Adhoc Wireless Network MCQ's




Question 61 :
Which of the following protocol is single-channel protocol of Contention-Based protocols?


  1. BTMA
  2. DBTMA
  3. MACAW
  4. RTMAC
  

Question 62 :
Which is not a disadvantage of using an adhoc network connection?


  1. There are too many issues (lack of security, etc.).
  2. It is good for for every day use.
  3. There are only certain situations where it would be useful.
  4. No dedicated bandwith
  

Question 63 :
Which packet is transmitted by omnidirectional antenna in the directional MAC scheme (DMAC-1)?


  1. RTS
  2. CTS
  3. ACK
  4. DATA
  

Question 64 :
In this model, each group has a center, which is either a logical center or a group leader node.


  1. In-Place Mobility Model
  2. Overlap Mobility Model
  3. Reference Point Group Mobility Model
  4. Convention Mobility Model
  

Question 65 :
A vehicular ad hoc network (VANET) can be used ____ loads, and


  1. to alert drivers of traffic jams ahead, help balance traffic informing the
  2. balance traffic loads, and reduce traveling time by
  3. close the jam route
  4. to observe the road to maintain street safty
  

Question 66 :
Which of the following is the main issue that need to be addressed while designing a MAC protocol for ad hoc wireless networks?


  1. Round Trip Time
  2. Reliability
  3. Error-Prone Shared Broadcast Channel
  4. Scalability
  

Question 67 :
MARCH protocol comes under ______ .


  1. Sender-intiated Protocol
  2. Synchronous Protocol
  3. Receiverintiated Protocol
  4. Asynchronous Protocol
  

Question 68 :
In TCP-BuS, the Pivot node attempts to find a new partial route to the TCP-BuS receiver, and the availability of a partial path to destination is intimated to theTCP-BuS sender through an ……


  1. Route failure notification (RFN) packet
  2. Explicit route disconnection notification (ERDN) packet
  3. Explicit link failure notification (ELFN) packet
  4. Explicit route successful notification (ERSN) packet.
  

Question 69 :
Which protocol ensure that all nodes are treated fairly with respect to bandwidth allocation?


  1. MAC
  2. MACAW
  3. BTMA
  4. PRMA
  

Question 70 :
One advantage that DSR has over DSDV due to its on-demand nature.


  1. New link is generated
  2. Routing adapts to load
  3. Sequence number is updated
  4. No New link is generated
  

Question 71 :
In wireless ad-hoc network ____


  1. Access point is must
  2. Access point is not required
  3. Nodes are not required
  4. All nodes are access points
  

Question 72 :
In this ________ attack, an adversary node replicates stale packets.


  1. Routing table poisoning
  2. Route cache poisoning
  3. Packet replication
  4. Routing table overflow
  

Question 73 :
In flow models, _____ commands the car’s acceleration/deceleration in order to maintain either a safe distance headway or to guarantee a safe time headway (reaction time).


  1. macroscopic modeling
  2. mesoscopic modeling
  3. microscopic modeling
  4. path Modelling
  

Question 74 :
Hybrid Routing attempts to …..........


  1. discover route only when you need it
  2. Saves energy and bandwidth during inactivity
  3. Be Proactive for neighborhood, Reactive for far away (Zone Routing Protocol, Haas group)
  4. Organize Nodes in clusters
  

Question 75 :
WPA uses ___________Algorithm to check integrity of the packets.


  1. TKIP
  2. SAP
  3. DOA
  4. TKP
  

Question 76 :
In TCP-Bus, Route Notification includes the __________ of packet belonging to that flow in the head of its queue.


  1. Source id
  2. Sequence number
  3. Destination id
  4. Receiver id
  

Question 77 :
The Random Direction mobility model was created to overcome ____ .


  1. Collision
  2. Cogestion
  3. Density Waves
  4. Interference
  

Question 78 :
Which of the following protocol is Asynchronous protocol of Contention-Based protocols with reservation Mechanism?


  1. SRMA/PA
  2. RTMAC
  3. FPRP
  4. HRMA
  

Question 79 :
In this ________ attack, an adversary node replicates stale packets.


  1. Routing table poisoning
  2. Route cache poisoning
  3. Packet replication
  4. Routing table overflow
  

Question 80 :
Cache poisoning is recognized in____ .


  1. AODV
  2. DSR
  3. ARAN
  4. ARNA
  

Question 81 :
_________protocol does not require any bandwidth reservation


  1. Contention based protocol
  2. Security based protocol
  3. Power control MAC Protocol
  4. Receiver based Autorate protocol
  

Question 82 :
Floor Acquisition Multiple Access Protocols (FAMA) is based on ______ .


  1. Carrier-sensing operation
  2. Bandwidth limitation
  3. Collision
  4. Hidden Channel
  

Question 83 :
Major advantage of Wireless Mesh Network is ____


  1. Less physical infrastructure
  2. High scalability
  3. Wired communication
  4. Dedicated Bandwidth
  

Question 84 :
Which of the following criteria is used to categories MAC protocols for ad hoc wireless networks?


  1. Round Trip Time
  2. Reliability
  3. Reservation approaches
  4. Broadcast Channel
  

Question 85 :
Which of the following issue is to be considered while designing a transport layer protocol for ad hoc wireless networks?


  1. Static Topology
  2. Completely decoupled transport layer
  3. Encoding
  4. Security
  

Question 86 :
Symmetric-key algorithms consist of ____


  1. Block ciphers
  2. Hidden Channel
  3. RTS-CTS exchange with carrier-sensing
  4. Link Layers
  

Question 87 :
Which of these is not a fast fading propogation mechanisms?


  1. Reflection
  2. Diffraction
  3. Refraction
  4. Scattering
  

Question 88 :
Which of the following protocol is a End-to-end approach of TCP over ad hoc wireless networks?


  1. Split-TCP
  2. TCP-BuS
  3. ACTP
  4. ATCP
  

Question 89 :
TCP-F provides a simple feedback-based solution to ….. the problems arising out of frequent path breaks in ad hoc wireless networks.


  1. Maximize
  2. Minimize
  3. Max
  4. Min
  

Question 90 :
For forwarding data packet from one node to another following protocol in VANET can be used ______ .


  1. Delay Tolerant Network
  2. TCP/IP
  3. UDP
  4. IP
  
Pages