Open navigation menu
Close suggestions
Search
Search
en
Change Language
Upload
Sign in
Sign in
Download free for days
0 ratings
0% found this document useful (0 votes)
109 views
8 pages
Eee G627-3
Uploaded by
Anmol Dubey
AI-enhanced title
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Download now
Download
Save EEE G627-3 For Later
Download
Save
Save EEE G627-3 For Later
0%
0% found this document useful, undefined
0%
, undefined
Embed
Share
Print
Report
0 ratings
0% found this document useful (0 votes)
109 views
8 pages
Eee G627-3
Uploaded by
Anmol Dubey
AI-enhanced title
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Download now
Download
Save EEE G627-3 For Later
Carousel Previous
Carousel Next
Download
Save
Save EEE G627-3 For Later
0%
0% found this document useful, undefined
0%
, undefined
Embed
Share
Print
Report
Download now
Download
You are on page 1
/ 8
Search
Fullscreen
Birla Institute of Technology & Science, Pilani- KK Birla Goa Campus. Ml Semester 2012-2013 EEEG627 Networked Embedded Applications Test 1 (Closed Book) Date: 15-02-2012 ‘Max Marks: 25 Duration: 1 Hour Q1. A WSN is deployed in a prison where there are 100 cells in two floors all cells facing east with a corridor. The WSN monitors the environment inside in prison cells and also the presence of prisoners in the cell and along the corridors. The prisoners also wear a mote as an arm band. Prisoners are mobile. The cells are single occupancy they are about 10x10x8(| x w x h) feet. The condition inside cells have to be sent at regular intervals to the central monitoring system inside the prison. Also the position of every prisoner inside a cell or outside a cell has to be monitored. {a) What is the deployment pattern — how many motes will be required, are all motes of the same type (classify requirements as motes (sensing, relay, sensing and relay) and super motes, where will you place each mote/super mote? Justify. (b) Would a time synchronization Algorithm be required? If so which one will you use and why? (c) Would a Localization Algorithm be required? if so which one will you use and why? (d) Would use Clustering? If so which algorithm and why? {e) Which Routing Algorithm will you use and why? [Note: If existing algorithms are non-ideal for this application (Q1b — Q1e) you will have suggest the changes that will be required] [20] Q2. For the following Localization Algorithms what are the main characteristics — in terms of (i) Distance Estimation Method (ii) Coarse/Fine Grained? (iii) Range based or Range Free (iv) Centralized Vs. Distributed (v) Time for convergence ? The Localization Algorithms are (a) WCL (b) SWEEPS (c) APIT. Elucidate. [6] Q3. Consider the network shown belowTriangles represent anchor nodes and circles sensor nodes, The dashed lines show the pattern (the network is wireless).All nodes have to be localised. Develop an algorithm for the and show its execution steps. 5) Q4. — Consider the nodes shown below Oo © The nodes need to be synchronized with each other. Assuming that A has a perfect clock {a) How many messages have to be exchanged in case of TPSN (assume that level discovery is completed)? Show the message exchange. (b) How many messages are exchanged in case of RBS? Show the messages? (c) What is the difference in synchronization of TPSN and RBS? (d) Can RBS be used if MAC protocol is TDMA? Elucidate (e) One more neighbour D is added to the scenario such that all nodes are within communication range. How many messages are exchanged for time sync in RBS and how many in case of TPSN? (f) Now add one more node E in communication with all nodes. How many messages are exchanged in case of RBS and TPSN? (g) If the number of nodes is n. How many messages will be exchanged in case of R3S and TPSN? (h) Comment on the scalability of the TPSN and RBS,y Birla Institute of Technology & Science, Pilani- KK Birla Goa Campus Hf Semester 2012-2013 EEEG627 Networked Embedded Applications Test 2 (Closed Book) Date: 21-03-2012 fax Marks: 25 Q4. This is in continuation of Q1 from T1 A WSN is deployed in a prison where there are 100 cells in two floors all cells facing east with corridor. The WSN monitors the environment inside in prison cells and also the presence of prisoners in the cell and along the corridors. The prisoners also wear a mote as an arm band. Prisoners are mobile. The cells are single occupancy they are about 10x10x8(I x w x h) feet. The condition inside cells have to be sent at regular intervals to the central monitoring system inside the prison. Also the position of every prisoner inside a cell or outside a cell has to be monitored. (a) For the deployment pattern you have employed clustering — what will be the average number of nodes in a cluster -what is the MAC protocol that you will use for intra cluster and inter cluster communication and why-how compatible is it with your routing and clustering protocol? (b) If Time Sync is required at regular interval how will you integrate the time synchronization with your normal data packet? (c) In your opinion is the final network protocol reactive, proactive or hybrid? Elucidate by defining the characteristics of proactive/reactive networks. Algorithm be required? If so which one will you use and why? [Note: If existing MAC algorithms are non-ideal for this application (Q1a) you will have suggest the changes that will be required] 10] Q2. A Chemical Plant manufacturing hazardous chemicals needs to be monitored and controlled. ‘The automation pyramid of the Plant is shown below Figi: Network Hierarchy ‘System Details The Diagnostic and Sensing done in the automation pyramid is only for the machinery and devices. A separate WSN is available that monitors only the atmosphere in the factory. This WSN is integrated to the top of the pyramid. The entire industry functioning can be monitored remotely via the internet © Control Information size is maximum 8-bits and real-time. Data rate reaches a maximum of IMbps. * Connection with the actuators and drivers is generally half-duplex. * Connection with sensors is full-duplex. * Sensor and drivers are both connected via a wired interface. * Maximum distance between two devices is 10m. The factory floor covers a considerable area, * Every driver/sensor/actuator has a built in physical address. ‘The lowest level of the pyramid should not be accessible from outside. * Sensors are required to have temporal consistency.«The lowest level of the pyramid is connected using proper infrastructure to the second the automation pyramid Design or suggest the required protocols for the Lowest Level of the automation pyramid. Justify your Protocol © The second level of the automation pyramid acts a sensor data collection as well as control data dissemination point «The Information size varies depending upon whether the information is received from top of the pyramid or bottom of the pyramid. The maximum size of the data can be as large as IKB. * Allconnections to CNC/PLC are wired. © Maximum distance between devices is 100m. «Every device has an inbuilt physical address. © PLC & CNC machines can have an individual network address but should not be accessible from outside the factory. «Data rate can be as high as 10Mbps Design or suggest the required protocols for the Second Level of the automation pyramid. Justify your protocol. = The overall control is done using a set of high-end computers that are isolated from the factory floor. They are available in an isolated control room. The communication between the Control Room Computers and the Factory level network is wireless. «The high-end computers are connected to each other using wired connections. © They are connected to the internet through a high-end fiber optic link. «Large amount of information exchange takes place. The connection has to be highly-reliable connection. Data rate can be as high as 100Mbps. Design or suggest the required protocols for the Lowest Level of the automation pyramid. Justify your Protocol. How will the three levels in the automation pyramid be integrated? Show the entire integration design with sufficient explanation. [10] Q3a. Consider the network shown below Circles represent sensor nodes, ‘The dashed lines show the connection pattern (the network is wireless). Give minimal assignment of a single time slot for each node using TDMA, such that no two nodes within two hops of each other share the same slot. Q3b. For the communication network graph shown in the network of Q3a identify the set of nodes that could be coordinators if SPAN protocol is used for topology control. The protocol has to pick up the minimum number of nodes. Show the steps taken by the protocol. (+2)y Birla Institute of Technology & Science, Pilani -KK Birla Goa campus ‘IL Semester 2012-2013 EEEG627 Network Embedded Application Comprehensive Examination Part- A (Closed Book) Date: 01-05-2013 Max Marks: 20 Duration: 1 Hr Qi. Distingui: ig out the characteristics that are unique to Distributed Systems? ay Q2. Will all Distributed Systems be pervasive? Blucidate a) Q3. What are the required characteristics of'a WSN testing platform? Will they all be available in a single development Tool? Elucidate. a Q4. List what are the security problems common to WSNs and VANETS? What is the effect of each security issue on the network? Is a solution possible in either of these areas? (qd) Q5. What are Migratability & Future Proof in Networks? (1) Q6. What is greedy forwarding? Does it find a place only in Wireless Networks? Can greedy Forwarding be used in WSNs? Elucidate. a Q7. “802.11 protocols can provide deterministic services — hence can also be used in industrial networks without any modificatious”. True or False? Elucidate. aw Q8. An industrial network has real-time as well as non-real-time traffic. How do industrial network protocols generally handle this varied traffic? Can this be done in case of wired and wireless networks? Explain with appropriate examples. a (%. Distinguish between Time Synchronization done in WSN, Vehicular Networks and Industrial Networks? a) Q10. What is delay-jitter in Real-Time Communication? a) QI1. What are fault and error containment in vehicular automation? How are they achieved in intra- vehicular Networks? @) Q12. What is the relative temporal consistency problem in hybrid wired/witeless networks? How this problem is be solved? Will this problem exist in purely wireless scenarios? @ Q13. The data from an 802.11 segment in an industrial network is directed to a segment implementing RS485, The data rate of RS485 is about 1 Mbps and the data rate of 802.11 is 2 Mbps. What will haggen if packet of size (a) 20 units of data (b) 512 units of data is to be sent from the 802.11 segment to RS 485 segment? Elucidate. Would the cut-through method or store and forward method work? Elucidate. @) Distinguish between Clustering in WSNs and VANETS 2 tie theclaba) schedule there is no need to attach source or eeDate: Birla Institute of Technology & Science, Pilani II Semester 2012-2013 EEEG627 Network Embedded Application Comprehensive Examination Part- B (Open Book) M: Duration: 2 Hrs 01-05-2013 Qi. A Nuclear Reactor (Fukushima-Daiichi nuclear plant) is located in a Tsunami prone area. The monitoring system of such a plant will have two modes of operation (1) Under Normal Conditions (Regular Mode) (2) When a disaster strikes ~ (Disaster Mode) ‘System Details ‘The nuclear reactor is made up of 20 sectors — of which 5 of the sectors are deemed hazardous and inaccessible to humans. Such sectors are equipped with a WSN - this network is made up of mobile and fixed sensor units — for monitoring radiation levels. The principle of design for nuclear power plants is defense in depth. Elements of the defense in depth philosophy are Redundant Safety Systems ~ Systems Necessary to support the safe shutdown of the nuclear reactor are designed with redundant and diverse back-up systems ‘Automatic Reactor Protection System — Monitor critical parameters of reactor system and automatically intimate shutdown of the reactor when any of these parameters are exceeded. Radiation Containment Barriers — Physical barriers are built for containment under extreme weather conditions. ‘You are to build the Safety & Control Network for this plant ~ Note: This does not contain plant security in terms of entry to restricted area, perimeter monitoring ete. You can assume that there is a separate network available for this purpose — that can communicate to a central controlling station ‘The Safety and Control Network is divided into four Levels- (a) Device Level (b) Machine Level (¢) Sector Level (d) Central Computing Unit Data rate reaches a maximum of IMbps. Connection with the devices are full-duplex, wired and require temporal consistency. Maximum distance between two devices is 25m. The factory floor covers a considerable area. There is no individual device address —there is only a functional address Devices cannot initiate communication or communicate with each other — they communicate to a Master Device Controller that is interfaced to the next level of hierarchy only — devices should not ‘be accessible to any other level of network / or from outside the network. Design! Suggest/ Modify the required/existing protocols for this level of the network. Justify your Protocol in terms of how it satisfies Network Characteristics. The second level acts a sensor data collection as well as control data dissemination point - The Information size varies depending upon whether the information is received from top or bottom of the hierarchy. Maximum distance between. devices is 100m. Data rate limit is 1OMbps, Machine Level Control is done by a series of high end systems with considerable processing power. Each machine is equipped with a camera — the output of the camera is collected, compressed, encrypted and sent to next level of hierarchy. This is not streaming video but image data collected using camera — based on command from higher level hierarchy. Every machine has an inbuilt physical address. Machines eam have an individual network address but should not be accessible from outside the factory. Design! Suggest/ Modify the required/existing protocols for this level of the network. Justify your Protocol in terms of how it satisfies Network Characteristics.Sector Control Network Characteristics e Thesector control is done using a set of high-end computers that are isolated from the’ * Thehigh-end computers are connected to each other using wired high-end fiber optic Finks speed switches. Large amount of information exchange takes place. The connection has to be hight connection, Data rate can be as high as 100Mbps. In Sectors termed as hazardous the Sector Control Unit also interfaces with a WSN. Design/ Suggest/ Modify the required/existing protocols for this level of the network. Justify your Protocol in terms of how it satisfies Network Characteristics. ‘® The overall control is done using a set of super computers that are isolated from the plant. «The data servers are also part of this system. Data Servers have a daily log of the activities in the plant. They are available in an isolated control room. © They are connected to the internet through a high-end fiber optic link. «Large amount of information exchange takes place. The connection has to be highly-reliable connection. Data rate can be as high as 100 Mbps. Design/ Suggest! Modify the required/existing protocols for this level of the network. Justify your Protocol in terms of how it satisfies Network Characteristics. How will the four levels in the network be integrated? Show the entire integration design with sufficient explanation. ‘Wireless Sensor Network © This wireless sensor network monitors the radiation parameters and structural condition in different ‘sectors. © Each sector has about 100 sensors placed all along the structure enclosing the sector. A fixed deployment pattem has to be followed with sufficient redundancy incorporated. Redundancy is desired in terms of the network functioning as well as topology control. © Data is monitored and collected at regular intervals of time. The collection interval of data is generally a multiple of sensing interval. There is also a possibility that in case of a certain threshold Jevel being reached in the sensed parameter reached, data has to be sent immediately. «The network will also have mobile units that are deployed the moment any sector says there is @ leakage. These are a set of 10 mobile units that have to disperse to different areas within a sector collect data and convene back to the sector control point. Design’ Suggest! Modify the required/existing protocols for this level of the network. Justify your Protocol in terms of how it satisfies Network Characteristics. What type of motes would you prefer for this WSN? What will be the WSN architecture? What will be the deployment pattern that you will use? Design the complete WSN protocol stack. How will the WSN be integrated to the plant network? Now assume that there has been disaster — A disaster warning is sounded and the entire Plant is shutdown. Is it possible that the plant can be remotely shutdown using your current network structure? If yes How? If no — which protocols will you modify to make this possible? ‘The National Guard has been activated to evacuate the town and close road and bridges. The nuclear plant is completely shut down. To get a real-time standard assessment- unmanned aerial vehicle (UAVs) drones are immediately launched. The UAV drones are based in autarkic stations. These not only shelter the drones, but also serve as a node between the cross-linked drones and the remote monitoring service. This is where all information converges. Solar modules ensure the electric power supply. Drones are protected by a dome which opens up in case of emergencyBR crcon's platform contains a charging cradle to recharge the batteries of the drone, Drone has a GPS for navigation and an ultrasonic sensor for distance measurement. These autarkic stations are placed within the safety parameter of the nuclear plant. Upon flying over the contamination site, the UAVs hover collect data relay data to a remote point via the nearest autarkic stations. Each UAV has three radiation detection pods- Two pods to collect and identify naturally occurring radioisotopes of lead and bismuth produced from the radioactive decay of atmospheric radon. The third pod processes data from four radiation detectors to help guide the drone toward the source of gamma radiation. UAVs are equipped with all the needed sensors and computer power to control the flight and carry out complicated missions and tasks without a human operator. The system is also equipped with many safety features that both prevents grave mistakes inflight, and secure a safe landing if there should be a technical problem. The OBEs in the UAVs are safety critical — as these UAVs must not crash at any time and must be able to land safely. Fig 1: UAV Drone in Air from an Autarkic Station shown below UAV Commands: Take -off: Releases the drones Position and Hover: Causes the drone to particular geographic location and hover in that position. Return and land: This command tells your drones to stop doing what they are doing and return to autarkic station. Abandon: Drones can sometimes become stuck and unable to return to their controller's drone bay. In such cases, abandoning them to be able to launch a new wave could be a wise decision, or so that be scooped up later : Scoop to drone bay: Causes disabled drones to be re-docked in the drone bay so that can be re- launched. Again, this only works if the drone is within 2,500 meters of station. What will be the kind of Intra-vehicular buses that will be used with the OBEs on the drones and why? What will be the network formed when UAVs hover? Design the complete protocol stack such that data is relayed to the nearest Autarkic Station. Is this network a WSN? If yes, what are the primary differences between the two WSNs that you have developed in this problem? Elaborate. If no, what is the difference between this and a WSN and why is it necessary that it should be different?
You might also like
Eee G627-2
PDF
No ratings yet
Eee G627-2
8 pages
Fundamentals of (Wireless) MAC Protocols
PDF
No ratings yet
Fundamentals of (Wireless) MAC Protocols
14 pages
2marks WSN
PDF
No ratings yet
2marks WSN
8 pages
Module 5
PDF
No ratings yet
Module 5
11 pages
MAC Protocols
PDF
No ratings yet
MAC Protocols
12 pages
unit 3 sensor theory
PDF
No ratings yet
unit 3 sensor theory
30 pages
Hierarchical Wireless Network Architecture For Distributed Applications
PDF
No ratings yet
Hierarchical Wireless Network Architecture For Distributed Applications
6 pages
Network EmbeddedQ&a.pdf
PDF
No ratings yet
Network EmbeddedQ&a.pdf
9 pages
NetworkEmbeddedApplications Mid-Sem QPv1
PDF
No ratings yet
NetworkEmbeddedApplications Mid-Sem QPv1
2 pages
Protocol Design and Implementation For Wireless Sensor Network
PDF
No ratings yet
Protocol Design and Implementation For Wireless Sensor Network
87 pages
WSND Unit 1 Part B
PDF
No ratings yet
WSND Unit 1 Part B
20 pages
Wireless Sensor Networks: Protocols, Optimization and Applications
PDF
No ratings yet
Wireless Sensor Networks: Protocols, Optimization and Applications
28 pages
WSN 5 Marks Question Bank
PDF
No ratings yet
WSN 5 Marks Question Bank
51 pages
Q1
PDF
No ratings yet
Q1
14 pages
WSN Qusn Minor1
PDF
No ratings yet
WSN Qusn Minor1
8 pages
Btech Aeie Eie Iee 6 Sem Wireless and Sensor Network Pei6j005 2018 (1)
PDF
No ratings yet
Btech Aeie Eie Iee 6 Sem Wireless and Sensor Network Pei6j005 2018 (1)
2 pages
btech-cse-6-sem-wireless-sensor-networks-pcs6j004-2019
PDF
No ratings yet
btech-cse-6-sem-wireless-sensor-networks-pcs6j004-2019
2 pages
wsnAAT2
PDF
No ratings yet
wsnAAT2
6 pages
Cec365 WSN Question Bank
PDF
No ratings yet
Cec365 WSN Question Bank
10 pages
Wireless Sensor Networks
PDF
No ratings yet
Wireless Sensor Networks
101 pages
IOT part 2
PDF
No ratings yet
IOT part 2
15 pages
WSN 1
PDF
No ratings yet
WSN 1
16 pages
Long Quesions
PDF
No ratings yet
Long Quesions
3 pages
DDI Book Chapter Intro
PDF
No ratings yet
DDI Book Chapter Intro
10 pages
WSN 100 Questions 5 Models With Answers
PDF
No ratings yet
WSN 100 Questions 5 Models With Answers
15 pages
WSND Ans Key Final p
PDF
No ratings yet
WSND Ans Key Final p
10 pages
Analyse RPL+MESH
PDF
No ratings yet
Analyse RPL+MESH
72 pages
unit 4
PDF
No ratings yet
unit 4
110 pages
CEC365 WSN
PDF
No ratings yet
CEC365 WSN
6 pages
MLWS Assignment 1
PDF
No ratings yet
MLWS Assignment 1
3 pages
Directed Diffusion
PDF
No ratings yet
Directed Diffusion
20 pages
Algorithmic Foundations of Sensor Networks Lecture 7: Synchronization in Wsns
PDF
No ratings yet
Algorithmic Foundations of Sensor Networks Lecture 7: Synchronization in Wsns
24 pages
Detailed Industrial Protocols
PDF
No ratings yet
Detailed Industrial Protocols
10 pages
WSN Unit 1
PDF
No ratings yet
WSN Unit 1
4 pages
End sem(2024)
PDF
No ratings yet
End sem(2024)
2 pages
CEC365_WSDN_2
PDF
No ratings yet
CEC365_WSDN_2
23 pages
WSNS Question paper solved[1]
PDF
No ratings yet
WSNS Question paper solved[1]
6 pages
WSN_1.1
PDF
No ratings yet
WSN_1.1
6 pages
CNS ENDSEM notes
PDF
No ratings yet
CNS ENDSEM notes
88 pages
IAT 2 Answer Key
PDF
No ratings yet
IAT 2 Answer Key
18 pages
Eeezg573 May03 An
PDF
No ratings yet
Eeezg573 May03 An
2 pages
CN ASSIGNMENT
PDF
No ratings yet
CN ASSIGNMENT
7 pages
WSN Notes of Unit-04
PDF
No ratings yet
WSN Notes of Unit-04
10 pages
Iwst09 Submission 13
PDF
No ratings yet
Iwst09 Submission 13
11 pages
WSN IoT Full Notes (1)
PDF
No ratings yet
WSN IoT Full Notes (1)
6 pages
Interference-Aware Real-Time Flow Scheduling For Wireless Sensor Networks
PDF
No ratings yet
Interference-Aware Real-Time Flow Scheduling For Wireless Sensor Networks
11 pages
Chapter 12 Wireless Sensor Networks: From Reference Book: Adhoc Wireless Networks By: B.S. Manoj
PDF
No ratings yet
Chapter 12 Wireless Sensor Networks: From Reference Book: Adhoc Wireless Networks By: B.S. Manoj
42 pages
ITCE419 - Final Exam
PDF
No ratings yet
ITCE419 - Final Exam
5 pages
WSN-1
PDF
No ratings yet
WSN-1
13 pages
Research Proposal: A. Proposed Study
PDF
No ratings yet
Research Proposal: A. Proposed Study
13 pages
Iot 1234 Mod 2m, 8m, 10m
PDF
No ratings yet
Iot 1234 Mod 2m, 8m, 10m
33 pages
Wireless notes
PDF
No ratings yet
Wireless notes
14 pages
Industrial Internet of Things - Challenges 2018
PDF
No ratings yet
Industrial Internet of Things - Challenges 2018
11 pages
MC Lecture 9
PDF
No ratings yet
MC Lecture 9
15 pages
Unit Ii: Sensor Networks - Introduction & Architectures
PDF
No ratings yet
Unit Ii: Sensor Networks - Introduction & Architectures
8 pages
Module 4 Iot
PDF
No ratings yet
Module 4 Iot
15 pages
Tutorial: Wireless Sensor Networks
PDF
No ratings yet
Tutorial: Wireless Sensor Networks
96 pages
Adsp QP3
PDF
No ratings yet
Adsp QP3
1 page
Gate C Notes
PDF
No ratings yet
Gate C Notes
141 pages
Mosfet Notes
PDF
No ratings yet
Mosfet Notes
65 pages
Eee G627-4
PDF
No ratings yet
Eee G627-4
4 pages