Academic Year 2023-2024 (Odd Semester)
Department of ECE
Question Bank
Subject Code & Subject Name: EC8702 - ADHOC & WIRELESS SENSOR NETWORK
Year & Sem : IV & 7 th SEM
Name of Faculty : Dr. [Link]
Designation & Department : AP / ECE
Part A
S .N
Question BL CO PI MM/YY
o
Unit 1
1. Is the 4G Cellular communication falls under an L3 CO1 Dec
ad hoc network ? Justify. 2020
2. How to improve the throughput of ad hoc L2 CO1 Dec
network ? 2020
3. Outline the hidden vs. exposed terminal problem L1 CO1 Dec
in ad hoc networks. 2021
4. State any two applications of ad hoc networks. L2 CO1 Dec
2021
5. List down any four challenges of the routing L1 CO1 Dec
protocol in adhoc wireless networks. 2022
6. Mention the significance of power aware routing L1 CO1 Dec
in adhoc wireless networks. 2022
Unit 2
1. Is the WSN has auto configuration? Briefly L2 CO2 Dec
discuss. 2020
2. Write the formula for Noise figure and discuss L1 CO2 Dec
when the noise figure will be lesser. 2020
3. Name the basic components of a sensor node. L1 CO2 Dec
2021
4. State any two applications of wireless sensor L2 CO2 Dec
networks. 2021
5. What is the need for dynamic modulation scaling L1 CO2 Dec
in a transceiver used in wireless sensor node? 2022
6. Energy scavenging in WSN : comment. L2 CO2 Dec
2022
Unit 3
1. List any two suggestion to maximize the lifetime L2 CO3 Dec
of WSN. 2020
2. Draw the super-frame structure of IEEE L1 CO3 Dec
802.15.4. 2020
3. What is data dissemination in a wireless sensor L1 CO3 Dec
network? 2021
4. Why wireless sensor networks need localization L2 CO3 Dec
protocols? 2021
5. Differentiate flooding and gossiping. L2 CO3 Dec
2022
6. List the objective of PAMAS. L1 CO3 Dec
2022
Unit 4
1. What is meant by node capture ? L1 CO4 Dec
2020
2. Differentiate link layer jamming and physical L2 CO4 Dec
layer jamming 2020
3. What is security provisioning? L1 CO4 Dec
2021
4. Define a black hole attack. L1 CO4 Dec
2021
5. Evaluate the impact of black hole attack in L2 CO4 Dec
routing protocols. Write the importance of 2022
flooding attack in secure routing.
6. Write the important of flooding attack in secure L1 CO4 Dec
routing. 2022
Unit 5
1. What is meant by state centric programming ? L1 CO5 Dec
2020
2. In WSN, the data is flooded in the network. L3 CO5 Dec
Which IP address is used for flooding ? Is 2020
flooding, a unicast / multicast / broadcast ?
3. Present an outline of berkeley motes. L1 CO5 Dec
2021
4. Name any two node-level simulators for wireless L1 CO5 Dec
sensor networks. 2021
5. How does Tiny OS support Berkeley mote? L2 CO5 Dec
2022
6. What is the need for nesC. language in sensor L1 CO5 Dec
network programming? 2022
Part B
[Link] Question BL CO PI MM/YY
Unit 1
1. i) Draw protocol graph for the following network: L2 CO1 Dec 2020
end node (ad hoc node) -> mobile node -> wireless
gateway -> end node (ad hoc node).
ii) The following network follows DSDV routing
protocol. Draw the routing table of ad hoc
network, and the source node is ‘A’.
2. b) Explain AODV route establishment and route L3 CO1 Dec 2020
maintenance with proper diagram for the following
network. Consider ‘A’ is a source node.
3. What is a routing protocol? Outline the issues in L1 CO1 Dec 2021
designing a routing protocol for ad hoc wireless
networks.
4. Classify routing protocols for ad hoc wireless L1 CO1 Dec 2021
networks and present an outline of the same.
5. (i) Discuss the design goals and challenges in L2 CO1 Dec 2022
Adhoc wireless networks.
(ii) What role does the routing protocol play in the
provisioning of QoS guarantees for adhoc
wireless networks? Explain.
6. There are 12 nodes from A to L formed an adhoc L3 CO1 Dec 2022
network. Node A wants to send packet to L. Using
DSDV explain how path is established and packets
are transferred. For each stage show the routing
table. During the transaction process, show the
effect of breaking the link at the node F.
Unit 2
1. i) Explain the transceiver operational states. L2 CO2 Dec 2020
ii) Explain the three categories of sensor with
example.
2. i) Discuss about the Operation states with different L2 CO2 Dec 2020
power consumption.
ii) Briefly explain the different types of mobility
with proper diagram.
3. What is a wireless sensor network? Elaborate the L1 CO2 Dec 2021
wireless sensor network architecture with a
diagram.
4. Present an elaborate note on the energy L2 CO2 Dec 2021
consumption rate for sensors in a wireless sensor
network.
5. Explain the transceiver characteristics and L1 CO2 Dec 2022
structure used in the sensor node.
6. (1) Explain how the sensor networks are deployed L2 CO2 Dec 2022
for Military and Synthetic Aperture Radar (SAR)
application.
(ii) Derive the expression for energy consumption
in a sensor node with an appropriate diagram.
Unit 3
1. Explain : SMAC with necessary diagram. L2 CO3 Dec 2020
2. What is the need of power aware multi-access L2 CO3 Dec 2020
protocol for defining WSN MAC ? Also briefly
describes the working model of power aware
multi-access signaling protocol.
3. Outline the low energy adaptive clustering L1 CO3 Dec 2021
hierarchy (LEACH) protocol for wireless sensor
networks.
4. What is energy efficient routing? Present an L1 CO3 Dec 2021
outline of energy efficient routing in wireless
sensor networks.
5. List down the routing protocol design issues of L2 CO3 Dec 2022
WSN and explain in detail the design issues to be
considered to achieve efficient communication.
6. Consider the network topology graph given below. L3 CO3 Dec 2022
The numbers on the edges indicate the distance
between two points. SMECN is used to construct a
minimum exposure path between u and v. What is
the shortest path between y and v in terms of
distance? What is the minimum energy path if
(i) T= 5 × c?
(ii) T= 4 × c?
(Assume the path loss exponent to be 2)
Unit 4
1. Assume that as an attacker, you are planning to L2 CO4 Dec 2020
propose DoS attack. Write down the steps involved
for DoS attack. Explain the effect of DoS attack in
WSN.
2. What is the need of security for routing protocol? L2 CO4 Dec 2020
Also, explain the secured routing protocol using
SPIN.
3. Outline the issues and challenges in security L1 CO4 Dec 2021
provisioning for wireless sensor networks.
4. Present an outline of SPINS, security protocol for L1 CO4 Dec 2021
sensor networks.
5. How the SPIN protocol provides authenticated L2 CO4 Dec 2022
broadcast for resource- constrained environments?
What are the three main design issues of this
protocol? Give your suggestion to overcome this
problem.
6. Identify the Key management schemes in Wireless L1 CO4 Dec 2022
Sensor Networks. Illustrate the key distribution
and management mechanism required for secure
communication in sensor networks.
Unit 5
1. i) A researcher defined new routing L3 CO5 Dec 2020
protocol for WSN. In order to test the
performance of the routing protocol,
suggest the best approach such as
simulation, emulation or real time
implementation which should be cost
effective. Justify your answer.
ii) ii) List out: Programming language
name, graphical interface name,
animation window name used in NS2.
iii) iii) Convert the following C code to
NS2. int a,b,c ;
a=5;
b=6;
c=a+b.
2.. i) Most of the journal papers which L2 CO5 Dec 2020
published in network domain are
displayed the result from simulation,
Why they included simulation results
instead of real time implementation?
Justify.
ii) ii) List out and brief about any four
open simulator which is used for ad hoc
network and WSN.
iii) (iii) Analyse the methodology of cycle
driven simulation and discrete event
simulation.
3. Outline the features of node-level simulators for L1 CO5 Dec 2021
wireless sensor networks.
4. Outline the features of TinyOS and CONTIKI OS L1 CO5 Dec 2021
for wireless sensor networks.
5. Describe the following simulators used in wireless L2 CO5 Dec 2022
sensor networks:
i) ns-2 simulator.
ii) TOSSIM simulator.
iii) COOJA simulator.
6. How is the operating system like TinyOS, nesC, L2 CO5 Dec 2022
CONTIKIOS designed for the sensor node and
discuss the design challenges of these Operating
System.
Part C
[Link] Question BL CO PI MM/YY
Unit 1
1. Present a wireless sensor network design that can L3 CO1 Dec 2021
be used for surveillance and environment
monitoring in a zoo. A zoo is a facility in which
animals are confined within enclosures,
displayed to the public, and in which they may
also be bred. State the functional requirements
you are considering.
Unit 2
1 Design and explain : WSN based border L4 CO2 Dec 2020
protection system in order to detect the entry of
terrorist in the line of control.
Discuss anyone possible attack on the border
protection system with solution.
2.. Design and Explain: Intelligent transport system L4 CO2 Dec 2020
using ad hoc network. The proposed system will
inform the alternate route during road traffic, and
it will provide necessary guideline during
accident.
Discuss suitable routing protocol for your
intelligent transport system.
Unit 3 – NIL
Unit 4
1. Present an ad hoc network design that can be L3 CO4 Dec 2021
used in a geographic location affected by
cyclone. State the functional requirements you
are considering.
Unit 5
1. Describe the following simulators used in L2 CO5 Dec 2022
wireless sensor networks:
(i)n -2 simulator
(ii) TOSSIM simulator
(iii)COOJA simulator
2. How is the operating system like Tiny OS, nesC, L3 CO5 Dec 2022
CONTIKIOS designed for the sensor node and
discuss the design challenges of these Operating
System.
Prepared By Verified By
(Name & Sign) (Name & Sign)
Format No : TLP 50 [Link] : 1.0 Date : 28-07-2023