EC Mobile Ad hoc Networks. Subject Code / Name: DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING QUESTION BANK. B.E./ DEGREE EXAMINATION, NOVEMBER/DECEMBER Eighth Semester Electronics and Communication Engineering EC /. EC MOBILE ADHOC NETWORKS. L T P C. 3 0 0 3. UNIT I. INTRODUCTION. 9. Introduction to adhoc networks – definition, characteristics features.

Author: Kagalmaran Goltigis
Country: Laos
Language: English (Spanish)
Genre: Software
Published (Last): 28 December 2005
Pages: 358
PDF File Size: 11.51 Mb
ePub File Size: 9.62 Mb
ISBN: 732-1-62971-424-9
Downloads: 90156
Price: Free* [*Free Regsitration Required]
Uploader: Akinogul

How are information symmetry and perceived collisions handled? The major goals when selecting a routing protocol are a Provide the maximum possible reliability by selecting alternative routes if a node connectivity fails. With this, the amount of space in routing table is reduced.


What are the advantages and disadvantages of dynamic source routing protocol? Netwirks against attacks Help Center Find new research papers in: With suitable trace, explain the route establishment in location aided routing. What is the approach used to find link stability in ABR?

Write examples for each. HRMA SRMA A multichannel MAC protocol which is based on half-duplex, very slow TDMA frame based dynamic reservation 1 frequency-hopping spread spectrum MAC protocol FHSS radios Time slot reservation protocol where each Nodes are allocated different time slots so 2 fixed time slot is assigned a frequency that transmissions are collision free channel Uses a reservation and handshake mechanism to enable a pair of Nodes use a collision-avoidance 3 communicating nodes to reserve a handshake mechanism and a soft frequency hop, thereby guaranteeing reservation mechanism collision-free data netwkrks Developed with the main objective of supporting integrated services of real-time 4 Supports real time transmission and non-real-time application in ad hoc networks MAC protocol should maximize it.

EC Mobile Adhoc Networks Question Bank updated | Devasena A. –

What are the two types of protocols used to handle multiple access issues? Considering the MSS of 1 KB, calculate the size of the congestion window for which the next three transmissions will be successful.


Associativity-based routing ABR protocol selects route based on the stability of the wireless link. List the four main categories of optimization. Reservation confirm phase 4. What is an adhoc network? Explain the significance and design goals of transport layer protocol for adhoc network.

Due to certain unique characteristics of ad hoc wireless networks the task of ensuring secure communication in ad hoc wireless networks is difficult. Foliage, lamp post, sharp edges. List mkbile major security threats that exist in ad hoc wireless networks. Explain the major challenges that a routing protocol designed for adhoc wireless networks face. Why does an AP in wireless network act as adhic bridge? Guarantee of correct route discovery 3.

Mention any four qualities of service metrics that are used to evaluate the performance of the network. Differentiate an ad hoc network and a cellular network with respect to bandwidth usage and cost effectiveness.

The issues of designing a MAC protocol for ad-hoc networks are a Bandwidth efficiency: Write the frame format of Explain adboc scheduling table update mechanism in distributed priority scheduling. Differentiate proactive and reactive protocols. Ad hoc networks are widely used in a. List the goals to be achieved in transport layer protocol for Ad hoc wireless networks.

Tunneling is a mechanism in which the mobile axhoc a Simply forwards the packets using the adhoc routing protocol to the destination node, if the destination is inside the MANET b Encapsulates packets and sends them to the gateway node if the destination is not inside the MANET c When the gateway node receives packets, it decapsulates adhod and sends them to the original destination 7. What are the mechanisms used in MAC layer?


Give the major objectives of the transport layer protocol. What are the mechanisms used in the MAC layer? Distinguish between shadowing and reflection of signal propagation. What do you mean by contention based protocols with reservation mechanism? What are the disadvantages of the binary exponential back off mechanism used in MACA?

What is cross layer feedback? All components within this system cooperate in providing the required services. Why secure routing protocols are needed? List the features of State the use of embedded protocol boosters in cross layer optimization.

State any four reasons that lead to the quick power drain of nodes in mobile ad hoc network. Successive reservation slots need not align with each other: Also write its impact on bit rate and power control.

The presence of dynamic and adaptive routing protocols enables quick formation ec050 ad hoc networks and is suitable for emergency situations like natural disasters, spontaneous meetings or military conflicts.

Collision report phase 3. What adhov the challenging issues in ad hoc network maintenance? List the table driven protocols. It is used in battlefields and military applications. Mobility of nodes in a sparsely populated mobile ad ho network is less. Based on the routing topology how the routing protocols are classified?