0% found this document useful (0 votes)
60 views2 pages

Btech 8 Sem Pecs5407 Wireless Sensor Networks 2017

Uploaded by

Mukesh Bathre
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
60 views2 pages

Btech 8 Sem Pecs5407 Wireless Sensor Networks 2017

Uploaded by

Mukesh Bathre
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

www.bputonline.

com

Registration no:

Total Number of Pages: 2 B.Tech


PECS5407

8th Semester Regular / Back Examination 2016-17


WIRELESS SENSOR NETWORKS
BRANCH(s): AEIE, EIE, IEE
Time: 3 Hours
Max Marks: 70
Q.CODE: Z116
Answer Question No.1 which is compulsory and any five from the rest.
The figures in the right hand margin indicate marks.

bput question papers visit http://www.bputonline.com

Q1 Answer the following questions: (2 x 10)


a) Define and differentiate between homogenous and heterogeneous
deployment in wireless sensor network.
b) How random graph model is used to represent wireless sensor
network.
c) What is the minimal information required for coarse-grained
localization.
d) What are the empirical measurements required for RADAR?
e) What are the advantages of Contention-based MAC protocols over
Contention-free MAC protocols
f) Explain exposed node problem with suitable example.
g) Explain the different components of B-MAC protocol.
h) What data-forwarding interruption problem?
i) Define and differentiate between MOR and MER metrics.
j) Explain Pull versus push diffusion.

Q2 a) What is Black hole attack in wireless sensor network? (2)

b) Explain different types of data aggregation attacks in case of sensor (8)


networks with its corresponding countermeasures.

Q3 a) How linear parameter-based synchronization is used to provide the (5)


deterministic bounds on relative clock drift and offset between sender-
receiver synchronization.

b) How Echolocation technique is used for ordering the received radio (5)
signal strengths from different reference nodes as the basis for
localization.
1
Page
www.bputonline.com

Q4 a) Consider a remote deployment consisting of three sensor nodes A, B, (5)


C, and a gateway node D. The following set of stationary packet
reception probabilities (i.e. the probability that a packet is received
successfully) has been determined for each link from experimental
measurements: [A–B: 0.65, A–C: 0.95, A–D: 0.95, B–A: 0.90, B–C: 0.3,
B–D: 0.99, C–A: 0.95, C–B: 0.6, C–D: 0.3]. Assuming all traffic must
originate at the sources (A, B, C) and end at the gateway (D), explain
why a single-hop star topology is unsuitable for this deployment, and
suggest a topology that would be more suitable.
b) How cone-based topology control (CBTC) technique is used to provide (5)
the connectivity in the networks while keeping the power usage of each
node as small as possible.

Q5 a) What is the significance of network topology during deployment of (5)


sensors? Analyze the functionality and performance of two-tier
hierarchical cluster topology in comparison to other topology.
b) Describe the architecture of IEEE 802.15.4 MAC with neat diagram. (5)

Q6 a) Explain the forwarding routing mechanism for gradient broadcast (5)


routing protocol.
b) Explain how packets are routed using greedy perimeter stateless (5)
routing protocol (GPSR).

Q7 Explain different types of traditional approaches for time (10)


synchronization in wireless sensor network with suitable examples.

Q8 Write short answer on any TWO: (5 x 2)


a) TinySQL
b) Mobile Deployment
c) Angle of arrival (AoA)
d) S-MAC Protocol

bput question papers visit http://www.bputonline.com


2
Page

You might also like