# MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON WIRELESS SENSOR NETWORKS

September 20, 2017 | Author: EKTHATIGER633590 | Category: Wireless Sensor Network, Computer Network, Routing, Signal To Noise Ratio, Wireless Lan

#### Short Description

MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON WIRELESS SENSOR NETWORKS...

#### Description

WIRELESS SENSOR NETWORKS

1

WIRELESS SENSOR NETWORKS 20>The RF attenuation model near the ground is given by a: Preceive ¤ Psend/r b: Psend ¤ Preceive/p Ans: ___________ (a/b/either) 21>In above expression, alpha is typically in the range of__to___ (2/3/4/5) 22>The power advantage of an N-hop transmission versus a single hop transmission over the same distance Nr is a: nrf=N(alpha-1) b: nrf=N(alpha+1) Ans: ___________ (a/b/both) 23>In above expression, ___________N gives a larger power saving due to the consideration of RF energy alone (smaller/larger) 24>Using more nodes increases a: the cost b: the power consumption of components Ans: ___________ (a/b/both) 25>Each sensor has a finite sensing range, determined by the___________ floor of the sensor (ground/noise) 26>Densor sensor field improves the odds of detecting a signal source within the range (true/false)___________ 27>Once a signal source is inside the sensing range of a sensor, further increasing the sensor density ___________the average distance from a sensor to the signal source, hence improving the SNR (decreases/increases) 28>wrt the acoustic sensing case in a two-dimensional plane, the acoustic power received at a distance r is given by a: Psend ¤ Precieve/r*r b: Preceive ¤ Psource/r*r Ans: ___________ (a/b/either) 29>Wrt acoustic sensing case in a two-dimensional plane, the SNR is given by a: SNR=10logPsource+10logPnoise+20logr b: SNR=10logPsource-10logPnoise-20logr Ans: ___________ (a/b/either) 30>The SNR advantage of the denser sensor network is given by a: nsnr=20logk b: nsnr=10logk Ans: ___________ (a/b/either) 31>An increase in sensor density by a factor of k improves the SNR at a sensor by ___________db (10logk/20logk) 32>A sensor network is designed to perform a set of high level information processing tasks such as a: detection b: tracking c: classification Ans: ___________ (a/b/c/all) 33>Following are sample commercial and military applications include a: environmental monitoring b: industrial sensing and diagnostics c: infrastructure protection d: battlefield awareness e: context aware computing Ans: ___________ (a/b/c/d/e/all) 34>Match the following environmental monitoring : intelligent home, responsive environment Industrial sensing and diagnostics : multi-target tracking Infrastructure protection : power grids, water distribution Battlefield awareness : traffic, habitat, security Context aware computing : appliances, factory, supply chains

2

WIRELESS SENSOR NETWORKS 35>If every sensor has some data that it needs to send to another node in a network, then per node throughput scales as___________{sqrt(N) or 1/sqrt (N)} 36>As the number of nodes___________, every node spends almost all of its time forwarding packets of other nodes (decreases/increases) 37>CSIP stands for___________ 38>___________refers to signal and information processing problems dominated by the issue of selecting embedded sensors to participate in an information processing task (CSIP/CCIP) 39>___________is an interdisciplinary research area that draws on contributions from signal processing, networking and protocols, databases and information management, distributed algorithms, and embedded systems and architecture (wireless networks/sensor networks) 40>Match the following sensor: routing of data based on geographical attributes such as locations or regions sensor node: the process of determining a network path from a packet source node to its destination network approaches that name, route or access a piece of data via topology: properties that are external to a communication network routing: a transducer that converts a physical phenomenon that may be further manipulated by other apparatus data centric: a basic unit with on-board sensors, processor, memory, wireless modem and power supply geographic a connectivity graph where nodes are sensor nodes and edges are routing: communication links 41>Match the following In-network: the process of discovering the existence of a physical phenomenon Collaborative processing:

either high-level system tasks which may include sensing, communication, processing and resource allocation or application tasks which may include detection, classification , localization or tracking

State:

a condition of the information caused by noise in sensor measurements or lack of knowledge in models

Uncertainty:

a snapshot about a physical environment or a snapshot of the system itself

sensors cooperatively processing data from multiple sources in order to serve a high level task Detection: a style of processing in which the data is processed and combined near where the data is generated 42>Match the following Classification: the assignment of sensors to a particular task and the control of sensor state for accomplishing the task Localization & services such as time synchronization and node localization that tracking: enable applications to discover properties of a node and the nodes to organize themselves into a useful network Value of resources include sensors, communication links, processors , oninformation: board memory and node energy reserves Sensor tasking: the estimation of the state of a physical entity such asa physical phenomenon or a sensor node from a set of measurements Resource: a mapping of data to a scalar number, in the context of the overall system task and knowledge Node services: the assignment of class labels to a set of physical phenomena being observed

3

WIRELESS SENSOR NETWORKS 43>Match the following Data storage: the abstract characterization of system properties Embedded OS:

a measurable quantity that describes how well the system is performing on some absolute scale

System performance goal: Evaluation metric:

sensor information applications

is

stored,

indexed

and

accessed

by

the run-time system support for sensor network applications

ANSWERS 1>Micro Electro Mechanical System 2>both 3>T 4>T 5>T 6>gateway 7>more 8>1000 to 100000 9>physical 10> 11>physical properties, IP address 12>T 13>all 14>1-b 2-c 3-a 15>both. 16>T 17>Both 18>decentralised 19>multihop, single hop 20>a 21>2-5 22>a 23>larger 24>both 25>noise 26>T 27>decreases 28>b 29>b 30>b 31>10logk 32>all 33>all 34>1-d 2-e 3-c 4-b 5-a 35>1/sqrt(N) 36>increases 37>Collaborative Signal & Information Processing 38>CSIP 39>sensor networks 40>1-d 2-e 3-f 4-b 5-a 6-c 41>1-f 2-e 3-d 4-c 5-b 6-a 42>1-f 2-d 3-e 4-a 5-c 6-b 43>1-c 2-d 3-a 4-b

4

WIRELESS SENSOR NETWORKS

CHAPTER 2: CANONICAL PROBLEM – LOCALIZATION AND TRACKING 1>Localizing and tracking moving objects is an essential capability for a sensor network in many practical applications (true/false)__________ 2>A central problem for CSIP is to dynamically define and form sensor groups based on__________ (task requirements/resource availability/both) 3>A sensor network can be defined as an abstract tuple G= where __specifies nodes, ___specifies link connectivity, __is a set of functions that characterizes the properties of each node and ___specifies properties of each link 4>DOA stands for__________ 5>__________is a distributed physical quantity such as temperature, pressure or optical flow across a region of space (area/field) 6>A tracking task can be formulated as a constrained optimization problem where__is the sensor network , __is a set of targets, __is a signal model for how target signals propagate and attenuate in the physical medium, __denotes a set of user queries, __specifies an objective function defined by task requirements and__ specifies a set of constraints 7>In wireless sensor networks, some of the information defining the objective function and constraints is available only at___________ (compile time/run time) 8>The position estimation may be accomplished by a: triangulation computation b: least square computation Ans: ___________ (a/b/either) 9>Bayesian estimation can be used for position estimation (true/false)___________ 10>When the two targets move close to a target track, ___________problem has to be addressed (data relationship/data association) 11>Tracking scenario raises following fundamental information processing issues a: in collaborative processing, the issue of target detection, localization, tracking and sensor tasking and control b: in networking, the issues of data naming , aggregation and routing c: in databases, the issues of data abstraction and query optimization d: in human-computer interface, the issues of data browsing , search and visualization e: in infrastructure services, the issues of network initialization and discovery, time ad location services, fault management and security Ans: ___________ (a/b/c/d/e/all) 12>Give an expression relating zi, ai, x, wi , and Ans: __________ 13>To uniquely determine the location on a two-dimensional plane, one needs alleast ___________independent distance measurements (two/three) 14>TDOA stands for___________ 15>___________determines the significance of the contribution of each sensor a: geometry of the sensor placement b: distance to the signal source Ans: __ (a/b) 16>The goal of localization or tracking is to obtain a good estimate of the target state from the measurement history (true/false)__________ 17>We refer to the___________ distribution as the current belief (priori/posterior) 18>The relationship between the posterior distribution p (x|z), the priori distribution p (x) , and the likelihood function p (z|x) is given by Bayes Theorem a: p (x|z)=p (z|x)p (x)/p (x) b: p (x|z)=p (z|x)p (x)/p (z) Ans: ___________ (a/b/either) 19>In above expression, ____is the marginal distribution, which is also called the normalizig constant{p (x) or p (z)}_______

5

WIRELESS SENSOR NETWORKS 20>MMSE stands for___________ 21>A commonly used estimator in the standard estimation theory is the___________ (MEMS/MMSE) 22>The___________ algorithm is inefficient in utilizing the communication resources (centralized/distributed) 23>From the processing point of view, the complexity of the___________ algorithm scales linearly with K, and hence is prohibitive for large networks (centralized/distributed) 24>In___________ filter, the belief distributions and error models are Gaussians and the system dynamics model is linear (kalman/particle) 25>In following ways we can approximate an arbitrary belief state regarding the targets a: we can approximate the belief by a family of distributions b: we can approximate the belief by weighted point samples Ans: ___________ (a/b/both) 26>PMF stands for___________ 27>We can approximate the belief by weighted point samples .Following are examples of this approximation a: discretizing the subset of S by a grid b: the particle filter approximation of distribution c: the kalman filter approximation of distribution Ans: __________ (a/b/c/all) 28>A variant of belief approximation by weighted point samples is to partition S and assign a probability value to each region which is called ___________type approach (histogram/heuristic) 29>The belief approximation by weighted point samples is called__________ (parametric/nonparametric) 30>The belief approximation by a family of distribution is called___________ (parametric/nonparametric) 31>If we must pass the belief to a remote sensor, we are faced with the following trade off. Representing the true belief by a______ approximation with relatively few parameters will result in a poor approximation of the belief state but with the benefit that fewer bits need to be transmitted. On the other hand, representing the true belief by_____ approximation will result in a more accurate approximation of the belief at the cost of more transmitted bits (parametric/nonparametric) 32>Gaussian approximation is example of___________ approximation (parametric/nonparametric) 33>In the___________ design, the robustness of the tracker may suffer from occasional leader node attrition (moving leader/single moving) 34>The___________ design can be used for tracking multiple targets in a sensor field, with one leader-node tracking each target (moving leader/single moving) 35>The belief state can be stored in a distributed fashion across a section of sensor nodes. This is attractive from the___________ point of view (robustness/security) 36>___________is key problem in designing distributed CSIP applications (information representation/storage/ access/all) 37>While defining a unifying architecture for sensor networks is still an open problem, a key element of such an architecture is the principled interaction between the______ &_____layers (application/transport/network) 38>Tracking multiple interacting targets distributed over a geographical region is significantly more challenging for following reasons a: curse of dimensionality b: mapping to distributed platforms Ans: ___________ (a/b/both) 39>The presence and interaction of multiple phenomena cause the dimension of the underlying state spaces to ___________ (decrease/increase) 40>To ensure the ___________of the system, the communication and computation should be localized to relevant sensors only (responsiveness/scalability/both) 41>The key idea in the state-space factorization is to decouple information in a state space into___________ information (location/identity/both) 42>The tracking problem can be solved separately by______ which requires frequent local communication, and by_____ which requires less frequent, longer range communication (location estimation/identity management)

6

WIRELESS SENSOR NETWORKS 43>Following approaches can be used for tracking multiple objects a: state space decomposition b: data association Ans: ___________ (a/b/both) 44>In___________ approach, the target location and identity information are coupled and processed in the same space (state space decomposition/ data association) 45>To address the data association problem, following methods can be used________ (MHT/JPDA/both) 46>MHT stands for___________ 47>JPDA stands for___________ 48>_____forms and maintains multiple association hypotheses. On the other hand, ______evaluates the association probabilities and combines them to compute the state estimate (MHT/JPDA) 49>The distributed ___________filter is a global method, requiring each sensor node to communicate its measurement to a central node, where estimation and tracking are carried out (kalman/particle) 50>In___________ filter method, sensing is distributed while tracking is centralized (kalman/particle) 51>Replicated information is one of the serious problem in distributed tracking, whether the tracking is about a single target or multiple targets (true/false)___________ 52>Following are sources of information double counting a: due to loopy propagation of evidence in a network b: due to multiple sensor nodes observing a single target and reporting multiple detections Ans: ___________ (a/b/both) 53>Following are common types of sensors for tracking a: acoustic amplitude sensors b: DOA sensors Ans: ___________ (a/b/both) 54>DOA stands for___________ 55>___________sensor node measures sound amplitude at the microphone and estimates the distance to the target based on the physics of sound attenuation (acoustic DOA/acoustic amplitude) 56>___________sensor is a small microphone array. Using beam forming techniques, it can determine the direction from which the sound comes, that is, the bearing of the target (acoustic DOA/acoustic amplitude) 57>______sensors estimate distance based on received signal strength or TOA, while_____ sensors estimate signal bearing based on TDOA (range/DOA) 58>for sensor network applications, a sensor may be characterized by properties such as cost, size, sensitivity, resolution, response time, energy usage and ease of calibration & installation (true/false)___________ 59>RMS stands for___________ 60>Assuming that the sound source is a point source and sound propagation is lossless and isotropic, RMS amplitude measurement z is related to the sound position x by Ans: ___________ 61>___________sensing provides a range estimate (frequency/amplitude) 62>___________algorithms are commonly used in radar, speech processing and wireless communication to enhance signals received at an array of sensors (beam forming/bayesian state) 63>The relative time delay between two sensors with a spacing d can be expressed as a function of the bearing angle given by a: tm= (d/c)sin b: tm= (c/d)sin Ans: ___________ 64>Following methods are examples of DOA estimation algorithms___________ (least squares/maximum likelihood/both) 65>___________method solves for target bearing and location by estimating first the time difference of arrival at a set of sensors and then the source location (least squares/maximum likelihood)

7

WIRELESS SENSOR NETWORKS 66>___________method typically converts a set of signals from time domain to frequency domain and then performs a possibly multidimensional search to find the peak in the correlation spectra (least squares/maximum likelihood) 67>_____method can be applied to both near and far field problems whereas______ method is particularly useful for near field problems in which the target is relatively close to the sensors compared with the sensor spacing (least squares/maximum likelihood) 68>In DOA sensor, The likelihood function is given by Ans: ___________ 69>The DOA estimate is_____ reliable in the medium distance range and is______ reliable when the sound source is too close or far away from the microphone array (less/more) 70>wrt DOA sensor, in the_____ field, the planar wave assumption is violated. In the______ field, the SNR is low, and he DOA estimation may be strongly influenced by noise and fail to converge to the correct angle (near/far) 71>Following are some of the commonly used measures of performance a: delectability b: accuracy c: scalability d: survivability e: resource usage Ans: ___________ (a/b/c/d/e/all) 72>Match the following Delectability: what is the amount of resources that each task consumes Accuracy: how does the system perform in the presence of node or link failures as well as malicious attacks Scalability: this may be measured by sensor coverage, detection resolution, dynamic range or response latency Survivability: this is typically characterized in terms of tracking errors or detection and classification errors Resource how does a specific property of the system vary as the size of the usage: network, the number of physical stimuli or the number of active queries increases 73>For___________ problems, performance is typically measured by false alarms and misses (detection/classification/tracking/all) 74>For___________ problem, performance goals and measures can be stated in terms of target and system parameters (detection/classification/tracking/all) 75>_____occurs when the outcome is incorrectly predicted as a positive when it is in fact a negative.______ is when the outcome is incorrectly labeled as a negative when in fact it is a positive (false negative/false positive) 76>Match the following Source SNR : percentage of runs of a full scenario where continuity of vehicle identity is not correctly maintained Obstacle density : the number of hours of target tracking versus the total number of node hours in fully awake mode for the entire network Network sleep efficiency : this may be measured by the probability of LOS obstruction for a randomly placed target-sensor pair Percentage of track loss : this is measured as the SNR at a reference distance from the signal source ___________ 77>For an acoustic source, ___________is defined as the log ratio of SPL of source at the reference distance over SPL of background noise (source SNR/receiver SNR)

8

WIRELESS SENSOR NETWORKS 78>Match the following Detection of robustness : active lifetime, sleep lifetime, sleep efficiency Detection spatial resolution : link capacity Detection latency : %node loss Classification robustness : sensor coverage area, target maneuvers, obstacle density Track continuity : source SNR System survivability : link delay Cross-node DOA estimation : inter-target spacing Power efficiency : ANSWERS 1>T 2>both 3>V,E,Pv,Pe 4>Direction-Of-Arrival 5>field 6>G, T, W, Q, J, C 7>run time 8>both 9>T 10>data association 11>all 12>z = h(x , ) 13>3 14>Time Difference Of Arrival 15>both 16>T 17>posterior 18>b 19>p(z) 20>Minimum Mean Squared Error 21>MMSE 22>centralized 23>centralized 24>Kalman 25>both 26>Probability Mass Function 27>a, b 28>histogram 29>non parametric 30>parametric 31>parametric, non-parametric 32>parametric 33>single moving 34>moving leader 35>robustness 36>all 37>application, networking 38>both 39>increase 40>both 41>both 42>location estimation, identity management 43>both 44>data association 45>both

9

WIRELESS SENSOR NETWORKS 46>Multiple Hypothesis Tracking 47>Joint Probabistic Data Association 48>MHT,JPDA 49>Kalman 50>kalman 51>T 52>both 53>both 54>Direction of arrival 55>acoustic amplitude 56>acoustic DOA 57>range, DOA 58>T 59>Root Mean Square 60>z=a/x- + w 61>amplitude 62>beam forming 63>a 64>both 65>least square 66>ML(maximum likelihood) 67>ML 68> 69>more, less 70>near, far 71>all 72>1-c 2-d 3-c 4-b 5-a 73>dtection, classification 74>tracking 75>false positive, false negative 76>1-d 2-c 3-b 4-a 77>source SNR 78>1-e 2-g 3-b 4-e 5-d 6-c 7-b 8-a

10

WIRELESS SENSOR NETWORKS

11

12

13

14

WIRELESS SENSOR NETWORKS 92>There are may situations in which, because the amount of data to be exchanged is small, the quality of the paths does not matter so much. In such situations, ___________routing can be used (rumour/reactive) 93>In___________ routing, in order to get sources and sinks to meet each other, we must spread information from each regions of the sensor field, so that the two growing regions eventually intersect (rumour/reactive) 94>Related to rumour routing is the___________ query answering mechanism (ACQUIRE/ACCESS) 95>In rumor routing, ___________approach is most appropriate for situations when we need to process one-shot complex queries, whose answers depend on information obtained in several nodes of the network (ACQUIRE/ACCESS) 96>wrt rumour routing, the idea of the ___________system is to elect a leader node whose goal is to compute the answer to the query (ACQUIRE/ACCESS) 97>IDSQ stands for___________ 98>GHT stands for___________ 99>GHT is a robust protocol (true/false)___________ 100>One of the most elegant aspects of GHT is the way that it exploits features of the___________ routing protocol accomplish its goal (GEAR/GPSR) 101>A nice feature of the perimeter refresh protocol is that it helps to recover from node failures (true/false)__________ 102>In wireless sensor network, the issues of fail utilization of networking resources at the node level are__________ important than just accomplishing the overall goal(less/more) 103>What is important to the sensor network is the information the nodes contain, not the nodes themselves (true/false)__________ 104>In wireless sensor networks, nodes are ephemeral i.e. they can be destroyed, be asleep or die from malfunction or battery depletion (true/false)__________ 105>Preservation of energy is of paramount concern in wireless sensor network (true/false)__________ 106>Network for sensor networks is ____centric but not ______centric (node/data) 107>GHT uses a perimeter refresh protocol a: to accomplish replication of attribute-value pairs b: to ensure their consistent placement in the appropriate home node c: to recover from node or link failures Ans: ___________ (a/b/c/all) ANSWERS 1>T 2>T 3>T 4>T 5>broadcast 6>Unit Distance Graph 7>T 8>more 9>T 10>MAC 11>all 12>all 13>S-MAC 14>all 15>periodic listen & sleep 16>Distributed Coordinate Function 17>collision avoidance 18>IEEE 802.15.4 19>ZigBee 20>all 21>S-MAC, 802.15.4 22>both

15

WIRELESS SENSOR NETWORKS 23>LS 24>DV 25>both 26>Dynamic Source Routing 27>Adhoc On-demand Distance Vector Routing 28>both 29>T 30>all 31>pull, push 32>T 33>smaller 34>topology control 35>greedy distance 36>compass 37>greedy distance 38>both 39>convex 40>Other Face Routing 41>OFR 42>Other Adoptive Face Routing 43>both 44>spanner, stretch factor 45>both 46>Relative Neighborhood Graph 47>RNG 48>Gabriel 49>Gabriel, RNG 50>both 51>Restricted Delaunay Graph 52>Localized Delaunay Triangulation 53>greedy distance, perimeter 54>Greedy Perimeter Stateless Routing 55>both 56>greedy distance, perimeter 57>Trajectory Based Forwarding 58>TBF 59>rumor 60>both 61>more 62>O(1/ ra) 63>minimum energy broadcast 64>Minimum Spanning Tree 65>wireless multicast advantage 66>NP 67>6,12 68>T 69>Broadcast Incremental Power 70>Prim 71>Geographical & Energy Aware Routing 72>GEAR 73>both 74>delivery 75>Learning Real Time A 76>50,100,50,25,45 77>both 78>recursive geographic forwarding 79>restricted flooding

16

WIRELESS SENSOR NETWORKS 80>restricted flooding 81>sink, source, interest 82>interval 83>duration 84>sink 85>gradient 86>sink 87>pull, push 88>T 89>data 90>reactive 91>T 92>rumor 93>rumor 94>ACQUIRE 95>ACQUIRE 96>ACQUIRE 97>Information Driven Sensor Querying 98>Geographic Hash Table 99>T 100>GPSR 101>T 102>less 103>T 104>T 105>T 106>data, node 107>all

17

WIRELESS SENSOR NETWORKS

CHAPTER 4: INFRASTRUCTURE ESTABLISHMENT 1>The problem of__________ for a sensor network is how to set the radio range for each node so as to minimize energy usage, while still ensuring that the communication graph of the nodes remains connected and satisfies other desirable communication properties (topology control/traffic monitoring) 2>CTR stands for__________ 3>__________problem states "compute the minimum common transmitting range r such that the network is connected" (topology control/critical transmitting range) 4>The probabilistic theory best suited to the analysis of CTR is the theory of __________ (GRG/GLS) 5>GRG stands for__________ 6>In__________ setting, n points are distributed into a region according to some distribution, and then some aspect of the node placement is investigated (GRG/GLS) 7>If n points are randomly and uniformly distributed in the unit square, then the critical transmission range is, with high probability a: r=c.sqrt (n/logn) b: r=c.sqrt (logn/n) Ans: ___________ (a/b/either) 8>One should choose_____ ranges in areas of high node density and ______ranges in regions of low density (short/long) 9>The range assignment problem has been shown to be NP complete for dimensions __& above (1/2)_________ 10>___________MST based algorithms can be expensive to implement on typical sensor nodes (homogeneous/non-homogeneous/either) 11>Give example of protocol that can be used to directly solve the CTR problem in a distributed way: ___________ (COMPOW/COMPASS) 12>__________protocol computer routing tables of each node at different power levels and a node selects the minimum transmit power so that its routing table contains all other nodes (COMPOW/COMPASS) 13>___________allows hierarchical structures to be built on the nodes and enables more efficient use of scarce resources such as frequency spectrum, bandwidth and power (clustering/classification) 14>___________allows the same time or frequency division multiplexing to be reused across nonoverlapping clusters (clustering/classification) 15>The more capable nodes can naturally play the role of __________ (cluster leader/cluster head) 16>__________are nodes that aid in passing traffic from one cluster to another (gradient/gateway) 17>___________can be used to thin out parts of the network where an excessive number of nodes may be present (classification/clustering) 18>Since the nodes in a sensor network operate independently , their clocks may not be or stay, synchronized with one another (true/false) ___________ 19>For time synchronization, the wired protocols assume the existence of highly accurate master clocks on some network nodes such as ___________ (skew clock/atomic clock) 20>In wireless sensor network a: no special master clocks are available b: connections are ephemeral c: communication delays are inconsistent and unpredictable Ans: ___________ (a/b/c/all) 21>Computer clocks are based on ___________oscillators which provide a local time for each sensor network node (software/hardware) 22>For a perfect hardware clock, the derivative dC (t)/dt should be___ to 1 (=/) 23>wrt clocks and communication delays, a typical value of p for today's hardware clock is 10 -__ (3/6/9)

18

19

20

WIRELESS SENSOR NETWORKS 13>clustering 14>clustering 15>cluster head 16>gateway 17>clustering 18>T 19>atomic clock 20>all 21>hardware 22>equal 23>6 24>clock skew 25>either 26>all 27>1-d 2-a 3-b 4-c 28>receive time 29>spanning 30>more 31>interval 32>either 33>Reference Broadcast System 34>RBS 35>group dispersion 36>both 37>self-localization 38>location service 39>landmark 40>both 41>ranging 42>Received Signal Strength 43>RSS 44>RSS 45>TOA 46>TDOA 47>T 48>atomic multi=lateration 49>collaborative subtree 50>collaborative subtree 51>tentatively unique 52>tentatively unique 53>recursive 54>Approximate Point In Triangle 55>APIT 56>APIT 57>14 58>location service 59>GLS 60>GLS 61>GLS 62>O(log n) 63>both 64>both 65>cricket

21

WIRELESS SENSOR NETWORKS

22

23

WIRELESS SENSOR NETWORKS 39>To mitigate the combinational explosion problem, following strategies can be used a: we can restrict the search for optimal paths to a small region of the sensor network b: we can apply heuristics to approximate the costs so that they can be treated as additive Ans: ___________ (a/b/either) 40>In sensor network, the goal is to route a query from the query proxy to the exit point and accumulate as much information as possible along the way, so that one can extract a good estimate about the target state at the exit node and yet keep the total communication cost close to some prespecified amount (true/false)___________ 41>When it is possible to estimate the cost to go, the A* ___________method can be used (best first search/heuristic search) 42>The basic A* is a ___________search, where the merit of a node is assessed as the sum of the actual cost g paid to reach it from the query proxy , and the estimated cost h to pay to get to the exit node (depth first/best first) 43>For real-time path-finding, we use a variation of the A* method called ___________search (RTA/BFS) 44>RTA stands for___________ 45>In many applications, the physical phenomenon may be mobile, requiring the network to migrate the information according to the motion of the physical phenomenon for communication___________ reasons (efficiency/scalability/both) 46>In practical applications, the effect of a physical phenomena usually attenuates with distance, thus limiting the propagation of physical signals to geographical regions around the physical phenomenon (true/false)___________ 47>The physical phenomenon being sensed change over time (true/false)___________ 48>Geographically based group initiation and management have to be achieved by a___________ protocol distributed on all sensor nodes (greedy/lightweight) 49>Considering that the group membership is dynamic as the targets move and that the network is formed in an adhoc way such that no nodes have the knowledge of the global network topology. These difficulties may be tackled via following techniques a: leader based tracking algorithm where at any time each group has a unique leader who knows the geographical region of the collaboration b: recent advances in geographical routing that do not require the leader to know the exact members of its group Ans: ___________ (a/b/both) 50>The information based approach to sensor querying and data routing selective invokes sensors to___________ the number sensing actions needed for a given accuracy and hence latency & energy usage (minimize/maximize) 51>___________is a set of sensor nodes responsible for the creation and maintenance of a target's belief state over time, which we call track (co-operative group/collaborative group) 52>is a set of sensor nodes responsible for the creation and maintenance of a target's belief state over time, which we call ___________ (trunk/track) 53>How the leader node maintains and migrates the collaborative processing group. Arrange the following steps in correct order a: sensors are selected to acquire new measurements using the sensor selection algorithm b: after the leader is elected, it initializes a belief state as uniform disk centered at its own location_ c: as the target moves, the sensors that did not previously detect may begin detecting Ans: __________ (cba/acb/bca) 54>Following are examples of data association algorithms a: optimal assignment b: multiple hypothesis processing Ans: ___________ (a/b/both) 55>Using ___________algorithm , the ambiguities in the target identities after crossing tracks can be resolved using additional local evidence of the track identity and then propagate the information to other relevant tracks (identity management/data association) 56>We can convert global estimation and tracking problem into a local analysis using the so called___________ (primal dual transformation/parametric approximation) 57>A wireless sensor network is severely constrained by the on-board battery power (true/false)___________

24

WIRELESS SENSOR NETWORKS 58>If a sensor only wakes up, senses and communicates when it expects an event of interest, the power consumption of the network could be dramatically reduced (true/false)___________ 59>The idea of information driven sensor tasking, and its realization in IDSQ, is to base the sensor selection the potential contribution of a sensor to the current estimation task while using a moderate amount of resources (true/false)___________ 60>Following protocol can be used for sensing stationary or moving physical phenomena a: leader based b: moving center of aggregation Ans: ___________ (a/b/both) 61>In the resource limited sensor networks, the appropriate balance between the information and the costs is of paramount concern, since unnecessary data collection or communication consumes precious bandwidth and energy and overload human attention (true/false)___________ 62>Primary function of a senor network is to collect information from a physical environment (true/false)___________ 63>Routing an a sensor network must be co-optimized with the information aggregation or dissemination (true/false)___________ 64>___________group is an important abstraction of physical sensors, since individual sensors are ephemeral and hence less important, and sensors collectively support a set of tasks (co-operative processing/collaborative processing) 65>A major benefit of establishing the collaborative group abstraction is in enabling the programming of sensor networks to move from addressing individuals nodes to addressing collectives (true/false) ___________ ANSWERS 1>camera 2>Information Driven Sensor Querying 3>T 4>standard algorithm design 5>all 6>either 7>T 8>IDSQ 9>belief 10>both 11>NN 12>Mahalanobis 13>distributed 14>mutual information 15>mutual information 16>both 17>Mahalanobis , mutual information 18>IDSQ 19>cabed 20>leader 21>cab 22>all 23>Passive Infrared 24>nearest-neighborhood 25>T 26>IDSQ 27>query proxy node 28>Mahalanobis 29>dynamic 30>dynamic 31>greedy 32>GPSR 33>T

25

WIRELESS SENSOR NETWORKS 34>both 35>Mean Squared Error 36>decreases 37>T 38>minus 39>either 40>T 41>heuristic search 42>best first 43>RTA 44>Real Time A* 45>both 46>T 47>T 48>lightweight 49>both 50>minimize 51>collaborative group 52>track 53>bca 54>both 55>identity management 56>spinal-dual transformation 57>T 58>T 59>T 60>both 61>T 62>T 63>T 64>collaborative processing 65>T

26

WIRELESS SENSOR NETWORKS

CHAPTER 6: SENSOR NETWORK DATABASES 1>From a data storage point of view ,one may think of a sensor network as a distributed database that a; collects physical measurements about the environment b; indexes them c; serves queries from users and other applications external to or from within the network Ans; __________ (a/b/c/all) 2>The advantage of the database approach is that it provides a separation between the logical view of the data held by the sensor network and the actual implementation of these operations on the physical network (true/false)__________ 3>In a classical DBMS ,data is stored in a__________ location (centralized/distributed) 4>The structure and constraints of the data format are called database__________ (table/schema) 5>The database scheme are typically defined or modified by a database administrator using __________ (DML/DDL) 6>DDL stands for___________ 7>Today most databases employ relational schemas and their variants, organizing data into tables whose_____ are record tuples and whose______ are labeled by data attributes rows/columns) 8>___________compiler translates the definitions into metadata which is stored in permanent storage along with the actual data (DML/DDL) 9>___________is a data structure describing the structure of the database data and the constraints they must satisfy (metadata/temporal data) 10>In a typical database system ,the___________ directly controls storage devices such as disks and the flow of data between them and main memory (storage & buffer manager/transaction manager ) 11>The database is updated through units of work named___________ (transition/transaction) 12>It is the job of the__________ to guarantee that transactions are executed atomically and in apparent isolation from other transactions (storage & buffer manager/transaction manager) 13>A user queries the database in a high level logical query language such as___________ (Oracle/SQL) 14>A query is parsed by the_____ and translated into an optimized execution plan ,which is then processed by the______ to answer the user query (execution engine/query processor) 15>In any database system, there are trade offs between the speed of answering queries and the speed of performing database updates (true/false)___________ 16>In__________ database systems ,data storage may be allocated among several geographical separated locations ,connected by a communications network (centralized/distributed) 17>___________database makes the job of the query processor significantly harder (centralized/distributed) 18>Most query execution plans can be represented as trees where the_____ represent database operators and the______ correspond to producer-consumer relationships among operators (centralized/distributed) 19>P2P Stands for___________ 20>In___________ networks ,active processors can number in the tens to hundreds of thousands and may come on the network and go off the network at arbitrary times (P2P/PPP) 21>Another recent trend in database systems is to consider systems for data streams. Such systems are aimed at handling long running___________ queries such as may arise in network or traffic monitoring ,telecom call ,stock market transaction or web log record summarization (continuous/discontinuous) 22>Each sensor in a sensor network takes___________ measurements of physical phenomena such as heat, sound, light ,pressure or motion (time sequenced/time stamped) 23>The issue of where to store the data becomes of paramount importance since_____ dominates______ (energy landscape/communication cost)

27

28

29

30

WIRELESS SENSOR NETWORKS 70>For______ operator, it can be shown that the size of the partial state record is proportional to the size of the data set it summarizes ,while in_____ operator ,the size correlates with statistical properties (median/histogram) 71>___________are distributive ,meaning the size of an intermediate state is the same as that of the final aggregate__________ is algebraic in that the partial state records are not themselves aggregates for the data set ,but are of constant size (max/min/count/average/sum) 72>_____is holistic and______ is content sensitive (median/histogram) 73>The performance of TinyDB is___________ related to the amount of intermediate state information required per aggregate (directly/inversely) 74>TinyDB uses ___________ based mechanism for data aggregation (emoge/epoch) 75>TinyDB builds a___________ tree for aggregation (static/dynamic) 76>In the query tree ,_____are the operators and______ are data dependencies among the operators (nodes/edges) 77>The task assignment problem is___________ complete (NP/PN) 78>A tree based query propagation mechanism is appropriate for a ___________based application (client/server) 79>DCS stands for___________ 80>____________is a method proposed to support queries from any node in the network by providing a rendezvous mechanism for data and queries that avoids flooding the entire network (DCE/DCS) 81>Directed diffusion is an example of data centric routing (true/false)___________ 82>At the center of a DCS system are___________ points ,where data and queries meet (rendezvous/meeting) 83>GHT stands for___________ 84>An instance of DCS is the ___________ (GLS/GHT) 85>in___________ ,the translation from node attributes to storage location is accomplished by a hash function ,which attempts to distribute data evenly across the network (GLS/GHT) 86>___________may be regarded as a variant of publish and subscribe except the event broker serves as the data storage and rendezvous point (DCS/DCE) 87>A type of query that is especially appropriate for sensor network databases is a __________query (range/boundary) 88>In___________ query ,a certain range is specified for a number of attributes of interest on the data sought (range/boundary) 89>In general ,sensor network data is multi-attribute (true/false)___________ 90>__________is aimed at point queries or exact matches, so it is not well suited for queries involving data ranges (GLS/GHT)_ 91>in general ,the complexity of answering a query in a sensor network will be a function of a; the size of the data in the network b; the number of records returned Ans; ___________ (a/b/both) 92>Following are classical measures of the quality of an index___________ (speed/size/both) 93>The ___________data the index stores ,the faster the query processing can be (less/more) 94>wrt one dimensional indices ,the particular subsets of data forming the prestored answers are referred to as the___________ subsets (orthogonal range/canonical) 95>In canonical subsets of sensors along a road ,an___________ node in the tree aggregates information from all its descendant sensors in th tree (internal/external) 96>Partial data aggregation is a key feature of any indexing scheme for range searching (true/false)___________ 97>When we have a set of attributes each parameterized by a scalar value and query with a interval along a subset of the parameters ,then we call this as___________ searching (orthogonal range/canonical) 98>Examples of hashing/partitioning schemes are___________ (grid files/partitioned hashing/both) 99>Examples of tree based index structure include a; multilevel indices b; k-d trees c; quad tree d; R trees Ans; ___________ (a/b/c/d/all) 100>The storage cost for storing m events into ___________is O (m) {k-d tree/multi level}

31

32

WIRELESS SENSOR NETWORKS 4>schema 5>DDL 6>Data Definition Language 7>row, column 8>DDL 9>metadata 10>storage & buffer manager 11>transaction 12>transaction manager 13>SQL 14>query processor, execution engine 15>T 16>distributed 17>distributed 18>node, edge 19>peer to peer 20>P2P 21>continuous 22>time-stamped 23>communication costs, energy landscape 24>both 25>both 26>all 27>all 28>all 29>data streams 30>P2P 31>T 32>high 33>duration, sampling period 34>continuous, snapshot, historical 35>all 36>T,T 37>cougar 38>both 39>ADT 40>ADT 41>physical 42>Short Time Fourier Transform 43>both 44>virtual 45>virtual, base 46>distributed 47>either 48>Gaussian ADT 49>GADT 50>diff 51>T 52>centralized 53>all 54>in-network storage 55>in-network storage 56>all 57>all 58>1-f 2-a 3-b 4-c 5-d 6-e 59>total usage, hot spot usage 60>both

33

WIRELESS SENSOR NETWORKS 61>all 62>1-d 2-c 3-e 4-b 5-f 6-a 63>both 64>server 65>both 66>both 67>TinyDB 68>all 69>both 70>median, histogram 71>max, min, count & sum; average 72>median, histogram 73>inversely 74>epoch 75>static 76>node, edge 77>NP 78>server 79>Data Centric Storage 80>DCS 81>T 82>rendezvous 83>Geographic Hast Table 84>GHT 85>GHT 86>DCS 87>range 88>range 89>T 90>GHT 91>both 92>both 93>more 94>canonical subsets 95>internal 96>T 97>orthogonal range 98>both 99>all 100>k-d tree 101>T 102>both 103>DIMENSIONS 104>Distributed Index for Features in Sensor network 105>DIFS 106>DIFS 107>fractional cascading 108>fractional cascading 109>all 110>Distributed Index for Multi-dimensional data 111>locally preserving hash functions 112>locally preserving hash functions 113>DIM 114>traditional, sensor network 115>T 116>T 117>DIMENSIONS

34

WIRELESS SENSOR NETWORKS 118>aging function 119>Kinetic Data Structure 120>KDS 121>KDS 122>both

35

WIRELESS SENSOR NETWORKS

CHAPTER 7:

SENSOR NETWORK PLATFORMS AND TOOLS

1>Following are different types of programming for sensor networks a: those carried out by end users b: those performed by application developers Ans: __________ (a/b/both) 2>_____may view a sensor network as a pool of data and interact with the network via queries.On the other hand, _____must provide users of a sensor network with the capabilities of data acquisition, processing and storage (end user/application developer) 3>CSIP stands for__________ 4>Following are different types of node centric programming interfaces a: imperative language, nesC b: dataflow style language, TinyGals Ans: __________ (a/b/both) 5>Following are examples of node level simulator a: ns-2 b: TOSSIM Ans: __________ (a/b/both) 6>___________centric programming gives programmers platform support for thinking in high level abstraction (node/state) 7>Sensor node hardware can be grouped into following categories a: augmented general purpose computers b: dedicated embedded sensor nodes c: system-on-chip (SoC) nodes Ans: ___________ (a/b/c/all) 8>Match the following augmented smart dust, BWRC picoradio node and PASTA node general purpose computers: dedicated Berkeley mote family, UCLA Medusa family, Ember nodes and MIT embedded microAMP sensor nodes: SoC nodes: low power PCs, embedded PCs, custom designed PC and various PDA___________ 9>COTS stands for 10>Compared with dedicated sensor nodes, PC like platforms are___________power hungry (less/more) 11>Which sensor node hardware has high processing capability a: augmented general purpose computers b: dedicated embedded sensor nodes c: SoC nodes Ans: ___________ (a/b/c) 12>Which platform typically use COTS chip sets with emphasis on small from factor, low power processing and communication, and simple sensor interfaces a: augmented general purpose computers b: dedicated embedded sensor nodes c: SoC nodes Ans: ___________ (a/b/c)

36

WIRELESS SENSOR NETWORKS 13>Berkeley motes has gained wide popularity in the sensor network research community because of a: small form factor b: open source software development c: commercial availability Ans: __________ (a/b/c/all) 14>Figure7.1___________ 15>In MICA mote , the main micro-controller named___________ takes care of regular processing (intel/Atmel ATmega103L) 16>In MICA mote, the ATmega103L MCU has integrated____ kB flash memory and ___kB of data memory (4/64/512)___ 17>The RF communication on MICA motes uses the TR=____chip set operating at ____MHz band (916/1000/1024) 18>MICA motes implement a____ kbps transmission rate (40/60/80)_______ 19>MICA mote has maximum transmission range of about ___________feet in open space (100/200/300) 20>MICA motes support a ____pin I/O extension connector (50/51/52)_______ 21>figure7.3___________ 22>Radio transmission bear the maximum power consumption (true/false)___________ 23>Stand alone embedded systems do not scale up for the programming of sensor networks for following reasons a: sensor networks are large scale distributed systems, where global properties are derivable from program execution in a massive number of distributed nodes b: sensor network should be able to respond o multiple concurrent stimuli at the speed of changes of the physical phenomena of interest Ans: ___________ (a/b/both) 24>___________implies a conceptual model for programmers, with associated techniques for problem decomposition for the software designers (design platform/design methodologies) 25>_____supports a______ by providing design time language constructs and restrictions, and run time execution services (design platform/design methodologies) 26>Most design methodologies for sensor network software are___________ centric, where programmers think in terms of how a node should behave in the environment (state/node) 27>Following are representative examples of node-level programming tools___________ (TinyOS/TinyGALS) 28>___________aims at supporting sensor network applications on resource constrained hardware platforms such as the Berkeley motes (TinyOS/TinyGALS) 29>___________is a virtual machine for the Berkeley motes (MICA/mate) 30>Features of TinyOS a: have no file system b: supports only static memory allocation: implements a simple task model d: provides minimal device & networking abstractions e: takes a language based application development approaches Ans: ___________ (a/b/c/d/e/all) 31>TinyOS organizes components into layers, the_____ a layer is , the closer it is to the hardware; the______ a layer is, the closer it is to the application (lower/higher) 32>In TinyOS, tasks are non-preemptive (true/false)___________ 33>The execution of an interrupt handler is called___________ (event context/event scheduler) 34>___________is an extension of C to support and reflect the design of TinyOS v1.0 and above (TinyGALS/nesC) 35>___________provides a set of language constructs and restrictions to implement TinyOS components and applications (nesC/ns2) 36>Interfaces of a nesC component are classified as___________ interfaces (provides/uses) 37>_____interface is a set of method calls exposed to the upper layers while a______ interface is a set of method calls hiding the lower layer components (provides/uses) 38>In nesC component, _____call is a method call from a lower layer component to a higher layer component while a______ call is a method call from a higher layer component to a lower layer component (command/event)

37

WIRELESS SENSOR NETWORKS 39>Following are different types of components in nesC, depending on how they are implemented ___________ (modules/configurations) 40>In nesC component, _____are implemented by application code whereas______ are implemented by connecting interfaces of existing components (modules/configurations) 41>In nesC component, the implementation part of a ___________is written in C-like code (modules/configurations) 42>TinyOS does not support dynamic memory allocation (true/false)___________ 43>In nesC, code can be classified into following types__________ code (synchronous/asynchronous) 44>In nesC, ______code is reachable from at least one interrupt handler whereas_____ code is only reachable from tasks (synchronous/asynchronous) 45>In TinyGALS, a dataflow program has a set of processing units called___________ (actors/directors) 46>___________event driven execution can be viewed as a special case of dataflow models, where each actor is triggered by every incoming event (synchronous/asynchronous) 47>GALS stands for__________ 48>TinyGALS is a language for TinyOS (true/false)___________ 49>___________mechanism is a way of building event triggered concurrent execution from thread unsafe components (GUYS/GALS) 50>One of the key factors that affects component reusability in embedded software is the component___________ (compatibility/composability) 51>TinyGALS addresses concurrency concerns at the_____ level, rather than at the ______level as in nesC (component/system) 52>An application in TinyGALS is built from following steps a: constructing asynchronous actors from synchronous components b: constructing an application by connecting the asynchronous components though FIFO queues Ans: ___________ (a/b/both) 53>___________in TinyGALS has a set of input ports, a set of output ports and a set of connected TinyOS components (actor/director) 54>GUYS stands for___________ 55>___________variables are a mechanism for sharing global state, allowing quick access but with protected modification of the data (TinyGALS/TinyGUYS) 56>In the___________ mechanism, global variables are guarded (TinyGALS/TinyGUYS) 57>In the TinyGUYS, the external variables are accessed within a component by using following keywords ___________ (PARAM_GET/PARAM_PUT/both) 58>In TinyGALS, the code generator automatically generates all of the necessary code for a: component links and actor connections b: application initialization and start of execution c: communication among actors d: global variables reads and writes Ans: ___________ (a/b/c/d/all) 59>___________function is one of the first functions called by the TinyGALS runtime scheduler before executing the application {init () or app_init ()} 60>A node level simulator has the following components a: sensor node model b: communication model c: physical environment model d: statistics and visualization Ans: ___________ (a/b/c/d/all) 61>A node in a simulator acts as a software execution platform, a sensor host as well as a communication terminal (true/false) ___________ 62>A key element of the environment within which a sensor network operates is the physical phenomenon of interest (true/false)___________ 63>Depending on how the time is advanced in the simulation, following are different types of execution models a: cycle driven simulation b: discrete event simulation Ans: ___________ (a/b/both)

38

WIRELESS SENSOR NETWORKS 64>_____simulation discretizes the continuous notion of real time into ticks and simulates the system behavior at these ticks (DE/CD)______ 65>___________simulator assumes that the time is continuous and an event may occur at any time (DE/CD) 66>In DE simulator, components are ___________in the sense that if an output event is computed from an input event, then the time stamp of the output event should not be earlier than that of the input event.____________ components require the simulators to be able to roll back in time and they may not define a deterministic behavior of a system (causal/non-causal) 67>_____simulator is more accurate than a______ simulator and as a consequence ______can run slower (CD/DE) 68>___________simulators are considered as good as actual implementation because of their continuous notion of time and discrete notion of events (CD/DE) 69>Following are extensions of classical network simulators a: ns-2 b: J-Sim (java sim) c: GloMoSim/QualNet Ans: ___________ (a/b/c/all) 70>Another class of simulators called___________ simulators incorporate the actual node software ino the simulation a: software in the loop b: hardware in the loop Ans: (a/b) 71>Following are examples of software in the loop simulators a: TOSSIM for Berkeley motes b: Em* for Linux based moses such as Sensoria WINS NG platforms Ans: ___________ (a/b/both) 72>___________is an open source network simulator that was originally designed for wired, IP networks (nesC/ns-2) 73>following are efforts to extend ns-2 to simulate sensor networks a: SensorSim from UCLA b: NRL sensor network extension from the Navy Research Laboratory Ans: ___________ (a/b/both) 74>___________aims at providing an energy model for sensor nodes and communication, so that power properties can be simulated (SensorSim/NRL sensor network ) 75>___________provides a flexible way of modeling physical phenomena in a discrete event simulator (SensorSim/NRL sensor network) 76>The main functionality of ns-2 is implemented in _____, while the dynamics of the simulation is controlled by______ scripts (C/C++/perj/Tcl) 77>The key advantage of ns-2 is its rich libraries of protocols for nearly all network layers and for many routing mechanisms (true/false)___________ 78>DSDV stands for___________ 79>DSR stands for___________ 80>AODV stands for____________ 81>TORA stands for ______ 82>Match the following TCP: directed diffusion, GEAR & GAF routing MAC: DSDV, DSR, AODV & TORA Adhoc routing: 802.3, 802.11 & TDMA Sensor network routing: reno, tahoe, vegas & SACK implementation_______ 83>___________is dedicated simulator for TinyOS applications running on one or more Berkeley motes (TOSSIM/ns-2) 84>___________uses a simple but powerful abstraction to model a wireless network (TOSSIM/ns-2) 85>___________has a visualization package called TinyViz , which is a java application that can connect to TOSSIM simulations (TOSSIM/ns-2) 86>___________is the basis for onus signal and information processing algorithms (state theories/system theories)

39

WIRELESS SENSOR NETWORKS 87>___________group is a set of entities that contribute to a state update (collaborative/cooperative) 88>In collaboration group, the entities can be physical sensor nodes or they can be more abstract system components. Such entities are referred to as___________ (actors/agents) 89>A collaboration group provides following abstraction a: its scope to encapsulate network topologies b: its structure to encapsulate communication protocols Ans: ___________ (a/b/both) 90>_____of a group defines the membership of the nodes with respect to the group._____ of a group defines the roles each member plays in the group and thus the flow of data (scope/structure) 91>A group is a 4 tuple G= (A, L, p, R) where __is a set of agents, __is a set of labels called roles, __is a function that assigns each agent a role and__ are the connectivity relations among roles 92>GCG stands for___________ 93>n-HNG stands do___________ 94>Following protocols can be used to support the communication among members even in the presence of communication holes in the region a: GEAR b: Mobicast c: Geocasting Ans: ___________ (a/b/c/all) 95>TinyDB is built on ______HNG group (0/1/infinite) 96>PSG stands for___________ 97>___________consists of members within a pre-specified geographical extent (GCG/nHNG/PSG/AG) 98>___________has an anchor node and defines that all nodes within n communication hops are members of the group (GCG/n-HNG/PSG/AG) 99>___________comprises consumers expressing interest in specific types of data or service and producers that provide those data or services (GCG/n-HNG/PSG/AG) 100>In___________, a member belongs to the group because it was invited by another member in the group (GCG/n-HNG/PSG/AG) 101>PIECES stands for__________ 102>__________is a software framework that implements the methodology of state centric programming over collaboration groups to support the modeling (TOSSIM/PIECES) 103>PIECES comprises __________ (principals/port agents/both) 104>In PIECES, ____is the key component for maintaining a piece of state whereas______ may be an input, an output or both (principals/port agents) 105>In PIECES, an output port agent is called__________ (anchor/observer) 106>In PIECES, _____observer pushes data autonomously to its destinations while_____ observer sends data only when a consumer requests it (passive/active) 107>In PIECES, the execution of principals and port agents can be__________ (time driven/event driven/either) 108>PIECES imposes the restriction that whenever an agent is triggered , its execution must have reached a quiescent state. Such a trigger is called__________ (restrictive trigger/responsible trigger) 109>In PIECES, __________maintains a piece of local state related to the physical phenomenon, based solely on its own local measurement history (physical principal/sensing principal) 110>PIECES simulator is implemented using a combination of__________ (java/matlab/C) 111>In PIECES simulator, an event driven engine is built in _____to simulate network message passing and agent execution at the collaboration group level whereas a continuous time engine is built in_____ to simulate target trajectories, signals and noise, and sensor front ends (java/matlab/C) 112>Using the__________ centric model, programmers decouple a global state into a set of independently maintained pieces, each of which is assigned a principal (node/state) 113>Following are kinds of target information that user cares about in the multi-target tracking problem a: target positions b: target identifies Ans: __________ (a/b/both)

40

WIRELESS SENSOR NETWORKS 114>In multitarget tracking problem, there is a need to sort out ambiguity regarding which track corresponds to which target. This problem is referred to as__________ problem (identity management/location management) 115>In PIECES, MTTracker is implemented by following principals a: tracking principal b: classification principal c: identity management principal Ans: ___________ (a/b/c/all) 116>TinyOS, TinyGALS and nesC are examples of__________level operating systems and programming languages based on the Berkeley mote hardware (state/node) 117>__________centric platforms typically employ a message passing abstraction of communication between nodes (state/node) 118>Programming distributed systems beyond individual nodes has been traditionally handled by middleware technologies such as__________ (COBRA/CORBA) 119>___________centric programming is aimed at providing domain specific programming models for information processing applications in sensor networks (state/node) ANSWERS 1>40 2>all 3>either 4>3,226 5>atomic 6>SC 7>norace 8>1 9>application 10>app_start() 11>signal processing specialist,networking expert 12>state 13>Sensoria WINS NG node 14>TinyOS,nesC 15>dedicated embedded sensor 16>Soc 17>Soc 18>Maxim DS1804 19>4 20>27 21>FSM 22>client server 23>tree structure 24>T 25>call,signal 26>both 27>nesC,TinyGALS 28>TinyGALS 29>TinyGALS 30>TinyOS,TinyGALS 31>app_init(),init() 32>PARAM_GET(),PARAM_PUT() 33>112,86 34>node 35>1-b 2-c 3-d 4-a 36>physical,mac and network 37>CD 38>DE 39>SensorSim

41

WIRELESS SENSOR NETWORKS 40>all 41>all 42>GCG 43>n-HNG 44>PSG 45>all 46>AG 47>either 48>PIECES 49>T 50>packet,collaboration group

42

WIRELESS SENSOR NETWORKS

CHAPTER 8: APPLICATIONS AND FUTURE DIRECTIONS 1>The main problem with wired sensor networks is __________in deployment (cost/delay) 2>A__________ network is more time consuming to construct and deploy, precluding applications where immediate data collection is needed (wired/wireless) 3>The size of wireless sensor system is limited mostly by a: the cost of maintaining communication links b: the cost of sensor hardware Ans: __________ (a/b/both) 4>Following are application areas of wireless sensor network a: asset and warehouse management b: automotive c: building monitoring and control d: environmental monitoring Ans: __________ (a/b/c/d/all) 5>Following are application areas of wireless sensor networks a: health care b: industrial process control c: military battlefield awareness d: security and surveillance Ans: __________ (a/b/c/d/all) 6>DSRC stands for___________ 7>NHTSA stands for___________ 8>Sensors may be used a: to monitor and track assets such as trucks or other equipment b: to manage assets for industries such as oil and gas, utility , and aerospace An: ___________ (a/b/both) 9>Sensors can be used a: to monitor conditions and movements of wild animals or plants in wildlife habitats b: to monitor air quality and track environmental pollutants, wildfires or other natural or manmade disasters c: to monitor biological or chemical hazards to provide early warnings d: to monitor earthquake Ans: ___________ (a/b/c/d/all) 10>___________sensors instrumented in a building can detect the direction and magnitude of a quake and provide an assessment of the building safety (acoustic/seismic) 11>C3I Stands for___________ 12>Ensuring security and privacy is one of the highest priorities for sensor network systems (true/false)__________ 13>PKI stands for___________ 14>EmSoft Stands for___________ 15>___________framework allows an application developer to write code for a sensor network signal processing and tracking application using a state-centric model of programming (TOSSIM/PIECES) 16>FFT stands for__________ 17>___________algorithms refer to methods that require relatively little floating-point computation and less memory storage than those that are floating point intensive such as FFT (lightweight signal processing/lightweight signal regeneration) 18>___________information architectures deal with how information is organized and manipulated in a sensor network (distributed/centralized) 19>Information double counting is a major problem for distributed inference (true/false)___________

43

WIRELESS SENSOR NETWORKS ANSWERS 1>both 2>wired 3>both 4>all 5>all 6>Dedicated Short Range Communication 7>National Highway Traffic Safety Administration 8>both 9>all 10>seismic 11>Command, control, communication and intelligent 12>T 13>Public key infrastructure 14>Embedded Software 15>PIECES 16>Fast Fourier Transform 17>Lightweight signal processing 18>distributed 19>T

44