You are on page 1of 9
TWO MARK QUESTIONS AND ANSWERS 1 more computers that are linked in order 1 d CDs), exchange files, or allow clocg, te n a network may be linked through fie es, or infrared light beams. 1. Define network. ‘A network consists of two 0! resources (such as printers an communications. The computers 0) telephone lines, radio waves, satellites, Two very com Local Area Network (LAN) “Wide Area Network (WAN) What is meant by wireless sensor networks? Wireless sensor network refers to a group of spatially dispersed and dedicated monitoring and recording the physical conditions of the environment location. It measures environmental mon types of networks include: sensors for and organizing the collected data at a central | conditions like temperature, sound, humidity etc. 3. What is mobile adhoc network? ‘A wireless network that transmits from computer to computer instead of using a central base station to which all computers must communicate, this peer“ peer mode of operation can greatly extend the distance of the wireless network. It is a type of wireless network that can change locations and configure its on the fly. Fr | moe Merworks Introduction and Rowing Proteee ; als SS Senso} @ Battery operated Nodes Emenee? (i) Limited wireless Communications (iid) Reduced CO-ordination (vi) Mobility of nodes «Give applications of wireless Sensor networks? (i) Area monitoring is a common application (i) Environmental/earth monitoring (iii) Forest fire detection (iv) Air quality monitoring (v) Industrial monitoring 6. Why wireless sensor networks is different from other networks? The wireless communication are specifically wireless multihop communication and also the name indicates the mobility of participating nodes as a typical ingredicnt but other network are setup literally for a very specific application. 1. What are the types of applications? (@ Event detention (ii) Periodic measurement Gii) Function approximation and edge detection (i) Tracking 8. What are the two basic challenges in mobile adhoc networks? (®. The problem on reorganization of the network as nodes. (i) The problem in handling the limited reach of wireless communication. 3. What is the function of routingp rotocols ? , The responsibilities of a routing protocol include exchanging the route information; finding a feasible path to a destination based on criteria such as hop length, minimum power required, and lifetime of the wireless link; gathering information about the path breaks; mending the broken paths expending minimum processing power and bandwidth; and utilizing minimum bandwidth. Ad hoe and Wireless Sensor yy on, (0. What is the role ‘multicasting? 1 of ; important fo: Multicasting plays an impo! emergency i etworks, namely, " hey om in such an environment, rH ; -multipoint and multipoint-to-multipoint Wing le in the typical applications Of ag search-and-rescue operation, Me nodes form groups to ey military communication. I certain tasks that require point-to and data communication. 11. What is meant by Security? The security of communication in ad hoc wireless networks jg Vey important, especially in military applications. The lack of any cent coordination and shared wireless medium makes them more vulnerable o attacks than wired networks. The attacks against ad hoc wireless Retworks are generally classified into two types: passive and active attacks, 12. Define active attacks. Passive attacks refer to the attempts made by malicious nodes to perceive the nature of activities and to obtain information transacted in the network without disrupting the operation. 13. Define passive attacks. : Active attacks disrupt the operation of the network. Those active attacks that n executed by nodes outside the network are called external attacks, and thos: are performed by nodes belonging to the same network are called internal Following are fet portant dit Attack differences between Active Attack and Passi gre Neneors = lmeremucton and Roaring Protocols = gNo Key Active Attack Passive Attack - ar 1, | Modification In Active Attack, In Passive Attack, information is modified | information remain unchanged al 2. | Dangerous for Active Attack is Passive Attack is dangerous dangerous for integrity | for Confidentiality bel _| as well as availability 3. | Attention Attention is to be paid _ | Attention is to be paid on | on detection prevention | 4 | Impact on system | In Active Attack, In Passive Attack, system | system is damaged has no impact §. | Victim | Victim gets informed in | Victim does not get active attack informed in passive attack. 4 6. | System Resources | System Resources can | System Resources are not be changed inactive _| changed in passive attack [attack J 15. List the Characteristics of an Ideal Routing Protocol for Ad Hoc Wireless Networks. A routing protocol for ad hoc wireless networks should have the following characteristics: 1. It must be fully distributed, as centralized routing involves high control overhead and hence is not scalable. Distributed routing is more fault tolerant than centralized routing, which involves the risk of single point of failure. nodes. It must be adaptive to frequent topology changes caused by the mobility of Route computation and maintenance must involve a minimum number of nodes. Each node in the network must have quick access to routes, that is, minimum connection setup time is desired. ‘Ad hoc and Wireless Sensor Nera : fe maintenance involves a huge a ized, as global stat . 4, It must be localized, ge propagation control overhead. tes. 5, It must be loop-free and free from stale rout The ber of packet collisions must be kept to a Tau by limit, 6. a Ie aia of broadcasts made by each node, The transmissions shou, le num reliable to reduce message loss and to prevent the occurrence of Stale routes. 7. It must converge to optimal routes once the network topology becomes stable. The convergence must be quick. 16. Define routing protocols. ; Routing protocols specifies ow routers communicate with each other ig distribute information that enables them to select routes between any two nodes ‘on a computer network. Routing algorithm determine the specific choice of route. Each route has a prior knowledge only of networks attached to it directly. 17. What are the classification of Routing protocols?. Routing protocols for ad hoc wireless networks can be classified into several types based on different criteria. Same of the classifications, their properties, and the basis of classifications are discussed below. The classification is not mutually exclusive and some protocols fall in more than one class. The deviation from the traditional. routing metrics and path-finding processes that a employed in wired networks makes it worth further exploration in this direction The routing protocols for ad hoc wireless networks can be broadly classified into four categories based on % Routing information update mechanism % Use of temporal information for routing Routing topology % Utilization of specific resources 18. Define Wireless Mesh Networks, % Wirel a wae na orks are ad hoc wireless networks that are formed Provide an alternate communication infrastructure for mobile of fixed 4dtoc Networks - Introduction and Rowing Protocols ee re Brrr ol nodes/users, without the Spectrum reuse constrai 7 of network planning of ¢ straints and the requirements ellular networks, ¢ The mesh topology of Wireless mesh paths for a data transfer session in quick reconfi, node failures, networks provides many alternate ° between a source and destination, resulting uration of the path when the existing path fails due to Wireless mesh networks provide the most economical data transfer capability coupled with the freedom of mobility. Since the infrastructure built is in the form of small radio relaying devices fixed on the rooftops of the houses in a residential zone. 19. Define Ad Hoc On-Demand Distance-Vector Routing Protocol. * Ad hoc on-demand distance vector (AODV) routing protocol uses an on-demand approach for finding routes, that is, a route is established only when it is required by a source node for transmitting data packets. It employs destination sequence numbers to identify the most recent path. * However, in AODV, the source node and the intermediate nodes store the next-hop information corresponding to each flow for data packet transmission. In an on-demand routing protocol, the source node floods the Route Request packet in the network when a route is not available for the desired destination. It may obtain multiple routes to different destinations from a single Route Request. 20, List the advantages and disadvantages of Ad Hoc On-Demand Distance- Vector Routing Protocol. Advantages: % The main advantage of this protocol is that routes are established on demand and destination sequence numbers are used to find the latest route to the destination. % The connection setup delay is less. Disadvantages: One of the disadvantages of this protocol is that intermediate nodes can lead to inconsistent routes if the source sequence number is very old and a + Adl hoc and Wireless Sensor Netw, the intermediate nodes have @ higher but not the latest destination ie i sequence number, thereby having stale entries, ‘Also multiple RouteReply packets in response to a single RouteRequest packet can lead to heavy control overhead, Another disadvantage of AODV is that the periodic beaconing leads tg unnecessary bandwidth consumption. 21. Define Table-Driven Routing Protocols. These protocols are extensions of the wired network routing protocols, They maintain the global topology information in the form of tables at every node, These tables are updated frequently in order to maintain consistent and accurate network state information. some examples for the protocols that belong to this category are ° ? ° + The destination sequenced distance-vector routing protocol (DSDV) wireless routing protocol (WRP), source-tree adaptive routing protocol (STAR), and cluster-head gateway switch routing protocol(CGSR) 22. Define Destination Sequenced Distance-Vector Routing Protocol(DSDV). + The destination sequenced distance-vector routing protocol (DSDV) is one of the first protocols proposed for ad hoc wireless networks. It is an enhanced version of the distributed Bellman-Ford algorithm where each node maintains a table that contains the shortest distance and the first node on the shortest path to every other node in the network. It incorpertes table updates with increasing sequence number tags t0 prevent loops, to counter the count-to-infinity problem, and for faster convergence, As it is)a table-driven routing protocol, routes to all destinations are teadily available at every node at all times. The tables are exchanged between neighbour’s at regular intervals to keeP an up-to-date view of the network topology, The tables are also forwarded if a node observes a Significant change in local topology. The tble updates are of two types: incremental updates and full dumps. jd Hoc Metworks + Introduction and Rowing Protocols “ mm eeeeesSsSsSsSSsSC‘C‘CUS 23, List the advantages and disadvantages of DSDY. Advantages : The availability of routes to all destinations at all times implies that much less delay is involved in the route setup process, + The mechanism of incremental updates with sequence number tags makes the existing wired network Protocols adaptable to ad hoc wireless networks. Hence, an existing wired network Protocol can be applied to ad hoc wireless networks with many fewer modifications. The updates are Propagated throughout the network in order to maintain an up-to-date view of the network topology at all the nodes. The updates due to broken links lead to a heavy control overhead during high mobility. Disadvantages: * Even a small network with high mobility or a large network with low mobility can completely choke the available bandwidth. Hence, this Protocol suffers from excessive control overhead that is proportional to the number of nodes in the network and therefore is not scalable in ad hoc wireless networks, which have limited bandwidth and whose topologies are highly dynamic. * Another disadvantage of DSDV is that in order to obtain information about a particular destination node, a node has to wait for a table update message initiated by the same destination node. This delay could result in stale routing information at nodes. , 4. What is the function of Transport Layer Protocols? * The main objectives of the transport layer protocols include setting up and maintaining end-to-end connections, reliable end-to-end delivery of data Packets, flow control, and congestion control. There exist simple connectionless transport layer protocols (e.g., UDP) which neither perform flow control and congestion control nor provide reliable data transfer. Such unreliable connectionless transport layer protocols do not take into account the current network status such as congestion at the intermediate Ad hoc'and Wireless Sensor Networks links, the rate of collision, or other similar factors affecting the network throughput. This behavior of the transport layer protocols increases the contention of the already-choked wireless links. > For example, in an ad hoc wireless network that employs a contention- based MAC protocol, nodes in a high-contention region experience several back off states, resulting in an increased number of collisions and a high latency. 25. Define Quality of Service Provisioning. Quality: of service (QoS) is the performance level of services offered bya service provider or a network to the user. QoS provisioning often requires negotiation between the host and the network, resource reservation schemes, priority scheduling, and call admission control. % Rendering QoS in ad hoc wireless networks can be on a per flow, per link, or per node basis. In ad hoc wireless networks, the boundary between thé service provider (network) and the user (host) is blurred, thus making it essential to have better coordination among the hosts to achieve Qos.

You might also like