Chapter 18: wireless networks
TRUE OR FALSE
T F 1. As the demand for broadband Internet access has grown, providers
of wired local loop service have responded with increasing reliance on optical fiber and coaxial cable.
T F 2. A BWA provider services one or more cells.
T F 3. Wireless systems are more expensive than wired systems.
T F 4. IEEE 802.16 and the associated WiMAX specification now deal with
both fixed and mobile BWA.
T F 5. A NAP is a business entity that provides WiMAX radio access
infrastructure to one or more WiMAX Service Providers.
T F 6. Secure communication between the subscriber station and the CSN
is handled at the security sublayer.
T F 7. A TDMA time slot may contain exactly one MAC PDU, a fraction of a
MAC PDU, or multiple MAC PDUs.
T F 8. The 802.16 MAC protocol is connection oriented.
T F 9. A MAC PDU with a generic header contains either MAC
management messages or convergence sublayer data.
T F 10. UGS is commonly used for uncompressed audio and video
information.
T F 11. File transfer is an example of an ERT-VR service.
T F 12. The IEEE 802.16 physical layer set of standards is still evolving
and is not stable enough to form the basis of widespread WiMAX implementation and deployment.
T F 13. Both WirelessMAN-OFDM and WirelessMAN-OFDMA are suitable
for an environment that includes mobile SSs.
T F 14. RFCOMM is the cable replacement protocol included in the
Bluetooth specification.
T F 15. Bluetooth incorporates the wireless application environment and
the wireless application protocol into its architecture.
MULTIPLE CHOICE
A) IEEE 802.11 B) IEEE 802.11a
C) IEEE 802.13 D) IEEE 802.16
C) WLL D) WCL
A) CSN B) ASN
C) NAP D) NSP
A) Network Service Provider B) Access Service Network
C) Connectivity Service Network D) Network Access Provider
C) ERT-VR D) all of the above
A) NRT-VR B) ERT- VR
C) FPS D) BE
A) nrtPS B) NRT-VR
C) BE D) rtPS
C) LOS D) RT-VR
A) OBEX B) TCP/IP
C) WAP D) PPP
C) scatternet D) unsolicited grant service
A) four B) six
C) eight D) ten
A) two B) three
C) four D) five
A) flow specification B) scatternet
C) piconet D) TDMA burst
C) latency D) delay variation
A) delay variation B) latency
C) token rate D) peak bandwidth
1. T
2. F
3. T
4. F
5. T
2. 16. WiMAX is based on the IEEE 802.16 standard. (D)
18. The set of network functions needed to provide radio access to WiMAX subscribers is: ASN
TRUE OR FALSE T F 1. As the demand for broadband Internet access has grown, providers of wired local loop service have responded with increasing reliance on optical fiber and coaxial cable. T F 2. A BWA provider services one or more cells. T F 3. Wireless systems are more expensive than wired systems. T F 4. IEEE 802.16 and the associated WiMAX specification now deal with both fixed and mobile BWA. T F 5. A NAP is a...
MULTIPLE CHOICE WiMAX is based on the ______ standard. A) IEEE 802.11 B) IEEE 802.11a C) IEEE 802.13 D) IEEE 802.16 The key stumbling blocks in installing ______ systems are obtaining permission to use a given frequency band and finding a suitable elevated site for the BS antennas. A) WBA B) BWA C) WLL D) WCL The set of network functions needed to provide radio access to WiMAX subscribers is: A) CSN B) ASN C) NAP D) NSP A ________...
1) What is the protocol developed for the wireless network communications? Explain. A) Wireless Encryption Protocol (WEP) B) Wireless Application Protocol (WAP) C) Wired Equivalent Privacy (WEP) D) Wireless Session Protocol (WSP) 2) Consider 802.11 shared key authentication. Which of the following statements is false? Explain. A) If a device with the key is lost then the security for the entire WLAN is compromised. B) 802.1X requires shared key authentication. C) Real users and attackers with a shared WEP key...
1. In the IEEE 802.3 Ethernet standard, the MAC layer represents the physical layer specification, while the LLC layer describes the data link layer specification. True False 2. What is true regarding the IEEE 802.11 WLAN standard? a. to avoid the crowded ISM spectrum, 802.11 requires the use of licensed frequency channels b. both centralized and decentralized access methods are available in the 802.11 standard c. WLAN communications can only be accomplished using an AP d. there is no method...
In this lab, we’ll investigate the 802.11 wireless network
protocol. Follow the instructions and answers questions 7 - 10.
http://gaia.cs.umass.edu/wireshark-labs/wireshark-traces.zip
In this lab, we'll investigate the 802.11 wireless network protocol. Before beginning this lab, you might want to re-read Section 6.3 in the text. Since we l1 be delving a bit deeper into 802.11 than is covered in the text, you might want to check out "A Technical Tutorial on the 802.11Protocol," by Pablo Brenner (Breezecom Communications) http://www.sss-mag.com/pdf802_11tut.pdf, and "Understanding...
Plz answer 27 to 40
flooding the network with 27. Which of the following is a type of denial-of-service attack that involves broadcast messages that contain a spoofed source address of an intended victim? a. packet storm b. broadcast flood c. smurf attack d. half-open SYN attack 28. When would you most likely NOT choose to use a leased line connection? a. when high-quality, 24/7 access is needed b. for mission critical applications c. when fast upstream as well as...
Q.1 Choose the correct answer 1. Performance is evaluated by two networking metrics: throughput 6 Marks and delay. We often need I2 Marks ) a. less throughput and less delay b. more throughput and less delay c. less throughput and more delay d more throughput and more delay 1 1 1 1 1 1 1 1000000000011000010101010101101010101011 is._L 2 Marks ] a. Unicast b. Broadcast c. Multicast d. None of the above 2 Marks) 3. The maximum data length for 10...
EXPLAIN in details why is it true or false. need to be 100%
POSTIVE OF ANSWER. SOLVE D E F G H I J
2) (10 points) IP and MAC addressing. True or False. Circle True or False. One point for each correct answer, zero points for each incorrect answer. Many of the questions refer the folowing network consisting of three 10Mbps Ethernet segments, one switch, and one router. Assume all ΛΕΡ tables are up-to-date unless otherwise stated Switch Ronter...
1. Data management, device management and network management of IoT is crucial to data integrity and transmission. T F 2. An IoT application is a set of wireless devices that act together to perform some sensing and control function. Most applications also provide a user interface, such as a mobile app or cloud-based service. In general, each application is deployed independently of any other applications that may be operating in the area and forms its own separate, cryptographically isolated network....
2) IP and MAC addressing. True or False. One point for each correct answer, zero points for each incorrect answer. Many of the questions refer to the following network consisting of three 10Mbps Ethernet segments, one switch, and one router. Assume all ARP tables are up-to-date unless otherwise stated. a) Consider a network consisting of Ethernets, hubs, switches, and routers. Suppose one of the hubs is replaced with a switch. Then the network administrator must redefine some IP addresses. True...