Вы находитесь на странице: 1из 31

Format : QB06

EC2050 Mobile Ad hoc Networks

Subject Code / Name:

DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING


QUESTION BANK (MOBILE ADHOC NETWORKS)
Sub.Code

: EC2050

Branch/Year/Sem/Sec:

ECE/IV/VIII /A & B
Sub.Name : Mobile Adhoc Networks

Batch

2011-2015
Staff Name: Mr.P.Raja Pirian / Mrs. D. Vennila

Academic Year

2014-2015(Even)

UNIT I INTRODUCTION
PART A
1. What is fading? List the different types of fading?
(AUApril/May 2014)
The term fading, or, small-scale fading, means rapid fluctuations of the
amplitudes, phases, or multipath delays of a radio signal over a short period or
short travel distance. This might be so severe that large scale radio
propagation loss effects might be ignored. The different types of fading are Fast
Fading and Slow Fading.
2. Define Scalability.
(AU-April/May
2014)
It is the ability of a computer application or product (hardware or software) to
continue to function well as it (or its context) is changed in size or volume
in order to meet a user need.
3. Define ad hoc networks?
(AU- Nov/
Dec.2013)
A mobile ad hoc network (MANET) is a continuously self-configuring,
infrastructure-less network of mobile devices connected without wires.
MANET Stands for "Mobile Ad Hoc Network." A MANET is a type of ad hoc
network that can change locations and configure itself on the fly. Because
MANETS are mobile, they use wireless connections to connect to various
networks. This can be a standard Wi-Fi connection, or another medium, such
as a cellular or satellite transmission.
4. Write any two characteristics of Wireless channel?
Dec.2013)
Dynamic topologies
Energy-constrained operation
Limited channel
Limited physical security
bandwidth
Mobile Ad hoc 9
AD HOC

(AU- Nov/

KCE/ECE/QB/IV YR/

Format : QB06
EC2050 Mobile Ad hoc Networks

Subject Code / Name:

Variable capacity links


5. List the transmission impairments of wireless channel.
(AUMay / June 2013)
The main transmission impairments in cellular wireless communications are cochannel interference, time-variation and frequency selectivity.
6. Write the equation for maximum data rate according to Shannons theorem.
(AU-May/ June 2013)
Maximum data rate = 1 * log2(1 + 0.5) = 1 * log2(1.5) = 0.58 Mbps. (or)
The maximum information transmission rate, C, will be
C = 2B Log2 {(1+S/N)1/2} = B Log2 {1+s/n}
This expression represents the maximum possible rate of information
transmission through a given channel or system. The maximum rate we can
transmit information is set by the

bandwidth, the signal level, and the noise level. C is therefore called the
channel's information carrying Capacity.
7. Differentiate an ad hoc network and a cellular network with respect to
bandwidth usage and
Cost effectiveness.
(AU-Nov/
Dec.2012)
S.N CELLELAR NETWORKS
AD HOC WIRELESS
O
NETWORKS
1. Fixed Infrastructure - based
Infrastructure - less
2. Single hop wireless links
3.

Guaranteed bandwidth (designed


for voice traffic)

4. Centralized Routing
5.

6.

Circuit- switched ( evolving


toward packet switching)
Reuse of frequency spectrum
through geographical channel
reuse.

Multi - hop wireless links


Shared Radio channel (more
suitable for best effort data
traffic)
Distributed Routing
Packet- switched ( evolving
toward emulation of circuit
switching)
Dynamic frequency reuse based
on carrier sense mechanism

8. State Shannons theorem.


(AU- Nov/
Dec.2012)
Shannon's Theorem gives an upper bound to the capacity of a link, in bits per
second (bps), as a function of the available bandwidth and the signal-to-noise
ratio of the link.
Mobile Ad hoc 10
YR/ AD HOC

KCE/ECE/QB/IV

Format : QB06
EC2050 Mobile Ad hoc Networks

Subject Code / Name:

The Theorem can be stated as: C = B * log2(1+ S/N)


where C is the achievable channel capacity, B is the bandwidth of the line, S is
the average signal power and N is the average noise power.
9. Why ad hoc networks are needed?
(AU-May/June
2012)
Ad-hoc networking is often justified by scenarios where you do not want or
where you cannot deploy & manage an infrastructure.
Spontaneous meetings (at work, airport): exchange files, play games
Special circumstances: disaster relief
Or simply cabling costs, management overhead: old building, wearable
LAN, wireless headset
10.
What are the challenging issues in ad hoc network maintenance?
(AU-May /June 2012)
Host is no longer an end system can also be an acting intermediate system.
Changing the network topology over time
Potentially frequent network partitions
Every node can be mobile
Limited power capacity & wireless bandwidth
Presence of varying channel quality
11. Define Nyquist theorem.
The Nyquist Theorem, also known as the sampling theorem, is a principle that
engineers follow in the digitization of analog signals. For analog-to-digital
conversion (ADC) to result in a faithful reproduction of the signal, slices, called
samples, of the analog waveform must be taken frequently.

12. .Define path loss.


Path loss (or path attenuation) is the reduction in power density
(attenuation) of an electromagnetic wave as it propagates through space. Path
loss is a major component in the analysis and design of the link budget of a
telecommunication system.
This term is commonly used in wireless communications and signal
propagation. Path loss may be due to many effects, such as free-space loss,
refraction, diffraction, reflection, aperture-medium coupling loss, and
absorption.
13. List the Applications of ad hoc networks.
Military applications
Wireless sensor networks
Emergency rescue
Multi hop cellular networks
Mesh networks
Wireless community networks.
14. Define Doppler shift.
Mobile Ad hoc 11
YR/ AD HOC

KCE/ECE/QB/IV

Format : QB06
EC2050 Mobile Ad hoc Networks

Subject Code / Name:

The Doppler Effect (or Doppler shift) is the change in frequency of a wave (or
other periodic event) for an observer moving relative to its source. In classical
physics (waves in a medium), the relationship between the observed frequency
f and the emitted frequency fo is given by:

f = {( v vr) / ( v vs )} * f0
where v is the velocity of waves in the medium, vs is the velocity of the source
relative to the medium and vr is the velocity of the receiver relative to the
medium.
15. List the characteristics of ad hoc networks
Operating without a central coordinator
Multi- hop radio relaying
Frequent link breakage due to mobile nodes
Instant deployment
Constraint resources (Band width, computing power, Battery life time)
PART B
1.

(i) Differentiate between cellular network and Ad Hoc Network. (8)


(AU- April/May 2014)

Differentiation
(8)
(ii)What is replay attack? How it can be prevented?(8)
(AUApril/May 2014)

Replay attack
(2)

Prevention method
(6)

2.
(i) List out the major advantages of Ad hoc wireless Internet.(6) (AUApril/May 2014)

Advantages
(6)
(ii)Discuss the Pros and Cons of a routing protocol that uses GPS information
for an Ad hoc
wireless Network for search and rescue operation. (10)
(AUApril/May 2014)
Pros and Cons
(6)
Explanation
(4)
3.

Illustrate the characteristic features of Mobile ad hoc Networks and state


its
applications.(16)
(AU- Nov/
Dec.2013)
Diagram
(4)
characteristic features (8)
Mobile Ad hoc 12
KCE/ECE/QB/IV
YR/ AD HOC

Format : QB06
EC2050 Mobile Ad hoc Networks

Subject Code / Name:

applications

(4)

4. Write in detail about Indoor and Outdoor models in Ad hoc mobility models.
(16)
(AU- Nov/ Dec.2013)
Diagram
Indoor models
Outdoor models

(4)
(6)
(6)

5.
Briefly discuss about path loss and fading. (16)
May/June 2013)
Diagram
(6)
Path Loss
(5)
Fading
(5)

(AU-

6.
(i) Explain the two main forms of interference, Doppler shift and Nyquist
theorem. (10)
(AU-May/June 2013)
Forms of interference (2)
Doppler shift
(4)
Nyquist theorem.
(4)
(ii) List the major advantages of Hybrid wireless Networks.(6)
(AUMay/June 2013)
Advantages
(6)
7.

How mobility can be supported in todays internet? Explain using the


WAP model. Comment
On its challenges in maintaining ad hoc networks that are connect to internet.

(16)
(AU-Nov/Dec.2012)
Diagram
Mobility
WAP model
Challenges

(3)
(3)
(5)
(5)

8.

(i) List the benefits when deployment of a commercial ad hoc wireless


networks compared to wired network. (8)
(AU-Nov/Dec.2012)
Diagram
(3)
Benefits
(2)
Comparison
(3)
(ii) Compare Ad-hoc Networks and Wireless LAN. (8)
(AUNov/Dec.2012)
Comparison
(8)
Mobile Ad hoc 13
YR/ AD HOC

KCE/ECE/QB/IV

Format : QB06
EC2050 Mobile Ad hoc Networks

Subject Code / Name:

9.

(i)What are the characteristics and features of ad hoc networks?(6)


(AU-May/June 2012)
Characteristics
(3)
Features
(3)
(ii)Discuss in detail ad hoc indoor mobility models. (10)
(AUMay/June 2012)
Diagram
(4)
Mobility models
(6)
10.

(i) Explain the application areas of ad hoc networks. (8)


(AU-May/June 2012)
Application areas
(4)
Explanation
(4)
(ii) Discuss in detail the characteristics of wireless channels. (8)
May/June 2012)
Diagram
(4)
Characteristics
(4)

(AU-

UNIT-II MEDIUM ACCESS PROTOCOLS


PART A
1.

What is meant by HIPERLAN?


April 2014)

2.

(AU - Nov/ Dec.2013,

HIPERLAN is a European (ETSI) standardization initiative for a High


Performance wireless Local Area Network.
Radio waves are used instead of a cable as a transmission medium.
Either, the radio transceiver is mounted to the movable station as an addon and no base station has to be installed separately, or a base station is
needed in addition per room.
The stations may be moved during operation-pauses or even become
mobile.

What are the issues to be considered while designing a MAC protocol for
Ad-Hoc Networks?
(AU- April / May
2014)
The main issues need to be addressed while designing a MAC protocol for ad
hoc wireless networks:
Bandwidth
Quality of service Synchronization
Hidden and exposed terminal problems:
Error-Prone Shared Broadcast Channel
Distributed Nature/Lack of Central Coordination
Mobile Ad hoc 14
YR/ AD HOC

KCE/ECE/QB/IV

Format : QB06
EC2050 Mobile Ad hoc Networks

Subject Code / Name:

Mobility of Nodes.
3.

What are the goals of medium access protocol?


(AU- Nov/ Dec. 2013)

Initialization & Fairness


Priority
Limitations to one station
Receipt
Error Limitation
Recovery
Reconfigurability
Compatibility
Reliability:

4.
Define synchronous protocols.
May/ June 2013)

(AU-

Synchronous is a communications protocol used to send and receive data


across high-speed mainframe networks. Data is synchronized and transmitted
using constant intervals between data bits.
5.
Classify the channel of D-PRMA.
May/ June 2013)

(AU-

A simple slot reservation mechanism for voice traffic at the level of talk
spurt without relying on any central entity and
A simple solution for the hidden and exposed terminal problems uniquely
present in wireless ad hoc environments.

6.
Compare the efficiency of the packet queuing mechanism adopted in
MACA and MACAW.
(AU- Nov/ Dec.
2012)
MACA
MACAW

Mobile Ad hoc 15
YR/ AD HOC

KCE/ECE/QB/IV

Format : QB06
EC2050 Mobile Ad hoc Networks

When a node wants to transmit


a data packet, it first transmit a
RTS (Request To Send) frame.
The receiver node, on receiving
the RTS packet, if it is ready to
receive
the
data
packet,
transmits a CTS (Clear to
Send) packet.
Once the sender receives the
CTS packet without any error, it
starts transmitting the data
packet.
If a packet transmitted by a
node is lost, the node uses the
binary
exponential
back-off
(BEB) algorithm to back off a
random interval of time before
retrying.
The binary exponential back-off
mechanism used in MACA might
starve flows sometimes. The
problem is solved by MACAW.

7.

Subject Code / Name:

MACAW (MACA for Wireless) is a


revision of MACA.
The sender senses the carrier to see
and transmits a RTS (Request To
Send) frame if no nearby station
transmits a RTS.
The receiver replies with a CTS (Clear
to Send) frame.
Neighbors see CTS, and then keep
quiet.
see RTS but not CTS, then keep quiet
until the CTS is back to the sender.
The receiver sends an ACK when
receiving an frame.
Neighbors keep silent until see ACK.
Collisions
There is no collision detection.
The senders know collision when they
dont receive CTS.
They each wait for the exponential back
off time.

What are the classifications of MAC protocol?


May/ June 2012)
Contention-based protocols
Contention-based protocols with reservation mechanisms
Contention-based protocols with scheduling mechanisms
Other MAC protocols

Mobile Ad hoc 16
YR/ AD HOC

(AU-

KCE/ECE/QB/IV

Format : QB06
EC2050 Mobile Ad hoc Networks

8.

Subject Code / Name:

List the design goals of MAC protocol for ad- hoc networks.
Provided QoS support for real-time traffic
Low access delay
Bandwidth (BW) efficiently used
Fair allocation of BW to nodes
Low control overhead
Scalable to large networks
Support power control and time synchronization
Adaptive data rate control

List the issues of designing a MAC protocol for ad hoc networks.


Bandwidth Efficiency
QoS support
Synchronization
Hidden and Exposed Terminal Problems
Error-Prone Share Broadcast Channel
Distributed Nature/Lack of Central
Coordination & Mobility of Nodes

9.

10.
List the five phases of FPRP.
FPRP is a single-channel TDMA-based broadcast scheduling protocol:
Reservation request: send reservation request (RR) packet to desk.
Collision report: if a collision is detected by any node, that node broadcasts
a CR packet
Reservation confirmation: a source node won the contention will send a RC
packet to destination node if it does not receive any CR message in the
previous phase
Mobile Ad hoc 17
YR/ AD HOC

KCE/ECE/QB/IV

Format : QB06
EC2050 Mobile Ad hoc Networks

Subject Code / Name:

Reservation acknowledgment: destination node acknowledge reception of


RC by sending back RA message to source
Packing and elimination: use packing packet and elimination packet
11.
Give the classification of contention based protocol.
Sender initiated
Single Channel MACAW, FAMA
Multiple Channels BTMA, BTMA, ICSMA
Receiver initiated RI-BTMA, MACA-BI, and MARCH.
12.
Give the classifications of MAC protocols.
MAC protocol for ad-hoc networks must be classified into:
Contention-based protocols without reservation/scheduling:
Contention-based protocols with reservation mechanisms:
Contention-based protocols with scheduling mechanisms:
Protocols that do not fall to any of these categories:
13.
What do you mean by D- PRMA?
D-PRMA: Distributed Packet Reservation Multiple Access Protocol
The channel is divided into fixed and equal sized frames along the time
axis.
The RTS/BI and CTS/BI are used for slot reservation and for overcoming the
hidden terminal problem
If a terminal wins the contention through mini-slot 1, the extra (m 1) minislots of this slot will be granted to the terminal as the payload
For voice node, the same slot in each subsequent frame can be reserved
until the end of its packet transmission
In the other cases, the extra (m 1) mini-slots are continuously used for
contention, and the winner of this contention will be granted the
reservation of the same slot
14.
What do you mean by BTMA?
The busy tone multiple access protocol was the first protocol to cobalt the
hidden terminal problems of CSMA.
BTMA is designed for station based networks and divides the channel into a
message channel and the busy tone channel.
The Base station transmits a busy tone signal on the busy tone channel as long
as it sense carrier on the data channel because the Base station is in line of
sight of all terminals, each terminal can sense the busy tone channel to
determine the state of the data channel.
15. How BTMA channel is separated?
Busy tone multiple access protocol (BTMA)
Multichannel protocol where the channel is separated into:
control channel: used for data transmission;
Data channel: used for busy tone transmission.
Mobile Ad hoc 18
YR/ AD HOC

KCE/ECE/QB/IV

Format : QB06
EC2050 Mobile Ad hoc Networks

Subject Code / Name:

PART B
1. (i) What are the advantages of reservation based MAC protocol over contention
based MAC
protocol? (8)
(AUApril/May
2014)
Advantages
(4)
Reservation based
(2)
Contention based
(2)
(ii) What are the advantages and disadvantages of MAC protocol using
directional antennas?
(8)
(AU- April/May
2014)
Advantages
(4)
Disadvantages
(4)
2. (i) Name the three MAC services provided by the IEEE 802.11 that are not
provided in the
traditional LANs such as 802.3. (6)
(AUApril/May 2014)
MAC services by IEEE 802.11 (2)
Reason behind LAN 802.3
(4)
(ii) Discuss the various HIPERLAN standards defined for wireless Networks by
ETSI.(6)
(AUApril/May
2014)

HIPERLAN standards
(3)

Explanation(3)
(iii) How are directional antennas superior to MACAW? Explain with an example.
(4)
(AUApril/May
2014)

Explanation(2)

Example
(2)
3. Explain in detail about contention based protocols with reservation.(16)
(AU-Nov/ Dec.2013)
Diagram
(4)
Explanation
(12)
4. Describe IEEE Standards 802.15 in detail.(16)
Dec.2013)
IEEE standards
(4)
Diagram
(4)
Explanation
(8)
Mobile Ad hoc 19
YR/ AD HOC

(AU-

Nov/

KCE/ECE/QB/IV

Format : QB06
EC2050 Mobile Ad hoc Networks

Subject Code / Name:

5. List and explain the issues in designing a MAC protocol for ad hoc wireless
networks.(16)
(AUMay/
June
2013)
Diagram
(4)
Explanation
(4)
Issues in MAC protocol design(8)
6. (i) List the important goals of designing a MAC protocol for ad hoc wireless
networks.(12)
(AU- May/ June
2013)
Goals of MAC protocol (6)
Explanation
(6)
(ii) Classify and define sender- initiated protocols. (4)
(AUMay/ June 2013)
Definition
(2)
Classification
(2)
7. How is scheduling mechanism achieved in distributed wireless ordering
protocol? Explain in
detail. How are Information symmetry and perceived collisions handled?(16)
(AUNov./Dec.
2012)
Scheduling Mechanism (8)
Information symmetry (4)
perceived collisions handled(4)
8. Illustrate various steps involved in five phase reservation protocol with its
frame format.(16)
(AUNov./Dec2012)
Steps in phase reservation protocol (8)
Diagram
(4)
Frame format
(4)
9.

(i) Discuss in detail contention based protocols with scheduling and


reservation.(12)
(AUMay/
June
2012)
Diagram
(4)
Explanation
(8)
(ii)Explain the HIPERLAN standards in detail. (4)
(AUMay/ June 2012)
HIPERLAN standards
(4)
Mobile Ad hoc 20
YR/ AD HOC

KCE/ECE/QB/IV

Format : QB06
EC2050 Mobile Ad hoc Networks

Subject Code / Name:

10.
Explain 802.11g IEEE standard in detail.(16)
May/ June 2012)
Diagram
(4)
802.11g IEEE standard (4)
Explanation
(8)

(AU-

UNIT III NETWORK PROTOCOLS


PART A
1.
Differentiate proactive and reactive protocol.
2013, April/May 2014)
Proactive routing
a. Classic routing strategies: link
state, distance vector
b. Keep track of routes to all possible
destinations
c. Changes in link connection
updated periodically
d. Minimal delay but substantial
fraction of control information
e. E.g. DSDV, WRP, TBRPF, OLSR,
etc.

(AU- Nov. /Dec.

Reactive routing
a.
b.
c.

Only discover routes to


destinations on-demand
Consume much less bandwidth
but experience substantial delay
E.g. DSR, ADOV, TORA, etc.

2.
What are the advantages and Disadvantages of hierarchical routing
protocol?
(AU- April/May 2014)
Advantage:
Using hierarchy information it reduces the routing table size
Disadvantage:
The process of exchanging information concerned all the levels of the
hierarchy as well as the process of leader election in every cluster makes
it quite problematic for ad hoc networks
3.
What is meant by Hierarchical routing?
(AUNov. /Dec. 2013)
The idea is to group the network into a hierarchy of clusters... e.g. clusters and
super clusters.
Two types of hierarchical routing
a.
Strict hierarchical routing:
Each node learns about the next cluster at the same level to use, in order to
reach each cluster at the same level, within its next ancestral cluster.
b.
Quasi hierarchical routing:
Mobile Ad hoc 21
YR/ AD HOC

KCE/ECE/QB/IV

Format : QB06
EC2050 Mobile Ad hoc Networks

Subject Code / Name:

Each node learns about the next node to use (typically the cluster head the
new cluster), in order to reach each cluster at the same level, within its next
ancestral cluster.
4.
May/

What does power aware routing aim?


(AUJune 2013)
To make communication more efficient
Trade-off between routing overhead and data transmission cost
Strategies incur differing levels of communication and storage overhead
Hybrid approaches are possible

5.
May/

What is fisheye state routing protocol?


(AUJune 2013)
The frequency of exchanges decrease with an increase in scope.
The path information for far-away nodes may be inaccurate.
FSR is suitable for large and highly mobile ad hoc wireless networks.
The number of hops with each scope level has significant influence on the
performance.

6.

What are the major challenges of Qos routing?


Nov. /Dec. 2012)
Dynamic varying network topology
Imprecise state information
Scare resources
Absence of communication infrastructure
Lack of centralized control
Power limitations
Heterogeneous nodes and networks
Error-prone shared radio channel
Hidden terminal problem
Insecure medium
Other layers

(AU-

7.
AMRIS may to exhibit high packet delivery ratio even when all nodes
restrict their mobility
to a small region. Why?
(AU- Nov./
Dec.2012)
AMRIS: Ad Hoc Multicast Routing Protocol Utilizing Increasing ID Numbers
National University of Singapore
Georgia Institute of Technology
November 1998 [draft]
ODMRP: On-demand Multicasting Routing Protocol
University of California at Los Angeles
January 2000 [draft]
Mobile Ad hoc 22
YR/ AD HOC

KCE/ECE/QB/IV

Format : QB06
EC2050 Mobile Ad hoc Networks

Subject Code / Name:

AMRIS

ODMRP

Topology

Shared Delivery Tree

Mesh of Nodes

Main Similarity
Mobility support

Yes, based on MANET

Big difference

Driven mode
Advantages

Disadvantages

On-demand, do not store whole network


topology
simple topology
mobility
low overheads

robustness

sensitive to mobility

complex topology
high overheads

8.

Differentiate proactive and reactive protocols. Write examples for each.


(AU- May/ June
2012)
Both proactive and reactive routing has specific advantages and
disadvantages that make them suitable for certain types of scenarios. Since
proactive routing maintains information that is immediately available, the delay
before sending a packet is minimal. On the contrary, reactive protocols must
first determine the route, which may result in considerable delay if the
information is not available in caches. Moreover, the reactive route search
procedure
may involve significant control traffic due to global flooding. This, together with
the long setup delay, may make pure reactive routing less suitable for real-time
traffic. However, the traffic amount can be reduced by employing route
maintenance schemes.

9.
May/

How does energy aware routing work?


June 2012)
Maximise network lifetime (no accepted definition)
Communication is the most expensive activity
Possible goals include:
i.
Shortest-hop (fewest nodes involved)
ii.
Lowest energy route
iii.
Route via highest available energy
iv.
Distribute energy burden evenly
v.
Lowest routing overhead
Distributed algorithms cost energy
Changing component state costs energy

(AU-

10.
List the advantages and disadvantages of wireless routing protocols.
Advantages:
Mobile Ad hoc 23
YR/ AD HOC

KCE/ECE/QB/IV

Format : QB06
EC2050 Mobile Ad hoc Networks

Subject Code / Name:

Same as DSDV
Has faster convergence and fewer table updates
Disadvantages:
Need large memory and greater computing power because of the
multiple tables
At high mobility, the control overhead for updating
Table entries is almost the same as DSDV
Not suitable for highly dynamic and large ad hoc network
11.

What are the issues in designing routing protocol?


Mobility:
Ad hoc is highly dynamic due to the movement of nodes
Node movement causes frequent path breaks
The path repair in wired network has slow convergence
Bandwidth Constraint:
Wireless has less bandwidth due to the limited radio band:
Less data rate and difficult to maintain topology information
Error-prone shared broadcast radio channel:
Wireless links have time varying characteristics in terms of link capacity
and link-error probability
Target: Interact with MAC layer to find better-quality link
Hidden terminal problem causes packet collision
Hidden and exposed terminal problems
RTS-CTS control packet cannot ensure collision free
Resource Constraints:
Limited battery life and limited processing power
Target: optimally manage these resources

12.
What are the advantages and disadvantages of dynamic source routing
protocol?(DSRP)
Advantage
No need to updating the routing tables
Intermediate nodes are able to utilize the Route Cache Information
efficiently to reduce the control overhead.
There are no hello messages needed (beacon-less)
Disadvantage
The Route Maintenance protocol does not locally repair a broken link
There is always a small time delay at the begin of a new connection
13.
Based on the routing topology how the routing protocols are classified?
Mobile ad hoc networks routing protocols are characteristically are subdivided
into 3 main categories. They are Proactive routing protocols, Reactive routing

Mobile Ad hoc 24
YR/ AD HOC

KCE/ECE/QB/IV

Format : QB06
EC2050 Mobile Ad hoc Networks

protocols

and

Subject Code / Name:

Hybrid

routing--protocols.

14.
Give the difference between Ad hoc on demand Distance vector routing
protocol(AODV) and dynamic sequence routing protocol (DSR)
Ad hoc on demand Distance
Dynamic sequence routing
vector routing protocol(AODV)
protocol (DSR)
Pure on-demand protocol
Node does not need to maintain
knowledge of another node unless
it communicates with it
AODV includes route discovery and
route maintenance.
AODV minimizes the number of
broadcasts by creating
routes
on-demand
AODV uses only symmetric links
because the route reply packet
follows the reverse path of route
request packet
AODV uses hello messages to know
its neighbors and to ensure
symmetric links.

on-demand
A node maintains route cache
containing the routes it knows
Two main phases
Route discovery
Route maintenance
Basic Operation is similar to
AODV.
Main difference

To use routing cache for link


failure.
When route discovery phase,
node send route request
message with its own
address.

15.
What is hybrid routing protocol?
Zone Routing Protocol or ZRP is a hybrid Wireless Networking routing protocol
that uses both proactive and reactive routing protocols when sending
information over the network.
16.
List the advantages and disadvantages of DSDV routing protocols.
Advantages:
Mobile Ad hoc 25
YR/ AD HOC

KCE/ECE/QB/IV

Format : QB06
EC2050 Mobile Ad hoc Networks

Subject Code / Name:

The availability of the routers to all destinations at all times implies that
much less delay is involved in the route set up process.
The mechanism of incremental updates with sequence number tags makes
the existing wired network protocol adaptable to ad hoc networks.
Hence wired network protocol can be applied to the ad hoc network by less
modification.
Disadvantages:
A small network with high mobility or a lar4ge network with low mobility
can completely choke the available bandwidth, Hence this protocol suffers
from excessive control overhead that is proportional to the number of
nodes in the network.
In order to obtain information about a particular destination node, a node
has to wait for a table update message initiated by the same destination
node.

PART B
1.
Describe how the packets are transmitted in multiple access collision
avoidance protocol.
(16)

(AU- April/May 2014)


Diagram
Transmission
Explanation

(4)
(8)
(4)

2.
Explain the scheduling table updates mechanism in distributed priority
scheduling. (!6)
(AU- April/May
2014)
Diagram
(4)
Explanation
(6)
Scheduling table
(6)
3.

4.

Discuss in detail about Unicast routing Algorithm.(16)


(AU- Nov./Dec 2013)
Diagram
(3)
Explanation
(8)
Algorithm
(5)
Write Short note on.
(i)
Energy Aware routing algorithm.(8)
2013)

Diagram
(4)

Explanation
(4)

Mobile Ad hoc 26
YR/ AD HOC

(AU- Nov./Dec

KCE/ECE/QB/IV

Format : QB06
EC2050 Mobile Ad hoc Networks

(ii)

QOS Aware Routing. (8)


2013)

Diagram

Explanation

Subject Code / Name:

(AU- Nov./Dec
(4)
(4)

5.
(i) Discuss the major challenges that a routing protocol designed for ad
hoc wireless network
faces. (10)
(AU- May
/June 2013)
Major challenges
(4)
Explanation
(6)
(ii) Discuss the types of ad hoc network routing protocols based on routing
information
update mechanism. (6)
(AU- May
/June 2013)
Different types
(3)
Explanation
(3)
6.
(i) List the characteristics of ideal routing protocol for ad hoc wireless
network. (10)
(AU- May /June
2013)

Characteristics
(4)

Explanation
(6)
(ii) Classify and explain ad hoc wireless network based on routing topology. (6)
(AU- May /June
2013)
Classification of routing topology(3)
Explanation
(3)
7.
(i) With suitable trace, explain the route establishment in location aided
routing. (8)
(AU- Nov./Dec
2012)

Diagram & trace (4)

Explanation(4)
(ii)Device a pseudo code that present various steps involved in neighbor
Degree- Based
preferred link algorithm. (8)
(AU- Nov./Dec
2012)
Various steps
(4)
Explanation
(4)

Mobile Ad hoc 27
YR/ AD HOC

KCE/ECE/QB/IV

Format : QB06
EC2050 Mobile Ad hoc Networks

8.

Subject Code / Name:

How is routing table constructed in fisheye state routing protocol? Explain


in detail. (16)
(AU- Nov./Dec
2012)

Construction
(4)

Diagram
(4)

Explanation(8)

9.
(i) Explain on demand routing protocol in detail. (12)
May /June 2012)
Routing protocol Diagram
(4)
Explanation
(8)

(AU-

(ii) Which QOS measure decides QOS aware routing? (4)


May /June 2012)
Explanation
(4)

(AU-

10.
(i) Why Hybrid routing algorithm is used. Justify.(6)
May /June 2012)
Hybrid routing algorithm
(6)

(AU-

(ii) Briefly discuss about multicast routing algorithms.(10)


/June 2012)
Diagram
(3)
multicast routing algorithms(7)

(AU- May

UNIT IV END-END DELIVERY AND SECURITY


PART A
1.
What are the effects of induced traffic in Ad hoc network?
(AUApril/May 2014)
Ad hoc wireless networks use multi-hop radio relaying, and a link-level
transmission affects neighbor nodes of both sender and receiver of the link.
This induced traffic affects throughput of the transport layer protocol.
2.
Define Wormhole attack.
(AUApril/May 2014)
An attacker records packets (or bits) at one location in the network, tunnels
them to another location, and retransmits them into the network at that
location.
The wormhole attack is quite severe, and consists in recording traffic from one
region of the network and replaying it in a different region. It is carried out by
an intruder node X located within transmission range of legitimate
nodes A and B, where A and B are not themselves within transmission range of
each other.

Mobile Ad hoc 28
YR/ AD HOC

KCE/ECE/QB/IV

Format : QB06
EC2050 Mobile Ad hoc Networks

Subject Code / Name:

3.
Write about ad hoc transport protocols.
(AUNov. / Dec .2013)
Ad hoc transport protocol (ATP) is a protocol designed for ad hoc wireless
networks, it is not based on TCP. ATP differs from TCP in many ways: ATP uses
coordination between different layers, ATP uses rate based transmissions and
assisted congestion control and finally, congestion control and reliability are
decoupled in ATP.
4.
What are the issues in ad hoc networks?
(AUNov. / Dec .2013)
Security
Bandwidth
Routing
Power limitation
Hidden terminal problem
Corroboration of mobile devices
5.

List the objectives of transport layer protocol.


(AUMay/ June 2013)
The following are the important goals to be met while designing a transport
protocol for ad hoc wireless networks:
The protocol should maximize the throughput per connection.
It should provide throughput fairness across contending flows.
It should have mechanisms for congestion and flow control in the network.

6.
Why does TCP-F provide a simple feedback based solution?
(AUMay/ June 2013)
TCP-F provides a simple feedback based solution to minimize the
problems arising out of frequent path breaks in ad hoc wireless network. At the
same time it permits the congestion control mechanism to respond to
congestion in the network. TCP-F depends on the intermediate nodes to detect
the route failures and routing protocol in order to re-establish the broken path
within a reasonably short duration.
7.
What are the issues in designing transport layer protocol?
(AUNov./ Dec 2012)
The issues in designing a transport layer protocol for Ad hoc wireless networks
are listed
below. The transport layer protocol needs to take into account,
Induced traffic
Induced throughput unfairness
Separation of congestion control, reliability, and flow control
Misinterpretation of congestion
Completely decoupled transport layer
Power and bandwidth constraints
Dynamic topology
8.

Comment on the use of natural language passwords directly for


cryptographic algorithms.
(AUNov/
Dec
2012)
Mobile Ad hoc 29
YR/ AD HOC

KCE/ECE/QB/IV

Format : QB06
EC2050 Mobile Ad hoc Networks

Subject Code / Name:

Human beings tend to favor natural language phrases as password, over


randomly generated strings. Such passwords, if used as keys directly during
session, are very weak & open to attack because of high redundancy, and the
possibility of reuse over different sessions.
9.

Why does TCP not work well in ad hoc network?


(AU- May/ June 2012)
The Transmission Control Protocol (TCP) raises a number of issues when
required to work in a wireless environment. In particular, within an ad-hoc
network, where changes can happen somewhat quickly and unpredictably, it
has to deal with new tough challenges such as high probability of both network
partition and route failures due to mobility.

10.
What is byzantine attack?
(AUMay/ June 2012)
A Byzantine fault is an arbitrary fault that occurs during the execution of
an algorithm by a distributed system. It encompasses both omission failures
(e.g., crash failures, failing to receive a request, or failing to send a response)
and commission failures (e.g., processing a request incorrectly, corrupting local
state, and/or sending an incorrect or inconsistent response to a request). When
a Byzantine failure has occurred, the system may respond in any unpredictable
way, unless it is designed to have Byzantine fault tolerance.
11.
What are the types of attacks in ad hoc wireless networks?
There are two ways in which fault may occur in ad hoc network, they are,
1. Data traffic attack
Black-Hole
Cooperative Black-Hole
Gray-Hole
Jellyfish attack
2. Control traffic attack
Worm-Hole , HELLO Flood , Bogus Registration
Man in Middle , Rushing , Cache Poisoning
Blackmail , Cooperative Blackmail , Sybil attack
12.

What do you mean by passive attacks?


A passive attack does not disrupt the normal operation of the network;
the attacker snoops the data exchanged in the network without altering it. Here
the requirement of confidentiality gets violated. Detection of passive attack is
very difficult since the operation of the network itself doesnt get affected. One
of the solutions to the problem is to use powerful encryption mechanism to
encrypt the data being transmitted.

13.

What do you mean by active attacks?


An active attack attempts to alter or destroy the data being exchanged in
the network there by disrupting the normal functioning of the network. Active
attacks can be internal or external. External attacks are carried out by nodes
Mobile Ad hoc 30
YR/ AD HOC

KCE/ECE/QB/IV

Format : QB06
EC2050 Mobile Ad hoc Networks

Subject Code / Name:

that do not belong to the network. Internal attacks are from compromised
nodes that are part of the network.
14.

Define Denial of attack.


Denial-of-Messages (DoM) attacks. Malicious nodes may prevent other
honest ones from receiving broadcast messages by interfering with their radio.
Denials of Service (DoS) attacks are common place in the Internet.
Guarding against DoS attacks is a critical component of any security system.
While DoS has been studied extensively for the wire-line networks. Due to
deployment in tactical battlefield missions these networks are susceptible to
attacks of malicious intruders.

15.
Define secure routing.
Secure routing ensures that when a non-faulty node sends a message to key
k, the message reaches all non-faulty members is the set of replica roots Rk
with very high probability
Problems in ad-hoc wireless networks

Lack of fixed infrastructure support


Frequent changes to network topology
Poor protection to protocol packets at physical layer
PART B

1. (i)Discuss the effect of multiple breaks on a single path at the TCP- F sender. (8)
(AU- April/May
2014)

Diagram
(3)

Explanation(6)
(ii)What is the impact of the failure of proxy nodes in split- TCP? (8)
(AUApril/May 2014)
Impact factors
(4)
Explanation
(4)
2. (i) Explain how the security provisioning in ad hoc network differs from that in
Infrastructure based network. (8)
(AUApril/May 2014)
Diagram
(4)
Explanation
(4)
(ii)List out and explain how some of the internet properties of the wireless Ad
hoc networks
introduce difficulties while implementing security in routing protocols. (8)
(AU- April/May
2014)
Internet properties
(4)
Explanation
(4)
Mobile Ad hoc 31
YR/ AD HOC

KCE/ECE/QB/IV

Format : QB06
EC2050 Mobile Ad hoc Networks

Subject Code / Name:

3. What are the design issues in transport layer? (16)


2013)
Diagram
(4)
Explanation
(6)
Design issues
(6)
4. (i)Explain in detail about network security attacks. (8)
Nov./Dec 2013)
Diagram
(3)
Explanation
(5)

(AU- Nov./Dec

(AU-

(ii)Explain the significance and design goals of transport layer protocol for ad
hoc network.
(8) (AU- Nov/Dec
2013)
Diagram
(4)
Significance
(2)
Design Goals
(2)
5. Explain the issues in designing a transport layer protocol for ad hoc wireless
networks. (16)
(AU- May/ June
2013)
Diagram
(4)
Explanation
(8)
Design issues
(4)
6. Why does TCP not perform well in ad hoc wireless network? Explain. (16)
(AU- May/ June
2013)

Diagram
(4)

Explanation(8)

Justification (4)
7. With any five major reasons, analyze why TCP is exposed to significant
throughput
Degradation in ad hoc networks. (16)
(AU- Nov/Dec
2012)
Diagram
(4)
Major reasons
(8)
Explanation
(4)
8. Explain various network and Transport layer security attacks in detail. (16)
(AU- Nov/Dec 2012)

Diagram
(4)
Mobile Ad hoc 32
YR/ AD HOC

KCE/ECE/QB/IV

Format : QB06
EC2050 Mobile Ad hoc Networks

Subject Code / Name:

Network layer security


Transport layer security

(8)
(8)

9. (i) Discuss in detail feedback based TCP and TCP BUS in detail. (12)
(AUMay/ June 2012)
Diagram
(4)
Feedback based TCP
(4)
TCP Bus
(4)
(ii)Why secure routing protocols are needed? (4)
(AU- May/
June 2012)
Explanation
(4)
10.
(i) Discuss briefly ad hoc TCP states and event action mapping. (8)
(AU- May/ June 2012)
Diagram
(2)
Explanation
(3)
Event action mapping (3)
(ii)Discuss in detail various network and application layer security attacks. (8)
(AU- May/ June
2012)

Diagram
(2)

Various network (3)

application layer attacks


(3)

UNIT V CROSS LAYER DESIGN AND INTEGRATION OF ADHOC FOR 4G


PART A
1.
What the needs are for cross layer design?
(AU- Nov./Dec 2013 ,
April/May 2014)
OSI networking model, strict boundaries between layers are enforced, where
data are kept strictly within a given layer. Cross layer optimization removes
such strict boundaries to allow communication between layers by permitting
one layer to access the data of another layer to exchange information and
enable interaction. For example, having knowledge of the current physical
state will help a channel allocation scheme or automatic repeat request (ARQ)
strategy at the MAC layer in optimizing tradeoffs and achieving throughput
maximization
2.
What are the parameter optimization techniques available?
April/May 2014)
Variational adjoint (VA) technique
Micro genetic algorithm (Micro GA)
3.

What is cross layer feedback?


Nov./Dec 2013)
Mobile Ad hoc 33
YR/ AD HOC

(AU-

(AUKCE/ECE/QB/IV

Format : QB06
EC2050 Mobile Ad hoc Networks

Subject Code / Name:

Cross-layer feedback means interaction among the layers (network layer and
TCP in this example) in the protocol stack. For the sake of convenience, crosslayer feedback can be categorized as follows:
Upper to lower layers.
Lower to upper layers.
4.
What do you mean by encapsulation?
(AUMay/June 2013)
Encapsulation is used to refer to the process of each layer at the sending
computer adding its own header information, in the form of meta-data to the
actual payload (data).
Each layers header information would be interpreted and acted upon by a peer
layer in another machine.
5.
What does cellular IP offer?
(AUMay/June 2013)
Mobile IP (or MIP) is an Internet Engineering Task Force (IETF) standard
communications protocol that is designed to allow mobile device users to
move from one network to another while maintaining a permanent IP
address.
Mobile IP was designed to support seamless and continuous Internet
connectivity.
Mobile IP is most often found in wired and wireless environments where
users need to carry their mobile devices across multiple LAN subnets
6.
List the major issues in wireless internet.
(AUNov./Dec.2012)
Security
Higher Data Rates (Ultra Wide Band, Wireless USB, MIMO antennas)
Longer Distance (Wimax > 1Mbps to 50 Km)
Seamless Networking
Mobility
Multimedia over wireless
Channel congestion in license exempt band

7.
What do you mean by Wireless transport layer security (WTLS)? (AUNov./Dec.2012)
Wireless Transport Layer Security (WTLS) module provides communication
security with the Wireless Application Protocol (WAP). WTLS is the security layer
protocol that operates above the transport layer.
The primary job of WTLS is to provide privacy, data integrity and authentication
between applications communicating using WAP. WTLS is based on and
provides similar functionality to the Transport Layer Security (TLS) protocol but
is optimized for low bandwidth mobile devices.
Mobile Ad hoc 34
YR/ AD HOC

KCE/ECE/QB/IV

Format : QB06
EC2050 Mobile Ad hoc Networks

Subject Code / Name:

8.
What is wireless internet?
(AUMay/June 2012)
Wireless Internet enables wireless connectivity to the Internet via radio waves
rather than wires on a person's home computer, laptop, smart phone or similar
mobile device. Wireless Internet can be accessed directly through providers.
9.
Define Wireless datagram protocol (WDP)
(AU- May/June
2012)
Wireless Datagram Protocol defines the movement of information from receiver
to the sender and resembles the User Datagram Protocol in the
Internet protocol suite. The Wireless Datagram Protocol (WDP), a protocol in
WAP architecture, covers the Transport Layer Protocols in the Internet model.
10.
What do you mean by time to live (TTL)?
Time to live defines the number of Hops a particular packet can traverse.
11.
Define tunneling.
Tunneling is a protocol that allows for the secure movement of data from one
network to another. Tunneling involves allowing private network
communications to be sent across a public network, such as the Internet,
through a process called encapsulation. The encapsulation process allows for
data packets to appear as though they are of a public nature to a public
network when they are actually private data packets, allowing them to pass
through unnoticed. Tunneling is also known as port forwarding.
12.
Give the categories of handoff.
Handoffs may be classified into two types:
Hard Handoff: Characterized by an actual break in the connection while
switching from one cell or base station to another. The switch takes place
so quickly that it can hardly be noticed by the user. Because only one
channel is needed to serve a system designed for hard handoffs, it is the
more affordable option. It is also sufficient for services that can allow slight
delays, such as mobile broadband Internet.

Soft Handoff: Entails two connections to the cell phone from two different
base stations. This ensures that no break ensues during the handoff.
Naturally, it is more costly than a hard handoff.

13.
What is protocol optimizer?
Protocol Optimization is the use of in-depth protocol knowledge to accelerate
user response time. By understanding the intricacies of how specific protocols
function, For applications in which requests are typically serialized (HTTP, CIFS),
or for traditionally chatty applications originally designed for LANs (CIFS,
MAPI), the performance improvement gained by Protocol Optimization.
14.

Why ad hoc network is integrated with mobile IP?

Mobile Ad hoc 35
YR/ AD HOC

KCE/ECE/QB/IV

Format : QB06
EC2050 Mobile Ad hoc Networks

Subject Code / Name:

Users with portable devices, like laptops and personal digital assistants (PDA),
connecting to foreign networks in the Internet want the same functionality as
when connected to the home network, as well as accessibility through the
home IP address. Ad hoc networking is also of major importance for
connectivity between communicating mobile hosts without backbone
infrastructure and for connectivity to access points. Due to this reasons ad hoc
network is integrated with mobile IP.
15.

What are the factors that affect effective cross layer design?
Network performance.
Network and environmental condition.
Information sharing between the cross-layers.
Non-adjacent layer communication.
PART B

1. Describe how to integrate Ad hoc with mobile IP. What are the advantages?
(16)
(AU- April/May
2014)
Diagram
(4)
Explanation
(8)
Advantages
(4)
2. (i) Explain any one of the cross layer optimization method and how it improve
the
performance of the routing Ad hoc networks. (10)
(AUApril/May 2014)
Diagram
(2)
Optimization method (4)
Performance
(4)
(ii)Explain the operation of optimizing sub system (OSS). (6)
(AUApril/May 2014)
Diagram
(2)
Operation
(4)
3. Give detailed description of Cross layer optimization.(16)
Nov./Dec 2013)
Diagram
(4)
Explanation
(12)

(AU-

4. Explain in detail about integration of ad hoc with mobile IP Networks.(16)


(AU- Nov/Dec
2013)
Diagram
(4)
Mobile Ad hoc 36
YR/ AD HOC

KCE/ECE/QB/IV

Format : QB06
EC2050 Mobile Ad hoc Networks

Explanation

Subject Code / Name:

(12)

5. (i)Briefly discuss about cross over time prediction.(10)


May/June 2013)
Diagram
(4)
Explanation
(4)
Time prediction
(2)
(ii)List the issues of utmost importance in mobile IP. (6)
May/June 2013)
Issues
(3)
Importance
(3)
6. Explain COA, reverse tunneling and route optimization.(16)
May/June 2013)
Diagram
(4)
Explanation of COA
(4)
reverse tunneling
(4)
route optimization
(4)

(AU-

(AU-

(AU-

7. Explain the significant challenges of generic cross layer design.(16)


Nov/Dec 2012)
Diagram
(4)
Explanation
(6)
Significant challenges (6)
8. (i) Explain the features of a cross-layer model designed for multiuser
scheduling. Also
Highlight how efficiency is improved through this model. (8)
Nov/Dec. 2012).
Diagram
(2)
Explanation
(2)
Features
(2)
Efficiency improvement
(2)

(AU-

(AU-

(ii) How link/MAC layer optimization is achieved with respect to its higher
layers and
Physical layer? Also write its impact on bit rate and power control. (AUNov./Dec .2012 )
Diagram
(2)
Explanation
(4)
Optimization
(2)
9. Discuss in detail the integration of ad hoc with mobile IP networks. (16)
(AU- May/June
2012)

Diagram
(4)
Mobile Ad hoc 37
YR/ AD HOC

KCE/ECE/QB/IV

Format : QB06
EC2050 Mobile Ad hoc Networks

Subject Code / Name:

Explanation
Integration with mobile IP

(4)
(8)

10.
(i) Discuss briefly cross layer optimization technique in detail. (10)
(AU- May/June 2012)
Diagram
(4)
Explanation
(3)
Optimization technique
(3)
(ii)Justify the need for cross layer design. (6)
2012)
Diagram
(2)
Justification
(4)

(AU- May/June

*****************************

SUMMARY:
UNIT
NO.

NO. OF
QUESTIONS IN
2 MARKS

NO. OF
QUESTIONS
IN 16 MARKS

15

10

II

15

10

III

15

10

IV

15

10

15

10

75

50

TOTAL

No. of sample university question Papers: 3

Mobile Ad hoc 38
YR/ AD HOC

KCE/ECE/QB/IV

Format : QB06
EC2050 Mobile Ad hoc Networks

STAFF INCHARGE

Mobile Ad hoc 39
YR/ AD HOC

Subject Code / Name:

HOD/ECE

KCE/ECE/QB/IV

Вам также может понравиться