Professional Documents
Culture Documents
UNIT – I
INTRODUCTION
1. What is an ad hoc network?
An ad hoc network is a multihop, infrastructure less network which has no centralized server
to control the communication between the nodes and resources cannot be reserved beforehand. It
is used in battlefields and military applications.
2. Why are ad hoc networks needed? [M/J – 12 R08]
Ad hoc networking is often needed where an infrastructure network cannot be deployed and
managed. The presence of dynamic and adaptive routing protocols enables quick formation of ad
hoc networks and is suitable for emergency situations like natural disasters, spontaneous
meetings or military conflicts.
3. What are the challenging issues in ad hoc network maintenance? [M/J – 12 R08]
The challenging issues in ad hoc network are
1. Medium access scheme
2. Routing
3. Multicast routing
4. Transport layer protocol
5. Pricing Schemes
6. Quality of Service Provisioning
7. Self-Organization
8. Security
9. Addressing and Service Discovery
10. Energy Management
11. Scalability
12. Deployment considerations
4. List the applications of ad hoc networks.
Ad hoc networks are widely used in
1. Military applications and battlefields
2. Collaborative and distributed computing
3. Emergency search and rescue operations
4. Wireless sensor and mesh networks
UNIT – II
MEDIUM ACCESS PROTOCOLS
1. List the design goals of a MAC protocol for ad hoc networks.
Design goals of a MAC protocol for ad hoc networks are
1. The operation of the protocol should be distributed.
2. The protocol should provide QoS support for real-time traffic.
3. The access delay, which refers to the average delay experienced by any packet to get
transmitted, must be kept low.
4. The available bandwidth must be utilized efficiently.
5. The protocol should ensure fair allocation of bandwidth to nodes.
6. Control overhead must be kept as low as possible.
7. The protocol should minimize the effects of hidden and exposed terminal problems.
8. The protocol must be scalable to large networks.
9. The protocol should have power control mechanisms.
10. The protocol should have mechanisms for adaptive data rate control.
11. The protocol should try to use directional antennas.
12. The protocol should provide synchronization among nodes.
2. List the issues of designing a MAC protocol for ad hoc networks.
The issues of designing a MAC protocol for ad hoc networks are
1. Bandwidth efficiency:
The ratio of bandwidth used for actual data transmission to the total available bandwidth.
MAC protocol should maximize it.
2. QoS support:
MAC protocol should consider the constraint of ad hoc networks for time critical
applications
3. Hidden and exposed terminal problem
4. Synchronization:
It can be achieved by exchange of control packets between transmitter and receiver
5. Error-Prone Shared Broadcast Channel
6. Distributed Nature/Lack of Central Coordination
7. Mobility of Nodes:
Nodes are mobile most of the time
2 2 6 6 6 2 6 0 - 2312 4
UNIT – III
NETWORK PROTOCOLS
1. Differentiate proactive and reactive routing protocols. Write examples for each.
[M/J – 12 R08]
S.No. Proactive Reactive
1 Route is pre-established Route establishment is on-demand
Route discovery by some global
2 Continuously discover the routes
search
Updates topology information(table)
3 No information update is done
periodically
longer delay due to latency of route
4 No latency in route discovery
discovery
Large capacity is needed to update
5 Large capacity is not needed
network information
A lot of routing information may May not be appropriate for real-time
6
never be used communication
7 Eg: DSDV, WRP Eg: AODV, ABR
UNIT – IV
END-END DELIVERY AND SECURITY
1. What is the typical value of time out period in traditional TCP? In what ways these
become a problem in mobile ad hoc networks?
The timeout period is atleast as much as the timer granularity, which is typically 100-500ms
and typically 500 ms for ATM LANs and WANs. The time out period depends on RTT (Round
Trip Time).
TCP in ad hoc networks becomes a problem due to
1. Misinterpretation of packet loss
2. Frequent path breaks
3. Effect of path length
4. Misinterpretation of congestion window
5. Asymmetric link behavior
6. Uni-directional path
7. Multipath routing
8. Network partitioning and remerging
9. Use of sliding-window-based transmission
2. Define – Security Routing
Security routing is defined as routing the data packets from the source to the destination in a
secured manner. Secured routing provides
1. Confidentiality
2. Integrity
3. Availability
4. Non-repudiation
3. What are not supported by the traditional TCP for handling Ad hoc network?
The features that are not supported by the traditional TCP for handling ad hoc network are
1. Path break handling mechanisms
2. Scheduling of packet loss and rate of transmission
3. Bandwidth consumption due to RTS-CTS-DATA-ACK
4. Congestion control mechanism
5. Asymmetric link behavior
UNIT – V
CROSS-LAYER DESIGN AND INTEGRATION OF AD HOC FOR 4G
1. Why ad hoc network is integrated with mobile IP? [M/J – 12 R08]
The growth of the Internet, its services and applications, and the convergence towards All-IP
networks in 4G wireless networks, where all traffic (data, control, voice and video services, etc.)
will be transported in IP packets, has led to an increasing demand for enabling MANET nodes to
integrate with mobile IP.
2. What are the classifications of integrated mobile IP network?
The classifications of integrated mobile IP network based on gateway discovery are
3. State any two challenges faced by MANETs in adopting mobile IP. (or) [N/D – 12 R08]
List the issues of integrating MANET with mobile IP network.
The issues of integrating MANET with mobile IP network are
1. Micro-mobility support
2. Gateway discovery
3. Tunneling
4. Periodic Agent Advertisement
5. Movement Detection
6. Handoff decision
7. Mobile IP
8. Ad hoc Routing
9. Implementation Approach
10. Periodic Unicast Agent Advertisement
11. Use Agent Solicitation for gateway discovery
12. Incorporate Default Route concept to Ad hoc routing protocol
13. Routing between MANET nodes and gateway
4. What are the factors that affect effective cross-layer design? [M/J – 12 R08]
The factors that affect effective cross-layer design are
1. Excessive packet losses
2. Unpredictable channel behavior
3. Inability to find stable and high-throughput paths
4. Throughput degradation due to intra-flow and inter-flow interferences
5. Lack of incentives (and a pricing mechanism) to forward transit packets
5. State the use of embedded protocol boosters in cross-layer optimization. [N/D – 12 R08]
The actual realization of the cross-layer optimizations at the link layer is achieved with
embedded protocol boosters which are transparent enhancements of the protocol communication
between the end entities. Protocol boosters can perform adaptation procedures towards upper
layers and lower layers, assisting the process of information exchanges between various layers
without a need for actual protocol format changes, leading to improved system performances.