0% found this document useful (0 votes)
118 views15 pages

WN Question - Answer

The document discusses wireless LAN (WLAN) and mobile network layer topics. It defines key terms like infrared transmission, UHF, piconet, scatternet, and care of addressing in mobile IP. It also compares wireless transmission standards like IEEE802.11a and IEEE802.11b. Security issues in wireless networks and routing protocols for mobile ad hoc networks are outlined. Characteristics of wireless technologies like Bluetooth, BRAN and HiperLAN are described based on their architecture and protocols.

Uploaded by

Manimegalai
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
118 views15 pages

WN Question - Answer

The document discusses wireless LAN (WLAN) and mobile network layer topics. It defines key terms like infrared transmission, UHF, piconet, scatternet, and care of addressing in mobile IP. It also compares wireless transmission standards like IEEE802.11a and IEEE802.11b. Security issues in wireless networks and routing protocols for mobile ad hoc networks are outlined. Characteristics of wireless technologies like Bluetooth, BRAN and HiperLAN are described based on their architecture and protocols.

Uploaded by

Manimegalai
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 15

UNIT I – WIRELESS LAN

PART-A

1. State the significance of radio transmission over IR.

A wireless network is a flexible data communications systems, which uses wireless media
such as radio frequency technology to transmit and receive data over the air, minimizing the
need for wired connections. Infrared light transmission is one of the important technologies
used in wireless LAN. It is based on the transmission of infrared light at 900nm wavelength.
2. Distinguish between IR transmission and UHF.

UHF: UHF are electromagnetic waves which have frequency range between 300 MHz to 3 GHz.
These can travel along long distances. These are unidirectional in nature which means that they can
travel only in straight line.

IR: Infrared Waves are electromagnetic waves that have frequency range between 300 GHz to 400
GHz. These cannot travel along long distances. These waves are used for short range communication
and they also use line-of-sight of propagation. These waves cannot pass through solid objects like
walls etc. These also not penetrate through walls. The most common application of the IR waves is
remote controls that are used for TV, DVD players, and stereo system.

3. List out the important characteristics of MANET. (Apr/May-2015)

Bandwidth-constrained and variable capacity links: wireless links continue to have significantly lower
capacity than infrastructure networks.

Energy-constrained operation: some or all of the MSs in a MANET may rely on batteries or other
exhaustible means for their energy

4. Draw the architecture of Bluetooth system.

5. What is piconet and scatternet?

Piconet is a type of Bluetooth network that contains one primary node called the master node and
seven active secondary nodes called slave nodes. Thus, we can say that there is a total of 8 active
nodes which are present at a distance of 10 meters.

Scatternet: The communication between the primary and secondary nodes can be one-to-one or
one-to-many.It is formed by using various piconets. A slave that is present in one piconet can act as
master or we can say primary in another piconet. This kind of node can receive a message from a
master in one piconet and deliver the message to its slave in the other piconet where it is acting as a
slave.

6. List out the requirements of WLAN


Global operation

Low power

Simplified spontaneous operation

Protection of investment

Transparency for applications

7. Compare IEEE802.11a and IEEE802.11b standards? (Apr/May-2018)

IEEE 802.11a standard uses the 5 GHz spectrum and provides a maximum theoretical data rate of 54
Mbps. The data rate automatically lowers down to (54/48/36/24/12/9/6 Mbps) to maintain the
connectivity with the increased distance or attenuation.

IEEE 802.11b provides a maximum theoretical data rate of 11 Mbps in the 2.4 GHz Indusrial,
Scientific and Medical (ISM) band. It specifies High Rate extension of the PHY for the DSSS system,
also called as the High Rate PHY to be used for ISM applications in the 2.4GHz band.

8. What is the difference between performance evolutions of voice oriented fixed assignment and
data oriented random access? (Nov/Dec-2014)

1. Fixed-Assignment Access for Voice-Oriented Networks

Frequency Division Multiple Access (FDMA)

Time Division Multiple Access (TDMA)

Code-Division Multiple Access (CDMA)

2. Random Access for Data-Oriented Networks

ALOHA-Based Wireless Random Access Techniques

CSMA-Based Wireless Random Access Techniques

9. What is BRAN?

The BRAN (Broadband Radio Access Networks (BRAN) is standardized by the European
Telecommunications Standards Institute (ETSI). Primary motivation of BRAN is the deregulation and
privatization of the telecommunication sector. BRAN technology is independent from the protocols
of the fixed network.

10. Compare FDMA, TDMA and CDMA

FDMA TDMA CDMA

FDMA stands for Frequency TDMA stands for Time CDMA stands for Code Division
Division Multiple Access. Division Multiple Access. Multiple Access.

In this, sharing of bandwidth In this, only the sharing of In this, there is sharing of both
among different stations takes time of satellite i.e. bandwidth and time among
place. transponder takes place. different stations takes place.

There is no need of any There is no need of any Codeword is necessary.


codeword. codeword.

In this, there is only need of


In this, guard time of the
guard bands between the In this, both guard bands and
adjacent slots are
adjacent channels are guard time are necessary.
necessary.
necessary.

Synchronization is not Synchronization is


Synchronization is not required.
required. required.

The rate of data is


The rate of data is low. The rate of data is high.
medium.

Mode of data transfer is Mode of data transfer is Mode of data transfer is digital
continuous signal. signal in burts. signal.

It is little flexible. It is moderate flexible. It is highly flexible.

11. Mention some key factors that contribute to security problems in wireless networks

Configuration Problems (Misconfigurations or Incomplete Configurations) ...

Denial of Service

Passive Capturing

Rogue (or Unauthorized/Ad-Hoc) Access Points.

Evil Twin Attacks.

Hacking of Lost or Stolen Wireless Devices.

Freeloading

12. Define Bluetooth.

Bluetooth is a short-range wireless technology standard that is used for exchanging data between
fixed and mobile devices over short distances using UHF radio waves in the ISM bands, from 2.402
GHz to 2.48 GHz, and building personal area networks (PANs).[3] It is mainly used as an alternative
to wire connections, to exchange files between nearby portable devices and connect cell phones and
music players with wireless headphones.

13. Examine the advantage of HYPERLAN-2.

Advantages of HiperLAN2 is that it could be connected to any backbone network, ATM, IP, Ethernet
etc. HiperLAN/2 system is likely to be deployed in a wide range of environments, such as buildings,
exhibition halls, airport, industrial buildings and outdoor deployment

PART B

1. With suitable example explain in detail about WLAN system and protocol architecture.
2. Classify the HIPERLAN standards based on their architecture and protocol specifications
(Nov/Dec-2014) (Nov/Dec-2017) (Apr/May-2018)
3. Describe the key features and explain architecture of Bluetooth (Apr/May-2017)

4. Outline the features of WATM, BRAN with the help of architecture

UNIT II- MOBILE NETWORK LAYER

PART-A

1. Recall the term care of addressing mobile IP (Apr/May-2017)

When MN moves from one network to another, it is identified by the foreign network and the
corresponding router is known as foreign agent. User’s home network router is home agent
and it can give the care of address of the mobile node and care of address identifies the
foreign agent’s location.
2. Define encapsulation and decapsulation.

Encapsulation adds information to a packet as it travels to its destination. Decapsulation reverses


the process by removing the info, so a destination device can read the original data

3. Compare proactive and reactive protocols.

Proactive protocol Reactive protocol

1.Route from each node to every other node Routers from source to destination only

in the network

2.Routers are ready to use instantaneously Routers constructed when needed,

higher connection setup delay.

3.Periodic route-update packets Route update when necessary

4.Large routing table small or no routing tables

4. What is Triangle routing?

Tunneling in its simplest form has all packets to home network (HA) and then sent to MN via a
tunnel. The inefficient behavior of a non-optimized mobile IP is called triangle routing.

5. What is meant by tunneling and reverse tunneling?

Reverse tunneling is a tunneling from mobile host to home agent, and makes it possible for the
mobile host from foreign network to communication in the network whose router has access filters

6. List out the routing protocol in MANET.

Pro-active routing protocols: These are also known as table-driven routing protocols.

Reactive routing protocols: These are also known as on-demand routing protocol.

Hybrid Routing protocol: It basically combines the advantages of both, reactive and pro-active
routing protocols.

7. Mention the different entities in a mobile IP(Apr/May-2017) (Apr/May-2018)


Mobile IP introduces the following new functional entities: Mobile Node (MN)–Host or router that
changes its point of attachment from one network to another. Home Agent (HA)–Router on a mobile
node's home network that intercepts datagrams destined for the mobile node, and delivers them
through the care-of address

8. Define mobile node

A mobile node (MN) is a node that is capable of changing its point of attachment to the network
across layers, namely layer 2 or layer 3.A mobile node may be either a mobile host (with no
forwarding functionality) or a mobile router (with forwarding functionality). A mobile node can have
multiple interfaces

9. What is DHCP?

Dynamic Host Configuration Protocol (DHCP) is a network management protocol used to automate
the process of configuring devices on IP networks, thus allowing them to use network services such
as DNS, NTP, and any communication protocol based on UDP or TCP. A DHCP server dynamically
assigns an IP address and other network configuration parameters to each device on a network so
they can communicate with other IP networks.

10. Access the importance of DSDV to Distance vector routing algorithm

Destination-Sequenced Distance-Vector Routing (DSDV) is a table-driven routing scheme for ad hoc


mobile networks. The main contribution of the algorithm was to solve the routing loop problem.
Each entry in the routing table contains a sequence number, the sequence numbers are generally
even if a link is present; else, an odd number is used. The number is generated by the destination,
and the emitter needs to send out the next update with this number. Routing information is
distributed between nodes by sending full dumps infrequently and smaller incremental updates
more frequently.

11. Justify the need for special protocols to support micro mobility on the network layer.

With the Mobile IP, the mobile nodes are able to send and receive data despite their current point of
attachment to the Internet. In the standard Mobile IP, mobile nodes have to report their every
movement in the foreign network to their home networks. This causes huge amount of signaling
traffic and disturbing latency during handoffs. Instead the home network only has to know in which
visited network the mobile node is located and the local micro mobility is managed inside the visited
network

12. When the agent solicitation message has to be sent by mobile node? (Nov/Dec-2017)

The mobile node can send three initial solicitations at a maximum rate of one per second while
searching for an agent. After registering with an agent, the rate at which solicitations are sent is
reduced, to limit the overhead on the local network.

13. Infer the knowledge of binding request

Binding request is sent by the correspondent node to the home agent to request a binding update.
It contains the home address of the queried mobile node and possibly an identification number

14. Distinguish between adhoc network with cellular network (Apr/May-2018)


The network routing of cellular network is centralized, all the traffic goes through the base station.
The network routing of adhoc network are distributed, no centralized system such as base station
needed

15. Define encapsulation in mobile IP (Apr/May-2016)

Encapsulation is the mechanism of taking a packet consisting of packet header and data and putting
it into the data part of a new packet. The reverse operation, taking a packet out of the data part of
another packet, is called de-capsulation

16. Why is routing in multi hop ad-hoc networks complicated? (Nov/Dec-2017)

Due to the highly dynamic nature of mobile ad hoc network, it results in frequent and unpredictable
changes in network topology and hence makes routing among the mobile nodes as a complex and
difficult task

. PART B

1. Briefly explain the following process in mobile IP (Apr/May-2017) (Nov/Dec-2017)

i)Agent discovery

ii) Host Registration III) IP packet delivery

2. With the suitable header format explain the following encapsulation methods

i)IP-IP encapsulation ii)minimal encapsulation iii)Generic routing encapsulation

3. Illustrate with suitable example and diagrams explain Destination sequenced distance vector

routing protocol. (Apr/May-2018)

4.State the entities and terminologies used in mobile IP along with the tunneling (Apr/May-2018)

5.IPV6

UNIT III –3G OVERVIEW

PART-A

1. Give the significance of link adaptation scheme. (Apr/May-2018)

Link adaptation schemes adaptively adjust over-the-air transmission parameters in response to a


change of radio channel for both downlink and uplink. The IEEE 802.16m supports an Adaptive
Modulation and Coding (AMC) scheme for downlink and uplink transmissions.

2. What are the functionalities supported by 3G-MSC?

The following functionality is provided by the 3G - MSC : Mobility management Call management
Supplementary services Short message services ( SMS ) OAM ( operation , administration , and
maintenance ) agent functionality

3. List the performance improvements achieved by HSDPA

Additional channels:
Modulation:

improved scheduling:

Hybrid automatic repeat request

4. How does the firewall protect the backbone data networks?

A firewall is a security device — computer hardware or software — that can help protect your
network by filtering traffic and blocking outsiders from gaining unauthorized access to the private
data on your computer

5. Distinguish between SGSN and GGSN. (Apr/May-2015)

The gateway GPRS support node (GGSN) converts the incoming data traffic coming from the mobile
users through the Service gateway GPRS support node (SGSN) and forwards it to the relevant
network, and vice versa. The GGSN and the SGSN together form the GPRS support nodes (GSN)

7. List out the supplementary services supported by 3G system.

Number identification supplementary services

Call offering supplementary services

Call completion supplementary services

Multiparty supplementary services

Community of interest’ supplementary services

Charging supplementary services

Additional information transfer supplementary services

8. Summarize the duties of SGSN and GGSN in GPRS network?

Task of SGSN : Packet Delivery, Mobility management, apply/ sign off of terminals localization, LLC
(Logical Link Control) management, Authentication, billing

Task of GGSN : Mediator between GPRS between backbone and external data networks. Saves
current data for the SGSN address of the participant as well as their profile and data for
authentication and invoice.

9. Outline the duties of RNS

Each RNS control the allocation and the release of specific radio resources to establish a connection
between a UE (User Equipment) and the UTRAN. A RNS is responsible for the resources and
transmission/reception in a group of cells

10. Name some of the 3G access schemes identified to support different spectrum. (Apr/May-
2017)

1. Enhanced data rates for GSM evolution (EDGE) with high-level modulation in a 200 kHz TDMA
channel is based on plug-in transceiver equipment, thereby allowing the migration of existing bands
in small spectrum segments.
2. Universal mobile telecommunications services (UMTS) is a new radio access network based on 5
MHz WCDMA and optimized for efficient support of 3G services. UMTS can be used in both new and
existing spectra.

11. Mention the duties of UMTS layers (Apr/May-2018)

Forward error correction, bit-interleaving, and rate matching

Signal measurements

Micro-diversity distribution/combining and soft hand off execution

Multiplexing/mapping of services on dedicated physical codes

Modulation, spreading, demodulation, despreading of physical channels

Frequency and time (chip, bit, slot, frame) synchronization

Fast closed-loop power control

Power weighting and combining of physical channels

Radio frequency (RF) processing.

12. Classify the functions provided by 3G-MSC.

The 3G-MSC is the main CN element to provide CS services. The 3G-MSC also provides the necessary
control and corresponding signaling interfaces including SS7, MAP, ISUP (ISDN user part), etc. The 3G
MSC provides the interconnection to external networks like PSTN and ISDN

13. Show the functions provided by 3G-GGSN

The GGSN provides interworking with the external PS network. It is connected with SGSN via an IP-
based network. The GGSN may optionally support an SS7 interface with the HLR to handle mobile
terminated packet sessions.

14. What are the functions provided by SMS-GMSC?

Reception of short message packet data unit (PDU), Interrogation of HLR for routing information and
Forwarding of the short message PDU to the MSC or SGSN using the routing information

15. State the objective of High speed downlink packet access

HSDPA is based on the same set of technologies as high data rate (HDR) to improve spectral
efficiency for data services — such as shared downlink packet data channel and high peak data rates
(8–10 Mbps) — using high-order modulation and adaptive modulation and coding, hybrid ARQ
(HARQ) retransmission schemes, fast scheduling and shorter frame sizes. HSDPA also shortens the
round-trip time between the network and terminals and reduces variance in downlink transmission
delay

16. What is meant by firewall? (Nov/Dec-2017)

This entity is used to protect the service provider’s backbone data networks from attack from
external packet data networks. The security of the backbone data network can be ensured by
applying packet filtering mechanisms based on access control lists or any other methods deemed
suitable

17. What are the new channels introduced in HSDPA?

The three main channels are High Speed Downlink Shared Channel, HS-DSCH; High Speed Signalling
Control Channel, HS-SCCH; and High Speed Dedicated Physical Control Channel, HS-DPCCH

18. What is the purpose of firewall used in UMTS network. (Apr/May-2017)

Its purpose is to control what traffic is allowed to traverse from one side to the other. As the most
basic level, firewalls can block traffic intended for particular IP addresses or server ports

19. Give the logical interfaces involved in network architecture.

The UMTS Iu interface is the open logical interface that interconnects one UTRAN to the UMTS core
network (UCN). On the UTRAN side the Iu interface is terminated at the RNC, and at the UCN side it
is terminated at U-MSC

20. How isolation between users in the downlink is accomplished in a wideband CDMA systems?

In a WCDMA system, isolation between users in the downlink is accomplished through the
combination of user-specific channelization codes and cell-specific scrambling codes. Channelization
codes are generated recursively to form a binary tree structure

PART-B

1UTRAN
UMTS core architecture (Or)What are the functions of UMTS domains? Explain in detail(Apr/May-
2017) (Nov/Dec-2017) (Apr/May-2018)

(Or)Summarize the functionalities provided by 3G-MSC,3G- SGSN and 3G- GGSN in 3G mobile

Communication systems (Apr/May-2014) (Nov/Dec-2017)

2.CDMA 2000

3.TDCDMA and TDSCDMA

4.3Gpp architecture
UNIT-IV- INTERNETWORKING BETWEEN WLANS AND WWANS

PART-A

1. Give the significance of network.

Data networks refer to systems designed to transfer data between two or more access points via the
use of system controls, transmission lines and data switching. What makes a data network unique
from other types of networks is that it is set up to transmit data only

2. What are the functionalities supported by interworking?

An interworking function (IWF) acts a gateway to enable 2G and 3G network elements to connect
and communicate with 4G LTE network elements, such as between MAP-based and Diameter-based
interfaces. This connection is essential; without it, communications service providers (CSPs) would
have to totally replace their legacy infrastructure and systems while building out their LTE networks.

3. List the components involved in internet.

Components of the Internet include- DSL Modem, DSL filter, NAT router and Firewall, Firewall of
computer and Internet Connection Sharing

4. What is the functional protocol?

Connection Establishment/Release. A data transfer can be a communication-oriented transfer or


connectionless transfer

Encapsulation

Segmentation and Reassembly.

Data Transfer Management.

Multiplexing/Demultiplexing.

Addressing.

Ordered Delivery.

Error Control

5. Define router in a network.

A router is a device that connects two or more packet-switched networks or subnetworks. It serves
two primary functions: managing traffic between these networks by forwarding data packets to their
intended IP addresses, and allowing multiple devices to use the same Internet connection

6. Outline the networking models used to describe the protocol

Hardware

Firmware

Software

Security

Routing
Topology

Transmission

Technology

7. Specify the categorization of the interworking scheme.

Mobile IP approach

Gateway approach

Emulator approach

8. Show the functions provided by DNS

Host Aliasing. A host with a complicated hostname can have one or more alias names.

Mail Server Aliasing. For obvious reasons, it is highly desirable that e-mail addresses by mnemonic.

Load Distribution.

9. State the objective of loose coupling.

The goal of a loose coupling architecture is to reduce the risk that a change made within one
element will create unanticipated changes within other elements. Limiting interconnections can help
isolate problems when things go wrong and simplify testing, maintenance and troubleshooting
procedures

10. What is meant by tight coupling?

Tight Coupling is the idea of binding resources to specific purposes and functions. Tightly-coupled
components may bind each resource to a particular use case, a specific interface, or a specific
frontend

11. What are the new channels introduced in GPRS?

Three subtypes of control channels have been defined for GPRS: broadcast, common control, and
associated. The different packet data logical channels are:

Packet broadcast control channel (PBCCH). ...

Packet common control channel (PCCCH). ...

Packet data traffic channel (PDTCH).

12. What is the purpose of LMDS?

LMDS is a broadband wireless point-to-multipoint communication system operating above 20 GHz


(depending on country of licensing) that can be used to provide digital two-way voice, data, Internet,
and video services

13. Give the logical advantages of LMDS?

Following are the LMDS advantages: It has larger bandwidth used for wide variety of applications
such as voice, IP, data etc. It supports large capacity of users densely populated by way of sectorizing
the area into cells
24. Distinguish between LMDS and MMDS.

MMDS signal can cover long distance and hence used in large cell network scenario. LMDS signal can
cover short distance from Base Station equipment

PART-B

1. Outline the tight coupling and loose coupling

2. Name and explain the protocol planes defined for LMDS.

3. What are the functions of MMDS systems? Explain in detail

5. Describe about the interworking objectives and requirements.

4. WLAN and 3GPP interworking of WLAN-GPRS.

UNIT V-4G&BEYOND

PART-A

1. What is smart antenna? and write the benefits of smart antenna technology.

smart antenna is “an antenna array with digital signal processing algorithms, which identify spatial
signatures.” Using these spatial signatures, the smart antenna calculates beamforming vectors,
which are then used to track and locate the antenna beam on a mobile or target

It improves the wireless system performance.

It is economic for a large range of potential users.

It increases in signal quality, capacity as well as the coverage.

It is now possible to multiple channels in spatial dimension

2. Compare SISO, SIMO, MISO and MIMO systems.

SISO- The simplest form of radio link can be defined in MIMO terms as SISO - Single Input Single
Output. This is effectively a standard radio channel - this transmitter operates with one antenna as
does the receiver. There is no diversity and no additional processing required.

SIMO- The SIMO or Single Input Multiple Output version of MIMO occurs where the transmitter has
a single antenna and the receiver has multiple antennas. This is also known as receive diversity. It is
often used to enable a receiver system that receives signals from a number of independent sources
to combat the effects of fading. It has been used for many years with short wave listening / receiving
stations to combat the effects of ionospheric fading and interference.

MISO- MISO is also termed transmit diversity. In this case, the same data is transmitted redundantly
from the two transmitter antennas. The receiver is then able to receive the optimum signal which it
can then use to receive extract the required data.

MIMO- Where there are more than one antenna at either end of the radio link, this is termed MIMO
- Multiple Input Multiple Output. MIMO can be used to provide improvements in both channel
robustness as well as channel throughput.

3. Define multicarrier modulation (Apr/May-2017)


Multi-carrier modulation (MCM) is a method of transmitting data by splitting it into several
components, and sending each of these components over separate carrier signals. The individual
carriers have narrow bandwidth , but the composite signal can have broad bandwidth

4. Compare the 3G and 4G systems.

The 3G technology offers a maximum download rate of about 21 Megabytes per second. The 4G
technology can download videos at a much faster rate, that can go as high as 1 Gigabyte per second.
It utilises the packet switching technique. It utilises both the message switching as well as the packet
switching techniques

5. What is meant by software defined radio?

A radio is any kind of device that wirelessly transmits or receives signals in the radio frequency (RF)
part of the electromagnetic spectrum to facilitate the transfer of information. In today's world,
radios exist in a multitude of items such as cell phones, computers, car door openers, vehicles, and
televisions

6. List out the functions of cognitive radio (Nov/Dec-2017)

Spectrum sensing

Transmitter detection

Cooperative detection

Power Control

Spectrum management

7. What is time slot scheduler?

The network has a single wireless channel, which is shared by all the primary and secondary users.
The channel is time-slotted. We assume that at each time slot, a primary user will not occupy the
channel with probability Pi. At the beginning of each slot, the secondary users sense the activity of
the primary users. If the channel is sensed idle, the secondary users can exploit the availability of the
channel

8. Draw the MIMO air interface architecture.

9. List out the benefits of smart antenna technology

It improves the wireless system performance.

It is economic for a large range of potential users.


It increases in signal quality, capacity as well as the coverage.

It is now possible to multiple channels in spatial dimension.

10. What are the types of MCM that are likely preferred for 4G?

multi-carrier CDMA

orthogonal FDM using TDMA

11. Give the applications of 4G(Nov/Dec-2017)

4G Ultra high-speed internet access.

E-mail or general web browsing is available.

4G Data intensive interactive user services.

Services such as online satellite mapping will load instantly.

4G Multiple User Video conferencing.

subscribers can see as well as talk to more than one person.

12. Summarize the challenges of 4G. (Apr/May-2017)

Multi-access interface, timing and recovery.

Higher frequency reuse leads to smaller cells that may cause intra-cell interference or higher noise
figures due to reduced power levels.

The Digital to analog conversions at high data rates, multiuser detection and estimation (at base
stations), smart antennas and complex error control techniques as well dynamic routing will need
sophisticated signal processing.

Issues in the interface with the ad hoc networks should be sorted out. 4G systems are expected to
interact with other networks like the Bluetooth, hiperlan, IEEE802.11b, etc.

13. Evaluate the channel capacity of MIMO system.

It is known that the channel capacity in a MIMO communication system depends on the number of
transmit and received antennas, the signal-to-noise ratio, the channel state, and the autocorrelation
or covariance matrix of the transmitted signal vector

14. Show the main issues in terminal mobility of 4G

Two important problems in terminal mobility are location and hand off management. Location
management includes tracking the location of the mobile users and maintaining data like the
authentication information, QoS capabilities, and the original and the current cell location.

15. Describe characteristics of 4G. (Apr/May-2018)


16. Discuss about the security challenges in 4G

Major security challenges in 4G heterogeneous networks are inherent in current internet security
threats and IP security vulnerabilities. These new challenges are: IP address spoofing, user ID theft,
Theft of Service, Denial of Service, and intrusion attacks

17. Suggest the methods to overcome security and privacy issues in 4G

LTE cellular security

LTE handover security

IMS security

HeNB security

MTC security

28. Give the advantage of multicarrier Modulation over single carrier schemes (Apr/May-2018)

The advantages of MCM include relative immunity to fading caused by transmission over more than
one path at a time (multipath fading), less susceptibility than single-carrier systems to interference
caused by impulse noise, and enhanced immunity to inter-symbol interference

PART-B

1. Discuss about 4G vision, features and challenge of 4G with applications

2. write notes on the following i) Smart antenna techniques ii) Multi carrier modulation

(Or)How are higher spectral efficiency and increased throughput achieved in the OFDM-MIMO

Systems? (Nov/Dec-2017) (Apr/May-2018)

(Or)Write your understanding on behaviour of smart antenna techniques.(Apr/May-2017)

3. Explain the LTE Protocol structure with the functional elements. (Apr/May-2018)

4.IMS architecture

5.Advanced broadband wireless access and service.

You might also like