Professional Documents
Culture Documents
ECE Department
UNIT 4
PART A (1 mark)
8. In--------------the foreign agent buffers all packets with destination mobile host
and additionally ‘snoops’ the packet flow in both directions to recognize
acknowledgements.
a) Snooping TCP
b) Traditional TCP
c) Mobile TCP
d) Fast retransmit/fast recovery
9. allows a receiver to inform a sender of congestion in the network
by setting the ECN-Echo flag on receiving an IP packet that has experienced
congestion.
a) Explicit Congestion Notification
b) Selective Acknowledgement
c) Time stamp
d) Header compression
10------------is a transport protocol that gives guaranteed and reliable data
transmission
a) UDP
b) TCP
c) FDP
d) TTP
11. The server transfers the content via a--------------to a client
a) push access protocol
b) push over the air
c) push proxy gateway
d) push initiator
12. The protocol-----------------------offers delivery of push messages, selection of
transport services for push messages and authentication of PIs.
a) push access protocol
b) push over the air
c) push proxy gateway
d) push initiator
13 is (are) the service primitives available for push
session management
a) pom suspend & pom resume
b) pom connect & pom disconnect
c) Pom session request
d) All of the above
14 is an unacknowledged push of content via a
connectionless session service.
a) po push
b) po-confirmed push
c) po-push abort
d) po-unit-push
15. The-------------------is used to transfer the contents between PPG and the client.
a) push access protocol
b) push over the air
c) push proxy gateway
d) push initiator
16. The basic objectives of the -------------is to bring diverse internet content and
other data services to digital cellular phones and other wireless, mobile
terminals.
a) Wireless application protocol
b) Transmission control protocol
c) Asynchronous transfer mode
d) None of the above
17. The-------------with its wireless transaction protocol offers a lightweight
transaction service at the transaction SAP
a) WAP session layer
b) WAP transaction layer
c) WAP security layer
d) WAP application layer
18. The----------------offers a bearer independent, consistent datagram-oriented
service to the higher layers of the WAP architecture.
a) WAP transport layer
b) WAP session layer
c) WAP transaction layer
d) WAP security layer
19. The -------------------layer of WAP architecture offers data integrity, privacy,
authentication, and denial-of-service protection.
a) WAP transport layer
b) WAP session layer
c) WAP transaction layer
d) WAP security layer
20. To be able to browse web pages with handheld devices, a--------------has been
defined in WAP.
a) WML
b) HTML
c) HTTP
d) WWW
21. If any errors happen when WDP datagrams are sent from one WDP entity
to another the--------provides error handling mechanisms for WDP.
a) wireless datagram protocol
b) wireless control message protocol
c) wireless transport layer security
d) wireless transaction protocol
22. WAP has specified the ----------which comprises protocols and services most
suited for browsing-type applications.
a) wireless session protocol/browsing
b) wireless session protocol
c) wireless session protocol/http
d) wireless session protocol/www
23. The status code------------indicates that the server could not find the web page
specified in the request
a) 404
b) 200
c) 302
d) 151
24.In which class of transaction services, the initiator sends a request to
the responder who does not reply with an acknowledgement?
a)unreliable request
b)Reliable request
c)Reliable request with one result message
d)Unreliable request with one result message
25------------is the micro browser that renders the content for display
a) WTA user agent
b) WAE user agent
c) WSP
d) WDP
26. Which one of the following is not benefits of push technology?
a) Immediacy
b) Efficiency
c) Increased latency
d) Long battery life
27. Which of the following is NOT a limitation of mobile computing?
a) Battery life
b) Screen size
c) Portability
d) Slow internet connection speed
28. WAP is a .
a) Application environment for mobile device
b) Common protocol
c) Both a) and b)
d) Transport protocol
29. A -------------is an end-system or router that can change its point of attachment
to the internet using mobile IP.
a) mobile node
b) Home agent
c) Foreign agent
d) Care of Address
30. The---------------is the current subnet the MN visits and which is not the home
network.
a) foreign network
b) home network
c) Care of Address
d) mobile node
31. The---------------can provide several services to the MN during its visit to the
foreign network.
a) mobile node
b) Home agent
c) Foreign agent
d) Care of Address
32. The----------defines the current location of the MN from an IP point of view
and the IP packets sent to the MN are delivered to this and not directly to the IP
address of the MN.
a) foreign network
b) home network
c) Care of Address
d) mobile node
33. The Benefits of Wireless Application Protocol includes---------------
a) Easy access to time sensitive information
b) Portable
c) World wide communication
d) All of the above
34. The WAP protocol was designed to show internet-contents on clients?
a) Wired
b) Wireless
c) Both
d) None
35. In WML, the deck is a set of --------------------
a) Pages
b) Cards
c) Files
d) Decks
SRM Institute of Science & Technology
Faculty of Engineering & Technology
ECE Department
UNIT 5
Multiple Choice Questions
1. Which of the following specifies a set of media access control
(MAC) and physical layer specifications for implementing
WLANs?
a) IEEE 802.16
b) IEEE 802.3
c) IEEE 802.11
d) IEEE 802.15
2. Which of the following is not a standard of WLAN?
a) HIPER-LAN
b) HIPERLAN/2
c) IEEE 802.11b
d) AMPS
3. Which of the following is the 802.11 High Rate Standard?
a) IEEE 802.15
b) IEEE 802.15.4
c) IEEE 802.11g
d) IEEE 802.11b
4. Which of the following spread spectrum techniques were used
in the original IEEE 802.11 standard?
a) FHSS and DSSS
b) THSS and FHSS
c) THSS and DSSS
d) Hybrid technique
5. Which of the following WLAN standard has been
named Wi-Fi?
a) IEEE 802.6
b) IEEE 802.15.4
c) DSSS IEEE 802.11b
d) IEEE 802.11g
6. The Bluetooth operates in GHz ISM band.
a) Ka Band
b) L Band
c) Ku Band
d) 2.4 GHz ISM Band
7. A Bluetooth network consists of primary
device(s) and up to secondary devices.
a) one; five
b) five; three
c) two; six
d) one; seven
8. Bluetooth wireless technology is a radio
technology, which is developed for Network.
a) Short range and Personal area
b) Long range and WAN
c) Medium range and LAN
d) None of the above
9. The Protocol is used by the