Explain tcp protocol is asymmetric over wireless link

Assignment Help Computer Engineering
Reference no: EM13861886

Question 1 Frequency reuse concept is used in

a. FDMA and TDMA systems

b. TDMA and CDMA systems

c. CDMA and FDMA systems

d. all of the above

Question 2 Performance measures of call admission control include

a. new call blocking probability

b. new call arrival rate

c. handoff rate

d. none of the above

Question 3 Mobility management covers

a. handoff management and power management

b. power management and location management

c. location management and handoff management

d. none of the above

Question 4 Performance metrics of handoff designs include

a. new call blocking probability, handoff call blocking probability and handoff rate

b. call dropping probability, handoff call blocking probability and successful call duration

c. call dropping probability, new call blocking probability and successful call duration

d. call dropping probability, handoff rate and successful call duration

Question 5 There are several handoff types

a. In hard handoff, a CDMA MS connects to two or more BS's at a given time

b. In a two-way softer handoff, a CDMA MS connects to two BS's

c. In soft handoff, a TDMA MS connects to two or more BS's

d. none of the above statements is correct

Question 6 Paging messages are sent from BS to MS

a. To minimize delay, cells are divided into groups and page one group at a time

b. To minimize paging traffic, page all cells at the same time

c. To minimize paging traffic, MS should send less frequent location updates

d. none of the above statements is correct

Question 7 HLR and VLR

a. Most of subscriber information are found in VLR

b. Paging areas are determined by the location of HLR rather than the location of VLR

c. To deliver a call to a MS, signaling message goes to HLR first then VLR

d. none of the above statements is correct

Question 8 In wireless multiple access,

a. collision avoidance is preferred rather than collision detection

b. collision detection is preferred rather than collision avoidance

c. both collision avoidance and collision detection are important

d. neither collision avoidance and collision detection can be implemented

Question 9 In a wireless network, a TCP packet can be lost due to

a. wireless channel errors

b. network congestion

c. handoff delay

d. all of the above

Question 10 To handle packet routing, the following information is required

a. network topology

b. network traffic status

c. network link costs

d. all of the above

Question 11 In Mobile IP, each mobile

a. has a permanent IP address

b. has a temporary IP address associated with its visiting BS

c. uses the IP address of its home agent

d. uses both its home agent IP address and its foreign agent IP address

Question 12 Possible radio propagation mechanisms include

a. Line of sight

b. Reflection

c. Scattering

d. all of the above

Question 13 The following wireless TCP protocol is asymmetric over wireless link in terms of transmission power and bandwidth

a. I-TCP

b. AIRMAIL

c. SNOOP

d. none of the above

Question 14 3G wireless systems include

a. GSM and GPRS

b. GPRS and IS-95

c. IS-95 and cdma2000

d. cdma2000 and W-CDMA

Question 15 GSM and IS-95

a. GSM is based on FDMA and IS-95 is based on CDMA

b. GSM is based on TDMA and IS-95 is based on CDMA

c. GSM is based on FDMA and IS-95 is based on TDMA

d. GSM is based on TDMA and IS-95 is based on TDMA

Question 16 BSC

a. receives radio signals from MS's

b. transmits radio signals to MS's

c. performs radio channel allocation

d. acts as an agent for roaming MS's

Question 17 For modulation schemes,

a. GSM uses BPSK/QPSK and IS-95 uses GMSK

b. GSM uses GMSK and IS-95 uses BPSK/QPSK

c. GSM and IS-95 use BPSK/QPSK

d. GSM and IS-95 use GMSK

Question 18 The main purpose of power control in CDMA is to

a. minimize interference

b. save transmit power

c. enhance code orthogonality

d. none of the above

Question 19 For the three basic ARQ schemes

a. SW is more efficient than GBN

b. GBN is more efficient than SR

c. SR is more efficient than SW

d. none of the above statements is correct

Question 20 Duplexing versus multiple access

a. TDD and FDMA are used to accomplish the same task

b. TDD and TDMA are used to accomplish the same task

c. FDD and TDMA are used to accomplish the same task

d. none of the above statements is correct

Question 21 A wireless system can be noise-limited or interference-limited

a. Range-limited scenario is closely related to interference levels

b. Coverage-limited scenario is closely related to noise levels

c. Interference-limited scenario is closely related to noise levels

d. none of the above statements is correct

Question 22 In call admission control, guard channel scheme is introduced to

a. minimize handoff call dropping probability

b. minimize new call blocking probability

c. maximize channel utilization

d. all of the above

Question 23 For a given number of channels, to reduce the new call blocking probability,

a. the number of guard channels should be increased

b. the number of guard channels should be reduced

c. the number of guard channels is irrelevant

d. none of the above statements is correct

Question 24 Call dropping probability is calculated based on information such as

a. new call request failure due to lack of available channels

b. a call handoff to another cell

c. handoff call request failure due to lack of available channels

d. all of the above

Question 25 To achieve dynamic channel allocation,

a. channels can be shared within a cell

b. channels can be shared among different cells

c. channels can be shared among different clusters

d. none of the above statements is correct

Reference no: EM13861886

Questions Cloud

Explain what the value of the standard error : Explain what the value of the standard error of the mean indicates about the true value of the measurement if it is assumed that the variation is due only to random variation
It budget on security : What you need to convey to your CEO is that network attacks are continuing to make the news and organizations have reacted by increasingly spending more of their overall IT budget on security. Business executives are starting to have questions about ..
What is totals interest expense for swiss franc debt : What is Totals net Swiss franc cash flow each year that is exposed to exchange rate changes - What is Totals interest expense for the Swiss franc debt for year 2015, measured in €?
Calculate the equation of this best fit straight line : Linear regression is a method for calculating the equation of the "best" straight line that passes through a set of points. By "best," we mean the "best fit" straight line—the one that passes as closely as possible to as many points as possible. To c..
Explain tcp protocol is asymmetric over wireless link : The following wireless TCP protocol is asymmetric over wireless link in terms of transmission power and bandwidth
Description of blue ocean strategy and its importance : A description of blue ocean strategy and its importance
Explain what each process means and what is involved : Explain what each process means and what is involved with the five that you picked. For clarification, these are the interconnected leadership tasks that are listed- Understanding the context and Understanding the people involved, including oneself
What is the role of leadership in creating : What is the role of leadership in creating, managing, and sustaining innovation in your organization?
High-lighting mechanisms of deformation : If you choose a metallic material for a single lobe of deformation show how stress and strain profiles and ultimately fracture (if occurs) progress through the deformation, show this via explanations, calculations and images

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd