Professional Documents
Culture Documents
WMN Model Summer-23
WMN Model Summer-23
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 1 / 19
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 2 / 19
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 3 / 19
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
to subscribers without their own SIM can also utilize this service in a
slightly different form. AoC for data calls is provided on the basis of
time measurements.
5)Closed User Groups (CUGs) − This service is meant for groups of
subscribers who wish to call only each other and no one else.
6)Unstructured supplementary services data (USSD) − This allows
operator-defined individual services.
b) Draw the architecture and explain the IEEE 802.11 Wireless 4M
LANs Services.
i) Basic Service Set (BSS)
ii) Extended Service Set
Ans.
Diagram
2M
Correct
1) Basic Service Set (BSS): A basic service set is a group of explanation
stations communicating at physical layer level. BSS can be of two 2M
categories depending upon mode ofoperation:
Page 4 / 19
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 5 / 19
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
WLL stands for Wireless Local Loop. Microwave wireless links can Explanati
be used to create a wireless local loop as shown in figure above. on of each
Wireless Access Network Unit (WANU): term 1M
Page 6 / 19
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Diagram
2M
The correspondent node sends the data to the mobile node. Data
Explanation
packets contain the correspondent node’s address (Source) and home 1M
address (Destination). Packets reach the home agent. But now mobile
node is not in the home network, it has moved into the foreign
network. The foreign agent sends the care-of-address to the home
agent to which all the packets should be sent. Now, a tunnel will be
established between the home agent and the foreign agent by the
process of tunneling. It is the process of sending a packet via a tunnel
and it is achieved by a mechanism called encapsulation.
Now, the home agent encapsulates the data packets into new packets
in which the source address is the home address and destination is the
care-of-address and sends it through the tunnel to the foreign agent.
Foreign agent, on another side of the tunnel, receives the data
packets, decapsulates them, and sends them to the mobile node. The
mobile node in response to the data packets received sends a reply in
response to the foreign agent. The foreign agent directly sends the
reply to the correspondent node.
Page 7 / 19
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Definition
1M
Definition: A Sensor Network is composed of a large number of
sensor nodes, which are tightly positioned either inside the
phenomenon or very close to it.
A wireless sensor network (WSN) can be defined as a network of
low-size and low-complex devices denoted as nodes that can sense
the environment and communicate the information gathered from the
monitored field through wireless links.
Page 8 / 19
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
b) Draw the labeled GPRS network architecture and state the role 4M
of SGSN and GGSN in GPRS.
Ans. Diagram
2M
Page 9 / 19
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 10 / 19
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 11 / 19
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
3. Assets tracking:
Hospitals and pharmacies meet tough product accountability
legislation with RFID; libraries limit theft and keep books in
circulation more efficiently.
4. Supply chain:
Wal-Mart, Target, Best Buy, and other retailers have discovered
that RFID technology can keep inventories at the optimal level,
reduce out of stock losses, limit shoplifting, and speed customers
through check-out lines.
Note: Marks to be credited if classification is given on frequency
basis.
e) Describe the energy consumption in WSN and how does WSN 4M
reduce energy consumption.
Ans.
Correct
Explanation
4M
Page 12 / 19
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Diagram
2M
(Note: Any other relevant diagram covering the above blocks can be
considered.)
Description
1. The MS sends the dialed number indicating the service requested 2M
to the MSC(via BSS)
2. The MSC checks from the VLR if the MS is allowed the requested
service. If so, MSC asks BSS to allocate necessary resources for the
call.
3. If the call is allowed, the MSC routes the call to GMSC.
4. The GMSC routes the call to the local exchange of called user.
5. The LE alerts (applies ringing) the called terminal.
6. Answer back (ring back tone) from the called terminal to LE.
7. Answer back signal is routed back to the MS through the serving
MSC which also completes the speech path to the MS.
Page 13 / 19
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
ASK
waveforms
2M
FSK:
Frequency shift keying (FSK) is the digital modulation technique. In FSK
Frequency shift keying, the frequency of the carrier signal is varied to create working 1M
signal elements. Both amplitude and phase remain constant while the
frequency changes.
Page 14 / 19
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
FSK
waveforms
2M
c) Draw and explain the labeled architecture of UMTS, also state its 6M
two applications.
Ans.
Diagram
2M
Note: Any other relevant diagram covering the above blocks can be
considered
UMTS system uses the same core network as the GPRS and uses an Explanation
2M
entirely new radio interface.
• _The new radio network in UMTS is called UTRAN (UMTS
Terrestrial Radio Access Network) and is connected to the core
network (CN) of GPRS via Iu interface.
• _The Iu is the UTRAN interface between the Radio network
controller RNC and CN.
Page 15 / 19
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 16 / 19
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Ans Diagram
2M
Page 17 / 19
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Features of MANET
Page 18 / 19
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
c) Draw the WAP layered architecture and protocol stack and state 6M
the functions of any four protocols.
Ans. Diagram
2M
Function of protocol
1. Wireless Datagram Protocol (WDP): The WDP allows WAP to Any four
be bearer-independent by adapting the transport layer of the functions
underlying bearer. The WDP presents a consistent data format to 1M each
the higher layers of the WAP protocol stack, thereby offering the
advantage of bearer independence to application developers.
2. Wireless Transport layer Security(WTLS) :WTLS incorporates
security features that are based upon the established Transport
Layer Security (TLS) protocol standard. It includes data integrity
checks, privacy, service denial, and authentication services.
3. Wireless Transaction Protocol(WTP): The WTP runs on top of a
datagram service, such as User Datagram Protocol (UDP) and is
part of the standard suite of TCP/IP protocols used to provide a
simplified protocol suitable for low bandwidth wireless stations.
4. Wireless Session Protocol (WSP):Unlike HTTP, WSP has been
designed by the WAP Forum to provide fast connection
suspension and reconnection.
5. Wireless Application Environment (WAE). This layer is of most
interest to content developers because it contains among other
things, device specifications, and the content development
programming languages, WML, and WML Script.
Page 19 / 19