Exam 5: Topics on Wireless Sensor Networks and Network Access Protocols

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Within the coverage range, communication is done by__________

Free
(Multiple Choice)
4.8/5
(34)
Correct Answer:
Verified

B

In pure ALOHA, the vulnerable time is ______ the frame transmission time.

Free
(Multiple Choice)
4.7/5
(38)
Correct Answer:
Verified

B

Following characteristics of wireless sensor networks point to the need for a specialized MAC protocol

Free
(Multiple Choice)
4.9/5
(32)
Correct Answer:
Verified

D

Which multiple access technique is used by iEEE 802.11 standard for wireless LAN?

(Multiple Choice)
4.9/5
(29)

In __________, each station is forced to send only at the beginning of the time slot.

(Multiple Choice)
4.9/5
(34)

In the S-MAC protocol, ___________is designed to reduce energy consumption during the long idle time when no sensing events happen, by turning off the radio periodically

(Multiple Choice)
4.8/5
(32)

A central problem for WSN is to dynamically define and form sensor groups based on__________

(Multiple Choice)
4.8/5
(37)

____________ assigns a unique number to each IP network adapter called the MAC address.

(Multiple Choice)
4.8/5
(26)

It may be more economical to use a smaller transmission radius for nodes in areas of high node density, w/o sacrificing adequate network connectivity. This is the issue of___________

(Multiple Choice)
4.8/5
(33)

The main goal of the ___________is to reduce energy waste caused by idle listening, collisions, overhearing and control overhead

(Multiple Choice)
4.9/5
(25)

As the number of nodes___________, every node spends almost all of its time forwarding packets of other nodes

(Multiple Choice)
4.8/5
(43)

The S-MAC protocol includes following major components

(Multiple Choice)
4.9/5
(45)

In ________ each station sends a frame whenever it has a frame to send.

(Multiple Choice)
4.7/5
(42)

Examples of data attributes may include

(Multiple Choice)
4.7/5
(32)

This describes how the Ethernet protocol regulates communication among connection points.

(Multiple Choice)
4.9/5
(27)

___________sub-layer manages access to the physical network medium, and its fundamental goal is to reduce or avoid packet collisions in the medium

(Multiple Choice)
4.9/5
(45)

Networking allows geographical distribution of the sensor nodes and their placement close to signal sources

(Multiple Choice)
4.8/5
(32)

802.11 wireless networking uses what method as the media access method?

(Multiple Choice)
4.9/5
(28)

Following MAC protocols have been developed for wireless voice and data communication networks

(Multiple Choice)
4.9/5
(41)

In which network access point is not required?

(Multiple Choice)
4.9/5
(31)
Showing 1 - 20 of 24
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)