0% found this document useful (0 votes)
138 views19 pages

EC8702 Ad Hoc Question Bank Ece

This document discusses ad hoc and wireless sensor networks. It begins by defining an ad hoc network as a spontaneously formed wireless local area network where devices communicate directly without an access point. Routing is the process of selecting best paths in a network and ensures loop-free routing. Some advantages of hierarchical routing protocols are reducing routing table size and improving scalability. Table driven protocols maintain routing tables and example protocols include DSDV and WRP. On-demand protocols discover routes when needed using route requests and replies. Hybrid protocols combine features of proactive and reactive approaches. Applications of ad hoc networks include military uses, emergency response, and wireless mesh networks. Wireless sensor networks differ from ad hoc networks in using mainly broadcast communication and having power and
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
138 views19 pages

EC8702 Ad Hoc Question Bank Ece

This document discusses ad hoc and wireless sensor networks. It begins by defining an ad hoc network as a spontaneously formed wireless local area network where devices communicate directly without an access point. Routing is the process of selecting best paths in a network and ensures loop-free routing. Some advantages of hierarchical routing protocols are reducing routing table size and improving scalability. Table driven protocols maintain routing tables and example protocols include DSDV and WRP. On-demand protocols discover routes when needed using route requests and replies. Hybrid protocols combine features of proactive and reactive approaches. Applications of ad hoc networks include military uses, emergency response, and wireless mesh networks. Wireless sensor networks differ from ad hoc networks in using mainly broadcast communication and having power and
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 19

AGNI COLLEGE OF TECHNOLOGY

DEPARTMENT OF ELECTRONICS AND COMMUNICATION


ENGINEERING
EC8702-Ad hoc and wireless sensor networks

UNIT-I
AD HOC NETWORKS – INTRODUCTION AND ROUTING PROTOCOLS

1.What is Ad Hoc Networks?


An ad hoc network is one that is spontaneously formed when devices connect and communicate
with each other. Ad hoc networks are mostly wireless local area networks (WLANs). The
devices communicate with each other directly instead of relying on a base station or access
points as in wireless LANs for data transfer co-ordination. Each device participates in routing
activity, by determining the route using the routing algorithm and forwarding data to other
devices via this route.

2. Define Routing.

Routing is the process of selecting best paths in a network. In the past, the term routing was also
used to mean forwarding network traffic among networks. Routing is performed for many kinds
of networks, including the telephone network , electronic data networks and transportation
networks.

3.How is the loop free property ensured in on demand routing protocol?

It is a fundamental requirement of any routing protocol to avoid unnecessary wastage of


network bandwidth. In ad hoc wireless networks, due to the random movement of nodes,
transient loops may form in the route thus established. A routing protocol should detect such
transient routing loops and take corrective actions.

4.What are the advantages of hierarchical routing protocol?


o Reduction in the size of routing tables
o Better scalability
o Substantially lesser calculation and updates of routing tables
5.List some example of table driven routing protocols
o Destination sequential distance-vector routing
o Wireless routing protocol
o Cluster head gateway switch routing protocol
o Source tree adaptive routing protocol.

6.List the advantages of DSVL routing protocols


o The routers are readily available to all destination at all times, the delay is less
in the route setup process.
o With the help of mechanism like incremental updates, an existing wired
network protocol can be applied to ad hoc wireless networks.

7. What is hybrid routing protocol?

Hybrid routing protocol combines the best feature of proactive and reactive routing protocols.
Hybrid routing protocol use distance vector for more accurate metrics to determine the best
paths to designation network and report routing information only when there is a change in the
topology of the network.

8. List some of the applications of ad hoc wireless networks.


o Military application
o Collaborative and distributed computing
o Emergency operation
o Wireless mesh networks
o Wireless sensor networks.

9. What is wireless sensor network?


Wireless sensor network consists of individual sensor nodes that are able to interact
with their environment by sensing or controlling physical parameters, these nodes have to
collaborate to fulfill their tasks as usually, a single node is incapable of doing so and they
use wireless communication to enable this collaboration. In essence the nodes without such a
network contain atleast some computation, Wireless communication and sensing or control
functionalities.
10.Compare wireless sensor network with ad hoc network
o Wireless sensor network mainly use broadcast communication while ad hoc
networks use point-to-point communication.
o Unlike ad hoc networks wireless sensor networks are limited by sensors limited
power , energy and computational capability,
o Sensor nodes may not have global ID because of the large amount of
overhead and large number of sensors.
11. Based on routing information update mechanism how the routing protocols are
classified?
o Proactive or table driven routing protocol
o Reactive or on demand routing protocol
o Hybrid routing protocol
12. Compare cellular and ad hoc wireless network.

Cellular networks Ad hoc networks


Fixed infrastructure- based Infrastructure less

Reuse of frequency spectrum through Dynamic frequency reuse based on carrier


geographical channel reuse sense mechanism
High cost and time of deployment Quick and cost effective deployment
Easier to employ bandwidth reservation Bandwidth reservation requires complex
medium access control protocols

13. What are the challenging issues in ad hoc network maintenance?


The challenging issues in ad hoc network are
1. Medium access scheme
2. Routing
3. Multicast routing
4. Transport layer protocol , 5. Pricing Schemes,6. Quality of Service Provisioning
7. Self-Organization, 8. Security, 9. Addressing and Service Discovery.

14. Why are ad-hoc networks needed?


Ad hoc networking is often needed where an infrastructure network cannot be deployed and
managed. The presence of dynamic and adaptive routing protocols enables quick formation of ad
hoc networks and is suitable for emergency situations like natural disasters, spontaneous
meetings or military conflicts.

15.List out the issues in Ad- Hoc networks.


Medium access scheme, Routing ,Multicasting ,Transport layer protocol ,Pricing scheme, QoS ,
Self-organization.

16. What is the need for power management in Ad-hoc network?


In Adhoc networks, the routers are power constrained just as the nodes. There is limitation in
availability of power for operation. The power management is needed for 1. Efficient utilization
of energy 2. Increase in life time of the network 3. Portability, weight, size of the hand held
devices 4. Difficulties in replacing batteries 5. Improving channel utilization 6. Selection of
optimal transmission power.

17.List the advantages of DSDV routing protocols.


The advantages and disadvantages of DSDV routing protocols are Advantages 1.Less Delay is
involved in route setup process. 2.DSDV protocol guarantees loop free paths. 3.Incremental
updates with sequence number tags make the existing wired network protocols adaptable to
adhoc wireless networks. 4.Count to infinity problem is reduced in DSDV. 5.Path Selection:
DSDV maintains only the best path instead of maintaining multiple paths to every destination.
With this, the amount of space in routing table is reduced.

18. List the disadvantages of DSDV routing protocols.


Disadvantages 1.Updates due to broken links lead to heavy control overhead during mobility.
2.The control overhead is directly proportional to the number of nodes. 3. Small network with
high mobility or large network with low mobility can choke the available bandwidth. 4.Wastage
of bandwidth due to unnecessary advertising of routing information even if there is no change in
the network topology. 5.Delay in obtaining information about a node could result in stale routing
at the nodes.

19. Give the difference between AODV and DSR.


• DSR has less routing overhead than AODV. • AODV has less normalized MAC overhead than
DSR. • DSR is based on a source routing mechanism whereas AODV uses a combination of •
DSR and DSDV mechanisms. • AODV has better performance than DSR in higher-mobility
scenarios. DSR has less frequent route discovery processes than AODV.

20.List the advantages and disadvantages of AODV routing protocols.


Sequence numbers are used in AODV routing protocol to maintain the freshness of
routes. Advantages of AODV include loop free operation and scalability to a large number of
terminals. When a source node intends to send packets, it checks its routing table to see whether
it has a valid route to that destination. One of the disadvantages of this protocol is that
intermediate nodes can lead to inconsistent routes if the source sequence number is very old and
the intermediate nodes have a higher but not the latest destination sequence number, thereby
having stale entries.

Part-B
1. Explain hidden and exposed terminal problem and near and far terminal problem.
2. Explain the major challenges that a routing protocol designed for ad-hoc wireless
networks face.
3. Explain the design issues in ad-hoc network?
4. What are the characteristics and features of ad hoc networks?
5. Explain the types of ad hoc network routing protocols based on routing information
update Mechanism.
6. Classify and explain ad-hoc wireless network based on routing topology.
7. Explain on demand routing protocol in detail.
8. Discuss table driven protocols with examples.
UNIT - II
SENSOR NETWORKS – INTRODUCTION & ARCHITECTURES

1. What is Active and Passive Sensors?


Active sensors This last group of sensors actively probes the environment. These are quite
specific-triggering an explosion is certainly not a lightly under taken action-and require special
attention. Passive, omnidirectional sensors These sensors can measure a physical quantity at the
point of the sensor node without actually manipulating the environment by active probing-in this
sense, they are passive. There is no notion of “direction” involved in these measurements.
Passive, narrow-beam sensors These sensors are passive as well, but have a well-defined notion
of direction of measurements. A typical example is a camera, which can “take measurements” in
a given direction, but has to be rotated if need be.

2. What is called beacons?


Sensor node localization is a highly desirable capability for wireless sensor network applications.
Localization refers to the process of estimating the coordinates of the sensor nodes in a network
based on various types of measurements and with the aid of a number of beacon or anchor nodes
that know their location.

3. What is use of addresses and names in sensor network?


Unique node identifier.
MAC address.
Network address.
Network identities.

4.Difference between single-hop and multihop networks?


Single-hop Network Multihop Network 1. Because of this limited distance, the simple, direct
communication between source and sink is not always possible. It is an evident and working
solution to overcome problems with large distances. 2. They intended to cover a lot of ground.
The attenuation of radio signals is at least quadratic in most environments.

5.Compare wireless sensor network with ad hoc network.


o Wireless sensor network mainly use broadcast communication while ad hoc
networks use point-to-point communication.
o Unlike ad hoc networks wireless sensor networks are limited by sensors limited
power , energy and computational capability,
o Sensor nodes may not have global ID because of the large amount of overhead
and large number of sensors.

6. Outline the functions performed by a node in a wireless sensor network.


Sensor node can perform the following functions. They are
i) Wireless communication (ii) Single processing
iii) Topology management (iv) Self assembling
v) Routing (vi) Clustering
vi) Scheduling (viii) Digital Encoding
ix) Error correction (x) Storage of data
7. What is data aggregation strategy in Wireless Sensor Network?
Sensor nodes are resource constrained and possess limited battery. So to avoid the usage of more
resources and battery power, data sensed by sensor nodes must be aggregated and disseminated to
other nodes. Data aggregation is the process of collecting data from different sensor nodes and
combining it together by applying aggregate functions. Data aggregation strategies are used to
enhance the network lifetime.

8. What is hidden terminal problem?


Hidden terminals are nodes that are hidden (or not reachable) from the sender of a data
transmission session, but are reachable to the receiver of the session. The hidden terminal can
cause collisions at the receiver node. Or When two transmitter nodes try to send data at the same
time, to the same receiver, they will sense the carrier to be free at the same time, leading to
collisions. This is called hidden terminal problem.

9.What are the challenges caused by sensor network MAC protocol?


o No single controlling authority, so global synchronization is difficult
o Power efficiency issue
o Frequent changes in topology due to node mobility and failure.

10.What are three kinds of MAC protocols used in sensor network?


o fixed -allocation
o demand- based
o contention –based

11.List the IEEE 802.15.4 features


o Data rates of 250kbps, 40kbps and 20kbps
o Two addressing modes; 16 bit short and 64 bit IEEE addressing
o CSMA-CA channel access
o Automatic network establishment by the coordinator.

12. What are the disadvantages of flooding?


o Implosion
o Overlap
o Resource blindness

13.List the advantages of clustering


o Prevent interferences using CDMA
o Flexible and adaptive
o Efficient transmission using TDMA

14.List the disadvantages of clustering


o Cluster head formation more overhead
o Long distance for CH to travel
o Possibility of CH dead
15.List the services provided by IEEE802.11
o Association
o Authentication
o De-Authentication
o Disassociation
o Integration
o Data delivery
o Privacy
o Reassociation.

16. What are the pros and cons of using multichannel MAC protocol over a single channel
protocol?

Although several single channel schemes came into design and tried to achieve a high quality of
services scheme, most of them were not successful due to hidden and exposed terminal
problems and the fairness issue. On the other hand, the multichannel schemes were almost
successful in solving these problems and providing a better and more reliable MAC protocol for
the users.

17.Define QoS
QoS is closely related to the type of network service is the quality of that service which is the
amount and quality of information that can be extracted at given sinks avout the observed
objects or area. Therefore adapted quality concepts like reliable detection of events or the
approximation quality.

18.Define sensor selection.


In the probabilistic framework, this belief is represented as a probability distribution over the
state space.
We consider two scenarios, localizing a stationary source and tracking a moving source, to
illustrate the use of information-based sensor tasking.

19. Mobility of nodes in a sparsely populated mobile Adhoc network is less. What is the
choice between proactive routing protocol and reactive routing protocol?
If the Mobility of nodes in a sparsely populated mobile Adhoc network is less, Proactive routing
protocol is chosen. Routes are already available in proactive routing rather than reactive protocol
in which routes are on demand. The nodes are sparsely populated hence the routing table will
occupy less memory. The routing table can be periodically exchanged in proactive routing and
this overhead will not occupy more bandwidth since the mobility is less. Route converges faster
compared to reactive routing protocol. Hence Proactive routing protocol can be used.
20. Draw the Diagram for sensor node hardware components?

PART-B

1.Briefly explain the issues in WSN routing.

2.With a neat diagram, Explain the sensor network architecture.

3.Explain about the QOS in WSN.

4. Explain about the Synchronization in WSN.

5. Write in detail about the IEEE 802.15.4

6.Classify and explain wireless sensor network based on routing topology.

7. Explain the types of wireless sensor network routing protocols based on routing

information update mechanism.


UNIT-III
WSN NETWORKING CONCEPTS AND PROTOCOLS

1.Define Routing

Routing is the process of selecting best paths in a network. In the past, the term routing was also
used to mean forwarding network traffic among networks. Routing is performed for many kinds
of networks, including the telephone network , electronic data networks and transportation
networks.

2.How is the loop free property ensured in on demand routing protocol?

It is a fundamental requirement of any routing protocol to avoid unnecessary wastage of


network bandwidth. In ad hoc wireless networks, due to the random movement of nodes,
transient loops may form in the route thus established. A routing protocol should detect such
transient routing loops and take corrective actions.

3.What are the advantages of hierarchical routing protocol?


o Reduction in the size of routing tables
o Better scalability
o Substantially lesser calculation and updates of routing tables

4.List some example of table driven routing protocols


o Destination sequential distance-vector routing
o Wireless routing protocol
o Cluster head gateway switch routing protocol
o Source tree adaptive routing protocol

5.List the advantages of DSVL routing protocols


o The routers are readily available to all destination at all times, the delay is less
in the route setup process.
o With the help of mechanism like incremental updates, an existing wired
network protocol can be applied to ad hoc wireless networks
6.What is hybrid routing protocol?

Hybrid routing protocol combines the best feature of proactive and reactive routing protocols.
Hybrid routing protocol use distance vector for more accurate metrics to determine the best
paths to designation network and report routing information only when there is a change in the
topology of the network.
7.How is the cluster head selected in the CGSR protocol?

CGSR organizes nodes into cluster with coordination among the members of each cluster
assigned to a unique node called cluster-head. The cluster head is selected dynamically by using
a least cluster change algorithm. In LCC algorithm, a node ceases to be a cluster head only if it
comes under the range of another cluster-head, where tie is broken either using the lowest ID or
highest connectivity algorithm.

8.What are the major challenges in designing routing protocols?


a. Mobility
b. Bandwidth constraint
c. Error prone shared broadcast radio channel
d. Hidden and exposed terminal problems

9.List some of the characteristics of a routing protocol for ad hoc wireless networks.
e. It must be fully distributed
f. It must be localized and adaptive to frequent topology changes
g. It must provide Quality of service
h. It must use the resources efficiently

10.What is the approach used to find link stability in ABR?


A link is classified as stable or unstable based on its temporal stability. The temporal stability is
determined by counting the periodic beacons that a node receives from its neighbors. Each node
maintains the count of its neighbors beacons and classifies each link as stable or unstable based
on the beacon count.
11.Classify the routing protocol for ad hoc wireless network
i. Routing information update mechanism
j. Use of temporal information for routing
k. Topology information organization
l. Utilization of specific resources

12.Based on routing information update mechanism how the routing protocols are
classified?
m. Proactive or table driven routing protocol
n. Reactive or on demand routing protocol
o. Hybrid routing protocol

13.Give the major objectives of the transport layer protocol.


p. Setting up of an end-to-end connection
q. End-to-end delivery of data packets
r. Flow control
s. Congestion control

14.Why does TCP not work well in Ad hoc network?


t. Misinterpretation of packet loss
u. Frequent path breaks
v. Effect of path length
w. Uni-directional path
x. Multipath routing
y. Network partitioning and remerging.

15.List the issues in designing a transport layer protocol for ad hoc wireless networks
a.Induced traffic
b.Induces throughput unfairness
c.Separation of congestion control, reliability and flow control
d.Power and bandwidth constraints
e.Dynamic topology

16.Specify some of the goals to be achieved in transport layer protocol for ad hoc wireless
networks.
1.The throughput for each connection should be increased
2.Throughput fairness must be provided across contending flows
3.The connection setup and connection maintenance overhead should be minimal
4.The protocol should have congestion control and flow control mechanism in
the network.
5.The protocol should be able to adjust to the dynamic topological changes in the
network

17.What additional state information is to be maintained at the FP in TCP-F?


The state information that is maintained at the FP
in TCP-F is Snooze state Connected state.

18.What is the impact of the failure of proxy nodes in split –TCP?

The failure of proxy nodes in splits TCP leads to throughput degradation. During frequent path
breaks or during frequent node failure, the performance of split TCP may be affected.

19.What are the challenges caused by sensor network MAC protocol?


o No single controlling authority, so global synchronization is difficult
o Power efficiency issue
o Frequent changes in topology due to node mobility and failure.

20.What are three kinds of MAC protocols used in sensor network?


o fixed -allocation
o demand- based
contention –based
PART-B

1. Explain about the hardware components of sensor nodes.

2. Explain about the software components of sensor nodes.

3. With a neat diagram, Explain the sensor network architecture.

4. Write notes on Dynamic Energy and power management.

5. Explain in detail about aggregation as an optimization problem.

6. Explain about the MAC protocol in WSN.

7. Write in detail about the IEEE 802.15.4..

8. With suitable trace, explain the route establishment in location aided routing.

9. Device a pseudo code that present various steps involved in neighbour Degree-

Based preferred link algorithm.


UNIT IV

SENSOR NETWORK SECURITY

1.What are the network security requirement?

Security Requirements

o Confidentiality • Protection from disclosure to unauthorised persons

o Integrity • Maintaining data consistency

o Authentication • Assurance of identity of person or originator of data

o Non-repudiation • Originator of communications can’t deny it later

2.Define Denial of service.

Prevents or inhibits the normal use or management of communication facilities. Another form

of service denial is the disruption of an entire network, either by disabling the network or

overloading it with messages so as to degrade performance.

3.What are the 3 aspects of security?


Security Attack -Any action that compromises the security of information owned by an organization.

Security Mechanism -A process that is designed to detect, prevent, or recover from


a security attack
Security Service
A processing or communication service that enhances the security of the data processing
systems and the information transfers of an organization. The services are intended to
counter security attacks, and they make use of one or more security mechanisms to provide
the service.

4. Define cryptanalysis?

The study of principles and methods of transforming an unintelligible message back into an
intelligible message without the knowledge of the key. It is also called code breaking.

5.Define Steganography.

It is the process of hiding the message into some cover media. It hides the existence of a
message. Ex: Character marking, Pin punctures, Invisible ink etc.
6. Define Threat and attack.

Threat is a possible danger that might exploit a vulnerability to breach security and thus cause
possible harm. Attack is any attempt to destroy, expose, alter, disable, steal or gain
unauthorized access to or make unauthorized use of an asset.

7.Define Brute-force attack.


The attacker tries every possible key on a piece of cipher text until an intelligible translation
into plaintext is obtained. On average, half of all possible keys must be tried to achieve
success.

8.Define Denial of service.


Prevents or inhibits the normal use or management of communication facilities. Another form
of service denial is the disruption of an entire network, either by disabling the network or
overloading it with messages so as to degrade performance .

9.Define Replay Attack.


Replay attack is a form of network attack in which a valid data transmission is maliciously or
fraudulently repeated or delayed. This is carried out either by the originator or by an
adversary who intercepts the data and retransmits it, possibly as part of a masquerade attack
by IPpacket substitution .

10. Define virus. Specify the types of viruses?


A virus is a program that can infect other program by modifying them the modification includes
a copy of the virus program, which can then go on to infect other program.
Types:
1) Parasitic virus
2) Memory-resident virus
3) Boot sector virus
4) Stealth virus
5) Polymorphic virus

11. What is Active and Passive Sensors?


i. Active sensors
This last group of sensors actively probes the environment.
These are quite specific-triggering an explosion is certainly not a lightly under taken action-and
require special attention.
ii. Passive, omnidirectional sensors
These sensors can measure a physical quantity at the point of the sensor node without actually
manipulating the environment by active probing-in this sense, they are passive.
There is no notion of “direction” involved in these measurements.
iii. Passive, narrow-beam sensors
These sensors are passive as well, but have a well-defined notion of direction of measurements.
A typical example is a camera, which can “take measurements” in a given direction, but has to
be rotated if need be.
12.what is block hole attack?

a packet drop attack or blackhole attack is a type of denial-of-service attack in which a router
that is supposed to relay packets instead discards them. This usually occurs from a router
becoming compromised from a number of different causes.
In black hole attack, a malicious node uses its routing protocol in order to publicize itself for
having the shortest route to the destination node.

13. what is flooding attack?

Flooding is a Denial of Service (DoS) attack that is designed to bring a network or service
down by flooding it with large amounts of traffic.By flooding a server or host with
connections that cannot be completed, the flood attack eventually fills the host s memory
buffer.
A SYN flood is a form of denial-of-service attack in which an attacker sends a succession of
SYN requests to a target's system in an attempt to consume enough server resources to make
the system unresponsive to legitimate traffic. SYN flood is a protocol attack.

14.what is SPINS in secure routing?

Many routing protocols have been proposed for sensor network, but most of them have not
designed with security as a goal. Sensor protocol for information via negotiation (SPIN)
protocol is a basic data centric routing protocol of sensor networks.

15.Specify some of the goals to be achieved in transport layer protocol for ad hoc wireless
networks.
o The throughput for each connection should be increased
o Throughput fairness must be provided across contending flows
o The connection setup and connection maintenance overhead should be minimal
o The protocol should have congestion control and flow control mechanism in
the network.
o The protocol should be able to adjust to the dynamic topological changes in the
network

16.What are the major challenges in designing routing protocols?


o Mobility
o Bandwidth constraint
o Error prone shared broadcast radio channel
o Hidden and exposed terminal problems

17.What is data aggregation?

Data aggregation is the process of collecting and aggregating the useful data. It is considered as
one of the fundamental processing procedures for saving the energy.
18.What are the challenges caused by sensor network MAC protocol?
o No single controlling authority, so global synchronization is difficult
o Power efficiency issue
o Frequent changes in topology due to node mobility and failure.

19.What is honey pot?

Honey pots are decoy system that is designed to lure a potential attacker away from critical
systems. Honey pots are designed to Divert an attacker from accessing critical systems
Collect information about the attacker’s activity Encourage the attacker to stay on the
system long enough for administrators to respond .

20.Define Kerberos.
Kerberos is an authentication service developed as part of project Athena at MIT. The
problem that Kerberos address is, assume an open distributed environment in which user
at work stations wish to access services on servers distributed throughout the network .A
full service Kerberos environment consisting of a Kerberos server, a no. Ofclients, no.of
application server requires the following: The Kerberos server must have user ID and
hashed password of all participating users in its database. The Kerberos server must shar
secret key with each server. Such an environment is referred to as “Realm”.

Part-B

1. .List out and explain how some of the internet properties of the wireless Adhoc networks
introduce difficulties while implementing security in routing protocols.
2. Explain various network and application layer security attacks in detail.
3. Explain how the security provisioning in adhoc network differs from that in infrastructure
based network.
4. List the network security requirements and Explain any Two security requirements.
5.Explain the major security threats that exist in ad hoc wireless networks.
6. With any five major reasons, analyze why TCP is exposed to significant throughput
degradation in ad hoc networks.
7. Explain various network and application layer security attacks in detail.
8. Explain the significance and design goals of transport layer protocol for adhoc network.
UNIT V
SENSOR NETWORK PLATFORMS AND TOOLS

1.What are the categories of power saving techniques?


o Schedule the wireless nodes to alternates between active and sleep mode
o Power control by adjusting the transmission range of wireless nodes
o Energy efficient routing, data gathering
o Reduce the amount of data transmitted and avoid useless activity.

2.What are the layers of Operating System?


The operating system is usually structured into a kernel layer and a shell layer. The shell
essentially provides facilities for user interaction with the kernel. The kernel executes in the
supervisor mode and can run privileged instructions that could not be run in the user mode.

3.Why is kernel mode called memory resident part?


During booting, the kernel gets loaded first and continues to remain in the main memory of the
device. This implies that in a virtual memory system, paging does not apply to the kernel code
and kernel data. For this reason, the kernel is called the memory resident part of an operating
system.

4.What are the advantages and disadvantages of BlackBerry OS? NOV/DEC 2017
Pros Excellent Connectivity (Messengers viz BBM, yahoo, gtalk, whatsapp work seamlessly)
Amazing email client (can also sync with your enterprise server) Most user friendly qwerty
keyboard (easy typing) Very fast and snappy
Cons Battery life not great in some models Camera quality not great Application support is bad
Almost all models have similar utility and features. (Minor change in visuals cz of the new OS)

5.What is the use of WCMP?


The wireless control message protocol provides error handling mechanisms for WDP. WCMP is used
for diagnostic and informational purposes. It is used by WDP nodes and gateways to report errors.

6.What is M- commerce?
Mobile e-commerce (m-commerce) is a term that describes online sales transactions that use
wireless electronic devices such as hand-held computers, mobile phones or laptops. These
wireless devices interact with computer networks that have the ability to conduct online
merchandise purchases. Any type of cash exchange is referred to as an e-commerce transaction.
Mobile e-commerce is just one of the many subsets of electronic commerce. Mobile e-commerce
may also be known as mobile commerce

7.What is TinyOS?
TinyOS is an embedded, component-based operating system and platform for low-power
wireless devices, such as those used in wireless sensor networks, smartdust, ubiquitous
computing, personal area networks, building automation, and smart meters.

8.what is Tossimos?
TOSSIM is a discrete event simulator for TinyOS sensor networks. Instead of compiling
a TinyOS application for a mote, users can compile it into the TOSSIM framework, which runs
on a PC. This allows users to debug, test, and analyze algorithms in a controlled and repeatable
environment.

9. What is Cooja simulator?


Cooja Simulator is A flexible java based simulator is also known as COOJA simulator which is
designed for simulating networks of sensors running the Contiki operating system. Contiki is an
operating system for networked, memory-constrained systems with a focus on low-power
wireless Internet of Things devices. Extant uses for Contiki include systems for street lighting,
sound monitoring for smart cities, radiation monitoring, and alarms

10.What is NESC in WSN?


nesC (pronounced "NES-see") is a component-based, event-driven programming language used
to build applications for the TinyOS platform. TinyOS is an operating environment designed to
run on embedded devices used in distributed wireless sensor networks.

11. What is State centric programming?


State-centric programming for sensor-actuator network systems. We describe a state-centric,
agent-based design methodology to mediate between a system developer's mental model of
physical phenomena and the distributed execution of DSAN applications.

12. what is Node-level Simulators ?


In node-level simulators, a component can be a sensor node, and the events can be
communication packets; or a component can be software module within and the events can be
message passings among these nodes.A DE simulator typically requires a global event queue.

13.what is NS2 and its extension to sensor networks?


One of commonly used simulator—i.e., NS2, is a friendly tool that offers a virtual environment,
which allows learning about the number of rules governing a sensor network's topologies to
carry out various settings and communications' formats or patterns.

14. what is Berkeley Motes?


The Berkeley motes are a family of embedded sensor nodes sharing roughly the same
architecture. Let us take the MICA mote as an example. The MICA motes have a two-CPU
design In addition to the memory inside the MCU, a MICA mote also has a separate 512 KB
flash memory unit that can hold data.
However, the Berkeley Mote was designed for generic applications and therefore the available
sensors are not optimised for use in civil infrastructure applications.

15.what is Sensor Node Hardware?


Wireless Sensor Node hardware: A review basic sensor node platform consists of a CPU, a radio
and a power supply. For the last 10 years a number of research institutions and companies have
been designing and producing nodes with these three components as a minimum.
A sensor node, also known as a mote (chiefly in North America), is a node in a sensor
network that is capable of performing some processing, gathering sensory information and
communicating with other connected nodes in the network..
16.Write down the system security standards?
National Institute of Standards and Technology(NIST)
The International Organization for Standardization (ISO)
The International Telecommunication Union (ITU)
Internet Society (ISOC)

17.What is circuit level gateway?


Circuit level gateway does not permit an end to end TCP connection rather the gatewaysets up
two TCP connections one between itself and a TCP user on an inner side and one between itself
and a TCP user on an outside.

18.Define ZOMBIE?
This program secretly over another internet takes attached computer and the uses that computer
launch attacks that are difficult to trace zombie’s creator.

19.In the context of access control, what is the difference between a subject and an object?
A subject is an entity capable of accessing objects (eg. user, application, process). An object is
resource to which access is controlled. An object is an entity used to contain information (eg. records,
files, directories, processors, communication ports .

20.what is the use of node level simulators?


node-level simulators, a component can be a sensor node, and the events can be communication
packets; or a component can be software module within and the events can be message passings
among these nodes. The parameters were different routing protocol like aodv and dsr and the
perfomance is based on packet delivery ratio , end to end delay we can get good throughput

Part-B
1.Compare & contrast various popular sensor networks platforms and tools.
2.Explain in detail about node level simulators?
3. Explain in detail about Node-level software platforms?
4.Explain in detail about NS2 and its extension to sensor networks?
5. Explain in detail about the TinyOS, nesC, CONTIKIOS?
6. Explain in detail about the COOJA, TOSSIM?
7. Discuss about the constraints of WSN OS ?
8. Explain in detail about Node-level Programming Challenges?
9. Explain the features of Andriod and Berkely OS?

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy