A point-to-point topology consists of a dedicated long-range, high-capacity wireless link between two sites. This topology is used for high-bandwidth wireless backhaul services at maximum operating ranges using either LOS or NLOS signal propagation. It uses a backhaul as a high-capacity line from a remote site or network to a central site or network.
A point-to-multipoint topology is composed of a central BS supporting multiple SSs, providing network access from one location to many locations. It is commonly used for last-mile broadband access, private enterprise connectivity to remote offices, and long-range wireless backhaul services for multiple sites. Last-mile broadband access refers to communications technology that bridges the transmission distance between the broadband service provider and the customer premises equipment.
A multihop relay topology, also referred to as mesh networking, is used to extend a BS’s coverage area by permitting SSs or MSs to replay traffic by acting as a relay station.
82. Which of the following worldwide interoperability for microwave access (WiMAX) operating topologies uses a concept of security zone?
a. Point-to-point
b. Point-to-multipoint
c. Multihop relay
d. Mobile
A point-to-point topology consists of a dedicated long-range, high-capacity wireless link between two sites. This topology is used for high-bandwidth wireless backhaul services at maximum operating ranges using either line-of-sight (LOS) or no-line-of-sight (NLOS) signal propagation. It uses a backhaul as a high-capacity line from a remote site or network to a central site or network.
A point-to-multipoint topology is composed of a central BS supporting multiple SSs, providing network access from one location to many locations. It is commonly used for last-mile broadband access, private enterprise connectivity to remote offices, and long-range wireless backhaul services for multiple sites. Last-mile broadband access refers to communications technology that bridges the transmission distance between the broadband service provider and the customer premises equipment.
A mobile topology is similar to a cellular network because multiple BSs collaborate to provide seamless communications over a distributed network to both SSs and MSs.
83. Which of the following is a detective control in a local-area network (LAN) environment?
a. File backup
b. Contingency plan
c. Electronic surveillance
d. Locks and keys
84. Which of the following establishes accountability in a local-area network environment?
a. Network monitoring tools
b. Access logs
c. Lock and key systems
d. Card key systems