You are on page 1of 1

Q6 Q6

www.jntuworld.com Q6 Q6 Q6
www.android.jntuworld.com Q6 Q6 Q6
www.jwjobs.net

Q6 Q6 Q6 Q6 Q6 Q6 R09
Q6 Q6
Code No: D7812
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD
M. Tech II SEMESTER EXAMINATION APRIL/MAY-2013
ADHOC AND SENSOR NETWORKS
(COMPUTER NETWORKS AND INFORMATION SECURITY)
Q6 Q6 Q6
Time: 3 hours Q6 Q6
Answer any FIVE questions
Q6
Max. Marks: 60 Q6 Q6
All questions carry equal marks
----

1.a) What are the characteristics of MANETs used for military applications?
Q6 Q6 Q6
Explain. Q6 Q6 Q6 Q6 Q6
b) What are challenges of ad-hoc wireless networks? How do we achieve

D
them?

Q6 Q6
2.a)
b)

3.a)
What are the advantages of multipoint relays?
Q6 Q6 Q6
R
Q6 L
Discuss the differences between proactive and reactive routing protocols.

Why is multicasting not considered as restricted broadcasting in


Q6 Q6
b)
c)
MANETs?

O
When would you prefer multiple unicast over core-based routing?
What is Geocasting? Discuss.
Q6 Q64.a)
b)
Q6 Q6

U W Q6
reliability to the application layer.
Q6 Q6
What are the pros and cons of assigning the responsibility of end-to-end

What are the major differences between ad-hoc wireless networks and
Q6

Q6 Q65.a)b) Q6 T
sensor networks?

N Q6
Give the functional Q6
components of Q6
a wireless sensor node. Q6 Q6

6.a)
J
What are the advantages of a clustered architecture over a layered
architecture in a sensor network?

What are the designs issues of MAC protocols used in wireless sensor
networks?
Q6 Q6 b) Q6 Q6 Q6 Q6 Q6
Explain how security provisioning in ad-hoc wireless networks different
from than in infrastructure based networks.
Q6
7.a) What are the various secure routing protocols for MANETs? Explain.
b) Explain the sensor network programming challenges.

Q6 Q68. Q6 Q6
Write short notes on Q6 Q6 Q6 Q6
a) Node-level simulators
b) Cooperation in MANETs
c) Sensor network hardware.
***** 
Q6 Q6 Q6 Q6 Q6 Q6 Q6 Q6

www.jntuworld.com

You might also like