Você está na página 1de 16

KONGUNADU COLLEGE OF ENGINEERING &TECHNOLOGY

DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING


QUESTION BANK (MOBILE ADHOC NETWORKS)
Sub.Code

: EC2050

Branch/Year/Sem/Sec:

ECE/IV/VII /A & B
Sub.Name : Mobile Adhoc Networks

Batch

: 2012-2016

UNIT I

INTRODUCTION

PART A
1.

Why ad hoc networks are needed?


(AUMay/June 2012)
2.
What are the challenging issues in ad hoc network maintenance?
(AUMay /June 2012)
3.
Differentiate an ad hoc network and a cellular network with respect to
bandwidth usage and
Cost effectiveness.
(AU-Nov/
Dec.2012)
4.
State Shannons theorem.
(AU- Nov/
Dec.2012)
5.
List the transmission impediments of wireless channel.
(AUMay / June 2013)
6.
Write the equation for maximum data rate according to Shannons
theorem.
(AU-May/ June
2013)
7.
Define ad hoc networks?
(AU- Nov/
Dec.2013)
8.
Write any two characteristics of Wireless channel?
(AU- Nov/
Dec.2013)
9.
Compare Ad-hoc Networks and Wireless LAN.
(AUApril/May 2014)
10. Define Scalability.
(AUApril/May 2014)
11. Define path loss.

PART B
1.
(i)What are the characteristics and features of ad hoc networks?(6)
May/June 2012)
Characteristics
(3)
Features
(3)

(AU-

(ii)Discuss in detail ad hoc indoor mobility models.


May/June 2012)
Diagram
(4)
Mobility models
(6)
2.

3.

(10) (AU-

(i) Explain the application areas of ad hoc networks.


(8)
May/June 2012)
Application areas
(4)
Explanation
(4)
(ii) Discuss in detail the characteristics of wireless channels.
May/June 2012)
Diagram
(4)
Characteristics
(4)

(AU-

(8)

(AU-

How mobility can be supported in todays internet? Explain using the WAP
model. Comment
On its challenges in maintaining ad hoc networks that are connect to
internet. (16)
(AU-Nov/Dec.2012)
Diagram
Mobility
WAP model
Challenges

(3)
(3)
(5)
(5)

4.

Briefly discuss about path loss and fading.


(16) (AUMay/June 2013)
Diagram
(6)
Path Loss
(5)
Fading
(5)

5.
(i) Explain the two main forms of interference, Doppler shift and Nyquist
theorem. (10)
(AU-May/June
2013)
Forms of interference (2)
Doppler shift
(4)
Nyquist theorem.
(4)
(ii) List the major advantages of Hybrid wireless Networks. (6)
May/June 2013)
Advantages
(6)
6.

(AU-

Illustrate the characteristic features of Mobile ad hoc Networks and state its

applications.
Dec.2013)
Diagram
(4)
characteristic features (8)
applications

(16) (AU- Nov/

(4)

7. Write in detail about Indoor and Outdoor models in Ad hoc mobility models.
(16)
(AU

Nov/ Dec.2013)
Diagram
Indoor models
Outdoor models

(4)
(6)
(6)

8. (i) Differentiate between cellular network and AdHoc Network. (8)(AUApril/May 2014)
Differentiation
(8)
(ii)What is replay attack? How it can be prevented?
(8)
(AUApril/May 2014)
Replay attack
(2)
Prevention method
(6)

9.

1.
2.
3.

4.

(i) List out the major advantages of Ad hoc wireless Internet.


(6)
(AUApril/May 2014)
Advantages
(6)
(ii)Discuss the Pros and Cons of a routing protocol that uses GPS information
for an Ad hoc
wireless Network for search and rescue operation.
(10) (AUApril/May 2014)
Pros and Cons
(6)
Explanation
(4)
UNIT-II MEDIUM ACCESS PROTOCOLS
PART A
What are the classifications of MAC protocol?
(AU- May/
June 2012)
List the features of 802.15 standard.
(AU- May/
June 2012)
Compare the efficiency of the packet queuing mechanism adopted in MACA
and MACAW.
(AU- Nov/ Dec.
2012)
Define synchronous protocols.
(AU- May/
June 2013)

5.

7.

Classify the channel of D-PRMA.


June 2013)
6. What are the goals of medium access protocol?
Nov/ Dec. 2013)

(AU- May/
(AU-

What is meant by HIPERLAN?


(AU - Nov/ Dec.2013, April
2014)
8.
What are the issues to be considered while designing a MAC protocol for AdHoc Networks?
(AU- April / May
2014)
9.
List the design goals of MAC protocol for ad- hoc networks.
10. List the issues of designing a MAC protocol for ad hoc networks.
11. What are the effects of exposed terminal problem in wireless networks?
12. What are the advantages of directional antennas of MMAC over MACAW?
13. What are the mechanisms used in MAC layer?
14. What are the differences between HRMA and SRMA?
15. List the five phases of FPRP.
16. List any two needs of real- time MAC protocol.
17. How is directional antenna MMAC superior over MACAW?
18. Write the frame format of 802.11a.
19. What is HIPERACCESS?
20. What do you mean by contention based protocols?
21. Give the classification of contention based protocol.
22. Give the classifications of MAC protocols.
23. List the main issues in designing a MAC protocol for ad hoc wireless networks.
24. What do you mean by FAMA?
25. What do you mean by contention based protocols with reservation
mechanism?
26. What do you mean by contention based protocols with scheduling
mechanism?
27. What do you mean by D- PRMA
28. What are the disadvantages of the binary exponential back off mechanism
used in MACA? How are they overcome in MACAW?
29. What do you mean by BTMA?
30. On what basis MACAW protocol is designed?
PART B
1. (i) Discuss in detail contention based protocols with scheduling and reservation.(12)
(AU- May/ June 2012)
Diagram
(4)
Explanation
(8)
(ii)Explain the HIPERLAN standards in detail.
(4)
(AU- May/ June 2012)
HIPERLAN standards
(4)

2. Explain 802.11g IEEE standard in detail.(16)


Diagram
(4)
802.11g IEEE standard
(4)
Explanation
(8)

(AU- May/ June 2012)

3.

How is scheduling mechanism achieved in distributed wireless ordering protocol? Explain in


detail. How are Information symmetry and perceived collisions handled?(16) (AU- Nov./Dec. 2012)

Scheduling Mechanism
(8)

Information symmetry
(4)

perceived collisions handled (4)

4.

Illustrate various steps involved in five phase reservation protocol with its frame format.(16)
( AU- Nov./Dec2012)
Steps in phase reservation protocol (8)
Diagram
(4)
Frame format
(4)

5.

List and explain the issues in designing a MAC protocol for ad hoc wireless networks.(16)
(AU- May/ June 2013)
Diagram
(4)
Explanation
(4)
Issues in MAC protocol design(8)

6.

(i) List the important goals of designing a MAC protocol for ad hoc wireless networks.(12)
(AU- May/ June 2013)
Goals of MAC protocol
(6)
Explanation
(6)
(ii) Classify and define sender- initiated protocols. (4)
(AU- May/ June 2013)

Definition
(2)

Classification
(2)

7.

Explain in detail about contention based protocols with reservation.(16)


Dec.2013)
Diagram
(4)
Explanation
(12)

(AU- Nov/

8.

Describe IEEE Standards 802.15 in detail.(16)


Dec.2013)
IEEE standards
(4)
Diagram
(4)
Explanation
(8)

(AU- Nov/

9.

(i) What are the advantages of reservation based MAC protocol over contention based MAC

protocol? (8)
(AU- April/May
2014)

Advantages
(4)

Reservation based
(2)

Contention based
(2)
(ii) What are the advantages and disadvantages of MAC protocol using directional antennas? (8)
(AU- April/May
2014)
Advantages
Disadvantages

(4)
(4)

10. (i) Name the three MAC services provided by the IEEE 802.11 that are not provided in the
traditional LANs such as 802.3. (6)
(AU- April/May
2014)
MAC services by IEEE 802.11 (2)
Reason behind LAN 802.3
(4)
(ii) Discuss the various HIPERLAN standards defined for wireless Networks by ETSI.(6)
(AU- April/May
2014)
HIPERLAN standards(3)
Explanation (3)
(iii) How are directional antennas superior to MACAW? Explain with an example.(4)
(AU- April/May
2014)
Explanation(2)
Example
(2)

UNIT III NETWORK PROTOCOLS


PART A
1.

Differentiate proactive and reactive protocols. Write examples for each.


(AU- May/ June
2012)
2.
How does energy aware routing work?
(AU- May/
June 2012)
3.
Is hop - length always the best metric for choosing paths in MANETs? Define
your answer.
(AU- Nov. /Dec.
2012)
4.
AMRIS may to exhibit high packet delivery ratio even when all nodes restrict
their mobility

to a small region. Why?


(AU- Nov./
Dec.2012)
5.
What does power aware routing aim?
(AU- May/
June 2013)
6.
List the merits of geographical information assisted routing.
(AUMay/ June 2013)
7.
Differentiate proactive routing from reactive routing.
(AU- Nov.
/Dec. 2013)
8.
What is meant by Hierarical routing?
(AU- Nov.
/Dec. 2013)
9.
Differentiate proactive and reactive protocol.
(AUApril/May 2014)
10. What are the advantages of hierarchical routing protocol?
(AUApril/May 2014)
11. What are the responsibilities of routing protocol?
12. What are the major challenges in designing routing protocols?
13. List the characteristics of a routing protocol for ad hoc wireless networks.
14. What is the approach used to find link stability in ABR ?
15. List the major classification of routing protocol for ad hoc wireless network.
16. Based on routing information update mechanism how the routing protocols are
classified?
17. List the classification of routing protocols based on the routing information
update mechanism. List the approaches for power aware routing protocol.
18. Based on the use of temporal information for routing, how the routing
protocols are classified?
19. Based on the routing topology how the routing protocols are classified?
20. What need for power management in ad hoc network? is the
21. List some examples of table driven routing protocols
22. List the advantages and disadvantages of DSDV routing protocols.
23. What is hybrid routing protocol?
24. Mobility of nodes in a sparsely populated mobile ad ho network is less.
25.
What is the choice between proactive routing protocol and reactive routing
protocol?
26. List the types of on-demand routing protocols.
27. List the types of hybrid routing protocols.
28. How on-demand routing protocols differ from on-demand routing protocols?
29. What are the advantages and disadvantages of dynamic source routing
protocol?(DSRP)
30. What are the pros and cons of tree based and mesh based routing?
31. What is call routing?
32. Mention any four qualities of service metrics that are used to evaluate the
performance of the network?
33. Where is network layer solution used for quality of service?
34. State any four reasons that lead to the quick power drain of nodes in mobile
ad hoc network.

35. Give the difference between Ad hoc on demand Distance vector routing
protocol(AODV) and dynamic sequence routing protocol (DSR)
PART B
1.
(i) Explain on demand routing protocol in detail. (12)
(AU- May
/June 2012)

Routing protocol Diagram


(4)

Explanation
(8)
(ii) Which QOS measure decides QOS aware routing? (4)
(AUMay /June 2012)

Explanation
(4)
2.

(i) Why Hybrid routing algorithm is used. Justify.


(6)
(AUMay /June 2012)
Hybrid routing algorithm
(6)
(ii) Briefly discuss about multicast routing algorithms.(10)
(AU- May
/June 2012)

Diagram
(3)

multicast routing algorithms(7)


3.
(i) With suitable trace, explain the route establishment in location aided
routing. (8)
(AU- Nov./Dec
2012)
Diagram & trace (4)
Explanation(4)
(ii)Device a pseudo code that present various steps involved in neighbor
Degree- Based
preferred link algorithm. (8)
(AUNov./Dec 2012)
Various steps
(4)
Explanation
(4)
4.
How is routing table constructed in fisheye state routing protocol? Explain in
detail. (16)
(AU- Nov./Dec
2012)
Construction
(4)
Diagram
(4)
Explanation(8)
5.
(i) Discuss the major challenges that a routing protocol designed for ad hoc
wireless network
faces. (10)
(AU- May
/June 2013)

Major challenges
(4)

Explanation
(6)

(ii) Discuss the types of ad hoc network routing protocols based on routing
information
update mechanism. (6)
(AU- May
/June 2013)

Different types
(3)

Explanation
(3)
6.

(i) List the characteristics of ideal routing protocol for ad hoc wireless network.
(10)
(AU- May /June
2013)

Characteristics
(4)

Explanation
(6)
(ii) Classify and explain ad hoc wireless network based on routing topology. (6)
(AU- May /June
2013)
Classification of routing topology(3)
Explanation
(3)
7.

8.

9.

Discuss in detail about Unicast routing Algorithm.(16)


Nov./Dec 2013)
Diagram
(3)
Explanation
(8)
Algorithm
(5)
Write Short note on.
(i)
Energy Aware routing algorithm.(8)
Nov./Dec 2013)
Diagram
(4)
Explanation
(4)
(ii)
QOS Aware Routing. (8)
Nov./Dec 2013)
Diagram
(4)
Explanation
(4)

(AU-

(AU-

(AU-

Describe how the packets are transmitted in multiple access collision


avoidance protocol.
(16)

(AU

April/May 2014)
Diagram
Transmission
Explanation

(4)
(8)
(4)

10. Explain the scheduling table updates mechanism in distributed priority


scheduling. (!6)
(AU- April/May
2014)

Diagram
(4)

Explanation
(6)

Scheduling table
(6)

UNIT IV END-END DELIVERY AND SECURITY


PART A
1.

Why does TCP not work well in ad hoc network?


(AUMay/ June 2012)
2.
What is byzantine attack?
(AU- May/
June 2012)
3.
Assume that the TCP sender experiences a timeout when the current
congestion window size
is48 KB. Considering the MSS of 1 KB, calculate the size of the congestion
window for which
the next three transmissions will be successful.
(AUNov. / Dec .2012)
4.
Comment on the use of natural language passwords directly for cryptographic
algorithms.
(AU- Nov./ Dec
2012)
5.
List the objectives of transport layer protocol.
(AU- May/
June 2013)
6.
Why does TCP-F provide a simple feedback based solution?
(AU- May/
June 2013)
7.
Write about ad hoc transport protocols.
(AU- Nov. /
Dec .2013)
8.
What are the issues in ad hoc networks?
(AU- Nov. /
Dec .2013)
9.
What are the effects of induced traffic in Ad hoc network?
(AUApril/May 2014)
10. Define Wormhole attack.
(AUApril/May 2014)
11. What are the types of attacks in ad hoc wireless networks?
12. What do you mean by passive attacks?
13. What do you mean by active attacks?
14. Define Denial of attack.
15. List the major types of resource consumption attacks.

16. List the major security threats that exist in ad hoc wireless networks.
17. Give the major objectives of the transport layer protocol.
18. What do you mean by quality of service (QoS) Provisioning?
19. What is the typical value of time out period in traditional TCP? In what ways
these become a problem in mobile ad hoc networks
20. List the issues and challenges in security provisioning of transport layer.
21. Define secure routing.
22. What are not supported by the traditional TCP for handling Adhoc network?
23. How is secure routing done on wireless channels?
24. Why secure routing protocols are needed?
25. Define QoS frame works
26. What are the issues in designing transport layer protocol?
27. List the issues in designing a transport layer protocol for Ad hoc wireless
networks.
28. List the goals to be achieved in transport layer protocol for Ad hoc wireless
networks.
29. List the network security requirements.
30. List some of the network layer attacks.
PART B
1.
(i) Discuss in detail feedback based TCP and TCP BUS in detail. (12)
(AUMay/ June 2012)
Diagram
(4)
Feedback based TCP
(4)
TCP Bus
(4)
(ii)Why secure routing protocols are needed? (4)
(AU- May/
June 2012)
Explanation
(4)
2.

(i) Discuss briefly ad hoc TCP states and event action mapping. (8)
(AUMay/ June 2012)
Diagram
(2)
Explanation
(3)
Event action mapping (3)
(ii)Discuss in detail various network and application layer security attacks. (8)
(AU- May/ June
2012)
Diagram
(2)
Various network (3)
application layer attacks
(3)
3.
With any five major reasons, analyze why TCP is exposed to significant
throughput
degradation in ad hoc networks. (16)
(AUNov./Dec 2012)

Diagram
(4)

4.

5.

Major reasons
(8)

Explanation
(4)
Explain various network and Transport layer security attacks in detail. (16)
(AU- Nov./Dec
2012)
Diagram
(4)
Network layer security (8)
Transport layer security (8)
Explain the issues in designing a transport layer protocol for ad hoc wireless
networks. (16)
(AU- May/ June
2013)

Diagram
(4)

Explanation
(8)

Design issues
(4)

6.

Why does TCP not perform well in ad hoc wireless network? Explain. (16)
(AU- May/ June
2013)
Diagram
(4)
Explanation(8)
Justification (4)

7.

What are the design issues in transport layer? (16)


Nov./Dec 2013)
Diagram
(4)
Explanation
(6)
Design issues
(6)

8.

(i)Explain in detail about network security attacks. (8)


(AUNov./Dec 2013)
Diagram
(3)
Explanation
(5)
(ii)Explain the significance and design goals of transport layer protocol for ad
hoc network.
(8)
(AU- Nov./Dec
2013)

Diagram
(4)

Significance
(2)

Design Goals
(2)

9.

(i)Discuss the effect of multiple breaks on a single path at the TCP- F sender.
(8)

(AU-

(AU- April/May
2014)
Diagram
(3)
Explanation(6)
(ii)What is the impact of the failure of proxy nodes in split- TCP? (8)
April/May 2014)

Impact factors
(4)

Explanation
(4)

(AU-

10.

(i) Explain how the security provisioning in ad hoc network differs from that in
Infrastructure based network. (8)
(AUApril/May 2014)
Diagram
(4)
Explanation
(4)
(ii)List out and explain how some of the internet properties of the wireless Ad
hoc networks
introduce difficulties while implementing security in routing protocols. (8)
(AU- April/May
2014)
Internet properties
(4)
Explanation
(4)

1.
2.
3.

4.
5.
6.
7.
8.

UNIT V CROSS LAYER DESIGN AND INTEGRATION OF ADHOC FOR 4G


PART A
Why ad hoc network is integrated with mobile IP?
(AUMay/June 2012)
What are the factors that affect effective cross layer design?
(AUMay/June 2012)
State the use of embedded protocol boosters in cross layer optimization.
(AU- Nov.
/Dec.2012)
State any two challenges faced by MANETs in adopting mobile IP. (AUNov./Dec.2012)
How is deliverability understood?
(AUMay/June 2013)
What does cellular IP offer?
(AUMay/June 2012)
Define cross layer cautionary perspective.
(AUNov./Dec 2013)
What the needs are for cross layer design?
(AU- Nov./Dec 2013 ,
April/May 2014)

9.

What are the parameter optimization techniques available?


April/May 2014)
10. List the issues of integrating MANET with mobile IP network.
11. What is wireless internet?
12. List the major issues in wireless internet.
13. What do you mean by encapsulation?
14. Define tunneling.
15. What do you mean by time to live (TTL)?
16. Give the categories of handoff.
17. What is cross layer feedback?
18. What is the need for cross layer design?
19. What is protocol optimizer?
20. How application layer is integrated with its upper layer?
21. List the four main categories of optimization.
22. What do you mean by Wireless transport layer security (WTLS)?
23. Define Wireless datagram protocol (WDP)
24. What are the classifications of integrated mobile IP network?

(AU-

PART B
1.

Discuss in detail the integration of ad hoc with mobile IP networks. (16)


(AU- May/June
2012)
Diagram
(4)
Explanation
(4)
Integration with mobile IP
(8)

2.

(i) Discuss briefly cross layer optimization technique in detail. (10)


(AUMay/June 2012)
Diagram
(4)
Explanation
(3)
Optimization technique
(3)
(ii)Justify the need for cross layer design. (6)
(AUMay/June 2012)
Diagram
(2)
Justification
(4)

3.

Explain the significant challenges of generic cross layer design.(16)


Nov./Dec 2012)
Diagram
(4)
Explanation
(6)
Significant challenges (6)

(AU-

4.

(i) Explain the features of a cross-layer model designed for multiuser


scheduling. Also
Highlight how efficiency is improved through this model. (8)
(AUNov./Dec. 2012).

Diagram
(4)

Explanation
(4)

Features
(4)

Efficiency improvement
(4)
(ii) How link/MAC layer optimization is achieved with respect to its higher
layers and
Physical layer? Also write its impact on bit rate and power control. (AUNov./Dec .2012 )

Diagram
(2)

Explanation
(4)

Optimization
(2)

5.

(i)Briefly discuss about cross over time prediction.(10)


May/June 2013)
Diagram
(4)
Explanation
(4)
Time prediction
(2)
(ii)List the issues of utmost importance in mobile IP. (6)
May/June 2013)

Issues
(3)

Importance
(3)

(AU-

(AU-

6.

Explain COA, reverse tunneling and route optimization.(16)


May/June 2013)
Diagram
(4)
Explanation of COA
(4)
reverse tunneling
(4)
route optimization
(4)

(AU-

7.

Give detailed description of Cross layer optimization.(16)


Nov./Dec 2013)
Diagram
(4)
Explanation
(12)

(AU-

8.

Explain in detail about integration of ad hoc with mobile IP Networks.(16)


(AU- Nov./Dec
2013)
Diagram
(4)
Explanation
(12)

9.

Describe how to integrate Ad hoc with mobile IP. What are the advantages?
(16)
(AU- April/May
2014)
Diagram
(4)
Explanation
(8)
Advantages
(4)

10. (i) Explain any one of the cross layer optimization method and how it improve
the
performance of the routing Ad hoc networks. (10)
(AUApril/May 2014)
Diagram
Optimization method
Performance

(2)
(4)
(4)

(ii)Explain the operation of optimizing sub system (OSS). (6)


Nov./Dec 2013)
Diagram
(2)
Operation
(4)
*****************************

(AU-

Você também pode gostar