Transcript
COMPUTER SCIENCE AND ENGINEERING UNIT WISE OBJECTIVE BITS Course Name
: ADHOC AND SENSOR NETWORKS
Course Code
: A58039
Class
: IV B. Tech II Semester
Branch
: Computer Science and Engineering
Year
: 2014 – 2015
Course Faculty
: Mr.N.SUBBA REDDY
OBJECTIVES
To meet the challenge of ensuring excellence in engineering education, the issue of quality needs to be addressed, debated and taken forward in a systematic manner. Accreditation is the principal means of quality assurance in higher education. The major emphasis of accreditation process is to measure the outcomes of the program that is being accredited. In line with this, Faculty of Marri Laxman Reddy institute of Technology, Hyderabad has taken a lead in incorporating philosophy of outcome based education in the process of problem solving and career development. So, all students of the institute should understand the depth and approach of course to be taught through this question bank, which will enhance learner’s learning process.
UNIT-1 OBJECTIVE QUESTIONS:
1. MANET stands for
[ D ]
A) Multiple ad hoc net
B) Multiple access net
C) Mobile access net
D) Mobile ad hoc net
2. The most important design criteria for MANET is A) Energy Conservation B) Security C) Accessibility D) Easy Interface
[ A ]
3. In crisis management the type of network that works is____ A) Wired network B) WMAN C) MANET D) PAN 4. Bluetooth is an example of, (a) WAN (c) ZAN
5. The parameters of QoS are (a) Jitter, bandwidth (c)
Both (a) and (b)
[ B ] (b) PAN (d) MAN
[ C ] (b) Delay (d) Only (b)
6. MANET does not face the challenge of, (a) Security (b) Node cooperation (b) QoS (d) Quick network setup 7. Security is a crucial issue in MANET due to lack of, (a) Centralized network management (b) Certification authority (c)
Both (a) and (b)
[ D ]
[ C ]
(d) Only (b)
8. In energy conservation the goal to maximize a battery's life is for, (a) Commercial use (b) Domestic use (c) Military use
[ C ]
[ A ]
(d) none of the above
9. In energy conservation the goal to maximize lifetime of whole network is for (a) Military environment
(b) Crisis management
(c) Commercial use
(d) none of the above
[ A ]
10. When two networks are near to each other and if they want to cooperate with each other they face challenges of [ D ] (a) Different synchronization (b) Different MAC protocol (c) Routing protocol
(d) All the above
Fill in the Blanks 11.__________allows fast creation of networks.[ MANETs]
12. Important features of MANET, are____[ Dynamic topology, energy constrained operation and limited bandwidth] 13. MANETs are used in ___and______[ Collaborative works, crisis-management applications, Personal area network] 14. The primary parameters of QoS are
____and ________[ Delay, jitter, bandwidth]
15. MANETs are more prone to malicious attack compared to wired network due to lack of_ [Centralized network management]
16.The problem of energy conservation can be addressed by____and _______[ Maximizing a battery's lifetime, maximizing lifetime of whole network]
17. When data differs in priority and amount____becomes more complex.[ Node cooperation]
18.MANETs faces challenges such as (specify any three) _____ ,____and ________[ Scalability, interoperation, security]
19.At network interface the energy efficiency can be enhanced by developing transmission and reception technology at__________layer.[ Physical]
UNIT-2 Multiple Choices: 1. DSDV stands for (a) Destination Service Distance Vector
[ B ] (b) Destination Sequenced Distance Vector
(c) Dynamic Situation Distance Vector
(d) Distance Sequence Destination Vector
2. AODV protocol is a combination of ______protocols (a) DSDV and DSR (b) DSR and OLSR (c) STAR and OSR (d) DSDV and OLSR
[ A ]
3. Zone protocol is a type of ______ protocol (a) Reactive (c) Hybrid
[ C ] (b) Proactive (d) None of the above
4. The protocols that acquire a route before transmitting packet is,
[ A ] (a) DSDV and WRP
(b) WRP and ZRP
(c)
(d) AODV and ZRP
DSDV and ZRP
5. ________is not a location service. (a) Some-for-some (c) All-for-some
[ B ] (b) Some-for-any (d) None of the above
6. _________ is not is a proactive protocol [ D ] (c) DSDV (b) WRP (d) TBRPF (d) AODV 7. _ protocol is best suited for dense and big network due to optimized multi point relay [ A ] (a) OLSR (b) WRP (c) DSDV
(d) STAR
8. Location Aided routing is_____ type of forwarding strategy.
[A
]
(a) Restricted directional flooding
(b) Greedy packet forwarding
(c) Hierarchical routing
(d) Home zone forwarding
9. The criteria to route packets adopted by QoS is
[ C ]
(a)
Power-aware metrics
(b)
(c)
Minimum bandwidth
(d) none of the above
Shortest path
10. Core extraction distributed Ad Hoc Routing Protocol is a type of____protocol. [A ] (a) QoS-aware protocol (b) Associatively based protocol (c)
(d) Static protocol
Dynamic protocol
Fill in the Blanks: 11. ______ Protocols are dependent on existing link information in a network. [Topology based routing] 12. TBRPF stands for____ [Topology Broadcast based on Reverse Path Forwarding protocol]
13. The two types of topology based routing protocol are_______and___________[ On demand, Table driven] 14. RDMAR comprises and _____________algorithms.[ Route discovery, Route maintenance] 15. A node controls accuracy of position information by changing the frequency of transmission of position update. This process is known as_________________[Temporal resolution] 16. Signal stability routing protocol uses
as a criteria for routing data packets.[ Signal strength]
17. Associatively based routing has three phaser. They are_________,____ and____ [Route discovery, Route reconstruction, Route deletion] 18. Two types of hierarchical forwarding are ________ and ___________[ Terminodes, Grid] 19. The protocol that erases invalid path by broadcasting route errors when a route fails is__[ AODV] 20. The protocol that floods the network only outside of a secure zone is [ZRP]
UNIT-3 Multiple Choices 1._ _______scheme rebroadcast the packet based on the accurate calculation performed on [ B ] expected additional area of coverage. (a) Distance based scheme (b) Location-based scheme (c) Simple flooding (d) Neighbor knowledge method
2. In______protocol the nodes present within the packet are regarded as broadcast relay gateway. [ A ]
(b) AHBP (c) CDS
(b) SBA (d) AMRIS
3. Which among them is a tree-base approaches?
[ C ]
(a) Adhoc multicast routine protocol
(b)
Light weight adaptive multicast
(c)
(d)
Adhoc broadcast protocol
Both (a) and (b)
4.________ Protocol creates MC-CLAIM messages. (a) MOLSR (c)
[A ] (b) LGK
LGS
(d) MAODV
5.The CAMP protocol creates the nodes in the network into (a) Simplex
(b) Duplex
(c) Non-member
(d) All the above
6._______ is approaches works on the principles of tree and mesh based approaches. (e) Counter-based (f) Neighbour knowledge
7. __ In
[
D ]
[
D ]
(b) Area-based (d) Hydride
protocol control packet is required and flooding is performed
[ B
]
(a) AMRLS
(b) MAODV
(c) MCEDAR
(d)
CAMP
8._________are data transmission oriented geocast protocols.
[ D ]
(a)
Location based multicast
(b)
Voronoi diagram based geocasting
(c)
GeoGRID
(d)
none of the above
9. ______________handles the network connection and chooses the path with low MAC layer connection.
[ B ]
(a) COPAS (c)
Contention-balance network l
(b) Dynamic contention technique (d) Neighborhood RED
10. ______________ works differently from other protocols; it does not need intermediate nodes between transport layers.
[ A ]
(a) TCP-DOOR (b) ATCP (c) Fixed RTO (d) TCP-Feedback
Fill in the Blanks
11.A__________ in adhoc networks occurs when one node broadcasts data to all other nodes.[ Broadcast storm ]
12._________ is a simple approach to perform broadcasting of data packets across the network.[ Flooding] 13. __________________________Scheme is based on two-hop neighbour knowledge.[ Dominant pruning] 14.____________is an on-demand protocol that operates on increasing id-no.s.[ Adhoc multicast routing protocol] 15. A node in a mode is not involved in a multicast delivery mesh. [Non-member]
16. In__type of mode, all the nodes present across the path maintains the forwarding information[ Soft state ]
17._____protocol has been proposed to enable multicast and broadcast feature in adhoc sensor networks [DSR-MB]
18.Multicast core extraction distributed adhoc routing is an extended version of .[ CEDAR]
19.protocol does not rely on unicast protocol is_ FGMP-SA]
20___________is one of the type of traditional multicasting problems.[ Geocasting]
UNIT_4 1.The MICA is powered by,
[C
(a) One volt button cell battery
(b) Two volt button cell battery
(c) Two AA batteries
(d) Four AA batteries
]
2.The probability of the number of sensor nodes (n) with in the space when the nodes are uniformly distributed with the node density of X, can be calculated by the Poisson's distribution as , n
-
(c) P (n) = (גs) / n! * e גs (c) P (n) = (גs)n-1 /(n-1)! * e- גs
n+1
[ A ]
-
(b) P (n) = (גs) /(n+1)! * e גs (d) P (n) =גn sn-1/n! * e- גs
3.The wireless sensor network are,
[ B ]
(a) Node centric
(b) Data centric
(c) Network centric
(d) Sensors centric
4.If N number of sensor nodes are placed in an area A = L x L, the density (X) of sensor nodes is given as, during active period and _
(a) = גNA
[ D
(b) =ג2NA
]
(c)
= ג2N/A
(d)
= גN/A
5.SSIM stands for,
[ B ]
(g) Symmetric sensing information mobility (h) Smart sensing information methodology (i) Smart sensing information methodology (j)
Sensor's service for integrated machine
6.The Berkley note hardware has been observed to draw during sleep period, respectively. (a) 5-20 milliamps, 5 microamps
(b)
5-20 microamps, 5 milliamps
(c) 5 millamps, 5-20 microamps
(d) 5-20 microamps, 5-20 milliamps
7._________In Hexagonal placement, the sensing area to be covered by each sensor is (a)
2 /3 r
(c)
2
3 /4 r
(b)
3 /4 r
(d) /4 r
(a)
N/r
(c)
Nr
2
2
(b)
Nr
(d)
2Nr
[ B ]
2
2
8. In rectangular placement, the total sensing area covered by N-sensors is
9. ______________ based sensors is used to monitor crack
10.
[ A ]
(a)
Fiber optic
(b)
Mica mote
(c)
Berkley mote
(d)
Bluetooth
Sens IT stands for,
[ C ]
[ A
]
[ B
]
(a) Sensing integrated tele devices
(b) Sensor information technology
(c) Sensor integrated topology
(d) Sensing information topology
Fill in the Blanks 11.The micro controller Atmel Atmega 1032 operates at____________[4MHz] 12.__is used to capture the physical parameters of the environment[Sensing transducer] 13.The energy consumed for receiving a K bit message is ERx(k) =________________[ ERx-elec(k) = Eelec *k ]
14.The are application specific.[ Wireless sensor networks ]
15.Sensor are put into ___________cycles to consume energy.[ Sleep-wakeup ]
16.If A is the total area covered by N number of sensors, r is the side of a triangle. Then the area covered by a triangular tile is given by_______________[ r2/4]
17. A Bluetooth based have been proposed for monitoring humidity, temperature, vibration, stress etc.[ Scatternet ] 18. The proposed architecture of 2-tier network comprise Of__[ Micro nodes and macro nodes ] 19.ALERT stands for_______[ Automated Local Evolution in Real-Time] 20.The networked micro sensors technologies have been identified as the future key application by_-[ DARDA.]
UNIT-5 Multiple Choices 1.___are used by wireless sensor node, to transmit and receive the data across the network. (a) Radio Transceivers
(b) Transmitter
(c) Transceiver
(d) None of the above
[ A ]
2.The primary strategy of____ protocol is to keep all the sensor nodes of wireless network in a low duty cycle mode. [ D ] (a) Cluster based routing protocol
(b) Chain-based protocol
(c) MECN protocol
(d) Sensor MAC protocol
3._________protocol enables continuity of various operations in sensor network.
[ B ]
(a) APTEEN protocol
(b) Eaves-drop-and-register protocol
(c) TEEN protocol
(d) STEM protocol
4._________are the messages used by EAR algorithm for inviting its neighbours.
[ D ]
(a) Response, invite and disconnect
(b) Mobile response and mobile disconnect
(c) Broadcast and mobile invite
(d) both (b) and (c)
5.The main purpose of _______ protocol is to preserve both time and energy that are used by sensor nodes in sensing the environment. [ C (a) APTEEN protocol (b) TEEN protocol
(c) STEM protocol
]
(d) MECN protocol
6. _______Routing techniques employ tree concept for communication between base stations and sensor. [ A ]
(a) Sequential assignment routing
(b)
MECN routing
(c) PEGASIS routing
(d) Adaptive routing
7. SCADDS stands for __________ (a) Scalable coordination architecture deeply distributed systems (b) Scalable cooperative architecture deeply distributed systems (c) Scalable coordination architecture deeply distributed systems (d) None of the above
8.
9.
COUGAR is a ___________________________
[ A
(a) Sensor database
(b) Database
(c) Routing technique
(d) none of the above
__ is the capability of the network to withstand the network failure. (a) Fault tolerance
[ A ]
(b) Tolerance
]
[ A ]
(c) Network strength 10.
(d) none of the above
__ Zone-based algorithm is used in________routing.
[ B
(a) Sensor aggregates routing
(b) Hierarchical power aware routing
(c) Adaptive routing
(d) APTEEN
Fill in the Blanks 11.In____network the nodes periodically sense data using sensors and transmit it using transmitters.[ Proactive] 12. In _______ Network the nodes quickly response to the sudden changes in sensed attribute values.[ Reactive]
13. In_____Nodes need to maintain their minimum cost estimate required to reach the base station.[ Minimum cost forwarding] 14. In____Routing time Stamps are allocated to the nodes.[ Coherent data processing] 15._____ Protocol is a chain-based protocol wherein nodes are configured in a chain fashion.[ PEGASIS]
16____ routings based on the threshold values of the sensed attributes.[ Threshold sensitive energy]
17. ADV, REQ and Data are the types of messages used by sensor nodes in a____protocol.[ SPIN]
18. Hierarchical routing follows _____ scheduling.[ Reservation-based]
19. The Flat routing follows__________ scheduling.[ Contention-based]
20. The processing that is carried out on the network nodes is called_______[ In-network processing.]
]
UNIT-6 Multiple Choices 1.In ad hoc network modern routing protocol are designed in such a way that it must have capability to work with dynamically changing topology is_____
[ C ]
(a) Key management
(b) Intrusion detection
(c) Secure routing
(d) none of the above
2.____is one of the following problems that affect secures ad hoc routing. [ B ] (a) Trusted third party
(b) Dynamic topology
(c) Throughput
(d) none of the above
3. The different attacks based on fabrication are__________
(a) (b) (c) (d)
[ C ]
Falsifying route error messages Route cache poisoning in DSR and routing table overflow attack Both (a) and (b) None of the above
4.ARAN protocol provides security services such as____
[ D ]
(a) Authentication
(b) Message integrity
(c) Non-repudiation
(d) All the above
5. _______Is based on the version of DSDV called DSDV-SQ.
[A
(a) SEAD
(b) SRP
(c) ARIADNE
(d) None of the above
6.In____procedure public key systems play a vital role in the public key infrastructure. (a) Secure routing
,
(b) Intrusion detection
[ C ]
]
(c) Key distribution
(d) none of the above
7.___Process consist of two phases i.e., preliminary certification and end-to-end authentication
Phase.
[ B
(a) Route maintenance
(b) Route discovery
(c) Both (a) and (b)
(d) none of the above
]
Fill in the Blanks: 8.___is the security policy which deals with the exchange of keys between source and destination in a secured warp.[ Key management] 9.______is a basic approach of providing authentication in ad hoc network.[ Trusted third party] 10.Remote redirection attack is also known as_________________[ Black hole attack]
11._______phase is used to obtained the certificate from the trusted certificate server.[ Preliminary certification]
12. The ______ mechanism is used for the detection of misbehaving nodes.[ Watchdog]
13._______and ________ protocol is a public key cryptography protocol wherein secret key is generated by broadcasting a new key among all the group members.[ Burmester and Desmedt]
14._____Protocol was basically designed to minimize communication overhead between the participants. ______.[ Hypercube] 15.___CONFIDENT stands for ___ .__[ Cooperation of nodes, fairness]
15. Monitors audit data for any abnormal activity_[ Local detection engine]
16.In Token based networks, all the nodes in the network are assigned a ___________[TOKEN]
UNIT-7 Multiple Choices 1. Low power PCs, embedded PCs and custom-designed PCs are examples of, [ A ]
2.
3.
(a) Augmented general-purpose computers
(b) Dedicated embedded sensor nodes
(c)
(d) Silicon-chip computers
System-on-chip nodes
Berkeley note family, UCLA Medusa family, Ember nodes and MIT AMP are examples of,
[B
(a) Augmented general-purpose computers
(b)
Dedicated embedded sensor nodes
(c) System-on-chip nodes
(d)
Silicon-chip computers
The size of flash memory in ATmega KBLMCU is,
[ C ]
(a) 256kB .
(b)
1064kB
(c) 512kB
(d)
128kB
4. The support provided to the radio receiver for sending one packet is about,
(a) 9ms
(b)
(c) 27 ms
(d) 36 ms
[ D ]
18ms
5. The rate of transmission used by MICA motes is,
(a) 25kbps
]
[ B ]
(b) 50kbps
(c) 75kbp
(d)
100 kbps
6. The rate at which MICA motes operate using TR1000 chip is,__ (a)
100 Hz
(c) 2000 Hz
(b) 916 MHz (d)
4 MHz
Fill in the Blanks 7. The size of data memory of ATmega 103L is The size of data memory of ATmega 103L is ___[4Kb] 8. Acronym for SPI is _________________[ Serial Peripheral]
9. Using________ the transmission power can be adjusted digitally by a software.[ Potentiometer]
10. Acronym for FSM is _________[ Finite State Machine]
11. Using ___ technologies, the operating system can be modularized for deploying the necessary Components in the application.[ Microkernel]
12.Smart dust is an example of___________[ System-on-chip nodes]
[ B ]
UNIT-8 Multiple Choices 1.
In TinyOS___ layer is closer to the application
[ B ]
(a) Lower
(b) Higher
(c)
(d) None of the above
Middle
2. ____n to completion without prempting or being prempted by other tasks,
3.
(a) Events
(b) Contexts
(c) Tasks
(d)
[ C ]
Both (a) and (c)
Interfaces of nesc component are classified as ,
[ C ]
(a) Provides .
(b)
Uses interfaces
(c) Both (a) and (b)
(d)
None of
4. _______Interface is a set of method calls hiding the lower layer components [ A ] (a) Uses
(b)
provides
(c) Both (a) and (b)
(d)
None of the above
5. _____are implemented by application code.
[ C ]
(a) Configurations
(b) Events
(c) Modules
(d) Tasks
6. ____code is only reachable from tasks. (a)
Synchronous
[ A ] (b) Asynchronous
(c) Application
(d)
None of the above
7. is a simulator for TinyOS applications running on one or more Berkeley motes, (a)
ns-2
(b) TOSSIM
(c) Both (a) and (b)
(d) None of the above
8. _________are the components of a node-level simulator. (a) Sensor node model and communication model
(b) Physical environment model
(c) Statistics and visualization
(d) All the above
Fill in the Blanks 9._______is an extension IF C to support and reflect the design of Tiny OS. [nesC] 10. Tiny OS organized_____
[ B ]
in the forms of layers.[ Components]
11.___and___are the two context of Tiny OS [Tasks and Events]
12.The execution of an interrupt handler is called an _________[ Event context]
13.______ interface is a set of method calls exposed to the upper layer. [Provides]
14.____and ____are the two components in nesC .[ Modules and]
15.___ are implemented by connecting interfaces of existing components.[ Configurations]
16._____Code is reachable from atleast one interrupt handler.[ Asynchronous]
17.____code generator generates a set of aliases for each synchronous method call.[ TinyGALS]
18._______is an open-source network simulator designed for wired, IP networks.[ ns-2 simulator]
[ D ]