Wireless Networks and Mobile Computing Mid - I, September - 2014

1._____________ is used for allocating separated space to users in wireless networks.
  • SDMA
  • TDMA
  • FDMA
  • CDMA
Answer: A
2.An example for explicit reservation scheme is ____________.
  • CSMA
  • PRMA
  • DAMA
  • DAMA
Answer: C
3.Request to send (RTS) contains _________________.
  • Name of the sender
  • Name of the receiver
  • Length of the future transmission
  • All of the above
Answer: D
4.___________ packets are used for registration requests.
  • TCP
  • HTTP
  • FTP
  • UDP
Answer: D
5.__________ allows encapsulation of packets of one protocol suite into the payload portion of a packet of another protocol suite.
  • IP-in-IP encapsulation
  • Minimal encapsulation
  • Generic routing encapsulation(GRE)
  • All of the above
Answer: C
6.__________ Protocol is used to simplify the installation and maintenance of networked computers.
  • FTP
  • TCP
  • UDP
  • DHCP
Answer: D
7.In __________ approach foreign agent inspects packet flow in both directions to recognize acknowledgements.
  • Indirect-TCP
  • Snooping TCP
  • Mobile TCP
  • None of the above
Answer: B
8.__________ is adapted to the problems arising from lengthy and frequent disconnections.
  • Indirect-TCP
  • Snooping TCP
  • Mobile TCP
  • None of the above
Answer: C
9.__________ can combine packets for connection establishment and connection release packets with user data packets.
  • Indirect-TCP
  • Snooping TCP
  • Mobile TCP
  • Transaction-oriented TCP
Answer: D
10.In bluetooth all active devices are assigned ________ active member address.
  • 1-bit
  • 2-bit
  • 3-bit
  • 4-bit
Answer: C
11.Each piconet has exactly one master and up to ______________ simultaneous slaves.
Answer: 7
12.The two different types of links offered by bluetooth are ______________ and _____________.
Answer: Synchronous connection oriented(SCO), asynchronous connectionless(ACL)
13.Non-transparent bearer services implements _____________ and _____________.
Answer: Error correction, flow control
15.Hidden terminals cause _______________.
Answer: Collisions
16.Demand assigned multiple access (DAMA) is also called as _______________.
Answer: Reservation aloha
17.The two different possible care of addresses are ______________ and _____________.
Answer: Foreign agent , Co-located
18.Foreign agents and home agents advertise their presence periodically through __________ messages.
Answer: Agent advertisement
19.Taking a packet consisting of packet header and data and putting into the data part of a new packet is called as ______________.
Answer: Encapsulation
20.In ______________ wireless networks, communication takes place between wireless nodes and access point, but not directly between wireless nodes.
Answer: Infrastructure-based