Adhoc Wireless Network MCQ's




Question 31 :
Enhanced Distributed Channel Access (EDCA) allows ____ .


  1. Adhoc sensors
  2. Wired communication
  3. Safety messages
  4. Physical infrastrucute
  

Question 32 :
The wireless transmission is divided into ___________ .


  1. 3 broad groups
  2. 6 broad groups
  3. 9 broad groups
  4. 8 broad groups
  

Question 33 :
BTMA protocol comes under which mechanism?


  1. Contention Based Protocols
  2. Contentionbased protocols with reservation mechanisms
  3. MAC protocols
  4. Contentionbased protocols with scheduling
  

Question 34 :
VANET refers for ____ .


  1. Inter vehicuar communication
  2. Communication between devices
  3. Communication between Aps
  4. Communication between Wired Network
  

Question 35 :
___________ refers to the process of gaining control of the channel.


  1. BTMA
  2. MARCH
  3. Floor Acquisition
  4. MACA
  

Question 36 :
Which of the following is the main issue that need to be addressed while designing a MAC protocol for ad hoc wireless networks?


  1. Round Trip Time
  2. Reliability
  3. Scalability
  4. Hidden and Exposed Terminal Problems
  

Question 37 :
Which of the following protocol has no dedicated control channel?


  1. Multichannel MAC Protocol
  2. Interleaved Carrier-Sense Multiple Access Protocol
  3. Receiver-Based Autorate Protocol
  4. Power Control MAC Protocol for Ad Hoc Networks
  

Question 38 :
In which protocol duration of RTS must be atleast twice the maximum channel propogation delay?


  1. BTMA
  2. FAMA
  3. MARCH
  4. PRMA
  

Question 39 :
Classification of routing protocol is based on _________ .


  1. Routing information update mechanism
  2. Protocol(DSDV) Routing topology
  3. Utilization of specific resources
  4. Processing Utilization
  

Question 40 :
The objectives of transport layer protocol include:


  1. Bandwidth allocation
  2. end-to-end delivery of data packets
  3. Path finding
  4. Speed of transmission
  

Question 41 :
IEEE 802.2: specifies……


  1. the Logical Link Control (LLC)
  2. the Phisical Link Control (PLC)
  3. OSI Layers
  4. the Route Link Control (RLC)
  

Question 42 :
ADHOC TRANSPORT PROTOCOL (ATP) uses information from lower layers for ______ .


  1. Detection, avoidance and control of congestion
  2. Successful delivery of the packet
  3. maximum delay
  4. provide simple feedback information
  

Question 43 :
Frequency hopping spread spectrum(FHSS) and direct sequence spread spectrum(DSSS) are commonly use techniques to overcome __________ attacks.


  1. Passive Atttack
  2. Active Attack
  3. Snooping
  4. Jamming
  

Question 44 :
In _________ attack, an attacker receives packets at one location in the network and tunnels them to another location in the network, where the packets are resent into the


  1. Blackhole attack
  2. Wormhole attack
  3. Byzantine attack
  4. Information disclosure
  

Question 45 :
In TCP-F, an intermediate node, upon detection of a path break, originates a ………………


  1. Route failure notification (RFN) packet
  2. Route reestablishment notification (RRN) packet
  3. Explicit link failure notification (ELFN) packet
  4. Explicit route successful notification (ERSN) packet.
  

Question 46 :
Which linear decrease is used in a multiplicative increase and linear decrease (MILD) back-off mechanism of MACAW Protocol upon a successful transmission?


  1. 1
  2. 2
  3. 3
  4. 4
  

Question 47 :
Vehicular adhoc network (VANET) is a tupr of ____ .


  1. Wired Network
  2. Mobile Ad-hoc Network (MANET)
  3. Wireless Sensor Network
  4. Wired Sensor Network
  

Question 48 :
Which of the following is the phase of Five-Phase Reservation Protocol?


  1. End phase
  2. Collision report phase
  3. Contention phase
  4. Ready phase
  

Question 49 :
Which of the following is the main components of MACA/PR?


  1. SMTP
  2. Reservation protocol
  3. FTP
  4. SNMP
  

Question 50 :
Which is TCP protocol cannot be used for the issue of Dependency on routing protocol ?


  1. TCP-ELFN
  2. TCP-F
  3. SPLIT TCP
  4. TCP-BUS
  

Question 51 :
Which is not a characteristic of the wireless Channel?


  1. Path Loss
  2. Fading
  3. Interference
  4. Spectrum Allocation
  

Question 52 :
Which is not a type of Adhoc Wireless Routing Protocol Based on routing information?


  1. Proactive Routing Protocol
  2. Hybrid Routing Protocol
  3. Power Aware Routing Protocol
  4. Reactive Routing Protocol
  

Question 53 :
In TCP-ELFN, for detecting the new route reestablishment TCP ……. Packets are used.


  1. Route failure notification (RFN) packet
  2. Route reestablishment notification (RRN) packet
  3. Probe packet
  4. Explicit route successful notification (ERSN) packet.
  

Question 54 :
Mostly ________ is used in wireless LAN.


  1. Space division multiplexing
  2. Channel division multiplexing
  3. Orthogonal frequency division multiplexing
  4. Time division multiplexing
  

Question 55 :
Which of the following is the main issue that need to be addressed while designing a MAC protocol for ad hoc wireless networks?


  1. Round Trip Time
  2. Reliability
  3. Synchronization
  4. Scalability
  

Question 56 :
Ad-hoc network connects each computer using which network topology?


  1. Three
  2. Mesh
  3. Star
  4. Bus
  

Question 57 :
The driver is influenced by an approaching preceding vehicle and applies a normal deceleration rate to reach a safe interdistance.


  1. Approaching mode
  2. Free-driving
  3. Following mode
  4. Breaking mode
  

Question 58 :
The network in which all the nodes are symmetric and there is no central control or hierarchy is ……


  1. MANET
  2. Client-Server Technology
  3. Peer-to-Peer
  4. VANET
  

Question 59 :
Flooding-based mechanisms classified as __- -


  1. Hybrid mechanisms
  2. Forwardingbased
  3. Disseminationbased
  4. Priority-based
  

Question 60 :
Communication in vehicular environment are provided by ____ .


  1. using a OSI Model
  2. using a wireless medium 802.11p which is based out of 802.11 standard
  3. Satellite communication
  4. using a wireless medium 820.11p which is based out of
  
Pages