Download as pdf or txt
Download as pdf or txt
You are on page 1of 24

www.rejinpaul.

com
EC8702 Ad hoc and Wireless Sensor Networks
Multiple Choice Questions
NPTEL - Online Assignments
[email protected]

Courses » Wireless Adhoc And Sensor Networks

Announcements Course Ask a Question Progress

Unit 2 - Week 1:

om
Course
outline Assignment Week 1
The due date for submitting this assignment has passed. Due on 2018-02-21, 23:59 IST.
How to access As per our records you have not submitted this assignment.

.c
the portal
1) A wireless network without a centralized access point may be: 1 point
Week 1:
An infrastructure network
Lecture 1: An ad hoc network

ul
Introduction:
All of these
Wireless Ad
Hoc Networks- None of these
Part- I
No, the answer is incorrect.
pa
Lecture 2: Score: 0
Introduction:
Wireless Ad Accepted Answers:
Hoc Networks- An ad hoc network
Part- II
2) Which of the following technologies enable wireless ad-hoc networking 1 point
Lecture 3: Self-
jin

organizing ZigBee
Behaviour of
Wireless Ad
4G(LTE)
Hoc Networks All of the above

Lecture 4: None of these


.re

Cooperation in
No, the answer is incorrect.
Mobile Ad Hoc
Networks- Part- Score: 0
I Accepted Answers:
Lecture 5: ZigBee
Cooperation in
3) The self-properties of self-organization networks are known by the acronym 1 point
w

Mobile Ad Hoc
Networks- Part-
II Self-POT
Self-CHOP
Week 1 Lecture
w

Material Self-CHAP
Self-COAT
Quiz :
Assignment No, the answer is incorrect.
Week 1
w

Score: 0
Assignment Accepted Answers:
Solution Week 1
Self-CHOP
Week 2 4) The main source of power consumption in wireless sensor networks is due to 1 point

Week 3 Sensing
Transmitting
Week 4
Processing
None of these
Week 5

Week 6
Downloaded updated materials from Rejinpaul Network App
EC8702 - MCQ Page: 1
https://onlinecourses-archive.nptel.ac.in/noc18_cs09/unit?unit=6&assessment=86 1/3
27/07/2020 Wireless Adhoc And Sensor Networks - - Unit 2 - Week 1:
No, the answer is incorrect.
www.rejinpaul.com
Week 7 Score: 0
Accepted Answers:
Week 8 Transmitting

DOWNLOAD 5) Throughput in wireless ad hoc networks with N nodes decreases at a rate of 1 point
VIDEOS
√N
N^2
N^3
2N

No, the answer is incorrect.

om
Score: 0
Accepted Answers:
√N

6) In Sprite, a selfish node may save a receipt but does not forward the message. What is the 1 point
countermeasure for this selfish action?

The CCS charges the sender an extra amount of credit

.c
The CCS gives more credit to a node that forwards a message than the node which does not
The credit of each node is multiplied by a fraction r, where r < 1
The non-forwarding node is charged with an extra amount of credit

ul
No, the answer is incorrect.
Score: 0
Accepted Answers:
pa
The CCS gives more credit to a node that forwards a message than the node which does not

7) The nodes which are unable to perform an operation because of either power failure or 1 point
environmental events are termed as

Selfish node
jin

Failed nodes
Dead node
Malicious node

No, the answer is incorrect.


.re

Score: 0
Accepted Answers:
Failed nodes

8) The types of reputations used in the CORE are 1 point

Objective, direct, and functional


w

Subjective, indirect, and functional


Subjective, indirect, and non-functional
Subjective, direct, and non-functional
w

No, the answer is incorrect.


Score: 0
Accepted Answers:
w

Subjective, indirect, and functional

9) Sprite is a system based on credit, which is used to provide ___________ for mobile nodes 1 point
to cooperate and report actions honestly.

Penalty
Bit coin
Incentives
Acknowledge

No, the answer is incorrect.


Score: 0

Downloaded updated materials from Rejinpaul Network App


EC8702 - MCQ Page: 2
https://onlinecourses-archive.nptel.ac.in/noc18_cs09/unit?unit=6&assessment=86 2/3
27/07/2020 Wireless Adhoc And Sensor Networks - - Unit 2 - Week 1:
Accepted Answers:
www.rejinpaul.com
Incentives

10)Nodes which deliberately disrupt the correct operation of the routing protocol are known as: 1 point

Selfish nodes
Failed nodes
Badly failed nodes
Malicious nodes

No, the answer is incorrect.


Score: 0
Accepted Answers:

om
Malicious nodes

Previous Page End

.c
ul
pa
© 2014 NPTEL - Privacy & Terms - Honor Code - FAQs -
A project of In association with
jin

Funded by
.re

Powered by
w
w
w

Downloaded updated materials from Rejinpaul Network App


EC8702 - MCQ Page: 3
https://onlinecourses-archive.nptel.ac.in/noc18_cs09/unit?unit=6&assessment=86 3/3
27/07/2020 Wireless Adhoc And Sensor Networks - - Unit 3 - Week 2
www.rejinpaul.com

[email protected]

Courses » Wireless Adhoc And Sensor Networks

Announcements Course Ask a Question Progress

Unit 3 - Week 2

om
Course
outline Assignment Week 2
The due date for submitting this assignment has passed. Due on 2018-02-21, 23:59 IST.
How to access As per our records you have not submitted this assignment.

.c
the portal
1) RTS/CTS period is called 1 point
Week 1:
Waiting period
Contention period

ul
Week 2
Running period
Lecture 6: MAC
Protocols in
None of these
MANETs- Part- I
No, the answer is incorrect.
pa
Lecture 7: MAC Score: 0
Protocols in
Accepted Answers:
MANETs- Part-
II Contention period

Lecture 8: 2) Existing MAC protocols cannot be used in MANETs because of -- 1 point


jin

Routing in
MANETs- Part- I Resource constrained nodes
Limited bandwidth
Lecture 9:
Routing in Lack of centralized control
MANETs- Part- All of the above
II
.re

No, the answer is incorrect.


Lecture 10:
Routing in Score: 0
MANETs- Part- Accepted Answers:
III
All of the above
Week 2: Course
3) FPRP is a – 1 point
w

Material

Quiz : Synchronous and contention based protocol


Assignment Asynchronous and contention based protocol
Week 2
w

Contention based protocol without reservation mechanism


Assignment Contention based Protocols with scheduling mechanism
Solution Week 2
No, the answer is incorrect.
Week 3
w

Score: 0
Accepted Answers:
Week 4
Synchronous and contention based protocol
Week 5 4) In MACAW, Data Sending (DS) frame is of size 1 point

Week 6 120 Bytes


30 Bytes
Week 7
23 Byte
35 Byte
Week 8

Downloaded updated materials from Rejinpaul Network App


EC8702 - MCQ Page: 4
https://onlinecourses-archive.nptel.ac.in/noc18_cs09/unit?unit=15&assessment=87 1/3
27/07/2020 Wireless Adhoc And Sensor Networks - - Unit 3 - Week 2
No, the answer is incorrect.
www.rejinpaul.com
DOWNLOAD
VIDEOS Score: 0
Accepted Answers:
30 Bytes

5) Which is a hybrid routing protocol: 1 point

DSR
AODV
ZRP
None of the above

No, the answer is incorrect.

om
Score: 0
Accepted Answers:
ZRP

6) An example of mesh-based routing protocol is: 1 point

QAMNET

.c
QMR
ODMRP
All the above

ul
No, the answer is incorrect.
Score: 0
Accepted Answers:
All the above
pa
7) When a group of nodes are required to contact, which type of the following routing is useful? 1 point

Multicast
Unicast
Broadcast
jin

None of these

No, the answer is incorrect.


Score: 0
Accepted Answers:
.re

Multicast

8) Join query and join reply are used by which of the following multicast routing protocol? 1 point

ODMRP
QAMNET QMR ZMR
w

QMR
ZMR

No, the answer is incorrect.


w

Score: 0
Accepted Answers:
ODMRP
w

9) The routing scheme which use both the mask and destination address as 0.0.0.0 is: 1 point

Network-specific
Default
Host-specific
None of the above

No, the answer is incorrect.


Score: 0
Accepted Answers:
Network-specific

Downloaded updated materials from Rejinpaul Network App


EC8702 - MCQ Page: 5
https://onlinecourses-archive.nptel.ac.in/noc18_cs09/unit?unit=15&assessment=87 2/3
27/07/2020 Wireless Adhoc And Sensor Networks - - Unit 3 - Week 2
www.rejinpaul.com 1 point
10)MARCH exploits the properties of ___________ antennas and overhearing properties of
MANETs.

Single directional
Bi-directional
Omnidirectional
None of these

No, the answer is incorrect.


Score: 0
Accepted Answers:
Omnidirectional

om
Previous Page End

.c
ul
pa
© 2014 NPTEL - Privacy & Terms - Honor Code - FAQs -
A project of In association with
jin

Funded by

Powered by
.re
w
w
w

Downloaded updated materials from Rejinpaul Network App


EC8702 - MCQ Page: 6
https://onlinecourses-archive.nptel.ac.in/noc18_cs09/unit?unit=15&assessment=87 3/3
27/07/2020 Wireless Adhoc And Sensor Networks - - Unit 4 - Week 3
www.rejinpaul.com

[email protected]

Courses » Wireless Adhoc And Sensor Networks

Announcements Course Ask a Question Progress

Unit 4 - Week 3

om
Course
outline Assignment Week 3
The due date for submitting this assignment has passed. Due on 2018-02-28, 23:59 IST.
How to access As per our records you have not submitted this assignment.

.c
the portal
1) In TCP-ELFN, CWND = 1 causes No significant change, because – 1 point
Week 1:
Optimal window is relatively small
It is similar to No change

ul
Week 2
Default value of RTO is small
Week 3 All of these

Lecture 11: No, the answer is incorrect.


pa
Multicasting in Score: 0
MANETs
Accepted Answers:
Lecture 12: Optimal window is relatively small
Mobility Models
for MANETs 2) Stochastic mobility models are 1 point
jin

Lecture 13:
Less complex
Transport
Protocols for Highly diversified
MANETs- Part- I Hard to realize
Lecture 14 : All of these
.re

Transport
Protocols for No, the answer is incorrect.
MANETs- Part- Score: 0
II
Accepted Answers:
Lecture 15: Less complex
Opportunistic
Mobile 3) For testing the performance of the ad-hoc network, most accurate approach is 1 point
w

Networks- Part-
I Simulated

Week 3 Lecture Analytics


w

Material Test bed


Feedback for None of these
week 3
No, the answer is incorrect.
w

Quiz : Score: 0
Assignment
Week 3
Accepted Answers:
Test bed
Assignment
Solution Week 3 4) Complexity is a measure of the ______________ required to produce the traces for the 1 point
simulation.
Week 4
Driver
Week 5 Electricity
Computational resources
Week 6
None of these

Downloaded updated materials from Rejinpaul Network App


EC8702 - MCQ Page: 7
https://onlinecourses-archive.nptel.ac.in/noc18_cs09/unit?unit=24&assessment=93 1/3
27/07/2020 Wireless Adhoc And Sensor Networks - - Unit 4 - Week 3
No, the answer is incorrect.
www.rejinpaul.com
Week 7
Score: 0

Week 8 Accepted Answers:


Computational resources
DOWNLOAD
5) When ATCP encounters 3 duplicate ACKs, it puts TCP in ______________. 1 point
VIDEOS
Active mode
Persist mode
Idle mode
Waiting mode

No, the answer is incorrect.

om
Score: 0
Accepted Answers:
Persist mode

6) When ATCP is in the lossy state, reception of an ECN or ICMP message will move ATCP into1 point
which of the following state?

Free

.c
Congested
Forward
None of these

ul
No, the answer is incorrect.
Score: 0
Accepted Answers:
pa
Congested

7) After receiving 3 duplicate ACKs, following incident occurs -- 1 point

ATCP puts TCP into persist mode


ATCP into loss state
jin

ATCP into congested state


ATCP puts TCP into persist mode and ATCP into loss state

No, the answer is incorrect.


Score: 0
.re

Accepted Answers:
ATCP puts TCP into persist mode and ATCP into loss state

8) In TCP-F, when a routing agent detects the disruption of a route, it explicitly sends a 1 point
_________ packet to the sender.

Route Failure Notification


w

Route Formations Notification


Route Disruption Notification
Transmission Success Notification
w

No, the answer is incorrect.


Score: 0
Accepted Answers:
w

Route Failure Notification

9) In TCP-BuS, to avoid timeout events during the route re-construction (RRC) phase, the 1 point
timeout values for buffered packets from source to PN will be

Set to one
Doubled
Same
Half

No, the answer is incorrect.


Score: 0

Downloaded updated materials from Rejinpaul Network App


EC8702 - MCQ Page: 8
https://onlinecourses-archive.nptel.ac.in/noc18_cs09/unit?unit=24&assessment=93 2/3
27/07/2020 Wireless Adhoc And Sensor Networks - - Unit 4 - Week 3
Accepted Answers:
www.rejinpaul.com
Doubled

10)ELFN works based on __________________the network (Choose most appropriate) 1 point

Selecting
Probing
Distributing
None of these

No, the answer is incorrect.


Score: 0
Accepted Answers:

om
Probing

Previous Page End

.c
ul
pa
© 2014 NPTEL - Privacy & Terms - Honor Code - FAQs -
A project of In association with
jin

Funded by
.re

Powered by
w
w
w

Downloaded updated materials from Rejinpaul Network App


EC8702 - MCQ Page: 9
https://onlinecourses-archive.nptel.ac.in/noc18_cs09/unit?unit=24&assessment=93 3/3
27/07/2020 Wireless Adhoc And Sensor Networks - - Unit 5 - Week 4
www.rejinpaul.com

[email protected]

Courses » Wireless Adhoc And Sensor Networks

Announcements Course Ask a Question Progress

Unit 5 - Week 4

om
Course
outline Assignment Week 4
The due date for submitting this assignment has passed. Due on 2018-03-07, 23:59 IST.
How to access As per our records you have not submitted this assignment.

.c
the portal
1) UAV-SDN aims to achieve – 1 point
Week 1:
Autonomous UAV control
Remote UAV control

ul
Week 2
Remote control and configuration of network of UAVs
Week 3 Swarm of UAVs

No, the answer is incorrect.


pa
Week 4
Score: 0
Lecture 16:
Accepted Answers:
Opportunistic
Mobile Remote control and configuration of network of UAVs
Networks- Part-
II
2) What does the presence function in a time-varying graph indicate? 1 point
jin

Lecture 17: Whether or not a given node was present at a given location at a given time instant
Opportunistic Whether or not it belongs to the cut set
Mobile
Networks- Part- Characterizes a node via which all communication must pass
III Whether or not a given edge was present at a given time instant
.re

Lecture 18: UAV No, the answer is incorrect.


Networks- Part-
Score: 0
I
Accepted Answers:
Lecture 19: UAV
Whether or not a given edge was present at a given time instant
Networks- Part-
II 3) What does a Protocol Translation Unit do? 1 point
w

Lecture 20: UAV


Networks- Part- Allows two different routing protocols to communicate
III Allows devices with heterogeneous MAC layers to communicate
w

Week 4: Lecture Provides backward compatibility to older versions of a given protocol


Material Collects messages from highly mobile nodes similar to throwboxes
Quiz : No, the answer is incorrect.
Assignment
w

Score: 0
Week 4
Accepted Answers:
Assignment
Allows two different routing protocols to communicate
Solution Week 4
4) Which is not a typical requirement for reputation/trust management schemes for OMNs, in 1 point
Week 5
general?

Week 6 Tamper-proof hardware


Huge network bandwidth
Week 7
Use of cryptographic hashes
Week 8 Presence of certifying authorities

Downloaded updated materials from Rejinpaul Network


EC8702 - MCQApp
Page: 10
https://onlinecourses-archive.nptel.ac.in/noc18_cs09/unit?unit=33&assessment=92 1/3
27/07/2020 Wireless Adhoc And Sensor Networks - - Unit 5 - Week 4
No, the answer is incorrect.
www.rejinpaul.com
DOWNLOAD
VIDEOS Score: 0
Accepted Answers:
Huge network bandwidth

5) OMNs are very similar to MANETs in the sense that they both lack in network infrastructure. 1 point
However, their primary difference is the lack of ____

End-to-end communication
Storage
Processing power
All of these

om
No, the answer is incorrect.
Score: 0
Accepted Answers:
End-to-end communication

6) Multi-UAV systems have preferably ____________ antennas, whereas single UAV systems 1 point
have omni-directional antennas.

.c
Omni-directional
Bi-directional
Directional

ul
None of these

No, the answer is incorrect.


Score: 0
pa
Accepted Answers:
Directional

7) Similar to vehicular networks, which are termed VANETs, UAV networks are popularly termed 1 point
as:
jin

UANETs
FANETs
WINETs
All of these
.re

No, the answer is incorrect.


Score: 0
Accepted Answers:
FANETs

8) Yaw, Pitch and Roll values are determined from which sensor? 1 point
w

Accelerometer
Gyroscope
Magnetometer
w

Barometer

No, the answer is incorrect.


Score: 0
w

Accepted Answers:
Gyroscope

9) An UAV SDN implementation encompasses data and ________ planes of communication. 1 point

Process
Resource
Control
Display

No, the answer is incorrect.


Score: 0

Downloaded updated materials from Rejinpaul Network


EC8702 - MCQApp
Page: 11
https://onlinecourses-archive.nptel.ac.in/noc18_cs09/unit?unit=33&assessment=92 2/3
27/07/2020 Wireless Adhoc And Sensor Networks - - Unit 5 - Week 4
Accepted Answers:
www.rejinpaul.com
Control

10)In ProPHET, the use of ___ allows to update the contact probability with a node with whom 1 point
there has been no contact lately

Paging
Aging
Indexing
Casing

No, the answer is incorrect.


Score: 0

om
Accepted Answers:
Aging

Previous Page End

.c
ul
pa
© 2014 NPTEL - Privacy & Terms - Honor Code - FAQs -
A project of In association with
jin

Funded by
.re

Powered by
w
w
w

Downloaded updated materials from Rejinpaul Network


EC8702 - MCQApp
Page: 12
https://onlinecourses-archive.nptel.ac.in/noc18_cs09/unit?unit=33&assessment=92 3/3
27/07/2020 Wireless Adhoc And Sensor Networks - - Unit 6 - Week 5
www.rejinpaul.com

[email protected]

Courses » Wireless Adhoc And Sensor Networks

Announcements Course Ask a Question Progress

Unit 6 - Week 5

om
Course
outline Assignment Week 5
The due date for submitting this assignment has passed. Due on 2018-03-14, 23:59 IST.
How to access As per our records you have not submitted this assignment.

.c
the portal
1) Solution for optimal coverage includes the important parameters as: 1 point
Week 1:
Coverage requirement
Detection time

ul
Week 2
Number of sensors
Week 3 All of the above

No, the answer is incorrect.


pa
Week 4
Score: 0
Week 5 Accepted Answers:
All of the above
Lecture 21:
Introducation: 2) Typically, ratio between transmission range and sensing range is: 1 point
Wireless Sensor
jin

Networks- Part- 2:1


I
1:1
Lecture 22:
1:2
Introducation:
Wireless Sensor None of the above
.re

Networks- Part-
II No, the answer is incorrect.
Score: 0
Lecture 23:
WSN Coverage Accepted Answers:
& Placement- 2:1
Part-I
3) Adequate placement of sensor node is important to ensure 1 point
w

Lecture 24:
WSN Coverage Adequate power consumption
& Placement-
Adequate transmission
Part-II
w

Adequate coverage
Lecture 25:
None of these
Topology
Mangement in
No, the answer is incorrect.
Wireless Sensor
w

Networks
Score: 0
Accepted Answers:
Week 5 Lecture
Material
Adequate coverage

Feedback for 4) An example of coverage algorithm is 1 point


week 5
CoRD
Quiz :
OGDC
Assignment
Week 5 OMN
All of these
Assignment
Solution Week 5

Downloaded updated materials from Rejinpaul Network


EC8702 - MCQApp
Page: 13
https://onlinecourses-archive.nptel.ac.in/noc18_cs09/unit?unit=42&assessment=99 1/3
27/07/2020 Wireless Adhoc And Sensor Networks - - Unit 6 - Week 5
No, the answer is incorrect.
www.rejinpaul.com
Week 6
Score: 0

Week 7 Accepted Answers:


OGDC
Week 8
5) Which of the following algorithms is known for establishing the connectivity in the presence of1 point
dumb nodes?
DOWNLOAD
VIDEOS
INTSEM
CoRD
OGDC
None of the above

om
No, the answer is incorrect.
Score: 0
Accepted Answers:
CoRD

6) Which statement is false in context of the LEACH protocol? 1 point

In the setup phase, clusters are created and cluster heads are determined

.c
The nodes join the cluster nearest to them with the strongest signal
In the steady state phase, CSMA-based solutions are used for inter-cluster communication
In the steady state phase, TDMA-based solutions are used for inter-cluster communication

ul
No, the answer is incorrect.
Score: 0
Accepted Answers:
pa
In the steady state phase, CSMA-based solutions are used for inter-cluster communication

7) Which statement is false with respect to the EMACs protocol? 1 point

EMACs is a fully centralized algorithm


The active nodes periodically transmit short control messages
jin

The dormant nodes are the nodes which run critically low in energy
None of the above

No, the answer is incorrect.


Score: 0
.re

Accepted Answers:
EMACs is a fully centralized algorithm

8) K-barrier coverage requires a barrier to be covered by: 1 point

At least k sensors
At least 1 sensors
w

At least 2 sensors
At least 3 sensors
w

No, the answer is incorrect.


Score: 0
Accepted Answers:
At least k sensors
w

9) Which statement is true with respect to the LMAC protocol? 1 point

The control messages transmitted are of fixed length


LMAC ensures collision-free communication
A node may transmit either a control message or a data frame during any time slot
All of the above

No, the answer is incorrect.


Score: 0
Accepted Answers:
All of the above
Downloaded updated materials from Rejinpaul Network
EC8702 - MCQApp
Page: 14
https://onlinecourses-archive.nptel.ac.in/noc18_cs09/unit?unit=42&assessment=99 2/3
27/07/2020 Wireless Adhoc And Sensor Networks - - Unit 6 - Week 5
10)Which is not a variant of S-MAC?
www.rejinpaul.com 1 point
Timeout MAC (TMAC)
Dynamic sensor MAC (DSMAC)
Input-Output MAC (IOMAC)
Data gathering (DMAC)

No, the answer is incorrect.


Score: 0
Accepted Answers:
Input-Output MAC (IOMAC)

om
Previous Page End

.c
ul
pa
© 2014 NPTEL - Privacy & Terms - Honor Code - FAQs -
A project of In association with

Funded by
jin

Powered by
.re
w
w
w

Downloaded updated materials from Rejinpaul Network


EC8702 - MCQApp
Page: 15
https://onlinecourses-archive.nptel.ac.in/noc18_cs09/unit?unit=42&assessment=99 3/3
27/07/2020 Wireless Adhoc And Sensor Networks - - Unit 7 - Week 6
www.rejinpaul.com

[email protected]

Courses » Wireless Adhoc And Sensor Networks

Announcements Course Ask a Question Progress

Unit 7 - Week 6

om
Course
outline Assignment Week 6
The due date for submitting this assignment has passed. Due on 2018-03-21, 23:59 IST.
How to access As per our records you have not submitted this assignment.

.c
the portal
1) 1. Which of the following statements does not describe the S-MAC protocol correctly? 1 point
Week 1:
Energy dissipation is reduced in S-MAC through idle listening
Implementation of the algorithm is simple

ul
Week 2
The sleep and listen vary constantly based on the network traffic conditions
Week 3 All of the above

No, the answer is incorrect.


pa
Week 4
Score: 0
Week 5 Accepted Answers:
The sleep and listen vary constantly based on the network traffic conditions
Week 6
2) Which is not a protocol of SPIN family? 1 point
Lecture 26:
jin

Mobile Wireless SPIN-PP


Sensor
SPIN-PC
Networks
SPIN-EC
Lecture 27:
SPIN-BC
Medium Access
.re

Control in No, the answer is incorrect.


Wireless
Score: 0
Networks- Part-I
Accepted Answers:
Lecture 28:
SPIN-PC
Medium Access
Control in
3) The goal of participatory sensing is/are 1 point
w

Wireless
Networks- Part-
Only collect data
II
Allow people to access data
Lecture 29:
w

Share knowledge
Routing in
Wireless Sensor All of the above
Networks- Part-
I No, the answer is incorrect.
w

Score: 0
Lecture 30:
Routing in Accepted Answers:
Wireless Sensor All of the above
Networks- Part-
II 4) Why is implementation of MAC protocols important in context of WSNs? 1 point

Week 6: Lecture Supports multi-hop communication, alongside single-hop


Material
Special design for energy-constrained environments
Feedback for Support for Ad-hoc node deployment
week 6
All of the above
Quiz :
Assignment

Downloaded updated materials from Rejinpaul Network


EC8702 - MCQApp
Page: 16
https://onlinecourses-archive.nptel.ac.in/noc18_cs09/unit?unit=51&assessment=100 1/3
27/07/2020 Wireless Adhoc And Sensor Networks - - Unit 7 - Week 6
Week 6 No, the answer is incorrect.
www.rejinpaul.com
Assignment
Score: 0
Solution Week 6 Accepted Answers:
All of the above
Week 7
5) Which is not a cause for undesired energy wastage in WSNs? 1 point
Week 8
Sensing of events
DOWNLOAD Idle listening
VIDEOS Overhearing in case of densely deployed sensor networks
Collision of transmitted frames

No, the answer is incorrect.

om
Score: 0
Accepted Answers:
Sensing of events

6) Which of the following is the example of flat routing? 1 point

SPIN

.c
CFFR
All of these
None of these

ul
No, the answer is incorrect.
Score: 0
Accepted Answers:
SPIN
pa
7) LEACH uses dynamic _______ cycles. 1 point

CDMA
FDMA
TDMA
jin

OFDMA

No, the answer is incorrect.


Score: 0
Accepted Answers:
.re

TDMA

8) Which is a negotiation based routing scheme? 1 point

Directed Diffusion
SPIN
w

SPEED
TTDD

No, the answer is incorrect.


w

Score: 0
Accepted Answers:
SPIN
w

9) What is the difference between the 3-color and 4-color topdisc mechanisms? a. 4-color 1 point
topdisc mechanism does not have a cluster head node b. Unlike the 3-color topdisc, nodes may have
red or blue color in 4-color topdisc mechanism c. Grey color is not present in 3-color topdisc mechanism
d. Dark grey color is not present in 3-color topdisc mechanism

4-color topdisc mechanism does not have a cluster head node


Unlike the 3-color topdisc, nodes may have red or blue color in 4-color topdisc mechanism
Grey color is not present in 3-color topdisc mechanism
Dark grey color is not present in 3-color topdisc mechanism

No, the answer is incorrect.


Score: 0

Downloaded updated materials from Rejinpaul Network


EC8702 - MCQApp
Page: 17
https://onlinecourses-archive.nptel.ac.in/noc18_cs09/unit?unit=51&assessment=100 2/3
27/07/2020 Wireless Adhoc And Sensor Networks - - Unit 7 - Week 6
Accepted Answers:
www.rejinpaul.com
Dark grey color is not present in 3-color topdisc mechanism

10)Which statement is false in context of the LEACH protocol? 1 point

In the setup phase, clusters are created and cluster heads are determined
The nodes join the cluster nearest to them with the strongest signal
In the steady state phase, CSMA-based solutions are used for inter-cluster communication
In the steady state phase, TDMA-based solutions are used for inter-cluster communication

No, the answer is incorrect.


Score: 0
Accepted Answers:

om
In the steady state phase, CSMA-based solutions are used for inter-cluster communication

Previous Page End

.c
ul
pa
© 2014 NPTEL - Privacy & Terms - Honor Code - FAQs -
A project of In association with
jin

Funded by
.re

Powered by
w
w
w

Downloaded updated materials from Rejinpaul Network


EC8702 - MCQApp
Page: 18
https://onlinecourses-archive.nptel.ac.in/noc18_cs09/unit?unit=51&assessment=100 3/3
27/07/2020 Wireless Adhoc And Sensor Networks - - Unit 8 - Week 7
www.rejinpaul.com

[email protected]

Courses » Wireless Adhoc And Sensor Networks

Announcements Course Ask a Question Progress

Unit 8 - Week 7

om
Course
outline Assignment Week 7
The due date for submitting this assignment has passed. Due on 2018-03-28, 23:59 IST.
How to access As per our records you have not submitted this assignment.

.c
the portal
1) In Congestion Control, a bit can be set in a packet moving in the direction opposite to 1 point
Week 1: congestion in

Implicit Signaling

ul
Week 2
Backward Signaling
Week 3 Source Signaling
Data Signaling
pa
Week 4
No, the answer is incorrect.
Week 5 Score: 0
Accepted Answers:
Week 6 Backward Signaling
jin

Week 7 2) There is no communication between congested node or nodes and source in the 1 point

Lecture 31: Implicit Signaling


Congestion and IP Signaling
Flow Control-
Part- I Source Signaling
.re

Data Signaling
Lecture 32:
Congestion and No, the answer is incorrect.
Flow Control-
Score: 0
Part- II
Accepted Answers:
Lecture 33:
Implicit Signaling
Underwater
w

Sensor 3) In Congestion, formula to calculate Average Data Rate (ADR) is 1 point


Networks- Part-
I Amount of Data/Stream
Lecture 34: Amount of Data/Protocol
w

Underwater
Amount of Data/Time
Sensor
Networks- Part- Packet
II
w

No, the answer is incorrect.


Lecture 35: Score: 0
Underwater
Sensor Accepted Answers:
Networks- Part- Amount of Data/Time
III
4) In Congestion Control and Quality of Services, our main focus is on 1 point
Week 7: Lecture
Material Data Protocol
Feedback for Data Layer
week 7 Data Congestion
Quiz : Data Traffic
Assignment

Downloaded updated materials from Rejinpaul Network


EC8702 - MCQApp
Page: 19
https://onlinecourses-archive.nptel.ac.in/noc18_cs09/unit?unit=60&assessment=103 1/3
27/07/2020 Wireless Adhoc And Sensor Networks - - Unit 8 - Week 7
Week 7 No, the answer is incorrect.
www.rejinpaul.com
Assignment
Score: 0
Solution Week 7 Accepted Answers:
Data Traffic
Week 8
5) ________________ is the best suitable ranging technique among these? (Consider no time- 1 point
DOWNLOAD synchronization among nodes.)
VIDEOS
ToA (one-way message transfer)
Euclidean distance propagation technique
ToA (two-way message transfer)
All of the above

om
No, the answer is incorrect.
Score: 0
Accepted Answers:
ToA (two-way message transfer)

6) For achieving network-wide localization, which are the important parameters for evaluating 1 point
any localization algorithm?

.c
Localization coverage
Average localization accuracy
Average energy consumption

ul
All of these

No, the answer is incorrect.


Score: 0
pa
Accepted Answers:
All of these

7) Underwater mobility affects 1 point

Topology
jin

Link between nodes


Coverage
All of these

No, the answer is incorrect.


.re

Score: 0
Accepted Answers:
All of these

8) Which statement is true for UWSN 1 point

High spatio-temporal variability of communication channel


w

Less transmission power required


No memory required for data caching
None of these
w

No, the answer is incorrect.


Score: 0
Accepted Answers:
w

High spatio-temporal variability of communication channel

9) The UWSN network could be 1 point

Star topology
Cluster topology
Mesh topology
All of these

No, the answer is incorrect.


Score: 0
Accepted Answers:
Downloaded updated materials from Rejinpaul Network
EC8702 - MCQApp
Page: 20
https://onlinecourses-archive.nptel.ac.in/noc18_cs09/unit?unit=60&assessment=103 2/3
27/07/2020 Wireless Adhoc And Sensor Networks - - Unit 8 - Week 7
All of these
www.rejinpaul.com
10)No. of reference points required for localizing a node in 3D coordinate systems is ______. 1 point

4
3
5
None of these

No, the answer is incorrect.


Score: 0
Accepted Answers:
4

om
Previous Page End

.c
ul
pa
© 2014 NPTEL - Privacy & Terms - Honor Code - FAQs -
A project of In association with
jin

Funded by
.re

Powered by
w
w
w

Downloaded updated materials from Rejinpaul Network


EC8702 - MCQApp
Page: 21
https://onlinecourses-archive.nptel.ac.in/noc18_cs09/unit?unit=60&assessment=103 3/3
27/07/2020 Wireless Adhoc And Sensor Networks - - Unit 9 - Week 8
www.rejinpaul.com

[email protected]

Courses » Wireless Adhoc And Sensor Networks

Announcements Course Ask a Question Progress

Unit 9 - Week 8

om
Course
outline Assignment Week 8
The due date for submitting this assignment has passed. Due on 2018-04-04, 23:59 IST.
How to access As per our records you have not submitted this assignment.

.c
the portal
1) Which of the following jamming attacks is time specific? 1 point
Week 1:
Constant jamming
Intermittent jamming

ul
Week 2
Deceptive jamming
Week 3 Reactive jamming

No, the answer is incorrect.


pa
Week 4
Score: 0
Week 5 Accepted Answers:
Intermittent jamming
Week 6
2) The primary challenges of embedded operating system are 1 point
jin

Week 7
Small memory footprint
Week 8 Efficient in power and computation
Lack hardware parallelism
Lecture 36:
All of these
Underwater
.re

Sensor
No, the answer is incorrect.
Networks- Part-
IV
Score: 0
Accepted Answers:
Lecture 37:
Security of
All of these
Wireless Sensor
3) Advantages of Event-Driven Model operating system in WSN are 1 point
w

Networks- Part-
I
Concurrency with low resources
Lecture 38: Complements the way networking protocols work
Security of
w

Wireless Sensor
Inexpensive scheduling technique
Networks- Part- All of these
II
No, the answer is incorrect.
Lecture 39:
w

Score: 0
Hardware
Design of Accepted Answers:
Sensor Node All of these
Lecture 40: 4) Example of Event-Driven Model operating system (OS) in WSN is 1 point
Real Life
Deployment of Mantis OS
WSN
RETOS
Week 8: Lecture TinyOS
Material
None of these
Feedback for
week 8

Downloaded updated materials from Rejinpaul Network


EC8702 - MCQApp
Page: 22
https://onlinecourses-archive.nptel.ac.in/noc18_cs09/unit?unit=69&assessment=107 1/3
27/07/2020 Wireless Adhoc And Sensor Networks - - Unit 9 - Week 8

Quiz : No, the answer is incorrect.


www.rejinpaul.com
Assignment Score: 0
Week 8
Accepted Answers:
Solution Week 8 TinyOS

DOWNLOAD 5) A Bluetooth network consists of one primary device(s) and up to ____ secondary devices. 1 point
VIDEOS
Five
Two
Seven
Nine

No, the answer is incorrect.

om
Score: 0
Accepted Answers:
Seven

6) Radar is one kind of ________ sensor 1 point

Passive

.c
Active
Dead
None of these

ul
No, the answer is incorrect.
Score: 0
Accepted Answers:
Active
pa
7) One malicious node behaves like multiple nodes, this type of attack is known as 1 point

Byzantine attack
Sybil attack
DoS attack
jin

Spoofing

No, the answer is incorrect.


Score: 0
Accepted Answers:
.re

Sybil attack

8) The flash memory of microcontroller in a sensor node is used to 1 point

Hold a data base


Hold a data sheet only
w

Hold a program code


Hold program variables only

No, the answer is incorrect.


w

Score: 0
Accepted Answers:
Hold a program code
w

9) An example of Selective forwarding attack is: 1 point

Forwarding attack
Sinkhole attack
Selectivity attack
None of these

No, the answer is incorrect.


Score: 0
Accepted Answers:
Sinkhole attack

Downloaded updated materials from Rejinpaul Network


EC8702 - MCQApp
Page: 23
https://onlinecourses-archive.nptel.ac.in/noc18_cs09/unit?unit=69&assessment=107 2/3
27/07/2020 Wireless Adhoc And Sensor Networks - - Unit 9 - Week 8
www.rejinpaul.com
10)Traditional cryptographic algorithms cannot be used directly in WSN, because sensor nodes 1 point
are

Resource constrained.
Memory-less
Clock-less
Processor-less

No, the answer is incorrect.


Score: 0
Accepted Answers:
Resource constrained.

om
Previous Page End

.c
ul
pa
© 2014 NPTEL - Privacy & Terms - Honor Code - FAQs -
A project of In association with
jin

Funded by

Powered by
.re
w
w
w

Downloaded updated materials from Rejinpaul Network


EC8702 - MCQApp
Page: 24
https://onlinecourses-archive.nptel.ac.in/noc18_cs09/unit?unit=69&assessment=107 3/3

You might also like