TWO MARK QUESTIONS AND ANSWERS
1 more computers that are linked in order 1
d CDs), exchange files, or allow clocg, te
n a network may be linked through fie
es,
or infrared light beams.
1. Define network.
‘A network consists of two 0!
resources (such as printers an
communications. The computers 0)
telephone lines, radio waves, satellites,
Two very com
Local Area Network (LAN)
“Wide Area Network (WAN)
What is meant by wireless sensor networks?
Wireless sensor network refers to a group of spatially dispersed and dedicated
monitoring and recording the physical conditions of the environment
location. It measures environmental
mon types of networks include:
sensors for
and organizing the collected data at a central |
conditions like temperature, sound, humidity etc.
3. What is mobile adhoc network?
‘A wireless network that transmits from computer to computer instead of using
a central base station to which all computers must communicate, this peer“
peer mode of operation can greatly extend the distance of the wireless network.
It is a type of wireless network that can change locations and configure its
on the fly.Fr
| moe Merworks Introduction and Rowing Proteee
; als
SS Senso}
@ Battery operated Nodes Emenee?
(i) Limited wireless Communications
(iid) Reduced CO-ordination
(vi) Mobility of nodes
«Give applications of wireless Sensor networks?
(i) Area monitoring is a common application
(i) Environmental/earth monitoring
(iii) Forest fire detection
(iv) Air quality monitoring
(v) Industrial monitoring
6. Why wireless sensor networks is different from other networks?
The wireless communication are specifically wireless multihop
communication and also the name indicates the mobility of participating nodes
as a typical ingredicnt but other network are setup literally for a very specific
application.
1. What are the types of applications?
(@ Event detention
(ii) Periodic measurement
Gii) Function approximation and edge detection
(i) Tracking
8. What are the two basic challenges in mobile adhoc networks?
(®. The problem on reorganization of the network as nodes.
(i) The problem in handling the limited reach of wireless communication.
3. What is the function of routingp rotocols ? ,
The responsibilities of a routing protocol include exchanging the route
information; finding a feasible path to a destination based on criteria such as hop
length, minimum power required, and lifetime of the wireless link; gathering
information about the path breaks; mending the broken paths expending
minimum processing power and bandwidth; and utilizing minimum bandwidth.Ad hoe and Wireless Sensor yy
on,
(0. What is the role ‘multicasting?
1 of ;
important fo:
Multicasting plays an impo!
emergency
i etworks, namely, "
hey om in such an environment, rH ;
-multipoint and multipoint-to-multipoint Wing
le in the typical applications Of ag
search-and-rescue operation, Me
nodes form groups to ey
military communication. I
certain tasks that require point-to
and data communication.
11. What is meant by Security?
The security of communication in ad hoc wireless networks jg Vey
important, especially in military applications. The lack of any cent
coordination and shared wireless medium makes them more vulnerable o
attacks than wired networks. The attacks against ad hoc wireless Retworks
are generally classified into two types: passive and active attacks,
12. Define active attacks.
Passive attacks refer to the attempts made by malicious nodes to perceive the
nature of activities and to obtain information transacted in the network without
disrupting the operation.
13. Define passive attacks.
: Active attacks disrupt the operation of the network. Those active attacks that
n executed by nodes outside the network are called external attacks, and thos:
are performed by nodes belonging to the same network are called internal
Following are fet
portant dit
Attack differences between Active Attack and Passigre Neneors = lmeremucton and Roaring Protocols
=
gNo Key Active Attack Passive Attack
- ar
1, | Modification In Active Attack, In Passive Attack,
information is modified | information remain
unchanged
al
2. | Dangerous for Active Attack is Passive Attack is dangerous
dangerous for integrity | for Confidentiality
bel _| as well as availability
3. | Attention Attention is to be paid _ | Attention is to be paid on
| on detection prevention
| 4 | Impact on system | In Active Attack, In Passive Attack, system
| system is damaged has no impact
§. | Victim | Victim gets informed in | Victim does not get
active attack informed in passive attack. 4
6. | System Resources | System Resources can | System Resources are not
be changed inactive _| changed in passive attack
[attack J
15. List the Characteristics of an Ideal Routing Protocol for Ad Hoc Wireless
Networks.
A routing protocol for ad hoc wireless networks should have the following
characteristics:
1. It must be fully distributed, as centralized routing involves high control
overhead and hence is not scalable. Distributed routing is more fault
tolerant than centralized routing, which involves the risk of single point of
failure.
nodes.
It must be adaptive to frequent topology changes caused by the mobility of
Route computation and maintenance must involve a minimum number of
nodes. Each node in the network must have quick access to routes, that is,
minimum connection setup time is desired.‘Ad hoc and Wireless Sensor Nera
:
fe maintenance involves a huge a
ized, as global stat .
4, It must be localized, ge
propagation control overhead.
tes.
5, It must be loop-free and free from stale rout
The ber of packet collisions must be kept to a Tau by limit,
6. a Ie aia of broadcasts made by each node, The transmissions shou,
le num
reliable to reduce message loss and to prevent the occurrence of Stale
routes.
7. It must converge to optimal routes once the network topology becomes
stable. The convergence must be quick.
16. Define routing protocols. ;
Routing protocols specifies ow routers communicate with each other ig
distribute information that enables them to select routes between any two nodes
‘on a computer network. Routing algorithm determine the specific choice of
route. Each route has a prior knowledge only of networks attached to it directly.
17. What are the classification of Routing protocols?.
Routing protocols for ad hoc wireless networks can be classified into several
types based on different criteria. Same of the classifications, their properties, and
the basis of classifications are discussed below. The classification is not
mutually exclusive and some protocols fall in more than one class. The deviation
from the traditional. routing metrics and path-finding processes that a
employed in wired networks makes it worth further exploration in this direction
The routing protocols for ad hoc wireless networks can be broadly classified into
four categories based on
% Routing information update mechanism
% Use of temporal information for routing
Routing topology
% Utilization of specific resources
18. Define Wireless Mesh Networks,
% Wirel a
wae na orks are ad hoc wireless networks that are formed
Provide an alternate communication infrastructure for mobile of fixed4dtoc Networks - Introduction and Rowing Protocols
ee re Brrr ol
nodes/users, without the
Spectrum reuse constrai 7
of network planning of ¢ straints and the requirements
ellular networks,
¢ The mesh topology of Wireless mesh
paths for a data transfer session
in quick reconfi,
node failures,
networks provides many alternate
° between a source and destination, resulting
uration of the path when the existing path fails due to
Wireless mesh networks provide the most economical data transfer
capability coupled with the freedom of mobility. Since the infrastructure
built is in the form of small radio relaying devices fixed on the rooftops of
the houses in a residential zone.
19. Define Ad Hoc On-Demand Distance-Vector Routing Protocol.
* Ad hoc on-demand distance vector (AODV) routing protocol uses an
on-demand approach for finding routes, that is, a route is established only
when it is required by a source node for transmitting data packets. It
employs destination sequence numbers to identify the most recent path.
* However, in AODV, the source node and the intermediate nodes store the
next-hop information corresponding to each flow for data packet
transmission. In an on-demand routing protocol, the source node floods the
Route Request packet in the network when a route is not available for the
desired destination. It may obtain multiple routes to different destinations
from a single Route Request.
20, List the advantages and disadvantages of Ad Hoc On-Demand Distance-
Vector Routing Protocol.
Advantages:
% The main advantage of this protocol is that routes are established on
demand and destination sequence numbers are used to find the latest route
to the destination.
% The connection setup delay is less.
Disadvantages:
One of the disadvantages of this protocol is that intermediate nodes can
lead to inconsistent routes if the source sequence number is very old anda
+
Adl hoc and Wireless Sensor Netw,
the intermediate nodes have @ higher but not the latest destination
ie i
sequence number, thereby having stale entries,
‘Also multiple RouteReply packets in response to a single RouteRequest
packet can lead to heavy control overhead,
Another disadvantage of AODV is that the periodic beaconing leads tg
unnecessary bandwidth consumption.
21. Define Table-Driven Routing Protocols.
These protocols are extensions of the wired network routing protocols, They
maintain the global topology information in the form of tables at every node,
These tables are updated frequently in order to maintain consistent and accurate
network state information. some examples for the protocols that belong to this
category are
°
?
°
+
The destination sequenced distance-vector routing protocol (DSDV)
wireless routing protocol (WRP),
source-tree adaptive routing protocol (STAR), and
cluster-head gateway switch routing protocol(CGSR)
22. Define Destination Sequenced Distance-Vector Routing Protocol(DSDV).
+
The destination sequenced distance-vector routing protocol (DSDV) is
one of the first protocols proposed for ad hoc wireless networks. It is an
enhanced version of the distributed Bellman-Ford algorithm where each
node maintains a table that contains the shortest distance and the first node
on the shortest path to every other node in the network.
It incorpertes table updates with increasing sequence number tags t0
prevent loops, to counter the count-to-infinity problem, and for faster
convergence, As it is)a table-driven routing protocol, routes to all
destinations are teadily available at every node at all times.
The tables are exchanged between neighbour’s at regular intervals to keeP
an up-to-date view of the network topology, The tables are also forwarded
if a node observes a Significant change in local topology. The tble
updates are of two types: incremental updates and full dumps.jd Hoc Metworks + Introduction and Rowing Protocols
“ mm eeeeesSsSsSsSSsSC‘C‘CUS
23, List the advantages and disadvantages of DSDY.
Advantages :
The availability of routes to all destinations at all times implies that much
less delay is involved in the route setup process,
+ The mechanism of incremental updates with sequence number tags makes
the existing wired network Protocols adaptable to ad hoc wireless
networks. Hence, an existing wired network Protocol can be applied to
ad hoc wireless networks with many fewer modifications.
The updates are Propagated throughout the network in order to maintain an
up-to-date view of the network topology at all the nodes. The updates due
to broken links lead to a heavy control overhead during high mobility.
Disadvantages:
* Even a small network with high mobility or a large network with low
mobility can completely choke the available bandwidth. Hence, this
Protocol suffers from excessive control overhead that is proportional to the
number of nodes in the network and therefore is not scalable in ad hoc
wireless networks, which have limited bandwidth and whose topologies
are highly dynamic.
* Another disadvantage of DSDV is that in order to obtain information
about a particular destination node, a node has to wait for a table update
message initiated by the same destination node. This delay could result in
stale routing information at nodes. ,
4. What is the function of Transport Layer Protocols?
* The main objectives of the transport layer protocols include setting up and
maintaining end-to-end connections, reliable end-to-end delivery of data
Packets, flow control, and congestion control. There exist simple
connectionless transport layer protocols (e.g., UDP) which neither perform
flow control and congestion control nor provide reliable data transfer.
Such unreliable connectionless transport layer protocols do not take into
account the current network status such as congestion at the intermediateAd hoc'and Wireless Sensor Networks
links, the rate of collision, or other similar factors affecting the network
throughput. This behavior of the transport layer protocols increases the
contention of the already-choked wireless links.
> For example, in an ad hoc wireless network that employs a contention-
based MAC protocol, nodes in a high-contention region experience several
back off states, resulting in an increased number of collisions and a high
latency.
25. Define Quality of Service Provisioning.
Quality: of service (QoS) is the performance level of services offered bya
service provider or a network to the user. QoS provisioning often requires
negotiation between the host and the network, resource reservation
schemes, priority scheduling, and call admission control.
% Rendering QoS in ad hoc wireless networks can be on a per flow, per link,
or per node basis. In ad hoc wireless networks, the boundary between thé
service provider (network) and the user (host) is blurred, thus making it
essential to have better coordination among the hosts to achieve Qos.