Sie sind auf Seite 1von 8

E.G.S. PILLAY ENGINEERING COLLEGE Rev.

0
(An Autonomous Institution, Affiliated to Anna University, Chennai)
COE/2017/QB
Nagore Post, Nagapattinam – 611 002, Tamilnadu.

17CO017 MOBILE AD HOC NETWORKS


Academic Year : 2017-2018 Programme M.E - CS
:
Question Bank
Year / I / II Course Coordinator V.ELAVARASI
Semester : :

Course Objectives Course Outcomes:

1. To introduce the characteristic features On completion of the course, students will be able to
of ad hoc wireless networks and their
applications to the students. CO1: The student would be able to demonstrate an
2. To enable the student to understand the understanding of the trade-offs involved in the
functioning of different access and design of AdHoc networks
routing protocols that can be used for ad CO2: The student would be able to design and
hoc networks. implement protocols suitable to AdHoc
3. To enable the student to understand the communication scenario using design tools and
need for security and the challenges and characterize them.
also the role of cross layer design in CO3: The student is exposed to the advances in
enhancing the network performance adhoc network design concepts

PART – A ( 2 Mark Questions With Key)


S.No Questions Mark COs BTL
UNIT III – NETWORK PROTOCOLS
1 What are the issues in network protocols? 2 K1
1. Mobility 2.Bandwidth Constraint 3. Error-prone shared broadcast
radio channel 4. Hidden and exposed terminal problems 5. Resource 2
Constraints
2 What are the classification of routing protocol ? 2 K1
The routing protocol for adhoc wireless networks can be broadly 1
classified into 4 categories based on
*Routing information update mechanism.
*Use of temporal information for routing
*Routing topology 1
*Utilization of specific resources.
3 What is meant by Proactive routing protocol? 2 K1
Proactive or table-driven routing protocols: 2
Every node maintains the network topology information in the form of
routing tables by periodically exchanging routing information.
4 What is the use of Hierarchical topology routing protocols? 2 K1
E.G.S. PILLAY ENGINEERING COLLEGE Rev.0
(An Autonomous Institution, Affiliated to Anna University, Chennai)
COE/2017/QB
Nagore Post, Nagapattinam – 611 002, Tamilnadu.

Make use of a logical hierarchy in the network and an associated 2


addressing scheme. The hierarchy could be based on geographical
information or it could be based on hop distance.
5 List out the classification of Table driven routing protocol? 2 K1
Destination sequenced distance vector routing protocol (DSDV), 1
wireless routing protocol (WRP)
Source-tree adaptive routing protocol (STAR) and cluster-head gateway 1
switch routing protocol (CGSR)
6 Write the merits of DSDV Protocol? 2 K1
Less delay involved in the route setup process. Mechanism of 2
incremental update with sequence number tags makes the existing
wired network protocols adaptable to ad hoc wireless networks.
7 What are the Demerits of Cluster-Head Gateway Switch Routing Protocol 2 K1
Increase in path length and instability in the system at high mobility 2
when the rate of change of cluster-head is high. Lead to Frequent
changes in the cluster-head, which may result in multiple path breaks
8 Give short notes on AODV? 2 K1
Route is established only when it is required by a source node for 1
transmitting data packets
It employs destination sequence numbers to identify the most recent
path
Source node and intermediate nodes store the next hop information 1
corresponding to each flow for data packet transmission
9 What is meant by LAR ? 2 K1
Location-Aided Routing (LAR) 2
*It utilizes the location information for improving the efficiency of
routing by reducing the control overhead.
10 Define INTER- AND INTRA-DOMAIN ROUTING? 2 K1
Routing inside an autonomous system is called intra-domain routing 1
Routing between autonomous systems is called inter-domain routing. 1
11 Define RIP? 2 K1
The Routing Information Protocol (RIP) is an intra-domain (interior) 2
routing protocol used inside an autonomous system. It is a very simple
protocol based on distance vector routing. RIP implements distance
vector routing directly with some considerations.
12 Define Multicating? 2 K1
In multicast routing, the router may forward the received packet 1
through several of its interfaces.
Broadcasting is a special case of multicasting 1
13 What are the merits and demerits of Zone Based Hierarchical Link State 2 K1
Routing Protocol (ZHLS)?
E.G.S. PILLAY ENGINEERING COLLEGE Rev.0
(An Autonomous Institution, Affiliated to Anna University, Chennai)
COE/2017/QB
Nagore Post, Nagapattinam – 611 002, Tamilnadu.

Advantages 1
*Reduce storage requirements and common overhead.
*Robust and resilient to path breaks.
*Non overlapping zones.
Disadvantages 1
*Additional overhead incurred in creation of zone level topology.
*Path to Destination is suboptimal.
*Geographical info may not be available in all environments
14 Differentiate OLSR and HSR? 2 K1
It is a proactive routing protocol that employs an efficient link state 1
packet forwarding mechanism called multipoint relaying (MPR).
This protocol optimizes the pure link state routing protocol.
It is a distributed multi-level hierarchical routing protocol that employs 1
clustering at different levels with efficient membership management at
every level of clustering. Each cluster has its leader.
15 What are the two type of QoS Service? 2 K1
Hard QoS 1
Soft QoS 1
UNIT IV - END -TO - END DELIVERY AND SECURITY
1 what are the issues in designing a transport layer protocol for ad hoc wireless K1
networks?
Induced Traffic, Induced throughput unfairness, Separation of 2
congestion control, reliability and flow control, Power and Band width 2
constraints, Interpretation of congestion
2 write any two design goals of a transport layer protocol for ad hoc wireless K1
networks
2
*The protocol should maximize the throughput per connection. 2
*It should provide throughput fairness across contending flows.
3 What are the merits of AdHoc TCP? K1
It maintains the end to end semantics of TCP. 1 2
* It is compatible with traditional TCP.
*Improves throughput of TCP in adhoc wireless network 1
4 What are the application of controlled transport layer protocol? K1
*It is a light-weight transport layer protocol 2 2
*Assigns the responsibility of ensuring reliability to the application
layer
5 What are the requirements of network security? 2 K1
Confidentiality, Integrity, Availability, Non-Repudiation 2
6 Write any two types of attack in network layer? K1
2
Wormhole attack, Blackhole attack. 2

7 Define Cryptography? 2 K1
E.G.S. PILLAY ENGINEERING COLLEGE Rev.0
(An Autonomous Institution, Affiliated to Anna University, Chennai)
COE/2017/QB
Nagore Post, Nagapattinam – 611 002, Tamilnadu.

Cryptography is one of the most common & reliable means to ensure 2


security & can be applied to any communication network
8 Give two solutions for the black hole problem? K1
*One of the solutions for the black hole problem is to restrict the 2
intermediate nodes from originating Route Reply packets. 2
*Only the destination node would be permitted to initiate Route Reply
packets
9 What are 2 major kinds of cryptographic algorithms? K1
1. Symmetric key algorithms, which use the same key for encryption & 2
decryption. 2
2. Asymmetric key algorithms, which use two different keys for
encryption & decryption.
10 Define Plain text? K1
In the parlance of cryptography, the original information to be sent 2 2
from one person to another is called plaintext
11 What is meant by Secret key K1
The process of encryption and decryption are governed by keys, which 2
are small amounts of information used by the cryptographic algorithms. 2
When the keys is to be kept secret to ensure the security of the system,
it is called a secret key.
12 What is meant by block cipher? K1
A block cipher is an encryption scheme in which plaintext is broken 2 2
into fixed -length segments called blocks, & the blocks are encrypted
one at a time.
13 What are the fundamental requirements for a secure routing protocol? K1
Detection of malicious nodes, Guarantee of correct route discovery, 2 2
Confidentiality of network topology and Stability against attacks
14 What is the main goal of end-to-end route authentication? K1
The main goal of this end-to-end route authentication process is to 2 2
ensure that the correct intended destination is reached by the packets
sent from the source node.
15 What is meant by Byzantine attack in network layer? 2 K1
In this, a compromised intermediate note or a set of compromised 2
intermediate nodes work in collusion & carries out attack such as
creating routing loops, routing packets on non-optimal paths &
selectively dropping packets.
UNIT V – CROSS LAYER DESIGN AND INTEGRATION
1 What is meant by Cross-layer feedback? K1

Cross-layer feedback 2 3
Cross-layer feedback means interaction among the layers in the protocol
stack. For the sake of convenience, cross-layer feedback can be
categorized as follows: Upper to lower layers.
E.G.S. PILLAY ENGINEERING COLLEGE Rev.0
(An Autonomous Institution, Affiliated to Anna University, Chennai)
COE/2017/QB
Nagore Post, Nagapattinam – 611 002, Tamilnadu.

2 What is the function of MAC layer? 3 K1


The functions of link/MAC layer are improving link reliability through 2
forward error correction (FEC) and Automatic Repeat request (ARQ),
avoiding/reducing collisions, fragmenting data into frames. so as to
ensure reliable transmission with minimal overhead.
3 What is meant by optimizing sub system? 3 K1
Optimizing Sub System (OSS): The optimizing subsystem contains the 2
algorithms and data structures for cross layer optimizations. It is the
cross layer engine. The OSS contains many Protocol Optimizers (POs).
APO contains the algorithm for a given cross layer optimization. The
OSS executes concurrently with the existing protocol stack and does not
increase the stack processing overhead.
4 What is meant by Tunneling layer? 3 K1
ECLAIR provides one TL for each protocol. For the ease of reference 2
the tuning layers having similar function are grouped together. E.g.:
TCP tuning layer, UDP tuning layer, etc. are collectively
referred to as Transport Tuning Layer.
5 List out the classification of Tunneling layer? 3 K1
TL is subdivided into a generic tuning sub layer and an implementation 2
dependent access sub layer.
6 List out the classification of IP mobility management protocols 3 K1
IP mobility management protocols can be classified into two main 2
groups: IP macro-mobility protocols and IP micro-mobility protocols
7 What is meant by IP mobility management protocols? 3 K1
IP mobility management protocols are used to manage node mobility 2
between different subnets inside the domain or between different
domains. IP mobility management protocols can be classified into
two main groups: IP macro-mobility protocols and IP micro-mobility
protocols
8 What is meant by IP Macro-mobility protocols? 3 K1
Macro-mobility is the movement (roaming) of mobile nodes between 2
two subnets (or cells) in two different domains. IP macro-mobility
protocols are designed to handle the mobile node movement
between two domains without disconnection.
9 Classify integrated routing protocol? 3 K1
Integrated routing protocols may generally be categorized based on 2 3
gateway discovery procedure as:
• Proactive solutions
• Reactive solutions
• Hybrid solutions
10 Classify integrated routing solution? 3 K1
E.G.S. PILLAY ENGINEERING COLLEGE Rev.0
(An Autonomous Institution, Affiliated to Anna University, Chennai)
COE/2017/QB
Nagore Post, Nagapattinam – 611 002, Tamilnadu.

The integrated routing solutions have been classified into two 2


categories:
• Tunneling-based integration routing solutions
• Non tunneling-based integration routing solutions
11 Write short notes on dependency graph? 3 K1
In this dependency graph every relevant parameter is a node, and a 2
directed edge indicates the dependency relation between the parameters.
By combining the graphs for various protocols, a dependency graph for
the entire stack can be obtained.
12 Define Cross-layer feedback 3 K1
Cross-layer feedback 2
Cross-layer feedback means interaction among the layers in the protocol
stack.
13 Classify cross layer feedback? 3 K1
Cross-layer feedback can be categorized as follows: Upper to lower 2
layers.
14 What is the use of physical layer? 3 K1
The function of physical layer is to transmit raw bits over a certain 2
distance with minimum bit errors, using a suitable power level. The
information available at the physical layer is transmit power, bit-error
rate and coding/modulation in use.
15 What are the design goals for a cross layer architecture? 3 K1
Rapid prototyping 2
Minimum intrusion
Portability
Efficiency
PART – B (12 Mark Questions with Key)
S.No Questions Mark COs BTL
UNIT III – NETWORK PROTOCOLS
1 Explain the issues in designing a routing protocol for ad hoc
wireless networks
Mobility and Bandwidth Constraint 4 2 K2
Error-prone shared broadcast radio channel 4
Hidden and exposed terminal problems and Resource Constraints 4
2 Compare Table driven, On Demand and Hybrid routing Protocol? 2 K2
Table driven routing protocol 4
On Demand routing protocol 4
Hybrid routing protocol 4
3 Draw route maintenance chart for WRP and Explain in Detail? 2 K2
Route maintenance chart 4
Explanation about WRP 8
E.G.S. PILLAY ENGINEERING COLLEGE Rev.0
(An Autonomous Institution, Affiliated to Anna University, Chennai)
COE/2017/QB
Nagore Post, Nagapattinam – 611 002, Tamilnadu.

4 Draw the graph for Bellman Ford Algorithm and explain the concept of 2 K2
Bellman ford and Distance vector routing?
Bellman ford algorithm 6
Distance vector routing 6
5 Explain about Multicast routing algorithm? 2 K2
Optimal routing: Shortest path trees 6
Unicast Routing 6
6 Describe the concept of routing protocols with efficient flooding mechanisms? 2 K2
Preferred link-based routing (PLBR) protocol 6
Optimized link state routing (OLSR) protocol 6
UNIT IV - END -TO - END DELIVERY AND SECURITY
1 Compare TCP solutions for adhoc wireless networks
TCP-F,TCP ELFN,TCP Bus 6 2 K2
ATCP, Split TCP 6
2 Describe the issues and challenges in security provisioning in AdHoc
network
2 K2
Issues in security provisioning in AdHoc network 6
Challenges in security provisioning in AdHoc network 6
3 Classify network security attack and explain network layer attack in detail
Classification of network security attack 6 2 K2
Explanation of network layer attack 6
4 Explain in detail symmetric key and asymmetric key algorithm
Symmetric key algorithm 6 2 K2
Asymmetric key algorithm 6
5 Explain key management in AdHoc wireless network
Password based group system ,Threshold Cryptography 6
2 K2
Self-Organised Public Key Management for Mobile Adhoc
6
Networks
6 Decribe the issues and goals for designing a transport layer protocol in
AdHoc wireless network
Issues for designing a transport layer protocol in AdHoc wireless
6 2 K2
network
Goals for designing a transport layer protocol in AdHoc wireless
6
network
UNIT V – CROSS LAYER DESIGN AND INTEGRATION
1 Draw ÉCLAIR architecture and explain the design goals for cross layer
architecture ?
3 K2
ÉCLAIR architecture 6
Design goals for cross layer architecture 6
2 Describe about Cross layer feedback ?
Interaction with Upper layer 6 3 K2
Interaction with lower layer 6
E.G.S. PILLAY ENGINEERING COLLEGE Rev.0
(An Autonomous Institution, Affiliated to Anna University, Chennai)
COE/2017/QB
Nagore Post, Nagapattinam – 611 002, Tamilnadu.

3 Explain the concept of Von Neuman architecture of computer system?


Diagram for Von Neuman architecture 6 3 K2
Importance of Architecture 6
4 Illustrate the concept of Cross layer design principle ?
Dependency graph 6 3 K2
Cross layer design principle 6
5 Draw ÉCLAIR architecture - User feedback and ÉCLAIR architecture
-Adapted TCP and explain its concept?
3 K2
ÉCLAIR architecture - User feedback and its concept 6
ÉCLAIR architecture -Adapted TCP and its concept 6
6 Compare various cellular system? 3 K2
3G and 4G 6
Satellite system, Bluetooth and Wi-Fi, Paging system 6
PART – C (20 Mark Questions with Key)
S.No Questions Mark COs BTL
UNIT III – NETWORK PROTOCOLS
1 Compare MBONE and Logical tunneling?
MBONE with diagram 10 2 K2
Logical tunneling with diagram 10
2 Compare CBT and PIM? 2 K2
Explanation about CBT 10
Explanation about PIM 10
UNIT IV - END -TO - END DELIVERY AND SECURITY
1 Discuss briefly the reasons why TCP does not perform well in Adhoc
wireless network
Misinterpretation of packet loss, Frequent path breaks, Effect of path
10
length, Misinterpretation of congestion window 2 K3
Asymmetric link behavior, Uni directional path, Multipath Routing,
Network partitioning and remerging, Use of sliding window based 10
transmission
2 state the importance of TCP bus 2 K2
Architecture of TCP Bus 10
Importance of TCP Bus with merits and demerits 10
UNIT V – CROSS LAYER DESIGN AND INTEGRATION
1 Discuss the concept of integrated network architecture?
Protocol design 10 3 K2
Hand-off Algorithm 10
2 Discuss the importance of Tunneling 3 K2
Tunneling-based integration routing solutions 10
Non tunneling-based integration routing solutions 10

Das könnte Ihnen auch gefallen