BEU Previous Year Questions Solved: Ad-hoc & Sensor Networks (Code: 105819)

VIIIth Semester Examination – 2023 (Code: 105819)

Question (a): What is wireless communication?

  • (i) Sending data from one location to another with the use of physical medium
  • (ii) Sending data from one location to another without the use of physical medium
  • (iii) Sending data from one location to another without the use of virtual medium
  • (iv) None of the above

Correct Answer: (ii) Sending data from one location to another without the use of physical medium

Question (b): Which of the following is not a fast fading propagation mechanism?

  • (i) Reflection
  • (ii) Diffraction
  • (iii) Refraction
  • (iv) Scattering

Correct Answer: (iii) Refraction

Question (c): Wormhole attack

  • (i) receives packets at one location in the network
  • (ii) creates routing loops
  • (iii) selectively dropping packets
  • (iv) may leak confidential information to unauthorized users

Correct Answer: (i) receives packets at one location in the network

Question (d): What is a defining characteristic of an ad-hoc network?

  • (i) Centralized control and management
  • (ii) Fixed infrastructure with wired connections
  • (iii) Dynamic and self-configuring nodes
  • (iv) Large coverage area

Correct Answer: (iii) Dynamic and self-configuring nodes

Question (e): What type of topology is commonly used in sensor networks?

  • (i) Star topology
  • (ii) Ring topology
  • (iii) Mesh topology
  • (iv) Bus topology

Correct Answer: (iii) Mesh topology

Question (f): Which networks are characterized by their dynamic topology and decentralized nature?

  • (i) Wired networks
  • (ii) WSN
  • (iii) VPN
  • (iv) Cellular networks

Correct Answer: (ii) WSN (Wireless Sensor Networks)

Question (g): In reactive routing (on-demand) protocol, a route to a destination is established:

  • (i) Periodically, at regular intervals
  • (ii) When a node detects link failure
  • (iii) In advance, before data transmission
  • (iv) Upon request, only when needed

Correct Answer: (iv) Upon request, only when needed

Question (h): Which routing protocol is considered proactive and maintains up-to-date routing information at all times?

  • (i) AODV
  • (ii) DSR
  • (iii) OLSR
  • (iv) TORA

Correct Answer: (iii) OLSR (Optimized Link State Routing)

Question (i): In ad-hoc network routing, which type of routing protocols maintain routes to all possible destinations?

  • (i) Proactive (table-driven) routing protocols
  • (ii) Reactive (on-demand) routing protocols
  • (iii) Hybrid routing protocols
  • (iv) Adaptive routing protocols

Correct Answer: (i) Proactive (table-driven) routing protocols

Question (j): In wireless ad-hoc network

  • (i) access point is must
  • (ii) access point is not required
  • (iii) nodes are not required
  • (iv) all nodes are access points

Correct Answer: (ii) access point is not required

Special Examination – 2023 (Code: 105819)

(Note: This exam featured short-answer definition questions instead of multiple-choice options. I have kept the spacing consistent for you).

Question (a): What is wireless communication?

Answer: Wireless communication is the transfer of information between two or more points without the use of a direct physical connection (like wires or cables), typically using electromagnetic waves.

Question (b): Define Scattering.

Answer: Scattering occurs when the medium through which an electromagnetic wave travels contains objects with dimensions smaller than the wavelength of the signal, causing the signal to scatter in multiple directions.

Question (c): Define Adhoc network.

Answer: An ad-hoc network is a decentralized type of wireless network that does not rely on a pre-existing infrastructure, such as routers or access points; instead, each node participates in routing by forwarding data for other nodes.

Question (d): What is a defining characteristic of an ad-hoc network?

Answer: Its defining characteristics are a lack of centralized infrastructure and a highly dynamic, self-configuring network topology.

Question (e): What type of topology is commonly used in sensor networks?

Answer: Mesh and Star topologies are most commonly used in wireless sensor networks (WSNs).

Question (f): Which networks are characterized by their dynamic topology and decentralized nature?

Answer: Mobile Ad-hoc Networks (MANETs) and Wireless Sensor Networks (WSNs).

Question (g): Define TDMA.

Answer: Time Division Multiple Access (TDMA) is a channel access method that allows several users to share the same frequency channel by dividing the signal into different time slots.

Question (h): Define routing protocol.

Answer: A routing protocol specifies how routers communicate with each other to disseminate information that enables them to select routes between any two nodes on a computer network.

Question (i): In ad-hoc network routing, type of routing protocols maintain routes to all possible destinations.

Answer: Proactive (or table-driven) routing protocols.

Question (j): Define wireless ad-hoc network.

Answer: A wireless ad-hoc network is a collection of wireless mobile nodes that dynamically form a temporary network without the use of any existing network infrastructure or centralized administration.

B.Tech 8th Semester Examination, 2024 (Code: 105819)

Question (a): Ad-hoc Wireless Networks are:

  • (i) Infrastructure less network
  • (ii) Fixed Infrastructure less network
  • (iii) Both (i) and (ii)
  • (iv) None of the above

Correct Answer: (i) Infrastructure less network

Question (b): Differentiate between WSNs and MANETs.

Answer: WSNs (Wireless Sensor Networks) are typically composed of resource-constrained nodes designed for sensing the environment and routing data to a sink. MANETs (Mobile Ad-hoc Networks) consist of mobile devices communicating directly without fixed infrastructure, where human interaction is usually the primary focus.

Question (c): How CSMA based MAC work on Wireless Sensor Network?

Answer: CSMA (Carrier Sense Multiple Access) requires a sensor node to “listen” to the wireless channel before transmitting. If the channel is idle, it transmits; if busy, it backs off for a random period to avoid collisions.

Question (d): Write down the difference between Proactive routing and Reactive routing.

Answer: Proactive routing maintains up-to-date routing tables constantly (high overhead, low latency). Reactive routing establishes a route only when needed to send data (low overhead, higher initial delay).

Question (e): What is data aggregation strategy in Wireless Sensor Network?

Answer: Data aggregation is the process of gathering and summarizing data from multiple sensor nodes to reduce redundant transmissions, thereby saving bandwidth and energy.

Question (f): List out the hardware and software components of a sensor node.

Answer: Hardware includes a microcontroller, transceiver, memory, power source, and sensors. Software includes a lightweight OS (like TinyOS) and network/routing protocols.

Question (g): What is hybrid routing?

Answer: Hybrid routing combines proactive and reactive routing protocols, often using proactive routing for local zones and reactive routing for inter-zone communication.

Question (h): List any three radio waves propagation mechanism.

Answer: Reflection, Diffraction, and Scattering.

Question (i): Write the classification of MAC protocols?

Answer: MAC protocols in wireless networks are classified into Contention-based, Contention-based with reservation, and Contention-based with scheduling.

Question (j): List the issues in designing a transport layer protocol for ad hoc wireless networks.

Answer: Issues include induced traffic, throughput unfairness, separation of congestion control and reliability, frequent path breaks due to mobility, and power/bandwidth constraints.

B.Tech 8th Semester Examination, 2024(S) (Code: 105819)

Question (a): The two main building blocks of SPINS are:

  • (i) TESLA and SNEP
  • (ii) TLS and DTLS
  • (iii) EAP and IPsec
  • (iv) RSA and DES

Correct Answer: (i) TESLA and SNEP

Question (b): The energy consumption in WSNs is mainly dominated by:

  • (i) Data processing at sensor nodes
  • (ii) Storing data locally
  • (iii) Communication among nodes
  • (iv) Sensing environmental parameters

Correct Answer: (iii) Communication among nodes

Question (c): Which factor is critical for the efficient design of a sensor node?

  • (i) High processing speed
  • (ii) Large-scale memory
  • (iii) Energy efficiency
  • (iv) Wide communication range

Correct Answer: (iii) Energy efficiency

Question (d): A jamming attack targets which layer of the network stack in ad hoc sensor networks?

  • (i) Physical layer
  • (ii) Network layer
  • (iii) Data link layer
  • (iv) Transport layer

Correct Answer: (i) Physical layer

Question (e): Which metric is crucial for evaluating transport protocols in ad hoc sensor networks?

  • (i) High bandwidth utilization
  • (ii) Low latency and high throughput
  • (iii) Packet delivery ratio and energy efficiency
  • (iv) Fixed routing overhead

Correct Answer: (iii) Packet delivery ratio and energy efficiency

Question (f): Which hybrid routing protocol combines proactive and reactive approaches?

  • (i) ZRP
  • (ii) OLSR
  • (iii) AODV
  • (iv) DSR

Correct Answer: (i) ZRP (Zone Routing Protocol)

Question (g): Which type of routing protocol establishes routes only when they are needed?

  • (i) Proactive
  • (ii) Hybrid
  • (iii) Reactive
  • (iv) Hierarchical

Correct Answer: (iii) Reactive

Question (h): Which of the following MAC protocols incorporates clustering for efficient energy use in sensor networks?

  • (i) SMAC
  • (ii) B-MAC
  • (iii) LEACH
  • (iv) IEEE 802.15.4

Correct Answer: (iii) LEACH (Low-Energy Adaptive Clustering Hierarchy)

Question (i): Which one of the following enables us to use the entire bandwidth simultaneously?

  • (i) TDMA
  • (ii) FDMA
  • (iii) CDMA
  • (iv) All of the above

Correct Answer: (iii) CDMA (Code Division Multiple Access)

Question (j): What is the purpose of the RTS/CTS mechanism in MAC protocols like IEEE 802.11?

  • (i) Minimize packet size
  • (ii) Increase bandwidth
  • (iii) Avoid collisions due to hidden terminals
  • (iv) Prioritize critical data

Correct Answer: (iii) Avoid collisions due to hidden terminals

B.Tech 8th Semester Examination, 2025 (Code: 105819)

Question (a): What is wireless communication?

  • (i) Sending data from one location to another with the use of physical medium
  • (ii) Sending data from one location to another without the use of physical medium
  • (iii) Sending data from one location to another with the use of virtual medium
  • (iv) None of the above

Correct Answer: (ii) Sending data from one location to another without the use of physical medium

Question (b): Which IEEE standard is associated with multi-channel MAC?

  • (i) IEEE 802.3
  • (ii) IEEE 802.11
  • (iii) IEEE 802.16
  • (iv) IEEE 802.15

Correct Answer: (ii) IEEE 802.11

Question (c): Reservation-based MAC protocols are preferred in:

  • (i) Dense and collision-prone networks
  • (ii) Sparse networks
  • (iii) Wired LANs
  • (iv) Networks with fixed topology

Correct Answer: (i) Dense and collision-prone networks

Question (d): Which MAC protocol uses both contention and reservation mechanisms?

  • (i) Pure ALOHA
  • (ii) Hybrid MAC
  • (iii) IEEE 802.11 DCF
  • (iv) TDMA

Correct Answer: (ii) Hybrid MAC

Question (e): Which of the following is a proactive routing protocol?

  • (i) AODV
  • (ii) DSR
  • (iii) DSDV
  • (iv) TORA

Correct Answer: (iii) DSDV (Destination-Sequenced Distance-Vector Routing)

Question (f): Hybrid routing protocols combine:

  • (i) Wired and wireless technologies
  • (ii) Reactive and proactive routing approaches
  • (iii) Static and dynamic routes
  • (iv) TCP and UDP protocols

Correct Answer: (ii) Reactive and proactive routing approaches

Question (g): In a typical WSN node, the power consumption is highest during:

  • (i) Sleep mode
  • (ii) Sensing
  • (iii) Idle listening
  • (iv) Data transmission

Correct Answer: (iv) Data transmission

Question (h): The main goal of data aggregation in WSNs is to:

  • (i) Increase delay
  • (ii) Consume more bandwidth
  • (iii) Reduce redundant data transmission
  • (iv) Provide encryption

Correct Answer: (iii) Reduce redundant data transmission

Question (i): The Biba model is primarily concerned with:

  • (i) Confidentiality
  • (ii) Authentication
  • (iii) Integrity
  • (iv) Availability

Correct Answer: (iii) Integrity

Question (j): IEEE 802.15.4 is designed specifically for:

  • (i) High-speed multimedia streaming
  • (ii) Fiber optic networks
  • (iii) Low-rate wireless personal area networks
  • (iv) Industrial Ethernet

Correct Answer: (iii) Low-rate wireless personal area networks (LR-WPANs)

B.Tech 8th Semester Examination, 2025 (S) (Code: 105819)

Question (a): MANET stands for

  • (i) Mobile Area Network
  • (ii) Mobile Ad-hoc Network
  • (iii) Managed Ad-hoc Network
  • (iv) Multi Access Network

Correct Answer: (ii) Mobile Ad-hoc Network

Question (b): Which spectrum is used for wireless communication?

  • (i) Optical spectrum
  • (ii) Electromagnetic spectrum
  • (iii) Acoustic spectrum
  • (iv) Mechanical spectrum

Correct Answer: (ii) Electromagnetic spectrum

Question (c): IEEE 802.11 is mainly used for

  • (i) Sensor networks
  • (ii) Cellular networks
  • (iii) Satellite networks
  • (iv) WLAN

Correct Answer: (iv) WLAN (Wireless Local Area Network)

Question (d): Hybrid MAC combine

  • (i) CSMA and TDMA
  • (ii) Routing and MAC
  • (iii) FDMA and CDMA
  • (iv) Transport and Network

Correct Answer: (i) CSMA and TDMA

Question (e): TCP performs poorly in ad-hoc networks due to

  • (i) High bandwidth
  • (ii) Fixed topology
  • (iii) Mobility and losses
  • (iv) Static routing

Correct Answer: (iii) Mobility and losses

Question (f): AODV is an example of

  • (i) Proactive routing
  • (ii) Hybrid routing
  • (iii) Reactive routing
  • (iv) Encryption

Correct Answer: (iii) Reactive routing

Question (g): Sink node in WSN is used for

  • (i) Sensing
  • (ii) Routing only
  • (iii) Data collection
  • (iv) Power control

Correct Answer: (iii) Data collection

Question (h): SPINS is used for

  • (i) Routing
  • (ii) Localization
  • (iii) Security in WSN
  • (iv) Scheduling

Correct Answer: (iii) Security in WSN

Question (i): Software-based IDS detects

  • (i) Hardware failure
  • (ii) Routing paths
  • (iii) Intrusions
  • (iv) Power usage

Correct Answer: (iii) Intrusions

Question (j): Watermarking technique is used for

  • (i) Routing
  • (ii) Energy saving
  • (iii) Data authentication
  • (iv) Scheduling

Correct Answer: (iii) Data authentication

B.Tech 8th Semester Exam, 2022 (Code: 105819)

Question (a): What is wireless communication?

  • (i) Sending data from one location to another with the use of physical medium
  • (ii) Sending data from one location to another without the use of physical medium
  • (iii) Sending data from one location to another without the use of virtual medium
  • (iv) None of the above

Correct Answer: (ii) Sending data from one location to another without the use of physical medium

Question (b): ___ is a transmission method used in MIMO wireless communications to transmit encoded data signals independently.

  • (i) MU-MIMO
  • (ii) STTD
  • (iii) SM
  • (iv) Collaborative Uplink MIMO

Correct Answer: (iii) SM (Spatial Multiplexing)

Question (c): Which of the following is not a fast fading propagation mechanism?

  • (i) Reflection
  • (ii) Diffraction
  • (iii) Refraction
  • (iv) Scattering

Correct Answer: (iii) Refraction

Question (d): Wormhole attack

  • (i) receives packets at one location in the network
  • (ii) creates routing loops
  • (iii) selectively dropping packets
  • (iv) may leak confidential information to unauthorized users

Correct Answer: (i) receives packets at one location in the network

Question (e): In MACA-BI, the receiver node initiates data transmission by transmitting

  • (i) RTS control packet
  • (ii) CTS control packet
  • (iii) RTR control packet
  • (iv) ACK control packet

Correct Answer: (iii) RTR control packet (Ready To Receive)

Question (f): On demand routing protocols exchange routing information periodically.

  • (i) Yes
  • (ii) No

Correct Answer: (ii) No

Question (g): 802.11 wireless networking uses what method as the media access method?

  • (i) CSMA/CD
  • (ii) CTS/RTS
  • (iii) CSMA/CA
  • (iv) CSCD/CA

Correct Answer: (iii) CSMA/CA

Question (h): Repudiation refers to

  • (i) attempted denial by a node involved in a communication
  • (ii) selection of node involved in a communication
  • (iii) selectively dropping packets
  • (iv) disrupt the normal operation of the network

Correct Answer: (i) attempted denial by a node involved in a communication

Question (i): In which type of attack, an adversary attempt to prevent consume/waste away resources of other nodes present in the network?

  • (i) Resource consumption attack
  • (ii) Blackhole attack
  • (iii) Denial of service attack
  • (iv) Wormhole attack

Correct Answer: (i) Resource consumption attack

Question (j): In wireless ad-hoc network

  • (i) access point is must
  • (ii) access point is not required
  • (iii) nodes are not required
  • (iv) all nodes are access points

Correct Answer: (ii) access point is not required

B.Tech 8th Semester Special Exam, 2022 (Code: 105819)

(Note: The first six questions (a through f) were exact duplicates of the regular 2022 exam above. They are listed directly below with the correct answers).

  • (a) What is wireless communication? (ii) Sending data from one location to another without the use of physical medium
  • (b) ___ is a transmission method used in MIMO wireless communications… (iii) SM
  • (c) Which of these is not a fast fading propagation mechanism? (iii) Refraction
  • (d) In MACA-BI, the receiver node initiates data transmission by transmitting (iii) RTR control packet
  • (e) Do on-demand routing protocols exchange routing information periodically? (ii) No
  • (f) 802.11 wireless networking uses what method as the media access method? (iii) CSMA/CA

Question (g): A ___ broadcast storm occurs when broadcast or multicast packets flood the LAN.

  • (i) MAN
  • (ii) WAN
  • (iii) LAN
  • (iv) None of the above

Correct Answer: (iii) LAN

Question (h): In ___, each station is forced to send only at the beginning of the time slot.

  • (i) pure aloha
  • (ii) slotted aloha
  • (iii) Both (i) and (ii)
  • (iv) Neither (i) nor (ii)

Correct Answer: (ii) slotted aloha

Question (i): The DES algorithm cipher system consists of ___ rounds (iterations) each with a round key.

  • (i) 12
  • (ii) 18
  • (iii) 9
  • (iv) 16

Correct Answer: (iv) 16

Question (j): Message ___ means that the receiver is ensured that the message is coming from the intended sender, not an imposter.

  • (i) confidentiality
  • (ii) integrity
  • (iii) authentication
  • (iv) None of the above

Correct Answer: (iii) authentication

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top