adhoc qb14 (1)

19
Format : QB06 Subject Code / Name: EC2050 Mobile Adhoc Networks DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING QUESTION BANK ( MOBILE ADHOC NETWORKS ) Sub.Code : EC2050 Branch/Year/Sem/Sec: ECE/IV/VII /A & B Sub.Name : Mobile Adhoc Networks Batch : 2011-2015 Staff Name: Mr.P.Raja Pirian / Mrs. D. Vennila Academic Year : 2014-2015(Even) UNIT – I INTRODUCTION PART A 1. Why ad hoc networks are needed? (AU- May/June 2012) 2. What are the challenging issues in ad hoc network maintenance? (AU-May /June 2012) 3. Differentiate an ad hoc network and a cellular network with respect to bandwidth usage and Cost effectiveness. (AU- Nov/ Dec.2012) 4. State Shannon’s theorem. (AU- Nov/ Dec.2012) 5. List the transmission impediments of wireless channel. (AU-May / June 2013) 6. Write the equation for maximum data rate according to Shannon’s theorem. (AU-May/ June 2013) 7. Define ad hoc networks? (AU- Nov/ Dec.2013) 8. Write any two characteristics of Wireless channel? (AU- Nov/ Dec.2013) 9. Compare Ad-hoc Networks and Wireless LAN. (AU- April/May 2014) 10. Define Scalability. (AU-April/May 2014) 1 | 18 KCE/ECE/QB/IV YR/TV

Upload: raja-pirian

Post on 13-Aug-2015

110 views

Category:

Engineering


5 download

TRANSCRIPT

Page 1: Adhoc qb14 (1)

Format : QB06 Subject Code / Name: EC2050 Mobile Adhoc Networks

DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING

QUESTION BANK ( MOBILE ADHOC NETWORKS )

Sub.Code : EC2050 Branch/Year/Sem/Sec: ECE/IV/VII /A & B

Sub.Name : Mobile Adhoc Networks Batch : 2011-2015

Staff Name: Mr.P.Raja Pirian / Mrs. D. Vennila Academic Year : 2014-2015(Even)

UNIT – I INTRODUCTION PART A

1. Why ad hoc networks are needed? (AU-May/June 2012)2. What are the challenging issues in ad hoc network maintenance? (AU-May /June 2012)3. Differentiate an ad hoc network and a cellular network with respect to bandwidth usage and Cost effectiveness. (AU-Nov/ Dec.2012)4. State Shannon’s theorem. (AU- Nov/ Dec.2012)5. List the transmission impediments of wireless channel. (AU-May / June 2013)6. Write the equation for maximum data rate according to Shannon’s theorem. (AU-May/ June 2013)7. Define ad hoc networks? (AU- Nov/ Dec.2013)8. Write any two characteristics of Wireless channel? (AU- Nov/ Dec.2013)9. Compare Ad-hoc Networks and Wireless LAN. (AU-April/May 2014)10. Define Scalability. (AU-April/May 2014)11. Define path loss.

PART B1. (i)What are the characteristics and features of ad hoc networks?(6) (AU-May/June 2012)

Characteristics (3) Features (3)

(ii)Discuss in detail ad hoc indoor mobility models. (10) (AU-May/June 2012) Diagram (4) Mobility models (6)

2. (i) Explain the application areas of ad hoc networks. (8) (AU-May/June 2012)

Application areas (4) Explanation (4)

(ii) Discuss in detail the characteristics of wireless channels. (8) (AU-May/June 2012) Diagram (4) Characteristics (4)

1 | 18 KCE/ECE/QB/IV YR/TV

Page 2: Adhoc qb14 (1)

Format : QB06 Subject Code / Name: EC2050 Mobile Adhoc Networks

3. How mobility can be supported in today’s internet? Explain using the WAP model. Comment On its challenges in maintaining ad hoc networks that are connect to internet. (16) (AU-Nov/Dec.2012)

Diagram (3) Mobility (3) WAP model (5) Challenges (5)

4. Briefly discuss about path loss and fading. (16) (AU-May/June 2013)

Diagram (6) Path Loss (5) Fading (5)

5. (i) Explain the two main forms of interference, Doppler shift and Nyquist theorem. (10)

(AU-May/June 2013) Forms of interference (2) Doppler shift (4) Nyquist theorem. (4)

(ii) List the major advantages of Hybrid wireless Networks. (6) (AU-May/June 2013)

Advantages (6)

6. Illustrate the characteristic features of Mobile ad hoc Networks and state its applications. (16) (AU- Nov/ Dec.2013)

Diagram (4) characteristic features (8) applications (4)

7. Write in detail about Indoor and Outdoor models in Ad hoc mobility models.(16) (AU- Nov/ Dec.2013)

Diagram (4) Indoor models (6) Outdoor models (6)

8. (i) Differentiate between cellular network and AdHoc Network. (8) (AU- April/May 2014) Differentiation (8)

(ii)What is replay attack? How it can be prevented? (8) (AU- April/May 2014) Replay attack (2) Prevention method (6)

9. (i) List out the major advantages of Ad hoc wireless Internet. (6) (AU- April/May 2014) Advantages (6)

(ii)Discuss the Pros and Cons of a routing protocol that uses GPS information for an Ad hoc wireless Network for search and rescue operation. (10) (AU- April/May 2014)

2 | 18 KCE/ECE/QB/IV YR/TV

Page 3: Adhoc qb14 (1)

Format : QB06 Subject Code / Name: EC2050 Mobile Adhoc Networks

Pros and Cons (6) Explanation (4)

UNIT-II MEDIUM ACCESS PROTOCOLS PART A

1. What are the classifications of MAC protocol? (AU- May/ June 2012) 2. List the features of 802.15 standard. (AU- May/ June 2012)3. Compare the efficiency of the packet queuing mechanism adopted in MACA and MACAW.

(AU- Nov/ Dec. 2012) 4. Define synchronous protocols. (AU- May/ June 2013)5. Classify the channel of D-PRMA. (AU- May/ June 2013)6. What are the goals of medium access protocol? (AU- Nov/ Dec. 2013)

7. What is meant by HIPERLAN? (AU - Nov/ Dec.2013, April 2014)

8. What are the issues to be considered while designing a MAC protocol for Ad-Hoc Networks?

(AU- April / May 2014)9. List the design goals of MAC protocol for ad- hoc networks. 10. List the issues of designing a MAC protocol for ad hoc networks. 11. What are the effects of exposed terminal problem in wireless networks? 12. What are the advantages of directional antennas of MMAC over MACAW?13. What are the mechanisms used in MAC layer? 14. What are the differences between HRMA and SRMA? 15. List the five phases of FPRP.16. List any two needs of real- time MAC protocol. 17. How is directional antenna MMAC superior over MACAW?18. Write the frame format of 802.11a. 19. What is HIPERACCESS? 20. What do you mean by contention based protocols? 21. Give the classification of contention based protocol.22. Give the classifications of MAC protocols. 23. List the main issues in designing a MAC protocol for ad hoc wireless networks.24. What do you mean by FAMA? 25. What do you mean by contention based protocols with reservation mechanism? 26. What do you mean by contention based protocols with scheduling mechanism?27. What do you mean by D- PRMA28. What are the disadvantages of the binary exponential back off mechanism used in MACA? How are they overcome in MACAW?29. What do you mean by BTMA? 30. On what basis MACAW protocol is designed?

PART B1. (i) Discuss in detail contention based protocols with scheduling and reservation.(12)

(AU- May/ June 2012) Diagram (4) Explanation (8)

3 | 18 KCE/ECE/QB/IV YR/TV

Page 4: Adhoc qb14 (1)

Format : QB06 Subject Code / Name: EC2050 Mobile Adhoc Networks

(ii)Explain the HIPERLAN standards in detail. (4) (AU- May/ June 2012) HIPERLAN standards (4)

2. Explain 802.11g IEEE standard in detail.(16) (AU- May/ June 2012) Diagram (4) 802.11g IEEE standard (4) Explanation (8)

3. How is scheduling mechanism achieved in distributed wireless ordering protocol? Explain in detail. How are Information symmetry and perceived collisions handled?(16) (AU- Nov./Dec. 2012)

Scheduling Mechanism (8) Information symmetry (4) perceived collisions handled (4)

4. Illustrate various steps involved in five phase reservation protocol with its frame format.(16) ( AU- Nov./Dec2012)

Steps in phase reservation protocol (8) Diagram (4) Frame format (4)

5. List and explain the issues in designing a MAC protocol for ad hoc wireless networks.(16) (AU- May/ June 2013)

Diagram (4) Explanation (4) Issues in MAC protocol design(8)

6. (i) List the important goals of designing a MAC protocol for ad hoc wireless networks.(12) (AU- May/ June 2013)

Goals of MAC protocol (6) Explanation (6)

(ii) Classify and define sender- initiated protocols. (4) (AU- May/ June 2013) Definition (2) Classification (2)

7. Explain in detail about contention based protocols with reservation.(16) (AU- Nov/ Dec.2013) Diagram (4) Explanation (12)

8. Describe IEEE Standards 802.15 in detail.(16) (AU- Nov/ Dec.2013) IEEE standards (4) Diagram (4) Explanation (8)

9. (i) What are the advantages of reservation based MAC protocol over contention based MAC  protocol? (8) (AU- April/May 2014)

Advantages (4) Reservation based (2)

4 | 18 KCE/ECE/QB/IV YR/TV

Page 5: Adhoc qb14 (1)

Format : QB06 Subject Code / Name: EC2050 Mobile Adhoc Networks

Contention based (2)(ii) What are the advantages and disadvantages of MAC protocol using directional antennas? (8)

(AU- April/May 2014) Advantages (4) Disadvantages (4)

10. (i) Name the three MAC services provided by the IEEE 802.11 that are not provided in the traditional LAN’s such as 802.3. (6) (AU- April/May 2014)

MAC services by IEEE 802.11 (2) Reason behind LAN 802.3 (4)

(ii) Discuss the various HIPERLAN standards defined for wireless Networks by ETSI.(6) (AU- April/May 2014)

HIPERLAN standards(3) Explanation (3)

(iii) How are directional antennas superior to MACAW? Explain with an example.(4) (AU- April/May 2014)

Explanation (2) Example (2)

UNIT III NETWORK PROTOCOLS

PART A1. Differentiate proactive and reactive protocols. Write examples for each.

(AU- May/ June 2012) 2. How does energy aware routing work? (AU- May/ June 2012) 3. Is hop - length always the best metric for choosing paths in MANETs? Define your answer.

(AU- Nov. /Dec. 2012) 4. AMRIS may to exhibit high packet delivery ratio even when all nodes restrict their mobility to a small region. Why? (AU- Nov./ Dec.2012) 5. What does power aware routing aim? (AU- May/ June 2013)6. List the merits of geographical information assisted routing. (AU- May/ June 2013)7. Differentiate proactive routing from reactive routing. (AU- Nov. /Dec. 2013)8. What is meant by Hierarical routing? (AU- Nov. /Dec. 2013)9. Differentiate proactive and reactive protocol. (AU- April/May 2014)10. What are the advantages of hierarchical routing protocol? (AU- April/May 2014)11. What are the responsibilities of routing protocol? 12. What are the major challenges in designing routing protocols? 13. List the characteristics of a routing protocol for ad hoc wireless networks. 14. What is the approach used to find link stability in ABR ? 15. List the major classification of routing protocol for ad hoc wireless network. 16. Based on routing information update mechanism how the routing protocols are classified?17. List the classification of routing protocols based on the routing information update mechanism. List the approaches for power aware routing protocol.18. Based on the use of temporal information for routing, how the routing protocols are classified?

5 | 18 KCE/ECE/QB/IV YR/TV

Page 6: Adhoc qb14 (1)

Format : QB06 Subject Code / Name: EC2050 Mobile Adhoc Networks

19. Based on the routing topology how the routing protocols are classified? 20. What need for power management in ad hoc network? is the 21. List some examples of table driven routing protocols22. List the advantages and disadvantages of DSDV routing protocols. 23. What is hybrid routing protocol? 24. Mobility of nodes in a sparsely populated mobile ad ho network is less.25. What is the choice  between proactive routing protocol and reactive routing protocol? 26. List the types of on-demand routing protocols. 27. List the types of hybrid routing protocols. 28. How on-demand routing protocols differ from on-demand routing protocols? 29. What are the advantages and disadvantages of dynamic source routing protocol?(DSRP) 30. What are the pros and cons of tree based and mesh based routing? 31. What is call routing? 32. Mention any four qualities of service metrics that are used to evaluate the performance of the network? 33. Where is network layer solution used for quality of service? 34. State any four reasons that lead to the quick power drain of nodes in mobile ad hoc network. 35. Give the difference between Ad hoc on demand Distance vector routing protocol(AODV) and dynamic sequence routing protocol (DSR)

PART B1. (i) Explain on demand routing protocol in detail. (12) (AU- May /June 2012)

Routing protocol Diagram (4) Explanation (8)

(ii) Which QOS measure decides QOS aware routing? (4) (AU- May /June 2012) Explanation (4)

2. (i) Why Hybrid routing algorithm is used. Justify. (6) (AU- May /June 2012)

Hybrid routing algorithm (6) (ii) Briefly discuss about multicast routing algorithms.(10) (AU- May /June 2012)

Diagram (3) multicast routing algorithms(7)

3. (i) With suitable trace, explain the route establishment in location aided routing. (8)(AU- Nov./Dec 2012)

Diagram & trace (4) Explanation (4)

(ii)Device a pseudo code that present various steps involved in neighbor Degree- Based preferred link algorithm. (8) (AU- Nov./Dec 2012)

Various steps (4) Explanation (4)

4. How is routing table constructed in fisheye state routing protocol? Explain in detail. (16)

(AU- Nov./Dec 2012) Construction (4) Diagram (4) Explanation (8)

6 | 18 KCE/ECE/QB/IV YR/TV

Page 7: Adhoc qb14 (1)

Format : QB06 Subject Code / Name: EC2050 Mobile Adhoc Networks

5. (i) Discuss the major challenges that a routing protocol designed for ad hoc wireless network faces. (10) (AU- May /June 2013)

Major challenges (4) Explanation (6)

(ii) Discuss the types of ad hoc network routing protocols based on routing information update mechanism. (6) (AU- May /June 2013)

Different types (3) Explanation (3)

6. (i) List the characteristics of ideal routing protocol for ad hoc wireless network. (10) (AU- May /June 2013)

Characteristics (4) Explanation (6)

(ii) Classify and explain ad hoc wireless network based on routing topology. (6) (AU- May /June 2013)

Classification of routing topology(3) Explanation (3)

7. Discuss in detail about Unicast routing Algorithm.(16) (AU- Nov./Dec 2013)

Diagram (3) Explanation (8) Algorithm (5)

8. Write Short note on.(i) Energy Aware routing algorithm.(8) (AU- Nov./Dec 2013)

Diagram (4) Explanation (4)

(ii) QOS Aware Routing. (8) (AU- Nov./Dec 2013) Diagram (4) Explanation (4)

9. Describe how the packets are transmitted in multiple access collision avoidance protocol. (16) (AU- April/May 2014)

Diagram (4) Transmission (8) Explanation (4)

10. Explain the scheduling table updates mechanism in distributed priority scheduling. (!6) (AU- April/May 2014)

Diagram (4) Explanation (6) Scheduling table (6)

7 | 18 KCE/ECE/QB/IV YR/TV

Page 8: Adhoc qb14 (1)

Format : QB06 Subject Code / Name: EC2050 Mobile Adhoc Networks

UNIT IV END-END DELIVERY AND SECURITY PART A

1. Why does TCP not work well in ad hoc network? (AU- May/ June 2012) 2. What is byzantine attack? (AU- May/ June 2012) 3. Assume that the TCP sender experiences a timeout when the current congestion window size is48 KB. Considering the MSS of 1 KB, calculate the size of the congestion window for which the next three transmissions will be successful. (AU- Nov. / Dec .2012) 4. Comment on the use of natural language passwords directly for cryptographic algorithms.

(AU- Nov./ Dec 2012) 5. List the objectives of transport layer protocol. (AU- May/ June 2013)6. Why does TCP-F provide a simple feedback based solution? (AU- May/ June 2013)7. Write about ad hoc transport protocols. (AU- Nov. / Dec .2013) 8. What are the issues in ad hoc networks? (AU- Nov. / Dec .2013) 9. What are the effects of induced traffic in Ad hoc network? (AU- April/May 2014)10. Define Wormhole attack. (AU- April/May 2014)11. What are the types of attacks in ad hoc wireless networks?12. What do you mean by passive attacks? 13. What do you mean by active attacks? 14. Define Denial of attack. 15. List the major types of resource consumption attacks. 16. List the major security threats that exist in ad hoc wireless networks.17. Give the major objectives of the transport layer protocol. 18. What do you mean by quality of service (QoS) Provisioning?19. What is the typical value of time out period in traditional TCP? In what ways these become a problem in mobile ad hoc networks 20. List the issues and challenges in security provisioning of transport layer.21. Define secure routing. 22. What are not supported by the traditional TCP for handling Adhoc network? 23. How is secure routing done on wireless channels? 24. Why secure routing protocols are needed? 25. Define QoS frame works 26. What are the issues in designing transport layer protocol? 27. List the issues in designing a transport layer protocol for Ad hoc wireless networks. 28. List the goals to be achieved in transport layer protocol for Ad hoc wireless networks. 29. List the network security requirements. 30. List some of the network layer attacks.

PART B1. (i) Discuss in detail feedback based TCP and TCP BUS in detail. (12) (AU- May/ June 2012)

Diagram (4) Feedback based TCP (4) TCP Bus (4)

(ii)Why secure routing protocols are needed? (4) (AU- May/ June 2012) Explanation (4)

2. (i) Discuss briefly ad hoc TCP states and event action mapping. (8) (AU- May/ June 2012) Diagram (2) Explanation (3)

8 | 18 KCE/ECE/QB/IV YR/TV

Page 9: Adhoc qb14 (1)

Format : QB06 Subject Code / Name: EC2050 Mobile Adhoc Networks

Event action mapping (3)(ii)Discuss in detail various network and application layer security attacks. (8)

(AU- May/ June 2012) Diagram (2) Various network (3) application layer attacks (3)

3. With any five major reasons, analyze why TCP is exposed to significant throughput degradation in ad hoc networks. (16) (AU- Nov./Dec 2012)

Diagram (4) Major reasons (8) Explanation (4)

4. Explain various network and Transport layer security attacks in detail. (16)(AU- Nov./Dec 2012)

Diagram (4) Network layer security (8) Transport layer security (8)

5. Explain the issues in designing a transport layer protocol for ad hoc wireless networks. (16) (AU- May/ June 2013)

Diagram (4) Explanation (8) Design issues (4)

6. Why does TCP not perform well in ad hoc wireless network? Explain. (16) (AU- May/ June 2013)

Diagram (4) Explanation (8) Justification (4)

7. What are the design issues in transport layer? (16) (AU- Nov./Dec 2013) Diagram (4) Explanation (6) Design issues (6)

8. (i)Explain in detail about network security attacks. (8) (AU- Nov./Dec 2013) Diagram (3) Explanation (5)

(ii)Explain the significance and design goals of transport layer protocol for ad hoc network. (8) (AU- Nov./Dec 2013)

Diagram (4) Significance (2) Design Goals (2)

9. (i)Discuss the effect of multiple breaks on a single path at the TCP- F sender. (8) (AU- April/May 2014)

Diagram (3) Explanation (6)

(ii)What is the impact of the failure of proxy nodes in split- TCP? (8) (AU- April/May 2014)

9 | 18 KCE/ECE/QB/IV YR/TV

Page 10: Adhoc qb14 (1)

Format : QB06 Subject Code / Name: EC2050 Mobile Adhoc Networks

Impact factors (4) Explanation (4)

10. (i) Explain how the security provisioning in ad hoc network differs from that in Infrastructure based network. (8) (AU- April/May 2014)

Diagram (4) Explanation (4)

(ii)List out and explain how some of the internet properties of the wireless Ad hoc networks introduce difficulties while implementing security in routing protocols. (8) (AU- April/May 2014)

Internet properties (4) Explanation (4)

UNIT – V CROSS LAYER DESIGN AND INTEGRATION OF ADHOC FOR 4G PART A

1. Why ad hoc network is integrated with mobile IP? (AU- May/June 2012) 2. What are the factors that affect effective cross layer design? (AU- May/June 2012)3. State the use of embedded protocol boosters in cross layer optimization.

(AU- Nov. /Dec.2012) 4. State any two challenges faced by MANETs in adopting mobile IP. (AU- Nov./Dec.2012)5. How is deliverability understood? (AU- May/June 2013)6. What does cellular IP offer? (AU- May/June 2012)7. Define cross layer cautionary perspective. (AU- Nov./Dec

2013)8. What the needs are for cross layer design? (AU- Nov./Dec 2013 , April/May 2014)9. What are the parameter optimization techniques available? (AU- April/May 2014)10. List the issues of integrating MANET with mobile IP network. 11. What is wireless internet? 12. List the major issues in wireless internet. 13. What do you mean by encapsulation? 14. Define tunneling. 15. What do you mean by time to live (TTL)? 16. Give the categories of handoff. 17. What is cross layer feedback? 18. What is the need for cross layer design? 19. What is protocol optimizer? 20. How application layer is integrated with its upper layer?

10 | 18 KCE/ECE/QB/IV YR/TV

Page 11: Adhoc qb14 (1)

Format : QB06 Subject Code / Name: EC2050 Mobile Adhoc Networks

21. List the four main categories of optimization. 22. What do you mean by Wireless transport layer security (WTLS)? 23. Define Wireless datagram protocol (WDP) 24. What are the classifications of integrated mobile IP network?

PART B1. Discuss in detail the integration of ad hoc with mobile IP networks. (16)

(AU- May/June 2012) Diagram (4) Explanation (4) Integration with mobile IP (8)

2. (i) Discuss briefly cross layer optimization technique in detail. (10) (AU- May/June 2012) Diagram (4) Explanation (3) Optimization technique (3)

(ii)Justify the need for cross layer design. (6) (AU- May/June 2012) Diagram (2) Justification (4)

3. Explain the significant challenges of generic cross layer design.(16) (AU- Nov./Dec 2012) Diagram (4) Explanation (6) Significant challenges (6)

4. (i) Explain the features of a cross-layer model designed for multiuser scheduling. Also Highlight how efficiency is improved through this model. (8) (AU- Nov./Dec. 2012).

Diagram (4) Explanation (4) Features (4) Efficiency improvement (4)

(ii) How link/MAC layer optimization is achieved with respect to its higher layers and Physical layer? Also write its impact on bit rate and power control. (AU- Nov./Dec .2012 )

Diagram (2) Explanation (4) Optimization (2)

5. (i)Briefly discuss about cross over time prediction.(10) (AU- May/June 2013) Diagram (4) Explanation (4) Time prediction (2)

(ii)List the issues of utmost importance in mobile IP. (6) (AU- May/June 2013) Issues (3) Importance (3)

6. Explain COA, reverse tunneling and route optimization.(16) (AU- May/June 2013) Diagram (4)

11 | 18 KCE/ECE/QB/IV YR/TV

Page 12: Adhoc qb14 (1)

Format : QB06 Subject Code / Name: EC2050 Mobile Adhoc Networks

Explanation of COA (4) reverse tunneling (4) route optimization (4)

7. Give detailed description of Cross layer optimization.(16) (AU- Nov./Dec 2013) Diagram (4) Explanation (12)

8. Explain in detail about integration of ad hoc with mobile IP Networks.(16) (AU- Nov./Dec 2013)

Diagram (4) Explanation (12)

9. Describe how to integrate Ad hoc with mobile IP. What are the advantages? (16)(AU- April/May 2014)

Diagram (4) Explanation (8) Advantages (4)

10. (i) Explain any one of the cross layer optimization method and how it improve the performance of the routing Ad hoc networks. (10) (AU- April/May 2014)

Diagram (2) Optimization method (4) Performance (4)

(ii)Explain the operation of optimizing sub system (OSS). (6) (AU- Nov./Dec 2013) Diagram (2) Operation (4)

*****************************

12 | 18 KCE/ECE/QB/IV YR/TV