Question

1) Select the correct statement(s) regarding IEEE 802.11 WLAN MAC access. a. DCF is a contention-based...

1) Select the correct statement(s) regarding IEEE 802.11 WLAN MAC access.

a. DCF is a contention-based access method in which data collisions can occur

b. Frame exchange and four frame exchange protocols are part of the DCF method

c. PCF is an optional method in which no data collisions occur

d. all statements are correct

2) ZigBee is a WPAN specification which is not part of the IEEE 802.15 family, and is designed to provide connectivity to machine-to-machine devices only.

True

False

0 0
Add a comment Improve this question Transcribed image text
Know the answer?
Add Answer to:
1) Select the correct statement(s) regarding IEEE 802.11 WLAN MAC access. a. DCF is a contention-based...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Study Questions, thanks! QUESTION 17 Select the correct statement(s) regarding 802.11 WLANs. a. Operates over unlicensed...

    Study Questions, thanks! QUESTION 17 Select the correct statement(s) regarding 802.11 WLANs. a. Operates over unlicensed ISM frequencies b. Implements spread spectrum or OFDM techniques for better noise resistance and spectral efficiency c. Uses CSMA/CA since collisions are always possible d. All of the above are correct QUESTION 18 For 802.11 WLANs, the four frame exchange protocol is implemented to help avoid the hidden node problem. True False QUESTION 19 What are ways to increase data capacity on an 802.11...

  • 1. In the IEEE 802.3 Ethernet standard, the MAC layer represents the physical layer specification, while...

    1. In the IEEE 802.3 Ethernet standard, the MAC layer represents the physical layer specification, while the LLC layer describes the data link layer specification. True False 2. What is true regarding the IEEE 802.11 WLAN standard? a. to avoid the crowded ISM spectrum, 802.11 requires the use of licensed frequency channels b. both centralized and decentralized access methods are available in the 802.11 standard c. WLAN communications can only be accomplished using an AP d. there is no method...

  • MULTIPLE CHOICE WiMAX is based on the ______ standard. A) IEEE 802.11                      B) IEEE 802.11a C)...

    MULTIPLE CHOICE WiMAX is based on the ______ standard. A) IEEE 802.11                      B) IEEE 802.11a C) IEEE 802.13                      D) IEEE 802.16 The key stumbling blocks in installing ______ systems are obtaining permission to use a given frequency band and finding a suitable elevated site for the BS antennas. A) WBA                      B) BWA C) WLL                       D) WCL The set of network functions needed to provide radio access to WiMAX subscribers is: A) CSN                        B) ASN C) NAP                        D) NSP A ________...

  • In this lab, we’ll investigate the 802.11 wireless network protocol. Follow the instructions and answers questions...

    In this lab, we’ll investigate the 802.11 wireless network protocol. Follow the instructions and answers questions 7 - 10. http://gaia.cs.umass.edu/wireshark-labs/wireshark-traces.zip In this lab, we'll investigate the 802.11 wireless network protocol. Before beginning this lab, you might want to re-read Section 6.3 in the text. Since we l1 be delving a bit deeper into 802.11 than is covered in the text, you might want to check out "A Technical Tutorial on the 802.11Protocol," by Pablo Brenner (Breezecom Communications) http://www.sss-mag.com/pdf802_11tut.pdf, and "Understanding...

  • (1) The sublayer is responsible for CSMA/CD operation. Select one: a. Logical Link Control (LLC) b. Medium Access Control (MAC) c. Physical Layer Management d. Data Link Layer (2) Carrier Sense M...

    (1) The sublayer is responsible for CSMA/CD operation. Select one: a. Logical Link Control (LLC) b. Medium Access Control (MAC) c. Physical Layer Management d. Data Link Layer (2) Carrier Sense Multiple Access (CSMA) method was developed to increase the of local area networks. Select one: a. collision b. performance d. number of station c. transmission time (3) In Carrier Sense Multiple Access/Collision Detection (CSMA/CD), sending station must detect collisions by "listening" to the medium for at least b. one-way...

  • TRUE/FALSE QUESTIONS:  Foundations of Information Security and Assurance 1. There is a problem anticipating and testing for...

    TRUE/FALSE QUESTIONS:  Foundations of Information Security and Assurance 1. There is a problem anticipating and testing for all potential types of non-standard inputs that might be exploited by an attacker to subvert a program. 2. Without suitable synchronization of accesses it is possible that values may be corrupted, or changes lost, due to over-lapping access, use, and replacement of shared values. 3. The biggest change of the nature in Windows XP SP2 was to change all anonymous remote procedure call (RPC)...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT