CS6003
CS6003
UNIT-I
1.Define computer network and give its two components
A computer network is an interconnected collection of independent computers which consists of two
components
Distributed applications
Networking infrastructure
2.Give some example of distributed applications.
Internet
E-mail
Banking applications
Reservation system
3.List the high and low frequency bands in the electromagnetic spectrum.
High frequency bands X-rays and Gamma rays
Low frequency bands-radio, Microwave, infrared and visible waves.
4.What are the method of spectrum allocation
Comparative bidding
Lottery system
Auctioning method
5. What is multipath propagation? How it affect the signal quality?
Multi path is the propagation phenomenon that results in radio signals reaching the receiving antenna by
two or more paths. The effects of multipath include constructive and destructive interference, and phase shifting
of the signal. Multi path propagation of signals causes fading of the transmitted signal.
6. What is inter symbol interference?
Give a mechanism that is used for overcoming problems arising due to inter symbol interference. Inter
symbol interference is a type of interference, where distortion in the received signal is caused by the temporal
spreading and the consequently overlapping of individual pulses in the signal. It can be avoided by introducing
guard bands.
7.List the characteristics of the wireless Channel.
1.Path loss
2.Fading
3.Interference
4.Doppler shift
5.Transmission rate constraints.
8.Define fading
Fading is fluctuations in signal strength when received at the receiver.It has two types,
Fast fading or small scale fading
slow fading or large scale fading.
9. Explain the Doppler shift.
It is defined as change in the frequency of the received signal when the transmitter and receiver move
with respect to each other. The Doppler shift is given by fd=v/λ
PART B
1. Explain MACAW protocol in detail.
2. Explain the contention based protocols with scheduling and reservation in detail.
3. List and explain the issues in designing a MAC protocol for ad hoc wireless networks.
4. List the important goals of designing a MAC protocol for ad hoc wireless networks.
5. Illustrate various steps involved in five phase reservation protocol with its frame format.
6. How is scheduling mechanism achieved in distributed wireless ordering protocol? Explain in detail. How are
Information symmetry and perceived collisions handled?
7. What are the advantages of reservation based MAC protocol over contention based MAC Protocol?
UNIT-III
1. Define Routing
Routing is the process of selecting best paths in a network. In the past, the term routing was also used to
mean forwarding network traffic among networks. Routing is performed for many kinds of networks, including
the telephone network , electronic data networks and transportation networks.
2. How is the loop free property ensured in on demand routing protocol?
It is a fundamental requirement of any routing protocol to avoid unnecessary wastage of network
bandwidth. In ad hoc wireless networks, due to the random movement of nodes, transient loops may form in the
route thus established. A routing protocol should detect such transient routing loops and take corrective actions.
3. What are the advantages of hierarchical routing protocol?
Reduction in the size of routing tables
Better scalability
Substantially lesser calculation and updates of routing tables
4. List some example of table driven routing protocols
Destination sequential distance-vector routing
Wireless routing protocol
Cluster head gateway switch routing protocol
Source tree adaptive routing protocol
5. List the advantages of DSVL routing protocols
The routers are readily available to all destination at all times, the delay is less in the route
setup process.
With the help of mechanism like incremental updates, an existing wired network protocol can
be applied to ad hoc wireless networks
6. What is hybrid routing protocol?
Hybrid routing protocol combines the best feature of proactive and reactive routing protocols. Hybrid
routing protocol use distance vector for more accurate metrics to determine the best paths to designation
network and report routing information only when there is a change in the topology of the network.
7. How is the cluster head selected in the CGSR protocol?
CGSR organizes nodes into cluster with coordination among the members of each cluster assigned to a
unique node called cluster-head. The cluster head is selected dynamically by using a least cluster change
algorithm. In LCC algorithm, a node ceases to be a cluster head only if it comes under the range of another
cluster-head, where tie is broken either using the lowest ID or highest connectivity algorithm.
8. What are the major challenges in designing routing protocols?
Mobility
Bandwidth constraint
Error prone shared broadcast radio channel
Hidden and exposed terminal problems
9. List some of the characteristics of a routing protocol for ad hoc wireless networks.
It must be fully distributed
It must be localized and adaptive to frequent topology changes
It must provide Quality of service
It must use the resources efficiently
10. What is the approach used to find link stability in ABR?
A link is classified as stable or unstable based on its temporal stability. The temporal stability is determined by
counting the periodic beacons that a node receives from its neighbors. Each node maintains the count of its
neighbors beacons and classifies each link as stable or unstable based on the beacon count.
11. Classify the routing protocol for ad hoc wireless network
Routing information update mechanism
Use of temporal information for routing
Topology information organization
Utilization of specific resources
12. Based on routing information update mechanism how the routing protocols are classified?
Proactive or table driven routing protocol
Reactive or on demand routing protocol
Hybrid routing protocol
13. Give the major objectives of the transport layer protocol.
Setting up of an end-to-end connection
End-to-end delivery of data packets
Flow control
Congestion control
14. Why does TCP not work well in Ad hoc network?
Misinterpretation of packet loss
Frequent path breaks
Effect of path length
Uni-directional path
Multipath routing
Network partitioning and remerging.
15. List the issues in designing a transport layer protocol for ad hoc wireless networks
Induced traffic
Induces throughput unfairness
Separation of congestion control, reliability and flow control
Power and bandwidth constraints
Dynamic topology
16. Specify some of the goals to be achieved in transport layer protocol for ad hoc wireless networks.
The throughput for each connection should be increased
Throughput fairness must be provided across contending flows
The connection setup and connection maintenance overhead should be minimal
The protocol should have congestion control and flow control mechanism in the network.
The protocol should be able to adjust to the dynamic topological changes in the network
17. What additional state information is to be maintained at the FP in TCP-F?
The state information that is maintained at the FP in TCP-F is Snooze state Connected state
18. What is the impact of the failure of proxy nodes in split –TCP?
The failure of proxy nodes in splits TCP leads to throughput degradation. During frequent path breaks or
during frequent node failure, the performance of split TCP may be affected.
PART B
1. With suitable trace, explain the route establishment in location aided routing.
2. Device a pseudo code that present various steps involved in neighbour Degree- Based preferred link
algorithm.
3. How is routing table constructed in fisheye state routing protocol? Explain in detail.
4. Discuss table driven protocols with examples.
5. Explain multicast routing algorithms in detail.
6. How routing table is constructed in fisheye state routing protocol? Explain in detail.
7. List the characteristics of ideal routing protocol for ad hoc wireless network.
8. Classify and explain adhoc wireless network based on routing topology.
9. Explain the types of ad hoc network routing protocols based on routing information update mechanism.
10. Explain on demand routing protocol in detail.
11. Explain the major challenges that a routing protocol designed for adhoc wireless networks face.
12. Describe how the packets are transmitted in multiple access collision avoidance protocol.
13. Explain the scheduling table update mechanism in distributed priority scheduling.
UNIT-IV
1. What is WSN?
Wireless sensor networks are a network that consists of sensor which are distributed in an ad hoc
manner.
2. Compare wireless sensor network with ad hoc network
Wireless sensor network mainly use broadcast communication while ad hoc networks use
point-to-point communication.
Unlike ad hoc networks wireless sensor networks are limited by sensors limited power ,
energy and computational capability,
Sensor nodes may not have global ID because of the large amount of overhead and large
number of sensors.
3. List the advantages of clustering
Prevent interferences using CDMA
Flexible and adaptive
Efficient transmission using TDMA
4. List the disadvantages of clustering
Cluster head formation more overhead
Long distance for CH to travel
Possibility of CH dead
5. What are the disadvantages of flooding?
Implosion
Overlap
Resource blindness
6. What is sequential assignment routing?
The sequential assignment routing algorithm creates multiple trees, where the root of each tree is a one
hop neighbor of the sink.
7. What is data aggregation?
Data aggregation is the process of collecting and aggregating the useful data. It is considered as one of
the fundamental processing procedures for saving the energy.
8. What are the challenges caused by sensor network MAC protocol?
No single controlling authority, so global synchronization is difficult
Power efficiency issue
Frequent changes in topology due to node mobility and failure.
9. What are three kinds of MAC protocols used in sensor network?
fixed -allocation
demand- based
contention –based
10. List the IEEE 802.15.4 features
Data rates of 250kbps, 40kbps and 20kbps
Two addressing modes; 16 bit short and 64 bit IEEE addressing
CSMA-CA channel access
Automatic network establishment by the coordinator.
11. How an implosion is caused?
When duplicate messages are send to the same node it occurs, when a node receives copies of the same
messages from many of its neighbors.
12. When an overlap will occur?
The same event may be sensed by more than one node due to overlapping regions of coverage. This
results in their neighbor receiving duplicate reports of the same event.
PART-B
1. Explain about the hardware components of sensor nodes
2. Explain about the software components of sensor nodes
3. With a neat diagram, Explain the sensor network architecture
4. Write notes on Dynamic Energy and power management
5. Explain in detail about aggregation as an optimization problem.
6. Explain about the MAC protocol in WSN.
7. Write in detail about the IEEE 802.15.4
UNIT-V
1. What are ways of deployment?
The deployment can be either
Deterministic
Randomized
2. Compare deterministic and random deployment
In deterministic deployment, the sensors are manually placed and data is routed through pre-
determined paths.
In random node deployment, the sensor nodes ar4e scattered randomly creating an
infrastructure in an ad hoc manner
3. What are the categories of power saving techniques?
Schedule the wireless nodes to alternates between active and sleep mode
Power control by adjusting the transmission range of wireless nodes
Energy efficient routing, data gathering
Reduce the amount of data transmitted and avoid useless activity.
4. Define OLSR
OLSR is optimized link state routing protocol which is a proactive protocol that employs an efficient
link state packet forwarding mechanism called multipoint relaying.
5. List the advantages of OLSR
Reduced control overhead.
Low connection setup
6. Define localization
Localization is the task of determine the position of a sensor or the spatial relationship among objects.
7. Why GPS is not feasible in localization?
Not available indoor
Constraints on the cost of sensor
Constraints on the size of sensor
Constraints on the energy consumption
8. What are the two mechanism for location discovery?
Indoor localization
Sensor localization
9. What is the purpose of RSSI?
`Receiver signal strength indicator was used to determine correlation to distance.
10. What is ML technique? classify it.
Multi-lateration technique is the technique of location estimation depending on the beacons nodes
locations. They are,
Atomic ML
Iterative ML
Collaborative ML
11. Define relative localization.
The aim of relative localization was to obtain the relationship of distance or angle between nodes. Its
distance is relative not absolute and the same angle.
12. What is coverage?
Coverage is a measure of how well the network can observe or cover an event. Coverage depends up on:
Range and sensitivity of sensing nodes
Location and density of sensing nodes in given region
13. Define breach path
Breach path shows the region of maximum vulnerability in a sensor network where the coverage
provided by the sensors is the weakest.
14. What is the use of voronoi diagram?
Voronoi diagram is used to solve the problem of coverage by partitioning the plane into a set of convex
polygon such that all points inside a polygon are closest to the sensor enclosed by the polygon
15. How voronoi diagram is drawn?
It is drawn by perpendicular bisector of every line segment joining two sites and using their points of
intersection as the vertices of the convex polygons.
16. What is delaunary triangulation?
Delaunary triangulation is a mathematical technique to solve this which is obtained from voronoi
diagram by connecting the sites whose polygons share a common edge.
17. What are the three function of PSFQ?
Message relaying
Error recovery
Selective status reporting
18. Define AOA?
The angle between the propagation direction of an incident wave and some reference direction
PART-B
1. Briefly explain the issues in WSN routing
2. What is meant by OLSR and explain about OLSR routing protocol-
3. Explain about the absolute and relative localization
4. Write notes on triangulation
5. Explain about the QOS in WSN
6. Explain about the Synchronization in WSN www.AUNewsBlog.net
99980109761093