100% found this document useful (1 vote)
527 views15 pages

MCW MCQ

The document discusses key aspects of GSM including: - GSM was the world's first cellular system to specify digital modulation and network architecture. - GSM originally stood for Groupe Special Mobile and sets standards through ETSI. - Key components of GSM include the SIM card for subscriber identification and on-air encryption for privacy. - GSM architecture consists of BSS, NSS, and OSS subsystems. BSS manages radio transmission between mobile stations and the MSC.

Uploaded by

Priti Patil
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
527 views15 pages

MCW MCQ

The document discusses key aspects of GSM including: - GSM was the world's first cellular system to specify digital modulation and network architecture. - GSM originally stood for Groupe Special Mobile and sets standards through ETSI. - Key components of GSM include the SIM card for subscriber identification and on-air encryption for privacy. - GSM architecture consists of BSS, NSS, and OSS subsystems. BSS manages radio transmission between mobile stations and the MSC.

Uploaded by

Priti Patil
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 15

1.

Which of the following is the world�s first cellular system to specify digital
modulation and network level architecture?
a) GSM
b) AMPS
c) CDMA
d) IS-54
answer A

2. Previously in 1980s, GSM stands for ____________


a) Global system for mobile
b) Groupe special mobile
c) Global special mobile
d) Groupe system mobile
Answer: b

3. Who sets the standards of GSM?


a) ITU
b) AT & T
c) ETSI
d) USDC
Answer: c

4. Which of the following does not come under the teleservices of GSM?
a) Standard mobile telephony
b) Mobile originated traffic
c) Base originated traffic
d) Packet switched traffic
View Answer

Answer: d
Explanation: GSM services follow ISDN guidelines and are classified as either
teleservices or data services. Teleservices include standard mobile telephony and
mobile originated or base originated traffic.
5. Which of the following comes under supplementary ISDN services?
a) Emergency calling
b) Packet switched protocols
c) Call diversion
d) Standard mobile telephony
View Answer

Answer: c
Explanation: Supplementary ISDN services are digital in nature. They include call
diversion, closed user groups, and caller identification, and are not available in
analog mobile networks. Supplementary services also include short messaging service
(SMS).
6. Which of the following memory device stores information such as subscriber�s
identification number in GSM?
a) Register
b) Flip flop
c) SIM
d) SMS
View Answer

Answer: c
Explanation: SIM (subscriber identity module) is a memory device that stores
information such as the subscriber�s identification number, the networks and
countries where the subscriber is entitled to service, privacy keys, and other user
specific information.
7. Which of the following feature makes impossible to eavesdrop on GSM radio
transmission?
a) SIM
b) On the air privacy
c) SMS
d) Packet switched traffic
View Answer

Answer: b
Explanation: The on the air privacy feature of GSM makes impossible to eavesdrop on
a GSM radio transmission. The privacy is made possible by encrypting the digital
bit stream sent by a GSM transmitter, according to a specific secret cryptographic
key that is known only to the cellular carrier.
8. Which of the following does not come under subsystem of GSM architecture?
a) BSS
b) NSS
c) OSS
d) Channel
View Answer

Answer: d
Explanation: The GSM architecture consists of three major interconnected subsystems
that interact between themselves and with the users through certain network
interfaces. The subsystems are BSS (Base Station Subsystem), NSS (Network and
Switching Subsystem) and OSS (Operation Support Subsystem).
9. Which of the following subsystem provides radio transmission between mobile
station and MSC?
a) BSS
b) NSS
c) OSS
d) BSC
View Answer

Answer: a
Explanation: The BSS provides and manages radio transmission paths between the
mobile stations and the Mobile Switching Center (MSC). It also manages the radio
interface between the mobile stations and all other subsystems of GSM.
10. ___________ manages the switching function in GSM.
a) BSS
b) NSS
c) OSS
d) MSC
View Answer

Answer: b
Explanation: NSS (Network and Switching Subsystem) manages the switching functions
of the system. It allows the MSCs to communicate with other networks such as PSTN
and ISDN.
11. __________ supports the operation and maintenance of GSM.
a) BSS
b) NSS
c) OSS
d) MSC
View Answer

Answer: c

1. __________ carries digitally encoded user data.


a) Traffic channels
b) Control channels
c) Signalling channels
d) Forward channels
View Answer

Answer: a
Explanation: Traffic channels carry digitally encoded user speech or user data. It
has identical functions and formats on both the forward and reverse links.
2. ____________ carries signalling and synchronizing commands.
a) Traffic channels
b) Control channels
c) Signalling channels
d) Forward channels
View Answer

Answer: b
Explanation: Control channels carry signalling and synchronizing commands between
the base station and mobile station. Certain types of control channels are defined
for just the forward or reverse link.
3. Which of the following is not a control channel of GSM?
a) BCH
b) CCCH
c) DCCH
d) TCH
View Answer

Answer: d
Explanation: There are three main control channels in the GSM system. These are the
broadcast channel (BCH), the common control channel (CCCH) and the dedicated
control channel (DCCH). Each control channel consists of several logical channels.
4. Which of the following is the forward control channel that is used to broadcast
information?
a) BCCH
b) CCCH
c) DCCH
d) TCH
View Answer

Answer: a
Explanation: The broadcast control channel (BCCH) is a forward channel that is used
to broadcast information such as cell and network identity, and operating
characteristics of the cell.
5. Which of the following channel does not come under CCCH?
a) PCH
b) RACH
c) DCCH
d) AGCH
View Answer

Answer: c
Explanation: CCCH consists of three different channels. They are paging channel
(PCH), which is a forward link channel, the random access channel (RACH) which is a
reverse link channel, and the access grant channel (AGCH) which is a forward link
channel.
6. Which of the following channel provides paging signals from base station to all
mobiles in the cell?
a) RACH
b) AGCH
c) DCCH
d) PCH
View Answer

Answer: d
Explanation: The PCH provides paging signals from the base station to all mobiles
in the cell. It notifies a specific mobile of an incoming call which originates
from the PSTN.
7. ___________ is a reverse link channel used by a subscriber unit to acknowledge.
a) RACH
b) AGCH
c) DCCH
d) PCH
View Answer

Answer: a
Explanation: The RACH (Random Access Channel) is a reverse link channel used by a
subscriber unit to acknowledge a page from the PCH. It is also used by mobiles to
originate a call.
8. Which of the following channel is used by base station to provide forward link
communication to mobile?
a) RACH
b) AGCH
c) DCCH
d) PCH
View Answer

Answer: b
Explanation: The AGCH (Access Grant Channel) is used by the base station to provide
forward link communication to the mobile. It carries data which instructs the
mobile to operate in a particular physical channel with particular dedicated
control channel.
9. Which of the following burst is used to broadcast the frequency and time
synchronization control messages?
a) FCCH and SCH
b) TCH and DCCH
c) RACH and TCH
d) FCCH and DCCH
View Answer

Answer: a
Explanation: FCCH and SCH burst are used to broadcast the frequency and time
synchronization control messages. They are used in TS0 of specific frames.
10. Which of the following burst is used to access service from any base station?
a) TCH
b) RACH
c) SCH
d) FCCH
View Answer

Answer: b
Explanation: Each user transmits a burst of data during the time slot assigned to
it. The RACH burst is used by all mobiles to access service from any base station,
and dummy burst is used as filter information for unused timeslots on forward link.
11. Group of superframes in GSM is called multiframe.
a) True
b) False
View Answer

Answer: b
1. US digital cellular system based on CDMA was standardized as ________
a) IS-54
b) IS-136
c) IS-95
d) IS-76
View Answer

Answer: c
Explanation: A US digital cellular system based on CDMA was standardized as Interim
Standard 95 (IS-95). It was standardized by US Telecommunication Industry
Association (TIA) and promised increased capacity.
2. IS-95 was not compatible with existing AMPS frequency band.
a) True
b) False
View Answer

Answer: b
Explanation: Like IS-136, IS-95 system was designed to be compatible with the
existing US analog cellular system (AMPS) frequency band. Hence, mobile and base
stations can be economically produced for dual mode operation.
3. Which of the following is used by IS-95?
a) DSSS
b) FHSS
c) THSS
d) Hybrid
View Answer

Answer: a
Explanation: IS-95 uses a direct sequence spread spectrum CDMA system. It allows
each user within a cell to use the same radio channel, and users in adjacent cell
also use the same radio channel.
4. Each IS-95 channel occupies ___________ of spectrum on each one way link.
a) 1.25 MHz
b) 1.25 kHz
c) 200 kHz
d) 125 kHz
View Answer

Answer: a
Explanation: To facilitate graceful transition from AMPS to CDMA, each IS-95
channel occupies 1.25 MHz of spectrum on each one way link, or 10% of the available
cellular spectrum for a US cellular provider.
5. IS-95 uses same modulation technique for forward and reverse channel.
a) True
b) False
View Answer

Answer: b
Explanation: IS-95 uses different modulation and spreading technique for the
forward and reverse links. On the forward link, the base station simultaneously
transmits the user data for all mobiles in the cell by using different spreading
sequence for each mobile.
6. IS-95 is specified for reverse link operation in _________ band.
a) 869-894 MHz
b) 849-894 MHz
c) 849-869 MHz
d) 824-849 MHz
View Answer
Answer: d
Explanation: IS-95 is specified for reverse link operation in the 824-849 MHz band
and 869-894 MHz for the forward link. The PCS version of IS-95 has also been
designed for international use in the 1800-2000 MHz bands.
7. User data in IS-95 is spread to a channel chip rate of ________
a) 1.2288 Mchip/s
b) 9.6 Mchip/s
c) 12.288 Mchip/s
d) 0.96 Mchip/s
View Answer

Answer: a
Explanation: User data is spread to a channel chip rate of 1.2288 Mchip/s (a total
spreading factor of 128) using a combination of techniques. The spreading process
is different for the forward and reverse links in the original CDMA specification.
8. __________ are used to resolve and combine multipath components.
a) Equalizer
b) Registers
c) RAKE receiver
d) Frequency divider
View Answer

Answer: c
Explanation: At both the base station and the subscriber, RAKE receivers are used
to resolve and combine multipath components, thereby reducing the degree of fading.
A RAKE receiver exploits the multipath time delays in a channel and combines the
delayed replicas of transmitted signal.
9. CT2 was the first generation of cordless telephones.
a) True
b) False
View Answer

Answer: b
Explanation: CT2 was the second generation of cordless telephones introduced in
Great Britain in 1989. It is used to provide telepoint services which allow a
subscriber to use CT2 handsets at a public telepoint.
10. CT2 is analog version of first generation cordless telephones.
a) True
b) False
View Answer

Answer: b

1. Cordless telephone standard, DECT stands for ____________


a) Discrete European Cordless Telephone
b) Digital European Cellular Telephone
c) Discrete European Cellular Telephone
d) Digital European Cordless Telephone
View Answer

Answer: d
Explanation: The Digital European Cordless Telephone (DECT) is a universal cordless
telephone standard. It was developed by the European Telecommunications Standard
Institute (ETSI).
2. Which of the following is not true for DECT?
a) High traffic density
b) Long range telecommunication
c) Broad range of application
d) First pan European standard
View Answer

Answer: b
Explanation: DECT provides a cordless communication framework for high traffic
density, short range telecommunications. It covers a broad range of applications
and environments.
3. DECT can be used by users in an in-building PBX.
a) True
b) False
View Answer

Answer: a
Explanation: The main function of DECT is to provide local mobility to portable
users in an in-building Private Branch Exchange (PBX). It provides excellent
quality and services for voice and data applications.
4. The DECT system is based on __________ principles.
a) TCP
b) IP
c) OSI
d) AMPS
View Answer

Answer: c
Explanation: The DECT system is based on OSI (Open System Interconnection)
principles in a manner similar to ISDN. A control plane (C-plane) and a user plane
(U-plane) use the services provided by the lower layers.
5. Which of the following layer consists of paging channel and control channel?
a) Physical layer
b) Network layer
c) Data link layer
d) MAC layer
View Answer

Answer: d
Explanation: The MAC (Medium Access Control) layer consists of a paging channel and
a control channel for the transfer of signalling information to the C-plane. The U-
plane is served with channels for the transfer of user information.
6. Which of the following layer is responsible for providing reliable data links?
a) Physical layer
b) Network layer
c) Data link control layer
d) MAC layer
View Answer

Answer: c
Explanation: The DLC (data link control) layer is responsible for providing
reliable data links to the network layer. It divides up the logical and physical
channels into time slots for each user.
7. __________ is the main signalling layer of DECT.
a) Physical layer
b) Network layer
c) Data link layer
d) MAC layer
View Answer

Answer: b
Explanation: The network layer is the main signalling layer of DECT. It is based on
GSM and ISDN (layer 3) protocols. It provides call control and circuit switched
services selected from one of the DLC services.
8. Which of the following supports the physical layer of DECT common air interface?
a) Portable Handset
b) Network specific Interface Unit
c) Radio Fixed Part
d) Cordless controller
View Answer

Answer: c
Explanation: RFP (Radio Fixed Part) supports the physical layer of the DECT common
air interface. Every RFP covers one cell in the microcellular system. A full duplex
operation is achieved using TDD.
9. ________ supports the call completion facility in a multihandset environment.
a) Portable Handset
b) Network specific Interface Unit
c) Radio Fixed Part
d) Cordless controller
View Answer

Answer: b
Explanation: Network specific Interface Unit supports the call completion facility
in a multihandset environment. The interface recommended by the CCITT is the G.732
based on ISDN protocols.
10. __________ is a third generation Personal Communication System.
a) PACS
b) AMPS
c) IS-95
d) GSM
View Answer

Answer: a
Explanation: PACS (Personal Access Communication Systems) is a third generation
Personal Communication System. It was originally developed and proposed by Bellcore
in 1992.
11. _________ is also known as Japanese Digital Cellular.
a) PACS
b) AMPS
c) PDC
d) GSM
View Answer

Answer: c

1. What layer in the TCP/IP stack is equivalent to the Transport layer of the OSI
model?
a) Application
b) Host to host
c) Internet
d) Network Access
View Answer

Answer: b
Explanation: The four layers of the TCP/IP stack (also called the DoD model) are
Application/Process, Host-to-Host, Internet, and Network Access. The Host-to-Host
layer is equivalent to the Transport layer of the OSI model.
2. You want to implement a mechanism that automates the IP configuration, including
IP address, subnet mask, default gateway, and DNS information. Which protocol will
you use to accomplish this?
a) SMTP
b) SNMP
c) DHCP
d) ARP
View Answer

Answer: c
Explanation: Dynamic Host Configuration Protocol (DHCP) is used to provide IP
information to hosts on your network. DHCP can provide a lot of information, but
the most common is the IP address, subnet mask, default gateway, and DNS
information.
3. The DoD model (also called the TCP/IP stack) has four layers. Which layer of the
DoD model is equivalent to the Network layer of the OSI model?
a) Application
b) Host to Host
c) Internet
d) Network Access
View Answer

Answer: c
Explanation: The four layers of the DoD model are Application/Process, Host-to-
Host, Internet, and Network Access. The Internet layer is equivalent to the Network
layer of the OSI model.
4. Which of the following protocols uses both TCP and UDP?
a) FTP
b) SMTP
c) Telnet
d) DNS
View Answer

Answer: d
Explanation: DNS and some other services work on both TCP and the UDP protocols.
DNS uses TCP for zone exchanges between servers and UDP when a client is trying to
resolve a hostname to an IP address.
5. Length of Port address in TCP/IP is _________
a) 4bit long
b) 16bit long
c) 32bit long
d) 8 bit long
View Answer

Answer: b
Explanation: TCP and UDP port numbers are 16 bits in length. So, valid port numbers
can theoretically take on values from 0 to 65,535. These values are divided into
ranges for different purposes, with certain ports reserved for particular uses.
6. TCP/IP layer is equivalent to combined Session, Presentation and _________
a) Network layer
b) Application layer
c) Transport layer
d) Physical layer
View Answer

Answer: b
Explanation: TCP/IP network model is a hierarchical protocol made up of interactive
modules, each of which provides a specific functionality; however, the modules are
not necessarily interdependent. It is equivalent to combined session, presentation
and application layer.
7. How many levels of addressing is provided in TCP/IP protocol?
a) One
b) Two
c) Three
d) Four
View Answer

Answer: d
Explanation: Four levels of addresses are used in the internet employing the TCP/IP
protocols. They are physical (link) addresses, logical (IP) addresses, port
addresses, and specific addresses.
8. Virtual terminal protocol is an example of _________
a) Network layer
b) Application layer
c) Transport layer
d) Physical layer
View Answer

Answer: b
Explanation: In open systems, a virtual terminal (VT) is an application service. It
allows host terminals on a multi-user network to interact with other hosts
regardless of terminal type and characteristics.
9. TCP/IP is related to __________
a) ARPANET
b) OSI
c) DECNET
d) ALOHA
View Answer

Answer: a
Explanation: In 1983, TCP/IP protocols replaced NCP (Network Control Program) as
the ARPANET�s principal protocol. And ARPANET then became one component of the
early Internet. The starting point for host-to-host communication on the ARPANET in
1969 was the 1822 protocol, which defined the transmission of messages to an IMP.
10. A device operating at network layer is called __________
a) Router
b) Equalizer
c) Bridge
d) Repeater
View Answer

Answer: a
Explanation: A router is a networking device that forwards data packets between
computer networks. Routers perform the traffic directing functions on the Internet.
It supports different network layer transmission standards. Each network interface
is used to enable data packets to be forwarded from one transmission system to
another.
11. A device operating at physical layer is called __________
a) Router
b) Equalizer
c) Bridge
d) Repeater
View Answer

Answer: d

1. A packet in Transmission Control Protocol (TCP) is called a ____________


a) Transmittable slots
b) Packet
c) Segment
d) Source Slots
View Answer
Answer: c
Explanation: Applications working at the Application Layer transfers a contiguous
stream of bytes to the bottom layers. It is the duty of TCP to pack this byte
stream to packets, known as TCP segments, which are passed to the IP layer for
transmission to the destination device.
2. Cable TV and DSL are examples of ____________
a) Interconnection of network
b) LAN
c) MAN
d) WAN
View Answer

Answer: c
Explanation: A MAN often acts as a high speed network to allow sharing of regional
resources. It typically covers an area of between 5 and 50 km diameter. Examples of
MAN are telephone company network that provides a high speed DSL to customers and
cable TV network.
3. Station on a wireless ALOHA network is maximum of ________
a) 400 Km
b) 500 Km
c) 600 Km
d) 700 Km
View Answer

Answer: c
Explanation: The stations on wireless ALOHA networks are a maximum of 600 km apart.
It was designed for a radio (wireless) LAN, but it can be used on any shared
medium. It is obvious that there are potential collisions in this arrangement. The
medium is shared between the stations.
4. IEEE 802.11 defines basic service set as building block of a wireless
___________
a) LAN
b) WAN protocol
c) MAN
d) ALOHA
View Answer

Answer: a
Explanation: The IEEE 802.11 topology consists of components interacting to provide
a wireless LAN. It enables station mobility transparent to higher protocol layers,
such as the LLC.
5. In wireless LAN, there are many hidden stations so that __________ cannot be
detected.
a) Frames
b) Collision
c) Signal
d) Data
View Answer

Answer: b
Explanation: In wireless networking, the hidden node problem or hidden terminal
problem occurs when a node is visible from a wireless access point (AP), but not
from other nodes communicating with said AP. This leads to difficulties in media
access control and collisions could not be detected.
6. A set that makes stationary or mobile wireless station and also have optional
central base station is known as ___________
a) Basic service set
b) Extended service set
c) Network point set
d) Access point
View Answer

Answer: a
Explanation: A set that makes stationary or mobile wireless station and also have
optional central base station is known as a basic service set. BSS is made of
stationary or mobile wireless stations and an optional central base station, known
as the access point (AP).
7. Wireless communication started in _________
a) 1869
b) 1895
c) 1879
d) 1885
View Answer

Answer: b
Explanation: In England, Guglielmo Marconi began his wireless experiments in 1895.
On 2 June 1896, he filed his provisional specification of a patent for wireless
telegraphy. He demonstrated the system to the British Post Office in July.
8. Wireless transmission is divided into ___________
a) 3 broad groups
b) 6 broad groups
c) 9 broad groups
d) 8 broad groups
View Answer

Answer: a
Explanation: We can divide wireless transmission into three broad groups: radio
waves, microwaves, and infrared waves. Radio waves are used for multicast
communications, such as AM and FM radio, television, maritime radio, cordless
phones and paging systems. Microwave propagation is line-of-sight.
9. Transmission Control Protocol/Internet Networking Protocol have ___________
a) Four Layers
b) Five Layers
c) Six Layers
d) Seven Layers
View Answer

Answer: a
Explanation: TCP/IP functionality is divided into four layers, each with its own
set of agreed-upon protocols: The datalink layer consists of methods and protocols
that operate only on a link. The Internet layer connects independent networks to
transport the packets. The Transport layer handles communications between. The
Application layer standardizes data exchange for applications.
10. Packets of data that is transported by IP is called __________
a) Datagrams
b) Frames
c) Segments
d) Encapsulate message
View Answer

Answer: a
Explanation: The format of data that can be recognized by IP is called an IP
datagram. It consists of two components, the header and data, which need to be
transmitted. The fields in the datagram, except the data, have specific roles to
perform in the transmission of data.
11. Parameter that is normally achieved through a trailer added to end of frame is
___________
a) Access Control
b) Flow Control
c) Error Control
d) Physical addressing
View Answer

Answer: c

1. IPv6 has a larger address space of _________


a) 216
b) 2128
c) 232
d) 28
View Answer

Answer: b
Explanation: The main advantage of IPv6 over IPv4 is its larger address space. The
length of an IPv6 address is 128 bits, compared with 32 bits in IPv4. The address
space therefore has 2128 or approximately 3.4�1038 addresses.
2. Three strategies used to handle transition from version 4 to version 6 are dual-
stack, tunneling and ________
a) Header Switching
b) Header Translation
c) Header Transfer
d) Header Transmission
View Answer

Answer: b
Explanation: Three strategies used to handle transition from version 4 to version 6
are dual-stack, tunneling and header translation. Header translation techniques are
more complicated than IPv4 NAT because the protocols have different header formats.
3. MTU stands for _________
a) Minimum Transfer Unit
b) Maximum Transfer Unit
c) Maximum Transport Unit
d) Maximum Transmission Unit
View Answer

Answer: b
Explanation: In computer networking, the maximum transmission unit (MTU) is the
size of the largest network layer protocol data unit that can be communicated in a
single network transaction.
4. In IPv6, real-time audio or video, particularly in digital form, requires
resources such as __________
a) Fixed Bandwidth
b) Variable Bandwidth
c) High Bandwidth
d) Low Bandwidth
View Answer

Answer: c
Explanation: In IPv6, real-time audio or video, particularly in digital form,
requires resources such as high bandwidth, large buffers, long processing times,
and so on. A process can make a reservation for these resources beforehand to
guarantee that real time data will not be delayed.
5. In practical IPv6 application, a technology encapsulates IPv6 packets inside
IPv4 packets, this technology is called _______
a) Tunneling
b) Hashing
c) Routing
d) NAT
View Answer

Answer: a
Explanation: IPv6 tunneling enables IPv6 hosts and routers to connect with other
IPv6 hosts and routers over the existing IPv4 Internet. The main purpose of IPv6
tunneling is to deploy IPv6 as well as maintain compatibility with large existing
base of IPv4 hosts and routers.
6. Which one of the following descriptions about IPv6 is correct?
a) Addresses are not hierarchical and are assigned at random
b) Broadcasts have been eliminated and replaced with multicasts
c) There are 2.7 billion available addresses
d) An interface can only be configured with one IPv6 address
View Answer

Answer: b
Explanation: In IPv6, there�s no longer any broadcast, sending one packet to a
large number of unspecified hosts. There�s only multicast, unicast and anycast. In
IPv6 all nodes are required to support multicast.
7. The header length of an IPv6 datagram is ___________
a) 10bytes
b) 25bytes
c) 30bytes
d) 40bytes
View Answer

Answer: d
Explanation: IPv6 datagram has fixed header length of 40bytes. It results in faster
processing of the datagram. Fixed length IPv6 header allows the routers to process
the IPv6 datagram packets more efficiently.
8. In the IPv6 header, the traffic class field is similar to which field in the
IPv4 header?
a) Fragmentation field
b) Fast switching
c) TOS field
d) Option field
View Answer

Answer: c
Explanation: This field enables to have different types of IP datagram. In an IPv6
packet, the Traffic Class byte is used in the same way as the ToS byte in an IPv4
packet. A ToS/Traffic Class byte includes a DSCP (Differentiated Services
Codepoint) and precedence bits.
9. Which are the features present in IPv4 but not in IPv6?
a) Fragmentation
b) Header checksum
c) Options
d) All of the mentioned
View Answer

Answer: d
Explanation: All the features are only present in IPv4 and not IPv6. IPv6 no longer
has a header checksum to protect the IP header, meaning that when a packet header
is corrupted by transmission errors, the packet is very likely to be delivered
incorrectly.
10. IPv6 is designed to allow extension of the _________
a) Protocol
b) Dataset
c) Headers
d) Routes
View Answer

Answer: a
Explanation: IPv6 is designed to allow the extension of the protocol if required by
new technologies or applications. IPv6 uses a new header format in which options
are separated from the base header and inserted, when needed, between the base
header and upper-layer data.
11. In IPv6, base header can be followed by, up to _________
a) Six Extension Layers
b) Six Extension Headers
c) Eight Extension headers
d) Eight Extension layers
View Answer

Answer: b
Explanation: The length of the base header is 40 bytes. However, to give more
functionality to the IP datagram, the base header can be followed by up to six
extension headers.
12. In an IPv6 datagram, M bit is 0, value of HLEN is 5, value of total length is
200 and offset value is ___________
a) 400
b) 350
c) 300
d) 200
View Answer

Answer: d

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy