Anna University, Chennai Department of Electronics and Communication Engineering Eighth Semester EC Mobile Adhoc Networks. ADHOC NETWORKS PPT – Free download as Powerpoint Presentation .ppt /. pptx), PDF File .pdf), Text File Introduction ` History ` Mobile Ad-hoc Networks ` Infrastructure based Networks and Infrastructureless Networks. . Adhoc Question Bank EC VTU 8TH SEM CSE ADHOC NETWORKS NOTES 10CS EC / EC Mobile Adhoc Networks May / June Question Paper ECE 8th Semester Regulation | BE Electronics and Communication.
|Published (Last):||21 January 2004|
|PDF File Size:||12.98 Mb|
|ePub File Size:||8.60 Mb|
|Price:||Free* [*Free Regsitration Required]|
In what ways these become a problem in mobile ad hoc networks? It is used in battlefields and military applications. Secured routing provides a Confidentiality b Integrity c Avalilability d Non-repudiation 8. Comment on the use of natural language passwords directly for cryptographic algorithms. Small scale fading is used to describe the rapid fluctuation of the amplitude, phase or multipath delays of a radio signal over a short period of time or travel distance. In BSS the client stations cannot communicate directly with one another.
The major goals when selecting a routing protocol are mobkle Provide the maximum possible reliability by selecting alternative routes if a node connectivity fails. Secure routing is done on wireless channels by having secure routing protocols which netwrks 1. The routers are free to move randomly and organize themselves arbitrarily; thus, the network’s wireless topology may change rapidly and unpredictably.
A link is classified as stable or unstable based on its temporal stability. How is secure routing done on wireless channels? IPv6 – Neighbor discovery, auto-configuration, routing.
List the design goals of a MAC protocol for ad-hoc networks. Contention based protocols with reservation mechanisms 3. List the applications of ad hoc networks.
Collision report phase 3. The standard covers only MAC and the physical layers.
The issues of designing a MAC protocol for ad-hoc networks are a Bandwidth efficiency: The distance covered is much smaller. Enduring end-end resource negotiation 2. It may or may not include the effects of antenna gain. This is due to the high redundancy and the possibility of reuse over different sessions. MAC protocol should maximize it. Log In Sign Up. How contention based protocols are classified? List the approaches for power aware routing protocol.
Circuits Switched Networks Control of Networks: Define — Indoor Propagation Model Indoor propagation model is defined as the model which is used to characterize radio propagation inside the buildings.
Military applications and battlefields b. The time out period depends on RTT round trip time. Hence in order to provide secure communication, secure routing protocols are needed. State moble use of embedded protocol boosters in cross-layer optimization. List the features of wireless LAN.
Network layer solution for QoS is used for 1. Emergency search and rescue operations d. Nodes are mobile most of the time 3. HRMA SRMA A multichannel MAC protocol which is based on half-duplex, very slow TDMA frame based dynamic notws 1 frequency-hopping spread spectrum MAC protocol FHSS radios Time slot reservation protocol where each Nodes are allocated different time slots so 2 fixed time slot is assigned a frequency that transmissions are collision free channel Uses a reservation and handshake mechanism to enable a pair of Nodes use a collision-avoidance 3 communicating nodes to reserve a handshake mechanism and a soft frequency hop, thereby guaranteeing reservation mechanism collision-free data transmission Developed with the main objective of supporting integrated services of real-time 4 Supports real time transmission and non-real-time application in ad hoc networks e2050 Ad-hoc networks Basic concepts, routing.
A “mobile ad hoc network” MANET is an autonomous system of mobile routers and associated hosts connected by wireless links –the union of which form an arbitrary graph.
Temporal stability is determined based on number of beacon signal that node receives from its neighbors. What are the factors that affect effective cross layer design?
The characteristics of wireless channel are 1.
EC Mobile Adhoc Network April May Important Questions
Topology changes rapidly and unpredictably. Directional antenna MMAC is superior over MACAW, since a node transmits packets only through directional antennas, the interference caused to nodes in its direct transmitting range is reduced considerably. Portability, weight, size of the hand held devices 4. Netwokrs is the need for cross layer design?
Sensor nodes consist of sensing, data processing, and communication components and typically form ad hoc networks. Single pass and graph Therotic. The features of wireless LAN are a Power management to save the battery power. List the transmission impediments of wireless channel. This interaction is done through the tuning layers. List the hybrid protocols. This leads to increased delay and increased probability of packet losses even when all nodes restrict their mobility to a small region.
Some of the commonly used outdoor propagation models are: List the services provided by IEEE In the absence of dedicated routers, providing security becomes a challenging task in these networks. It determines the highest priority of a data packet ready to be sent by competing nodes.