EC2050 Mobile Ad Hoc Networks VIII Semester ECE: Unit I
EC2050 Mobile Ad Hoc Networks VIII Semester ECE: Unit I
Unit I
3. What are the challenging issues in ad hoc network maintenance? (M/J12 R08)
The challenging issues in ad hoc network are
a) Medium access scheme
b) Routing
c) Multicast routing
d) Transport layer protocol
e) Pricing Schemes
f) Quality of Service Provisioning
g) Self-Organization
h) Security
i) Addressing and Service Discovery
j) Energy Management
k) Scalability
l) Deployment considerations
i. Longley-Rice model
ii. Durkin’s model
iii. Okumura model
4. Doppler Shift
Transmission rate constraints
b) Multipath propagation
c) Speed of the mobile
d) Transmission bandwidth of the signal.
18. Write the equation for maximum data rate according to Shannon’s theorem.
(May/June 13)
Shannon’s theorem states the maximum data rate possible on a noisy channel.
The maximum data rate is
C = B x log 2 (1+(S/N)) bits per second
Where C = maximum data rate, B = bandwidth
S/N = signal to noise ratio.
The Noise level is represented by SNR – Signal to Noise Ratio.
Unit II
3. What are the two types of protocols used to handle multiple access issues?
The two types of protocol that are used to handle multiple access issues are
(i) Contention based protocols
(ii) Conflict free (collision free) protocols.
5. List the types of Random Access protocols and Collision Resolution protocols.
The types of random access protocols are
(i) ALOHA type protocol
(ii) Carrier Sense Multiple Access (CSMA) type protocol
(iii) Busy tone multiple Access (BTMA) type protocol.
(iv) Idle Signal Multiple Access (ISMA) type protocol
The types of Collision resolution access protocols are
(i) TREE type protocol
(ii) Window type protocol.
6. What are the different types of conflict free protocols?
The different types of conflict free protocols are
(i) Frequency Division Multiple Access (FDMA)
(ii)Time Division Multiple Access (TDMA)
(iii)Code Division Multiple Access (CDMA)
8. Draw the frame format of IEEE 802.11 physical layer using FHSS.
The frame format of IEEE 802.11 physical layer using FHSS are
12. What are the advantages of directional antennas MMAC over MACAW?
The advantages of directional antennas over MACAW are
1. Reduced signal interference
2. Increase in system throughput
3. Improved channel reuse
4. Increase in overall capacity of the channel
14. List any two needs of real-time MAC protocol. (Nov/Dec 12)
RTMAC provides a bandwidth reservation mechanism to support real time traffic in ad
15. Compare the efficiency of the packet queuing mechanism adopted in MACA and
MACAW. (Nov/Dec 12)
MACAW implements per flow fairness as opposed to the per node fairness in MACA.
This is done by manipulating multiple queues at every node, one each for each data stream,
and running the back-off algorithm independently for each queue. Thus the efficiency of the
packet queuing mechanism is better in MACAW.
18. What are the MAC services of IEEE 802.11 that are not provided in traditional LAN
22. What are the phases available in HIPER LAN-1 MAC layer?
The phases available in HIPER LAN-1 MAC layer
Prioritization Phase: It determines the highest priority of a data packet ready to
be sent by competing nodes.
Contention phase : Eliminate all but one of the contenders if more than one
sender has the current priority.
Transmission Phase: Transmit the packet of the remaining node.
Unit III
The energy aware routing works based on the routing metrics such as low energy, cost
and remaining battery charge. It aims mainly at increasing the lifetime of the network.
10. List the classification of routing protocols based on the routing information update
mechanism.
The classification of routing protocols based on the routing information update
mechanism are
14. State any four reasons that lead to the quick power drain of nodes in mobile Ad
hoc network.
The reasons that lead to the quick power drain of nodes in mobile Ad hoc network are
a) Using the same route for a longer duration leads to partitioning of the network.
b) Quick depletion of the battery energy of the nodes along the most heavily used
routes in the network.
c) Power drain due to peripheral devices like disk drive etc. under idle conditions.
d) High number of retransmissions.
e) Nodes in ad hoc network consume substantial power even when they are in idle
state since they keep listening to the channel, awaiting request packets from
neighbor.
f) Power drain due to hardware devices (transmitters, receivers, display) in nodes.
15. Mention any four qualities of service metrics that are used to evaluate the
performance of the network.
The QOS metrics that are used to evaluate the performance of the network are
1. Minimum Bandwidth
2. Maximum Delay
3. Maximum Delay variance (Jitter)
4. Maximum packet loss rate
5. Security – Military
6. Availability of network – Emergency
7. Battery life – Group communications
17. AMRIS may not exhibit high packet delivery ratio even when all nodes restrict their
mobility to a small region. Why? (Nov/Dec 12)
Since the selection of potential parent node is based on MSM-ID, AMRIS tends to
increase the average hop-length between the receivers and the source.
This leads to increased delay and increased probability of packet losses even when all
nodes restrict their mobility to a small region.
18. Is hop – length always the best metric for choosing paths in MANETs? Defend your
answer. (Nov/Dec 12)
No, hop length is not always the best metric for choosing paths in MANETs.
It is the best metric only in the shortest path protocol. For secure routing, all the nodes along
the path must be secure nodes else security is compromised. For energy aware routing, low
power consumption and remaining battery backup must also be considered for choosing path.
Unit IV
1. Assume that the TCP sender experiences a timeout when the current congestion
window size is 48 KB. Considering the MSS of 1KB, calculate the size of the
congestion window for which the next three transmissions will be successful.
(N/D12 R08)
Given, CW=48 KB and MSS=1 KB
When time out occurs, the TCP sender resets the congestion window size to one MSS
TRANSMISSION CW
First 2 KB
Second 4 KB
Third 8 KB
Therefore, the size of the congestion window after the three successful transmissions is 8 KB.
3.Why does TCP not work well in ad hoc network? (May/June 12)
The TCP does not work well in ad hoc network because of the following reasons
a) Misinterpretation of packet loss
b) Frequent path breaks
c) Effect of path length
d) Misinterpretation of congestion window
e) Asymmetric link behavior
f) Uni-directional path
g) Multipath routing
h) Network partitioning and remerging
i) Use of sliding-window-based transmission
6.What is the typical value of time out period in traditional TCP? In what ways these
become a problem in mobile ad hoc networks?
The timeout period is atleast as much as the timer granularity, which is typically 100-500ms
and typically 500 ms for ATM LANs and WANs. The time out period depends on RTT
(round trip time).
TCP in ad hoc networks becomes a problem due to
a) Misinterpretation of packet loss
b) Frequent path breaks
c) Effect of path length
d) Misinterpretation of congestion window
e) Asymmetric link behavior
f) Uni-directional path
g) Multipath routing
h) Network partitioning and remerging
i) Use of sliding-window-based transmission
7.Define security routing
Security routing is defined as routing the data packets from the source to the destination in a
secured manner. Secured routing provides
a) Confidentiality
b) Integrity
c) Avalilability
d) Non-repudiation
8.What are not supported by the traditional TCP for handling Adhoc network?
The features that are not supported by the traditional TCP for handling adhoc network are
1. Throughput
2. Power consumption
3. Path break handling mechanisms
4. Scheduling of packet loss and rate of transmission
5. Bandwidth consumption due to RTS-CTS-DATA-ACK
Unit V
1. List the issues of integrating MANET with mobile IP network. (N/D12 R08)
The issues of integrating MANET with mobile IP network are
a) Micro-mobility support
b) Gateway discovery
c) Tunneling
d) Periodic Agent Advertisement
e) Movement Detection
f) Handoff decision
g) Mobile IP
h) Ad hoc Routing
i) Implementation Approach
j) Periodic Unicast Agent Advertisement
k) Use Agent Solicitation for gateway discovery
l) Incorporate Default Route concept to Ad hoc routing protocol
m) Routing between MANET nodes and gateway.
2. What are the factors that affect effective cross layer design? (M/J12 R08)
The factors that affect effective cross layer design are
a) Excessive packet losses
b) Unpredictable channel behavior
c) Inability to find stable and high-throughput paths
d) Throughput degradation due to intra-flow and inter-flow interferences
e) Lack of incentives (and a pricing mechanism) to forward transit packets
b) The standard layered protocol stack is inefficient under mobility conditions, where
seamless mobility across heterogeneous mobile wireless technologies is essential as
mobile subscribers demand full and cost-effective wireless network coverage.
c) The highly variable nature of wireless links and the resource-poor nature of mobile
devices lead to inefficient functioning of the layered stack.
6. What is tunneling?
Tunneling is a mechanism in which the mobile node
a) Simply forwards the packets using the adhoc routing protocol to the destination node, if
the destination is inside the MANET
b) Encapsulates packets and sends them to the gateway node if the destination is not inside
the MANET
c) When the gateway node receives packets, it decapsulates them and sends them to the
original destination
7. What are the factors that affect effective cross layer design? (M/J12 R08)
The factors that affect effective cross layer design are
a) Excessive packet losses
b) Unpredictable channel behavior
c) Inability to find stable and high-throughput paths
d) Throughput degradation due to intra-flow and inter-flow interferences
e) Lack of incentives (and a pricing mechanism) to forward transit packets