Beruflich Dokumente
Kultur Dokumente
0
(An Autonomous Institution, Affiliated to Anna University, Chennai)
COE/2017/QB
Nagore Post, Nagapattinam – 611 002, Tamilnadu.
1. To introduce the characteristic features On completion of the course, students will be able to
of ad hoc wireless networks and their
applications to the students. CO1: The student would be able to demonstrate an
2. To enable the student to understand the understanding of the trade-offs involved in the
functioning of different access and design of AdHoc networks
routing protocols that can be used for ad CO2: The student would be able to design and
hoc networks. implement protocols suitable to AdHoc
3. To enable the student to understand the communication scenario using design tools and
need for security and the challenges and characterize them.
also the role of cross layer design in CO3: The student is exposed to the advances in
enhancing the network performance adhoc network design concepts
Advantages 1
*Reduce storage requirements and common overhead.
*Robust and resilient to path breaks.
*Non overlapping zones.
Disadvantages 1
*Additional overhead incurred in creation of zone level topology.
*Path to Destination is suboptimal.
*Geographical info may not be available in all environments
14 Differentiate OLSR and HSR? 2 K1
It is a proactive routing protocol that employs an efficient link state 1
packet forwarding mechanism called multipoint relaying (MPR).
This protocol optimizes the pure link state routing protocol.
It is a distributed multi-level hierarchical routing protocol that employs 1
clustering at different levels with efficient membership management at
every level of clustering. Each cluster has its leader.
15 What are the two type of QoS Service? 2 K1
Hard QoS 1
Soft QoS 1
UNIT IV - END -TO - END DELIVERY AND SECURITY
1 what are the issues in designing a transport layer protocol for ad hoc wireless K1
networks?
Induced Traffic, Induced throughput unfairness, Separation of 2
congestion control, reliability and flow control, Power and Band width 2
constraints, Interpretation of congestion
2 write any two design goals of a transport layer protocol for ad hoc wireless K1
networks
2
*The protocol should maximize the throughput per connection. 2
*It should provide throughput fairness across contending flows.
3 What are the merits of AdHoc TCP? K1
It maintains the end to end semantics of TCP. 1 2
* It is compatible with traditional TCP.
*Improves throughput of TCP in adhoc wireless network 1
4 What are the application of controlled transport layer protocol? K1
*It is a light-weight transport layer protocol 2 2
*Assigns the responsibility of ensuring reliability to the application
layer
5 What are the requirements of network security? 2 K1
Confidentiality, Integrity, Availability, Non-Repudiation 2
6 Write any two types of attack in network layer? K1
2
Wormhole attack, Blackhole attack. 2
7 Define Cryptography? 2 K1
E.G.S. PILLAY ENGINEERING COLLEGE Rev.0
(An Autonomous Institution, Affiliated to Anna University, Chennai)
COE/2017/QB
Nagore Post, Nagapattinam – 611 002, Tamilnadu.
Cross-layer feedback 2 3
Cross-layer feedback means interaction among the layers in the protocol
stack. For the sake of convenience, cross-layer feedback can be
categorized as follows: Upper to lower layers.
E.G.S. PILLAY ENGINEERING COLLEGE Rev.0
(An Autonomous Institution, Affiliated to Anna University, Chennai)
COE/2017/QB
Nagore Post, Nagapattinam – 611 002, Tamilnadu.
4 Draw the graph for Bellman Ford Algorithm and explain the concept of 2 K2
Bellman ford and Distance vector routing?
Bellman ford algorithm 6
Distance vector routing 6
5 Explain about Multicast routing algorithm? 2 K2
Optimal routing: Shortest path trees 6
Unicast Routing 6
6 Describe the concept of routing protocols with efficient flooding mechanisms? 2 K2
Preferred link-based routing (PLBR) protocol 6
Optimized link state routing (OLSR) protocol 6
UNIT IV - END -TO - END DELIVERY AND SECURITY
1 Compare TCP solutions for adhoc wireless networks
TCP-F,TCP ELFN,TCP Bus 6 2 K2
ATCP, Split TCP 6
2 Describe the issues and challenges in security provisioning in AdHoc
network
2 K2
Issues in security provisioning in AdHoc network 6
Challenges in security provisioning in AdHoc network 6
3 Classify network security attack and explain network layer attack in detail
Classification of network security attack 6 2 K2
Explanation of network layer attack 6
4 Explain in detail symmetric key and asymmetric key algorithm
Symmetric key algorithm 6 2 K2
Asymmetric key algorithm 6
5 Explain key management in AdHoc wireless network
Password based group system ,Threshold Cryptography 6
2 K2
Self-Organised Public Key Management for Mobile Adhoc
6
Networks
6 Decribe the issues and goals for designing a transport layer protocol in
AdHoc wireless network
Issues for designing a transport layer protocol in AdHoc wireless
6 2 K2
network
Goals for designing a transport layer protocol in AdHoc wireless
6
network
UNIT V – CROSS LAYER DESIGN AND INTEGRATION
1 Draw ÉCLAIR architecture and explain the design goals for cross layer
architecture ?
3 K2
ÉCLAIR architecture 6
Design goals for cross layer architecture 6
2 Describe about Cross layer feedback ?
Interaction with Upper layer 6 3 K2
Interaction with lower layer 6
E.G.S. PILLAY ENGINEERING COLLEGE Rev.0
(An Autonomous Institution, Affiliated to Anna University, Chennai)
COE/2017/QB
Nagore Post, Nagapattinam – 611 002, Tamilnadu.