Вы находитесь на странице: 1из 4

MCT Questions

1. Agent solicitation means


Ans. mobile host find agent.
2. Arp reply is
Ans. Unicast
3. In solicitation msg which protocol is used?
Ans. ICMP
4. What is prefix length in 255.255.192.0?
Ans. /18
5. Which utility is used for mapping ip address and mac address?
Ans. Ipconfig
6. Gratuitous arp and proxy arp is done by
Ans. Home agent in home network.
7. In CDMA if there are 8 mobile host how many bands are needed?
Ans. 1
8. GSM cellular network uses
Ans. Both FDMA and TDMA
9. In wireless environment which technology is used?
Ans. CSMA/CA
10. Which TCP doesnt support end to- end semantics?
Ans. I-TCP
11. Asynchronous RPC/RMI:
Ans. Coupled in space and time
12. Performance of chord if finger table is used
Ans. O(log n)
13. For mobile IP which is true?
Ans. It provides alive TCP connection even if MH moves between different IP networks
14. What is false for chord?
Ans. It is not unstructured P2P.
15. If multiple users each have their own frequency band which technique is used?
Ans. FDMA
16. Where binding table is used?
Ans. At home agent
17. Which TCP is used for frequent and lengthy disconnection ?
Ans. M-TCP
18. How route optimization is achieved in mobile IP?
Ans. Binding cache is maintained at local routing table at correspondent node..
19. What happens in congestion control?
Ans. Additive increase, Multiplicative decrease
20. Concept of Sliding window?
Ans. Window size is negotiable at the time of TCP connection for efficient utilization of
bandwidth
21. Technologies that use DHT are:
Ans. All Structured P2P
22. When we have 20 clients and we want to share a video file, which technique should be used for
less network traffic?
a. Class A address
b. Class C address
c. Broadcast
d. Multicast
Ans. Multicast
23. In _________ Phase, mobile host must know the IP address of the home agent.
Ans. Registration Phase
24. Which of the following is true?
Ans. Mobile host can directly register using collocated care of address
Note: other options of the question were contradicting the concept of care of address
25. Replay attack can be detected by
Ans. Identification number
26. In mobile IP mobile nodes original address is called _____, and temporary address is called
_____
Ans. Home address ,Care of address
27. In which of the following technology same node can work as client for one network and server
for other network?
a. Bus
b. Ring
c. VPM
d. Peer to peer
Ans. Peer to peer
28. In ______ Hand off mobile node is connected to only one base station, and in _____ hand off its
connected to only two base station.
Ans. Hard, Soft
29. A cell in cellular network can be viewed as a ________ in a 802.11
a. BSS
b. ESS
c. Access Point
d. None of the above
Ans. Access Point
30. Which of the following doesnt limit network broadcast and doesnt increase the performance
a. Router
b. Bridge
c. Hub
d. Switch
Ans. Hub
31. If IP address is 190.162.10.0/27, then number of addresses available are..
a. 8
b. 16
c. 32
d. None of these
Ans.32
32. In DHT, chord space is [0,15] and nodes placed on the chord are 0,1,3,4,7,12,13,15. Then the
longest distance finger node in finger table 3 is.
Ans. 12
33. If wireless printer is connected to PDA, then which technique is used to detect the wireless
printer?
Ans. Bluetooth
34. Who is the task of PROXY ARP?
Ans. Home Agent for Mobile Host
35. A node in network A wants to send data to the node in another network B. then which logical
address is to be mapped in to physical address?
Ans. Destination IP address in datagram header
36. When the Mobile host moves form one MSC to another MSC then
Ans. Content of HLR is copied to VLR
37. If sequence number has reached 2
16
-1 what will be the next sequence number?
Ans. 0
Note: sequence number has a wrap around nature
38. What is stored at visitors log at foreign agent?
Ans. Refer PPT no.56 of Mobile IPv2.
39. If congestion window size is 3, when receiver can send ACK for the data received?
Ans. After 1 Packet
40. What is true for I-TCP?
a. Foreign agent does proxy
b. Foreign agent maintains and transfer states
c. _________
d. All of the above

Ans. All of the above

41. If we can access the internet but cant access network data centre, then what could be the
problem?
Ans. Subnet masking is wrong.
42. If we can access the network data, but cant access the internet from outside world, then what
could be the problem?
Ans. Gateway is not properly configured.
43. If system sends data, and after the collision is detected, system retransmits the data, then which
technique is used?
Ans. CSMA/CD
44. In KAZAH, it uses the concept of super peer, then which of the following is true
1.superPeer works as a broker.
2.superPeer can notify the other superpeers only.
3.normal node can publish data to its superPeer.
4. SuperPeer can notify other SuperPeer as well as normal node in its region.
Ans. 1,3,4

NOTES: Other topics that are needed to be refered::

1. Coupling and Decoupling in Publish-Subscribe(Refer PPT no. 18 of pubsub)

Вам также может понравиться