The origin and history of the sip protocol

Assignment Help Computer Engineering
Reference no: EM13753237

Question 1. ITU recommendation G. 711 is also referred to as _____

Mean Opinion Score (MOS).

Pulse Code Modulation (PCM)

Digital Signal (DS)-0 channel.

DS-1 channel.

Question 2. What's a typical amount of downtime associated with PSTN business services?
Several days per year

Several hours per year

Several minutes per year

Several seconds per year

Question 3. Which circuit-switched Private Branch Exchange (PBX) hardware allows internal phones and extensions to be connected to the PBX?

Line cards

Trunk cards

Administrative terminal

Voice mail card

Question 4. An end user of a(n) _____ uses line keys on the phone panel to select and access telephone company lines.

key system

Private Branch Exchange (PBX)

Automatic Call Distribution (ACD)

All of the above

Question 5. Which transport layer protocol is not used by voice packets in VoIP?

UDP

TCP

IP

RTP

Question 6.In the RTP header, _____ is used by the receiver to detect lost packets and to ensure that received packets are played back in proper order?

time stamp

payload type

sequence number

synchronization source identifier

Question 7. Which of the following audio codecs, in its original form, requires 64 Kbps of bandwidth?

G.728

G.711

G.723.1

G.729A

Question 8. Which of the following audio codecs, in its original form, requires the least amount of bandwidth?

G.711

G.728

G.723.1

G.729A

Question 9. Which of the following techniques help reduce VoIP bandwidth consumption?

Payload compression (e.g., G.729A)

Header compression (e.g., cRTP)

Large payload sizes

All of the above

Question 10. Which of the following VoIP equipment is typically seen in a residential environment?

Hybrid Private Branch Exchange(PBX)

VoIP server

IP Private Branch Exchange(PBX)

An IP phone that connects to a broadband router

Question 11. Which SIP method/response is typically generated to signal the end of a call session or dialog?

INVITE (INV)

Notify (NOTIFY)

Update (UP)

Goodbye (BYE)

Question 12. Which SIP method/request or response is shown below?

INVITE sip:[email protected] SIP/2.0

Via: SIP/2.0/UDP pc14.chicago.com;branch=z9hG4bK887chdhds

Max-Forwards: 70

To: John <sip:[email protected]>

From: Mary <sip:[email protected]>;tag=1982301747

Call-ID: [email protected]

CSeq: 413159 INVITE

Contact: <sip:[email protected]>

Content-Type: application/sdp

Content-Length: 142

Notify

200 OK

Acknowledgment

INVITE

Question 13. In H.323 call signaling, _____ is used for terminals to exchange capabilities and preferences such as audio and video codecs during a call setup.

H.225

SIP

H.245

RTCP

Question 14. Which of the following is not a typical function of VoIP gateways?

Converting between RTP packets and PSTN voice bit streams.

Registering terminals or User Agents (UAs).

Converting VoIP signaling and SS7 signaling on the PSTN.

Converting between different audio codecs (i.e., voice transcoding).

Question 15. Which of the following facts about Local Number Portability (LNP) is not correct?

When switching from TDM service to VoIP, subscribers don't have to give up their previous telephone numbers.

The LNP policy doesn't apply to toll-free numbers.

Cellular telephone numbers are portable under certain conditions.

LNP is only a U.S. national policy.

Question 16. Which of the following is a telephony feature that was made possible by VoIP?

Using a DID number to directly reach a local extension without an attendant.

Inviting and bridging multiple parties into a group call.

Forwarding incoming calls to a different extension or phone number.

Using a public telephone number (E.164) to receive faxes in one's private e-mail box.

Question 17. What's the name of the gateway interface/port that connects an analog phone?

Foreign Exchange Subscriber (FXS)

Foreign Exchange Office (FXO)

Direct Inward Dialing (DID)

Dual-tone Multi-frequency (DTMF)

Question 18. Which of the following is typically required to connect SIP trunks to legacy PBXs and analog phones?

Gatekeeper

Softswitch

SIP Proxy

Gateway

Question 19. 200 seconds of total holding time during the Busy Hour generates a traffic load of _____

1 Erlang.

1 CCS.

2 Erlangs.

2 CCS.

Question 20. Given that the targeted call blocking probability remains the same, which of the following PBX systems will support the least amount of traffic during the Busy Hour?

A PBX system with 24 trunk circuits.

A PBX system with 12 trunk circuits.

A PBX system with 8 trunk circuits.

A PBX system with 6 trunk circuits.

Question 21. Sending an INVITE message to every phone number on a network in search of vulnerable devices based on received responses is referred to as _____

SIP scanning.

Vishing.

High-volume calling.

Eavesdropping.

Question 22. Even if the voice traffic is encrypted, an intruder may capture and interpret _____ to discover who calls whom, when calls involve speci?c phones, and other information.

audio codecs

voice packet payloads

call signaling messages

All of the above

Question 23. Network connectivity is a(n) _____ a good user experience on VoIP services.

guarantee of

irrelevant factor of

prerequisite to

None of the above

Question 24. Which of the following is not correct about echo in a voice call?

It could be caused by acoustic feedback from a phone or headset.

It could be caused by gateways between VoIP and analog lines.

It is not "visible" in voice packets.

None of the above

Question 25. IEEE 802.1p defines eight priority classes for _____ prioritization.

layer 2

layer 3

layer 4

None of the above

Question 26. Which of the following could be an indicator of high-end desktop IP phones?

Touch screens

Monochrome displays

Navigation buttons

Speakers

Question 27. Having a third-party assume all PBX management responsibilities is referred to as a(n) _____ solution.

hybrid PBX

hosted PBX

on-site PBX

IP PBX

Question 28. What does this formula calculate?

(the expected returns from a project - the cost of implementing a project) / the amount of time required to complete the project.
Call For Proposal (CFP)

Payback time period

Total Cost of Ownership (TCO)

Return on Investment (ROI)

Question 1. ABC Inc. replaced its legacy circuit-switched PBX with an SIP-based VoIP system on its Ethernet LAN. When capturing and observing voice packets using Wireshark, which header contains the sequence number and time stamp information needed for playing back the audio at the receiving end? Describe, in one paragraph, how the sequence number and time stamp are used to for this purpose.

Question 2. The IT department of ABC Inc. decides to use the G. 711 codec on its local VoIP telephony network. What's the payload bit rate of G. 711? What does the payload bit rate mean? Explain, in one paragraph, how increasing and reducing the payload size of voice packets affects the required bandwidth per VoIP conversation, respectively.

Question 3. Explain, in a couple of paragraphs, the origin and history of the SIP protocol and the H.323 protocol suite. What are the most noticeable characteristics of each? What are some of their cons?

Question 4. Explain, in one paragraph, layer 2 prioritization and its priority classes. Explain, in one paragraph, layer 3 prioritization and its precedence levels. If a company plans to switch to VoIP, what should the IT department look for in the switches and routers on its network?

Question 5. Use the Erlangs and VoIP Bandwidth Calculator at https://www.erlang.com/calculator/eipb/ to complete the following question.

ABC Inc. is planning to lease a 512 Kbps frame relay connection between two PBXs from two branch locations. The audio codec used on the trunk is G.729A with a 20-millisecond packet duration. Assume the targeted call blocking probability for ABC Inc. is 1% (i.e., 0.01). How much traffic volume/load (in Erlangs) can this trunk support?

120 call attempts, with an average call duration of 10 minutes during the Busy Hour have been observed on the connection. What's the current traffic volume/load (in Erlangs) on this trunk connection? Compare the current traffic volume/load to the supported traffic volume/load calculated above. Does the frame relay trunk have enough capacity to support the current traffic volume/load?

Question 6. ABC Inc. is re-evaluating the end-to-end delay budget of its cross-country VoIP services. In one paragraph, name at least two components (i.e., devices or processes) that contribute to the end-to-end latency budget.

Suggest, in one paragraph, two methods that could help ABC Inc. reduce the end-to-end delay of its cross-country VoIP services.

Reference no: EM13753237

Questions Cloud

Examples of application layer protocols : Examples of application layer protocols and Cables and wireless transmissions are part of what OSI layer
Nformation security implementation plan : The paper will be an information security implementation plan that addresses: physical security, authentication, network security, encryption, software development, email, Internet, acceptable use, disaster recover, business continuity security aw..
Expected level of sales for the year : Griswold Electronics expects sales next year to be $3,000,000 if the economy is strong, $1,200,000 if the economy is steady, and $800,000 if the economy is weak. The Griswold's are predicting a 35% probability the economy will be strong, a 50% pro..
Provide specific details from the sargent family painting : Provide specific details from The Sargent family painting or personal diaries and clearly explain how these specific details illustrate your points.
The origin and history of the sip protocol : Explain, in a couple of paragraphs, the origin and history of the SIP protocol and the H.323 protocol suite. What are the most noticeable characteristics of each. What are some of their cons
Define operational excellence : Define operational excellence. How can information systems help achieve it
How can ehr systems reduce cost and increase quality of care : How can EHR systems reduce cost and increase quality of care and Why has EHR adoption been so slow? Why did the early systems fail
Prepare a business plan for an it firm : Prepare a business plan for an IT Firm
Feature of object-oriented programming : Use the Internet or Strayer databases to research the advantages, features, and common examples of OOP and EDP. Describe at least one (1) feature of object-oriented programming that Visual Logic lacks

Reviews

Write a Review

Computer Engineering Questions & Answers

  Create an array of pointers to objects of class real estate

A file should be used to store the data once all of the objects are created. There should be 5 objects in the real estate program.

  How to write a program "oneway"

Write down a program "oneway" which implements a one-way communication between a parent process and it's child using a pipe.

  Questionwrite down an account class which represents a

questionwrite down an account class which represents a saint anselm college bank account with basic service such as

  Define what a cache is and what its purpose

define what a cache is and what its purpose is. Also describe what data gets placed into the cache, and when it is put there.

  Write down an mdi application, using visual basic.net

You have been commissioned to write an MDI application, using Visual Basic.NET, for the new Clothing Store.

  Write down a java program, which build a binary tree

Write down a java program, which build a binary tree

  Manufacturers are continuously releasing firm-ware upgrades

manufacturers are continuously releasing firmware upgrades for their products. if you were the manager of a wlan how

  Use the web to research and evaluate security products from

in a two-page apa formatted paper provide analysis answering the followinguse the web to research and evaluate security

  Discuss how 80x86 procedures can be called

Discuss how 80x86 procedures can be called from high-level programs or high-level procedures.

  How to assemble and debug the problem

Write down a program using the mov instruction to produce the following results. Assemble and debug the problem.

  Determine which company the customer could buy each item

Design a polynomial time algorithm to determine which company the customer could buy each item from to minimize her total cost.

  Bit binary counter utilizing ltl.

State the three bit counter utilizing the LTL. The following are the properties we may wish to try and prove are valid given the specification of the three bit counter. Eventually the counter reaches 111.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd