0% found this document useful (0 votes)
110 views25 pages

EC2050 Mobile Ad Hoc Networks VIII Semester ECE: Unit I

The document discusses mobile ad hoc networks and their characteristics. It begins by defining key concepts like path loss and ad hoc networks. It then lists some of the challenging issues in ad hoc network maintenance like medium access, routing, multicast routing, and energy management. It also defines concepts like the hidden terminal problem and various indoor and outdoor propagation models. Finally, it discusses the design goals of MAC protocols for ad hoc networks, which include distributed operation, QoS support, low access delay, efficient bandwidth utilization, and fair bandwidth allocation.

Uploaded by

BALAKRISHNAN
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
110 views25 pages

EC2050 Mobile Ad Hoc Networks VIII Semester ECE: Unit I

The document discusses mobile ad hoc networks and their characteristics. It begins by defining key concepts like path loss and ad hoc networks. It then lists some of the challenging issues in ad hoc network maintenance like medium access, routing, multicast routing, and energy management. It also defines concepts like the hidden terminal problem and various indoor and outdoor propagation models. Finally, it discusses the design goals of MAC protocols for ad hoc networks, which include distributed operation, QoS support, low access delay, efficient bandwidth utilization, and fair bandwidth allocation.

Uploaded by

BALAKRISHNAN
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 25

EC2050 ― Mobile Ad hoc Networks VIII Semester ECE

Unit I

1. What is meant by path loss?


The difference between the effective transmitted power and the received power is called path
loss. It represents signal attenuation as a positive quantity measured in db. It may or may not
include the effects of antenna gain.

2. What is an ad hoc network?


An ad hoc network is a multihop, infrastructure less network which has no centralized
server to control the communication between the nodes and resources cannot be reserved
beforehand. It is used in battlefields and military applications.

3. What are the challenging issues in ad hoc network maintenance? (M/J12 R08)
The challenging issues in ad hoc network are
a) Medium access scheme
b) Routing
c) Multicast routing
d) Transport layer protocol
e) Pricing Schemes
f) Quality of Service Provisioning
g) Self-Organization
h) Security
i) Addressing and Service Discovery
j) Energy Management
k) Scalability
l) Deployment considerations

4. What is hidden terminal problem?


Hidden terminals are nodes that are hidden (or not reachable) from the sender of a data
transmission session, but are reachable to the receiver of the session. The hidden terminal
can cause collisions at the receiver node.

5. Name some of the outdoor propagation models.


Some of the commonly used outdoor propagation models are:

i. Longley-Rice model
ii. Durkin’s model
iii. Okumura model

Prepared by A.Devasena., Asso. Prof/ Dept. of ECE Page 1


EC2050 ― Mobile Ad hoc Networks VIII Semester ECE

6. Define – Indoor Propagation Model


Indoor propagation model is defined as the model which is used to characterize radio
propagation inside the buildings. The distance covered is much smaller.

7. List out some indoor propagation models.


Some indoor propagation models are:

i. Long –distance path loss model


ii. Ericession multiple break point model
iii. Attenuation factor model.

8. Differentiate an ad hoc network and a cellular network with respect to


a) Bandwidth usage
b) Cost effectiveness (Nov/Dec 12)
PARAMETER CELLULAR NETWORK AD HOC NETWORK
Bandwidth reservation requires
Easier to employ bandwidth
complex medium access control
reservation
Bandwidth protocols
usage Shared radio channel (more
Guaranteed bandwidth (designed
suitable for best-effort data
for voice traffic)
traffic)
Self-organization and
Cost of network maintenance is
Cost maintenance properties are built
high (backup power source,
effectiveness into the network. Hence the cost
staffing, etc.)
of network maintenance is less.

9. What is free space propagation model?


Propagation model which is used to predict received signal strength, when the line-of-sight path
is unobstructed between transmitter and receiver is called free space propagation model.

Prepared by A.Devasena., Asso. Prof/ Dept. of ECE Page 2


EC2050 ― Mobile Ad hoc Networks VIII Semester ECE

10. Why are ad hoc networks needed? (May/June 12)


Ad hoc networking is often needed where an infrastructure network cannot be deployed
and managed. The presence of dynamic and adaptive routing protocols enables quick
formation of ad hoc networks and is suitable for emergency situations like natural disasters,
spontaneous meetings or military conflicts.

11. List the applications of ad hoc networks.


Ad hoc networks are widely used in
a. Military applications and battlefields
b. Collaborative and distributed computing
c. Emergency search and rescue operations
d. Wireless sensor and mesh networks

12. Distinguish between shadowing and reflection of signal propagation.


Shadowing Reflection
When the propagating radio wave hits an
Fading caused by the large buildings object which is very large compared to its
or other structures, that block the wavelength (such as the surface of Earth, or
direct transmission path from the tall buildings), the wave gets reflected by
transmitter to the receiver is known as that object. Reflection causes a phase shift of
shadowing. 180 degrees between the incident and
reflected rays.

13. What is scattering?


When a radio wave impinges on a rough surface, the reflected energy is spread out in all
directions. This is called scattering. It occurs when the wavelength of medium is small when
compared to wavelength of travelled wave. e.g. Foliage, lamp post, sharp edges.

14. List the transmission impediments of wireless channel. (or)


List the characteristics of wireless channels.
The characteristics of wireless channel are
1. Path loss
2. Fading
3. Interference

Prepared by A.Devasena., Asso. Prof/ Dept. of ECE Page 3


EC2050 ― Mobile Ad hoc Networks VIII Semester ECE

4. Doppler Shift
Transmission rate constraints

15. What is fading? List the different types of fading.


Fading refers to the fluctuations in signal strength, when received at the receiver. It
occurs due to multipath propagation.
The different types of fading are
1. Slow/long term fading
2. Fast/short term fading

16. What is meant by small scale fading?


Small scale fading is used to describe the rapid fluctuation of the amplitude, phase or multipath
delays of a radio signal over a short period of time or travel distance.

17. What are the factors influencing small scale fading?


Factors influencing small scale fading are

a) Speed of surrounding objects

b) Multipath propagation
c) Speed of the mobile
d) Transmission bandwidth of the signal.

18. Write the equation for maximum data rate according to Shannon’s theorem.
(May/June 13)
Shannon’s theorem states the maximum data rate possible on a noisy channel.
The maximum data rate is
C = B x log 2 (1+(S/N)) bits per second
Where C = maximum data rate, B = bandwidth
S/N = signal to noise ratio.
The Noise level is represented by SNR – Signal to Noise Ratio.

19. Define- MANET.


MANET is defined as an autonomous system of nodes or Mobile Stations (also serving
as routers) connected by wireless links, the union that forms a communication networks,
modeled in the form of an arbitrarily communication graph.

20. List the characteristics of MANETs.


Prepared by A.Devasena., Asso. Prof/ Dept. of ECE Page 4
EC2050 ― Mobile Ad hoc Networks VIII Semester ECE

The characteristics of MANETs are


(a) Dynamic topologies
(b) Bandwidth-constrained and variable capacity links.
(c) Energy-constrained operation.
(d) Limited physical security.

21. List the applications of MANET.


The applications of MANET are
(a) Defense applications.
(b) Crisis-management applications
(c) Telemedicine
(d) Tele-geo processing applications
(e)Virtual navigation
(f)Education via the internet

22. List the factors that involves in routing of a MANET.


The factors that involves in routing of a MANET are
a) Modeling of the topology
b) selection of routers
c) initiation of a route request
Specific underlying characteristics that could serve as heuristics in finding the path efficiently.

Unit II

1. List the design goals of a MAC protocol for ad-hoc networks.


Design goals of a MAC protocol for ad-hoc networks are
a) The operation of the protocol should be distributed.
b) The protocol should provide QoS support for real-time traffic.
c) The access delay, which refers to the average delay experienced by any packet to
get transmitted, must be kept low.
d) The available bandwidth must be utilized efficiently.

Prepared by A.Devasena., Asso. Prof/ Dept. of ECE Page 5


EC2050 ― Mobile Ad hoc Networks VIII Semester ECE

e) The protocol should ensure fair allocation of bandwidth to nodes.


f) Control overhead must be kept as low as possible.
g) The protocol should minimize the effects of hidden and exposed terminal
problems.
h) The protocol must be scalable to large networks.
i) The protocol should have power control mechanisms.
j) The protocol should have mechanisms for adaptive data rate control.
k) The protocol should try to use directional antennas.
l) The protocol should provide synchronization among nodes.

2. List the issues of designing a MAC protocol for ad-hoc networks.


The issues of designing a MAC protocol for ad-hoc networks are
a) Bandwidth efficiency:
a. The ratio of bandwidth used for actual data transmission to the total
available bandwidth. MAC protocol should maximize it.
b) QoS support:
a. MAC protocol should consider the constraint of ad hoc networks for time
critical applications
c) Hidden and exposed terminal problem
d) Synchronization:
a. It can be achieved by exchange of control packets between transmitter and
receiver
e) Error-Prone Shared Broadcast Channel
f) Distributed Nature/Lack of Central Coordination
g) Mobility of Nodes:
a. Nodes are mobile most of the time

3. What are the two types of protocols used to handle multiple access issues?
The two types of protocol that are used to handle multiple access issues are
(i) Contention based protocols
(ii) Conflict free (collision free) protocols.

4. How contention based protocols are classified?


The contention based protocols can be classified into two groups according to the ways
collisions are resolved. They are

Prepared by A.Devasena., Asso. Prof/ Dept. of ECE Page 6


EC2050 ― Mobile Ad hoc Networks VIII Semester ECE

(i) Random access protocols


(ii) Collision resolution protocols

5. List the types of Random Access protocols and Collision Resolution protocols.
The types of random access protocols are
(i) ALOHA type protocol
(ii) Carrier Sense Multiple Access (CSMA) type protocol
(iii) Busy tone multiple Access (BTMA) type protocol.
(iv) Idle Signal Multiple Access (ISMA) type protocol
The types of Collision resolution access protocols are
(i) TREE type protocol
(ii) Window type protocol.
6. What are the different types of conflict free protocols?
The different types of conflict free protocols are
(i) Frequency Division Multiple Access (FDMA)
(ii)Time Division Multiple Access (TDMA)
(iii)Code Division Multiple Access (CDMA)

7. List the features of wireless LAN.


The features of wireless LAN are
(a) Power management to save the battery power.
(b) The handling of hidden nodes.
(c) The ability to operate worldwide.

8. Draw the frame format of IEEE 802.11 physical layer using FHSS.
The frame format of IEEE 802.11 physical layer using FHSS are

Sync SFD PLW PSF HEC MPDU


(80) (16) (12) (4) (16) variable

SFD –Start Frame Delimiter


PLW- PDU Length Word
PSF – PLCP Signalling Field
HEC – Header Error Check
MPDU – MAC Protocol Data Unit

9. What are the classifications of MAC protocol? (May/June 12)

Prepared by A.Devasena., Asso. Prof/ Dept. of ECE Page 7


EC2050 ― Mobile Ad hoc Networks VIII Semester ECE

10. What are the mechanisms used in the MAC layer?


The mechanisms used in the MAC layer are
1. Contention based protocols
2. Contention based protocols with reservation mechanisms
3. Contention based protocols with scheduling mechanisms
4. Protocols with directional antennas

11. What are the differences between HRMA and SRMA?

Prepared by A.Devasena., Asso. Prof/ Dept. of ECE Page 8


EC2050 ― Mobile Ad hoc Networks VIII Semester ECE

S.No. HRMA SRMA


A multichannel MAC protocol which is
based on half-duplex, very slow TDMA frame based dynamic reservation
1
frequency-hopping spread spectrum MAC protocol
(FHSS) radios
Time slot reservation protocol where each
Nodes are allocated different time slots so
2 fixed time slot is assigned a frequency
that transmissions are collision free
channel
Uses a reservation and handshake
mechanism to enable a pair of Nodes use a collision-avoidance
3 communicating nodes to reserve a handshake mechanism and a soft
frequency hop, thereby guaranteeing reservation mechanism
collision-free data transmission
Developed with the main objective of
supporting integrated services of real-time
4 Supports real time transmission
and non-real-time application in ad hoc
networks

12. What are the advantages of directional antennas MMAC over MACAW?
The advantages of directional antennas over MACAW are
1. Reduced signal interference
2. Increase in system throughput
3. Improved channel reuse
4. Increase in overall capacity of the channel

13. List the five phases of FPRP.


The five phases of FPRP are
1. Reservation request phase
2. Collision report phase
3. Reservation confirm phase
4. Reservation acknowledge phase
5. Packing/elimination phase

14. List any two needs of real-time MAC protocol. (Nov/Dec 12)
RTMAC provides a bandwidth reservation mechanism to support real time traffic in ad

Prepared by A.Devasena., Asso. Prof/ Dept. of ECE Page 9


EC2050 ― Mobile Ad hoc Networks VIII Semester ECE

hoc wireless network.


The real-time MAC protocol is needed where
1. Nodes do not require global time synchronization:
RTMAC has no time synchronization since nodes operate in the asynchronous
mode.
2. Successive reservation slots need not align with each other:
Small slot can be used to transmit DATA and ACK packet and it can use some
other slot for control packets (Resv RTS, Resv CTS, Resv ACK) for transmitting
best effort packet.

15. Compare the efficiency of the packet queuing mechanism adopted in MACA and
MACAW. (Nov/Dec 12)
MACAW implements per flow fairness as opposed to the per node fairness in MACA.
This is done by manipulating multiple queues at every node, one each for each data stream,
and running the back-off algorithm independently for each queue. Thus the efficiency of the
packet queuing mechanism is better in MACAW.

16. How is directional antenna MMAC superior over MACAW?


Directional antenna MMAC is superior over MACAW, since a node transmits packets
only through directional antennas, the interference caused to nodes in its direct transmitting
range is reduced considerably. This leads to an increase in the overall throughput of the
system.

17. List the services provided by IEEE 802.11.


The services provided by IEEE 802.11 are
a)Association
b)Deauthentication
c)Disassociation
d)Integration
e)MSDU Delivery
f) Privacy
g) Reassociation

18. What are the MAC services of IEEE 802.11 that are not provided in traditional LAN

Prepared by A.Devasena., Asso. Prof/ Dept. of ECE Page 10


EC2050 ― Mobile Ad hoc Networks VIII Semester ECE

802.3? (May/Jun 2013)


The MAC services of IEEE 802.11 that are not provided in traditional LAN
802.3 are

Services Provider Used to Support


Association Distribution system MSDU delivery
Authentication Station LAN access and security
De authentication Station LAN access and security
Disassociation Distribution system MSDU delivery
Distribution Distribution system MSDU delivery
Integration Distribution system MSDU delivery
MSDU Station MSDU delivery
Privacy Station LAN access and security
Reassociation Distribution system MSDU delivery

19. List the challenges faced by WLAN industry. (May/June 2012)


The challenges faced by WLAN industry are
a) Data rate enhancements
b) Minimizing size and cost
c) Low power networking
d) User security

20. What are the versions of HIPER LAN?


The versions of HIPER LAN are
a) HIPER LAN-1
b) HIPER LAN-2
c)HIPER Access
d)HIPER Link

21. List the protocols used in HIPER LAN-2.


The protocols used in HIPER LAN-2
a) Radio Link Control (RLC) protocol.
b) DLC connection Protocol.
c) Radio Resource Protocol (RRC)
d) Association control Function (ACF)

Prepared by A.Devasena., Asso. Prof/ Dept. of ECE Page 11


EC2050 ― Mobile Ad hoc Networks VIII Semester ECE

22. What are the phases available in HIPER LAN-1 MAC layer?
The phases available in HIPER LAN-1 MAC layer
Prioritization Phase: It determines the highest priority of a data packet ready to
be sent by competing nodes.
Contention phase : Eliminate all but one of the contenders if more than one
sender has the current priority.
Transmission Phase: Transmit the packet of the remaining node.

23. Why does an AP in wireless network act as a bridge? (Nov/Dec 2012)


Access Point in IEEE802.11 architecture acts as a bridge and a relay point. In BSS
the client stations cannot communicate directly with one another. Rather if one client wants to
communicate to another client of same BSS a MAC frame format is sent to AP and AP will
connect to the requested destination. Similarly a MAC frame from a station in the BSS to the
remote station is sent from the local station to the AP and then relayed by the AP over the DS
on its way to its destination station.

24. List the features of 802.15 standard. (May/June 12)


IEEE has approved a Bluetooth based standard (IEEE 802.15.1) for WPANS. The standard
covers only MAC and the physical layers.
The features of 802.15 standard are
1. It employs radio frequency technology for communication.
2. It makes use of frequency modulation to generate radio waves in the ISM band.
3. Low power consumption.
4. It covers range up to 10 meters.
5. Can establish ad hoc network of laptops.

25. What is HIPERACCESS?


HIPERACCESS (originally called HIPERLAN/3) covers “the last mile” to the customer.
It enables establishment of outdoor high speed radio access networks, providing fixed radio
connections to customer premises. HIPERACCESS provides a data rate of 25Mbps. It can
be used to connect HIPERLAN/2 deployments that are located far apart (up to 5Km away).
It offers point - to - multipoint communication.

Prepared by A.Devasena., Asso. Prof/ Dept. of ECE Page 12


EC2050 ― Mobile Ad hoc Networks VIII Semester ECE

Unit III

1. List the major goals when selecting a routing protocol.


The major goals when selecting a routing protocol are
a) Provide the maximum possible reliability by selecting alternative routes if
a node connectivity fails.
b) Route network traffic through the path with least cost in the network by
minimizing the actual length between the source and destination through
the least number of intermediate nodes.
c) Provide the nodes the best possible response time and throughput. This is
especially important for interactive sessions between user applications.

2. Give the classifications of routing protocol in MANET.


The classifications of routing protocol in MANET are
a)Proactive protocols: This protocol attempt to evaluate continuously the
routes within the network, so that when a packet needs
to be forwarded, the router is already known and can
be immediately used.
b) Reactive protocols: This protocol invoke a route determination procedure
only on demand.
The routing protocols may also be categorized as follows:
a) Table-driven protocols.
b) Source-initiated on-demand protocols.

3. List the table driven protocols.


The table driven protocols are
a) Destination-Sequenced Distance Vector (DSDV)
b) Cluster Head Gateway Switch Routing (CHGSR)
c) Wireless Routing Protocol (WRP)

4. List the Source-initiated On-Demand Routing Protocols.


The Source-initiated On-Demand Routing Protocols are
a) Adhoc On-Demand Distance Vector Routing (AODV)
b) Dynamic Source Routing (DSR)
c) Temporarily Ordered Routing Algorithm (TORA)
d) Associatively Based Routing (ABR)
e) Signal Stability Based Routing (SSR)

Prepared by A.Devasena., Asso. Prof/ Dept. of ECE Page 13


EC2050 ― Mobile Ad hoc Networks VIII Semester ECE

5. What are hybrid protocols?


Hybrid Protocols attempt to take advantage of best reactive and proactive schemes.
These protocols are to initiate route discovery on demand but at a limited search cost.

6. List the hybrid protocols.


The hybrid protocols are
a) Zone Routing Protocol (ZRP)
b) Fisheye State Routing (FSR)
c) LANdMArk Routing (LANMAR) for MANET with group mobility
d) Location-Aided Routing (LAR)
e) Distance Routing Effect Algorithm for Mobility (DREAM)
f) Relative Distance Micro discovery Adhoc Routing (RDMAR)
g) Power aware Routing
h) Multipath Routing Protocols
7. Differentiate proactive and reactive routing protocols. Write examples for each.
(May/June 12)
S.No. Proactive Reactive
1 Route is pre-established Route establishment is on-demand
Route discovery by some global
2 Continuously discover the routes
search
Updates topology information(table)
3 No information update is done
periodically
longer delay due to latency of route
4 No latency in route discovery
discovery
Large capacity is needed to update
5 Large capacity is not needed
network information
A lot of routing information may May not be appropriate for real-time
6
never be used communication
7 Eg: DSDV, WRP Eg: AODV, ABR

8.What is the approach used to find link stability in ABR?


Associativity-based routing (ABR) protocol selects route based on the stability of the
wireless link. A link is classified as stable or unstable based on its temporal stability.
Temporal stability is determined based on number of beacon signal that node receives from its
neighbors.
 Large number of beacon signals implies stable link
 Lesser number of beacon signals implies unstable link

9. How does energy aware routing work? (May/June 12)

Prepared by A.Devasena., Asso. Prof/ Dept. of ECE Page 14


EC2050 ― Mobile Ad hoc Networks VIII Semester ECE

The energy aware routing works based on the routing metrics such as low energy, cost
and remaining battery charge. It aims mainly at increasing the lifetime of the network.

10. List the classification of routing protocols based on the routing information update
mechanism.
The classification of routing protocols based on the routing information update
mechanism are

1. Table driven routing protocols


- Periodic exchange of routing information.
- Each node maintains its own routing table.
2. On-demand routing protocols
- No periodic exchange of routing information.
- Route is found when only required.
3. Hybrid routing protocols
- Uses both table driven routing and on-demand routing protocols.
- Table driven routing (at a defined local zone) + on-demand routing (among zones)

11. List the approaches for power aware routing protocol.


The approaches for Power aware routing are
1. Minimize Energy Consumption per Packet
2. Maximize Network Connectivity
3. Minimize Variance in Node Power Levels
4. Minimize Cost per Packet
5. Minimize Maximum Cost per Node

12. What is the need for power management in Adhoc network?


In Adhoc networks, the routers are power constrained just as the nodes. There is
limitation in availability of power for operation. The power management is needed for
1. Efficient utilization of energy
2. Increase in life time of the network
3. Portability, weight, size of the hand held devices
4. Difficulties in replacing batteries
5. Improving channel utilization
6. Selection of optimal transmission power

Prepared by A.Devasena., Asso. Prof/ Dept. of ECE Page 15


EC2050 ― Mobile Ad hoc Networks VIII Semester ECE

13. List the advantages and disadvantages of DSDV routing protocols.


The advantages and disadvantages of DSDV routing protocols are
Advantages
a) Less Delay is involved in route setup process.
b) DSDV protocol guarantees loop free paths.
c) Incremental updates with sequence number tags make the existing wired network
protocols adaptable to ad-hoc wireless networks.
d) Count to infinity problem is reduced in DSDV.
e) Path Selection: DSDV maintains only the best path instead of maintaining multiple
paths to every destination. With this, the amount of space in routing table is reduced.
Disadvantages
a) Updates due to broken links lead to heavy control overhead during mobility.
b) The control overhead is directly proportional to the number of nodes.
c) Small network with high mobility or large network with low mobility can choke the
available bandwidth.
d) Wastage of bandwidth due to unnecessary advertising of routing information even if
there is no change in the network topology.
e) Delay in obtaining information about a node could result in stale routing at the nodes.

14. State any four reasons that lead to the quick power drain of nodes in mobile Ad
hoc network.
The reasons that lead to the quick power drain of nodes in mobile Ad hoc network are
a) Using the same route for a longer duration leads to partitioning of the network.
b) Quick depletion of the battery energy of the nodes along the most heavily used
routes in the network.
c) Power drain due to peripheral devices like disk drive etc. under idle conditions.
d) High number of retransmissions.
e) Nodes in ad hoc network consume substantial power even when they are in idle
state since they keep listening to the channel, awaiting request packets from
neighbor.
f) Power drain due to hardware devices (transmitters, receivers, display) in nodes.

15. Mention any four qualities of service metrics that are used to evaluate the
performance of the network.
The QOS metrics that are used to evaluate the performance of the network are
1. Minimum Bandwidth
2. Maximum Delay
3. Maximum Delay variance (Jitter)
4. Maximum packet loss rate

Prepared by A.Devasena., Asso. Prof/ Dept. of ECE Page 16


EC2050 ― Mobile Ad hoc Networks VIII Semester ECE

5. Security – Military
6. Availability of network – Emergency
7. Battery life – Group communications

Prepared by A.Devasena., Asso. Prof/ Dept. of ECE Page 17


EC2050 ― Mobile Ad hoc Networks VIII Semester ECE

16. Where is network layer solution used for QoS?


Network layer solution for QoS is used for
1. Enduring end-end resource negotiation
2. Reservation and
3. Reconfiguration

17. AMRIS may not exhibit high packet delivery ratio even when all nodes restrict their
mobility to a small region. Why? (Nov/Dec 12)
Since the selection of potential parent node is based on MSM-ID, AMRIS tends to
increase the average hop-length between the receivers and the source.
This leads to increased delay and increased probability of packet losses even when all
nodes restrict their mobility to a small region.

18. Is hop – length always the best metric for choosing paths in MANETs? Defend your
answer. (Nov/Dec 12)
No, hop length is not always the best metric for choosing paths in MANETs.
It is the best metric only in the shortest path protocol. For secure routing, all the nodes along
the path must be secure nodes else security is compromised. For energy aware routing, low
power consumption and remaining battery backup must also be considered for choosing path.

Prepared by A.Devasena., Asso. Prof/ Dept. of ECE Page 18


EC2050 ― Mobile Ad hoc Networks VIII Semester ECE

Unit IV

1. Assume that the TCP sender experiences a timeout when the current congestion
window size is 48 KB. Considering the MSS of 1KB, calculate the size of the
congestion window for which the next three transmissions will be successful.
(N/D12 R08)
Given, CW=48 KB and MSS=1 KB
When time out occurs, the TCP sender resets the congestion window size to one MSS
TRANSMISSION CW
First 2 KB
Second 4 KB
Third 8 KB
Therefore, the size of the congestion window after the three successful transmissions is 8 KB.

2. Comment on the use of natural language passwords directly for cryptographic


algorithms. (Nov/Dec 12)
The use of natural language passwords directly for cryptographic algorithms is not advisable
because such passwords are very weak and open to attack. This is due to the high redundancy
and the possibility of reuse over different sessions.

3.Why does TCP not work well in ad hoc network? (May/June 12)
The TCP does not work well in ad hoc network because of the following reasons
a) Misinterpretation of packet loss
b) Frequent path breaks
c) Effect of path length
d) Misinterpretation of congestion window
e) Asymmetric link behavior
f) Uni-directional path
g) Multipath routing
h) Network partitioning and remerging
i) Use of sliding-window-based transmission

4.What are the issues in designing transport layer protocol?


The issues in designing transport layer protocols are
a) Induced traffic
b) Induced throughput unfairness
c) Separation of congestion control, reliability and flow control
d) Power and bandwidth constraints
e) Misinterpretation of congestion

Prepared by A.Devasena., Asso. Prof/ Dept. of ECE Page 19


EC2050 ― Mobile Ad hoc Networks VIII Semester ECE

f) Completely decoupled transport layer


g) Dynamic topology

5. Why secure routing protocols are needed?


In ad hoc wireless networks, nodes act both as regular terminals (source or destination) and also
as routers for other nodes. In the absence of dedicated routers, providing security becomes a
challenging task in these networks. Due to certain unique characteristics of ad hoc wireless
networks the task of ensuring secure communication in ad hoc wireless networks is difficult.
Hence in order to provide secure communication, secure routing protocols are needed.

6.What is the typical value of time out period in traditional TCP? In what ways these
become a problem in mobile ad hoc networks?
The timeout period is atleast as much as the timer granularity, which is typically 100-500ms
and typically 500 ms for ATM LANs and WANs. The time out period depends on RTT
(round trip time).
TCP in ad hoc networks becomes a problem due to
a) Misinterpretation of packet loss
b) Frequent path breaks
c) Effect of path length
d) Misinterpretation of congestion window
e) Asymmetric link behavior
f) Uni-directional path
g) Multipath routing
h) Network partitioning and remerging
i) Use of sliding-window-based transmission
7.Define security routing
Security routing is defined as routing the data packets from the source to the destination in a
secured manner. Secured routing provides
a) Confidentiality
b) Integrity
c) Avalilability
d) Non-repudiation
8.What are not supported by the traditional TCP for handling Adhoc network?
The features that are not supported by the traditional TCP for handling adhoc network are
1. Throughput
2. Power consumption
3. Path break handling mechanisms
4. Scheduling of packet loss and rate of transmission
5. Bandwidth consumption due to RTS-CTS-DATA-ACK

Prepared by A.Devasena., Asso. Prof/ Dept. of ECE Page 20


EC2050 ― Mobile Ad hoc Networks VIII Semester ECE

9.How is secure routing done on wireless channels?


Secure routing is done on wireless channels by having secure routing protocols which support
1. Detection of malicious nodes
2. Guarantee of correct route discovery
3. Confidentiality
4. Stability against attacks

10. Define QoS frameworks.


A framework for QoS is a complete system that attempts to provide required/promised
services to each user or application. All components within this system cooperate in providing
the required services.

11. What is Byzantine attack? (May/June 12)


In the Byzantine attack, a compromised intermediate node or a set of compromised
intermediate nodes works in collusion and carries out attacks such as creating routing loops,
routing packets on non-optimal paths and selectively dropping packets.

Prepared by A.Devasena., Asso. Prof/ Dept. of ECE Page 21


EC2050 ― Mobile Ad hoc Networks VIII Semester ECE

Unit V
1. List the issues of integrating MANET with mobile IP network. (N/D12 R08)
The issues of integrating MANET with mobile IP network are
a) Micro-mobility support
b) Gateway discovery
c) Tunneling
d) Periodic Agent Advertisement
e) Movement Detection
f) Handoff decision
g) Mobile IP
h) Ad hoc Routing
i) Implementation Approach
j) Periodic Unicast Agent Advertisement
k) Use Agent Solicitation for gateway discovery
l) Incorporate Default Route concept to Ad hoc routing protocol
m) Routing between MANET nodes and gateway.

2. What are the factors that affect effective cross layer design? (M/J12 R08)
The factors that affect effective cross layer design are
a) Excessive packet losses
b) Unpredictable channel behavior
c) Inability to find stable and high-throughput paths
d) Throughput degradation due to intra-flow and inter-flow interferences
e) Lack of incentives (and a pricing mechanism) to forward transit packets

3. State the use of embedded protocol boosters in cross-layer optimization.


(N/D12 R08)
The actual realization of the cross-layer optimizations at the link layer is achieved with
embedded protocol boosters which are transparent enhancements of the protocol
communication between the end entities. Protocol boosters can perform adaptation procedures
towards upper layers and lower layers, assisting the process of information exchanges between
various layers without a need for actual protocol format changes, leading to improved system
performances.

4. What is the need for cross layer design?


The needs for cross layer design are
a) To enhance the performance of the layered protocol stacks.

Prepared by A.Devasena., Asso. Prof/ Dept. of ECE Page 22


EC2050 ― Mobile Ad hoc Networks VIII Semester ECE

b) The standard layered protocol stack is inefficient under mobility conditions, where
seamless mobility across heterogeneous mobile wireless technologies is essential as
mobile subscribers demand full and cost-effective wireless network coverage.

c) The highly variable nature of wireless links and the resource-poor nature of mobile
devices lead to inefficient functioning of the layered stack.

5. How is application layer integrated with its upper layer?


The application layer is integrated with its upper layer for the following reasons
a) The application layer communicates the user’s requirement to the lower layers.
b) The mobile device could then be reconfigured to satisfy user needs.

6. What is tunneling?
Tunneling is a mechanism in which the mobile node
a) Simply forwards the packets using the adhoc routing protocol to the destination node, if
the destination is inside the MANET
b) Encapsulates packets and sends them to the gateway node if the destination is not inside
the MANET
c) When the gateway node receives packets, it decapsulates them and sends them to the
original destination

7. What are the factors that affect effective cross layer design? (M/J12 R08)
The factors that affect effective cross layer design are
a) Excessive packet losses
b) Unpredictable channel behavior
c) Inability to find stable and high-throughput paths
d) Throughput degradation due to intra-flow and inter-flow interferences
e) Lack of incentives (and a pricing mechanism) to forward transit packets

8.Why ad hoc network is integrated with mobile IP? (M/J12 R08)


The growth of the Internet, its services and applications, and the convergence towards All-IP
networks in 4G wireless networks, where all traffic (data, control, voice and video services,
etc.) will be transported in IP packets, has led to an increasing demand for enabling MANET
nodes to integrate with mobile IP.

Prepared by A.Devasena., Asso. Prof/ Dept. of ECE Page 23


EC2050 ― Mobile Ad hoc Networks VIII Semester ECE

9. What are the classifications of integrated mobile IP network?


The classifications of integrated mobile IP network based on gateway discovery are

10. What is cross layer feedback?


Cross-layer feedback means interaction among the layers in the protocol stack. The cross-layer
feedback can be categorized as follows
Upper to lower layers:
Cross layer is done to communicate the delay or loss constraints of the application to the link
layer to enable the link layer to adapt its error correction mechanisms.

Lower to upper layers:


Cross layering is done to coordinate physical layer transmit power and bit-error rate information
communicated to the link/MAC layer to enable adaptation of error correction mechanisms.

Prepared by A.Devasena., Asso. Prof/ Dept. of ECE Page 24


EC2050 ― Mobile Ad hoc Networks VIII Semester ECE

11. What is protocol optimizer?


The protocol optimizer in the OSS (Optimizing Sub System) contains the cross layer feedback
algorithms. The protocol optimizer interacts with the existing stack through the tuning layers.
The PO decides the optimizing action to be taken based on the events occurring at the various
layers and the current state of the protocol layer which is to be modified. The optimizing
action modifies the target protocol’s behavior. This interaction is done through the tuning
layers.

Prepared by A.Devasena., Asso. Prof/ Dept. of ECE Page 25

You might also like