Question 61 :
Which of the following protocol is single-channel protocol of Contention-Based protocols?
- BTMA
- DBTMA
- MACAW
- RTMAC
Question 62 :
Which is not a disadvantage of using an adhoc network connection?
- There are too many issues (lack of security, etc.).
- It is good for for every day use.
- There are only certain situations where it would be useful.
- No dedicated bandwith
Question 63 :
Which packet is transmitted by omnidirectional antenna in the directional MAC scheme (DMAC-1)?
- RTS
- CTS
- ACK
- DATA
Question 64 :
In this model, each group has a center, which is either a logical center or a group leader node.
- In-Place Mobility Model
- Overlap Mobility Model
- Reference Point Group Mobility Model
- Convention Mobility Model
Question 65 :
A vehicular ad hoc network (VANET) can be used ____ loads, and
- to alert drivers of traffic jams ahead, help balance traffic informing the
- balance traffic loads, and reduce traveling time by
- close the jam route
- to observe the road to maintain street safty
Question 66 :
Which of the following is the main issue that need to be addressed while designing a MAC protocol for ad hoc wireless networks?
- Round Trip Time
- Reliability
- Error-Prone Shared Broadcast Channel
- Scalability
Question 67 :
MARCH protocol comes under ______ .
- Sender-intiated Protocol
- Synchronous Protocol
- Receiverintiated Protocol
- Asynchronous Protocol
Question 68 :
In TCP-BuS, the Pivot node attempts to find a new partial route to the TCP-BuS receiver, and the availability of a partial path to destination is intimated to theTCP-BuS sender through an ……
- Route failure notification (RFN) packet
- Explicit route disconnection notification (ERDN) packet
- Explicit link failure notification (ELFN) packet
- Explicit route successful notification (ERSN) packet.
Question 69 :
Which protocol ensure that all nodes are treated fairly with respect to bandwidth allocation?
- MAC
- MACAW
- BTMA
- PRMA
Question 70 :
One advantage that DSR has over DSDV due to its on-demand nature.
- New link is generated
- Routing adapts to load
- Sequence number is updated
- No New link is generated
Question 71 :
In wireless ad-hoc network ____
- Access point is must
- Access point is not required
- Nodes are not required
- All nodes are access points
Question 72 :
In this ________ attack, an adversary node replicates stale packets.
- Routing table poisoning
- Route cache poisoning
- Packet replication
- Routing table overflow
Question 73 :
In flow models, _____ commands the car’s acceleration/deceleration in order to maintain either a safe distance headway or to guarantee a safe time headway (reaction time).
- macroscopic modeling
- mesoscopic modeling
- microscopic modeling
- path Modelling
Question 74 :
Hybrid Routing attempts to …..........
- discover route only when you need it
- Saves energy and bandwidth during inactivity
- Be Proactive for neighborhood, Reactive for far away (Zone Routing Protocol, Haas group)
- Organize Nodes in clusters
Question 75 :
WPA uses ___________Algorithm to check integrity of the packets.
- TKIP
- SAP
- DOA
- TKP
Question 76 :
In TCP-Bus, Route Notification includes the __________ of packet belonging to that flow in the head of its queue.
- Source id
- Sequence number
- Destination id
- Receiver id
Question 77 :
The Random Direction mobility model was created to overcome ____ .
- Collision
- Cogestion
- Density Waves
- Interference
Question 78 :
Which of the following protocol is Asynchronous protocol of Contention-Based protocols with reservation Mechanism?
- SRMA/PA
- RTMAC
- FPRP
- HRMA
Question 79 :
In this ________ attack, an adversary node replicates stale packets.
- Routing table poisoning
- Route cache poisoning
- Packet replication
- Routing table overflow
Question 80 :
Cache poisoning is recognized in____ .
- AODV
- DSR
- ARAN
- ARNA
Question 81 :
_________protocol does not require any bandwidth reservation
- Contention based protocol
- Security based protocol
- Power control MAC Protocol
- Receiver based Autorate protocol
Question 82 :
Floor Acquisition Multiple Access Protocols (FAMA) is based on ______ .
- Carrier-sensing operation
- Bandwidth limitation
- Collision
- Hidden Channel
Question 83 :
Major advantage of Wireless Mesh Network is ____
- Less physical infrastructure
- High scalability
- Wired communication
- Dedicated Bandwidth
Question 84 :
Which of the following criteria is used to categories MAC protocols for ad hoc wireless networks?
- Round Trip Time
- Reliability
- Reservation approaches
- Broadcast Channel
Question 85 :
Which of the following issue is to be considered while designing a transport layer protocol for ad hoc wireless networks?
- Static Topology
- Completely decoupled transport layer
- Encoding
- Security
Question 86 :
Symmetric-key algorithms consist of ____
- Block ciphers
- Hidden Channel
- RTS-CTS exchange with carrier-sensing
- Link Layers
Question 87 :
Which of these is not a fast fading propogation mechanisms?
- Reflection
- Diffraction
- Refraction
- Scattering
Question 88 :
Which of the following protocol is a End-to-end approach of TCP over ad hoc wireless networks?
- Split-TCP
- TCP-BuS
- ACTP
- ATCP
Question 89 :
TCP-F provides a simple feedback-based solution to ….. the problems arising out of frequent path breaks in ad hoc wireless networks.
- Maximize
- Minimize
- Max
- Min
Question 90 :
For forwarding data packet from one node to another following protocol in VANET can be used ______ .
- Delay Tolerant Network
- TCP/IP
- UDP
- IP