You are on page 1of 8

Subject: Wireless Sensor Networks

>>> UNIT 1
1. List design goals of WLANs ?
Ans. The following are some of the goals which have to be achieved while designing WLANs −

A) Operational simplicity − Design of wireless LANS must incorporate features to enable a mobile user to
quickly set up and access network services in a simple and efficient manner.

B) Power efficient operation − The power-constrained nature of mobile computing devices such as laptops
and PDAs necessitates the important requirement of WLANs operating with minimal power consumption.
Therefore, the design of WLAN must incorporate power-saving features and use appropriate technologies
and protocols to achieve this.

C) License-free operation − One of the major factors that affects the cost of wireless access is the license
fee for the spectrum in which a particular wireless access technology operates. Low cost of access is an
important aspect for popularizing a WLAN technology. Hence the design of WLAN should consider the
parts of the frequency spectrum. For its operation which does not require an explicit

D) Tolerance to interference − The proliferation of different wireless networking technologies both for
civilian and military applications have led to a significant increase in the interference level across the radio
spectrum.

The WLAN design should account for this and take appropriate measures by way of selecting technologies
and protocols to operate in the presence of interference.

E) Global Usability − The design of the WLAN, the choice of technology, and the selection of the operating
frequency spectrum should take into account the prevailing spectrum restriction in countries across the
world. This ensures the acceptability of the technology across the world.

F) Security − The inherent broadcast nature of wireless medium adds to the requirement of security features
to be included in the design of WLAN technology.

G) Safety requirements − The design of WLAN technology should follow the safety requirements that can
be classified into the following.

Interference to medical and other instrumentation devices.


Increased power level of transmitters that can lead to health hazards.
A well-designed WLAN should follow the power emission restrictions that are applicable in the given
frequency spectrum.

H) Quality of service requirements − Quality of Service (QoS) refers to the provisioning of designated
levels of performance for multimedia traffic. The design of WLAN should take into consideration the
possibility of supporting a wide variety of traffic, including multimedia traffic.

I) Compatibility with other technologies and applications − The interoperability among different LANS is
important for efficient communication between hosts operating with different LAN technologies.

2. List out the differences between IEEE 802.11 and IEEE 802.16. ?
3. Discuss in detail about various multiple access techniques ?
4. Illustrate the basics of Wireless WAN & Wireless MAN ?
5. Explain the physical layer and transceiver design considerations in wireless networks
6. Illustrate modulation techniques in a wireless channel. ?
7. What is the wavelength of a signal with a frequency of 150 Mhz?
8. Based on your understanding of the Bluetooth protocol stack, suggest a possible implementation of FTP
over Bluetooth without using TCP/IP.
9. Draw the pictographic view of Electro-magnetic spectrum.
10. Explain about topologies of PANs. ?
11. What is a MANET? Discuss important characteristic of MANETs.
12. Discuss the 4 different types of controllers ?
13. In Wireless Sensor Networks, state the three types of Mobility ?
14. Write a short note on 4 aspects of optimization goals,
15. State the reasons why gateways are needed in WSN. ?
16. State the applications of Wireless Sensor Networks. ?

>>> UNIT 2
17. Explain about mobile adhoc network with a neat diagram?
18. Discuss on Issues and Challenges in Designing a Sensor Networks?
19. What are the characteristics of an ideal routing-protocol for Adhoc networks?
20. What is a gateway? State its advantages and disadvantages.
21. State the fundamental tasks of Address Management in WSN.
22. Write about the operational states of a sensor node
23. Briefly discuss various issues in Ad-hoc wireless networks.
24. Write a short note on ADHOC wireless Internet.
25. Compare MANET and WSN
26. Differentiate between active and passive sensors.
27. Write a short note on Self Organizing MAC for Sensor Networks (SMACS)
28. Explain feasibility of using TCP/UDP for WSN
29. Explain SPIN.
30. What is Low Energy Adaptive Clustering Hierarchy (LEACH)?
31. Explain in brief any 5 common MAC protocols used in WSN.
32. Explain different routing strategies of routing.

>>> UNIT 3.
33. Explain the steps of Spread Spectrum.
34. Explain directional busy-tone-based MAC protocol in detail.
35. Write short note on TETRA. ?
36. Elaborate on the requirements of MAC protocols for WSNs.
37. Explain in detail the programming challenges and state-centric programming in sensor networks.
38. What are the advantages and disadvantages of MAC protocols using directional antennas? What are the
disadvantages of the BTMA protocol? How are they overcome in the DBTMA protocol?
39. Explain Wireless Sensor Network Taxonomy and Trends in Details ?
40. Discuss about the Contention Based MAC Protocols with Scheduling Mechanisms. ?
41. What are the different applications of mobile communication?
42. Explain the Telecommunication, Satellite and Broadcast system. ?
43. What are the advantages and disadvantages of cellular systems?
44. Write short note on Signal Propagation
45. What are the different features of GSM? Explain any 2 ?
46. Explain system architecture of DECT ?
47. Explain Multiplexing in mobile communication brief. ?
48. What is LEO, MEO and GEO? ?

---------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------

Subject: Cloud Computing

>>> UNIT 1
1. What is the innovative characteristic of cloud computing? What is the major advantage of cloud
computing?
2. Which are the technologies on which cloud computing relies?
3. Provide a brief characterization of a distributed system.
4. Define cloud computing and identify its core features.
5. What are the major distributed computing technologies that led to cloud computing?
6. What is virtualization?
7. What is the major revolution introduced by Web2.0? Give some examples of 0 applications.
8. Discuss about Models for Inter-process communications.
9. Describe the main characteristics of a service orientation.
10. What is utility computing? 11. Describe the vision introduced by cloud computing.
12. Briefly summarize the Cloud Computing Reference Model.
13. Briefly summarize the challenges still open in cloud computing.
14. What is the difference between parallel and distributed computing?
15. What is a distributed system? What are the components that characterize it?
16. What are the different types of clouds?

>>> UNIT 2

17. What is virtualization and what are its benefits?


18. What are the characteristics of virtualized environments?
19. Discuss classification or taxonomy of virtualization at different levels.
20. Discuss the machine reference model of execution virtualization.
21. What are hardware virtualization techniques?
22. List and discuss different types of virtualization.
23. What are the benefits of virtualization in the context of cloud computing?
24. What are the advantages and disadvantages of virtualization?
25. What are the fundamental components introduced in the cloud reference model?
26. Which are the basic components of an laaS-based solution for cloud computing?
27. Explain RPC in detail.
28. What kinds of needs are addressed by heterogeneous clouds?
29. Describe the fundamental features of the economic and business model behind cloud
30. List some of the challenges in cloud computing.
31. What does the acronym SaaS mean? How does it relate to cloud computing?
32. Write short note on services offered by AWS.

>>> UNIT 3

33. Explain the benefits of using OpenStack Cloud.


34. What are the key components of OpenStack?
35. List and explain the basic OpenStack operations tasks.
36. Explain the OpenStack Command Line Interface(CLI).
37. Explain Tenant network with suitable diagram.
38. Explain Quotas in OpenStack.
39. Explain Private cloud building blocks.
40. Explain Controller deployment in OpenStack.
41. Explain Networking deployment in OpenStack.
42. Explain Block Storage deployment in OpenStack.
43. Explain Heat orchestration in OpenStack.
44. Explain in detail about KVM.
45. Describe the different levels of parallelism that can be obtained in a computing system.
46. Write short note on middleware
47. Explain publish subscribe system
48. OpenStack is cloud operating system. "Justify"

---------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------

Subject: Digital Image Processing

>>> UNIT 1

1. Briefly describe fundamental steps in image processing.


2. Write down advantages and disadvantages of digital image.
3. List various image file formats. Explain any one in detail.
4. Explain 2D unit impulse sequence.
5. Write a note on separable and periodic sequence.
6. Write a note on classification of 2D systems.
7. What is need of transformation? Explain classification of image
8. Explain Fourier transform.
9. What are the applications of digital image processing?
10. How image is formed in Human eye?
11. Write a short note on Sampling and Quantization.
12. Explain the different types of connectivity of pixels with suitable example.
13. What are different fields where image processing is used?
14. Write a short note on DFT
15. Write a note on Walsh transform and its application in image
16. Explain image sampling and quantization.

>>> UNIT 2

17. Explain the term: (a) Thresholding (b) Log Transformation (c) Negative Transformation (d) Contrast
stretching (e) Grey level slicing.
18. Explain the terms: (a)Smoothing (b) Sharpening
19. Explain Dilation and Erosion and explain how opening and closing are related with them.
20. What is Structuring Element? What is the use of it in morphological operation?
21. Write a note on image enhancement using spatial filters.
22 What is histogram of an image? Compare between histogram equalization and histogram matching.
23. Write a note on weighted average filters. Give example.
24. What are high boost filters? How are they used? Explain.
25. What is dilation and erosion of and erosion of an image? State its applications
26. Two images have the same histogram. Which of the following properties must they have in cannon? (i)
Same total power()Same entropy. (ii) same inter pixel covariance function.
27. What will we obtain if the arithmetic mean filter is applied to an image again and again ? what will
happen if we use the median filter instead?
28. List and explain five arithmetic operations along with their mathematical representation.
29. Explain Homomorphic filter along with Block diagram of homomprphk filtering.
30. Explain two types of classification of Color-Quantization Techniques.
31. List any five color models and Explain any two in details.
32. Write a short note on HSI color model.

>>> UNIT 3

33. How is thresholding used in image segmentation?


34. Compare lossy and lossless image compression.
35. What do you mean by Image Segmentation?
36. Compare and contrast between inter pixel redundancy, coding redundancy and psycho- visual
redundancy.
37. Explain Huffman coding with suitable example.
38. Explain the method of edge linking using Hough transform.
39. Generate the Huffman code for the word COMMITTEE
40. Write a short note on region splitting.
41. Explain run length coding with suitable example.
42. Explain edge detection.
43. Explain image compression standards.
44. What is block processing? Explain in detail.
45. What is content-based image retrieval?
46. Give the following kernel (i)Sobel (ii)Prewitt (iii) Robert
47. Write a short note on Laplacian of Gaussian (LOG).
48. Explain the term Difference of Gaussians Filter (DoG)
49. Write down steps of Shannon-Fano coding.
50.Explain the JPEG compression with suitable block diagram.

---------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------

Subject: Information Retrieval

>>> UNIT 1

1. Identify the need of Information Retrieval.


2. Explain History of IR
3. Explain the issues and challenges in information retrieval.
4. Define and differentiate between precision and recall.
5. Explain the process of Indexing.
6. Explain any two open search engine frameworks for IR.
7. Explain the Need of Term Document Incidence Matrix.
8. Give any one example of term document incidence matrix and find incidence vectors.
9. Write note on edit distance.
10. How to process boolean queries?
11. Explain k-gram index for spelling correction.
12. Explain components of R
13. Explain forms of spelling correction.
14. Write note on binary tree.
15. Discuss about Peer to Peer Search.
16. Draw the inverted index for following:
Doc1-new home sales top forecast
Doc2-home sales rise in july
Doc3-increase in home sales in july
Doc4-july new home sales rise

>>> UNIT 2

17. Describe the main idea of Link Analysis.


18. Illustrate the web as a directed graph.
19. State the aim of question answering system.
20. Describe HITS Algorithm.
21. What is map reduce? Explain an example by considering a text file to explain its working.
22. Analyze the Collaborative filtering and challenges.
23. Give the concept of PAGE Ranking in detail.
24. Analyze how Handling Invisible Web is done.
25. Analyze the process of cross lingual retrieval.
26. How to enhance personalized web search?
27. Explain Markov chain.
28. Explain the challenges in cross lingual retrieval.
29. Explain hub and authorities.
30. Differentiate between Content based and Collaborative Filtering.
31. Categorize the modules of Hadoop Framework.
32. Explain anchor text and the web graph.

>>> UNIT 3

33. Express the basis of web search with a neat diagram.


34. What is Paid Placement?
35. What is meant by Search Engine Optimization?
36. List the need of Web Search Engine.
37. List the SPAM Techniques.
38. Describe in detail about XML Retrieval.
39. Discuss invisible web.
40. Define: CTR, CPC, Spam
41. State and explain the challenges in XML retrieval
42. Explain Text Centric Vs Data Centric XML.
43. DEFINE XML schema.
44. WRITE note on vector space model for XML retrieval.
45. WRITE note on evaluation of XML retrieval.
46. WRITE note on web size measurement.
47. WRITE note on index process and query process.
48. Define the following: cloaking, stopping, stemming.

---------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------

Subject: Ethical Hacking

>>> UNIT 1

1. What is Information Security? Explain Asset Risk, Threat, Vulnerability with respect to InfoSec.
2. Write a short note on Security, Functionality, and Ease of Use Triangle.
3. What is Access control in security? Explain identification, authentication, and authorization with respect
of Access control.
4. Write a short note on CIA triad.
5. What is malware? Explain Worms and Trojan with suitable example.
6. What is malware? Explain in brief concept of Virus.
7. What is an attack? Explain in brief rootkit attack.
8. Explain in brief about Attacks and Attack Surface.
9. What is OWASP Top 10? Explain in brief any one of the Ten Most Critical Web Application Security.
10. Write a short note on CVE Database.
11. Explain the following terms:
1. Keystroke Logging
2. Denial of Service (DoS /DDoS)
3. Brute force
4. Phishing and fake WAP
5. Eavesdropping
12. Explain the following terms:
1. Man-in-the-middle
2. Session Hijacking
3. Cookie Theft
4. Buffer Overflow
5. Identity Theft
13. Explain the following terms:
1. Waterhole attack
2. Clickjacking
3. URL Obfuscation
4. IoT Attacks
5. Equifax
14. What are BOTs and BOTNETs?
15. Write a short note on CSRF.
16. Explain in brief the following recent cyber attacks:
1. WannaCry
2. JP Morgan Chase
3. Uber
4. eBay
5. Yahoo

>>> UNIT 2

17. What is Ethical Hacking? Explain the types of hackers.


18. Explain Black/Gray/White Box Penetration Testing methods in detail.
19. Explain the need of Information Gathering in detail.
20. Write a short note on Crawling/Spidering with suitable example.
21. Explain the contents of a penetration testing report in detail with respect to ethical hacking.
22. Explain in detail the phases of hacking :
1. Reconnaissance
2. Footprinting
3. Enumeration
4. Scanning
5. Sniffing
23. Write a short note on Vulnerability Assessment and Penetration Testing.
24. Write a short note on security testing plan.
25. What is Footprinting? What countermeasures can be taken against footprinting?
26. Define the Term Footprinting. Explain how whois and traceroute is used in foot printing.
27. What is enumeration? What are the steps involved in performing enumeration?
28. What is Scanning? List and explain types of scanning performed.
29. State the difference between Manual and Automated Penetration Testing.
30. Why is Repeated Penetration Testing required? Explain in detail.
31. Write a short note on Authenticated Vs Unauthenticated Testing.
32. Explain the importance of Application Security Testing.
33. Explain the need of NDA
34. Explain the need of Compliance and Regulatory concerns.

>>> UNIT 3

33. Compare Windows and Linux operating systems on the basis of following point:
a) Customizable.
b) Security.
c) Efficiency
34. What is Smurf Attack?
35. Write a short note on MAC Flooding.
36. Write a short note on MAC Spoofing.
37. Write a short note on Event Logs alteration.
38. What is privilege escalation? What are its types? Explain. How system can be protected against
privilege escalation?
39. Explain SMTP or Email based attacks in detail.
40. What are VOIP vulnerabilities? Explain any five.
41. Write a short note on reverse engineering.
42. Explain IDS/IPS.
43. Explain ARP poisoning.
44. What is ARP poisoning? What are the threats due to ARP poisoning? How can we defend against ARP
poisoning?
45. Write a short note on System Hacking.
46. Explain Steganography in detail.
47. What is WEP Vulnerabilities?
48. What is a password cracker? Explain various steps involved in cracking a password.
49. What is password cracking? What are the password cracking countermeasures?
50. Write a note on Gaining and Maintaining Access phase.
51. Write a note on Covering your tracks phase.
52. List and explain any 5 OWASP Secure Coding Guidelines.

You might also like