Adhoc WSN Q
Adhoc WSN Q
(AUTONOMOUS)
NAMAKKAL- TRICHY MAIN ROAD, THOTTIAM, TRICHY
REGULATIONS – 2017
YEAR/SEM: IV/VII SUBJECT CODE & NAME: EC8702-ADHOC AND
WIRELESS SENSOR NETWORKS
QUESTION BANK
PART – B
PART – A
1. What is a wireless sensor network?
2. Illustrate the characteristic requirements of a wireless sensor network.
3. Examine how address centric network differ from with data centric network
4. Differentiate between active and passive sensors
5. Outline the event detection approaches in WSN.
6. Interpret the term energy scavenging in Wireless Sensor Network
7. Summarize the Collaborative processing.
8. Name the hardware components of a Wireless sensor network
9. Define self-organization of network.
10. Identify the key characteristics of a microcontroller which makes it possible to use in wireless
sensor node.
11. List the characteristics based on which the transceiver is selected for a wireless sensor node.
12. Classify the energy consumption operations in wireless sensor networks.
13. Exhibit the performance metrics of wireless sensor network
14. Associate the term aggregation with WSN.
15. Formulate the types of mobility of a sensor node in a network
16. Compare Single Hop with Multiple Hop.
17. Explore the features of in-network processing in WSN
18. Classify the modes of operation of a sensor node.
19. Discuss about dynamic modulation scaling in a transceiver used in wireless sensor node
20. Write the generic possibilities for high level QoS in wireless sensor network
PART – B
1. Illustrate the challenges and the required mechanisms of a Wireless Sensor network.
2. What are the various applications of wireless sensor networks and explain any two with an
example each.
3. Explain how the sensor networks are deployed for various applications
4. Sketch the RF front end of a transceiver and outline the behavior of operational states
5. Explore the transceiver tasks and characteristics in a sensor node in a wireless sensor network
6. Demonstrate the enabling technologies of the wireless sensor networks
7. Apply the innovative mechanisms to realize the characteristic requirements of WSN.
8. Interpret the Transceiver characteristics and structure used in the sensor node.
9. Analyze how Energy Scavenging is realized in wireless sensor network.
10. Distinguish sensor networks from the mobile ad hoc network
11. Is spread spectrum modulation schemes are followed in WSN - justify your answer.
12. Discuss the energy consumption of sensors and actuators.
13. Deduce the energy consumption in a node with an appropriate diagram.
14. Brief the energy consumption in discrete operational states of an embedded microcontroller in
a sensor node.
15. Describe the relationship between computation and communication.
16. Draw the sensor network architecture and describe the components in detail.
17. Categorize the sensor network scenario and illustrate with diagram also explain how mobility
can appear in WSN?
18. Express how optimization goals and figure of merits achieved in WSN.
19. Examine the factors playing major role in optimizing a wireless sensor network
PART - A
1.Define Network Security
2. List out the requirements of Network security.
3. Write about the issues in Security provisioning.
4. Formulate the methods to minimize the security attacks.
5. Categorize the various types of attacks in a wireless sensor network.
6. Mention the challenges involved in security provisioning
7. Explore the methods to minimize the attacks in WSN
8. Interpret the key idea of Security provisioning in WSN?
9. Exhibit the different layer wise attacks in a sensor network.
10. Illustrate how Jamming affects the performance of wireless sensor network.
11. Determine the characteristics of denial-of-service
12. Examine the impacts of denial-of-service attacks in sensor networks.
13. Point out the significance of Physical-layer and link-layer attacks
14. Develop the possible countermeasures to alleviate the denial-of-service attacks.
15. Assess how the link-layer jamming affects the performance of sensor networks.
16. Name the Network-layer attacks in sensor networks.
17. Summarize the impact of black hole attack in routing protocols
18. What is meant by tampering?
19. How does misdirections affect the routing in sensor networks?
20. Discuss the importance of flooding attack in secure routing.
PART – B
1. Analyze the different security attacks with suitable parameters.
2. Explain how the security can be improved by minimizing the attacks in sensor networks.
3. Discuss the challenges in security provisioning
4. Describe in various types of attacks and explain its characteristics.
5. Compile the various issues in security provisioning in WSN and also write about the solutions
to avoid it.
6. Identify the layer wise attacks in wireless Sensor networks and explain its impact on networks.
7. Explain about Jamming and write the possible solutions for jamming in WSN.
8. Examine how the security attacks affect the performance of the Wireless sensor networks.
9. List the possible solutions to mitigate the denial-of-service attacks in sensor networks and
explain how it improves the performance of the system.
10.Summarize about the impacts of physical-layer jamming attacks on radio communication.
How it distorts the signals in the sensor network’s frequency band.
11. Define Tampering attack. Describe how it recovers cryptographic keys used for ciphering in
sensor networks.
12.Identify the Key management schemes in Wireless Sensor Networks.
13. Develop the key distribution and management mechanism required for secure communication
in sensor networks
14. Analyze about the flooding attack and its Countermeasures in wireless sensor networks in
detail.
15. Assess the requirements of Secure Routing
16. Examine about the Network-layer attacks in routing protocols.
17. Determine the impact of the following security threats in WSN :
(i) Black hole attack
(ii) Transport layer attacks
PART A
1.List the challenges of sensor network programming.
2. Write the three categories of sensor node hardware.
3. What are the characteristics of Berkeley mote family?
4. Point out the two-CPU design of MICA motes.
5. Outline the transmission characteristics of MICA motes.
6. Name the features of Node-Level Software Platforms
7. Create the two representative examples of node-level programming tools
8. How does TinyOS support Berkeley mote?
9. Develop the application example of TinyOS.
10. Expressthe need for nesC.language for sensor network programming
11. Interpret about the component interfaces of nesC
12. Classify the components of nesC based on the implementation level
13. Justify that the language nesC directly reflects the TinyOS execution model.
14. Relate the TinyGALS with TinyOS
15. Assess the importance of TinyGUYS mechanism in sensor network programming.
16. Identify the components of node-level simulator
17. Distinguish between cycle driven and discrete event simulation.
18. Illustrate the functionalities of ns-2 in the simulation of sensor network
19. Discuss about the use of TOSSIM simulator in modelling wireless network.
20. Evaluate the role of state centric programming model in sensor network applications.
PART B
1. Define sensor node hardware and explain in detail about three categories of sensor node
hardware with examples.
2. Summarize about the characteristics of embedded sensor nodes family with the help of MICA
note architecture.
3. List the drawbacks of traditional programming technologies in sensor network design.
4. What are the Challenges of Sensor Network Programming
5. Write short notes on node-centric programming
6. Explain about the node level programming tools with examples.
7 .Explore the TinyOS operating system support resource does constrained hardware platforms.
Discuss in detail.
8. Demonstrate about the interface and configuration of nesC language.
9. Justify that nesC supports the components and applications of TinyOS.
10. Develop the components and implementation models of Timer functions in nesC.
11. Identify the characteristics of Dataflow-Style Language
12. Illustrate the component interfaces and module implementations of TinyGALS programming
model with necessary diagrams.
13. Analyze the characteristics and components of node-level simulator with necessary functions.
14. Examine how an open-source network simulator can be used to simulate wireless/mobile
networks and sensor networks.
15. Name a dedicated simulator for TinyOS applications and explain.
16. Point out the components of node centric programming models.
17. Describe the following simulators used in wireless sensor networks:
(i) ns-2 simulator
(ii) TOSSIM simulator
18. Evaluate the design methodologies and frameworks supported by state-centric programming
tools.
19. Determine the role of Collaboration Groups and its abstractions in the design of state-centric
programming tools.