Computer Engg

DLO8013: Adhoc Wireless Network Syllabus for CS 8th Sem 2019 Pattern Mumbai University (Department Level Optional Course-4)

Adhoc Wireless Network detailed syllabus scheme for Computer Engineering (CS), 2019 regulation has been taken from the MU official website and presented for the Bachelor of Engineering students. For Course Code, Course Title, Test 1, Test 2, Avg, End Sem Exam, Team Work, Practical, Oral, Total, and other information, do visit full semester subjects post given below.

For 8th Sem Scheme of Computer Engineering (CS), 2019 Pattern, do visit CS 8th Sem Scheme, 2019 Pattern. For the Department Level Optional Course-4 scheme of 8th Sem 2019 regulation, refer to CS 8th Sem Department Level Optional Course-4 Scheme 2019 Pattern. The detail syllabus for adhoc wireless network is as follows.

Adhoc Wireless Network Syllabus for Computer Engineering BE 8th Sem 2019 Pattern Mumbai University

Course Objectives:

For the complete Syllabus, results, class timetable, and many other features kindly download the iStudy App
It is a lightweight, easy to use, no images, and no pdfs platform to make students’s lives easier.
Get it on Google Play.

Course Outcomes:

On successful completion of course learner will be able to:

  1. Identify the characteristics and features of Adhoc Networks.
  2. Understand the concepts & be able to design MAC protocols for Ad Hoc networks
  3. Implement protocols / Carry out simulation of routing protocols of Adhoc Networks
  4. Interpret the flow control in transport layer of Ad Hoc Networks
  5. Analyze security principles for routing of Ad Hoc Networks
  6. Utilize the concepts of Adhoc Networks in VANETs

Prerequisites:

Computer Network, Wireless Networking

Module 1

For the complete Syllabus, results, class timetable, and many other features kindly download the iStudy App
It is a lightweight, easy to use, no images, and no pdfs platform to make students’s lives easier.
Get it on Google Play.

Module 2

MAC protocols for Wireless Ad-Hoc Networks 12

  1. Introduction
  2. Issues in designing MAC for Wireless Ad-Hoc Networks
  3. Design Goals and classification of MAC for Wireless Ad-Hoc Networks
  4. Contention based MAC protocols for Wireless Ad-Hoc Networks, with reservation mechanisms, scheduling Mechanisms
  5. MAC protocols using directional antennas, Other MAC Protocols
  6. IEEE standards MAC Protocols: 802.15.1(WPAN based on Bluetooth), 802.15.4 (WSN/Zigbee), 802.15.6 (WBAN).

Module 3

Routing Protocols for Wireless Ad-Hoc Networks 10

  1. Introduction, Issues in designing a routing protocol for Wireless Ad-Hoc Networks
  2. Classification of routing protocols, Table driven routing protocols like DSDV, WRP, On- demand routing protocols like ABR, DSR, TORA, AODV, etc.
  3. Hybrid Routing Protocols : ZRP, Routing Protocols with efficient flooding mechanism, Hierarchical Routing Protocols, Power aware routing protocols

Module 4

For the complete Syllabus, results, class timetable, and many other features kindly download the iStudy App
It is a lightweight, easy to use, no images, and no pdfs platform to make students’s lives easier.
Get it on Google Play.

Module 5

Security 08

  1. Security attacks in wireless Ad hoc wireless Networks, Network security requirements,
  2. Issues & challenges in security provisioning,
  3. Link Layer security attacks: 802.11 MAC , WPA and variations
  4. Network Security Attacks: Routing Protocol Attacks: attacks using falsifying route errors and broadcasting falsifying routes, spoofing attacks, Rushing attacks, Secure routing in Ad hoc wireless Networks

Module 6

Vehicular Ad-Hoc Network (VANET. 08

  1. Introduction: Challenges and Requirements, , Layered architecture for VANETs, DSRC /WAVE standard (IEEE 802.11p .
  2. IEEE 802.11p protocol Stack (PHY & MAC) , A Survey on Proposed MAC Approaches for VANETs like TDMA, SDMA and CDMA based approaches, DSRC MAC & LLC
  3. Georouting: CBF, Flooding with broadcast suppression
  4. Delay Tolerant Network, Introduction to Opportunistic Networking in Delay Tolerant Vehicular Ad Hoc Networks

Assessment

For the complete Syllabus, results, class timetable, and many other features kindly download the iStudy App
It is a lightweight, easy to use, no images, and no pdfs platform to make students’s lives easier.
Get it on Google Play.

Text Books:

  1. Siva Ram Murthy and B.S. Manoj , Ad hoc Wireless Networks Architectures and protocols, 2nd edition, Pearson Education, 2007 (T1)
  2. C. K. Toh, Adhoc Mobile Wireless Networks, Pearson Education, 2002 (T2)
  3. Charles E. Perkins, Adhoc Networking, Addison – Wesley, 2000 (T3)
  4. Dipankar Raychaudhuri, Mario Gerla, Emerging Wireless Technologies and the Future Mobile Internet, D, Cambridge. (T4)

Reference Books:

  1. Subir Kumar Sarkar, Ad-Hoc Mobile Wireless Networks: principles, protocols and applications CRC Press (R1)
  2. Prasant Mohapatra and Sriramamurthy, Ad Hoc Networks: Technologies and Protocols, Springer International Edition, 2009, (R2)
  3. Stefano Basangi, Marco Conti, Silvia Giordano, Ivan Stojmenovic, Mobile Ad-Hoc Networking, John-Wiley and Sons Publications, 2004,(R3)
  4. Hannes Hartenstein, Kenneth Laberteaux, VANET Applications and Interworking Technologies, Wiley Publications (R4)
  5. Christoph Sommer , Falko Dressler, Vehicular Networking, Cambridge University Press, 2014 (R5)

Lab Outcome:

  1. Explore the knowledge of NS2 and NS3 by installing it and make it ready
  2. Shall synthesize a simulation and evaluate the performance of WLAN 802.11 and Bluetooth
  3. Students will able to analyze and implement MAC & Network layer protocols using open source and synthesis as well as evaluate its performance
  4. Implement Transport layer protocols / Carry out simulation of routing protocols of Adhoc Networks
  5. Describe and interpret the use security routines and evaluate its performance
  6. Explore and understand the capability of SUMO and MOVE as well as Nessi by installing it and analyze it by applying on various scenarios

Description: It is recommended that Network simulation Softwares like NS-2, NS-3, SUMO (Simulation software for Urban MObility) with MOVE. Software like Nessi is also recommended for the event based security attacks simulation and measure. The Laboratory Work (Experiments) for this course is required to be performed and to be evaluated in Computational Lab-II

Suggested List of Experiments:

  1. Installation of NS2 & NS3 in Fedora 19 (32 bit) OS Linux.
  2. Simulating IEEE 802.11 wireless LAN in Ad-Hoc Mode using NS2
  3. Implementation a Bluetooth network in NS3 with application as transfer of a file from one device to another
  4. To implement and compare MAC layer protocols, MACAW, MACA-BI and MACA with piggybacked Reservation using NS-3
  5. Develop sample wireless network in which
    1. implement AODV and AOMDV protocol
    2. Calculate the time to receive reply from the receiver using NS2.
    3. Generate graphs which show the transmission time for packet. Implement wireless network. Capture data frame and identify fields using NS2.
  6. Communicate between two different networks (NS-3) which has following specifications:
    1. One network has Class A network with TORA protocol
    2. Second has Class B network AODV protocol
  7. To calculate and compare average throughput for various TCP variants like TCP-F (Feedback) and Ad-Hoc TCP using NS-3
  8. Explore and use security tools like WEP & WPA and evaluate its performance on mobile terminals
  9. Simulation of Urban Mobility (SUMO) along with MOVE is software that helps in simulating the VANETs. Install it on Fedora 19 (32 bit) OS Linux
  10. Create a simulation for road traffic with 6 junctions. There are various vehicles going on and your own car also. Select a shortest route for your car. Demonstrate with simulation software SUMO and MOVE.
  11. A car acts as a malicious node and can be analyzed for the packet loss before and after malicious activity. Using SUMO and MOVE.
  12. Create an Ad-hoc Network using nessi Simulation software and include events incorporate dropped packets, infected flows, compromised machines, unavailable services etc, and check its performance

Digital Material (if Any):

  1. http://www.isi.edu/nsnam/ns/ : NS-2 software download (D1)
  2. https://nsnam.isi.edu/nsnam/index.php/NS manual (D2)
  3. https://www.nsnam.org/ : Ns-3 Software Download (D3)
  4. http://www.nsnam.com/2013/11/vanet-simulator-in-fedora-19-32-bit.html (D4)
  5. http://www.sumo.dlr.de/userdoc/Tutorials/Quick Start.html (D5)
  6. http://veins.car2x.org/ (D6)
  7. http://www.nessi2.de/ (D7)

Text Books:

  1. Ekram Hossain and Teerawat Issariyakul, Introduction to Network Simulator NS-2, Springer , Second Edition. (T1)
  2. Jack L. Burbank, Introduction to Network Simulator 3, Wiley Publications(T2)
  3. Siva Ram Murthy and B.S. Manoj , Ad hoc Wireless Networks Architectures and protocols, 2nd edition, Pearson Education, 2007 (T3)
  4. Michael Gregg, Build your own security lab, Wiley India edition (T4)

For detail Syllabus of all subjects of Computer Engineering (CS) 8th Sem 2019 regulation, visit CS 8th Sem Subjects of 2019 Pattern.

Leave a Reply

Your email address will not be published. Required fields are marked *

*

This site uses Akismet to reduce spam. Learn how your comment data is processed.