Download as pdf or txt
Download as pdf or txt
You are on page 1of 21

Agni College of Technology

Thalambur, Chennai 600 130


Department of Electronics and Communication Engineering
Anna University Solved QB 5 Units
Sub Name : Wireless Networks Sem: VIII
Sub Code : EC6802 Year IV
Unit -1
PART – A Question & Answer

1. Draw the frequency spectrum for wireless operation (Nov/Dec 2019)

2. List out the main features of Bluetooth (Nov/Dec 2019)

The key features of Bluetooth technology are robustness, low power, and low cost,
and the fact that it has become a universal standard for exchanging data amongst a range of
fixed and mobile devices. In addition, Bluetooth wireless technology has the ability to
simultaneously handle both data and voice transmissions

3. Identify the need of WATM systems (Apr/May 2019)

WATM systems had to be designed for transferring voice, classical data, video,
multimedia etc.

4. What are Piconets and Scatternets ? (Apr/May 2019)


Bluetooth specification defines a small cell called as piconet which has upto 8 devices
grouped together. Two or more piconets grouped together known as scatternet

5. What is the principle behind IR technology? What are advantages and disadvantages of IR?
(Nov/Dec 2018)
Infrared technology uses diffuse light reflected at walls, furniture etc. Or directed light
when line of sight (LOS) exists between sender and receiver
Advantages
1.Shielding is easy and no need for license for infrared technology
2.Electrical devices do not interfere with infrared transmission
Disadvantages
1.Low bandwidth
2.Cannot penetrate through walls or other obstacles

6. What is WiMax? Mention its features (Nov/Dec 2018)

WIMAX is the air interface for the actual radio interface network, where both fixed
and mobile users can have access to the network. Its specification is IEEE 802.16.
Features
• 1. OFDM-based Physical Layer.
• 2. Very High Peak Data Rates.
• 3. Scalable Bandwidth and Data Rate Support.
• 4. Adaptive Modulation and Coding (AMC) .
• 5. Link-layer Retransmissions.
• 6. Support for TDD and FDD.
• 7. WiMAX Uses OFDM
7. Give any three difference between HIPERLAN 1 and HIPERLAN 2 (Apr/May 2018)
HIPERLAN 1 HIPERLAN 2

Application Wireless LAN Access to ATM fixed networks


Range 50 m 50 – 100 m
Data rate 23.5 M bits/ sec > 20 M bits / s

8. What is IEEE 802.11? What are the functions of MAC layer in IEEE 802.11 ?(Apr/May 18)

The IEEE 802.11 is the first WLAN standard that has secured the market in large
extent. The primary goal of the standard was the specification of a simple and robust that
offers time bounded and asynchronous services.
Functions of MAC layer
1. Media Access Control

2. Reliable delivery of data units

3. Management functions

4. Authentication encryption

9. State the MAC management functions (Nov/Dec 2017)


The Media Access Control Layer is one of two sublayers that make up the Data
Link Layer of the OSI model. The MAC layer is responsible for moving data packets to and
from one Network Interface Card (NIC) to another across a shared channel.
10. What are the functions of L2CAP? List the different types of logical channels? (Nov/Dec 17)
The Bluetooth L2CAP or logical link control and adaptation protocol is used to
provide an interface for all the data applications that use the ACL links. The Bluetooth
L2CAP provides multiplexing between the higher layer protocols. This enables multiple
applications to utilise the same lower layer links

[2]
11. State of significance of radio transmission over IR.( Apr/May 2017)
Radio waves have a longer wavelength than infrared light, in the electromagnetic
spectrum. Radio waves are able to reach the earth's surface, unlike most infrared light. ... A
remote control uses infrared light to change the channel on your TV, while radio waves are
used to receive TV shows

12. OFDM uses a set orthogonal sub carriers for transmission of data .( Apr/May 2017)
OFDM is used in WLAN consider an OFDM system that uses 52 subcarriers out of
which 48 are pilot sub carriers . Find the data rate.
13. What is the need for WATM?
WATM systems had to be designed for transferring voice, classical data, video,
multimedia etc
14. Give any two requirements of HIPERLAN
1. Data rates of 23.529 Mbps
2. Multi-hop and Ad-hoc networking
3. Support of time bounded services

15. Give any three differences between HIPERLAN 1 and HIPERLAN 2


HIPERLAN 1 HIPERLAN 2
Access to ATM fixed
Application Wireless LAN networks
Range 50 m 50 – 100 m
Data rate 23.5 M bits/ sec > 20 M bits / s
16. What is meant by BRAN?
The BRAN (Broadband Radio Access Networks (BRAN) is standardized by the
European Telecommunications Standards Institute (ETSI). Primary motivation of BRAN is
the deregulation and privatization of the telecommunication sector. BRAN technology is
independent from the protocols of the fixed network. BRAN can be used for ATM and
TCP/IP networks.

17. What is Piconet and Scatternet?


Bluetooth specification defines a small cell called as piconet which has upto 8
devices grouped together. Two or more piconets grouped together know as scatternet

18. What is the need for WIMAX?


The main reason for the development of WIMAX( World Interoperability
Microwave Access ) is the demand of high data rates not only the faster downloading but
also for the use of new applications like Voip, Video, streaming multimedia conferencing
and interactive gaming.

19. Give difference between IEEE 802.11 and IEEE 802.16


Specifications 802.11 802.16
The standard defines Wireless It defines WiMAX
Technology
LAN technology based products. technology based products.
802.11a, 11b, 11g, 11n, 11ac, 802.16a, 802.16d, 802.16e,
Standard variants
11ad etc. 802.16m etc.
Coverage range 30 to 100 meters From 7 Km to 50 Km

[3]
upto 54 Mbps in legacy WLAN
Data Rate (11a), 300-600Mbps(11n), Gbps upto 150 Mbps as per BW of
in 802.11ac/11ad use
20. List out the applications of WLAN
1. Transfer of medical images
2. Remote access to patient records
3. Remote monitoring of patients
4. Remote diagnosis of patients at home or in an ambulance
5. In telemedicine
6. Surveillance
PART – B Question

1. Explain various WLAN technologies and describe them with their Nov/Dec 2019
applications
2. Describe the need for Link manager protocol and illustrate with Nov/Dec 2019
architecture
3. Describe the IEEE 802.11 MAC data frame format with diagram Apr/May 2019
4. Give the strategy of L2CAP Apr/May 2019
5. Compare IR vs Radio transmission techniques. Nov/Dec 2018,
Advantages of WLAN techniques Apr/May 2018
6. Draw the protocol architecture of WLAN .Explain the physical layer and Nov/Dec 2018,
MAC management layer of 802.11 Apr/May 2018,
Nov/Dec 2017
7. Architecture of HIPERLAN II Protocol Apr/May 2018
8. Define HIPERLAN 2.Discuss about the various operations modes and Nov/Dec 2017
protocol stack in HIPERLAN 2
9. Describe the user scenario architecture and protocol stack of Bluetooth Apr/May 2017
technology
10. Explain and compare the medium access mechanism of DCF methods Apr/May 2017
adopted in IEEE 802.11 WLAN
PART – C Question
1. Depict a treatise on spectrum allocation of WiMax in detail Nov/Dec 2019
2. Describe in detail about IEEE 802.11 system and protocol architecture with relevant
diagram
3. Write a note on WATM and BRAN
4. Explain the various architecture of HIPERLAN
5. Describe the user scenario architecture and protocol stack of Bluetooth technology

[4]
Unit -2
PART – A Question & Answer

1. Define the term Care-of address in mobile IP (Apr/May 2019)(Apr/May 2017)


The Care of Address defines the current location of the MN from an IP point of view. All IP
packets sent to the MN are delivered to the COA, not directly to the subnet

2. Outline the characteristics of MANET (Apr/May 2019)


1. Dynamic Topologies
2. Bandwidth Constraints and Variable Capacity Links
3. Energy Constrained Operations
4. Limited Physical Security

3. Define SIP. Write the functions of SIP (Nov/Dec 2018)


The Session Initiation Protocol (SIP) is an application-layer control (signaling) protocol for
creating, modifying and terminating sessions with one or more participants. It is a IETF (Internet
Standard) RFC 3261 protocol

4. Differentiate proactive and reactive routing protocols. Write examples for each. (Nov/Dec 2018)
S.No. Proactive Reactive
1 Route is pre-established Route establishment is on-demand
2 Continuously discover the routes Route discovery by some global search
Updates topology information(table)
3 periodically No information update is done
4 No latency in route discovery longer delay due to latency of route discovery
5. What is a Mobile IP? What are the entities of Mobile IP ? (Apr/May 2018)
Mobile IP is a protocol developed to allow internetwork mobility for wireless nodes without
them having to change their IP addresses
Mobile Node (MN) , Correspondent Node (CN) , Home Network (HN) , Foreign Network (FN) , Foreign
Agent (FA) , Home Agent (HA)

6. Differentiate an ad hoc network and a cellular network with respect to (Apr/May 2018)
a) Bandwidth usage b) Cost effectiveness.

7. When the agent solicitation message has to be sent by mobile node? (Nov/Dec 2017)
Every mobile node should implement agent solicitation. The mobile node uses the same
procedures, defaults, and constants for agent solicitation, as specified for ICMP router solicitation
messages.
The rate at which a mobile node sends solicitations is limited by the mobile node. The mobile node
[5]
can send three initial solicitations at a maximum rate of one per second while searching for an agent.
After registering with an agent, the rate at which solicitations are sent is reduced, to limit the overhead on
the local network
8. Why is routing in multi-hop ad-hoc networks complicated? (Nov/Dec 2017)
In an ad hoc network, it is all the more so because there is no backbone to handle or multiplex
higher bandwidth Routing: Routing in a mobile ad hoc network is complex. This depends on many
factors, including finding the routing path, selection of routers, topology, protocol etc

9. What is Encapsulation in mobile IP? ( Apr/May 2017)


Encapsulation is the mechanism of taking a packet consisting of packet header and data and putting it
into the data part of a new packet

10. What is a Mobile IP?


Mobile IP is a protocol developed to allow internetwork mobility for wireless nodes without them
having to change their IP addresses.

11. What are the benefits of Mobile IP?


The major benefit of Mobile IP is that it frees the user from a fixed location. Mobile IP makes
invisible the boundaries between attachment points, it is able to track and deliver information to mobile
devices without needing to change the device’s long-term Internet Protocol (IP) address

12. What are the entities of Mobile IP?


Mobile Node (MN)
Correspondent Node (CN)
Home Network (HN)
Foreign Network (FN)
Foreign Agent (FA)
Home Agent (HA)

13. Define – Encapsulation and Decapsulation


Encapsulation is the mechanism of taking a packet consisting of packet header and data and
putting it into the data part of a new packet. The reverse operation, taking a packet out of the data part of
another packet, is called decapsulation.

14. What is DHCP?


The Dynamic Host Configuration Protocol (DHCP) is based on the bootstrap protocol (BOOTP),
which provides the framework for passing configuration information to hosts on a TCP/IP network.
DHCP adds the automatically allocate reusable network addresses and configuration options to internet
hosts

15. What are the characteristics of MANET?


Dynamic Topologies
Bandwidth Constraints and Variable Capacity Links
Energy Constrained Operations
Limited Physical Security

16. What are the challenging issues in ad hoc network maintenance?


Medium access scheme , Routing , Multicast routing , Transport layer protocol , Pricing Schemes
Quality of Service Provisioning , Self-Organization , Security , Addressing and Service Discovery ,
[6]
Energy Management

17. Why are ad hoc networks needed?


Ad hoc networking is often needed where an infrastructure network cannot be deployed and
managed. The presence of dynamic and adaptive routing protocols enables quick formation of ad hoc
networks and is suitable for emergency situations like natural disasters, spontaneous meetings or military
conflicts.

18. List out the applications of ad hoc networks


1. Military applications and battlefields
2. Collaborative and distributed computing
3. Emergency search and rescue operations
4. Wireless sensor and mesh networks

19. Give the classifications of routing protocol in MANET.


a) Proactive protocols: This protocol attempt to evaluate continuously the routes within the
network, so that when a packet needs to be forwarded, the router is already known and can be
immediately used.
b) Reactive protocols: This protocol invoke a route determination procedure only on demand.
The routing protocols may also be categorized as follows:
Table-driven protocols.
Source-initiated on-demand protocols

20. Differentiate proactive and reactive routing protocols. Write examples for each
S.No. Proactive Reactive
1 Route is pre-established Route establishment is on-demand
2 Continuously discover the routes Route discovery by some global search
Updates topology information(table)
3 periodically No information update is done
4 No latency in route discovery longer delay due to latency of route discovery
PART – B Question

1. How the Tunneling and IP-in-IP encapsulation occur in the mobile IP? Apr/May 2019
Nov/Dec 2017
Apr/May 2017
2. Describe the Dynamic source routing with example Apr/May 2019
Nov/Dec 2017
Apr/May 2017
3. Imagine the following scenario. A Japanese and a German meet at a Nov/Dec 2018
conference on Hawaii. Both want to use their laptops for exchanging data,
both run mobile IP for mobility support. Explain the optimizations used in
this mobile IP. Networks
4. Discuss the Entities and terminology of mobile IP networks Nov/Dec 2018
Apr/May 2017
5. Explain the Destination Sequence Distance Vector routing protocol. Nov/Dec 2018
[7]
Mention its features Apr/May 2018
6. Apr/May 2018
Explain the Mobile IP session initiation protocol for IP pocket delivery
in Mobile IP Networks
7. Explain in detail about Mobile IP and Packet and agent delivery
8. Write a note on IPV6
9. Explain in detail Mobile IP session initiation protocol
10. Write a note on MANET
PART – C Question
1. Analyse all possible solutions to be adopted for giving mobility support in Apr/May 2019
the network layer such that both delay constraints along with throughput
levels are achieved
Unit -3
PART – A Question & Answer

1. Give any four schemes to improve the TCPs performance in wireless networks (Apr/May 19)
1. Slow start
2. Fast Transmit
3. Fast Recovery
4. Congestion avoidance
2. Identify the characteristics to be considered while deploying applications over 3G wireless
links (Apr/May 2019)
1. Latency.
2. Data Rates.
3. Asymmetry.
4. Delay Spikes.
5. Packet Loss Due to Corruption.
6. Intersystem Handovers.
7. Bandwidth Oscillation
3. What is I-TCP? List its merits and demerits (Nov/Dec 2018)(Nov/Dec 2017)
Indirect TCP segments the TCP connection in to a fixed part and a wireless part.
Standard PC is used between the fixed computer and the access point. No computer in the
internet recognizes any changes to TCP. Instead of the mobile host the access point now
terminates the standard TCP connection, acting as a proxy
Merits :
1. No changes in the fixed network necessary, no changes for the host necessary.
2. Simple to control
3. Transmission errors on wireless links do not propagate in to the fixed network.
4. Fast retransmission of packets is possible.
5. It is easy to use different protocols for wired and wireless networks
[8]
Demerits :
1. Loss of end to end semantics
2. Higher latency possible
3. Security issues will arise
4. What is Congestion Avoidance algorithm? (Nov/Dec 2017)
The congestion window is a sender imposed window that was implemented
to avoid overrunning some routers in the middle of the network path. The sender,
with each segment sent, increases the congestion window slightly, i.e. the sender will
allow itself more outstanding sent data.
5. Define the term slow start mechanism and Fast Retransmit algorithm in TCP (Apr/May 2018)

Slow start is a method of controlling the capacity of a network connection. It


restricts how much data may be initially transmitted over a connection, then increases that
capacity methodically. Slow start is part of the transmission control protocol

Fast Retransmit is an enhancement to TCP which reduces the time a sender waits
before retransmitting a lost segment. A TCP sender uses a timer to recognize lost segments

6. How the destination correspondent host works? (Apr/May 2018)


Data packets addressed to the Mobile Host are routed to its home network, where
the Home Agent now intercepts and tunnels them to the care-of address toward the
Mobile Host. Finally, the Mobile Host sends packets directly to their final destination, i.e.
the Correspondent Host.

7. Define fast recovery (Nov/Dec 2017)

This step is congestion avoidance, since TCP is down to one-half the rate it was at
when the packet was lost. The fast retransmit algorithm first appeared in the 4.3BSD Tahoe
release, and it was followed by slow start

8. List out the disadvantages of indirect TCP (Apr/May 2017)

Merits :
1. No changes in the fixed network necessary, no changes for the host necessary.
2. Simple to control
3. Transmission errors on wireless links do not propagate in to the fixed network.
4. Fast retransmission of packets is possible.
5. It is easy to use different protocols for wired and wireless networks
Demerits :
1. Loss of end to end semantics
2. Higher latency possible
3. Security issues will arise

9. Mention the advantages of Mobile TCP (Apr/May 2017)

1. It maintains the TCP end to end semantics.


2. It avoids useless retransmission, slow starts or breaking connections by
simply shrinking the sender‘s window to 0.
3. No buffering is required
[9]
10. What is TCP?

TCP is a connection-oriented protocol, which means a connection is established and


maintained until the application programs at each end have finished exchanging messages. It
determines how to break application data into packets that networks can deliver, sends
packets to and accepts packets from the network layer, manages flow control, and—because
it is meant to provide error- free data transmission—handles retransmission of dropped or
garbled packets as well as acknowledgement of all packets that arrive. In the Open Systems
Interconnection (OSI) communication model, TCP covers parts of Layer 4, the Transport
Layer, and parts of Layer 5, the Session Layer

11. Draw the format for TCP header?

12. What are the three most common TCP/IP protocols

HTTP - Used between a web client and a web server, for non-secure data
transmissions. A web client (i.e. Internet browser on a computer) sends a request to a
web server to view a web page. The web server receives that request and sends the
web page information back to the web client.

HTTPS - Used between a web client and a web server, for secure data transmissions.
Often used for sending credit card transaction data or other private data from a web
client (i.e. Internet browser on a computer) to a web server.

FTP - Used between two or more computers. One computer sends data to or receives data
from another computer directly

13. What do you mean by congestion control?

Congestion control Congestion control controls traffic entry into a telecommunications


network, to avoid congestive collapse by avoiding oversubscription by reducing the rate of
packets. It should not be confused with flow control, which prevents the sender from

[10]
overwhelming the receiver

14. What do you mean by congestion window?

The congestion window is a sender imposed window that was implemented to


avoid overrunning some routers in the middle of the network path. The sender, with
each segment sent, increases the congestion window slightly, i.e. the sender will
allow itself more outstanding sent data.
15. What is fast retransmit in TCP?
Fast Retransmit is an enhancement to TCP which reduces the time a sender waits
before retransmitting a lost segment. A TCP sender uses a timer to recognize lost segments

16. What is snooping TCP?

It is the new enhancement which leaves the TCP connection intact and is
completely transparent. The main function is to buffer data close to the mobile host
to perform fast local retransmission in case of packet loss.
17. List the advantages of snooping TCP?

The end to end TCP semantics is preserved.


Handover of state is not required
Most of the enhancements are done in the foreign agent itself.

18. Write the disadvantages of M – TCP?

M – TCP assumes low bit error rates which are not always a valid assumption.

A modified TCP on the wireless link requires modification to the MH protocol


software but also new network elements like bandwidth manager

19. How fast is the 3g network?

The operators talk about 3G speeds of 3.6 mbps to 21 mbps on their network, but the
actual speed is much lower. Last year, telecom regulator TRAI proposed to set a minimum of
one mbps download speed for 3G networks. In fact, the difference between the speeds of 2G
and 3G is hardly visible

20. What is the data transmission speed of 4g network?

Ultra Mobile Broadband (UMB), also known as CDMA2000 EV-DO, is an expected


path to 4G for legacy CDMA network providers. It's an IP-based technology that is said to
support 100Mbps through 1Gbps data-transmission speeds

PART – B Question

1. Explain the Congestion control, Slow start and Fast retransmit/fast Apr/May 2019
recovery in traditional TCP Nov/Dec 2017
Apr/may 2017
2. Describe the Snooping TCP and points out the advantages and Apr/May 2019
disadvantages
[11]
Nov/Dec 2017
3. How does mobile TCP play an important role in Mobile transport layer? Nov/Dec 2018
Discuss in detail.
4. Explain any two classical TCP improvements for mobility Nov/Dec 2018
Apr/May 2018
Apr/May 2017
5. Explain in detail about the TCP over 3G wireless networks Nov/Dec 2018
6. How the Mobile TCP is playing the important role in Mobile Transport Apr/May 2018
layer? Explain with overview of the classical enhancements to TCP for Nov/Dec 2017
mobility and compare with 2.5/3G wireless networks
PART – C Question
1. How the Mobile TCP is playing the important role in Mobile Transport layer? Explain with
overview of the classical enhancements to TCP for mobility and compare with 2.5/3G
wireless networks
Unit -4
PART – A Question & Answer

1. What is UMTS? (Apr/May 2019)


UMTS (Universal Mobile Telecommunications Service) is a third-generation (3G)
broadband, packet-based transmission of text, digitized voice, video, and multimedia at data
rates up to 2 megabits per second (Mbps). UMTS is based on the Global System for Mobile
(GSM) communication standard.

2. Define the Long-Term Evolution (LTE) (Apr/May 2019)


Long Term Evolution (LTE) refers to a standard for smooth and efficient transition
toward more advanced leading-edge technologies to increase the capacity and speed of wireless
data networks. LTE is often used to refer to wireless broadband or mobile network technologies
LTE is a 4G telecommunications standard used for transferring data over cellular
networks. It supports data transfer rates of up to 100 Mbps downstream and 50 Mbps upstream
3. Name the functions of Radio Network Control (RNC). (Nov/Dec 2018)
1. Radio resource management
2. Mobility management functions
3. Encrypts data before it is sent to and from the mobile

4. List the functions provided by 3G-GGSN (Nov/Dec 2018)

1. Assign dynamic packet data protocol addresses.


2. Access management (authentication and accounting)
3. Session management
4. Macro-Mobility (maintaining information locations at SGSN level)
5. Gateway between UMTS packet network
6. external data networks Initiate mobile terminate route Mobile Terminated Packets
7. User data screening/security.
5. What is UMTS ? What are the layers of UMTS ? (Apr/May 2018)
UMTS (Universal Mobile Telecommunications Service) is a third-generation (3G)
broadband, packet-based transmission of text, digitized voice, video, and multimedia at data

[12]
rates up to 2 megabits per second (Mbps). UMTS is based on the Global System for Mobile
(GSM) communication standard.

Layers:
PHY(layer 1)
MAC(layer 2), RLC(layer 2)
RRC(layer 3)
NAS or core network part is divided based on circuit switched(CS) or packet switched(PS)
functionalities.
6. Give the significance about link adaption scheme (Apr/May 2018)
Link adaptation is a term used in radio communications. This gives a high data
throughput on the radio channel. If the conditions of the radio channel are poor, a low-level,
more robust, modulation scheme is used and the amount of error correction is increased.

7. State the salient features of HSDPA. (Nov/Dec 2017)


HSDPA is based on the same set of technologies as high data rate (HDR) to improve
spectral efficiency for data services — such as shared downlink packet data channel and
high peak data rates (8–10 Mbps) — using high-order modulation and adaptive modulation
and coding, hybrid ARQ (HARQ) retransmission schemes, fast scheduling and shorter
frame sizes. HSDPA also shortens the round-trip time between the network and terminals
and reduces variance in downlink transmission delay

8. What is meant by firewall ? (Nov/Dec 2017)


A firewall is a system designed to prevent unauthorized access to or from a
private network. You can implement a firewall in either hardware or software form, or a
combination of both. Firewalls prevent unauthorized internet users from accessing
private networks connected to the internet, especially intranets

9. What is the purpose of firewall used in UMTS network? (Apr/May 2017)


All traffic coming in and going out of the private network is handled by the firewall.
The firewall ensures that only authenticated traffic is allowed to pass through it.

10. Name the 3G radio access schemes identified to support different spectrum scenario
(Apr/May 2017)
1. Enhanced data rates for GSM evolution (EDGE) with high-level modulation in a 200
kHz TDMA channel is based on plug-in transceiver equipment, thereby allowing the
migration of existing bands in small spectrum segments.
2. Universal mobile telecommunications services (UMTS) is a new radio access
network based on 5 MHz WCDMA and optimized for efficient support of 3G
services. UMTS can be used in both new and existing spectra

11. What are the types of services provided by GPRS?


Two types of services are provided by GPRS:
1. Point-to-point (PTP)
2. Point-to-multipoint (PTM)

12. How packet data protocol helps in GPRS


[13]
Within the GPRS networks, protocol data units ( PDUs) are encapsulated at the
originating GSN and decapsulated at the destination GSN. In between the GSNs, IP is used
as the backbone to transfer PDUs. This whole process is referred to as tunnelling in GPRS.
The GGSN also maintains routing information used to tunnel the PDUs to the SGSN that
is currently serving the mobile station (MS). All GPRS user related data required by the
SGSN to perform the routing and data transfer functionality is stored within the HLR. In
GPRS, a user may have multipledata sessions in operation at one time. These sessions are
called packet data protocol (PDP) contexts.
13. What is the need for Iur interface?
The connection between two RNCs (serving RNC (SRNC) and drift RNC (DRNC))
is the Iur interface. It is used in soft handoff scenarios when different macro diversity
streams of one communication are supported by Node Bs that belong to different RNCs.
Communication between one RNC and one Node B of two different RNCs are realized
through the Iur interface.
14. Give the PCCCH consists packets
PCCCH consists of:
Packet random access channel (PRACH) — uplink
Packet access grant channel (PAGCH) — downlink
Packet notification channel (PNCH) — downlink
On the other hand, the PTCH can either be:
Packet data traffic channel (PDTCH)
Packet associated control channel (PACCH)
15. What are the cases handled by mobile terminated in data ?
Routing to the home GPRS network, and routing to a visited GPRS network. In the
first case, a user sends a data packet to a mobile. The packet goes through the local area
network (LAN) via a router out on the GPRS context for the mobile. If the mobile is in a
GPRS idle state, the packet is rejected. If the mobile is in standby or active mode, the
GGSN routes the packet in an encapsulated format to SGSN. In the second case, the home
GPRS network sends the data packet over the inter-operator backbone network to the
visiting GPRS network. The visiting GPRS network routes the packet to the appropriate
SGSN.
16. What is meant by Radio Protocol Design?
The radio protocol strategy in EDGE is to reuse the protocols of GSM/GPRS
whenever possible, thus minimizing the need for new protocol implementation. EDGE
enhances both the GSM circuit-switched (HSCSD) and packet-switched (GPRS) mode
operation. EDGE includes one packet-switched and one circuit switched mode, EGPRS and
ECSD

[14]
17. Give the significance about link adaption scheme
A link adaptation scheme regularly estimates the link quality and subsequently selects
the most appropriate modulation and coding scheme for the transmission to maximize the
user bit rate. The link adaptation scheme offers mechanisms for choosing the best
modulation and coding scheme for the radio link.
18. Explain Iu, Iups, Iucs, Iur terms in detail
The Iu is split functionally into two logical interfaces, Iups connecting the packet
switched domain to the access network and the Iucs connecting the circuit switched domain
to the access network. The standards do not dictate that these are physically separate, but the
user plane for each is different and the control plane may be different. The Iur logically
connects radio network controllers (RNCs) but could be physically realized by a direct
connection between RNCs or via the core network

19. What does Mac responsible for?


Selection of appropriate transport format (basically bit rate) within a predefined set
per information unit delivered to the physical layer, Service multiplexing on random access
channel (RACH), forward access
channel (FACH), and dedicated channel (DCH)
Priority handling between data flow of a user as well as between data flows
from several users - Access control on RACH and FACH, Contention
resolution on RACH

20. What are the types of DPCH?


There are two types of DPCH: (1) dedicated physical data channel (DPDCH) to
carry user data and signaling information generated at layer 2 (there may be none, one, or
several DPDCHs); and (2) dedicated physical control channel (DPCCH) to carry control
information generated at layer 1 (pilot bits, transmit power control (TPC) commands,
feedback information (FBI) commands, and optional transport format combination indicator
(TFCI)).
21 Draw the UTRAN logical architecture

22 What are the functions carried out by Iur interface?


Basic inter-RNC mobility support, dedicated channel traffic support, Common
[15]
channel traffic support and Global resource management support
23 State the functions of 3G-MSC.
The 3G-MSC is the main CN element to provide CS services. The 3G-MSC also
provides the necessary control and corresponding signaling interfaces including SS7, MAP,
ISUP (ISDN user part), etc. The 3G MSC provides the interconnection to external networks
like PSTN and ISDN.
24 Write about 3G-SGSN.
The 3G-SGSN is the main CN element for PS services. The 3G-SGSN provides the
necessary control functionality both toward the UE and the 3G-GGSN. It also provides the
appropriate signaling and data interfaces including connection to an IP-based network
toward the 3G-GGSN, SS7 toward the HLR/EIR/AUC and TCP/IP or SS7 toward the
UTRAN.
25 What are the tasks carried out by SMS-GMSC?
Reception of short message packet data unit (PDU), Interrogation of HLR for routing
information and Forwarding of the short message PDU to the MSC or SGSN using the
routing information
26 What is Transport Network Control Plane (TNCP)?
Transport Network Control Plane (TNCP) carries information for the control of
transport network used within UCN.
27 What is 3G-SGSN?
The 3G-SGSN (serving GPRS Support Node) provides the appropriate signaling and
data interface that includes connection to an IP-based network toward the 3G-GGSN, SS7
towards the HLR/EIR/AUC and TCP/IP or SS7 toward the UTRAN.
28 What are the duties of Radio network control (RNC)?
1. Intra UTRAN handover
2. Macro diversity combining/ splitting of Iub data systems.
3. Outer loop power control
4. IU interface user plane setup
5. Serving RNS (SRNS) relocation
6. Radio resource allocation
29 What are the functions provided by 3G-MSC?
1. Mobility management
2. Call management
3. Supplementary services
4. Short message services (SMS)
5. OAM (operation, administration, and maintenance) agent functionality
PART – B Question

1. Outline the overview of UMTS Terrestrial Radio Access Network Apr/May 2019
Apr/May 2018
2. Illustrate the theory of High-Speed Downlink Packet Access (HSDPA) Apr/May 2019
3. With neat diagram, explain the Reference Architecture of UMTS Nov/Dec 2018
Apr/May 2017
4. Describe Channel Structure in UMTS Terrestrial Radio Nov/Dec 2018

[16]
5. Explain in detail about LTE Wireless Systems Apr/May 2018
6. Explain the techniques about UMTS Network Reference Architecture
Apr/May 2018
Apr/May 2017
7. Discuss the role of the Access Link Control Application Part Nov/Dec 2017
(ALCAP) in the UMTS
8. Discuss two evolution paths for the GSM to offer 3G services Nov/Dec 2017
PART – C Question
1. How does the 3G GGSN/MSC differ from the GPRS architecture elements Apr/May 2019
(2G GGSN/MSC)? What sort of enhancements are carried out in UMTS
to meet out its specifications
Unit -5
PART – A Question & Answer

1. List the features of 4G (Apr/May 2019)


1. Frequency Band: 1.8 - 2.5 GHz
2. Mobile top speeds: 200 kmph
3. Bandwidth: 5-20 MHz
4. Data rate: Up to 2Mbps (384 kbps WAN)
2. Identify the focuses of Cognitive Radio (Apr/May 2019)
Cognitive radio (CR) is a form of wireless communication in which a transceiver can
intelligently detect which communication channels are in use and which are not, and
instantly move into vacant channels while avoiding occupied ones.

3. What is meant by Multi Carrier Modulation (MCM)? Mention its merits and demerits (Nov/Dec 18)

Multicarrier modulation (MCM) is a derivative of frequency-division


multiplexing. Forms of multicarrier systems are currently used in DSL modems and
digital audio/video broadcast (DAB/DVB). MCM is a baseband process that uses
parallel equal bandwidth sub channels to transmit information and is normally
implemented with fast Fourier transform (FFT) techniques.
MERITS
1. Multipath fading
2. Less susceptibility
3. Enhanced immunity to inter-symbol interference
DEMERITS
1. Difficulty in synchronizing the carriers under marginal conditions
2. Relatively strict requirement that amplification be linear.
4. What are the techniques to improve network survivability in different layers? Name the
challenges faced by 4G (Nov/Dec 2018)
Cross layer technique to improve the survivability of all-optical networks, which are
facing link failures. Algorithms were proposed to improve the network survivability over
non-cross-layer algorithms by decreasing both the blocking probability and the vulnerability
of the network to failures

Challenges faced by 4G

[17]
1. High usability: anytime, anywhere, and with any technology
2. Support for multimedia services at low transmission cost
3. Personalization
4. Integrated services

5. List the characteristics of 4G Network (Apr/May 2018)

1. Support interactive multimedia, voice, video, wireless internet and other broadband
services.
2. High speed, high capacity and low cost per bit.

6. Give the advantages of Multicarrier Modulation over single carrier schemes (Apr/May 2018)

1. Multipath fading
2. Less susceptibility
3. Enhanced immunity to inter-symbol interference
7. List some of the applications of 4G system (Nov/Dec 2017)
1. Virtual presence - 4G will provide user services at all times, even if the user is
off-site.
2. Virtual navigation - 4G will provide users with virtual navigation through which
a user can access a database of streets, buildings, etc., of a large city.
3. This requires high speed transmission.
4. Tele-medicine - 4G will support the remote health monitoring of patients via
video conference assistance for a doctor at anytime and anywhere.
5. Tele-geo-processing applications - 4G will combine geographical information systems
(GIS) and global positioning

8. What is cognitive radio? (Nov/Dec 2017)


Cognitive radio (CR) is a form of wireless communication in which a transceiver
can intelligently detect which communication channels are in use and which are not, and
instantly move into vacant channels while avoiding occupied ones.
9. Compare 4G with 3G?

3G 4G

Definition 3G, the 3rd generation of 4G is the 4th generation of


wireless mobile broadband cellular network
telecommunications tech, technology, succeeding 3G. A
offers faster internet speed 4G system must provide
than 2G and 2.5G GPRS capabilities defined by ITU in
networks. 3G networks IMT Advanced. 4G applications
comply with the IMT-2000 include mobile web access, IP
specifications; uses include telephony, gaming, HDTV and
voice telephony, mobile TV, video conferencing.
video calls and web access.

Data Throughput Up to 3.1Mbps with an Practically speaking, 2 to 12


average speed range between Mbps (Telstra in Australia
[18]
0.5 to 1.5 Mbps claims up to 40 Mbps) but
potential estimated at a range of
100 to 300 Mbps.

Peak Upload Rate 5 Mbps 500 Mbps

Switching Technique packet switching packet switching, message


switching
Peak Download Rate 100 Mbps 1 Gbps
Network Wide Area Cell Based Integration of wireless LAN and
Architecture Wide area.
Frequency Band 1.8 – 2.5 GHz 2 – 8 GHz
Services And CDMA 2000, UMTS, EDGE Wimax2 and LTE-Advance
Applications
Forward error 3G uses Turbo codes for Concatenated codes are used for
correction (FEC) error correction. error corrections in 4G.
10. List the challenges of 4G?
High usability: anytime, anywhere, and with any technology
Support for multimedia services at low transmission cost
Personalization
Integrated services
11. Define OFDM?

OFDM is possibly the most widely used form of multicarrier modulation. It uses
multiple closely spaced carriers and as a result of their orthogonality, mutual interference
between them is avoided.
12. List the OFDM advantages

• OFDM has been used in many high data rate wireless


systems because of the many advantages it provides.
• Immunity to selective fading
• Resilience to interference
• Spectrum efficiency

• Resilient to ISI
• Resilient to narrow-band effects
• Simpler channel equalization
13. Write the OFDM disadvantages

• High peak to average power ratio


• Sensitive to carrier offset and drift
14. What is MIMO support?

Multiple-Input Multiple-Output (MIMO) technology is a wireless technology that


uses multiple transmitters and receivers to transfer more data at the same time. All wireless
products with 802.11n support MIMO, which is part of the technology that allows 802.11n
[19]
to reach much higher speeds than products without 802.11n

15. What is the number of subcarrier in OFDM?

An 802.11a OFDM carrier signal (burst type) is the sum of one or more
OFDM symbols each comprised of 52 orthogonal subcarriers, with baseband data on
each subcarrier being independently modulated using quadrature amplitude
modulation (available formats: BPSK, QPSK, 16-QAM, or 64-QAM).
16. What is MIMO support?

Multiple-Input Multiple-Output (MIMO) technology is a wireless technology that


uses multiple transmitters and receivers to transfer more data at the same time. All wireless
products with 802.11n support MIMO, which is part of the technology that allows 802.11n
to reach much higher speeds than products without 802.11n

17. What is MIMO technology?

MIMO (multiple input, multiple output) is an antenna technology for wireless


communications in which multiple antennas are used at both the source (transmitter) and the
destination (receiver). The antennas at each end of the communications circuit are combined
to minimize errors and optimize data speed.

18. What is the meaning of cognitive network?

In communication networks, cognitive network (CN) is a new type of


data network that makes use of cutting edge technology from several research areas
(i.e. machine learning, knowledge representation, computer network,
network management) to solve some problems current networks are faced with.
19. What is meant by dynamic spectrum access?

Dynamic spectrum access is a new spectrum sharing paradigm that allows


secondary users to access the abundant spectrum holes or white spaces in the licensed
spectrum bands. DSA is a promising technology to alleviate the spectrum
scarcity problem and increase spectrum utilization.
20. What do you mean by adaptive modulation or coding?

Link adaptation, or adaptive modulation and coding (AMC), is a term used


in wireless communications to denote the matching of the
modulation, coding and other signal and protocol parameters to the conditions on the
radio link. For example, WiMAX uses a rate adaptation algorithm that adapts the
modulation and coding scheme (MCS) according to the quality of the radio channel, and
thus the bit rate and robustness of data transmission.

PART – B Question

Categorize the four types of Smart antenna technique and explain Apr/May 2019
1
in detail Apr/May 2017
2 Summarize the 4G key challenges and mention the proposed Apr/May 2019

[20]
What is 4G? Compare the key parameters of 4G with 3G. Nov/Dec 2018
Apr/May 2018
3 Nov/Dec 2017
Write a note on Cognitive Radio:· Nov/Dec 2018
Apr/May 2018
What is a Multi-Input Multi-Output.(MIMO) system? Explain. Nov/Dec 2018
Apr/May 2018
4 Nov/Dec 2017
With a neat block diagram explain the OFDM Transmitter Receiver. Nov/Dec 2018

Describe the basic concepts of Adaptive Modulation and Coding Time- Apr/May 2017
5
Slot Scheduler
PART – C Question
1. Categorize the four types of Smart antenna technique and explain in detail

[21]

You might also like