Wireless Networks and Mobile Computing Mid - I, September - 2014
1._____________ is used for allocating separated space to users in wireless networks.
-
SDMA
-
TDMA
-
FDMA
-
CDMA
-
Answer: A
2.An example for explicit reservation scheme is ____________.
-
CSMA
-
PRMA
-
DAMA
-
DAMA
-
Answer: C
3.Request to send (RTS) contains _________________.
-
Name of the sender
-
Name of the receiver
-
Length of the future transmission
-
All of the above
-
Answer: D
4.___________ packets are used for registration requests.
-
TCP
-
HTTP
-
FTP
-
UDP
-
Answer: D
5.__________ allows encapsulation of packets of one protocol suite into the payload portion of a packet of another protocol suite.
-
IP-in-IP encapsulation
-
Minimal encapsulation
-
Generic routing encapsulation(GRE)
-
All of the above
-
Answer: C
6.__________ Protocol is used to simplify the installation and maintenance of networked computers.
-
FTP
-
TCP
-
UDP
-
DHCP
-
Answer: D
7.In __________ approach foreign agent inspects packet flow in both directions to recognize acknowledgements.
-
Indirect-TCP
-
Snooping TCP
-
Mobile TCP
-
None of the above
-
Answer: B
8.__________ is adapted to the problems arising from lengthy and frequent disconnections.
-
Indirect-TCP
-
Snooping TCP
-
Mobile TCP
-
None of the above
-
Answer: C
9.__________ can combine packets for connection establishment and connection release packets with user data packets.
-
Indirect-TCP
-
Snooping TCP
-
Mobile TCP
-
Transaction-oriented TCP
-
Answer: D
10.In bluetooth all active devices are assigned ________ active member address.
-
1-bit
-
2-bit
-
3-bit
-
4-bit
-
Answer: C
11.Each piconet has exactly one master and up to ______________ simultaneous slaves.
Answer: 7
12.The two different types of links offered by bluetooth are ______________ and _____________.
Answer: Synchronous connection oriented(SCO), asynchronous connectionless(ACL)
13.Non-transparent bearer services implements _____________ and _____________.
Answer: Error correction, flow control
15.Hidden terminals cause _______________.
Answer: Collisions
16.Demand assigned multiple access (DAMA) is also called as _______________.
Answer: Reservation aloha
17.The two different possible care of addresses are ______________ and _____________.
Answer: Foreign agent , Co-located
18.Foreign agents and home agents advertise their presence periodically through __________ messages.
Answer: Agent advertisement
19.Taking a packet consisting of packet header and data and putting into the data part of a new packet is called as ______________.
Answer: Encapsulation
20.In ______________ wireless networks, communication takes place between wireless nodes and access point, but not directly between wireless nodes.
Answer: Infrastructure-based