You are on page 1of 6

Which one of the following is computing that allows continuous access to remote resources even with the physical

mobility of small computing devices such as laptops? a. b. c. d. Soft computing Mobile computing Remote computing Ubiquitous computing

Which one of the following can be characterized as mobility through a global network? a. b. c. d. Macro-mobility Micro-mobility Ad hoc mobility None of the above

Mobility of a device in one single administrative domain of the global network is known as which one of the following? a. b. c. d. Macro-mobility Micro-mobility Ad hoc mobility None of the above

Which one of the following is not a wireless protocol? a. b. c. d. Bluetooth IrDA WAP CSMA/CD

Which one of the following is true for statements X and Y? X: It is easier to provide security for a mobile system as compared to a stationary system. Y: Security includes user authentication, data integrity and privacy, prevention of denial of service and non-repudiation. a. b. c. d. X is true but Y is false X is false but Y is true Both X and Y are true Both X and Y are false

The higher frequencies, that is, ultraviolet light, X-rays and gamma rays, are normally not used for wireless transmission, because of which one of the following reasons? a. They are difficult to produce and modulate

b. Do not propagate well through buildings c. They are harmful to humans d. All of the above Which one of the following is not true for infrared waves? a. b. c. d. They are capable of traversing multiple paths without interferences They are less secure than radio They have reasonably high bandwidth No government license is required for their operation

Which one of the following is the multiple-access scheme used in GSM? a. b. c. d. Time division multiple access (TDMA) Frequency division multiple access (FDMA) Code division multiple access (CDMA) A combination of TDMA and FDMA

The efficiency of a wireless system is given in which of the following units? a. b. c. d. bits per second bits per second per Hertz bits per second per Hertz per km2 None of the above

Wireless LANs will operate in which one of the following configurations? a. b. c. d. With base stations only Without base stations only Either a or b None of the above

Which one of the following is the main standard for WLANs? a. b. c. d. IEEE 802.15 IEEE 802.3 IEEE 802.11 IEEE 802.16

In the above figure, which one of the following gives the hidden station problem?

a. b. c. d.

When both B and C wants to transmit to station D When only B wants to transmit to A When C wants to transmit to both B and D When A and C wants to transmit to B.

In the same figure, which one of the following gives the exposed station problem? a. b. c. d. A and C want to transmit to B A is sending to some other station E and B wants to send to C Only B wants to transmit to A Both B and C wants to transmit to station D

Which one of the following is to be considered in WLANs? a. b. c. d. Multipath fading Handoff Mobility awareness All the above

Which one of the following is the main standard for Bluetooth? a. b. c. d. IEEE 802.15 IEEE 802.3 IEEE 802.11 IEEE 802.16

Which one of the following gives the number of nodes in a Scatternet? a. b. c. d. One None At least two None of the above

The mobility binding table in mobile IP is maintained by a. b. c. d. Mobile node Home agent Foreign agent All of the above

Why is mobile IP not suitable for seamless mobility? a. b. c. d. Route optimization is optional in mobile IP After each migration, local address must to obtained and communicated to home agent Mobile IP requires home and foreign agents All of the above

Which one of the following is one of the columns of the visitor list maintained by the foreign agent? a. b. c. d. Home address Media address Life time All of the above

Which one of the following is the mobility requirement for physical mobility? a. b. c. d. Low power Low bandwidth Small user interface Address migration

Which one of the following is a type of MANET? a. b. c. d. Personal area network Body area network Wireless LAN All of the above

Which of the following is NOT true with respect to a MANET? a. b. c. d. All the nodes in a MANET are free to move arbitrarily Power consumption is a major issue in MANETs. MANETs offer less mobility as compared to 802.11 Wi-Fi. MANETs are more vulnerable to security threats than wired or 802.11 Wi-Fi networks.

Which of the following is a reactive routing protocol for MANETs? a. b. c. d. CSMA/CA Dynamic source routing (DSR) Link state routing protocol DSDV

Which of the following fields is contained in the route request (RREQ) packet? a. b. c. d. Destination IP address Request ID Source sequence number All of the above

GSM can best be called a system for (1) cordless telephony

(2) cellular telephony Which of the following statements is true of a wireless LAN? (1) Communication between devices may only occur in ad-hoc mode. (2) Communication between devices may only occur via an access point. (3) Communication between devices may occur via an access point, or in ad-hoc mode. GSM includes HLR and VLR databases. Their uses may be described as: (1) Every time a user moves into a location area of a different MSC, all relevant user information is copied from the VLR to the HLR associated with the new MSC. (2) The contents of HLRs and VLRs are always the same. (3) A VLR copies all relevant information for a user from the HLR every time a user moves from one cell to another. (4) Every time a user moves into the location area of a different MSC, all relevant user information is copied from the HLR to the VLR associated with the new MSC. Which of these statements are correct? I. II. III. IV. Mobile Switching Centre(MSC) would process the call made by one mobile phone user to another mobile phone user. Public Switched Telephone Network(PSTN) would be involved in processing a call when the call is made by a mobile phone user to a land phone. Both MSC and PSTN processes a call made from a mobile phone to a land phone. Electronic Serial Number(ESN) is the telephone number of the cellular instrument assigned to the subscriber. (1) (2) (3) (4) III only I, II and IV III and IV I and II

Which of the following statement is true about spread spectrum? A. It uses a narrow band frequency B. Spread Spectrum allocates disjoint resources (frequency or time slots depending on the access system) to each user. C. Spread Spectrum signals can be picked up by simple receivers D. Spread spectrum signals are hard to jam and identify When a mobile node is using a collocated care-of address, the mobile node acts as its own foreign agent. a. True.

b. False. Which Mobile IP entities are ultimately responsible for discovery? 1. Home agents. 2. Foreign agents. 3. Mobile nodes. 4. All of the above. 5. None of the above. Mobile IP was designed to resist fraudulent redirections of IP traffic. 1. True. 2. False. Every GSM phone has a unique sequence number. What is it called? a) International Mobile Equipment Identity number b) International Multiple Access number c) International Equipment Code d) International Network Access Code

You might also like