0% found this document useful (0 votes)
19 views2 pages

Syllabus

Uploaded by

Bjajn
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views2 pages

Syllabus

Uploaded by

Bjajn
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Course Title/Code INTRODUCTION TO WIRELESS SENSOR NETWORKS (ECH403B-T/P)

Course Type: Elective (Departmental)

Course Nature: Hard

L-T-P-O Structure 3-0-2-0

Objective Provide students with the fundamentals of WSN architecture, network platforms, and applications to design
energy-efficient MAC protocols for sensor networks in IoT environments.

Sections Weightage

A 25%
Syllabus B 25%
C 25%
D 25%
TOTAL 100%

SECTION A
SENSOR NETWORKS – INTRODUCTION & ARCHITECTURES: Challenges for Wireless Sensor
Networks, Enabling Technologies for Wireless Sensor Networks, WSN application examples, Single-Node
Architecture - Hardware Components, Energy Consumption of Sensor Nodes, Network Architecture - Sensor
Network Scenarios, Transceiver Design Considerations, Optimization Goals and Figures of Merit.

SECTION B
ADHOC NETWORKS AND ROUTING PROTOCOLS: Elements of Ad hoc Wireless Networks, Issues in
Ad hoc wireless networks, Issues in Designing a Routing Protocol for Ad Hoc Wireless Networks, Classifications
of Routing Protocols, Table Driven Routing Protocols - Destination Sequenced Distance Vector (DSDV), On–
Demand Routing protocols –Ad hoc On–Demand Distance Vector Routing (AODV).

SECTION C
WSN NETWORKING CONCEPTS AND PROTOCOLS:MAC Protocols for Wireless Sensor Networks, Low
Duty Cycle Protocols and Wakeup Concepts - S-MAC, The Mediation Device Protocol, Contention based
protocols - PAMAS, Schedule based protocols – LEACH, IEEE 802.15.4 MAC protocol, Routing Protocols-
Energy Efficient Routing, Challenges and Issues in Transport layer protocol.

SECTION D
SENSOR NETWORK SECURITY: Network Security Requirements, Issues and Challenges in Security
Provisioning, Network Security Attacks, Layer wise attacks in wireless sensor networks, possible solutions for
jamming, tampering, black hole attack, flooding attack. Key Distribution and Management, Secure Routing –
SPINS, reliability requirements in sensor networks. INTRODUCTION TO CONTIKIOS, Node-level Simulators
– NS2 and its extension to sensor networks, COOJA, , Programming beyond individual nodes – State centric
programming.

Suggested Text / Reference Books

1. C. Siva Ram Murthy and B. S. Manoj, ―Ad Hoc Wireless Networks Architectures and Protocols‖,
Prentice Hall, PTR, 2004.
2. Holger Karl , Andreas willig, ―Protocol and Architecture for Wireless Sensor Networks‖, John wiley
publication, Jan 2006
3. . Feng Zhao, Leonidas Guibas, ―Wireless Sensor Networks: an information processing approach‖,
Elsevier publication, 2004.
4. Charles E. Perkins, ―Ad Hoc Networking‖, Addison Wesley, 2000.
5. I.F. Akyildiz, W. Su, Sankarasubramaniam, E. Cayirci, ―Wireless sensor networks: a survey‖,
computer networks, Elsevier, 2002, 394 - 422.
ECH403B.1 CO1: Describe the architecture of wireless sensor network system and evaluate various
challenges and constraints for the same
ECH403B.2 CO2: Identify and describe the various protocols for routing data through Wireless Sensor
Networks.
ECH403B.3 CO3: Resolve special issues of WSNs related to power handling energy conservation and
security challenges
ECH403B.4 CO4: Describe various protocols to evaluate Wireless Sensor Networks for a given application
and describe emerging research areas in the field of sensor networks

PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2

ECH403B.1
3 2 1 1 1 1 1 - 1 1 - - 3 1
ECH403B.2
3 3 2 1 1 1 1 - 1 1 - - 3 1
ECH403B.3
3 3 3 2 1 1 1 - 1 2 - - 3 2
ECH403B.4
3 3 2 2 2 1 1 - 1 1 - - 3 3
3-High, 2-Medium, 1-Low

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy