Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Ans ANSWER THESE QUESTION PLEASE HURRY, AND PROVIDE SUITABLE REASONING 5. These networks operate across packets switched networks, in which data are transmitted in packets

image text in transcribedimage text in transcribedimage text in transcribedAnsimage text in transcribedANSWER THESE QUESTION PLEASE HURRY, AND PROVIDE SUITABLE REASONING

5. These networks operate across packets switched networks, in which data are transmitted in packets over shared circuits of public network. They may also transmit data over leased high speed phone lines or wireless links such as satellites or terrestrial mobile networks. Which network is being discussed here? a. Local Area Networks (LAN) b. Metropolitan Area Networks (MAN) c Wide Area Networks (WAN) d. All of the above 6. Which of the following statement regarding connecting devices is false? a. A repeater inspects neither the physical nor IP address. b. A hub inspects neither the physical nor IP address. CA router inspects the physical address and the IP address. d. A bridge inspects neither the physical nor IP address. 7. Assume that you are analyzing the round trip delay from your laptop to a certain destination. The command used for this shows the round trip delay for each hop or router between the source and the destination. However, the time for the nth hop can be greater than (n + 1)th hop. This is because of the: a. Transmission delay b. Propagation delay c. Processing delay d. Queuing delay 8. The two major avenues of Quality of Service (QoS) is timeliness and data integrity/reliability for computer based networks. For an lot based network which of the following must be true: a. Timeliness should be the most important for an lot based network. b. Data integrity should be the most important for an lot based network c. Only power and memory constraints decides the QoS level. d. The prioritized QoS metric depends upon the specific application/service that an IoT device targets along with other device constraints 1. Generic protocol stack is not optimized for one of the following management protocols: a. Mobility Management b. Power Management c. Data Link Layer Management d. Managing the number and energy consumption profile for the Tasks and their timing 2. Which one among the following is the most important reason to prefer a Zigbee based sensor node over a Wifi one: a. Range of the transmission b. Hardware Cost and scalability c. Power economy ensuring longer battery autonomy d. Deployment of LowPAN for the IP in the networking layer 3. Which among the following are the two major design parameters for an optimized Protocol stack for the Wireless Sensor Networks. a. Efficient Security routines embedded b. Power-aware lighter versions of the protocols c. Protocols supporting self-organizing capabilities for the WSN nodes d. Reliable Data dissemination and storage within the network 4. Which among the following is not known for broadcasting Data in a flat-hierarchy of the WSN nodes: a. Flooding b. SPIN c. Directed diffusion d. GEAR 5. The nature and attributes of Data in a WSN are different from the Internet data not based on which one of the following features: a. Data nature is exclusively the function of a specific destination b. Data is attributable to the location of the node c. There may be several proximity sources meeting the required attributes of the data in a query 6. The approach of data dissemination in the Directed Diffusion is more efficient than SPIN because of one of the following reasons: a. Meta-data is not the true data but information about the data that broadcasts b. Proactive Source disseminating the data to approach a silent Sink C. Sink requiring a certain attributes of data initiate a need based activity by developing gradients for the alternate paths d. Domino of controlled broadcasts propagating advertisement of data consumes less battery 7. The threshold sensitive clustering could be not an ideal choice for a WSN data dissemination, because of the two of the following reasons: a. The proven validation tests showcasing LEACH and PEGASIS surviving longer network life b. Adaption of a soft threshold defeats the premise of conserving energy c. Ambiguity between a packet loss and insignificant data d. An invalid technique for the periodic monitoring applications 8. Which one among the following is not a feature improving the abilities of data dissemination in the presence of geographical awareness: a. Limited broadcast of data targeting the global location b. Sleep and active mode selection based on the alternate relay nodes in the grid Sub-versing a locally economical hop selection, with a global optimization in the overall transmission d. Sleep time adjustment resulting in faster battery depletion 9. The M2M architecture would place the Cloud in one or several among the following M2M domains, if it is to host data storage and M2M query responding servers along with the Software Defined Networks (SDN) virtualizing the network and even the sensing containers. a. Sensing Device Domain b. Networking Domain C. Application Domain d. Partial Sensing Domain 10. The use of constrained Application Protocol (CAP) is aligned with the http protocol at one of the following: a. The use of acknowledgement in the application layer for the confirmed messages b. The use of 'Observation command for the periodic monitoring of a source c. The use of UDP in the transport indiscriminately for all levels of reliability and accommodating it in the application layer d. The ability to Get and Post the URI over the world wide web

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Marketing Database Analytics

Authors: Andrew D. Banasiewicz

1st Edition

0415657881, 978-0415657884

More Books

Students also viewed these Databases questions

Question

1. What are the peculiarities of viruses ?

Answered: 1 week ago