what is common between x

17
What is common between X.25 Packet switching and Fast Packet Switching 1. In both of them bandwidth is used only when there is something to transmit 2. Both supports high speed data (T1 speed and up) 3. Both supports sharing of the same channel to carry voice , data and video 4. In both of them transmit delays are low enough to handle voice traffic ATM is 1. a frame relay implementation 2. a cell relay implementation 3. a circuit switch implementation 4. a packet switch implementation Which one is true about ATM and Packet Switching 1. Both ATM and Packet Switching have relatively small size cells 2. Packet Switching has no windowing while ATM has 3. Both have fixed length cells 4. ATM has no error detection on data while Packet Switching has The difference between X.25 and frame relay is 1. only frame relay is connection-oriented 2. only frame relay has error control 3. only X.25 is reliable 4. only X.25 is virtual circuit The difference between ATM and frame relay is 1. only ATM is virtual circuit 2. only frame relay has error control 3. only frame relay is connection-oriented 4. only ATM is unreliable The difference between ATM and X.25 is 1. only ATM is connection-oriented 2. only X.25 has error control 3. only X.25 is virtual circuit 4. only ATM is reliable Two networks can 1. have hosts with the same host id 2. have the same net id 3. have the same prefix in their IP address 4. not have the same suffix in their hosts IP addresses In ARP 1. Both request and response are broadcast 2. The response is broadcast 3. The request is point to point 4. The request is broadcast ATM is well suited for 1. voice, interactive data and video transfer 2. interactive data transfer but not for voice transfer 3. voice and video transfer only 4. voice and interactive data transfer only Routing is the responsibility of 1. The data link layer 2. The network layer 3. The physical layer 4. The transport layer

Upload: mcajava

Post on 02-Jan-2016

25 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: What is Common Between X

What is common between X.25 Packet switching and Fast Packet Switching 1. In both of them bandwidth is used only when there is something to transmit 2. Both supports high speed data (T1 speed and up) 3. Both supports sharing of the same channel to carry voice , data and video 4. In both of them transmit delays are low enough to handle voice traffic

ATM is 1. a frame relay implementation 2. a cell relay implementation 3. a circuit switch implementation 4. a packet switch implementation

Which one is true about ATM and Packet Switching 1. Both ATM and Packet Switching have relatively small size cells 2. Packet Switching has no windowing while ATM has 3. Both have fixed length cells 4. ATM has no error detection on data while Packet Switching has

The difference between X.25 and frame relay is 1. only frame relay is connection-oriented 2. only frame relay has error control 3. only X.25 is reliable 4. only X.25 is virtual circuit

The difference between ATM and frame relay is 1. only ATM is virtual circuit 2. only frame relay has error control 3. only frame relay is connection-oriented 4. only ATM is unreliable

The difference between ATM and X.25 is 1. only ATM is connection-oriented 2. only X.25 has error control 3. only X.25 is virtual circuit 4. only ATM is reliable

Two networks can 1. have hosts with the same host id 2. have the same net id 3. have the same prefix in their IP address 4. not have the same suffix in their hosts IP addresses

In ARP 1. Both request and response are broadcast 2. The response is broadcast 3. The request is point to point 4. The request is broadcast

ATM is well suited for 1. voice, interactive data and video transfer 2. interactive data transfer but not for voice transfer 3. voice and video transfer only 4. voice and interactive data transfer only

Routing is the responsibility of 1. The data link layer 2. The network layer 3. The physical layer 4. The transport layer

The type of access used in GSM technology is

Page 2: What is Common Between X

1. FDMA/TDMA 2. CDMA 3. OFDMA 4. None of the above

Which of these is not true for TDD? 1. TDD uses different time slots for transmission and reception paths 2. Single radio frequency can be used 3. Duplexer is required 4. It increases the battery life of mobile phones

The connectivity from exchange to customer prermises is termed as 1. Data network 2. Access Network or Local Loop 3. Bridge network 4. None of the above

The coverage & capacity of CDMA system is more than that of GSM system 1. True 2. False 3. Equal 4. None of the above

The type of Access technology which can enhance the battery life is 1. CDMA 2. TDMA 3. OFDMA 4. None of the above

The core concept used in Cellular technology is 1. TDM 2. Frequency Reuse 3. Code reuse 4. None of the above

The table used for calculating the no of resources is 1. Erlang B table 2. Erlang C table 3. Queing method 4. None of the above

The uplink frequency of P-GSM system is 1. 1850-1910Mhz 2. 1710-1785Mhz 3. 890-915 Mhz 4. None of the above

The technique adopted to increase the system capacity and reduce co-chl interference is 1. High power BTS 2. By installing the Omnidirectional antenna 3. Sectorisation 4. None of the above

The remote and sparsely populated areas will be covered by 1. Microcell 2. Macro cell 3. Picocell 4. None of the above

Which of these cells are used for densely populated areas 1. Macro cells 2. Micro cells 3. Selective cells 4. Umbrella cells

The cell having the same number in the adjacent cluster using the same set of RF channels are termed as 1. adjacent cell 2. Co channel cell

Page 3: What is Common Between X

3. Macro cell 4. Selective Cell

Higher value of Q is achievable in 1. big cluster size 2. small cluster size 3. medium cluster size 4. None of the above

The terminal is under observation from the network for the possible problems. Under which list will this belong in EIR 1. White List 2. Grey List 3. Black List 4. None of the above

The process of channel coding, Encryption, Multiplexing and modulation for Trans direction and reverse for reception are to be carried out by 1. BTS 2. BSC 3. MSC 4. MS

Modulation technique used in DECT is 1. GFSK 2. QPSK 3. BPSK 4. None of the above

The broad spectrum of the transmitted signal gives rise to 1. Fadiing 2. Noise 3. Spread Spectrum 4. All Of the above

This Handles IWF (Interworking Function) for interworking with public data network for data call service 1. BTS 2. BSC 3. MSC 4. GPS

AMPS (Advanced Mobile Telephone System) is of 1. Scandinavia 2. UK 3. North America 4. France

A-interface is mainly used to transmit the following information 1. BSS management information 2. Call processing 3. Mobility management information 4. All of the above

Which of these are Digital Cellular Technologies 1. IS:54 / IS-136 – N America 2. GSM – Europe and Asia 3. IS-95 – N America 4. All of the above

Which of these Controls call processing and status management of the BTS, as the highest-level processor within the BTS. BSPA TFPA TFBB

Page 4: What is Common Between X

GPS-RWhich of these block processes CDMA channels, and performs digital and analogue signal processing for IS-95A calls of each channel and interface with the RF block. 1. BHI 2. CCB 3. TCP 4. None of teh above

CCB (CDMA CHANNEL BANK) BLOCK

_________ occurs if the cross talk power in the disturbed channel propagates in the direction opposite to the propagation of useful power in the disturbing channel. 1. NEXT 2. FEXT 3. Intelligible cross-talk 4. None of the above

___________ occurs if the cross talk power in the disturbed channel propagates in the direction of the propagation of the useful power in the disturbing channel. 1. NEXT 2. FEXT 3. Intelligible cross-talk 4. None of the above

Unintelligible cross talk occurs in 1. Between carrier channels having different frequency allocations. 2. Between carrier channels having virtual carrier frequencies essentially differing from each

other 3. In consequence of non-linear distortion 4. All of the above

PCM systems use ______ technique to provide a number of circuits on the same transmission medium 1. TDM 2. FDM 3. CDM 4. VDM

In a PCM, a frame of _________microseconds duration has 32 time slots. 1. 3.9 2. 25 3. 125 4. None of the above

Which of these is disadvantages of Digital Communication 1. Economies in certain applications 2. Compatibility of different traffic 3.Reliability and power consumption 4. Easy repeatability of design

Question was not answered

Which of these are methods of demodulation of FSK. - - . 1. Coherent detection 2. Incoherent detection 3. Both 4. None Of the above

Question was not answered

Unwanted phase modulation is termed as 1. Jitter 2. Swim

Page 5: What is Common Between X

3. BER 4. Distortion

Question was not answered

The 16 QAM (Quadrature Amplitude Modulation) system carriers . 1. four times as much information as the QPSK system 2. twice as much information as the QPSK system 3. 16 times as much information as the QPSK system 4. thrice as much information as the QPSK system

Question was not answered

The 16 QAM (Quadrature Amplitude Modulation) system carriers . 1. four times as much information as the QPSK system 2. twice as much information as the QPSK system 3. 16 times as much information as the QPSK system 4. thrice as much information as the QPSK system

In order to send data/message from one point to another, which of the following are required? Source Medium Receiver All of the above

Which of the following is a DTE Teleprinter Computer with a key board DTA Both 1&2

In data communication, source and receiver data equipment is called Data Terminal Equipment (DTE),

Which of these is characteristics of Simplex Transmission? 1. An O/P Terminal can only transmit and never receive. 2. An input Terminal can only receive and transmit. 3. Message always flows in both direction . 4. None Of the above

Baudot Code is 1. 7 bit code 2. 5 bit code 3. 4 bit code 4. 6 bit code

Parity checking method 1. can detect single error. 2. can detect multiple errors. 3. Both 4. None Of the above

Keyboard of computer is encoded in 1. Baudot code 2. ASCII code 3. BCDIC code 4. EBCDIC Code

EBCDIC gives how much no. of combination 1. 128 2. 256 3. 64

Page 6: What is Common Between X

4. 32In telegraph terminology,1 is characterised as 1 1 or 0 None Of the above

Information carrying capacity of a transmission channel is determined by the following characteristics Bandwidth (BW). Signal-to-noise (S/N) Ratio. Both None Of the above

Nyquist Theorem states that Sample rate > 2 * highest frequency component Sample rate < 2 * highest frequency component Sample rate = 2 * highest frequency component None Of the above

Calculate the number of level required for transmission if the B.W. of a channel is 300-3400 Hz and S/N ratio is 20 dB. 8 16 32 64

Which of the following is not RZ CODES? Manchester Coding Biphase-M Coding Biphase-S Coding Baudot Coding

OSI is short for 1. Open Sided Interface 2. Open System Interface 3. Open System Interconnection 4. None Of the above

The Network layer converts 1. DATA to SEGMENTS 2. SEGMENTS to PACKETS 3. PACKETS to FRAMES 4. FRAMES to BITS

1.The Application, Presentation and Session layers create DATA from users' input. 2.The Transport layer converts the DATA to SEGMENTS 3.The Network layer converts the SEGMENTS to PACKETS 4.The Data Link layer converts the PACKETS to FRAMES 5.The Physical layer converts the FRAMES to BITS.

Which of the following are the examples of Application layer protocols: 1. Telnet 2. SMB 3. NCP 4. All of the above

Which of the following is not example of Presentation Layer 1. SMTP 2. MPEG 3. ASCII 4. GIF

The layer which establishes, manages, maintains and terminates communication channels between software programs on network nodes is 1. Presentation Layer 2. Session Layer 3. Transport Layer 4. Network layer

Examples of Transport layer protocols are:

Page 7: What is Common Between X

1. TCP 2. SMTP 3. FTP 4. NCP

Star , Bus and Ring are examples of 1. Transport Layer 2. Data Link Layer 3. Application Layer 4. Network layer

This is the layer that actually interacts with the operating system or application whenever the user chooses to transfer files, read messages or perform other network-related activities. 1. Application layer 2. Presentation layer 3. Session layer 4. Network layer

In which layer, the appropriate physical protocol is assigned to the data 1. Data Layer 2. Session Layer 3. Transport Layer 4. Physical Layer

Which of these are characteristics of LAN? 1. Speed 4, 10, 16 up to 100MBPS 2. Distance Few KMs 3. Shared access to medium 4. All of the above

Which of these are advantages of bus topology: 1. Fault diagnostics 2. Least amount of media is used 3. Fault isolation 4. None Of the above

Advantages of star topology are 1. Control/fault diagnostics is centralized. 2. Ease of service 3. One device per connection 4. All of the above

Data Rate of Twisted Pair (Shielded) for Bus Topology is 1. 10 mbps 2. 2mbps 3. 1 mbps 4. None Of the above

What is the full form of ARP?     1. Address Resolution Part 2. Address Resolution Protocol 3. Administartive Resolution Protocol 4. None of the above

_________resolves the IP address to the physical address (which is often referred to as the data link layer address or MAC address 1. ARP 2. BGP 3. OSPF 4. RIP

What is the full form of BGP? 1. Border gateway Protocol 2. Broadband gateway Protocol 3. Broadband gateway Part 4. None of the above

An IP address is a _________ layer protocol address for a host in a TCP/IP network. 1. network

Page 8: What is Common Between X

2. session 3. transport 4. physical

The size of an IP address is __ bits 1. 12 2. 16 3. 32 4. 64

What is the full form of DHCP? 1. Dynamic Host Configuration Part 2. Dynamic Host Configuration Protocol 3. Dynamic Handshake Configuration Protocol 4. Dynamic Handshake Control Protocol

The size of each byte of ip address is 8 bits and the value of each byte can be from __________.     1. 1 to 255 2. 0 to 255 3. 0 to 256 4. 1 to 256

A router analyses __________ part of an IP address for datagram forwarding. 1. whole 2. last byte 3. only the network ID 4. None of the above

DHCP supports which of these mechanisms for IP address allocation? 1. Automatic allocation 2. Dynamic allocation 3. Manual allocation 4. All of the above

Two hosts in two different networks _____ have the same host ID, and 2 hosts in the same network ______ have the same host ID at the same time.   1. can, cannot 2. cannot, can 3. can, can 4. cannot, cannot,

In the IP address 192.9.205.21, the host ID is ______ 1. 205 2. 21 3. 2^21 4. 192.9

________ is an exterior routing protocol related to EGP, but it operates with more capability and greater flexibility. 1. ARP 2. DHCP 3. BGP 4. RIP

A _________ IP address is an IP address uniquely identifying a single host in a network. 1. unicast 2. multicast 3. unilateral 4. None of the above

A __________address is an IP address identifying a particular group of hosts in network. 1. unicast 2. multicast 3. unilateral 4. None of the above

A _________address is an IP address denoting the entire network.     1. unicast 2. multicast 3. broadcast 4. unilateral

Page 9: What is Common Between X

ADSL provides 1. higher data rates in the downstream direction 2. lower data rates in the downstream direction 3. equal data rates in both direction 4. None of the above

The maximum theoretical downstream data rate of an ADSL system is 1. 2Mbps 2. 10Mbps 3. 15.24Mbps 4. 100Mbps

What is full form of ADSL? 1. Asymmetric Digital Subscriber Line 2. Asynchronous Digital Subscriber Line 3. Asynchronous Data Service Line 4. Asymmetrical Dynamic Subscriber Link

Currently, most ADSL communication is 1. simplex 2. half duplex 3. full duplex 4. None of the above

If the distance between the DSLAM and the Tier2 switch is less than 10 Kms, 1. then STM medium can be used for connectivity 2. then SDH equipment could be used for connectivity 3. then Dark Fibre could be used for connectivity 4. None of the above

If the distance exceeds 10 kms, then we can use the STM medium with electrical to optical converters at both the ends, as both DSLAM as well as Tier2 switch has optical interface whereas the output from STM is electrical.

Which of these is not a characterisic of ADSL 1. symmetric 2. Digital 3. twisted pair copper loop to the subscriber premises 4. faster downstream & slower upstream

The ADSL modem at the customer premises, that is called 1. ATU-R 2. ATU-C 3. ATU-T 4. None of the above

ADSL transceiver unit-remote (ATU-R)

The modem of the central office that is called an 1. ATU-R 2. ATU-C 3. ATU-T 4. None of the above

ADSL Transmission Unit- central office (ATU-C)

DSLAM unit can connect through 1. ATM 2. Ethernet 3. Both 1 & 2 4. None of the above

What is the modulation technique(s) that can be used for ADSL?

Page 10: What is Common Between X

1. CAP/QAM 2. DMT 3. Both 1 & 2 4. None of the above

In ADSL modems, creating multiple channels is done by dividing the available bandwidth of a telephone line by 1. FDM 2. TDM 3. FDD 4. None of the above

The data of the ADSL transport is organized into frames and superframes. One superframe is built of 1. 32 ADSL frames and one sync frame 2. 64 ADSL frames and one sync frame 3. 68 ADSL frames and one sync frame 4. None of the above

Specific ADSL Reference Model for ATM Mode consists of 1. Access Node (AN) 2. Broadband Network Termination (B-NT) 3. Both 1 & 2 4. None of the above

What is the ATU-C? 1. Low pass filter 2. DSL access multiplexer 3. The transceiver at the central office 4. The transceiver at the costumer premises

How many splitters do we use in the ADSL architecture and where? 1. Two. Both in the central office. 2. One. In the central office 3. One. In the subscriber premises. 4. Two. One in the central office and the other in the subscriber premises.

If a router with IP addresses 203.168.27.14 and 198.20.30.15 (and default masks) and physical addresses xxxxx and yyyyy receives the message with IP destination address 128.20.30.15 and physical address xxxxx, what should the router do? 1. Discard the message 2. Pass the message to its next higher layer 3. Pass the message to another router 4. Pass the message to the ultimate destination

When a station receives a message, it checks the destination physical address. If the physical destination address is different from the station's physical address, then the message is discarded. If addresses are the same, the station checks the destination IP address. If it is the station's address, then the message is passed to the next higher layer; otherwise the message is not for the station. If the station is a router, it passes the message to another router or to the ultimate destination (if the destination is its neighbor). If the station is a host, the message is discarded (since a host does not route messages). In this case, the destination is not a neighbor (because the IP address is not on one of the router's networks).

If a router with IP addresses 203.168.27.14 and 198.168.27.15 (and default masks) and physical addresses xxxxx and yyyyy receives a message with IP destination address 203.168.27.15 and physical address xxxxx, what should the router do? 1. Discard the message 2. Pass the message to its next higher layer 3. Pass the message to another router 4. Pass the message to the ultimate destination

Explanation: When a station receives a message, it checks the destination physical address. If the physical destination address is different from the station's physical address, then the message is discarded. If addresses are the same, the station checks the destination IP address. If it is the station's

Page 11: What is Common Between X

address, then the message is passed to the next higher layer; otherwise the message is not for the station. If the station is a router, it passes the message to another router or to the ultimate destination (if the destination is its neighbor). If the station is a host the message is discarded ( since a host does not route messages). In this case, the destination is a neighbor (because the IP address is on one of the router's networks).

If a router with IP addresses 203.168.27.14 and 198.20.30.15 (and default masks) and physical addresses xxxxx and yyyyy receives a message with IP destination address 198.20.30.15 and physical address zzzzz, what should the router do? 1. Discard the message 2. Pass the message to its next higher layer 3. Pass the message to another router 4. Pass the message to the ultimate destination

When a station receives a message, it checks the destination physical address. If the physical destination address is different from the station's physical address, then the message is discarded.

If a host with IP address 203.168.27.14 and physical address xxxxx receives a message with IP destination address 203.168.27.15 and physical address xxxxx, what should the host do? 1. Discard the message 2. Pass the message to its next higher layer 3. Pass the message to its default router 4. Pass the message to the ultimate

When a station receives a message, it checks the destination physical address. If the physical destination address is different from the station's physical address then the message is discarded.

A host with IP address 128.127.13.14 wants to send a message to a station with IP address 203.13.14.127. What should the host do? 1. Send the message to a default router 2. Send the message directly to the station 3. The host can send message to the station only if the station is a router 4. Send the message to a router according to the routing table

The host can not directly reach the station (they are not IP neighbors). Therefore it should consult its routing table. The router that it chooses might be the host's default router, but the host must consult its routing table to determine which router to use.

A router with IP addresses 203.168.27.14 and 198.20.30.15 and physical addresses xxxxx and yyyyy receives a message with IP destination address: 198.20.30.15 and physical address: yyyyy. What should the router do? 1. Discard the message 2. Pass the message to its next higher layer 3. Pass the message to another router 4. Pass the message to the ultimate destination

Explanation: When a station receives a message, it checks the destination physical address. If the physical destination address is different from the station's physical address then the message is discarded. If addresses are the same, the station checks the destination IP address. If it is the station's address, then the message is passed to the next higher layer. In this case, the destination IP address is the router itself.

Which address is different? 1. 198.168.27.11 2. 192.186.11.27 3. 172.16.27.11 4. 172.14.72.11

Explanation: 172.16.27.11 is the only address in the list that is from the private address space.

Page 12: What is Common Between X

What is the default subnet mask of IP address 223.14.68.7? 1. 255.0.0.0 2. 255.255.0.0 3. 255.255.255.0 4. It is not a legal unicast address

223 in binary presentation: 11011111. The prefix 110 indicates a class C address, which has default mask 255.255.255.0.

What is the default subnet mask of IP address 224.41.68.7 1. 255.0.0.0 2. 255.255.0.0 3. 255.255.255.0 4. It is not a legal unicast address

224 in binary presentation: 11100000 The prefix 111 indicates a multicast address, which is not a legal unicast address.

Given the IP network address 112.172.13.15. Assuming the default mask, what is its network-id and host-id? 1. Network-id 112 and host-id 172.13.15 2. Network-id 112.172 and host-id 13.15 3. Network-id 112.172.13 and host-id 15 4. It is not a legal unicast address

The given address is a class A address, and thus the first octet is the network-id.

Given a host with IP address 192.14.64.93 and the mask 255.255.255.224. To which subnet does it belong? 1. 192.14.64.0 2. 192.14.64.64 3. 192.14.64.96 4. 192.14.64.224

224 in binary presentation is 11100000. Therefore, 3 bits represent the subnet and 5 bits represent the host. A bitwise "and" of the host address and the mask will result in the subnet address.

Given the IP network address 203.14.68.0 and the mask 255.255.255.224. Which subnet can you have with the given address and mask? 1. 203.14.68.0 2. 203.14.68.48 3. 203.14.68.128 4. 203.14.68.16

224 in binary presentation is 11100000. Therefore, 3 bits represent the subnet and 5 bits represent the host. The possible subnets (last octet) are: 000 00000 - that is the network itself, 001 00000 - 203.14.68.32, 010 00000 - 203.14.68.64, 011 00000 - 203.14.68.96, 100 00000 - 203.14.68.128, 101 00000 - 203.14.68.160, 110 00000 - 203.14.68.192, 111 00000 - 203.14.68.224

Given the IP network address 192.48.5.0/24. What CIDR prefix should you use if you want to divide it into at least 3 subnets and the maximum number of hosts per network? 1. /17 2. /18 3. /26 4. /27

If we add two bits to the given prefix, we can define the subnets 192.48.5.128/26, 192.48.5.64/26, and 192.48.5.192/26. /27 would certainly work, but you would have fewer hosts per subnet. /17 and /18 are not possible given a /24 allocation.

Page 13: What is Common Between X

You are given the IP network address 196.58.27.0/24. If you use prefix /28, how many subnets and hosts can you have? 1. 16 subnets and 14 hosts on each subnet 2. 14 subnets and 14 hosts on each subnet 3. 30 subnets and 30 hosts on each subnet 4. 16 subnets and 16 hosts on each subnet

The /28 prefix indicates that you will use 4 bits to define the subnets and 4 bits to define the hosts on each subnet. Number of subnets: 2^4 = 16. Number of hosts: 2^4-2 = 14 (the all zeros host defines the subnet; the all ones host is for directed broadcast.)

You are given the IP network address 203.127.14.0/24. If you use the prefix /26, how much of the address space (expressed in number of hosts) is wasted due to the subnetting? 1. 0 2. 74 3. 130 4. 6

With two bits defining the subnets, you will have 4 subnets. Each one will be able to use 2^6-2=62 hosts, for a total of 4x62=248 hosts. Without subnetting, we have 2^8-2=254 hosts.

How is the finite-state automata defined ?     1. by events, actions and state transitions 2. by actions and state transitions only 3. by events and state transitions only 4. None of the above

What attempt is made in the Request-Sent state ?     1. to close a connection 2. to configure a connection 3. to open a connection 4. None of the above

When does an event occur ? 1. when a lower layer indicates that it's ready to carry packets 2. when a link layer indicates that it's ready to carry packets 3. when a lower layer indicates that it's busy 4. All of the above

Actions typically indicate __________ and/or the starting or stopping of the Restart Timer.     1. the transmission 2. the connection 3. the configuration 4. None of the above

For what is the Restart Timer used ? 1. to time transmissions of Configure-Request and Configure-Ack 2. to time transmissions of Configure-Request and Terminate-Request 3. both 1 & 2 4. None of the above

How many classes of LCP packets exist ?     1. 2 2. 3 3. 4 4. 5

At this phase protocols such as IP,AppleTalk must be separately configured by the appropriate Network Control Protocol (NCP)     1. link termination phase 2. authentication phase 3. network-layer protocol phase 4. None of the above

What does the Close event indicate ? 1. the link is not available 2. the network administrator (human or program) has indicated that the link

Page 14: What is Common Between X

3. both 1 & 2 4. None of the above

What are the fields of LCP packet ?     1. Code, Identifier, Data 2. Type, Identifier, Length, Options 3. Type, Length, Data 4. Code, Identifier, Length, Data

What happens if a packet is received with an unknown Code field ?     1. the connection is immediatly closed 2. a Code-Reject packet is transmitted 3. a Terminate-Request packet is transmitted 4. None of the above

Say the customer from the previous question got older, and decided to move to the country side 18,000ft from the CO. He doesn't need HDTV anymore, he has already seen it all, but he just can't do without his daily websites. What would be the best line configuration for him? 1. ADSL 2. VDSL 3. ADSL2/2+ 4. RE-ADSL2

What is SRA? 1. Sound Rack Audio 2. Seamless Rate Adaptation 3. Seek And Rescue 4. Its an organization who standardize ADSL

"Seamless Rate Adaptation" - an ADSL2 mechanism to adapt a new rate in an existing connection without restarting and invisibly from the end systems.

How can ADSL2+ reduce crosstalk? 1. By masking downstream frequencies below 1.1Mhz to 1.1-2.2Mhz 2. By using rate adaptation 3. By using special binders 4. It can't reduce crosstalk, only AM radio band interferences

The difference(s) between VDSL and ADSL are 1. VDSL can be both symmetric and asymmetric 2. ADSL operates over regular POTS, while VDSL can't 3. VDSL provide faster data transmission over shorter distances then ADSL 4. 1 and 3 are correct

What makes the ADSL asymmetric? 1. Different data rates - Downstream is bigger than Upstream 2. Different data rates - Upstream is bigger than Downstream 3. Download and Upload can't occur simultaneously 4. None of the above

A version of multicarrier modulation in which incoming data is collected and then distributed over a large number of small individual carriers is 1. DMT 2. CAP 3. Both 1 & 2 4. None of the above

QAM ( Quadrature Amplitude M odulation) also known as I&Q modulation, is a combination of ___________ 1. AM & Phase shift keying 2. FM & Phase shift keying 3. AM & Binary shift keying 4. FM & Binary shift keying

__________ is a version of multicarrier modulation in which the data is distributed over a large number of subcarriers, or channels, each of which uses a form of QAM modulation. 1. DMT

Page 15: What is Common Between X

2. QAM 3. PDSN 4. FMT

FMT ( Filtered MultiTone) is a multicarrier modulation scheme which can be viewed as a combination __________ 1. AM & Phase shift keying 2. FM & Phase shift keying 3. QAM & DMT 4. FM & Binary shift keying

DSL Lite (or G.Lite) can go upto ___________ feet on 24 gauge wire 1. 5,000 2. 9,000 3. 18,000 4. 36,000