Mind Maps for All Questions
Q1. Ad Hoc Networks
Ad hoc Networks
├── Characteristics
│ ├── Self-Configuring
│ ├── Decentralized
│ ├── Dynamic Topology
│ └── Limited Range
├── Features
│ ├── Quick Deployment
│ ├── Scalability
│ └── Flexibility
└── Applications
├── Military
├── Disaster Recovery
├── Vehicular Networks
└── Smart Homes
Q2. Wireless Channel Characteristics
Wireless Channel Characteristics
├── Path Loss
│ ├── Signal weakens with distance
│ └── Example: Wi-Fi range
├── Multipath Fading
│ ├── Signals reflect and interfere
│ └── Example: Elevator signal drop
└── Interference
├── Other devices disrupt signals
└── Example: Microwave and Wi-Fi
Q3. Modulation Techniques
Modulation Techniques
├── AM
│ ├── Varies amplitude
│ ├── Pros: Simple
│ └── Cons: Noise-sensitive
├── FM
│ ├── Varies frequency
│ ├── Pros: Noise-resistant
│ └── Cons: High bandwidth
└── PM
├── Varies phase
├── Pros: High data rate
└── Cons: Complex
Q4. Multiple Access Techniques
Multiple Access Techniques
├── TDMA
│ ├── Time slots
│ ├── Pros: Efficient
│ └── Cons: Sync needed
├── FDMA
│ ├── Frequency channels
│ ├── Pros: Simple
│ └── Cons: Wastes bandwidth
└── CDMA
├── Unique codes
├── Pros: High capacity
└── Cons: Complex
Q5. Voice Coding Techniques
Voice Coding Techniques
├── PCM
│ ├── Samples and quantizes
│ ├── Pros: High quality
│ └── Cons: High bandwidth
└── LPC
├── Predicts and compresses
├── Pros: Low bandwidth
└── Cons: Lower quality
Q6. Error Control Mechanisms
Error Control Mechanisms
├── ARQ
│ ├── Retransmission on error
│ ├── Pros: Reliable
│ └── Cons: High latency
└── FEC
├── Corrects errors at receiver
├── Pros: Low latency
└── Cons: High overhead
Q7. OSI and TCP/IP Models
Computer Networks
├── OSI Model (7 Layers)
│ ├── Physical
│ ├── Data Link
│ ├── Network
│ ├── Transport
│ ├── Session
│ ├── Presentation
│ └── Application
└── TCP/IP Model (4 Layers)
├── Network Access
├── Internet
├── Transport
└── Application
Q8. IEEE 802 Standards
IEEE 802 Standard
├── 802.11 (WLAN)
│ ├── Wi-Fi
│ ├── High speed
│ └── Use Case: Internet access
└── 802.15 (Bluetooth)
├── Short range
├── Low power
└── Use Case: Device connectivity
Q9. WLANs
WLANs
├── How They Work
│ ├── Access Points (AP)
│ └── Clients (devices)
├── Role of AP
│ ├── Connectivity
│ ├── Routing
│ └── Security
└── 802.11 Standards
├── a, b, g, n, ac
└── Compare speed, range, use case
Q10. Bluetooth Technology
Bluetooth Technology
├── Architecture
│ ├── Piconet (1 master, 7 slaves)
│ └── Scatternet (multiple piconets)
├── Key Features
│ ├── Short range
│ ├── Low power
│ └── Easy pairing
└── Comparison with Wi-Fi
├── Range, speed, power, applications
└── Example: Earphones vs. streaming
Q11. MAC Protocols in Ad Hoc Networks
MAC Protocols in Ad Hoc Networks
├── Design Issues
│ ├── Hidden Terminal Problem
│ ├── Exposed Terminal Problem
│ ├── Mobility
│ └── Energy Efficiency
├── Goals
│ ├── Collision Avoidance
│ ├── Fairness
│ ├── Scalability
│ └── Energy Efficiency
└── Importance
└── Ensures effective communication
Q12. Contention-Based MAC with Reservation
Contention-Based MAC with Reservation
├── How It Works
│ ├── Contention Phase (CSMA/CA)
│ └── Reservation Phase (RTS/CTS)
└── Scenarios
├── High traffic networks
├── Real-time applications
└── Energy-constrained networks
Q13. Scheduling Mechanisms in MAC Protocols
Scheduling Mechanisms in MAC Protocols
├── Role
│ ├── Fairness
│ ├── Collision Reduction
│ └── QoS
└── Benefits
├── Reduced collisions
├── Better resource utilization
└── Improved QoS
Q14. Directional Antennas in MAC Protocols
Directional Antennas in MAC Protocols
├── How They Are Used
│ ├── Beamforming
│ └── Spatial Reuse
├── Benefits
│ ├── Increased range
│ ├── Reduced interference
│ └── Improved capacity
└── Challenges
├── Complexity
├── Mobility
└── Cost
Q15. Routing Protocols in Ad Hoc Networks
Routing Protocols in Ad Hoc Networks
├── Design Issues
│ ├── Dynamic topology
│ ├── Limited resources
│ └── Scalability
├── Goals
│ ├── Efficiency
│ ├── Reliability
│ └── Scalability
└── Difference from Traditional Networks
├── No fixed infrastructure
└── Dynamic topology
Q16. Table-Driven (Proactive) Routing Protocols
Table-Driven (Proactive) Routing Protocols
├── How They Work
│ ├── Routing tables
│ ├── Periodic updates
│ └── Route discovery
├── Example
│ └── DSDV
├── Advantages
│ ├── Low latency
│ └── Reliability
└── Limitations
├── High overhead
└── Scalability issues
Q17. On-Demand (Reactive) Routing Protocols
On-Demand (Reactive) Routing Protocols
├── How They Work
│ ├── Route discovery (RREQ)
│ ├── Route reply (RREP)
│ └── Route maintenance
├── Example
│ └── AODV
├── Benefits
│ ├── Low overhead
│ └── Scalability
└── Challenges
├── Latency
└── Route stability
Q18. Hybrid Routing Protocols
Hybrid Routing Protocols
├── Purpose
│ ├── Efficiency
│ ├── Scalability
│ └── Flexibility
└── Examples
├── ZRP (Zone Routing Protocol)
└── TORA (Temporally Ordered Routing Algorithm)
Q19. Hierarchical Routing Protocols
Hierarchical Routing Protocols
├── Structure
│ ├── Clustering
│ ├── Hierarchy
│ └── Routing
└── Benefits
├── Reduced overhead
├── Scalability
└── Efficiency
Q20. Power-Aware Routing Protocols
Power-Aware Routing Protocols
├── Importance
│ ├── Energy efficiency
│ ├── Network lifetime
│ └── Sustainability
└── Challenges
├── Complexity
├── Dynamic topology
└── Trade-offs
Q21. Multicast Routing Protocols
Multicast Routing Protocols
├── Design Issues
│ ├── Dynamic topology
│ ├── Scalability
│ └── Energy efficiency
├── Classification
│ ├── Tree-based (MAODV)
│ ├── Mesh-based (ODMRP)
│ └── Hybrid
└── Key Differences
├── Structure
├── Overhead
└── Reliability
Q22. Transport Layer Challenges
Transport Layer Challenges in Ad Hoc Networks
├── Dynamic Topology
├── High Packet Loss
├── Congestion Control
├── Energy Efficiency
└── Heterogeneous Traffic
Q23. TCP Performance in Ad Hoc Networks
TCP Performance in Ad Hoc Networks
├── Reasons for Poor Performance
│ ├── Misinterpretation of packet loss
│ ├── Frequent route changes
│ └── High latency
└── Proposed Solutions
├── TCP variants (TCP-ELFN, TCP-Westwood)
├── Cross-layer solutions
└── Split TCP
Q24. Transport Layer Solutions
Transport Layer Solutions in Ad Hoc Networks
├── TCP Enhancements (TCP-ELFN, TCP-Westwood)
├── UDP-Based Solutions (Real-time streaming)
├── Cross-Layer Solutions (ATP)
└── Energy-Efficient Protocols (PET)
Q25. Security Challenges in Ad Hoc Networks
Security Challenges in Ad Hoc Networks
├── Lack of Central Authority
├── Dynamic Topology
├── Resource Constraints
└── Wireless Medium Vulnerabilities
└── Impact on Performance
├── Reduced reliability
├── Increased overhead
└── Lower trust
Q26. Network Security Attacks
Network Security Attacks in Ad Hoc Networks
├── Passive Attacks
│ └── Eavesdropping
├── Active Attacks
│ ├── Jamming
│ └── Spoofing
└── Routing Attacks
├── Blackhole Attack
└── Wormhole Attack
Q27. Key Management
Key Management in Ad Hoc Networks
├── Pre-Distribution
├── Distributed Key Management
└── Certificate-Based Systems
Q28. Secure Routing
Secure Routing in Ad Hoc Networks
├── Concept
│ ├── Authentication
│ ├── Integrity
│ └── Confidentiality
└── Example: SAODV
├── Digital signatures
├── Hash chains
└── Encryption
Q29. QoS Challenges
QoS Challenges in Ad Hoc Networks
├── Dynamic Topology
├── Resource Constraints
├── Heterogeneous Traffic
└── Interference
└── Impact on QoS
├── Unpredictable performance
└── Difficulty in prioritization
Q30. MAC Layer QoS Solutions
QoS Solutions at the MAC Layer
├── Prioritization Mechanisms (IEEE 802.11e)
├── Scheduling Algorithms (TDMA)
└── Contention-Based Protocols (EDCA)
Q31. Network Layer QoS Solutions
Network Layer QoS Solutions
├── QoS-Aware Routing Protocols (QoS-AODV)
├── Resource Reservation Protocols (INSIGNIA)
└── Traffic Engineering (Load balancing)
└── Contribution to Performance
├── Reliable communication
└── Efficient resource utilization
Last updated