Wireless Networks and Ubiquitous Computing Quiz
36 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which type of network is useful when infrastructure is not available or practical?

  • Ad hoc network (correct)
  • Wireless network
  • Infrastructure-based network
  • MANET
  • What is the goal of routing in MANET?

  • To increase routing-related overhead
  • To find long and unstable routes
  • To avoid frequent topology changes
  • To find short and stable routes (correct)
  • Which MAC method uses signaling packets for collision avoidance?

  • OLSR
  • MACA (correct)
  • DSR
  • AODV
  • Which reactive routing protocol uses a route discovery process, source routing, and route caching?

    <p>DSR</p> Signup and view all the answers

    Which proactive routing protocol maintains routing tables at nodes and uses Route Requests and Route Replies?

    <p>DSDV</p> Signup and view all the answers

    What are the three classes of location systems?

    <p>Client-based, network-based, and network-network assisted location</p> Signup and view all the answers

    What are some of the error sources for location systems?

    <p>Delay in signal, clock synchronization, and geometry</p> Signup and view all the answers

    Which sensor type is used to measure physical quantities and convert them into signals that can be read by an observer or an instrument?

    <p>Sensors in general</p> Signup and view all the answers

    What is the goal of ubiquitous computing?

    <p>To embed chips in any device and connect it to an infinite network of other devices</p> Signup and view all the answers

    Which type of network is useful when infrastructure is not available or practical?

    <p>Ad hoc network</p> Signup and view all the answers

    What is the goal of routing in MANET?

    <p>To find short and stable routes</p> Signup and view all the answers

    Which MAC method uses signaling packets for collision avoidance?

    <p>MACA</p> Signup and view all the answers

    Which reactive routing protocol uses a route discovery process, source routing, and route caching?

    <p>DSR</p> Signup and view all the answers

    Which proactive routing protocol maintains routing tables at nodes and uses Route Requests and Route Replies?

    <p>DSDV</p> Signup and view all the answers

    What are the three classes of location systems?

    <p>Client-based, network-based, and network-network assisted location</p> Signup and view all the answers

    What are some of the error sources for location systems?

    <p>Delay in signal, clock synchronization, and geometry</p> Signup and view all the answers

    Which sensor type is used to measure physical quantities and convert them into signals that can be read by an observer or an instrument?

    <p>Sensors in general</p> Signup and view all the answers

    What is the goal of ubiquitous computing?

    <p>To embed chips in any device and connect it to an infinite network of other devices</p> Signup and view all the answers

    Which type of networks are useful when infrastructure is not available or practical?

    <p>Ad hoc networks</p> Signup and view all the answers

    What are the two types of wireless connectivity in MANET?

    <p>Single-hop and multi-hop</p> Signup and view all the answers

    What is the name of the MAC method used for collision avoidance in wireless networks?

    <p>MACA</p> Signup and view all the answers

    Which of the following is a reactive routing protocol for MANET that uses a route discovery process, source routing, and route caching?

    <p>Dynamic Source Routing (DSR)</p> Signup and view all the answers

    Which routing protocol for MANET improves on DSR by not requiring routes in data packets, assuming symmetric links, and avoiding the large packet headers that degrade performance?

    <p>Ad Hoc On-Demand Distance Vector Routing (AODV)</p> Signup and view all the answers

    Which protocol is an example of a proactive routing protocol for MANET?

    <p>Destination-Sequenced Distance-Vector (DSDV)</p> Signup and view all the answers

    What is the name of the simulator typically used to conduct performance studies of MANET protocols?

    <p>ns</p> Signup and view all the answers

    Which protocol is a combination of proactive and reactive approaches for routing in MANET?

    <p>Zone Routing Protocol (ZRP)</p> Signup and view all the answers

    What is the goal of ubiquitous computing?

    <p>To embed chips in devices to connect them to an infinite network of other devices</p> Signup and view all the answers

    What are some of the effects of mobility on the protocol stack in MANET?

    <p>New applications, congestion and flow control, addressing and routing, media access, and transmission errors and interference.</p> Signup and view all the answers

    Why may MAC methods for fixed networks not work for wireless networks?

    <p>Due to hidden or exposed terminals.</p> Signup and view all the answers

    What is Multiple Access with Collision Avoidance (MACA)?

    <p>A MAC method that uses signaling packets for collision avoidance.</p> Signup and view all the answers

    What are the advantages and disadvantages of the three types of unicast routing protocols for MANET (proactive, reactive, and hybrid)?

    <p>Each has its own advantages and disadvantages.</p> Signup and view all the answers

    What is Dynamic Source Routing (DSR)?

    <p>A reactive routing protocol that uses a route discovery process, source routing, and route caching.</p> Signup and view all the answers

    What is Ad Hoc On-Demand Distance Vector Routing (AODV)?

    <p>A reactive routing protocol that maintains routing tables at nodes and uses Route Requests and Route Replies.</p> Signup and view all the answers

    How does AODV improve on DSR?

    <p>By not requiring routes in data packets, assuming symmetric links, and avoiding the large packet headers that degrade performance.</p> Signup and view all the answers

    What are some factors that affect TCP performance in MANET?

    <p>Wireless transmission errors, multi-hop routes on shared wireless medium, and route failures due to mobility.</p> Signup and view all the answers

    What are some approaches to improving TCP throughput in MANET?

    <p>Network feedback, explicit notification, better route caching mechanisms, and probing.</p> Signup and view all the answers

    Study Notes

    Wireless Communication Networks: Mobile Ad Hoc Networks and Routing Protocols

    • Mobile ad hoc networks (MANET) allow access to computing and communication services while on the move.

    • MANET can be infrastructure-based or ad hoc networks, which are useful when infrastructure is not available or practical.

    • MANET can have single-hop or multi-hop wireless connectivity, with frequent topology changes and host movement.

    • The effect of mobility on the protocol stack includes new applications, congestion and flow control, addressing and routing, media access, and transmission errors and interference.

    • Media access control (MAC) methods for fixed networks may not work for wireless networks due to hidden or exposed terminals.

    • Multiple Access with Collision Avoidance (MACA) is a MAC method that uses signaling packets for collision avoidance.

    • Routing in MANET involves finding a path from a source to a destination, with the goal of decreasing routing-related overhead, finding short and stable routes.

    • Unicast routing protocols for MANET include proactive, reactive, and hybrid protocols, each with its advantages and disadvantages.

    • Dynamic Source Routing (DSR) is a reactive routing protocol that uses a route discovery process, source routing, and route caching.

    • Ad Hoc On-Demand Distance Vector Routing (AODV) is a reactive routing protocol that maintains routing tables at nodes and uses Route Requests and Route Replies.

    • AODV improves on DSR by not requiring routes in data packets, assuming symmetric links, and avoiding the large packet headers that degrade performance.

    • The trade-off between proactive and reactive routing protocols depends on traffic and mobility patterns, with standardization efforts in IETF MANET and MobileIP working groups.Wireless Communication Networks Routing in MANET and Link, Network, and Transport Layers Considerations

    • Reactive and proactive routing protocols are used in MANET, with variations including power-aware routing, associativity-based routing, and signal stability-based adaptive routing.

    • The destination-sequenced distance-vector (DSDV) and optimized link state routing (OLSR) protocols are examples of proactive routing protocols, while the zone routing protocol (ZRP) combines proactive and reactive approaches.

    • Performance studies of these protocols are typically conducted through simulations using ns, a discrete event simulator, with variables such as traffic characteristics and mobility patterns affecting performance.

    • User Datagram Protocol (UDP) and Transmission Control Protocol (TCP) are used to measure performance in MANET, with several metrics including routing overhead, packet delivery delay, and throughput/loss.

    • TCP performance is affected by several factors, including wireless transmission errors, multi-hop routes on shared wireless medium, and route failures due to mobility.

    • TCP throughput degrades with an increase in the number of hops, and packet transmission can occur on at most one hop among three consecutive hops.

    • TCP performance typically degrades when caches are used for route repair, and caching can result in faster route repair but may be offset by loss of TCP performance due to multiple timeouts.

    • TCP acknowledgements (Acks) share the wireless bandwidth with TCP data packets, and acks require additional receive-send turnarounds, which also incur a time penalty.

    • The reduction of contention between data and acks and the frequency of send-receive turnaround can be improved through piggybacking link layer acks with data, sending fewer TCP acks, and ack filtering.

    • Improving TCP throughput can be achieved through network feedback, explicit notification, better route caching mechanisms, and probing.

    • Computing encompasses the design and development of software and hardware systems for a broad range of purposes, and the first era of computing is known as the Mainframe era.

    • Ubiquitous computing involves the integration of technology into everyday objects and environments, allowing for seamless interaction between users and their surroundings.Ubiquitous Computing, Location, Security, and Data Collection

    • Ubiquitous computing enhances computing use by making many devices available throughout the physical environment but making them effectively invisible to the user.

    • The goal of ubiquitous computing is to embed chips in any device, from clothing to tools to appliances to cars to homes to the human body, to connect the device to an infinite network of other devices.

    • Location is one of the most important components of user context and location technologies are a major part of ubiquitous systems.

    • Three classes of location systems include client-based, network-based, and network-network assisted location.

    • Approaches to determining location include proximity, trilateration, hyperbolic lateration, triangulation, and dead reckoning.

    • Error sources for location systems include incorrect reference point coordinates, delay in signal, clock synchronization, multipath, and geometry.

    • Characteristics for location systems are scalability, resolution, active vs. passive, centralization, and infrastructure.

    • Security and privacy issues for ubiquitous computing include location and trust.

    • Sensors measure physical quantities and convert them into signals that can be read by an observer or an instrument.

    • Sensor types include thermal, electromagnetic, mechanical, chemical, optical radiation, acoustic, motion, and orientation sensors.

    • Body, environment, and object sensors are used in ubiquitous environments for various applications.

    • Integrated sensors combine multiple sensor types for more comprehensive data collection.

    Wireless Communication Networks: Mobile Ad Hoc Networks and Routing Protocols

    • Mobile ad hoc networks (MANET) allow access to computing and communication services while on the move.

    • MANET can be infrastructure-based or ad hoc networks, which are useful when infrastructure is not available or practical.

    • MANET can have single-hop or multi-hop wireless connectivity, with frequent topology changes and host movement.

    • The effect of mobility on the protocol stack includes new applications, congestion and flow control, addressing and routing, media access, and transmission errors and interference.

    • Media access control (MAC) methods for fixed networks may not work for wireless networks due to hidden or exposed terminals.

    • Multiple Access with Collision Avoidance (MACA) is a MAC method that uses signaling packets for collision avoidance.

    • Routing in MANET involves finding a path from a source to a destination, with the goal of decreasing routing-related overhead, finding short and stable routes.

    • Unicast routing protocols for MANET include proactive, reactive, and hybrid protocols, each with its advantages and disadvantages.

    • Dynamic Source Routing (DSR) is a reactive routing protocol that uses a route discovery process, source routing, and route caching.

    • Ad Hoc On-Demand Distance Vector Routing (AODV) is a reactive routing protocol that maintains routing tables at nodes and uses Route Requests and Route Replies.

    • AODV improves on DSR by not requiring routes in data packets, assuming symmetric links, and avoiding the large packet headers that degrade performance.

    • The trade-off between proactive and reactive routing protocols depends on traffic and mobility patterns, with standardization efforts in IETF MANET and MobileIP working groups.Wireless Communication Networks Routing in MANET and Link, Network, and Transport Layers Considerations

    • Reactive and proactive routing protocols are used in MANET, with variations including power-aware routing, associativity-based routing, and signal stability-based adaptive routing.

    • The destination-sequenced distance-vector (DSDV) and optimized link state routing (OLSR) protocols are examples of proactive routing protocols, while the zone routing protocol (ZRP) combines proactive and reactive approaches.

    • Performance studies of these protocols are typically conducted through simulations using ns, a discrete event simulator, with variables such as traffic characteristics and mobility patterns affecting performance.

    • User Datagram Protocol (UDP) and Transmission Control Protocol (TCP) are used to measure performance in MANET, with several metrics including routing overhead, packet delivery delay, and throughput/loss.

    • TCP performance is affected by several factors, including wireless transmission errors, multi-hop routes on shared wireless medium, and route failures due to mobility.

    • TCP throughput degrades with an increase in the number of hops, and packet transmission can occur on at most one hop among three consecutive hops.

    • TCP performance typically degrades when caches are used for route repair, and caching can result in faster route repair but may be offset by loss of TCP performance due to multiple timeouts.

    • TCP acknowledgements (Acks) share the wireless bandwidth with TCP data packets, and acks require additional receive-send turnarounds, which also incur a time penalty.

    • The reduction of contention between data and acks and the frequency of send-receive turnaround can be improved through piggybacking link layer acks with data, sending fewer TCP acks, and ack filtering.

    • Improving TCP throughput can be achieved through network feedback, explicit notification, better route caching mechanisms, and probing.

    • Computing encompasses the design and development of software and hardware systems for a broad range of purposes, and the first era of computing is known as the Mainframe era.

    • Ubiquitous computing involves the integration of technology into everyday objects and environments, allowing for seamless interaction between users and their surroundings.Ubiquitous Computing, Location, Security, and Data Collection

    • Ubiquitous computing enhances computing use by making many devices available throughout the physical environment but making them effectively invisible to the user.

    • The goal of ubiquitous computing is to embed chips in any device, from clothing to tools to appliances to cars to homes to the human body, to connect the device to an infinite network of other devices.

    • Location is one of the most important components of user context and location technologies are a major part of ubiquitous systems.

    • Three classes of location systems include client-based, network-based, and network-network assisted location.

    • Approaches to determining location include proximity, trilateration, hyperbolic lateration, triangulation, and dead reckoning.

    • Error sources for location systems include incorrect reference point coordinates, delay in signal, clock synchronization, multipath, and geometry.

    • Characteristics for location systems are scalability, resolution, active vs. passive, centralization, and infrastructure.

    • Security and privacy issues for ubiquitous computing include location and trust.

    • Sensors measure physical quantities and convert them into signals that can be read by an observer or an instrument.

    • Sensor types include thermal, electromagnetic, mechanical, chemical, optical radiation, acoustic, motion, and orientation sensors.

    • Body, environment, and object sensors are used in ubiquitous environments for various applications.

    • Integrated sensors combine multiple sensor types for more comprehensive data collection.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Chapter 7.pdf

    Description

    Test your knowledge on wireless communication networks and ubiquitous computing with our quiz. Learn about mobile ad hoc networks, routing protocols, location technologies, sensor types, and security and privacy issues in ubiquitous computing. This quiz covers a range of topics related to the design and development of software and hardware systems for a broad range of purposes, from everyday objects to mobile devices and networks. Take the quiz to see how much you know about these fascinating topics!

    More Like This

    Use Quizgecko on...
    Browser
    Browser