Download as pdf or txt
Download as pdf or txt
You are on page 1of 24

EC8702 Ad hoc and Wireless Sensor Networks

Multiple Choice Questions


NPTEL - Online Assignments
[email protected]

Courses » Wireless Adhoc And Sensor Networks

Announcements Course Ask a Question Progress

Unit 2 - Week 1:

Course
outline Assignment Week 1
The due date for submitting this assignment has passed. Due on 2018-02-21, 23:59 IST.
How to access As per our records you have not submitted this assignment.
the portal
1) A wireless network without a centralized access point may be: 1 point
Week 1:
An infrastructure network
Lecture 1: An ad hoc network
Introduction:
All of these
Wireless Ad
Hoc Networks- None of these
Part- I
No, the answer is incorrect.
Lecture 2: Score: 0
Introduction:
Wireless Ad Accepted Answers:
Hoc Networks- An ad hoc network
Part- II
2) Which of the following technologies enable wireless ad-hoc networking 1 point
Lecture 3: Self-
organizing ZigBee
Behaviour of
Wireless Ad
4G(LTE)
Hoc Networks All of the above

Lecture 4: None of these


Cooperation in
No, the answer is incorrect.
Mobile Ad Hoc
Networks- Part- Score: 0
I Accepted Answers:
Lecture 5: ZigBee
Cooperation in
Mobile Ad Hoc
3) The self-properties of self-organization networks are known by the acronym 1 point
Networks- Part-
II Self-POT
Self-CHOP
Week 1 Lecture
Material Self-CHAP
Self-COAT
Quiz :
Assignment No, the answer is incorrect.
Week 1
Score: 0
Assignment Accepted Answers:
Solution Week 1
Self-CHOP
Week 2 4) The main source of power consumption in wireless sensor networks is due to 1 point

Week 3 Sensing
Transmitting
Week 4
Processing
None of these
Week 5

Week 6
https://onlinecourses-archive.nptel.ac.in/noc18_cs09/unit?unit=6&assessment=86 EC8702 - MCQ Page: 1 1/3
27/07/2020 Wireless Adhoc And Sensor Networks - - Unit 2 - Week 1:
No, the answer is incorrect.
Week 7 Score: 0
Accepted Answers:
Week 8 Transmitting

DOWNLOAD 5) Throughput in wireless ad hoc networks with N nodes decreases at a rate of 1 point
VIDEOS
√N
N^2
N^3
2N

No, the answer is incorrect.


Score: 0
Accepted Answers:
√N

6) In Sprite, a selfish node may save a receipt but does not forward the message. What is the 1 point
countermeasure for this selfish action?

The CCS charges the sender an extra amount of credit


The CCS gives more credit to a node that forwards a message than the node which does not
The credit of each node is multiplied by a fraction r, where r < 1
The non-forwarding node is charged with an extra amount of credit

No, the answer is incorrect.


Score: 0
Accepted Answers:
The CCS gives more credit to a node that forwards a message than the node which does not

7) The nodes which are unable to perform an operation because of either power failure or 1 point
environmental events are termed as

Selfish node
Failed nodes
Dead node
Malicious node

No, the answer is incorrect.


Score: 0
Accepted Answers:
Failed nodes

8) The types of reputations used in the CORE are 1 point

Objective, direct, and functional


Subjective, indirect, and functional
Subjective, indirect, and non-functional
Subjective, direct, and non-functional

No, the answer is incorrect.


Score: 0
Accepted Answers:
Subjective, indirect, and functional

9) Sprite is a system based on credit, which is used to provide ___________ for mobile nodes 1 point
to cooperate and report actions honestly.

Penalty
Bit coin
Incentives
Acknowledge

No, the answer is incorrect.


Score: 0

https://onlinecourses-archive.nptel.ac.in/noc18_cs09/unit?unit=6&assessment=86 EC8702 - MCQ Page: 2 2/3


27/07/2020 Wireless Adhoc And Sensor Networks - - Unit 2 - Week 1:
Accepted Answers:
Incentives

10)Nodes which deliberately disrupt the correct operation of the routing protocol are known as: 1 point

Selfish nodes
Failed nodes
Badly failed nodes
Malicious nodes

No, the answer is incorrect.


Score: 0
Accepted Answers:
Malicious nodes

Previous Page End

© 2014 NPTEL - Privacy & Terms - Honor Code - FAQs -


A project of In association with

Funded by

Powered by

https://onlinecourses-archive.nptel.ac.in/noc18_cs09/unit?unit=6&assessment=86 EC8702 - MCQ Page: 3 3/3


27/07/2020 Wireless Adhoc And Sensor Networks - - Unit 3 - Week 2

[email protected]

Courses » Wireless Adhoc And Sensor Networks

Announcements Course Ask a Question Progress

Unit 3 - Week 2

Course
outline Assignment Week 2
The due date for submitting this assignment has passed. Due on 2018-02-21, 23:59 IST.
How to access As per our records you have not submitted this assignment.
the portal
1) RTS/CTS period is called 1 point
Week 1:
Waiting period
Week 2 Contention period
Running period
Lecture 6: MAC
Protocols in
None of these
MANETs- Part- I
No, the answer is incorrect.
Lecture 7: MAC Score: 0
Protocols in
Accepted Answers:
MANETs- Part-
II Contention period

Lecture 8: 2) Existing MAC protocols cannot be used in MANETs because of -- 1 point


Routing in
MANETs- Part- I Resource constrained nodes
Limited bandwidth
Lecture 9:
Routing in Lack of centralized control
MANETs- Part- All of the above
II
No, the answer is incorrect.
Lecture 10:
Routing in Score: 0
MANETs- Part- Accepted Answers:
III
All of the above
Week 2: Course
3) FPRP is a – 1 point
Material

Quiz : Synchronous and contention based protocol


Assignment Asynchronous and contention based protocol
Week 2
Contention based protocol without reservation mechanism
Assignment Contention based Protocols with scheduling mechanism
Solution Week 2
No, the answer is incorrect.
Week 3 Score: 0
Accepted Answers:
Week 4
Synchronous and contention based protocol
Week 5 4) In MACAW, Data Sending (DS) frame is of size 1 point

Week 6 120 Bytes


30 Bytes
Week 7
23 Byte
35 Byte
Week 8

https://onlinecourses-archive.nptel.ac.in/noc18_cs09/unit?unit=15&assessment=87 EC8702 - MCQ Page: 4 1/3


27/07/2020 Wireless Adhoc And Sensor Networks - - Unit 3 - Week 2
No, the answer is incorrect.
DOWNLOAD
VIDEOS Score: 0
Accepted Answers:
30 Bytes

5) Which is a hybrid routing protocol: 1 point

DSR
AODV
ZRP
None of the above

No, the answer is incorrect.


Score: 0
Accepted Answers:
ZRP

6) An example of mesh-based routing protocol is: 1 point

QAMNET
QMR
ODMRP
All the above

No, the answer is incorrect.


Score: 0
Accepted Answers:
All the above

7) When a group of nodes are required to contact, which type of the following routing is useful? 1 point

Multicast
Unicast
Broadcast
None of these

No, the answer is incorrect.


Score: 0
Accepted Answers:
Multicast

8) Join query and join reply are used by which of the following multicast routing protocol? 1 point

ODMRP
QAMNET QMR ZMR
QMR
ZMR

No, the answer is incorrect.


Score: 0
Accepted Answers:
ODMRP

9) The routing scheme which use both the mask and destination address as 0.0.0.0 is: 1 point

Network-specific
Default
Host-specific
None of the above

No, the answer is incorrect.


Score: 0
Accepted Answers:
Network-specific

https://onlinecourses-archive.nptel.ac.in/noc18_cs09/unit?unit=15&assessment=87 EC8702 - MCQ Page: 5 2/3


27/07/2020 Wireless Adhoc And Sensor Networks - - Unit 3 - Week 2
10)MARCH exploits the properties of ___________ antennas and overhearing properties of 1 point
MANETs.

Single directional
Bi-directional
Omnidirectional
None of these

No, the answer is incorrect.


Score: 0
Accepted Answers:
Omnidirectional

Previous Page End

© 2014 NPTEL - Privacy & Terms - Honor Code - FAQs -


A project of In association with

Funded by

Powered by

https://onlinecourses-archive.nptel.ac.in/noc18_cs09/unit?unit=15&assessment=87 EC8702 - MCQ Page: 6 3/3


27/07/2020 Wireless Adhoc And Sensor Networks - - Unit 4 - Week 3

[email protected]

Courses » Wireless Adhoc And Sensor Networks

Announcements Course Ask a Question Progress

Unit 4 - Week 3

Course
outline Assignment Week 3
The due date for submitting this assignment has passed. Due on 2018-02-28, 23:59 IST.
How to access As per our records you have not submitted this assignment.
the portal
1) In TCP-ELFN, CWND = 1 causes No significant change, because – 1 point
Week 1:
Optimal window is relatively small
Week 2 It is similar to No change
Default value of RTO is small
Week 3 All of these

Lecture 11: No, the answer is incorrect.


Multicasting in Score: 0
MANETs
Accepted Answers:
Lecture 12: Optimal window is relatively small
Mobility Models
for MANETs 2) Stochastic mobility models are 1 point
Lecture 13:
Less complex
Transport
Protocols for Highly diversified
MANETs- Part- I Hard to realize
Lecture 14 : All of these
Transport
Protocols for No, the answer is incorrect.
MANETs- Part- Score: 0
II
Accepted Answers:
Lecture 15: Less complex
Opportunistic
Mobile 3) For testing the performance of the ad-hoc network, most accurate approach is 1 point
Networks- Part-
I Simulated

Week 3 Lecture Analytics


Material Test bed
Feedback for None of these
week 3
No, the answer is incorrect.
Quiz : Score: 0
Assignment
Week 3
Accepted Answers:
Test bed
Assignment
Solution Week 3 4) Complexity is a measure of the ______________ required to produce the traces for the 1 point
simulation.
Week 4
Driver
Week 5 Electricity
Computational resources
Week 6
None of these

https://onlinecourses-archive.nptel.ac.in/noc18_cs09/unit?unit=24&assessment=93 EC8702 - MCQ Page: 7 1/3


27/07/2020 Wireless Adhoc And Sensor Networks - - Unit 4 - Week 3
No, the answer is incorrect.
Week 7
Score: 0

Week 8 Accepted Answers:


Computational resources
DOWNLOAD
5) When ATCP encounters 3 duplicate ACKs, it puts TCP in ______________. 1 point
VIDEOS
Active mode
Persist mode
Idle mode
Waiting mode

No, the answer is incorrect.


Score: 0
Accepted Answers:
Persist mode

6) When ATCP is in the lossy state, reception of an ECN or ICMP message will move ATCP into1 point
which of the following state?

Free
Congested
Forward
None of these

No, the answer is incorrect.


Score: 0
Accepted Answers:
Congested

7) After receiving 3 duplicate ACKs, following incident occurs -- 1 point

ATCP puts TCP into persist mode


ATCP into loss state
ATCP into congested state
ATCP puts TCP into persist mode and ATCP into loss state

No, the answer is incorrect.


Score: 0
Accepted Answers:
ATCP puts TCP into persist mode and ATCP into loss state

8) In TCP-F, when a routing agent detects the disruption of a route, it explicitly sends a 1 point
_________ packet to the sender.

Route Failure Notification


Route Formations Notification
Route Disruption Notification
Transmission Success Notification

No, the answer is incorrect.


Score: 0
Accepted Answers:
Route Failure Notification

9) In TCP-BuS, to avoid timeout events during the route re-construction (RRC) phase, the 1 point
timeout values for buffered packets from source to PN will be

Set to one
Doubled
Same
Half

No, the answer is incorrect.


Score: 0

https://onlinecourses-archive.nptel.ac.in/noc18_cs09/unit?unit=24&assessment=93 EC8702 - MCQ Page: 8 2/3


27/07/2020 Wireless Adhoc And Sensor Networks - - Unit 4 - Week 3
Accepted Answers:
Doubled

10)ELFN works based on __________________the network (Choose most appropriate) 1 point

Selecting
Probing
Distributing
None of these

No, the answer is incorrect.


Score: 0
Accepted Answers:
Probing

Previous Page End

© 2014 NPTEL - Privacy & Terms - Honor Code - FAQs -


A project of In association with

Funded by

Powered by

https://onlinecourses-archive.nptel.ac.in/noc18_cs09/unit?unit=24&assessment=93 EC8702 - MCQ Page: 9 3/3


27/07/2020 Wireless Adhoc And Sensor Networks - - Unit 5 - Week 4

[email protected]

Courses » Wireless Adhoc And Sensor Networks

Announcements Course Ask a Question Progress

Unit 5 - Week 4

Course
outline Assignment Week 4
The due date for submitting this assignment has passed. Due on 2018-03-07, 23:59 IST.
How to access As per our records you have not submitted this assignment.
the portal
1) UAV-SDN aims to achieve – 1 point
Week 1:
Autonomous UAV control
Week 2 Remote UAV control
Remote control and configuration of network of UAVs
Week 3 Swarm of UAVs

Week 4 No, the answer is incorrect.


Score: 0
Lecture 16:
Accepted Answers:
Opportunistic
Mobile Remote control and configuration of network of UAVs
Networks- Part-
II
2) What does the presence function in a time-varying graph indicate? 1 point

Lecture 17: Whether or not a given node was present at a given location at a given time instant
Opportunistic Whether or not it belongs to the cut set
Mobile
Networks- Part- Characterizes a node via which all communication must pass
III Whether or not a given edge was present at a given time instant
Lecture 18: UAV No, the answer is incorrect.
Networks- Part-
Score: 0
I
Accepted Answers:
Lecture 19: UAV
Whether or not a given edge was present at a given time instant
Networks- Part-
II 3) What does a Protocol Translation Unit do? 1 point
Lecture 20: UAV
Networks- Part- Allows two different routing protocols to communicate
III Allows devices with heterogeneous MAC layers to communicate
Week 4: Lecture Provides backward compatibility to older versions of a given protocol
Material Collects messages from highly mobile nodes similar to throwboxes
Quiz : No, the answer is incorrect.
Assignment
Score: 0
Week 4
Accepted Answers:
Assignment
Allows two different routing protocols to communicate
Solution Week 4
4) Which is not a typical requirement for reputation/trust management schemes for OMNs, in 1 point
Week 5
general?

Week 6 Tamper-proof hardware


Huge network bandwidth
Week 7
Use of cryptographic hashes
Week 8 Presence of certifying authorities

https://onlinecourses-archive.nptel.ac.in/noc18_cs09/unit?unit=33&assessment=92 EC8702 - MCQ Page: 10 1/3


27/07/2020 Wireless Adhoc And Sensor Networks - - Unit 5 - Week 4
No, the answer is incorrect.
DOWNLOAD
VIDEOS Score: 0
Accepted Answers:
Huge network bandwidth

5) OMNs are very similar to MANETs in the sense that they both lack in network infrastructure. 1 point
However, their primary difference is the lack of ____

End-to-end communication
Storage
Processing power
All of these

No, the answer is incorrect.


Score: 0
Accepted Answers:
End-to-end communication

6) Multi-UAV systems have preferably ____________ antennas, whereas single UAV systems 1 point
have omni-directional antennas.

Omni-directional
Bi-directional
Directional
None of these

No, the answer is incorrect.


Score: 0
Accepted Answers:
Directional

7) Similar to vehicular networks, which are termed VANETs, UAV networks are popularly termed 1 point
as:

UANETs
FANETs
WINETs
All of these

No, the answer is incorrect.


Score: 0
Accepted Answers:
FANETs

8) Yaw, Pitch and Roll values are determined from which sensor? 1 point

Accelerometer
Gyroscope
Magnetometer
Barometer

No, the answer is incorrect.


Score: 0
Accepted Answers:
Gyroscope

9) An UAV SDN implementation encompasses data and ________ planes of communication. 1 point

Process
Resource
Control
Display

No, the answer is incorrect.


Score: 0

https://onlinecourses-archive.nptel.ac.in/noc18_cs09/unit?unit=33&assessment=92 EC8702 - MCQ Page: 11 2/3


27/07/2020 Wireless Adhoc And Sensor Networks - - Unit 5 - Week 4
Accepted Answers:
Control

10)In ProPHET, the use of ___ allows to update the contact probability with a node with whom 1 point
there has been no contact lately

Paging
Aging
Indexing
Casing

No, the answer is incorrect.


Score: 0
Accepted Answers:
Aging

Previous Page End

© 2014 NPTEL - Privacy & Terms - Honor Code - FAQs -


A project of In association with

Funded by

Powered by

https://onlinecourses-archive.nptel.ac.in/noc18_cs09/unit?unit=33&assessment=92 EC8702 - MCQ Page: 12 3/3


27/07/2020 Wireless Adhoc And Sensor Networks - - Unit 6 - Week 5

[email protected]

Courses » Wireless Adhoc And Sensor Networks

Announcements Course Ask a Question Progress

Unit 6 - Week 5

Course
outline Assignment Week 5
The due date for submitting this assignment has passed. Due on 2018-03-14, 23:59 IST.
How to access As per our records you have not submitted this assignment.
the portal
1) Solution for optimal coverage includes the important parameters as: 1 point
Week 1:
Coverage requirement
Week 2 Detection time
Number of sensors
Week 3 All of the above

Week 4 No, the answer is incorrect.


Score: 0
Week 5 Accepted Answers:
All of the above
Lecture 21:
Introducation: 2) Typically, ratio between transmission range and sensing range is: 1 point
Wireless Sensor
Networks- Part- 2:1
I
1:1
Lecture 22:
1:2
Introducation:
Wireless Sensor None of the above
Networks- Part-
II No, the answer is incorrect.
Score: 0
Lecture 23:
WSN Coverage Accepted Answers:
& Placement- 2:1
Part-I
3) Adequate placement of sensor node is important to ensure 1 point
Lecture 24:
WSN Coverage Adequate power consumption
& Placement-
Adequate transmission
Part-II
Adequate coverage
Lecture 25:
None of these
Topology
Mangement in
No, the answer is incorrect.
Wireless Sensor
Networks
Score: 0
Accepted Answers:
Week 5 Lecture
Material
Adequate coverage

Feedback for 4) An example of coverage algorithm is 1 point


week 5
CoRD
Quiz :
OGDC
Assignment
Week 5 OMN
All of these
Assignment
Solution Week 5

https://onlinecourses-archive.nptel.ac.in/noc18_cs09/unit?unit=42&assessment=99 EC8702 - MCQ Page: 13 1/3


27/07/2020 Wireless Adhoc And Sensor Networks - - Unit 6 - Week 5
No, the answer is incorrect.
Week 6
Score: 0

Week 7 Accepted Answers:


OGDC
Week 8
5) Which of the following algorithms is known for establishing the connectivity in the presence of1 point
dumb nodes?
DOWNLOAD
VIDEOS
INTSEM
CoRD
OGDC
None of the above

No, the answer is incorrect.


Score: 0
Accepted Answers:
CoRD

6) Which statement is false in context of the LEACH protocol? 1 point

In the setup phase, clusters are created and cluster heads are determined
The nodes join the cluster nearest to them with the strongest signal
In the steady state phase, CSMA-based solutions are used for inter-cluster communication
In the steady state phase, TDMA-based solutions are used for inter-cluster communication

No, the answer is incorrect.


Score: 0
Accepted Answers:
In the steady state phase, CSMA-based solutions are used for inter-cluster communication

7) Which statement is false with respect to the EMACs protocol? 1 point

EMACs is a fully centralized algorithm


The active nodes periodically transmit short control messages
The dormant nodes are the nodes which run critically low in energy
None of the above

No, the answer is incorrect.


Score: 0
Accepted Answers:
EMACs is a fully centralized algorithm

8) K-barrier coverage requires a barrier to be covered by: 1 point

At least k sensors
At least 1 sensors
At least 2 sensors
At least 3 sensors

No, the answer is incorrect.


Score: 0
Accepted Answers:
At least k sensors

9) Which statement is true with respect to the LMAC protocol? 1 point

The control messages transmitted are of fixed length


LMAC ensures collision-free communication
A node may transmit either a control message or a data frame during any time slot
All of the above

No, the answer is incorrect.


Score: 0
Accepted Answers:
All of the above

https://onlinecourses-archive.nptel.ac.in/noc18_cs09/unit?unit=42&assessment=99 EC8702 - MCQ Page: 14 2/3


27/07/2020 Wireless Adhoc And Sensor Networks - - Unit 6 - Week 5
10)Which is not a variant of S-MAC? 1 point

Timeout MAC (TMAC)


Dynamic sensor MAC (DSMAC)
Input-Output MAC (IOMAC)
Data gathering (DMAC)

No, the answer is incorrect.


Score: 0
Accepted Answers:
Input-Output MAC (IOMAC)

Previous Page End

© 2014 NPTEL - Privacy & Terms - Honor Code - FAQs -


A project of In association with

Funded by

Powered by

https://onlinecourses-archive.nptel.ac.in/noc18_cs09/unit?unit=42&assessment=99 EC8702 - MCQ Page: 15 3/3


27/07/2020 Wireless Adhoc And Sensor Networks - - Unit 7 - Week 6

[email protected]

Courses » Wireless Adhoc And Sensor Networks

Announcements Course Ask a Question Progress

Unit 7 - Week 6

Course
outline Assignment Week 6
The due date for submitting this assignment has passed. Due on 2018-03-21, 23:59 IST.
How to access As per our records you have not submitted this assignment.
the portal
1) 1. Which of the following statements does not describe the S-MAC protocol correctly? 1 point
Week 1:
Energy dissipation is reduced in S-MAC through idle listening
Week 2 Implementation of the algorithm is simple
The sleep and listen vary constantly based on the network traffic conditions
Week 3 All of the above

Week 4 No, the answer is incorrect.


Score: 0
Week 5 Accepted Answers:
The sleep and listen vary constantly based on the network traffic conditions
Week 6
2) Which is not a protocol of SPIN family? 1 point
Lecture 26:
Mobile Wireless SPIN-PP
Sensor
SPIN-PC
Networks
SPIN-EC
Lecture 27:
SPIN-BC
Medium Access
Control in No, the answer is incorrect.
Wireless
Score: 0
Networks- Part-I
Accepted Answers:
Lecture 28:
SPIN-PC
Medium Access
Control in
3) The goal of participatory sensing is/are 1 point
Wireless
Networks- Part-
Only collect data
II
Allow people to access data
Lecture 29:
Share knowledge
Routing in
Wireless Sensor All of the above
Networks- Part-
I No, the answer is incorrect.
Score: 0
Lecture 30:
Routing in Accepted Answers:
Wireless Sensor All of the above
Networks- Part-
II 4) Why is implementation of MAC protocols important in context of WSNs? 1 point

Week 6: Lecture Supports multi-hop communication, alongside single-hop


Material
Special design for energy-constrained environments
Feedback for Support for Ad-hoc node deployment
week 6
All of the above
Quiz :
Assignment

https://onlinecourses-archive.nptel.ac.in/noc18_cs09/unit?unit=51&assessment=100 EC8702 - MCQ Page: 16 1/3


27/07/2020 Wireless Adhoc And Sensor Networks - - Unit 7 - Week 6
Week 6 No, the answer is incorrect.
Assignment
Score: 0
Solution Week 6 Accepted Answers:
All of the above
Week 7
5) Which is not a cause for undesired energy wastage in WSNs? 1 point
Week 8
Sensing of events
DOWNLOAD Idle listening
VIDEOS Overhearing in case of densely deployed sensor networks
Collision of transmitted frames

No, the answer is incorrect.


Score: 0
Accepted Answers:
Sensing of events

6) Which of the following is the example of flat routing? 1 point

SPIN
CFFR
All of these
None of these

No, the answer is incorrect.


Score: 0
Accepted Answers:
SPIN

7) LEACH uses dynamic _______ cycles. 1 point

CDMA
FDMA
TDMA
OFDMA

No, the answer is incorrect.


Score: 0
Accepted Answers:
TDMA

8) Which is a negotiation based routing scheme? 1 point

Directed Diffusion
SPIN
SPEED
TTDD

No, the answer is incorrect.


Score: 0
Accepted Answers:
SPIN

9) What is the difference between the 3-color and 4-color topdisc mechanisms? a. 4-color 1 point
topdisc mechanism does not have a cluster head node b. Unlike the 3-color topdisc, nodes may have
red or blue color in 4-color topdisc mechanism c. Grey color is not present in 3-color topdisc mechanism
d. Dark grey color is not present in 3-color topdisc mechanism

4-color topdisc mechanism does not have a cluster head node


Unlike the 3-color topdisc, nodes may have red or blue color in 4-color topdisc mechanism
Grey color is not present in 3-color topdisc mechanism
Dark grey color is not present in 3-color topdisc mechanism

No, the answer is incorrect.


Score: 0

https://onlinecourses-archive.nptel.ac.in/noc18_cs09/unit?unit=51&assessment=100 EC8702 - MCQ Page: 17 2/3


27/07/2020 Wireless Adhoc And Sensor Networks - - Unit 7 - Week 6
Accepted Answers:
Dark grey color is not present in 3-color topdisc mechanism

10)Which statement is false in context of the LEACH protocol? 1 point

In the setup phase, clusters are created and cluster heads are determined
The nodes join the cluster nearest to them with the strongest signal
In the steady state phase, CSMA-based solutions are used for inter-cluster communication
In the steady state phase, TDMA-based solutions are used for inter-cluster communication

No, the answer is incorrect.


Score: 0
Accepted Answers:
In the steady state phase, CSMA-based solutions are used for inter-cluster communication

Previous Page End

© 2014 NPTEL - Privacy & Terms - Honor Code - FAQs -


A project of In association with

Funded by

Powered by

https://onlinecourses-archive.nptel.ac.in/noc18_cs09/unit?unit=51&assessment=100 EC8702 - MCQ Page: 18 3/3


27/07/2020 Wireless Adhoc And Sensor Networks - - Unit 8 - Week 7

[email protected]

Courses » Wireless Adhoc And Sensor Networks

Announcements Course Ask a Question Progress

Unit 8 - Week 7

Course
outline Assignment Week 7
The due date for submitting this assignment has passed. Due on 2018-03-28, 23:59 IST.
How to access As per our records you have not submitted this assignment.
the portal
1) In Congestion Control, a bit can be set in a packet moving in the direction opposite to 1 point
Week 1: congestion in

Week 2 Implicit Signaling


Backward Signaling
Week 3 Source Signaling
Data Signaling
Week 4
No, the answer is incorrect.
Week 5 Score: 0
Accepted Answers:
Week 6 Backward Signaling

Week 7 2) There is no communication between congested node or nodes and source in the 1 point

Lecture 31: Implicit Signaling


Congestion and IP Signaling
Flow Control-
Part- I Source Signaling
Data Signaling
Lecture 32:
Congestion and No, the answer is incorrect.
Flow Control-
Score: 0
Part- II
Accepted Answers:
Lecture 33:
Implicit Signaling
Underwater
Sensor 3) In Congestion, formula to calculate Average Data Rate (ADR) is 1 point
Networks- Part-
I Amount of Data/Stream
Lecture 34: Amount of Data/Protocol
Underwater
Amount of Data/Time
Sensor
Networks- Part- Packet
II
No, the answer is incorrect.
Lecture 35: Score: 0
Underwater
Sensor Accepted Answers:
Networks- Part- Amount of Data/Time
III
4) In Congestion Control and Quality of Services, our main focus is on 1 point
Week 7: Lecture
Material Data Protocol
Feedback for Data Layer
week 7 Data Congestion
Quiz : Data Traffic
Assignment

https://onlinecourses-archive.nptel.ac.in/noc18_cs09/unit?unit=60&assessment=103 EC8702 - MCQ Page: 19 1/3


27/07/2020 Wireless Adhoc And Sensor Networks - - Unit 8 - Week 7
Week 7 No, the answer is incorrect.
Assignment
Score: 0
Solution Week 7 Accepted Answers:
Data Traffic
Week 8
5) ________________ is the best suitable ranging technique among these? (Consider no time- 1 point
DOWNLOAD synchronization among nodes.)
VIDEOS
ToA (one-way message transfer)
Euclidean distance propagation technique
ToA (two-way message transfer)
All of the above

No, the answer is incorrect.


Score: 0
Accepted Answers:
ToA (two-way message transfer)

6) For achieving network-wide localization, which are the important parameters for evaluating 1 point
any localization algorithm?

Localization coverage
Average localization accuracy
Average energy consumption
All of these

No, the answer is incorrect.


Score: 0
Accepted Answers:
All of these

7) Underwater mobility affects 1 point

Topology
Link between nodes
Coverage
All of these

No, the answer is incorrect.


Score: 0
Accepted Answers:
All of these

8) Which statement is true for UWSN 1 point

High spatio-temporal variability of communication channel


Less transmission power required
No memory required for data caching
None of these

No, the answer is incorrect.


Score: 0
Accepted Answers:
High spatio-temporal variability of communication channel

9) The UWSN network could be 1 point

Star topology
Cluster topology
Mesh topology
All of these

No, the answer is incorrect.


Score: 0
Accepted Answers:

https://onlinecourses-archive.nptel.ac.in/noc18_cs09/unit?unit=60&assessment=103 EC8702 - MCQ Page: 20 2/3


27/07/2020 Wireless Adhoc And Sensor Networks - - Unit 8 - Week 7
All of these

10)No. of reference points required for localizing a node in 3D coordinate systems is ______. 1 point

4
3
5
None of these

No, the answer is incorrect.


Score: 0
Accepted Answers:
4

Previous Page End

© 2014 NPTEL - Privacy & Terms - Honor Code - FAQs -


A project of In association with

Funded by

Powered by

https://onlinecourses-archive.nptel.ac.in/noc18_cs09/unit?unit=60&assessment=103 EC8702 - MCQ Page: 21 3/3


27/07/2020 Wireless Adhoc And Sensor Networks - - Unit 9 - Week 8

[email protected]

Courses » Wireless Adhoc And Sensor Networks

Announcements Course Ask a Question Progress

Unit 9 - Week 8

Course
outline Assignment Week 8
The due date for submitting this assignment has passed. Due on 2018-04-04, 23:59 IST.
How to access As per our records you have not submitted this assignment.
the portal
1) Which of the following jamming attacks is time specific? 1 point
Week 1:
Constant jamming
Week 2 Intermittent jamming
Deceptive jamming
Week 3 Reactive jamming

Week 4 No, the answer is incorrect.


Score: 0
Week 5 Accepted Answers:
Intermittent jamming
Week 6
2) The primary challenges of embedded operating system are 1 point
Week 7
Small memory footprint
Week 8 Efficient in power and computation
Lack hardware parallelism
Lecture 36:
All of these
Underwater
Sensor
No, the answer is incorrect.
Networks- Part-
IV
Score: 0
Accepted Answers:
Lecture 37:
Security of
All of these
Wireless Sensor
3) Advantages of Event-Driven Model operating system in WSN are 1 point
Networks- Part-
I
Concurrency with low resources
Lecture 38: Complements the way networking protocols work
Security of
Wireless Sensor
Inexpensive scheduling technique
Networks- Part- All of these
II
No, the answer is incorrect.
Lecture 39: Score: 0
Hardware
Design of Accepted Answers:
Sensor Node All of these
Lecture 40: 4) Example of Event-Driven Model operating system (OS) in WSN is 1 point
Real Life
Deployment of Mantis OS
WSN
RETOS
Week 8: Lecture TinyOS
Material
None of these
Feedback for
week 8

https://onlinecourses-archive.nptel.ac.in/noc18_cs09/unit?unit=69&assessment=107 EC8702 - MCQ Page: 22 1/3


27/07/2020 Wireless Adhoc And Sensor Networks - - Unit 9 - Week 8

Quiz : No, the answer is incorrect.


Assignment Score: 0
Week 8
Accepted Answers:
Solution Week 8 TinyOS

DOWNLOAD 5) A Bluetooth network consists of one primary device(s) and up to ____ secondary devices. 1 point
VIDEOS
Five
Two
Seven
Nine

No, the answer is incorrect.


Score: 0
Accepted Answers:
Seven

6) Radar is one kind of ________ sensor 1 point

Passive
Active
Dead
None of these

No, the answer is incorrect.


Score: 0
Accepted Answers:
Active

7) One malicious node behaves like multiple nodes, this type of attack is known as 1 point

Byzantine attack
Sybil attack
DoS attack
Spoofing

No, the answer is incorrect.


Score: 0
Accepted Answers:
Sybil attack

8) The flash memory of microcontroller in a sensor node is used to 1 point

Hold a data base


Hold a data sheet only
Hold a program code
Hold program variables only

No, the answer is incorrect.


Score: 0
Accepted Answers:
Hold a program code

9) An example of Selective forwarding attack is: 1 point

Forwarding attack
Sinkhole attack
Selectivity attack
None of these

No, the answer is incorrect.


Score: 0
Accepted Answers:
Sinkhole attack

https://onlinecourses-archive.nptel.ac.in/noc18_cs09/unit?unit=69&assessment=107 EC8702 - MCQ Page: 23 2/3


27/07/2020 Wireless Adhoc And Sensor Networks - - Unit 9 - Week 8
10)Traditional cryptographic algorithms cannot be used directly in WSN, because sensor nodes 1 point
are

Resource constrained.
Memory-less
Clock-less
Processor-less

No, the answer is incorrect.


Score: 0
Accepted Answers:
Resource constrained.

Previous Page End

© 2014 NPTEL - Privacy & Terms - Honor Code - FAQs -


A project of In association with

Funded by

Powered by

https://onlinecourses-archive.nptel.ac.in/noc18_cs09/unit?unit=69&assessment=107 EC8702 - MCQ Page: 24 3/3

You might also like