0 оценок0% нашли этот документ полезным (0 голосов)
56 просмотров4 страницы
This document contains 43 multiple choice questions related to computer networking concepts such as mobile IP, TCP, wireless networks, peer-to-peer networks, and more. The questions cover topics like agent solicitation in mobile IP, protocols used for wireless communication, congestion control algorithms in TCP, structured and unstructured peer-to-peer networks, and components of cellular networks like home agent, foreign agent, visitor location register. The document also provides short answers to each question.
This document contains 43 multiple choice questions related to computer networking concepts such as mobile IP, TCP, wireless networks, peer-to-peer networks, and more. The questions cover topics like agent solicitation in mobile IP, protocols used for wireless communication, congestion control algorithms in TCP, structured and unstructured peer-to-peer networks, and components of cellular networks like home agent, foreign agent, visitor location register. The document also provides short answers to each question.
This document contains 43 multiple choice questions related to computer networking concepts such as mobile IP, TCP, wireless networks, peer-to-peer networks, and more. The questions cover topics like agent solicitation in mobile IP, protocols used for wireless communication, congestion control algorithms in TCP, structured and unstructured peer-to-peer networks, and components of cellular networks like home agent, foreign agent, visitor location register. The document also provides short answers to each question.
Ans. mobile host find agent. 2. Arp reply is Ans. Unicast 3. In solicitation msg which protocol is used? Ans. ICMP 4. What is prefix length in 255.255.192.0? Ans. /18 5. Which utility is used for mapping ip address and mac address? Ans. Ipconfig 6. Gratuitous arp and proxy arp is done by Ans. Home agent in home network. 7. In CDMA if there are 8 mobile host how many bands are needed? Ans. 1 8. GSM cellular network uses Ans. Both FDMA and TDMA 9. In wireless environment which technology is used? Ans. CSMA/CA 10. Which TCP doesnt support end to- end semantics? Ans. I-TCP 11. Asynchronous RPC/RMI: Ans. Coupled in space and time 12. Performance of chord if finger table is used Ans. O(log n) 13. For mobile IP which is true? Ans. It provides alive TCP connection even if MH moves between different IP networks 14. What is false for chord? Ans. It is not unstructured P2P. 15. If multiple users each have their own frequency band which technique is used? Ans. FDMA 16. Where binding table is used? Ans. At home agent 17. Which TCP is used for frequent and lengthy disconnection ? Ans. M-TCP 18. How route optimization is achieved in mobile IP? Ans. Binding cache is maintained at local routing table at correspondent node.. 19. What happens in congestion control? Ans. Additive increase, Multiplicative decrease 20. Concept of Sliding window? Ans. Window size is negotiable at the time of TCP connection for efficient utilization of bandwidth 21. Technologies that use DHT are: Ans. All Structured P2P 22. When we have 20 clients and we want to share a video file, which technique should be used for less network traffic? a. Class A address b. Class C address c. Broadcast d. Multicast Ans. Multicast 23. In _________ Phase, mobile host must know the IP address of the home agent. Ans. Registration Phase 24. Which of the following is true? Ans. Mobile host can directly register using collocated care of address Note: other options of the question were contradicting the concept of care of address 25. Replay attack can be detected by Ans. Identification number 26. In mobile IP mobile nodes original address is called _____, and temporary address is called _____ Ans. Home address ,Care of address 27. In which of the following technology same node can work as client for one network and server for other network? a. Bus b. Ring c. VPM d. Peer to peer Ans. Peer to peer 28. In ______ Hand off mobile node is connected to only one base station, and in _____ hand off its connected to only two base station. Ans. Hard, Soft 29. A cell in cellular network can be viewed as a ________ in a 802.11 a. BSS b. ESS c. Access Point d. None of the above Ans. Access Point 30. Which of the following doesnt limit network broadcast and doesnt increase the performance a. Router b. Bridge c. Hub d. Switch Ans. Hub 31. If IP address is 190.162.10.0/27, then number of addresses available are.. a. 8 b. 16 c. 32 d. None of these Ans.32 32. In DHT, chord space is [0,15] and nodes placed on the chord are 0,1,3,4,7,12,13,15. Then the longest distance finger node in finger table 3 is. Ans. 12 33. If wireless printer is connected to PDA, then which technique is used to detect the wireless printer? Ans. Bluetooth 34. Who is the task of PROXY ARP? Ans. Home Agent for Mobile Host 35. A node in network A wants to send data to the node in another network B. then which logical address is to be mapped in to physical address? Ans. Destination IP address in datagram header 36. When the Mobile host moves form one MSC to another MSC then Ans. Content of HLR is copied to VLR 37. If sequence number has reached 2 16 -1 what will be the next sequence number? Ans. 0 Note: sequence number has a wrap around nature 38. What is stored at visitors log at foreign agent? Ans. Refer PPT no.56 of Mobile IPv2. 39. If congestion window size is 3, when receiver can send ACK for the data received? Ans. After 1 Packet 40. What is true for I-TCP? a. Foreign agent does proxy b. Foreign agent maintains and transfer states c. _________ d. All of the above
Ans. All of the above
41. If we can access the internet but cant access network data centre, then what could be the problem? Ans. Subnet masking is wrong. 42. If we can access the network data, but cant access the internet from outside world, then what could be the problem? Ans. Gateway is not properly configured. 43. If system sends data, and after the collision is detected, system retransmits the data, then which technique is used? Ans. CSMA/CD 44. In KAZAH, it uses the concept of super peer, then which of the following is true 1.superPeer works as a broker. 2.superPeer can notify the other superpeers only. 3.normal node can publish data to its superPeer. 4. SuperPeer can notify other SuperPeer as well as normal node in its region. Ans. 1,3,4
NOTES: Other topics that are needed to be refered::
1. Coupling and Decoupling in Publish-Subscribe(Refer PPT no. 18 of pubsub)