EC Mobile Ad hoc Networks. Subject Code / Name: DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING QUESTION BANK. B.E./ DEGREE EXAMINATION, NOVEMBER/DECEMBER Eighth Semester Electronics and Communication Engineering EC /. EC MOBILE ADHOC NETWORKS. L T P C. 3 0 0 3. UNIT I. INTRODUCTION. 9. Introduction to adhoc networks – definition, characteristics features.
|Published (Last):||18 October 2006|
|PDF File Size:||5.51 Mb|
|ePub File Size:||5.34 Mb|
|Price:||Free* [*Free Regsitration Required]|
Explain the operation of optimizing sub system OSS. List the characteristics of wireless channel.
An ad hoc network is netwrks multihop, infrastructure less network which has no centralized server networjs control the communication between the nodes and resources cannot be reserved beforehand.
The two types of protocol that are used to handle multiple access issues are i Contention based protocols ii Conflict free collision free protocols. Ec20500 and explain the issues in designing a MAC protocol for ad hoc wireless networks. How on-demand routing protocols differ from on-demand routing protocols? Give the classification of contention based protocol. Remember me on this computer. List any two needs of real-time MAC protocol. Tunneling is a mechanism in which the mobile node a Simply forwards the packets using the adhoc routing protocol to the destination kobile, if the destination is inside the MANET b Encapsulates packets and sends them to the gateway node if the destination is not inside the MANET c When the gateway node receives packets, it decapsulates them and sends them to the original destination 7.
Some of the commonly used outdoor propagation models are: Associativity-based routing ABR protocol selects route based on the stability of the wireless link.
Discuss table driven protocols with examples. List the challenges faced by WLAN industry. Differentiate between cellular network and AdHoc Network.
It aims mainly at increasing the lifetime of the network. Explain any one of the cross layer optimization method and how it improve the performance of the routing Adhoc networks. Maximum Delay variance Jitter 4. Give e2050 categories of handoff. Efficient utilization of energy 2. Discuss the Pros and Cons of a routing protocol that uses GPS information for an Ed2050 wireless Network for search and rescue operation.
Wireless sensor and mesh networks List the types of attacks in ad hoc wireless networks. Based on routing information update mechanism how the routing protocols are classified?
Mobile Adhoc Networks – Syllabus | EC | uLektz Learning Solutions Private Limited
The factors that involves in routing of a MANET are a Modeling of the topology b selection of routers c initiation of a route request Netorks underlying characteristics that could serve as heuristics in finding the path efficiently. Skip to main content. List the types of on-demand routing protocols. State the use of embedded protocol boosters in cross layer optimization. It may or may not include the effects of antenna gain. This nobile due to the high redundancy and the possibility of reuse over different sessions.
List out the major advantages of Adhoc wireless Internet.
Differentiate proactive and reactive routing protocols. List some of the network layer attacks. List the issues that affect the design deployment and performance of ad hoc wireless system. Foliage, lamp post, sharp edges. Security — Military 6.
Help Center Find new research papers in: What is hidden terminal problem? Why does TCP not perform well in adhoc wireless network?
Explain with an example. How is secure routing done on wireless channels? List the major goals when selecting a routing protocol. Lower to upper layers: List and brief various network and transport layer attacks in detail. What is cross layer feedback?
Explain on demand routing protocol in detail. Eliminate all but one of the contenders if more than one sender has the current priority.
What is the typical value of time out period in traditional TCP? List the design goals of MAC protocol for ad- hoc networks. What adhod protocol optimizer?
Considering the MSS of 1KB, calculate the size of the congestion window for which the next three transmissions will be successful. Why secure routing protocols are needed? Cross layer is done to communicate the delay or loss constraints of the application to the link layer to enable the link layer to adapt its error correction mechanisms. What are not supported by the traditional TCP for handling Adhoc network?