20IT1107
20IT1107
COURSE OUTCOMES
At the end of the course the student shall be able to
CO1: Explain the basics of Ad hoc networks and routing protocols. (L4)
CO2: Apply the knowledge to identify appropriate physical and MAC layer protocols. (L4)
CO3: Interpret the basics of Sensor networks and routing protocols. (L3)
CO4 : Apply the knowledge to identify the suitable routing algorithm based on the network and
user requirement. (L3)
CO5 : Analyze the security issues possible in Ad hoc and sensor networks. (L4)
UNIT II (8 LECTURES)
MAC PROTOCOLS FOR AD-HOC WIRELESS NETWORKS: Issues in designing a MAC
Protocol- Design goal of MAC Protocol-Classification of MAC Protocols- Contention based protocols-
Contention based protocols with Reservation Mechanisms- Contention based protocols with Scheduling
Mechanisms.MAC Protocols that use directional Antennas and Multichannel MAC Protocols.
Learning Outcomes:
At the end of the module, student will be able to
1. Distinguish between contention based MAC protocol and schedule based MAC
protocol(L2)
2. Illustrate the factors that influence the design of physical layer.(L3)
3. Classify the MAC Protocols for Adhoc networks (L4)
UNIT V (8 LECTURES)
SENSOR NETWORK SECURITY: Network Security Requirements, Issues and Challenges in
Security Provisioning, Network Security Attacks, Layer wise attacks in wireless sensor networks,
possible solutions for jamming, tampering, black hole attack, flooding attack. Key Distribution and
Management, Secure Routing – SPINS, reliability requirements in sensor networks.
Learning Outcomes:
At the end of the module, student will be able to
1. Analyze the issues and challenges in security provisioning.(L4)
2. Explain the black hole attack.(L2)
3. Analyze the various attacks in Wireless sensor networks.(L4)
TEXT BOOKS:
1. C. Siva Ram Murthy and B. S. Manoj, ”Ad Hoc Wireless Networks Architectures and
Protocols”, Second Edition, Pearson Publication, Reprinted in 2015.
2. Holger Karl and Andreas Willig,”Protocol and Architecture for Wireless Sensor Networks”,
First Edition, John wiley publication, Reprinted in 2011.
REFERENCES:
1. Fei Hu, Xiaojun Cao and Auerbach,” Wireless Sensor Networks — Principles and Practice,”
CRC Press, Taylor & Francis Group, 2010.
2. Raheem Beyah, Janise McNair and Cherita Corbett. ”Security in Ad hoc and Sensor Networks”
World Scientific Publications / Cambridge University Press, 2010
3. Jagannathan Sarangapani ,”Wireless Ad hoc and Sensor Networks — Protocols”, Performance
and Control, CRC Press, Taylor & Francis Group, 2010.
WEB REFERENCES:
1. https://nptel.ac.in/wireless Ad Hoc and Sensor Networks.pdf