Professional Documents
Culture Documents
A411062700 - 18818 - 23 - 2020 - Ca3 Question Allotment Ke056
A411062700 - 18818 - 23 - 2020 - Ca3 Question Allotment Ke056
Q1 Discuss various CDMA identities with suitable example for each. Also, explain five main differences between GSM and CDMA by taking suitable examples
45 Q2 Differentiate between WEP Encryption and Decryption with suitable diagrams and Examples
Differentiate between International Mobile Security Identity and Temporary Mobile Subscriber Identity by taking suitable examples for each. Also,
Q3 Explain the call flow of mobile originated call and mobile terminated call flow in GSM. Rahul Kumar
Differentiate between random and planned deployment of nodes in the network. Justify why random deployment is preferred in case of wireless sensor
Q1 networks.
46
Q2 How MAC layer protocol works For the reduction of energy consumption ? Palavalasa Suresh
Q3 How authentication is important in security discuss with example? Explain WEP encryption with proper diagram. Babu
Q1 Elaborate FEC and ARQ methods for fault tolerance in ad hoc networks. Also highlight the factors for making choice between FEC and ARQ.
47 Q2 Explain the methods required to offer security in Wide area networks in detail along with their probable problems. Ummadisetty Jaya
Q3 What is the need of re-deployment or re-configuration of nodes in wireless sensor networks? Explain in detail. Venkata Sudheer
Q1 Differentiate between Cartesian routing and trajectory based forwarding techniques used in directional routing for WSN.
48 Q2 How confidentaility, integrity and authentication of a network can be maintained and safeguarded for various attacks.
Q3 Discuss secure protocol configuration and group communication in WSN with examples. Ashokraj K
Q1 Discuss the various mechanisms of deployment and configuration in wireless sensor networks.
49 Q2 Elaborate the complete security mechanism used for GSM and also explain the problems associated with GSM security.
Q3 Explain the methods required to offer security in wireless metropolitan area networks in detail along with their probable problems. Dhananjay Kumar
Q1 Elaborate the problems of sending separate messages to base station by a sensor node along with the possible solutions to overcome the problems.
50
Q2 Explain the methods required to offer security in wireless personal area networks in detail along with their probable problems.
Q3 Differentiate between uniform power Dissipation and sensor component power management in energy efficiency with example. Shashi Ranjan Kumar
Determine the situations in WSN, when sensor nodes become dead or faulty. Also discuss the mechanism of dealing with these dead and faulty nodes in
Q1 detail.
51
Q2 Discuss the types of attack on mobile and wireless security by specifying the type of service compromised.
Q3 Explain the methods required to offer security in wireless local area networks in detail along with their probable problems. Utkarsh Kumar
Routing in wireless sensor network differs from other types of network. Justify this statement by explaining the differences and the routing mechanism
Q1 followed by WSN.
52
Q2 Which IEEE standard supports security for local area networks? How Wired Equivalent Privacy method offers comparable security? Explain in detail.
Q3 How scalability and self configuration are related to each other in WSN. Explain in detail with example. Valeti Naveen
Q1 “Routing table is not a good option for WSN”. Justify this statement by further explaining the mechanism used for routing in WSN.
53 Q2 Discuss the security mechanisms opted by WPA. Also find out the disadvantage of using this security method.
Q3 What are the different types of security required in mobile and wireless secuirty. Explain the mechanism of providing security. Mohammad Ashar Khan
Q1 Differentiate between event driven and periodic sensor readings for routing. Also mention the applications that are apt for periodic sensor readings.
54
Q2 Discuss the various security modes of bluetooth along with the attacks possible on bluetooth.
Q3 “Energy Efficiency prolongs the lifetime of WSN”. How energy efficiency of a WSN can be maintained? Himanshu Singh Koshyari
Q1 What type of properties of a sensor network makes it different from adhoc and wireless network.
55 Q2 Explain the concept of Fault tolerance and ARQ.
Q3 Explain the problem with GSM security in detail. Prateek Gupta
Q1 How the sensors near the base station can retain the energy ?
56 Q2 How is it challenging to get advantages of wireless adhoc network
Q3 Explain WEP encryption and decryption in detail. Ram Achal Prajapati
Q1 Discuss the protocol based on taken passing chain based technique for data transmission. Explain with example
57 Q2 How duplicate message supression and comuunication scheduling helps in energy efficient communication. Kaggallu Anjaneya
Q3 How security is enabled in bluetooth network ? Swamy Wari Rohith
Q1 How clustering is beneficial in wireless sensor network. Which protocols use this approach?
58 Q2 what do you understand by Directed diffusion routing protocol and how it is different from other routing protocols ?
Q3 Briefely explain the IEEE 802.11 standard. Karanam Sriram
Q1 How group communication is more energy efficient in sensor based network ?
59 Q2 Explain the method Sensor component power management.
Q3 Define Piconet and multipoint in WPAN. Explain the security mechanism of WPAN with detail description of all the keys. Ankit Guleria
Q1 How is it challenging to get advantages of wireless adhoc network ?
60 Q2 Explain Bluetooth node states.
Q3 Discuss the protocol based onclustering technique for data transmission. Explain with example Sonali Rajhans
Q1 How MAC layer protocols enables the energy efficient communication in sensor network ?
61 Q2 Explain the four primary keys used in Bluetooth security in detail.
Q3 How hidden terminal problem is different from exposed terminal problem , explain with a scenario. Ankit Sharma
Q1 How protocols enables the energy efficient communication in sensor network ?
62 Q2 Explain IEEE802.16 security in detail.
Q3 Explain the concept of dual radio scheduling. Rishindra Mani Katiyar
Q1 Discuss the procedure of PEGASIS , also discuss its cons by using suitable diagrams
63 Q2 Define the term Master and slave in WPAN. Explain Bluetooth encryption and authentication process.
Q3 Define the term Master and slave in WPAN. Explain Bluetooth encryption and authentication process. Avikshit Saras
Q1 Explain about different types of random deployment with examples.
64 Q2 Explain trilateration method for localization in WSNs with example. Sabbasani Revanth
Q3 Explain wormhole attack and any two solutions. Sai Kumar Reddy
Q1 How drones help in random deployment ? Explain with an diagram.
65 Q2 How mobile beacon nodes help in localization?
Q3 Explain sybil attack and any two solutions. Shivam Kumar
Q1 Explain the SEKEN protocol fo WSNs. Use diagrams as necessary.
66 Q2 How RSSI bases localization works? Explain with a diagrams.
Q3 Which kind of security problems can exist in wireless body area networks? Harshit Agrawal
Q1 Explain various parameters that are related for reconfiguration.
67 Q2 Explain DV-hop localization for WSNs.
Q3 What is lightweight security ? How it is important for WPANs? Ritik Kumar Singh
Q1 Explain Triagnulation method in WSNs with example.
68 Q2 Explain APTEEN for WSNs.
Q3 What is zero-knowledge proof? How it is used for authentication in Wireless Body Area Networks? Anshika Singh
Q1 Explain the process of periodic sensor reading in a cold storage architecture. Use diagram.
69 Q2 Explain the process of Energy-Efficient Sensor Routing in WSNs.
Q3 What is perception layer in IoTs? How they are connected with WPAN? Give examples. Abhinabh Parida