Telecommunication Networks Final

Ace your homework & exams now with Quizwiz!

________ comprise a typical network hierarchy. (Choose all correct answers.)

- Access networks - Distribution networks - Core networks

The three categories of mobile traffic are _______________.

- Managed IP traffic - Mobile data traffic - Internet Traffic

________ is a network that is administered by a single set of management rules that are controlled by one person, group, or organization.

Autonomous system

Cloud computing refers to everything that enables an organization to create, manipulate, and manage very large data sets and the facilities in which these are stored.

False

In the management plane, traffic restoration refers to the network response to failures.

False

IoT is the newest, easiest, and most developed area of network security.

False

NFVI nodes are in the infrastructure network domain.

False

Perception is the mental processes of perception, memory, judgment and reasoning.

False

PolicyCop uses the control plane of SDNs to monitor the compliance with QoS policies.

False

Products do not need to be certified by the Wi-Fi Alliance to be designated as Wi-Fi.

False

RFC is the coordinating committee for Internet design, engineering and management.

False

The DevOps approach is just for applications and does not pertain to network infrastructure.

False

The IoT is a massive system consisting of seven layers, all of which are essential to an effective use of the IoT concept.

False

The basic building block of the logical switch architecture is the group table.

False

The data forwarding function interacts with the SDN control layer to support programmability via resource-control interfaces.

False

The southbound interface provides a uniform means for application developers and network managers to access SDN services and perform network management tasks.

False

Cloud service management includes all the service-related functions necessary for the management and operation of those services required by or proposed to cloud consumers.

True

Cloud storage is a subset of cloud computing that consists of database storage and database applications hosted remotely on cloud servers.

True

CoAp is a specialized web transfer protocol for use with constrained nodes and constrained networks in the IoT.

True

Cross-section bandwidth is the maximum bidirectional data rate that can pass between two parts of the network if it is divided into two equal halves.

True

Deep packet inspection is analyzing network traffic to discover the type of application that sent the data.

True

Defense4All is an open SDN security application integrated into OpenDayLight

True

DevOps is said to be the intersection of software engineering, quality assurance, and operations.

True

DiffServ is the most widely accepted QoS mechanism in enterprise networks.

True

Elastic traffic is network traffic that is tolerant to variations in delay, jitter, and throughput.

True

End-user device analytics is a method of QoE measurement.

True

Hardware virtualization is the use of software to partition a computer's resources into separate and isolated entities called virtual machines.

True

IPsec is a suite of protocols for securing IP communications at the network layer by authenticating/encrypting each IP packet in a data stream.

True

In contrast to SCTP, TCP allows delivering out-of-order packets to applications, which is more suitable for delay-sensitive applications.

True

In effect, PaaS is an operating system in the cloud.

True

IoT must support security audit for data transmission, storage, processing, and application access.

True

IoTivity is an open source software initiative whose objective is to provide a standard and open source implementation so devices and services will be able to work together regardless of who makes them.

True

It is likely that over time, SDN and NFV will tightly interoperate to provide a broad, unified software-based networking approach to abstract and programmatically control network equipment and network-based resources.

True

Media Access Control (MAC) frame is the basic unit of transmission on Ethernet and Wi-Fi LANs.

True

Networking professionals need to seize opportunities for both in-house and third-party training to maintain their competitive edge.

True

Operational expenditure refers to business expenses incurred in the course of ordinary business, such as maintenance and operation of equipment.

True

Physical resources are the computing, storage and network resources that are fundamental to providing cloud services.

True

Precision refers to how close multiple measurements of the same physical quantity are to each other.

True

Security and privacy are concerns that encompass all layers and elements of the cloud provider's architecture.

True

Some Internet service providers (ISPs) are deploying proprietary Content Delivery Network (CDN) cache nodes in their networks to improve delivery of video and other high-bandwidth services to their customers.

True

Standards are documents that provide requirements, specifications, guidelines, or characteristics that can be used consistently to ensure that materials, products, processes, and services are fit for their purpose.

True

Systems must keep records of their activities to permit later forensic analysis to trace security breaches.

True

Technical and management literature on SDN, NFV, cloud, and IoT shows a frequent reference to the need for personnel who understand and can use a DevOps approach to deigning, installing, and managing these new network technologies.

True

The IoT World Forum (IWF) is an industry-sponsored annual event that brings together representatives of business, government, and academia to promote the market adoption of IoT.

True

The NFV framework consists of three domains of operation: virtualized network functions, NFV infrastructure, and NFV management and orchestration.

True

The OpenFlow protocol describes message exchanges that take place between an OpenFlow controller and an OpenFlow switch.

True

The SDN application layer maps control layer service requests into specific commands and directives to data plane switches and supplies applications with information about data plane topology and activity.

True

The SDN controller is a high-value target that needs a high level of protection.

True

The SDN data plane is where network forwarding devices perform the transport and processing of data according to decisions made by the SDN control plane.

True

The application plane contains applications and services that define, monitor, and control network resources and behavior.

True

The end user is the ultimate consumer of applications, data, and services on a computing platform.

True

The full-reference black-box quality models are widely used for onsite benchmarking, diagnosis, and tuning of network equipment, where clean stimulus is available.

True

The glass-box parameter-based models are generally less accurate and coarser than black-box media-based ones.

True

The hypervisor domain is a software environment that abstracts hardware and implements services, such as starting a VM, terminating a VM, acting on policies, scaling, live migration, and high availability.

True

The infrastructure network domain provides the means of interconnection with the existing carrier network.

True

The key ingredients of an IoT-enabled thing are sensors, actuators, a microcontroller, a means of communication, and a means of identification.

True

The mean opinion score (MOS) is a standard metric for QoE

True

The network layer QoS/QoE mapping models rely solely on NQoS metrics gathered from the TCP/IP stack.

True

The northbound interface enables applications to access control plane functions and services without needing to know the details of the underlying network switches.

True

The routing function comprises a protocol for collecting information about the topology and traffic conditions of the network and an algorithm for designing routes through the network.

True

The signal-to-noise ratio is a good indicator of quality of service, especially over wireless telecom networks.

True

The term embedded system refers to any device that includes a computer chip, but that is not a general-purpose workstation, desktop, or laptop computer.

True

The two categories of routing protocols are interior router protocols (IRPs) and exterior router protocols (ERPs).

True

The virtual machine approach is a common way for businesses and individuals to deal with legacy applications and to optimize their hardware usage by maximizing the various kinds of applications that a single computer can handle.

True

Traffic on the Internet and enterprise networks can be divided into two broad categories: elastic and inelastic.

True

Trick mode functionalities are features of video streaming systems that mimic visual feedback given during fast-forward and rewind operations.

True

User demographics, usability, cost, content, and media quality are all key contributing factors to producing a good QoE.

True

Virtual machine enables different operating systems to run in the same computer at the same time and prevents application from interfering with each other.

True

Virtualization technologies effectively emulate or simulate a hardware platform, such as a server, storage device, or network resource, in software.

True

Whereas enterprise network convergence focuses on the consolidation of traditionally distinct voice, video, and data communications networks into a common infrastructure, ________ focuses on the integration of real-time communication services to optimize business processes.

Unified communications

________ enables multiple copies of the same or different operating system to execute on the computer and prevents applications from different virtual machines from interfering with each other.

hardware virtualization

As with SDN, success for NFV requires standards at appropriate interface reference points and open source software for commonly used functions

true

Each group table consists of a number of rows, consisting of four components: group identifier, group type, counters, and action buckets.

true

The "tail drop" technique is when the queue management discipline was to drop any incoming packets when the queue was full.

true

Wireless developments are crucial to the growth of IoT.

true

An example of a network service abstraction layer is the programming language Frenetic.

True

An increasing delay jitter is a good indicator of poor quality.

True

A machine running virtualization software can only host applications that are running on the same operating systems.

False

An abstraction layer is a mechanism that translates a high-level request into the low-level commands required to perform the request.

False

________ traffic can adjust, over wide ranges, to changes in delay and throughput across an internet and still meet the needs of its applications.

Elastic

________ is the commercial name for a wired local-area network technology.

Ethernet

A big advantage to using cloud computing to store your data and share it with others is that cloud providers do not have security failures.

False

________ is a committee of the Institute of Electrical and Electronics Engineers responsible for developing standards for wireless LANs.

IEEE 802

________ traffic does not easily adapt, if at all, to changes in delay and throughput across an internet.

Inelastic

An action set is a list of actions associated with a packet that are accumulated while the packet is processed by each table and that are executed when the packet exits the processing pipeline.

True

A dominant theme of the ________ is the embedding of short-range mobile transceivers into a wide array of gadgets and everyday items, enabling new forms of communication between people and things, and between things themselves.

Internet of Things

________ is the provision of telephone, video, and data communication services within a single network.

Network convergence

A(n) ________ is an organization that delivers communications services over a typically large geographic area and provides, maintains, and manages network equipment and networks.

Network provider

________ is the measurable end-to-end performance properties of a network service that can be guaranteed in advance by a service level agreement between a user and a service provider, so as to satisfy specific customer application requirements.

QoS

A "chip" is a single piece of semiconducting material, typically silicon, upon which electronic circuits and logic gates are fabricated.

True

A VLAN is a broadcast domain consisting of a group of end stations that are not constrained by their physical location and can communicate as if they were on a common LAN.

True

A choke packet is a control packet generated at a congested node and transmitted back to a source node to restrict traffic flow.

True

A cloud service category can include capabilities from one or more cloud capability types.

True

A flow is a sequence of packets traversing a network that share a set of header field values.

True

A high packet loss rate indicates that users sustain undoubtedly a very poor quality.

True

A single compute or network host can host multiple virtual machines, each of which can host a single VNF.

True

ALM embraces requirements management, system design, software development, and configuration management and implies an integrated set of tools for developing and controlling the project.

True

_____________ is a variety of technologies for managing computer resources by providing an abstraction layer between the software and the physical hardware.

Virtualization


Related study sets

Fundamentals of Nursing, Communication, Care 1: Communications

View Set

Stat 252- Linear Regression Multiple choice Exam

View Set

Clayton's Basic Pharmacology for Nurses Chapter 11

View Set

Test Four Unit 4 Context: Art History

View Set

Chp. 14: Somatosensory Function, Pain, Headache, and Temperature Regulation

View Set