Which of the following is a device that makes possible the translation of digital signals to analog sound signals used by a computer network? A) Local area network B) Modem C) Twisted wire D) TCP/IP 28. A network that covers entire geographical regions is most commonly referred to as an): A) intranet B) peer-to-peer network. C) wide area network. D)...
Please answer me as soon as possible Quiz Question 1 (1 point) Saved What metric is used to measure bandwidth? Question 1 options: a. msec b. bit/sec c. bytes d. number of packets/sec Question 2 (1 point) Saved Ethernet is one of access network technologies. Question 2 options: True False Question 3 (1 point) Saved Consider two hosts, A and B, connected by a single link of rate R bps. Suppose that the two hosts are separated by m meters,...
1. Which 802.11 standard has the best performing parameters in terms of data rate, range, channel separation issues and interoperability? 802.11n 802.11b 802.11g 802.11a 2. WPA2 uses IEEE 802.X with the Extensible Authentication Protocol (EAP) to perform mutual authentication, either via a _________ server or by means of a changing key generated on the basis of a shared secret pass-phrase. AES RADIUS WEP Common 3. At the MAC level, 802.11 LANs involve the use of ______ for medium access control....
4. KEY TERMS Multiple Choice Circle the letter of the choice that best matches the definition or answers the question 1. A list of the medical services covered by an insurance policy C. Noncovered services D. Fee-for-service A. Health care claim B. Schedule of benefits 2. Health plans are often referred to as: C. Providers D. Payers A. Policyholders B. Subscribers managed care network of providers under contract to provide services at discounted fees. A. Health Maintenance Organization (HMO) B....
Q1 Error detection/correction Can these schemes correct bit errors: Internet checksums, two-dimendional parity, cyclic redundancy check (CRC) A. Yes, No, No B. No, Yes, Yes c. No, Yes, No D. No, No, Yes E. Ho, hum, ha Q2 CRC vs Internet checksums Which of these is not true? A. CRC's are commonly used at the link layer B. CRC's can detect any bit error of up to r bits with an r-bit EDC. c. CRC's are more resilient to bursty...
1. Data management, device management and network management of IoT is crucial to data integrity and transmission. T F 2. An IoT application is a set of wireless devices that act together to perform some sensing and control function. Most applications also provide a user interface, such as a mobile app or cloud-based service. In general, each application is deployed independently of any other applications that may be operating in the area and forms its own separate, cryptographically isolated network....