Professional Documents
Culture Documents
EC6802 Wireless Networks Important PART-A &B Questions With Answers
EC6802 Wireless Networks Important PART-A &B Questions With Answers
The key features of Bluetooth technology are robustness, low power, and low cost,
and the fact that it has become a universal standard for exchanging data amongst a range of
fixed and mobile devices. In addition, Bluetooth wireless technology has the ability to
simultaneously handle both data and voice transmissions
WATM systems had to be designed for transferring voice, classical data, video,
multimedia etc.
5. What is the principle behind IR technology? What are advantages and disadvantages of IR?
(Nov/Dec 2018)
Infrared technology uses diffuse light reflected at walls, furniture etc. Or directed light
when line of sight (LOS) exists between sender and receiver
Advantages
1.Shielding is easy and no need for license for infrared technology
2.Electrical devices do not interfere with infrared transmission
Disadvantages
1.Low bandwidth
2.Cannot penetrate through walls or other obstacles
WIMAX is the air interface for the actual radio interface network, where both fixed
and mobile users can have access to the network. Its specification is IEEE 802.16.
Features
• 1. OFDM-based Physical Layer.
• 2. Very High Peak Data Rates.
• 3. Scalable Bandwidth and Data Rate Support.
• 4. Adaptive Modulation and Coding (AMC) .
• 5. Link-layer Retransmissions.
• 6. Support for TDD and FDD.
• 7. WiMAX Uses OFDM
7. Give any three difference between HIPERLAN 1 and HIPERLAN 2 (Apr/May 2018)
HIPERLAN 1 HIPERLAN 2
8. What is IEEE 802.11? What are the functions of MAC layer in IEEE 802.11 ?(Apr/May 18)
The IEEE 802.11 is the first WLAN standard that has secured the market in large
extent. The primary goal of the standard was the specification of a simple and robust that
offers time bounded and asynchronous services.
Functions of MAC layer
1. Media Access Control
3. Management functions
4. Authentication encryption
[2]
11. State of significance of radio transmission over IR.( Apr/May 2017)
Radio waves have a longer wavelength than infrared light, in the electromagnetic
spectrum. Radio waves are able to reach the earth's surface, unlike most infrared light. ... A
remote control uses infrared light to change the channel on your TV, while radio waves are
used to receive TV shows
12. OFDM uses a set orthogonal sub carriers for transmission of data .( Apr/May 2017)
OFDM is used in WLAN consider an OFDM system that uses 52 subcarriers out of
which 48 are pilot sub carriers . Find the data rate.
13. What is the need for WATM?
WATM systems had to be designed for transferring voice, classical data, video,
multimedia etc
14. Give any two requirements of HIPERLAN
1. Data rates of 23.529 Mbps
2. Multi-hop and Ad-hoc networking
3. Support of time bounded services
[3]
upto 54 Mbps in legacy WLAN
Data Rate (11a), 300-600Mbps(11n), Gbps upto 150 Mbps as per BW of
in 802.11ac/11ad use
20. List out the applications of WLAN
1. Transfer of medical images
2. Remote access to patient records
3. Remote monitoring of patients
4. Remote diagnosis of patients at home or in an ambulance
5. In telemedicine
6. Surveillance
PART – B Question
1. Explain various WLAN technologies and describe them with their Nov/Dec 2019
applications
2. Describe the need for Link manager protocol and illustrate with Nov/Dec 2019
architecture
3. Describe the IEEE 802.11 MAC data frame format with diagram Apr/May 2019
4. Give the strategy of L2CAP Apr/May 2019
5. Compare IR vs Radio transmission techniques. Nov/Dec 2018,
Advantages of WLAN techniques Apr/May 2018
6. Draw the protocol architecture of WLAN .Explain the physical layer and Nov/Dec 2018,
MAC management layer of 802.11 Apr/May 2018,
Nov/Dec 2017
7. Architecture of HIPERLAN II Protocol Apr/May 2018
8. Define HIPERLAN 2.Discuss about the various operations modes and Nov/Dec 2017
protocol stack in HIPERLAN 2
9. Describe the user scenario architecture and protocol stack of Bluetooth Apr/May 2017
technology
10. Explain and compare the medium access mechanism of DCF methods Apr/May 2017
adopted in IEEE 802.11 WLAN
PART – C Question
1. Depict a treatise on spectrum allocation of WiMax in detail Nov/Dec 2019
2. Describe in detail about IEEE 802.11 system and protocol architecture with relevant
diagram
3. Write a note on WATM and BRAN
4. Explain the various architecture of HIPERLAN
5. Describe the user scenario architecture and protocol stack of Bluetooth technology
[4]
Unit -2
PART – A Question & Answer
4. Differentiate proactive and reactive routing protocols. Write examples for each. (Nov/Dec 2018)
S.No. Proactive Reactive
1 Route is pre-established Route establishment is on-demand
2 Continuously discover the routes Route discovery by some global search
Updates topology information(table)
3 periodically No information update is done
4 No latency in route discovery longer delay due to latency of route discovery
5. What is a Mobile IP? What are the entities of Mobile IP ? (Apr/May 2018)
Mobile IP is a protocol developed to allow internetwork mobility for wireless nodes without
them having to change their IP addresses
Mobile Node (MN) , Correspondent Node (CN) , Home Network (HN) , Foreign Network (FN) , Foreign
Agent (FA) , Home Agent (HA)
6. Differentiate an ad hoc network and a cellular network with respect to (Apr/May 2018)
a) Bandwidth usage b) Cost effectiveness.
7. When the agent solicitation message has to be sent by mobile node? (Nov/Dec 2017)
Every mobile node should implement agent solicitation. The mobile node uses the same
procedures, defaults, and constants for agent solicitation, as specified for ICMP router solicitation
messages.
The rate at which a mobile node sends solicitations is limited by the mobile node. The mobile node
[5]
can send three initial solicitations at a maximum rate of one per second while searching for an agent.
After registering with an agent, the rate at which solicitations are sent is reduced, to limit the overhead on
the local network
8. Why is routing in multi-hop ad-hoc networks complicated? (Nov/Dec 2017)
In an ad hoc network, it is all the more so because there is no backbone to handle or multiplex
higher bandwidth Routing: Routing in a mobile ad hoc network is complex. This depends on many
factors, including finding the routing path, selection of routers, topology, protocol etc
20. Differentiate proactive and reactive routing protocols. Write examples for each
S.No. Proactive Reactive
1 Route is pre-established Route establishment is on-demand
2 Continuously discover the routes Route discovery by some global search
Updates topology information(table)
3 periodically No information update is done
4 No latency in route discovery longer delay due to latency of route discovery
PART – B Question
1. How the Tunneling and IP-in-IP encapsulation occur in the mobile IP? Apr/May 2019
Nov/Dec 2017
Apr/May 2017
2. Describe the Dynamic source routing with example Apr/May 2019
Nov/Dec 2017
Apr/May 2017
3. Imagine the following scenario. A Japanese and a German meet at a Nov/Dec 2018
conference on Hawaii. Both want to use their laptops for exchanging data,
both run mobile IP for mobility support. Explain the optimizations used in
this mobile IP. Networks
4. Discuss the Entities and terminology of mobile IP networks Nov/Dec 2018
Apr/May 2017
5. Explain the Destination Sequence Distance Vector routing protocol. Nov/Dec 2018
[7]
Mention its features Apr/May 2018
6. Apr/May 2018
Explain the Mobile IP session initiation protocol for IP pocket delivery
in Mobile IP Networks
7. Explain in detail about Mobile IP and Packet and agent delivery
8. Write a note on IPV6
9. Explain in detail Mobile IP session initiation protocol
10. Write a note on MANET
PART – C Question
1. Analyse all possible solutions to be adopted for giving mobility support in Apr/May 2019
the network layer such that both delay constraints along with throughput
levels are achieved
Unit -3
PART – A Question & Answer
1. Give any four schemes to improve the TCPs performance in wireless networks (Apr/May 19)
1. Slow start
2. Fast Transmit
3. Fast Recovery
4. Congestion avoidance
2. Identify the characteristics to be considered while deploying applications over 3G wireless
links (Apr/May 2019)
1. Latency.
2. Data Rates.
3. Asymmetry.
4. Delay Spikes.
5. Packet Loss Due to Corruption.
6. Intersystem Handovers.
7. Bandwidth Oscillation
3. What is I-TCP? List its merits and demerits (Nov/Dec 2018)(Nov/Dec 2017)
Indirect TCP segments the TCP connection in to a fixed part and a wireless part.
Standard PC is used between the fixed computer and the access point. No computer in the
internet recognizes any changes to TCP. Instead of the mobile host the access point now
terminates the standard TCP connection, acting as a proxy
Merits :
1. No changes in the fixed network necessary, no changes for the host necessary.
2. Simple to control
3. Transmission errors on wireless links do not propagate in to the fixed network.
4. Fast retransmission of packets is possible.
5. It is easy to use different protocols for wired and wireless networks
[8]
Demerits :
1. Loss of end to end semantics
2. Higher latency possible
3. Security issues will arise
4. What is Congestion Avoidance algorithm? (Nov/Dec 2017)
The congestion window is a sender imposed window that was implemented
to avoid overrunning some routers in the middle of the network path. The sender,
with each segment sent, increases the congestion window slightly, i.e. the sender will
allow itself more outstanding sent data.
5. Define the term slow start mechanism and Fast Retransmit algorithm in TCP (Apr/May 2018)
Fast Retransmit is an enhancement to TCP which reduces the time a sender waits
before retransmitting a lost segment. A TCP sender uses a timer to recognize lost segments
This step is congestion avoidance, since TCP is down to one-half the rate it was at
when the packet was lost. The fast retransmit algorithm first appeared in the 4.3BSD Tahoe
release, and it was followed by slow start
Merits :
1. No changes in the fixed network necessary, no changes for the host necessary.
2. Simple to control
3. Transmission errors on wireless links do not propagate in to the fixed network.
4. Fast retransmission of packets is possible.
5. It is easy to use different protocols for wired and wireless networks
Demerits :
1. Loss of end to end semantics
2. Higher latency possible
3. Security issues will arise
HTTP - Used between a web client and a web server, for non-secure data
transmissions. A web client (i.e. Internet browser on a computer) sends a request to a
web server to view a web page. The web server receives that request and sends the
web page information back to the web client.
HTTPS - Used between a web client and a web server, for secure data transmissions.
Often used for sending credit card transaction data or other private data from a web
client (i.e. Internet browser on a computer) to a web server.
FTP - Used between two or more computers. One computer sends data to or receives data
from another computer directly
[10]
overwhelming the receiver
It is the new enhancement which leaves the TCP connection intact and is
completely transparent. The main function is to buffer data close to the mobile host
to perform fast local retransmission in case of packet loss.
17. List the advantages of snooping TCP?
M – TCP assumes low bit error rates which are not always a valid assumption.
The operators talk about 3G speeds of 3.6 mbps to 21 mbps on their network, but the
actual speed is much lower. Last year, telecom regulator TRAI proposed to set a minimum of
one mbps download speed for 3G networks. In fact, the difference between the speeds of 2G
and 3G is hardly visible
PART – B Question
1. Explain the Congestion control, Slow start and Fast retransmit/fast Apr/May 2019
recovery in traditional TCP Nov/Dec 2017
Apr/may 2017
2. Describe the Snooping TCP and points out the advantages and Apr/May 2019
disadvantages
[11]
Nov/Dec 2017
3. How does mobile TCP play an important role in Mobile transport layer? Nov/Dec 2018
Discuss in detail.
4. Explain any two classical TCP improvements for mobility Nov/Dec 2018
Apr/May 2018
Apr/May 2017
5. Explain in detail about the TCP over 3G wireless networks Nov/Dec 2018
6. How the Mobile TCP is playing the important role in Mobile Transport Apr/May 2018
layer? Explain with overview of the classical enhancements to TCP for Nov/Dec 2017
mobility and compare with 2.5/3G wireless networks
PART – C Question
1. How the Mobile TCP is playing the important role in Mobile Transport layer? Explain with
overview of the classical enhancements to TCP for mobility and compare with 2.5/3G
wireless networks
Unit -4
PART – A Question & Answer
[12]
rates up to 2 megabits per second (Mbps). UMTS is based on the Global System for Mobile
(GSM) communication standard.
Layers:
PHY(layer 1)
MAC(layer 2), RLC(layer 2)
RRC(layer 3)
NAS or core network part is divided based on circuit switched(CS) or packet switched(PS)
functionalities.
6. Give the significance about link adaption scheme (Apr/May 2018)
Link adaptation is a term used in radio communications. This gives a high data
throughput on the radio channel. If the conditions of the radio channel are poor, a low-level,
more robust, modulation scheme is used and the amount of error correction is increased.
10. Name the 3G radio access schemes identified to support different spectrum scenario
(Apr/May 2017)
1. Enhanced data rates for GSM evolution (EDGE) with high-level modulation in a 200
kHz TDMA channel is based on plug-in transceiver equipment, thereby allowing the
migration of existing bands in small spectrum segments.
2. Universal mobile telecommunications services (UMTS) is a new radio access
network based on 5 MHz WCDMA and optimized for efficient support of 3G
services. UMTS can be used in both new and existing spectra
[14]
17. Give the significance about link adaption scheme
A link adaptation scheme regularly estimates the link quality and subsequently selects
the most appropriate modulation and coding scheme for the transmission to maximize the
user bit rate. The link adaptation scheme offers mechanisms for choosing the best
modulation and coding scheme for the radio link.
18. Explain Iu, Iups, Iucs, Iur terms in detail
The Iu is split functionally into two logical interfaces, Iups connecting the packet
switched domain to the access network and the Iucs connecting the circuit switched domain
to the access network. The standards do not dictate that these are physically separate, but the
user plane for each is different and the control plane may be different. The Iur logically
connects radio network controllers (RNCs) but could be physically realized by a direct
connection between RNCs or via the core network
1. Outline the overview of UMTS Terrestrial Radio Access Network Apr/May 2019
Apr/May 2018
2. Illustrate the theory of High-Speed Downlink Packet Access (HSDPA) Apr/May 2019
3. With neat diagram, explain the Reference Architecture of UMTS Nov/Dec 2018
Apr/May 2017
4. Describe Channel Structure in UMTS Terrestrial Radio Nov/Dec 2018
[16]
5. Explain in detail about LTE Wireless Systems Apr/May 2018
6. Explain the techniques about UMTS Network Reference Architecture
Apr/May 2018
Apr/May 2017
7. Discuss the role of the Access Link Control Application Part Nov/Dec 2017
(ALCAP) in the UMTS
8. Discuss two evolution paths for the GSM to offer 3G services Nov/Dec 2017
PART – C Question
1. How does the 3G GGSN/MSC differ from the GPRS architecture elements Apr/May 2019
(2G GGSN/MSC)? What sort of enhancements are carried out in UMTS
to meet out its specifications
Unit -5
PART – A Question & Answer
3. What is meant by Multi Carrier Modulation (MCM)? Mention its merits and demerits (Nov/Dec 18)
Challenges faced by 4G
[17]
1. High usability: anytime, anywhere, and with any technology
2. Support for multimedia services at low transmission cost
3. Personalization
4. Integrated services
1. Support interactive multimedia, voice, video, wireless internet and other broadband
services.
2. High speed, high capacity and low cost per bit.
6. Give the advantages of Multicarrier Modulation over single carrier schemes (Apr/May 2018)
1. Multipath fading
2. Less susceptibility
3. Enhanced immunity to inter-symbol interference
7. List some of the applications of 4G system (Nov/Dec 2017)
1. Virtual presence - 4G will provide user services at all times, even if the user is
off-site.
2. Virtual navigation - 4G will provide users with virtual navigation through which
a user can access a database of streets, buildings, etc., of a large city.
3. This requires high speed transmission.
4. Tele-medicine - 4G will support the remote health monitoring of patients via
video conference assistance for a doctor at anytime and anywhere.
5. Tele-geo-processing applications - 4G will combine geographical information systems
(GIS) and global positioning
3G 4G
OFDM is possibly the most widely used form of multicarrier modulation. It uses
multiple closely spaced carriers and as a result of their orthogonality, mutual interference
between them is avoided.
12. List the OFDM advantages
• Resilient to ISI
• Resilient to narrow-band effects
• Simpler channel equalization
13. Write the OFDM disadvantages
An 802.11a OFDM carrier signal (burst type) is the sum of one or more
OFDM symbols each comprised of 52 orthogonal subcarriers, with baseband data on
each subcarrier being independently modulated using quadrature amplitude
modulation (available formats: BPSK, QPSK, 16-QAM, or 64-QAM).
16. What is MIMO support?
PART – B Question
Categorize the four types of Smart antenna technique and explain Apr/May 2019
1
in detail Apr/May 2017
2 Summarize the 4G key challenges and mention the proposed Apr/May 2019
[20]
What is 4G? Compare the key parameters of 4G with 3G. Nov/Dec 2018
Apr/May 2018
3 Nov/Dec 2017
Write a note on Cognitive Radio:· Nov/Dec 2018
Apr/May 2018
What is a Multi-Input Multi-Output.(MIMO) system? Explain. Nov/Dec 2018
Apr/May 2018
4 Nov/Dec 2017
With a neat block diagram explain the OFDM Transmitter Receiver. Nov/Dec 2018
Describe the basic concepts of Adaptive Modulation and Coding Time- Apr/May 2017
5
Slot Scheduler
PART – C Question
1. Categorize the four types of Smart antenna technique and explain in detail
[21]