Tagore Institute of Engineering and Technology: Question Bank
Tagore Institute of Engineering and Technology: Question Bank
Tagore Institute of Engineering and Technology: Question Bank
1
QUESTION BANK
Subject Code & Name : EC8702 & Ad Hoc and Wireless Sensor Networks
Department of ECE
TAGORE INSTITUTE OF ENGINEERING AND TECHNOLOGY
Deviyakurichi-636112, Attur (TK), Salem (DT). Website: www.tagoreiet.ac.in
Approved by AICTE, New Delhi and Affiliated to Anna University, Chennai
Accredited by NAAC
A wireless network uses radio waves as the sole medium for transmitting and receiving
data. There are no wires involved. 2
Radio waves are electromagnetic waves which are transverse in nature and they have
the longest wavelength on the electromagnetic spectrum.
Examples: Infrared, Bluetooth, WiFi.
Department of ECE
TAGORE INSTITUTE OF ENGINEERING AND TECHNOLOGY
Deviyakurichi-636112, Attur (TK), Salem (DT). Website: www.tagoreiet.ac.in
Approved by AICTE, New Delhi and Affiliated to Anna University, Chennai
Accredited by NAAC
Department of ECE
TAGORE INSTITUTE OF ENGINEERING AND TECHNOLOGY
Deviyakurichi-636112, Attur (TK), Salem (DT). Website: www.tagoreiet.ac.in
Approved by AICTE, New Delhi and Affiliated to Anna University, Chennai
Accredited by NAAC
Department of ECE
TAGORE INSTITUTE OF ENGINEERING AND TECHNOLOGY
Deviyakurichi-636112, Attur (TK), Salem (DT). Website: www.tagoreiet.ac.in
Approved by AICTE, New Delhi and Affiliated to Anna University, Chennai
Accredited by NAAC
The major activities that an ad hoc wireless network is required to perform for self-
organization are, 5
Neighbour discovery.
Topology organization.
Topology reorganization (updating topology information)
Department of ECE
TAGORE INSTITUTE OF ENGINEERING AND TECHNOLOGY
Deviyakurichi-636112, Attur (TK), Salem (DT). Website: www.tagoreiet.ac.in
Approved by AICTE, New Delhi and Affiliated to Anna University, Chennai
Accredited by NAAC
The state of operation.
The transmission power and 6
The technology used for the RF circuitry.
38. What are the issues in Designing a Routing Protocol for Ad Hoc Wireless
Networks?
The major challenges that a routing protocol designed for ad hoc wireless networks
faces are:
Mobility of nodes
Department of ECE
TAGORE INSTITUTE OF ENGINEERING AND TECHNOLOGY
Deviyakurichi-636112, Attur (TK), Salem (DT). Website: www.tagoreiet.ac.in
Approved by AICTE, New Delhi and Affiliated to Anna University, Chennai
Accredited by NAAC
Bandwidth Constraints
Error-Prone channel state 7
Hidden Terminal Problem
Exposed Terminal Problems
Resource Constraints
39. List any two Characteristics of an Ideal Routing Protocol for Ad Hoc Wireless
Networks.
It must be fully distributed as centralized routing involves high control overhead
and hence is not scalable.
It must be adaptive to frequent topology changes caused by the mobility of nodes.
PART-B
1. Explain the elements of Ad hoc Wireless Networks in detail.
2. Discuss the issues in Ad hoc wireless networks in detail.
3. Summarize some commercial applications of Ad hoc networking in detail.
4. Explain in detail about the importance of Ad hoc wireless Internet.
5. Discuss in detail about issues in designing a Routing Protocol for Ad Hoc Wireless
Networks.
6. Describe the Classification of Routing Protocols in detail.
7. Explain about Table Driven Routing Protocols in detail.
8. Discuss Destination Sequenced Distance Vector in detail.
9. Explain in detail about On–Demand Routing protocols.
10. Explain in detail about Ad hoc On–Demand Distance Vector Routing.
Department of ECE
TAGORE INSTITUTE OF ENGINEERING AND TECHNOLOGY
Deviyakurichi-636112, Attur (TK), Salem (DT). Website: www.tagoreiet.ac.in
Approved by AICTE, New Delhi and Affiliated to Anna University, Chennai
Accredited by NAAC
Department of ECE
TAGORE INSTITUTE OF ENGINEERING AND TECHNOLOGY
Deviyakurichi-636112, Attur (TK), Salem (DT). Website: www.tagoreiet.ac.in
Approved by AICTE, New Delhi and Affiliated to Anna University, Chennai
Accredited by NAAC
9
8. List the applications of WSN.
Internet of Things (IOT)
Surveillance and Monitoring for security, threat detection
Environmental temperature, humidity, and air pressure
Noise Level of the surrounding
Medical applications like patient monitoring
Agriculture
Landslide Detection
9. List the major issues and challenges that affect the design and performance of a
wireless sensor networks.
Energy Efficiency
Quality of Service
Security Issue
Deployment
Node Costs
Limited Bandwidth
11. What are the Enabling Technologies for Wireless Sensor Networks.
Hardware Design
Energy Consumption
Software
Routing protocols
Operating systems
12. What are the numerous applications of WSNs?
Military or Border Surveillance Applications
Environmental Applications
Health Care Applications
Home Intelligence
Industrial Process Control
Agriculture
Structural Monitoring
Department of ECE
TAGORE INSTITUTE OF ENGINEERING AND TECHNOLOGY
Deviyakurichi-636112, Attur (TK), Salem (DT). Website: www.tagoreiet.ac.in
Approved by AICTE, New Delhi and Affiliated to Anna University, Chennai
Accredited by NAAC
Power Supply Unit
10
14. List some of the characteristics Transceiver.
Service to upper layer
Power consumption and energy efficiency
Carrier frequency and multiple channels
State change times and energy
15. What are the various aspects of Power Supply Unit?
Storing Energy
Energy Scavenging
Department of ECE
TAGORE INSTITUTE OF ENGINEERING AND TECHNOLOGY
Deviyakurichi-636112, Attur (TK), Salem (DT). Website: www.tagoreiet.ac.in
Approved by AICTE, New Delhi and Affiliated to Anna University, Chennai
Accredited by NAAC
PART-B 11
1. Explain in detail about the components, characteristics and applications of WSN.
2. Describe in detail about Challenges for Wireless Sensor Networks.
3. Summarize the Enabling Technologies for Wireless Sensor Networks.
4. Explain Wireless Sensor Networks application with examples.
5. Describe in detail about network requires a device for sending and receiving
information over a wireless channel.
6. Summarize the Transceiver tasks and characteristics in detail.
7. Explain about Single-Node Architecture in detail with a neat diagram.
8. Describe the Hardware Components in detail.
9. Explain in detail about Energy Consumption of Sensor Nodes.
10. Describe about Network Architecture in detail.
11. Summarize various sensor network scenarios detail.
12. Explain Single-Hop versus Multi-Hop Networks.
13. Explain about different kinds of mobility in detail.
14. Explain about Consideration of Transceiver Design in detail.
15. Explain various Optimization Goals of WSN and Figures of Merit in detail.
16. Explain the most commonly considered aspects of energy efficiency in detail.
Department of ECE
TAGORE INSTITUTE OF ENGINEERING AND TECHNOLOGY
Deviyakurichi-636112, Attur (TK), Salem (DT). Website: www.tagoreiet.ac.in
Approved by AICTE, New Delhi and Affiliated to Anna University, Chennai
Accredited by NAAC
4. Define low duty cycle protocol.
The concept of a low duty cycle is represented as a periodic wake-up scheme. A 12
node wakes up periodically to transmit or receive packets from other nodes. Usually
after a node wakes up, it listens to the channel for any activity before transmitting or
receiving packets.
7. Define S-MAC.
The S-MAC (Sensor-MAC) protocol provides mechanisms to avoid idle listening,
collisions, and overhearing.
Department of ECE
TAGORE INSTITUTE OF ENGINEERING AND TECHNOLOGY
Deviyakurichi-636112, Attur (TK), Salem (DT). Website: www.tagoreiet.ac.in
Approved by AICTE, New Delhi and Affiliated to Anna University, Chennai
Accredited by NAAC
13. List the Applications of IEEE 802.15.4.
Wireless sensor networks 13
Home Automation
Home Networking
Connecting Devices to a PC
Home security, etc.
14. Define Flooding.
Flooding is a common technique frequently used for path discovery and
information dissemination in wired and wireless ad hoc networks. Flooding uses
a reactive approach whereby each node receiving a data or control packet sends
the packet to all its neighbours. After transmission, a packet follows all possible
paths. Unless the network is disconnected, the packet will eventually reach its
destination.
Department of ECE
TAGORE INSTITUTE OF ENGINEERING AND TECHNOLOGY
Deviyakurichi-636112, Attur (TK), Salem (DT). Website: www.tagoreiet.ac.in
Approved by AICTE, New Delhi and Affiliated to Anna University, Chennai
Accredited by NAAC
PART-B
1. Explain the basics of MAC Protocols also explain its characteristics and goals.
2. Describe the specific requirements and design considerations for MAC protocols in
wireless sensor networks.
3. Explain the basic idea of low duty cycle protocols in detail. Also explain the wakeup
concepts.
4. Explain about S-MAC schemes in detail.
5. Summarize the Network Allocation Vector (NAV) Approach in detail.
6. Explain about The Mediation Device Protocol in detail.
7. Describe about Power Aware Multi-Access with Signaling in detail.
8. Explain in detail about schedule Based Protocols.
9. Describe about Low Energy Adaptive Clustering Hierarchy in detail.
10. Explain the Network Architecture and Types of IEEE 802.15.4 MAC.
11. Explain in detail about Routing Protocols.
12. Explain the design challenges in WSNs in detail.
13. Describe in detail about Energy Efficient Routing.
14. Explain the challenges and issues of Transport Layer Protocol in detail.
Department of ECE
TAGORE INSTITUTE OF ENGINEERING AND TECHNOLOGY
Deviyakurichi-636112, Attur (TK), Salem (DT). Website: www.tagoreiet.ac.in
Approved by AICTE, New Delhi and Affiliated to Anna University, Chennai
Accredited by NAAC
Availability
Self-Organization 15
Time synchronization
Source Localization
Scalability
3. List some issues of designing a new routing protocol for WSN security and privacy.
Node Mobility
Coverage Problem
Shared Broadcast Radio Channel
Insecure Operational Environment
Lack of Central Authority
Department of ECE
TAGORE INSTITUTE OF ENGINEERING AND TECHNOLOGY
Deviyakurichi-636112, Attur (TK), Salem (DT). Website: www.tagoreiet.ac.in
Approved by AICTE, New Delhi and Affiliated to Anna University, Chennai
Accredited by NAAC
Unfairness 16
Interrogation
Sybil Attack
10. Define Sybil Attack.
In this attack, a single node presents multiple identities to all other nodes in the WSN.
This may mislead other nodes, and hence routes believed to be disjoint with respect to
node can have the same adversary node.
A countermeasure to Sybil Attack is by using a unique shared symmetric key for each
node with the base station.
11. List the various Network Layer Attacks.
Sinkhole Attack
Hello Flood
Node Capture
Selective Forwarding/ Black Hole Attack
Wormhole Attacks
Replayed Routing Information
Misdirection
Homing
12. List the Transport layer Attacks.
Flooding
De-synchronization Attacks
13. List the various Application layer Attacks.
Overwhelm Attack
Path-based DOS Attack
Deluge (reprogram) Attack
14. What is Overwhelm Attack?
An attacker might attempt to overwhelm network nodes with sensor stimuli, causing
the network to forward large volumes of traffic to a base station. This attack consumes
network bandwidth and drains node energy.
Department of ECE
TAGORE INSTITUTE OF ENGINEERING AND TECHNOLOGY
Deviyakurichi-636112, Attur (TK), Salem (DT). Website: www.tagoreiet.ac.in
Approved by AICTE, New Delhi and Affiliated to Anna University, Chennai
Accredited by NAAC
Reactive Jammer
Reactive RTS/CTS jammer 17
Reactive Data/ACK jammer
Department of ECE
TAGORE INSTITUTE OF ENGINEERING AND TECHNOLOGY
Deviyakurichi-636112, Attur (TK), Salem (DT). Website: www.tagoreiet.ac.in
Approved by AICTE, New Delhi and Affiliated to Anna University, Chennai
Accredited by NAAC
PART-B
1. Explain about various Network Security Requirements in detail. 18
2. Summarize the issues and Challenges in Security Provisioning.
3. Describe about Network Security Attacks in detail.
4. Write notes on Host Based Vs Network Based attacks.
5. Explain the various Layer wise Attacks in Wireless Sensor Networks.
6. Write Short notes on Physical Layer Attacks.
7. Explain Data Link Layer Attacks in detail.
8. Explain about Network Layer Attacks in detail.
9. Write notes on Application layer Attacks.
10. Explain in detail about Jamming Attack and its Countermeasures.
11. Summarize the types of jammer in detail.
12. Explain about Tampering Attack and its Countermeasures.
13. Explain about Block Hole Attack and its Countermeasures.
14. Describe in detail about Flooding Attack and its Countermeasures.
15. Explain Key Distribution and Management in detail.
16. Explain about Symmetric key algorithms and asymmetric key algorithms.
17. Explain various Key Distribution (Management) Approaches in detail.
18. Describe about Secure Routing in Wireless Sensor Networks.
19.Explain the Requirements of a Secure Routing Protocol for Wireless Sensor Networks.
20. Explain in detail about Security Protocols for Sensor Networks.
21. Explain about Reliability Requirements in Sensor Networks.
Department of ECE
TAGORE INSTITUTE OF ENGINEERING AND TECHNOLOGY
Deviyakurichi-636112, Attur (TK), Salem (DT). Website: www.tagoreiet.ac.in
Approved by AICTE, New Delhi and Affiliated to Anna University, Chennai
Accredited by NAAC
Examples of SoC hardware include smart dust the BWRC picoradio node, and the
PASTA node. 19
5. Define Berkeley Motes.
Berkeley Mote platform as it is an open hardware/software, smart-sensing platform
with a large user community. The Berkeley Mote platform was developed under the
Networked Embedded Systems Technology (NEST) program with the quantitative
target of building dependable, real-time, distributed, embedded applications
comprising 100 to 100 000 simple computing nodes.
9. Define nesC.
nesC is a component-based, event-driven programming language used to build
applications for the TinyOS platform. TinyOS is an operating environment designed to
run on embedded devices used in distributed wireless sensor networks. The name nesC
is an abbreviation of “network embedded systems C”. nesC is an extension of C.
Department of ECE
TAGORE INSTITUTE OF ENGINEERING AND TECHNOLOGY
Deviyakurichi-636112, Attur (TK), Salem (DT). Website: www.tagoreiet.ac.in
Approved by AICTE, New Delhi and Affiliated to Anna University, Chennai
Accredited by NAAC
12. Define COOJA.
Cooja simulator is the efficient simulate wireless sensor networks. Cooja is the default 20
simulator of Contiki operating system that helps to simulate the wireless sensor
networks in addition it helps to do the performance evolution.
PART-B
1. Explain in detail about Sensor Node Hardware.
2. Describe in detail about Berkeley Motes.
3. Explain the Challenges of Sensor Network Programming in detail.
4. Write notes on Node-Level Software Platforms.
5. Summarize the various design issues of Operating System.
6. Explain about the Operating System: TinyOS in detail with a neat architecture.
7. Explain in detail about nesC.
8. Describe in detail about ContikiOS.
9. Explain in detail about Node-Level Simulators.
Department of ECE
TAGORE INSTITUTE OF ENGINEERING AND TECHNOLOGY
Deviyakurichi-636112, Attur (TK), Salem (DT). Website: www.tagoreiet.ac.in
Approved by AICTE, New Delhi and Affiliated to Anna University, Chennai
Accredited by NAAC
10. Write notes on network simulator execution models.
11. Explain in detail about NS2 and its Extension to Sensor Networks. 21
12. Explain about COOJA in detail.
13.Explain about TOSSIM (TinyOS Mote Simulator) in detail with a neat architecture.
14. Explain about Programming beyond Individual Nodes in detail.
15. Explain in detail about State Centric Programming.
Department of ECE