Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Network & Security Expert

Part A-

Question 1. Identify the merger of legacy-based TDM architecture with packet-switching technology and call-control intelligence.

Telecommunication convergence

Analog convergence

Digital convergence

DSL and cable telecommunication convergence

Question 2. Choose the mechanism(s) for sending RAS messages using RAS channel over UDP.

Retry counts

Timeout

Timeout and retry counts

Timeout, TTL, and retry counts

Question 3. Construct a 1.536 Mbps T1 link.

24 Channels

32 Channels

Fractional Channels

CAS

Question 4. Identify how IP telephones access their media controllers.

IP telephones access their media controllers through a hub.

IP telephones access their media controllers through a bridge.

IP telephones access their media controllers through a switched bridge.

IP telephones access their media controllers through a switched IP connection.

Question 5. An MCU may control three different conference types; please identify them.

Centralized, decentralized, mobile

Mobile, centralized, decentralized

Centralized, mobile, decentralized

Centralized, decentralized, mixed

Question 6. Identify the cause of packet delay.

It is not the time it takes a packet to traverse the network.

It is the time it takes a packet to traverse a router.

It is the time it takes a packet to traverse the network.

It is the time it takes a packet to traverse a switch.

Question 7. Which of the following characteristics are not common to circuit-switched networks?

Store and forward transmission

Dedicated bandwidth

Potentially wasted bandwidth

Each packet follows the same route

Question 8. Explain why G.711 is used in LANs.

There is quite a bit of bandwidth in a LAN and it is not expensive.

There is not much bandwidth in a LAN and it is not expensive.

There is quite a bit of bandwidth in a LAN and it is expensive.

There is not much bandwidth in a LAN and it is expensive.

Question 9. Select the codec that is most appropriate for limited bandwidth WANs.

G.711

G.741

G.729

G.735

Question 10. Describe the three main ways of powering an IP telephone.

Local power, powered AC patch panels, inline power

Local AC power, powered patch panels, inline power

Local power, powered patch panels, online power

Local power, powered patch panels, inline power

Part B-

1. Select the IEEE standard that defines the application of power to IP telephones through the UTP wiring.

802.3af

802.11

802.13

802.4ab

Question 2. Identify the IEEE specifications that will support QoS on WLAN.

IEEE802.11e

IEEE802.11a

IEEE802.11b

IEEE802.11g

Question 3. Identify a very weak encryption system that is sometimes used in wireless networks.

WAP

TKIP

WEP

AES

Question 4. Identify the document that specifies the requirements for mobile node to use two IP addresses.

RFC 2001

RFC 2003

RFC 2002

RFC 2004

Question 5. What protocol is commonly used to allow integration between the softphone and the corporate directory?

LDPD

LPAD

LAPD

LDAP

Question 6. What do we call frames that are implemented with 802.1p?

Switched frames

Tagged frames

LAN frames

Untagged frames

Question 7. What is the maximum delay that is considered acceptable for voice traffic?

250 ms

300 ms

100 ms

150 ms

Question 8. Identify the function of an SIP User Agent.

An SIP User Agent places calls using IP address or e-mail-like addressing.

An SIP User Agent places calls using E.164 or IP address.

An SIP User Agent places calls using neither E.164 nor e-mail-like addressing.

An SIP User Agent places calls using E.164 or e-mail-like style.

Question 9. SNMP uses the ______ protocol to the Transport Layer.

TCP

UDP

MIB

RTP

Question 10. TKIP provides a ______solution to the problems found in WEP.

worse

add-on

interim

permanent

Part C-

1. Explain five different common applications for unified messaging.

2. Describe the purpose of a Multipoint Conferencing Unit (MCU).

3. Describe jitter in a network.

4. Explain the function of communications protocols.

5. Explain the DiffServ objective.

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M91587506
  • Price:- $40

Priced at Now at $40, Verified Solution

Have any Question?


Related Questions in Computer Network & Security

It networking assignment - networking project areamajor lab

IT Networking Assignment - Networking Project Area Major Lab Scenario - Instructions This lab has a time limit of one term The lab must be completed by individual students, and the completed assessment returned to the as ...

Advanced network design assessment - human factors in

Advanced Network Design Assessment - Human factors in network analysis and design Purpose of the assessment - This assignment is designed to assess students' knowledge and skills related to the following learning outcome ...

Advanced network design assessment - human factors in

Advanced Network Design Assessment - Human factors in network analysis and design Purpose of the assessment - This assignment is designed to assess students' knowledge and skills related to the following learning outcome ...

Metasoft ltd is a software development company which works

MetaSoft Ltd is a software development company which works across Australia and New Zealand. The company is considering the following strategic proposal: - They plan to close down the Melbourne data centre rather than up ...

Part auniversity of neverland offers more than 300

Part A University of Neverland offers more than 300 undergraduate programs. The Bachelor of Dreams is one of the highly regarded program offered by the University. The University tries to improve all its programs by intr ...

Question suppose you work in a network security company and

Question: Suppose you work in a network security company, and you need to prepare a survey report of a particular security issue of wireless networking. To start with, select an area of wireless network security. We have ...

Below are the supply and demand schedules for fresh coffee

Below are the supply and demand schedules for fresh coffee in Vancouver: Price ($/cup) Quantity Demanded  (cups/day) Quantity Supplied (cups/day) 1 440 330 2 415 360 3 390 390 4 365 420 5 340 450 6 315 480 7 290 510 a. W ...

Security challenges in emerging networksassignment

Security Challenges in Emerging Networks Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowle ...

You need to prepare packet tracer fileattached pdf contains

You need to prepare packet tracer file attached pdf contains topology and required configurations and assigned ip address. In packet tacer file you need to include banner, router and switches. 1. VLSM Design a) As first ...

After reading this weeks materials please respond to two 2

After reading this week's materials, please respond to TWO (2) of the following questions. AND PROVIDE CITATION IN APA 1. Describe the differences between bus, ring, star and mesh topologies. 2. Explain the TCP/IP Model ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As