Download as pdf or txt
Download as pdf or txt
You are on page 1of 1

J

N
T
U
W
O
R
L
D
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Code No: D7812
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD
M. Tech II SEMESTER EXAMINATION APRIL/MAY-2013
ADHOC AND SENSOR NETWORKS
(COMPUTER NETWORKS AND INFORMATION SECURITY)
Time: 3 hours Max. Marks: 60
Answer any FIVE questions
All questions carry equal marks
----

1.a) What are the characteristics of MANETs used for military applications?
Explain.
b) What are challenges of ad-hoc wireless networks? How do we achieve
them?

2.a) Discuss the differences between proactive and reactive routing protocols.
b) What are the advantages of multipoint relays?

3.a) Why is multicasting not considered as restricted broadcasting in
MANETs?
b) When would you prefer multiple unicast over core-based routing?
c) What is Geocasting? Discuss.

4.a) What are the pros and cons of assigning the responsibility of end-to-end
reliability to the application layer.
b) What are the major differences between ad-hoc wireless networks and
sensor networks?

5.a) Give the functional components of a wireless sensor node.
b) What are the advantages of a clustered architecture over a layered
architecture in a sensor network?

6.a) What are the designs issues of MAC protocols used in wireless sensor
networks?
b) Explain how security provisioning in ad-hoc wireless networks different
from than in infrastructure based networks.

7.a) What are the various secure routing protocols for MANETs? Explain.
b) Explain the sensor network programming challenges.

8. Write short notes on
a) Node-level simulators
b) Cooperation in MANETs
c) Sensor network hardware.
*****
R09
www.jntuworld.com
www.jntuworld.com
www.jwjobs.net www.android.jntuworld.com

You might also like