CS2045 Wireless Networks QA

Download as pdf or txt
Download as pdf or txt
You are on page 1of 27

Vidyarthiplus.

com

CS2045- Wireless networks -question bank with answers -Sakthi edition


VII semester BE-CSE
Regulation(2008)
UNIT-1
Part-A
1. What is wireless communication?
Wireless communication is the transfer of information over a distance without the use
of electrical conductors or wires. The distance involved may be short, long.

2. What are the uses of wireless Technology?


 To span a distance beyond the capabilities of typical cabling
 To avoid obstacles such as physical structures
 To provide a backup communication link in case of normal network failure
 To overcome situations where normal cabling is difficult or financially impractical.

3. What are the challenges in wireless communication?
 Very limited resources
 Unstable channel characteristics
 Multi- user Interference
 Line of sight for frequencies
 Mobility issues

4. List the type of wireless networks


 Personal area networks
 Local area networks
 Metropolitan area networks
 Wide area networks.

5. Define CDMA?
Code Division Multiple Access systems use codes with certain characteristic to separate
different users. To enable access to the shared medium without interference. The users use the
same frequency and time to transmit data. The main problem is to find good codes and to seprate
this signal from noise. The good code can be found by two characteristics 1. Orthogonal 2. Auto
Correlation.

6. What are the advantages and disadvantages of CDMA?


Adv.
All terminals can use the same frequency no planning needed.
Huge code space used
Interference is not coded.
Dis adv.
Higher complexity of a receiver
All signals should have the same strength at a receiver

7. What is SDMA?
Space Division Multiple Access is used for allocating separated spaces to users in wireless

Vidyarthiplus.com
Vidyarthiplus.com

Networks. The basis for the SDMA algorithm is formed by cells and sectorized antennas which
constitute the infrastructure implementing space division multiplexing.

8.What are the types of communication?


 Simplex communication
 Duplex communication
 Half Duplex Communication.

9. List the applications of wireless networks.


 Vehicles
 Emergencies
 Business
 Replacement of wired networks
 Infotainment
 Location dependent services
 Follow-on services
 Location aware services
 Privacy
 Information services
 Support services.

10. What the features of Code Division multiple Accesses?


 It does not require external synchronization networks.
 CDMA offers gradual degradation in performance when the number of
users is increased But it is easy to add new user to the system.
 If offers an external interference rejection capability.

11. List out the advantage of cellular wireless networks.


 Higher capacity, higher number of users
 Less transmission power needed
 More robust, decentralized
 Base station deals with interference, transmission area etc.

12. What is meant by Handoff?


If a mobile unit moves out of range of one cell and into the range of another during a
connection, the traffic channel has to change to one assigned to the BS in the new cell. The
system makes this change without either interrupting the call or alerting the user.

Part –B
1. Explain Cellular Systems in detail.
 Each transmitter, typically called a base station covers a certain area a cell.
 Cell radii from tens of meters in buildings and hundreds of meters in cities up to
tens of Kilometers in the countryside.
 Advantage of Cellular systems.

Vidyarthiplus.com
Vidyarthiplus.com

 Disadvantage of Cellular systems.


 Diagram.

2. Explain frequency allocation in detail.


SDMA (Space Division Multiple Access)
 segment space into sectors, use directed antennas
 cell structure
FDMA (Frequency Division Multiple Access)
 assign a frequency to a transmission channel
 permanent (e.g., radio broadcast), slow hopping (e.g., GSM), fast hopping
(FHSS, Frequency Hopping Spread Spectrum)
TDMA (Time Division Multiple Access)
 assign the fixed sending frequency to a transmission channel between a sender and a
receiver for a certain amount of time
 Fixed TDM
 Classical Aloha
 Slotted Aloha
 CSMA
 DAMA
 PRMA
 Reservation TDMA
 MACA
 Polling
 ISMA
Diagram.

Vidyarthiplus.com
Vidyarthiplus.com

Frequency division multiplexing for multiple access and duplex

TDMA

Vidyarthiplus.com
Vidyarthiplus.com

3.Explain CDMA in detail.


CDMA (Code Division Multiple Access)
 all terminals send on the same frequency probably at the same
time and can use the whole bandwidth of the transmission channel
 each sender has a unique random number, the sender XORs the
signal with this random number
 the receiver can “tune” into this signal if it knows the pseudo
random number, tuning is done via a correlation function
Disadvantages:
 higher complexity of a receiver (receiver cannot just listen into the
medium and start receiving if there is a signal)
 all signals should have the same strength at a receiver
Advantages:
 all terminals can use the same frequency, no planning needed
 huge code space (e.g. 232)compared to frequency space
 interferences (e.g. white noise) is not coded
 forward error correction and encryption can be easily integrated
Diagram: CDMA on signal level I.

4. Describe Cellular Wireless Network in detail.

 Principles of Cellular Networks


 First-Generation Analog
 Second-Generation TDMA
 Second-Generation CDMA
 Third-Generation Systems.

Vidyarthiplus.com
Vidyarthiplus.com

UNIT-2
Part-A
1. What are the Advantages of wireless LAN?
Flexibility, Planning, Design, Robustness, Quality of Service, Cost, Proprietary Solution,
Restriction, Safety and Security.

2. What are the Design Goals of Wireless LAN?


Global Operation, Low Power, License-free Operation, Robust
Transmission technology, Simplified spontaneous co-operation, Easy to use,
protection of investment, Safety and Security, Transparency for application.

3. Mention some of the disadvantages of WLANS?


• Quality of service
• Proprietary solutions.
• Restrictions
• Safety and Security.

4. What is the difference between infrastructure and ad-hoc networks?


Infrastructure-based wireless networks:
Communication takes place only between the wireless nodes and the access
point, but not directly between the wireless nodes.
Ad-hoc wireless networks:
Communication takes place directly with other nodes, so no access point
Controlling medium access is necessary.

5. What is the primary goal of IEEE 802.11?


The primary goal of the standard was the specification of a simple, robust,
WLAN which offers time bounded and asynchronous services also it should be able
to operate with multiple physical layers.

Vidyarthiplus.com
Vidyarthiplus.com

6. Is IEEE 802.11 and Wi-Fi same/ State the purpose of Wi-Fi.


No.
It is wireless internet. Your laptop has an internal wireless card so you can
connect to wireless routers. If you goto a hotel that advertises free wireless internet,
you should be able to connect to it. You don't have to have an Ethernet cable to
connect to the web at home either.

7. What are the various versions of a physical layer defined in IEEE 802.11
Standards?
 IEEE 802.11-83.5 MHz
 IEEE 802.11a -300 MHz
 IEEE 802.11b. 83.5 MHz
 IEEE 802.11g - 83.5 MHz.

8. What are the system integration functions of MAC management?
 Synchronization
 Power management
 Roaming
 Management information base (MIB)

9. What is meant by SIFS?


SIFS means Short Inter Frame Spacing. The shortest waiting time defined for
short control message such as acknowledgements or polling response.

10. What is meant by PLCP?


Defines a method of mapping 802.11 MAC layer protocol data units into a framing
format suitable for sending and receiving user data and management information
between two or more stations using the associated PMD sub layer.

11. What is meant by PIFS?


A midlength IFS used by the centralized controller in the PCF scheme when issuing
polls.

12. What is meant by DIFS?


The longest IFS, used as a minimum delay for asynchronous frames contending for
access.

Part –B
1. Briefly describe the architecture and services of IEEE 802.11.
 System Architecture
 Services
 Diagram
Architecture of Infra structure based IEEE 802.11

Vidyarthiplus.com
Vidyarthiplus.com

Architecture of IEEE 802.11 adhoc Wireless LANs

Vidyarthiplus.com
Vidyarthiplus.com

Medium Access and Inter Framing spacing

2. Explain the architecture of WIFI in detail.


 Wireless Fidelity
 Wireless communication
 Diagram

Vidyarthiplus.com
Vidyarthiplus.com

3. Explain the architecture of WIMAX in detail.


 Wi-MAX (Worldwide Interoperability for Microwave Access)
 WI-MAX ARCHITECTURE
 Standard WiMax Architecture
 Two Dimensions of WiMax Network
 Diagram

Vidyarthiplus.com
Vidyarthiplus.com

4. Explain Mobile ad-hoc networks in detail.


 Introduction
 Routing
 Overview ad-hoc routing protocols
 Diagram

MANETs and mobile IP

Vidyarthiplus.com
Vidyarthiplus.com

Example ad-hoc Network

Example for least Interference routing

UNIT-3
Part-A

Vidyarthiplus.com
Vidyarthiplus.com

What is meant by GSM?


 This was named the global system for mobile communications (GSM)
 GSM is the most successful digital mobile telecommunication system in the
world.
 GSM phones make use of a SIM card to identify the user's account.

1. What are the major subsystems in GSM?


 GSM consists of three major components
 Base station subsystem
 Network and switching subsystem
 Operation support subsystem.

2. List the databases of NSS in GSM?


 Home location register
 Visitor location register
 Authentication center.

3. What are the functions of OSS in GSM?


 Manage all charging and billing procedures.
 Manage all mobile equipment in the system.

4. Write the interfaces used in GSM


There are three interfaces used in GS, they are
 GSM radio air interface
 Abis interface
 A interface.

5. What are the services offered by the GSM?


There are three user services offered by GSM, they are
 Bearer or data service
 Telephone service
 Supplementary ISDN service.

6. List the security services offered by GSM?


 Access Control and Authentication
 Confidentiality and Anonymity.
7. What are the four possible handover scenarios in GSM?
The four possible handover scenarios in GSM are:
 Intra-cell handover.
 Inter-cell, intra-BSC handover.
 Inter-BSC, intra-MSC handover.
 Inter MSC handover.

8. What are the two basic groups of logical channels in GSM?
The two basics groups of logical channels in GSM are:

Vidyarthiplus.com
Vidyarthiplus.com

 Traffic channels (TCH).


 Control Channels (CCH).

9. What is the frequency range of uplink and downlink in GSM network?


 The frequency range of uplink in GSM network is 890-960 MHz.
 The frequency range of downlink in GSM network is 935-960 MHz.

10. What is meant by GGSN?


GGSN is Gateway GPRS Support Node. It is the inter-working unit between the GPRS
network and external packet data networks. The GGSN is connected to external networks
via the Gi interface and transfers packets to the SGSN via an IP-based GPRS backbone
network.

11. What is meant by BSSGP?


BSSGP is Base Station Subsystem GPRS Protocol. It is used to convey routing and QoS-
related information between the BSS and SGSN.BSSGP does not perform error
correction and works on top of a frame relay network.

12. What do you mean by HLR?


HLR - The HLR is the reference database for subscriber parameters.
Various identification numbers and addresses are stored, as well as authentication
parameters. This information is entered into the database by the network provider when a
new subscriber is added to the system. The HLR database contains the master database of
all the subscribers to a GSM PLMN.
13. What do you mean by VLR?
The VLR provides a local database for the subscribers wherever they are physically
located within a PLMN, this may or may not be the “home” system. This function
eliminates the need for excessive and time-consuming references to the “home” HLR
database.
Part-B
1. Explain the GSM system architecture with a neat diagram.
System Architecture
 Radio subsystem.
 Network and switching subsystem.
 Operation subsystem.
 Diagram.

Vidyarthiplus.com
Vidyarthiplus.com

Functional Architecture of GSM System

2. Explain the protocol architecture of GSM for signaling.


 Protocols
 Diagram

3. Describe the security services provided by GSM


 Access control and authentication
 Confidentiality

Vidyarthiplus.com
Vidyarthiplus.com

 Anonymity
Authentication
Encryption
Diagram

Data Encryption

4. Explain the architecture of GPRS with a neat diagram


 general packet radio service (GPRS)
 gateway GPRS support node (GGSN)
 Packet data networks (PDN).
 serving GPRS support node (SGSN)
 GPRS register (GR)
 Diagram

Vidyarthiplus.com
Vidyarthiplus.com

UNIT-4
Part-A
1. What is mobile routing?
Even if the location of a terminal is known to the system, it still has to route the
traffic through the network to the access point currently responsible for the wireless
terminal. Each time a user moves to a new access point, the system must reroute traffic. This
is known as mobile routing.

2. Define Mobile node


A mobile node is an end-system or router that can change its point of attachment to the
Internet using mobile IP. The MN keeps its IP address and can continuously with any other
system in the Internet as long as link layer connectivity is given.

3. Define COA.
The COA (care of address) defines the current location of the MN from an IP point of
view. All IP packets sent to the MN are delivered to the COA, not directly to the IP
address of the MN. Packet delivery toward the MN is done using the tunnel.

4. What are the possibilities for the location of care-of-address (COA)?


The two possibilities for the location of care-of-address are:
i. Foreign agent COA
ii. Co-related COA

5. What do you mean by the term Mobile TCP?


Special handling of lengthy and/or frequent disconnections
M-TCP splits as I-TCP does
unmodified TCP fixed network to supervisory host (SH)
Optimized TCP SH to MH
Supervisory host

6. What do you mean by the term ‘Snooping TCP’?


buffering of packets sent to the mobile host lost packets on the wireless link will be
retransmitted immediately by the mobile host or foreign agent, respectively
the foreign agent therefore “snoops” the packet flow and recognizes acknowledgements in
both directions, it also filters ACKs changes of TCP only within the foreign agent.

Vidyarthiplus.com
Vidyarthiplus.com

7. What are the advantage and disadvantage of Mobile TCP?


Advantages
maintains semantics, supports disconnection, no buffer forwarding
Disadvantages
loss on wireless link propagated into fixed network
adapted TCP on wireless link.

8. What is Dynamic source Routing?


Dynamic Source Routing eliminates all periodic routing updates. If a node needs to
discover a route, it broadcast a route request with a unique identifier and the destination
address as parameters. Any node that receivers a route request gives a list of addresses
representing a possible path on its way toward the destination.

9. What is Generic Routing encapsulation?


Generic Routing encapsulation (GRE) allows the encapsulation of packets of one
protocol suite into the payload portion of a packet of another protocol suit.

10. What is binding Request?


Any node that wants to know the current location of an MN can send a binding request to
the HA. The HA can check if the MN has allowed dissemination of its current location.

11. What do you mean by Tunneling?


It establishes a virtual pipe for data packets between a tunnel entry and a tunnel endpoint.
Packets entering a tunnel are forwarded inside the tunnel and leave the tunnel unchanged.

12. What do you mean by Home agent and foreign agent?


The HA provides several services for the MN and is located in the HN.The Tunnel for
packets toward the MN starts at the HN.
The FA can provide several services to the MN during its visit to the foreign network.The FA
can have the COA acting as tunnel end point and forwarding packets to the MN.

Part-B
1. Explain Mobile IP in detail.
 Goals,assumptions and requirements
 Entities and terminology
 IP packet delivery
 Agent discovery
 Registration
 Tunneling and encapsulation
 Optimizations
 Reverse tunneling
 IPv6
 IP micro-mobility support
 Diagram

Vidyarthiplus.com
Vidyarthiplus.com

Packet Delivery to and from the mobile node

Registration
2. Explain DHCP in detail.

Vidyarthiplus.com
Vidyarthiplus.com

 Main Idea
 Application
 Client/Server Model
 Diagram

Client initialization via DHCP

3. Explain TCP in detail.


 Congestion control
 Slow start
 Fast retransmit/fast recovery

Vidyarthiplus.com
Vidyarthiplus.com

 Implications of mobility.

4. Explain Classical TCP in detail


 Indirect TCP
 Snooping TCP
 Mobile TCP
 Fast retransmit/fast recovery
 Diagram.

Indirect TCP

Snooping TCP

5. Explain Mobile ad-hoc routing protocol in detail.


 Destination-Sequenced Distance-Vector (DSDV) Routing protocol.
 Ad-hoc on demand distance vector routing protocol.
 Dynamic source routing protocol.

Unit-5

Vidyarthiplus.com
Vidyarthiplus.com

Part-A
1. Mention any 2 salient features of WAP
interoperable, i.e., allowing terminals and software from different vendors
to communicate with networks from different providers
scaleable, i.e., protocols and services should scale with customer needs and
number of customers.

2. Mention the role of transaction layer in WAP?


The WAP transaction layer with its wireless transaction protocol (WTP) offers a
lightweight transaction service at the transaction SAP(TR-SAP).This service efficiency
provides reliable or unreliable requests and asynchronous transactions. Tightly coupled to
this layer us the next higher layer, if used for connection-oriented service.

3. What is WAP?
Wireless Application Protocol (WAP) is a technical standard for accessing information
over a mobile wireless network. A WAP browser is a web browser for mobile devices
such as mobile phones that uses the protocol.

4. What is WML?
WML (Wireless Markup Language), formerly called HDML (Handheld Devices Markup
Languages), is a language that allows the text portions of Web pages to be presented on
cellular telephones and personal digital assistants (PDAs) via wireless access.

5. Define WTP.
It refers to a protocol in the Wireless Application Protocol (WAP) suite that efficiently
operates over either secure or non-secure wireless datagram networks. Three different
kinds of transaction services are provided by the WTP, namely the unreliable one-way,
reliable one-way and reliable two-way transactions.

6. What is WSP?
Wireless Session Protocol (WSP) is an open standard for maintaining high level session.
Wireless session is nothing but a normal Web browsing session that starts when the user
connects to one URL and ends when the user leaves that URL.

7. What are the main features of WAP?


 Browser
 Markup language
 Script language
 Gateway
 Server
 Protocol layers
 Telephony application interface.

8. What are the Wireless Protocol stacks?


 Wireless Session Protocol (WSP)
 Wireless Transport Layer Security (WTLS)

Vidyarthiplus.com
Vidyarthiplus.com

 Wireless Transaction Protocol (WTP)


 Wireless Datagram Protocol (WDP)
 Wireless network interface definitions.

9. What is the function of WTLS?


 Provides data integrity, privacy, authentication functios
 Based on ideas from TLS/SSL.

10. What are the goals of WAE?


 device and network independent application environment
 for low bandwidth, wireless devices
 considerations of slow links, limited memory, low computing power,
 small display, simple user interface (compared to desktops)
 Integrated Internet/WWW programming model
 high interoperability.

11. What do you mean by WTA?


 Collection of telephony specific extensions.
 Extension of basic WAE application model.
Content push
server can push content to the client.
client may now be able to handle unknown events.
Handling of network events
table indicating how to react on certain events from the network.
access to telephony functions (WTAI)
any application on the client may access telephony functions.

12. What are the features of WTA?


Extension of basic WAE application model.
-network model for interaction
 client requests to server.
 event signaling: server can push content to the client.
-event handling
 table indicating how to react on certain events from the network.
 client may now be able to handle unknown events.
-telephony functions
 some application on the client may access telephony functions.

Part-B
1. Explain WAP Architecture in detail.
 Introduction
 Interoperable

Vidyarthiplus.com
Vidyarthiplus.com

 Scaleable
 Efficient
 Reliable
 Secure
 Architecture
 Diagram.

Component and interface of WAP

Examples for the integration of WAP components

2. Explain WTP in detail.


 Introduction
 WTP Class 0
 WTP Class 1
 WTP Class 1
 Diagram

Vidyarthiplus.com
Vidyarthiplus.com

WTP Class 0

WTP Class 1

WTP Class 2

3. Explain WML and WML Script in detail.


 Introduction
 Basic Features
 Example
 WML Script
 Capabilities
 Six Libraries
4. Explain WAE and WTA Architecture in detail.

Vidyarthiplus.com
Vidyarthiplus.com

 Introduction(WAE and WTA)


 WAE application model
 Architecture
 Diagram

WAE

WTA

5. Explain WDP and WTLS in detail.

Vidyarthiplus.com
Vidyarthiplus.com

 Introduction(WDP and WTLS)


 WCMP
 Diagram

WDP Service Primitives

WTLS establishing secure session

6. Explain Session Protocol in detail.


 Introduction.
 Session management.
 Capability negotiation.
 Content encoding.
 HTTP/1.1 functionality.
 Exchange of session headers.
 Push and pull data transfer.
 Asynchronous requests.

Vidyarthiplus.com

You might also like