Importatant - (10M) Questions
Importatant - (10M) Questions
Importatant - (10M) Questions
UNIT-1
1.Write in detail about the functionalities provided by MAC layer in IEEE 802.11 WLANs.
3.Describe how wireless networks can replace wired networks in order to improve the efficiency.
Assignment-2
UNIT – II
1.Explain MACAW protocol in detail.
2.Write the design goals of a MAC protocol for Ad hoc wireless networks.
3.Identify and elaborate some of the important issues in pricing for multi-hop wireless communication.
4.Describe a method used in alleviating the hidden terminal and exposed terminal problems at the MAC
layer.
5.What are the differences between cellular networks and ad hoc wireless networks?
6.What important goals have to be met while designing a medium access control (MAC) protocol for ad
hoc wireless networks?
Assignemt-3
UNIT – III
1.Explain any one of table-driven routing protocols in detail.
2.Write in detail about key management approaches.
4.Discuss the effects of multiple breaks on a single path at the TCP-F sender.
5.What are the advantages of hierarchical topology-based protocols over protocols that use flat
topologies?
6 Explain about the classification of the different types of attacks in ad hoc wireless networks.
7.Discuss the differences in topology reorganization in DSDV and CGSR routing protocols.
8.Whatare the factors that limit the performance of TCP in Adhoc wireless networks?Explain how each
factor limits the performance of TCP in Adhoc wireless networks.
Assignment-4
UNIT – IV
1.Write in detail about QOS framework for Ad hoc wireless networks (any one).
3.Explain how a source node determines how many number of tickets (green and yellow tickets) are to
be issued for a session in delay constrained TBP protocol.
5.What are the issues and challenges in providing QoS in ad hoc wireless networks?
6.Which battery is being commonly used for portable mobile nodes such as laptops? Give a few reasons
to support your answer.
8.Discuss the advantages of distributed power control algorithms in ad hoc wireless networks over the
centralized power control algorithms?
Assignment-5
UNIT – V
1.Write in detail about data dissemination in WSN.
12.Explain self-organizing MAC for sensor networks and eavesdrop and register.
3.How does the hybrid usage of TDMA and FDMA minimize energy consumption? Explain.
4Describe the Sybil attack and the Sinkhole attack on sensor networks.
8.Why are public key cryptographic solutions not suitable for the security of sensor networks?Explain in
detail.