Sie sind auf Seite 1von 18

1 As the number of nodes___________, Decreases Increases Constant None of B

every node spends almost all of its time the above


forwarding packets of other nodes

2 A central problem for WSN is to task resource both a and none of C


dynamically define and form sensor requiremen availability b these
groups based on__________ ts

3 In wireless sensor networks, some of the compile run time Ideal time Setup B
information defining the objective time time
function and constraints is available only
at___________

4 To ensure the ___________of the system, responsive scalability both a and neither A C
the communication and computation ness b nor B
should be localized to relevant sensors
only

5 does not statement isirrelavant


correct away from B
Networking allows geographical
depend on corelation signal
distribution of the sensor nodes and their
signal source
placement close to signal sources
source

6 Within the coverage range, multicast broadcast unicast all of the B


communication is done by__________ above

7 ___________sub-layer manages access to MAC LLC Applicatio session A


the physical network medium, and its n
fundamental goal is to reduce or avoid
packet collisions in the medium

8 Following characteristics of wireless the issues most In-network all of D


sensor networks point to the need for a of fairness sensor processing above
specialized MAC protocol of the node nodes are can greatly
level are idle much improve
much less of the time bandwidth
important utilization
than
overall
application
performanc
e
9 Following MAC protocols have been TDMA FDMA CDMA all of D
developed for wireless voice and data above
communication networks

10 The main goal of the ___________is to S-MAC IEEE802.15 A and b None of A


reduce energy waste caused by idle protocol .4 standard these
listening, collisions, overhearing and
control overhead

11 periodic D
The S-MAC protocol includes following collision overheating all of
listen and
major components avoidance avoidance above
sleep

12 In the S-MAC protocol, ___________is Message periodic topology Link B


designed to reduce energy consumption passing listen and control Control
during the long idle time when no sensing sleep
events happen, by turning off the radio
periodically

13 Examples of data attributes may include node's node's type certain all of D
location of sensors range of above
values in a
certain type
of sensed
data

14 topology traffic protocol link A


It may be more economical to use a
control control control control
smaller transmission radius for nodes in
areas of high node density, w/o sacrificing
adequate network connectivity. This is the
issue of___________

15 Which multiple access technique is used CDMA CDMA/CD CDMA/CA None of C


by IEEE 802.11 standard for wireless the above
LAN?

16 What is the size of MAC Address? 16-bits 32-bits 48-bits 64-bits C

17 This is what happens if two devices on the Overlap crossover collision None of C
same Ethernet network determine the the above
network is free, but attempt to transmit
data at exactly the same time.
18 Carrier A
Sense Discontinu
This describes how the Ethernet protocol
Multiple ous Wait and
regulates communication among Aggregator
Access/Col transmissio response
connection points.
lision n
Detect

19 802.11 wireless networking uses what C


CSMA/CD CTS/RTS CSMA/CA CSCD/CA
method as the media access method?

20 ____________ assigns a unique number Media Metro Metropolit Both b A


to each IP network adapter called the Access Access an Access and c
MAC address. Control Control Control above

21 In ________ each station sends a frame pure slotted both (a) neither (a) A
whenever it has a frame to send. ALOHA ALOHA and (b) nor (b)

22 In pure ALOHA, the vulnerable time is none of B


the same as two times three times
______ the frame transmission time. the above

23 In __________, each station is forced to pure slotted both (a) neither (a) B
send only at the beginning of the time ALOHA ALOHA and (b) nor (b)
slot.

24 In ________, a station monitors the CSMA/CA CSMA/CD either (a) both (a) B
medium after it sends a frame to see if the or (b) and (b)
transmission was successful. If so, the
station is finished. If, however, there is a
collision, the frame is sent again.

25 To avoid collisions on wireless networks, CSMA/CA CSMA/CD either (a) both (a) A
________was invented. or (b) and (b)

26 In _______, collisions are avoided CSMA/CA CSMA/CD either (a) both (a) A
through the use of three strategies: the or (b) and (b)
interframe space, the contention window,
and acknowledgments.

27 In _______ methods, the stations consult random controlled channelizat none of B


one another to find which station has the access access ion the above
right to send.

28 In _______ methods, a station cannot random controlled channelizat none of B


send unless it has been authorized by access access ion the above
other stations.
29 reservation polling token none of A
In the ________ method, a station needs
passing the above
to make a reservation before sending data.
Time is divided into intervals.

30 In the ______ method, all data exchanges reservation polling token none of B
must be made through the primary device passing the above
even when the ultimate destination is a
secondary device.

31 In the _______ method, the primary reservation polling token none of B


device controls the link; the secondary passing the above
devices follow its instructions.

32 FDMA TDMA CDMA none of A


In ______, each station is allocated a band
the above
to send its data. In other words, each band
is reserved for a specific station, and it
belongs to the station all the time.

33 In _______, the stations share the FDMA TDMA CDMA none of B


bandwidth of the channel in time. the above

34 In _____, each station is allocated a time FDMA TDMA CDMA none of B


slot during which it can send data. Each the above
station transmits its data in its assigned
time slot.

35 In _____, each station transmits its data in FDMA TDMA CDMA none of B
its assigned time slot. the above

36 W-CDMA is ____. Wireless Wideband Wide code Web band A


Code code division code
Division division multiple division
Multiple multiple access multiple
Access access access

37 You have 5 information signals and only Frequency Multiplexin Amplificati Amplitude B
one transmitter. What technique will help modulatio g on modulatio
in transmitting all the 5 signals? n n

38 RTS/CTS period is called ( ) Waiting Contention Running none of A


period period period these
39 Which is not a variant of S-MAC? Timeout Dynamic Input- Data D
MAC sensor Output gathering
(TMAC) MAC MAC (DMAC)
(DSMAC) (IOMAC)

40 Fading of the received radio signals in a Direct Multipath Bi-path None of B


mobile communication environment propagatio Propagatio Propagatio the above
occurs because of ..... n n n

41 In .............. Frequency Spectrum is TDMA CDMA FDMA FGMA C


divided into smaller spectra and is
allocated to each user.

42 5. In ................ multiple access is TDMA CDMA FDMA FGMA A


achieved by allocating different time slots
for the different users.

43 A antenna which attempts to direct all its Directional One to Single A


energy in a particular direction is called as Antenna One Propagatio Direction
a ............. Antenna n Antenna Antenna

44 Which of the FCC's RF bands operates in ISM RFID SOHO UNII A


the frequency range of 2.4 GHz to 2.4835
GHz

45 What is the term used to identify the RFI RFID FCC ISM A
broadcast or generated electrical signals
that can disrupt wireless
communications?

46 Which one of the following devices Bridge Repeater Router Gateway B


rebroadcasts the signals it receives after
conditioning them for increased strength
and clarity?

47 Wireless networks transmit using RF Repeater Router Antenna Remote C


signals, which require a __________ to
receive and transmit signals through the
air.

48 Which one of the following RF band is 4.9 GHz to 824 MHz 174 MHz 2.4 GHz to D
allocated to the Industrial, Scientific and 5.825 GHz to 849 to 220 2.4835
Medical industry? MHz MHz GHz
49 Since a wireless ad-hoc network is Forwarding Protocols Switching Range A
decentralized and its topology is dynamic,
each of the wireless nodes must perform
its own message __________.

50 What is the networking device used to Hub Lan switch NAP Router D
forward packets on a packet-switching
network?

51 What signal transmission method DSSS Multiplexin Modulatio FHSS B


intersperses message segments from g n
multiple sessions into a single medium?

52 What is the term used to describe the Frequency Amplitude Wavelengt Modulatio B
height of a radio wave? h n

53 Which of the RF multiplexing methods FDM FM TDM AM C


uses times slices to carry multiple data
streams on a single carrier?

54 The general rule of __________ is the Intensity Frequency Amplitude Propagati D


inverse-square law, which measures an on
electromagnetic wave's strength relative
to the distance over which it is
transmitted.

55 The __________ is designed to radiate Intensity Antenna Radio Phase B


the aura of the electromagnetic field
created by the electric current.

56 __________ communications mode Radio Multiplexin Full duplex Half D


means that it can both transmit and g duplex
receive, but only one action at a time.

57 The radio communication spectrum is Frequency Cost and Transmissi Amplitude A


divided into bands based on ______. hardware on media

58 Which of the following is a type of SNR RFI EMI Crosstalk B


wireless network interference that can
originate from a nearby radio wave
transmitter?
59 What type of interference is emitted by SNR RFI Crosstalk EMI D
nearby electrical motors, appliances, or
faulty connections?

60 What is the receive signal strength The SSID of The The The C
indicator used to measure? the access weakest strongest channel
point with signal on signal on a which the
the any particular least
strongest channel channel at signal to
signal. within the a specific noise
range of an location. ratio.
access
point.

61 What is the measurement used to Crosstalk SNR RFI EMI B


indicate the amount of interference to a
particular location?

62 Which of these is not true for Time- TDD uses Single It increases A C
Division Duplex (TDD)? different radio the battery Duplexer
time slots frequency life of is required
for can be mobile
transmissi used phones
on and
reception
paths

63 increases decreases not affect independe A


Densor sensor field---------- the odds of
detecting a signal source within the range nt of

64 As the number of nodes___________, every decreases increases goes down remains B


node spends almost all of its time forwarding same
packets of other nodes

65 select the incorrect statement Networking Radio Sensor Wireless B


allows communicat networks communica
geographica ion is the are typically tion
l less deployed in between
distribution expensive an adhoc nodes
of the operation a manner utilizes
sensor node radio links
nodes and performs in
their terms of
placement energy
close to usage
signal
sources
66 select the incorrect statement Networking Radio Sensor Wireless D
allows communicat networks communica
geographica ion is the are typically tion
l most deployed in between
distribution expensive an adhoc nodes
of the operation a manner utilizes
sensor node optical link
nodes and performs in links
their terms of
placement energy
close to usage
signal
sources

67 select the incorrect statement Networking Radio Sensor Wireless C


allows communicat networks communica
geographica ion is the are typically tion
l most deployed in between
distribution expensive structured nodes
of the operation a manner utilizes
sensor node radio links
nodes and performs in
their terms of
placement energy
close to usage
signal
sources

68 Within the coverage range, nodes multicast broadcast both none of B


communication is by__________ above

69 ___________sub-layer manages access to the LLC physical MAC BASEBAN C


physical network medium, and its D
fundamental goal is to reduce or avoid packet
collisions in the medium

70 most sensor In-network issues of all of D


nodes are processing energy above
idle much of can greatly efficiency,
the time improve scalability
bandwidth and
Following characteristics of wireless sensor utilization robustness
networks point to the need for a specialized remain
MAC protocol paramount

71 The main goal of the ___________is to S-MAC IEEE802.15. both IEEE802.15. A


reduce energy waste caused by idle listening, protocol 4 standard 3 standard
collisions, overhearing and control overhead
72 The S-MAC protocol includes following major periodic listencollision
and sleepavoidance
message passing
all of D
component above

73 The S-MAC protocol includes following major periodic listenmessage


and sleep
passing
A and B both none of C
component above

74 In the S-MAC protocol, ___________is periodic listenperiodic


only listenmessage
and sleep
passing
periodic sleep
B only
designed to reduce energy consumption
during the long idle time when no sensing
events happen, by turning off the radio
periodically

75 __________in S-MAC is similar to the using collision overhearin both one of A


an RTS/CTS exchange avoidance g above
avoidance

76 Following aspects of the energy cost in a Multi-hop When a neither A A and B D


sensor network make it challenging to reason communicat node nor B Both
about optimizing energy ion can be transmits,
more all other
efficient nodes
than direct within range
transmissio can hear
n

77 select the correct statement Since the For time A and B neither A A
nodes synchronizat Both nor B
operate ion, the
independen wired
tly, their protocols
clocks may assume the
not be existence of
synchronize highly
d with one accurate
another master
clocks on
some
network
nodes such
as skew
clock
78 select the correct statement Since the For time A and B neither A C
nodes synchronizat Both nor B
operate ion, the
independen wired
tly, their protocols
clocks may assume the
not be existence of
synchronize highly
d with one accurate
another master
clocks on
some
network
nodes such
as atomic
clock

79 The latency in channel can be decomposed send time access time propagation alln of D
into following components and receive time above
time

80 The latency in channel can be decomposed Send time Receive A and B neither A C
into following components and access time and Both nor B
time propagation
time

81 The Send time is This is the This is the This is the This is the A
time taken delay time for time for
by the incurred message to the
sender to while travel across network
construct waiting for the channel interface
the access to to the on the
message the destination receiver
transmission node side to get
channel due the
to message
contention, and notify
collisions etc the host of
its arrival
82 The Access time is This is the This is the This is the This is the B
time taken delay time for time for
by the incurred message to the
sender to while travel across network
construct waiting for the channel interface
the access to to the on the
message the destination receiver
transmission node side to get
channel due the
to message
contention, and notify
collisions etc the host of
its arrival

83 The Propagation time is This is the This is the This is the This is the C
time taken delay time for time for
by the incurred message to the
sender to while travel across network
construct waiting for the channel interface
the access to to the on the
message the destination receiver
transmission node side to get
channel due the
to message
contention, and notify
collisions etc the host of
its arrival

84 The Receive time is This is the This is the This is the This is the D
time taken delay time for time for
by the incurred message to the
sender to while travel across network
construct waiting for the channel interface
the access to to the on the
message the destination receiver
transmission node side to get
channel due the
to message
contention, and notify
collisions etc the host of
its arrival
85 Fading Reflection & Scattering & all of D
(frequency refraction diffraction above
dependent) depending
Receiving power additionally influenced by
& on the
shadowing density

86 Incorrect statement about Time and Better Protection Higher data No precise D
frequency multiplexing in combination is protection against rates coordinatio
against frequency compared n required
tapping selective to code
interference multiplex

87 in case of hidden terminal problem two two independe none of B


senders senders nt of the above
are in the are not in sender
communic the range
ation range communic
of each ation range
other of each
other

88 in case of exposed terminal problem two two independe two A


senders senders nt of receivers
are in the are not in sender are in the
communic the range communic
ation range communic ation
of each ation range range of
other of each each
other other

89 Throughput is defined as the number of bits Received Lost per Transmitted Retransmitt C
or bytes successfully per time time unit T per time ed per time
unit T unit T unit T

90 Design Criteria for Medium Access Protocols Maximize Maximize Minimize Maximize A
the the the the
throughput throughput throughput throughput
by by Maximize by by
minimizing the delay minimizing Maximize
the delay and the delay the delay
and energy minimizing and energy and energy
spent. energy spent. spent.
spent.
91 Design Criteria for Medium Access Protocols Maximize To minimize To maximize Avoid the B
the the time in the time in switched
throughput listening listening off devices
by Maximize mode as mode as handling
the delay much as much as
and energy possible. possible.
spent.

92 Microcontroller has current drawn Active Sleep Ideal Sleep A


typically of 1.8 mA and 5.1 µA mode mode mode mode
respectively in and and and and
sleep Active Active ideal
mode mode mode mode

93 RF Transceiver draws more current in sleep Receive Transmit search C


mode mode mode mode

94 In centralized TDMA, The The The The B


schedule is schedule is schedule is schedule is
calculated calculated calculated calculated
online and offline and offline and online and
provided provided to provided provided
when the sensor when when after
required nodes at required regular
startup. interval of
time

95 When a node has a packet to send, it listens If the If the If the If the C
for traffic on the channel. channel is channel is channel is channel is
free, it free, it free, it free, it
initially initially initially initially
sends waits for sends waits for
message, message, message, message,
CTS. CTS. RTS. RTS.

96 If the channel is busy, continues sensing the 1-persistent Non- P-persistent O- A


channel until it becomes idle again. CSMA persistent CSMA persistent
CSMA CSMA

97 If the channel is busy, it back-offs for a 1-persistent Non- P-persistent O- B


random amount of time and then retries. CSMA persistent CSMA persistent
CSMA CSMA
98 This version is time scheduled. A central 1-persistent Non- P-persistent O- D
controller in the network assigns a fixed CSMA persistent CSMA persistent
transmission order CSMA CSMA

99 An inherent problems with S-MAC is It does not Internal The internal The C
allow sensor clocks are clock of the internal
nodes to not present. nodes are clock of the
sleep for not nodes are
extensive synchronize synchroniz
amounts of d. ed.
time.

100 Timeout-MAC (T-MAC) letting the nodes During their During their Before the After the B
timeout when nothing happens sleep active active active
periods. periods. period. period.

101 Berkeley MAC (B-MAC) was developed to T-MAC S-MAC LPL All of above B
tackle the problems of

102 Long preamble used in Berkeley MAC (B- Application Other Has fixed Has D
MAC) has long preamble consist of data payloads length and variable
may carry length and
sender, may carry
receiver, sender,
and packet receiver,
size and packet
information size
information

103 Long preamble used in Berkeley MAC (B- Wakeup Less than Sleeping Less than C
MAC) has to be send at least for duration of time wakeup time sleeping
time time

104 The MAC protocol, Guarantee Does not Guarantee None of B


that the guarantee that the above
transmissio that the retransmissi
n will be transmission on will be
successful will be successful
successful
105 incorrect statement is The lower Link Quality Link Quality Packet B
the Indicator Indicator Reception
Received (LQI) (LQI) Ratio
Signal positive positive measured
Strength number number in fraction
Indicator - ranging ranging
RSSI, better from from
the signal. approximate approximate
ly 110 to 50 ly 0 to 100

106 The packet reception ratio (PPR) is depicted At long At short At long PPR is C
against the distance distance distance distance independe
between between between nt of
nodes, the nodes, the nodes, the distance
PRR PRR PRR between
increases decreases decreases nodes

107 In the clear communication zone At least a Almost interference From B


communication is 90% impossible, free. almost
but 100% to 0%
interference
might still
occur.

108 The purpose of error control is to Guarantee Guarantee Guarantee A and B D


communicat communicat communicat both
ion is error- ion is ion is error-
free & in- duplicate- free and loss-
sequence, free, and free
loss-free

109 Backward Error Control – Should not Should try Should try None of A
try to to prevent to prevent the above
prevent errors errors and
errors but avoid
only discovery of
discover errors
errors.

110 Forward Error Control- Should not Should try Should try Attempts D
try to to prevent to prevent to prevent
prevent errors only errors and errors
errors but avoid instead of
only discovery of only
discover errors detecting
errors. them
111 Select correct statement for naming Name Name reveal Name does Name does C
reveal a about the not reveal not reveal
about the position of anything anything
position of the node, about the about the
the node but not position of position of
and its role. about the the node. the node as
role. Reveal well as its
something role.
about the
role.

112 Select correct statement for addressing of Address Address Address Address B
node reveal a reveal about does not does not
about the the position reveal reveal
position of of the node, anything anything
the node but not about the about the
and its role. about the position of position of
role. the node. the node as
Reveal well as its
something role.
about the
role.

113 Centralized Topology Control Is very hard Requires React well in All are B
to perform significant case of leading
communicat changes. nodes
ion
overhead

114 Distributed Topology Control Is very simple Requires less More flexible, Less precise C
to perform time to situation- than
stabilize aware centralized
control.

115 What is shadowing? Direct Undirect Signal Signal B


signal signal strength range

116 In wireless distribution system There is no There is no Multiple None of C


access repeater in APs are the above
point wireless inter-
network connected
with each
other

117 What device is the wireless equivalent of a Bridge Repeater Antenna Access- D
wired hub? point

118 The type of access used in GSM technology TDMA CDMA OFDMA None of A
is the above
119 34. Uplinks are also knowns as Reverse BS link Forward link MS link A
link

120 The RTS and CTS frames in CSMA/CA ____ can; cannot cannot; can can; can cannot; A
solve the hidden station problem. The RTS cannot
and CTS frames in CSMA/CA ____ solve the
exposed station problem.

121 A one-to-all communication between one unicast multicast broadcast none of the C
source and all hosts on a network is classified above
as a _______ communication.

122 A one-to-many communication between one unicast multicast broadcast none of the B
source and a specific group of hosts is above
classified as a _______ communication.

123 A one-to-one communication between one unicast multicast broadcast none of the A
source and one destination is classified as a above
_______ communication.

Das könnte Ihnen auch gefallen