This Portion of Computer Networking contains Computer Networking Multimedia and Quality of Service MCQs (Multiple Choice Questions and Answers).
This Section covers below lists of topics.
1 COMPRESSION
• Lossless Compression
• Lossy Compression
2 MULTIMEDIA DATA
• Text
• Image
• Video
• Audio
3 MULTIMEDIA IN THE INTERNET
• Streaming Stored Audio/Video
• Streaming Live AudioA’ideo
• Real-Time Interactive Audio/Video
4 REAL-TIME INTERACTIVE PROTOCOLS
• Rationale for New Protocols
• RTP
• RTCP
• Session Initialization Protocol (SIP)
• H.323
• SCTP
5 QUALITY OF SERVICE
• Data-Flow Characteristics
• Flow Classes
• Flow Control to Improve QoS
• Integrated Services (IntServ)
• Differentiated Services (DiffServ)
1. In __________ compression, the integrity of the data _____ preserved because compression and decompression algorithms are exact inverses of each other.
- lossless; is
- lossless; is not
- lossy; is
- lossy; is not
2. Which of the following compression method is not lossless?
- run-length coding
- dictionary coding
- arithmetic coding
- predictive coding
3. Lempel Ziv Welch (LZW) method is an example of ______________.
- run-length coding
- dictionary coding
- arithmetic coding
- predictive coding
4. ______________ assigns shorter codes to symbols that occur more frequently and longer codes to those that occur less frequently.
- run-length coding
- dictionary coding
- arithmetic coding
- Huffman coding
5. In arithmetic coding the entire message is mapped to a real number in the interval _________.
- (0, 1)
- [0, 1]
- [0, 1)
- (0, 1]
6. Which of the following compression methods is considered as predictive coding?
- DM
- DPCM
- LPC
- All of the choices are correct.
7. In ________, instead of quantizing each sample separately, the differences are quantized.
- predictive coding
- perceptual coding
- transfer coding
- pulse code modulation
8. The adaptive DM (ADM) is used to solve the problem of _________ in DM.
- a slowly growing original function
- a fast growing original function
- overload distortion or granular noise
- All of the choices are correct.
9. _______ can achieve a high level of compression and is normally used in military for compressing speech. The synthesized speech, though intelligible, lacks naturalness and quality to identify the speaker.
- LCP
- DPCM
- ADM
- ADPCM
10. __________ coding is based on the science of psychoacoustics, which is the study of how people perceive sound.
- predictive coding
- perceptual coding
- transfer coding
- None of the choices are correct.
11. Which step of transform coding used in multimedia is lossy?
- transformation step
- quantization step
- reverse transformation step
- All of the choices are correct.
12. Since the square matrix that represents the DCT coefficient is an ____________ matrix, inverse and transpose are the same.
- linear
- square
- orthogonal
- symmetric
13. ____________ is used to compress images.
- MPEG
- JPEG
- MPEG or JPEG
- None of the choices are correct.
14. The first phase of JPEG compression process is ___________.
- DCT transformation
- quantization
- lossless compression encoding
- None of the choices are correct.
15. The second phase of JPEG compression process is ___________.
- DCT transformation
- quantization
- lossless compression encoding
- None of the choices are correct.
16. The third phase of JPEG is ___________.
- DCT transformation
- quantization
- lossless compression encoding
- None of the choices are correct.
17. ____________ is used to compress video.
- MPEG
- JPEG
- MPEG or JPEG
- None of the choices are correct.
18. In MPEG method, the ________ compression of each frame is done with JPEG; redundant frames are removed during _______ compression.
- temporal; spatial
- spatial; temporal
- lossy; lossless
- None of the choices are correct.
19. ________ audio/video refers to on-demand requests for compressed audio/video files.
- Streaming live
- Streaming stored
- Interactive
- None of the choices are correct.
20. ___________ audio/video refers to the broadcasting of radio and TV programs through the Internet.
- Streaming live
- Streaming stored
- Interactive
- None of the choices are correct.
21. _________ audio/video refers to the use of the Internet for interactive audio/video applications.
- Streaming live
- Streaming stored
- Interactive
- None of the choices are correct.
22. A ________ buffer is required for real-time traffic.
- playback
- reordering
- sorting
- None of the choices are correct.
23. To establish time relationship and order of the packets, a real-time traffic needs __________ on each packet
- only a timestamp
- only a sequence number
- both a timestamp and a sequence number
- None of the choices are correct
24. __________ means changing the encoding of a payload to a lower quality to match the bandwidth of the receiving network.
- Translation
- Mixing
- Encoding
- None of the choices are correct.
25. __________ means combining several streams of traffic into one stream.
- Translation
- Mixing
- Encoding
- None of the choices are correct.
26. To makeup for the lost and corrupt packets, the real-time traffic normally ____________.
- retransmits the lost and corrupt packets
- uses forward error correction (FEC) method
- retransmits the whole traffic
- None of the choices are correct.
27. A real-time video performance lasts 10 min. If there is jitter in the system, the viewer spends _______ minutes watching the performance.
- less than 10
- more than 10
- exactly 10
- None of the choices are correct.
28. A _______ shows the time a packet was produced relative to the first or previous packet.
- timestamp
- playback buffer
- sequence number
- None of the choices are correct.
29. _______ are used to number the packets of a real-time transmission.
- Timestamps
- Playback buffers
- Sequence numbers
- None of the choices are correct.
30. A _______ adds signals from different sources to create a single composite signal.
- timestamp
- sequence number
- mixer
- None of the choices are correct.
31. A _______ changes the format of a high-bandwidth video signal to a lower quality narrow-bandwidth signal.
- timestamp
- sequence number
- translator
- None of the choices are correct.
32. _____ is an application layer protocol that establishes, manages, and terminates a multimedia session.
- SIP
- H.323
- RTP
- None of the choices are correct.
33. _____ is a standard designed by ITU to allow telephones on the public telephone network to talk to computers connected to the Internet.
- SIP
- H.323
- RTP
- None of the choices are correct.
34. _____ is not suitable for interactive multimedia traffic because we cannot allow retransmission of packets.
- TCP
- UDP
- RTP
- None of the choices are correct.
35. __________ is the protocol designed to handle real-time traffic on the Internet.
- TCP
- UDP
- RTP
- None of the choices are correct.
36. ___________ is a protocol for controlling the flow and quality of data in association with RTP.
- SIP
- RTCP
- H.232
- None of the choices are correct.
37. An RTP packet is encapsulated in _______.
- a UDP user datagram
- a TCP segment
- an IP datagram
- None of the choices are correct
38. Stream Control Transmission Protocol (SCTP) is a new _____________ protocol.
- reliable, character-oriented
- reliable, message-oriented
- unreliable, message-oriented
- None of the choices are correct.
39. SCTP allows __________ service in each association.
- only single-stream
- multistream
- only double-stream
- None of the choices are correct.
40. SCTP association allows _____________ for each end.
- only one IP address
- multiple IP addresses
- only two IP addresses
- None of the choices are correct.
41. In SCTP, a data chunk is numbered using ________.
- a TSN
- an SI
- an SSN
- None of the choices are correct.
42. To distinguish between different streams, SCTP uses ___________.
- a TSN
- an SI
- an SSN
- None of the choices are correct
43. To distinguish between different data chunks belonging to the same stream, SCTP uses ___________.
- TSNs
- SIs
- SSNs
- None of the choices are correct.
44. TCP has ____________; SCTP has ____________.
- packets; segments
- packet; frames
- segments; frames
- None of the choices are correct.
45. The control information in SCTP are carried in the ________.
- header control field
- control chunks
- data chunks
- None of the choices are correct.
46. In SCTP, acknowledgment numbers are used to acknowledge _____________.
- both data chunks and control chunks
- only control chunks
- only data chunks
- None of the choices are correct
47. In an SCTP packet, control chunks come ___________ data chunks.
- after
- before
- between
- None of the choices are correct.
48. A connection in SCTP is called a(n) ____________.
- negotiation
- association
- transmission
- None of the choices are correct.
49. Which of the following is not a characteristic attributed to a data flow?
- reliability
- delay
- bandwidth
- All choices are correct
50. Which of the following method is used to improve QoS?
- Scheduling
- Resource reservation
- Traffic shaping or policing
- All choices are correct.
51. Which of the following method is a scheduling technique?
- FIFO queuing
- priority queuing
- weighted fair queuing
- All choices are correct.
52. A _______ algorithm is a policing technique that shapes bursty traffic into fixed-rate traffic by averaging the data rate, but it does not give credit to the user during idle periods.
- leaky bucket
- token bucket
- priority queuing
- weighted fair queuing
53. A _______ algorithm is a policing technique that allows bursty traffic at a regulated maximum rate and give some credits to the user during idle periods.
- leaky bucket
- token bucket
- priority queuing
- weighted fair queuing
54. Which QoS model depends heavily on resource reservation?.
- IntServ
- DiffServ
- Scheduling
- Policing
55. Integrated Services is a _______________ QoS model designed for IP.
- flow-based
- class-based
- reliability-based
- efficiency-based
56. Differentiated Services is a _______________ QoS model designed for IP.
- flow-based
- class-based
- reliability-based
- efficiency-based
57. Guaranteed services in IntServ model are required for __________ application
- on-demand audio/video
- stored audio/video
- real-time
- All choices are correct
58. Controlled-Load services in IntServ model is designed for applications that ______________________.
- can accept some delays, but are sensitive to packet loss
- can accept some packet loss, but are sensitive to delay
- are sensitive to both delay and packet loss
- are sensitive to neither delay nor packet loss
59. IntServ model is ________________________________________
- scalable but has service type limitation.
- scalable and does not have service type limitation.
- not scalable and has service type limitation.
- not scalable but does not have service type limitation.
60. To implement _________, the DS node uses _________________ such as meters, markers, shapers, and droppers
- Diffserv; traffic conditioners
- Diffserv; gadgets
- IntServ; traffic conditioners
- IntServ; gadgets