EC2050 MOBILE ADHOC NETWORKS PDF

EC2050 MOBILE ADHOC NETWORKS PDF

EC Mobile Ad hoc Networks. Subject Code / Name: DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING QUESTION BANK. B.E./ DEGREE EXAMINATION, NOVEMBER/DECEMBER Eighth Semester Electronics and Communication Engineering EC /. EC MOBILE ADHOC NETWORKS. L T P C. 3 0 0 3. UNIT I. INTRODUCTION. 9. Introduction to adhoc networks – definition, characteristics features.

Author: Mugore Zujin
Country: Egypt
Language: English (Spanish)
Genre: Spiritual
Published (Last): 7 December 2016
Pages: 149
PDF File Size: 1.75 Mb
ePub File Size: 15.92 Mb
ISBN: 632-1-29630-247-3
Downloads: 33306
Price: Free* [*Free Regsitration Required]
Uploader: Maukinos

Successive reservation slots need not align with each other: The services provided by IEEE Distinguish between shadowing and reflection of signal propagation.

Secure routing is done on wireless channels by having secure routing protocols which support 1. The features of TCP in ad hoc networks becomes a problem due to a Misinterpretation of packet loss b Frequent path breaks c Effect of path length d Misinterpretation of congestion window e Asymmetric link behavior f Uni-directional path g Multipath routing h Network partitioning and remerging i Use of sliding-window-based transmission 7.

MAC protocol should maximize it. Considering the MSS of 1KB, calculate the size of the congestion window for which the next three transmissions will be successful.

Mobile Adhoc Networks – Syllabus | EC | uLektz Learning Solutions Private Limited

Difficulties in replacing batteries 5. What is the need for power management in Adhoc network?

What are the advantages of hierarchical routing protocol? For secure routing, all the nodes along the path must be secure nodes else security is compromised. Why secure routing protocols are needed?

Foliage, lamp post, sharp edges. What is the need for cross layer design? Proactive Reactive 1 Route is pre-established Route establishment is on-demand Route discovery by some global 2 Continuously discover the routes search Updates topology information table 3 No information update is done periodically longer delay due to latency of route 4 No latency in route discovery discovery Large capacity is needed to update 5 Large capacity is not needed network information A lot of routing information may May not be appropriate for real-time 6 never be used communication 7 Eg: List the benefits when deployment of a commercial ad hoc wireless networks compared to wired network.

  KNAUF SILIPERL PDF

EC MOBILE ADHOC NETWORKS SYLLABUS ~ Online Virtual-Tutor

How does energy aware routing work? Discuss the Pros and Cons of a routing protocol that uses GPS information for an Adhoc wireless Network for search and rescue operation.

List the design goals of MAC protocol for ad- hoc networks. Define — Indoor Propagation Model Indoor propagation model is defined as the model which is used to characterize radio propagation inside the buildings.

How scalability improved in ad hoc wireless network. The difference between the effective transmitted power and the received power is called path loss. In what ways these become a problem in mobile ad hoc networks 4. Path break mobil mechanisms 4.

Explain using the WAP model. They are Prepared by A. Why does an AP in wireless network act as a bridge? Collision report phase 3. How is scheduling mechanism achieved in distributed wireless ordering protocol?

Differentiate proactive and reactive routing protocols.

Explain how the adho provisioning in adhoc network differs from that in infrastructure based network. Explain the significant challenges of generic cross layer design. Can establish ad hoc network of laptops. What are the advantages and disadvantages of MAC protocol using directional antennas? What are the major challenges in designing routing protocols? What do you mean by FAMA? What is the typical value of time out period in traditional TCP?

  FESTINGER CARLSMITH 1959 PDF

Book Details

Guarantee of correct route discovery 3. This is due to the high redundancy and the possibility of reuse over different sessions. Military applications and battlefields b. The five phases of FPRP are 1. What are the effects of exposed terminal problem in wireless networks? Explain with an example.

Explain the contention netowrks protocols with scheduling and reservation in detail. Hidden terminals are nodes that are hidden or not reachable from the sender of a data transmission session, but are reachable to the receiver of the session. Why ad hoc network is integrated with mobile IP? The frame format of IEEE Lower to upper layers: It offers point – to – multipoint communication. Selection of jetworks transmission power Prepared by A.

What are the mechanisms used in the MAC layer? What is cross layer feedback? Explain the features of a cross-layer model designed for multiuser scheduling.