Question Bank ECC802 R-16 WN EXTC

Download as xlsx, pdf, or txt
Download as xlsx, pdf, or txt
You are on page 1of 42

Q=QUESTION

A=ANSWER

Q
A
A
A
A
Q
A
A
A
A
Q
A
A
A
A
Q
A
A
A
A
Q
A
A
A
A
Q
A
A
A
A
Q
A
A
A
A
Q
A
A
A
A
Q
A
A
A
A

Q
A
A
A
A

Q
A
A
A
A

Q
A
A
A
A

Q
A
A
A
A

Q
A
A
A
A
Q
A
A
A
A

Q
A
A
A
A

Q
A
A
A
A

Q
A
A
A
A

Q
A
A
A
A

Q
A
A
A
A

Q
A
A
A
A

Q
A
A
A
A

Q
A
A
A
A

Q
A
A
A
A

Q
A
A
A
A

Q
A
A
A
A

Q
A
A
A
A

Q
A
A
A
A

Q
A
A
A
A

Q
A
A
A
A

Q
A
A
A
A

Q
A
A
A
A

Q
A
A
A
A

Q
A
A
A
A

Q
A
A
A
A

Q
A
A
A
A

Q
A
A
A
A

Q
A
A
A
A

Q
A
A
A
A

Q
A
A
A
A

Q
A
A
A
A

A
A

Q
A
A
A
A

Q
A
A
A
A
Q
A
A
A
A
Q
A
A
A
A
Q
A
A
A
A

Q
A
A
A
A
Q
A
A
A
A
Q
A
A
A
A

Q
A
A
A
A

Q
A
A
A
A
Q
A
A
A
A

Q
A
A
A
A
Q
A
A
A
A
Q
A
A
A
A

Q
A
A
A
A

Q
A
A
A
A

Q
A
A
A
A
Q
A
A
A
A
Q
A
A
A
A

Q
A
A
A
A

Q
A
A
A
A

Q
A
A
A
A

Q
A
A
A
A

Q
A
A
A
A

Q
A
A
A
A

Q
A
A
A
A
Q
A
A
A
A
Q
A
A
A
A
Q
A
A
A
A
Q
A
A
A
A

Q
A
A
A
A

Q
A
A
A
A

Q
A
A
A
A

A
A

A
A

Q
A
A
A
A
Q
A
A
A
A

Q
A
A
A

A
A
Q
A
A
A
A
Q
A
A
A
A
Q
A
A
A
A
Q
A
A
A
A
Q
A
A
A
A
Q
A
A
A
A
Q
A
A
A
A
Q
A
A
A
A
Q
A
A
A
A
Q
A
A
A
A
Q
A
A
A
A
Q
A
A
A
A

Q
A
A
A
A

Q
A
A
A
A

Q
A
A
A
A

Q
A
A
A
A
question_description
answer_description

Developed by International Telecommunication Union (ITU), ______ is a code-division multiple access (CDMA) ver
CDMA
WCDMA
CSYK
CDMA 2000
Wireless Networks can be classified into
WLANS
WPANS
WMANS
All of these
Which of this is not true for WBAN
use of a broadband signaling scheme (possibly ultra-wideband, UWB);
frequency range below 6 GHz
support of heterogeneous multihop links to cope with the high path loss
support of one hop link to cope with the high path loss
Packet-switched communication uses
short bursts of information that use channels for longer periods of time.
short bursts of information that use channels only for short periods of time.
Dedicated connections for longer period
None of the above
The technique uses M different carrier frequencies modulated by the source signal with changing time slots.
FDM
FHSS
DSSS
TDMA
Which node communication is usually in WBAN in nature
Simplex
Duplex
Data centric
Medium Access Control
Which of the following is a faster version of GSM wireless service, designed to deliver data at rates up to 384 Kbps a
ESMR
BREW
EDGE
None of the above
Which of the FCC's RF bands operates in the frequency range of 2.4 GHz to 2.4835 GHz
ISM
RFID
SOHO
UNII
IEEE 802.15.2 describes coexixtance of WPAN with
wired devices
wireless devices
both wired and wireless devices
telephony

IEEE 802.15.3 standard is proposed for


low rate wpan
high rate wpan
mesh based wpan
both low and high rate wpan

Logical link control and adaptation protocol implement


a) multiplexing
b) flow control
both a and b
ofdm

WPAN standard based on bluetooth v1.1 is


IEEE 802.15.1
802.15.2
802.15.1G
802.11.1

Which layer receives and transmits data and voive in WPAN


Physical layer
data link layer
session layer
application layer

_____ is a low connection based bluetooth communication protocol that implements multiplexing.
L2CAP
control block
link manager
adhoc
________ is a bit oriented protocol that defines the call control signaling for establishment of speech and data calls
L2CAP
Telephony control specification
LLC
zigbee

Which is not a part of the bluetooth system


RF section
link control unit
link management software
AF section

frequency hopping synchronization (FHS) contains ______information bits


144
255
1025
0

which packets can cover upto 5 time slots and hold upto 226 infobytes
DM3
DM5
DH5
DH6

HR WPAN uses which IEEE standard


802.15.1
802.15.1a
802.15.1g
802.15.3

LR WPAN IS ALSO CALLED AS


ZIGBEE
BLUETOOTH
WIFI
WIMAX

The different layers of zigbee stack communicate with each other using ____
service access point (SAP)
L2CAP
Cluster
tree

which command is used for handling all MAC peer entity control transfers
MAC command frame
beacon frame
data frame
data packets

Which is not an application of WPAN


Automotive
information sharing
health monitoring
3d printing

__________- provides security mechanism for layers that use encryption


Security service provider (SSP)
application object
application framework
aps sublayer

__________ is responsible for providing a data service to the application and ZDP
Security service provider (SSP)
application object
application framework
aps sublayer

A peer to peer network can be


adhoc
multi cluster
tree
coordinator

A zigbee device can be


full function device (FFD) and Reduced function device (RFD)
coordinator
controller
frame

The IEEE 802.15.3 task group is developling WPAN upto _______Mbps


155
55
255
10

IEEE 802.15.2 is concerned with which issue that arise when two wireless systems share an environment of operation
coexistance
interference
swapping
complexity

Which method of multiple secondary communication in TDMA is acquired/adopted by bluetooth especially where da
Synchronous Connection-Oriented (SCO) Link
Asynchronous Connectionless Link (ACL)
data packets
Data Frames

Bluetooth allows the station to define the quality of:


Time level
service level
data level
segment level

Bluetooth supports _______


point-to-point connections
point-to-multipoint connection
both point-to-point connections and point-to-multipoint connection
multipoint to point connection

The 802.11 standard provides a mechanism to remove a station from the basic service set, is called as:

Removetion
Identification
De-authentication.
Authentication
IEEE 802.11 supports following power utilization modes:
Hold Mode
continuous aware mode
Sniff mode
Stand by mode

The original version of the 802.11 specifies in the DSSS standard an 11-bit chipping, called a______
Barker sequence
Direct sequence
P-N sequence
F-H sequence

To increase the data rate in 802.11b standard advanced coding techniques are employed. That is:
Phase Shift Keying
On-Off keying (OOK)
complementary code keying (CCK)
Pulse Code Modulation technique

802.11n employs an evolutionary philosophy reusing existing technologies. Which of the following technology is not
OFDM
forward error correction coding
interleaving
amplitude modulation mapping

________ technology is used in 802.11n, to evolve the existing OFDM physical interface presently implemented with

Single input Multiple output


Multiple input Multiple output
Multiple input Single output
Single input Single output

__________ is a scheme commonly used to resolve contention problems among different stations wishing to transmit

CSMA
CSMA/CA
CSMA/CD
Backoff
Each MAC frame in HIPERLAN/2 consist of a
Broadcast phase
Downlink and uplink phases
Random access phase
All the above

Which of the following is a permanent IP address that is assigned to a mobile node?

Home address
Permanent address
Visitor address
None of the above

What conclusion can be drawn if the collision is detected in CSMA/CD algorithm while controlling the access in wire

Non-reception of frame & necessity of retransmission

No necessity of working in duplex mode for the host

No necessity to prevent the signal fading


All of the above

802.11a offers greater speed than 802.11b but offers less ________
speed
distance
security
channels

In IEEE 802.11, communication between two stations in two different BSSs usually occurs via two ________.
BSSs
ESSs
APs
none of the above
The wireless network planning process can be divided into
initial planning(dimensioning) phase
detailed radio network planning phase
operation and optimization phase
all the above
______ is used to estimate the approximate number of cell sites required, base station confi gurations, and number of network e
initial planning(dimensioning) phase
detailed radio network planning phase
operation and optimization phase
all the above
_______takes into account the real site locations, real propagation conditions, and real user distributions based on the operator’
Dimensioning Phase
The detailed planning phase
Both of the above
None
The planning of a wireless network is a __________task in which competing
requirements must be balanced.
Complex
multitasking
Easy
multidiscipline
Cell and frequency planning in a cellular network requires:
a) initial traffic estimation
b) traffic growth plan
both a&b
None of above
To design for capacity, market forecasts of average subscriber _________ are used to determine the number of busy hours per d
call minutes per day
call minutes per month
call hour per year
call minutes per hour
The most important design objective of a cellular network is to provide ______
radio coverage.
far ubiquitous
fixed
near ubiquitous
Variable
critical factor that affects radio coverage is ______ for both
buildings and vehicles
penetration loss
area
prapogation loss
bandwidth
If radio coverage for the outer section of a building is suffi cient, then an assumed penetration loss of ______ dB should be ade
16 to 20
16to 25
20 to 25
10 to 15
If calls are expected to be received and originated within the inner core
of the building, a penetration loss of about ____ dB should be used.
16 to 18
16 to 20
20 to 16
18 to 16
A _____ could experience a penetration loss of 3 to 6 dB.
VAN
Bus
car
Truck
For a typical urban environment, a shadow fading margin of _____ dB should be used based on the
assumption that path loss follows an inverse exponent law.
18 to 9
8 to 9
8 to 19
18 to 19
the pole capacity of a CDMA cell, we consider a user with the
received signal strength of S at the base station and account for interference from _____ users in its own cell
M-1
M+1
M
N
In the 1X EV-DO users are separated into ___ classes according to their signal-tonoise
ratio (SNR) levels, and corresponding instantaneous rate levels supportable
M
M-1
N
M+1
For a mixed R99 and HSDPA HSDSCH
power should be around _______.
14 to 7 W.
4 to 7 W.
41 to 7 W.
7 to 4 W.
the objective of the HSDPA link budget is to estimate the ______achievable in the downlink at the cell edge, assuming that cov
maximum data rate
minimum data rate
minimum interference
maximum coverage
The use of _______ in link budget requires the knowledge of bit rate or number of codes.
Eb
N0
Eb/N0
N0/Eb
In the UMTS, the ______ interface is dimensioned to carry expected user traffic between a BTS (node B) and an RNC includin
O&M, ATM.
Iub
Uu
Both of the above
None of above
Large banks can connect branches
and ATM sites to their regional office
through a private WiMAX network
carrying voice, video, and data.
Fasle
1
Both of the above
None of above
LMDS and MMDS deployed together
can lower system deployment costs and increase coverage.
1
0
Both of the above
None of above
Space–time codes can be designed in
two ways space–time block code and
space–time trellis code
1
0
Both of the above
None of above
_____are better options for small
businesses but not for central office
MMDS
LMDS
UCIC
NCR
The wireless local loop sytems are_____ type of broadband wireless
networks.
Dyanamic
static
Fixed
ad-hoc
Extended real-time polling service supports real-time applications where
the applications require guaranteed____ and____ .
data rate & delay
bandwidth & dealy
data rate & Bandwidth
None of above
What is the type of network in which the routers themselves are mobile?
Wide Area Network
Mobile Ad hoc Network
Mobile Network
Local Area Network
What is the routing algorithm used in MANETs?
Shortest Path First
Routing Information Protocol
Distance Vector Protocol
Ad hoc On -demand Distance Vector Protocol
which of the following protocol is not a routing protocol in WMNs
link quality source routing(LQSR)
Multi-radio link quality source routing
hierarchical routing
open shortest path first
which of the following protocol is more favorable
TDMA
CDMA
CSMA/CD
CSMA/CA

in MANETs, performance degradation will take place because of


a) mobility of nodes
b) decreased distance between the nodes
c) varying link capacity
both a and c
Ad hoc wireless networks can be very useful inestablishing _____ among a group of soldiers for tactical operations.

Communication
Information
Network Channel
DCN
This mode of wireless network allows devices to communicate directly with each other.

Ad- hoc
Digital
Physical
Infrastructure
What is the access point (AP) in a wireless LAN?

device that allows wireless devices to connect to a wired network

wireless devices itself


both device that allows wireless devices to connect to a wired network and wireless devices itself

all the nodes in the network

In shortest path routing algorithm, the path length is measured based on ……………
time delay
number of hops
size of the routers
routing table
A well -defined groups that are numerically large in size but small compared to the network as a whole are used in ……………
Unicast routing
Multicast routing
Broadcast routing
Telecast routing

In AODV routing algorithm for MANETs, the route is discovered at time


only when the network is established
in middle of the transmission
when there is a need for route by the host

when there is no need for route by the host

Why probe packets are transmitted in the network?


To know about the capacity of the channel

to count the number of host in the network

to know about efficiency of the routing algorithm


to know about the congestion
Which of the following protocol is more favorable for detecting collision
TDMA
CDMA
CSMA/CA
CSMA/CD
________ have a great long-term economic potential, ability to transform our lives, and pose many new system-building challe
WBANs
  Wireless sensor networks (WSNs)

PANs
WWANs
Which of the following is not a differences between WSNs and ad hoc networks:
The number of sensor nodes in a sensor network can be several orders of magnitude higher than those in an ad hoc network
Sensor nodes are densely deployed
Sensor nodes are prone to failures.
The topology of a sensor network does not change very frequently
The ______ algorithm allows mobile sensors to maintain connectivity to a wireless stationary sensor network (i.e., hybrid ad ho
NAR
PAR
EAR
MAR
In _______, each node receiving a data or management packet repeats it by broadcasting, unless a maximum number of hops fo
  flooding

Gossiping
LEACH
  SPIN

SPIN has three types of messages, namely:


advertisement (ADV), request (REQ), and DATA
advertisement (ADV), request (REQ), and Terminate
(ACK), request (REQ), and DATA
  advertisement (ADV), DATA, and Terminate

  The purpose of _______ is to randomly select sensor nodes as CHs, so the high energy dissipation in communicating with the

flooding
Gossiping
   LEACH

SPIN
____ coordinates the operation of multiple wireless network cards tuned to non-overlapping frequency channels.
LEACH
   SPIN

  UWB

MUP
A ______ can be seen as a type of wireless ad hoc network, where all radio nodes are static and do not experiences direct mobil
   WMN

VANET
MANET
SANET
MQTT is _________ protocol
Machine to Machine
Internet of Things
Machine to Machine and Internet of Things
Machine Things
The IoT platforms are mainly divided into how many types
3 types
2 types
5 types
4 types
Which component in sensor node is responsible for performing tasks, processing data and controlling the functionality of othe
Transceiver
Controller
Sensor
Power source

The functionality of both the transmitter and the receiver is combined into a single device is known as _________
Transceiver
Sensor
Controller
Power source

The correct sequence of operational states for transceivers include ____________.


Receive, Transmit, Idle, Sleep
Sleep, Receive, Idle, Transmit
Transmit, Receive, Idle, Sleep
Transmit, Idle, Receive, Sleep

Which topology allows transmission of data from one node to another, which is within its radio transmission range.
Mesh
Star
Network
Tree

This layer in WSN provides an edge for transferring a stream of bits above physical medium.
Network Layer
Data Link Layer
Transport Layer
Physical Layer
question_explanation question_type question_difficulty
answer_explanation answer_isright answer_position

M 1
0 1
0 2
0 3
1 4
M 1
0 1
0 2
0 3
1 4
M 1
0 1
0 2
0 3
1 4
M 1
0 1
1 2
0 3
0 4
M 1
0 1
1 2
0 3
0 4
M 1
1 1
0 2
0 3
0 4
M 1
0 1
0 2
1 3
0 4
M 1
1 1
0 2
0 3
0 4
M 1
0 1
1 2
0 3
0 4

M 1
0 1
1 2
0 3
0 4

M 1
1 1
0 2
0 3
0 4

M 1
1 1
0 2
0 3
0 4

M 1
1 1
0 2
0 3
0 4

M 1
1 1
0 2
0 3
0 4
M 1
0 1
1 2
0 3
0 4

M 1
0 1
0 2
0 3
1 4

M 1
1 1
0 2
0 3
0 4

M 1
0 1
1 2
0 3
0 4

M 1
0 1
0 2
0 3
1 4

M 1
1 1
0 2
0 3
0 4

M 1
1 1
0 2
0 3
0 4

M 1
1 1
0 2
0 3
0 4

M 1
0 1
0 2
0 3
1 4

M 1
1 1
0 2
0 3
0 4

M 1
0 1
0 2
0 3
1 4

M 1
1 1
0 2
0 3
0 4

M 1
1 1
0 2
0 3
0 4

M 1
0 1
1 2
0 3
0 4

M 1
1 1
0 2
0 3
0 4

M 1
0 1
1 2
0 3
0 4

M 1
0 1
1 2
0 3
0 4

M 1
0 1
0 2
1 3
0 4

M 1
0 1
0 2
1 3
0 4

M 1
0 1
1 2
0 3
0 4

M 1
1 1
0 2
0 3
0 4

M 1
0 1
0 2
1 3
0 4

M 1
0 1
0 2
0 3
1 4

M 1
0 1
1 2
0 3
0 4

M 1
0 1
0 2
0 3
1 4

M 1
0 1
0 2
0 3
1 4

M 1
1 1
0 2
0 3
0 4

M 1

1 1

0 2

0 3
0 4

M 1
0 1
1 2
0 3
0 4

M 1
0 1
0 2
1 3
0 4
M 1
0 1
0 2
0 3
1 4
M 1
1 1
0 2
0 3
0 4
M 1
0 1
1 2
0 3
0 4

M 1
0 1
0 2
0 3
1 4
M 1
0 1
0 2
1 3
0 4
M 1
0 1
1 2
0 3
0 4

M 1
0 1
0 2
1 3
0 4

M 1
1 1
0 2
0 3
0 4
M 1
0 1
0 2
0 3
1 4

M 1
0 1
1 2
0 3
0 4
M 1
0 1
0 2
1 3
0 4
M 1
0 1
1 2
0 3
0 4

M 1
1 1
0 2
0 3
0 4

M 1
0 1
0 2
1 3
0 4

M 1
0 1
1 2
0 3
0 4
M 1
1 1
0 2
0 3
0 4
M 1
0 1
0 2
1 3
0 4

M 1
1 1
0 2
0 3
0 4

M 1
0 1
1 2
0 3
0 4

M 1
1 1
0 2
0 3
0 4

M 1
1 1
0 2
0 3
0 4

M 1
1 1
0 2
0 3
0 4

M 1
0 1
0 2
1 3
0 4

M 1
1 1
0 2
0 3
0 4
M 1
0 1
1 2
0 3
0 4
M 1
0 1
0 2
0 3
1 4
M 1
0 1
0 2
0 3
1 4
M 1
0 1
0 2
0 3
1 4

M 1
0 1
0 2
0 3
1 4

M 1
1 1
0 2
0 3
0 4

M 1
1 1
0 2
0 3
0 4

M 1

1 1
0 2

0 3
0 4

M 1
0 1
1 2
0 3
0 4
M 1
0 1
1 2
0 3
0 4

M 1
0 1
0 2
1 3

0 4

M 1

0 1

0 2

0 3
1 4
M 1
0 1
0 2
0 3
1 4
M 1
0 1
1 2
0 3
0 4
M 1
0 1
0 2
0 3
1 4
M 1
0 1
0 2
1 3
0 4
M 1
1 1
0 2
0 3
0 4
M 1
1 1
0 2
0 3
0 4
M 1
0 1
0 2
1 3
0 4
M 1
0 1
0 2
0 3
1 4
M 1
1 1
0 2
0 3
0 4
M 1
0 1
0 2
1 3
0 4
M 1
0 1
0 2
1 3
0 4
M 1
0 1
1 2
0 3
0 4

M 1
1 1
0 2
0 3
0 4

M 1
0 1
0 2
1 3
0 4

M 1
1 1
0 2
0 3
0 4

M 1
0 1
0 2
0 3
1 4

You might also like