Вы находитесь на странице: 1из 26

Format : QB06 Subject Code / Name: EC2050 Mobile Ad hoc Networks

DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING


QUESTION BANK (MOBILE ADHOC NETWORKS)
Sub.Code : EC2050 Branch/Year/Sem/Sec: ECE/IV/VIII /A & B
Sub.Name : Mobile Adhoc Networks Batch : 2011-2015
Staff Name: Mr.P.Raja Pirian / Mrs. D. Vennila Academic Year : 2014-2015(Even)

UNIT – I INTRODUCTION
PART A

1. What is fading? List the different types of fading? (AU-April/May 2014)


The term fading, or, small-scale fading, means rapid fluctuations of the amplitudes, phases, or
multipath delays of a radio signal over a short period or short travel distance. This might be so
severe that large scale radio propagation loss effects might be ignored. The different types of
fading are Fast Fading and Slow Fading.

2. Define Scalability. (AU-April/May 2014)


It is the ability of a computer application or product (hardware or software) to continue to
function well as it (or its context) is changed in size or volume in order to meet a user
need.

3. Define ad hoc networks? (AU- Nov/ Dec.2013)


 A mobile ad hoc network (MANET) is a continuously self-configuring, infrastructure-less
network of mobile devices connected without wires.
 MANET Stands for "Mobile Ad Hoc Network." A MANET is a type of ad hoc network that
can change locations and configure itself on the fly. Because MANETS are mobile, they use
wireless connections to connect to various networks. This can be a standard Wi-Fi
connection, or another medium, such as a cellular or satellite transmission.

4. Write any two characteristics of Wireless channel? (AU- Nov/ Dec.2013)


 Dynamic topologies  Energy-constrained operation
 Limited channel bandwidth  Limited physical security
 Variable capacity links

5. List the transmission impairments of wireless channel. (AU-May / June 2013)


The main transmission impairments in cellular wireless communications are co-channel
interference, time-variation and frequency selectivity.

6. Write the equation for maximum data rate according to Shannon’s theorem.
(AU-May/ June 2013)
Maximum data rate = 1 * log2(1 + 0.5) = 1 * log2(1.5) = 0.58 Mbps. (or)
The maximum information transmission rate, C, will be
C = 2B Log2 {(1+S/N)1/2} = B Log2 {1+s/n}
Mobile Ad hoc 9 KCE/ECE/QB/IV YR/ AD HOC
Format : QB06 Subject Code / Name: EC2050 Mobile Ad hoc Networks

This expression represents the maximum possible rate of information transmission through a
given channel or system. The maximum rate we can transmit information is set by the

bandwidth, the signal level, and the noise level. C is therefore called the channel's information
carrying Capacity.

7. Differentiate an ad hoc network and a cellular network with respect to bandwidth usage and
Cost effectiveness. (AU-Nov/ Dec.2012)
S.NO CELLELAR NETWORKS AD HOC WIRELESS NETWORKS
1. Fixed Infrastructure - based Infrastructure - less

2. Single – hop wireless links Multi - hop wireless links

3. Guaranteed bandwidth (designed for Shared Radio channel (more suitable


voice traffic) for best – effort data traffic)
4. Centralized Routing Distributed Routing

5. Circuit- switched ( evolving toward Packet- switched ( evolving toward


packet switching) emulation of circuit switching)
6. Reuse of frequency spectrum through Dynamic frequency reuse based on
geographical channel reuse. carrier sense mechanism

8. State Shannon’s theorem. (AU- Nov/ Dec.2012)


Shannon's Theorem gives an upper bound to the capacity of a link, in bits per second (bps), as
a function of the available bandwidth and the signal-to-noise ratio of the link.
The Theorem can be stated as: C = B * log2(1+ S/N)
where C is the achievable channel capacity, B is the bandwidth of the line, S is the average
signal power and N is the average noise power.

9. Why ad hoc networks are needed? (AU-May/June 2012)


 Ad-hoc networking is often justified by scenarios where you do not want or where you
cannot deploy & manage an infrastructure.
 Spontaneous meetings (at work, airport): exchange files, play games
 Special circumstances: disaster relief
 Or simply cabling costs, management overhead: old building, “wearable LAN”, wireless
headset

10. What are the challenging issues in ad hoc network maintenance? (AU-May /June 2012)
 Host is no longer an end system can also be an acting intermediate system.
 Changing the network topology over time
 Potentially frequent network partitions
 Every node can be mobile
 Limited power capacity & wireless bandwidth
 Presence of varying channel quality

11. Define Nyquist theorem.

Mobile Ad hoc 10 KCE/ECE/QB/IV YR/ AD HOC


Format : QB06 Subject Code / Name: EC2050 Mobile Ad hoc Networks

The Nyquist Theorem, also known as the sampling theorem, is a principle that engineers
follow in the digitization of analog signals. For analog-to-digital conversion (ADC) to result in a
faithful reproduction of the signal, slices, called samples, of the analog waveform must be
taken frequently.

12. .Define path loss.


Path loss (or path attenuation) is the reduction in power density (attenuation) of an
electromagnetic wave as it propagates through space. Path loss is a major component in the
analysis and design of the link budget of a telecommunication system.
This term is commonly used in wireless communications and signal propagation. Path loss
may be due to many effects, such as free-space loss, refraction, diffraction, reflection,
aperture-medium coupling loss, and absorption.

13. List the Applications of ad hoc networks.


 Military applications  Wireless sensor networks
 Emergency rescue  Multi hop cellular networks
 Mesh networks  Wireless community networks.

14. Define Doppler shift.


The Doppler Effect (or Doppler shift) is the change in frequency of a wave (or other periodic
event) for an observer moving relative to its source. In classical physics (waves in a medium),
the relationship between the observed frequency f and the emitted frequency fo is given by:
f = {( v ± vr) / ( v ± vs )} * f0
where v is the velocity of waves in the medium, vs is the velocity of the source relative to the
medium and vr is the velocity of the receiver relative to the medium.

15. List the characteristics of ad hoc networks

 Operating without a central coordinator

 Multi- hop radio relaying

 Frequent link breakage due to mobile nodes

 Instant deployment

 Constraint resources (Band width, computing power, Battery life time)

PART B

1. (i) Differentiate between cellular network and Ad Hoc Network. (8) (AU- April/May
2014)
 Differentiation (8)
(ii)What is replay attack? How it can be prevented?(8) (AU- April/May 2014)
 Replay attack (2)
 Prevention method (6)

Mobile Ad hoc 11 KCE/ECE/QB/IV YR/ AD HOC


Format : QB06 Subject Code / Name: EC2050 Mobile Ad hoc Networks

2. (i) List out the major advantages of Ad hoc wireless Internet.(6) (AU- April/May
2014)
 Advantages (6)
(ii)Discuss the Pros and Cons of a routing protocol that uses GPS information for an Ad hoc
wireless Network for search and rescue operation. (10) (AU- April/May 2014)
 Pros and Cons (6)
 Explanation (4)

3. Illustrate the characteristic features of Mobile ad hoc Networks and state its
applications.(16) (AU- Nov/ Dec.2013)
 Diagram (4)
 characteristic features (8)
 applications (4)

4. Write in detail about Indoor and Outdoor models in Ad hoc mobility models.(16)
(AU- Nov/ Dec.2013)
 Diagram (4)
 Indoor models (6)
 Outdoor models (6)

5. Briefly discuss about path loss and fading. (16) (AU-May/June


2013)
 Diagram (6)
 Path Loss (5)
 Fading (5)

6. (i) Explain the two main forms of interference, Doppler shift and Nyquist theorem. (10)
(AU-May/June 2013)
 Forms of interference (2)
 Doppler shift (4)
 Nyquist theorem. (4)
(ii) List the major advantages of Hybrid wireless Networks.(6) (AU-May/June 2013)
 Advantages (6)

7. How mobility can be supported in today’s internet? Explain using the WAP model.
Comment
On its challenges in maintaining ad hoc networks that are connect to internet. (16)
(AU-Nov/Dec.2012)
 Diagram (3)
 Mobility (3)
 WAP model (5)
 Challenges (5)

8. (i) List the benefits when deployment of a commercial ad hoc wireless networks
compared to wired network. (8) (AU-
Nov/Dec.2012)
 Diagram (3)
 Benefits (2)
Mobile Ad hoc 12 KCE/ECE/QB/IV YR/ AD HOC
Format : QB06 Subject Code / Name: EC2050 Mobile Ad hoc Networks

 Comparison (3)
(ii) Compare Ad-hoc Networks and Wireless LAN. (8) (AU-Nov/Dec.2012)
 Comparison (8)

9. (i)What are the characteristics and features of ad hoc networks?(6) (AU-May/June


2012)
 Characteristics (3)
 Features (3)
(ii)Discuss in detail ad hoc indoor mobility models. (10) (AU-May/June 2012)
 Diagram (4)
 Mobility models (6)

10. (i) Explain the application areas of ad hoc networks. (8) (AU-May/June
2012)
 Application areas (4)
 Explanation (4)
(ii) Discuss in detail the characteristics of wireless channels. (8) (AU-May/June 2012)
 Diagram (4)
 Characteristics (4)

UNIT-II MEDIUM ACCESS PROTOCOLS


PART A

1. What is meant by HIPERLAN? (AU - Nov/ Dec.2013, April


2014)

 HIPERLAN is a European (ETSI) standardization initiative for a High Performance


wireless Local Area Network.
 Radio waves are used instead of a cable as a transmission medium.
 Either, the radio transceiver is mounted to the movable station as an add-on and no base
station has to be installed separately, or a base station is needed in addition per room.
 The stations may be moved during operation-pauses or even become mobile.

2. What are the issues to be considered while designing a MAC protocol for Ad-Hoc
Networks?
(AU- April / May 2014)
The main issues need to be addressed while designing a MAC protocol for ad hoc wireless
networks:
 Bandwidth
 Quality of service Synchronization
 Hidden and exposed terminal problems:
 Error-Prone Shared Broadcast Channel
 Distributed Nature/Lack of Central Coordination
 Mobility of Nodes.

3. What are the goals of medium access protocol? (AU- Nov/ Dec.
2013)
Mobile Ad hoc 13 KCE/ECE/QB/IV YR/ AD HOC
Format : QB06 Subject Code / Name: EC2050 Mobile Ad hoc Networks

 Initialization & Fairness


 Priority
 Limitations to one station
 Receipt
 Error Limitation
 Recovery
 Reconfigurability
 Compatibility
 Reliability:

4. Define synchronous protocols. (AU- May/ June


2013)

Synchronous is a communications protocol used to send and receive data across high-speed
mainframe networks. Data is synchronized and transmitted using constant intervals between
data bits.

5. Classify the channel of D-PRMA. (AU- May/ June


2013)

 A simple slot reservation mechanism for voice traffic at the level of “talk spurt” without
relying on any central entity and
 A simple solution for the hidden and exposed terminal problems uniquely present in
wireless ad hoc environments.

6. Compare the efficiency of the packet queuing mechanism adopted in MACA and
MACAW.
(AU- Nov/ Dec. 2012)
MACA MACAW
• When a node wants to transmit a data  MACAW (MACA for Wireless) is a revision of
packet, it first transmit a RTS MACA.
(Request To Send) frame. • The sender senses the carrier to see and
• The receiver node, on receiving the transmits a RTS (Request To Send) frame if no
RTS packet, if it is ready to receive the nearby station transmits a RTS.
data packet, transmits a CTS (Clear to • The receiver replies with a CTS (Clear to Send)
Send) packet. frame.
• Once the sender receives the CTS  Neighbors see CTS, and then keep quiet.
packet without any error, it starts  see RTS but not CTS, then keep quiet until the
transmitting the data packet. CTS is back to the sender.
• If a packet transmitted by a node is • The receiver sends an ACK when receiving an
lost, the node uses the binary frame.
exponential back-off (BEB) algorithm  Neighbors keep silent until see ACK.
to back off a random interval of time • Collisions
before retrying.  There is no collision detection.
 The binary exponential back-off  The senders know collision when they don’t

Mobile Ad hoc 14 KCE/ECE/QB/IV YR/ AD HOC


Format : QB06 Subject Code / Name: EC2050 Mobile Ad hoc Networks

mechanism used in MACA might receive CTS.


starve flows sometimes. The problem  They each wait for the exponential back off
is solved by MACAW. time.

7. What are the classifications of MAC protocol? (AU- May/ June


2012)
 Contention-based protocols
 Contention-based protocols with reservation mechanisms
 Contention-based protocols with scheduling mechanisms
 Other MAC protocols

8. List the design goals of MAC protocol for ad- hoc networks.
 Provided QoS support for real-time traffic
 Low access delay
 Bandwidth (BW) efficiently used
 Fair allocation of BW to nodes
 Low control overhead
 Scalable to large networks
 Support power control and time synchronization
 Adaptive data rate control

9. List the issues of designing a MAC protocol for ad hoc networks.

Mobile Ad hoc 15 KCE/ECE/QB/IV YR/ AD HOC


Format : QB06 Subject Code / Name: EC2050 Mobile Ad hoc Networks

 Bandwidth Efficiency
 QoS support
 Synchronization
 Hidden and Exposed Terminal Problems
 Error-Prone Share Broadcast Channel
 Distributed Nature/Lack of Central
 Coordination & Mobility of Nodes

10. List the five phases of FPRP.


FPRP is a single-channel TDMA-based broadcast scheduling protocol:
 Reservation request: send reservation request (RR) packet to desk.
 Collision report: if a collision is detected by any node, that node broadcasts a CR packet
 Reservation confirmation: a source node won the contention will send a RC packet to
destination node if it does not receive any CR message in the previous phase
 Reservation acknowledgment: destination node acknowledge reception of RC by sending
back RA message to source
 Packing and elimination: use packing packet and elimination packet

11. Give the classification of contention based protocol.


 Sender initiated
Single Channel – MACAW, FAMA
Multiple Channels – BTMA, BTMA, ICSMA
 Receiver initiated –RI-BTMA, MACA-BI, and MARCH.

12. Give the classifications of MAC protocols.


MAC protocol for ad-hoc networks must be classified into:
 Contention-based protocols without reservation/scheduling:
 Contention-based protocols with reservation mechanisms:
 Contention-based protocols with scheduling mechanisms:
 Protocols that do not fall to any of these categories:

13. What do you mean by D- PRMA?


D-PRMA: Distributed Packet Reservation Multiple Access Protocol
 The channel is divided into fixed and equal sized frames along the time axis.
 The RTS/BI and CTS/BI are used for slot reservation and for overcoming the hidden
terminal problem
 If a terminal wins the contention through mini-slot 1, the extra (m – 1) mini-slots of this
slot will be granted to the terminal as the payload
 For voice node, the same slot in each subsequent frame can be reserved until the end of
its packet transmission
 In the other cases, the extra (m – 1) mini-slots are continuously used for contention, and
the winner of this contention will be granted the reservation of the same slot

14. What do you mean by BTMA?


The busy tone multiple access protocol was the first protocol to cobalt the hidden terminal
problems of CSMA.

Mobile Ad hoc 16 KCE/ECE/QB/IV YR/ AD HOC


Format : QB06 Subject Code / Name: EC2050 Mobile Ad hoc Networks

BTMA is designed for station based networks and divides the channel into a message channel
and the busy tone channel.
The Base station transmits a busy tone signal on the busy tone channel as long as it sense
carrier on the data channel because the Base station is in line of sight of all terminals, each
terminal can sense the busy tone channel to determine the state of the data channel.

15. How BTMA channel is separated?


Busy tone multiple access protocol (BTMA)
Multichannel protocol where the channel is separated into:
 control channel: used for data transmission;
 Data channel: used for busy tone transmission.

PART B

1. (i) What are the advantages of reservation based MAC protocol over contention based MAC
protocol? (8) (AU- April/May 2014)
 Advantages (4)
 Reservation based (2)
 Contention based (2)
(ii) What are the advantages and disadvantages of MAC protocol using directional antennas?
(8) (AU- April/May 2014)
 Advantages (4)
 Disadvantages (4)

2. (i) Name the three MAC services provided by the IEEE 802.11 that are not provided in the
traditional LAN’s such as 802.3. (6) (AU- April/May 2014)
 MAC services by IEEE 802.11 (2)
 Reason behind LAN 802.3 (4)
(ii) Discuss the various HIPERLAN standards defined for wireless Networks by ETSI.(6)
(AU- April/May 2014)
 HIPERLAN standards (3)
 Explanation (3)
(iii) How are directional antennas superior to MACAW? Explain with an example.(4)
(AU- April/May 2014)
 Explanation (2)
 Example (2)
3. Explain in detail about contention based protocols with reservation.(16)
(AU-Nov/ Dec.2013)
 Diagram (4)
 Explanation (12)

4. Describe IEEE Standards 802.15 in detail.(16) (AU- Nov/ Dec.2013)


 IEEE standards (4)
 Diagram (4)
 Explanation (8)

5. List and explain the issues in designing a MAC protocol for ad hoc wireless networks.(16)

Mobile Ad hoc 17 KCE/ECE/QB/IV YR/ AD HOC


Format : QB06 Subject Code / Name: EC2050 Mobile Ad hoc Networks

(AU- May/ June 2013)


 Diagram (4)
 Explanation (4)
 Issues in MAC protocol design(8)

6. (i) List the important goals of designing a MAC protocol for ad hoc wireless networks.(12)
(AU- May/ June 2013)
 Goals of MAC protocol (6)
 Explanation (6)
(ii) Classify and define sender- initiated protocols. (4) (AU- May/ June 2013)
 Definition (2)
 Classification (2)

7. How is scheduling mechanism achieved in distributed wireless ordering protocol? Explain in


detail. How are Information symmetry and perceived collisions handled?(16)
(AU- Nov./Dec. 2012)
 Scheduling Mechanism (8)
 Information symmetry (4)
 perceived collisions handled(4)

8. Illustrate various steps involved in five phase reservation protocol with its frame format.(16)
(AU- Nov./Dec2012)
 Steps in phase reservation protocol (8)
 Diagram (4)
 Frame format (4)

9. (i) Discuss in detail contention based protocols with scheduling and reservation.(12)
(AU- May/ June 2012)
 Diagram (4)
 Explanation (8)
(ii)Explain the HIPERLAN standards in detail. (4) (AU- May/ June 2012)
 HIPERLAN standards (4)

10. Explain 802.11g IEEE standard in detail.(16) (AU- May/ June 2012)
 Diagram (4)
 802.11g IEEE standard (4)
 Explanation (8)

UNIT III NETWORK PROTOCOLS

PART A
1. Differentiate proactive and reactive protocol. (AU- Nov. /Dec. 2013, April/May
2014)

Proactive routing Reactive routing

Mobile Ad hoc 18 KCE/ECE/QB/IV YR/ AD HOC


Format : QB06 Subject Code / Name: EC2050 Mobile Ad hoc Networks

a. Classic routing strategies: link state, a. Only discover routes to destinations


distance vector on-demand
b. Keep track of routes to all possible b. Consume much less bandwidth but
destinations experience substantial delay
c. Changes in link connection updated c. E.g. DSR, ADOV, TORA, etc.
periodically
d. Minimal delay but substantial fraction of
control information
e. E.g. DSDV, WRP, TBRPF, OLSR, etc.

2. What are the advantages and Disadvantages of hierarchical routing protocol?


(AU- April/May
2014)
Advantage:
Using hierarchy information it reduces the routing table size
Disadvantage:
The process of exchanging information concerned all the levels of the hierarchy as well
as the process of leader election in every cluster makes it quite problematic for ad hoc
networks

3. What is meant by Hierarchical routing? (AU- Nov. /Dec.


2013)
The idea is to group the network into a hierarchy of clusters... e.g. clusters and super clusters.
Two types of hierarchical routing
a. Strict hierarchical routing:
Each node learns about the next cluster at the same level to use, in order to reach each cluster
at the same level, within its next ancestral cluster.
b. Quasi hierarchical routing:
Each node learns about the next node to use (typically the cluster head the new cluster), in
order to reach each cluster at the same level, within its next ancestral cluster.

4. What does power aware routing aim? (AU- May/ June


2013)
 To make communication more efficient
 Trade-off between routing overhead and data transmission cost
 Strategies incur differing levels of communication and storage overhead
 Hybrid approaches are possible

5. What is fisheye state routing protocol? (AU- May/ June


2013)
 The frequency of exchanges decrease with an increase in scope.
 The path information for far-away nodes may be inaccurate.
 FSR is suitable for large and highly mobile ad hoc wireless networks.
 The number of hops with each scope level has significant influence on the performance.

Mobile Ad hoc 19 KCE/ECE/QB/IV YR/ AD HOC


Format : QB06 Subject Code / Name: EC2050 Mobile Ad hoc Networks

6. What are the major challenges of Qos routing? (AU- Nov. /Dec.
2012)
Dynamic varying network topology
 Imprecise state information
 Scare resources
 Absence of communication infrastructure
 Lack of centralized control
 Power limitations
 Heterogeneous nodes and networks
 Error-prone shared radio channel
 Hidden terminal problem
 Insecure medium
 Other layers

7. AMRIS may to exhibit high packet delivery ratio even when all nodes restrict their
mobility
to a small region. Why? (AU- Nov./ Dec.2012)
 AMRIS: Ad Hoc Multicast Routing Protocol Utilizing Increasing ID Numbers
 National University of Singapore
 Georgia Institute of Technology
 November 1998 [draft]
 ODMRP: On-demand Multicasting Routing Protocol
 University of California at Los Angeles
 January 2000 [draft]

AMRIS ODMRP

Big difference

Topology Shared Delivery Tree Mesh of Nodes

Main Similarity
Mobility support Yes, based on MANET

Driven mode On-demand, do not store whole network topology

Advantages simple topology mobility

low overheads robustness

Disadvantages sensitive to mobility complex topology

high overheads

8. Differentiate proactive and reactive protocols. Write examples for each.


(AU- May/ June 2012)
Both proactive and reactive routing has specific advantages and disadvantages that make
them suitable for certain types of scenarios. Since proactive routing maintains information
that is immediately available, the delay before sending a packet is minimal. On the contrary,

Mobile Ad hoc 20 KCE/ECE/QB/IV YR/ AD HOC


Format : QB06 Subject Code / Name: EC2050 Mobile Ad hoc Networks

reactive protocols must first determine the route, which may result in considerable delay if
the information is not available in caches. Moreover, the reactive route search procedure
may involve significant control traffic due to global flooding. This, together with the long setup
delay, may make pure reactive routing less suitable for real-time traffic. However, the traffic
amount can be reduced by employing route maintenance schemes.

9. How does energy aware routing work? (AU- May/ June


2012)
 Maximise network lifetime (no accepted definition)
 Communication is the most expensive activity
 Possible goals include:
i. Shortest-hop (fewest nodes involved)
ii. Lowest energy route
iii. Route via highest available energy
iv. Distribute energy burden evenly
v. Lowest routing overhead
 Distributed algorithms cost energy
 Changing component state costs energy

10. List the advantages and disadvantages of wireless routing protocols.


Advantages:
 Same as DSDV
 Has faster convergence and fewer table updates
Disadvantages:
 Need large memory and greater computing power because of the multiple tables
 At high mobility, the control overhead for updating
 Table entries is almost the same as DSDV
 Not suitable for highly dynamic and large ad hoc network

11. What are the issues in designing routing protocol?


Mobility:
 Ad hoc is highly dynamic due to the movement of nodes
 Node movement causes frequent path breaks
 The path repair in wired network has slow convergence
Bandwidth Constraint:
 Wireless has less bandwidth due to the limited radio band:
 Less data rate and difficult to maintain topology information
Error-prone shared broadcast radio channel:
 Wireless links have time varying characteristics in terms of link capacity and link-error
probability
 Target: Interact with MAC layer to find better-quality link
Hidden terminal problem causes packet collision
Hidden and exposed terminal problems
 RTS-CTS control packet cannot ensure collision free
Resource Constraints:
 Limited battery life and limited processing power

Mobile Ad hoc 21 KCE/ECE/QB/IV YR/ AD HOC


Format : QB06 Subject Code / Name: EC2050 Mobile Ad hoc Networks

 Target: optimally manage these resources

12. What are the advantages and disadvantages of dynamic source routing protocol?
(DSRP)
Advantage
 No need to updating the routing tables
 Intermediate nodes are able to utilize the Route Cache Information efficiently to reduce
the control overhead.
 There are no “hello” messages needed (beacon-less)
Disadvantage
 The Route Maintenance protocol does not locally repair a broken link
 There is always a small time delay at the begin of a new connection

13. Based on the routing topology how the routing protocols are classified?
Mobile ad hoc networks routing protocols are characteristically are subdivided into 3 main
categories. They are Proactive routing protocols, Reactive routing protocols and Hybrid
routing--protocols. .

14. Give the difference between Ad hoc on demand Distance vector routing
protocol(AODV) and dynamic sequence routing protocol (DSR)
Ad hoc on demand Distance vector routing Dynamic sequence routing protocol (DSR)
protocol(AODV)

 Pure on-demand protocol  on-demand


 Node does not need to maintain  A node maintains route cache
knowledge of another node unless it containing the routes it knows
communicates with it  Two main phases
 AODV includes route discovery and route  Route discovery
maintenance.  Route maintenance
 AODV minimizes the number of  Basic Operation is similar to AODV.
broadcasts by creating routes on-  Main difference
demand  To use routing cache for link
 AODV uses only symmetric links because failure.

Mobile Ad hoc 22 KCE/ECE/QB/IV YR/ AD HOC


Format : QB06 Subject Code / Name: EC2050 Mobile Ad hoc Networks

the route reply packet follows the reverse  When route discovery phase, node
path of route request packet send route request message with
 AODV uses hello messages to know its its own address.
neighbors and to ensure symmetric links.

15. What is hybrid routing protocol?


Zone Routing Protocol or ZRP is a hybrid Wireless Networking routing protocol that uses both
proactive and reactive routing protocols when sending information over the network.

16. List the advantages and disadvantages of DSDV routing protocols.


Advantages:
 The availability of the routers to all destinations at all times implies that much less delay
is involved in the route set up process.
 The mechanism of incremental updates with sequence number tags makes the existing
wired network protocol adaptable to ad hoc networks.
 Hence wired network protocol can be applied to the ad hoc network by less modification.
Disadvantages:
 A small network with high mobility or a lar4ge network with low mobility can completely
choke the available bandwidth, Hence this protocol suffers from excessive control
overhead that is proportional to the number of nodes in the network.
 In order to obtain information about a particular destination node, a node has to wait for
a table update message initiated by the same destination node.

PART B

1. Describe how the packets are transmitted in multiple access collision avoidance
protocol.
(16) (AU- April/May 2014)
 Diagram (4)
 Transmission (8)
 Explanation (4)

2. Explain the scheduling table updates mechanism in distributed priority scheduling. (!


6)
(AU- April/May 2014)
 Diagram (4)
 Explanation (6)
 Scheduling table (6)

3. Discuss in detail about Unicast routing Algorithm.(16) (AU- Nov./Dec


2013)
 Diagram (3)
 Explanation (8)
 Algorithm (5)

4. Write Short note on.

Mobile Ad hoc 23 KCE/ECE/QB/IV YR/ AD HOC


Format : QB06 Subject Code / Name: EC2050 Mobile Ad hoc Networks

(i) Energy Aware routing algorithm.(8) (AU- Nov./Dec 2013)


 Diagram (4)
 Explanation (4)
(ii) QOS Aware Routing. (8) (AU- Nov./Dec 2013)
 Diagram (4)
 Explanation (4)

5. (i) Discuss the major challenges that a routing protocol designed for ad hoc wireless
network
faces. (10) (AU- May /June 2013)
 Major challenges (4)
 Explanation (6)
(ii) Discuss the types of ad hoc network routing protocols based on routing information
update mechanism. (6) (AU- May /June 2013)
 Different types (3)
 Explanation (3)

6. (i) List the characteristics of ideal routing protocol for ad hoc wireless network. (10)
(AU- May /June 2013)
 Characteristics (4)
 Explanation (6)
(ii) Classify and explain ad hoc wireless network based on routing topology. (6)
(AU- May /June 2013)
 Classification of routing topology(3)
 Explanation (3)

7. (i) With suitable trace, explain the route establishment in location aided routing. (8)
(AU- Nov./Dec 2012)
 Diagram & trace (4)
 Explanation (4)
(ii)Device a pseudo code that present various steps involved in neighbor Degree- Based
preferred link algorithm. (8) (AU- Nov./Dec 2012)
 Various steps (4)
 Explanation (4)

8. How is routing table constructed in fisheye state routing protocol? Explain in detail.
(16)
(AU- Nov./Dec 2012)
 Construction (4)
 Diagram (4)
 Explanation (8)

9. (i) Explain on demand routing protocol in detail. (12) (AU- May /June
2012)
 Routing protocol Diagram (4)
Mobile Ad hoc 24 KCE/ECE/QB/IV YR/ AD HOC
Format : QB06 Subject Code / Name: EC2050 Mobile Ad hoc Networks

 Explanation (8)
(ii) Which QOS measure decides QOS aware routing? (4) (AU- May /June 2012)
 Explanation (4)

10. (i) Why Hybrid routing algorithm is used. Justify.(6) (AU- May /June
2012)
 Hybrid routing algorithm (6)

(ii) Briefly discuss about multicast routing algorithms.(10) (AU- May /June 2012)
 Diagram (3)
 multicast routing algorithms(7)

UNIT IV END-END DELIVERY AND SECURITY

PART A
1. What are the effects of induced traffic in Ad hoc network? (AU- April/May
2014)
Ad hoc wireless networks use multi-hop radio relaying, and a link-level transmission affects
neighbor nodes of both sender and receiver of the link. This induced traffic affects throughput
of the transport layer protocol.

2. Define Wormhole attack. (AU- April/May


2014)
An attacker records packets (or bits) at one location in the network, tunnels them to another
location, and retransmits them into the network at that location.
The wormhole attack is quite severe, and consists in recording traffic from one region of the
network and replaying it in a different region. It is carried out by an intruder node X located
within transmission range of legitimate nodes A and B, where A and B are not themselves
within transmission range of each other.

3. Write about ad hoc transport protocols. (AU- Nov. / Dec .


2013)
Ad hoc transport protocol (ATP) is a protocol designed for ad hoc wireless networks, it
is not based on TCP. ATP differs from TCP in many ways: ATP uses coordination between
different layers, ATP uses rate based transmissions and assisted congestion control and finally,
congestion control and reliability are decoupled in ATP.

4. What are the issues in ad hoc networks? (AU- Nov. / Dec .


2013)
 Security  Bandwidth
 Routing  Power limitation
 Hidden terminal problem  Corroboration of mobile devices

5. List the objectives of transport layer protocol. (AU- May/ June


2013)
The following are the important goals to be met while designing a transport protocol for ad
hoc wireless networks:

Mobile Ad hoc 25 KCE/ECE/QB/IV YR/ AD HOC


Format : QB06 Subject Code / Name: EC2050 Mobile Ad hoc Networks

 The protocol should maximize the throughput per connection.


 It should provide throughput fairness across contending flows.
 It should have mechanisms for congestion and flow control in the network.

6. Why does TCP-F provide a simple feedback based solution? (AU- May/ June
2013)
TCP-F provides a simple feedback based solution to minimize the problems arising out
of frequent path breaks in ad hoc wireless network. At the same time it permits the congestion
control mechanism to respond to congestion in the network. TCP-F depends on the
intermediate nodes to detect the route failures and routing protocol in order to re-establish
the broken path within a reasonably short duration.

7. What are the issues in designing transport layer protocol? (AU- Nov./ Dec
2012)
The issues in designing a transport layer protocol for Ad hoc wireless networks are listed
below. The transport layer protocol needs to take into account,
 Induced traffic
 Induced throughput unfairness
 Separation of congestion control, reliability, and flow control
 Misinterpretation of congestion
 Completely decoupled transport layer
 Power and bandwidth constraints
 Dynamic topology

8. Comment on the use of natural language passwords directly for cryptographic


algorithms.
(AU- Nov/ Dec 2012)
Human beings tend to favor natural language phrases as password, over randomly generated
strings. Such passwords, if used as keys directly during session, are very weak & open to
attack because of high redundancy, and the possibility of reuse over different sessions.

9. Why does TCP not work well in ad hoc network? (AU- May/ June
2012)
The Transmission Control Protocol (TCP) raises a number of issues when required to
work in a wireless environment. In particular, within an ad-hoc network, where changes can
happen somewhat quickly and unpredictably, it has to deal with new tough challenges such as
high probability of both network partition and route failures due to mobility.

10. What is byzantine attack? (AU- May/ June


2012)
A Byzantine fault is an arbitrary fault that occurs during the execution of an algorithm
by a distributed system. It encompasses both omission failures (e.g., crash failures, failing to
receive a request, or failing to send a response) and commission failures (e.g., processing a
request incorrectly, corrupting local state, and/or sending an incorrect or inconsistent
response to a request). When a Byzantine failure has occurred, the system may respond in any
unpredictable way, unless it is designed to have Byzantine fault tolerance.

11. What are the types of attacks in ad hoc wireless networks?

Mobile Ad hoc 26 KCE/ECE/QB/IV YR/ AD HOC


Format : QB06 Subject Code / Name: EC2050 Mobile Ad hoc Networks

There are two ways in which fault may occur in ad hoc network, they are,
1. Data traffic attack
 Black-Hole
 Cooperative Black-Hole
 Gray-Hole
 Jellyfish attack
2. Control traffic attack
 Worm-Hole , HELLO Flood , Bogus Registration
 Man in Middle , Rushing , Cache Poisoning
 Blackmail , Cooperative Blackmail , Sybil attack

12. What do you mean by passive attacks?


A passive attack does not disrupt the normal operation of the network; the attacker
snoops the data exchanged in the network without altering it. Here the requirement of
confidentiality gets violated. Detection of passive attack is very difficult since the operation of
the network itself doesn’t get affected. One of the solutions to the problem is to use powerful
encryption mechanism to encrypt the data being transmitted.

13. What do you mean by active attacks?


An active attack attempts to alter or destroy the data being exchanged in the network
there by disrupting the normal functioning of the network. Active attacks can be internal or
external. External attacks are carried out by nodes that do not belong to the network. Internal
attacks are from compromised nodes that are part of the network.

14. Define Denial of attack.


Denial-of-Messages (DoM) attacks. Malicious nodes may prevent other honest ones
from receiving broadcast messages by interfering with their radio.
Denials of Service (DoS) attacks are common place in the Internet. Guarding against
DoS attacks is a critical component of any security system. While DoS has been studied
extensively for the wire-line networks. Due to deployment in tactical battlefield missions
these networks are susceptible to attacks of malicious intruders.

15. Define secure routing.


“Secure routing ensures that when a non-faulty node sends a message to key k, the message
reaches all non-faulty members is the set of replica roots Rk with very high probability”
 Problems in ad-hoc wireless networks
 Lack of fixed infrastructure support
 Frequent changes to network topology
 Poor protection to protocol packets at physical layer

PART B

1. (i)Discuss the effect of multiple breaks on a single path at the TCP- F sender. (8)
(AU- April/May 2014)
 Diagram (3)
 Explanation (6)
(ii)What is the impact of the failure of proxy nodes in split- TCP? (8) (AU- April/May 2014)
 Impact factors (4)

Mobile Ad hoc 27 KCE/ECE/QB/IV YR/ AD HOC


Format : QB06 Subject Code / Name: EC2050 Mobile Ad hoc Networks

 Explanation (4)

2. (i) Explain how the security provisioning in ad hoc network differs from that in
Infrastructure based network. (8) (AU- April/May 2014)
 Diagram (4)
 Explanation (4)

(ii)List out and explain how some of the internet properties of the wireless Ad hoc networks
introduce difficulties while implementing security in routing protocols. (8)
(AU- April/May 2014)
 Internet properties (4)
 Explanation (4)

3. What are the design issues in transport layer? (16) (AU- Nov./Dec 2013)
 Diagram (4)
 Explanation (6)
 Design issues (6)

4. (i)Explain in detail about network security attacks. (8) (AU- Nov./Dec 2013)
 Diagram (3)
 Explanation (5)

(ii)Explain the significance and design goals of transport layer protocol for ad hoc network.
(8) (AU- Nov/Dec 2013)
 Diagram (4)
 Significance (2)
 Design Goals (2)

5. Explain the issues in designing a transport layer protocol for ad hoc wireless networks. (16)
(AU- May/ June 2013)
 Diagram (4)
 Explanation (8)
 Design issues (4)

6. Why does TCP not perform well in ad hoc wireless network? Explain. (16)
(AU- May/ June 2013)
 Diagram (4)
 Explanation (8)
 Justification (4)

7. With any five major reasons, analyze why TCP is exposed to significant throughput
Degradation in ad hoc networks. (16) (AU- Nov/Dec 2012)
 Diagram (4)
 Major reasons (8)
 Explanation (4)

8. Explain various network and Transport layer security attacks in detail. (16)

Mobile Ad hoc 28 KCE/ECE/QB/IV YR/ AD HOC


Format : QB06 Subject Code / Name: EC2050 Mobile Ad hoc Networks

(AU- Nov/Dec 2012)


 Diagram (4)
 Network layer security (8)
 Transport layer security (8)

9. (i) Discuss in detail feedback based TCP and TCP BUS in detail. (12) (AU- May/ June 2012)
 Diagram (4)
 Feedback based TCP (4)
 TCP Bus (4)
(ii)Why secure routing protocols are needed? (4) (AU- May/ June 2012)
 Explanation (4)

10. (i) Discuss briefly ad hoc TCP states and event action mapping. (8) (AU- May/ June 2012)
 Diagram (2)
 Explanation (3)
 Event action mapping (3)
(ii)Discuss in detail various network and application layer security attacks. (8)
(AU- May/ June 2012)
 Diagram (2)
 Various network (3)
 application layer attacks (3)

UNIT – V CROSS LAYER DESIGN AND INTEGRATION OF ADHOC FOR 4G


PART A

1. What the needs are for cross layer design? (AU- Nov./Dec 2013 , April/May 2014)
OSI networking model, strict boundaries between layers are enforced, where data are kept
strictly within a given layer. Cross layer optimization removes such strict boundaries to allow
communication between layers by permitting one layer to access the data of another layer to
exchange information and enable interaction. For example, having knowledge of the current
physical state will help a channel allocation scheme or automatic repeat request (ARQ)
strategy at the MAC layer in optimizing tradeoffs and achieving throughput maximization

2. What are the parameter optimization techniques available? (AU- April/May


2014)
 Variational adjoint (VA) technique
 Micro genetic algorithm (Micro GA)

3. What is cross layer feedback? (AU- Nov./Dec


2013)
Cross-layer feedback means interaction among the layers (network layer and TCP in this
example) in the protocol stack. For the sake of convenience, cross-layer feedback can be
categorized as follows:
 Upper to lower layers.
 Lower to upper layers.

Mobile Ad hoc 29 KCE/ECE/QB/IV YR/ AD HOC


Format : QB06 Subject Code / Name: EC2050 Mobile Ad hoc Networks

4. What do you mean by encapsulation? (AU- May/June


2013)
Encapsulation is used to refer to the process of each layer at the sending computer adding its
own header information, in the form of meta-data to the actual payload (data).
Each layer’s header information would be interpreted and acted upon by a peer layer in
another machine.

5. What does cellular IP offer? (AU- May/June


2013)
 Mobile IP (or MIP) is an Internet Engineering Task Force (IETF) standard
communications protocol that is designed to allow mobile device users to move from one
network to another while maintaining a permanent IP address.
 Mobile IP was designed to support seamless and continuous Internet connectivity.
 Mobile IP is most often found in wired and wireless environments where users need to
carry their mobile devices across multiple LAN subnets

6. List the major issues in wireless internet. (AU-


Nov./Dec.2012)
 Security
 Higher Data Rates (Ultra Wide Band, Wireless USB, MIMO antennas)
 Longer Distance (Wimax > 1Mbps to 50 Km)
 Seamless Networking
 Mobility
 Multimedia over wireless
 Channel congestion in license exempt band

7. What do you mean by Wireless transport layer security (WTLS)? (AU-


Nov./Dec.2012)
Wireless Transport Layer Security (WTLS) module provides communication security with the
Wireless Application Protocol (WAP). WTLS is the security layer protocol that operates above
the transport layer.
The primary job of WTLS is to provide privacy, data integrity and authentication between
applications communicating using WAP. WTLS is based on and provides similar functionality
to the Transport Layer Security (TLS) protocol but is optimized for low bandwidth mobile
devices.

8. What is wireless internet? (AU- May/June


2012)
Wireless Internet enables wireless connectivity to the Internet via radio waves rather than
wires on a person's home computer, laptop, smart phone or similar mobile device. Wireless
Internet can be accessed directly through providers.

9. Define Wireless datagram protocol (WDP) (AU- May/June 2012)


Wireless Datagram Protocol defines the movement of information from receiver to the sender
and resembles the User Datagram Protocol in the Internet protocol suite. The Wireless

Mobile Ad hoc 30 KCE/ECE/QB/IV YR/ AD HOC


Format : QB06 Subject Code / Name: EC2050 Mobile Ad hoc Networks

Datagram Protocol (WDP), a protocol in WAP architecture, covers the Transport Layer
Protocols in the Internet model.

10. What do you mean by time to live (TTL)?


Time to live defines the number of Hops a particular packet can traverse.

11. Define tunneling.


Tunneling is a protocol that allows for the secure movement of data from one network to
another. Tunneling involves allowing private network communications to be sent across a
public network, such as the Internet, through a process called encapsulation. The
encapsulation process allows for data packets to appear as though they are of a public nature
to a public network when they are actually private data packets, allowing them to pass
through unnoticed. Tunneling is also known as port forwarding.

12. Give the categories of handoff.


Handoffs may be classified into two types:
 Hard Handoff: Characterized by an actual break in the connection while switching from
one cell or base station to another. The switch takes place so quickly that it can hardly be
noticed by the user. Because only one channel is needed to serve a system designed for
hard handoffs, it is the more affordable option. It is also sufficient for services that can
allow slight delays, such as mobile broadband Internet.
 Soft Handoff: Entails two connections to the cell phone from two different base
stations. This ensures that no break ensues during the handoff. Naturally, it is more costly
than a hard handoff.

13. What is protocol optimizer?


Protocol Optimization is the use of in-depth protocol knowledge to accelerate user response
time. By understanding the intricacies of how specific protocols function, For applications in
which requests are typically serialized (HTTP, CIFS), or for traditionally “chatty” applications
originally designed for LANs (CIFS, MAPI), the performance improvement gained by Protocol
Optimization.

14. Why ad hoc network is integrated with mobile IP?


Users with portable devices, like laptops and personal digital assistants (PDA), connecting to
foreign networks in the Internet want the same functionality as when connected to the home
network, as well as accessibility through the home IP address. Ad hoc networking is also of
major importance for connectivity between communicating mobile hosts without backbone
infrastructure and for connectivity to access points. Due to this reasons ad hoc network is
integrated with mobile IP.

15. What are the factors that affect effective cross layer design?
 Network performance.
 Network and environmental condition.
 Information sharing between the cross-layers.
 Non-adjacent layer communication.

Mobile Ad hoc 31 KCE/ECE/QB/IV YR/ AD HOC


Format : QB06 Subject Code / Name: EC2050 Mobile Ad hoc Networks

PART B

1. Describe how to integrate Ad hoc with mobile IP. What are the advantages? (16)
(AU- April/May 2014)
 Diagram (4)
 Explanation (8)
 Advantages (4)

2. (i) Explain any one of the cross layer optimization method and how it improve the
performance of the routing Ad hoc networks. (10) (AU- April/May 2014)
 Diagram (2)
 Optimization method (4)
 Performance (4)
(ii)Explain the operation of optimizing sub system (OSS). (6) (AU- April/May 2014)
 Diagram (2)
 Operation (4)

3. Give detailed description of Cross layer optimization.(16) (AU- Nov./Dec 2013)


 Diagram (4)
 Explanation (12)

4. Explain in detail about integration of ad hoc with mobile IP Networks.(16)


(AU- Nov/Dec 2013)
 Diagram (4)
 Explanation (12)

5. (i)Briefly discuss about cross over time prediction.(10) (AU- May/June 2013)
 Diagram (4)
 Explanation (4)
 Time prediction (2)
(ii)List the issues of utmost importance in mobile IP. (6) (AU- May/June 2013)
 Issues (3)
 Importance (3)

6. Explain COA, reverse tunneling and route optimization.(16) (AU- May/June 2013)
 Diagram (4)
 Explanation of COA (4)
 reverse tunneling (4)
 route optimization (4)

7. Explain the significant challenges of generic cross layer design.(16) (AU- Nov/Dec 2012)
 Diagram (4)
 Explanation (6)
 Significant challenges (6)

8. (i) Explain the features of a cross-layer model designed for multiuser scheduling. Also
Highlight how efficiency is improved through this model. (8) (AU- Nov/Dec. 2012).
 Diagram (2)
Mobile Ad hoc 32 KCE/ECE/QB/IV YR/ AD HOC
Format : QB06 Subject Code / Name: EC2050 Mobile Ad hoc Networks

 Explanation (2)
 Features (2)
 Efficiency improvement (2)

(ii) How link/MAC layer optimization is achieved with respect to its higher layers and
Physical layer? Also write its impact on bit rate and power control. (AU- Nov./Dec .2012 )
 Diagram (2)
 Explanation (4)
 Optimization (2)

9. Discuss in detail the integration of ad hoc with mobile IP networks. (16)


(AU- May/June 2012)
 Diagram (4)
 Explanation (4)
 Integration with mobile IP (8)

10. (i) Discuss briefly cross layer optimization technique in detail. (10) (AU- May/June 2012)
 Diagram (4)
 Explanation (3)
 Optimization technique (3)

(ii)Justify the need for cross layer design. (6) (AU- May/June 2012)
 Diagram (2)
 Justification (4)

*****************************

SUMMARY:

NO. OF QUESTIONS NO. OF QUESTIONS


UNIT NO.
IN 2 MARKS IN 16 MARKS

I 15 10

II 15 10

III 15 10

IV 15 10

V 15 10

TOTAL 75 50

Mobile Ad hoc 33 KCE/ECE/QB/IV YR/ AD HOC


Format : QB06 Subject Code / Name: EC2050 Mobile Ad hoc Networks

No. of sample university question Papers: 3

STAFF INCHARGE HOD/ECE

Mobile Ad hoc 34 KCE/ECE/QB/IV YR/ AD HOC

Вам также может понравиться