Ad Hoc and Wireless Sensor Networks MCQ
Ad Hoc and Wireless Sensor Networks MCQ
Unit 2 - Week 1:
Course
outline Assignment Week 1
The due date for submitting this assignment has passed. Due on 2018-02-21, 23:59 IST.
How to access As per our records you have not submitted this assignment.
the portal
1) A wireless network without a centralized access point may be: 1 point
Week 1:
An infrastructure network
Lecture 1: An ad hoc network
Introduction:
All of these
Wireless Ad
Hoc Networks- None of these
Part- I
No, the answer is incorrect.
Lecture 2: Score: 0
Introduction:
Wireless Ad Accepted Answers:
Hoc Networks- An ad hoc network
Part- II
2) Which of the following technologies enable wireless ad-hoc networking 1 point
Lecture 3: Self-
organizing ZigBee
Behaviour of
Wireless Ad
4G(LTE)
Hoc Networks All of the above
Week 3 Sensing
Transmitting
Week 4
Processing
None of these
Week 5
Week 6
https://onlinecourses-archive.nptel.ac.in/noc18_cs09/unit?unit=6&assessment=86 EC8702 - MCQ Page: 1 1/3
27/07/2020 Wireless Adhoc And Sensor Networks - - Unit 2 - Week 1:
No, the answer is incorrect.
Week 7 Score: 0
Accepted Answers:
Week 8 Transmitting
DOWNLOAD 5) Throughput in wireless ad hoc networks with N nodes decreases at a rate of 1 point
VIDEOS
√N
N^2
N^3
2N
6) In Sprite, a selfish node may save a receipt but does not forward the message. What is the 1 point
countermeasure for this selfish action?
7) The nodes which are unable to perform an operation because of either power failure or 1 point
environmental events are termed as
Selfish node
Failed nodes
Dead node
Malicious node
9) Sprite is a system based on credit, which is used to provide ___________ for mobile nodes 1 point
to cooperate and report actions honestly.
Penalty
Bit coin
Incentives
Acknowledge
10)Nodes which deliberately disrupt the correct operation of the routing protocol are known as: 1 point
Selfish nodes
Failed nodes
Badly failed nodes
Malicious nodes
Funded by
Powered by
Unit 3 - Week 2
Course
outline Assignment Week 2
The due date for submitting this assignment has passed. Due on 2018-02-21, 23:59 IST.
How to access As per our records you have not submitted this assignment.
the portal
1) RTS/CTS period is called 1 point
Week 1:
Waiting period
Week 2 Contention period
Running period
Lecture 6: MAC
Protocols in
None of these
MANETs- Part- I
No, the answer is incorrect.
Lecture 7: MAC Score: 0
Protocols in
Accepted Answers:
MANETs- Part-
II Contention period
DSR
AODV
ZRP
None of the above
QAMNET
QMR
ODMRP
All the above
7) When a group of nodes are required to contact, which type of the following routing is useful? 1 point
Multicast
Unicast
Broadcast
None of these
8) Join query and join reply are used by which of the following multicast routing protocol? 1 point
ODMRP
QAMNET QMR ZMR
QMR
ZMR
9) The routing scheme which use both the mask and destination address as 0.0.0.0 is: 1 point
Network-specific
Default
Host-specific
None of the above
Single directional
Bi-directional
Omnidirectional
None of these
Funded by
Powered by
Unit 4 - Week 3
Course
outline Assignment Week 3
The due date for submitting this assignment has passed. Due on 2018-02-28, 23:59 IST.
How to access As per our records you have not submitted this assignment.
the portal
1) In TCP-ELFN, CWND = 1 causes No significant change, because – 1 point
Week 1:
Optimal window is relatively small
Week 2 It is similar to No change
Default value of RTO is small
Week 3 All of these
6) When ATCP is in the lossy state, reception of an ECN or ICMP message will move ATCP into1 point
which of the following state?
Free
Congested
Forward
None of these
8) In TCP-F, when a routing agent detects the disruption of a route, it explicitly sends a 1 point
_________ packet to the sender.
9) In TCP-BuS, to avoid timeout events during the route re-construction (RRC) phase, the 1 point
timeout values for buffered packets from source to PN will be
Set to one
Doubled
Same
Half
Selecting
Probing
Distributing
None of these
Funded by
Powered by
Unit 5 - Week 4
Course
outline Assignment Week 4
The due date for submitting this assignment has passed. Due on 2018-03-07, 23:59 IST.
How to access As per our records you have not submitted this assignment.
the portal
1) UAV-SDN aims to achieve – 1 point
Week 1:
Autonomous UAV control
Week 2 Remote UAV control
Remote control and configuration of network of UAVs
Week 3 Swarm of UAVs
Lecture 17: Whether or not a given node was present at a given location at a given time instant
Opportunistic Whether or not it belongs to the cut set
Mobile
Networks- Part- Characterizes a node via which all communication must pass
III Whether or not a given edge was present at a given time instant
Lecture 18: UAV No, the answer is incorrect.
Networks- Part-
Score: 0
I
Accepted Answers:
Lecture 19: UAV
Whether or not a given edge was present at a given time instant
Networks- Part-
II 3) What does a Protocol Translation Unit do? 1 point
Lecture 20: UAV
Networks- Part- Allows two different routing protocols to communicate
III Allows devices with heterogeneous MAC layers to communicate
Week 4: Lecture Provides backward compatibility to older versions of a given protocol
Material Collects messages from highly mobile nodes similar to throwboxes
Quiz : No, the answer is incorrect.
Assignment
Score: 0
Week 4
Accepted Answers:
Assignment
Allows two different routing protocols to communicate
Solution Week 4
4) Which is not a typical requirement for reputation/trust management schemes for OMNs, in 1 point
Week 5
general?
5) OMNs are very similar to MANETs in the sense that they both lack in network infrastructure. 1 point
However, their primary difference is the lack of ____
End-to-end communication
Storage
Processing power
All of these
6) Multi-UAV systems have preferably ____________ antennas, whereas single UAV systems 1 point
have omni-directional antennas.
Omni-directional
Bi-directional
Directional
None of these
7) Similar to vehicular networks, which are termed VANETs, UAV networks are popularly termed 1 point
as:
UANETs
FANETs
WINETs
All of these
8) Yaw, Pitch and Roll values are determined from which sensor? 1 point
Accelerometer
Gyroscope
Magnetometer
Barometer
9) An UAV SDN implementation encompasses data and ________ planes of communication. 1 point
Process
Resource
Control
Display
10)In ProPHET, the use of ___ allows to update the contact probability with a node with whom 1 point
there has been no contact lately
Paging
Aging
Indexing
Casing
Funded by
Powered by
Unit 6 - Week 5
Course
outline Assignment Week 5
The due date for submitting this assignment has passed. Due on 2018-03-14, 23:59 IST.
How to access As per our records you have not submitted this assignment.
the portal
1) Solution for optimal coverage includes the important parameters as: 1 point
Week 1:
Coverage requirement
Week 2 Detection time
Number of sensors
Week 3 All of the above
In the setup phase, clusters are created and cluster heads are determined
The nodes join the cluster nearest to them with the strongest signal
In the steady state phase, CSMA-based solutions are used for inter-cluster communication
In the steady state phase, TDMA-based solutions are used for inter-cluster communication
At least k sensors
At least 1 sensors
At least 2 sensors
At least 3 sensors
Funded by
Powered by
Unit 7 - Week 6
Course
outline Assignment Week 6
The due date for submitting this assignment has passed. Due on 2018-03-21, 23:59 IST.
How to access As per our records you have not submitted this assignment.
the portal
1) 1. Which of the following statements does not describe the S-MAC protocol correctly? 1 point
Week 1:
Energy dissipation is reduced in S-MAC through idle listening
Week 2 Implementation of the algorithm is simple
The sleep and listen vary constantly based on the network traffic conditions
Week 3 All of the above
SPIN
CFFR
All of these
None of these
CDMA
FDMA
TDMA
OFDMA
Directed Diffusion
SPIN
SPEED
TTDD
9) What is the difference between the 3-color and 4-color topdisc mechanisms? a. 4-color 1 point
topdisc mechanism does not have a cluster head node b. Unlike the 3-color topdisc, nodes may have
red or blue color in 4-color topdisc mechanism c. Grey color is not present in 3-color topdisc mechanism
d. Dark grey color is not present in 3-color topdisc mechanism
In the setup phase, clusters are created and cluster heads are determined
The nodes join the cluster nearest to them with the strongest signal
In the steady state phase, CSMA-based solutions are used for inter-cluster communication
In the steady state phase, TDMA-based solutions are used for inter-cluster communication
Funded by
Powered by
Unit 8 - Week 7
Course
outline Assignment Week 7
The due date for submitting this assignment has passed. Due on 2018-03-28, 23:59 IST.
How to access As per our records you have not submitted this assignment.
the portal
1) In Congestion Control, a bit can be set in a packet moving in the direction opposite to 1 point
Week 1: congestion in
Week 7 2) There is no communication between congested node or nodes and source in the 1 point
6) For achieving network-wide localization, which are the important parameters for evaluating 1 point
any localization algorithm?
Localization coverage
Average localization accuracy
Average energy consumption
All of these
Topology
Link between nodes
Coverage
All of these
Star topology
Cluster topology
Mesh topology
All of these
10)No. of reference points required for localizing a node in 3D coordinate systems is ______. 1 point
4
3
5
None of these
Funded by
Powered by
Unit 9 - Week 8
Course
outline Assignment Week 8
The due date for submitting this assignment has passed. Due on 2018-04-04, 23:59 IST.
How to access As per our records you have not submitted this assignment.
the portal
1) Which of the following jamming attacks is time specific? 1 point
Week 1:
Constant jamming
Week 2 Intermittent jamming
Deceptive jamming
Week 3 Reactive jamming
DOWNLOAD 5) A Bluetooth network consists of one primary device(s) and up to ____ secondary devices. 1 point
VIDEOS
Five
Two
Seven
Nine
Passive
Active
Dead
None of these
7) One malicious node behaves like multiple nodes, this type of attack is known as 1 point
Byzantine attack
Sybil attack
DoS attack
Spoofing
Forwarding attack
Sinkhole attack
Selectivity attack
None of these
Resource constrained.
Memory-less
Clock-less
Processor-less
Funded by
Powered by