Wireless Sensor Networks Wsn Set 5
On This Page
This set of Wireless Sensor Networks (WSN) Multiple Choice Questions & Answers (MCQs) focuses on Wireless Sensor Networks Wsn Set 5
Q1 | Similarities between WSNs and MANETs networks is.
- nodes are densely deployed
- the nodes communicate each other using multi-hop communication
- topology changes very frequently
- have global unique identification for nodes
Q2 | In which network access point is not required?
- ad hoc network
- infrastructure network
- both a and b
- none of the above
Q3 | As the number of nodes___________, every node spends almost all of its time forwarding packets of other nodes
- decreases
- increases
- constant
- none of the above
Q4 | In wireless sensor networks, some of the information defining the objective function and constraints is available only at___________
- compile time
- run time
- ideal time
- setup time
Q5 | To ensure the ___________of the system, the communication and computation should be localized to relevant sensors only
- responsiveness
- scalability
- both a and b
- neither a nor b
Q6 | Networking allows geographical distribution of the sensor nodes and their placement close to signal sources
- does not depend on signal source
- statement is correct
- irrelavant corelation
- away from signal source
Q7 | Within the coverage range, communication is done by__________
- multicast
- broadcast
- unicast
- all of the above
Q8 | ___________sub-layer manages access to the physical network medium, and its fundamental goal is to reduce or avoid packet collisions in the medium
- mac
- llc
- application
- session
Q9 | Following characteristics of wireless sensor networks point to the need for a specialized MAC protocol
- the issues of fairness of the node level are much less important than overall application performance
- most sensor nodes are idle much of the time
- in-network processing can greatly improve bandwidth utilization
- all of above
Q10 | Following MAC protocols have been developed for wireless voice and data communication networks
- tdma
- fdma
- cdma
- all of above
Q11 | The main goal of the ___________is to reduce energy waste caused by idle listening, collisions, overhearing and control overhead
- s-mac protocol
- ieee802.15.4 standard
- a and b
- none of these
Q12 | The S-MAC protocol includes following major components
- periodic listen and sleep
- collision avoidance
- overheating avoidance
- all of above
Q13 | In the S-MAC protocol, ___________is designed to reduce energy consumption during the long idle time when no sensing events happen, by turning off the radio periodically
- message passing
- periodic listen and sleep
- topology control
- link control
Q14 | Examples of data attributes may include
- node\s location
- node\s type of sensors
- certain range of values in a certain type of sensed data
- all of above
Q15 | It may be more economical to use a smaller transmission radius for nodes in areas of high node density, w/o sacrificing adequate network connectivity. This is the issue of___________
- topology control
- traffic control
- protocol control
- link control
Q16 | This describes how the Ethernet protocol regulates communication among connection points.
- carrier sense multiple access/collision detect
- discontinuous transmission
- aggregator
- wait and response
Q17 | 802.11 wireless networking uses what method as the media access method?
- csma/cd
- cts/rts
- csma/ca
- cscd/ca
Q18 | ____________ assigns a unique number to each IP network adapter called the MAC address.
- media access control
- metro access control
- metropolitan access control
- both b and c above
Q19 | In ________ each station sends a frame whenever it has a frame to send.
- pure aloha
- slotted aloha
- both (a) and (b)
- neither (a) nor (b)
Q20 | In pure ALOHA, the vulnerable time is ______ the frame transmission time.
- the same as
- two times
- three times
- none of the above
Q21 | In __________, each station is forced to send only at the beginning of the time slot.
- pure aloha
- slotted aloha
- both (a) and (b)
- neither (a) nor (b)