WN Question - Answer
WN Question - Answer
PART-A
A wireless network is a flexible data communications systems, which uses wireless media
such as radio frequency technology to transmit and receive data over the air, minimizing the
need for wired connections. Infrared light transmission is one of the important technologies
used in wireless LAN. It is based on the transmission of infrared light at 900nm wavelength.
2. Distinguish between IR transmission and UHF.
UHF: UHF are electromagnetic waves which have frequency range between 300 MHz to 3 GHz.
These can travel along long distances. These are unidirectional in nature which means that they can
travel only in straight line.
IR: Infrared Waves are electromagnetic waves that have frequency range between 300 GHz to 400
GHz. These cannot travel along long distances. These waves are used for short range communication
and they also use line-of-sight of propagation. These waves cannot pass through solid objects like
walls etc. These also not penetrate through walls. The most common application of the IR waves is
remote controls that are used for TV, DVD players, and stereo system.
Bandwidth-constrained and variable capacity links: wireless links continue to have significantly lower
capacity than infrastructure networks.
Energy-constrained operation: some or all of the MSs in a MANET may rely on batteries or other
exhaustible means for their energy
Piconet is a type of Bluetooth network that contains one primary node called the master node and
seven active secondary nodes called slave nodes. Thus, we can say that there is a total of 8 active
nodes which are present at a distance of 10 meters.
Scatternet: The communication between the primary and secondary nodes can be one-to-one or
one-to-many.It is formed by using various piconets. A slave that is present in one piconet can act as
master or we can say primary in another piconet. This kind of node can receive a message from a
master in one piconet and deliver the message to its slave in the other piconet where it is acting as a
slave.
Low power
Protection of investment
IEEE 802.11a standard uses the 5 GHz spectrum and provides a maximum theoretical data rate of 54
Mbps. The data rate automatically lowers down to (54/48/36/24/12/9/6 Mbps) to maintain the
connectivity with the increased distance or attenuation.
IEEE 802.11b provides a maximum theoretical data rate of 11 Mbps in the 2.4 GHz Indusrial,
Scientific and Medical (ISM) band. It specifies High Rate extension of the PHY for the DSSS system,
also called as the High Rate PHY to be used for ISM applications in the 2.4GHz band.
8. What is the difference between performance evolutions of voice oriented fixed assignment and
data oriented random access? (Nov/Dec-2014)
9. What is BRAN?
The BRAN (Broadband Radio Access Networks (BRAN) is standardized by the European
Telecommunications Standards Institute (ETSI). Primary motivation of BRAN is the deregulation and
privatization of the telecommunication sector. BRAN technology is independent from the protocols
of the fixed network.
FDMA stands for Frequency TDMA stands for Time CDMA stands for Code Division
Division Multiple Access. Division Multiple Access. Multiple Access.
In this, sharing of bandwidth In this, only the sharing of In this, there is sharing of both
among different stations takes time of satellite i.e. bandwidth and time among
place. transponder takes place. different stations takes place.
Mode of data transfer is Mode of data transfer is Mode of data transfer is digital
continuous signal. signal in burts. signal.
11. Mention some key factors that contribute to security problems in wireless networks
Denial of Service
Passive Capturing
Freeloading
Bluetooth is a short-range wireless technology standard that is used for exchanging data between
fixed and mobile devices over short distances using UHF radio waves in the ISM bands, from 2.402
GHz to 2.48 GHz, and building personal area networks (PANs).[3] It is mainly used as an alternative
to wire connections, to exchange files between nearby portable devices and connect cell phones and
music players with wireless headphones.
Advantages of HiperLAN2 is that it could be connected to any backbone network, ATM, IP, Ethernet
etc. HiperLAN/2 system is likely to be deployed in a wide range of environments, such as buildings,
exhibition halls, airport, industrial buildings and outdoor deployment
PART B
1. With suitable example explain in detail about WLAN system and protocol architecture.
2. Classify the HIPERLAN standards based on their architecture and protocol specifications
(Nov/Dec-2014) (Nov/Dec-2017) (Apr/May-2018)
3. Describe the key features and explain architecture of Bluetooth (Apr/May-2017)
PART-A
When MN moves from one network to another, it is identified by the foreign network and the
corresponding router is known as foreign agent. User’s home network router is home agent
and it can give the care of address of the mobile node and care of address identifies the
foreign agent’s location.
2. Define encapsulation and decapsulation.
1.Route from each node to every other node Routers from source to destination only
in the network
Tunneling in its simplest form has all packets to home network (HA) and then sent to MN via a
tunnel. The inefficient behavior of a non-optimized mobile IP is called triangle routing.
Reverse tunneling is a tunneling from mobile host to home agent, and makes it possible for the
mobile host from foreign network to communication in the network whose router has access filters
Pro-active routing protocols: These are also known as table-driven routing protocols.
Reactive routing protocols: These are also known as on-demand routing protocol.
Hybrid Routing protocol: It basically combines the advantages of both, reactive and pro-active
routing protocols.
A mobile node (MN) is a node that is capable of changing its point of attachment to the network
across layers, namely layer 2 or layer 3.A mobile node may be either a mobile host (with no
forwarding functionality) or a mobile router (with forwarding functionality). A mobile node can have
multiple interfaces
9. What is DHCP?
Dynamic Host Configuration Protocol (DHCP) is a network management protocol used to automate
the process of configuring devices on IP networks, thus allowing them to use network services such
as DNS, NTP, and any communication protocol based on UDP or TCP. A DHCP server dynamically
assigns an IP address and other network configuration parameters to each device on a network so
they can communicate with other IP networks.
11. Justify the need for special protocols to support micro mobility on the network layer.
With the Mobile IP, the mobile nodes are able to send and receive data despite their current point of
attachment to the Internet. In the standard Mobile IP, mobile nodes have to report their every
movement in the foreign network to their home networks. This causes huge amount of signaling
traffic and disturbing latency during handoffs. Instead the home network only has to know in which
visited network the mobile node is located and the local micro mobility is managed inside the visited
network
12. When the agent solicitation message has to be sent by mobile node? (Nov/Dec-2017)
The mobile node can send three initial solicitations at a maximum rate of one per second while
searching for an agent. After registering with an agent, the rate at which solicitations are sent is
reduced, to limit the overhead on the local network.
Binding request is sent by the correspondent node to the home agent to request a binding update.
It contains the home address of the queried mobile node and possibly an identification number
Encapsulation is the mechanism of taking a packet consisting of packet header and data and putting
it into the data part of a new packet. The reverse operation, taking a packet out of the data part of
another packet, is called de-capsulation
Due to the highly dynamic nature of mobile ad hoc network, it results in frequent and unpredictable
changes in network topology and hence makes routing among the mobile nodes as a complex and
difficult task
. PART B
i)Agent discovery
2. With the suitable header format explain the following encapsulation methods
3. Illustrate with suitable example and diagrams explain Destination sequenced distance vector
4.State the entities and terminologies used in mobile IP along with the tunneling (Apr/May-2018)
5.IPV6
PART-A
The following functionality is provided by the 3G - MSC : Mobility management Call management
Supplementary services Short message services ( SMS ) OAM ( operation , administration , and
maintenance ) agent functionality
Additional channels:
Modulation:
improved scheduling:
A firewall is a security device — computer hardware or software — that can help protect your
network by filtering traffic and blocking outsiders from gaining unauthorized access to the private
data on your computer
The gateway GPRS support node (GGSN) converts the incoming data traffic coming from the mobile
users through the Service gateway GPRS support node (SGSN) and forwards it to the relevant
network, and vice versa. The GGSN and the SGSN together form the GPRS support nodes (GSN)
Task of SGSN : Packet Delivery, Mobility management, apply/ sign off of terminals localization, LLC
(Logical Link Control) management, Authentication, billing
Task of GGSN : Mediator between GPRS between backbone and external data networks. Saves
current data for the SGSN address of the participant as well as their profile and data for
authentication and invoice.
Each RNS control the allocation and the release of specific radio resources to establish a connection
between a UE (User Equipment) and the UTRAN. A RNS is responsible for the resources and
transmission/reception in a group of cells
10. Name some of the 3G access schemes identified to support different spectrum. (Apr/May-
2017)
1. Enhanced data rates for GSM evolution (EDGE) with high-level modulation in a 200 kHz TDMA
channel is based on plug-in transceiver equipment, thereby allowing the migration of existing bands
in small spectrum segments.
2. Universal mobile telecommunications services (UMTS) is a new radio access network based on 5
MHz WCDMA and optimized for efficient support of 3G services. UMTS can be used in both new and
existing spectra.
Signal measurements
The 3G-MSC is the main CN element to provide CS services. The 3G-MSC also provides the necessary
control and corresponding signaling interfaces including SS7, MAP, ISUP (ISDN user part), etc. The 3G
MSC provides the interconnection to external networks like PSTN and ISDN
The GGSN provides interworking with the external PS network. It is connected with SGSN via an IP-
based network. The GGSN may optionally support an SS7 interface with the HLR to handle mobile
terminated packet sessions.
Reception of short message packet data unit (PDU), Interrogation of HLR for routing information and
Forwarding of the short message PDU to the MSC or SGSN using the routing information
HSDPA is based on the same set of technologies as high data rate (HDR) to improve spectral
efficiency for data services — such as shared downlink packet data channel and high peak data rates
(8–10 Mbps) — using high-order modulation and adaptive modulation and coding, hybrid ARQ
(HARQ) retransmission schemes, fast scheduling and shorter frame sizes. HSDPA also shortens the
round-trip time between the network and terminals and reduces variance in downlink transmission
delay
This entity is used to protect the service provider’s backbone data networks from attack from
external packet data networks. The security of the backbone data network can be ensured by
applying packet filtering mechanisms based on access control lists or any other methods deemed
suitable
The three main channels are High Speed Downlink Shared Channel, HS-DSCH; High Speed Signalling
Control Channel, HS-SCCH; and High Speed Dedicated Physical Control Channel, HS-DPCCH
Its purpose is to control what traffic is allowed to traverse from one side to the other. As the most
basic level, firewalls can block traffic intended for particular IP addresses or server ports
The UMTS Iu interface is the open logical interface that interconnects one UTRAN to the UMTS core
network (UCN). On the UTRAN side the Iu interface is terminated at the RNC, and at the UCN side it
is terminated at U-MSC
20. How isolation between users in the downlink is accomplished in a wideband CDMA systems?
In a WCDMA system, isolation between users in the downlink is accomplished through the
combination of user-specific channelization codes and cell-specific scrambling codes. Channelization
codes are generated recursively to form a binary tree structure
PART-B
1UTRAN
UMTS core architecture (Or)What are the functions of UMTS domains? Explain in detail(Apr/May-
2017) (Nov/Dec-2017) (Apr/May-2018)
(Or)Summarize the functionalities provided by 3G-MSC,3G- SGSN and 3G- GGSN in 3G mobile
2.CDMA 2000
4.3Gpp architecture
UNIT-IV- INTERNETWORKING BETWEEN WLANS AND WWANS
PART-A
Data networks refer to systems designed to transfer data between two or more access points via the
use of system controls, transmission lines and data switching. What makes a data network unique
from other types of networks is that it is set up to transmit data only
An interworking function (IWF) acts a gateway to enable 2G and 3G network elements to connect
and communicate with 4G LTE network elements, such as between MAP-based and Diameter-based
interfaces. This connection is essential; without it, communications service providers (CSPs) would
have to totally replace their legacy infrastructure and systems while building out their LTE networks.
Components of the Internet include- DSL Modem, DSL filter, NAT router and Firewall, Firewall of
computer and Internet Connection Sharing
Encapsulation
Multiplexing/Demultiplexing.
Addressing.
Ordered Delivery.
Error Control
A router is a device that connects two or more packet-switched networks or subnetworks. It serves
two primary functions: managing traffic between these networks by forwarding data packets to their
intended IP addresses, and allowing multiple devices to use the same Internet connection
Hardware
Firmware
Software
Security
Routing
Topology
Transmission
Technology
Mobile IP approach
Gateway approach
Emulator approach
Host Aliasing. A host with a complicated hostname can have one or more alias names.
Mail Server Aliasing. For obvious reasons, it is highly desirable that e-mail addresses by mnemonic.
Load Distribution.
The goal of a loose coupling architecture is to reduce the risk that a change made within one
element will create unanticipated changes within other elements. Limiting interconnections can help
isolate problems when things go wrong and simplify testing, maintenance and troubleshooting
procedures
Tight Coupling is the idea of binding resources to specific purposes and functions. Tightly-coupled
components may bind each resource to a particular use case, a specific interface, or a specific
frontend
Three subtypes of control channels have been defined for GPRS: broadcast, common control, and
associated. The different packet data logical channels are:
Following are the LMDS advantages: It has larger bandwidth used for wide variety of applications
such as voice, IP, data etc. It supports large capacity of users densely populated by way of sectorizing
the area into cells
24. Distinguish between LMDS and MMDS.
MMDS signal can cover long distance and hence used in large cell network scenario. LMDS signal can
cover short distance from Base Station equipment
PART-B
UNIT V-4G&BEYOND
PART-A
1. What is smart antenna? and write the benefits of smart antenna technology.
smart antenna is “an antenna array with digital signal processing algorithms, which identify spatial
signatures.” Using these spatial signatures, the smart antenna calculates beamforming vectors,
which are then used to track and locate the antenna beam on a mobile or target
SISO- The simplest form of radio link can be defined in MIMO terms as SISO - Single Input Single
Output. This is effectively a standard radio channel - this transmitter operates with one antenna as
does the receiver. There is no diversity and no additional processing required.
SIMO- The SIMO or Single Input Multiple Output version of MIMO occurs where the transmitter has
a single antenna and the receiver has multiple antennas. This is also known as receive diversity. It is
often used to enable a receiver system that receives signals from a number of independent sources
to combat the effects of fading. It has been used for many years with short wave listening / receiving
stations to combat the effects of ionospheric fading and interference.
MISO- MISO is also termed transmit diversity. In this case, the same data is transmitted redundantly
from the two transmitter antennas. The receiver is then able to receive the optimum signal which it
can then use to receive extract the required data.
MIMO- Where there are more than one antenna at either end of the radio link, this is termed MIMO
- Multiple Input Multiple Output. MIMO can be used to provide improvements in both channel
robustness as well as channel throughput.
The 3G technology offers a maximum download rate of about 21 Megabytes per second. The 4G
technology can download videos at a much faster rate, that can go as high as 1 Gigabyte per second.
It utilises the packet switching technique. It utilises both the message switching as well as the packet
switching techniques
A radio is any kind of device that wirelessly transmits or receives signals in the radio frequency (RF)
part of the electromagnetic spectrum to facilitate the transfer of information. In today's world,
radios exist in a multitude of items such as cell phones, computers, car door openers, vehicles, and
televisions
Spectrum sensing
Transmitter detection
Cooperative detection
Power Control
Spectrum management
The network has a single wireless channel, which is shared by all the primary and secondary users.
The channel is time-slotted. We assume that at each time slot, a primary user will not occupy the
channel with probability Pi. At the beginning of each slot, the secondary users sense the activity of
the primary users. If the channel is sensed idle, the secondary users can exploit the availability of the
channel
10. What are the types of MCM that are likely preferred for 4G?
multi-carrier CDMA
Higher frequency reuse leads to smaller cells that may cause intra-cell interference or higher noise
figures due to reduced power levels.
The Digital to analog conversions at high data rates, multiuser detection and estimation (at base
stations), smart antennas and complex error control techniques as well dynamic routing will need
sophisticated signal processing.
Issues in the interface with the ad hoc networks should be sorted out. 4G systems are expected to
interact with other networks like the Bluetooth, hiperlan, IEEE802.11b, etc.
It is known that the channel capacity in a MIMO communication system depends on the number of
transmit and received antennas, the signal-to-noise ratio, the channel state, and the autocorrelation
or covariance matrix of the transmitted signal vector
Two important problems in terminal mobility are location and hand off management. Location
management includes tracking the location of the mobile users and maintaining data like the
authentication information, QoS capabilities, and the original and the current cell location.
Major security challenges in 4G heterogeneous networks are inherent in current internet security
threats and IP security vulnerabilities. These new challenges are: IP address spoofing, user ID theft,
Theft of Service, Denial of Service, and intrusion attacks
IMS security
HeNB security
MTC security
28. Give the advantage of multicarrier Modulation over single carrier schemes (Apr/May-2018)
The advantages of MCM include relative immunity to fading caused by transmission over more than
one path at a time (multipath fading), less susceptibility than single-carrier systems to interference
caused by impulse noise, and enhanced immunity to inter-symbol interference
PART-B
2. write notes on the following i) Smart antenna techniques ii) Multi carrier modulation
(Or)How are higher spectral efficiency and increased throughput achieved in the OFDM-MIMO
3. Explain the LTE Protocol structure with the functional elements. (Apr/May-2018)
4.IMS architecture