You are on page 1of 19

SRM Institute of Science & Technology

Faculty of Engineering & Technology

ECE Department

B Tech: CSE 2020 – 2021


Regulations: 2018
Subject Code & Title : 18CSE458T/ WIRELESS AND MOBILE
COMMUNICATION Year/Sem: III/VI
Name of the faculty handling the course :Dr.Christeena Joseph

UNIT 4

PART A (1 mark)

1. ----------------- are the requirements for the development of Mobile IP


a) Compatibility
b) Transparency and Security
c) Scalability and efficiency
d) All of the above
2. The--------------------defines the current location of the MN from an IP point of
view.
a) Foreign location
b) Home location
c) Care of Address
d) Correspondent Node
3. is the mechanism of taking a packet consisting of packet header
and data and putting it into the data part of a new packet.
a) Encapsulation
b) Tunneling
c) Decapsulation
d) Agent Discovery
4. is responsible for tunneling multicast packets to the MS’s
currently subscribed FA.
a) Multicast home agent
b) Mobile multicast
c) Mobile station
d) Base station
5. connectionless and does not give certain guarantees about reliable data
delivery.
UDP
TCP
FDP
TTP
Answer a
6. To solve the network addressing problem, a mobile host------------------
a) Uses DHCP to change its address as it goes to a new network
b) Uses two addresses: home address and the care of address
c) Borrows an address from the care of address
d) None of the choices are correct

7. Which of the following describe the DHCP Discover


message? 1.It uses FF:FF:FF:FF:FF:FF as a layer 2 broadcast.
2.It uses UDP as the Transport layer protocol.
3.It uses TCP as the Transport layer protocol.
4.It does not use a layer 2 destination
address.
a) 1
b) 1 and 2
c) 3 and 4
d) 4

8. In--------------the foreign agent buffers all packets with destination mobile host
and additionally ‘snoops’ the packet flow in both directions to recognize
acknowledgements.
a) Snooping TCP
b) Traditional TCP
c) Mobile TCP
d) Fast retransmit/fast recovery
9. allows a receiver to inform a sender of congestion in the network
by setting the ECN-Echo flag on receiving an IP packet that has experienced
congestion.
a) Explicit Congestion Notification
b) Selective Acknowledgement
c) Time stamp
d) Header compression
10------------is a transport protocol that gives guaranteed and reliable data
transmission
a) UDP
b) TCP
c) FDP
d) TTP
11. The server transfers the content via a--------------to a client
a) push access protocol
b) push over the air
c) push proxy gateway
d) push initiator
12. The protocol-----------------------offers delivery of push messages, selection of
transport services for push messages and authentication of PIs.
a) push access protocol
b) push over the air
c) push proxy gateway
d) push initiator
13 is (are) the service primitives available for push
session management
a) pom suspend & pom resume
b) pom connect & pom disconnect
c) Pom session request
d) All of the above
14 is an unacknowledged push of content via a
connectionless session service.
a) po push
b) po-confirmed push
c) po-push abort
d) po-unit-push
15. The-------------------is used to transfer the contents between PPG and the client.
a) push access protocol
b) push over the air
c) push proxy gateway
d) push initiator
16. The basic objectives of the -------------is to bring diverse internet content and
other data services to digital cellular phones and other wireless, mobile
terminals.
a) Wireless application protocol
b) Transmission control protocol
c) Asynchronous transfer mode
d) None of the above
17. The-------------with its wireless transaction protocol offers a lightweight
transaction service at the transaction SAP
a) WAP session layer
b) WAP transaction layer
c) WAP security layer
d) WAP application layer
18. The----------------offers a bearer independent, consistent datagram-oriented
service to the higher layers of the WAP architecture.
a) WAP transport layer
b) WAP session layer
c) WAP transaction layer
d) WAP security layer
19. The -------------------layer of WAP architecture offers data integrity, privacy,
authentication, and denial-of-service protection.
a) WAP transport layer
b) WAP session layer
c) WAP transaction layer
d) WAP security layer
20. To be able to browse web pages with handheld devices, a--------------has been
defined in WAP.
a) WML
b) HTML
c) HTTP
d) WWW
21. If any errors happen when WDP datagrams are sent from one WDP entity
to another the--------provides error handling mechanisms for WDP.
a) wireless datagram protocol
b) wireless control message protocol
c) wireless transport layer security
d) wireless transaction protocol
22. WAP has specified the ----------which comprises protocols and services most
suited for browsing-type applications.
a) wireless session protocol/browsing
b) wireless session protocol
c) wireless session protocol/http
d) wireless session protocol/www
23. The status code------------indicates that the server could not find the web page
specified in the request
a) 404
b) 200
c) 302
d) 151
24.In which class of transaction services, the initiator sends a request to
the responder who does not reply with an acknowledgement?
a)unreliable request
b)Reliable request
c)Reliable request with one result message
d)Unreliable request with one result message
25------------is the micro browser that renders the content for display
a) WTA user agent
b) WAE user agent
c) WSP
d) WDP
26. Which one of the following is not benefits of push technology?
a) Immediacy
b) Efficiency
c) Increased latency
d) Long battery life
27. Which of the following is NOT a limitation of mobile computing?
a) Battery life
b) Screen size
c) Portability
d) Slow internet connection speed
28. WAP is a .
a) Application environment for mobile device
b) Common protocol
c) Both a) and b)
d) Transport protocol
29. A -------------is an end-system or router that can change its point of attachment
to the internet using mobile IP.
a) mobile node
b) Home agent
c) Foreign agent
d) Care of Address

30. The---------------is the current subnet the MN visits and which is not the home
network.
a) foreign network
b) home network
c) Care of Address
d) mobile node
31. The---------------can provide several services to the MN during its visit to the
foreign network.
a) mobile node
b) Home agent
c) Foreign agent
d) Care of Address
32. The----------defines the current location of the MN from an IP point of view
and the IP packets sent to the MN are delivered to this and not directly to the IP
address of the MN.
a) foreign network
b) home network
c) Care of Address
d) mobile node
33. The Benefits of Wireless Application Protocol includes---------------
a) Easy access to time sensitive information
b) Portable
c) World wide communication
d) All of the above
34. The WAP protocol was designed to show internet-contents on clients?
a) Wired
b) Wireless
c) Both
d) None
35. In WML, the deck is a set of --------------------
a) Pages
b) Cards
c) Files
d) Decks
SRM Institute of Science & Technology
Faculty of Engineering & Technology

ECE Department

B Tech: CSE 2020 – 2021


Regulations: 2018
Subject Code & Title : 18CSE458T/ WIRELESS AND
MOBILE COMMUNICATION Year/Sem: III/VI
Name of the faculty handling the course :Dr.Christeena
Joseph

UNIT 5
Multiple Choice Questions
1. Which of the following specifies a set of media access control
(MAC) and physical layer specifications for implementing
WLANs?
a) IEEE 802.16
b) IEEE 802.3
c) IEEE 802.11
d) IEEE 802.15
2. Which of the following is not a standard of WLAN?
a) HIPER-LAN
b) HIPERLAN/2
c) IEEE 802.11b
d) AMPS
3. Which of the following is the 802.11 High Rate Standard?
a) IEEE 802.15
b) IEEE 802.15.4
c) IEEE 802.11g
d) IEEE 802.11b
4. Which of the following spread spectrum techniques were used
in the original IEEE 802.11 standard?
a) FHSS and DSSS
b) THSS and FHSS
c) THSS and DSSS
d) Hybrid technique
5. Which of the following WLAN standard has been
named Wi-Fi?
a) IEEE 802.6
b) IEEE 802.15.4
c) DSSS IEEE 802.11b
d) IEEE 802.11g
6. The Bluetooth operates in GHz ISM band.
a) Ka Band
b) L Band
c) Ku Band
d) 2.4 GHz ISM Band
7. A Bluetooth network consists of primary
device(s) and up to secondary devices.
a) one; five
b) five; three
c) two; six
d) one; seven
8. Bluetooth wireless technology is a radio
technology, which is developed for Network.
a) Short range and Personal area
b) Long range and WAN
c) Medium range and LAN
d) None of the above
9. The Protocol is used by the

Link Managers (on either


side) for link set-up and control.
a) Link Manager
b) RFCOMM
c) Radio
d) Telephony Control Protocol
Spec Answer a
10. The handoff strategies of a femtocell network are-----
a) Hand Out
b)Hand in
c) Hand off
d)All of the above

11. provides a common interface between


the Bluetooth host and a Bluetooth module. It also manages
the hardware links with the scatternets.
a) RFCOMM
b) Telephony Control Protocol Spec
c) Logical Link Control and Adaptation
d) Host Controller Interface
12. The IEEE 802.11a, uses .
a) DSSS
b) OFDM
c) FHSS
d) either (a) or (c)
13. The Baseband handles three types of links:
, and .
a) Synchronous Connection-Oriented, Polling-based
packet transmissions, Asynchronous
Connection-Less link
b) Logical Link, MAC Link,Host Controller Interface
c) All of the above
d) None of the above
14. In IEEE 802.11, the ----------- is a timer used for
collision avoidance
a) NAV
b) SIFS
c) BSS
d) None of the above
15. In IEEE 802.11, a BSS with an AP is referred
to as
a) Infrastructure Network
b) Adhoc network
c) Metropolitan Area Network
d) Wireless Sensor Network
16. In IEEE 802.11, a BSS without an AP is
called an
a) Infrastructure Network
b) Adhoc network
c) Metropolitan Area Network
d) Ethernet
17. The IEEE 802.11 standard for wireless LANs defines
------------ and -------------service sets
a) BSS and ESS
b) BCC and ECC
c) Physical and Data link
d) None of the above
18. In wireless network an extended service set is a set of
connected ------------
a) BCC
b) BSS
c) ESS
d) ECC
19. , The IEEE 802.11 standard defines the control packets
and
to deal with hidden terminal problem
a) RTS , CTS.
b) SIFS ,DIFS
c) Request and Send
d) ACK,NACK
20. In IEEE 802.11, when a frame is going from one AP to
another AP in a wireless distribution system, the address flag
is------------
a) 00
b) 01
c) 10
d) 11
21. In IEEE 802.11, when a frame is going from one station in
a BSS to another without
passing through the distribution system, the address flag
is---------------
a) 00
b) 01
c) 10
d) 11
22. A wireless network interface controller can work
in------------ and---------------------modes
a) ESS and BSS
b) Infrastructure and adhoc
c) Token ring and Ethernet
d) None of the above
Answer b
23. The RTS and CTS frames in CSMA/CA solve the
hidden station problem. The RTS and CTS frames in
CSMA/CA
solve the exposed station problem.
a) can; cannot
b) cannot; can
c) can; can
d) cannot; cannot
24. Which of the followings are the characteristics of WPAN?
a) Short range
b) Low power
c) Low cost
d) Small networks
e) All of the above
25. The ---------------layer handles all functions related to
modulation, forward error correction, signal detection,
synchronization in HIPERLAN 2
a) physical
b) Data link control
c) Network
d) transport
26. This highest layer of HiperLAN2 --------------layer is
responsible for segmentation and reassembly functions and
adaptations to fixed LANs, 3G networks
a) physical
b) Data link control
c) Network
d) Convergence
27. The ----------routing protocols attempt to evaluate
continuously the routes within the network, so that when a
packet needs to be forwarded, the route is already known and
can be immediately used.
a) Reactive
b) Proactive
c) On-demand
d) None of the above
28. The main source of power consumption in wireless sensor
networks is due to
a) Sensing
b) communication
c) Processing
d) None of these(transmitting))
29. Following are the types of routing on MANET, except:
a) Proactive Routing
b) Hybrid Routing
c) Hyper Active Routing
d) Reactive Routing
30. In , each mobile node is an independent node,
which act as a host and a router.
a) Wireless Sensor Network
b) Mobile Ad-hoc Network
c) Computer Ad-hoc Network
d) Wired Sensor
Network Answer b
31. Multihop network operates on principle.
a) Store Packet
b) Forward Packet
c) Store and Forward Packet
d) Receive and Update Packet
32. Ad hoc wireless networks can be very useful in establishing
among a group of soldiers for tactical operations.
a) Communication
b) Information
c) Network channel
d) DCN
33. Characteristics of MANET are-----------------
a) Dynamic topologies and Limited physical security
b) Bandwidth-constrained and variable capacity links
c) Energy-constrained operation
d) All of the above
34. The -----------------transmitted with beacon signal contains
a list of stations for which unicast data frames are buffered in
the access point.
a) Traffic Indication Map
b) Timing synchronization function
c) Scanning
d) None of the above
35. What is the type of network in which the routers
themselves are mobile?
a) Wide Area Network
b) Mobile Ad hoc Network
c) Mobile Network
d) Local Area Network
36. What is the routing algorithm used in MANETs?
a) Shortest Path First
b) Routing Information Protocol
c) Distance Vector Protocol
d) Ad hoc On -demand Distance Vector Protocol
37. is a transducer that converts energy in the
physical world into electrical energy that can be passed to a
computing system or controller
a) Computing transducer
b) Sensor
c) Enhanced transducer
d) Transinductor
38. Which among the following is true about wireless sensor
networks?
a. Single purpose design
b. General purpose design
c. Energy is the main constraint
d. Deployment is ad hoc
e. Physical access to sensor node is difficult
f. Network performance is the primary design concern
39. The Benefits of Femtocell network includes
a) Improved, seamless coverage
b)Enhanced capacity
c) Lower transmit power
d)Prolonged handset battery life
e) All of the above
40. Among the following statements given for data
acquisition and actuation identify the correct statements
1. Sensing is a technique to gather information about a
physical object
2. An object performing sensing task is called sensor
3. No controller is required for data actuation
4. Transducer is used to describe a device that
converts energy from one form into another
a). Statement 1, 2, 3 is True
b). Statement 1, 2, 4 is True
c). Statement 1, 4, 3 is True
d). Statement 4, 2, 3 is True
41. WSN nodes are prone to-------------
a) Malicious Attacks
b) Eaves dropping
c) Interference
d) All of the above
42. WSN consists of densely distributed nodes that support
the following activity
a) sensing
b) signal processing
c) embedded computing, and connectivity
d) All the above
43. The nodes in the ----------------wireless sensor network
periodically switch on their
sensors and transmitters, sense the environment, and
transmit data of interest.
a) Proactive
b) Reactive
c) Idle
d) Active
44. In WSN a ---------------architecture organizes the
sensor nodes into clusters, each
governed by a cluster-head.
a) Flat
b) Clustered
c) Layered
d) None of the above
45. Which of these is not a feature of VANET?
a) High dynamic topology
b) High transmission and computation capability
c) Stable connectivity
d) Predictable mobility pattern
46. In many VANET applications,-------------------protocol
is used to indicate the
destination location that helps in discovering the path
a)Connecting aware routing (CAR)
bDynamic Source Routing(DSR)
c)Open Shortest path First(OSPF)
d)Border Gateway Routing
47. What is the use of the RFID Module?
a) Object Identification
b) To provide 3G Connectivity
c) To measure temperature
d) To measure Wi-Fi strength
48. Which frequency does the RFID Module operate in?
a) 12.98 MHz
b) 14.67 MHz
c) 19.56 MHz
d) 13.56 MHz
49. What is the maximum data rate of the RFID Module?
a) 11 Mbps
b) 1 Kbps
c) 10 Mbps
d) 11 Gbps
50. There are basic types of chips available
on RFID tags.
a) Two
b) Three
c) Four
d) Five
51. Which of the following businesses benefit and
implement RFID?
a) Logistics and Transportation
b) Building and Construction
c) IT
d) All of the above
52. A reader may have multiple antennas that
are responsible for sending and receiving radio
waves.
a) True
b) False

53 The Femtocell Network consists of :


a) Femtocell Base Stations
b)Internet Link
c) Femtocell Gateway
d)All of the above
54. In a femtocell network -------------is a service
provider’s device that acts as a gateway
between the Internet and the communication
network.
a) Femtocell Base Stations
b)Internet Link
c) Femtocell Gateway
d)All of the above

You might also like