Sunteți pe pagina 1din 15

Format : QB06

Subject Code / Name: EC2050


Mobile Adhoc Networks

DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING


QUESTION BANK (MOBILE ADHOC NETWORKS)
Sub.Code

: EC2050

Branch/Year/Sem/Sec:

ECE/IV/VII /A & B
Sub.Name : Mobile Adhoc Networks

Batch

: 2011-2015
Staff Name: Mr.P.Raja Pirian / Mrs. D. Vennila

Academic Year

2014-2015(Even)

UNIT I INTRODUCTION
PART A
1. Why ad hoc networks are needed?
(AUMay/June 2012)
2. What are the challenging issues in ad hoc network maintenance?
(AUMay /June 2012)
3. Differentiate an ad hoc network and a cellular network with respect to
bandwidth usage and
Cost effectiveness.
(AU-Nov/
Dec.2012)
4. State Shannons theorem.
(AU- Nov/
Dec.2012)
5. List the transmission impediments of wireless channel.
(AUMay / June 2013)
6. Write the equation for maximum data rate according to Shannons
theorem.
(AU-May/ June
2013)
7. Define ad hoc networks?
(AU- Nov/
Dec.2013)
8. Write any two characteristics of Wireless channel?
(AU- Nov/
Dec.2013)
9. Compare Ad-hoc Networks and Wireless LAN.
(AUApril/May 2014)
10.
Define Scalability.
(AUApril/May 2014)
11.
Define path loss.

1.

PART B
(i)What are the characteristics and features of ad hoc networks?(6)
(AU-May/June 2012)
1 | 18
KCE/ECE/QB/IV YR/TV

Format : QB06

Subject Code / Name: EC2050


Mobile Adhoc Networks

Characteristics
Features
(ii)Discuss in detail ad hoc indoor
May/June 2012)
Diagram
Mobility models

(3)
(3)
mobility models.

(10) (AU-

(4)
(6)

2.
(i) Explain the application areas of ad hoc networks.
May/June 2012)
Application areas
(4)
Explanation
(4)
(ii) Discuss in detail the characteristics of wireless channels.
May/June 2012)
Diagram
(4)
Characteristics
(4)

(8)

(AU-

(8)

(AU-

3.
How mobility can be supported in todays internet? Explain using the
WAP model. Comment
On its challenges in maintaining ad hoc networks that are connect to
internet. (16)
(AU-Nov/Dec.2012)
Diagram
Mobility
WAP model
Challenges

(3)
(3)
(5)
(5)

4.
Briefly discuss about path loss and fading.
(16) (AUMay/June 2013)
Diagram
(6)
Path Loss
(5)
Fading
(5)

5.
(i) Explain the two main forms of interference, Doppler shift and Nyquist
theorem. (10)
(AU-May/June
2013)
Forms of interference (2)
Doppler shift
(4)
Nyquist theorem.
(4)
(ii) List the major advantages of Hybrid wireless Networks. (6)
May/June 2013)
Advantages
(6)

2 | 18
KCE/ECE/QB/IV YR/TV

(AU-

Format : QB06

6.
its

Subject Code / Name: EC2050


Mobile Adhoc Networks

Illustrate the characteristic features of Mobile ad hoc Networks and state

applications.
Dec.2013)
Diagram
(4)
characteristic features (8)
applications

(16) (AU- Nov/

(4)

7. Write in detail about Indoor and Outdoor models in Ad hoc mobility models.
(16)
(AU- Nov/ Dec.2013)
Diagram
Indoor models
Outdoor models

(4)
(6)
(6)

8. (i) Differentiate between cellular network and AdHoc Network. (8)(AUApril/May 2014)

Differentiation
(8)
(ii)What is replay attack? How it can be prevented?
(8)
(AUApril/May 2014)

Replay attack
(2)

Prevention method
(6)
9. (i) List out the major advantages of Ad hoc wireless Internet.
(6)
(AUApril/May 2014)

Advantages
(6)
(ii)Discuss the Pros and Cons of a routing protocol that uses GPS information
for an Ad hoc
wireless Network for search and rescue operation.
(10) (AUApril/May 2014)
Pros and Cons
(6)
Explanation
(4)
UNIT-II MEDIUM ACCESS PROTOCOLS
PART A
1. What are the classifications of MAC protocol?
(AU- May/
June 2012)
2. List the features of 802.15 standard.
(AU- May/
June 2012)
3. Compare the efficiency of the packet queuing mechanism adopted in MACA
and MACAW.
(AU- Nov/ Dec.
2012)
4. Define synchronous protocols.
(AU- May/
June 2013)
3 | 18
KCE/ECE/QB/IV YR/TV

Format : QB06

Subject Code / Name: EC2050


Mobile Adhoc Networks

5. Classify the channel of D-PRMA.


June 2013)
6. What are the goals of medium access protocol?
Nov/ Dec. 2013)

(AU- May/
(AU-

7.

What is meant by HIPERLAN?


(AU - Nov/ Dec.2013,
April 2014)
8.
What are the issues to be considered while designing a MAC protocol for
Ad-Hoc Networks?
(AU- April / May
2014)
9.
List the design goals of MAC protocol for ad- hoc networks.
10.
List the issues of designing a MAC protocol for ad hoc networks.
11.
What are the effects of exposed terminal problem in wireless networks?
12.
What are the advantages of directional antennas of MMAC over MACAW?
13.
What are the mechanisms used in MAC layer?
14.
What are the differences between HRMA and SRMA?
15.
List the five phases of FPRP.
16.
List any two needs of real- time MAC protocol.
17.
How is directional antenna MMAC superior over MACAW?
18.
Write the frame format of 802.11a.
19.
What is HIPERACCESS?
20.
What do you mean by contention based protocols?
21.
Give the classification of contention based protocol.
22.
Give the classifications of MAC protocols.
23.
List the main issues in designing a MAC protocol for ad hoc wireless
networks.
24.
What do you mean by FAMA?
25.
What do you mean by contention based protocols with reservation
mechanism?
26.
What do you mean by contention based protocols with scheduling
mechanism?
27.
What do you mean by D- PRMA
28.
What are the disadvantages of the binary exponential back off
mechanism used in MACA? How are they overcome in MACAW?
29.
What do you mean by BTMA?
30.
On what basis MACAW protocol is designed?
PART B
1. (i) Discuss in detail contention based protocols with scheduling and reservation.(12)
(AU- May/ June 2012)
Diagram
(4)
Explanation
(8)
(ii)Explain the HIPERLAN standards in detail.
(4)
(AU- May/ June 2012)
HIPERLAN standards
(4)
2. Explain 802.11g IEEE standard in detail.(16)
4 | 18
KCE/ECE/QB/IV YR/TV

(AU- May/ June 2012)

Format : QB06

Subject Code / Name: EC2050


Mobile Adhoc Networks

Diagram
802.11g IEEE standard
Explanation

(4)
(4)
(8)

3. How is scheduling mechanism achieved in distributed wireless ordering protocol? Explain in


detail. How are Information symmetry and perceived collisions handled?(16) (AU- Nov./Dec. 2012)
Scheduling Mechanism
(8)
Information symmetry
(4)
perceived collisions handled (4)
4. Illustrate various steps involved in five phase reservation protocol with its frame format.(16)
( AU- Nov./Dec2012)
Steps in phase reservation protocol (8)
Diagram
(4)
Frame format
(4)
5. List and explain the issues in designing a MAC protocol for ad hoc wireless networks.(16)
(AU- May/ June 2013)
Diagram
(4)
Explanation
(4)
Issues in MAC protocol design(8)
6. (i) List the important goals of designing a MAC protocol for ad hoc wireless networks.(12)
(AU- May/ June 2013)
Goals of MAC protocol
(6)
Explanation
(6)
(ii) Classify and define sender- initiated protocols. (4)
(AU- May/ June 2013)
Definition
(2)
Classification
(2)
7. Explain in detail about contention based protocols with reservation.(16)
Dec.2013)
Diagram
(4)
Explanation
(12)

(AU- Nov/

8. Describe IEEE Standards 802.15 in detail.(16)


Dec.2013)
IEEE standards
(4)
Diagram
(4)
Explanation
(8)

(AU- Nov/

9. (i) What are the advantages of reservation based MAC protocol over contention based MAC
protocol? (8)
(AU- April/May
2014)
Advantages
(4)
5 | 18
KCE/ECE/QB/IV YR/TV

Format : QB06

Subject Code / Name: EC2050


Mobile Adhoc Networks

Reservation based
(2)
Contention based
(2)
(ii) What are the advantages and disadvantages of MAC protocol using directional antennas? (8)
(AU- April/May
2014)
Advantages
Disadvantages

(4)
(4)

10. (i) Name the three MAC services provided by the IEEE 802.11 that are not provided in the
traditional LANs such as 802.3. (6)
(AU- April/May
2014)
MAC services by IEEE 802.11 (2)
Reason behind LAN 802.3
(4)
(ii) Discuss the various HIPERLAN standards defined for wireless Networks by ETSI.(6)
(AU- April/May
2014)

HIPERLAN standards(3)

Explanation (3)
(iii) How are directional antennas superior to MACAW? Explain with an example.(4)
(AU- April/May
2014)

Explanation(2)

Example
(2)

UNIT III NETWORK PROTOCOLS


PART A
1. Differentiate proactive and reactive protocols. Write examples for each.
(AU- May/ June
2012)
2. How does energy aware routing work?
(AU- May/
June 2012)
3. Is hop - length always the best metric for choosing paths in MANETs? Define
your answer.
(AU- Nov. /Dec.
2012)
4. AMRIS may to exhibit high packet delivery ratio even when all nodes restrict
their mobility
to a small region. Why?
(AU- Nov./
Dec.2012)
5. What does power aware routing aim?
(AU- May/
June 2013)
6. List the merits of geographical information assisted routing.
(AUMay/ June 2013)
6 | 18
KCE/ECE/QB/IV YR/TV

Format : QB06

Subject Code / Name: EC2050


Mobile Adhoc Networks

7. Differentiate proactive routing from reactive routing.


(AU- Nov.
/Dec. 2013)
8. What is meant by Hierarical routing?
(AU- Nov.
/Dec. 2013)
9. Differentiate proactive and reactive protocol.
(AUApril/May 2014)
10.
What are the advantages of hierarchical routing protocol?
(AUApril/May 2014)
11.
What are the responsibilities of routing protocol?
12.
What are the major challenges in designing routing protocols?
13.
List the characteristics of a routing protocol for ad hoc wireless
networks.
14.
What is the approach used to find link stability in ABR ?
15.
List the major classification of routing protocol for ad hoc wireless
network.
16.
Based on routing information update mechanism how the routing
protocols are classified?
17.
List the classification of routing protocols based on the routing
information update mechanism. List the approaches for power aware routing
protocol.
18.
Based on the use of temporal information for routing, how the routing
protocols are classified?
19.
Based on the routing topology how the routing protocols are classified?
20.
What need for power management in ad hoc network? is the
21.
List some examples of table driven routing protocols
22.
List the advantages and disadvantages of DSDV routing protocols.
23.
What is hybrid routing protocol?
24.
Mobility of nodes in a sparsely populated mobile ad ho network is less.
25.
What is the choice between proactive routing protocol and reactive
routing protocol?
26.
List the types of on-demand routing protocols.
27.
List the types of hybrid routing protocols.
28.
How on-demand routing protocols differ from on-demand routing
protocols?
29.
What are the advantages and disadvantages of dynamic source routing
protocol?(DSRP)
30.
What are the pros and cons of tree based and mesh based routing?
31.
What is call routing?
32.
Mention any four qualities of service metrics that are used to evaluate
the performance of the network?
33.
Where is network layer solution used for quality of service?
34.
State any four reasons that lead to the quick power drain of nodes in
mobile ad hoc network.
35.
Give the difference between Ad hoc on demand Distance vector routing
protocol(AODV) and dynamic sequence routing protocol (DSR)
PART B
7 | 18
KCE/ECE/QB/IV YR/TV

Format : QB06

Subject Code / Name: EC2050


Mobile Adhoc Networks

1.
(i) Explain on demand routing protocol in detail. (12)
May /June 2012)
Routing protocol Diagram
(4)
Explanation
(8)
(ii) Which QOS measure decides QOS aware routing? (4)
May /June 2012)
Explanation
(4)
2.

(AU-

(AU-

(i) Why Hybrid routing algorithm is used. Justify.


(6)
(AU- May /June 2012)
Hybrid routing algorithm
(6)
(ii) Briefly discuss about multicast routing algorithms.(10)
(AU- May
/June 2012)
Diagram
(3)
multicast routing algorithms(7)
3.
(i) With suitable trace, explain the route establishment in location aided
routing. (8)
(AU- Nov./Dec
2012)

Diagram & trace (4)

Explanation(4)
(ii)Device a pseudo code that present various steps involved in neighbor
Degree- Based
preferred link algorithm. (8)
(AUNov./Dec 2012)
Various steps
(4)
Explanation
(4)
4.
How is routing table constructed in fisheye state routing protocol?
Explain in detail. (16)
(AU- Nov./Dec
2012)

Construction
(4)

Diagram
(4)

Explanation(8)
5.
(i) Discuss the major challenges that a routing protocol designed for ad
hoc wireless network
faces. (10)
(AU- May
/June 2013)
Major challenges
(4)
Explanation
(6)
(ii) Discuss the types of ad hoc network routing protocols based on routing
information
update mechanism. (6)
(AU- May
/June 2013)
Different types
(3)
Explanation
(3)
8 | 18
KCE/ECE/QB/IV YR/TV

Format : QB06

Subject Code / Name: EC2050


Mobile Adhoc Networks

6.
(i) List the characteristics of ideal routing protocol for ad hoc wireless
network. (10)
(AU- May /June
2013)

Characteristics
(4)

Explanation
(6)
(ii) Classify and explain ad hoc wireless network based on routing topology. (6)
(AU- May /June
2013)
Classification of routing topology(3)
Explanation
(3)
7.

Discuss in detail about Unicast routing Algorithm.(16)


(AU- Nov./Dec 2013)
Diagram
(3)
Explanation
(8)
Algorithm
(5)

8.

Write Short note on.


(i)
Energy Aware routing algorithm.(8)
Nov./Dec 2013)

Diagram
(4)

Explanation
(4)
(ii)
QOS Aware Routing. (8)
Nov./Dec 2013)

Diagram
(4)

Explanation
(4)

(AU-

(AU-

9.
Describe how the packets are transmitted in multiple access collision
avoidance protocol.
(16)

(AU- April/May 2014)


Diagram
Transmission
Explanation

(4)
(8)
(4)

10.
Explain the scheduling table updates mechanism in distributed priority
scheduling. (!6)
(AU- April/May
2014)
Diagram
(4)
Explanation
(6)
Scheduling table
(6)
UNIT IV END-END DELIVERY AND SECURITY
9 | 18
KCE/ECE/QB/IV YR/TV

Format : QB06

Subject Code / Name: EC2050


Mobile Adhoc Networks

PART A
1. Why does TCP not work well in ad hoc network?
(AUMay/ June 2012)
2. What is byzantine attack?
(AU- May/
June 2012)
3. Assume that the TCP sender experiences a timeout when the current
congestion window size
is48 KB. Considering the MSS of 1 KB, calculate the size of the congestion
window for which
the next three transmissions will be successful.
(AUNov. / Dec .2012)
4. Comment on the use of natural language passwords directly for cryptographic
algorithms.
(AU- Nov./ Dec
2012)
5. List the objectives of transport layer protocol.
(AU- May/
June 2013)
6. Why does TCP-F provide a simple feedback based solution?
(AU- May/
June 2013)
7. Write about ad hoc transport protocols.
(AU- Nov. /
Dec .2013)
8. What are the issues in ad hoc networks?
(AU- Nov. /
Dec .2013)
9. What are the effects of induced traffic in Ad hoc network?
(AUApril/May 2014)
10.
Define Wormhole attack.
(AUApril/May 2014)
11.
What are the types of attacks in ad hoc wireless networks?
12.
What do you mean by passive attacks?
13.
What do you mean by active attacks?
14.
Define Denial of attack.
15.
List the major types of resource consumption attacks.
16.
List the major security threats that exist in ad hoc wireless networks.
17.
Give the major objectives of the transport layer protocol.
18.
What do you mean by quality of service (QoS) Provisioning?
19.
What is the typical value of time out period in traditional TCP? In what
ways these become a problem in mobile ad hoc networks
20.
List the issues and challenges in security provisioning of transport layer.
21.
Define secure routing.
22.
What are not supported by the traditional TCP for handling Adhoc
network?
23.
How is secure routing done on wireless channels?
24.
Why secure routing protocols are needed?
25.
Define QoS frame works
26.
What are the issues in designing transport layer protocol?
27.
List the issues in designing a transport layer protocol for Ad hoc wireless
networks.
10 | 18
KCE/ECE/QB/IV YR/TV

Format : QB06

Subject Code / Name: EC2050


Mobile Adhoc Networks

28.
wireless
29.
30.

List the goals to be achieved in transport layer protocol for Ad hoc


networks.
List the network security requirements.
List some of the network layer attacks.
PART B
1. (i) Discuss in detail feedback based TCP and TCP BUS in detail. (12)
(AUMay/ June 2012)
Diagram
(4)
Feedback based TCP
(4)
TCP Bus
(4)
(ii)Why secure routing protocols are needed? (4)
(AU- May/
June 2012)
Explanation
(4)
2. (i) Discuss briefly ad hoc TCP states and event action mapping. (8)
(AUMay/ June 2012)
Diagram
(2)
Explanation
(3)
Event action mapping (3)
(ii)Discuss in detail various network and application layer security attacks. (8)
(AU- May/ June
2012)

Diagram
(2)

Various network (3)

application layer attacks


(3)
3. With any five major reasons, analyze why TCP is exposed to significant
throughput
degradation in ad hoc networks. (16)
(AUNov./Dec 2012)
Diagram
(4)
Major reasons
(8)
Explanation
(4)
4. Explain various network and Transport layer security attacks in detail. (16)
(AU- Nov./Dec
2012)

Diagram
(4)

Network layer security


(8)

Transport layer security


(8)
5. Explain the issues in designing a transport layer protocol for ad hoc wireless
networks. (16)
(AU- May/ June
2013)
Diagram
(4)
Explanation
(8)
Design issues
(4)
11 | 18
KCE/ECE/QB/IV YR/TV

Format : QB06

Subject Code / Name: EC2050


Mobile Adhoc Networks

6. Why does TCP not perform well in ad hoc wireless network? Explain. (16)
(AU- May/ June
2013)

Diagram
(4)

Explanation(8)

Justification (4)
7. What are the design issues in transport layer? (16)
Nov./Dec 2013)
Diagram
(4)
Explanation
(6)
Design issues
(6)

(AU-

8. (i)Explain in detail about network security attacks. (8)


(AUNov./Dec 2013)
Diagram
(3)
Explanation
(5)
(ii)Explain the significance and design goals of transport layer protocol for ad
hoc network.
(8)
(AU- Nov./Dec
2013)
Diagram
(4)
Significance
(2)
Design Goals
(2)
9. (i)Discuss the effect of multiple breaks on a single path at the TCP- F sender.
(8)
(AU- April/May
2014)

Diagram
(3)

Explanation(6)
(ii)What is the impact of the failure of proxy nodes in split- TCP? (8)
(AUApril/May 2014)
Impact factors
(4)
Explanation
(4)
10.
that in

(i) Explain how the security provisioning in ad hoc network differs from

Infrastructure based network. (8)


(AUApril/May 2014)
Diagram
(4)
Explanation
(4)
(ii)List out and explain how some of the internet properties of the wireless Ad
hoc networks
introduce difficulties while implementing security in routing protocols. (8)
12 | 18
KCE/ECE/QB/IV YR/TV

Format : QB06

Subject Code / Name: EC2050


Mobile Adhoc Networks

(AU- April/May
2014)
Internet properties
Explanation

(4)
(4)

UNIT V CROSS LAYER DESIGN AND INTEGRATION OF ADHOC FOR 4G


PART A
1.
Why ad hoc network is integrated with mobile IP?
(AUMay/June 2012)
2.
What are the factors that affect effective cross layer design?
(AU- May/June 2012)
3.
State the use of embedded protocol boosters in cross layer optimization.
(AU- Nov.
/Dec.2012)
4.
State any two challenges faced by MANETs in adopting mobile IP. (AUNov./Dec.2012)
5.
How is deliverability understood?
(AUMay/June 2013)
6.
What does cellular IP offer?
(AUMay/June 2012)
7.
Define cross layer cautionary perspective.
(AUNov./Dec 2013)
8.
What the needs are for cross layer design?
(AU- Nov./Dec
2013 , April/May 2014)
9.
What are the parameter optimization techniques available?
(AUApril/May 2014)
10.
List the issues of integrating MANET with mobile IP network.
11.
What is wireless internet?
12.
List the major issues in wireless internet.
13.
What do you mean by encapsulation?
14.
Define tunneling.
15.
What do you mean by time to live (TTL)?
16.
Give the categories of handoff.
17.
What is cross layer feedback?
18.
What is the need for cross layer design?
19.
What is protocol optimizer?
20.
How application layer is integrated with its upper layer?
21.
List the four main categories of optimization.
22.
What do you mean by Wireless transport layer security (WTLS)?
23.
Define Wireless datagram protocol (WDP)
24.
What are the classifications of integrated mobile IP network?
PART B
1. Discuss in detail the integration of ad hoc with mobile IP networks. (16)
13 | 18
KCE/ECE/QB/IV YR/TV

Format : QB06

Subject Code / Name: EC2050


Mobile Adhoc Networks

(AU- May/June
2012)

Diagram
(4)
Explanation
Integration with mobile IP

(4)
(8)

2. (i) Discuss briefly cross layer optimization technique in detail. (10)


(AUMay/June 2012)
Diagram
(4)
Explanation
(3)
Optimization technique
(3)
(ii)Justify the need for cross layer design. (6)
(AUMay/June 2012)
Diagram
(2)
Justification
(4)
3. Explain the significant challenges of generic cross layer design.(16)
Nov./Dec 2012)
Diagram
(4)
Explanation
(6)
Significant challenges (6)

(AU-

4. (i) Explain the features of a cross-layer model designed for multiuser


scheduling. Also
Highlight how efficiency is improved through this model. (8)
(AUNov./Dec. 2012).
Diagram
(4)
Explanation
(4)
Features
(4)
Efficiency improvement
(4)
(ii) How link/MAC layer optimization is achieved with respect to its higher
layers and
Physical layer? Also write its impact on bit rate and power control. (AUNov./Dec .2012 )
Diagram
(2)
Explanation
(4)
Optimization
(2)
5. (i)Briefly discuss about cross over time prediction.(10)
May/June 2013)
Diagram
(4)
Explanation
(4)
Time prediction
(2)
(ii)List the issues of utmost importance in mobile IP. (6)
May/June 2013)
14 | 18
KCE/ECE/QB/IV YR/TV

(AU-

(AU-

Format : QB06

Subject Code / Name: EC2050


Mobile Adhoc Networks

Issues
Importance

(3)
(3)

6. Explain COA, reverse tunneling and route optimization.(16)


May/June 2013)
Diagram
(4)
Explanation of COA
(4)
reverse tunneling
(4)
route optimization
(4)

(AU-

7. Give detailed description of Cross layer optimization.(16)


Nov./Dec 2013)
Diagram
(4)
Explanation
(12)

(AU-

8. Explain in detail about integration of ad hoc with mobile IP Networks.(16)


(AU- Nov./Dec
2013)
Diagram
(4)
Explanation
(12)
9. Describe how to integrate Ad hoc with mobile IP. What are the advantages?
(16)
(AU- April/May
2014)
Diagram
(4)
Explanation
(8)
Advantages
(4)
10.
(i) Explain any one of the cross layer optimization method and how it
improve the
performance of the routing Ad hoc networks. (10)
(AUApril/May 2014)
Diagram
Optimization method
Performance

(2)
(4)
(4)

(ii)Explain the operation of optimizing sub system (OSS). (6)


Nov./Dec 2013)
Diagram
(2)
Operation
(4)

*****************************
15 | 18
KCE/ECE/QB/IV YR/TV

(AU-

S-ar putea să vă placă și