Chapter 18: wireless networks
TRUE OR FALSE
T F 1. As the demand for broadband Internet access has grown, providers
of wired local loop service have responded with increasing reliance on optical fiber and coaxial cable.
T F 2. A BWA provider services one or more cells.
T F 3. Wireless systems are more expensive than wired systems.
T F 4. IEEE 802.16 and the associated WiMAX specification now deal with
both fixed and mobile BWA.
T F 5. A NAP is a business entity that provides WiMAX radio access
infrastructure to one or more WiMAX Service Providers.
T F 6. Secure communication between the subscriber station and the CSN
is handled at the security sublayer.
T F 7. A TDMA time slot may contain exactly one MAC PDU, a fraction of a
MAC PDU, or multiple MAC PDUs.
T F 8. The 802.16 MAC protocol is connection oriented.
T F 9. A MAC PDU with a generic header contains either MAC
management messages or convergence sublayer data.
T F 10. UGS is commonly used for uncompressed audio and video
information.
T F 11. File transfer is an example of an ERT-VR service.
T F 12. The IEEE 802.16 physical layer set of standards is still evolving
and is not stable enough to form the basis of widespread WiMAX implementation and deployment.
T F 13. Both WirelessMAN-OFDM and WirelessMAN-OFDMA are suitable
for an environment that includes mobile SSs.
T F 14. RFCOMM is the cable replacement protocol included in the
Bluetooth specification.
T F 15. Bluetooth incorporates the wireless application environment and
the wireless application protocol into its architecture.
MULTIPLE CHOICE
A) IEEE 802.11 B) IEEE 802.11a
C) IEEE 802.13 D) IEEE 802.16
C) WLL D) WCL
A) CSN B) ASN
C) NAP D) NSP
A) Network Service Provider B) Access Service Network
C) Connectivity Service Network D) Network Access Provider
C) ERT-VR D) all of the above
A) NRT-VR B) ERT- VR
C) FPS D) BE
A) nrtPS B) NRT-VR
C) BE D) rtPS
C) LOS D) RT-VR
A) OBEX B) TCP/IP
C) WAP D) PPP
C) scatternet D) unsolicited grant service
A) four B) six
C) eight D) ten
A) two B) three
C) four D) five
A) flow specification B) scatternet
C) piconet D) TDMA burst
C) latency D) delay variation
A) delay variation B) latency
C) token rate D) peak bandwidth
1. T
2. F
3. T
4. F
5. T
2. 16. WiMAX is based on the IEEE 802.16 standard. (D)
18. The set of network functions needed to provide radio access to WiMAX subscribers is: ASN
MULTIPLE CHOICE WiMAX is based on the ______ standard. A) IEEE 802.11 B) IEEE 802.11a C) IEEE 802.13 D) IEEE 802.16 The key stumbling blocks in installing ______ systems are obtaining permission to use a given frequency band and finding a suitable elevated site for the BS antennas. A) WBA B) BWA C) WLL D) WCL The set of network functions needed to provide radio access to WiMAX subscribers is: A) CSN B) ASN C) NAP D) NSP A ________...
seven-layer model? (Select twa.) A. Cables B. Hub C. Network protocol D. Session software the data 13. Which components work at Layer I of the os La a. Which layer of the 0Sl model makes sure ls in a readable format for the Application layer A. Application layer B. Presentation layer Ex do C. Session layer D. Transport layer 9. At which layer of the TCP/1P model are UDP 14. Andalyn says complete 48-bit MAC ed to NIC manufacturers from...
1) What is the protocol developed for the wireless network communications? Explain. A) Wireless Encryption Protocol (WEP) B) Wireless Application Protocol (WAP) C) Wired Equivalent Privacy (WEP) D) Wireless Session Protocol (WSP) 2) Consider 802.11 shared key authentication. Which of the following statements is false? Explain. A) If a device with the key is lost then the security for the entire WLAN is compromised. B) 802.1X requires shared key authentication. C) Real users and attackers with a shared WEP key...
In this lab, we’ll investigate the 802.11 wireless network protocol. Follow the instructions and answers questions 7 - 10. http://gaia.cs.umass.edu/wireshark-labs/wireshark-traces.zip In this lab, we'll investigate the 802.11 wireless network protocol. Before beginning this lab, you might want to re-read Section 6.3 in the text. Since we l1 be delving a bit deeper into 802.11 than is covered in the text, you might want to check out "A Technical Tutorial on the 802.11Protocol," by Pablo Brenner (Breezecom Communications) http://www.sss-mag.com/pdf802_11tut.pdf, and "Understanding...
1. In the IEEE 802.3 Ethernet standard, the MAC layer represents the physical layer specification, while the LLC layer describes the data link layer specification. True False 2. What is true regarding the IEEE 802.11 WLAN standard? a. to avoid the crowded ISM spectrum, 802.11 requires the use of licensed frequency channels b. both centralized and decentralized access methods are available in the 802.11 standard c. WLAN communications can only be accomplished using an AP d. there is no method...
EXPLAIN in details why is it true or false. need to be 100% POSTIVE OF ANSWER. SOLVE D E F G H I J 2) (10 points) IP and MAC addressing. True or False. Circle True or False. One point for each correct answer, zero points for each incorrect answer. Many of the questions refer the folowing network consisting of three 10Mbps Ethernet segments, one switch, and one router. Assume all ΛΕΡ tables are up-to-date unless otherwise stated Switch Ronter...
Question 26 In the TCP/IP model, what layer combines the responsibilities of the Application, Presentation, and Session layers from the OSI model? a. Internet b. Application c. Transport d. Link 1.25 points Question 27 In the TCP/IP model, what layer is considered so simple that it is ignored entirely? a. Network b. Data Link c. Application d. Physical 1.25 points Question 28 In the United States, who is able to activate the Emergency Alert System at the national level? a....
2) IP and MAC addressing. True or False. One point for each correct answer, zero points for each incorrect answer. Many of the questions refer to the following network consisting of three 10Mbps Ethernet segments, one switch, and one router. Assume all ARP tables are up-to-date unless otherwise stated. a) Consider a network consisting of Ethernets, hubs, switches, and routers. Suppose one of the hubs is replaced with a switch. Then the network administrator must redefine some IP addresses. True...
Q.1 Choose the correct answer 1. Performance is evaluated by two networking metrics: throughput 6 Marks and delay. We often need I2 Marks ) a. less throughput and less delay b. more throughput and less delay c. less throughput and more delay d more throughput and more delay 1 1 1 1 1 1 1 1000000000011000010101010101101010101011 is._L 2 Marks ] a. Unicast b. Broadcast c. Multicast d. None of the above 2 Marks) 3. The maximum data length for 10...
166 Chapter 8: TCP/IP Applications Getting Down to Business The way network communication all those ls and Os) goes in and out of a machine physically is through the NIC (network interface card). The way network communication goes in and out of a machine logically though, is through a program or service. A service is a program that runs in the background, independent of a logon, that provides functionalities to a system. Windows client machines, for instance, have a Workstation...