Different common applications for unified messaging

Assignment Help Computer Networking
Reference no: EM13803986

Question 1. Identify the merger of legacy-based TDM architecture with packet-switching

technology and call-control intelligence.

Telecommunication convergence

Analog convergence

Digital convergence

DSL and cable telecommunication convergence

Question 2.  Choose the mechanism(s) for sending RAS messages using RAS channel over UDP.

 

Retry counts

Timeout

Timeout and retry counts

Timeout, TTL, and retry counts

Question 3.  Construct a 1.536 Mbps T1 link. 

24 Channels

32 Channels

Fractional Channels

CAS

Question 4.  Identify how IP telephones access their media controllers. 

IP telephones access their media controllers through a hub.

IP telephones access their media controllers through a bridge.

IP telephones access their media controllers through a switched bridge.

IP telephones access their media controllers through a switched IP connection.

Question 5.  An MCU may control three different conference types; please identify them.

Centralized, decentralized, mobile

Mobile, centralized, decentralized

Centralized, mobile, decentralized

Centralized, decentralized, mixed

Question 6.  Identify the cause of packet delay. 

It is not the time it takes a packet to traverse the network.

It is the time it takes a packet to traverse a router.

It is the time it takes a packet to traverse the network.

It is the time it takes a packet to traverse a switch.

Question 7.  Which of the following characteristics are not common to circuit-switched networks? Store and forward transmission

Dedicated bandwidth

Potentially wasted bandwidth

Each packet follows the same route

Question 8.  Explain why G.711 is used in LANs. 

There is quite a bit of bandwidth in a LAN and it is not expensive.

There is not much bandwidth in a LAN and it is not expensive.

There is quite a bit of bandwidth in a LAN and it is expensive.

There is not much bandwidth in a LAN and it is expensive.

Question 9.  Select the codec that is most appropriate for limited bandwidth WANs. 

G.711

G.741

G.729

G.735

Question 10.  Describe the three main ways of powering an IP telephone. 

Local power, powered AC patch panels, inline power

Local AC power, powered patch panels, inline power

Local power, powered patch panels, online power

Local power, powered patch panels, inline power

1.  Select the IEEE standard that defines the application of power to IP telephones through the UTP

wiring. 

802.3af

802.11

802.13

802.4ab

Question 2.  Identify the IEEE specifications that will support QoS on WLAN. 

IEEE802.11e

IEEE802.11a

IEEE802.11b

IEEE802.11g

Question 3.  Identify a very weak encryption system that is sometimes used in wireless networks.

 

WAP

TKIP

WEP

AES

Question 4.  Identify the document that specifies the requirements for mobile node to use two IP addresses. 

RFC 2001

RFC 2003

RFC 2002

RFC 2004

Question 5.  What protocol is commonly used to allow integration between the softphone and the corporate directory? 

LDPD

LPAD

LAPD

LDAP

Question 6.  What do we call frames that are implemented with 802.1p? 

Switched frames

Tagged frames

LAN frames

Untagged frames

Question 7.  What is the maximum delay that is considered acceptable for voice traffic?

250 ms

300 ms

100 ms

150 ms

Question 8.  Identify the function of an SIP User Agent. 

An SIP User Agent places calls using IP address or e-mail-like addressing.

An SIP User Agent places calls using E.164 or IP address.

An SIP User Agent places calls using neither E.164 nor e-mail-like addressing.

An SIP User Agent places calls using E.164 or e-mail-like style.

Question 9.  SNMP uses the ______ protocol to the Transport Layer. 

TCP

UDP

MIB

RTP

Question 10.  TKIP provides a ______solution to the problems found in WEP. 

worse

add-on

interim

permanent

Question 1.  Explain five different common applications for unified messaging. 

Question 2.  Describe the purpose of a Multipoint Conferencing Unit (MCU). 

Question 3.  Describe jitter in a network. 

Question 4.  Explain the function of communications protocols. 

Question 5.  Explain the DiffServ objective.

Reference no: EM13803986

Questions Cloud

Secure storage and retrieval process for healthcare data : Formulate a secure storage and retrieval process for healthcare data. Create a PowerPoint that highlights each of the topics below: Databases, Data dictionaries, data mining, and data warehouses and Characteristics of data quality
Semi-annual bond with a coupon rate : XYZ has just sold a callable bond. The bond is a thirty year semi-annual bond with a coupon rate of 8%. Investors, however, can call the bond starting at the end of ten years. If the yield-to-call on this bond is 10% and the call requires XYZ to pay ..
Explain how u.s. citizens are exposed to political actors : The media does have a very significant role in how U.S. citizens are exposed to political actors, policies, and processes that comprise American government.
Sole owner of all-equity firm-debt is secured by the firm : Suppose that you are the sole owner of an all-equity firm, the assets of which are worth $500,000. The ROA is 15% per year paid as a dividend to you. If you have the firm issue $100,000 of debt at 6%, the interest expense will be paid by the firm out..
Different common applications for unified messaging : Explain five different common applications for unified messaging - Describe the purpose of a Multipoint Conferencing Unit (MCU) and Describe jitter in a network.
Demand for ready-made : Over the past few decades, a sizable industry has arisen to serve the demand for ready-made and even customized compositions and term papers.
How much tax deduction you would be entitled to : Suppose that you are the sole owner of an all-equity firm, the assets of which are worth $500,000. The tax rate is 34%. If you have the firm issue $100,000 of debt at 6%, how much tax deduction you would be entitled to?
Calculate the required return on equity for this firm : A firm has 500,000 shares of stock outstanding with a par value of $1 per share and debt outstanding with a par value of $1,000,000. The stock is selling for $10 per share, and the debt is selling at a discount (90% of par). If the firm were financed..

Reviews

Write a Review

Computer Networking Questions & Answers

  Define high-performance network

The company wants to upgrade to a high-performance network and has asked you to suggest considerations needed to alter its infrastructure.

  Suppose that you are planning web server computer capacity

assume you are planning web server computer capacity for a business that has 5000 business customers and sells about

  Database administrator role

Information professionals with adequate skills are required to maintain the business continuity of database services in an organization. Identify and assess at least three professional skills that would be required to be successful database admini..

  Describe link-state and distance-vector routing compare and

as a lead network administrator you need to review a few things with your team before implementing the next phase of

  Document risk event-impact-probability and impact

Identify the top three risks in this situation. For each risk, document its risk event, impact, probability, impact rating/risk exposure, and mitigation strategy.

  Question 1nbspnbspnbsp what rc4 key value will completely

question 1.nbspnbspnbsp what rc4 key value will completely invert s after the initial permutation so that s0 255 s1

  Question 1ai differentiate between denial of service attack

question 1ai differentiate between denial of service attack dos and distributed denial of service ddos attack.ii give

  Determine possible routing paths in bgp routing table

In the topology, network S is multi-homed to four providers, i.e., P1, P2, P3 and P4, where P1, P2 and P3 are customers of common provider P while P4 is customer. Now assume D is destination of interest. Determine the possible routing paths to D th..

  What are the inter-dependencies of workstation hardwares

what are the inter-dependencies of workstation hardwares with network components.

  Discuss cots systems

Write a report on the infrastructure needs for such a data warehouse. Discuss COTS systems and data warehouse architectures that would be applicable in such a context.

  Segment network to reduce scope of compliance

To avoid having whole network subject to PCI specifications, how will you segment network to reduce scope of compliance?

  Circuit packet switching and vpns

Circuit Packet Switching and VPNs-From the e-Activity, analyze at least one major advantage of private networks and the impact it creates for a communication technology organization. Be sure to provide your source either as an article or URL

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd