Escolar Documentos
Profissional Documentos
Cultura Documentos
: EC2050
Branch/Year/Sem/Sec:
ECE/IV/VII /A & B
Sub.Name : Mobile Adhoc Networks
Batch
: 2012-2016
UNIT I
INTRODUCTION
PART A
1.
PART B
1.
(i)What are the characteristics and features of ad hoc networks?(6)
May/June 2012)
Characteristics
(3)
Features
(3)
(AU-
3.
(10) (AU-
(AU-
(8)
(AU-
How mobility can be supported in todays internet? Explain using the WAP
model. Comment
On its challenges in maintaining ad hoc networks that are connect to
internet. (16)
(AU-Nov/Dec.2012)
Diagram
Mobility
WAP model
Challenges
(3)
(3)
(5)
(5)
4.
5.
(i) Explain the two main forms of interference, Doppler shift and Nyquist
theorem. (10)
(AU-May/June
2013)
Forms of interference (2)
Doppler shift
(4)
Nyquist theorem.
(4)
(ii) List the major advantages of Hybrid wireless Networks. (6)
May/June 2013)
Advantages
(6)
6.
(AU-
Illustrate the characteristic features of Mobile ad hoc Networks and state its
applications.
Dec.2013)
Diagram
(4)
characteristic features (8)
applications
(4)
7. Write in detail about Indoor and Outdoor models in Ad hoc mobility models.
(16)
(AU
Nov/ Dec.2013)
Diagram
Indoor models
Outdoor models
(4)
(6)
(6)
8. (i) Differentiate between cellular network and AdHoc Network. (8)(AUApril/May 2014)
Differentiation
(8)
(ii)What is replay attack? How it can be prevented?
(8)
(AUApril/May 2014)
Replay attack
(2)
Prevention method
(6)
9.
1.
2.
3.
4.
5.
7.
(AU- May/
(AU-
3.
Scheduling Mechanism
(8)
Information symmetry
(4)
4.
Illustrate various steps involved in five phase reservation protocol with its frame format.(16)
( AU- Nov./Dec2012)
Steps in phase reservation protocol (8)
Diagram
(4)
Frame format
(4)
5.
List and explain the issues in designing a MAC protocol for ad hoc wireless networks.(16)
(AU- May/ June 2013)
Diagram
(4)
Explanation
(4)
Issues in MAC protocol design(8)
6.
(i) List the important goals of designing a MAC protocol for ad hoc wireless networks.(12)
(AU- May/ June 2013)
Goals of MAC protocol
(6)
Explanation
(6)
(ii) Classify and define sender- initiated protocols. (4)
(AU- May/ June 2013)
Definition
(2)
Classification
(2)
7.
(AU- Nov/
8.
(AU- Nov/
9.
(i) What are the advantages of reservation based MAC protocol over contention based MAC
protocol? (8)
(AU- April/May
2014)
Advantages
(4)
Reservation based
(2)
Contention based
(2)
(ii) What are the advantages and disadvantages of MAC protocol using directional antennas? (8)
(AU- April/May
2014)
Advantages
Disadvantages
(4)
(4)
10. (i) Name the three MAC services provided by the IEEE 802.11 that are not provided in the
traditional LANs such as 802.3. (6)
(AU- April/May
2014)
MAC services by IEEE 802.11 (2)
Reason behind LAN 802.3
(4)
(ii) Discuss the various HIPERLAN standards defined for wireless Networks by ETSI.(6)
(AU- April/May
2014)
HIPERLAN standards(3)
Explanation (3)
(iii) How are directional antennas superior to MACAW? Explain with an example.(4)
(AU- April/May
2014)
Explanation(2)
Example
(2)
35. Give the difference between Ad hoc on demand Distance vector routing
protocol(AODV) and dynamic sequence routing protocol (DSR)
PART B
1.
(i) Explain on demand routing protocol in detail. (12)
(AU- May
/June 2012)
Explanation
(8)
(ii) Which QOS measure decides QOS aware routing? (4)
(AUMay /June 2012)
Explanation
(4)
2.
Diagram
(3)
Major challenges
(4)
Explanation
(6)
(ii) Discuss the types of ad hoc network routing protocols based on routing
information
update mechanism. (6)
(AU- May
/June 2013)
Different types
(3)
Explanation
(3)
6.
(i) List the characteristics of ideal routing protocol for ad hoc wireless network.
(10)
(AU- May /June
2013)
Characteristics
(4)
Explanation
(6)
(ii) Classify and explain ad hoc wireless network based on routing topology. (6)
(AU- May /June
2013)
Classification of routing topology(3)
Explanation
(3)
7.
8.
9.
(AU-
(AU-
(AU-
(AU
April/May 2014)
Diagram
Transmission
Explanation
(4)
(8)
(4)
Diagram
(4)
Explanation
(6)
Scheduling table
(6)
16. List the major security threats that exist in ad hoc wireless networks.
17. Give the major objectives of the transport layer protocol.
18. What do you mean by quality of service (QoS) Provisioning?
19. What is the typical value of time out period in traditional TCP? In what ways
these become a problem in mobile ad hoc networks
20. List the issues and challenges in security provisioning of transport layer.
21. Define secure routing.
22. What are not supported by the traditional TCP for handling Adhoc network?
23. How is secure routing done on wireless channels?
24. Why secure routing protocols are needed?
25. Define QoS frame works
26. What are the issues in designing transport layer protocol?
27. List the issues in designing a transport layer protocol for Ad hoc wireless
networks.
28. List the goals to be achieved in transport layer protocol for Ad hoc wireless
networks.
29. List the network security requirements.
30. List some of the network layer attacks.
PART B
1.
(i) Discuss in detail feedback based TCP and TCP BUS in detail. (12)
(AUMay/ June 2012)
Diagram
(4)
Feedback based TCP
(4)
TCP Bus
(4)
(ii)Why secure routing protocols are needed? (4)
(AU- May/
June 2012)
Explanation
(4)
2.
(i) Discuss briefly ad hoc TCP states and event action mapping. (8)
(AUMay/ June 2012)
Diagram
(2)
Explanation
(3)
Event action mapping (3)
(ii)Discuss in detail various network and application layer security attacks. (8)
(AU- May/ June
2012)
Diagram
(2)
Various network (3)
application layer attacks
(3)
3.
With any five major reasons, analyze why TCP is exposed to significant
throughput
degradation in ad hoc networks. (16)
(AUNov./Dec 2012)
Diagram
(4)
4.
5.
Major reasons
(8)
Explanation
(4)
Explain various network and Transport layer security attacks in detail. (16)
(AU- Nov./Dec
2012)
Diagram
(4)
Network layer security (8)
Transport layer security (8)
Explain the issues in designing a transport layer protocol for ad hoc wireless
networks. (16)
(AU- May/ June
2013)
Diagram
(4)
Explanation
(8)
Design issues
(4)
6.
Why does TCP not perform well in ad hoc wireless network? Explain. (16)
(AU- May/ June
2013)
Diagram
(4)
Explanation(8)
Justification (4)
7.
8.
Diagram
(4)
Significance
(2)
Design Goals
(2)
9.
(i)Discuss the effect of multiple breaks on a single path at the TCP- F sender.
(8)
(AU-
(AU- April/May
2014)
Diagram
(3)
Explanation(6)
(ii)What is the impact of the failure of proxy nodes in split- TCP? (8)
April/May 2014)
Impact factors
(4)
Explanation
(4)
(AU-
10.
(i) Explain how the security provisioning in ad hoc network differs from that in
Infrastructure based network. (8)
(AUApril/May 2014)
Diagram
(4)
Explanation
(4)
(ii)List out and explain how some of the internet properties of the wireless Ad
hoc networks
introduce difficulties while implementing security in routing protocols. (8)
(AU- April/May
2014)
Internet properties
(4)
Explanation
(4)
1.
2.
3.
4.
5.
6.
7.
8.
9.
(AU-
PART B
1.
2.
3.
(AU-
4.
Diagram
(4)
Explanation
(4)
Features
(4)
Efficiency improvement
(4)
(ii) How link/MAC layer optimization is achieved with respect to its higher
layers and
Physical layer? Also write its impact on bit rate and power control. (AUNov./Dec .2012 )
Diagram
(2)
Explanation
(4)
Optimization
(2)
5.
Issues
(3)
Importance
(3)
(AU-
(AU-
6.
(AU-
7.
(AU-
8.
9.
Describe how to integrate Ad hoc with mobile IP. What are the advantages?
(16)
(AU- April/May
2014)
Diagram
(4)
Explanation
(8)
Advantages
(4)
10. (i) Explain any one of the cross layer optimization method and how it improve
the
performance of the routing Ad hoc networks. (10)
(AUApril/May 2014)
Diagram
Optimization method
Performance
(2)
(4)
(4)
(AU-