1) What are the main reasons behind throughput degradation faced by TCP when used in ad hoc wireless networks?
2) State the targeted layer in the protocol stack for the attacks given below.
i. Jamming
ii. Byzantine attack
iii. Routing attacks
iv. Repudiation
v. Wormhole attack
vi. Impersonation
3) Describe in detail the existing network layer solutions which support QOS provisioning.
4) Describe the data link layer solutions to compute the optimum transmission range.
5) List and describe the factors on which the optimal value of the reception range depend.
6) Describe Rumor routing algorithm.
7) Describe some simple multi-lateration techniques.
8) Why clustered architecture is especially useful for sensor networks.