You are on page 1of 2

Assignment 1

Wireless Ad Hoc and Sensor Networks


Choose the Correct answer:
1. A wireless network without a centralized access point may be:
a. An infrastructure network
b. An ad hoc network
c. All of these
d. None of these

2. Which of the following technologies enable wireless ad-hoc networking?


a. ZigBee
b. 4G(LTE)
c. All of the above
d. None of these

3. The self-properties of self-organization networks are known by the acronym


a. Self-POT
b. Self-CHOP
c. Self-CHAP
d. Self-COAT

4. The main source of power consumption in wireless sensor networks is due to


a. Sensing
b. Transmitting
c. Processing
d. None of these

5. Throughput in wireless ad hoc networks with N nodes decreases at a rate of


a. √N
b. N2
c. N3
d. 2N

6. In Sprite, a selfish node may save a receipt but does not forward the message. What is the
countermeasure for this selfish action?
a. The CCS charges the sender an extra amount of credit
b. The CCS gives more credit to a node that forwards a message than the node
which does not
c. The credit of each node is multiplied by a fraction r, where r < 1
d. The non-forwarding node is charged with an extra amount of credit

7. The nodes which are unable to perform an operation because of either power failure or
environmental events are termed as
a. Selfish node

1|Page
b. Failed nodes
c. Dead node
d. Malicious node

8. The types of reputations used in the CORE are


a. Objective, direct, and functional
b. Subjective, indirect, and functional
c. Subjective, indirect, and non-functional.
d. Subjective, direct, and non-functional.

9. Sprite is a system based on credit, which is used to provide ___________ for mobile nodes to
cooperate and report actions honestly.
a. Penalty
b. Bit coin
c. Incentives
d. Acknowledge

10. Nodes which deliberately disrupt the correct operation of the routing protocol are known as
a. Selfish nodes
b. Failed nodes
c. Badly failed nodes
d. Malicious nodes

2|Page

You might also like