Академический Документы
Профессиональный Документы
Культура Документы
UNIT – I INTRODUCTION
PART A
6. Write the equation for maximum data rate according to Shannon’s theorem.
(AU-May/ June 2013)
Maximum data rate = 1 * log2(1 + 0.5) = 1 * log2(1.5) = 0.58 Mbps. (or)
The maximum information transmission rate, C, will be
C = 2B Log2 {(1+S/N)1/2} = B Log2 {1+s/n}
Mobile Ad hoc 9 KCE/ECE/QB/IV YR/ AD HOC
Format : QB06 Subject Code / Name: EC2050 Mobile Ad hoc Networks
This expression represents the maximum possible rate of information transmission through a
given channel or system. The maximum rate we can transmit information is set by the
bandwidth, the signal level, and the noise level. C is therefore called the channel's information
carrying Capacity.
7. Differentiate an ad hoc network and a cellular network with respect to bandwidth usage and
Cost effectiveness. (AU-Nov/ Dec.2012)
S.NO CELLELAR NETWORKS AD HOC WIRELESS NETWORKS
1. Fixed Infrastructure - based Infrastructure - less
10. What are the challenging issues in ad hoc network maintenance? (AU-May /June 2012)
Host is no longer an end system can also be an acting intermediate system.
Changing the network topology over time
Potentially frequent network partitions
Every node can be mobile
Limited power capacity & wireless bandwidth
Presence of varying channel quality
The Nyquist Theorem, also known as the sampling theorem, is a principle that engineers
follow in the digitization of analog signals. For analog-to-digital conversion (ADC) to result in a
faithful reproduction of the signal, slices, called samples, of the analog waveform must be
taken frequently.
Instant deployment
PART B
1. (i) Differentiate between cellular network and Ad Hoc Network. (8) (AU- April/May
2014)
Differentiation (8)
(ii)What is replay attack? How it can be prevented?(8) (AU- April/May 2014)
Replay attack (2)
Prevention method (6)
2. (i) List out the major advantages of Ad hoc wireless Internet.(6) (AU- April/May
2014)
Advantages (6)
(ii)Discuss the Pros and Cons of a routing protocol that uses GPS information for an Ad hoc
wireless Network for search and rescue operation. (10) (AU- April/May 2014)
Pros and Cons (6)
Explanation (4)
3. Illustrate the characteristic features of Mobile ad hoc Networks and state its
applications.(16) (AU- Nov/ Dec.2013)
Diagram (4)
characteristic features (8)
applications (4)
4. Write in detail about Indoor and Outdoor models in Ad hoc mobility models.(16)
(AU- Nov/ Dec.2013)
Diagram (4)
Indoor models (6)
Outdoor models (6)
6. (i) Explain the two main forms of interference, Doppler shift and Nyquist theorem. (10)
(AU-May/June 2013)
Forms of interference (2)
Doppler shift (4)
Nyquist theorem. (4)
(ii) List the major advantages of Hybrid wireless Networks.(6) (AU-May/June 2013)
Advantages (6)
7. How mobility can be supported in today’s internet? Explain using the WAP model.
Comment
On its challenges in maintaining ad hoc networks that are connect to internet. (16)
(AU-Nov/Dec.2012)
Diagram (3)
Mobility (3)
WAP model (5)
Challenges (5)
8. (i) List the benefits when deployment of a commercial ad hoc wireless networks
compared to wired network. (8) (AU-
Nov/Dec.2012)
Diagram (3)
Benefits (2)
Mobile Ad hoc 12 KCE/ECE/QB/IV YR/ AD HOC
Format : QB06 Subject Code / Name: EC2050 Mobile Ad hoc Networks
Comparison (3)
(ii) Compare Ad-hoc Networks and Wireless LAN. (8) (AU-Nov/Dec.2012)
Comparison (8)
10. (i) Explain the application areas of ad hoc networks. (8) (AU-May/June
2012)
Application areas (4)
Explanation (4)
(ii) Discuss in detail the characteristics of wireless channels. (8) (AU-May/June 2012)
Diagram (4)
Characteristics (4)
2. What are the issues to be considered while designing a MAC protocol for Ad-Hoc
Networks?
(AU- April / May 2014)
The main issues need to be addressed while designing a MAC protocol for ad hoc wireless
networks:
Bandwidth
Quality of service Synchronization
Hidden and exposed terminal problems:
Error-Prone Shared Broadcast Channel
Distributed Nature/Lack of Central Coordination
Mobility of Nodes.
3. What are the goals of medium access protocol? (AU- Nov/ Dec.
2013)
Mobile Ad hoc 13 KCE/ECE/QB/IV YR/ AD HOC
Format : QB06 Subject Code / Name: EC2050 Mobile Ad hoc Networks
Synchronous is a communications protocol used to send and receive data across high-speed
mainframe networks. Data is synchronized and transmitted using constant intervals between
data bits.
A simple slot reservation mechanism for voice traffic at the level of “talk spurt” without
relying on any central entity and
A simple solution for the hidden and exposed terminal problems uniquely present in
wireless ad hoc environments.
6. Compare the efficiency of the packet queuing mechanism adopted in MACA and
MACAW.
(AU- Nov/ Dec. 2012)
MACA MACAW
• When a node wants to transmit a data MACAW (MACA for Wireless) is a revision of
packet, it first transmit a RTS MACA.
(Request To Send) frame. • The sender senses the carrier to see and
• The receiver node, on receiving the transmits a RTS (Request To Send) frame if no
RTS packet, if it is ready to receive the nearby station transmits a RTS.
data packet, transmits a CTS (Clear to • The receiver replies with a CTS (Clear to Send)
Send) packet. frame.
• Once the sender receives the CTS Neighbors see CTS, and then keep quiet.
packet without any error, it starts see RTS but not CTS, then keep quiet until the
transmitting the data packet. CTS is back to the sender.
• If a packet transmitted by a node is • The receiver sends an ACK when receiving an
lost, the node uses the binary frame.
exponential back-off (BEB) algorithm Neighbors keep silent until see ACK.
to back off a random interval of time • Collisions
before retrying. There is no collision detection.
The binary exponential back-off The senders know collision when they don’t
8. List the design goals of MAC protocol for ad- hoc networks.
Provided QoS support for real-time traffic
Low access delay
Bandwidth (BW) efficiently used
Fair allocation of BW to nodes
Low control overhead
Scalable to large networks
Support power control and time synchronization
Adaptive data rate control
Bandwidth Efficiency
QoS support
Synchronization
Hidden and Exposed Terminal Problems
Error-Prone Share Broadcast Channel
Distributed Nature/Lack of Central
Coordination & Mobility of Nodes
BTMA is designed for station based networks and divides the channel into a message channel
and the busy tone channel.
The Base station transmits a busy tone signal on the busy tone channel as long as it sense
carrier on the data channel because the Base station is in line of sight of all terminals, each
terminal can sense the busy tone channel to determine the state of the data channel.
PART B
1. (i) What are the advantages of reservation based MAC protocol over contention based MAC
protocol? (8) (AU- April/May 2014)
Advantages (4)
Reservation based (2)
Contention based (2)
(ii) What are the advantages and disadvantages of MAC protocol using directional antennas?
(8) (AU- April/May 2014)
Advantages (4)
Disadvantages (4)
2. (i) Name the three MAC services provided by the IEEE 802.11 that are not provided in the
traditional LAN’s such as 802.3. (6) (AU- April/May 2014)
MAC services by IEEE 802.11 (2)
Reason behind LAN 802.3 (4)
(ii) Discuss the various HIPERLAN standards defined for wireless Networks by ETSI.(6)
(AU- April/May 2014)
HIPERLAN standards (3)
Explanation (3)
(iii) How are directional antennas superior to MACAW? Explain with an example.(4)
(AU- April/May 2014)
Explanation (2)
Example (2)
3. Explain in detail about contention based protocols with reservation.(16)
(AU-Nov/ Dec.2013)
Diagram (4)
Explanation (12)
5. List and explain the issues in designing a MAC protocol for ad hoc wireless networks.(16)
6. (i) List the important goals of designing a MAC protocol for ad hoc wireless networks.(12)
(AU- May/ June 2013)
Goals of MAC protocol (6)
Explanation (6)
(ii) Classify and define sender- initiated protocols. (4) (AU- May/ June 2013)
Definition (2)
Classification (2)
8. Illustrate various steps involved in five phase reservation protocol with its frame format.(16)
(AU- Nov./Dec2012)
Steps in phase reservation protocol (8)
Diagram (4)
Frame format (4)
9. (i) Discuss in detail contention based protocols with scheduling and reservation.(12)
(AU- May/ June 2012)
Diagram (4)
Explanation (8)
(ii)Explain the HIPERLAN standards in detail. (4) (AU- May/ June 2012)
HIPERLAN standards (4)
10. Explain 802.11g IEEE standard in detail.(16) (AU- May/ June 2012)
Diagram (4)
802.11g IEEE standard (4)
Explanation (8)
PART A
1. Differentiate proactive and reactive protocol. (AU- Nov. /Dec. 2013, April/May
2014)
6. What are the major challenges of Qos routing? (AU- Nov. /Dec.
2012)
Dynamic varying network topology
Imprecise state information
Scare resources
Absence of communication infrastructure
Lack of centralized control
Power limitations
Heterogeneous nodes and networks
Error-prone shared radio channel
Hidden terminal problem
Insecure medium
Other layers
7. AMRIS may to exhibit high packet delivery ratio even when all nodes restrict their
mobility
to a small region. Why? (AU- Nov./ Dec.2012)
AMRIS: Ad Hoc Multicast Routing Protocol Utilizing Increasing ID Numbers
National University of Singapore
Georgia Institute of Technology
November 1998 [draft]
ODMRP: On-demand Multicasting Routing Protocol
University of California at Los Angeles
January 2000 [draft]
AMRIS ODMRP
Big difference
Main Similarity
Mobility support Yes, based on MANET
high overheads
reactive protocols must first determine the route, which may result in considerable delay if
the information is not available in caches. Moreover, the reactive route search procedure
may involve significant control traffic due to global flooding. This, together with the long setup
delay, may make pure reactive routing less suitable for real-time traffic. However, the traffic
amount can be reduced by employing route maintenance schemes.
12. What are the advantages and disadvantages of dynamic source routing protocol?
(DSRP)
Advantage
No need to updating the routing tables
Intermediate nodes are able to utilize the Route Cache Information efficiently to reduce
the control overhead.
There are no “hello” messages needed (beacon-less)
Disadvantage
The Route Maintenance protocol does not locally repair a broken link
There is always a small time delay at the begin of a new connection
13. Based on the routing topology how the routing protocols are classified?
Mobile ad hoc networks routing protocols are characteristically are subdivided into 3 main
categories. They are Proactive routing protocols, Reactive routing protocols and Hybrid
routing--protocols. .
14. Give the difference between Ad hoc on demand Distance vector routing
protocol(AODV) and dynamic sequence routing protocol (DSR)
Ad hoc on demand Distance vector routing Dynamic sequence routing protocol (DSR)
protocol(AODV)
the route reply packet follows the reverse When route discovery phase, node
path of route request packet send route request message with
AODV uses hello messages to know its its own address.
neighbors and to ensure symmetric links.
PART B
1. Describe how the packets are transmitted in multiple access collision avoidance
protocol.
(16) (AU- April/May 2014)
Diagram (4)
Transmission (8)
Explanation (4)
5. (i) Discuss the major challenges that a routing protocol designed for ad hoc wireless
network
faces. (10) (AU- May /June 2013)
Major challenges (4)
Explanation (6)
(ii) Discuss the types of ad hoc network routing protocols based on routing information
update mechanism. (6) (AU- May /June 2013)
Different types (3)
Explanation (3)
6. (i) List the characteristics of ideal routing protocol for ad hoc wireless network. (10)
(AU- May /June 2013)
Characteristics (4)
Explanation (6)
(ii) Classify and explain ad hoc wireless network based on routing topology. (6)
(AU- May /June 2013)
Classification of routing topology(3)
Explanation (3)
7. (i) With suitable trace, explain the route establishment in location aided routing. (8)
(AU- Nov./Dec 2012)
Diagram & trace (4)
Explanation (4)
(ii)Device a pseudo code that present various steps involved in neighbor Degree- Based
preferred link algorithm. (8) (AU- Nov./Dec 2012)
Various steps (4)
Explanation (4)
8. How is routing table constructed in fisheye state routing protocol? Explain in detail.
(16)
(AU- Nov./Dec 2012)
Construction (4)
Diagram (4)
Explanation (8)
9. (i) Explain on demand routing protocol in detail. (12) (AU- May /June
2012)
Routing protocol Diagram (4)
Mobile Ad hoc 24 KCE/ECE/QB/IV YR/ AD HOC
Format : QB06 Subject Code / Name: EC2050 Mobile Ad hoc Networks
Explanation (8)
(ii) Which QOS measure decides QOS aware routing? (4) (AU- May /June 2012)
Explanation (4)
10. (i) Why Hybrid routing algorithm is used. Justify.(6) (AU- May /June
2012)
Hybrid routing algorithm (6)
(ii) Briefly discuss about multicast routing algorithms.(10) (AU- May /June 2012)
Diagram (3)
multicast routing algorithms(7)
PART A
1. What are the effects of induced traffic in Ad hoc network? (AU- April/May
2014)
Ad hoc wireless networks use multi-hop radio relaying, and a link-level transmission affects
neighbor nodes of both sender and receiver of the link. This induced traffic affects throughput
of the transport layer protocol.
6. Why does TCP-F provide a simple feedback based solution? (AU- May/ June
2013)
TCP-F provides a simple feedback based solution to minimize the problems arising out
of frequent path breaks in ad hoc wireless network. At the same time it permits the congestion
control mechanism to respond to congestion in the network. TCP-F depends on the
intermediate nodes to detect the route failures and routing protocol in order to re-establish
the broken path within a reasonably short duration.
7. What are the issues in designing transport layer protocol? (AU- Nov./ Dec
2012)
The issues in designing a transport layer protocol for Ad hoc wireless networks are listed
below. The transport layer protocol needs to take into account,
Induced traffic
Induced throughput unfairness
Separation of congestion control, reliability, and flow control
Misinterpretation of congestion
Completely decoupled transport layer
Power and bandwidth constraints
Dynamic topology
9. Why does TCP not work well in ad hoc network? (AU- May/ June
2012)
The Transmission Control Protocol (TCP) raises a number of issues when required to
work in a wireless environment. In particular, within an ad-hoc network, where changes can
happen somewhat quickly and unpredictably, it has to deal with new tough challenges such as
high probability of both network partition and route failures due to mobility.
There are two ways in which fault may occur in ad hoc network, they are,
1. Data traffic attack
Black-Hole
Cooperative Black-Hole
Gray-Hole
Jellyfish attack
2. Control traffic attack
Worm-Hole , HELLO Flood , Bogus Registration
Man in Middle , Rushing , Cache Poisoning
Blackmail , Cooperative Blackmail , Sybil attack
PART B
1. (i)Discuss the effect of multiple breaks on a single path at the TCP- F sender. (8)
(AU- April/May 2014)
Diagram (3)
Explanation (6)
(ii)What is the impact of the failure of proxy nodes in split- TCP? (8) (AU- April/May 2014)
Impact factors (4)
Explanation (4)
2. (i) Explain how the security provisioning in ad hoc network differs from that in
Infrastructure based network. (8) (AU- April/May 2014)
Diagram (4)
Explanation (4)
(ii)List out and explain how some of the internet properties of the wireless Ad hoc networks
introduce difficulties while implementing security in routing protocols. (8)
(AU- April/May 2014)
Internet properties (4)
Explanation (4)
3. What are the design issues in transport layer? (16) (AU- Nov./Dec 2013)
Diagram (4)
Explanation (6)
Design issues (6)
4. (i)Explain in detail about network security attacks. (8) (AU- Nov./Dec 2013)
Diagram (3)
Explanation (5)
(ii)Explain the significance and design goals of transport layer protocol for ad hoc network.
(8) (AU- Nov/Dec 2013)
Diagram (4)
Significance (2)
Design Goals (2)
5. Explain the issues in designing a transport layer protocol for ad hoc wireless networks. (16)
(AU- May/ June 2013)
Diagram (4)
Explanation (8)
Design issues (4)
6. Why does TCP not perform well in ad hoc wireless network? Explain. (16)
(AU- May/ June 2013)
Diagram (4)
Explanation (8)
Justification (4)
7. With any five major reasons, analyze why TCP is exposed to significant throughput
Degradation in ad hoc networks. (16) (AU- Nov/Dec 2012)
Diagram (4)
Major reasons (8)
Explanation (4)
8. Explain various network and Transport layer security attacks in detail. (16)
9. (i) Discuss in detail feedback based TCP and TCP BUS in detail. (12) (AU- May/ June 2012)
Diagram (4)
Feedback based TCP (4)
TCP Bus (4)
(ii)Why secure routing protocols are needed? (4) (AU- May/ June 2012)
Explanation (4)
10. (i) Discuss briefly ad hoc TCP states and event action mapping. (8) (AU- May/ June 2012)
Diagram (2)
Explanation (3)
Event action mapping (3)
(ii)Discuss in detail various network and application layer security attacks. (8)
(AU- May/ June 2012)
Diagram (2)
Various network (3)
application layer attacks (3)
1. What the needs are for cross layer design? (AU- Nov./Dec 2013 , April/May 2014)
OSI networking model, strict boundaries between layers are enforced, where data are kept
strictly within a given layer. Cross layer optimization removes such strict boundaries to allow
communication between layers by permitting one layer to access the data of another layer to
exchange information and enable interaction. For example, having knowledge of the current
physical state will help a channel allocation scheme or automatic repeat request (ARQ)
strategy at the MAC layer in optimizing tradeoffs and achieving throughput maximization
Datagram Protocol (WDP), a protocol in WAP architecture, covers the Transport Layer
Protocols in the Internet model.
15. What are the factors that affect effective cross layer design?
Network performance.
Network and environmental condition.
Information sharing between the cross-layers.
Non-adjacent layer communication.
PART B
1. Describe how to integrate Ad hoc with mobile IP. What are the advantages? (16)
(AU- April/May 2014)
Diagram (4)
Explanation (8)
Advantages (4)
2. (i) Explain any one of the cross layer optimization method and how it improve the
performance of the routing Ad hoc networks. (10) (AU- April/May 2014)
Diagram (2)
Optimization method (4)
Performance (4)
(ii)Explain the operation of optimizing sub system (OSS). (6) (AU- April/May 2014)
Diagram (2)
Operation (4)
5. (i)Briefly discuss about cross over time prediction.(10) (AU- May/June 2013)
Diagram (4)
Explanation (4)
Time prediction (2)
(ii)List the issues of utmost importance in mobile IP. (6) (AU- May/June 2013)
Issues (3)
Importance (3)
6. Explain COA, reverse tunneling and route optimization.(16) (AU- May/June 2013)
Diagram (4)
Explanation of COA (4)
reverse tunneling (4)
route optimization (4)
7. Explain the significant challenges of generic cross layer design.(16) (AU- Nov/Dec 2012)
Diagram (4)
Explanation (6)
Significant challenges (6)
8. (i) Explain the features of a cross-layer model designed for multiuser scheduling. Also
Highlight how efficiency is improved through this model. (8) (AU- Nov/Dec. 2012).
Diagram (2)
Mobile Ad hoc 32 KCE/ECE/QB/IV YR/ AD HOC
Format : QB06 Subject Code / Name: EC2050 Mobile Ad hoc Networks
Explanation (2)
Features (2)
Efficiency improvement (2)
(ii) How link/MAC layer optimization is achieved with respect to its higher layers and
Physical layer? Also write its impact on bit rate and power control. (AU- Nov./Dec .2012 )
Diagram (2)
Explanation (4)
Optimization (2)
10. (i) Discuss briefly cross layer optimization technique in detail. (10) (AU- May/June 2012)
Diagram (4)
Explanation (3)
Optimization technique (3)
(ii)Justify the need for cross layer design. (6) (AU- May/June 2012)
Diagram (2)
Justification (4)
*****************************
SUMMARY:
I 15 10
II 15 10
III 15 10
IV 15 10
V 15 10
TOTAL 75 50