TYCS Sem 6 Question Bank WSN
TYCS Sem 6 Question Bank WSN
Question Bank
Class: T.Y.B. Sc.CS Semester: VI
Subject: Wireless sensors and Mobile Communication
1) The Challenges we faced in designing sensor network system and application include
a) Limited hardware
b) Limited support for networking
c) Limited support for software development
d) All of above
Options:
I) (1)-(d) (2)-(e) (3)-(c) (4)-(b)
II.) (1)-(a) (2)-(b) (3)-(c) (4)-(d)
III.) (1)-(b) (2)-(a) (3)-(d) (4)-(c)
IV.) (1)-(c) (2)-(b) (3)-(a) (4)-(d)
4) Which of the following condition is satisfied for below statement: Challenges and Issue
Designing a Sensor Network
a) It must be infrastructure-less
b) It must be adaptive to frequent topology
c) It must be loop free
6) In a typical sensor network ,each sensor node operates untethered and has a microprocessor and a
small amount of memory for signal processing and task scheduling.
a] True
b] False
8) In _________ , each mobile node is an independent node, which act as a host and a router.
a) Wireless Sensor Network
b) Mobile Ad-hoc Network
c) Both a and b
9) Multihop network operates on ______________ principle.
a) store packet
b) forward packet
c) store and forward packet
d) receive and update packet
10) Which of the following is a data gathering protocol which is based on the assumption that all
nodes know the location of each other node?
a) Low Energy Adaptive Clustering Hierarchy
b) Power Efficient Gathering for Sensor Information System
c) Sensor Protocols for Information via Negotiation.
d) Flooding and Gossiping
13) MANET routing protocols are categorized into the following types:
a) Topology based routing and Location based routing
b) Location based, Energy awareness based and Topology based routing
c)Topology based and Energy based routing
d) Location based and Energy awareness based routing
14) In a sensor node architecture, ____________ is used a power saving polic to its ability to
conserve power by shutting down parts of the network which not currently active or in usage.
Which of the following substitutes the blank?
a) Dynamic Voltage Scaling
b) Auto Power save mode
c) Critical Usage algorithm
d) Dynamic Power Management
15) Which of the following is one of the major challenges of WSN, similar to a DOS attack, which
also creates illegal identities in a bid to break down the one to one mapping between each node?
a) Sinkhole attack
b) Sybil attack
c) Clone attack
d) Selective forwarding attack
16) Match List-I with List-II
The advantages of WSN:
LIST- I LIST - II
1) Robust i) many nodes are sensing the same eve
2) Reliable ii) large number of sensors
3) Accurate iii) degree of availability
4) Fault-tolerant iv) sensor nodes covering wider range
Options
a) 1-iii, 2-iv, 3-i, 4-ii
b) 1- ii, 2-iii, 3-iv, 4-i
c) 1-iv, 2-iii, 3-i, 4-ii
d) 1-i, 2-ii, 3-iii, 4-iv
Options
a) ii and iii
b) v and i
c) i, iii and iv
d) i, ii and iv
Point to multipoint ?
Options
a) Communication between sink and sensor nodes, multipoint to point, point to point
b)Point to point, communication between sink and sensor nodes, multipoint to
point
c) Single point to last point, communication among all nodes, multipoint to point
d) None of the above
19) . A desirable modulation scheme provides _________ bit error rates at __________ received
signal to noise ratios.
a) Low, low
b) Low, high
c) High, high
d) High, low
Options
1) 1-a 2-b 3-d 4-c
2) 1-c 2-d 3-a 4-b
3) 1-b 2-c 3-d 4-a
4) None of the Above
21) The DoD model (also called the TCP/IP stack) has four layers. Which layer of the DoD model is
equivalent to the Network layer of the OSI model?
a) Application
b) Host to Host
c) Internet
d) Network Acces
22) IEEE 802.11 defines basic service set as building block of a wireless __________ a) LAN
b) WAN protocol
c) MAN
d) ALOHA
24) A Sensor network is designed to perform a set of high level information processing task such as
a) Detection
b) Tracking
c) Classification
d) All of the Above
25) Because of the unique attenuation characteristics of RF signals ____________ network provide a
significant energy saving over ______________ network for the same distance.
a) Single hop/ Multi hop
b) Multihop/ Single hop
c) None of the above
26) It is more appropriate to address nodes in a sensor network by _________ than by _________
a) Physical Address /IP Address
b) IP Address/ Physical properties.
c)Both a and b
d) None of the above
27) In a typical sensor network, which of the following statements is/are true?
a) Each sensor node has a microprocessor and a small amount of memory for
signal processing and task scheduling.
b) Each node is equipped with one or more sensing devices such as acoustic
microphone arrays, seismic or magnetic sensors.
Select the correct answer from the options given below :
1) Both a and b
2) Neither a nor b
3). Only a
4). Only b 42
29) While designing new routing protocols, _________ and _________ should be fulfilled by a
network engineer.
a)Node centric, Data centric
b) Energy efficiency, Complexity
c). Dynamic source routing, Proactive protocols
d). Directed diffusion, Delay
33) A sensor network is designed to perform a set of high level information processing tasks such as:
a) Detection
b) Tracking
c) Classfication
d) All of the above
35) What is the type of network in which the topology change from time to time?
a) Wi-Fi
b) Cell Network
c) LAN
d) MANET
List:1. List:2
A) Rate of Failure 1) point to point
B) Communication Mode. 2)Very rare
C) Identifiers. 3)Not Possible
D) Aggregation. 4)Unique
Options:-
a) A:2;B:1;C:4;D:3
b) A:1;B:3;C:2;D:4
c) A:2;B:4;C:1;D:3
d) A:1;B:3;C:2;D:4
40)WSN networks consist of individual ______ that are able to interact with their environment by
sensing or controlling _____ parameters
a)Computers,Imaginary
b)Network,Physical
c)Routers,Imaginary
d)Nodes,Physical
41) ______ controlled by a node of a wireless sensor network are perhaps not quite as multifaceted,
Typically they control a mechanical device
a) Sensor
b)Buffer
c)IC
d)Actuator
42) Wildfire detection is an example of ____ application.
a)Disaster Relief
b) Intelligent buildings
c) Facility management
d) Precision agriculture
43) Since nodes may run out of energy or might be damaged, or since the wireless communication
between two nodes can be permanently interrupted, it is important that the WSN as a whole is able to
_________
a) Fault Tolerant
b) Error Tolerant
c) Scalable
d) Programmable
44) Since a WSN might include a large number of nodes, the employed architectures and
protocols must be able ______ to these number
a) Program
b) Scale
c) Tolerance
d) Maintain
45) ______Network that is composed of individual devices communicating with each other directly.
a)Ad-hoc
b)virtual
c)Mobile
d)wireless
46) Turning nodes into a network requires a device for sending and receiving information over a
wireless channel is ______ component
a) Communication
b) Memory
c) Link
d) Fiber cable
47) A transceiver that is ready to receive but is not currently receiving anything is said to be in an
_________
a) ideal
b) sleep
c) transceiver
d) active
48) ______amplifies incoming signals up to levels suitable for further processing without
significantly reducing the SNR
a) Power Amplifier
b) Low noise Amplifier
c) Base band Processor
d) RF front-end
49) Wireless Sensor Network are made up of low cost and low power sensor.
a)TRUE
b)FALSE
UNIT 2
1) Which of the following specifies a set of media access control (MAC) and physical layer
specifications for implementing WLANs?
a) IEEE 802.16
b)IEEE 802.3
c) IEEE 802.11
d) IEEE 802.15
a) P only
b) P and Q only
c) Q only
d) All of the above
5) A packet in Transmission Control Protocol (TCP) is called a ____________
a) Transmittable slots
b) Packet
c) Segment
d) None of the above
10) 1KHz=______Hz
a)100Hz
b)1000Hz
c)10000Hz
d)10Hz
Options
a)1-c , 2-a , 3-d , 4-b
b)1-b , 2-c , 3-a , 4-d
c)1-a , 2-c , 3-d , 4-b
d)1-a , 2-b , 3-c , 4-d
15) Which of the following statement is true to cause mobility problem in MANET ?
P: Nodes moving around, changing multihop routes in the network that have
to be handled
Q: Sensor nodes are simple and energy supply is scarce the operating and
networking software must be kept orders and magnitude simpler
composed to today's desktop computer.
Select the correct answer from the options given below:
a] Both P and Q
b] Only P
c] Only Q
d] Neither P nor Q
List-I List-II
a] First class of routing protocol 1] Uses location to address Sensor node b]
Second class of routing protocol 2] Uses a data-centric approach to
disseminate interest within the network c] Third
class of routing protocol 3] Imposes a structure on the network to
achieve energy Efficiency, stability and
Scalability
d] fourth class of routing protocol 4] adopts a flat network Architecture in
which all nodes Are considered peers
Option:
1. a] - 1], b] - 2], c] - 4], d] - 3]
2. a] - 2], b] - 1], c] - 3], d] - 4]
3. a] - 4], b] - 3], c] - 2], d] - 1]
4. a] - 3], b] - 4], c] - 1], d] - 2]
19) What is the name of the protocol that can classified as either connection-oriented and
connectionless ?
a] UDP
b] TCP
c] MAC
d] TCDM
20) Which of the following statements are true as respect to the antennas ?
i] Antennas couple electromagnetic energy to and from space to and from a wire
or coaxial cable
ii] Antenna is the isotropic radiator
iii] Real antennas all exhibit directive effects, i.e., the intensity of radiation is same
in all directions from the antenna.
iv] directional antennas with certain fixed preferential transmission and reception
directions can be used.
v] Several directed antennas can be combined on a single pole to construct a
sectorized antenna.
Select the correct answers from the following options given below:
a) i], ii] iii], iv]
b) ii], iii], iv], v]
c) i], iii], iv], v]
d) i], ii], iv], v]
23) Who provides reliability and congestion control, belongs to the upstream reliability
guarantee group?
a] CODA(Congestion Detection and Avoidance)
b] ESRT (Event-to-Sink Reliable Transport)
c] RMST (Reliable Multi Segment Transport)
d] PSFQ (Pump Slowly, Fetch Quickly)
24) --------------- has defined three different categories of services: bearer, tele, and
supplementary services?
a] ISDN
b] TDMA
c] GSM
d] FDMA
26) ___________ is an interdisciplinary research area that draws on contributions from signal
processing, networking and protocols,databases and information management, distributed
algorithms, and embedded systems and architecture.
A.) Wireless networks
B.) Sensor networks
Options:
1) 1-B,2-F,3-D,4-C,5-A,6-E
2) 1-F,2-E,3-F,4-B,5-B,6-A
3.) 1-D,2-E,3-D,4-C,5-B,6-A
4) 1-F,2-D,3-E,4-A,5-C,6-B
28)Mobility and instability in wireless links prevent the use of many existing edge network
gateway protocols for internetworking IP ans sensor networks
a.) True
b.) False
29) The challenges we face in designing sensor network systems and applications include:
a.) Limited hardware
b.) Limited support for networking
c.) Limited support for software development
d) All of the above
31) The sharing of a medium and its link by two or more devices is called _________ a) Fully
duplexing
b) Multiplexing
c) Micropleixng
d) Duplexing
32) In TDM, slots are further divided into _________
a) Seconds
b) Packets
c) Frames
d) Bits
33) From the following statements which are the options for Sink node.
a. Sink node could be a part of internal network.
b. Sink node should belong to a sensor network.
c. Sink node is could be a part of external network.
d. Sink node is external entity.
1. (a),(b),(c)
2. (b),(c),(d)
3. (a),(c)
4. (b),(c)
36) Which of the following protocol provides mechanism to avoid overhearing, collisions
and idle listening.
a). B-MAC
b). W-MAC
c.) Both (1) & (2)
d) S-MAC
39) Truncked radio system does not forms other method of wireless data transmission . No
other radio carriers are used in these systems.
a) True
b) False
Options
1.(a),(d),(e),(f)
2.(a),(c),(d),(e)
3.(b),(c),(e),(f)
4.(a),(c),(e),(f)
41)Following MAC protocols have been developed for wireless voice and data communication
networks.
a) TDMA
b) FDMA
c) CDMA
d) All of the above
d) Only Q
42)Which of the following multiplexing techniques is used to transmit digital signals?
a. FDM
b TDM
c. WDM
d. FDM & WDM
43)Which area network defines medium access control(MAC) as a sub layer of the data link
presented in the OSI model.
a. LAN (local area network)
b. MAN (metropolitan area network)
c. WAN (wide area network)
d Both a and b
44)Which MAC protocol is used in WSN to reduce energy consumption and support self
configuration?
a) Sensor-MAC protocol
b) Leach Protocol
c) Y-MAC Protocol
d) CSMA CD
45)In ____________ we can transmit signals from a series of independent sources at the same
time over the same frequency band.
a) Frequency division multiplexing(FDM)
b) Time division multiplexing(TDM)
c) Space division multiplexing(SDM)
d) Code division multiplexing(CDM)
47) It is more appropriate to address nodes in a sensor network by ______ than by _____.
a) IP address, Physical properties
b) Physical properties, IP address
48) Compared to FDMA, _________ offers much more flexible scheme, which comprises all
technologies that allocate certain time slot for communication.
a) FDMA
b) SDMA
c) TDMA
d) Classical Aloha
49) An extreme form of attenuation is ______ of radio signals due to large obstacle
a) Blocking
b) Unblocking
c) Path loss
d) Inference
50) TCP stands for _______
a)Transmission control protocol
b)Transit control protocol
c)Transaction control protocol
d)Turner Control Protocol
UNIT 3
2)Which of the following does not come under the teleservices of GSM?
a) Standard mobile telephony
b) Mobile originated traffic
c) Base originated traffic
d) Packet switched traffic
b) It is information received from a router that can’t be sent back to the originating
router.RIPv2 supports classless routing
c) It prevents regular update messages from reinstating a route that has just come up
d) It describes when a router sets the metric for a downed link to infinity
7) Which protocol should you select if the network diameter is more than 17 hops? a) RIPv1
b) RIPv2
c) EIGRP
d) OSPF
9) Which of the following subsystem provides radio transmission between mobile station and
MSC?
a) BSS
b) NSS
c) OSS
d) BSC
10) The bandwidth of the channel used in the hopset is called _________
a) Hopping bandwidth
b) Total hopping bandwidth
c) Instantaneous bandwidth
d) 3 dB bandwidth
22) __________ is the main signalling layer of DECT as well as ________ supports the call
completion facility in a multi handset environment.
a) Physical Layer, Cordless controller
b) Data link layer, Radio fixed part
c) Network layer, Network Specific
24) A Geo satellite is at the _____ orbit and revolves in phase with Earth
a)Equatorial
b)Polar
c)inclined
d)Non-inclined
25)GPS satellite are _____ satellites
a)GEO
b)MEO
c)LEO
d)None of these
34) Apogee?
a) The Point farthest from earth
b) The Point nearest from earth
c) The Point smallest from earth
d) None of the above
35) Perigee?
a) The point farthest from earth
b) The point longest from earth
c) The point closest approach to earth
d) None of the above
36) The carrier to noise ratio for a satellite depends upon
a) Effective Isotropic Radiated Power
b) Bandwidth
c) Free space path losses
d) All of them