Professional Documents
Culture Documents
5. Baseband transmission of a digital A) digital 30. Given two sine waves A and B, if
signal is possible only if we have a B) analog the frequency of A is twice that of B,
____ channel. C) (a) or (b) then the period of B is ________ that
D) none of the above of A.
A) bandpass
B) low-pass 18. ________ is a type of transmission A) one-half
C) high rate impairment in which the signal loses B) twice
D) low rate strength due to the different C) the same as
propagation speeds of each frequency D) indeterminate from
6. ________ is a type of transmission that makes up the signal.
impairment in which the signal loses 31. As frequency increases, the period
strength due to the resistance of the A) Noise ________.
transmission medium. B) Distortion
C) Attenuation A) increases
A) Distortion D) Decibel B) decreases
B) Attenuation C) doubles
C) Noise 19. Signals can be ________. D) remains the same
D) Decibel
A) digital 32. If the available channel is a ____
7. A sine wave in the ______ domain B) analog channel, we cannot send a digital
can be represented by one single spike C) either (a) or (b) signal directly to the channel.
in the _____ domain. D) neither (a) nor (b)
A) low-pass
A) time; phase 20. A sine wave is ________. B) low rate
B) frequency; time C) bandpass
C) time; frequency A) periodic and discrete D) high rate
D) phase; time B) aperiodic and discrete
C) periodic and continuous 33. For a ______ channel, the Nyquist
8. If the bandwidth of a signal is 5 D) aperiodic and continuous bit rate formula defines the
KHz and the lowest frequency is 52 theoretical maximum bit rate.
KHz, what is the highest frequency? 21. _______ data have discrete states
and take discrete values. A) low-pass
A) 5 KHz B) bandpass
B) 47 KHz A) Analog C) noisy
C) 57 KHz B) Digital D) noiseless
D) none of the above
34. In a frequency-domain plot, the A) Manchester
horizontal axis measures the ________. 12. The idea of RZ and the idea of B) differential Manchester
NRZ-L are combined into the ________ C) both (a) and (b)
A) phase scheme. D) neither (a) nor (b)
B) frequency
C) slope A) Manchester 24. The ________ mode provides
D) peak amplitude B) differential Manchester synchronization for the entire stream
C) both (a) and (b) of bits must. In other words, it
1. Which of the following encoding D) neither (a) nor (b) guarantees that the data arrive at a
methods does not provide for fixed rate.
synchronization? 13. ________ provides synchronization
without increasing the number of bits. A) isochronous
A) RZ B) synchronous
B) NRZ-L A) Line coding C) asynchronous
C) NRZ-I B) Block coding D) none of the above
D) Manchester C) Scrambling
D) None of the above 25. The idea of RZ and the idea of
2. If the frequency spectrum of a NRZ-I are combined into the ________
signal has a bandwidth of 500 Hz with 14. The Nyquist theorem specifies the scheme.
the highest frequency at 600 Hz, what minimum sampling rate to be_______.
should be the sampling rate, according A) Manchester
to the Nyquist theorem? A) equal to the lowest frequency of B) differential Manchester
a signal C) both (a) and (b)
A) 200 samples/s B) equal to the highest frequency of D) neither (a) nor (b)
B) 500 samples/s a signal
C) 1000 samples/s C) twice the bandwidth of a signal 26. In decoding a digital signal, the
D) 1200 samples/s D) twice the highest frequency of a receiver calculates a running average
signal of the received signal power, called
3. In asynchronous transmission, the the _______.
gap time between bytes is _______. 15. PCM is an example of _______
conversion. A) base
A) variable B) line
B) fixed A) analog-to-analog C) baseline
C) zero B) analog-to-digital D) none of the above
D) a function of the data rate C) digital-to-digital
D) digital-to-analog 27. In _________ transmission, we send
4. ______ substitutes eight bits one after another without start
consecutive zeros with 000VB0VB. 16. There are three sampling methods: or stop bits or gaps. It is the
__________. responsibility of the receiver to
A) B4B8 group the bits.
B) B8ZS A) ideal, natural, and flat-top
C) HDB3 B) ideal, sampled, and flat-top A) synchronous
D) none of the above C) quantized, sampled, and ideal B) asynchronous
D) none of the above C) isochronous
5. The most common technique to change D) none of the above
an analog signal to digital data is 17. In _______encoding, we use three
called __________. levels: positive, zero, and negative. 28. ______ finds the value of the
signal amplitude for each sample; ____
A) sampling A) unipolar finds the change from the previous
B) PAL B) polar sample.
C) PCM C) bipolar
D) none of the above D) none of the above A) DM; CM
B) DM; PCM
6. The minimum bandwidth of Manchester 18. Block coding can help in _______ C) PCM; DM
and differential Manchester is ____ at the receiver. D) none of the above
that of NRZ.
A) Synchronization 29. ______ substitutes four
A) the same as B) Error detection consecutive zeros with 000V or B00V.
B) twice C) Attenuation
C) thrice D) (a) and (b) A) HDB3
D) none of the above B) B4B8
19. In Manchester and differential C) B8ZSf
7. The signal rate is sometimes called Manchester encoding, the transition at D) none of the above
the ____ rate. the middle of the bit is used for
__________. 30. The ______ scheme uses three
A) bit levels (+V, 0, and -V) and three
B) baud A) bit transfer transition rules to move between the
C) signal B) synchronization levels.
D) none of the above C) baud transfer
D) none of the above A) 4B5B
8. Unipolar, bipolar, and polar B) MLT-3
encoding are types of _______ 20. _______ encoding has a transition C) 2B1Q
encoding. at the beginning of each 0 bit. D) none of the above
9. ________ is normally referred to as 21. In ______, the change or lack of A) one; two
mB/nB coding; it replaces each m-bit change in the level of the voltage B) one; three
group with an n-bit group. determines the value of the bit. C) two; three
D) none of the above
A) Line coding A) NRZ-L
B) Block coding B) NRZ-I 32. Which quantization level results
C) Scrambling C) both (a) and (b) in a more faithful reproduction of the
D) None of the above D) neither (a) nor (b) signal?
29. In _____ transmission, the carrier 6. ______ is an analog multiplexing 18. Which multiplexing technique
signal is modulated so that its technique to combine optical signals. transmits analog signals?
amplitude varies with the changing
amplitudes of the modulating signal. A) WDM A) WDM
B) FDM B) TDM
A) PM C) TDM C) FDM
B) FM D) None of the above D) (a) and (c)
C) AM
D) none of the above 7. FDM is an _________technique. 19. ________ is the set of techniques
that allows the simultaneous
30. In QAM, both ________ of a carrier A) digital transmission of multiple signals
frequency are varied. B) analog across a single data link.
C) either (a) or (b)
A) phase and frequency D) none of the above A) Demodulating
B) amplitude and phase B) Multiplexing
C) frequency and amplitude 8. ______ can be applied when the C) Compressing
D) none of the above bandwidth of a link (in hertz) is D) None of the above
greater than the combined bandwidths
31. ________ uses two carriers, one of the signals to be transmitted. 20. ________ can be achieved by using
in-phase and the other quadrature. multiplexing; ______ can be achieved
A) TDM by using spreading.
A) QAM B) FDM
B) ASK C) Both (a) or (b) A) Privacy and antijamming;
C) FSK D) Neither (a) or (b) efficiency
D) PSK B) Privacy and efficiency;
9. In TDM, the transmission rate of antijamming
32. Given an AM radio signal with a the multiplexed path is usually C) Efficiency; privacy and
bandwidth of 10 KHz and the highest- _______ the sum of the transmission antijamming
frequency component at 705 KHz, what rates of the signal sources. D) Efficiency and antijamming;
is the frequency of the carrier privacy
signal? A) equal to
B) less than 21. The ______ technique expands the
A) 710 KHz C) greater than bandwidth of a signal by replacing
B) 705 KHz D) not related to each data bit with n bits.
C) 700 KHz
D) Cannot be determined from given 10. In a multiplexed system, ____ A) DSSS
information lines share the bandwidth of _____ B) FHSS
link. C) FDM
33. A constellation diagram shows us D) TDM
the __________ of a signal element, A) 1; n
particularly when we are using two B) n; 1 22. ________ is a digital process that
carriers (one in-phase and one C) 1; 1 allows several connections to share
quadrature). D) n; n the high bandwidth of a link.
A) IXC 29. The HFC network uses _______ 11. A _____ error means that two or
B) LEC cable. more bits in the data unit have
C) POP changed.
D) none of the above A) coaxial
B) twisted-pair A) burst
17. The modern telephone network is C) fiber-optic B) double-bit
now ________. D) a combination of (a) and (c) C) single-bit
D) none of the above
A) digital 30. In ______signaling, the same
B) digital as well as analog circuit is used for both signaling and 12. Adding 1 and 1 in modulo-2
C) analog data. arithmetic results in _________.
D) none of the above
A) mixed A) 0
18. In an HFC network, the upstream B) out-of-band B) 1
data are modulated using the _______ C) in-band C) 2
modulation technique. D) none of the above D) none of the above
A) ASK 31. Most popular modems available are 13. In ________ error correction, the
B) PCM based on the ________standards. receiver corrects errors without
C) QAM requesting retransmission.
D) QPSK A) X-series
B) V-series A) onward
19. _______ was designed as an C) VX-series B) forward
alternative to the T-1 line. D) none of the above C) backward
D) none of the above
A) ADSL 1. Checksums use _________ arithmetic.
B) HDSL 14. If the Hamming distance between a
C) VDSL A) one’s complement arithmetic dataword and the corresponding
D) SDSL B) two’s complement arithmetic codeword is three, there are _____
C) either (a) or (b) bits in error.
20. HDSL encodes data using _______. D) none of the above
A) 5
A) 2B1Q 2. The checksum of 1111 and 1111 is B) 4
B) 1B2Q _________. C) 3
C) 4B/5B D) none of the above
D) 6B/8T A) 0000
B) 1111 15. A simple parity-check code can
21. In an HFC network, the downstream C) 1110 detect __________ errors.
data are modulated using the _______ D) 0111
modulation technique. A) an odd-number of
3. In modulo-11 arithmetic, we use B) an even-number of
A) PCM only the integers in the range ______, C) two
B) QAM inclusive. D) no errors
C) PSK
D) ASK A) 1 to 10 16. The Hamming distance between equal
B) 0 to 10 codewords is _________.
22. Another name for the cable TV C) 1 to 11
office is the _______. D) none of the above A) 0
B) 1
A) head end 4. In cyclic redundancy checking, the C) n
B) combiner divisor is _______ the CRC. D) none of the above
C) fiber node
D) splitter A) one bit less than 17. In a linear block code, the
B) one bit more than _______ of any two valid codewords
23. The term modem is a composite word C) The same size as creates another valid codeword.
that refers to the two functional D) none of the above
entities that make up the device: a A) ANDing
signal _______ and a signal _______. 5. The ________ between two words is B) XORing
the number of differences between C) ORing
A) demodulator; modulator corresponding bits. D) none of the above
B) modulator; demodulator
C) modern; demo A) Hamming rule 18. In ________ error correction, the
D) none of the above B) Hamming code receiver asks the sender to send the
C) Hamming distance data again.
24. The two most common digital D) none of the above
services are ________ service and A) forward
______. 6. The _______ of a polynomial is the B) backward
highest power in the polynomial. C) retransmission
A) switched/56; DDS D) none of the above
B) switched/56; switched/64 A) range
C) DDS; switched 64 B) power 19. We can divide coding schemes into
D) leased; out-of-band C) degree two broad categories: ________ and
D) none of the above ______coding.
25. The United States is divided into
many _______. 7. In modulo-2 arithmetic, __________ A) linear; nonlinear
give the same results. B) block; convolution
A) IXCs C) block; linear
B) LECs A) addition and subtraction D) none of the above
C) LATAs B) addition and multiplication
D) none of the above C) addition and division 20. In modulo-2 arithmetic, we use
D) none of the above only ______.
26. The standard for data transmission
over an HFC network is called _______. 8. In cyclic redundancy checking, what A) 1 and 2
is the CRC? B) 0 and 1
A) ADSL C) 0 and 2
B) CMTS A) The quotient D) none of the above
C) DOCSIS B) The dividend
D) MCNS C) The divisor
21. To guarantee correction of up to If a codeword is rotated, the result
5 errors in all cases, the minimum is another codeword. 10. In the _________ method, a special
Hamming distance in a block code must packet called a ______ circulates
be ________. A) Convolution through the ring.
B) Cyclic
A) 11 C) Non-linear A) polling: poll request
B) 6 D) none of the above B) token passing: token
C) 5 C) reservation: control frame
D) none of the above 34. The Hamming distance between 100 D) none of the above
and 001 is ________.
22. The _____of errors is more
difficult than the ______. A) 0 11. The maximum throughput for pure
B) 1 ALOHA is ________ per cent.
A) detection; correction C) 2
B) correction; detection D) none of the above A) 36.8
C) creation; correction B) 18.4
D) creation; detection C) 12.2
1.In _______, the stations share the D) none of the above
23. In block coding, if k = 2 and n = bandwidth of the channel in time.
3, we have _______ invalid codewords.
A) FDMA 12. In ________, the available
A) 4 B) CDMA bandwidth is divided into frequency
B) 8 C) TDMA bands.
C) 2 D) none of the above
D) none of the above A) TDMA
B) CDMA
24. The checksum of 0000 and 0000 is 2. In ______, the chance of collision C) FDMA
__________. can be reduced if a station senses the D) none of the above
medium before trying to use it.
A) 0000
B) 1111 A) CSMA 13. In ___________ methods, no station
C) 0111 B) MA is superior to another station and
D) 1110 C) CDMA none is assigned the control over
D) FDMA another.
25. In one’s complement arithmetic, if
positive 7 is 0111, then negative 7 is A) controlled access
________. 3. In the _______ method, the stations B) random access
in a network are organized in a C) channelization
A) 1101 logical ring. D) none of the above
B) 1000
C) 1111 A) polling
D) none of the above B) token passing 14. In the ________method, a station
C) reservation that has a frame to send senses the
26. In block coding, if n = 5, the D) none of the above line. If the line is idle, it sends
maximum Hamming distance between two immediately. If the line is not idle,
codewords is ________. it waits a random amount of time and
4. In _______, the sequences are then senses the line again.
A) 5 generated using orthogonal codes such
B) 3 the Walsh tables. A) 1-persistent
C) 2 B) nonpersistent
D) none of the above A) TDMA C) p-persistent
B) CDMA D) none of the above
27. Which error detection method uses C) FDMA
one’s complement arithmetic? D) none of the above 15. In ______, each station is
allocated a band to send its data. In
A) Checksum other words, each band is reserved for
B) CRC 5. __________ augments the CSMA a specific station, and it belongs to
C) Simple parity check algorithm to detect collision. the station all the time.
D) Two-dimensional parity check
A) CSMA/CD A) CDMA
28. The divisor in a cyclic code is B) CSMA/CA B) FDMA
normally called the _________. C) either (a) or (b) C) TDMA
D) both (a) and (b) D) none of the above
A) redundancy
B) degree 16. In the _______method, after the
C) generator 6. In the _________ method, after the station finds the line idle it sends
D) none of the above station finds the line idle, it sends or refrain from sending based on the
its frame immediately. If the line is outcome of a random number generator.
29. In modulo-2 arithmetic, we use the not idle, it continuously senses the If the line is busy, it tries again.
______ operation for both addition and line until it finds it idle.
subtraction. A) p-persistent
A) p-persistent B) nonpersistent
A) OR B) nonpersistent C) 1-persistent
B) XOR C) 1-persistent D) none of the above
C) AND D) none of the above
D) none of the above
17. To avoid collisions on wireless
30. We add r redundant bits to each 7. In the _____ method, time is networks, ________was invented.
block to make the length n = k + r. divided into intervals. In each
The resulting n-bit blocks are called interval, a reservation frame precedes A) CSMA/CD
_________. the data frames sent in that interval. B) CSMA/CA
C) either (a) or (b)
A) codewords A) token passing D) both (a) and (b)
B) datawords
C) blockwords B) reservation
D) none of the above 18. In _____, each station is
C) polling allocated a time slot during which it
31. To guarantee the detection of up can send data. Each station transmits
to 5 errors in all cases, the minimum D) none of the above its data in its assigned time slot.
Hamming distance in a block code must
be _______. A) TDMA
8. In the _______ method, each station B) CDMA
A) 11 has a predecessor and a successor. C) FDMA
B) 5 D) none of the above
C) 6 A) token passing
D) none of the above B) polling
C) reservation 19. In the _______ method, the primary
32. A generator that contains a factor D) none of the above device controls the link; the
of ____ can detect all odd-numbered secondary devices follow its
errors. instructions.
9. The vulnerable time for CSMA is the
A) x ________propagation time. A) token passing
B) 1 B) reservation
C) x + 1 A) three times C) polling
D) none of the above B) two times D) none of the above
C) the same as
33. _______codes are special linear D) none of the above
block codes with one extra property.
20. In _____, each station transmits A) 1000Base-LX
its data in its assigned time slot. A) 36.8 B) 1000Base-SX
B) 18.4 C) 1000Base-T
A) TDMA C) 12.2 D) none of the above
B) CDMA D) none of the above
C) FDMA
D) none of the above 5. What is the hexadecimal equivalent
32. _________ is a multiple-access of the Ethernet address 01011010
method in which the available 00010001 01010101 00011000 10101010
21 We discussed ________ bandwidth of a link is shared in time, 00001111?
channelization protocols. frequency, or through code, between
different stations. A) 5A:81:BA:81:AA:0F
A) four B) 5A:11:55:18:AA:0F
B) three A) Controlled access C) 5A:88:AA:18:55:F0
C) two B) Channelization D) 5A:18:5A:18:55:0F
D) none of the above C) Random access
D) none of the above
6. In Ethernet addressing, if all the
22. In the ______ method, all data 33. ________ requires that each bits are 1s, the address is _________.
exchanges must be made through the station first listen to the medium
primary device even when the ultimate before sending. A) multicast
destination is a secondary device. B) broadcast
A) FDMA C) unicast
A) polling B) CDMA D) none of the above
B) token passing C) MA
C) reservation D) CSMA
D) none of the above 7. If an Ethernet destination address
34. We have categorized access methods is 07:01:02:03:04:05, then this is a
into _______ groups. ______ address.
23. We discussed ______ popular
controlled-access methods. A) five A) broadcast
B) three B) unicast
A) four C) four C) multicast
B) three D) two D) any of the above
C) two
D) none of the above
35. In _______ methods, a station 8. Each station on an Ethernet network
cannot send unless it has been has a unique _______ address imprinted
24. In __________, each station is authorized by other stations. on its network interface card (NIC).
forced to send only at the beginning
of the time slot. A) controlled access A) 48-bit
B) channelization B) 32-bit
A) pure ALOHA C) random access C) 5-byte
B) slotted ALOHA D) none of the above D) none of the above
C) both (a) and (b)
D) neither (a) nor (b)
36. In slotted ALOHA, the vulnerable 9. Gigabit Ethernet has a data rate of
time is ______ the frame transmission ________Mbps.
25. In _______ methods, the stations time.
consult one another to find which A) 10,000
station has the right to send. A) two times B) 1000
B) three times C) 100
A) channelization C) the same as D) 10
B) random access D) none of the above
C) controlled access
D) none of the above 10. In the Ethernet frame, the _______
37. In ________, a station monitors field contains error detection
the medium after it sends a frame to information.
26. In ________ each station sends a see if the transmission was
frame whenever it has a frame to send. successful. If so, the station is A) address
finished. If, however, there is a B) preamble
A) slotted ALOHA collision, the frame is sent again. C) CRC
B) pure ALOHA D) none of the above
C) both (a) and (b) A) CSMA/CD
D) neither (a) nor (b) B) CSMA/CA
C) either (a) or (b) 11. 100Base-T4 uses ________ line
D) both (a) and (b) coding.
27. In ______, the stations use
different codes to achieve multiple A) 8B6T
access. 38. _______ is based on coding theory B) Manchester
and uses sequences of numbers called C) MLT-3
A) CDMA chips. D) NRZ
B) TDMA
C) FDMA A) TDMA
D) none of the above B) CDMA 12. ________uses long-wave 1310-nm
C) FDMA single mode fiber.
D) none of the above
28. In _______, collisions are avoided A) 10GBase-E
through the use of three strategies: 1. __________ uses four twisted pairs. B) 10GBase-S
the interframe space, the contention C) 10GBase-L
window, and acknowledgments. A) 1000Base-LX D) none of the above
B) 1000Base-T
A) CSMA/CD C) 1000Base-SX 13. ______defines a protocol data unit
B) CSMA/CA D) none of the above (PDU) that is somewhat similar to that
C) either (a) or (b) of HDLC.
D) both (a) and (b)
2. 1000Base-SX, 1000Base-LX, and A) LLC
29. In the ________ method, a station 1000Base-CX use _________ block coding B) LLU
needs to make a reservation before and ________ line coding. C) MAC
sending data. Time is divided into D) none of the above
intervals. A) 8B/10B; NRZ
B) 4B/5B; NRZ 14. 100Base-TX uses _________ block
A) token passing C) 8B/10B; MLT-3 coding and ________ line coding.
B) polling D) 4B/5B; MLT-3
C) reservation A) 8B/10B; NRZ
D) none of the above B) 4B/5B; MLT-3
3. _________ uses two fiber-optic C) 4B/5B; NRZ
30. In pure ALOHA, the vulnerable time cables. D) 8B/10B; MLT-3
is ______ the frame transmission time.
A) 100Base-FX 15. The _____ sublayer is responsible
A) two times B) 100Base-T4 for the operation of the CSMA/CD
B) three times C) 100Base-TX access method and framing.
C) the same as D) none of the above
D) none of the above A) MAC
B) MII
4. __________ uses two optical fibers C) LLC
31. The maximum throughput for slotted and a short-wave laser source. D) none of the above
ALOHA is ________ per cent.
27. Fast Ethernet has a data rate of B) 4B/5B; MLT-3
16. _______ is the most widely used ________Mbps. C) 8B/10B; MLT-3
local area network protocol. D) 4B/5B; NRZ-I
A) 10,000
A) Token Bus B) 1000
B) Ethernet C) 100 39. Which of the following could not
C) Token Ring D) 10 be an Ethernet unicast destination?
D) none of the above
A) 46:56:21:1A:DE:F4
28. The purpose of the _______ is to B) 43:7B:6C:DE:10:00
17. In Ethernet addressing, if the provide flow and error control for the C) 48:32:21:21:4D:34
least significant bit of the first upper-layer protocols that actually D) 44:AA:C1:23:45:32
byte is 1, the address is _________. demand these services.
14. In IEEE 802.11, a BSS with an AP 28. The IEEE 802.11a, uses _________.
is sometimes referred to as A) DSSS
____________. B) OFDM
A) an infrastructure network C) FHSS
B) an ad hoc architecture D) either (a) or (c)
C) either (a) or (b)
D) neither (a) nor (b) 29. In IEEE 802.11, a ___ is made of
stationary or mobile wireless stations
15. In IEEE 802.11, the ______ is a and an optional central base station,
timer used for collision avoidance. known as the access point (AP).
A) BSS A) BSS
B) ESS B) CSS
C) NAV C) ESS
D) none of the above D) none of the above
16. In IEEE 802.11, the MAC layer 30. The IEEE 802.11 standard for
frame has ______ fields. wireless LANs defines two services:
A) four ______ and _______.
B) six A) ESS; SSS
C) five B) BSS; ESS
D) none of the above C) BSS; ASS
D) BSS; DCF
17. Bluetooth uses ______method in the
physical layer to avoid interference 31. In Bluetooth, the _____ link is
from other devices or other networks. used when avoiding latency (delay in
A) FHSS data delivery) is more important than
B) DSSS integrity (error-free delivery).
C) FDMA A) SCL
D) none of the above B) ACL
C) ACO
18. In Bluetooth, the _____ link is D) SCO
used when data integrity is more
important than avoiding latency. 32. IEEE 802.11b, has a data rate of
A) SCL _____Mbps.
B) ACO A) 5.5
C) ACL B) 2
D) SCO C) 1
D) none of the above
19. In Bluetooth, the _____layer is
roughly equivalent to the MAC sublayer 33. IEEE 802.11g, has a data rate of
in LANs. _____Mbps.
A) L2CAP A) 22
B) radio B) 11
C) baseband C) 2
D) none of the above D) 1
20. IEEE has defined the 34. In IEEE 802.11, a station with
specifications for a wireless LAN, ________mobility can move from one BSS
called _______, which covers the to another, but the movement is
physical and data link layers. confined inside one ESS.
A) IEEE 802.5 A) ESS-transition
B) IEEE 802.11 B) no-transition
C) IEEE 802.2 C) BSS-transition
D) IEEE 802.3 D) none of the above
21. In IEEE 802.11, a station with 35. The access method in Bluetooth is
________ mobility can move from one ________.
ESS to another. A) TDD-TDMA
A) BSS-transition B) CDMA
B) ESS-transition C) FDMA
C) no-transition D) none of the above
D) none of the above
36. The IEEE 802.11 wireless LANs use
22. The IEEE 802.11g, uses _________. ________ types of frames.
A) DSSS A) five
B) OFDM B) six
C) FHSS C) four
D) either (a) or (c) D) none of the above
23. In IEEE 802.11, the access method 37. In IEEE 802.11, _______ is an
used in the DCF sublayer is _________. optional access method that can be
A) CSMA/CA implemented in an infrastructure
B) CSMA/CD network (not in an ad hoc network).
C) ALOHA A) PCF
D) none of the above B) DCF
C) either (a) or (b)
24. The RTS and CTS frames in CSMA/CA D) neither (a) nor (b)
____ solve the hidden station problem.
The RTS and CTS frames in CSMA/CA ____ 38. In IEEE 802.11, when a frame is
solve the exposed station problem. coming from an AP and going to a
A) cannot; cannot station, the address flag is _______.
B) can; cannot A) 00
C) cannot; can B) 11
D) can; can C) 10
D) 01
25. In IEEE 802.11, communication
between two stations in two different 39. In Bluetooth, multiple ________
BSSs usually occurs via two ________. form a network called a _________.
A) ESSs A) piconets: bluenet
B) APs B) scatternet; piconets
C) BSSs C) piconets: scatternet
D) none of the above D) bluenet; scatternet
26. Bluetooth is a _______ technology 40. The IEEE 802.11b, uses _________.
that connects devices (called gadgets) A) OFDM
in a small area. B) FHSS
A) VLAN C) DSSS
B) wired LAN D) either (a) or (b)
C) wireless LAN
D) none of the above 41. IEEE 802.11a, has a data rate of
_____Mbps.