Quiznetik

Wireless Network | Set 1

1. If a datagram router goes down then …………..

Correct : B. only those packets which are queued in the router at that time will suffer

2. In datagram subnet new route is chosen …………………

Correct : A. for every packet sent

3. For a connection oriented service, we need a ……………

Correct : C. datagram subnet

4. In ………………, each packet of a message follows the same path from sender to receiver.

Correct : A. circuit switching

5. A permanent virtual circuit involves ……………..

Correct : B. data transfer

6. The set of optimal routes from all sources to a given destination from a tree rooted to the destination is known as ……………..

Correct : C. sink tree

7. Adaptive routing algorithms get their information from ………….

Correct : C. from locally, adjacent, external routers

8. In Hierarchical routing for N router subnet, the optimal number of levels is …………..

Correct : C. lnn (

9. The router algorithm takes the decision to changes the route when ……………..

Correct : B. topology changes

10. If route from router I to router J is computed on line based on the current statistics, then it is called as ………………..

Correct : A. dynamic routing

11. If the subnet uses virtual circuits internally, routing decisions are made only when a new virtual circuit is being setup. This is called as……………..

Correct : A. session routing

12. …………….. change their routing decisions to reflect changes in the topology.

Correct : B. adaptive algorithms

13. If router J is on the optimal path from router I to router K, then the optimal path from J to K also falls along the same route is known as ………………..

Correct : B. optimality principle

14. ……………. do not base their routing decisions on measurements or estimates of the current traffic and topology.

Correct : A. non adaptive algorithms

15. The method of network routing where every possible path between transmitting and receiving DTE is used is called ……………

Correct : B. packet flooding

16. In Hierarchical routing, the routers are divided into what is called as ……………..

Correct : C. regions

17. The regions in Hierarchical routing are grouped in to ……………..

Correct : A. clusters

18. The Clusters in Hierarchical routing are grouped in to ………………

Correct : B. zones

19. If a router sends every incoming packet out only on those lines that are going approximately in the right direction is known as ……………..

Correct : C. selective flooding

20. To do multicast routing, each router computes a …………………

Correct : C. spanning tree

21. In ………………. to send a multicast message a host sends it to the core, which then does the multicast along the spanning tree.

Correct : A. core based trees

22. In distance vector routing algorithm, each router maintains a separate routing table with the following entries.

Correct : C. preferred output line, estimated time

23. In distance vector routing algorithm, the routing tables are updated …………………

Correct : A. by exchanging information with the neighbours

24. In AODV routing algorithm for MANETs, the route is discovered at time

Correct : C. when there is a need for route by the host

25. The processes that keep track of all mobile hosts visiting the area is ……………..

Correct : C. foreign agent

26. The hosts which are basically stationary hosts who move from one fixed site to another from time to time but use the network only when they are physically connected to it are called …………….

Correct : A. migratory hosts

27. The hosts who compute on the run and want to maintain their connections as they move around ……………

Correct : C. mobile hosts

28. What is the type of network in which the routers themselves are mobile?

Correct : B. mobile ad hoc network

29. In open loop congestion control techniques, the decisions are based on the ……………

Correct : A. without regard to the current state of the network

30. In closed loop congestion control techniques, the decisions are based on the ……………..

Correct : A. concept of a feedback loop

31. ..………..is used to validate the identity of the message sender to the recipient

Correct : C. digital certificate

32. When too many packets are present in the subnet, and performance degrades then it leads to ………………..

Correct : B. congestion

33. What is it goal of congestion control?

Correct : C. making sure that subnet is able to carry the offered traffic

34. The service of open loop congestion control technique is …………………..

Correct : B. when to accept new traffic

35. In …………… case higher bandwidth can be achieved.

Correct : A. connectionless networks

36. In transport layer, End to End delivery is the movement of data from ……………….

Correct : C. source to destination

37. The service of closed loop congestion control technique is ………………

Correct : C. monitor the system to detect when and where congestion occurs

38. The solution to increase the capacity when congestion occurs is …………………

Correct : C. splitting traffic over multiple routes

39. When the source host receives the choke packet, then the source ………………

Correct : C. reduces the traffic generation

40. If the buffer fills and a packet segment is dropped, then dropping all the rest of the segments from that packet, since they will be useless anyway is called ………………..

Correct : B. tail dropping

41. Flow control policy is implemented in ………………….

Correct : B. transport layer

42. For applications such as audio and video streaming, the variation in the packet arrival times is called ……………..

Correct : B. jitter

43. The first collision free protocol is ……………….

Correct : B. basic bitmap

44. Sending of a IP packet from host 1 to host 2 where both are of same LAN but the packet is transferred through different intermediate LANs is called ………………

Correct : A. tunnelling

45. FDDI is an acronym for ……………

Correct : B. fiber distributed data interface

46. The address field of a frame in HDLC protocol contains the address of the ……………… station.

Correct : B. secondary

47. In ………………. transmission, the channel capacity is shared by both communicating devices at all times.

Correct : C. full-duplex

48. Source routing bridges in the same LANs must have …………… bridge Number.

Correct : B. different

49. A repeater takes a weakened or corrupted signal and …………… it.

Correct : B. regenerates

50. The PSTN is an example of …………….. network.

Correct : B. circuit-switched