Question

Chapter 18: wireless networks TRUE OR FALSE                                    

Chapter 18: wireless networks

TRUE OR FALSE

                                                                                                   

T          F          1. As the demand for broadband Internet access has grown, providers

of wired local loop service have responded with increasing reliance   on optical fiber and coaxial cable.

T          F          2. A BWA provider services one or more cells.

T          F          3. Wireless systems are more expensive than wired systems.

T          F          4. IEEE 802.16 and the associated WiMAX specification now deal with

     both fixed and mobile BWA.

T          F          5. A NAP is a business entity that provides WiMAX radio access

     infrastructure to one or more WiMAX Service Providers.

T          F          6. Secure communication between the subscriber station and the CSN

      is handled at the security sublayer.

T          F          7. A TDMA time slot may contain exactly one MAC PDU, a fraction of a

     MAC PDU, or multiple MAC PDUs.

T          F          8. The 802.16 MAC protocol is connection oriented.

T          F          9. A MAC PDU with a generic header contains either MAC

     management messages or convergence sublayer data.

T          F          10. UGS is commonly used for uncompressed audio and video

        information.

T          F          11. File transfer is an example of an ERT-VR service.

T          F          12. The IEEE 802.16 physical layer set of standards is still evolving

and is not stable enough to form the basis of widespread WiMAX implementation and deployment.

T          F          13. Both WirelessMAN-OFDM and WirelessMAN-OFDMA are suitable

        for an environment that includes mobile SSs.

T          F          14. RFCOMM is the cable replacement protocol included in the

        Bluetooth specification.

T          F          15. Bluetooth incorporates the wireless application environment and

        the wireless application protocol into its architecture.

MULTIPLE CHOICE

  1. WiMAX is based on the ______ standard.

A) IEEE 802.11                      B) IEEE 802.11a

C) IEEE 802.13                      D) IEEE 802.16

  1. The key stumbling blocks in installing ______ systems are obtaining permission to use a given frequency band and finding a suitable elevated site for the BS antennas.
  1. WBA                      B) BWA

C) WLL                       D) WCL

  1. The set of network functions needed to provide radio access to WiMAX subscribers is:

A) CSN                        B) ASN

C) NAP                        D) NSP

  1. A ________ is a set of network functions that provide IP connectivity services to WiMAX subscribers.

A) Network Service Provider           B) Access Service Network

C) Connectivity Service Network     D) Network Access Provider

  1. _______ applications transmit at a rate that varies with time.
  1. RT-VR                   B) UGS

C) ERT-VR                  D) all of the above

  1. The _______ service is to support real-time applications with variable data rates, which require guaranteed data and delay.

A) NRT-VR                 B) ERT- VR

C) FPS                         D) BE

  1. The _______ service is suitable for applcations that can tolerate variable delays and rates.

A) nrtPS                      B) NRT-VR

C) BE                           D) rtPS

  1. _______ employs a single, relatively large, uplink frequency band that is used to transmit a sequence of time slots.
  1. DAMA                   B) TDMA

C) LOS                         D) RT-VR

  1. The _________ is an Internet standard protocol for transporting IP datagrams over a point-to-point link.

A) OBEX                      B) TCP/IP      

C) WAP                       D) PPP

  1. A ________ consists of a master and from one to seven active slave devices.
  1. piconet                  B) wireless local loop

C) scatternet              D) unsolicited grant service

  1. The header format for all Bluetooth packets consists of ______ fields.

A) four                        B) six

C) eight                       D) ten

  1. Bluetooth defines _______ types of logical data channels designated to carry different types of payload traffic.

A) two                         B) three

C) four                        D) five

  1. A _________ is a set of parameters that indicate a performance level that the transmiter will attempt to achieve.

A) flow specification             B) scatternet

C) piconet                               D) TDMA burst

  1. The _________ is the maximum acceptable delay between transmission of a bit by the sender and its initial transmission over the air, expressed in microseconds.
  1. peak bandwidth               B) token rate

C) latency                               D) delay variation

  1. The _________ is the difference, in microseconds, between the maximum and minimum possible delay that a packet will experience.

A) delay variation                  B) latency

C) token rate                          D) peak bandwidth

0 0
Add a comment Improve this question Transcribed image text
Answer #1

1. T

2. F

3. T

4. F

5. T

2. 16. WiMAX is based on the IEEE 802.16 standard. (D)

18. The set of network functions needed to provide radio access to WiMAX subscribers is: ASN

Add a comment
Know the answer?
Add Answer to:
Chapter 18: wireless networks TRUE OR FALSE                                    
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • MULTIPLE CHOICE WiMAX is based on the ______ standard. A) IEEE 802.11                      B) IEEE 802.11a C)...

    MULTIPLE CHOICE WiMAX is based on the ______ standard. A) IEEE 802.11                      B) IEEE 802.11a C) IEEE 802.13                      D) IEEE 802.16 The key stumbling blocks in installing ______ systems are obtaining permission to use a given frequency band and finding a suitable elevated site for the BS antennas. A) WBA                      B) BWA C) WLL                       D) WCL The set of network functions needed to provide radio access to WiMAX subscribers is: A) CSN                        B) ASN C) NAP                        D) NSP A ________...

  • seven-layer model? (Select twa.) A. Cables B. Hub C. Network protocol D. Session software the data...

    seven-layer model? (Select twa.) A. Cables B. Hub C. Network protocol D. Session software the data 13. Which components work at Layer I of the os La a. Which layer of the 0Sl model makes sure ls in a readable format for the Application layer A. Application layer B. Presentation layer Ex do C. Session layer D. Transport layer 9. At which layer of the TCP/1P model are UDP 14. Andalyn says complete 48-bit MAC ed to NIC manufacturers from...

  • 1) What is the protocol developed for the wireless network communications? Explain. A) Wireless Encryption Protocol...

    1) What is the protocol developed for the wireless network communications? Explain. A) Wireless Encryption Protocol (WEP) B) Wireless Application Protocol (WAP) C) Wired Equivalent Privacy (WEP) D) Wireless Session Protocol (WSP) 2) Consider 802.11 shared key authentication. Which of the following statements is false? Explain. A) If a device with the key is lost then the security for the entire WLAN is compromised. B) 802.1X requires shared key authentication. C) Real users and attackers with a shared WEP key...

  • In this lab, we’ll investigate the 802.11 wireless network protocol. Follow the instructions and answers questions...

    In this lab, we’ll investigate the 802.11 wireless network protocol. Follow the instructions and answers questions 7 - 10. http://gaia.cs.umass.edu/wireshark-labs/wireshark-traces.zip In this lab, we'll investigate the 802.11 wireless network protocol. Before beginning this lab, you might want to re-read Section 6.3 in the text. Since we l1 be delving a bit deeper into 802.11 than is covered in the text, you might want to check out "A Technical Tutorial on the 802.11Protocol," by Pablo Brenner (Breezecom Communications) http://www.sss-mag.com/pdf802_11tut.pdf, and "Understanding...

  • 1. In the IEEE 802.3 Ethernet standard, the MAC layer represents the physical layer specification, while...

    1. In the IEEE 802.3 Ethernet standard, the MAC layer represents the physical layer specification, while the LLC layer describes the data link layer specification. True False 2. What is true regarding the IEEE 802.11 WLAN standard? a. to avoid the crowded ISM spectrum, 802.11 requires the use of licensed frequency channels b. both centralized and decentralized access methods are available in the 802.11 standard c. WLAN communications can only be accomplished using an AP d. there is no method...

  • EXPLAIN in details why is it true or false. need to be 100% POSTIVE OF ANSWER. SOLVE D E F G H I J 2) (10 points) IP and MAC addressing. True or False. Circle True or False. One point for each corre...

    EXPLAIN in details why is it true or false. need to be 100% POSTIVE OF ANSWER. SOLVE D E F G H I J 2) (10 points) IP and MAC addressing. True or False. Circle True or False. One point for each correct answer, zero points for each incorrect answer. Many of the questions refer the folowing network consisting of three 10Mbps Ethernet segments, one switch, and one router. Assume all ΛΕΡ tables are up-to-date unless otherwise stated Switch Ronter...

  • Question 26 In the TCP/IP model, what layer combines the responsibilities of the Application, Presentation, and...

    Question 26 In the TCP/IP model, what layer combines the responsibilities of the Application, Presentation, and Session layers from the OSI model? a. Internet b. Application c. Transport d. Link 1.25 points Question 27 In the TCP/IP model, what layer is considered so simple that it is ignored entirely? a. Network b. Data Link c. Application d. Physical 1.25 points Question 28 In the United States, who is able to activate the Emergency Alert System at the national level? a....

  • 2) IP and MAC addressing. True or False. One point for each correct answer, zero points for each incorrect answer. Many of the questions refer to the following network consisting of three 10Mbps Ether...

    2) IP and MAC addressing. True or False. One point for each correct answer, zero points for each incorrect answer. Many of the questions refer to the following network consisting of three 10Mbps Ethernet segments, one switch, and one router. Assume all ARP tables are up-to-date unless otherwise stated. a) Consider a network consisting of Ethernets, hubs, switches, and routers. Suppose one of the hubs is replaced with a switch. Then the network administrator must redefine some IP addresses. True...

  • Q.1 Choose the correct answer 1. Performance is evaluated by two networking metrics: throughput 6 Marks...

    Q.1 Choose the correct answer 1. Performance is evaluated by two networking metrics: throughput 6 Marks and delay. We often need I2 Marks ) a. less throughput and less delay b. more throughput and less delay c. less throughput and more delay d more throughput and more delay 1 1 1 1 1 1 1 1000000000011000010101010101101010101011 is._L 2 Marks ] a. Unicast b. Broadcast c. Multicast d. None of the above 2 Marks) 3. The maximum data length for 10...

  • 166 Chapter 8: TCP/IP Applications Getting Down to Business The way network communication all those ls...

    166 Chapter 8: TCP/IP Applications Getting Down to Business The way network communication all those ls and Os) goes in and out of a machine physically is through the NIC (network interface card). The way network communication goes in and out of a machine logically though, is through a program or service. A service is a program that runs in the background, independent of a logon, that provides functionalities to a system. Windows client machines, for instance, have a Workstation...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT