Professional Documents
Culture Documents
>>> UNIT 1
1. List design goals of WLANs ?
Ans. The following are some of the goals which have to be achieved while designing WLANs −
A) Operational simplicity − Design of wireless LANS must incorporate features to enable a mobile user to
quickly set up and access network services in a simple and efficient manner.
B) Power efficient operation − The power-constrained nature of mobile computing devices such as laptops
and PDAs necessitates the important requirement of WLANs operating with minimal power consumption.
Therefore, the design of WLAN must incorporate power-saving features and use appropriate technologies
and protocols to achieve this.
C) License-free operation − One of the major factors that affects the cost of wireless access is the license
fee for the spectrum in which a particular wireless access technology operates. Low cost of access is an
important aspect for popularizing a WLAN technology. Hence the design of WLAN should consider the
parts of the frequency spectrum. For its operation which does not require an explicit
D) Tolerance to interference − The proliferation of different wireless networking technologies both for
civilian and military applications have led to a significant increase in the interference level across the radio
spectrum.
The WLAN design should account for this and take appropriate measures by way of selecting technologies
and protocols to operate in the presence of interference.
E) Global Usability − The design of the WLAN, the choice of technology, and the selection of the operating
frequency spectrum should take into account the prevailing spectrum restriction in countries across the
world. This ensures the acceptability of the technology across the world.
F) Security − The inherent broadcast nature of wireless medium adds to the requirement of security features
to be included in the design of WLAN technology.
G) Safety requirements − The design of WLAN technology should follow the safety requirements that can
be classified into the following.
H) Quality of service requirements − Quality of Service (QoS) refers to the provisioning of designated
levels of performance for multimedia traffic. The design of WLAN should take into consideration the
possibility of supporting a wide variety of traffic, including multimedia traffic.
I) Compatibility with other technologies and applications − The interoperability among different LANS is
important for efficient communication between hosts operating with different LAN technologies.
2. List out the differences between IEEE 802.11 and IEEE 802.16. ?
3. Discuss in detail about various multiple access techniques ?
4. Illustrate the basics of Wireless WAN & Wireless MAN ?
5. Explain the physical layer and transceiver design considerations in wireless networks
6. Illustrate modulation techniques in a wireless channel. ?
7. What is the wavelength of a signal with a frequency of 150 Mhz?
8. Based on your understanding of the Bluetooth protocol stack, suggest a possible implementation of FTP
over Bluetooth without using TCP/IP.
9. Draw the pictographic view of Electro-magnetic spectrum.
10. Explain about topologies of PANs. ?
11. What is a MANET? Discuss important characteristic of MANETs.
12. Discuss the 4 different types of controllers ?
13. In Wireless Sensor Networks, state the three types of Mobility ?
14. Write a short note on 4 aspects of optimization goals,
15. State the reasons why gateways are needed in WSN. ?
16. State the applications of Wireless Sensor Networks. ?
>>> UNIT 2
17. Explain about mobile adhoc network with a neat diagram?
18. Discuss on Issues and Challenges in Designing a Sensor Networks?
19. What are the characteristics of an ideal routing-protocol for Adhoc networks?
20. What is a gateway? State its advantages and disadvantages.
21. State the fundamental tasks of Address Management in WSN.
22. Write about the operational states of a sensor node
23. Briefly discuss various issues in Ad-hoc wireless networks.
24. Write a short note on ADHOC wireless Internet.
25. Compare MANET and WSN
26. Differentiate between active and passive sensors.
27. Write a short note on Self Organizing MAC for Sensor Networks (SMACS)
28. Explain feasibility of using TCP/UDP for WSN
29. Explain SPIN.
30. What is Low Energy Adaptive Clustering Hierarchy (LEACH)?
31. Explain in brief any 5 common MAC protocols used in WSN.
32. Explain different routing strategies of routing.
>>> UNIT 3.
33. Explain the steps of Spread Spectrum.
34. Explain directional busy-tone-based MAC protocol in detail.
35. Write short note on TETRA. ?
36. Elaborate on the requirements of MAC protocols for WSNs.
37. Explain in detail the programming challenges and state-centric programming in sensor networks.
38. What are the advantages and disadvantages of MAC protocols using directional antennas? What are the
disadvantages of the BTMA protocol? How are they overcome in the DBTMA protocol?
39. Explain Wireless Sensor Network Taxonomy and Trends in Details ?
40. Discuss about the Contention Based MAC Protocols with Scheduling Mechanisms. ?
41. What are the different applications of mobile communication?
42. Explain the Telecommunication, Satellite and Broadcast system. ?
43. What are the advantages and disadvantages of cellular systems?
44. Write short note on Signal Propagation
45. What are the different features of GSM? Explain any 2 ?
46. Explain system architecture of DECT ?
47. Explain Multiplexing in mobile communication brief. ?
48. What is LEO, MEO and GEO? ?
---------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------
>>> UNIT 1
1. What is the innovative characteristic of cloud computing? What is the major advantage of cloud
computing?
2. Which are the technologies on which cloud computing relies?
3. Provide a brief characterization of a distributed system.
4. Define cloud computing and identify its core features.
5. What are the major distributed computing technologies that led to cloud computing?
6. What is virtualization?
7. What is the major revolution introduced by Web2.0? Give some examples of 0 applications.
8. Discuss about Models for Inter-process communications.
9. Describe the main characteristics of a service orientation.
10. What is utility computing? 11. Describe the vision introduced by cloud computing.
12. Briefly summarize the Cloud Computing Reference Model.
13. Briefly summarize the challenges still open in cloud computing.
14. What is the difference between parallel and distributed computing?
15. What is a distributed system? What are the components that characterize it?
16. What are the different types of clouds?
>>> UNIT 2
>>> UNIT 3
---------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------
>>> UNIT 1
>>> UNIT 2
17. Explain the term: (a) Thresholding (b) Log Transformation (c) Negative Transformation (d) Contrast
stretching (e) Grey level slicing.
18. Explain the terms: (a)Smoothing (b) Sharpening
19. Explain Dilation and Erosion and explain how opening and closing are related with them.
20. What is Structuring Element? What is the use of it in morphological operation?
21. Write a note on image enhancement using spatial filters.
22 What is histogram of an image? Compare between histogram equalization and histogram matching.
23. Write a note on weighted average filters. Give example.
24. What are high boost filters? How are they used? Explain.
25. What is dilation and erosion of and erosion of an image? State its applications
26. Two images have the same histogram. Which of the following properties must they have in cannon? (i)
Same total power()Same entropy. (ii) same inter pixel covariance function.
27. What will we obtain if the arithmetic mean filter is applied to an image again and again ? what will
happen if we use the median filter instead?
28. List and explain five arithmetic operations along with their mathematical representation.
29. Explain Homomorphic filter along with Block diagram of homomprphk filtering.
30. Explain two types of classification of Color-Quantization Techniques.
31. List any five color models and Explain any two in details.
32. Write a short note on HSI color model.
>>> UNIT 3
---------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------
>>> UNIT 1
>>> UNIT 2
>>> UNIT 3
---------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------
>>> UNIT 1
1. What is Information Security? Explain Asset Risk, Threat, Vulnerability with respect to InfoSec.
2. Write a short note on Security, Functionality, and Ease of Use Triangle.
3. What is Access control in security? Explain identification, authentication, and authorization with respect
of Access control.
4. Write a short note on CIA triad.
5. What is malware? Explain Worms and Trojan with suitable example.
6. What is malware? Explain in brief concept of Virus.
7. What is an attack? Explain in brief rootkit attack.
8. Explain in brief about Attacks and Attack Surface.
9. What is OWASP Top 10? Explain in brief any one of the Ten Most Critical Web Application Security.
10. Write a short note on CVE Database.
11. Explain the following terms:
1. Keystroke Logging
2. Denial of Service (DoS /DDoS)
3. Brute force
4. Phishing and fake WAP
5. Eavesdropping
12. Explain the following terms:
1. Man-in-the-middle
2. Session Hijacking
3. Cookie Theft
4. Buffer Overflow
5. Identity Theft
13. Explain the following terms:
1. Waterhole attack
2. Clickjacking
3. URL Obfuscation
4. IoT Attacks
5. Equifax
14. What are BOTs and BOTNETs?
15. Write a short note on CSRF.
16. Explain in brief the following recent cyber attacks:
1. WannaCry
2. JP Morgan Chase
3. Uber
4. eBay
5. Yahoo
>>> UNIT 2
>>> UNIT 3
33. Compare Windows and Linux operating systems on the basis of following point:
a) Customizable.
b) Security.
c) Efficiency
34. What is Smurf Attack?
35. Write a short note on MAC Flooding.
36. Write a short note on MAC Spoofing.
37. Write a short note on Event Logs alteration.
38. What is privilege escalation? What are its types? Explain. How system can be protected against
privilege escalation?
39. Explain SMTP or Email based attacks in detail.
40. What are VOIP vulnerabilities? Explain any five.
41. Write a short note on reverse engineering.
42. Explain IDS/IPS.
43. Explain ARP poisoning.
44. What is ARP poisoning? What are the threats due to ARP poisoning? How can we defend against ARP
poisoning?
45. Write a short note on System Hacking.
46. Explain Steganography in detail.
47. What is WEP Vulnerabilities?
48. What is a password cracker? Explain various steps involved in cracking a password.
49. What is password cracking? What are the password cracking countermeasures?
50. Write a note on Gaining and Maintaining Access phase.
51. Write a note on Covering your tracks phase.
52. List and explain any 5 OWASP Secure Coding Guidelines.