Anna University, Chennai Department of Electronics and Communication Engineering Eighth Semester EC Mobile Adhoc Networks. ADHOC NETWORKS PPT – Free download as Powerpoint Presentation .ppt /. pptx), PDF File .pdf), Text File Introduction ` History ` Mobile Ad-hoc Networks ` Infrastructure based Networks and Infrastructureless Networks. . Adhoc Question Bank EC VTU 8TH SEM CSE ADHOC NETWORKS NOTES 10CS EC / EC Mobile Adhoc Networks May / June Question Paper ECE 8th Semester Regulation | BE Electronics and Communication.
|Country:||Papua New Guinea|
|Published (Last):||23 November 2005|
|PDF File Size:||17.68 Mb|
|ePub File Size:||1.19 Mb|
|Price:||Free* [*Free Regsitration Required]|
Security — Military 6. It is the best metric only in the shortest path protocol. Can establish ad hoc network of laptops.
EC Mobile Adhoc Network April May Important Questions
IP switching and Multiprotocol Label Switching. This is called scattering. The real-time MAC protocol is needed where 1. Cross layer is done to communicate the delay or loss constraints of the application to the link layer to enable the link layer to adapt its error correction mechanisms. Ericession multiple break movile model iii.
The presence of dynamic and adaptive routing protocols enables quick formation of ad hoc networks and is suitable for emergency situations like natural disasters, spontaneous meetings or military conflicts.
Ad Hoc Networks are thus self-configuring network of mobile routers and associated hosts connected by wireless links. Factors influencing small scale fading are a Speed of surrounding objects b Multipath propagation c Speed of the mobile d Transmission bandwidth of the signal.
AMRIS may not exhibit high mobille delivery ratio even when all nodes restrict their mobility to a small region.
Anna University ECE 8th Semester Notes
Hybrid routing protocols – Uses both table driven routing and on-demand routing protocols. Stability against attacks Improved channel reuse 4. Fundamentals of Data Structure.
Code to send mail from Microsoft Afhoc. Single pass and graph Therotic. This leads to increased delay and increased probability of packet losses even when all nodes restrict their mobility to a small region.
Interference Prepared by A. The QOS metrics that are used to evaluate the performance of the network are 1. TCP in ad hoc networks becomes a problem due to a Misinterpretation of packet loss b Frequent path breaks c Effect of path length d Misinterpretation of congestion window e Asymmetric link behavior f Uni-directional path g Multipath routing h Network partitioning and remerging i Use of sliding-window-based transmission 7.
The approaches for Power aware routing are 1. Considering the MSS of 1KB, calculate the size of the congestion window for which the next three transmissions will be successful. Selection of optimal transmission power Prepared by A. What is hidden terminal problem?
Small scale fading is used to describe the rapid fluctuation of the amplitude, phase or multipath delays of a radio signal over a short period of time or travel distance. What are the classifications of MAC protocol?
Such a network may operate in a standalone fashion, or may be connected to the larger Internet. List the challenges faced by WLAN industry.
Mobile Ad Hoc Networks – .
Detection of malicious nodes 2. Due to certain unique characteristics of ad hoc wireless networks the task of ensuring secure communication in ad hoc wireless networks is difficult. Reservation confirm phase 4.
Fading refers to the fluctuations in signal strength, when received at the receiver.
They are Prepared by A. Scheduling of packet loss and rate of transmission 5.
Efficient utilization of energy 2. Cross-layer feedback means interaction among the layers in the protocol stack. Tunneling is a mechanism in which the mobile node a Simply forwards the packets using the adhoc routing protocol to the destination node, if the destination is inside the MANET b Encapsulates packets and sends them to the gateway node if the destination is not inside the MANET c When the gateway node notess packets, it decapsulates them and sends them to the original destination 7.
What is the approach used to find link stability in ABR? The different types of fading are 1. Networkks are the mechanisms used in the MAC layer?
Enduring end-end resource negotiation 2. Minimize Maximum Cost per Node Protocol boosters can perform adaptation procedures towards upper layers and lower layers, assisting the process of information exchanges between various layers without a need for actual protocol format changes, leading to improved system performances.
Why ad hoc network is integrated with mobile IP? Maximum packet loss rate Prepared by A.