You are on page 1of 27

JEPPIAAR NAGAR, CHENNAI – 600119

Department of Electronics & Communication Engineering

QUESTION BANK

EC8702– ADHOC AND WIRELESS SENSOR NETWORKS

IV Year/VII Semester ECE


Regulation – 2017 (Batch: 2019-2023)
Academic Year 2021 – 22

Prepared by

Mrs.R.Gracelin Sheeba, Assistant professor/ECE


Mrs. C. Anitha, Assistant Professor/ECE
DEPARTMENT OF ECE
EC8702 AD HOC AND WIRELESS SENSOR NETWORKS L T P C
3 0 0 3
OBJECTIVES:
The student should be made to:
 Learn Ad hoc network and Sensor Networkfundamentals
 Understand the different routingprotocols
 Have an in-depth knowledge on sensor network architecture and designissues
 Understand the transport layer and security issues possible in Ad hoc and Sensor networks
 Have an exposure to mote programming platforms andtools

UNIT I AD HOC NETWORKS – INTRODUCTION AND 9


ROUTING PROTOCOLS
Elements of Ad hoc Wireless Networks, Issues in Ad hoc wireless networks, Example commercial
applications of Ad hoc networking, Ad hoc wireless Internet, Issues in Designing a Routing Protocol
for Ad Hoc Wireless Networks, Classifications of Routing Protocols, Table Driven Routing Protocols -
Destination Sequenced Distance Vector (DSDV), On–Demand Routing protocols –Ad hoc On–
Demand Distance Vector Routing(AODV).

UNIT II SENSOR NETWORKS – INTRODUCTION & ARCHITECTURES 9


Challenges for Wireless Sensor Networks, Enabling Technologies for Wireless Sensor Networks,
WSN application examples, Single-Node Architecture - Hardware Components, Energy Consumption
of Sensor Nodes, Network Architecture - Sensor Network Scenarios, Transceiver Design
Considerations, Optimization Goals and Figures of Merit.

UNIT III WSN NETWORKING CONCEPTS AND PROTOCOLS 9


MAC Protocols for Wireless Sensor Networks, Low Duty Cycle Protocols And Wakeup Concepts - S-
MAC, The Mediation Device Protocol, Contention based protocols - PAMAS, Schedule based
protocols – LEACH, IEEE 802.15.4 MAC protocol, Routing Protocols- Energy Efficient Routing,
Challenges and Issues in Transport layerprotocol.

UNIT IV SENSOR NETWORK SECURITY 9


Network Security Requirements, Issues and Challenges in Security Provisioning, Network Security
Attacks, Layer wise attacks in wireless sensor networks, possible solutions for jamming, tampering,
black hole attack, flooding attack. Key Distribution and Management, Secure Routing – SPINS,
reliability requirements in sensor networks.

UNIT V SENSOR NETWORK PLATFORMS AND TOOLS 9


Sensor Node Hardware – Berkeley Motes, Programming Challenges, Node-level software platforms –
TinyOS, nesC, CONTIKIOS, Node-level Simulators – NS2 and its extension to sensor networks,
COOJA, TOSSIM, Programming beyond individual nodes – State centric programming.

TOTAL:45 PERIODS

OUTCOMES:
At the end of the course, the student would be able to:
 Know the basics of Ad hoc networks and Wireless SensorNetworks
 Apply this knowledge to identify the suitable routing algorithm based on the
network and userrequirement
 Apply the knowledge to identify appropriate physical and MAC layerprotocols
 Understand the transport layer and security issues possible in Ad hoc and
sensor networks.
 Be familiar with the OS used in Wireless Sensor Networks and build basicmodules

TEXT BOOKS:

C. Siva Ram Murthy and B. S. Manoj, ―Ad Hoc Wireless Networks Architectures and Protocols‖,
Prentice Hall, PTR, 2004. (UNIT I)
Holger Karl , Andreas willig, ―Protocol and Architecture for Wireless Sensor Networks‖,
John wiley publication, Jan 2006.(UNIT II-V)

REFERENCES:

Feng Zhao, Leonidas Guibas, ―Wireless Sensor Networks: an information processing approach‖,
Elsevier publication, 2004.
Charles E. Perkins, ―Ad Hoc Networking‖, Addison Wesley, 2000.
I.F. Akyildiz, W. Su, Sankarasubramaniam, E. Cayirci, ―Wireless sensor networks: a survey‖,
computer networks, Elsevier, 2002, 394 - 422.
EC8702– ADHOC AND WIRELESS SENSOR NETWORKS
UNIT I AD HOC NETWORKS – INTRODUCTION AND ROUTING PROTOCOLS

PART A QUESTIONS

1. What is an ad hocnetwork?
An ad hoc network is a multihop, infrastructure less network which has no
centralized server to control the communication between the nodes and resources
cannot be reserved beforehand. It is used in battlefields and military applications.
2.Why are ad hocnetworksneeded?
Ad hoc networking is often needed where an infrastructure network cannot be
deployed and managed. The presence of dynamic and adaptive routing protocols
enables quick formation of ad hoc networks and is suitable for emergency situations
like natural disasters, spontaneous meetings or military conflicts.
3.List the applications of ad hoc networks.
Ad hoc networks are widely used in
a. Military applications andbattlefields
b. Collaborative and distributedcomputing
c. Emergency search and rescueoperations
d. Wireless sensor and meshnetworks
4.What are the challenging issues in ad hocnetworkmaintenance?
The challenging issues in ad hoc network are
a) Medium accessscheme
b) Routing
c) Multicastrouting
d) Transport layerprotocol
e) PricingSchemes
f) Quality of ServiceProvisioning
g) Self-Organization
h) Security
i) Addressing and ServiceDiscovery
j) EnergyManagement
k) Scalability
l) Deploymentconsiderations

5.What is fading? List the different types offading.


Fading refers to the fluctuations in signal strength, when received at the receiver.
It occurs due to multipathpropagation.
The different types of fading are
1. Slow/long termfading
2. Fast/short termfading

6.What is hidden terminalproblem?


Hidden terminals are nodes that are hidden (or not reachable) from the sender of a
data transmission session, but are reachable to the receiver of the session. The
hidden terminal can cause collisions at the receiver node.

7.Define Routing:
Routing is the process of selecting a path for forwarding packet from source to
destination.
8.What is Routing Protocol?
• It is the set of instructions that tells us how Routers communicate with each other
in a network.
• It uses metrics to evaluate what path is the best path for packet transmission.
9.Classify the types of Routing protocols.

10.What is table driven protocol?Give an example.


This type of protocols periodically updates destinations and their routes by
periodically distributing routing tables throughout the network.Ex:DSDV
11.What is On-Demand Routing Protocol ?Give an example.

• on-demand routing protocols execute the path-finding process and exchange


routing information only when a path is required by a node to communicate with
a destination.Ex:AODV

12.List the table drivenprotocols.


The table driven protocols are
a) Destination-Sequenced Distance Vector (DSDV)
b) Cluster Head Gateway Switch Routing(CHGSR)
c) Wireless Routing Protocol(WRP)

13.List the On-Demand Routing Protocol.


AODV- Adhoc On-demand Distance Vector
ABR-Associativity Based Routing
DSR- Dynamic Source Routing
TORA-Temporally Ordered Routing Algorithm

14.List the issues of designing a MAC protocol for ad-hocnetworks.


The issues of designing a MAC protocol for ad-hoc networks are
a) Bandwidthefficiency:
a. The ratio of bandwidth used for actual data transmission to the
total available bandwidth. MAC protocol should maximizeit.
b) QoSsupport:
a. MAC protocol should consider the constraint of ad hoc networks
for time criticalapplications
c) Hidden and exposed terminalproblem
d) Synchronization:
a. It can be achieved by exchange of control packets between
transmitter and receiver
e) Error-Prone Shared BroadcastChannel
f) Distributed Nature/Lack of CentralCoordination
g) Mobility ofNodes:
15.Briefly explain the classification of routing protocols based on the routing
information update mechanism.
The classification of routing protocols based on the routing information update
mechanism are

1. Table driven routingprotocols


- Periodic exchange of routing information.
- Each node maintains its own routingtable.
2. On-demand routingprotocols
- No periodic exchange of routinginformation.
- Route is found when onlyrequired.
3. Hybrid routingprotocols
- Uses both table driven routing and on-demand routingprotocols.
- Table driven routing (at a defined local zone) + on-demand routing
(amongzones)
16.How does energy aware routing work?
The energy aware routing works based on the routing metrics such as low energy,
cost and remaining battery charge. It aims mainly at increasing the lifetime of the
network.

17.What is the objective of transport layer protocol?


The main objective is setting up and maintaining End-to-end connections, reliable end-to-end
data delivery, flow control, and congestion control.

18.What is Self organization in Adhoc wireless Networks?


An important property that an ad hoc wireles network should exhibit is organizing and
maintaining the network by itself.

19.What are the major activities in self organization?


Major activities: neighbor discovery, topology organization, and topology reorganization

20.What are the various types of energy management inAdhoc network?


 Transmission power management
 Battey energy management
 Processor power management
 Devices power management
The energy aware routing works based on the routing metrics such as low
energy, cost and remaining battery charge. It aims mainly at increasing the lifetime of
the network.
21.Differentiate proactive and reactive routing protocols. Write examples foreach.
(May/June12)
S.No. Proactive Reactive
1 Route is pre-established Route establishment is on-demand
Route discovery by some global
2 Continuously discover the routes
search
Updates topology information(table)
3 No information update is done
periodically
longer delay due to latency of route
4 No latency in route discovery
discovery
Large capacity is needed to update
5 Large capacity is not needed
network information
A lot of routing information may May not be appropriate for real-time
6
never be used communication
7 Eg: DSDV, WRP Eg: AODV, ABR
22.What are hybridprotocols?
Hybrid Protocols attempt to take advantage of best reactive and proactive schemes.
These protocols are to initiate route discovery on demand but at a limited search cost.

23.List the major goals when selecting a routing protocol.


The major goals when selecting a routing protocol are
d) Provide the maximum possible reliability by selecting alternative
routesif a node connectivityfails.
e) Route network traffic through the path with least cost in the
network by minimizing the actual length between the source
and destinationthrough the least number of intermediatenodes.
f) Provide the nodes the best possible response time and
throughput. This is especially important for interactive sessions
between userapplications.
24.What are the two types of attacks against Adhoc wireless networks.
The attack against ad hoc wireless networks are classified into two types: passive and
active attacks.
• Passive attack: obtain information in the network without disrupting the
operation.
• Active attack: disrupt the operation of the network
25.List out QoS parameters based on applications.
• Qos Parameters: different applications have different requirements
– Multimedia: bandwidth and delay are the key
parameters
– Military: BW, delay, security and reliability
– Emergency search –and-rescue: availability is the key
parameters, multiple link disjoint paths
– WSN: battery life, minimum energy consumption
26.What are the advantages of wireless mesh networks?
High data rate, quick and low cost of deployment,enhanced services, high
scalability, easy extendability, high availability, and low cost per bit.
27.Draw the MCN architechture in Hybrid Wireless Networks.
28.Why the Reactive Protocol is otherwise called as on-demand routing protocol?
Reactive Protocol execute the path-finding process and exchange routing
information only when a path is required by a node to communicate with a
destination.Since it establishes routing only on demand or only when required it
is also called as on-demand routing protocol.
29.Define DSDV.
• It is a routing protocol where each node maintains a table that contains the
shortest distance and the first node on the shortest path to every other node in the
network.
• As it is a table-driven routing protocol, routes to all destinations are readily
available at every node at all times.
30.Briefly explain AODV.
On-demand routing protocols execute the path-finding process and exchange routing
information only when a path is required by a node to communicate with a destination.
31. Draw the route maintenance of DSDV

32.Draw the route establishment of DSDV.


33.Draw the route establishment of AODV

34.Draw the route maintenance of AODV

35.Compare AODV and DSDV


36. Differentiateintra-zoneandinter-zoneroutingprotocolinHybridrouting.[APRIL/
MAY2018
Intra-zone routing protocol is used when the nodes use proactive routing whereas Inter-zone
STUCOR APP
routing protocol can be used by the node when it uses reactive routing
UNIT I-AD HOC NETWORKS – INTRODUCTION AND ROUTING PROTOCOLS

PART B AND C QUESTIONSs


1. Outline the design challenges in adhoc wireless networks with relevant examples.
2. Briefly explain the elements of ad hoc wireless networks.
3. Write short notes on Adhoc wireless internet.
4. What is DSDV? Explain the Route establishment and Route maintenance of DSDV
with neat diagram
5. Explain the Issues in Designing a Routing Protocol for Ad Hoc Wireless Networks.
6. Enumerate the commercial application areas of Adhoc networking with examples.
7. Explain the operation of AODV with neat diagram.Also mention itsadvantages
and disadvantages
8. Explain how adhoc network can be configured with internet.Also discuss about the
elements of adhocwireless networks.
9. Explain Destination Sequenced Distance Vector routing protocol along with
advantages and disadvantages.
10. Explain the route establishment and route maintenance of AdhocOn-demand
Distance Vector Routing protocol with neat diagram.
11. Explain the Issues in Designing a Routing Protocol for Ad Hoc Wireless Networks.
12. Explain the design issues in adhoc wireless networks.
13. Explain adhoc wireless internet and its applications.

UNIT II- SENSOR NETWORKS – INTRODUCTION &


ARCHITECTURES
PART A QUESTIONS
1. List out the components of sensor node.
Controller, Memory, Sensors and actuators, Communication device and power supply

2. Write down the various operational states of transceiver in WSN.


Transmit, Receive, idle and sleep state.

3. How microcontroller is best when compared with other controllers used in sensor
node?
These microcontrollers are particularly suited to embedded systems are their flexibility in
connecting with other devices (like sensors), their instruction set amenable to time-critical
signal processing, and their typically low power consumption; they are also convenient in
that they often have memory built in. In addition, they are freely programmable and hence
very flexible. Microcontrollers are also suitable for WSNs since they commonly have the
possibility to reduce their power consumption by going into sleep states where only parts
of the controller are active.

4. What is the uses of controller in sensor node.?


It collects data from the sensors, processes this data, decides when and where to send it,
receives data from other sensor nodes, and decides on the actuator’s behavior.
It has to execute various programs, ranging from time-critical signal processing and
communication protocols to application programs

5. What are the two task of Radio Transceiver?


A radio transceiver has essentially two tasks: transmitting and receiving data between a pair
of nodes. Similar to microcontrollers, radio transceivers can operate in different modes; the
simplest ones are being turned on or turned off

6. Write the three categories of sensors.


Passive, omnidirectional sensors
Passive, narrow-beam sensors
Active sensors

7. Define robustness.
wireless sensor networks should also exhibit an appropriate robustness. They should not fail
just because a limited number of nodes run out of energy, or because their environment
changes and severs existing radio links between two nodes – if possible, these failures have
to be compensated

8. What is Scalability?
Scalability is an evidently indispensable requirement. Scalability is ill served by any construct
that requires globally consistent state, such as addresses or routing table entries that have to be
maintained. Hence, the need to restrict such information is enforced by and goes hand in hand
with the resource limitations of sensor nodes, especially with respect to memory.
9. What is Dynamic voltage scaling?
The rational is the fact that a controller running at lower speed, that is, lower clock rates,
consumes less power than at full speed. This is due to the fact that the supply voltage can be
reduced at lower clock rates while still guaranteeing correct operation. This technique is called
Dynamic Voltage Scaling.

10. Define the sensors and actuators.


The actual interface to the physical world: devices that can observe or
controlphysicalparametersoftheenvironment.

11. What is energy scavenging?


Some of the unconventional energy described above-fuel cells, micro heat engines,
radioactivity-convert energy from some stored, secondary form into electricity in a less
direct and easy to use way than a normal battery would do. The entire energy supply is
stored on the node itself-once the fuel supply is exhausted, the node fails.

12. What is Idle and Sleep state?


Idle state
A transceiver that is ready to receive but is not currently receiving anything is said to be in
an idle state.
In this idle state, many parts of the receive circuitry are active, and others can be switched
off.
Sleep state
In the sleep state, significant parts of the transceiver are switched off.
This sleep states differ in the amount of circuitry switched off and in the associated
recovery times and startup energy.

13. Write down the condition for the sleep state to be beneficial.
switching to a sleep mode is only beneficial if Eoverhead<Esaved or, equivalently, if the time to
the next event is sufficiently large:

14. Give some example for microcontroller?


Intel Strong ARM
Texas Instruments MSP 430
Atmel Atmega
15. Draw the Diagram for sensor node hardware components?
16. What is power consumption and energy efficiency?
The simplest interpretation of energy efficiency is the energy required to transmit and
receive a single bit. Also, to be suitable for use in WSNs, transceivers should be
switchable between different states, e.g. active and sleeping.
The idle power consumption in each of these states and during switching between them is
very important.

17. Define Noise figure?


Noise Figure of an element is defined as the ratio of the Signal-to-Noise Ratio (SNR)
ratio SNRI at the input of the element to the SNR ratio SNRo at the element‟s output. It
describes the degradation of SNR due to the element‟s operation and is typically given in dB:
NF dB= SNRI dB – SNRo dB

18. What is Receiver Sensitivity?


The receiver sensitivity of the radio front end is given as the ratio of the radiated power to the
overall power consumed by the front end; for a power amplifier; the efficiency describes the
ratio of the output signal‟s power to the power consumed by the overall power amplifier.

19. What is Active and Passive Sensors?


Active sensors
This last group of sensors actively probes the environment.
These are quite specific-triggering an explosion is certainly not a lightly under taken action-and
require special attention.
Passive, omnidirectional sensors
These sensors can measure a physical quantity at the point of the sensor node without actually
manipulating the environment by active probing-in this sense, they are passive.
There is no notion of “direction” involved in these measurements.
Passive, narrow-beam sensors
These sensors are passive as well, but have a well-defined notion of direction of measurements.
A typical example is a camera, which can “take measurements” in a given direction, but has to
be rotated if need be.

20. What is Relaxation effect?


The seeming self-recharging of an empty or almost empty battery when no current is drawn
from it, based on chemical diffusion processes within the cell-should be clearly understood.
Battery lifetime and usable capacity is considerably extended if this effect is leveraged.
21. What are the three types of mobility?
Node mobility
Sink mobility
Event mobility

22. What is QOS?


WSN networks essentially only move bits from one place to another. additional requirements
about the offered Quality of Services (QOS) are made, especially in the context of multimedia
applications. Such QOS can be regarded as a low-level, networking-device-observable
attribute-bandwidth, delay, jitter and packet loss rate.

23. What is network lifetime?


The time for which the network is operational or, put another way, the time during which it is
able to fulfill its tasks (starting from a given amount of stored energy).

24. What is meant by fixed assignment protocol?


The available resources are divided between the nodes such that the resource assignment is
long term and each node can use its resources exclusively without the risk of collisions.

25. What is Overheading?


Unicast frames have one source and one destination node. The wireless medium is a broadcast
medium and all the source‟sneighbors that are in receive state hear a packet & drop it when it
is not destined to them these nodes overhead the packet.

UNIT SENSOR
-2 NETWORKS – INTRODUCTION &
ARCHITECTURES

PART B AND C QUESTIONSS

1. Explain briefly about the energy consumption of sensor Nodes


2. Briefly explain the enabling technologies of sensor networks.
3. Write the applications of wireless sensor network.
4. Explain in detail about Transceiver design considerations
5. Explain the concepts of Figure of Merit and Optimization of Goals in WSN.
6. Discuss about the sensor network scenarios with neat diagram.
7. With neat sketch, discuss Sensor node architecture
8. Explain the challenges of wireless sensor network
9. How energy can be saved in controller, memory and transceiver and explain the condition
when the sleep mode is beneficial in wireless sensor node.
10. Explain in detail about hardware components of sensor node.
11. Discuss about the sensor network scenarios of WSN.
12. Write short notes on (i) Figure of Merit (ii) Optimization of Goals
13. Explain in detail about the architecture, operational states and task of transceiver in WSN
Unit-3 WSN NETWORKING CONCEPTS AND PROTOCOLS
PART A QUESTIONS
1. What is Contention based protocol?
In contention-based protocols , any of the receiver’s neighbors might try its luck at the risk
of collisions. Accordingly, those protocols contain mechanisms to avoid collisions or to
reduce theirprobability.

2. What are the Advantages and drawbacks of S- MAC protocol.


Advantages are 1.The battery utilization is increased implementing sleep schedules.2.This
protocol is simple to implement.3.Long messages can be efficiently transferred using
message passing technique.
S-MAC has one major drawback: it is hard to adapt the length of the wakeup period to
changing load situations, since this length is essentially fixed, as is the length of the
listen period.

3. Write short notes on wakeup radio concepts.


A whole cycle consisting of sleep period and listen period is also called a
wakeupperiod.

4. Write the concepts of LEACH protocol.


TheLEACHprotocol(Low-
energyAdaptiveClusteringHierarchy)assumesadensesensornetworkofhomogeneous,energy
-constrainednodes,which shallreporttheirdatatoasinknode.InLEACH,aTDMA-
basedMACprotocolisintegratedwith clusteringandasimple“routing”protocol, LEACH
partitions the nodes into clusters and in each cluster a dedicated node, the clusterhead, is
responsible for creating and maintaining a TDMA schedule; all the other nodes of a cluster
are member nodes. To all member nodes, TDMA slots are assigned, which can be used to
exchange data between the member and the clusterhead; there is no peer-to-peer
communication

5. Outline how node scheduling is done in contention based MAC protocols with
scheduling mechanism.
There can be packet scheduling at the nodes, or node scheduling for access to the
channel. Node scheduling should not treat the nodes unfairly. Some of
these protocols consider battery power in their node scheduling.

6. Define S-MAC protocol.


S-MAC adopts a periodic wakeup scheme, that is, each node alternates between a fixed-
length listen period and a fixed-length sleep period according to its schedule. S-MAC
attempts to coordinate the schedules of neighboring nodes such that their listen periods
startatthesametime.

7. Draw the periodic wake up scheme.

8. Compare contention based and schedule based protocol. (C404.3,PO1,2)


Schedule Based Protocol Contention based Protocol

Scheduled Based MAC Protocol is a A Contention based protocol is a


communication protocol, it is used for communication protocol for operating
access nodes in the shared medium is wireless telecommunication equipment
divided with respect to time (Time that allows many users to use the same
Division Multiple Access), frequency radio channel without pre coordination.
(Frequency Division Multiple Access)
and pseudo codes (Code Division
Multiple Access).
Examples : Low energy adaptive Examples: ALOHA (pure & slotted),
clustering hierarchy (LEACH), Power CSMA, S-MAC.
efficient and delay-aware medium access
protocol (PEDAMACS)
Schedule bases protocol is based on strict Contention based protocol is based on
time synchronization requirements relax time synchronization requirement
It allows the different nodes to access the It does not allows the different nodes to
shared channel without collision access the shared channel .Hence
collision occurs

9. What are the mechanisms used in the MAC layer?


The mechanisms used in the MAC layer are
1. Contention based protocols
2. Contention based protocols with reservation mechanisms
3. Contention based protocols with scheduling mechanisms
4. Protocols with directional antennas

10. List the features of 802.15 standard.


IEEE has approved a Bluetooth based standard (IEEE 802.15.1) for WPANS.
The standard covers only MAC and the physical layers.
The features of 802.15 standard are
1. It employs radio frequency technology for communication.
2. It makes use of frequency modulation to generate radio waves in the ISM band.
3. Low power consumption.
4. It covers range up to 10 meters.
5. Can establish ad hoc network of laptops.

11. List some design challenges of wireless sensor network.


Type of service, Quality of Service, Fault tolerance, Lifetime, Scalability, Wide range of
densities, Programmability, Maintainability.

12. How does energy aware routing work?


The energy aware routing works based on the routing metrics such as low energy, cost and
remaining battery charge. It aims mainly at increasing the lifetime of the network.

13. What are not supported by the traditional TCP for handling Adhoc network?
The features that are not supported by the traditional TCP for handling adhoc
network are
1. Throughput
2. Power consumption
3. Path break handling mechanisms
4. Scheduling of packet loss and rate of transmission
5. Bandwidth consumption due to RTS-CTS-DATA-ACK

14. Define Node’s duty cycle.


Theratioofthelistenperiodlengthtothewakeupperiodlengthisalsocalledthe node’s duty
cycle

15. What are the issues in designing transport layer protocol?


The issues in designing transport layer protocols are
1. Induced traffic
2. Induced throughput unfairness
3. Separation of congestion control, reliability and flow control
4. Power and bandwidth constraints
5. Misinterpretation of congestion
6. Completely decoupled transport layer
7. Dynamic topology

16. List the energy problems and design goal of MAC protocol.
Collisions, Overhearing, Protocol overhead, Idle listening

17. How single-channel sender initiated contention based MAC protocols for
Ad Hoc Wireless Networks work? [ NOVEMBER/DECEMBER 2016 ]
In sender-initiated protocols, the packet transmissions are initiated by the sender nodes only.
In Single-channel sender-initiated protocols, the total available bandwidth will not be
divided into several channels; it will be used as it is. The node which uses the channel can
use entire bandwidth and hence only one node can able to transmit data and use the channel
at a time.
18. Outline how node scheduling is done in contention-based MAC protocols with
scheduling mechanism. [ NOVEMBER/DECEMBER 2016 ]
Contention-based MAC protocols with scheduling mechanisms perform two operations:
Packet scheduling at each node and scheduling nodes for accessing channel. Scheduling
mechanism has to consider the priority assigned for each flow and the battery power of each
node. The scheduling decisions need to consider the following factors.
Delay targets of packets
Laxities of packets
Traffic load at nodes
Remaining battery power at node
19. Define Packet Delivery Ratio. [ APRIL/MAY 2017 ]
Packet delivery ratio is defined as the ratio of data packets received by the destinations to
those generated by the sources. Mathematically, it can be defined as:
PDR = S1 / S2
Where, S1 is the sum of data packets received by the each destination and S2 is the sum of
data packets generated by the each source.
20. Write down the issues of designing a MAC protocol for Ad-hoc networks.
[ NOVEMBER/DECEMBER 2017 ]
Bandwidth efficiency
QoS support
Synchronization
Hidden and Exposed terminal problems
Error prone shared broadcast channel
21. How mobility of nodes affect the throughput in wireless networks? [ APRIL/MAY
2018 ]
The mobility of nodes would affect the performance of the system in Ah Hoc wireless
network. Due to the mobility of nodes, channel reservation and the node information cannot
be periodically maintained. So the throughput of the network is highly reduced.

22. How does Multi-hop coordination mechanism work? [ APRIL/MAY 2018 ]


Each node will forward the message through multiple hops to deliver to the designated nodes
which is far away to source node.

23. What is meant by Internet Proxy? [ NOVEMBER/DECEMBER 2018 ]


A proxy server, also known as a "proxy" or "application-level gateway", is a computer that
acts as a gateway between a local network and a larger-scale network such as the internet.
Proxy servers provide increased performance and security.

A proxy server works by intercepting connections between sender and receiver. All incoming
data enters through one port and is forwarded to the
24. What are the advantages of reservation based MAC protocols over contention based
MAC protocols?
MACA/PR is an efficient bandwidth reservation protocol that can support real time traffic
sessions
MACA/PR is that it does not require global synchronization among nodes o RTMAC is its
bandwidth efficiency
RTMAC is its asynchronous mode of operation where nodes do not require any global time
synchronization

25. List the services provided by IEEE802.11services.


 Association
 Authentication

 De-Authentication
 Disassociation
 Integration
 Datadelivery
 Privacy
 Reassociation

UNIT-3 WSN NETWORKING CONCEPTS AND PROTOCOLS


PART B AND C QUESTIONS
1. Explain the hidden and exposed problems with an example and diagrammatic illustration
2. Explain the concept of IEEE 802.15.4 MAC protocol
3. Explain briefly about schedule based protocol.
4. Present an overview of MAC protocol in WSN.
5. Explain the principles of S-MAC protocols along with the advantages and disadvantages.
6. Outline the issues related to the transport layer in WSN.
7. Illustrate the concept of PAMAS protocol.
8. Explain fragmentation and NAV setting in S-MAC protocols.
9. Explain in detail about Contention based protocol.
10. Explain the specific requirements and design considerations of MAC protocol in WSN
11. Explain the concepts of Mediation device protocol and wake up Radio concepts.
12. Explain in detail about the LEACH protocol with neat diagram
UNIT 4- SENSOR NETWORK SECURITY
PART A QUESTIONS
1. List out the hardware and software components of sensor node? (Nov/Dec2017)(C)
Hardware components
Memeory,controller,sensor,communicationdevice,power supply.
Software components
Protocol,security,frame.
2. How to determine the distance between the nodes?
The characteristics of wireless communication are partially determined by the distance
between the sensor and receiver. If these characteristics are measured at the receiver they
can serve as a estimator or distance. The most important characteristics are RSSI
(Received signal strength Indicator), TOA (Time of Arrival) and TDOA (Time
Difference of Arrival)
3. Why security is need in ad hoc wireless networks
Due to the unique characteristics of ad hoc wireless networks, such networks are highly
vulnerable to security attacks compared to wired networks or infrastructure-based
wireless networks.
4. List the network security requirements
Confidentiality
Integrity
Availability
Non-repudiation
5. Define Confidentiality
The data sent by the sender (source node) must be comprehensible only to the intended
receiver (destination node).
Though an intruder might get hold of the data being sent, he/she must not be able to
derive any useful information out of the data.
6. Define Integrity
The data sent by the source node should reach the destination node as it was sent:
unaltered.
In other words, it should not be possible for anymalicious node in the network to tamper
with the data during transmission.
7. Define Availability
The network should remain operational all the time.
It must be robust enough to tolerate link failures and also be capable of surviving various
attacks mounted on it.
It should be able to provide the guaranteed services whenever an authorized user requires
them.
8. Define Non-repudiation
Non-repudiation is a mechanism to guarantee that the sender of a message cannot later
deny having sent the message and that the recipient cannot deny having received the
message.
9. List the challenges in security provisioning
Shared broadcast radio channel,
Insecure operating environment,
Lack of central authority,
Lack of association among nodes,
Limited availability of resources,
Physical vulnerability.
10. Which is Limited resource availability
Resources such as bandwidth, battery power, and computational power (to a certain
extent) are scarce in ad hoc wireless networks.
11. What is passive attack
A passive attack does not disrupt the operation of the network
The adversary snoops the data exchanged in the network without altering it. Here, the
requirement of confidentiality can be violated if an adversary is also able to interpret
the data gathered through snooping.
12. What is active attack
An active attack attempts to alter or destroy the data being exchanged in the network,
thereby disrupting the normal functioning of the network
13. List the Two types of active attack
external attacks
internal attacks
14. what is External attacks
External attacks are carried out by nodes that do not belong to the network. These attacks
can be prevented by using standard security mechanisms such as encryption techniques
and firewall.
15. What is firewall
A firewall is used to separate a local network from the outside world. It is a software
which works closely with a router program and filters all packets entering the network to
determine whether or not to forward those packets toward their intended destinations.
A firewall protects the resources of a private network from malicious intruders on
foreign networks such as the Internet. In an ad hoc wireless network, the firewall
software could be installed on each node on the network.
16. List the Network Layer Attacks
Wormhole attack
Blackhole attack
Byzantine attack
Information disclosure
Resource consumption attack
Routing attacks
17. What is Blackhole attack
A malicious node falsely advertises good paths (e.g., shortest path or most stable path)
to the destination node during the path-finding process (in on-demand routing protocols)
or in the route update messages (in table-driven routing protocols).
The intention of the malicious node could be to hinder the path-finding process or to
intercept all data packets being sent to the destination node concerned.
18. What is Byzantine attack
A compromised intermediate node or a set of compromised intermediate nodes works in
collusion.
Carries out attacks such as creating routing loops, routing packets on non-optimal paths,
and selectively dropping packets.
Byzantine failures are hard to detect. The network would seem to be operating normally
in the viewpoint of the nodes, though it may actually be exhibiting Byzantine behavior.
19. What is Information disclosure
A compromised node may leak confidential or important information to unauthorized
nodes in the network.
Such information may include information regarding the network topology, geographic
location of nodes, or optimal routes to authorized nodes in the network.
20. List the Routing attacks
Routing table overflow
Routing table poisoning
Packet replication
Route cache poisoning
Rushing attack
21. Define the Session hijacking
An adversary takes control over a session between two nodes.
Since most authentication processes are carried out only at the start of a session, once the
session between two nodes gets established, the adversary node masquerades as one of
the end nodes of the session and hijacks the session
22. Define Impersonation
An adversary assumes the identity and privileges of an authorized node, either to
make use of network resources that may not be available to it under normal
circumstances, or to disrupt the normal functioning of the network by injecting false
routing information into the network.
23. Define man-in-the-middle attack
A man-in-the-middle attack is another type of impersonation attack.
Here, the adversary reads and possibly modifies, messages between two end nodes
without letting either of them know that they have been attacked.
24. Define Cryptography
It is the study of the principles, techniques, and algorithms by which information is
transformed into a disguised version which no unauthorized person can read,
but which can be recovered in its original form by an intended recipient.
25. Two major kinds of cryptographic algorithms
Symmetric key algorithms
Asymmetric key algorithms
26. What is Symmetric Key Algorithms
Symmetric key algorithms rely on the presence of the shared key at both the sender and
receiver, which has been exchanged by some previous arrangement
use the same key for encryption and decryption.
faster to execute electronically
but require a secret key to be shared between the sender and receiver.
When communication needs to be established among a group of nodes, each sender-
receiver pair should share a key, which makes the system non- scalable.
27. What is block cipher
It is an encryption scheme in which the plaintext is broken into fixed-length segments
called blocks, and the blocks are encrypted one at a time.
The simplest examples include substitution and transposition.
The block length used is five.
28. List the Key Management Approaches
key pre distribution
key transport
key arbitration
key agreement

PART B AND C QUESTIONS


1. Issues and challenges in security provisioning in ad hoc network.
2. Explain briefly about the key management in ad hoc network security
3. List and brief various network and transport layer attacks in detail
4. Explain security aware AODV protocol to solve black hole attack.
5. Explain briefly about Two major kinds of cryptographic algorithms.
6. Explain briefly about Shamir's three-pass protocol.
7. Briefly explain the network security requirements.
8. Identify the layer wise attacks in wireless Sensor networks and explain its impact on
networks.
9. Summarize about the impacts of physical-layer jamming attacks on radio
communication. How it distorts the signals in the sensor network’s frequency band.
10. Define Tampering attack. Describe how it recovers cryptographic keys used for
ciphering in sensor networks.
11. Develop the key distribution and management mechanism required for secure
communication in sensor networks
12. Analyze about the flooding attack and its Countermeasures in wireless sensor
networks in detail.
13. Determine the impact of the following security threats in WSN : (i) Black hole
attack (ii) Transport layer attacks
14. Validate the importance of Security Protocols for Sensor Networks. also explain
about the building blocks of SPINS protocols in Security Provisioning
15. Generalize the Active and passive attacks with suitable examples. Also explain how
these attacks differ from each other.
UNIT 5-SENSOR NETWORK PLATFORMS AND TOOLS
PART A QUESTIONS
1. What is Berkeley mote?(K)
A sensor node, also known as a mote (chiefly in North America), is a node in a sensor
network that is capable of performing some processing, gathering sensory information
and communicating with other connected nodes in the network. A mote is a node but a
node is not always a mote.

2. What is Data-Centric Network?


Named Data Networking (NDN)(related to Content-Centric Networking (CCN), content-
based networking, data-oriented networking or information-centric networking) is a
Future Internet architecture inspired by years of empirical research into network usage
and a growing awareness of unsolved problems in contemporary internet architectures
like IP.

3. How Sensor node hardware grouped into categories


a. Augmented general-purpose computers
b. Dedicated embedded sensor nodes
c. System-on-chip (SoC)
d.
4. Short notes on System-on-chip (SoC)
Build extremely low power and small footprint sensor nodes that still provide certain
sensing, computation, and communication capabilities.
Currently in the research pipeline with no predefined instruction set, there is no software
platform support available.

5. List the Sensor Network Programming Challenges


Event-driven execution allows the system to fall into low-power sleep mode when no
interesting events need to be processed.
At the extreme, embedded operating systems tend to expose more hardware controls to
the programmers, who now have to directly face device drivers and scheduling
algorithms, and optimize code at the assembly level.

6. Short notes on TinyOS


TinyOS is an embedded, component-based operating system and platform for low-power
wireless devices, such as those used in wireless sensor networks (WSNs)

7. Short notes on nesC


The name nesC is an abbreviation of "network embedded systems C
nesC is built as an extension to the C programming language with components "wired"
together to run applications on TinyOS.
8. Write about Contiki OS
Contiki is an open source operating system for the Internet of Things. It runs on
networked embedded systems and wireless sensor nodes.
It is designed for microcontrollers with small amounts of memory.
A typical Contiki configuration is 2 kilobytes of RAM and 40 kilobytes of ROM.

9. What is NS2
NS2 stands for Network Simulator Version. It is an open-source event-driven simulator
designed specifically for research in computer communication network

10. List the Features of NS2


It is a discrete event simulator for networking research.
It provides substantial support to simulate bunch of protocols like TCP, FTP, UDP, https
and DSR.
It simulates wired and wireless network.
It is primarily Unix based.
Uses TCL as its scripting language.
Otcl: Object oriented support
Tclcl: C++ and otcl linkage
Discrete event scheduler
11. Draw the basic architecture of ns2

12.
13. Short notes on TOSSIM
Power tossim is a scalable simulation environment .it provides accurate estimate of
power consumption.
14. Short notes on cooja

Cooja is a highly useful tool for Contiki development  It allows developers to test their
code and systems long before running it on the target hardware
UNIT 5-SENSOR NETWORK PLATFORMS AND TOOLS
PART B AND C QUESTIONS

1. Write brief notes on Node-level Simulators – NS2 and its extension.


2. How to anlyze the wireless network using ns2 simulator.
3. Outline the sensor network simulator COOJA
4. How to anlyze the wireless network using cooja
5. Explain briefly about the Node-level software platforms – TinyOS, nesC.
6. Outline the sensor network simulator. TOSSIM.
7. Neatly draw and explain the General WSN System Architecture with software and
hardware platform.
8. Neatly draw and explain Berkeley Motes with software and hardware platform.
9. Demonstrate about the interface and configuration of nesC language.
10. Justify that nesC supports the components and applications of TinyOS.
11. Develop the components and implementation models of Timer functions in nesC.
12. Examine how an open-source network simulator can be used to simulate
wireless/mobile networks and sensor networks.
13. Name a dedicated simulator for TinyOS applications and explain.
14. Point out the components of node centric programming models
15. Formulate the traditional embedded system programming interface with neat
diagram and also explain the characteristics of sensor network programming with
its challenges.

You might also like