_____ is used for transmission of packets in the cellular switched architecture.
 a) Packet switching techniques
b) Circuit switching techniques
c) Packet and circuit switched technique
d) Datagram technique

1 Answer

Answer :

a) Packet switching techniques

Related questions

Description : Which of the following feature makes impossible to eavesdrop on GSM radio transmission? a) SIM b) On the air privacy c) SMS d) Packet switched traffic

Last Answer : b) On the air privacy

Description : Which transmission technique guarantees that data packets will be received by the receiver in the same order in which they were sent by the sender? (A) Broadcasting (B) Unicasting (C) Packet Switching (D) Circuit Switching

Last Answer : (D) Circuit Switching

Description : Circuit switching has more advantage than packet switching for PCS. a) True b) False

Last Answer : b) False

Description : Which of the following comes under supplementary ISDN services? a) Emergency calling b) Packet switched protocols c) Call diversion d) Standard mobile telephony

Last Answer : c) Call diversion

Description : Which of the following does not come under the teleservices of GSM? a) Standard mobile telephony b) Mobile originated traffic c) Base originated traffic d) Packet switched traffic

Last Answer : d) Packet switched traffic

Description : Which of the following is the world’s first cellular system to specify digital modulation and network level architecture? a) GSM b) AMPS c) CDMA d) IS-54

Last Answer : a) GSM

Description : Satellite-Switched Time-Division Multiple Access (SS/TDMA) is A. the method of determining whichdevice has access tothe transmission medium at any time. B. a medium access control technique for ... switching is used to dynamically changethechannel assignments D. All of theabove E. None of the above

Last Answer : a form of TDMA in which circuit switching is used to dynamically changethechannel assignments

Description : A _________ network is across between a circuit-switchednetworkand a datagram network. It has some characteristics ofboth. A) virtual-circuit B) packet-switched C) frame-switched D) none of the above

Last Answer : virtual-circui

Description : Packet-switched networks can alsobe divided into ______subcategories: virtual-circuit networks and datagram networks A) four B) three C) two D) five

Last Answer : two

Description : A network is a cross between a circuit-switched network and a datagram network. It has some characteristics of both. a. virtual-circuit b. packet-switched c. None of the Given d. frame-switched

Last Answer : a. virtual-circuit

Description : Which of the following multiple access techniques are used by second generation cellular systems? a) FDMA/FDD and TDMA/FDD c c) FDMA/FDD and CDMA/FDD d) FDMA/FDD only

Last Answer : b) TDMA/FDD and CDMA/FDD

Description : Transmission protocol, PRMA stands for _________ a) Pocket reservation multiple access b) Packet register multiple access c) Pocket register multiple access d) Packet reservation multiple access

Last Answer : d) Packet reservation multiple access

Description : In _________, thereis no resource allocation for a packet. A) datagram switching B) circuit switching C) frame switching D) none of the above

Last Answer : datagram switching

Description : Which of the following spread spectrum techniques were used in the original IEEE 802.11 standard? a) FHSS and DSSS b) THSS and FHSS c) THSS and DSSS d) Hybrid technique

Last Answer : a) FHSS and DSSS

Description : For which one of the following reasons does Internet Protocol (IP) use the time-to- live (TTL) field in the IP datagram header? a. Ensure packets reach destination within that time b. ... packets from looping indefinitely d. Limit the time for which a packet gets queued in intermediate routers.

Last Answer : c. Prevent packets from looping indefinitely

Description : State weather the following statement is true or false for IPV6 Addressing 1). IPV6 is a routable protocol that addresses, routes, fragments, and reassembles packets 2).IPV6 is a connectionless, unreliable datagram protocol. 3). ... C. 1. false, 2. false, 3. false D. 1.false, 2. true, 3. true

Last Answer : A. 1. True, 2. true, 3. true

Description : In IPv4 layer, datagram is of ________ a) Fixed length b) Variable length c) Global length d) Zero length

Last Answer : b) Variable length

Description : Header of datagram in IPv4 has _________ a) 0 to 20 bytes b) 20 to 40 bytes c) 20 to 60 bytes d) 20 to 80 bytes

Last Answer : c) 20 to 60 bytes

Description : In version field of IPv4 header, when machine is using some other version of IPv4 then datagram is __________ a) Discarded b) Accepted c) Interpreted d) Interpreted incorrectly

Last Answer : a) Discarded

Description : In public switched telephone network, LATA stands for ______ a) Local access and transport area b) Land area and transport area c) Local access and telephone access d) Local area and telephone access

Last Answer : a) Local access and transport area

Description : PSTN stands for ________ a) Public switched telephone network b) Personal switched telephone network c) Personal switched telephone node d) Public switched telephone node

Last Answer : a) Public switched telephone network

Description : In a packet switching network, if the message size is 48 bytes and each packet contains a header of 3 bytes. If 24 packets are required to transmit the message, the packet size is ................ (1) 2 bytes (2) 1 byte (3) 4 bytes (4) 5 bytes

Last Answer : (4) 5 bytes 

Description : In ATM,_____ is for conventionalpacket switching(virtual-circuit approachor datagram approach). A) AAL1 B) AAL2 C) AAL3/4 D) AAL5

Last Answer : AAL3/4

Description : Network layer at source is responsible for creating a packet from data coming from another ________ a) Station b) Link c) Node d) Protocol

Last Answer : d) Protocol

Description : How much packet data rate per user is supported by W-CDMA if the user is stationary? a) 2.048 Kbps b) 100 Mbps c) 2.048 Mbps d) 1 Gbps

Last Answer : c) 2.048 Mbps

Description : _______ is the information contained in the packet header of TIU. a) PTI b) VCI c) PRMA d) CDPD

Last Answer : b) VCI

Description : ___________ manages the switching function in GSM. a) BSS b) NSS c) OSS d) MSC

Last Answer : c) OSS

Description : Which of the following does not come under subsystem of GSM architecture? a) BSS b) NSS c) OSS d) Channel

Last Answer : d) Channel

Description : User datagram protocol is called connectionless because _____________ a. all UDP packets are treated independently by transport layer b. it sends data as a stream of related packets c. it is received ... order d. it sends data very quickly Answer: Option(a) 4. Transmission control protocol ____

Last Answer : a. all UDP packets are treated independently by transport layer

Description : In........................mode, a common technique in packet-switched networks consists of wrapping a packet in a new one. A) Tunneling B) Encapsulation C) Both A and B D) None of the above

Last Answer : C) Both A and B

Description : In ……………………. mode, a common technique in packet-switched networks consists of wrapping a packet in a new one. A) Tunneling B) Encapsulation C) Both A and B D) None of the above

Last Answer : C) Both A and B

Description : Explain the two approaches of packet switching techniques.

Last Answer : _ Datagram approach _ Virtual circuit approach _ Switched virtual circuit(SVC) _ Permanent virtual circuit(PVC) _ Circuit – switched connection versus virtual – circuit connection _ Path versus route _ Dedicated versus shared

Description : The network layer in the Internet isdesigned as a __________network. A) virtual-circuit B) datagram C) circuit-switched D) none of the above

Last Answer : datagram

Description : In a ________ network, twotypes of addressing are involved: global and local. A) virtual-circuit B) datagram C) circuit-switched D) none of the above

Last Answer : virtual-circuit

Description : A switched WAN is normally implemented as a _______ network. A) virtual-circuit B) datagram C) circuit-switched D) none of the above

Last Answer : virtual-circuit

Description : The network layer in the Internet is designed as anetwork. a. datagram b. none c. virtual-circuit d. circuit-switched

Last Answer : a. datagram

Description : An IP datagram of size 1000 bytes arrives at a router. The router has to forward this packet on a link whose MTU (maximum transmission unit) is 100 bytes. Assume that the size of the IP header is 20 bytes ... the IP datagram will be divided into for transmission is : a. 10 b. 50 c. 12 d. 13

Last Answer : d. 13

Description : IS-136 uses which modulation technique? a) π/4 DQPSK b) BPSK c) GMSK d) AFSK

Last Answer : a) π/4 DQPSK

Description : IS-95 uses which modulation technique? a) GMSK b) BPSK c) QAM d) AFSK

Last Answer : b) BPSK

Description : Which modulation technique is used by GSM? a) GMSK b) BPSK c) QPSK d) GFSK

Last Answer : a) GMSK

Description : UMTS use which multiple access technique? a) CDMA b) TDMA c) FDMA d) SDMA

Last Answer : a) CDMA

Description : Which one of the following event is not possible in wireless LAN? a) collision detection b) acknowledgement of data frames c) multi-mode data transmission d) connection to wired networks

Last Answer : a) collision detection

Description : At the base station, the air interface portion of mobile transmission is passed to MSC. a) True b) False

Last Answer : b) False

Description : Which of the following subsystem provides radio transmission between mobile station and MSC? a) BSS b) NSS c) OSS d) BSC

Last Answer : a) BSS

Description : In _______ there are no setup or teardown phases. A) datagram switching B) circuit switching C) frame switching D) none of the above

Last Answer : datagram switching

Description : In __________, eachpacket is treatedindependentlyof all others. A) datagram switching B) circuit switching C) frame switching D) none of the above

Last Answer : datagram switching

Description : In _________, resources areallocatedon demand. A) datagram switching B) circuit switching C) frame switching D) none of the above

Last Answer : datagram switching

Description : In _______, the resources need to bereserved during the setup phase; the resources remain dedicated for the entire durationof data transfer phase until the teardownphase. A) datagram switching B) circuit switching C) frame switching D) none of the above

Last Answer : circuit switching

Description : A local telephone network isan example of a_______ network. A) packet-switched B) circuit-switched C) message-switched D) none of the above

Last Answer : circuit-switched