Question 29 In the Aloha protocol, the vulnerability period is … D. Any time a transmission is taking place
Question 30 In Go-Back-N, the receiver window indicates B. The packet ID the receiver is expecting to receive
Question 31 In a constellation diagram, each symbol can be indexed using C. I and Q components
Question 32 A network is using stop-and-wait flow control. If it takes 10ms to transmit a packet and receive an acknowledgement, how long will transmitting 7 packets take? Assume no errors or lost packets. 80ms
Question 33 Which of the following is not a function of the data link layer? C. Modulation
Question 34 A system uses FSK where ones are represented by 4 cycles of a sine wave, with each cycle having period of 10 (s). What is the bit rate? 25 kbps
Question 35 Assume five nodes are connected in a mesh topology. How many cables are required? 10
Question 36 In the context of convolutional code, what does 1⁄3 mean? B. Each data bit produces 3 bits
Question 37 A machine is using convolutional code. Does it send data bits over the channel? No
Question 38 What is the difference between linear block codes, e.g., Hamming, and convolutional code? B. Convolutional code works on a stream of bits continuously