Documente Academic
Documente Profesional
Documente Cultură
: EC2050
Branch/Year/Sem/Sec:
ECE/IV/VII /A & B
Sub.Name : Mobile Adhoc Networks
Batch
: 2011-2015
Staff Name: Mr.P.Raja Pirian / Mrs. D. Vennila
Academic Year
2014-2015(Even)
UNIT I INTRODUCTION
PART A
1. Why ad hoc networks are needed?
(AUMay/June 2012)
2. What are the challenging issues in ad hoc network maintenance?
(AUMay /June 2012)
3. Differentiate an ad hoc network and a cellular network with respect to
bandwidth usage and
Cost effectiveness.
(AU-Nov/
Dec.2012)
4. State Shannons theorem.
(AU- Nov/
Dec.2012)
5. List the transmission impediments of wireless channel.
(AUMay / June 2013)
6. Write the equation for maximum data rate according to Shannons
theorem.
(AU-May/ June
2013)
7. Define ad hoc networks?
(AU- Nov/
Dec.2013)
8. Write any two characteristics of Wireless channel?
(AU- Nov/
Dec.2013)
9. Compare Ad-hoc Networks and Wireless LAN.
(AUApril/May 2014)
10.
Define Scalability.
(AUApril/May 2014)
11.
Define path loss.
1.
PART B
(i)What are the characteristics and features of ad hoc networks?(6)
(AU-May/June 2012)
1 | 18
KCE/ECE/QB/IV YR/TV
Format : QB06
Characteristics
Features
(ii)Discuss in detail ad hoc indoor
May/June 2012)
Diagram
Mobility models
(3)
(3)
mobility models.
(10) (AU-
(4)
(6)
2.
(i) Explain the application areas of ad hoc networks.
May/June 2012)
Application areas
(4)
Explanation
(4)
(ii) Discuss in detail the characteristics of wireless channels.
May/June 2012)
Diagram
(4)
Characteristics
(4)
(8)
(AU-
(8)
(AU-
3.
How mobility can be supported in todays internet? Explain using the
WAP model. Comment
On its challenges in maintaining ad hoc networks that are connect to
internet. (16)
(AU-Nov/Dec.2012)
Diagram
Mobility
WAP model
Challenges
(3)
(3)
(5)
(5)
4.
Briefly discuss about path loss and fading.
(16) (AUMay/June 2013)
Diagram
(6)
Path Loss
(5)
Fading
(5)
5.
(i) Explain the two main forms of interference, Doppler shift and Nyquist
theorem. (10)
(AU-May/June
2013)
Forms of interference (2)
Doppler shift
(4)
Nyquist theorem.
(4)
(ii) List the major advantages of Hybrid wireless Networks. (6)
May/June 2013)
Advantages
(6)
2 | 18
KCE/ECE/QB/IV YR/TV
(AU-
Format : QB06
6.
its
applications.
Dec.2013)
Diagram
(4)
characteristic features (8)
applications
(4)
7. Write in detail about Indoor and Outdoor models in Ad hoc mobility models.
(16)
(AU- Nov/ Dec.2013)
Diagram
Indoor models
Outdoor models
(4)
(6)
(6)
8. (i) Differentiate between cellular network and AdHoc Network. (8)(AUApril/May 2014)
Differentiation
(8)
(ii)What is replay attack? How it can be prevented?
(8)
(AUApril/May 2014)
Replay attack
(2)
Prevention method
(6)
9. (i) List out the major advantages of Ad hoc wireless Internet.
(6)
(AUApril/May 2014)
Advantages
(6)
(ii)Discuss the Pros and Cons of a routing protocol that uses GPS information
for an Ad hoc
wireless Network for search and rescue operation.
(10) (AUApril/May 2014)
Pros and Cons
(6)
Explanation
(4)
UNIT-II MEDIUM ACCESS PROTOCOLS
PART A
1. What are the classifications of MAC protocol?
(AU- May/
June 2012)
2. List the features of 802.15 standard.
(AU- May/
June 2012)
3. Compare the efficiency of the packet queuing mechanism adopted in MACA
and MACAW.
(AU- Nov/ Dec.
2012)
4. Define synchronous protocols.
(AU- May/
June 2013)
3 | 18
KCE/ECE/QB/IV YR/TV
Format : QB06
(AU- May/
(AU-
7.
Format : QB06
Diagram
802.11g IEEE standard
Explanation
(4)
(4)
(8)
(AU- Nov/
(AU- Nov/
9. (i) What are the advantages of reservation based MAC protocol over contention based MAC
protocol? (8)
(AU- April/May
2014)
Advantages
(4)
5 | 18
KCE/ECE/QB/IV YR/TV
Format : QB06
Reservation based
(2)
Contention based
(2)
(ii) What are the advantages and disadvantages of MAC protocol using directional antennas? (8)
(AU- April/May
2014)
Advantages
Disadvantages
(4)
(4)
10. (i) Name the three MAC services provided by the IEEE 802.11 that are not provided in the
traditional LANs such as 802.3. (6)
(AU- April/May
2014)
MAC services by IEEE 802.11 (2)
Reason behind LAN 802.3
(4)
(ii) Discuss the various HIPERLAN standards defined for wireless Networks by ETSI.(6)
(AU- April/May
2014)
HIPERLAN standards(3)
Explanation (3)
(iii) How are directional antennas superior to MACAW? Explain with an example.(4)
(AU- April/May
2014)
Explanation(2)
Example
(2)
Format : QB06
Format : QB06
1.
(i) Explain on demand routing protocol in detail. (12)
May /June 2012)
Routing protocol Diagram
(4)
Explanation
(8)
(ii) Which QOS measure decides QOS aware routing? (4)
May /June 2012)
Explanation
(4)
2.
(AU-
(AU-
Explanation(4)
(ii)Device a pseudo code that present various steps involved in neighbor
Degree- Based
preferred link algorithm. (8)
(AUNov./Dec 2012)
Various steps
(4)
Explanation
(4)
4.
How is routing table constructed in fisheye state routing protocol?
Explain in detail. (16)
(AU- Nov./Dec
2012)
Construction
(4)
Diagram
(4)
Explanation(8)
5.
(i) Discuss the major challenges that a routing protocol designed for ad
hoc wireless network
faces. (10)
(AU- May
/June 2013)
Major challenges
(4)
Explanation
(6)
(ii) Discuss the types of ad hoc network routing protocols based on routing
information
update mechanism. (6)
(AU- May
/June 2013)
Different types
(3)
Explanation
(3)
8 | 18
KCE/ECE/QB/IV YR/TV
Format : QB06
6.
(i) List the characteristics of ideal routing protocol for ad hoc wireless
network. (10)
(AU- May /June
2013)
Characteristics
(4)
Explanation
(6)
(ii) Classify and explain ad hoc wireless network based on routing topology. (6)
(AU- May /June
2013)
Classification of routing topology(3)
Explanation
(3)
7.
8.
Diagram
(4)
Explanation
(4)
(ii)
QOS Aware Routing. (8)
Nov./Dec 2013)
Diagram
(4)
Explanation
(4)
(AU-
(AU-
9.
Describe how the packets are transmitted in multiple access collision
avoidance protocol.
(16)
(4)
(8)
(4)
10.
Explain the scheduling table updates mechanism in distributed priority
scheduling. (!6)
(AU- April/May
2014)
Diagram
(4)
Explanation
(6)
Scheduling table
(6)
UNIT IV END-END DELIVERY AND SECURITY
9 | 18
KCE/ECE/QB/IV YR/TV
Format : QB06
PART A
1. Why does TCP not work well in ad hoc network?
(AUMay/ June 2012)
2. What is byzantine attack?
(AU- May/
June 2012)
3. Assume that the TCP sender experiences a timeout when the current
congestion window size
is48 KB. Considering the MSS of 1 KB, calculate the size of the congestion
window for which
the next three transmissions will be successful.
(AUNov. / Dec .2012)
4. Comment on the use of natural language passwords directly for cryptographic
algorithms.
(AU- Nov./ Dec
2012)
5. List the objectives of transport layer protocol.
(AU- May/
June 2013)
6. Why does TCP-F provide a simple feedback based solution?
(AU- May/
June 2013)
7. Write about ad hoc transport protocols.
(AU- Nov. /
Dec .2013)
8. What are the issues in ad hoc networks?
(AU- Nov. /
Dec .2013)
9. What are the effects of induced traffic in Ad hoc network?
(AUApril/May 2014)
10.
Define Wormhole attack.
(AUApril/May 2014)
11.
What are the types of attacks in ad hoc wireless networks?
12.
What do you mean by passive attacks?
13.
What do you mean by active attacks?
14.
Define Denial of attack.
15.
List the major types of resource consumption attacks.
16.
List the major security threats that exist in ad hoc wireless networks.
17.
Give the major objectives of the transport layer protocol.
18.
What do you mean by quality of service (QoS) Provisioning?
19.
What is the typical value of time out period in traditional TCP? In what
ways these become a problem in mobile ad hoc networks
20.
List the issues and challenges in security provisioning of transport layer.
21.
Define secure routing.
22.
What are not supported by the traditional TCP for handling Adhoc
network?
23.
How is secure routing done on wireless channels?
24.
Why secure routing protocols are needed?
25.
Define QoS frame works
26.
What are the issues in designing transport layer protocol?
27.
List the issues in designing a transport layer protocol for Ad hoc wireless
networks.
10 | 18
KCE/ECE/QB/IV YR/TV
Format : QB06
28.
wireless
29.
30.
Diagram
(2)
Diagram
(4)
Format : QB06
6. Why does TCP not perform well in ad hoc wireless network? Explain. (16)
(AU- May/ June
2013)
Diagram
(4)
Explanation(8)
Justification (4)
7. What are the design issues in transport layer? (16)
Nov./Dec 2013)
Diagram
(4)
Explanation
(6)
Design issues
(6)
(AU-
Diagram
(3)
Explanation(6)
(ii)What is the impact of the failure of proxy nodes in split- TCP? (8)
(AUApril/May 2014)
Impact factors
(4)
Explanation
(4)
10.
that in
(i) Explain how the security provisioning in ad hoc network differs from
Format : QB06
(AU- April/May
2014)
Internet properties
Explanation
(4)
(4)
Format : QB06
(AU- May/June
2012)
Diagram
(4)
Explanation
Integration with mobile IP
(4)
(8)
(AU-
(AU-
(AU-
Format : QB06
Issues
Importance
(3)
(3)
(AU-
(AU-
(2)
(4)
(4)
*****************************
15 | 18
KCE/ECE/QB/IV YR/TV
(AU-