Академический Документы
Профессиональный Документы
Культура Документы
: EC2050
Branch/Year/Sem/Sec:
ECE/IV/VIII /A & B
Sub.Name : Mobile Adhoc Networks
Batch
2011-2015
Staff Name: Mr.P.Raja Pirian / Mrs. D. Vennila
Academic Year
2014-2015(Even)
UNIT I INTRODUCTION
PART A
1. What is fading? List the different types of fading?
(AUApril/May 2014)
The term fading, or, small-scale fading, means rapid fluctuations of the
amplitudes, phases, or multipath delays of a radio signal over a short period or
short travel distance. This might be so severe that large scale radio
propagation loss effects might be ignored. The different types of fading are Fast
Fading and Slow Fading.
2. Define Scalability.
(AU-April/May
2014)
It is the ability of a computer application or product (hardware or software) to
continue to function well as it (or its context) is changed in size or volume
in order to meet a user need.
3. Define ad hoc networks?
(AU- Nov/
Dec.2013)
A mobile ad hoc network (MANET) is a continuously self-configuring,
infrastructure-less network of mobile devices connected without wires.
MANET Stands for "Mobile Ad Hoc Network." A MANET is a type of ad hoc
network that can change locations and configure itself on the fly. Because
MANETS are mobile, they use wireless connections to connect to various
networks. This can be a standard Wi-Fi connection, or another medium, such
as a cellular or satellite transmission.
4. Write any two characteristics of Wireless channel?
Dec.2013)
Dynamic topologies
Energy-constrained operation
Limited channel
Limited physical security
bandwidth
Mobile Ad hoc 9
AD HOC
(AU- Nov/
KCE/ECE/QB/IV YR/
Format : QB06
EC2050 Mobile Ad hoc Networks
bandwidth, the signal level, and the noise level. C is therefore called the
channel's information carrying Capacity.
7. Differentiate an ad hoc network and a cellular network with respect to
bandwidth usage and
Cost effectiveness.
(AU-Nov/
Dec.2012)
S.N CELLELAR NETWORKS
AD HOC WIRELESS
O
NETWORKS
1. Fixed Infrastructure - based
Infrastructure - less
2. Single hop wireless links
3.
4. Centralized Routing
5.
6.
KCE/ECE/QB/IV
Format : QB06
EC2050 Mobile Ad hoc Networks
KCE/ECE/QB/IV
Format : QB06
EC2050 Mobile Ad hoc Networks
The Doppler Effect (or Doppler shift) is the change in frequency of a wave (or
other periodic event) for an observer moving relative to its source. In classical
physics (waves in a medium), the relationship between the observed frequency
f and the emitted frequency fo is given by:
f = {( v vr) / ( v vs )} * f0
where v is the velocity of waves in the medium, vs is the velocity of the source
relative to the medium and vr is the velocity of the receiver relative to the
medium.
15. List the characteristics of ad hoc networks
Operating without a central coordinator
Multi- hop radio relaying
Frequent link breakage due to mobile nodes
Instant deployment
Constraint resources (Band width, computing power, Battery life time)
PART B
1.
Differentiation
(8)
(ii)What is replay attack? How it can be prevented?(8)
(AUApril/May 2014)
Replay attack
(2)
Prevention method
(6)
2.
(i) List out the major advantages of Ad hoc wireless Internet.(6) (AUApril/May 2014)
Advantages
(6)
(ii)Discuss the Pros and Cons of a routing protocol that uses GPS information
for an Ad hoc
wireless Network for search and rescue operation. (10)
(AUApril/May 2014)
Pros and Cons
(6)
Explanation
(4)
3.
Format : QB06
EC2050 Mobile Ad hoc Networks
applications
(4)
4. Write in detail about Indoor and Outdoor models in Ad hoc mobility models.
(16)
(AU- Nov/ Dec.2013)
Diagram
Indoor models
Outdoor models
(4)
(6)
(6)
5.
Briefly discuss about path loss and fading. (16)
May/June 2013)
Diagram
(6)
Path Loss
(5)
Fading
(5)
(AU-
6.
(i) Explain the two main forms of interference, Doppler shift and Nyquist
theorem. (10)
(AU-May/June 2013)
Forms of interference (2)
Doppler shift
(4)
Nyquist theorem.
(4)
(ii) List the major advantages of Hybrid wireless Networks.(6)
(AUMay/June 2013)
Advantages
(6)
7.
(16)
(AU-Nov/Dec.2012)
Diagram
Mobility
WAP model
Challenges
(3)
(3)
(5)
(5)
8.
KCE/ECE/QB/IV
Format : QB06
EC2050 Mobile Ad hoc Networks
9.
(AU-
2.
What are the issues to be considered while designing a MAC protocol for
Ad-Hoc Networks?
(AU- April / May
2014)
The main issues need to be addressed while designing a MAC protocol for ad
hoc wireless networks:
Bandwidth
Quality of service Synchronization
Hidden and exposed terminal problems:
Error-Prone Shared Broadcast Channel
Distributed Nature/Lack of Central Coordination
Mobile Ad hoc 14
YR/ AD HOC
KCE/ECE/QB/IV
Format : QB06
EC2050 Mobile Ad hoc Networks
Mobility of Nodes.
3.
4.
Define synchronous protocols.
May/ June 2013)
(AU-
(AU-
A simple slot reservation mechanism for voice traffic at the level of talk
spurt without relying on any central entity and
A simple solution for the hidden and exposed terminal problems uniquely
present in wireless ad hoc environments.
6.
Compare the efficiency of the packet queuing mechanism adopted in
MACA and MACAW.
(AU- Nov/ Dec.
2012)
MACA
MACAW
Mobile Ad hoc 15
YR/ AD HOC
KCE/ECE/QB/IV
Format : QB06
EC2050 Mobile Ad hoc Networks
7.
Mobile Ad hoc 16
YR/ AD HOC
(AU-
KCE/ECE/QB/IV
Format : QB06
EC2050 Mobile Ad hoc Networks
8.
List the design goals of MAC protocol for ad- hoc networks.
Provided QoS support for real-time traffic
Low access delay
Bandwidth (BW) efficiently used
Fair allocation of BW to nodes
Low control overhead
Scalable to large networks
Support power control and time synchronization
Adaptive data rate control
9.
10.
List the five phases of FPRP.
FPRP is a single-channel TDMA-based broadcast scheduling protocol:
Reservation request: send reservation request (RR) packet to desk.
Collision report: if a collision is detected by any node, that node broadcasts
a CR packet
Reservation confirmation: a source node won the contention will send a RC
packet to destination node if it does not receive any CR message in the
previous phase
Mobile Ad hoc 17
YR/ AD HOC
KCE/ECE/QB/IV
Format : QB06
EC2050 Mobile Ad hoc Networks
KCE/ECE/QB/IV
Format : QB06
EC2050 Mobile Ad hoc Networks
PART B
1. (i) What are the advantages of reservation based MAC protocol over contention
based MAC
protocol? (8)
(AUApril/May
2014)
Advantages
(4)
Reservation based
(2)
Contention based
(2)
(ii) What are the advantages and disadvantages of MAC protocol using
directional antennas?
(8)
(AU- April/May
2014)
Advantages
(4)
Disadvantages
(4)
2. (i) Name the three MAC services provided by the IEEE 802.11 that are not
provided in the
traditional LANs such as 802.3. (6)
(AUApril/May 2014)
MAC services by IEEE 802.11 (2)
Reason behind LAN 802.3
(4)
(ii) Discuss the various HIPERLAN standards defined for wireless Networks by
ETSI.(6)
(AUApril/May
2014)
HIPERLAN standards
(3)
Explanation(3)
(iii) How are directional antennas superior to MACAW? Explain with an example.
(4)
(AUApril/May
2014)
Explanation(2)
Example
(2)
3. Explain in detail about contention based protocols with reservation.(16)
(AU-Nov/ Dec.2013)
Diagram
(4)
Explanation
(12)
4. Describe IEEE Standards 802.15 in detail.(16)
Dec.2013)
IEEE standards
(4)
Diagram
(4)
Explanation
(8)
Mobile Ad hoc 19
YR/ AD HOC
(AU-
Nov/
KCE/ECE/QB/IV
Format : QB06
EC2050 Mobile Ad hoc Networks
5. List and explain the issues in designing a MAC protocol for ad hoc wireless
networks.(16)
(AUMay/
June
2013)
Diagram
(4)
Explanation
(4)
Issues in MAC protocol design(8)
6. (i) List the important goals of designing a MAC protocol for ad hoc wireless
networks.(12)
(AU- May/ June
2013)
Goals of MAC protocol (6)
Explanation
(6)
(ii) Classify and define sender- initiated protocols. (4)
(AUMay/ June 2013)
Definition
(2)
Classification
(2)
7. How is scheduling mechanism achieved in distributed wireless ordering
protocol? Explain in
detail. How are Information symmetry and perceived collisions handled?(16)
(AUNov./Dec.
2012)
Scheduling Mechanism (8)
Information symmetry (4)
perceived collisions handled(4)
8. Illustrate various steps involved in five phase reservation protocol with its
frame format.(16)
(AUNov./Dec2012)
Steps in phase reservation protocol (8)
Diagram
(4)
Frame format
(4)
9.
KCE/ECE/QB/IV
Format : QB06
EC2050 Mobile Ad hoc Networks
10.
Explain 802.11g IEEE standard in detail.(16)
May/ June 2012)
Diagram
(4)
802.11g IEEE standard (4)
Explanation
(8)
(AU-
Reactive routing
a.
b.
c.
2.
What are the advantages and Disadvantages of hierarchical routing
protocol?
(AU- April/May 2014)
Advantage:
Using hierarchy information it reduces the routing table size
Disadvantage:
The process of exchanging information concerned all the levels of the
hierarchy as well as the process of leader election in every cluster makes
it quite problematic for ad hoc networks
3.
What is meant by Hierarchical routing?
(AUNov. /Dec. 2013)
The idea is to group the network into a hierarchy of clusters... e.g. clusters and
super clusters.
Two types of hierarchical routing
a.
Strict hierarchical routing:
Each node learns about the next cluster at the same level to use, in order to
reach each cluster at the same level, within its next ancestral cluster.
b.
Quasi hierarchical routing:
Mobile Ad hoc 21
YR/ AD HOC
KCE/ECE/QB/IV
Format : QB06
EC2050 Mobile Ad hoc Networks
Each node learns about the next node to use (typically the cluster head the
new cluster), in order to reach each cluster at the same level, within its next
ancestral cluster.
4.
May/
5.
May/
6.
(AU-
7.
AMRIS may to exhibit high packet delivery ratio even when all nodes
restrict their mobility
to a small region. Why?
(AU- Nov./
Dec.2012)
AMRIS: Ad Hoc Multicast Routing Protocol Utilizing Increasing ID Numbers
National University of Singapore
Georgia Institute of Technology
November 1998 [draft]
ODMRP: On-demand Multicasting Routing Protocol
University of California at Los Angeles
January 2000 [draft]
Mobile Ad hoc 22
YR/ AD HOC
KCE/ECE/QB/IV
Format : QB06
EC2050 Mobile Ad hoc Networks
AMRIS
ODMRP
Topology
Mesh of Nodes
Main Similarity
Mobility support
Big difference
Driven mode
Advantages
Disadvantages
robustness
sensitive to mobility
complex topology
high overheads
8.
9.
May/
(AU-
10.
List the advantages and disadvantages of wireless routing protocols.
Advantages:
Mobile Ad hoc 23
YR/ AD HOC
KCE/ECE/QB/IV
Format : QB06
EC2050 Mobile Ad hoc Networks
Same as DSDV
Has faster convergence and fewer table updates
Disadvantages:
Need large memory and greater computing power because of the
multiple tables
At high mobility, the control overhead for updating
Table entries is almost the same as DSDV
Not suitable for highly dynamic and large ad hoc network
11.
12.
What are the advantages and disadvantages of dynamic source routing
protocol?(DSRP)
Advantage
No need to updating the routing tables
Intermediate nodes are able to utilize the Route Cache Information
efficiently to reduce the control overhead.
There are no hello messages needed (beacon-less)
Disadvantage
The Route Maintenance protocol does not locally repair a broken link
There is always a small time delay at the begin of a new connection
13.
Based on the routing topology how the routing protocols are classified?
Mobile ad hoc networks routing protocols are characteristically are subdivided
into 3 main categories. They are Proactive routing protocols, Reactive routing
Mobile Ad hoc 24
YR/ AD HOC
KCE/ECE/QB/IV
Format : QB06
EC2050 Mobile Ad hoc Networks
protocols
and
Hybrid
routing--protocols.
14.
Give the difference between Ad hoc on demand Distance vector routing
protocol(AODV) and dynamic sequence routing protocol (DSR)
Ad hoc on demand Distance
Dynamic sequence routing
vector routing protocol(AODV)
protocol (DSR)
Pure on-demand protocol
Node does not need to maintain
knowledge of another node unless
it communicates with it
AODV includes route discovery and
route maintenance.
AODV minimizes the number of
broadcasts by creating
routes
on-demand
AODV uses only symmetric links
because the route reply packet
follows the reverse path of route
request packet
AODV uses hello messages to know
its neighbors and to ensure
symmetric links.
on-demand
A node maintains route cache
containing the routes it knows
Two main phases
Route discovery
Route maintenance
Basic Operation is similar to
AODV.
Main difference
15.
What is hybrid routing protocol?
Zone Routing Protocol or ZRP is a hybrid Wireless Networking routing protocol
that uses both proactive and reactive routing protocols when sending
information over the network.
16.
List the advantages and disadvantages of DSDV routing protocols.
Advantages:
Mobile Ad hoc 25
YR/ AD HOC
KCE/ECE/QB/IV
Format : QB06
EC2050 Mobile Ad hoc Networks
The availability of the routers to all destinations at all times implies that
much less delay is involved in the route set up process.
The mechanism of incremental updates with sequence number tags makes
the existing wired network protocol adaptable to ad hoc networks.
Hence wired network protocol can be applied to the ad hoc network by less
modification.
Disadvantages:
A small network with high mobility or a lar4ge network with low mobility
can completely choke the available bandwidth, Hence this protocol suffers
from excessive control overhead that is proportional to the number of
nodes in the network.
In order to obtain information about a particular destination node, a node
has to wait for a table update message initiated by the same destination
node.
PART B
1.
Describe how the packets are transmitted in multiple access collision
avoidance protocol.
(16)
(4)
(8)
(4)
2.
Explain the scheduling table updates mechanism in distributed priority
scheduling. (!6)
(AU- April/May
2014)
Diagram
(4)
Explanation
(6)
Scheduling table
(6)
3.
4.
Diagram
(4)
Explanation
(4)
Mobile Ad hoc 26
YR/ AD HOC
(AU- Nov./Dec
KCE/ECE/QB/IV
Format : QB06
EC2050 Mobile Ad hoc Networks
(ii)
Diagram
Explanation
(AU- Nov./Dec
(4)
(4)
5.
(i) Discuss the major challenges that a routing protocol designed for ad
hoc wireless network
faces. (10)
(AU- May
/June 2013)
Major challenges
(4)
Explanation
(6)
(ii) Discuss the types of ad hoc network routing protocols based on routing
information
update mechanism. (6)
(AU- May
/June 2013)
Different types
(3)
Explanation
(3)
6.
(i) List the characteristics of ideal routing protocol for ad hoc wireless
network. (10)
(AU- May /June
2013)
Characteristics
(4)
Explanation
(6)
(ii) Classify and explain ad hoc wireless network based on routing topology. (6)
(AU- May /June
2013)
Classification of routing topology(3)
Explanation
(3)
7.
(i) With suitable trace, explain the route establishment in location aided
routing. (8)
(AU- Nov./Dec
2012)
Explanation(4)
(ii)Device a pseudo code that present various steps involved in neighbor
Degree- Based
preferred link algorithm. (8)
(AU- Nov./Dec
2012)
Various steps
(4)
Explanation
(4)
Mobile Ad hoc 27
YR/ AD HOC
KCE/ECE/QB/IV
Format : QB06
EC2050 Mobile Ad hoc Networks
8.
Construction
(4)
Diagram
(4)
Explanation(8)
9.
(i) Explain on demand routing protocol in detail. (12)
May /June 2012)
Routing protocol Diagram
(4)
Explanation
(8)
(AU-
(AU-
10.
(i) Why Hybrid routing algorithm is used. Justify.(6)
May /June 2012)
Hybrid routing algorithm
(6)
(AU-
(AU- May
Mobile Ad hoc 28
YR/ AD HOC
KCE/ECE/QB/IV
Format : QB06
EC2050 Mobile Ad hoc Networks
3.
Write about ad hoc transport protocols.
(AUNov. / Dec .2013)
Ad hoc transport protocol (ATP) is a protocol designed for ad hoc wireless
networks, it is not based on TCP. ATP differs from TCP in many ways: ATP uses
coordination between different layers, ATP uses rate based transmissions and
assisted congestion control and finally, congestion control and reliability are
decoupled in ATP.
4.
What are the issues in ad hoc networks?
(AUNov. / Dec .2013)
Security
Bandwidth
Routing
Power limitation
Hidden terminal problem
Corroboration of mobile devices
5.
6.
Why does TCP-F provide a simple feedback based solution?
(AUMay/ June 2013)
TCP-F provides a simple feedback based solution to minimize the
problems arising out of frequent path breaks in ad hoc wireless network. At the
same time it permits the congestion control mechanism to respond to
congestion in the network. TCP-F depends on the intermediate nodes to detect
the route failures and routing protocol in order to re-establish the broken path
within a reasonably short duration.
7.
What are the issues in designing transport layer protocol?
(AUNov./ Dec 2012)
The issues in designing a transport layer protocol for Ad hoc wireless networks
are listed
below. The transport layer protocol needs to take into account,
Induced traffic
Induced throughput unfairness
Separation of congestion control, reliability, and flow control
Misinterpretation of congestion
Completely decoupled transport layer
Power and bandwidth constraints
Dynamic topology
8.
KCE/ECE/QB/IV
Format : QB06
EC2050 Mobile Ad hoc Networks
10.
What is byzantine attack?
(AUMay/ June 2012)
A Byzantine fault is an arbitrary fault that occurs during the execution of
an algorithm by a distributed system. It encompasses both omission failures
(e.g., crash failures, failing to receive a request, or failing to send a response)
and commission failures (e.g., processing a request incorrectly, corrupting local
state, and/or sending an incorrect or inconsistent response to a request). When
a Byzantine failure has occurred, the system may respond in any unpredictable
way, unless it is designed to have Byzantine fault tolerance.
11.
What are the types of attacks in ad hoc wireless networks?
There are two ways in which fault may occur in ad hoc network, they are,
1. Data traffic attack
Black-Hole
Cooperative Black-Hole
Gray-Hole
Jellyfish attack
2. Control traffic attack
Worm-Hole , HELLO Flood , Bogus Registration
Man in Middle , Rushing , Cache Poisoning
Blackmail , Cooperative Blackmail , Sybil attack
12.
13.
KCE/ECE/QB/IV
Format : QB06
EC2050 Mobile Ad hoc Networks
that do not belong to the network. Internal attacks are from compromised
nodes that are part of the network.
14.
15.
Define secure routing.
Secure routing ensures that when a non-faulty node sends a message to key
k, the message reaches all non-faulty members is the set of replica roots Rk
with very high probability
Problems in ad-hoc wireless networks
1. (i)Discuss the effect of multiple breaks on a single path at the TCP- F sender. (8)
(AU- April/May
2014)
Diagram
(3)
Explanation(6)
(ii)What is the impact of the failure of proxy nodes in split- TCP? (8)
(AUApril/May 2014)
Impact factors
(4)
Explanation
(4)
2. (i) Explain how the security provisioning in ad hoc network differs from that in
Infrastructure based network. (8)
(AUApril/May 2014)
Diagram
(4)
Explanation
(4)
(ii)List out and explain how some of the internet properties of the wireless Ad
hoc networks
introduce difficulties while implementing security in routing protocols. (8)
(AU- April/May
2014)
Internet properties
(4)
Explanation
(4)
Mobile Ad hoc 31
YR/ AD HOC
KCE/ECE/QB/IV
Format : QB06
EC2050 Mobile Ad hoc Networks
(AU- Nov./Dec
(AU-
(ii)Explain the significance and design goals of transport layer protocol for ad
hoc network.
(8) (AU- Nov/Dec
2013)
Diagram
(4)
Significance
(2)
Design Goals
(2)
5. Explain the issues in designing a transport layer protocol for ad hoc wireless
networks. (16)
(AU- May/ June
2013)
Diagram
(4)
Explanation
(8)
Design issues
(4)
6. Why does TCP not perform well in ad hoc wireless network? Explain. (16)
(AU- May/ June
2013)
Diagram
(4)
Explanation(8)
Justification (4)
7. With any five major reasons, analyze why TCP is exposed to significant
throughput
Degradation in ad hoc networks. (16)
(AU- Nov/Dec
2012)
Diagram
(4)
Major reasons
(8)
Explanation
(4)
8. Explain various network and Transport layer security attacks in detail. (16)
(AU- Nov/Dec 2012)
Diagram
(4)
Mobile Ad hoc 32
YR/ AD HOC
KCE/ECE/QB/IV
Format : QB06
EC2050 Mobile Ad hoc Networks
(8)
(8)
9. (i) Discuss in detail feedback based TCP and TCP BUS in detail. (12)
(AUMay/ June 2012)
Diagram
(4)
Feedback based TCP
(4)
TCP Bus
(4)
(ii)Why secure routing protocols are needed? (4)
(AU- May/
June 2012)
Explanation
(4)
10.
(i) Discuss briefly ad hoc TCP states and event action mapping. (8)
(AU- May/ June 2012)
Diagram
(2)
Explanation
(3)
Event action mapping (3)
(ii)Discuss in detail various network and application layer security attacks. (8)
(AU- May/ June
2012)
Diagram
(2)
(AU-
(AUKCE/ECE/QB/IV
Format : QB06
EC2050 Mobile Ad hoc Networks
Cross-layer feedback means interaction among the layers (network layer and
TCP in this example) in the protocol stack. For the sake of convenience, crosslayer feedback can be categorized as follows:
Upper to lower layers.
Lower to upper layers.
4.
What do you mean by encapsulation?
(AUMay/June 2013)
Encapsulation is used to refer to the process of each layer at the sending
computer adding its own header information, in the form of meta-data to the
actual payload (data).
Each layers header information would be interpreted and acted upon by a peer
layer in another machine.
5.
What does cellular IP offer?
(AUMay/June 2013)
Mobile IP (or MIP) is an Internet Engineering Task Force (IETF) standard
communications protocol that is designed to allow mobile device users to
move from one network to another while maintaining a permanent IP
address.
Mobile IP was designed to support seamless and continuous Internet
connectivity.
Mobile IP is most often found in wired and wireless environments where
users need to carry their mobile devices across multiple LAN subnets
6.
List the major issues in wireless internet.
(AUNov./Dec.2012)
Security
Higher Data Rates (Ultra Wide Band, Wireless USB, MIMO antennas)
Longer Distance (Wimax > 1Mbps to 50 Km)
Seamless Networking
Mobility
Multimedia over wireless
Channel congestion in license exempt band
7.
What do you mean by Wireless transport layer security (WTLS)? (AUNov./Dec.2012)
Wireless Transport Layer Security (WTLS) module provides communication
security with the Wireless Application Protocol (WAP). WTLS is the security layer
protocol that operates above the transport layer.
The primary job of WTLS is to provide privacy, data integrity and authentication
between applications communicating using WAP. WTLS is based on and
provides similar functionality to the Transport Layer Security (TLS) protocol but
is optimized for low bandwidth mobile devices.
Mobile Ad hoc 34
YR/ AD HOC
KCE/ECE/QB/IV
Format : QB06
EC2050 Mobile Ad hoc Networks
8.
What is wireless internet?
(AUMay/June 2012)
Wireless Internet enables wireless connectivity to the Internet via radio waves
rather than wires on a person's home computer, laptop, smart phone or similar
mobile device. Wireless Internet can be accessed directly through providers.
9.
Define Wireless datagram protocol (WDP)
(AU- May/June
2012)
Wireless Datagram Protocol defines the movement of information from receiver
to the sender and resembles the User Datagram Protocol in the
Internet protocol suite. The Wireless Datagram Protocol (WDP), a protocol in
WAP architecture, covers the Transport Layer Protocols in the Internet model.
10.
What do you mean by time to live (TTL)?
Time to live defines the number of Hops a particular packet can traverse.
11.
Define tunneling.
Tunneling is a protocol that allows for the secure movement of data from one
network to another. Tunneling involves allowing private network
communications to be sent across a public network, such as the Internet,
through a process called encapsulation. The encapsulation process allows for
data packets to appear as though they are of a public nature to a public
network when they are actually private data packets, allowing them to pass
through unnoticed. Tunneling is also known as port forwarding.
12.
Give the categories of handoff.
Handoffs may be classified into two types:
Hard Handoff: Characterized by an actual break in the connection while
switching from one cell or base station to another. The switch takes place
so quickly that it can hardly be noticed by the user. Because only one
channel is needed to serve a system designed for hard handoffs, it is the
more affordable option. It is also sufficient for services that can allow slight
delays, such as mobile broadband Internet.
Soft Handoff: Entails two connections to the cell phone from two different
base stations. This ensures that no break ensues during the handoff.
Naturally, it is more costly than a hard handoff.
13.
What is protocol optimizer?
Protocol Optimization is the use of in-depth protocol knowledge to accelerate
user response time. By understanding the intricacies of how specific protocols
function, For applications in which requests are typically serialized (HTTP, CIFS),
or for traditionally chatty applications originally designed for LANs (CIFS,
MAPI), the performance improvement gained by Protocol Optimization.
14.
Mobile Ad hoc 35
YR/ AD HOC
KCE/ECE/QB/IV
Format : QB06
EC2050 Mobile Ad hoc Networks
Users with portable devices, like laptops and personal digital assistants (PDA),
connecting to foreign networks in the Internet want the same functionality as
when connected to the home network, as well as accessibility through the
home IP address. Ad hoc networking is also of major importance for
connectivity between communicating mobile hosts without backbone
infrastructure and for connectivity to access points. Due to this reasons ad hoc
network is integrated with mobile IP.
15.
What are the factors that affect effective cross layer design?
Network performance.
Network and environmental condition.
Information sharing between the cross-layers.
Non-adjacent layer communication.
PART B
1. Describe how to integrate Ad hoc with mobile IP. What are the advantages?
(16)
(AU- April/May
2014)
Diagram
(4)
Explanation
(8)
Advantages
(4)
2. (i) Explain any one of the cross layer optimization method and how it improve
the
performance of the routing Ad hoc networks. (10)
(AUApril/May 2014)
Diagram
(2)
Optimization method (4)
Performance
(4)
(ii)Explain the operation of optimizing sub system (OSS). (6)
(AUApril/May 2014)
Diagram
(2)
Operation
(4)
3. Give detailed description of Cross layer optimization.(16)
Nov./Dec 2013)
Diagram
(4)
Explanation
(12)
(AU-
KCE/ECE/QB/IV
Format : QB06
EC2050 Mobile Ad hoc Networks
Explanation
(12)
(AU-
(AU-
(AU-
(AU-
(AU-
(ii) How link/MAC layer optimization is achieved with respect to its higher
layers and
Physical layer? Also write its impact on bit rate and power control. (AUNov./Dec .2012 )
Diagram
(2)
Explanation
(4)
Optimization
(2)
9. Discuss in detail the integration of ad hoc with mobile IP networks. (16)
(AU- May/June
2012)
Diagram
(4)
Mobile Ad hoc 37
YR/ AD HOC
KCE/ECE/QB/IV
Format : QB06
EC2050 Mobile Ad hoc Networks
Explanation
Integration with mobile IP
(4)
(8)
10.
(i) Discuss briefly cross layer optimization technique in detail. (10)
(AU- May/June 2012)
Diagram
(4)
Explanation
(3)
Optimization technique
(3)
(ii)Justify the need for cross layer design. (6)
2012)
Diagram
(2)
Justification
(4)
(AU- May/June
*****************************
SUMMARY:
UNIT
NO.
NO. OF
QUESTIONS IN
2 MARKS
NO. OF
QUESTIONS
IN 16 MARKS
15
10
II
15
10
III
15
10
IV
15
10
15
10
75
50
TOTAL
Mobile Ad hoc 38
YR/ AD HOC
KCE/ECE/QB/IV
Format : QB06
EC2050 Mobile Ad hoc Networks
STAFF INCHARGE
Mobile Ad hoc 39
YR/ AD HOC
HOD/ECE
KCE/ECE/QB/IV