0% found this document useful (0 votes)
5 views16 pages

WMN PT2

Download as pdf or txt
Download as pdf or txt
Download as pdf or txt
You are on page 1/ 16

WMN PT2

WMN PT2
QB

1. State two features of 5g technology.


2. Classify clustering algorithm.
3. Define the term LEC (Local Exchange Carrier).
4. State 2 application of MANET.
5. State 2 specifications of IMT 2000.
6. Draw the WAP protocol stack and the functions of any 4 protocols.
7. Draw the block schematic of WLL architecture and explain it.
8. Encode the data stream 1011000101 using the following technique:-
1) Rz-Bipolar
2) AMI
3) Manchester
4) NRZ-unipolar
9. Draw the architecture of WSN and explain.
10.Draw the architecture of UMTS and explain.
11.Explain the energy constraints in sensor node in WSN and name the protocols to
design energy efficiency in WSN.
12.Draw the MANET topology and explain. State 2 applications of MANET.
13. Explain the principle of working of ASK and BPSK with suitable waveforms of
the bit sequence 110101100.
14.Draw the block diagram of a sensor node in WSN and state the function of
various components.
15.Compare WCDMA and CDMA 2000 on the basis of channel Bandwidth chip
rate, dulex mode, modulation, frame length and power control rate.
16.State any 2 features of UMTS.
17.List any 4 application of IOT.
18.Differentiate btw 4g and 4g LTE (any 4).
19.Differentiate btw PCM and DPCM on the bases of Bitrate, quantization and
distortion, application and feedback.
20.Differentiate btw Bluetooth and Wi-Fi on the basis of range, bandwidth,
modulation technique and no. of devices connected.
21.Differentiate btw WSN and IOT n/t.
22.Explain design challenges in MANET.
23.Draw and explain IOS equivalent protocol layer architecture for WSN.

R
RUSHI BHANSALI 1
WMN PT2

WMN PT2
Answers

1. State two features of 5g technology.


Ans. Features of 5G: (write any 2)
 The 5G technology is providing up to 25Mbps connectivity speed.
 5G technology offer high resolution for crazy cell phone user and bi-directional large
bandwidth shaping.
 5G technology also providing subscriber supervision tools for fast action.
 The advanced billing interfaces of 5G technology makes it more attractive and effective.
 The high quality services of 5G technology based on policy to avoid error.
 The traffic statistics by 5G technology makes it more accurate.
 5G technology is providing large broadcasting of data in Gigabit which supporting almost
65,00C connections.
 The remote diagnostics also a great feature of 5G technology.
 5G technology offer transporter class gateway with unparalleled consistency.
 Through remote management offered by 5G technology a user can get better and fast solution.
 The 5G technology network offering enhanced and available connectivity just about the world.

2. Classify clustering algorithm.


Ans.

3. Define the term LEC (Local Exchange Carrier).


Ans. LEC (Local Exchange carrier) is the term for a public telephone company in the U.S that
provides local service.
Some of the largest LECs and the Bell operating companies which were grouped in to holding
companies known collectively as the Regional Bell Operating Companies (RBOCs) when the Bell
system was broken up by a 1983 consent decree. In addition to the Bell companies, there are a
number of independent LECs, such as GTE.
LEC Companies are also sometimes referred to as "telcos" A "local exchange" is the local "central
office" of an LEC. Lines from homes and businesses terminate at a local exchange.
Local exchanges connect to other local exchanges within a Local Access and Transport Area
(LATA) or to Inter-Exchange Carriers (IXCs) such as long distance carriers. AT&T, MCI and
Sprint.

R
RUSHI BHANSALI 2
WMN PT2

4. State 2 application of MANET.


Ans. (any 2 only)
1. Military Sector: Military equipment now routinely contains some sort of computer
equipment. Ad- hoc networking would allow the military to take advantage of
commonplace network technology to maintain an information network between the
soldiers, vehicles, and military information headquarters. The basic techniques of Ad-hoc
network came from this field
2. Crisis -Management Application: Ad hoc can be used in emergency rescue operations for
disaster management, e.g. in fire, flood, or earthquake. This may be because all of the
equipments were destroyed, or perhaps because the region is at remote place. Rescuers must
be able to communicate in order to make the best use of their energy, but also to maintain
safety. By automatically establishing a data network with the communications equipment
that the rescuers are already carrying, their job made easier. Other commercial scenarios
include e.g. ship-to-ship Ad-hoc mobile communication, law enforcement, etc.
3. Low Level: Appropriate low level application might be in domestic networks where devices
can communicate directly to exchange information. Similarly in other civilian environments
like taxi, sports stadium, boat and small aircraft, mobile Ad-hoc communications have
many applications.
4. Data Networks; A commercial application for MANETS include wide range computing. By
allowing computers to forward data to others, data networks may be extended far beyond
the usual reach of installed infrastructure. Networks may be made more widely available
and easier to use.
5. Vehicular Area Network: Ad-hoc network is useful in forming network among different
vehicles on the road and can propagate information like accidents, congestion. It is also
helpful in determining nearby facilities such as gas station, restaurants, hospitals and other
facilities.
6. Personal Area Network: PAN is short range, localized network where nodes are associated
with a given person. These nodes could be attached to someone's cellphone laptop and
television and so on.

5. State 2 specifications of IMT 2000.


Ans. The International Mobile Telecommunications-2000 (IMT-2000) is a global standard for
third generation (3G) mobile communications. Here are two specifications of IMT-2000:
1. Multiple access methods: IMT-2000 supports multiple access methods, including Time
Division Multiple Access (TDMA), Code Division Multiple Access (CDMA), and Frequency
Division Multiple Access (FDMA). This allows for more efficient use of the radio spectrum
and enables more users to access the network simultaneously.
2. Data rates: IMT-2000 is designed to support high-speed data transfer rates, with a minimum
data rate of 144 kilobits per second (kbps) for mobile users and up to 2 megabits per second
(Mbps) for fixed users. This allows for a wide range of applications, including video streaming,
online gaming, and other bandwidth-intensive services.

R
RUSHI BHANSALI 3
WMN PT2

6. Draw the WAP protocol stack and the functions of any 4 protocols.
Ans.

Here are the functions of four protocols in the WAP protocol stack:

1. Wireless Markup Language (WML): This is the language used to create pages for mobile
devices. It is similar to HTML and is used to define the layout and content of WAP pages.
2. WAP Transport Layer Security (WTLS): This protocol provides security for data transmitted
over a WAP connection. It uses encryption and authentication to protect against
eavesdropping and other security threats.
3. Wireless Data Link Protocol (WDP): This protocol is responsible for establishing a
connection between the mobile device and the WAP gateway. It also handles packet
fragmentation and reassembly, as well as error detection and correction.
4. WAP Session Protocol (WSP): This protocol manages the connection between the mobile
device and the WAP gateway. It defines the way in which data is exchanged between the two
devices and provides features such as session timeout and data compression.

7. Draw the block schematic of WLL architecture and explain it

R
RUSHI BHANSALI 4
WMN PT2

Ans.

Explain nahi mill raha


Khud se dhund lo or muja bhi batao

8. Encode the data stream 1011000101 using the following technique:-


1) Rz-Bipolar
2) AMI
3) Manchester
4) NRZ-unipolar

9. Draw the architecture of WSN and explain.


Ans.

A Wireless Sensor Network (WSN) is a type of network that consists of a large number of small,
low-power, wireless sensors deployed in a geographical area. These sensors are capable of
collecting and transmitting data from their surroundings, and the data can be used for various
applications, such as environmental monitoring, traffic control, and home automation. Here is
an overview of the architecture of a typical WSN:

R
RUSHI BHANSALI 5
WMN PT2

Sensor Nodes: Sensor nodes are the building blocks of a WSN. They are small devices that are
equipped with sensors, a processing unit, and a wireless transceiver. The sensors are responsible
for collecting data from their environment, such as temperature, humidity, light, and motion. The
processing unit is responsible for processing the collected data, and the wireless transceiver is
responsible for transmitting the data to other nodes or a base station.
Communication Protocol: Communication protocols are used to establish communication
between sensor nodes and between sensor nodes and the base station. The protocol defines the
format of the data, the method of transmission, and the way in which the nodes are addressed.
Network Topology: The network topology defines the way in which the sensor nodes are
connected to each other and to the base station. The topology can be either a star topology, where
each sensor node is connected directly to the base station, or a mesh topology, where the nodes
are connected to each other in a network.
Base Station: The base station is the central node in the network that is responsible for collecting
the data from the sensor nodes and processing it. It also serves as a gateway between the WSN
and other networks, such as the Internet.
Power Management: Power management is an important aspect of the WSN architecture. Since
the sensor nodes are typically battery-powered and have limited energy, power management
techniques are used to conserve energy and prolong the lifetime of the network. These techniques
include duty cycling, adaptive sampling, and energy harvesting.
Overall, the architecture of a WSN is designed to enable the collection and transmission of data
from a large number of sensors over a wide area, while minimizing energy consumption and
maximizing network lifetime.

10.Draw the architecture of UMTS and explain.


Ans.

R
RUSHI BHANSALI 6
WMN PT2

The architecture of Universal Mobile Telecommunications System (UMTS) consists of three


main components: User Equipment (UE), Radio Access Network (RAN), and Core Network
(CN). Here is a brief explanation of each component:
User Equipment (UE): The UE is the mobile device used by the subscriber to access the UMTS
network. The UE includes a Subscriber Identity Module (SIM) card that stores the subscriber's
personal information, such as phone number and authentication credentials. The UE is
responsible for sending and receiving data to and from the RAN.
Radio Access Network (RAN): The RAN is responsible for establishing and maintaining the
wireless connection between the UE and the UMTS network. It consists of two main
components: NodeB and Radio Network Controller (RNC). The NodeB is responsible for
transmitting and receiving data to and from the UE, while the RNC is responsible for controlling
and managing the NodeBs.
Core Network (CN): The CN is responsible for managing the call and data processing functions
of the UMTS network. It consists of several functional entities, including the Mobile Services
Switching Center (MSC), the Serving GPRS Support Node (SGSN), and the Gateway GPRS
Support Node (GGSN). The MSC is responsible for call processing and control, while the SGSN
is responsible for managing data packet routing and mobility management. The GGSN is
responsible for connecting the UMTS network to external networks, such as the Internet.
The UMTS architecture is designed to provide a high-speed data and voice services to mobile
subscribers. The UE communicates with the RAN using radio frequencies, and the RAN
communicates with the CN using a variety of wired and wireless protocols. The architecture is
also designed to support mobility, allowing the UE to move between different cells and maintain
a continuous connection to the network. Overall, the UMTS architecture provides a flexible and
robust framework for mobile communication.

11.Explain the energy constraints in sensor node in WSN and name the protocols to
design energy efficiency in WSN.
Ans. Sensor nodes in Wireless Sensor Networks (WSN) are usually battery-powered and have
limited energy resources, which pose a significant challenge to the efficient operation of the
network. The energy consumption of a sensor node is determined by the sensing, computation,
communication, and data storage tasks it performs. Therefore, reducing the energy consumption
of a sensor node is crucial to prolonging its operational lifetime.
There are several energy constraints in sensor nodes in WSN, including:

 Limited battery capacity: Sensor nodes usually rely on batteries as their primary power
source, which have limited capacity and eventually drain out over time. The network's
energy efficiency should, therefore, ensure that the battery life is prolonged as much as
possible.
 Energy consumption in communication: Communication in a WSN is a major energy-
consuming task since radio transceivers consume significant power. Nodes can reduce

R
RUSHI BHANSALI 7
WMN PT2

energy consumption by adopting efficient communication protocols that minimize


transmission power and reduce packet size.
 Computational energy consumption: The processing and computation of data also require
energy, and energy-efficient algorithms should be implemented to minimize the
computational requirements of nodes.
To improve energy efficiency in WSN, several protocols have been developed, including:
 LEACH (Low Energy Adaptive Clustering Hierarchy): LEACH is a clustering-based
protocol that partitions nodes into clusters and selects a cluster head to aggregate data from
the nodes. The cluster head performs the majority of the communication and
computational tasks, reducing the energy consumption of the nodes.
 TEEN (Threshold-sensitive Energy Efficient sensor Network): TEEN is a protocol that
employs a threshold-sensitive approach to manage the network's energy consumption.
Nodes switch between active and sleep modes, with the threshold value determined by the
application requirements.
 PEGASIS (Power-Efficient Gathering in Sensor Information Systems): PEGASIS is a
chain-based protocol that forms a chain of nodes to transmit data to the base station,
reducing the energy consumed in data transmission.
 SPIN (Sensor Protocols for Information via Negotiation): SPIN is a protocol that reduces
the energy consumption of sensor nodes by using data-centric communication. Instead of
continuously transmitting data, nodes advertise their data availability, and interested
nodes request data.
These protocols can help improve the energy efficiency of WSN and prolong the operational
lifetime of the sensor nodes.

12.Draw the MANET topology and explain. State 2 applications of MANET.


Ans. MANET (Mobile Ad hoc Network) is a type of wireless network in which mobile devices
communicate with each other without the need for a centralized infrastructure, such as a router
or access point. The network topology in a MANET is dynamic and constantly changing due to
the mobility of the devices.
In a MANET, devices form a temporary network by establishing direct communication with each
other, forming a multi-hop network to transmit data to a destination node. Each device acts as a
router, forwarding data packets to other devices in the network until the destination is reached.
The topology in a MANET can take various forms, such as a mesh, cluster, or tree-based
structure. The mesh topology consists of a network of devices that can communicate with any
other device in the network, forming a fully connected network. The cluster topology divides the
devices into clusters, with a designated cluster head responsible for forwarding data within the
cluster. The tree-based topology uses a hierarchical structure, with one or more root nodes at the
top and child nodes below them.

R
RUSHI BHANSALI 8
WMN PT2

Overall, the topology in a MANET is highly dynamic and can change rapidly due to the mobility
of the devices. The devices in the network must be able to adapt quickly to changes in the topology
to ensure efficient communication and network performance.

2 applications are same as question no. 4

13. Explain the principle of working of ASK and BPSK with suitable waveforms of
the bit sequence 110101100.

14.Draw the block diagram of a sensor node in WSN and state the function of
various components.
Ans. Diagram khud ka bana lo 
The various components of a sensor node and their functions are:

 Sensor: The sensor is the primary component of a sensor node that senses physical
phenomena, such as temperature, humidity, pressure, or light. The sensor converts the
physical phenomenon into an electrical signal that can be processed by the
microcontroller.
 Analog-to-Digital Converter (ADC): The ADC converts the analog signal from the
sensor into a digital signal that can be processed by the microcontroller.
 Microcontroller: The microcontroller is the brain of the sensor node that processes the
data from the sensor and makes decisions based on the programmed logic. The
microcontroller may also control the power management of the sensor node to conserve
energy.

R
RUSHI BHANSALI 9
WMN PT2

 Memory: The memory component stores the data generated by the sensor node and the
program code executed by the microcontroller.
 Transceiver: The transceiver is responsible for transmitting and receiving data between
the sensor node and the base station. It modulates the digital signal into a form that can
be transmitted wirelessly and demodulates the received signal into a form that can be
processed by the microcontroller.
 Power Source: The power source provides the energy required to power the sensor node
components. In WSNs, the power source is typically a battery or energy-harvesting device
that converts ambient energy into electrical energy.
Overall, the sensor node components work together to sense physical phenomena, convert the
analog signal into digital form, process the data using the microcontroller, store the data in
memory, transmit and receive data using the transceiver, and power the components using a
power source.

15.Compare WCDMA and CDMA 2000 on the basis of channel Bandwidth chip
rate, dulex mode, modulation, frame length and power control rate.
Ans.
Sr. no. On bases of WCDMA CDMA
1 Chanel 5 MHz 1.25 MHz , 3.75 MHz
bandwidth
2 Chip rate 4.096 Mcps (DOCOMO), 1.2288 Mcps (1X), 3.6864
3.84 Mcps (UMTS). Mcps (3x).
3 Dulex mode WCDMA supports both Time While CDMA2000 supports
Division Duplex (TDD) and only FDD mode.
Frequency Division Duplex
(FDD) modes.
4 Modulation QPSK (Forward link), and QPSK (Both links)
BPAS (Reverse link)
5 Frame 10ms for physical layer 5 ms(signalling), 20,40,80 ms
length ,10,20,40 and 80 ms for physical layer frames
transport, layer
6 Power WCDMA has a faster power CDMA2000 has a slower
control rate control rate of 1500 Hz. power control rate of 800 Hz.

16.State any 2 features of UMTS.


Ans. The features of UMTS are as follows: (learn any 2)
 Bandwidth : 5 MHz or 1.25 MHz.
 Chip rate : 3.84 Mcps.
 Frame duration : IO to 20 ms (frame length).
 Data rate : 2.048 Mbps.
R
RUSHI BHANSALI 10
WMN PT2

 Frame structure : 16 slots per frame.


 Backward compatibility : GSM.
 Power control frequency : 1.5 MHz.
 Base station synchronization: Asynchronous.
 Data rate: up to 144 Kbps.
 Antenna used: Simple Antenna.
 Frequency spectrum: Uplink 1920 to 1980 MHz.
 Downlink 2110 to 2170 MHz.
 Duplexing Technique : FDD and TDD modes.
 Modulation scheme : Direct sequence CDMA with QPSK.
 Coding Technique : Orthogonal Variable Spreading Factor (OVSF).
 Service type : Multirate and multiservice.

17.List any 4 application of IOT.


Ans.
 Smart Home Automation: IOT can be used to control and automate various home
appliances such as lights, thermostat, security cameras, and smart locks. By using sensors
and internet connectivity, these devices can be remotely controlled using a smartphone or
other internet-connected devices.
 Industrial Automation: IOT can be used to monitor and control industrial equipment,
such as machines and assembly lines, using sensors and cloud-based platforms. This can
help in improving efficiency, reducing downtime, and predicting maintenance needs.
 Healthcare: IOT can be used to monitor and track the health of patients remotely, using
wearable devices and sensors. This can help in early detection of health issues, tracking
medication compliance, and reducing hospital readmissions.
 Smart Agriculture: IOT can be used to monitor and optimize crop growth, soil moisture
levels, and weather conditions, using sensors and cloud-based analytics. This can help in
increasing crop yield, reducing water usage, and minimizing environmental impact.

18.Differentiate btw 4g and 4g LTE (any 4).


Ans. (any 4)
Sr. no. Based on 4g 4g LTE
1 Technology 4G is a standard for wireless 4G LTE (Long Term Evolution) is
communication that uses the a standard for wireless
OFDMA (Orthogonal Frequency communication that uses both the
Division Multiple Access) OFDMA and SC-FDMA (Single
technology Carrier Frequency Division
Multiple Access) technologies.
2 Speed 4G can provide theoretical 4G LTE can provide theoretical
download speeds of up to 100 Mbps download speeds of up to 1 Gbps

R
RUSHI BHANSALI 11
WMN PT2

(Megabits per second) and upload (Gigabits per second) and upload
speeds of up to 50 Mbps speeds of up to 100 Mbps.

3 Latency 4G LTE has a lower latency than 4G latency can range from 30 to 50
4G. The latency of 4G LTE is milliseconds.
typically less than 100 milliseconds.
4 Spectrum 4G LTE can operate on multiple 4G primarily operates on licensed
frequency bands, including both the spectrum.
licensed and unlicensed spectrum
5 Application 4G LTE is better suited for 4G is better suited for less
bandwidth-intensive applications, bandwidth-intensive applications,
such as video streaming, online such as web browsing and email.
gaming, and video conferencing

19.Differentiate btw PCM and DPCM on the bases of Bitrate, quantization and
distortion, application and feedback.
Ans.
Sr. No. Based on PCM DPCM
1 Bitrate PCM uses a fixed bitrate to DPCM uses a variable bitrate that
represent each sample depends on the difference between
the current and the predicted
value.
2 Quantization PCM uses uniform DPCM uses adaptive
and distortion quantization, which can quantization, which can reduce
result in a higher distortion distortion for low amplitude
level for low amplitude signals.
signals.
3 Application PCM is used in DPCM is used in applications
applications where high- where the available bandwidth is
quality audio is required, limited, such as voice
such as music recording communication and data
and playback. transmission.
4 Feedback PCM does not use DPCM uses feedback to adjust the
feedback to improve the predicted value based on the error
accuracy of the encoding between the actual and the
process predicted value.

20.Differentiate btw Bluetooth and Wi-Fi on the basis of range, bandwidth,


modulation technique and no. of devices connected.
Ans.

R
RUSHI BHANSALI 12
WMN PT2

Sr. No. Based on Bluetooth Wi-Fi


1 Range Bluetooth has a shorter range of Wi-Fi has a longer range of up to
up to 30 feet (10 meters) in 300 feet (100 meters) in general.
general.
2 Bandwidth Wi-Fi provides higher The latest Wi-Fi standards can
bandwidth compared to provide up to several Gigabits per
Bluetooth. second (Gbps) of bandwidth, while
Bluetooth 5.0 can provide up to 2
Megabits per second (Mbps) of
bandwidth.
3 Modulation Bluetooth uses frequency Wi-Fi uses direct sequence spread
technique hopping spread spectrum spectrum (DSSS) and orthogonal
(FHSS) modulation technique. frequency division multiplexing
(OFDM) modulation techniques.
4 No. of devices Bluetooth can connect up to 7 Wi-Fi can connect hundreds of
connected devices in a piconet (master- devices in an access point (AP)-
slave relationship) client relationship.

21.Differentiate btw WSN and IOT n/t.


Ans.

R
RUSHI BHANSALI 13
WMN PT2

22.Explain design challenges in MANET.


Ans. Changes in MANET:-
1. Routing: Since the topology of the network is constantly changing, the issue of routing packets
between any pair of nodes becomes a challenging task, because routes between nodes may
potentially contain multiple hops, which is more complex than the single hop communication.
2. Security and Reliability: An Ad hoc network has its particular security problems due to nasty
neighbour relaying packets. The feature of distributed operation requires different schemes of
authentication and key management. Further, wireless link characteristics introduce also
reliability problems, because of the limited wireless transmission range, the broadcast nature of
the wireless medium, mobility-induced packet losses, and data transmission errors.
3. Quality of Service (QoS): Providing different quality of service levels in a constantly changing
environment will be challenge. The inherent stochastic feature of communications quality in a
MANET makes it difficult to offer fixed guarantees on the services offered to a device. An
adaptive QoS must be implemented over the traditional resource reservation to support the
multimedia services.
4. Internetworking: Addition to the communication within an Ad hoc network, inter-networking
between MANET and fixed networks is often expected in many cases. The coexistence of routing
protocols in such a mobile device is a challenge for the harmonious mobility management
5. Power Consumption: For most of the mobile terminals, the communication-related functions
should be optimized for lean power consumption. Conservation of power and power-aware
routing must be taken into consideration.
6. Restricted Wireless Transmission Range: The radio group will be restricted in the wireless
networks and as a result data amounts it can provide much slighter than what a bound can
provide. This involves routing procedures of wireless networks must be use bandwidth in ideal
way. This can be achieved through protecting the overhead as minimum as conceivable. The
restricted transmission range also enforces restraint on routing procedures for sustaining the
topographical information. Particularly in MANETs because of regular variations in topology,
preserving the topological data for every node includes more controller overhead which results in
additional bandwidth depletion.
7. Time-Varying Wireless Link Characteristics: Wireless channel is liable to a range of
broadcast disorders such as path harm, declining, intervention and obstruction. These features
resist the series, data rate, and consistency of these cordless transmissions. The range of which
these features disturb the transmission that rest on atmospheric situations and flexibility of
receiver and transmitter. Even two dissimilar key restraints, Nyquist's and Shannon's theorems
that title over capability to communicate the information at diverse data degrees can be measured.
8. Packet Losses due to Transmission Errors: Ad hoc wireless networks practices very advanced
packet damage due to reasons such as extraordinary Bit Error Rate (BER) in the wireless channel,
R
RUSHI BHANSALI 14
WMN PT2

enlarged crashes because of the existence of unseen terminals, occurrence of interventions,


position reliant controversy, single directional associations, regular pathway breakages due to
device movements, and the integral declining characteristics of the wireless passage.
9. Mobility-Induced Route Changes: The system topography in ad hoc wireless network is
extremely active be-cause of node movement; as a result, a constant meeting undergoes numerous
pathway breakages. Such position often results in regular path alterations. So flexibility
administration is massive investigation theme in ad hoc networks.
10. Mobility-induced Packet Losses: Communication contacts in an Ad hoc network are
insecure such that con-seductively conservative procedures for MANETs over a great damage
frequency will suffer from performance deprivation. Though, with large frequency of inaccuracy,
it is problematic to supply a data-packet to its target.
11. Battery Constraints: It is due to restricted resources that arrange main limitation on the
mobile devices in an ad hoc network. Nodes which are contained in such network have
restrictions on the supremacy foundation in order to preserve movability, dimension and capacity
of the node. Due to accumulation of power and the processing capacity make the nodes
heavyweight and less portable. Consequently only MANET devices have to use these resources.

23.Draw and explain IOS equivalent protocol layer architecture for WSN.
Ans.

Physical Layer:-
 The physical layer provides an edge for transferring a stream of bits above physical medium. This
layer is responsible for the selection of frequency, generation of a carrier frequency, signal
detection, Modulation and data encryption.
 IEEE 802.15.4 is suggested as typical for low rate particular areas and wireless sensor network
with low cost, power consumption, density, the range of communication to improve the battery
life.
Data Link Layer:-
 The data link layer is responsible for multiplexing of data streams, frame detection, Media Access
control (MAC) and error control.

R
RUSHI BHANSALI 15
WMN PT2

 Since the environment is noisy and sensor nodes can be mobile, the MAC protocol must be power
aware and able to minimize collision with neighbours’ broadcast.
Transport Layer:-
 The function of the transport layer is to deliver congestion avoidance and reliability where a lot
of protocols intended to Offer this function are either practical on the upstream.
 These protocols use dissimilar mechanisms for loss recognition and loss recovery. The transport
layer is exactly needed when a system is planned to contact other networks.
 Providing a reliable loss recovery is more energy efficient and that is one of the main reasons why
TCP is not fit for WSN. In general, Transport layers can be separated into Packet driven, Event
driven.
Network Layer:-
 The main function of the network layer is routing, it has a lot of tasks based on the application,
but actually, the main tasks are in the power conserving, partial memory, buffers, and sensor don't
have a universal ID and have to be self-organized.
 The simple idea of the routing protocol is to explain a reliable lane and redundant lanes, according
to a convinced scale called metric, which varies from protocol to protocol.
 There are a lot of existing protocols for this network layer, they can be separate into; flat routing
and hierarchal routing or can be separated into time driven, query-driven 8 event driven.
 There are some popular protocols in the transport layer namely STCP (Sensor Transmission
Control protocol), PORT (Price-Oriented Reliable Transport Protocol and PSFQ (pump slow
fetch quick).
Application Layer:-
 The application layer is liable for traffic management and offers software for numerous
applications that convert the data in a clear form to find positive information.
 Sensor networks arranged in numerous applications in different fields such as agricultural,
military, environment, medical, etc.
Power, Mobility and Task Management Planes:-In addition, the power, mobility, and task
management planes monitor the power, movement, and task distribution among the sensor nodes.
1. Power Management Planes: It manages how a sensor node uses its power. When the power level
of a sensor node is low, the sensor node broadcast to its neighbours that it is low in power and
cannot participate in routing message. The remaining power is reserved for sensing.
2. Mobility Management Planes: It detect and register the movement of sensor nodes; so a route
back to the user is always maintained. The sensor nodes can keep track of who their neighbour
sensor node are and then sensor nodes can balance their power task usage.
3. Task Management Plane: It balances and schedules the sensing task given to specific region.
These planes help the sensor nodes coordinate the sensing task and lower the overall energy
consumption.

Left – 2,7,8,13,14,
R
RUSHI BHANSALI 16

You might also like