SlideShare a Scribd company logo
ANURAG Engineering College 
(Accredited by NBA, Approved by AICTE, NewDelhi, Affiliated to JNTU, Hyd) 
Ananthagiri (V), Kodad (M), Nalgonda (Dt) 
II- Mid Examination 
Branch: M.Tech II Sem (WMC) Date: 16-07-2014 
Subject:Ad-hoc WSN Time: 120 Mins 
Answer All Questions 1x 16 = 16 M 
1. Write short note on 
A. Security routing in adhoc wireless networks 
B. Key management 
C. MAC protocals for sensor networks 
D. Sensor networks programming challenges 
Answer any 3 Questions 3x 8 = 24 M 
1. What are the various battery management schemes ? Explain. 
2. Discuss the issues and challenges in providing QOS in adhoc wireless networks. 
3. Explain how security provisining in adhoc wireless networks differ from that in 
infrastructure based netwoks. 
4. Explain wireless sensor networks architecture. 
5. Explain quality of a sensor networks.
.

More Related Content

Similar to Ad hocm.tech ist mid

Mvjce ece 8_sem
Mvjce ece 8_semMvjce ece 8_sem
Mvjce ece 8_sem
Adarsh Adu
 
Wireless body area network
Wireless body area network Wireless body area network
Wireless body area network
subhradeep mitra
 
A secure scheme against power exhausting attacks in hierarchical wireless sen...
A secure scheme against power exhausting attacks in hierarchical wireless sen...A secure scheme against power exhausting attacks in hierarchical wireless sen...
A secure scheme against power exhausting attacks in hierarchical wireless sen...
LogicMindtech Nologies
 
Access-2022-24126_Proof_hi.pdf
Access-2022-24126_Proof_hi.pdfAccess-2022-24126_Proof_hi.pdf
Access-2022-24126_Proof_hi.pdf
mokamojah
 
Intrusion Detection and Countermeasure in Virtual Network Systems Using NICE ...
Intrusion Detection and Countermeasure in Virtual Network Systems Using NICE ...Intrusion Detection and Countermeasure in Virtual Network Systems Using NICE ...
Intrusion Detection and Countermeasure in Virtual Network Systems Using NICE ...
IJERA Editor
 
398 .docx
398                                                             .docx398                                                             .docx
gcettb presentation on sensor network
gcettb presentation on sensor networkgcettb presentation on sensor network
gcettb presentation on sensor network
rahulkumargiri
 
Network-based Wireless for Remote Monitoring Lead-Acid Battery
Network-based Wireless for Remote Monitoring Lead-Acid BatteryNetwork-based Wireless for Remote Monitoring Lead-Acid Battery
Network-based Wireless for Remote Monitoring Lead-Acid Battery
Oka Danil
 
PERFORMANCE EVALUATION OF CROSS LAYER SECURITY SYSTEM FOR SECURE OPTICAL TRAN...
PERFORMANCE EVALUATION OF CROSS LAYER SECURITY SYSTEM FOR SECURE OPTICAL TRAN...PERFORMANCE EVALUATION OF CROSS LAYER SECURITY SYSTEM FOR SECURE OPTICAL TRAN...
PERFORMANCE EVALUATION OF CROSS LAYER SECURITY SYSTEM FOR SECURE OPTICAL TRAN...
IRJET Journal
 
ADAPTATION TO NON-CRITICAL FAILURE AND PERFORMANCE ANALYSIS OF OPTICAL WDM NE...
ADAPTATION TO NON-CRITICAL FAILURE AND PERFORMANCE ANALYSIS OF OPTICAL WDM NE...ADAPTATION TO NON-CRITICAL FAILURE AND PERFORMANCE ANALYSIS OF OPTICAL WDM NE...
ADAPTATION TO NON-CRITICAL FAILURE AND PERFORMANCE ANALYSIS OF OPTICAL WDM NE...
ASHIT CHANDER
 
Introduction of Wireless Sensor Network
Introduction of Wireless Sensor NetworkIntroduction of Wireless Sensor Network
Introduction of Wireless Sensor Network
Muhammad Kaife Uddin
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor network
Neha Kulkarni
 
resume
resumeresume
Border security
Border securityBorder security
Border security
Farah Naaz
 
IRJET- Wireless Sensor Network for Railway Security System
IRJET- Wireless Sensor Network for Railway Security SystemIRJET- Wireless Sensor Network for Railway Security System
IRJET- Wireless Sensor Network for Railway Security System
IRJET Journal
 
Design of smart nodes for wireless sensor network ...
Design of smart nodes for wireless sensor network                            ...Design of smart nodes for wireless sensor network                            ...
Design of smart nodes for wireless sensor network ...
JOLLUSUDARSHANREDDY
 
first_ppt[1] (1).pptx
first_ppt[1] (1).pptxfirst_ppt[1] (1).pptx
first_ppt[1] (1).pptx
RITHESHKT1
 
Secure And Efficient Defense Strategy Against Energy Exhausting Attacks In Wsn
Secure And Efficient Defense Strategy Against Energy Exhausting Attacks In WsnSecure And Efficient Defense Strategy Against Energy Exhausting Attacks In Wsn
Secure And Efficient Defense Strategy Against Energy Exhausting Attacks In Wsn
ijcnes
 
AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...
AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...
AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...
IJNSA Journal
 
A Brief Review on: Evolution of Communication Technologies
A Brief Review on: Evolution of Communication Technologies A Brief Review on: Evolution of Communication Technologies
A Brief Review on: Evolution of Communication Technologies
Radha Mahalle
 

Similar to Ad hocm.tech ist mid (20)

Mvjce ece 8_sem
Mvjce ece 8_semMvjce ece 8_sem
Mvjce ece 8_sem
 
Wireless body area network
Wireless body area network Wireless body area network
Wireless body area network
 
A secure scheme against power exhausting attacks in hierarchical wireless sen...
A secure scheme against power exhausting attacks in hierarchical wireless sen...A secure scheme against power exhausting attacks in hierarchical wireless sen...
A secure scheme against power exhausting attacks in hierarchical wireless sen...
 
Access-2022-24126_Proof_hi.pdf
Access-2022-24126_Proof_hi.pdfAccess-2022-24126_Proof_hi.pdf
Access-2022-24126_Proof_hi.pdf
 
Intrusion Detection and Countermeasure in Virtual Network Systems Using NICE ...
Intrusion Detection and Countermeasure in Virtual Network Systems Using NICE ...Intrusion Detection and Countermeasure in Virtual Network Systems Using NICE ...
Intrusion Detection and Countermeasure in Virtual Network Systems Using NICE ...
 
398 .docx
398                                                             .docx398                                                             .docx
398 .docx
 
gcettb presentation on sensor network
gcettb presentation on sensor networkgcettb presentation on sensor network
gcettb presentation on sensor network
 
Network-based Wireless for Remote Monitoring Lead-Acid Battery
Network-based Wireless for Remote Monitoring Lead-Acid BatteryNetwork-based Wireless for Remote Monitoring Lead-Acid Battery
Network-based Wireless for Remote Monitoring Lead-Acid Battery
 
PERFORMANCE EVALUATION OF CROSS LAYER SECURITY SYSTEM FOR SECURE OPTICAL TRAN...
PERFORMANCE EVALUATION OF CROSS LAYER SECURITY SYSTEM FOR SECURE OPTICAL TRAN...PERFORMANCE EVALUATION OF CROSS LAYER SECURITY SYSTEM FOR SECURE OPTICAL TRAN...
PERFORMANCE EVALUATION OF CROSS LAYER SECURITY SYSTEM FOR SECURE OPTICAL TRAN...
 
ADAPTATION TO NON-CRITICAL FAILURE AND PERFORMANCE ANALYSIS OF OPTICAL WDM NE...
ADAPTATION TO NON-CRITICAL FAILURE AND PERFORMANCE ANALYSIS OF OPTICAL WDM NE...ADAPTATION TO NON-CRITICAL FAILURE AND PERFORMANCE ANALYSIS OF OPTICAL WDM NE...
ADAPTATION TO NON-CRITICAL FAILURE AND PERFORMANCE ANALYSIS OF OPTICAL WDM NE...
 
Introduction of Wireless Sensor Network
Introduction of Wireless Sensor NetworkIntroduction of Wireless Sensor Network
Introduction of Wireless Sensor Network
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor network
 
resume
resumeresume
resume
 
Border security
Border securityBorder security
Border security
 
IRJET- Wireless Sensor Network for Railway Security System
IRJET- Wireless Sensor Network for Railway Security SystemIRJET- Wireless Sensor Network for Railway Security System
IRJET- Wireless Sensor Network for Railway Security System
 
Design of smart nodes for wireless sensor network ...
Design of smart nodes for wireless sensor network                            ...Design of smart nodes for wireless sensor network                            ...
Design of smart nodes for wireless sensor network ...
 
first_ppt[1] (1).pptx
first_ppt[1] (1).pptxfirst_ppt[1] (1).pptx
first_ppt[1] (1).pptx
 
Secure And Efficient Defense Strategy Against Energy Exhausting Attacks In Wsn
Secure And Efficient Defense Strategy Against Energy Exhausting Attacks In WsnSecure And Efficient Defense Strategy Against Energy Exhausting Attacks In Wsn
Secure And Efficient Defense Strategy Against Energy Exhausting Attacks In Wsn
 
AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...
AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...
AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...
 
A Brief Review on: Evolution of Communication Technologies
A Brief Review on: Evolution of Communication Technologies A Brief Review on: Evolution of Communication Technologies
A Brief Review on: Evolution of Communication Technologies
 

Ad hocm.tech ist mid

  • 1. ANURAG Engineering College (Accredited by NBA, Approved by AICTE, NewDelhi, Affiliated to JNTU, Hyd) Ananthagiri (V), Kodad (M), Nalgonda (Dt) II- Mid Examination Branch: M.Tech II Sem (WMC) Date: 16-07-2014 Subject:Ad-hoc WSN Time: 120 Mins Answer All Questions 1x 16 = 16 M 1. Write short note on A. Security routing in adhoc wireless networks B. Key management C. MAC protocals for sensor networks D. Sensor networks programming challenges Answer any 3 Questions 3x 8 = 24 M 1. What are the various battery management schemes ? Explain. 2. Discuss the issues and challenges in providing QOS in adhoc wireless networks. 3. Explain how security provisining in adhoc wireless networks differ from that in infrastructure based netwoks. 4. Explain wireless sensor networks architecture. 5. Explain quality of a sensor networks.
  • 2. .