MC Solved QB
MC Solved QB
Computer Engineering
Option A: VLR
Option B: HMR
Option C: CMR
Option D: SIM
4. In which one of the following, the slow and fast hopping is used?
Option A: GSM
Option B: GPRS
Option C: FHSS
Option D: None of the above
7. What is the interface between SGSN and HLR in a GPRS network structure?
Option A: Gs
Option B: Gn
Option C: Gb
Option D: Gr
14. In the Indirect TCP the Foreign Agent (FA) becomes or acts as a —— and
relays data in both directions
Option A: Router
Option B: Node
Option C: Proxy
Option D: Access Point
19. Which of the following specifies a set of media access control (MAC) and
physical layer specifications for implementing WLANs?
Option A: IEEE 802.16
Option B: IEEE 802.3
Option C: IEEE 802.11
Option D: IEEE 802.15
20. Which of the following is the 802.11 High Rate Standard?
Option A: IEEE 802.15
Option B: IEEE 802.15.4
Option C: IEEE 802.11g
Option D: IEEE 802.11b
Descriptive Questions
Differentiate between DSSS and FHSS.
Explain the Various types of antennas along with their radiation patters.
What are the modifications are required to an existing GSM network to be upgraded to
GPRS, Explain with suitable diagram.
Write a short note on UTRAN and UMTS network.
Explain Hidden and Exposed terminal problem? Discuss solutions to this problems
Explain Tunnelling and Encapsulation and discuss how tunnelling work for Mobile IP using
IP-In-IP Encapsulation?
Explain about Hierarchical Mobile IPv6?
Explain the SAE architecture in detailed manner.
Explain LTE protocol stack.
Explain LTE MAC layer.
Explain Protocol Architecture of 802.11?
Explain in detail IEEE 802.11 MAC sub layer?
Explain Bluetooth Architecture in detailed manner?
Draw and explain Bluetooth protocol stack in detail?
Explain about optimization in mobility management?
Comparison of IPv4 and IPv6 Header format?
What is Cellular IP? Explain CIP architecture along with routing and paging procedure in
CIP?
Discuss in detail about Macro Mobility?
Explain about HAWAII in detailed manner?
Explain Agent advertisement in Mobile IP?
Explain various ALOHA protocol?
What are the goals of Mobile IP?
Write a short note on different generations of telecommunication
Compare between 1G, 2G, 3G, 4G and 5G generations.
Compare between LTE and LTE advanced.
Explain how Mobile originated call (MOC) work.
Explain the concept of medium access protocol.
Discuss various GSM services.
Explain how Mobile terminated call work in GSM.
Difference between Ad-hoc Network and Infrastructure Network?
Comparison of various IEEE 802.11x Standards?
Explain about Wireless LAN threats?
Short note on 5G.
Describe Micro Mobility.
Q. Describe Micro Mobility.
Ans:
Micromobility protocols aim to handle movement within a domain of MNs(Mobile
Networks), with minimum or zero packet loss, minimum signalling, reduced power
consumption and by just interacting with Mobile IP in the access network gateway
(ANG), i.e. the node through which the domain connects to the Internet.
This has the benefit of reducing delay and packet loss during handoff and eliminating
registration between MNs and possibly distant home agents when MNs remain
inside their local coverage areas.
All IP micromobility protocols share the same operational principles related to fast
handoff, e.g. reduced location updates, fast security or even the quality of service.
Micromobility protocols try to guarantee the arrival of packets and to reduce
signalling by hiding local migrations from home agents.
Hierarchical mobility protocols do it by registering in the HA (Heirarchical address)
the address of the ANG(Access any network Gateway) instead of the CoA (Care of
Address or temporary address) assigned to the MN in the visited domain.
In this way, when a MN moves from one access point to another one (which is
reachable through the same gateway) the HA needs not be informed.
The role of micromobility protocols is to ensure that packets arriving at the ANG are
forwarded to the appropriate access point. In order to route packets to the MN's
actual point of attachment, protocols maintain a location database that maps host
identifiers to location information.
Types of Micro Mobility:
hierarchical tunnelling:
In hierarchical tunnelling, the location database is maintained in a distributed way by
a set of mobility agents.
Each agent reads the incoming packet's original destination address and searches its
list of visitors for a corresponding entry.
The entry contains the address of the next lower level agent.
Entries are created and maintained by registration messages transmitted by MNs.
One of the main hierarchical tunnelling proposals, mobility agents directly interact
with MNs without the need for establishing a tree-like structure
Mobile-Specific routing:
Mobile-specific routing approaches avoid the overhead introduced by decapsulation
and re-encapsulation schemes of tunnelling approaches.
These schemes typically introduce implicit or explicit signalling to update host-
specific routes.
In the case of Cellular IP [CaGo00] MNs attached to an access network use the IP
address of the gateway as their Mobile IP care-of address.
Q. Short note on 5G.
Ans:
5G is not just one technology, it is actually a combination of several technologies in
one. The system, however, will be a smart and know when to make use of which
technology for maximum efficiency.
5G will be much more faster than 4G. It will provide data rate up to 10Gbps.
It will provide 100% coverage area. That is better coverage even at the cell
boundaries.
5G will also provide low network latency (up to 1 msec) which will be helpful for the
critical applications like industry, healthcare and medical.
5G technology aims to provide wide range of future industries from retail to
education, transportation to entertainment and smart homes to healthcare.
5G technology will provide ubiquitous connectivity means everything. from vehicles
to mobile networks to industries to smart homes will be connected together.
5G will utilize Extremely High frequency spectrum band between 3GHz to 30 GHz.
These are called millimetre waves. These wave can travel at very high speed but
covers short distance since they cannot penetrate obstacles..
Unlike 4G that requires high powered cellular base stations to transmit signal over
long distance, 5G will use a large number of small cell stations that may be located
on small towers or building roofs.
5G makes the use of Massive MIMO (Multiple Input Multiple Output) standards to
make is 100 times faster as opposed to standard MIMO. Massive MIMO makes the
use of as much as 100 antennas. Multiple antennas allow for better and faster data
transmission.
The 5G network will come with 100 times more devices in market.
Applications of 5G Network:
High Speed Mobile Networks
Entertainment and Multimedia
Internet of Things - Connecting everything
Virtual reality and Augmented Reality
Q. Explain about Wireless LAN threats?
Ans:
Rogue Access Points/Ad-Hoc Networks
One way that is the attackers target wireless LANs is by setting up a rogue access
point.
A rogue access point (AP) is a wireless AP that has been installed on a secured
network without any authorization from the network administrator.
The idea is to 'fool' some of the legitimate devices and to make them connect to the
rogue access point.
Evil Twin Aps
In this type of attack, the fraudulent AP advertises the same network name (SSID) as
a legitimate WLAN, causing nearby Wi-Fi clients to connect to them.
The only effective defense against Evil Twins is server authentication from 802.1X.
Denial of Service
This is the most common and simplest attack. It can cripple or disable a wireless
network by limiting the access to the services.
This can be done by simply sending a large amount of traffic at a specific target.
Here the amount of traffic generated to affect a target device is much higher than
the capabilities of a target machine.
Configuration Problems
Simple configuration problems are often the cause of many vulnerabilities. A novice
user can set up one of these devices quickly and gain access. However, they also
open up their network to external use without further configuration.
Other issues with configuration include weak passphrases, weak security algorithm
deployments (i.e. WEP vs WPA vs WPA2), and default SSID usage.
Passive Capturing
Passive capturing is performed by simply getting within the range of a target wireless
LAN and then listening and capturing data.
This information can be used for a number of things including attempting to break
existing security settings and analyzing non-secured traffic.
It is almost impossible to really prevent this type of attack because of the nature of a
wireless network; what can
be done is to implement high security standards using complex parameters.
Misbehaving Clients
Sometimes clients form unauthorized Wi-Fi connections accidentally or intentionally.
By doing this, they put themselves and corporate data at risk.
Some enterprises use Group Policy Objects to configure authorized Wi-Fi
connections and prevent end-user changes.
Others use host-resident agents to monitor Wi-Fi client activity and disconnect high-
risk connections.
Q. Comparison of various IEEE 802.11x Standards?
Ans:
Q. Difference between Ad-hoc Network and Infrastructure Network?
Ans:
Infrastructure mode ad hoc mode
In this mode, the transmitter and receivers are In the ad hoc mode transmitter and receivers can
in direct range of the access point (AP). communicate directly with each other.
In this mode AP handles all wireless nodes In ad hoc mode there is no need for an access point
within the range. in the range.
In this mode each client's security setting must Since in ad hoc mode there is no AP, the network
be configured to match the security setting of users have to configure what are the correct
the access point (AP). security settings and it must have to match with
each client’s security settings in the network.
In this mode, a client or a system can only Since ad hoc is peer to peer mode with no central
communicate with connected clients in access point, it also allows internet between any
managed mode. two connected clients.
More widely used. Most of the IEEE 802.11 transmitter and receivers
Generally used at airport lounge, hotel lobby, support the ad hoc mode.
railway station etc. Generally used in the Military arena (for sharing
information among soldiers),local area networks
for communication among a fixed group of people
etc.
Q. Explain how Mobile terminated call work in GSM.
Ans:
When a call is placed from the PSTN towards a given phone number, the PSTN uses
the information in the phone number (country and if available, operator) to locate
gateway MSC leading to the MSC where the subscriber is registered.
The GMSC can request information about the subscriber’s core network and current
location by interrogating the HLR (Home Location Register).
The HLR constantly updates locations of the MS stored in the VLRs of the networks
the MS visits. In the HLR, the subscriber MSISDN (phone number) is associated with
the IMSI number of the SIM card, which was used to authenticate the subscriber in
the visited network as they registered. Since authentication is communicated to the
MSC, the HLR is aware of the visited MSC/VLR of the MS at a given time.
In order for the GMSC to pass the call to the MSC, the HLR asks a temporary roaming
phone number from the MSC (Mobile Station Roaming Number – MSRN).
The MSRN is sent back from the HLR to the GMSC.
The GMSC forward the call to the MSC using the assigned MSRN.
Having received the call, the MSC pages all the BSCs in the area that it serves.
The BSC, in turn, page the BTSs assigned to them.
The called MS responds to the paging from the BTS, asking to establish a radio
channel to the BTS.
The response is forwarded to the MSC, which, once notified, authenticates the MS
and initiates the ciphering of the call using the same procedure as in MO calls.
When the MSC sends back to the radio network the call confirmation message, the
called MS starts to ring.
Q. Discuss various GSM services.
Ans:
Teleservices
The abilities of a Bearer Service are used by a Teleservice to transport data. These services
are further transited
Voice Calls
o The most basic Teleservice supported by GSM is telephony. This includes full-
rate speech at 13 kbps and emergency calls, where the nearest emergency-
service provider is notified by dialing three digits.
Short Text Messages
o Short Messaging Service (SMS) service is a text messaging service that allows
sending and receiving text messages on your GSM mobile phone. In addition
to simple text messages, other text data including news, sports, financial,
language, and location-based data can also be transmitted.
Bearer Services
Data services or Bearer Services are used through a GSM phone. to receive and send
data is the essential building block leading to widespread mobile Internet access and
mobile data transfer. GSM currently has a data transfer rate of 9.6k. New
developments that will push up data transfer rates for GSM users are HSCSD (high
speed circuit switched data) and GPRS (general packet radio service) are now
available.
Supplementary Services
Ans:
Ans:
Step 1 : The MS transmits the request for a new connection. This is realized by the MS
sending a random access burst on RACH logical channel.
Step 3, 4 : MSC then checks if this user is allowed to setup a call with the requested service.
Step 5-8 : The MSC checks the availability of resources through GSM network and into the
PSTN. Step 9, 10 : If all resources are available, the MSC sets up a connection between MS
and the fixed network.
Q. Compare between LTE and LTE advanced.
Ans:
Q. Compare between 1G, 2G, 3G, 4G and 5G generations.
Ans:
Q. Write a short note on different generations of telecommunication
Ans:
The second generation (2G) of mobile cellular started in the early 1990s.
It was completely digital and used either Time Division Multiple Access (TDMA) or
Code Division Multiple Access (CDMA).
It provides increased capacity and security due to the uses of digital cellular
technology.
2G systems support international roaming.
Ans:
Mobile devices can continue to use their existing IP address even while changing
their actual location or their original network.
The same overall scheme for addressing and routing must be maintained as in
regular IP. The owner of each device must assign IP addresses in the usual way.
New routing requirements must not be placed on the internetwork, like host-
specific routes.
3. Interoperability
Mobile IP devices can continue to communicate with other IP devices that have no
idea about how Mobile IP works, and vice-versa.
4. Transparency of Layers
All changes made by Mobile IP must remain confined to the network layer.
Other layers like the transport layer and applications must be able to function in the
same way as regular IPv4.
A few changes are required to the routers that are used, by the mobile device and
the mobile device software for Mobile IP.
These changes must be kept to a minimum. Other devices, however, like routers
between the ones on the home and visited networks, do not need changes.
6. Scalability
Mobile IP must allow any device to change from one network to another network,
and this must be supported for an arbitrary number of devices.
The scope of the connection change must be global. For example, you can use your
laptop from an office in London and also use it if you move to Mumbai.
7. Security
Ans:
ALOHA:
ALOHA is a multiple access protocol for transmission of data via a shared network
channel. It operates in the medium access control sublayer (MAC sublayer) of the
open systems interconnection (OSI) model.
Using this protocol, several data streams originating from multiple nodes are
transferred through a multi-point transmission channel.
In ALOHA, each node or station transmits a frame without trying to detect whether
the transmission channel is idle or busy.
If the channel is idle, then the frames will be successfully transmitted.
If two frames attempt to occupy the channel simultaneously, collision of frames will
occur and the frames will be discarded.
These stations may choose to retransmit the corrupted frames repeatedly until
successful transmission occurs.
Versions Of ALOHA:
Pure ALOHA:
In pure ALOHA, the time of transmission is continuous. Whenever a station has an available
frame, it sends the frame. If there is collision and the frame is destroyed, the sender waits
for a random amount of time before retransmitting it.
Slotted ALOHA
Slotted ALOHA reduces the number of collisions and doubles the capacity of pure ALOHA.
The shared channel is divided into a number of discrete time intervals called slots. A station
can transmit only at the beginning of each slot. However,there can still be collisions if more
than one station tries to transmit at the beginning of the same time slot.
Q. Explain Agent advertisement in Mobile IP?
Ans:
Agent Advertisement
Over here the HA and FA periodically advertise their presence by using special
advertisements messages.
Usually, the FA periodically broadcasts the IRDP message in its own network to let
the visited MN know the FA is here and what services the FA provides (Agent
Advertisement). Thus, the MN knows which network it belongs to.
In case the MN does not receive this message, it can request the service by sending a
solicitation message to inform the FA directly (Agent Solicitation).
These advertisements can be seen as beacon broadcast to the subnets.
Here we use ICMP messages according to RFC 1256. The agent advertisement packet
is show alongside.
In the figure the upper half is the ICMP packet while the lower half is the extension
needed for mobility
The IP destination address (not in fig.) can be set to 224.0.0.1 (which is the standard
address for multicast) or 255.255.255.255 (broadcast address)
Some of the fields used are as follows:
o Type → set to 9
o Code → 0 if agent routes traffic from non-mobile nodes as well or else 16
o Check sum → The 16-bit one's complement of the one's complement sum of
the ICMP /IRDP message
o #addresses → The number of router addresses adver sed in this message
o Addr. Size → The number of 32-bit words of information per each router
address
o Lifetime → The maximum number of seconds that the router addresses may
be considered valid.
o Router Address [i=1,2,3..] → The sending router's IP address on the ith
interface from which this message is sent.
o Prefernce level [i=1,2,…] →The preferability of each Router Address[i]
Q. Explain about HAWAII in detailed manner?
Ans:
Working
Step 3 : When MN moving another cell inside the foreign domain, the MN sends a
registration request to the new base station as to a foreign agent.
Step 4 : The base station interprets the registration request and sends out a handoff update
message, which reconfigures all routers on the paths from the old and new base station to
the crossover router.
Advantages
1. Security : Challenge response extensions are mandatory. In contrast to cellular IP, routing
changes are always initiated by the foreign domain’s infrastructure.
Disadvantages
Ans:
Macro-mobility protocols
Mobile IP is the most widely used protocol for macro-mobility management. In addition to
Mobile IP, three macro-mobility architectures are discussed in the section. These protocols
are: Session Initiation Protocol (SIP)-based mobility management, multi-tier hybrid SIP and
Mobile IP protocol, and network inter-working agent-based mobility protocol.
Q. What is Cellular IP? Explain CIP architecture along with routing and paging procedure in
CIP?
Ans:
Cellular IP (CIP) is a new robust, simple, and flexible protocol for highly mobile hosts.
CIP complements Mobile IP by supporting local mobility.
It can accommodate large number of users by separating idle hosts from active
hosts.
Cellular IP Architecture:
The architecture of Cellular IP is shown in Fig. 5.4.1. It consists of three major components.
Uplink packets (packets originated from mobile host) are routed from mobile host to
the gateway on a hop-by-hop basis.
The path taken by these packets is cached in base stations. This cache is called
routing cache.
To route downlink packets addressed to a mobile host the path used by recent
packets transmitted by the host (that are already stored in route cache) is reversed.
Paging in CIP
In Cellular IP, an idle mobile host is one that has not received data packets for a
system specific time.
For such idle hosts, their downlink soft state routes timeout and are removed from
the routing cache.
These hosts transmit paging-update packets at regular intervals. The paging update
packet is an empty IP packet addressed to the gateway. It is distinguished from route
update packet by its IP type parameter.
Similar to data and route update packets, paging update packets are routed on a
hop-by-hop basis to the gateway. Base stations may optionally maintain paging
cache.
Q. Comparison of IPv4 and IPv6 Header format?
Ans:
(ii) Traffic Class : 8 bits. Used to specify different classes or priorities of IPv6 packets.
(iii) Flow Label : 20 bits. Used for specifying special router handling from source to
destination(s) for a sequence of packets. It distinguishes the different types of packets such
as audio, video, txt etc. and accordingly provides Quality of services to them.
(iv) Payload Length : 16 bits unsigned. Specifies the length of the data in the packet.
(v) Next Header : 8 bits. Specifies the next encapsulated protocol. The values are compatible
with those specified for the IPv4 protocol field.
(vi) Hop Limit : 8 bits unsigned. For each router that forwards the packet, the hop limit is
decremented by 1. When the hop limit field reaches zero, the packet is discarded. This
replaces the TTL field in the IPv4 header that was originally intended to be used as a time
based hop limit.
(vii) Source address : 16 bytes. The IPv6 address of the sending node.
(viii) Destination address : 16 bytes. The IPv6 address of the destination node.
Yeh answer me jo ipv4 me hai wo lokh dena or uske baad likh dena wo cheez ipv4 me nhi
hai. Or
Jo ipv4 me hai wo likh dena uske baad likh dena yeh cheez ipv6 me nhi hai
Q. Explain about optimization in mobility management?
Ans:
Triangular routing
With Mobile IPv4 there is always a triangular traffic pattern. As shown in Fig. 5.1.2
the IP packet from a CN (Correspondent Node) destined to an MN needs to be
routed to its HA first and then tunneled to the foreign agent of the MN.
If the Corresponding Node (CN)and MN are very near, then also the IP packet has to
travel a long way to reach the MN. This in efficient behavior of a non optimized
mobile IP is called Triangular Routing.
The triangle is made of the three segments : CN to HA, HA to COA/MN and MN back
to CN.
Route optimization to avoid triangular routing
To solve triangular routing problem, a route optimization protocol has been introduced.
Basically this protocol defines some messages as to inform CN of an upto date location of
MN. Once the current location of the MN is known, the CN itself performs tunneling and
sends packet directly to MN.
The optimized mobile IP protocol needs four additional messages; these are :
1. Binding request
If a node wants to know where the MN is currently located, it can send a binding
request to the HA.
2. Binding update
The HA sends a binding update to the CN and informs the CN the current location of
an MN. The binding update can request an acknowledgement.
3. Binding acknowledgement
4. Binding warnings
Ans:
AT : Attention sequence
OBEX : Object exchange
TCS BIN : Telephony control protocol specification – binary
BNEP : Bluetooth network encapsulation protocol
SDP : Service discovery protocol
RFCOMM : Radio frequency comm.
Radio Layer
Baseband Layer
Baseband layer performs frequency hopping to avoid interference and to access the
medium.
Defines physical links and many packet formats.
Link Manager Protocol (LMP)
The link manager protocol (LMP) manages various aspects of the radio link between
master and slave.
L2CAP is layered over the Baseband Protocol and resides in the data link layer.
The HCI provides a command interface to the baseband controller and link manager
It provides access to hardware status and control registers.
Essentially this interface provides a uniform method of accessing the Bluetooth
baseband capabilities.
The service discovery protocol (SDP) helps the applications to discover which
services are available and to determine the characteristics of those available
services.
SDP defines only the discovery of services not about their usage.
The service discovery protocol (SDP) helps the applications to discover which
services are available and to determine the characteristics of those available
services.
SDP defines only the discovery of services not about their usage.
To define call control signaling for the establishment of voice and data calls between
Bluetooth devices TCS-BIN describes a binary, packet based, bit-oriented protocol.
Q. Explain Bluetooth Architecture in Detail Manner?
Ans:
Bluetooth:
Bluetooth is a network technology that connects mobile devices wirelessly over a short
range to form a personal area network (PAN). They use short-wavelength, ultra-high
frequency (UHF) radio waves within the range 2.400 to 2.485 GHz, instead of RS-232 data
cables of wired PANs.
Bluetooth Architecture:
1. Piconet
2. Scatternet
Piconets
Piconets are small Bluetooth networks, formed by at most 8 stations, one of which is the
master node and the rest slave nodes (maximum of 7 slaves). Master node is the primary
station that manages the small network. The slave stations are secondary stations that are
synchronized with the primary station.
Communication can take place between a master node and a slave node in either one-to-
one or one-to-many manner. However, no direct communication takes place between
slaves. Each station, whether master or slave, is associated with a 48-bit fixed device
address.
Besides the seven active slaves, there can be up to 255 numbers of parked nodes. These are
in a low power state for energy conservation. The only work that they can do is respond to a
beacon frame for activation from the master node.
Scatternodes
A scatternet is an interconnected collection of two or more piconets. They are formed when
a node in a piconet, whether a master or a slave, acts as a slave in another piconet. This
node is called the bridge between the two piconets, which connects the individual piconets
to form the scatternet.
Q. Explain in detail IEEE 802.11 MAC sub layer?
Ans:
The 802.11 MAC sublayer provides an abstraction of the physical layer to the logical link
control sublayer and upper layers of the OSI network. It is responsible for encapsulating
frames and describing frame formats.
The main fields of a frame of wireless LANs as laid down by IEEE 802.11 are −
Duration − It is a 2-byte field that specifies the time period for which the frame and its
acknowledgement occupy the channel.
Address fields − There are three 6-byte address fields containing addresses of source,
immediate destination and final endpoint respectively.
Data − This is a variable sized field carries the data from the upper layers. The maximum size
of data field is 2312 bytes.
Ans:
1) Stations (STA) − Stations comprise all devices and equipments that are connected to the
wireless LAN. A station can be of two types:
Wireless Access Pointz (WAP) − WAPs or simply access points (AP) are generally
wireless routers that form the base stations or access.
Client. − Clients are worksta ons, computers, laptops, printers, smartphones,
etc.sEach station has a wireless network interface controller.
2) Basic Service Set (BSS) −A basic service set is a group of stations communicating at
physical layer level. BSS can be of two categories depending upon mode of operation:
Infrastructure BSS − Here, the devices communicate with other devices through
access points.
Independent BSS − Here, the devices communicate in peer-to-peer basis in an ad
hoc manner.
Advantages of WLANs
They provide clutter free homes, offices and other networked places.
The LANs are scalable in nature, i.e. devices may be added or removed from the
network at a greater ease than wired LANs
Disadvantages of WLANs
Since radio waves are used for communications, the signals are noisier with more
interference from nearby systems.
Ans:
Logical channels exist at the top of the MAC. Types of logical channels include
control channels (for control plane data) and traffic channels (for user plane data)
Transport channels are in the transport blocks at the bottom of the MAC. They
represent data transfer services offered by the PHY and are defined by how the
information is carried, different physical layer modulations and the way they are
encoded.
When a valid transport block is available from the HARQ process, the transport
channels are mapped to logical channels.
When the radio resources for a new transmission are allocated, the logical channel
prioritization entity instructs the multiplexing and de-multiplexing entity to generate
MAC PDUs from the MAC SDUs.
The logical channel prioritization entity also decides how much data from each
configured logical channel should be included in each MAC PDU whenever radio
resource for a new transmission is available.
Scheduling
Scheduling is a process through which eNodeB decides which UEs should be given
resources (RBs), how much resource (RBs) should be given to send or receive data.
In LTE, scheduling is done at per subframe basis i.e. every 1 mili second.
Resources are composed of Physical Resource Blocks (PRB) and Modulation Coding
Scheme (MCS).
The MCS determines the bit rate, and thus the capacity, of PRBs.
Q. Explain LTE protocol stack.
Ans:
Physical Layer carries all information from the MAC transport channels over the air
interface. Takes care of the link adaptation (AMC), power control, cell search (for
initial synchronization and handover purposes) and other measurements (inside the
LTE system and between systems) for the RRC layer.
MAC layer is responsible for Mapping between logical channels and transport
channels.
Multiplexing of MAC SDUs from one or different logical channels onto transport
blocks (TB) to be delivered to the physical layer on transport channels
Demultiplexing of MAC SDUs from one or different logical channels from transport
blocks (TB) delivered from the physical layer on transport channels.
The main services and functions of the RRC sublayer include broadcast of System
Information related to the non-access stratum (NAS),
The non-access stratum (NAS) protocols form the highest stratum of the control
plane between the user equipment (UE) and MME.
NAS protocols support the mobility of the UE and the session management
procedures to establish and maintain IP connectivity between the UE and a PDN GW.
Q. Explain the SAE architecture in detailed manner.
Ans:
SAE Architecture
The E-UTRAN
The E-UTRAN handles the radio communications between the mobile equipment
(ME) and the evolved packet core (EPC). It contains only one component, the
evolved base stations, called eNodeB or eNB.
Each eNB is a base station that controls the mobiles in one or more cells.
The base station that is currently communicating with a mobile is known as its
serving eNB
Evolved Packet Core (EPC) components
1. Serving GW
The serving gateway (S-GW) acts as a router, and forwards data between the base
station and the PDN gateway.
It is also responsible for inter-eNB handovers in the U-plane.
It provides mobility between LTE and other types of networks (such as between
2G/3G and P-GW).
PDN GW
The PDN GW is the point of interconnect between the EPC and the external IP networks.
PDN GW routes packets to and from the PDNs. The functions of the PGW include :
Policy enforcement
Packet filtering
Charging support
HSS
The HSS (for Home Subscriber Server) is a database that contains user-related and
subscriber-related information.
It is similar to - Home Location Register (HLR) and Authentication Centre (AuC)
used in 3G networks.
MME
The MME (for Mobility Management Entity) deals with the control plane.
It handles the signaling related to mobility and security for E-UTRAN access. The MME is
responsible for the tracking and the paging of UE in idle-mode. It is the termination point of
the Non-Access Stratum (NAS).
Q. Explain about Hierarchical Mobile IPv6?
Ans:
The Hierarchical Mobile IPv6 (HMIPv6) has been proposed by IETF to reduce
registration control signaling. It separates micro-mobility from macro-mobility with
the help of an intermediate mobility agent, called the mobility anchor point (MAP).
Mobile Node’s (MN’s) spatial locality. However, in HMIPv6, the handover process
reveals numerous problems manifested by the latency in configuring a new care of
address and confirmation scheme called duplicate address detection. In this paper,
we proposes an
Efficient Scheme Fast Handover over HMIPv6 networks
Hierarchical Mobile IPV6 (HMIPv6) provides micro-mobility support by installing a
mobility anchor point (MAP). MAP is an entity which is responsible for a certain
domain and acts as a local HA within this domain for visiting MNs.
The MAP receives all packets on behalf of the MN, encapsulates and forwards them
directly to the MN’s current address LCOA (Link COA).
Advantages
1. Security : MNs can have (limited) location privacy because LCOAs can be hidden.
2. Efficiency : Direct routing between CNs sharing the same link is possible
Disadvantages
Security : Routing tables are changed based on messages sent by mobile nodes. This
requires strong authentication and protection against denial of service attacks. Additional
security functions might be necessary in MAPs
Q. Explain Tunnelling and Encapsulation and discuss how tunnelling work for Mobile IP
using IP-In-IP Encapsulation?
Ans:
Tunneling:
When a mobile node moves out from home network, the HA sends packet to COA
of the MN via a tunnel.
A tunnel establishes a virtual pipe for data packet.
In Mobile IP, the start of the tunnel is the home agent, which does the
encapsulation. The end of the tunnel depends on what sort of care of address is
being used which decapsulates data packet.
If foreign agent COA is used then FA acts as the tunnel end point and if co-located
COA is used then MN acts as the tunnel end point.
If a CN wants to send data packet to MN (currently not in home network) the data
packet is first encapsulated at HA and sent via a tunnel and then decapsulated at FA
and finally forwarded to the MN.
Encapsulation means putting a packet made up of a packet header and data into the data
field of a new packet.
Advantages of Encapsulation:
IP-in-IP Encapsulatiion:
IP-in-IP encapsulation is defined in RFC 2003. It is the simplest approach and must
always be supported.
In this type of encapsulation, the entire IP datagram sent by the internet host is
inserted in a new IP datagram as the payload
1.ver. (Version) : Version field denotes the version number and set to 4 for IPv4.
2. IHL (Internet header length) : IHL indicates the length of the outer header.
5. TTL (time to live) : It indicates the period of validity of the packet. TTL should be high
enough so the packet can reach the tunnel endpoint.
Advantage
Disadvantage
Most of the outer header fields are same as inner header so this method increases
redundancy.
Q. Write a short note on UTRAN and UMTS network.
Ans:
UTRAN
The UMTS Terrestrial network (UTRAN) handles the cell level mobility and
comprises several radio network subsystems (RNS).
RNS consists of two main components: RNC(Radio Network Controller) and Node
B.
Node B is similar to the base station in GSM system, which performs physical layer
processing such as channel coding, modulation, data interleaving etc.
RNC controls one or more Node Bs. It manages radio resources assigned to them.
Thus it performs data link layer processing and also participates in handover process.
RNC is connected to MSC and SGSN to route circuit switched and packet switched
data.
Ans:
OR
The following network nodes have been added to the existing GSM network to support
packet switched network.
The most important network node added to the GSM network is GSN (GPRS
Support Node).
It is a network node which supports the use of GPRS in the GSM core network. All
GSNs should have a Gn interfaceand support the GPRS tunneling protocol (GTP).
There are two key variants of the GSN, namely serving and gateway GPRS support
node.
Performs data compression which helps to minimize the size of transmitted data
units.
Performs authentication of GPRS subscribers and also maintains information of all
the GPRS subscribers.
GGSN is the gateway to external networks such as PDN (Packet Data Network) or IP
network. It is similar to GMSC of GSM network.
PCU is the core unit to segregate between GSM and GPRS traffic. It separates the
circuit switched and packet switched traffic from the user and sends them to the
GSM and GPRS networks respectively.
Charging gateway is responsible for accounting and billing for the use of the
network.
Charging is done based on Quality of Service or plan user has opted.
DNS server
Ans:
1. Radio subsystem
Radio subsystem comprises all radio entities. Entities of RSS are explained below.
Base station subsystem (BSS)
o A GSM network comprises many BSSs.
o BSS contains one or more radio cells, each one is controlled by a base
transceiver station (BTS).
Base station controller (BSC)
o The BSC manages the radio resources for one or more BTSs.
Mobile station (MS)
The MS comprises all user hardware and software needed for communication
with a GSM network.
International mobile equipment identity (IMEI) is used to identify an MS.
Device specific mechanism like theft protection uses the IMEI number.
The NSS connects the radio network with the standard public mobile networks.
The NSS includes the main switching functions of GSM, important databases (such
as HLR, VLR) required to manage user profile and user mobility.
The OSS is the functional entity which is used to monitor and control the overall
GSM network.
It is also used to control the traffic load of the BSS.
OSS contains the following entities.
Operation and Maintenance Center (OMC)
o The operations and maintenance center (OMC) is connected to all
equipment in the switching system and to the BSC.
o The OMC monitors and controls all other network entities via the O
interface.
Authentication Center (AUC) The Authentication Center is a protected database
that stores a copy of the secret key stored in each subscriber's SIM card, which is
used for authentication and ciphering of the radio channel. The AUC protects
network operators from different types of fraud
Q. Explain the Various types of antennas along with their radiation patters.
Ans:
Types of Antennas.
Isotropic Antenna
Omnidirectional Antennas
Unlike isotropic antennas, dipole antennas are real antennas. The dipole radiation
pattern is 360 degrees in the horizontal plane and approximately 75 degrees in the
vertical plane.
It is also called the "non-directional" antenna because it does not favor any
particular direction.
Directional Antenna
Antenna arrays
Ans:
Ans:
Parameters of
FHSS DSSS
Comparison
Delivery capability
3 Mbps 11 Mbps
the connection
Rate of Signal to
18 dB 12 dB
Noise Ratio