Wireless Network: Multiple Choice Questions and Answers
Wireless Network: Multiple Choice Questions and Answers
(B) only those packets which are queued in the router at that time will suffer
(C) only those packets which are not queued in the router at that time will suffer
Answer: B
(D) no packets will suffer
Answer: A
Answer: B
4. Each packet is routed independently in ……………….
Answer: C
(A) virtual circuit subnet (B) short circuit subnet
datagram subnet
wireless subnet
Answer: C
circuit switching
message switching
Answer: D
7. In …………… circuit switching, delivery of data is delayed because data must be stored and
retrieved from RAM.
Answer: D
9. In ………………, each packet of a message follows the same path from sender to receiver.
circuit switching
message switching
Answer: A
Connection establishment
Data transfer
11. The set of optimal routes from all sources to a given destination from a tree rooted to the
destination is known as ……………..
B) Sparse tree
Answer: C
Answer: C
13. If the route from I to J is computed in advance, off line, and downloaded to the routers when
the network is booted is called as ……………….
lnN (
14. In Hierarchical routing for N router subnet, the optimal number of levels is …………..
D) ln(N-1)
(A) logN
Answer: C
15. The router algorithm takes the decision to changes the route when ……………..
router changes
topology changes
user changes
Answer: B
16. If route from router I to router J is computed on line based on the current statistics, then it is called
as ………………..
Dynamic routing
Session routing
Answer: A
17. If the subnet uses virtual circuits internally, routing decisions are made only when a new virtual
circuit is being setup. This is called as……………..
(D) Forwarding
Answer: A
18. …………….. change their routing decisions to reflect changes in the topology.
Answer: B
19. If router J is on the optimal path from router I to router K, then the path from J to K along the
same route is ………………
Answer: B
20. If router J is on the optimal path from router I to router K, then the optimal path from J to K also
falls along the same route is known as ………………..
(A) Routing principle
Answer: B
21. ……………. do not base their routing decisions on measurements or estimates of the current
traffic and topology.
Answer: A
22. The method of network routing where every possible path between transmitting and receiving DTE
is used is called ……………
Answer: B
23. In Hierarchical routing, the routers are divided into what is called as ……………..
(A) zones
(B) Cells
Answer: C
(C) Regions
Clusters
Zones
Blocks
Cells
Answer: A
Clusters
Zones
Blocks
Cells
Answer: B
26. If a router sends every incoming packet out only on those lines that are going approximately in the
right direction is known as ……………..
Answer: B
Answer: A
29. In military applications where large number of routers may be blown to bits at any instant, we use
……………….
Answer: D
30. In distributed applications, it is sometimes necessary to update all the databases concurrently, we
use …………………..
(D) Flooding
(A) Shortest path first
31. In multicast routing with spanning tree method, a network with n groups, each with an average of m
members, for each group we require ………………..
Answer: D
Binary tree
AVL tree
Spanning tree
None of these
Answer: C
33. A well -defined groups that are numerically large in size but small compared to the network as a
whole are used in …………………..
Answer: B
34. The processes that keep track of hosts whose home is in the area, but who currently visiting
another area is ……………..
Answer: A
35. In ………………. to send a multicast message a host sends it to the core, which then does the
multicast along the spanning tree.
Answer: A
36. Sending a packet to all destinations simultaneously is called ……………….
(A) Multicasting
(B) Unicasting
(C) Telecasting
(D) Broadcasting
Answer: D
Answer: D
38. In Broadcast routing, if the router does not know anything all about spanning tree,
………………. method is preferred.
Answer: A
39. The method of Broadcast routing in which each packet contains either a list of destinations or a
bit map indicating the desired destinations is ……………….
40. Sending a message to a well defined group that are numerically large in size but small compared
to the network as a whole is called ……………….
Answer: B
41. In link state routing, after the construction of link state packets new routes are computed using
…………………
Answer: C
Answer: A
43. In distance vector routing algorithm, each router maintains a separate routing table with
the following entries.
Answer: B
45. In which routing method do all the routers have a common database?
Answer: D
46. In distance vector routing algorithm, the routing tables are updated …………………
automatically
by the server
Answer: A
47. Distance vector routing algorithm is implemented in Internet as ……………………
Answer: B
(A) OSPF (B) RIP
Answer: D
Answer: D
50. In AODV routing algorithm for MANETs, the route is discovered at time
Answer: C
51. Military vehicles on a battlefield with no existing infrastructure will deploy …………… network.
Answer: A
(A) MANET (B) Cell Network
Answer: C
53. What is the type of network in which the topology change from time to time?
Wi-Fi
Cell Network
LAN
MANET
Answer: D
54. The processes that keep track of all mobile hosts visiting the area is ……………..
Answer: C
55. The hosts which are basically stationary hosts who move from one fixed site to another from time
to time but use the network only when they are physically connected to it are called …………….
Answer: A
56. The hosts who compute on the run and want to maintain their connections as they move around
……………
Answer: C
57. What is the type of network in which the routers themselves are mobile?
Answer: D
Answer: D
60. If the source deduces the existence of congestion by making local observations, such as the time
needed for acknowledgements to come back is called as ……………..
MAC layer
61. Packet discard policy is implemented in ……………..
Network layer
Answer: D
62. The solution to decrease the load on the network when congestion occurs is ……………..
Answer: D
Answer: D
64. In open loop congestion control techniques, the decisions are based on the ……………
(D) without regard to the choice of the host
(A) without regard to the current state of the network
5. In closed loop congestion control techniques, the decisions are based on the ……………..
None of these
Answer: A
66. ..………..is used to validate the identity of the message sender to the recipient
Encryption
Decryption
Digital certificate
None of these
Answer: C
67. When too many packets are present in the subnet, and performance degrades then it leads to
………………..
(A) Ingestion
(B) Congestion
Answer: B
(C) Digestion
(D) Diffusion
68. What is it goal of congestion control?
making sure that subnet is not able to carry the offered traffic
making sure that subnet will allow more than the offered packets
Answer: C
Answer: B
Answer: C
72. In transport layer, End to End delivery is the movement of data from ……………….
source to destination
Answer: C
(C) monitor the system to detect when and where congestion occurs
Answer: C
75. When routers are being inundated by packets that they cannot handle, they just throw them away is
known as ……………….
Jitter control
Choke packets
Load shedding
Answer: D
(C) Retransmission
Answer: C
78. If the buffer fills and a packet segment is dropped, then dropping all the rest of the segments from
that packet, since they will be useless anyway is called ………………..
Priority dropping
Tail dropping
None of these
Answer: B
network layer
transport layer
Answer: B
80. For applications such as audio and video streaming, the variation in the packet arrival times is called
……………..
(B) Jitter
Answer: B
(B) protocol
Answer: D
Answer: D
83. The first collision free protocol is ……………….
(D) SAP
(A) Binary countdown
84. Sending of a IP packet from host 1 to host 2 where both are of same LAN but the packet is
transferred through different intermediate LANs is called ………………
Tunnelling
Routing
Diverting
Forwarding
Answer: A
Routers
Modems
Ethernet card
Bridges
Answer: D
86. In ……………….. all frames are given to the computer, not to those addressed.
(A) Promiscuous mode
Answer: B
88. In ………………… each packet of a message need not follow the same path From sender to receiver.
Circuit switching
message switching
Answer: D
Transparent bridge
Answer: B
Selective flooding
Source Routing
Remote Bridges
Answer: A
91. The address field of a frame in HDLC protocol contains the address of the ……………… station.
(A) primary
B) secondary
tertiary
a station
Answer: B
92. In ………………. transmission, the channel capacity is shared by both communicating devices at all
times.
(A) Simplex
(B) half-duplex
(C) full-duplex
(D) automatic
(A) regions
Answer: C
B) blocks
(C) divisions
93. The DNS name space is divided into non overlapping ………………….
D) zones
Answer: D
94. Source routing bridges in the same LANs must have …………… bridge Number.
Same
Different
Source
Destination
Answer: B
Answer: A
96. A repeater takes a weakened or corrupted signal and …………… it.
(D) Reroute
(A) Amplifies
(B) Regenerates
Answer: B
(C) Resample
packet-switched
circuit-switched
message-switched
TSI
Answer: B
98. In a time division switch, a ……………… governs the destination of a packet stored in RAM.
Answer: D
99. How many cross points are needed in a single stage switch with 40 inputs and 50 outputs.
(A) 40
(B) 50
(C) 90
(D) 2000
100. The …………….. of A TSI controls the order of delivering of slot values that are stored in RAM.
cross bar
Answer: D
cross point
control unit
transceiver
Answer: D