EC8702 Ad Hoc Question Bank Ece
EC8702 Ad Hoc Question Bank Ece
UNIT-I
AD HOC NETWORKS – INTRODUCTION AND ROUTING PROTOCOLS
2. Define Routing.
Routing is the process of selecting best paths in a network. In the past, the term routing was also
used to mean forwarding network traffic among networks. Routing is performed for many kinds
of networks, including the telephone network , electronic data networks and transportation
networks.
Hybrid routing protocol combines the best feature of proactive and reactive routing protocols.
Hybrid routing protocol use distance vector for more accurate metrics to determine the best
paths to designation network and report routing information only when there is a change in the
topology of the network.
Part-B
1. Explain hidden and exposed terminal problem and near and far terminal problem.
2. Explain the major challenges that a routing protocol designed for ad-hoc wireless
networks face.
3. Explain the design issues in ad-hoc network?
4. What are the characteristics and features of ad hoc networks?
5. Explain the types of ad hoc network routing protocols based on routing information
update Mechanism.
6. Classify and explain ad-hoc wireless network based on routing topology.
7. Explain on demand routing protocol in detail.
8. Discuss table driven protocols with examples.
UNIT - II
SENSOR NETWORKS – INTRODUCTION & ARCHITECTURES
16. What are the pros and cons of using multichannel MAC protocol over a single channel
protocol?
Although several single channel schemes came into design and tried to achieve a high quality of
services scheme, most of them were not successful due to hidden and exposed terminal
problems and the fairness issue. On the other hand, the multichannel schemes were almost
successful in solving these problems and providing a better and more reliable MAC protocol for
the users.
17.Define QoS
QoS is closely related to the type of network service is the quality of that service which is the
amount and quality of information that can be extracted at given sinks avout the observed
objects or area. Therefore adapted quality concepts like reliable detection of events or the
approximation quality.
19. Mobility of nodes in a sparsely populated mobile Adhoc network is less. What is the
choice between proactive routing protocol and reactive routing protocol?
If the Mobility of nodes in a sparsely populated mobile Adhoc network is less, Proactive routing
protocol is chosen. Routes are already available in proactive routing rather than reactive protocol
in which routes are on demand. The nodes are sparsely populated hence the routing table will
occupy less memory. The routing table can be periodically exchanged in proactive routing and
this overhead will not occupy more bandwidth since the mobility is less. Route converges faster
compared to reactive routing protocol. Hence Proactive routing protocol can be used.
20. Draw the Diagram for sensor node hardware components?
PART-B
7. Explain the types of wireless sensor network routing protocols based on routing
1.Define Routing
Routing is the process of selecting best paths in a network. In the past, the term routing was also
used to mean forwarding network traffic among networks. Routing is performed for many kinds
of networks, including the telephone network , electronic data networks and transportation
networks.
Hybrid routing protocol combines the best feature of proactive and reactive routing protocols.
Hybrid routing protocol use distance vector for more accurate metrics to determine the best
paths to designation network and report routing information only when there is a change in the
topology of the network.
7.How is the cluster head selected in the CGSR protocol?
CGSR organizes nodes into cluster with coordination among the members of each cluster
assigned to a unique node called cluster-head. The cluster head is selected dynamically by using
a least cluster change algorithm. In LCC algorithm, a node ceases to be a cluster head only if it
comes under the range of another cluster-head, where tie is broken either using the lowest ID or
highest connectivity algorithm.
9.List some of the characteristics of a routing protocol for ad hoc wireless networks.
e. It must be fully distributed
f. It must be localized and adaptive to frequent topology changes
g. It must provide Quality of service
h. It must use the resources efficiently
12.Based on routing information update mechanism how the routing protocols are
classified?
m. Proactive or table driven routing protocol
n. Reactive or on demand routing protocol
o. Hybrid routing protocol
15.List the issues in designing a transport layer protocol for ad hoc wireless networks
a.Induced traffic
b.Induces throughput unfairness
c.Separation of congestion control, reliability and flow control
d.Power and bandwidth constraints
e.Dynamic topology
16.Specify some of the goals to be achieved in transport layer protocol for ad hoc wireless
networks.
1.The throughput for each connection should be increased
2.Throughput fairness must be provided across contending flows
3.The connection setup and connection maintenance overhead should be minimal
4.The protocol should have congestion control and flow control mechanism in
the network.
5.The protocol should be able to adjust to the dynamic topological changes in the
network
The failure of proxy nodes in splits TCP leads to throughput degradation. During frequent path
breaks or during frequent node failure, the performance of split TCP may be affected.
8. With suitable trace, explain the route establishment in location aided routing.
9. Device a pseudo code that present various steps involved in neighbour Degree-
Security Requirements
Prevents or inhibits the normal use or management of communication facilities. Another form
of service denial is the disruption of an entire network, either by disabling the network or
4. Define cryptanalysis?
The study of principles and methods of transforming an unintelligible message back into an
intelligible message without the knowledge of the key. It is also called code breaking.
5.Define Steganography.
It is the process of hiding the message into some cover media. It hides the existence of a
message. Ex: Character marking, Pin punctures, Invisible ink etc.
6. Define Threat and attack.
Threat is a possible danger that might exploit a vulnerability to breach security and thus cause
possible harm. Attack is any attempt to destroy, expose, alter, disable, steal or gain
unauthorized access to or make unauthorized use of an asset.
a packet drop attack or blackhole attack is a type of denial-of-service attack in which a router
that is supposed to relay packets instead discards them. This usually occurs from a router
becoming compromised from a number of different causes.
In black hole attack, a malicious node uses its routing protocol in order to publicize itself for
having the shortest route to the destination node.
Flooding is a Denial of Service (DoS) attack that is designed to bring a network or service
down by flooding it with large amounts of traffic.By flooding a server or host with
connections that cannot be completed, the flood attack eventually fills the host s memory
buffer.
A SYN flood is a form of denial-of-service attack in which an attacker sends a succession of
SYN requests to a target's system in an attempt to consume enough server resources to make
the system unresponsive to legitimate traffic. SYN flood is a protocol attack.
Many routing protocols have been proposed for sensor network, but most of them have not
designed with security as a goal. Sensor protocol for information via negotiation (SPIN)
protocol is a basic data centric routing protocol of sensor networks.
15.Specify some of the goals to be achieved in transport layer protocol for ad hoc wireless
networks.
o The throughput for each connection should be increased
o Throughput fairness must be provided across contending flows
o The connection setup and connection maintenance overhead should be minimal
o The protocol should have congestion control and flow control mechanism in
the network.
o The protocol should be able to adjust to the dynamic topological changes in the
network
Data aggregation is the process of collecting and aggregating the useful data. It is considered as
one of the fundamental processing procedures for saving the energy.
18.What are the challenges caused by sensor network MAC protocol?
o No single controlling authority, so global synchronization is difficult
o Power efficiency issue
o Frequent changes in topology due to node mobility and failure.
Honey pots are decoy system that is designed to lure a potential attacker away from critical
systems. Honey pots are designed to Divert an attacker from accessing critical systems
Collect information about the attacker’s activity Encourage the attacker to stay on the
system long enough for administrators to respond .
20.Define Kerberos.
Kerberos is an authentication service developed as part of project Athena at MIT. The
problem that Kerberos address is, assume an open distributed environment in which user
at work stations wish to access services on servers distributed throughout the network .A
full service Kerberos environment consisting of a Kerberos server, a no. Ofclients, no.of
application server requires the following: The Kerberos server must have user ID and
hashed password of all participating users in its database. The Kerberos server must shar
secret key with each server. Such an environment is referred to as “Realm”.
Part-B
1. .List out and explain how some of the internet properties of the wireless Adhoc networks
introduce difficulties while implementing security in routing protocols.
2. Explain various network and application layer security attacks in detail.
3. Explain how the security provisioning in adhoc network differs from that in infrastructure
based network.
4. List the network security requirements and Explain any Two security requirements.
5.Explain the major security threats that exist in ad hoc wireless networks.
6. With any five major reasons, analyze why TCP is exposed to significant throughput
degradation in ad hoc networks.
7. Explain various network and application layer security attacks in detail.
8. Explain the significance and design goals of transport layer protocol for adhoc network.
UNIT V
SENSOR NETWORK PLATFORMS AND TOOLS
4.What are the advantages and disadvantages of BlackBerry OS? NOV/DEC 2017
Pros Excellent Connectivity (Messengers viz BBM, yahoo, gtalk, whatsapp work seamlessly)
Amazing email client (can also sync with your enterprise server) Most user friendly qwerty
keyboard (easy typing) Very fast and snappy
Cons Battery life not great in some models Camera quality not great Application support is bad
Almost all models have similar utility and features. (Minor change in visuals cz of the new OS)
6.What is M- commerce?
Mobile e-commerce (m-commerce) is a term that describes online sales transactions that use
wireless electronic devices such as hand-held computers, mobile phones or laptops. These
wireless devices interact with computer networks that have the ability to conduct online
merchandise purchases. Any type of cash exchange is referred to as an e-commerce transaction.
Mobile e-commerce is just one of the many subsets of electronic commerce. Mobile e-commerce
may also be known as mobile commerce
7.What is TinyOS?
TinyOS is an embedded, component-based operating system and platform for low-power
wireless devices, such as those used in wireless sensor networks, smartdust, ubiquitous
computing, personal area networks, building automation, and smart meters.
8.what is Tossimos?
TOSSIM is a discrete event simulator for TinyOS sensor networks. Instead of compiling
a TinyOS application for a mote, users can compile it into the TOSSIM framework, which runs
on a PC. This allows users to debug, test, and analyze algorithms in a controlled and repeatable
environment.
18.Define ZOMBIE?
This program secretly over another internet takes attached computer and the uses that computer
launch attacks that are difficult to trace zombie’s creator.
19.In the context of access control, what is the difference between a subject and an object?
A subject is an entity capable of accessing objects (eg. user, application, process). An object is
resource to which access is controlled. An object is an entity used to contain information (eg. records,
files, directories, processors, communication ports .
Part-B
1.Compare & contrast various popular sensor networks platforms and tools.
2.Explain in detail about node level simulators?
3. Explain in detail about Node-level software platforms?
4.Explain in detail about NS2 and its extension to sensor networks?
5. Explain in detail about the TinyOS, nesC, CONTIKIOS?
6. Explain in detail about the COOJA, TOSSIM?
7. Discuss about the constraints of WSN OS ?
8. Explain in detail about Node-level Programming Challenges?
9. Explain the features of Andriod and Berkely OS?