You are on page 1of 34

Wireless Sensor Network Paper 2019

(a)Attempt All (Each of 5Marks)

1. What is the access point (AP) in wireless LAN?


(a) wireless.
(b) device that allow wireless device to connect to a wired network.
(c) both device that allow wireless device to connect to a wired network and
wireless device itself. (d) none of the mentioned.
2. A transceiver that is ready to receive but is not currently receiving anything is
said to be in an
(a) idle-state (b) sleep state (c) transmit state
(d) receive state
3. A GSM system consists of _____ Subsystems.
(a) five (b) four (c) three (d)two
4. Sky wave ranges from ______.
(a) above 100 (b)>30 MHz (c)<2 MHz
(d)2 MHz-30 MHz
5. TCP is a connection-oriented protocol.
(a) true (b) false

(b)Fill in the blank with the following option


{structure, Physical, Data gathering, isotropic radiator, mobile}
1.A sensor network is designed to collect information from a "Physical"
environment.
2.The source of an event can be "isotropic radiator".
3.A theoretical reference antenna is the "isotropic radiator".

1
4."Data gathering" is to transmit data that has been collected by the sensor nodes
to the base station.
5.Hierarchical routing protocols imposes a "structure" on the network.

(c)Answer the following in one line.

1.What Tiny Os?


Ans. TinyOS is an open-source, event-driven operating system designed for low-
power wireless devices with limited resources, such as sensor networks and
smart embedded systems. It is written in the nesC programming language and
provides a flexible and modular architecture to support various applications in
these domains.

2.What does a gateway node do?


Ans. In the context of a network, a gateway node acts as an interface between
two or more different networks, allowing communication and data exchange
between them. It can translate protocols and data formats between networks,
perform security and authentication checks, and route data packets to their
intended destinations. Gateway nodes are often used in IoT and sensor networks
to connect devices to the internet or to other networks, providing access to cloud-
based services and enabling remote management and control of the devices.

3.What is shadowing?
Ans. In the context of wireless communication, shadowing refers to the
attenuation or weakening of a radio signal due to the obstruction or absorption of
the signal by physical objects, such as buildings, trees, or terrain. This effect can
cause signal fading and signal strength variations in different locations, even
within a small area. Shadowing is one of the main causes of signal loss and
degradation in wireless communication, and it can be mitigated through
techniques such as antenna diversity, power control, and frequency hopping.

2
4.What is Data dissemination?
Ans. Data dissemination refers to the process of distributing or broadcasting data
to a large number of users or recipients, often over a network or through wireless
communication. This can involve the transmission of various types of data, such
as multimedia, sensor data, or software updates, to individual devices or groups
of devices in a timely and efficient manner. Data dissemination is a critical
component in many applications and domains, such as IoT, smart cities,
emergency response, and social networks, where the timely and accurate
distribution of information can significantly impact the decision-making and
actions of users.

5.GPRS stands for?


Ans. GPRS stands for General Packet Radio Service. It is a mobile data service
provided by GSM-based cellular networks that allows the wireless transmission
of IP-based data packets, such as email, web browsing, and multimedia
messaging. GPRS is a packet-switched technology, which means that data is
transmitted in discrete packets and only when it is needed, rather than in a
continuous stream like in circuit-switched networks. This allows more efficient
use of network resources and higher data transfer rates. GPRS has been largely
superseded by newer and faster mobile data standards such as 3G, 4G, and 5G.

Q.2 Attempt the following:

1. Define & explain any five tasks of transceivers


Ans. Transceivers are devices that can both transmit and receive signals, typically
used in wireless communication systems. Some common tasks that transceivers
perform are:

1. Modulation and Demodulation: Transceivers often modulate the outgoing


signal to carry information, and then demodulate incoming signals to
extract the original information. This can involve different types of
modulation techniques, such as amplitude modulation (AM), frequency
modulation (FM), or phase modulation (PM).
3
2. Frequency Synthesis: Transceivers use frequency synthesis to generate a
stable and accurate radio frequency (RF) signal, which is used to transmit
and receive signals. This can involve techniques such as phase-locked loops
(PLLs) or direct digital synthesis (DDS) to generate the RF signal.

3. Amplification: Transceivers use amplifiers to boost the power of the


outgoing signals and amplify the incoming signals to improve their signal-
to-noise ratio. This can involve different types of amplifiers, such as low-
noise amplifiers (LNAs), power amplifiers (PAs), or intermediate-
frequency (IF) amplifiers.

4. Filtering: Transceivers often use filters to remove unwanted frequencies or


noise from the signals. This can involve various types of filters, such as
band-pass filters, low-pass filters, high-pass filters, or notch filters.

5. Antenna Control: Transceivers may have an antenna control system that


allows them to adjust the direction or polarization of the antenna to improve
the signal quality or to avoid interference from other signals. This can
involve different types of antenna systems, such as omnidirectional
antennas, directional antennas, or phased-array antennas.

2. Explain sensor node with its different categories


Ans. Sensor nodes are small, low-power electronic devices that are used to detect
and collect data from their environment. They are commonly used in wireless
sensor networks (WSNs) to provide real-time data about environmental
conditions. Sensor nodes can be divided into different categories based on their
functionality, power consumption, and communication capabilities. In this
article, we will explore the different types of sensor nodes and their applications.

1. Data acquisition nodes:

4
These types of sensor nodes are used to collect data from different sources. They
are equipped with sensors that can measure various parameters such as
temperature, humidity, pressure, and light. Data acquisition nodes are usually
deployed in large numbers to cover a wide area and provide comprehensive data
about environmental conditions. These nodes are powered by batteries and are
designed to consume minimal power to extend their operational lifetime.

2. Processing nodes:
Processing nodes are responsible for analyzing and processing the data received
from data acquisition nodes. They are equipped with more powerful processors
and memory than data acquisition nodes, allowing them to handle more complex
data analysis tasks. These nodes are usually connected to a central node, which
acts as a gateway between the WSN and the external world.

3. Routing nodes:
Routing nodes are responsible for forwarding data from one node to another in a
WSN. They are equipped with a radio transceiver and a routing protocol that
enables them to communicate with other nodes in the network. Routing nodes
can be used to create different network topologies, including mesh, star, and tree.

4. Sink nodes:
Sink nodes are also known as base stations or gateway nodes. They are
responsible for collecting data from all the nodes in the network and forwarding
it to an external system for further processing. Sink nodes usually have more
processing power and memory than other nodes in the network to handle the
large amounts of data received from multiple nodes.

5. Actuator nodes:
Actuator nodes are responsible for controlling physical devices such as motors,
valves, and switches. These nodes are connected to a WSN and can be controlled
remotely using wireless communication protocols. Actuator nodes are typically

5
used in industrial automation and control systems to control the operation of
machines and equipment.

6. Hybrid nodes:
Hybrid nodes are sensor nodes that can perform multiple functions. They can be
equipped with sensors for data acquisition, processors for data processing, and
radios for wireless communication. Hybrid nodes are versatile and can be used in
a wide range of applications, including environmental monitoring, healthcare,
and smart homes.

In conclusion, sensor nodes play a critical role in wireless sensor networks by


providing real-time data about environmental conditions. They can be divided
into different categories based on their functionality, power consumption, and
communication capabilities. Each type of sensor node has its own unique
application and can be used in a wide range of fields, including industrial
automation, healthcare, and environmental monitoring.

3. What are different optimization goals for Wireless Sensor Networks?


Ans. Wireless Sensor Networks (WSNs) are composed of a large number of
small, low-power, and autonomous devices called sensor nodes. These nodes can
be deployed in various environments to sense and collect data about the physical
world. However, due to the limited resources of sensor nodes, such as energy,
computational power, memory, and communication bandwidth, it is necessary to
optimize various aspects of WSNs to ensure their efficient and effective
operation.

Here are some of the different optimization goals for WSNs:

1. Energy Efficiency: One of the primary optimization goals for WSNs is to


minimize the energy consumption of sensor nodes to extend the network
lifetime. Since most WSNs are powered by batteries, energy is a scarce
resource that needs to be carefully managed. The energy efficiency of
6
WSNs can be improved by using low-power hardware and software design,
energy-aware routing protocols, and efficient data aggregation techniques.

2. Network Coverage: Another optimization goal is to ensure that the network


can cover the target area with a minimum number of sensors. This is
important for minimizing the deployment cost of the network and
maximizing the coverage area. To achieve this goal, WSNs can use
techniques such as clustering, directional sensing, and optimal placement of
sensor nodes.

3. Data Accuracy: WSNs are designed to collect data about the physical
world. Therefore, it is essential to ensure that the collected data is accurate
and reliable. The accuracy of data can be improved by using appropriate
sensor technologies, signal processing techniques, and data fusion
algorithms.

4. Delay and Throughput: WSNs must be able to deliver data in a timely


manner to support real-time applications. Hence, optimizing the data
delivery rate and minimizing the end-to-end delay are important
optimization goals. This can be achieved by using efficient routing
protocols, congestion control mechanisms, and scheduling algorithms.

5. Security: WSNs may be vulnerable to security attacks due to their


distributed and wireless nature. Therefore, ensuring that the sensor nodes
and the data they transmit are protected against unauthorized access is a
significant optimization goal. This can be achieved by using encryption,
authentication, and key management techniques.

6. Scalability: WSNs may need to expand to accommodate additional sensors


and nodes. Thus, scalability is another optimization goal. This can be
achieved by using distributed protocols, self-organizing algorithms, and
multi-hop routing.

7
7. Fault Tolerance: WSNs are subject to various types of faults, including
node failures, link failures, and network partitions. Thus, ensuring that the
network can continue to operate even in the presence of these faults is
another important optimization goal. This can be achieved by using fault-
tolerant routing protocols, redundancy, and self-healing algorithms.

In conclusion, WSNs have various optimization goals, including energy


efficiency, network coverage, data accuracy, delay and throughput, security,
scalability, and fault tolerance. By optimizing these goals, WSNs can achieve
their objectives, such as monitoring the physical environment, detecting
anomalies, and supporting various applications.

4. List & explain different types of application of WSN


Ans. Wireless Sensor Networks (WSNs) have numerous applications in various
domains. Here are some of the different types of applications of WSNs and their
explanations:

1. Environmental Monitoring: WSNs can be used to monitor the environment,


such as air quality, temperature, humidity, and pollution. The collected data
can be used for scientific research, public health, and urban planning.

2. Industrial Automation: WSNs can be used to monitor and control industrial


processes, such as manufacturing, assembly lines, and inventory
management. The collected data can be used to optimize the processes,
reduce waste, and increase productivity.

3. Healthcare: WSNs can be used for remote patient monitoring, fall


detection, and emergency response. The collected data can be used for
medical diagnosis, treatment, and prevention.

8
4. Agriculture: WSNs can be used to monitor the growth, health, and
productivity of crops, livestock, and fish. The collected data can be used for
precision farming, irrigation, and pest control.

5. Smart Homes and Buildings: WSNs can be used to monitor and control
various aspects of homes and buildings, such as energy consumption,
temperature, lighting, and security. The collected data can be used to
optimize the energy usage, improve the indoor environment, and enhance
the safety.

6. Transportation: WSNs can be used to monitor and control traffic, parking,


and logistics. The collected data can be used to optimize the transportation
network, reduce congestion, and improve the efficiency.

7. Military and Defense: WSNs can be used for surveillance, reconnaissance,


and battlefield monitoring. The collected data can be used for situational
awareness, threat detection, and decision-making.

8. Disaster Management: WSNs can be used for disaster monitoring,


prediction, and response. The collected data can be used for early warning,
evacuation, and relief operations.

In conclusion, WSNs have a wide range of applications, including environmental


monitoring, industrial automation, healthcare, agriculture, smart homes and
buildings, transportation, military and defense, and disaster management. By
using WSNs, various industries and domains can benefit from the real-time data
collection, analysis, and decision-making capabilities.

5. What are different functionalities that a service interface should provide in


WSN?
Ans. In Wireless Sensor Networks (WSNs), a service interface is an abstraction
layer between the application layer and the underlying network and hardware
9
layers. It provides a set of functionalities that enable the application layer to
interact with the WSN and access its resources. Here are some of the different
functionalities that a service interface should provide in WSNs:

1. Resource Discovery: The service interface should provide a mechanism for


discovering the available resources in the network, such as sensor nodes,
data storage, and communication channels. This can be achieved by using a
service discovery protocol that allows the application to browse the
network and locate the desired resources.

2. Resource Access: The service interface should provide a mechanism for


accessing the available resources in the network, such as reading sensor
data, writing data to storage, and sending messages over the network. This
can be achieved by using an application programming interface (API) that
provides a set of functions for accessing the resources.

3. Quality of Service (QoS): The service interface should provide a


mechanism for specifying and enforcing the QoS requirements of the
application. This can be achieved by using a QoS framework that allows
the application to specify the desired QoS parameters, such as latency,
reliability, and throughput.

4. Security: The service interface should provide a mechanism for securing


the communication between the application and the network, such as
authentication, encryption, and key management. This can be achieved by
using a security framework that provides a set of functions for securing the
communication.

5. Data Aggregation: The service interface should provide a mechanism for


aggregating the sensor data from multiple nodes and reducing the amount
of data sent over the network. This can be achieved by using a data
aggregation protocol that allows the application to specify the aggregation
function and the nodes to be aggregated.
10
6. Event Notification: The service interface should provide a mechanism for
notifying the application of the events that occur in the network, such as
node failures, link failures, and data arrivals. This can be achieved by using
an event notification protocol that allows the application to register for the
desired events and receive the notifications.

In conclusion, the service interface in WSNs should provide a set of


functionalities that enable the application layer to interact with the network and
access its resources. These functionalities include resource discovery, resource
access, QoS, security, data aggregation, and event notification. By providing
these functionalities, the service interface can simplify the development of WSN
applications and improve their performance and reliability.

6. Explain the block diagram of a sensor node


Ans. A sensor node is a basic building block of a Wireless Sensor Network
(WSN) that consists of several components working together to sense, process,
and transmit data over the network. Here is a block diagram of a typical sensor
node:

1. Sensor: The sensor is the primary component of the sensor node that senses
the physical or environmental parameter, such as temperature, humidity,
light, or motion. It converts the analog signals into digital signals that can
be processed by the microcontroller.

2. Analog-to-Digital Converter (ADC): The ADC is a component that


converts the analog signals from the sensor into digital signals that can be
processed by the microcontroller. The resolution of the ADC determines
the accuracy of the measured data.

3. Microcontroller: The microcontroller is the central processing unit of the


sensor node that controls the sensing, processing, and communication
11
functions. It reads the digital signals from the ADC, processes the data, and
communicates with the other nodes in the network.

4. Memory: The memory is a component that stores the data and programs of
the sensor node. It consists of two types of memory: volatile memory, such
as RAM, for temporary storage of data and instructions, and non-volatile
memory, such as ROM, for permanent storage of programs and data.

5. Transceiver: The transceiver is a component that enables the sensor node to


communicate with other nodes in the network. It consists of a transmitter
that sends the data over the air and a receiver that receives the data from
other nodes. The transceiver can use various wireless communication
standards, such as Zigbee, Bluetooth, or Wi-Fi.

6. Power Supply: The power supply is a component that provides the


necessary power to the sensor node. It can use various sources of power,
such as batteries, solar cells, or energy harvesters, depending on the
application requirements.

7. Sensor Interface: The sensor interface is a component that connects the


sensor to the ADC and the microcontroller. It provides the necessary signal
conditioning and amplification to ensure accurate measurement of the
sensor data.

8. Antenna: The antenna is a component that enables the sensor node to


transmit and receive data over the air. It can be integrated into the
transceiver or can be a separate component.

In conclusion, a sensor node is a complex system that consists of several


components working together to sense, process, and transmit data over the
network. The block diagram of a sensor node includes a sensor, ADC,
microcontroller, memory, transceiver, power supply, sensor interface, and
12
antenna. By integrating these components, the sensor node can perform various
sensing and monitoring tasks in a wide range of applications.

Q.3 Attempt the following:

1. Explain different performance requirements of MAC protocol.


Ans. A Medium Access Control (MAC) protocol is a set of rules that governs
how wireless devices communicate with each other and access a shared wireless
channel in a Wireless Sensor Network (WSN). The MAC protocol is responsible
for ensuring that multiple devices can communicate with each other without
interference, collisions, or congestion. In this article, we will discuss the different
requirements of a MAC protocol.

1. Low Power Consumption:


One of the most critical requirements of a MAC protocol is low power
consumption. The MAC protocol must ensure that the devices in the WSN
consume the least amount of power possible to increase the network's lifetime.
The MAC protocol must minimize the energy expended on idle listening,
overhearing, and transmission. The protocol should also enable the devices to
sleep or turn off their radios when not in use.

13
2. Low Latency:
Another critical requirement of a MAC protocol is low latency. The MAC
protocol must ensure that the devices can transmit and receive data quickly to
minimize the delay in data transmission. The protocol should provide efficient
scheduling and data transfer mechanisms that reduce the time required to
complete a communication transaction.

3. High Reliability:
The MAC protocol must ensure high reliability in data transmission. The
protocol should provide mechanisms to detect and correct errors and minimize
the impact of noise and interference on the wireless channel. The protocol should
also ensure that the data is transmitted without loss or duplication.

4. Scalability:
The MAC protocol must be scalable to support a large number of devices in the
WSN. The protocol should provide efficient mechanisms for channel access,
synchronization, and collision avoidance. The protocol should also be able to
adapt to the changing network topology and traffic patterns.

5. Fairness:
The MAC protocol must ensure that all devices in the WSN have an equal
opportunity to access the wireless channel. The protocol should provide
mechanisms to prevent any device from monopolizing the channel or delaying
the transmission of other devices.

6. Security:
The MAC protocol must provide security mechanisms to prevent unauthorized
access to the wireless channel and protect the data transmitted in the network.
The protocol should provide encryption, authentication, and access control
mechanisms to ensure the integrity and confidentiality of the data.

14
In conclusion, a MAC protocol is an essential component of a Wireless Sensor
Network (WSN). The MAC protocol must meet several requirements, including
low power consumption, low latency, high reliability, scalability, fairness, and
security. These requirements are critical for the efficient operation of the WSN
and the successful deployment of various applications such as environmental
monitoring, healthcare, and smart cities.

2. Explain periodic Listen & sleep operation in S-MAC.


Ans. S-MAC (Sensor-MAC) is a power-saving MAC protocol designed for
wireless sensor networks (WSNs). It is designed to conserve energy by using
periodic listen and sleep cycles. In this protocol, sensor nodes periodically wake
up to listen for incoming data and then go back to sleep to conserve energy. The
listen and sleep operation is controlled by a duty cycle, which is the ratio of the
time the node spends in the listen mode to the total cycle time.
The periodic listen and sleep operation in S-MAC is achieved through the
following steps:

1. Sleep Mode: When a sensor node is not actively transmitting or receiving


data, it enters a low-power sleep mode to conserve energy. In sleep mode,
the node turns off its radio and other hardware components except for a
timer that is used to wake up the node periodically.

15
2. Listen Mode: After the sleep timer expires, the node wakes up and enters
the listen mode, during which it turns on its radio and listens for incoming
packets. During the listen mode, the node can receive data packets from
other nodes and can also send packets to the base station or other nodes in
the network.

3. Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA): In


the listen mode, the node performs carrier sense multiple access with
collision avoidance (CSMA/CA) to avoid collisions with other nodes that
may be transmitting data simultaneously. The node listens to the wireless
channel for a random period of time to detect if it is busy or not. If the
channel is idle, the node waits for a random backoff time and then transmits
its data. If the channel is busy, the node waits for a random period of time
and then repeats the carrier sense procedure until the channel is free.

4. Backoff and Sleep: After the node has successfully transmitted or received
data, it goes back to sleep mode to conserve energy. If the node fails to
transmit or receive data after a fixed number of retries, it goes back to sleep
mode and tries again in the next listen cycle.

The periodic listen and sleep operation in S-MAC can significantly reduce the
energy consumption of sensor nodes by avoiding unnecessary idle listening and
by efficiently using the available wireless channel. By controlling the duty cycle
and other parameters, the protocol can optimize the trade-off between energy
consumption and communication performance, such as latency, throughput, and
packet loss. S-MAC is a widely used protocol in WSNs and has been shown to
be effective in many applications, such as environmental monitoring, healthcare,
and smart cities.

3. List & Explain different routing strategies in WSN.


Ans. Wireless Sensor Networks (WSNs) are often deployed in environments
where the sensors may be constrained by limited energy resources, processing
power, and communication bandwidth. Routing in WSNs plays a critical role in
16
ensuring that the data is efficiently and reliably delivered to the sink node. Here
are some of the common routing strategies in WSNs:

1. Direct Routing: In direct routing, each sensor node sends data directly to
the sink node. This strategy is simple but may not be suitable for large-scale
WSNs as it could result in high traffic and lead to congestion, which would
further increase energy consumption.

2. Flat Routing: In flat routing, all the nodes are at the same level, and the data
is forwarded hop-by-hop until it reaches the sink node. This approach
requires that every node participate in the routing process, which may lead
to network overhead and potential congestion.

3. Hierarchical Routing: Hierarchical routing divides the network into


clusters, with each cluster having a cluster head that communicates with the
sink node. The nodes within each cluster only communicate with their
respective cluster head, which reduces network traffic and energy
consumption.

4. Location-Based Routing: In location-based routing, each node has a unique


geographical location, and the data is forwarded to a node that is closer to
the sink node. This approach can improve network efficiency and reduce
energy consumption, but it requires accurate location information.

5. Data-Centric Routing: Data-centric routing focuses on the data being


transmitted rather than the nodes. The data is tagged with a name or
attribute, and the routing decisions are based on the data's characteristics.
This approach can reduce communication overhead and conserve energy by
only transmitting relevant data.

6. Multi-path Routing: Multi-path routing involves using multiple routes to


transmit data from source to destination. This approach can improve
17
network reliability by providing redundancy in case a path fails, but it may
increase energy consumption and network overhead.

Each of these routing strategies has its advantages and disadvantages, and the
choice of the routing strategy depends on the specific requirements of the
application and network.
4. How Power-efficient gathering in sensor information systems (PEGASIS)
routing protocol works?
Ans. Power-efficient gathering in sensor information systems (PEGASIS) is a
hierarchical routing protocol designed for Wireless Sensor Networks (WSNs) to
improve energy efficiency and prolong network lifetime. Here's how PEGASIS
works:

1. Node Selection: In PEGASIS, the nodes are first arranged in a chain, and
then each node selects its closest neighbor to form a one-dimensional chain.

2. Cluster Formation: In the next step, nodes are divided into clusters, where
each cluster contains a fixed number of nodes. The cluster heads are
selected based on the remaining energy level of the nodes.

3. Cluster Head Chain Formation: The cluster heads then form a chain, where
each cluster head selects the next closest cluster head as its successor.

4. Data Aggregation and Transmission: Data is collected from each sensor


node and transmitted through the chain of cluster heads until it reaches the
sink node. The cluster head closest to the sink node is responsible for
forwarding the aggregated data to the sink node.

5. Data Aggregation and Transmission Optimization: To reduce energy


consumption, PEGASIS uses data aggregation and transmission
optimization techniques. The data is aggregated at each cluster head and
18
transmitted only once to the next cluster head. This reduces the number of
transmissions required to reach the sink node, and hence reduces energy
consumption.

6. Successor Selection: After a node transmits its data to its successor, it turns
off its transmitter to conserve energy. The next time it needs to transmit
data, it turns on its transmitter and selects the next closest cluster head as its
successor.

PEGASIS improves energy efficiency by reducing the number of transmissions


required to reach the sink node and distributing the energy load evenly across the
nodes. This hierarchical routing protocol is suitable for large-scale WSNs where
energy efficiency is a critical requirement.

5. What are the issues need to consider to design transport protocols for WSNs.
Ans. Designing transport protocols for Wireless Sensor Networks (WSNs) is a
challenging task due to several factors that need to be considered. Here are some
of the key issues that need to be addressed when designing transport protocols for
WSNs:

1. Energy Efficiency: Since the sensor nodes in WSNs are typically battery-
powered, energy efficiency is a critical consideration. The transport
protocol should minimize the energy consumption during data transfer and
ensure that the nodes are not drained of their energy resources quickly.

2. Data Aggregation: WSNs generate a large amount of data, which needs to


be aggregated before transmission to reduce the network traffic and energy
consumption. The transport protocol should support data aggregation and
ensure that the data is transmitted efficiently.

3. Network Heterogeneity: WSNs typically comprise nodes with different


capabilities and operating conditions. The transport protocol should be able
19
to handle network heterogeneity and adapt to different network
configurations.

4. Node Failure: Since the sensor nodes in WSNs are prone to failures due to
factors such as battery exhaustion or physical damage, the transport
protocol should be able to detect and recover from node failures to ensure
data integrity and reliability.

5. Quality of Service (QoS): In some WSN applications, QoS requirements


such as latency, reliability, and throughput are critical. The transport
protocol should be able to provide the necessary QoS guarantees while
minimizing energy consumption.

6. Security: WSNs may transmit sensitive data, and hence the transport
protocol should support security mechanisms such as encryption,
authentication, and confidentiality to protect the data from unauthorized
access.

7. Scalability: WSNs may comprise a large number of nodes, and hence the
transport protocol should be scalable to handle large-scale networks.

Designing transport protocols for WSNs requires careful consideration of these


issues to ensure that the protocols can handle the unique characteristics of WSNs
and provide efficient and reliable data transfer.

6. Explain SPIN protocol


Ans. Sensor Protocols for Information via Negotiation (SPIN) is a distributed
communication protocol designed for Wireless Sensor Networks (WSNs). It uses
a negotiation-based approach for efficient and adaptive data dissemination.
Here's how SPIN works:

20
1. Data Encoding: In SPIN, the data is encoded in a specific format, which
includes the data type, data value, and other metadata. This format enables
efficient data aggregation and processing.

2. Message Exchange: SPIN uses a message exchange mechanism based on


three types of messages - ADV, REQ, and DATA. The ADV message is
used by a node to advertise its data to its neighbors. The REQ message is
used by a node to request data from its neighbors. The DATA message is
used to transfer the data from the source node to the destination node.

3. Negotiation-Based Data Dissemination: SPIN uses a negotiation-based


approach to disseminate data efficiently. When a node receives an ADV
message from a neighbor, it can choose to store the advertisement or
request the data from the advertising node. If the node chooses to request
the data, it sends a REQ message to the advertising node, and the
advertising node responds with a DATA message. If multiple nodes request
the same data, the advertising node sends the data only once, and the
requesting nodes can share the received data.

4. Energy-Efficient Operation: SPIN is designed to be energy-efficient. Nodes


use a duty cycle to conserve energy, where they switch off their radios most
of the time and turn them on only when necessary. Nodes also use data
aggregation to reduce the number of messages transmitted, which reduces
energy consumption.

SPIN is a lightweight and scalable protocol that can handle a large number of
nodes. Its negotiation-based approach enables efficient and adaptive data
dissemination, which reduces the network traffic and energy consumption. SPIN
has been widely used in WSN applications such as environmental monitoring,
healthcare, and military surveillance.

Q.4 Attempt the following:

21
1. Explain range for signal propagation in wireless transmission.
Ans. The range of signal propagation in wireless transmission refers to the
maximum distance that a wireless signal can travel between a transmitter and a
receiver while still maintaining a reliable and usable signal strength. The range of
signal propagation is determined by several factors:

1. Frequency: The frequency of the wireless signal affects the range of


propagation. Generally, higher frequencies have a shorter range than lower
frequencies. This is because higher frequencies are more easily absorbed by
obstacles and are more susceptible to interference.

2. Transmit Power: The transmit power of the wireless signal also affects the
range of propagation. The higher the transmit power, the greater the range
of propagation. However, higher transmit power also leads to greater
energy consumption and may cause interference with other devices.

3. Obstacles: Obstacles such as walls, buildings, and other objects in the


environment can weaken the signal and reduce the range of propagation.
The density and type of obstacles can have a significant impact on the
range of propagation.

4. Antenna Type: The type of antenna used for transmission and reception
also affects the range of propagation. Antennas with higher gain can
increase the range of propagation by focusing the signal in a specific
direction.

5. Environmental Conditions: Environmental factors such as temperature,


humidity, and atmospheric pressure can affect the range of signal
propagation. For example, high humidity can weaken the signal and reduce
the range of propagation.

22
It's important to note that the range of signal propagation is not a fixed value and
can vary depending on the specific wireless system, the environment, and other
factors. In practical applications, the range of propagation is often determined
through empirical testing and optimization to ensure reliable and effective
wireless communication.

2. What are the Tele services provided by GSM?


Ans. Global System for Mobile Communications (GSM) is a standard for cellular
communication used by mobile phones and other devices. GSM provides a range
of telecommunication services, including:

1. Voice Calls: GSM supports circuit-switched voice calls, which allow users
to make and receive phone calls using their mobile devices. GSM uses
Time Division Multiple Access (TDMA) technology to allocate radio
frequencies to multiple calls simultaneously.

2. SMS (Short Message Service): SMS allows users to send and receive text
messages using their mobile devices. SMS messages are limited to 160
characters and can be sent and received even when voice calls are not
possible.

3. MMS (Multimedia Messaging Service): MMS allows users to send and


receive multimedia messages, including images, audio, and video clips.
MMS messages are sent using data transmission and are typically more
expensive than SMS messages.

4. Data Services: GSM supports a range of data services, including internet


browsing, email, and file transfer. These services are typically accessed
using a GPRS (General Packet Radio Service) or EDGE (Enhanced Data
rates for GSM Evolution) connection.

23
5. Roaming: GSM enables users to use their mobile devices while traveling in
other countries or regions. This is possible through international roaming
agreements between different GSM network operators.

6. Caller ID: GSM supports caller ID, which allows users to see the phone
number of the incoming call before answering the call.

7. Call Waiting: GSM supports call waiting, which allows users to receive
incoming calls while they are already on a call. The user can choose to put
the current call on hold and answer the incoming call.

8. Call Forwarding: GSM supports call forwarding, which allows users to


forward incoming calls to another phone number or voicemail.

GSM provides a range of telecommunication services that have become an


essential part of modern communication. These services have enabled people to
communicate and share information quickly and easily, irrespective of their
location.

3. With block diagram Explain System: architecture of UMTS?


Ans. The Universal Mobile Telecommunications System (UMTS) is a third-
generation (3G) wireless communication technology that provides high-speed
data transfer and multimedia services to mobile devices. The architecture of
UMTS can be divided into two main parts: the user equipment (UE) and the core
network.

1. User Equipment (UE):


The UE includes the mobile device, such as a smartphone or tablet, and the
Universal Subscriber Identity Module (USIM) card. The USIM card provides
authentication and security services for the user, and stores user-specific

24
information such as phone number, address book, and other data. The UE
connects to the UMTS network through the Radio Access Network (RAN).

2. Radio Access Network (RAN):


The RAN is responsible for transmitting and receiving wireless signals between
the UE and the UMTS core network. The RAN consists of two main parts: Node
B and Radio Network Controller (RNC).

 Node B: Node B is a base station that communicates with the UE over the
air interface using WCDMA (Wideband Code Division Multiple Access)
technology. Node B is responsible for managing the radio resources, signal
transmission, and reception.

 Radio Network Controller (RNC): RNC is responsible for managing and


controlling multiple Node Bs. RNC manages the radio resources and
mobility management for the UE. RNC also provides packet routing and
forwarding, congestion control, and Quality of Service (QoS) management.

3. Core Network:
The core network provides the backbone for the UMTS network, and it includes
several components:
 Mobile Switching Center (MSC): The MSC is responsible for call routing
and control. It provides connections between the UE and the Public
Switched Telephone Network (PSTN) or other networks.

 Serving GPRS Support Node (SGSN): The SGSN is responsible for packet
switching and routing in the UMTS network. It manages the user's
mobility, location management, and packet delivery.

25
 Gateway GPRS Support Node (GGSN): The GGSN provides an interface
between the UMTS network and external packet data networks, such as the
internet. It is responsible for packet routing, forwarding, and charging.

 Home Location Register (HLR): The HLR is a database that stores user-
specific information, such as the user's phone number, address book, and
other data.

 Authentication Center (AUC): The AUC is responsible for providing


authentication and security services for the user.

Overall, the UMTS system architecture is designed to provide high-speed data


transfer and multimedia services to mobile devices. The system is divided into
two main parts: the UE and the core network, which are connected through the
RAN. The core network provides the backbone for the UMTS network, and it
includes several components that provide call routing and control, packet
switching and routing, and authentication and security services.

4. Write difference between GEO , LEO, MEO?


Ans. Here is a table summarizing the differences between GEO, LEO, and MEO
satellite orbits:
GEO
(Geostationary LEO (Low Earth MEO (Medium
Attribute Earth Orbit) Orbit) Earth Orbit)
Approximately 2000 to 36,000
Altitude 36,000 km 160 to 2000 km km
Orbit Time 24 hours 90 minutes 2 to 12 hours
Coverage Global Regional Regional
Latency High Low Medium

26
GEO
(Geostationary LEO (Low Earth MEO (Medium
Attribute Earth Orbit) Orbit) Earth Orbit)
Cost Expensive Affordable Affordable
Satellite internet,
TV broadcasting, Earth observation, Navigation,
continuous low-latency mobile
Applications coverage communication communication

In summary, GEO satellites orbit at a high altitude, take 24 hours to orbit the
Earth, provide global coverage, have high latency, are expensive to launch and
maintain, and are best suited for continuous coverage applications. LEO satellites
orbit at a low altitude, take 90 minutes to orbit the Earth, provide regional
coverage, have low latency, are affordable to launch and maintain, and are best
suited for low-latency communication and Earth observation applications. MEO
satellites orbit at a medium altitude, take between 2 to 12 hours to orbit the Earth,
provide regional coverage, have medium latency, are affordable to launch and
maintain, and are best suited for navigation and mobile communication
applications.

5. Explain is HSCSD (High Speed circuit Switched data).


Ans. HSCSD (High Speed Circuit Switched Data) is a wireless communication
technology that was introduced as an enhancement to the existing circuit-
switched data (CSD) technology used in GSM networks. HSCSD allows data to
be transmitted over a GSM network at a higher speed than CSD.

In HSCSD, a dedicated circuit-switched connection is established between the


sender and receiver, allowing data to be transmitted at a fixed rate. The
maximum speed of HSCSD is 57.6 kbps, which is four times faster than CSD's
maximum speed of 14.4 kbps.

27
HSCSD achieves its higher data transmission speed by allocating multiple time
slots in the GSM network to a single user, rather than using only one time slot as
in CSD. The number of time slots allocated to a user depends on the bandwidth
required by the application and the availability of time slots in the network.

HSCSD is a simple and reliable technology that can be used for applications that
require a dedicated circuit-switched connection, such as remote monitoring and
control systems, point-of-sale terminals, and telemetry applications. However,
the use of dedicated connections means that HSCSD is not efficient for bursty
data transmission, and its data rates are limited compared to more modern
wireless technologies such as GPRS and LTE.

6.Explain features of DECT System.


Ans. DECT (Digital Enhanced Cordless Telecommunications) is a wireless
communication standard designed for voice and data transmission in residential
and business environments. The main features of DECT systems include:

1. Wide Coverage: DECT operates in the 1880-1900 MHz frequency band


and provides a range of up to 300 meters in outdoor environments and up to
50 meters indoors.

2. High-Quality Voice Transmission: DECT uses a high-quality digital voice


codec that provides crystal-clear voice quality with low latency and no
noise or interference.

3. Multiple Users: DECT allows multiple users to share the same base station
and frequency channel, supporting up to 12 simultaneous calls.

28
4. Interference-Free: DECT uses Frequency Hopping Spread Spectrum
(FHSS) technology to minimize interference from other wireless devices
operating in the same frequency band.

5. Security: DECT uses Advanced Encryption Standard (AES) encryption to


ensure secure voice and data transmission.

6. Low Power Consumption: DECT handsets and base stations are designed to
operate on low power, enabling long battery life and energy-efficient
operation.

7. Scalability: DECT systems can be easily expanded by adding more


handsets and base stations to the network, making it a flexible solution for
growing businesses.

8. Data Transmission: In addition to voice transmission, DECT can also


support data transmission, enabling applications such as wireless internet,
text messaging, and file transfer.

DECT systems are widely used for cordless telephony and are also used in a
variety of other applications, including wireless headsets, baby monitors, home
automation, and security systems.

Q.5Attempt the following:

1.Discuss Salient features of TinyOS.


Ans. TinyOS is an open-source, event-driven operating system designed for use
in low-power wireless sensor networks (WSNs). The salient features of TinyOS
are:

29
1. Component-based architecture: TinyOS is designed using a component-
based architecture that allows developers to create modular, reusable
components that can be easily combined to create complex applications.

2. Energy-efficient: TinyOS is designed to be highly energy-efficient, with a


low-power consumption model that enables long battery life and efficient
use of resources.

3. Scalable: TinyOS is highly scalable, enabling it to be used in small, simple


networks or large, complex networks with thousands of nodes.

4. Real-time operation: TinyOS provides real-time operation, enabling it to


respond quickly to events and perform time-critical operations.

5. Cross-platform support: TinyOS is designed to work with a variety of


hardware platforms, including the popular TelosB and Mote platforms, as
well as a range of other hardware platforms.

6. Efficient memory management: TinyOS uses efficient memory


management techniques to minimize memory usage and optimize
performance.

7. Rich set of built-in components: TinyOS includes a rich set of built-in


components that can be used to perform common tasks in sensor network
applications, such as sensing, data storage, communication, and power
management.

8. Support for network protocols: TinyOS supports a variety of network


protocols, including ZigBee, 6LoWPAN, and IPv6, enabling it to be used in
a wide range of applications.

30
9. Active development community: TinyOS has a large and active
development community that contributes to the ongoing development and
improvement of the operating system.

Overall, TinyOS provides a powerful and flexible platform for developing low-
power wireless sensor network applications, with a range of features designed to
optimize performance, efficiency, and scalability.

2.How Congestion Detection and Avoidance works?


Ans. Congestion detection and avoidance are techniques used to manage network
congestion, which occurs when there is more traffic on a network than it can
handle. Here's how congestion detection and avoidance work:

1. Congestion Detection: To detect congestion, network devices monitor


various network parameters such as the number of packets dropped, the
length of packet queues, or the delay in packet transmission. When the
threshold of one or more of these parameters is exceeded, the device
concludes that there is congestion on the network.

2. Congestion Notification: Once congestion is detected, the network device


notifies other devices on the network of the congestion. This notification
can take the form of an explicit signal sent to the source devices, or it can
be done implicitly through mechanisms like packet drops.

3. Congestion Avoidance: To avoid congestion, devices can take a variety of


actions. One common approach is to reduce the rate at which data is sent.
This can be achieved by reducing the transmission window or using a
congestion control algorithm like TCP Congestion Control. Other methods
of congestion avoidance include traffic shaping, prioritization, and load
balancing.

31
4. Re-evaluation: Once the congestion has been resolved, network devices re-
evaluate the network parameters and adjust their behavior as needed. For
example, if the congestion was caused by an increase in traffic, the device
may increase the transmission window or adjust the congestion control
algorithm to allow for a higher data rate.

Overall, congestion detection and avoidance are important techniques for


managing network traffic and ensuring that data is transmitted efficiently and
reliably. By monitoring network conditions and taking appropriate actions, these
techniques help to prevent congestion and ensure that the network can operate
effectively even under heavy load.

3.Discuss any 2 Mobile and wireless devices.


Ans. Sure, here are two more examples of mobile and wireless devices:

1. Tablet - A tablet is a mobile device that has a larger display than a


smartphone and can perform many of the same functions as a laptop.
Tablets can be used for web browsing, email, video playback, gaming, and
other tasks. They are typically equipped with Wi-Fi, Bluetooth, and cellular
connectivity options for accessing the internet and connecting with other
devices. Some tablets come with detachable keyboards that turn them into
laptop-like devices, while others support stylus input for drawing and note-
taking.

2. Smartwatch - A smartwatch is a wearable device that can connect to a


smartphone and provide notifications, fitness tracking, and other features
on the go. Smartwatches typically include a touch-enabled display and a
range of sensors for tracking physical activity, heart rate, and other health
metrics. They can be used to receive and respond to text messages, make
phone calls, control music playback, and run a variety of apps.
Smartwatches connect to smartphones using Bluetooth or Wi-Fi, allowing
users to access their phone's features without taking it out of their pocket or
bag.
32
4.Write a short note on Radio subsystem and its components.
Ans. The radio subsystem is an essential component of any mobile
communication system that allows wireless communication between devices. It
consists of several components that work together to transmit and receive signals
between devices.
The main components of the radio subsystem include:
1. Antenna - This is a device that sends and receives radio waves, which are
used to transmit and receive signals between devices.

2. Transceiver - This is a device that combines a transmitter and a receiver


into a single unit. It converts electrical signals into radio waves and vice
versa.

3. Amplifier - This is a device that increases the strength of the radio signal to
ensure that it can be transmitted over long distances.

4. Modulator/Demodulator - These are devices that convert the digital


information into analog signals for transmission and convert analog signals
back into digital information when received.

5. Frequency synthesizer - This is a device that generates the carrier frequency


for the radio signal.

6. Baseband processor - This is a device that manages the digital data


transmission between the mobile device and the base station.

Together, these components work in tandem to ensure that the radio subsystem
can transmit and receive signals over long distances with minimal loss of data.
They are essential components of any mobile communication system and are
critical to the functioning of modern communication technology.

33
5.Discuss the advantage of cellular systems with small cells.
Ans. Cellular systems with small cells have several advantages:

1. Increased capacity: Small cells increase network capacity by allowing for


more efficient use of available spectrum. With small cells, the same amount
of spectrum can be reused more frequently, resulting in increased capacity
and improved network performance.

2. Improved coverage: Small cells can be deployed in areas where macro cells
have poor coverage, such as indoors or in densely populated areas. This
improves the overall coverage of the network and provides better service to
users.

3. Lower latency: Small cells reduce the distance between the user and the
base station, resulting in lower latency and faster data transfer rates.

4. Lower power consumption: Small cells use less power than macro cells,
which reduces energy costs and makes it easier to deploy them in areas
without access to a reliable power supply.

5. Cost-effectiveness: Small cells are typically less expensive to deploy than


macro cells, which makes it easier for network operators to expand
coverage and improve service quality in areas where it may have been
previously uneconomical to do so.

34

You might also like