Explain tcp protocol is asymmetric over wireless link

Assignment Help Computer Engineering
Reference no: EM13861886

Question 1 Frequency reuse concept is used in

a. FDMA and TDMA systems

b. TDMA and CDMA systems

c. CDMA and FDMA systems

d. all of the above

Question 2 Performance measures of call admission control include

a. new call blocking probability

b. new call arrival rate

c. handoff rate

d. none of the above

Question 3 Mobility management covers

a. handoff management and power management

b. power management and location management

c. location management and handoff management

d. none of the above

Question 4 Performance metrics of handoff designs include

a. new call blocking probability, handoff call blocking probability and handoff rate

b. call dropping probability, handoff call blocking probability and successful call duration

c. call dropping probability, new call blocking probability and successful call duration

d. call dropping probability, handoff rate and successful call duration

Question 5 There are several handoff types

a. In hard handoff, a CDMA MS connects to two or more BS's at a given time

b. In a two-way softer handoff, a CDMA MS connects to two BS's

c. In soft handoff, a TDMA MS connects to two or more BS's

d. none of the above statements is correct

Question 6 Paging messages are sent from BS to MS

a. To minimize delay, cells are divided into groups and page one group at a time

b. To minimize paging traffic, page all cells at the same time

c. To minimize paging traffic, MS should send less frequent location updates

d. none of the above statements is correct

Question 7 HLR and VLR

a. Most of subscriber information are found in VLR

b. Paging areas are determined by the location of HLR rather than the location of VLR

c. To deliver a call to a MS, signaling message goes to HLR first then VLR

d. none of the above statements is correct

Question 8 In wireless multiple access,

a. collision avoidance is preferred rather than collision detection

b. collision detection is preferred rather than collision avoidance

c. both collision avoidance and collision detection are important

d. neither collision avoidance and collision detection can be implemented

Question 9 In a wireless network, a TCP packet can be lost due to

a. wireless channel errors

b. network congestion

c. handoff delay

d. all of the above

Question 10 To handle packet routing, the following information is required

a. network topology

b. network traffic status

c. network link costs

d. all of the above

Question 11 In Mobile IP, each mobile

a. has a permanent IP address

b. has a temporary IP address associated with its visiting BS

c. uses the IP address of its home agent

d. uses both its home agent IP address and its foreign agent IP address

Question 12 Possible radio propagation mechanisms include

a. Line of sight

b. Reflection

c. Scattering

d. all of the above

Question 13 The following wireless TCP protocol is asymmetric over wireless link in terms of transmission power and bandwidth

a. I-TCP

b. AIRMAIL

c. SNOOP

d. none of the above

Question 14 3G wireless systems include

a. GSM and GPRS

b. GPRS and IS-95

c. IS-95 and cdma2000

d. cdma2000 and W-CDMA

Question 15 GSM and IS-95

a. GSM is based on FDMA and IS-95 is based on CDMA

b. GSM is based on TDMA and IS-95 is based on CDMA

c. GSM is based on FDMA and IS-95 is based on TDMA

d. GSM is based on TDMA and IS-95 is based on TDMA

Question 16 BSC

a. receives radio signals from MS's

b. transmits radio signals to MS's

c. performs radio channel allocation

d. acts as an agent for roaming MS's

Question 17 For modulation schemes,

a. GSM uses BPSK/QPSK and IS-95 uses GMSK

b. GSM uses GMSK and IS-95 uses BPSK/QPSK

c. GSM and IS-95 use BPSK/QPSK

d. GSM and IS-95 use GMSK

Question 18 The main purpose of power control in CDMA is to

a. minimize interference

b. save transmit power

c. enhance code orthogonality

d. none of the above

Question 19 For the three basic ARQ schemes

a. SW is more efficient than GBN

b. GBN is more efficient than SR

c. SR is more efficient than SW

d. none of the above statements is correct

Question 20 Duplexing versus multiple access

a. TDD and FDMA are used to accomplish the same task

b. TDD and TDMA are used to accomplish the same task

c. FDD and TDMA are used to accomplish the same task

d. none of the above statements is correct

Question 21 A wireless system can be noise-limited or interference-limited

a. Range-limited scenario is closely related to interference levels

b. Coverage-limited scenario is closely related to noise levels

c. Interference-limited scenario is closely related to noise levels

d. none of the above statements is correct

Question 22 In call admission control, guard channel scheme is introduced to

a. minimize handoff call dropping probability

b. minimize new call blocking probability

c. maximize channel utilization

d. all of the above

Question 23 For a given number of channels, to reduce the new call blocking probability,

a. the number of guard channels should be increased

b. the number of guard channels should be reduced

c. the number of guard channels is irrelevant

d. none of the above statements is correct

Question 24 Call dropping probability is calculated based on information such as

a. new call request failure due to lack of available channels

b. a call handoff to another cell

c. handoff call request failure due to lack of available channels

d. all of the above

Question 25 To achieve dynamic channel allocation,

a. channels can be shared within a cell

b. channels can be shared among different cells

c. channels can be shared among different clusters

d. none of the above statements is correct

Reference no: EM13861886

Questions Cloud

Explain what the value of the standard error : Explain what the value of the standard error of the mean indicates about the true value of the measurement if it is assumed that the variation is due only to random variation
It budget on security : What you need to convey to your CEO is that network attacks are continuing to make the news and organizations have reacted by increasingly spending more of their overall IT budget on security. Business executives are starting to have questions about ..
What is totals interest expense for swiss franc debt : What is Totals net Swiss franc cash flow each year that is exposed to exchange rate changes - What is Totals interest expense for the Swiss franc debt for year 2015, measured in €?
Calculate the equation of this best fit straight line : Linear regression is a method for calculating the equation of the "best" straight line that passes through a set of points. By "best," we mean the "best fit" straight line—the one that passes as closely as possible to as many points as possible. To c..
Explain tcp protocol is asymmetric over wireless link : The following wireless TCP protocol is asymmetric over wireless link in terms of transmission power and bandwidth
Description of blue ocean strategy and its importance : A description of blue ocean strategy and its importance
Explain what each process means and what is involved : Explain what each process means and what is involved with the five that you picked. For clarification, these are the interconnected leadership tasks that are listed- Understanding the context and Understanding the people involved, including oneself
What is the role of leadership in creating : What is the role of leadership in creating, managing, and sustaining innovation in your organization?
High-lighting mechanisms of deformation : If you choose a metallic material for a single lobe of deformation show how stress and strain profiles and ultimately fracture (if occurs) progress through the deformation, show this via explanations, calculations and images

Reviews

Write a Review

Computer Engineering Questions & Answers

  Pros and cons of the model-view-controller

define the benefits and limitations of the model-view-controller (MVC) principle. Identify one way in which MVC helps software designers create better code, and one way in which it deters them.

  Listing the values that have been inserted

Write down a Java program that loads 12 random integers with the values between 1 and 100 into a tree. Apart from building the tree.

  What is the atleast number of keys

What is the minimum number of keys that are hashed to their home positions using the linear probing technique? define with an example using a 5-cell array.

  Analyze porters five forces model in relation to

research an organizationchoose a publicly held corporation from an industry with which you are familiar. conduct

  Questionyour microsoft windows 2000-based office network

questionyour microsoft windows 2000-based office network has three domains- alpha beta and omega all in the similar

  Make a function definition called reverse

Write down a function definition called reverse, with two parameters, the first is an array of integer and the second is the number of elements in the array. The function reverses the elements of the array and does not return a value.

  Addressing and naming model

Sketch a plan for development of the addressing and the naming model in an environment of following given scenario: Ten (10) departments in the 1,000-employee organization. Equal separation by geography

  Problem 1consider two different machines the first has a

problem 1consider two different machines. the first has a single cycle datapath i.e. a single stage non-pipelined

  How to maintain the list of cd/dvds

How to maintain the list of CD/DVDs.

  Find expectations that his business will continue to grow

Fernando Culebra has always been fascinated by skateboards. Fernando has won many contests, both locally and nationally. His interest in skateboards led him to open Fernando's Skate Shop in Denton, Maine.

  Choose two of the security features you recognize and write

third-party assurance providers such as bbbonline inc. and truste sell their services to businesses that want to

  Write down a short assembly language module

Write down a short assembly language module

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd