This Portion of Computer Networking contains Computer Networking Multimedia and Quality of Service MCQs (Multiple Choice Questions and Answers).

This Section covers below lists of topics.

1 COMPRESSION
• Lossless Compression
• Lossy Compression

2 MULTIMEDIA DATA
• Text
• Image
• Video
• Audio

3 MULTIMEDIA IN THE INTERNET
• Streaming Stored Audio/Video
• Streaming Live AudioA’ideo
• Real-Time Interactive Audio/Video

4 REAL-TIME INTERACTIVE PROTOCOLS
• Rationale for New Protocols
• RTP
• RTCP
• Session Initialization Protocol (SIP)
• H.323
• SCTP

5 QUALITY OF SERVICE
• Data-Flow Characteristics
• Flow Classes
• Flow Control to Improve QoS
• Integrated Services (IntServ)
• Differentiated Services (DiffServ)

PRACTICE IT NOW TO SHARPEN YOUR CONCEPT AND KNOWLEDGE

view hide answers

1. In __________ compression, the integrity of the data _____ preserved because compression and decompression algorithms are exact inverses of each other.

  • lossless; is
  • lossless; is not
  • lossy; is
  • lossy; is not

2. Which of the following compression method is not lossless?

  • run-length coding
  • dictionary coding
  • arithmetic coding
  • predictive coding

3. Lempel Ziv Welch (LZW) method is an example of ______________.

  • run-length coding
  • dictionary coding
  • arithmetic coding
  • predictive coding

4. ______________ assigns shorter codes to symbols that occur more frequently and longer codes to those that occur less frequently.

  • run-length coding
  • dictionary coding
  • arithmetic coding
  • Huffman coding

5. In arithmetic coding the entire message is mapped to a real number in the interval _________.

  • (0, 1)
  • [0, 1]
  • [0, 1)
  • (0, 1]

6. Which of the following compression methods is considered as predictive coding?

  • DM
  • DPCM
  • LPC
  • All of the choices are correct.

7. In ________, instead of quantizing each sample separately, the differences are quantized.

  • predictive coding
  • perceptual coding
  • transfer coding
  • pulse code modulation

8. The adaptive DM (ADM) is used to solve the problem of _________ in DM.

  • a slowly growing original function
  • a fast growing original function
  • overload distortion or granular noise
  • All of the choices are correct.

9. _______ can achieve a high level of compression and is normally used in military for compressing speech. The synthesized speech, though intelligible, lacks naturalness and quality to identify the speaker.

  • LCP
  • DPCM
  • ADM
  • ADPCM

10. __________ coding is based on the science of psychoacoustics, which is the study of how people perceive sound.

  • predictive coding
  • perceptual coding
  • transfer coding
  • None of the choices are correct.

11. Which step of transform coding used in multimedia is lossy?

  • transformation step
  • quantization step
  • reverse transformation step
  • All of the choices are correct.

12. Since the square matrix that represents the DCT coefficient is an ____________ matrix, inverse and transpose are the same.

  • linear
  • square
  • orthogonal
  • symmetric

13. ____________ is used to compress images.

  • MPEG
  • JPEG
  • MPEG or JPEG
  • None of the choices are correct.

14. The first phase of JPEG compression process is ___________.

  • DCT transformation
  • quantization
  • lossless compression encoding
  • None of the choices are correct.

15. The second phase of JPEG compression process is ___________.

  • DCT transformation
  • quantization
  • lossless compression encoding
  • None of the choices are correct.

16. The third phase of JPEG is ___________.

  • DCT transformation
  • quantization
  • lossless compression encoding
  • None of the choices are correct.

17. ____________ is used to compress video.

  • MPEG
  • JPEG
  • MPEG or JPEG
  • None of the choices are correct.

18. In MPEG method, the ________ compression of each frame is done with JPEG; redundant frames are removed during _______ compression.

  • temporal; spatial
  • spatial; temporal
  • lossy; lossless
  • None of the choices are correct.

19. ________ audio/video refers to on-demand requests for compressed audio/video files.

  • Streaming live
  • Streaming stored
  • Interactive
  • None of the choices are correct.

20. ___________ audio/video refers to the broadcasting of radio and TV programs through the Internet.

  • Streaming live
  • Streaming stored
  • Interactive
  • None of the choices are correct.

21. _________ audio/video refers to the use of the Internet for interactive audio/video applications.

  • Streaming live
  • Streaming stored
  • Interactive
  • None of the choices are correct.

22. A ________ buffer is required for real-time traffic.

  • playback
  • reordering
  • sorting
  • None of the choices are correct.

23. To establish time relationship and order of the packets, a real-time traffic needs __________ on each packet

  • only a timestamp
  • only a sequence number
  • both a timestamp and a sequence number
  • None of the choices are correct

24. __________ means changing the encoding of a payload to a lower quality to match the bandwidth of the receiving network.

  • Translation
  • Mixing
  • Encoding
  • None of the choices are correct.

25. __________ means combining several streams of traffic into one stream.

  • Translation
  • Mixing
  • Encoding
  • None of the choices are correct.

26. To makeup for the lost and corrupt packets, the real-time traffic normally ____________.

  • retransmits the lost and corrupt packets
  • uses forward error correction (FEC) method
  • retransmits the whole traffic
  • None of the choices are correct.

27. A real-time video performance lasts 10 min. If there is jitter in the system, the viewer spends _______ minutes watching the performance.

  • less than 10
  • more than 10
  • exactly 10
  • None of the choices are correct.

28. A _______ shows the time a packet was produced relative to the first or previous packet.

  • timestamp
  • playback buffer
  • sequence number
  • None of the choices are correct.

29. _______ are used to number the packets of a real-time transmission.

  • Timestamps
  • Playback buffers
  • Sequence numbers
  • None of the choices are correct.

30. A _______ adds signals from different sources to create a single composite signal.

  • timestamp
  • sequence number
  • mixer
  • None of the choices are correct.

31. A _______ changes the format of a high-bandwidth video signal to a lower quality narrow-bandwidth signal.

  • timestamp
  • sequence number
  • translator
  • None of the choices are correct.

32. _____ is an application layer protocol that establishes, manages, and terminates a multimedia session.

  • SIP
  • H.323
  • RTP
  • None of the choices are correct.

33. _____ is a standard designed by ITU to allow telephones on the public telephone network to talk to computers connected to the Internet.

  • SIP
  • H.323
  • RTP
  • None of the choices are correct.

34. _____ is not suitable for interactive multimedia traffic because we cannot allow retransmission of packets.

  • TCP
  • UDP
  • RTP
  • None of the choices are correct.

35. __________ is the protocol designed to handle real-time traffic on the Internet.

  • TCP
  • UDP
  • RTP
  • None of the choices are correct.

36. ___________ is a protocol for controlling the flow and quality of data in association with RTP.

  • SIP
  • RTCP
  • H.232
  • None of the choices are correct.

37. An RTP packet is encapsulated in _______.

  • a UDP user datagram
  • a TCP segment
  • an IP datagram
  • None of the choices are correct

38. Stream Control Transmission Protocol (SCTP) is a new _____________ protocol.

  • reliable, character-oriented
  • reliable, message-oriented
  • unreliable, message-oriented
  • None of the choices are correct.

39. SCTP allows __________ service in each association.

  • only single-stream
  • multistream
  • only double-stream
  • None of the choices are correct.

40. SCTP association allows _____________ for each end.

  • only one IP address
  • multiple IP addresses
  • only two IP addresses
  • None of the choices are correct.

41. In SCTP, a data chunk is numbered using ________.

  • a TSN
  • an SI
  • an SSN
  • None of the choices are correct.

42. To distinguish between different streams, SCTP uses ___________.

  • a TSN
  • an SI
  • an SSN
  • None of the choices are correct

43. To distinguish between different data chunks belonging to the same stream, SCTP uses ___________.

  • TSNs
  • SIs
  • SSNs
  • None of the choices are correct.

44. TCP has ____________; SCTP has ____________.

  • packets; segments
  • packet; frames
  • segments; frames
  • None of the choices are correct.

45. The control information in SCTP are carried in the ________.

  • header control field
  • control chunks
  • data chunks
  • None of the choices are correct.

46. In SCTP, acknowledgment numbers are used to acknowledge _____________.

  • both data chunks and control chunks
  • only control chunks
  • only data chunks
  • None of the choices are correct

47. In an SCTP packet, control chunks come ___________ data chunks.

  • after
  • before
  • between
  • None of the choices are correct.

48. A connection in SCTP is called a(n) ____________.

  • negotiation
  • association
  • transmission
  • None of the choices are correct.

49. Which of the following is not a characteristic attributed to a data flow?

  • reliability
  • delay
  • bandwidth
  • All choices are correct

50. Which of the following method is used to improve QoS?

  • Scheduling
  • Resource reservation
  • Traffic shaping or policing
  • All choices are correct.

51. Which of the following method is a scheduling technique?

  • FIFO queuing
  • priority queuing
  • weighted fair queuing
  • All choices are correct.

52. A _______ algorithm is a policing technique that shapes bursty traffic into fixed-rate traffic by averaging the data rate, but it does not give credit to the user during idle periods.

  • leaky bucket
  • token bucket
  • priority queuing
  • weighted fair queuing

53. A _______ algorithm is a policing technique that allows bursty traffic at a regulated maximum rate and give some credits to the user during idle periods.

  • leaky bucket
  • token bucket
  • priority queuing
  • weighted fair queuing

54. Which QoS model depends heavily on resource reservation?.

  • IntServ
  • DiffServ
  • Scheduling
  • Policing

55. Integrated Services is a _______________ QoS model designed for IP.

  • flow-based
  • class-based
  • reliability-based
  • efficiency-based

56. Differentiated Services is a _______________ QoS model designed for IP.

  • flow-based
  • class-based
  • reliability-based
  • efficiency-based

57. Guaranteed services in IntServ model are required for __________ application

  • on-demand audio/video
  • stored audio/video
  • real-time
  • All choices are correct

58. Controlled-Load services in IntServ model is designed for applications that ______________________.

  • can accept some delays, but are sensitive to packet loss
  • can accept some packet loss, but are sensitive to delay
  • are sensitive to both delay and packet loss
  • are sensitive to neither delay nor packet loss

59. IntServ model is ________________________________________

  • scalable but has service type limitation.
  • scalable and does not have service type limitation.
  • not scalable and has service type limitation.
  • not scalable but does not have service type limitation.

60. To implement _________, the DS node uses _________________ such as meters, markers, shapers, and droppers

  • Diffserv; traffic conditioners
  • Diffserv; gadgets
  • IntServ; traffic conditioners
  • IntServ; gadgets

Share with : Share on Linkedin Share on Twitter Share on WhatsApp Share on Facebook