0% found this document useful (0 votes)
114 views11 pages

Question Bank AWSN

This document contains a list of questions related to the topics of ad hoc and wireless sensor networks. It covers concepts like ad hoc network applications, issues, security attacks, routing protocols, wireless sensor network characteristics, enabling technologies, sensor node architecture, mobility, sources and sinks, MAC protocols, transport layer protocols, and energy efficient routing. The questions range from definitions to explanations to comparisons between different protocols.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
114 views11 pages

Question Bank AWSN

This document contains a list of questions related to the topics of ad hoc and wireless sensor networks. It covers concepts like ad hoc network applications, issues, security attacks, routing protocols, wireless sensor network characteristics, enabling technologies, sensor node architecture, mobility, sources and sinks, MAC protocols, transport layer protocols, and energy efficient routing. The questions range from definitions to explanations to comparisons between different protocols.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 11

(An Autonomous Institution, Affiliated to Anna University, Chennai)

DEPARTMENT
VII- Semester
EC8702 – ADHOC AND WIRELESS SENSOR NETWORKS

(B.E– ECE)
(Regulations 2017)
UNIT-I
PART A
1. What is an ad hoc wireless network?
2. List the applications of ad hoc networks.
3. Illustrate the issues in Ad Hoc networks
4. Classify the security attack on ad hoc wireless networks and specify its features.
5. Outline the challenging issues in ad hoc network maintenance.
6. Explore the importance of a Gateway in a wireless network.
7. Generalize the concept of the hidden terminal problem.
8. Briefly explain the exposed terminal problem.
9. Write the classification of routing protocols based on the routing information update
mechanism
10 Differentiate between proactive and reactive routing protocols. Write examples for each.
.
11 Examine the methods to update the table in the table-driven routing protocol.
12 Mention the significance of power-aware routing in ad hoc wireless networks.
13 Identify the advantages and disadvantages of DSDV routing protocols in an ad hoc wireless
network
14 The mobility of nodes in a sparsely populated mobile ad hoc network is lower. Assess the
choice between proactive routing protocols and reactive routing protocols.
15 When is the Route Error message initiated in the AODV routing protocol?
16 Analyse the factors by which AODV performs well compared to DSDV routing protocol
17 Briefly explain the messages involved in the AODV routing protocol.
18 Summarize the basic principle of the on-demand routing protocol.
19 How does the table-driven protocol work in Ad hoc networks?
20 Show that wireless sensor networks and wireless mesh networks are part of the ad hoc wireless
network
UNIT-I
PART – B
1. Differentiate between cellular networks and Ad Hoc networks and Examine the (13)
major advantages of ad hoc wireless Internet
2. Describe the issues and challenges of Ad hoc wireless networks. (13)
3. Assess the importance of multicasting in ad hoc wireless network applications. (13)
And Summarize the security threats in ad hoc wireless networks.
4. Draw the schematic diagram of an ad hoc wireless Internet and discuss the issues (13)
to be considered for a successful ad hoc wireless Internet.
5. Interpret the concept of self-organizing in ad hoc wireless networks. What role (13)
does the routing protocol play in the provisioning of QoS guarantees for ad hoc
wireless networks?
6. What are the classifications of routing protocols? Explain each with an example. (13)
7. Devise the significance of each field in the table maintained at each node in an ad (13)
hoc wireless network using a table-driven protocol.
8. Analyse the destination-sequenced distance-vector routing protocol with an (13)
example.
9. Outline the major challenges that a routing protocol designed for ad hoc wireless (13)
networks faces and Write about the types of ad hoc network routing protocols
based on routing information update mechanisms
10 Explore the issues related to routing protocols for ad hoc wireless networks. (13)
.
11 Compare and contrast the routing mechanisms used in ad-hoc wireless
. networks .Discuss the challenges and advantages of routing in ad-hoc
networks, especially in scenarios where there is no centralized
infrastructure.
12 (i) Explain the concept of "hidden nodes" in wireless ad-hoc networks. How
. can hidden nodes affect network performance

(ii) What is the role of routing protocols in ad-hoc networks? How do they
enable communication between mobile nodes in the absence of fixed
infrastructure?
13 Provide an overview of the AODV (Ad-Hoc On-Demand Distance Vector)
. routing protocol. How does AODV discover routes and maintain them in
ad-hoc networks?
14 Explain the concept of a "routing table" in ad-hoc networks. How do routing
. tables help nodes make forwarding decisions in dynamic and changing
network topologies?. Explain with an example.
15 Explain the concept of self-organization in ad-hoc networks. How do nodes
. in an ad-hoc network dynamically form connections without relying on a
centralized infrastructure with different protocols?
PART – C

1. Discriminate the topology organization in DSDV and AODV routing protocols (15)
with a sample network.
2. Demonstrate how routes are established and maintained in an ad hoc network (15)
using the AODV routing protocol.
3. Explain the key principles and operation of the DSDV routing protocol, (15)
highlighting its advantages and disadvantages. Provide examples to
illustrate its use in practical network scenarios.
4. Define an ad-hoc network in the context of wireless communication. (15)
Explain how ad-hoc networks differ from infrastructure-based wireless
networks, and provide an example of a real-world scenario where an ad-hoc
network is beneficial.
5. Explain the issues and challenges related to Quality of Service (QoS) (15)
provisioning in ad-hoc networks and in terms of security and energy
management, and what are the other issues?

**********

UNIT-2
PART A
1. List out the characteristics requirements for Wireless Sensor Network
2. What are the Required Mechanisms for Wireless Sensor Network
3. Define Scalability
4. Why Multihop communication is required in WSN?
5. What is Collaboration and in-network processing ?
6. List out the applications of WSN
7. What are the enabling technologies for wireless sensor networks?
8. What are the main components of sensor node?
9. What are the operational states of transceivers?
10 What are the types of sensors?
.
11 What are the three types of mobility?
12 What are the Optimization goals and figures of merit in WSN?
13 How to reduce consumption in sensor node level?
14 What are the transceiver design considerations in WSN?
15 Define node mobility
16 Brief about event mobility
17 Explain sink mobility
18 Briefly describe the two basic kinds of sensor network architectures
19 Depict layered architecture of sensor networks
20 Write short notes on sources and sinks.
UNIT-2
PART – B
1. Discuss the characteristics requirements and required mechanisms for Wireless (13)
Sensor Network.
2. Describe the enabling technologies and applications of the wireless sensor (13)
networks
3. Elaborate how the sensor networks are deployed for various applications. (13)
4. Explain the hardware components of Wireless Sensor Node or Single Node (13)
Architecture in detail
5. Explain the architecture of wireless sensor networks. (13)
6. Explain the physical layer and transceiver design considerations in WSNs.
7. Describe about optimization goals of a WSN and figures of merit in detail.
8. Differentiate layered architecture and clustered architecture
9. Write about the different types of mobility for sensor network in detail.
10 Discuss
. (i) Types of sources and sinks
(ii) Single-hop versus multihop networks

11 Discuss the components and functionalities of a typical single-node


. architecture in ad-hoc networks. What are the essential elements that make
up a single node?
12 Detail about energy consumption of sensor nodes
.
13 Define
. (i) transceivers in WSN.
(ii) Power supply of sensor nodes

14 What are the primary issues and challenges encountered when designing
. sensor networks? Discuss how these challenges impact the design and
deployment of sensor networks for various applications.
15 Describe about mobility, sources and sinks of a sensor network
.
PART – C

1. Write in detail about Sensor Network Scenarios with neat diagram (15)
2. Assess the function of controller in a wireless sensor node and discuss about the (15)
components that are used in the sensor node.
3. (i) What are the applications of wireless sensor networks and explain any two with (15)
an example each.
(ii) Explain how the sensor networks are deployed for Military and SAR
application.
4. Explain the key enabling technologies and characteristic requirements that (15)
are essential for the successful implementation of wireless sensor networks
(WSNs).
5. Categorize the sensor network scenario with diagrams and also explain how (15)
mobility can appear in WSN?

**********

UNIT-3
PART A
1. What are the design considerations for MAC protocols in wireless sensor networks ?
2. What is the purpose of Low duty protocols in WSN
3. What is duty cycle?
4. What is the drawback of S-MAC protocol?
5. What is Contention-based protocols?
6. What is Schedule-based protocols ?
7. Why Mediation Device is used in Mediation Device Protocol?
8. What are the advantages of Mediation Device Protocol?
9. List he features of PAMAS Protocol?
10 What is Clustering in LEACH Protocol?
.
11 What are the features of IEEE 802.15.4 Protocol?
12 Draw the Super frame structure of IEEE 802.15.4.
13 List the issues in designing a Transport Layer Protocol for Ad Hoc Wireless Networks?
14 Explain the Energy efficient unicast routing protocol
15 List the type of nodes that distinguish on the MAC layer.
16 Discuss about the energy problems on the MAC layer
17 What is periodic wakeup scheme?
18 List out the drawbacks of mediation device protocol
19 Explain about the wake up radio concept in WSN
20 What are the two channels used in PAMAS protocol. Explain.
UNIT-3
PART – B
1. What is S-MAC protocol in WSN. Explain with neat diagram. (13)
2. Interpret the concept of the mediation device protocol with neat diagram. (13)
3. Outline the requirements and design considerations for MAC protocol in wireless (13)
sensor network and write short notes on advantages and disadvantages of
scheduled based protocols.
4. Summarize the operation of LEACH protocol (13)
5. Explore the issues in designing a transport layer protocol for ad hoc wireless (13)
networks
6. (i) Analyse the energy efficient routing protocol.
(ii) Exhibit the features of the IEEE 802.15.4 MAC protocol
7. Discuss about the importance of the Mediation device protocols with relevant
diagrams in wireless sensor networks.
8. Analyse the LEACH routing with the help of neat diagram, Give its advantages
and disadvantages
9. (i) Assess the working principle of CSMA protocol used in 802.15.4 for medium
access in WSN with the help of state diagram.
(ii) Summarize the requirements and design considerationsfor a MAC protocol in
wireless sensor network.
10 Discuss about three phases of SMAC protocol
.
11 List and describe the characteristics of the IEEE 802.15.4 protocol. How
. does IEEE 802.15.4 enable low-power, low-data-rate wireless
communication?
12 Describe about the low duty cycle protocols and explain any low duty cycle
. protocol.
13 Explain the significance of mediation device protocols in wireless sensor
. networks (WSNs). Include relevant diagrams to illustrate how mediation
devices enhancing their efficiency and functionality.
14 Explore the concept of clustering within the LEACH (Low Energy Adaptive
. Clustering Hierarchy) protocol. How does LEACH utilize clustering to
optimize energy efficiency and extend the lifetime of nodes in wireless
sensor networks (WSNs)?
15 Describe the dual-channel communication approach employed by the
. PAMAS (Power Aware Multi-Access protocol with Signalling) protocol
and its features.
PART – C

1. A small town wants to establish an environmental monitoring system to keep track (15)
of pollution levels in different areas. They plan to use wireless sensor nodes and
the LEACH routing protocol for data collection.
How can the LEACH routing protocol be applied to efficiently gather pollution
data from various sensor nodes spread across the town? Explain the concept of
clustering, the role of cluster heads, and how LEACH helps conserve energy in
this environmental monitoring scenario.
2. What does the S-MAC protocol entail in the context of Wireless Sensor Networks (15)
(WSNs)? explain its functionality accompanied by a neat diagram
3. Explain how the scheduled based MAC protocol differs from the contention based (15)
MAC protocol.
4. Discuss about the importance of the Mediation device protocols with relevant (15)
diagrams in wireless sensor networks.
5. Discuss the concept of low-duty-cycle protocols in wireless communication (15)
and describe a specific example of a low-duty-cycle protocol used in
wireless sensor networks (WSNs)

**********

UNIT-4 (Title)
PART A
1. What are the requirements of a security protocol for ad hoc wireless networks?
2. List out the characteristics causes difficulty in providing security in ad hoc wireless networks

3. Give the classification of attacks in different layers

4. What are the differences between passive and active attack?

5. What is called Wormhole attack?


6. What is Blackhole attack?
7. List the various types of routing attacks
8. What is the effect of Routing table poisoning?
9. Write in detail about Session hijacking?

10 What is called Jamming and how it is overcomed?


.
11 What are the different network layer attacks

12 What is cryptography?
13 What are the two types of cryptography?
14 What are the types of symmetric key algorithm?

15 What is called Block ciphers?


16 Explain block cipher and stream cipher
17 what is assymetric key algorithm?

18 What is SPINS?

19 What are the two main modules of SPINS?


20 What are the different active attacks?
UNIT-4
PART – B
1. Discuss about the different types of security attacks with suitable parameters. (13)
2. (i) Explain how the security can be improved by minimizing the attacks in sensor (13)
networks
(ii) Assess the challenges in security provisioning

3. List the possible solutions to mitigate the denial-of-service attacks in sensor (13)
networks and explain how it improves the performance of the system.

4. Compile the various issues in security provisioning in WSN and also write about (13)
the solutions to avoid it.
5. Write the layer wise attacks in wireless Sensor networks and explain its impact on (13)
networks.
6. Explain about Jamming and write the possible solutions for jamming in WSN.
7. List the types of transport layer attacks and explain about its impacts on security
provisioning.
8. What are the different network layer attacks ad transport layer attacks. Explain in
detail
9. Identify the Key management schemes in Wireless Sensor Networks. Illustrate the
key distribution and management mechanism required for secure communication
in sensor networks.
10 Analyze about the application layer attacks and its countermeasures in wireless
. sensor networks in detail.
11 Assess how the SPIN protocol provides authenticated broadcast for resource-
. constrained environments.
12 Determine the impact of the following security threats in WSN :
. (i) Black hole attack
(ii) Wormhole attack

13 Compare and contrast symmetric and asymmetric key management


. algorithms in the context of cryptography.
14 Describe the principles of symmetric key management in cryptography.
. Provide examples of symmetric encryption algorithms in securing data and
communication.
15 Discuss the role of cryptographic protocols and key management in
. mitigating attacks.
PART – C

1. Generalize the active and passive attacks with suitable examples. Also explain (15)
how these attacks differ from each other.
2. Evaluate how the jamming and tampering affects the functional characteristics of (15)
wireless sensor networks in real time environment.
3. Elaborate how the network layer attacks degrades the performance of an end-to- (15)
end communication in WSN and also discuss about the reliability bottleneck of the
network.
4. Describe the importance of security protocols for sensor networks. also explain (15)
about the building blocks of SPINS protocols in security provisioning
5. Define the field of cryptography and explain the classifications. How does (15)
cryptography help protect data confidentiality, integrity, and authenticity in
wireless sensor networks.

**********

UNIT-5 (Title)
PART A
1. Why the Berkeley motes gain wide popularity in the sensor network research community?
2. Give the uses of operating system in sensor networks
3. What are the characteristics of TinyOS?
4. What are the two context of TinyOS?

5. What are the three groups of Sensor node hardware?


6. List the examples of Augmented general-purpose computers
7. List the examples of Dedicated embedded sensor nodes
8. List the transmission features of MICA Mote
9. How the sensor nodes are organized in WSN?
10 Give in detail about the power consumption of MICA Mote?
.
11 What are the components of Node Level Simulator?
12 What parameters can be observed using Visualization tool?

13 What are the two extensions of NS-2 Simulator for Sensor Networks?
14 List the features of Sensor Sim?
15 List the features of NS2

16 List the features of TOSSIM


17 What are the advantages of TinyOS?
18 What are the disadvantages of TinyOS?
19 What is the function of Timer Component and its interfaces?
20 Briefly explain sensor node model
UNIT-5
PART – B
1. Define sensor node hardware and explain in detail about three categories of (13)
sensor node hardware with examples.
2. Summarize about the characteristics of embedded sensor nodes family with the (13)
help of MICA note architecture.
3. (i)List the drawbacks of traditional programming technologies in sensor network (13)
design.
(ii) What are the challenges of sensor network programming

4. Explain about the node level programming tools with examples. (13)
5. (i) Discuss about the interface and configuration of nesC language. (13)
(ii) Justify that nesC supports the components and applications of TinyOS.
6. Describe the components and implementation models of Timer functions in nesC. (13)
7. Analyze the characteristics and components of node-level simulator with (13)
necessary functions.
8. Examine how an open-source network simulator can be used to simulate (13)
wireless/mobile networks and sensor networks.
9. Point out the components of node level simulators. (13)
10 Describe the following simulators used in wireless sensor networks: (13)
. (i) ns-2 simulator
(ii) TOSSIM simulator

11 Provide an overview of node simulators used in wireless sensor networks (WSNs).


. What is the purpose of these simulators, Explain with an example
12 Explain the challenges in Sensor network programming
.
13 Describe the key features of NesC in the context of wireless sensor
. networks (WSNs).
14 Explain the sensor network extensions in NS2 smulator.
.
15 . Explain in detail about state centric Programming
.
PART – C

1. Illustrate the traditional embedded system programming interface with neat (15)
diagram and also explain the characteristics of sensor network programming with
its challenges.
2. Evaluate the layers of operating system TinyOS that supports sensor network (15)
applications on Berkeley motes hardware platforms and demonstrate its Field
Monitor application for sensing and sending measurements.
3. Describe about the execution models of Node-Level Simulators. Formulate the (15)
characteristics of cycle-driven and discrete-event simulators In terms of timing
behavior.
4. Explain about TOSSIM Simulator and COOJA simulator (15)
5. Discuss the significance of node simulators in the context of wireless sensor (15)
networks (WSNs).provide an example to illustrate their importance.

You might also like