You are on page 1of 2

Birla Institute of Technology & Science, Pilani

Work-Integrated Learning Programmes Division


Second Semester 2018-2019
Comprehensive Examination (EC-3 Regular)

Course No. : CSI ZG656


Course Title : NETWORKED EMBEDDED APPLICATIONS
Nature of Exam : Open Book
Weightage : 50% No. of Pages =2
Duration : 3 Hours No. of Questions = 9
Date of Exam : 04/05/2019 (FN)
Note:
1. Please follow all the Instructions to Candidates given on the cover page of the answer book.
2. All parts of a question should be answered consecutively. Each answer should start from a fresh page.
3. Assumptions made if any, should be stated clearly at the beginning of your answer.

Q.1. Why is 802.11a not preferred for VANETS. Mention a IEEE communication standard suitable for
VANETS. Compare the 802.11a with the preferred standard for VANETS. [4]

Q.2. Mention the types of security attack that an adversary can initiate by accessing a single sensor node in
a large-scale WSN? Identify the most important CIA security service which must be supported in a
WSN designed for a system that collects biometric information. [3 + 2 = 5]

Q.3. Explain the MAC protocol supported by 802.15.4 standard. [4]

Q.4. Ethernet is neither fair nor deterministic. Do you agree with this statement? Justify. Explain how
Ethernet Power Link will provide deterministic behavior and fairness. [3 + 5 = 8]

Q.5. Identify the optimal routes for source A to sink M according to the following criteria.
(a) Minimum energy consumed per packet
(b) Maximum minimum energy capacity

The numbers X/Y along each link indicate the latency (X) and energy cost (Y) for transmitting a
single packet over the link. The number under each node indicates the node’s remaining energy
capacity.

(c) How will you implement the routing algorithm such that the life time of the network is
maximized.
(d) Distinguish between flooding and gossiping with respect to routing of data. Mention
the pros and cons of gossiping when compared to flooding. [3 x 4 = 12]

CSI ZG656 (EC-3 Regular) Second Semester 2018-2019 Page 1 of 2


CSI ZG656 (EC-3 Regular) Second Semester 2018-2019 Page 2

Q.6. Mention whether CAN and FlexRay support event triggered, time Triggered communication or
combination of both. Justify. Why is Flexray more suited for safety critical functions?
[3 + 3 = 6]

Q.7. Explain any one routing protocol each based on geographic unicast and broadcast forwarding. [3]

Q.8. Three nodes A, B, and C are known to be positioned at locations (0, 0), (10, 0), and (4, 15),
respectively. Node D is estimated to be a distance of 7 from A, a distance of 7 from B, and a distance
of 10.15 from C. Determine the location of D using trilateration. [3]

Q.9. Mention the three unique (most important distinguishing) characteristics of Wireless Sensor
Networks, Industrial Networks & Vehicular networks which are prime factors while designing the
protocols for these domains. [5]

**********

CSI ZG656 (EC-3 Regular) Second Semester 2018-2019 Page 2 of 2

You might also like