Telecommunication Networks Final
________ comprise a typical network hierarchy. (Choose all correct answers.)
- Access networks - Distribution networks - Core networks
The three categories of mobile traffic are _______________.
- Managed IP traffic - Mobile data traffic - Internet Traffic
________ is a network that is administered by a single set of management rules that are controlled by one person, group, or organization.
Autonomous system
Cloud computing refers to everything that enables an organization to create, manipulate, and manage very large data sets and the facilities in which these are stored.
False
In the management plane, traffic restoration refers to the network response to failures.
False
IoT is the newest, easiest, and most developed area of network security.
False
NFVI nodes are in the infrastructure network domain.
False
Perception is the mental processes of perception, memory, judgment and reasoning.
False
PolicyCop uses the control plane of SDNs to monitor the compliance with QoS policies.
False
Products do not need to be certified by the Wi-Fi Alliance to be designated as Wi-Fi.
False
RFC is the coordinating committee for Internet design, engineering and management.
False
The DevOps approach is just for applications and does not pertain to network infrastructure.
False
The IoT is a massive system consisting of seven layers, all of which are essential to an effective use of the IoT concept.
False
The basic building block of the logical switch architecture is the group table.
False
The data forwarding function interacts with the SDN control layer to support programmability via resource-control interfaces.
False
The southbound interface provides a uniform means for application developers and network managers to access SDN services and perform network management tasks.
False
Cloud service management includes all the service-related functions necessary for the management and operation of those services required by or proposed to cloud consumers.
True
Cloud storage is a subset of cloud computing that consists of database storage and database applications hosted remotely on cloud servers.
True
CoAp is a specialized web transfer protocol for use with constrained nodes and constrained networks in the IoT.
True
Cross-section bandwidth is the maximum bidirectional data rate that can pass between two parts of the network if it is divided into two equal halves.
True
Deep packet inspection is analyzing network traffic to discover the type of application that sent the data.
True
Defense4All is an open SDN security application integrated into OpenDayLight
True
DevOps is said to be the intersection of software engineering, quality assurance, and operations.
True
DiffServ is the most widely accepted QoS mechanism in enterprise networks.
True
Elastic traffic is network traffic that is tolerant to variations in delay, jitter, and throughput.
True
End-user device analytics is a method of QoE measurement.
True
Hardware virtualization is the use of software to partition a computer's resources into separate and isolated entities called virtual machines.
True
IPsec is a suite of protocols for securing IP communications at the network layer by authenticating/encrypting each IP packet in a data stream.
True
In contrast to SCTP, TCP allows delivering out-of-order packets to applications, which is more suitable for delay-sensitive applications.
True
In effect, PaaS is an operating system in the cloud.
True
IoT must support security audit for data transmission, storage, processing, and application access.
True
IoTivity is an open source software initiative whose objective is to provide a standard and open source implementation so devices and services will be able to work together regardless of who makes them.
True
It is likely that over time, SDN and NFV will tightly interoperate to provide a broad, unified software-based networking approach to abstract and programmatically control network equipment and network-based resources.
True
Media Access Control (MAC) frame is the basic unit of transmission on Ethernet and Wi-Fi LANs.
True
Networking professionals need to seize opportunities for both in-house and third-party training to maintain their competitive edge.
True
Operational expenditure refers to business expenses incurred in the course of ordinary business, such as maintenance and operation of equipment.
True
Physical resources are the computing, storage and network resources that are fundamental to providing cloud services.
True
Precision refers to how close multiple measurements of the same physical quantity are to each other.
True
Security and privacy are concerns that encompass all layers and elements of the cloud provider's architecture.
True
Some Internet service providers (ISPs) are deploying proprietary Content Delivery Network (CDN) cache nodes in their networks to improve delivery of video and other high-bandwidth services to their customers.
True
Standards are documents that provide requirements, specifications, guidelines, or characteristics that can be used consistently to ensure that materials, products, processes, and services are fit for their purpose.
True
Systems must keep records of their activities to permit later forensic analysis to trace security breaches.
True
Technical and management literature on SDN, NFV, cloud, and IoT shows a frequent reference to the need for personnel who understand and can use a DevOps approach to deigning, installing, and managing these new network technologies.
True
The IoT World Forum (IWF) is an industry-sponsored annual event that brings together representatives of business, government, and academia to promote the market adoption of IoT.
True
The NFV framework consists of three domains of operation: virtualized network functions, NFV infrastructure, and NFV management and orchestration.
True
The OpenFlow protocol describes message exchanges that take place between an OpenFlow controller and an OpenFlow switch.
True
The SDN application layer maps control layer service requests into specific commands and directives to data plane switches and supplies applications with information about data plane topology and activity.
True
The SDN controller is a high-value target that needs a high level of protection.
True
The SDN data plane is where network forwarding devices perform the transport and processing of data according to decisions made by the SDN control plane.
True
The application plane contains applications and services that define, monitor, and control network resources and behavior.
True
The end user is the ultimate consumer of applications, data, and services on a computing platform.
True
The full-reference black-box quality models are widely used for onsite benchmarking, diagnosis, and tuning of network equipment, where clean stimulus is available.
True
The glass-box parameter-based models are generally less accurate and coarser than black-box media-based ones.
True
The hypervisor domain is a software environment that abstracts hardware and implements services, such as starting a VM, terminating a VM, acting on policies, scaling, live migration, and high availability.
True
The infrastructure network domain provides the means of interconnection with the existing carrier network.
True
The key ingredients of an IoT-enabled thing are sensors, actuators, a microcontroller, a means of communication, and a means of identification.
True
The mean opinion score (MOS) is a standard metric for QoE
True
The network layer QoS/QoE mapping models rely solely on NQoS metrics gathered from the TCP/IP stack.
True
The northbound interface enables applications to access control plane functions and services without needing to know the details of the underlying network switches.
True
The routing function comprises a protocol for collecting information about the topology and traffic conditions of the network and an algorithm for designing routes through the network.
True
The signal-to-noise ratio is a good indicator of quality of service, especially over wireless telecom networks.
True
The term embedded system refers to any device that includes a computer chip, but that is not a general-purpose workstation, desktop, or laptop computer.
True
The two categories of routing protocols are interior router protocols (IRPs) and exterior router protocols (ERPs).
True
The virtual machine approach is a common way for businesses and individuals to deal with legacy applications and to optimize their hardware usage by maximizing the various kinds of applications that a single computer can handle.
True
Traffic on the Internet and enterprise networks can be divided into two broad categories: elastic and inelastic.
True
Trick mode functionalities are features of video streaming systems that mimic visual feedback given during fast-forward and rewind operations.
True
User demographics, usability, cost, content, and media quality are all key contributing factors to producing a good QoE.
True
Virtual machine enables different operating systems to run in the same computer at the same time and prevents application from interfering with each other.
True
Virtualization technologies effectively emulate or simulate a hardware platform, such as a server, storage device, or network resource, in software.
True
Whereas enterprise network convergence focuses on the consolidation of traditionally distinct voice, video, and data communications networks into a common infrastructure, ________ focuses on the integration of real-time communication services to optimize business processes.
Unified communications
________ enables multiple copies of the same or different operating system to execute on the computer and prevents applications from different virtual machines from interfering with each other.
hardware virtualization
As with SDN, success for NFV requires standards at appropriate interface reference points and open source software for commonly used functions
true
Each group table consists of a number of rows, consisting of four components: group identifier, group type, counters, and action buckets.
true
The "tail drop" technique is when the queue management discipline was to drop any incoming packets when the queue was full.
true
Wireless developments are crucial to the growth of IoT.
true
An example of a network service abstraction layer is the programming language Frenetic.
True
An increasing delay jitter is a good indicator of poor quality.
True
A machine running virtualization software can only host applications that are running on the same operating systems.
False
An abstraction layer is a mechanism that translates a high-level request into the low-level commands required to perform the request.
False
________ traffic can adjust, over wide ranges, to changes in delay and throughput across an internet and still meet the needs of its applications.
Elastic
________ is the commercial name for a wired local-area network technology.
Ethernet
A big advantage to using cloud computing to store your data and share it with others is that cloud providers do not have security failures.
False
________ is a committee of the Institute of Electrical and Electronics Engineers responsible for developing standards for wireless LANs.
IEEE 802
________ traffic does not easily adapt, if at all, to changes in delay and throughput across an internet.
Inelastic
An action set is a list of actions associated with a packet that are accumulated while the packet is processed by each table and that are executed when the packet exits the processing pipeline.
True
A dominant theme of the ________ is the embedding of short-range mobile transceivers into a wide array of gadgets and everyday items, enabling new forms of communication between people and things, and between things themselves.
Internet of Things
________ is the provision of telephone, video, and data communication services within a single network.
Network convergence
A(n) ________ is an organization that delivers communications services over a typically large geographic area and provides, maintains, and manages network equipment and networks.
Network provider
________ is the measurable end-to-end performance properties of a network service that can be guaranteed in advance by a service level agreement between a user and a service provider, so as to satisfy specific customer application requirements.
QoS
A "chip" is a single piece of semiconducting material, typically silicon, upon which electronic circuits and logic gates are fabricated.
True
A VLAN is a broadcast domain consisting of a group of end stations that are not constrained by their physical location and can communicate as if they were on a common LAN.
True
A choke packet is a control packet generated at a congested node and transmitted back to a source node to restrict traffic flow.
True
A cloud service category can include capabilities from one or more cloud capability types.
True
A flow is a sequence of packets traversing a network that share a set of header field values.
True
A high packet loss rate indicates that users sustain undoubtedly a very poor quality.
True
A single compute or network host can host multiple virtual machines, each of which can host a single VNF.
True
ALM embraces requirements management, system design, software development, and configuration management and implies an integrated set of tools for developing and controlling the project.
True
_____________ is a variety of technologies for managing computer resources by providing an abstraction layer between the software and the physical hardware.
Virtualization