Different common applications for unified messaging

Assignment Help Computer Networking
Reference no: EM13803986

Question 1. Identify the merger of legacy-based TDM architecture with packet-switching

technology and call-control intelligence.

Telecommunication convergence

Analog convergence

Digital convergence

DSL and cable telecommunication convergence

Question 2.  Choose the mechanism(s) for sending RAS messages using RAS channel over UDP.

 

Retry counts

Timeout

Timeout and retry counts

Timeout, TTL, and retry counts

Question 3.  Construct a 1.536 Mbps T1 link. 

24 Channels

32 Channels

Fractional Channels

CAS

Question 4.  Identify how IP telephones access their media controllers. 

IP telephones access their media controllers through a hub.

IP telephones access their media controllers through a bridge.

IP telephones access their media controllers through a switched bridge.

IP telephones access their media controllers through a switched IP connection.

Question 5.  An MCU may control three different conference types; please identify them.

Centralized, decentralized, mobile

Mobile, centralized, decentralized

Centralized, mobile, decentralized

Centralized, decentralized, mixed

Question 6.  Identify the cause of packet delay. 

It is not the time it takes a packet to traverse the network.

It is the time it takes a packet to traverse a router.

It is the time it takes a packet to traverse the network.

It is the time it takes a packet to traverse a switch.

Question 7.  Which of the following characteristics are not common to circuit-switched networks? Store and forward transmission

Dedicated bandwidth

Potentially wasted bandwidth

Each packet follows the same route

Question 8.  Explain why G.711 is used in LANs. 

There is quite a bit of bandwidth in a LAN and it is not expensive.

There is not much bandwidth in a LAN and it is not expensive.

There is quite a bit of bandwidth in a LAN and it is expensive.

There is not much bandwidth in a LAN and it is expensive.

Question 9.  Select the codec that is most appropriate for limited bandwidth WANs. 

G.711

G.741

G.729

G.735

Question 10.  Describe the three main ways of powering an IP telephone. 

Local power, powered AC patch panels, inline power

Local AC power, powered patch panels, inline power

Local power, powered patch panels, online power

Local power, powered patch panels, inline power

1.  Select the IEEE standard that defines the application of power to IP telephones through the UTP

wiring. 

802.3af

802.11

802.13

802.4ab

Question 2.  Identify the IEEE specifications that will support QoS on WLAN. 

IEEE802.11e

IEEE802.11a

IEEE802.11b

IEEE802.11g

Question 3.  Identify a very weak encryption system that is sometimes used in wireless networks.

 

WAP

TKIP

WEP

AES

Question 4.  Identify the document that specifies the requirements for mobile node to use two IP addresses. 

RFC 2001

RFC 2003

RFC 2002

RFC 2004

Question 5.  What protocol is commonly used to allow integration between the softphone and the corporate directory? 

LDPD

LPAD

LAPD

LDAP

Question 6.  What do we call frames that are implemented with 802.1p? 

Switched frames

Tagged frames

LAN frames

Untagged frames

Question 7.  What is the maximum delay that is considered acceptable for voice traffic?

250 ms

300 ms

100 ms

150 ms

Question 8.  Identify the function of an SIP User Agent. 

An SIP User Agent places calls using IP address or e-mail-like addressing.

An SIP User Agent places calls using E.164 or IP address.

An SIP User Agent places calls using neither E.164 nor e-mail-like addressing.

An SIP User Agent places calls using E.164 or e-mail-like style.

Question 9.  SNMP uses the ______ protocol to the Transport Layer. 

TCP

UDP

MIB

RTP

Question 10.  TKIP provides a ______solution to the problems found in WEP. 

worse

add-on

interim

permanent

Question 1.  Explain five different common applications for unified messaging. 

Question 2.  Describe the purpose of a Multipoint Conferencing Unit (MCU). 

Question 3.  Describe jitter in a network. 

Question 4.  Explain the function of communications protocols. 

Question 5.  Explain the DiffServ objective.

Reference no: EM13803986

Questions Cloud

Secure storage and retrieval process for healthcare data : Formulate a secure storage and retrieval process for healthcare data. Create a PowerPoint that highlights each of the topics below: Databases, Data dictionaries, data mining, and data warehouses and Characteristics of data quality
Semi-annual bond with a coupon rate : XYZ has just sold a callable bond. The bond is a thirty year semi-annual bond with a coupon rate of 8%. Investors, however, can call the bond starting at the end of ten years. If the yield-to-call on this bond is 10% and the call requires XYZ to pay ..
Explain how u.s. citizens are exposed to political actors : The media does have a very significant role in how U.S. citizens are exposed to political actors, policies, and processes that comprise American government.
Sole owner of all-equity firm-debt is secured by the firm : Suppose that you are the sole owner of an all-equity firm, the assets of which are worth $500,000. The ROA is 15% per year paid as a dividend to you. If you have the firm issue $100,000 of debt at 6%, the interest expense will be paid by the firm out..
Different common applications for unified messaging : Explain five different common applications for unified messaging - Describe the purpose of a Multipoint Conferencing Unit (MCU) and Describe jitter in a network.
Demand for ready-made : Over the past few decades, a sizable industry has arisen to serve the demand for ready-made and even customized compositions and term papers.
How much tax deduction you would be entitled to : Suppose that you are the sole owner of an all-equity firm, the assets of which are worth $500,000. The tax rate is 34%. If you have the firm issue $100,000 of debt at 6%, how much tax deduction you would be entitled to?
Calculate the required return on equity for this firm : A firm has 500,000 shares of stock outstanding with a par value of $1 per share and debt outstanding with a par value of $1,000,000. The stock is selling for $10 per share, and the debt is selling at a discount (90% of par). If the firm were financed..

Reviews

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd