Download as pdf or txt
Download as pdf or txt
You are on page 1of 15

Questions Bank with Solutions (Ad Hoc Network and Wireless Network)

1. What is an Ad Hoc network, and how does it differ from other types of networks?
Solution: Ad Hoc network is a decentralized type of wireless network, where devices communicate
directly with each other without the need for a centralized infrastructure. This is different from
infrastructure networks, where devices communicate through a central access point.
2. List three characteristics of Ad Hoc networks.
Solution:
 Dynamic topology: Devices can join or leave the network at any time.
 Self-configuring: Nodes in the network automatically configure themselves.
 Limited range: Ad Hoc networks typically have a limited communication range.
3. Provide two examples of applications where Ad Hoc networks are commonly used.
Solution:
 Military communication in the field.
 Emergency response communication during disasters.
4. Explain the characteristics of the wireless channel in the context of communication in Ad Hoc
networks.
Solution: The wireless channel is subject to interference, fading, and attenuation. It is also affected by
factors such as signal strength, path loss, and multipath propagation.
5. What is modulation, and why is it essential in wireless communication?
Solution: Modulation is the process of encoding information onto a carrier signal. It is essential in
wireless communication to transmit data over the airwaves efficiently.
6. Name two modulation techniques used in wireless communication and briefly describe them.
Solution:
Frequency Modulation (FM): Varied the frequency of the carrier signal.
Amplitude Modulation (AM): Varied the amplitude of the carrier signal.
7. Define multiple access techniques in the context of wireless networks.
Solution: Multiple access techniques allow multiple users to share the same communication channel.
Examples include Time Division Multiple Access (TDMA) and Frequency Division Multiple Access
(FDMA).
8. What is voice coding, and why is it important in wireless communication systems?
Solution: Voice coding is the process of converting analog voice signals into digital format. It is important
in wireless communication to efficiently transmit voice over limited bandwidth.
9. Briefly explain the concept of error control in wireless networks.
Solution: Error control involves mechanisms to detect and correct errors that may occur during data
transmission. Techniques include error detection codes and retransmission of lost or corrupted data.
10. Define computer networks and provide one example of a computer network.
Solution: A computer network is a set of interconnected computers that can communicate with each other.
Example: The Internet.
11. What is computer network software, and how does it facilitate communication in a network?
Solution: Computer network software includes protocols and applications that enable communication
between devices on a network. Examples include TCP/IP and application layer protocols.
12. Explain the concept of computer network architecture.
Solution: Computer network architecture refers to the design and arrangement of components in a
network, including hardware, software, protocols, and communication patterns.
13. What is the IEEE 802 Networking standard, and why is it significant in networking?
Solution: The IEEE 802 Networking standard is a set of standards that define the implementation of
LANs and MANs. It is significant as it ensures compatibility and interoperability of network devices.
14. What are the fundamentals of WLANs (Wireless Local Area Networks)?

1
SCE ,Dehradun
Solution: WLANs use wireless communication to connect devices within a limited geographic area. They
often use Wi-Fi technology and are commonly found in homes, offices, and public spaces.
15. Briefly describe Bluetooth technology and its primary applications.
Solution: Bluetooth is a wireless technology used for short-range communication between devices. It is
commonly used for connecting devices like smartphones, headphones, and other peripherals.
16. How does Ad Hoc networking differ from traditional networking architectures in terms of
infrastructure?
Solution: Ad Hoc networking does not rely on a centralized infrastructure like routers or access points.
Devices in an Ad Hoc network communicate directly with each other.
17. Discuss the advantages and disadvantages of Ad Hoc networks.
Solution:
Advantages: Flexibility, quick deployment, and independence from infrastructure.
Disadvantages: Limited range, potential for network instability, and increased complexity.
18. Explain the role of the wireless channel in determining the performance of Ad Hoc networks.
Solution: The wireless channel affects signal quality, interference, and data transmission speed in Ad Hoc
networks. Understanding these factors is crucial for optimizing network performance.
19. Compare and contrast Frequency Division Multiple Access (FDMA) and Time Division Multiple
Access (TDMA).
Solution:
FDMA divides the frequency spectrum, allowing multiple users to transmit simultaneously.
TDMA divides time into slots, with each user having a specific time slot for transmission.
20. How does the IEEE 802.11 standard contribute to the development and implementation of WLANs?
Solution: The IEEE 802.11 standard defines the specifications for implementing WLANs, including
protocols for wireless communication, ensuring compatibility and interoperability among different
devices.
21. Question: Explain the characteristics of Ad Hoc networks in detail. How do these characteristics make
Ad Hoc networks suitable for specific applications? (5 marks)
Solution:Ad Hoc networks possess several characteristics, including dynamic topology, self-configuring
nature, and limited range. Dynamic topology allows devices to join or leave the network at any time,
making it adaptable to changing conditions. Self-configuring capability enables nodes to automatically
configure themselves without manual intervention. The limited range ensures that communication is
within a specific geographic area.
These characteristics make Ad Hoc networks suitable for applications such as military communication
and emergency response. In dynamic and unpredictable situations, Ad Hoc networks can quickly establish
communication without relying on a fixed infrastructure.
22. Question: Discuss the importance of modulation in wireless communication. Provide examples of two
modulation techniques and explain how they work. (5 marks)
Solution: Modulation is crucial in wireless communication as it allows the encoding of information onto a
carrier signal for transmission. Two modulation techniques are Frequency Modulation (FM) and
Amplitude Modulation (AM).
FM varies the frequency of the carrier signal based on the input signal, providing resistance to amplitude
variations and improving signal quality. AM varies the amplitude of the carrier signal based on the input
signal, making it susceptible to noise but simpler to implement.
Modulation ensures efficient use of the frequency spectrum and aids in the successful transmission of data
over wireless channels.
23. Question: Explain the role of multiple access techniques in wireless networks. Compare and contrast
Time Division Multiple Access (TDMA) and Frequency Division Multiple Access (FDMA). (5 marks)
Solution: Multiple access techniques enable multiple users to share the same communication channel.
TDMA divides time into slots, allowing each user to transmit in their allocated time slot. FDMA divides
the frequency spectrum, allowing multiple users to transmit simultaneously on different frequencies.

2
SCE ,Dehradun
TDMA is time-efficient but may face challenges in handling variable data rates. FDMA efficiently utilizes
the frequency spectrum but may experience interference among users.
Both techniques address the challenge of multiple users accessing the same channel, providing solutions
for efficient communication in wireless networks.
24. Question: Describe the significance of error control in wireless networks. Explain two error control
mechanisms used to ensure reliable data transmission. (5 marks)
Solution:Error control is essential in wireless networks to detect and correct errors that may occur during
data transmission. Two error control mechanisms are error detection codes and retransmission.
Error detection codes, such as checksums, identify errors in transmitted data. If an error is detected, the
data can be resent. Retransmission involves sending data again if it is not successfully received, ensuring
reliable communication.
These mechanisms enhance the reliability of wireless communication by detecting and correcting errors
introduced during transmission.
25. Question: Discuss the role of the IEEE 802.11 standard in the development and implementation of
Wireless Local Area Networks (WLANs). How does this standard contribute to the interoperability of
WLAN devices? (5 marks)
Solution:
The IEEE 802.11 standard plays a crucial role in defining the specifications for WLANs. It establishes
protocols for wireless communication, ensuring compatibility and interoperability among different
devices. These standard addresses aspects such as data rates, security, and frequency bands for wireless
communication.
The IEEE 802.11 standard allows manufacturers to produce WLAN devices that adhere to the same set of
rules, enabling users to mix and match devices from different vendors. This interoperability is vital for
creating a seamless and efficient wireless networking environment
26. What is the cellular concept in wireless communication, and how does it contribute to efficient use of
the frequency spectrum?
Solution: The cellular concept involves dividing a geographic area into cells, each served by a base
station. This increases the capacity of the wireless system by reusing frequencies in different cells,
minimizing interference and optimizing spectrum utilization.
27. Explain the cellular architecture and its components. How does the architecture support seamless
communication in cellular networks?
Solution: Cellular architecture includes base stations, mobile switching centers, and mobile devices. Base
stations provide coverage in individual cells, while mobile switching centers handle call routing. The
architecture allows handovers between cells, ensuring uninterrupted communication as mobile devices
move across the network.
28. Discuss the key features and limitations of first-generation cellular systems. How have these systems
evolved in subsequent generations?
Solution: First-generation cellular systems, like analog AMPS, supported voice calls but had limited
capacity. Subsequent generations (2G, 3G) introduced digital technologies, improved capacity, and added
features such as data services and multimedia support.
29. Compare the characteristics of second-generation (2G) and third-generation (3G) cellular systems.
Highlight the advancements brought by 3G technology.
Solution: 2G introduced digital voice and text services, while 3G added higher data rates, improved
multimedia support, and enhanced mobile internet access. 3G also introduced a packet-switched network
for more efficient data transmission.
30. Explain the concept of wireless in the local loop. How does it impact the "last mile" connectivity in
telecommunications?
Solution: Wireless in the local loop involves using wireless technologies to connect the subscriber's
premises to the local telephone exchange. It eliminates the need for physical cables, simplifying the "last
mile" connectivity and making it more flexible and cost-effective.

3
SCE ,Dehradun
31. Define the IEEE 802.11 standard. What is its significance in wireless communication, and what types
of devices commonly use this standard?
Solution: The IEEE 802.11 standard defines protocols for wireless local area networks (WLANs). It is
significant for ensuring interoperability between different wireless devices, and devices such as laptops,
smartphones, and smart home devices commonly use this standard.
32. Briefly describe the IEEE 802.16 standard. How does it differ from the IEEE 802.11 standard, and
what are its applications?
Solution: The IEEE 802.16 standard, also known as WiMAX, is designed for wireless metropolitan area
networks (WMANs). It provides high-speed wireless broadband access over longer distances compared to
IEEE 802.11. Applications include providing internet access to urban and suburban areas.
33. What is wireless internet, and how does it differ from traditional wired internet? Discuss the
advantages and challenges associated with wireless internet.
Solution: Wireless internet refers to internet connectivity using wireless technologies. It differs from
wired internet by providing mobility and flexibility. Advantages include accessibility in remote areas,
while challenges include signal interference and potential security concerns.
34. Explain the concept of Mobile IP. How does it enable seamless communication for mobile devices
across different networks?
Solution: Mobile IP is a protocol that allows mobile devices to maintain continuous connectivity while
moving across different networks. It assigns a unique IP address to the mobile device, enabling it to stay
reachable even when changing its point of attachment to the network.
35. Provide an introduction to Ad Hoc Wireless Networks. What distinguishes Ad Hoc networks from
other wireless network architectures?
Solution: Ad Hoc Wireless Networks are decentralized networks where devices communicate directly
with each other without a fixed infrastructure. Unlike cellular networks, Ad Hoc networks do not rely on
base stations, making them flexible and suitable for scenarios where infrastructure is limited.
36. Discuss the key issues in Ad Hoc Wireless Networks. How do challenges such as routing and security
impact the performance of Ad Hoc networks?
Solution: Issues in Ad Hoc networks include dynamic topology, routing complexity, and security
concerns. Dynamic topology requires adaptive routing protocols, and securing communication in a
decentralized environment poses unique challenges.
37. What is Ad Hoc Wireless Internet, and how does it extend the concept of Ad Hoc networks to provide
internet connectivity?
Solution: Ad Hoc Wireless Internet extends the Ad Hoc network concept to enable internet connectivity.
Devices in the network collaborate to provide internet access, sharing resources and routing information
to connect to the broader internet.
38.Question: Explain three advantages of the cellular concept in wireless communication.
Solution: Frequency Reuse: The cellular concept allows the reuse of frequencies in different cells,
optimizing spectrum utilization.
Increased Capacity: By dividing an area into cells, the network can accommodate more users
simultaneously.
Reduced Interference: Cell separation minimizes interference, improving the overall quality of
communication.
39. Question: Describe the components of cellular architecture and their functions.
Solution: Base Stations: Provide coverage in individual cells.
Mobile Switching Centers: Handle call routing and switching.
Mobile Devices: User devices communicating with base stations.
40 Question: Compare and contrast the key features of second-generation (2G) and third-generation (3G)
cellular systems.
Solution:2G: Introduced digital voice and text services.

4
SCE ,Dehradun
3G: Added higher data rates, improved multimedia support, and introduced packet-switched networks for
data transmission.
41 Question: Discuss two applications of wireless in the local loop and how it simplifies connectivity.
Solution: Last-Mile Connectivity: Wireless in the local loop simplifies the "last mile" connection from the
local exchange to the subscriber's premises without physical cables.
Flexibility in Service Provision: Enables quick and flexible deployment of telecommunication services.
42 Question: Explain the significance of the IEEE 802.11 standard in the context of wireless
communication.
Solution: The IEEE 802.11 standard ensures interoperability between different wireless devices, allowing
them to communicate seamlessly in WLANs.
43. Question: Differentiate between the IEEE 802.11 and IEEE 802.16 standards. Provide one application
scenario for each standard.
Solution: IEEE 802.11: Used for wireless local area networks (WLANs), such as connecting laptops and
smartphones.
IEEE 802.16: WiMAX, designed for wireless metropolitan area networks (WMANs), providing high-
speed broadband access in urban areas.
44. Question: What are three advantages of wireless internet over traditional wired internet?
Solution: Mobility: Wireless internet allows users to access the internet from anywhere within the
coverage area.
Flexibility: No physical cables are required, providing flexibility in device placement.
Accessibility: Enables internet access in remote or challenging-to-wire locations.
45. Question: Briefly explain the concept of Mobile IP and its role in maintaining continuous connectivity
for mobile devices.
Solution:Mobile IP assigns a unique IP address to a mobile device, allowing it to remain reachable as it
moves across different networks. It enables seamless communication by ensuring the device is reachable
regardless of its network attachment point.
46. Question: Identify two key challenges in Ad Hoc Wireless Networks and propose a solution for one of
them.
Solution:Dynamic Topology: Adaptive routing protocols can be used to handle the dynamic nature of Ad
Hoc networks.
Security Concerns: Implementing encryption and authentication mechanisms can address security
challenges.
47. Question: Provide two practical examples of Ad Hoc Wireless Internet scenarios and explain how
devices collaborate to provide internet connectivity.
Solution:Disaster Response: Devices in an Ad Hoc network collaborate to establish internet connectivity
for communication during emergencies.
Outdoor Events: Ad Hoc networks can form to provide internet access in areas without traditional
infrastructure during outdoor events.
48.What is the primary purpose of the MAC layer in a network?
Answer: The MAC (Media Access Control) layer is responsible for controlling access to the physical
transmission medium, managing data frames, and providing unique addressing (MAC addresses) for
network devices. Its primary purpose is to ensure that data is transmitted reliably between devices on the
same network.
49.Explain the concept of MAC address and its significance in networking.
Answer: A MAC address (Media Access Control address) is a unique identifier assigned to a network
interface controller (NIC) for communication on a network. It is crucial in networking as it allows devices
to be uniquely identified in a network, enabling the proper delivery of data to the intended recipient.
50.Compare and contrast contention-based and contention-free MAC protocols. Provide examples of
each.

5
SCE ,Dehradun
Answer: Contention-based MAC protocols, such as CSMA/CA (Carrier Sense Multiple Access with
Collision Avoidance), rely on devices contending for access to the medium. Contention-free protocols,
like TDMA (Time Division Multiple Access), allocate specific time slots to devices. CSMA/CA is used in
Wi-Fi, while TDMA is often found in cellular networks.
51.Discuss the design issues involved in contention-based MAC protocols.
Answer: Design issues in contention-based MAC protocols include managing collisions, dealing with
variable channel conditions, and implementing backoff mechanisms to avoid repeated collisions.
Ensuring fairness and efficiency in accessing the medium are also significant challenges.
52.Examine the goals of contention-based MAC protocols with reservation mechanisms. Provide a real-
world scenario where such a protocol would be beneficial.
Answer: Reservation mechanisms in contention-based MAC protocols aim to allocate specific time slots
for transmission, reducing contention. An example is WiMAX, where a device can reserve a time slot for
guaranteed access, ensuring Quality of Service (QoS) for applications like voice over IP (VoIP).
53.Describe the key features of MAC protocols with scheduling mechanisms. How do they address
contention issues?
Answer: MAC protocols with scheduling mechanisms allocate specific time slots or frequencies to
devices, minimizing contention. This ensures predictable access to the medium, reduces collisions, and
improves overall network efficiency. TDMA is an example of a scheduling-based MAC protocol.
54.What challenges are associated with MAC protocols using directional antennas? How do these
protocols improve network performance?
Answer: Challenges include beamforming and alignment issues. Directional antennas improve network
performance by focusing signal strength in specific directions, reducing interference, and increasing
overall network capacity.
55.Provide an overview of protocols using directional antennas and their applications in wireless
communication.
Answer: Protocols using directional antennas, such as Wi-Fi 6E with support for Spatial Frequency
Reuse, enhance wireless communication by enabling better spatial efficiency and reducing interference.
This is particularly beneficial in crowded environments.
56.Explain the concept of reservation mechanisms in MAC protocols. How do they contribute to efficient
channel access?
Answer: Reservation mechanisms allocate specific time slots or frequencies for devices, reducing
contention and providing deterministic access. This contributes to efficient channel access by minimizing
collisions and ensuring that devices have dedicated time for transmission.
57.Discuss the classification of MAC protocols based on their operation in wireless networks.
Answer: MAC protocols can be classified into contention-based and contention-free. Contention-based
protocols include CSMA/CA, while contention-free protocols include TDMA and FDMA (Frequency
Division Multiple Access).
58. Compare and contrast MAC protocols that use frequency division and time division techniques.
Answer:
Frequency Division Multiple Access (FDMA): Concept: FDMA allocates different frequency bands to
multiple users simultaneously.
Advantages: Allows concurrent transmission, supports multiple users, and is suitable for continuous data
streams.
Disadvantages: Inefficient for bursty traffic, vulnerable to interference, and requires precise frequency
synchronization.
Time Division Multiple Access (TDMA):Concept: TDMA divides time into slots, and each user is
allocated a specific time slot for data transmission.
Advantages: Efficient for bursty traffic, reduces interference, and enables dynamic allocation of
bandwidth.

6
SCE ,Dehradun
Disadvantages: Synchronization challenges, may lead to idle slots, and may not be suitable for continuous
data streams.
Comparison:Commonality: Both aim to share the communication medium efficiently.
Difference: FDMA divides the frequency spectrum, while TDMA divides time. Their suitability depends
on the nature of the data traffic and network requirements.
59. How does a MAC protocol handle collisions, and what mechanisms are in place for collision
resolution?
Answer: Handling Collisions:
When two or more devices attempt to transmit simultaneously, a collision occurs.
Carrier Sense Multiple Access (CSMA): Devices listen to the channel before transmitting to detect
ongoing transmissions.
Collision Avoidance (CA): Protocols like CSMA/CA use mechanisms like RTS/CTS to avoid collisions in
wireless networks.
Mechanisms for Collision Resolution:Backoff Mechanism: After a collision, devices wait for a random
time before reattempting transmission, reducing the likelihood of repeated collisions.
Exponential Backoff: The wait time increases exponentially with each collision, providing a fair chance
for all devices.
CSMA/CD (Collision Detection): Used in wired networks, devices detect collisions during transmission
and cease transmission immediately.
60. Examine the role of the MAC layer in ensuring data integrity and reliability in wireless
communication.
Answer:Data Integrity:MAC layer manages frame transmission, including error detection mechanisms
like Frame Check Sequence (FCS) to ensure data integrity.
Detects corrupted frames and requests retransmission if necessary.
Reliability:Coordinates access to the medium to avoid collisions, ensuring reliable communication.
Implements acknowledgment mechanisms to confirm successful frame reception.
Wireless Challenges:Manages challenges like fading, interference, and signal attenuation by incorporating
error detection and correction techniques.
61. Provide examples of MAC protocols used in sensor networks and IoT devices. How do these
protocols address the unique challenges of these environments?
Answer: Examples:IEEE 802.15.4: Common in low-power and low-data-rate applications like sensor
networks.
LoRaWAN: Used for long-range, low-power communication in IoT devices.
Addressing Challenges:Low Power: Protocols implement low-power modes to conserve energy in
battery-operated devices.
Short Range: Optimized for short-range communication in sensor networks with limited transmission
power.
62. Discuss the impact of network topology on the design of MAC protocols.
Answer:Star Topology:Impact: TDMA may be suitable, providing dedicated time slots for devices.
Advantage: Simplifies collision avoidance and improves efficiency.
Mesh Topology:Impact: CSMA/CA may be preferred for dynamic contention resolution.
Advantage: Supports dynamic connections but requires effective collision management.
Bus Topology:Impact: CSMA/CD may be used in wired networks.
Advantage: Efficient for linear configurations but can experience contention.
63. Explain the concept of Carrier Sense Multiple Access (CSMA) in the context of MAC protocols.
Answer:Carrier Sense Multiple Access (CSMA):Concept: Devices listen to the communication medium
before attempting to transmit.
CSMA/CD (Collision Detection): Used in wired networks, devices stop transmission immediately upon
detecting a collision.

7
SCE ,Dehradun
CSMA/CA (Collision Avoidance): Used in wireless networks, devices use mechanisms like RTS/CTS to
avoid collisions.
Purpose: Prevents multiple devices from transmitting simultaneously, reducing the likelihood of collisions
and improving medium access efficiency.
64. What are the advantages and disadvantages of MAC protocols with reservation mechanisms?
Answer:Advantages:Guaranteed Access: Provides dedicated time slots or frequencies, ensuring
predictable access for reserved devices.
Predictable Performance: Reservations lead to deterministic transmission, suitable for time-sensitive
applications.
Disadvantages:Reduced Flexibility: Less adaptable to dynamic changes in network conditions.
Increased Complexity: Implementing reservation mechanisms adds complexity to the protocol.
65. Describe the role of contention-based MAC protocols in ad-hoc networks.
Answer:Contention-Based MAC Protocols:
Example: CSMA/CA is common in ad-hoc networks.
Role: Enables devices to contend for access to the medium without pre-established schedules.
Advantage: Flexibility for dynamic connections in scenarios where a predefined schedule may not be
practical.
66. Discuss the factors influencing the choice of MAC protocols in wireless communication.
Answer:Network Topology: Different topologies may favor different MAC protocols.
Traffic Patterns: Bursty or continuous traffic influences the choice of contention-based or scheduled
protocols.
Latency Requirements: Real-time applications may require low-latency protocols.
Power Consumption: Mobile devices and IoT applications may prioritize energy-efficient protocols.
Quality of Service (QoS) Requirements: Applications with specific QoS needs influence protocol
selection.
67. Provide an overview of emerging MAC protocols and their potential contributions to future
networking technologies.
Answer:5G NR (New Radio):Contribution: Higher data rates, lower latency, and improved network
efficiency.
Features: Massive MIMO, beamforming, and advanced modulation techniques.
Wi-Fi 6E:Contribution: Utilizes additional spectrum in the 6 GHz band.
Features: Improved performance, increased capacity, and better coexistence in dense environments.
Beyond 5G and 6G: Ongoing research for future protocols focusing on enhanced spectral efficiency,
lower latency, and support for diverse applications.
Q 68 Discuss the design issues associated with routing protocols and their impact on network
performance.
Ans: Design issues in routing protocols can significantly impact network performance. Some key
considerations include:
Scalability: Routing protocols should scale efficiently with the network size. Issues arise when the
number of nodes or network segments increases, affecting the protocol's ability to handle the growing
routing table.
Convergence Time: Rapid convergence is crucial to minimize downtime and ensure timely delivery of
data. Protocols that take longer to converge may lead to delays and packet loss.
Adaptability: Networks are dynamic, and protocols need to adapt to changes in topology or traffic
patterns. Inflexible protocols may cause inefficiencies or suboptimal routing.
Security: Routing protocols should be designed with security considerations to prevent attacks like
spoofing or routing table manipulation, which can lead to unauthorized access or data interception.
Resource Utilization: Efficient use of network resources, including bandwidth and processing power, is
vital. Inefficient protocols may lead to congestion or resource wastage.

8
SCE ,Dehradun
Q69 What are the primary goals of routing protocols, and how do they contribute to efficient network
operation?
Ans :The primary goals of routing protocols include:
Reachability: Ensure that devices on the network can communicate with each other by establishing viable
routes.
Accuracy: Provide accurate and up-to-date information about the network topology to enable effective
routing decisions.
Efficiency: Optimize the use of network resources, such as bandwidth and processing power, to enhance
overall performance.
Scalability: Scale seamlessly as the network grows in size or experiences changes in topology.
Fault Tolerance: Maintain network operation in the face of hardware failures or other disruptions.
Routing protocols contribute to efficient network operation by dynamically adapting to changes, finding
the most efficient paths, and ensuring reliable and timely delivery of data.
Q70 Examine the classification of routing protocols based on their operation in wireless ad hoc networks.
Ans: Routing protocols in wireless ad hoc networks can be classified into two main categories:
Proactive (Table-Driven) Protocols: These maintain up-to-date routing information constantly, regardless
of whether it is needed or not. Examples include OLSR (Optimized Link State Routing) and DSDV
(Destination-Sequenced Distance Vector).
Reactive (On-Demand) Protocols: These establish routes only when needed, reducing the overhead of
maintaining a complete routing table. Examples include AODV (Ad Hoc On-Demand Distance Vector)
and DSR (Dynamic Source Routing).
Describe the key characteristics of table-driven routing protocols and provide a scenario where they are
suitable.
Table-driven routing protocols, also known as proactive protocols, maintain a consistent routing table that
is continuously updated. Key characteristics include:
Continuous Updates: The routing table is regularly updated, reflecting changes in the network topology.
Low Latency for Data Transmission: Since routes are pre-established, data transmission can occur with
minimal delay.
Suitability: Table-driven protocols are suitable for scenarios where network topology changes are
frequent, and the cost of maintaining up-to-date routing information is justified. For example, in a fixed
infrastructure wireless network where nodes have constant connectivity, such as a mesh network in a
smart city.
Q 71. In on-demand routing protocols, how is route discovery initiated, and what mechanisms are
employed for route maintenance?
Ans: In on-demand routing protocols, route discovery is initiated when a node needs to send data to a
destination for which it doesn't have a route. This involves a process where the source node broadcasts a
route request (RREQ) packet to discover a valid route. The RREQ packet propagates through the network
until it reaches the destination or an intermediate node that has a route to the destination.
Route maintenance in on-demand protocols involves mechanisms to react to changes in the network
topology:
Route Error (RERR): When a node detects a link failure or a destination becomes unreachable, it sends a
Route Error packet to inform the source about the issue.
Route Update (RREP): In some protocols, when a new and more efficient route is discovered, a Route
Reply packet is sent to update the source node about the better path.
Q 72 Explain the fundamental purpose of routing protocols in computer networks.
Ans : Routing protocols in computer networks serve the fundamental purpose of determining the paths
that data packets should take from the source to the destination. The key objectives include:
Path Determination: Routing protocols establish and maintain routes in a network, ensuring that data can
be delivered from one node to another.

9
SCE ,Dehradun
Optimal Path Selection: They aim to find the most efficient and reliable paths, considering factors like
distance, bandwidth, and network conditions.
Adaptability: Routing protocols respond to changes in the network, updating routes dynamically to
accommodate variations in topology or link status.
Q73 Compare and contrast table-driven routing protocols with on-demand routing protocols. Provide
examples of each.
Ans : Table-Driven (Proactive) Routing Protocols: Continuous Updates: Maintain a constant, up-to-date
routing table.
Low Latency: Routes are pre-established, leading to low latency for data transmission.
Examples: OLSR (Optimized Link State Routing), DSDV (Destination-Sequenced Distance Vector).
On-Demand (Reactive) Routing Protocols:Route Discovery: Routes are established only when needed,
initiated by a node requiring a path to a destination.
Reduced Overhead: Lower overhead since routes are not maintained constantly.
Examples: AODV (Ad Hoc On-Demand Distance Vector), DSR (Dynamic Source Routing).
Q 74 Discuss the advantages and disadvantages of hybrid routing protocols in comparison to table-driven
and on-demand protocols.
Ans : Advantages of Hybrid Protocols: Efficiency: Combines the benefits of both proactive and reactive
protocols, adapting to changing conditions while avoiding unnecessary overhead.
Fast Adaptation: On-demand aspects allow for quick adaptation to dynamic changes.
Examples: ZRP (Zone Routing Protocol), TORA (Temporally Ordered Routing Algorithm).
Disadvantages: Complexity: Hybrid protocols can be more complex to implement and manage than
purely proactive or reactive protocols.
Overhead: There may be a moderate level of overhead due to maintaining both proactive and reactive
components.
Q75 Explain the concept of hierarchical routing protocols and their role in managing large-scale wireless
networks.
Ans : Hierarchical routing protocols organize nodes into a hierarchical structure, typically based on
geographical or logical proximity. The key features include:
Hierarchical Structure: Nodes are organized into clusters or levels, simplifying the routing process.
Reduced Overhead: Hierarchical organization reduces the need for each node to have complete
knowledge of the network, minimizing routing overhead.
Scalability: Effective for managing large-scale networks by breaking them into manageable segments.
Examples: HSRP (Hierarchical State Routing Protocol), CBRP (Cluster-Based Routing Protocol).
Q 76 How do power-aware routing protocols contribute to energy efficiency in wireless networks?
Provide examples.
Ans : Power-aware routing protocols aim to conserve energy in wireless networks by considering the
power levels of nodes and optimizing routes accordingly. Key contributions include:
Energy-Efficient Routes: Routes are selected to minimize the energy consumption of individual nodes.
Dynamic Adaptation: Nodes can adjust their transmission power based on the proximity of neighboring
nodes.
Examples: LEACH (Low-Energy Adaptive Clustering Hierarchy), AODV-AP (Ad Hoc On-Demand
Distance Vector with Adjusted Power).
Q 77 What are the challenges and considerations in designing multicast routing protocols for Ad Hoc
wireless networks?
Ans : Dynamic Topology: Ad Hoc networks experience frequent topology changes, making it challenging
to maintain efficient multicast structures.
Limited Bandwidth: Wireless links have limited bandwidth, requiring optimization of multicast routing to
conserve resources.
Energy Constraints: Battery-powered devices in Ad Hoc networks necessitate energy-efficient multicast
protocols.

10
SCE ,Dehradun
Scalability: Designing protocols that scale effectively as the number of nodes and multicast groups
increases.
Q 78 Examine the operation of multicast routing protocols and their ability to efficiently distribute data to
multiple receivers.
Ans Tree-based Protocols: Establish a tree structure to reach multiple receivers simultaneously.
Mesh-based Protocols: Create a mesh of connections, enabling efficient data distribution.
Efficiency: Multicast protocols aim to minimize redundant transmissions and optimize bandwidth usage
for simultaneous data delivery to multiple receivers.
Q 79 Compare and contrast tree-based multicast routing protocols with mesh-based multicast routing
protocols.
Ans Tree-based Protocols: Create a rooted or shared tree structure. Examples: Core-Based Trees (CBT),
Protocol Independent Multicast-Sparse Mode (PIM-SM).
Mesh-based Protocols: Allow multiple paths between nodes.
Examples: On-Demand Multicast Routing Protocol (ODMRP), Wireless Mesh Multicast (WMM).
Tree-based protocols may be more efficient for scenarios with a well-defined center, while mesh-based
protocols excel in dynamic and decentralized environments.
Q 80 Discuss the issues involved in designing multicast routing protocols that can handle dynamic and
changing network topologies.
Ans : Route Maintenance: Adaptation to frequent topology chaWhat are the challenges and considerations
in designing multicast routing protocols for Ad Hoc wireless networks?
Dynamic Topology: Ad Hoc networks experience frequent topology changes, making it challenging to
maintain efficient multicast structures.
Limited Bandwidth: Wireless links have limited bandwidth, requiring optimization of multicast routing to
conserve resources.
Energy Constraints: Battery-powered devices in Ad Hoc networks necessitate energy-efficient multicast
protocols.
Scalability: Designing protocols that scale effectively as the number of nodes and multicast groups
increases.
Q 81 Provide examples of multicast routing protocols and explain their suitability for different types of
applications in wireless networks.
Ans : PIM-SM (Protocol Independent Multicast-Sparse Mode): Suitable for large-scale networks with a
central distribution point.
ODMRP (On-Demand Multicast Routing Protocol): Efficient for dynamic Ad Hoc networks with
changing topologies.
CBT (Core-Based Trees): Well-suited for networks with a central core.
Q 82 How does the concept of source-based trees differ from shared trees in multicast routing, and what
are their respective advantages?
Ans : Source-Based Trees: A separate tree is built for each source.
More efficient for scenarios with multiple sources sending to a common group.
Shared Trees: A single tree is shared among all sources.
Reduces redundancy in the tree structure but may be less efficient in certain scenarios.
The choice between source-based and shared trees depends on the network characteristics and
communication patterns.
Q 83 Explain the role of the Group Management Protocol (GMP) in the operation of multicast routing
protocols.
Ans : Group Management Protocol (GMP): Facilitates the management of multicast group memberships.
Ensures efficient tracking and updating of group memberships.Enables routers to join or leave multicast
groups dynamically.
GMP is essential for the proper functioning of multicast routing protocols by managing group
membership information.

11
SCE ,Dehradun
Q 84 Discuss the benefits and challenges of using a core-based tree approach in multicast routing.
Ans : Benefits: Reduced tree maintenance overhead. Efficient use of network resources.
Challenges:
Dependency on the selection of an appropriate core.
Limited flexibility in certain network scenarios.
Q 85 In the context of multicast routing, how do protocols handle the issue of group membership changes
and mobility of nodes?
Ans : Dynamic Group Membership:
Protocols need mechanisms to handle nodes joining or leaving multicast groups dynamically.
Node Mobility:
Mobility-aware protocols adapt to the movement of nodes, updating multicast structures accordingly.
Protocols like ODMRP and PIM-SM incorporate features to address these challenges.
Q 86 Provide an overview of emerging trends and advancements in multicast routing protocols for Ad
Hoc wireless networks.
Ans : Efficiency Improvements: Ongoing efforts to reduce overhead and optimize multicast routing in
terms of bandwidth and energy.
Machine Learning Integration: Exploration of machine learning techniques to enhance decision-making in
dynamic environments.
Security Enhancements: Integration of secure multicast protocols to address vulnerabilities in Ad Hoc
networks.
QoS (Quality of Service) Considerations: Focus on providing better QoS for multicast traffic in wireless
environments.
Q 87 What are the major challenges in designing the transport layer for Ad Hoc wireless networks?
Ans : Dynamic Topology: Ad Hoc networks experience frequent changes in topology, making it
challenging to establish and maintain end-to-end connections reliably.
Limited Bandwidth: Wireless links often have constrained bandwidth, requiring efficient utilization for
data transmission.
Energy Constraints: Nodes in Ad Hoc networks are often battery-powered, necessitating energy-efficient
transport layer protocols.
Security: Ad Hoc networks are susceptible to security threats, and designing secure transport layer
protocols is essential.
QoS Requirements: Meeting Quality of Service (QoS) requirements in dynamic and resource-constrained
environments poses a challenge.
Q 88 Discuss the classification of transport layer solutions in the context of Ad Hoc wireless networks.
Ans :Connection-Oriented Protocols: Establish and maintain a connection before data transmission (e.g.,
TCP).
Connectionless Protocols: Transmit data without prior connection establishment (e.g., UDP).
Reliable Protocols: Ensure reliable data delivery, often through mechanisms like acknowledgment and
retransmission (e.g., TCP).
Unreliable Protocols: Prioritize low overhead and may not guarantee reliable delivery (e.g., UDP).
Q 89 How does TCP perform in Ad Hoc wireless networks, and what are the challenges associated with
its use in such environments?
Ans : Performance Issues: TCP may experience performance degradation due to factors like high latency,
frequent link failures, and varying bandwidth.
Congestion Control Challenges: TCP's congestion control mechanisms may not adapt well to the dynamic
and rapidly changing nature of Ad Hoc networks.
Head-of-Line Blocking: Delays caused by retransmissions and congestion control mechanisms can lead to
head-of-line blocking issues.
Q 90 Explore alternative transport layer protocols designed specifically for Ad Hoc wireless networks.

12
SCE ,Dehradun
Ans : Ad Hoc Transport Protocols: Examples include ATP (Adaptive Transport Protocol) and ATCP (Ad
Hoc Transport Control Protocol).
Delay-Tolerant Protocols: Designed to handle intermittent connectivity, such as Bundle Protocol (BP) in
Delay-Tolerant Networks (DTNs).
Multipath Transport Protocols: Utilize multiple paths simultaneously to enhance reliability and
performance, e.g., MPTCP (Multipath TCP).
Q 91 Explain the issues related to congestion control in the transport layer of Ad Hoc wireless networks.
Ans :Dynamic Topology: Rapid changes in network topology make congestion control challenging.
Limited Feedback: Lack of timely and accurate feedback about network conditions hinders effective
congestion control.
Wireless Characteristics: Wireless links exhibit different characteristics (e.g., variable bandwidth,
interference) that traditional congestion control algorithms may not handle optimally.
Energy Considerations: Traditional congestion control may not account for energy constraints in nodes,
leading to suboptimal energy usage.
Q 92 What are the primary challenges and issues in providing security for Ad Hoc wireless networks?
Ans : Dynamic Topology: Frequent changes in network topology make it challenging to establish and
maintain secure communication links.
Limited Resources: Ad Hoc nodes often have constrained processing power, memory, and energy
resources, affecting the implementation of robust security measures.
Open Medium: Wireless communication is susceptible to eavesdropping, unauthorized access, and
malicious interference.
Lack of Infrastructure: Ad Hoc networks may lack centralized infrastructure, making it challenging to
deploy traditional security mechanisms.
Q 93 Discuss common network security attacks that can be particularly problematic in Ad Hoc wireless
environments.
Ans : Eavesdropping: Unauthorized interception of communication to obtain sensitive information.
Jamming: Deliberate interference to disrupt communication or degrade network performance.
Spoofing: Impersonation of legitimate nodes to gain unauthorized access.
Routing Attacks: Manipulation of routing protocols to misdirect or disrupt data flows.
Denial of Service (DoS): Overloading the network or specific nodes to render them unusable.
Q 94 Elaborate on the key management strategies employed to enhance security in Ad Hoc wireless
networks.
Ans : Public Key Infrastructure (PKI): Use of digital certificates and public-private key pairs to
authenticate nodes.
Pre-Shared Keys (PSK): Distribution of shared secrets to authenticate and establish secure
communication.
Key Distribution Centers (KDC): Centralized entities facilitating secure key exchange between nodes.
Trust-Based Systems: Establishing trust relationships among nodes to enhance security.
Q 95 How is secure routing addressed in Ad Hoc wireless networks, and what are the key considerations?
Ans :Secure Routing Protocols: Implementation of routing protocols with built-in security mechanisms
(e.g., Secure Ad Hoc On-Demand Distance Vector - SAODV).
Intrusion Detection Systems (IDS): Monitoring for malicious activities or deviations from normal
behavior.
Trust-Based Routing: Utilizing trust metrics to make routing decisions based on the reliability of nodes.
Key considerations include the prevention of routing attacks, secure route discovery, and adaptability to
dynamic network conditions.
Q 96 Explore the role of cryptographic techniques in securing communication within Ad Hoc wireless
networks.
Ans :Encryption: Use of cryptographic algorithms to encode transmitted data, preventing unauthorized
access.

13
SCE ,Dehradun
Authentication: Verifying the identity of communicating nodes through digital signatures or
authentication protocols.
Integrity Protection: Ensuring the integrity of transmitted data by detecting and preventing tampering.
Secure Key Exchange: Securely exchanging cryptographic keys to facilitate encrypted communication.
Q 97 Classify QoS solutions for Ad Hoc wireless networks, focusing on transport layer considerations.
Ans : Integrated Services (IntServ): Reservation-based model allowing applications to request specific
QoS parameters.
Differentiated Services (DiffServ): Classifies and marks packets, allowing routers to prioritize traffic
based on predefined service classes.
Multiprotocol Label Switching (MPLS): Labels packets to create paths with specific QoS characteristics.
Resource Reservation Protocol (RSVP): Reserves resources along the path for guaranteed QoS.
Q 98 What are the QoS challenges at the MAC layer in Ad Hoc wireless networks, and how are they
addressed?
Ans :Channel Access: Contention for the shared wireless medium can lead to unpredictable delays.
Synchronization: Nodes may have different synchronization levels, impacting the timing of data
transmissions.
Fairness: Ensuring fair access to the channel for all nodes.
Collision Avoidance: Mitigating collisions to prevent data loss.
Solutions include contention-based protocols like Carrier Sense Multiple Access with Collision
Avoidance (CSMA/CA), time-division protocols, and advanced scheduling mechanisms.
Q 99 Discuss network layer solutions for achieving QoS in the context of Ad Hoc wireless networks.
Ans :Adaptive Routing: Dynamic selection of routes based on current network conditions to optimize
QoS.
Quality-Aware Routing Protocols: Routing protocols that consider QoS metrics during path selection.
Load Balancing: Distributing traffic across multiple paths to balance network load and enhance QoS.
Cross-Layer Design: Collaboration between the network and transport layers to optimize QoS parameters.
Q 100 How do differentiated services (DiffServ) play a role in QoS provisioning for Ad Hoc wireless
networks?
Ans :Packet Marking: Differentiated Services Code Point (DSCP) markings are applied to packets based
on their priority or class.
Traffic Classification: Packets are classified into different service classes, allowing routers to treat them
accordingly.
Per-Hop Behavior (PHB): Defines how routers should handle packets with specific DSCP markings.
DiffServ allows for a scalable and flexible approach to QoS by categorizing and treating packets
differently based on their assigned markings.
Q 101 Explore the impact of mobility on QoS in Ad Hoc wireless networks and potential solutions.
Ans :Handover Latency: Mobility introduces handovers between different access points, causing delays.
Packet Loss: Nodes in motion may experience packet loss due to link disruptions.
Dynamic Topology Changes: Rapid changes in topology affect the stability and predictability of QoS.
Q 102 Discuss the interplay between transport layer protocols, security mechanisms, and QoS
considerations in Ad Hoc wireless networks.
Ans :Transport Layer Protocols: Choice of transport layer protocols affects how data is reliably and
efficiently transferred.
Security Mechanisms: Implementing encryption, authentication, and other security measures impacts data
confidentiality and integrity.
QoS Considerations: QoS mechanisms ensure that data meets certain performance requirements, such as
low latency or high throughput.
The interplay involves balancing these aspects to achieve a secure and efficient communication
environment.

14
SCE ,Dehradun
Q 103 How can the choice of transport layer protocol influence the overall security posture of an Ad Hoc
wireless network?
Ans :Secure Protocols: Choosing transport layer protocols with built-in security features (e.g., DTLS for
UDP) enhances data protection.
Vulnerabilities: Insecure protocols may expose the network to threats like eavesdropping, tampering, or
unauthorized access.
Overhead: Some secure protocols introduce additional overhead, impacting resource utilization.
The choice of a transport layer protocol directly impacts the level of security provided and the efficiency
of data transfer in Ad Hoc networks.
Q 104 Explain the trade-offs involved in optimizing QoS while maintaining security in Ad Hoc wireless
environments.
Ans Trade-Offs:Encryption Overhead: Implementing encryption may introduce latency and overhead,
affecting QoS.
Authentication Delay: Secure handshakes or authentication processes can impact the speed of data
transmission.
Resource Utilization: Security measures may consume additional resources, affecting overall network
performance.
Optimizations:Efficient Algorithms: Choosing efficient cryptographic algorithms helps minimize
overhead.
Adaptive Security Levels: Adjusting security levels based on network conditions to balance QoS and
security.
Balancing QoS and security involves optimizing protocols and adjusting parameters based on the specific
requirements of the Ad Hoc network.
Q 105 Discuss the role of network-layer QoS solutions in supporting secure and reliable communication
in Ad Hoc wireless networks.
Ans :Traffic Prioritization: Network-layer QoS assigns priorities to different types of traffic.
Adaptive Routing: QoS-aware routing protocols dynamically adjust routes based on network conditions.
Resource Reservation: Allocating resources for specific communication flows to guarantee QoS.
Network-layer QoS solutions play a crucial role in managing and prioritizing traffic to support secure and
reliable communication in Ad Hoc wireless networks.
Q 106 Explore emerging trends and advancements in transport layer, security, and QoS protocols for Ad
Hoc wireless networks.
Ans :Machine Learning Integration: Incorporating machine learning for adaptive security and QoS
decision-making.
Blockchain for Security: Exploring blockchain technology for enhancing security in Ad Hoc networks.
5G Integration: Leveraging 5G capabilities for improved QoS and security.
Cross-Layer Design: Continued emphasis on cross-layer approaches to optimize performance and
security.

15
SCE ,Dehradun

You might also like