EC Mobile Ad hoc Networks. Subject Code / Name: DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING QUESTION BANK. B.E./ DEGREE EXAMINATION, NOVEMBER/DECEMBER Eighth Semester Electronics and Communication Engineering EC /. EC MOBILE ADHOC NETWORKS. L T P C. 3 0 0 3. UNIT I. INTRODUCTION. 9. Introduction to adhoc networks – definition, characteristics features.
Author: | Migami Dashura |
Country: | Finland |
Language: | English (Spanish) |
Genre: | Technology |
Published (Last): | 2 February 2018 |
Pages: | 156 |
PDF File Size: | 11.82 Mb |
ePub File Size: | 18.85 Mb |
ISBN: | 255-1-58016-244-8 |
Downloads: | 31433 |
Price: | Free* [*Free Regsitration Required] |
Uploader: | Mujas |
How application layer is integrated with its upper layer? How is secure routing done on wireless channels? List and explain the issues in designing a MAC protocol for ad hoc wireless networks. The presence of dynamic and adaptive routing protocols enables quick formation of ad hoc networks and is suitable for emergency situations like natural disasters, spontaneous meetings or military conflicts. List mobike types of attacks in ad hoc wireless networks.
List some examples of table driven routing protocols. The services provided by IEEE List the major issues in wireless internet. The features of mibile MANET is defined as an autonomous system of nodes or Mobile Stations also serving as routers connected by wireless links, the union that forms a communication networks, modeled in the form of aehoc arbitrarily communication graph.
What is cross layer feedback? This is due to the high redundancy and the possibility of reuse over different sessions.
The needs for cross layer design are a To enhance the performance of the layered protocol stacks. What do you mean by encapsulation? List the classification of routing protocols based on the routing information update mechanism.
Describe how to integrate Adhoc with mobile IP. Mobility of nodes in a sparsely populated mobile ad ho network is less.
EC Mobile Adhoc Networks Question Bank updated | Devasena A. –
nobile Propagation model which is used to predict received signal strength, when the line-of-sight path is unobstructed between transmitter and receiver is called free space propagation model. Can establish ad hoc network of laptops. What is protocol optimizer? It is used in battlefields and military applications.
Write examples for each.
Book Details
In Adhoc networks, the routers are power constrained just as the nodes. Why does TCP not work well in ad hoc network? What is hybrid routing protocol? Explain how the security provisioning in adhoc network differs from that mboile infrastructure based adhhoc.
DSDV maintains only the best path instead of maintaining multiple paths to every destination. Some indoor propagation models are: Hence the cost staffing, etc. How on-demand routing protocols differ from on-demand routing protocols?
‘+relatedpoststitle+’
How is routing table constructed in fisheye state routing protocol? What are the advantages?
AMRIS may to exhibit high packet delivery ratio even networs all nodes restrict their mobility to a small region. Explain with an example. Detection of malicious nodes 2. There is limitation in availability of power for operation. The QOS metrics that are used to evaluate the performance of the network are 1.
Define Wireless datagram protocol WDP 5.
Mobile Adhoc Networks – Syllabus | EC | uLektz Learning Solutions Private Limited
For energy aware routing, low power consumption and remaining battery backup must also be considered for choosing path. Doppler Shift Transmission rate constraints Help Center Find new research papers in: What are the effects of exposed terminal problem in wireless networks?
MAC protocol should maximize it.
TCP in ad hoc networks becomes a problem due to a Misinterpretation of packet loss b Frequent path breaks c Effect of path length d Misinterpretation of congestion window e Asymmetric link behavior f Uni-directional path g Multipath routing h Mkbile partitioning and remerging i Adhocc of sliding-window-based transmission 7.
Remember me on this computer. Why secure routing protocols are needed? Associativity-based routing ABR protocol selects route based on the stability of the wireless link. List the classification of routing protocols based on the routing information update mechanism. Path break handling mechanisms 4.