Question 31 :
Enhanced Distributed Channel Access (EDCA) allows ____ .
- Adhoc sensors
- Wired communication
- Safety messages
- Physical infrastrucute
Question 32 :
The wireless transmission is divided into ___________ .
- 3 broad groups
- 6 broad groups
- 9 broad groups
- 8 broad groups
Question 33 :
BTMA protocol comes under which mechanism?
- Contention Based Protocols
- Contentionbased protocols with reservation mechanisms
- MAC protocols
- Contentionbased protocols with scheduling
Question 34 :
VANET refers for ____ .
- Inter vehicuar communication
- Communication between devices
- Communication between Aps
- Communication between Wired Network
Question 35 :
___________ refers to the process of gaining control of the channel.
- BTMA
- MARCH
- Floor Acquisition
- MACA
Question 36 :
Which of the following is the main issue that need to be addressed while designing a MAC protocol for ad hoc wireless networks?
- Round Trip Time
- Reliability
- Scalability
- Hidden and Exposed Terminal Problems
Question 37 :
Which of the following protocol has no dedicated control channel?
- Multichannel MAC Protocol
- Interleaved Carrier-Sense Multiple Access Protocol
- Receiver-Based Autorate Protocol
- Power Control MAC Protocol for Ad Hoc Networks
Question 38 :
In which protocol duration of RTS must be atleast twice the maximum channel propogation delay?
- BTMA
- FAMA
- MARCH
- PRMA
Question 39 :
Classification of routing protocol is based on _________ .
- Routing information update mechanism
- Protocol(DSDV) Routing topology
- Utilization of specific resources
- Processing Utilization
Question 40 :
The objectives of transport layer protocol include:
- Bandwidth allocation
- end-to-end delivery of data packets
- Path finding
- Speed of transmission
Question 41 :
IEEE 802.2: specifies……
- the Logical Link Control (LLC)
- the Phisical Link Control (PLC)
- OSI Layers
- the Route Link Control (RLC)
Question 42 :
ADHOC TRANSPORT PROTOCOL (ATP) uses information from lower layers for ______ .
- Detection, avoidance and control of congestion
- Successful delivery of the packet
- maximum delay
- provide simple feedback information
Question 43 :
Frequency hopping spread spectrum(FHSS) and direct sequence spread spectrum(DSSS) are commonly use techniques to overcome __________ attacks.
- Passive Atttack
- Active Attack
- Snooping
- Jamming
Question 44 :
In _________ attack, an attacker receives packets at one location in the network and tunnels them to another location in the network, where the packets are resent into the
- Blackhole attack
- Wormhole attack
- Byzantine attack
- Information disclosure
Question 45 :
In TCP-F, an intermediate node, upon detection of a path break, originates a ………………
- Route failure notification (RFN) packet
- Route reestablishment notification (RRN) packet
- Explicit link failure notification (ELFN) packet
- Explicit route successful notification (ERSN) packet.
Question 46 :
Which linear decrease is used in a multiplicative increase and linear decrease (MILD) back-off mechanism of MACAW Protocol upon a successful transmission?
- 1
- 2
- 3
- 4
Question 47 :
Vehicular adhoc network (VANET) is a tupr of ____ .
- Wired Network
- Mobile Ad-hoc Network (MANET)
- Wireless Sensor Network
- Wired Sensor Network
Question 48 :
Which of the following is the phase of Five-Phase Reservation Protocol?
- End phase
- Collision report phase
- Contention phase
- Ready phase
Question 49 :
Which of the following is the main components of MACA/PR?
- SMTP
- Reservation protocol
- FTP
- SNMP
Question 50 :
Which is TCP protocol cannot be used for the issue of Dependency on routing protocol ?
- TCP-ELFN
- TCP-F
- SPLIT TCP
- TCP-BUS
Question 51 :
Which is not a characteristic of the wireless Channel?
- Path Loss
- Fading
- Interference
- Spectrum Allocation
Question 52 :
Which is not a type of Adhoc Wireless Routing Protocol Based on routing information?
- Proactive Routing Protocol
- Hybrid Routing Protocol
- Power Aware Routing Protocol
- Reactive Routing Protocol
Question 53 :
In TCP-ELFN, for detecting the new route reestablishment TCP ……. Packets are used.
- Route failure notification (RFN) packet
- Route reestablishment notification (RRN) packet
- Probe packet
- Explicit route successful notification (ERSN) packet.
Question 54 :
Mostly ________ is used in wireless LAN.
- Space division multiplexing
- Channel division multiplexing
- Orthogonal frequency division multiplexing
- Time division multiplexing
Question 55 :
Which of the following is the main issue that need to be addressed while designing a MAC protocol for ad hoc wireless networks?
- Round Trip Time
- Reliability
- Synchronization
- Scalability
Question 56 :
Ad-hoc network connects each computer using which network topology?
- Three
- Mesh
- Star
- Bus
Question 57 :
The driver is influenced by an approaching preceding vehicle and applies a normal deceleration rate to reach a safe interdistance.
- Approaching mode
- Free-driving
- Following mode
- Breaking mode
Question 58 :
The network in which all the nodes are symmetric and there is no central control or hierarchy is ……
- MANET
- Client-Server Technology
- Peer-to-Peer
- VANET
Question 59 :
Flooding-based mechanisms classified as __- -
- Hybrid mechanisms
- Forwardingbased
- Disseminationbased
- Priority-based
Question 60 :
Communication in vehicular environment are provided by ____ .
- using a OSI Model
- using a wireless medium 802.11p which is based out of 802.11 standard
- Satellite communication
- using a wireless medium 820.11p which is based out of