Download as pdf or txt
Download as pdf or txt
You are on page 1of 13

www.rejinpaul.

com

SRM VALLIAMMAI ENGINEERING COLLEGE


(An Autonomous Institution)

SRM Nagar, Kattankulathur – 603 203

DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING

QUESTION BANK

EC8702 - AD HOC AND WIRELESS SENSOR NETWORKS


VII SEMESTER
Regulation – 2017
Academic Year 2020 – 21 (Odd Semester)

Prepared by

Dr.N.Subhashini, Assistant Professor (Selection Grade)-ECE


Dr. C.Amali, Assistant Professor (Selection Grade)-ECE
Mr.D.Murugesan, Assistant Professor (Selection Grade)-ECE

EC8702 – AWSN_ VII Semester ECE_2020-21(Odd Sem) 1


Download updated materials from Rejinpaul Network App
www.rejinpaul.com
SRM VALLIAMMI ENGINEERING COLLEGE
(An Autonomous Institution)
SRM Nagar, Kattankulathur – 603 203.

QUESTION BANK

SUBJECT : EC8702 – Ad hoc and Wireless Sensor Networks


SEM / YEAR : VII / IV year B.E. (ECE)

UNIT I :- AD HOC NETWORKS – INTRODUCTION AND ROUTING PROTOCOLS


Elements of Ad hoc Wireless Networks, Issues in Ad hoc wireless networks, Example commercia l
applications of Ad hoc networking, Ad hoc wireless Internet, Issues in Designing a Routing Protocol for Ad
Hoc Wireless Networks, Classifications of Routing Protocols, Table Driven Routing Protocols - Destinatio n
Sequenced Distance Vector (DSDV), On–Demand Routing protocols –Ad hoc On–Demand Distance Vector
Routing (AODV).

PART – A
Bloom’s
Q.No. Questions Domain
Taxonomy
Level

1. What is an ad hoc wireless network? BTL 1 Remembering


2. Outline the challenging issues in ad hoc network maintenance?. BTL 1 Remembering
3. Classify the security attack in ad hoc wireless networks and specify Understanding
BTL 2
its features.
4. Explore the importance of a Gateway in a wireless network. BTL 3 Applying
5. List the applications of ad hoc networks BTL 1 Remembering
6. Generalize the concept of hidden terminal problem. BTL 6 Creating
7. Illustrate the issues in Ad Hoc networks. BTL 2 Understanding
Broadly Categorize the routing protocols of ad hoc wireless BTL 4 Analyzing
8.
networks.
Differentiate proactive and reactive routing protocols. Write BTL 4 Analyzing
9.
examples for each
10. Mention the significance of power aware routing in ad hoc wireless Understanding
BTL 2
networks.
Write the classification of routing protocols based on the routing BTL 1 Remembering
11.
information update mechanism.
12. Examine the method to update the table in table driven routing BTL 3 Applying
protocol.
Identify the advantages and disadvantages of DSDV routing BTL 1 Remembering
13.
protocols in an ad hoc wireless network.

EC8702 – AWSN_ VII Semester ECE_2020-21(Odd Sem) 2


Download updated materials from Rejinpaul Network App
www.rejinpaul.com
Mobility of nodes in a sparsely populated mobile Adhoc network
14. is less. Assess the choice between proactive routing protocol and BTL 5 Evaluating
reactive routing protocol.
Show that wireless sensor network and wireless mesh network are BTL 1 Remembering
15.
part of the ad hoc wireless network.
16. How the table driven protocol work in Ad hoc networks? BTL 3 Applying
17. Summarize the basic principle of on demand routing protocol. BTL 5 Evaluating
18. Formulate the messages involved in AODV routing protocol. BTL 6 Creating

19. Analyze the factor by which AODV performs well compared to BTL 4 Analyzing
DSDV routing protocol
20. When does RouteError message initiated in AODV routing Understanding
BTL 2
protocol
PART – B
(i) Differentiate between cellular Network and Ad Hoc (8)
Network.
1. BTL 4 Analyzing
(ii) Examine the major advantages of ad hoc wireless (5)
Internet.
2. Describe the issues and challenges in Ad hoc wireless (6) BTL 1 Remembering
networks
(i) Assess the importance of multicasting in an ad hoc (7)
wireless network applications. Evaluating
3. BTL 5
(ii) Summarize the security threats in an adhoc wireless (6)
networks.
Draw the schematic diagram of an ad hoc wireless Internet (13)
4. and discuss the issues to be considered for the successful BTL 1 Remembering
ad hoc wireless Internet.
(i) Demonstrate the benefits of the commercial ad hoc (7)
wireless networks.
5. BTL 2 Understanding
(ii) Why is power management important for ad hoc (6)
wireless networks?
(i) Interpret the concept of Self Organizing in an ad hoc (7)
wireless networks.
6. (ii) What role does the routing protocol play in the (6) BTL 2 Understanding
provisioning of QoS guarantees for ad hoc wireless
networks?
(i) Outline the major challenges that a routing protocol (8)
designed for ad hoc wireless networks faces.
7. (ii) Write about the types of ad hoc network routing (5) BTL 1 Remembering
protocols based on routing information update
mechanism.
8. How is the loop free property ensured in an on demand (13) Understanding
BTL 2
routing protocol and in table driven routing protocol.
Explore the issues related to routing protocol for ad hoc (13)
9. BTL 3 Applying
wireless networks.

EC8702 – AWSN_ VII Semester ECE_2020-21(Odd Sem) 3


Download updated materials from Rejinpaul Network App
www.rejinpaul.com
Analyze the destination sequenced distance-vector routing (13)
10. BTL 4 Analyzing
protocol with an example.
(i) List the advantages of hierarchical topology-based (7)
protocols over protocols that use flat topologies.
11. (ii) Explain the characteristics that the routing protocol for (6) BTL 1 Remembering
ad hoc wireless networks should poses for transfer of
data from source node to destination node.
(i) Devise the significance of each field in the table (7)
maintained at each node in an ad hoc wireless
12. networks using Table driven protocol BTL 6 Creating
(ii) Formulate the changes in the table on addition and (6)
deletion of a node in a network.
Demonstrate how route is established and maintained in an (13)
13. BTL 3 Applying
ad hoc network using AODV routing protocol.
Discriminate the topology organization in DSDV and (13)
14. BTL 4 Analyzing
AODV routing protocols with a sample network.
PART – C
(i) Evaluate whether the Table driven routing protocol is (7)
suitable high mobility environment.
1. (ii) Discuss the behavior of the components of an ad hoc (8) BTL 5 Evaluating
wireless network and infer the uniqueness of each
component.
Design an ad hoc wireless network with nodes and (15)
2. demonstrate the process of route establishment and route BTL 6 Creating
maintenance using the on demand routing protocol.
Assess in detail about routing protocols with efficie nt (15)
3. BTL 5 Evaluating
flooding mechanisms.
What kind of multiple access technology is suitable in a (15)
4. military ad hoc network environment, and a home ad hoc BTL 6 Creating
network environment? Devise the methods for differe nt
applications of ad hoc wireless network
UNIT II :-SENSOR NETWORKS – INTRODUCTION & ARCHITECTURES
Challenges for Wireless Sensor Networks, Enabling Technologies for Wireless Sensor Networks, WSN
application examples, Single-Node Architecture - Hardware Components, Energy Consumption of Sensor
Nodes, Network Architecture - Sensor Network Scenarios, Transceiver Design Considerations, Optimizatio n
Goals and Figures of Merit.
Bloom’s
Q.No. Question Domain
Taxonomy
Level
PART – A
1. What is a wireless sensor network? BTL 1 Remembering

EC8702 – AWSN_ VII Semester ECE_2020-21(Odd Sem) 4


Download updated materials from Rejinpaul Network App
www.rejinpaul.com
Illustrate the characteristic requirements of a wireless sensor
2. BTL 2 Understanding
network.
Examine how address centric network differ from with data centric
3. BTL 3 Applying
network.
4. Differentiate between active and passive sensors. BTL 4 Analyzing

5. Outline the event detection approaches in WSN. BTL 2 Understanding

6. Interpret the term energy scavenging in Wireless Sensor Network. BTL 2 Understanding

7. Summarize the Collaborative processing. BTL 5 Evaluating

8. Name the hardware components of a Wireless sensor network. BTL 1 Remembering


9. Define self-organization of network. BTL 1 Remembering
Identify the key characteristics of a microcontroller which makes
10. it possible to use in wireless sensor node. BTL 1 Remembering

List the characteristics based on which the transceiver is selected


11. for a wireless sensor node. BTL 1 Remembering

Classify the energy consumption operations in wireless sensor


12. networks. BTL 2 Understanding

13. Exhibit the performance metrics of wireless sensor network. BTL 3 Applying

14. Associate the term aggregation with WSN. BTL 6 Creating

15. Formulate the types of mobility of a sensor node in a network. BTL 6 Creating

16. Compare Single Hop with Multiple Hop. BTL 4 Analyzing

17. Explore the features of in-network processing in WSN. BTL 3 Applying

18. Classify the modes of operation of a sensor node. BTL 4 Analyzing


Discuss about dynamic modulation scaling in a transceiver used in
19. wireless sensor node. BTL 5 Evaluating

Write the generic possibilities for high level QoS in wireless


20. sensor network BTL 1 Remembering

PART – B

1. Illustrate the challenges and the required mechanisms of a (13) Understanding


BTL 2
Wireless Sensor network.
(i) What are the various applications of wireless sensor (7)
2. networks and explain any two with an example each. Remembering
BTL 1
(ii) Explain how the sensor networks are deployed for (6)
various applications.

EC8702 – AWSN_ VII Semester ECE_2020-21(Odd Sem) 5


Download updated materials from Rejinpaul Network App
www.rejinpaul.com
Sketch the RF front end of a transceiver and outline the (13) Remembering
3. BTL 1
behavior of operational states.
Explore the transceiver tasks and characteristics in a sensor (13)
4. BTL 3 Applying
node in a wireless sensor network.
(i) Demonstrate the enabling technologies of the wireless (6)
sensor networks
5. BTL 3 Applying
(ii) Apply the innovative mechanisms to realize the (7)
characteristic requirements of WSN.
Interpret the Transceiver characteristics and structure used (13)
6. BTL 2 Understanding
in the sensor node.
(i) Analyze how Energy Scavenging is realized in (7)
wireless sensor network.
7. BTL 4 Analyzing
(ii) Distinguish sensor networks from the mobile ad hoc (6)
network.
Model the energy consumption during the transmission and (13)
8. BTL 6 Creating
reception of a transceiver with the supporting equations.
(i) Is spread spectrum modulation schemes are followed (7)
in WSN - justify your answer.
9. BTL 5 Evaluating
(ii) Discuss the energy consumption of sensors and (6)
actuators.
Deduce the energy consumption in a node with an (13)
10. BTL 4 Analyzing
appropriate diagram.
(i) Brief the energy consumption in discrete operationa l (7)
states of an embedded microcontroller in a sensor
11. node. BTL 1 Remembering
(ii) Describe the relationship between computation and (6)
communication.
Draw the sensor network architecture and describe the (13)
12. BTL 1 Remembering
components in detail.
Categorize the sensor network scenario and illustrate with (13)
13. BTL 4 Analyzing
diagram also explain how mobility can appear in WSN?
(i) Express how optimization goals and figure of merits (7)
achieved in WSN.
14. BTL 2 Understanding
(ii) Examine the factors playing major role in optimizing (6)
a wireless sensor network
PART – C

1. Evaluate the nonradio frequency communication available (15) BTL 5 Evaluating


for communication in a wireless sensor network.
(i) Generalize the essential aspects of power supply for an (10)
untethered wireless sensor node. BTL 6 Creating
2.
(ii) Devise the possible sensors and actuators that can be (5)
used to design a wireless sensor network.
Assess the function of microcontroller in a wireless sensor (15)
3. node and discuss about the various microcontrollers that are BTL 5 Evaluating
available in the sensor node.

EC8702 – AWSN_ VII Semester ECE_2020-21(Odd Sem) 6


Download updated materials from Rejinpaul Network App
www.rejinpaul.com
Formulate the advance radio concepts that are associated (15)
4. with the transceivers of a mote. BTL 6 Creating

UNIT III :-WSN NETWORKING CONCEPTS AND PROTOCOLS


MAC Protocols for Wireless Sensor Networks, Low Duty Cycle Protocols And Wakeup Concepts - S-MAC, The
Mediation Device Protocol, Contention based protocols - PAMAS, Schedule based protocols – LEACH, IEEE
802.15.4 MAC protocol, Routing Protocols- Energy Efficient Routing, Challenges and Issues in Transport layer
protocol.
Q.No. Question Bloom’s Domain
Taxonomy
Level
PART – A

1. What are the performance requirements for a MAC protocol? BTL 1 Remembering
2. Discuss the concept of wake up radio. BTL 2 Understanding
3. List the factors that are essential for PHY design in WSNs. BTL 1 Remembering
Illustrate the difference between contention based protocols and
4. schedule based protocols. BTL 2 Understanding

5. Define dynamic modulation scaling. BTL 1 Remembering


6. Write about the energy efficient routing in WSN. BTL 1 Remembering
7. Devise a method for duplicate address detection. BTL 6 Creating
8. Interpret the salient feature of location based routing. BTL 2 Understanding
9. Determine how flooding is different from gossiping. BTL 4 Analyzing
10. Compare on-demand protocols with proactive protocols. BTL 4 Analyzing
11. Express any one method for duplicate address detection. BTL 3 Applying
12. Classify the identifiers that can be used in WSN. BTL 2 Understanding
13. Analyze the pros and cons of Scheduled based protocols. BTL 4 Analyzing
Formulate the challenges involved in designing the wireless
14. sensor networks. BTL 6 Creating

Does random address assignment in WSN lead to address


15. BTL 5 Evaluating
conflicts? Justify your answer.
16. Summarize the objective of PAMAS. BTL 5 Evaluating
17. Outline the features of IEEE 802.15.4. BTL 1 Remembering
18. Name the scheduled based protocols. BTL 1 Remembering
Demonstrate how LEACH protocol differs from other routing
19. protocols used in WSN. BTL 3 Applying

EC8702 – AWSN_ VII Semester ECE_2020-21(Odd Sem) 7


Download updated materials from Rejinpaul Network App
www.rejinpaul.com
20. Explore the challenges and issues in Transport layer protocol. BTL 3 Applying

PART – B
(i) Explain any three schedule based MAC protocols of (10)
WSN.
1. BTL 2 Understanding
(ii) Illustrate the duty cycle and demonstrate how it is (3)
calculated in WSN.
(i) Analyze the energy efficient routing protocol. (8)
2. (ii) Exhibit the features of the IEEE 802.15.4 MAC (5) BTL 4 Analyzing
protocol.
Depict the importance of the Mediation device protocols (13)
3. BTL 6 Creating
with relevant diagrams in wireless sensor networks.
Determine the impact of S-MAC protocol in a network with (13)
4. BTL 4 Analyzing
suitable diagrams.
(i) Describe the low duty cycle protocols and explain any (8)
two protocols.
5. BTL 1 Remembering
(ii) How address and name management takes place in (5)
WSN.
Write about SMAC and mediation device protocol in a (13)
6. BTL 1 Remembering
network with a neat sketch.
(7)
(i) Assess the working principle of CSMA protocol used in
802.15.4 for medium access in WSN with the help of
7. State diagram. BTL 5 Evaluating
(ii) Summarize the requirements and design consideratio ns
(6)
for a MAC protocols in wireless sensor networks.

Explain the LEACH routing with the help of neat diagram. (13)
8. BTL 1 Remembering
Give its advantages and disadvantages.
Demonstrate the SPIN and PEGASIS routing with the help (13)
9. BTL 3 Applying
of neat diagram. Give its advantages and disadvantages.
Express how the scheduled based MAC protocol differs (13)
10. BTL 2 Understanding
from the contention based MAC protocol.
(i) List the difference between proactive and reactive (7)
routing.
11. BTL 1 Remembering
(ii) Which routing is more suitable for WSN? Explain the (6)
reasons.
12. Interpret a suitable routing technique more suitable for (13) Understanding
BTL 2
WSN. Narrate the reasons for it.
Explore the functional diagram which depicts the issues in (13)
13. BTL 3 Applying
addressing and naming of WSN.
Inspect the distributed assignment of network wide unique (13)
14. BTL 4 Analyzing
MAC address for WSN
PART – C

EC8702 – AWSN_ VII Semester ECE_2020-21(Odd Sem) 8


Download updated materials from Rejinpaul Network App
www.rejinpaul.com
Evaluate the performance of MAC protocols for Wireless (15)
1. BTL 5 Evaluating
Sensor Networks and estimate the duty cycle.
Formulate the methods to select the protocol for Scheduled (15)
2. BTL -6 Creating
based routing and justify the reasons.
Assess the important parameters used in Energy efficie nt (15)
3. BTL -5 Evaluating
routing protocols and estimate the efficiency of the protocol.
Generalize the challenges and issues in Transport layer (15)
4. BTL -6 Creating
protocol and find the suitable solution for it.

UNIT IV:- SENSOR NETWORK SECURITY


Network Security Requirements, Issues and Challenges in Security Provisioning, Network Security Attacks,
Layer wise attacks in wireless sensor networks, possible solutions for jamming, tampering, black hole attack,
flooding attack. Key Distribution and Management, Secure Routing – SPINS, reliability requirements in
sensor networks
PART - A
Q.No Questions Bloom’s
Taxonomy Domain
Level
1. Define Network Security. BTL 1 Remembering
2. List out the requirements of Network security. BTL 1 Remembering
3. Write about the issues in Security provisioning. BTL 1 Remembering
4. Formulate the methods to minimize the security attacks. BTL 6 Creating
5. Categorize the various types of attacks in a wireless sensor network. BTL 4 Analyzing
6. Mention the challenges involved in security provisioning. BTL 2 Understanding
7. Explore the methods to minimize the attacks in WSN. BTL 3 Applying
8. Interpret the key idea of Security provisioning in WSN? BTL 2 Understanding
9. Exhibit the different layer wise attacks in a sensor network. BTL 3 Applying
10. Illustrate how Jamming affects the performance of wireless sensor BTL 2 Understanding
network.
11. Determine the characteristics of denial-of-service. BTL 4 Analyzing
12. Examine the impacts of denial-of-service attacks in sensor networks. BTL 4 Analyzing
13. Point out the significance of Physical- layer and link-layer attacks BTL 1 Remembering
14. Develop the possible countermeasures to alleviate the denial- of-
BTL 6 Creating
service attacks.
15. Assess how the link-layer jamming affects the performance of sensor
BTL 5 Evaluating
networks.

EC8702 – AWSN_ VII Semester ECE_2020-21(Odd Sem) 9


Download updated materials from Rejinpaul Network App
www.rejinpaul.com
16. Name the Network-layer attacks in sensor networks. BTL 1 Remembering
17. Summarize the impact of black hole attack in routing protocols. BTL 5 Evaluating
18. What is meant by tampering? BTL 1 Remembering
19. How does misdirections affect the routing in sensor networks? BTL 3 Applying
20. Discuss the importance of flooding attack in secure routing. BTL 2 Understanding

PART – B
1. Analyze the different security attacks with suitable (13)
BTL 4 Analyzing
parameters.
2. (i) Explain how the security can be improved by minimizing (8)
the attacks in sensor networks. BTL 2 Understanding
(ii) Discuss the challenges in security provisioning. (5)
3. Describe in various types of attacks and explain its (13)
BTL 1 Remembering
characteristics.
4. Compile the various issues in security provisioning in WSN (13)
BTL 6 Creating
and also write about the solutions to avoid it.
5. Identify the layer wise attacks in wireless Sensor networks (13)
BTL 3 Applying
and explain its impact on networks.
6. Explain about Jamming and write the possible solutions for (13)
BTL 1 Remembering
jamming in WSN.
7. Examine how the security attacks affect the performance of (13)
BTL 4 Analyzing
the Wireless sensor networks.
8. List the possible solutions to mitigate the denial-of-ser vice (13)
attacks in sensor networks and explain how it improves the BTL 1 Remembering
performance of the system.
9. Summarize about the impacts of physical- layer jamming (13)
attacks on radio communication. How it distorts the signals in BTL 2 Understanding
the sensor network’s frequency band.
10. Define Tampering attack. Describe how it recovers (13)
cryptographic keys used for ciphering in sensor networks. BTL 1 Remembering

11. (i) Identify the Key management schemes in Wireless (5)


Sensor Networks.
(ii) Develop the key distribution and (8) BTL 3 Applying
management mechanism required
for secure communication in sensor networks.
12. Analyze about the flooding attack and its Countermeasures in (13)
BTL 4 Analyzing
wireless sensor networks in detail.
13. (i) Assess the requirements of Secure Routing (6)
(ii) Examine about the Network-layer attacks in routing (7) BTL 5 Evaluating
protocols.

EC8702 – AWSN_ VII Semester ECE_2020-21(Odd Sem) 10


Download updated materials from Rejinpaul Network App
www.rejinpaul.com
14. Determine the impact of the following security threats in
WSN :
BTL 2 Understanding
(i) Black hole attack (6)
(ii) Transport layer attacks (7)
PART-C
1. Generalize the Active and passive attacks with suitable (15)
examples. Also explain how these attacks differ from each BTL 6 Creating
other.
2. Evaluate how the jamming affects the functio na l (15)
characteristics of Wireless sensor networks in real time BTL 5 Evaluating
environment.
3. Develop the reliability requirements in sensor networks in (15)
order to achieve an end-to-end communication and also BTL 6 Creating
discuss about the reliability bottleneck of the network.
4. Validate the importance of Security Protocols for Sensor (15)
Networks. also explain about the building blocks of SPINS BTL 5 Evaluating
protocols in Security Provisioning

UNIT V :- SENSOR NETWORK PLATFORMS AND TOOLS


Sensor Node Hardware – Berkeley Motes, Programming Challenges, Node-level software platforms –
TinyOS, nesC, CONTIKIOS, Node-level Simulators – NS2 and its extension to sensor networks, COOJA,
TOSSIM, Programming beyond individual nodes – State centric programming.

PART A
Q.No Questions Bloom’s Competence
Taxonomy
Level
1. List the challenges of sensor network programming. BTL 1 Remembering
2. Write the three categories of sensor node hardware. BTL 1 Remembering
3. What are the characteristics of Berkeley mote family? BTL 1 Remembering
4 Point out the two-CPU design of MICA motes. BTL 1 Remembering
5. Outline the transmission characteristics of MICA motes. BTL 2 Understanding
6. Name the features of Node-Level Software Platforms BTL 1 Remembering
7. Create the two representative examples of node-level programming BTL 6 Creating
tools
8. How does TinyOS support Berkeley mote? BTL 3 Applying
9. Develop the application example of TinyOS. BTL 6 Creating
10. Expressthe need for nesC.language for sensor network programming BTL 2 Understanding

EC8702 – AWSN_ VII Semester ECE_2020-21(Odd Sem) 11


Download updated materials from Rejinpaul Network App
www.rejinpaul.com
11. Interpret about the component interfaces of nesC. BTL 2 Understanding
12. Classify the components of nesC based on the implementation level. BTL 4 Analyzing
13. Justify that the language nesC directly reflects the TinyOS execution BTL 5 Evaluating
model.
14. Relate the TinyGALS with TinyOS BTL 1 Remembering
15. Assess the importance of TinyGUYS mechanism in sensor network BTL 4 Analyzing
programming.
16. Identify the components of node-level simulator. BTL 3 Applying
17. Distinguish between cycle driven and discrete event simulation. BTL 4 Analyzing
18. Illustrate the functionalities of ns-2 in the simulation of sensor BTL 2 Understanding
network
19. Discuss about the use of TOSSIM simulator in modelling wireless BTL 3 Applying
network.
20. Evaluate the role of state centric programming model in sensor BTL 5 Evaluating
network applications.
Part B
1. Define sensor node hardware and explain in detail about three (13) BTL 1 Remembering
categories of sensor node hardware with examples.
2. Summarize about the characteristics of embedded sensor (13) BTL 2 Understanding
nodes family with the help of MICA note architecture.
3. (i) List the drawbacks of traditional programming (5) BTL 1 Remembering
technologies in sensor network design.
(ii) What are the Challenges of Sensor Network (8)
Programming
4. (i) Write short notes on node-centric programming. (5) BTL 1 Remembering
(ii) Explain about the node level programming tools with (8)
examples.
5. Explore the TinyOS operating system support resource does (13) BTL 3 Applying
constrained hardware platforms. Discuss in detail.
6. (i) Demonstrate about the interface and configuration of (6) BTL 2 Understanding
nesC language. (7)
(ii) Justify that nesC supports the components and
applications of TinyOS.
7. Develop the components and implementation models of (13) BTL 6 Creating
Timer functions in nesC.
8. (i) Identify the characteristics of Dataflow-Style Language. (5) BTL 3 Applying
(ii) Illustrate the component interfaces and module (8)
implementations of TinyGALS programming model
with necessary diagrams.
9. Analyze the characteristics and components of node-level (13) BTL 4 Analyzing
simulator with necessary functions.
10. Examine how an open-source network simulator can be used (13) BTL 4 Analyzing
to simulate wireless/mobile networks and sensor networks.

EC8702 – AWSN_ VII Semester ECE_2020-21(Odd Sem) 12


Download updated materials from Rejinpaul Network App
www.rejinpaul.com
11. (i) Name a dedicated simulator for TinyOS applications (5) BTL 2 Understanding
and explain. (8)
(ii) Point out the components of node centric programming
models.
12. Describe the following simulators used in wireless sensor BTL 1 Remembering
networks:
(i) ns-2 simulator (6)
(ii) TOSSIM simulator (7)
13. Evaluate the design methodologies and frameworks (13) BTL 5 Evaluating
supported by state-centric programming tools.
14. Determine the role of Collaboration Groups and its (13) BTL 4 Analyzing
abstractions in the design of state-centric programming tools.
PART-C

1. Formulate the traditional embedded system programming (15)


interface with neat diagram and also explain the
BTL 6 Creating
characteristics of sensor network programming with its
challenges.
2. Evaluate the layers of operating system TinyOS that supports (15)
sensor network applications on Berkeley motes hardware
BTL 5 Evaluating
platforms and demonstrate its Field Monitor application for
sensing and sending measurements.
3. Develop the execution models of Node-Level Simulato rs. (15)
Formulate the characteristics of cycle-driven and discrete- BTL 6 Creating
event simulators In terms of timing behavior.
4. Validate the issues to be addressed using abstractions during (15)
the design of sensor network to ensure the correctness and BTL 5 Evaluating
efficiency of the system.

EC8702 – AWSN_ VII Semester ECE_2020-21(Odd Sem) 13


Download updated materials from Rejinpaul Network App

You might also like