Professional Documents
Culture Documents
MTCS 202 WMN QB
MTCS 202 WMN QB
Department of CSE
Year/Semester: I/II
------------------------------------------------------------------------------------------------
Q3. Which type of message cannot be sent with the help of paging system?
a) Alphanumeric message
b) Video message
c) Voice message
d) Numeric message
Q7. Which of the following properties describes the transmitters and receivers in paging
system?
a) High complexity and high power transmitter, high complexity and high power receivers
b) Low complexity and low power transmitter, low complexity and low power receivers
c) Low complexity and low power transmitter, high complexity and high power receivers
d) High complexity and high power transmitter, low complexity and low power receivers
Q10. Which of the following is a protocol used for cordless telephone system?
a) PACS
b) ERMES
c) IS-95
d) FLEX
Q17. Cordless telephone system will not work under which of the following criteria?
a) Within a home
b) Within a building
c) Within campus
d) Within a city
Q21 Who has the responsibility of billing and system maintenance function in cellular
system?
a) Base Station
b) PSTN
c) MSC
d) Mobile system
Q23. Which two channels are responsible for initiating mobile calls?
a) FVC and FCC
b) FVC and RVC
c) FCC and RCC
d) FCC and RVC
Q24. Of the total channels present in the cellular system, what is the percentage of voice
and control channels?
a) 95% voice channels, 5% control channels
b) 5% voice channels, 95% control channels
c) 50% voice channels, 50% control channels
d) 25% voice channels, 75% control channels
Q26. What is transmitted along with the call initiation request during the origin of call
by a mobile?
a) MIN
b) ESN
c) ESN and SCM
d) MIN, ESN and SCM
Q28. What is the shape of the cell present in the cellular system?
a) Circular
b) Square
c) Hexagonal
d) Triangular
Q29. Why the size of the cell is kept small in cellular network?
a) Increase capacity
b) Decrease capacity
c) Increased size of base station electronics
d) Slow process of handoffs
Q32. The process of transferring a mobile station from one base station to another is
____________
a) MSC
b) Roamer
c) Handoff
d) Forward channel
Q35.What port is a fast connection that is more flexible than traditional serial and
parallel ports?
(A) Serial
(B) USB
(C) Parallel
(D) Ethernet
Q37. What type of cable uses light waves to carry information at high speed?
(A) Cable modems
(B) Fiber-optic cables
(C) Wireless cables
(D) Phone lines
Q39. Which of the following is a protocol used for cordless telephone system?
(A) PACS
(B) ERMES
(C) IS-95
(D) FLEX
Q42. What is the name of 300 MHz of unlicensed spectrum allocated by FCC in ISM
band?
(A) UNII
(B) Unlicensed PCS
(C) Millimetre wave
(D) Bluetooth
Q43. In fixed channel assignment strategy, each cell is allocated a predetermined set of
______
(A) Voice channels
(B) Control channels
(C) Frequency
(D) Base stations
Q44. What happen to a call-in fixed channel strategy, if all the channels in a cell are
occupied?
(A) Queued
(B) Cross talk.
(C) Blocked
(D) Delayed
Q46. In dynamic channel assignment strategy, base station requests channel from
________
(A) MSC
(B) Neighbouring cell
(C) Neighbouring cluster
(D) Neighbouring base station
Answer: A
Q49. Cellular concept replaces many low power transmitters to a single high power
transmitter.
a) True
b) False
Q50. HSCSD allows single users _____________in order to obtain higher speed data
access over the GSM network.
a) to use one specific time slot
b) to use consecutive user time slots
c) by using 8-PSK modulation technique
d) to use individual time slot
ANSWER KEY:
Unit-1
1. b Simplex
Explanation: Simplex systems communicate in only one way. For the paging
systems, messages received are not acknowledged and thus they use simplex mode
of transmission.
2. d Page
Explanation: Page is concise information sent by a paging system to the
subscribers of entire service area.
3. b Video message
Explanation: The message sent by a paging system can be numeric, alphanumeric
or voice depending upon the type of service.
4. c A toll free telephone number
Explanation: Paging access number is a telephone number which is used to send
the information to the subscriber.
5. a Simulcasting
Explanation: Simulcast is a reliable technique used by paging system by
transmitting the same paging signal from multiple paging transmitters at
approximately equal times.
6. c High cost
Explanation: One of the main reasons for the increased users of paging system was
its less cost. But as the prices of cellular system declined, the users of paging system
also decreased.
7. D High complexity and high power transmitter, low complexity and low power
receivers
Explanation: High power of transmitters helps paging signal to easily penetrate the
building and low power receivers allow long usage time and light weight batteries.
8. b A receiver
Explanation: A pager is a wireless device which receives the page, i.e. numeric,
alphanumeric or voice message sent by the transmitter.
9. a Al Gross
Explanation: AL Gross introduced the first paging system during world war in
1949.
10. a PACS
Explanation: PACS (Personal Access Communication System) is a protocol used
for cordless telephone system. ERMES and FLEX are used by paging system. And
IS-95 is used for cellular system.
11. a 43-50 MHz
Explanation: Cordless phones mostly operate in the frequency range of 43-50
MHz. The frequency range of FM is 88-108 MHz and for AM is 540-1600 KHz.
12. b Limited coverage area
Explanation: Cordless telephone systems are wireless, but they have a
disadvantage of limited coverage area with cell size of approx. 300 m. Being digital,
they have very less chance of eaves dropping.
13. d DECT
Explanation: Digital enhanced cordless telecommunication (DECT) is a fully
digital system established in 1991. CT0, Ct1, Ct1+ were analog systems established
in 1980, 1984 and 1987 respectively.
14. b. Cordless telephone system
Explanation: GSM, UMTS and EDGE covers worldwide area whereas cordless
system has vey less coverage area.
15. c UMTS
Explanation: CT-2 is a cordless telephone standard used in Europe and Asia. DECT
and PHS (Personal Handyphone System) are cordless telephone standards used in
Europe and Japan respectively. UMTS is a cellular system standard.
16. a. 300 m
Explanation: DECT has the cell diameter of 300 m from the base station while
GSM is designed for outdoor use with a cell diameter of 70 km.
17. d Within a city
Explanation: Cordless telephones are used in homes, in offices, on campus, at
trade shows. But due to their limited coverage they cannot cover a whole city.
18. a Multimedia processing
Explanation: Users in a neighborhood served by a telephone company wired local
loop can be connected by a cordless phone that exchanges signals with a
neighborhood antenna.
19. d Large frequency spectrum
Explanation: Cellular systems accommodate a large number of users within a
limited frequency spectrum over a large geographic area.
20. b Connection of mobile to PSTN
Explanation: Mobile Switching Center (MSC) is responsible for connecting all
mobiles to the PSTN (Public Switched Telephone Network) in a cellular system.
21. c MSC
Explanation: Mobile switching center (MSC) accommodates 100,000 subscribers
and 5,000 simultaneous conversations at a time and handles all billing and system
maintenance functions.
22. a Voice transmission from base station to mobiles
Explanation: FVC (Forward Voice Channel) and RVC (Reverse Voice Channel)
are responsible for voice transmission. FVC is used for voice transmission from
base station to mobile and RVC is used for voice transmission from mobile to base
station.
23. c FCC and RCC
Explanation: FCC (Forward Control Channel) and RCC (Reverse Control
Channel) are control channels responsible for initiating mobile calls.
24. a 95% voice channels, 5% control channels
Explanation: In each cellular system, control channels are 5% of the total
channels available and remaining 95% are dedicated to voice and data traffic.
25. a. Subscriber’s telephone number
Explanation: MIN (Mobile Identification Number) is a 10 digit unique number
which represents the telephone number of subscriber.
26. d. MIN, ESN and SCM
Explanation: When a mobile originates the call, it sends the MIN (mobile
identification number), ESN (electronic serial number) and SCM (station class
mark) along with the call initiation request.
27. b Maximum transmitter power level for a particular user
Explanation: SCM (Station Class Mark) indicates the maximum transmitter power
level for a particular user.
28. c Hexagonal
Explanation: The shape of the cell present in the cellular network is hexagonal
since it can cover the entire geographical area without any gap and overlapping.
29. a Increase capacity
Explanation: The size of the cells in cellular network is kept small because of the
need of high capacity in areas with high user density and reduced size and cost of
base station electronics.
30. b Switching technique
Explanation: Handoff is a switching technique which refers to the process of
transferring an active call or data session from one cell in a cellular network to
another.
31. d Number of base stations is reduced
Explanation: Frequency reuse is a technique of reusing frequencies and channels
within a cellular system to improve capacity and spectral efficiency.
32. c Handoff
Explanation: Handoff is the process of changing the channel associated with
current connection while a call is in progress.
33. a Assigning different group of channels
Explanation: The interference between the neighbouring base stations is avoided
by assigning different group of channels and reusing the same channel after a certain
amount of distance.
39. a PACS
Explanation: PACS (Personal Access Communication System) is a protocol used for
cordless telephone system. ERMES and FLEX are used by paging system. And IS-95 is
used for cellular system.
40. d DECT
Explanation: Digital enhanced cordless telecommunication (DECT) is a fully digital
system established in 1991. CT0, Ct1, Ct1+ were analog systems established in 1980, 1984
and 1987 respectively.
41. a Voice transmission from base station to mobiles
Explanation: FVC (Forward Voice Channel) and RVC (Reverse Voice Channel) are
responsible for voice transmission. FVC is used for voice transmission from
base station to mobile and RVC is used for voice transmission from mobile to base station.
42. a UNII
Explanation: FCC allocated 300 MHz of unlicensed spectrum in the ISM bands. This
allocation is called the Unlicensed National Information Infrastructure (UNII) band. It was
allocated for the express purpose of supporting low power license free spread spectrum
data communication.
43. a Voice channels
Explanation: In a foxed channel strategy, each cell is allocated a predetermined set of
voice channels. Any call attempt within the cell can only be served by the unused channels
in that particular cell.
44. c Blocked
Explanation: As any call attempt within a cell can be served by unused channels in fixed
channel strategy. If all the channels in that cell are occupied, the call is blocked and
subscriber does not receive any service.
45. a Borrowing channels from neighbouring cell
Explanation: In borrowing strategy, a cell is allowed to borrow channels from a
neighbouring cell if all of its own channels are already occupied. The MSC supervises such
borrowing procedure and ensures that the borrowing of channel does not interfere with any
call-in progress
46. a MSC
Explanation: Each time a call request is made, the serving base station requests a channel
from the MSC. The switch then allocates a channel to the requested cell following an
algorithm that takes into account the likelihood of future blocking within the cell.
47. b. Restricted Signal Strength Indicator
48. a Assigning different group of channels
49. a. True
50. b to use consecutive user time slots
UNIT II - Wireless Medium Access Control & Wireless
Telecommunications Systems
Q1 MIN stands for
a. Mobile Identification Number
b. Mobile Internet
c. Mobility In Network
d. None of the above
Q 2. The process of transferring a mobile station from one base station to another is
a. MSC
b. Roamer
c. Hand off
d. Forward channel
Q6 In a fixed channel assignment strategy, if all the assigned channels are occupied,
the call
a. Gets transferred to another cell
b. Gets blocked
c. Is kept on waiting
d. All of the above
17. The bandwidth of the channel used in the hopset is called _________
a) Hopping bandwidth
b) Total hopping bandwidth
c) Instantaneous bandwidth
d) 3 dB bandwidth
Q18. A signal is a _____ that carries data from one network to another.
a. Electromagnetic
b. Electrical current
c. Electronic sign
d. None of the above
Q20 What should be the value of modulation index for perfect modulation?
a) <1
b) 1
c) >1
d) Infinity
Q28 If all the signal frequencies in a radio receiver are amplified equally, then it has a
high _______.
a) High sensitivity
b) High fidelity
c) High selectivity
d) High distortion
Q30 The synchronous time division multiplexing is not efficient because of___
a) data rate
b) infinite frames
c) empty slots
d) lower data rate
Q33 If there are n signal sources of same data rate, then the TDM link has slots?
A. n
B. n/2
C. n*2
D. 2n
Q34 The sharing of a medium and its link by two or more devices is called?
A. Fully duplexing
B. Multiplexing
C. Micropleixng
D. Duplexing
Q36 Which of the following is the world’s first cellular system to specify digital
modulation and network level architecture?
a) GSM
b) AMPS
c) CDMA
d) IS-541
Q39. Which of the following does not come under the teleservices of GSM?
a) Standard mobile telephony
b) Mobile originated traffic
c) Base originated traffic
d) Packet switched traffic
Q41. Which of the following memory device stores information such as subscriber’s
identification number in GSM?
a) Register
b) Flip flop
c) SIM
d) SMS
Q42. Which of the following feature makes impossible to eavesdrop on GSM radio
transmission?
a) SIM
b) On the air privacy
c) SMS
d) Packet switched traffic
Explanation: The on the air privacy feature of GSM makes impossible to eavesdrop on a GSM
radio transmission. The privacy is made possible by encrypting the digital bit stream sent by a
GSM transmitter, according to a specific secret cryptographic key that is known only to the
cellular carrier.
Q43. Which of the following does not come under subsystem of GSM architecture?
a) BSS
b) NSS
c) OSS
d) Channel
Q46. Which one of the following is considered as the GSM supplementary service?
a) Emergency number
b) SMS
c) Call forwarding
d) All of the above
Q47. Which of the following offers packet mode data transfer service over the cellular
network?
a) TCP
b) GPRS
c) GSM
d) None of the above
Q48. In which one of the following, the slow and fast hopping is used?
a) GSM
b) GPRS
c) FHSS
d) None of the above
Unit-II
Q2. The system of satellites that circle the earth and can determine any position is known
as a.
(A) GPS
(B) LAN
(C) Receiver
(D) MAN
Q3. What is the reason for shifting from c band to ku band in satellite communication?
(A) Lesser attenuation
(B) Less power requirements
(C) More bandwidth
(D) Overcrowding is through a satellite rather than phone lines
Q4. Which of the following bands cannot be used for satellite communication?
(A) MF
(B) Ku
(C) X
(D) C
Q7. Which of the following is the 802.11 High base station Rate Standard?
(A) IEEE 802.15
(B) IEEE 802.15.4
(C) IEEE 802.11g
(D) IEEE 802.11b
Q8. Which of the following spread spectrum techniques were used in the original IEEE
802.11 standard?
(A) FHSS and DSSS
(B) THSS and FHSS
(C) THSS and DSSS
(D) Hybrid technique
Q9. Which of the following WLAN standard has been named Wi-Fi?
(A) IEEE 802.6
(B) IEEE 802.15.4
(C) DSSS IEEE 802.11b
(D) IEEE 802.11g
Q10. What is the range of asynchronous user data rates provided by HIPER-LAN?
(A) 1-100 Mbps
(B) 50-100 Mbps
(C) 1-20 Mbps
(D) 500 Mbps to 1 Gbps
Q11. What is the name of the European WLAN standard that provides user data rate
upto 54 Mbps?
(A) UNII
(B) WISP
(C) MMAC
(D) HIPERLAN/2
Q14. Which of the following layer is responsible for providing reliable data links?
a) Physical layer
b) Network layer
c) Data link control layer
d) MAC layer
Q15. UMTS use which multiple access technique?
a) CDMA
b) TDMA
c) FDMA
d) SDMA
Q21. What is the term used by ITU for a set of global standards of 3G systems?
a) IMT 2000
b) GSM
c) CDMA
d) EDGE
Q29. The time over which a call can be maintained within a cell without handoff is called
a. Run time.
b. Peak time.
c. Dwell time.
d. Cell time .
Q36. The symbol time in FDMA systems is___________ thus intersymbol Interference
is_____________
A. Large, high .
B. Small, low .
C. small, high.
D. Large, low.
Q37. Which of The following is not true for FDMA systems as compared to TDMA
systems ?
A. low complexly.
B. lower call site system cost.
C. Tight RF entering.
D. Narrow bandwidth.
Q42. Which of the following is the world's first cellular system to specify digital
modulation and network level architecture ?
A. GSM.
B. AMPS.
C. CDMA.
D. IS-54.
Q43. Which of the following does not come under teleservices of GSM ?
A. Standard mobile telephony.
B. Mobile originated traffic.
C. Base originated traffic.
D. Packet switched traffic.
Q44. Which of the following does not come under subsystem of GSM architecture ?
A. BSS .
B. NSS .
C. OSS.
D. Channel.
.
ANSWER KEY:
Unit-III
Q2. In IPv4, service type of service in header field, first 3 bits are called
a) Type of service
b) Code bits
c) Sync bits
d) Precedence bits
Q3. _______ is responsible for tunneling multicast packets to the MS’s currently
subscribed FA.
a. Multicast home agent
b. Mobile multicast
c. Mobile station
d. Base station
solution: Multicast home agent (MHA) is responsible for tunneling multicast packets to
the MS’s currently subscribed FA. MHA serves MSs that are roaming around the foreign
networks and are within its service range.
Q5. The process of transferring a mobile station from one base station to another
a) MSC
b) Roamer
c) Hand off
d) Forward channel
Q8.Network layer at source is responsible for creating a packet from data coming from
another __
a) Station
b) Link
c) Node
d) Protocol
a) MMP
b) RMDP
c) RM2
d) Mobicast
Q10. DHCP (dynamic host configuration protocol) provides __________ to the client.
a) IP address
b) MAC address
c) Url
d) None of the mentioned
Q14. Which of the following can be used to bypass even the best physical and logical
security mechanisms to gain access to a system?
a) Brute force attacks
b) Denial of service
c) Social engineering
d) Port scanningView Answer
Q15 At which OSI model layer does the IPSec protocol function?
a. Data Link
b. Transport
c. Session
d. NetworkView Answer
Q16. After obtaining the IP address, to prevent the IP conflict the client may use
_________
a) internet relay chat
b) broader gateway protocol
c) address resolution protocol
d) none of the mentioned
Q17. Tunnel connections can be established over all except for which of the following?
a) WAN links
b) LAN pathways
c) Dial-up connections
d) Stand-alone systems
Q18. Which functionality of the network layer deals with the necessity of a three-way
handshake usually before the transmission of data from sender to receiver?
a. Path determination
b. Forwarding
c. Call Set-up
d. All of the above
Q22. The mechanism behind electromagnetic wave propagation cannot be attributed to-
---------------
A. Reflection.
B. Diffraction.
C. Scattering.
D. Sectoring.
Q23. The Propagation model that estimates the radio coverage of a transmitter is called?
A. Large scale propagation model.
B. Small scale propagation model.
C. Fading model .
D. Okumura model.
Q24. Propagation model that characterize rapid fluctuation is called ______________
A. Hata model .
B. Fading model .
C. Large scale propagation model.
D. Okumura model.
Q26. The satellite that is used as a relay to extend communication distance is called
as______
A. Relay satellites.
B. Communication satellites.
C. Repeater satellites .
D. Geosynchronous satellites.
Q33.Application of AWN
A. Military Application
B. Emergency operations
C. Wireless mesh network
D. All of the above
Q37.What is MAC?
A. Medium Access control protocol.
B. Medium Access communication protocol.
C. Multiple Access control protocol.
D. Multiple Access communication protocol.
Q41. The attack effected by making the network resource unavailable for service to other
nodes, either by consuming the bandwidth or by overloading the system, is known as
A. Resource consumption
B. Bandwidth depletion
C. Denial of service
D. None of the above
Q47. Which of the following is not an objective for channel assignment strategies?
(A) Efficient utilization of spectrum –
(B) Increase of capacity
(C) Minimize the interference
(D) Maximize the interference
Unit-IV
1. c. 20 to 60 bytes
2. d) Precedence bits
Explanation: The 8-bit ToS (type of service) in IPv4 uses 3 bits for IP Precedence, 4 bits for
ToS with the last bit not being used. The 4-bit ToS field, although defined, has never been used.
3. a. Multicast home agent
4. a. True
5.c. Hand off
6. d Encryption
7. c. SLIP
8. d Protocol
9. c RM2
10. a IP address
11. d. all of the above
12. c. Performing a brute force attack against a known user account
13. a. ISDN
14. c. Social engineering
15. d. Network
16. c address resolution protocol
17. d. Stand-alone systems
18. c. Call Set-up
19. a. Hard handover only.
20. b. 3GPP.
Explanation: The 3rd Generation Partnership Project (3GPP) is collaboration between groups
of telecommunications standards associations, known as:
the Organizational Partners. LTE (Long Term Evolution) introduced in 3GPP R8, is the access
part of the Evolved Packet System (EPS).
21. d. Improved uplink coverage, lower UE power consumption and reduced equalizer.
22. d. Sectoring.
Explanation: The mechanisms behind electromagnetic wave propagation are diverse. They
can be greatly attributed to reflection, diffraction and scattering. Due to multiple reflections
from various objects, the electromagnetic waves travel along different paths of varying lengths.
23. b. Small scale propagation model.
24. b. Fading model .
Explanation: Small scale propagation model is also called fading model. Fading model
characterize the rapid fluctuations of the received signal strength over very short distance of a
few wavelengths or short time duration. The propagation models are used to estimate the
performance of wireless channels.
25. a. Received signal strength.
26. b. Communication satellites.
Explanation: Communication satellites are not originators of information to be transmitted. If
a transmitting station cannot communicate directly with one or more receiving stations because
of line-of-sight restrictions, a satellite can be used. The transmitting station sends the
information to the satellite, which in turn re-transmits it to the receiving stations
27.c. Transponder.
28. c. Both A and B
29. b. Mobile ad hoc network
30. c. Mesh
31. a. Infrastructure less network
32. c. Both A and B
33. d. All of the above
34. a. Yes
35. c. Regenerative
36. c. Both A and B
37. a. Medium Access control protocol.
38. a. Hidden terminal
39. d. All of the above
40. b. Stale route information at the nodes
41. c. Denial of service
42. d. VPN
Explanation: An open standard is a standard that is publicly available. It has various rights to
use associated with it. Bluetooth is an open standard that has been embraced by over thousand
manufacturers of electronic appliances. VPN (Virtual Private Network) is a private network.
43. c. King Herald Bluetooth
Explanation: Bluetooth standard is named after King Harald Bluetooth. He was the 10th
century Viking who united Denmark and Norway. The Bluetooth standard aims to unify the
connectivity chores of appliances within the personal workspace of an individual.
44. d 2.4 GHz ISM Band
Explanation: Bluetooth is a radio technology operating in 2.4 GHz frequency band. Bluetooth
is best suited for low-bandwidth applications like transferring sound data with telephones (i.e.
with a Bluetooth headset) or byte data with hand-held computers (transferring files) or
keyboard.
45. a. Frequency hopping TDD scheme
Explanation: Frequency hopping TDD (Time Division Duplexing) scheme is used by
Bluetooth. Frequency hopping provides a form of multiple access among co-located devices in
different piconets.
46. c. GFSK
Explanation: Gaussian Frequency Shift Keying
Bluetooth technology uses a special binary frequency shift keying modulation scheme called
Gaussian Frequency Shift Keying (GFSK).
47. d. Maximize the interference
Explanation: The objective of channel assignment strategy is to utilize the spectrum
efficiently. And for efficient utilization, a frequency reuse scheme consistent with the objective
of increasing capacity and minimizing interference is required.
48.b. Microcontroller
49. b. Mesh
50. d. Detection, Tracking & Classification
UNIT V - Mobile Transport Layer & Support for Mobility
Q1 General goal of a file system
a. Efficient
b. Transparent
c. Consistent
d. All of this
Q2. Why Efficiency in file system is of special importance for wireless systems
a. bandwidth is low
b. bandwidth is high
c. Both
d. No one
Q4. Why MIo-NFS uses a pessimistic approach with tokens controling access to files
a. MIo-NFS avoid buffering
b. MIo-NFS avoids write conflicts
c. Both
d. no one
Q5. What is a stateless, lightweight, application level protocol for data transfer between
servers and clients
a. Html
b. Head
c. HTTP
d. All of this
Q7. Allowing terminals and software from different vendors to communicate with
networks from different providers
(a) reliable
(b) scaleable
(c). secure
(d) interoperable
Q8. protocols and services should scale with customer needs and number of customers
a. reliable
b. scalable
c. secure
d. interoperable
Q11. WDP offers source and destination port numbers used for
a. multiplexing
b. demultiplexing
c. both
d. no one
Q12. If a higher layer requests a service the WDP cannot fulfill, this error is indicated
with the
a. T-DError.ind
b. T-AError.ind
c. T-CError.ind
d. None of this
Q21. TCP supports many of the Internet’s most popular application protocols and
resulting applications, including the –
a. World Wide Web,
b. e-mail
c. File Transfer Protocol and Secure Shell
d. All of the above
Q22.In the Internet protocol suite, TCP is the intermediate layer between
the —– .
a. Internet layer and application layer
b. Mobile laver and application layer
c. Transport layer and application layer
d. Session layer and application layer
Q26. In TCP during the slow start doubling the congestion window, every time
acknowledgments come back until reaching the congestion threshold is called
a. The exponential growth of the congestion window
b Doubling the growth of the congestion window
c. Linear growth of the congestion window
d. None
Q27. As soon as the congestion window reaches the congestion threshold, further increase
of the transmission rate is only linear by adding ……… to the congestion window each
time the acknowledgments come back.
a. 1
b. 2
c. 3
d. None of the above
Q29.Due to packet loss due to transmission error the sender can now retransmit the
missing packet(s) before the timer expires. This behavior is called
a. Fast retransmit
b. Fast recovery
c. Congestion control
d. None
Q31.Indirect TCP segments a TCP connection into a fixed part and a ——-
a. wireless part
b. wired part
c. either wireless part or wired part
d. None of the above
Q32. In I-TCP a suitable place for segmenting the connection is at the ……………………
as it not only controls the mobility of the mobile host anyway and can also hand over the
connection to the next foreign agent when the mobile host moves on.
a. Router
b. Home agent
c. Foreign agent
d. Access point
Q34. In the I TCP the Foreign Agent (FA) becomes or acts as a —— and relays data in
both directions
a. Proxy
b. Router
c. Node
d. Access point
Q35. Which of the following buffers data close to the mobile host to perform fast local
retransmission in case of packet loss.
a. Indirect TCP
b. Snooping TCP
c. Foreign agent
d. None of the following
Q36. A new enhancement, which leaves the TCP connection intact and is completely
transparent, is ———–
a. Mobile TCP
b. Snooping TCP
c. I TCP
d.None
Q38.In which of the following the sender can now determine precisely which packet is
needed and retransmit it?
a. I TCP
b. M TCP
c. Selective transmission
d. None of the above
Q39 A packet in Transmission Control Protocol (TCP) is called a ____________
a) Transmittable slots
b) Packet
c) Segment
d) Source Slots
Q42. IEEE 802.11 defines basic service set as building block of a wireless ___________
a) LAN
b) WAN protocol
c) MAN
d) ALOHA
Q43. In wireless LAN, there are many hidden stations so that __________ cannot be
detected.
a) Frames
b) Collision
c) Signal
d) Data
Q44. A set that makes stationary or mobile wireless station and also have optional central
base station is known as ___________
a) Basic service set
b) Extended service set
c) Network point set
d) Access point
Q49. Parameter that is normally achieved through a trailer added to end of frame is
___________
a) Access Control
b) Flow Control
c) Error Control
d) Physical addressing
Unit-V
1. d
2. a.
Explanation : As the bandwidth is low so the protocol overhead and updating
operations etc.
3. a. Problems of location-dependent
4. b. MIo-NFS avoids write conflicts
5. c. HTTP
6. b. client/server system
7. d interoperable
8. b. scalable
9. a. Wireless datagram protocol
10. d wireless control message protocol
11. c.both
12. a. T-DError.ind
13. a. indicating the reason for the error to the higher layer
14. a Wireless transport layer security
15. b. Class 0 provides unreliable message transfer without any result message
16. c. Class 1,2 provide reliable message transfer
17. d. All of this
18. d All of this
19. a. wireless session protocol
20. c Both
21. d All of the above
22. a. Internet layer and application layer
23. d. All of the above
24. c. Slows down
25. a. Slow start
26. a. The exponential growth of the congestion window
27. a. 1
28. a. fast retransmit and fast recovery
29. a. Fast retransmit
30. d. All of the above
31. c. either wireless part or wired part
32. c. Foreign agent
33. d. All of the above
34. a. Proxy
35. b. Snooping TCP
36. a. Mobile TCP
37. c. disconnections
38. c Selective transmission
39. c Segment
40. c MAN
41. c 600 Km
42. a. LAN
43. b Collision
44. a Basic service set
45. b 1895
Explanation: In England, Guglielmo Marconi began his wireless experiments in 1895. On
2 June 1896, he filed his provisional specification of a patent for wireless telegraphy. He
demonstrated the system to the British Post Office in July.
46. a 3 broad groups
Explanation: We can divide wireless transmission into three broad groups: radio waves,
microwaves, and infrared waves. Radio waves are used for multicast communications, such
as AM and FM radio, television, maritime radio, cordless phones and paging systems.
Microwave propagation is line-of-sight.
47. a Four Layers
48. a Datagrams
49. c Error Control
50. a. Table driven routing protocol