Mind Maps for All Questions


Q1. Ad Hoc Networks

Ad hoc Networks  
├── Characteristics  
│   ├── Self-Configuring  
│   ├── Decentralized  
│   ├── Dynamic Topology  
│   └── Limited Range  
├── Features  
│   ├── Quick Deployment  
│   ├── Scalability  
│   └── Flexibility  
└── Applications  
    ├── Military  
    ├── Disaster Recovery  
    ├── Vehicular Networks  
    └── Smart Homes

Q2. Wireless Channel Characteristics

Wireless Channel Characteristics  
├── Path Loss  
│   ├── Signal weakens with distance  
│   └── Example: Wi-Fi range  
├── Multipath Fading  
│   ├── Signals reflect and interfere  
│   └── Example: Elevator signal drop  
└── Interference  
    ├── Other devices disrupt signals  
    └── Example: Microwave and Wi-Fi

Q3. Modulation Techniques

Modulation Techniques  
├── AM  
│   ├── Varies amplitude  
│   ├── Pros: Simple  
│   └── Cons: Noise-sensitive  
├── FM  
│   ├── Varies frequency  
│   ├── Pros: Noise-resistant  
│   └── Cons: High bandwidth  
└── PM  
    ├── Varies phase  
    ├── Pros: High data rate  
    └── Cons: Complex

Q4. Multiple Access Techniques

Multiple Access Techniques  
├── TDMA  
│   ├── Time slots  
│   ├── Pros: Efficient  
│   └── Cons: Sync needed  
├── FDMA  
│   ├── Frequency channels  
│   ├── Pros: Simple  
│   └── Cons: Wastes bandwidth  
└── CDMA  
    ├── Unique codes  
    ├── Pros: High capacity  
    └── Cons: Complex

Q5. Voice Coding Techniques

Voice Coding Techniques  
├── PCM  
│   ├── Samples and quantizes  
│   ├── Pros: High quality  
│   └── Cons: High bandwidth  
└── LPC  
    ├── Predicts and compresses  
    ├── Pros: Low bandwidth  
    └── Cons: Lower quality

Q6. Error Control Mechanisms

Error Control Mechanisms  
├── ARQ  
│   ├── Retransmission on error  
│   ├── Pros: Reliable  
│   └── Cons: High latency  
└── FEC  
    ├── Corrects errors at receiver  
    ├── Pros: Low latency  
    └── Cons: High overhead

Q7. OSI and TCP/IP Models

Computer Networks  
├── OSI Model (7 Layers)  
│   ├── Physical  
│   ├── Data Link  
│   ├── Network  
│   ├── Transport  
│   ├── Session  
│   ├── Presentation  
│   └── Application  
└── TCP/IP Model (4 Layers)  
    ├── Network Access  
    ├── Internet  
    ├── Transport  
    └── Application

Q8. IEEE 802 Standards

IEEE 802 Standard  
├── 802.11 (WLAN)  
│   ├── Wi-Fi  
│   ├── High speed  
│   └── Use Case: Internet access  
└── 802.15 (Bluetooth)  
    ├── Short range  
    ├── Low power  
    └── Use Case: Device connectivity

Q9. WLANs

WLANs  
├── How They Work  
│   ├── Access Points (AP)  
│   └── Clients (devices)  
├── Role of AP  
│   ├── Connectivity  
│   ├── Routing  
│   └── Security  
└── 802.11 Standards  
    ├── a, b, g, n, ac  
    └── Compare speed, range, use case

Q10. Bluetooth Technology

Bluetooth Technology  
├── Architecture  
│   ├── Piconet (1 master, 7 slaves)  
│   └── Scatternet (multiple piconets)  
├── Key Features  
│   ├── Short range  
│   ├── Low power  
│   └── Easy pairing  
└── Comparison with Wi-Fi  
    ├── Range, speed, power, applications  
    └── Example: Earphones vs. streaming

Q11. MAC Protocols in Ad Hoc Networks

MAC Protocols in Ad Hoc Networks  
├── Design Issues  
│   ├── Hidden Terminal Problem  
│   ├── Exposed Terminal Problem  
│   ├── Mobility  
│   └── Energy Efficiency  
├── Goals  
│   ├── Collision Avoidance  
│   ├── Fairness  
│   ├── Scalability  
│   └── Energy Efficiency  
└── Importance  
    └── Ensures effective communication

Q12. Contention-Based MAC with Reservation

Contention-Based MAC with Reservation  
├── How It Works  
│   ├── Contention Phase (CSMA/CA)  
│   └── Reservation Phase (RTS/CTS)  
└── Scenarios  
    ├── High traffic networks  
    ├── Real-time applications  
    └── Energy-constrained networks

Q13. Scheduling Mechanisms in MAC Protocols

Scheduling Mechanisms in MAC Protocols  
├── Role  
│   ├── Fairness  
│   ├── Collision Reduction  
│   └── QoS  
└── Benefits  
    ├── Reduced collisions  
    ├── Better resource utilization  
    └── Improved QoS

Q14. Directional Antennas in MAC Protocols

Directional Antennas in MAC Protocols  
├── How They Are Used  
│   ├── Beamforming  
│   └── Spatial Reuse  
├── Benefits  
│   ├── Increased range  
│   ├── Reduced interference  
│   └── Improved capacity  
└── Challenges  
    ├── Complexity  
    ├── Mobility  
    └── Cost

Q15. Routing Protocols in Ad Hoc Networks

Routing Protocols in Ad Hoc Networks  
├── Design Issues  
│   ├── Dynamic topology  
│   ├── Limited resources  
│   └── Scalability  
├── Goals  
│   ├── Efficiency  
│   ├── Reliability  
│   └── Scalability  
└── Difference from Traditional Networks  
    ├── No fixed infrastructure  
    └── Dynamic topology

Q16. Table-Driven (Proactive) Routing Protocols

Table-Driven (Proactive) Routing Protocols  
├── How They Work  
│   ├── Routing tables  
│   ├── Periodic updates  
│   └── Route discovery  
├── Example  
│   └── DSDV  
├── Advantages  
│   ├── Low latency  
│   └── Reliability  
└── Limitations  
    ├── High overhead  
    └── Scalability issues

Q17. On-Demand (Reactive) Routing Protocols

On-Demand (Reactive) Routing Protocols  
├── How They Work  
│   ├── Route discovery (RREQ)  
│   ├── Route reply (RREP)  
│   └── Route maintenance  
├── Example  
│   └── AODV  
├── Benefits  
│   ├── Low overhead  
│   └── Scalability  
└── Challenges  
    ├── Latency  
    └── Route stability

Q18. Hybrid Routing Protocols

Hybrid Routing Protocols  
├── Purpose  
│   ├── Efficiency  
│   ├── Scalability  
│   └── Flexibility  
└── Examples  
    ├── ZRP (Zone Routing Protocol)  
    └── TORA (Temporally Ordered Routing Algorithm)

Q19. Hierarchical Routing Protocols

Hierarchical Routing Protocols  
├── Structure  
│   ├── Clustering  
│   ├── Hierarchy  
│   └── Routing  
└── Benefits  
    ├── Reduced overhead  
    ├── Scalability  
    └── Efficiency

Q20. Power-Aware Routing Protocols

Power-Aware Routing Protocols  
├── Importance  
│   ├── Energy efficiency  
│   ├── Network lifetime  
│   └── Sustainability  
└── Challenges  
    ├── Complexity  
    ├── Dynamic topology  
    └── Trade-offs

Q21. Multicast Routing Protocols

Multicast Routing Protocols  
├── Design Issues  
│   ├── Dynamic topology  
│   ├── Scalability  
│   └── Energy efficiency  
├── Classification  
│   ├── Tree-based (MAODV)  
│   ├── Mesh-based (ODMRP)  
│   └── Hybrid  
└── Key Differences  
    ├── Structure  
    ├── Overhead  
    └── Reliability

Q22. Transport Layer Challenges

Transport Layer Challenges in Ad Hoc Networks  
├── Dynamic Topology  
├── High Packet Loss  
├── Congestion Control  
├── Energy Efficiency  
└── Heterogeneous Traffic

Q23. TCP Performance in Ad Hoc Networks

TCP Performance in Ad Hoc Networks  
├── Reasons for Poor Performance  
│   ├── Misinterpretation of packet loss  
│   ├── Frequent route changes  
│   └── High latency  
└── Proposed Solutions  
    ├── TCP variants (TCP-ELFN, TCP-Westwood)  
    ├── Cross-layer solutions  
    └── Split TCP

Q24. Transport Layer Solutions

Transport Layer Solutions in Ad Hoc Networks  
├── TCP Enhancements (TCP-ELFN, TCP-Westwood)  
├── UDP-Based Solutions (Real-time streaming)  
├── Cross-Layer Solutions (ATP)  
└── Energy-Efficient Protocols (PET)

Q25. Security Challenges in Ad Hoc Networks

Security Challenges in Ad Hoc Networks  
├── Lack of Central Authority  
├── Dynamic Topology  
├── Resource Constraints  
└── Wireless Medium Vulnerabilities  
└── Impact on Performance  
    ├── Reduced reliability  
    ├── Increased overhead  
    └── Lower trust

Q26. Network Security Attacks

Network Security Attacks in Ad Hoc Networks  
├── Passive Attacks  
│   └── Eavesdropping  
├── Active Attacks  
│   ├── Jamming  
│   └── Spoofing  
└── Routing Attacks  
    ├── Blackhole Attack  
    └── Wormhole Attack

Q27. Key Management

Key Management in Ad Hoc Networks  
├── Pre-Distribution  
├── Distributed Key Management  
└── Certificate-Based Systems

Q28. Secure Routing

Secure Routing in Ad Hoc Networks  
├── Concept  
│   ├── Authentication  
│   ├── Integrity  
│   └── Confidentiality  
└── Example: SAODV  
    ├── Digital signatures  
    ├── Hash chains  
    └── Encryption

Q29. QoS Challenges

QoS Challenges in Ad Hoc Networks  
├── Dynamic Topology  
├── Resource Constraints  
├── Heterogeneous Traffic  
└── Interference  
└── Impact on QoS  
    ├── Unpredictable performance  
    └── Difficulty in prioritization

Q30. MAC Layer QoS Solutions

QoS Solutions at the MAC Layer  
├── Prioritization Mechanisms (IEEE 802.11e)  
├── Scheduling Algorithms (TDMA)  
└── Contention-Based Protocols (EDCA)

Q31. Network Layer QoS Solutions

Network Layer QoS Solutions  
├── QoS-Aware Routing Protocols (QoS-AODV)  
├── Resource Reservation Protocols (INSIGNIA)  
└── Traffic Engineering (Load balancing)  
└── Contribution to Performance  
    ├── Reliable communication  
    └── Efficient resource utilization

Last updated