Deck 5: Topics on Wireless Sensor Networks and Network Access Protocols

Full screen (f)
exit full mode
Question
Similarities between WSNs and MANETs networks is.

A)nodes are densely deployed
B)the nodes communicate each other using multi-hop communication
C)topology changes very frequently
D)have global unique identification for nodes
Use Space or
up arrow
down arrow
to flip the card.
Question
In which network access point is not required?

A)ad hoc network
B)infrastructure network
C)both a and b
D)none of the above
Question
As the number of nodes___________, every node spends almost all of its time forwarding packets of other nodes

A)decreases
B)increases
C)constant
D)none of the above
Question
A central problem for WSN is to dynamically define and form sensor groups based on__________

A)task requirements
B)resource availability
C)both a and b
D)none of these
Question
In wireless sensor networks, some of the information defining the objective function and constraints is available only at___________

A)compile time
B)run time
C)ideal time
D)setup time
Question
To ensure the ___________of the system, the communication and computation should be localized to relevant sensors only

A)responsiveness
B)scalability
C)both a and b
D)neither a nor b
Question
Networking allows geographical distribution of the sensor nodes and their placement close to signal sources

A)does not depend on signal source
B)statement is correct
C)irrelavant corelation
D)away from signal source
Question
Within the coverage range, communication is done by__________

A)multicast
B)broadcast
C)unicast
D)all of the above
Question
___________sub-layer manages access to the physical network medium, and its fundamental goal is to reduce or avoid packet collisions in the medium

A)mac
B)llc
C)application
D)session
Question
Following characteristics of wireless sensor networks point to the need for a specialized MAC protocol

A)the issues of fairness of the node level are much less important than overall application performance
B)most sensor nodes are idle much of the time
C)in-network processing can greatly improve bandwidth utilization
D)all of above
Question
Following MAC protocols have been developed for wireless voice and data communication networks

A)tdma
B)fdma
C)cdma
D)all of above
Question
The main goal of the ___________is to reduce energy waste caused by idle listening, collisions, overhearing and control overhead

A)s-mac protocol
B)iEEE 802.15.4 standard
C)a and b
D)none of these
Question
The S-MAC protocol includes following major components

A)periodic listen and sleep
B)collision avoidance
C)overheating avoidance
D)all of above
Question
In the S-MAC protocol, ___________is designed to reduce energy consumption during the long idle time when no sensing events happen, by turning off the radio periodically

A)message passing
B)periodic listen and sleep
C)topology control
D)link control
Question
Examples of data attributes may include

A)node\s location
B)node\s type of sensors
C)certain range of values in a certain type of sensed data
D)all of above
Question
It may be more economical to use a smaller transmission radius for nodes in areas of high node density, w/o sacrificing adequate network connectivity. This is the issue of___________

A)topology control
B)traffic control
C)protocol control
D)link control
Question
Which multiple access technique is used by iEEE 802.11 standard for wireless LAN?

A)cdma
B)cdma/cd
C)cdma/ca
D)none of the above
Question
This is what happens if two devices on the same Ethernet network determine the network is free, but attempt to transmit data at exactly the same time.

A)overlap
B)crossover
C)collision
D)none of the above
Question
This describes how the Ethernet protocol regulates communication among connection points.

A)carrier sense multiple access/collision detect
B)discontinuous transmission
C)aggregator
D)wait and response
Question
802.11 wireless networking uses what method as the media access method?

A)csma/cd
B)cts/rts
C)csma/ca
D)cscd/ca
Question
____________ assigns a unique number to each IP network adapter called the MAC address.

A)media access control
B)metro access control
C)metropolitan access control
D)both b and c above
Question
In ________ each station sends a frame whenever it has a frame to send.

A)pure aloha
B)slotted aloha
C)both (a) and (b)
D)neither (a) nor (b)
Question
In pure ALOHA, the vulnerable time is ______ the frame transmission time.

A)the same as
B)two times
C)three times
D)none of the above
Question
In __________, each station is forced to send only at the beginning of the time slot.

A)pure aloha
B)slotted aloha
C)both (a) and (b)
D)neither (a) nor (b)
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/24
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 5: Topics on Wireless Sensor Networks and Network Access Protocols
1
Similarities between WSNs and MANETs networks is.

A)nodes are densely deployed
B)the nodes communicate each other using multi-hop communication
C)topology changes very frequently
D)have global unique identification for nodes
the nodes communicate each other using multi-hop communication
2
In which network access point is not required?

A)ad hoc network
B)infrastructure network
C)both a and b
D)none of the above
ad hoc network
3
As the number of nodes___________, every node spends almost all of its time forwarding packets of other nodes

A)decreases
B)increases
C)constant
D)none of the above
increases
4
A central problem for WSN is to dynamically define and form sensor groups based on__________

A)task requirements
B)resource availability
C)both a and b
D)none of these
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
5
In wireless sensor networks, some of the information defining the objective function and constraints is available only at___________

A)compile time
B)run time
C)ideal time
D)setup time
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
6
To ensure the ___________of the system, the communication and computation should be localized to relevant sensors only

A)responsiveness
B)scalability
C)both a and b
D)neither a nor b
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
7
Networking allows geographical distribution of the sensor nodes and their placement close to signal sources

A)does not depend on signal source
B)statement is correct
C)irrelavant corelation
D)away from signal source
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
8
Within the coverage range, communication is done by__________

A)multicast
B)broadcast
C)unicast
D)all of the above
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
9
___________sub-layer manages access to the physical network medium, and its fundamental goal is to reduce or avoid packet collisions in the medium

A)mac
B)llc
C)application
D)session
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
10
Following characteristics of wireless sensor networks point to the need for a specialized MAC protocol

A)the issues of fairness of the node level are much less important than overall application performance
B)most sensor nodes are idle much of the time
C)in-network processing can greatly improve bandwidth utilization
D)all of above
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
11
Following MAC protocols have been developed for wireless voice and data communication networks

A)tdma
B)fdma
C)cdma
D)all of above
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
12
The main goal of the ___________is to reduce energy waste caused by idle listening, collisions, overhearing and control overhead

A)s-mac protocol
B)iEEE 802.15.4 standard
C)a and b
D)none of these
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
13
The S-MAC protocol includes following major components

A)periodic listen and sleep
B)collision avoidance
C)overheating avoidance
D)all of above
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
14
In the S-MAC protocol, ___________is designed to reduce energy consumption during the long idle time when no sensing events happen, by turning off the radio periodically

A)message passing
B)periodic listen and sleep
C)topology control
D)link control
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
15
Examples of data attributes may include

A)node\s location
B)node\s type of sensors
C)certain range of values in a certain type of sensed data
D)all of above
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
16
It may be more economical to use a smaller transmission radius for nodes in areas of high node density, w/o sacrificing adequate network connectivity. This is the issue of___________

A)topology control
B)traffic control
C)protocol control
D)link control
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
17
Which multiple access technique is used by iEEE 802.11 standard for wireless LAN?

A)cdma
B)cdma/cd
C)cdma/ca
D)none of the above
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
18
This is what happens if two devices on the same Ethernet network determine the network is free, but attempt to transmit data at exactly the same time.

A)overlap
B)crossover
C)collision
D)none of the above
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
19
This describes how the Ethernet protocol regulates communication among connection points.

A)carrier sense multiple access/collision detect
B)discontinuous transmission
C)aggregator
D)wait and response
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
20
802.11 wireless networking uses what method as the media access method?

A)csma/cd
B)cts/rts
C)csma/ca
D)cscd/ca
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
21
____________ assigns a unique number to each IP network adapter called the MAC address.

A)media access control
B)metro access control
C)metropolitan access control
D)both b and c above
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
22
In ________ each station sends a frame whenever it has a frame to send.

A)pure aloha
B)slotted aloha
C)both (a) and (b)
D)neither (a) nor (b)
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
23
In pure ALOHA, the vulnerable time is ______ the frame transmission time.

A)the same as
B)two times
C)three times
D)none of the above
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
24
In __________, each station is forced to send only at the beginning of the time slot.

A)pure aloha
B)slotted aloha
C)both (a) and (b)
D)neither (a) nor (b)
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 24 flashcards in this deck.