ZBLOG

Question 29 In the Aloha protocol, the vulnerability period is … At the start of a packet transmission only. When the sender waits for an acknowledgement After a packet arrives at the receiver Any time a transmission is taking place Question 30 ...

Question 29 In the Aloha protocol, the vulnerability period is … D. Any time a transmission is taking place

Question 30 In Go-Back-N, the receiver window indicates B. The packet ID the receiver is expecting to receive

Question 31 In a constellation diagram, each symbol can be indexed using C. I and Q components

Question 32 A network is using stop-and-wait flow control. If it takes 10ms to transmit a packet and receive an acknowledgement, how long will transmitting 7 packets take? Assume no errors or lost packets. 80ms

Question 33 Which of the following is not a function of the data link layer? C. Modulation

Question 34 A system uses FSK where ones are represented by 4 cycles of a sine wave, with each cycle having period of 10 (s). What is the bit rate? 25 kbps

Question 35 Assume five nodes are connected in a mesh topology. How many cables are required? 10

Question 36 In the context of convolutional code, what does 13 mean? B. Each data bit produces 3 bits

Question 37 A machine is using convolutional code. Does it send data bits over the channel? No

Question 38 What is the difference between linear block codes, e.g., Hamming, and convolutional code? B. Convolutional code works on a stream of bits continuously

本站部分文章来源于网络,版权归原作者所有,如有侵权请联系站长删除。
转载请注明出处:https://sdn.0voice.com/?id=1160

分享:
扫描分享到社交APP
上一篇
下一篇
发表列表
游客 游客
此处应有掌声~
评论列表

还没有评论,快来说点什么吧~

联系我们

在线咨询: 点击这里给我发消息

微信号:3007537140

上班时间: 10:30-22:30

关注我们
x

注册

已经有帐号?