Professional Documents
Culture Documents
QUESTION BANK
Prepared by
TOTAL:45 PERIODS
OUTCOMES:
At the end of the course, the student would be able to:
Know the basics of Ad hoc networks and Wireless SensorNetworks
Apply this knowledge to identify the suitable routing algorithm based on the
network and userrequirement
Apply the knowledge to identify appropriate physical and MAC layerprotocols
Understand the transport layer and security issues possible in Ad hoc and
sensor networks.
Be familiar with the OS used in Wireless Sensor Networks and build basicmodules
TEXT BOOKS:
C. Siva Ram Murthy and B. S. Manoj, ―Ad Hoc Wireless Networks Architectures and Protocols‖,
Prentice Hall, PTR, 2004. (UNIT I)
Holger Karl , Andreas willig, ―Protocol and Architecture for Wireless Sensor Networks‖,
John wiley publication, Jan 2006.(UNIT II-V)
REFERENCES:
Feng Zhao, Leonidas Guibas, ―Wireless Sensor Networks: an information processing approach‖,
Elsevier publication, 2004.
Charles E. Perkins, ―Ad Hoc Networking‖, Addison Wesley, 2000.
I.F. Akyildiz, W. Su, Sankarasubramaniam, E. Cayirci, ―Wireless sensor networks: a survey‖,
computer networks, Elsevier, 2002, 394 - 422.
EC8702– ADHOC AND WIRELESS SENSOR NETWORKS
UNIT I AD HOC NETWORKS – INTRODUCTION AND ROUTING PROTOCOLS
PART A QUESTIONS
1. What is an ad hocnetwork?
An ad hoc network is a multihop, infrastructure less network which has no
centralized server to control the communication between the nodes and resources
cannot be reserved beforehand. It is used in battlefields and military applications.
2.Why are ad hocnetworksneeded?
Ad hoc networking is often needed where an infrastructure network cannot be
deployed and managed. The presence of dynamic and adaptive routing protocols
enables quick formation of ad hoc networks and is suitable for emergency situations
like natural disasters, spontaneous meetings or military conflicts.
3.List the applications of ad hoc networks.
Ad hoc networks are widely used in
a. Military applications andbattlefields
b. Collaborative and distributedcomputing
c. Emergency search and rescueoperations
d. Wireless sensor and meshnetworks
4.What are the challenging issues in ad hocnetworkmaintenance?
The challenging issues in ad hoc network are
a) Medium accessscheme
b) Routing
c) Multicastrouting
d) Transport layerprotocol
e) PricingSchemes
f) Quality of ServiceProvisioning
g) Self-Organization
h) Security
i) Addressing and ServiceDiscovery
j) EnergyManagement
k) Scalability
l) Deploymentconsiderations
7.Define Routing:
Routing is the process of selecting a path for forwarding packet from source to
destination.
8.What is Routing Protocol?
• It is the set of instructions that tells us how Routers communicate with each other
in a network.
• It uses metrics to evaluate what path is the best path for packet transmission.
9.Classify the types of Routing protocols.
3. How microcontroller is best when compared with other controllers used in sensor
node?
These microcontrollers are particularly suited to embedded systems are their flexibility in
connecting with other devices (like sensors), their instruction set amenable to time-critical
signal processing, and their typically low power consumption; they are also convenient in
that they often have memory built in. In addition, they are freely programmable and hence
very flexible. Microcontrollers are also suitable for WSNs since they commonly have the
possibility to reduce their power consumption by going into sleep states where only parts
of the controller are active.
7. Define robustness.
wireless sensor networks should also exhibit an appropriate robustness. They should not fail
just because a limited number of nodes run out of energy, or because their environment
changes and severs existing radio links between two nodes – if possible, these failures have
to be compensated
8. What is Scalability?
Scalability is an evidently indispensable requirement. Scalability is ill served by any construct
that requires globally consistent state, such as addresses or routing table entries that have to be
maintained. Hence, the need to restrict such information is enforced by and goes hand in hand
with the resource limitations of sensor nodes, especially with respect to memory.
9. What is Dynamic voltage scaling?
The rational is the fact that a controller running at lower speed, that is, lower clock rates,
consumes less power than at full speed. This is due to the fact that the supply voltage can be
reduced at lower clock rates while still guaranteeing correct operation. This technique is called
Dynamic Voltage Scaling.
13. Write down the condition for the sleep state to be beneficial.
switching to a sleep mode is only beneficial if Eoverhead<Esaved or, equivalently, if the time to
the next event is sufficiently large:
UNIT SENSOR
-2 NETWORKS – INTRODUCTION &
ARCHITECTURES
5. Outline how node scheduling is done in contention based MAC protocols with
scheduling mechanism.
There can be packet scheduling at the nodes, or node scheduling for access to the
channel. Node scheduling should not treat the nodes unfairly. Some of
these protocols consider battery power in their node scheduling.
13. What are not supported by the traditional TCP for handling Adhoc network?
The features that are not supported by the traditional TCP for handling adhoc
network are
1. Throughput
2. Power consumption
3. Path break handling mechanisms
4. Scheduling of packet loss and rate of transmission
5. Bandwidth consumption due to RTS-CTS-DATA-ACK
16. List the energy problems and design goal of MAC protocol.
Collisions, Overhearing, Protocol overhead, Idle listening
17. How single-channel sender initiated contention based MAC protocols for
Ad Hoc Wireless Networks work? [ NOVEMBER/DECEMBER 2016 ]
In sender-initiated protocols, the packet transmissions are initiated by the sender nodes only.
In Single-channel sender-initiated protocols, the total available bandwidth will not be
divided into several channels; it will be used as it is. The node which uses the channel can
use entire bandwidth and hence only one node can able to transmit data and use the channel
at a time.
18. Outline how node scheduling is done in contention-based MAC protocols with
scheduling mechanism. [ NOVEMBER/DECEMBER 2016 ]
Contention-based MAC protocols with scheduling mechanisms perform two operations:
Packet scheduling at each node and scheduling nodes for accessing channel. Scheduling
mechanism has to consider the priority assigned for each flow and the battery power of each
node. The scheduling decisions need to consider the following factors.
Delay targets of packets
Laxities of packets
Traffic load at nodes
Remaining battery power at node
19. Define Packet Delivery Ratio. [ APRIL/MAY 2017 ]
Packet delivery ratio is defined as the ratio of data packets received by the destinations to
those generated by the sources. Mathematically, it can be defined as:
PDR = S1 / S2
Where, S1 is the sum of data packets received by the each destination and S2 is the sum of
data packets generated by the each source.
20. Write down the issues of designing a MAC protocol for Ad-hoc networks.
[ NOVEMBER/DECEMBER 2017 ]
Bandwidth efficiency
QoS support
Synchronization
Hidden and Exposed terminal problems
Error prone shared broadcast channel
21. How mobility of nodes affect the throughput in wireless networks? [ APRIL/MAY
2018 ]
The mobility of nodes would affect the performance of the system in Ah Hoc wireless
network. Due to the mobility of nodes, channel reservation and the node information cannot
be periodically maintained. So the throughput of the network is highly reduced.
A proxy server works by intercepting connections between sender and receiver. All incoming
data enters through one port and is forwarded to the
24. What are the advantages of reservation based MAC protocols over contention based
MAC protocols?
MACA/PR is an efficient bandwidth reservation protocol that can support real time traffic
sessions
MACA/PR is that it does not require global synchronization among nodes o RTMAC is its
bandwidth efficiency
RTMAC is its asynchronous mode of operation where nodes do not require any global time
synchronization
De-Authentication
Disassociation
Integration
Datadelivery
Privacy
Reassociation
9. What is NS2
NS2 stands for Network Simulator Version. It is an open-source event-driven simulator
designed specifically for research in computer communication network
12.
13. Short notes on TOSSIM
Power tossim is a scalable simulation environment .it provides accurate estimate of
power consumption.
14. Short notes on cooja
Cooja is a highly useful tool for Contiki development It allows developers to test their
code and systems long before running it on the target hardware
UNIT 5-SENSOR NETWORK PLATFORMS AND TOOLS
PART B AND C QUESTIONS