Anna University, Chennai Department of Electronics and Communication Engineering Eighth Semester EC Mobile Adhoc Networks. ADHOC NETWORKS PPT – Free download as Powerpoint Presentation .ppt /. pptx), PDF File .pdf), Text File Introduction ` History ` Mobile Ad-hoc Networks ` Infrastructure based Networks and Infrastructureless Networks. . Adhoc Question Bank EC VTU 8TH SEM CSE ADHOC NETWORKS NOTES 10CS EC / EC Mobile Adhoc Networks May / June Question Paper ECE 8th Semester Regulation | BE Electronics and Communication.
|Published (Last):||17 November 2006|
|PDF File Size:||19.4 Mb|
|ePub File Size:||7.9 Mb|
|Price:||Free* [*Free Regsitration Required]|
List the applications of ad hoc networks. Directional antenna MMAC is superior over MACAW, since a node transmits packets only through directional antennas, the interference caused to nodes in its direct transmitting range netowrks reduced considerably.
Maximum Delay variance Jitter 4. It employs radio frequency technology for communication.
Reservation confirm phase 4. This is called scattering.
EC Mobile Adhoc Networks Question Bank – Edition
List the features of List the table driven protocols. List the classification of routing protocols based on the routing information update mechanism. The presence of dynamic and adaptive routing protocols enables quick formation of ad hoc networks and is suitable for emergency situations like natural disasters, spontaneous meetings or military conflicts. Okumura model Prepared by A. Secured routing provides a Confidentiality b Integrity c Avalilability d Non-repudiation 8.
Temporal stability is determined based on number of beacon signal that node receives from its neighbors. What is the approach used to find link stability in ABR? It represents signal attenuation as a positive quantity measured in db. Protocols with directional antennas The contention based protocols can be classified into two groups according to the ways collisions are resolved.
What are the challenging issues in ad hoc network maintenance? It offers point – to – multipoint communication. Enduring end-end resource negotiation 2.
Anna University ECE 8th Semester Notes
It determines the highest priority of a data packet ready to be sent by competing nodes. DSDV maintains only the best path instead of maintaining multiple paths to nettworks destination. Define — Indoor Propagation Model Indoor propagation model is defined as the model which is used to characterize radio propagation inside the buildings.
Lower to upper layers: Single pass and graph Therotic. List the transmission impediments of wireless channel.
Hybrid routing protocols – Nottes both table driven routing and on-demand routing protocols. For energy aware routing, low power consumption and remaining battery backup must also be considered for choosing path. Security — Military 6.
Can establish ad hoc network of laptops. List the advantages and disadvantages of DSDV routing protocols. The issues of designing a MAC protocol for ad-hoc networks are a Bandwidth efficiency: It is used in battlefields and military applications. Considering the MSS of 1KB, calculate the size of the congestion window for which the next three transmissions will be successful.
What is hidden aadhoc problem?
Mobile Ad Hoc Networks – .
Due to certain unique characteristics of ad hoc wireless networks the task of ensuring secure communication in ad hoc wireless networks is difficult. Log In Sign Up. What are the factors influencing small scale fading?
Doppler Shift Transmission newtorks constraints Ad hoc networks are widely used in a. The needs for cross layer design are a To enhance the performance of the layered protocol stacks. Proactive Reactive 1 Route is pre-established Route establishment is on-demand Route discovery by some global 2 Continuously discover the routes search Updates topology information table 3 No information update is done periodically longer delay due to latency of route 4 No latency in wdhoc discovery discovery Large capacity is needed to update 5 Large capacity is not needed network information A lot of routing information may May not be appropriate for real-time 6 never be used communication 7 Eg: