Download as pdf or txt
Download as pdf or txt
You are on page 1of 19

MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION

(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

SUMMER – 2023 EXAMINATION


MODEL ANSWER-Only for the Use of RAC Assessors

Subject: Wireless & Mobile Network Subject Code: 22622

Important Instructions to examiners:


1) The answers should be examined by key words and not as word-to-word as given in the
model answer scheme.
2) The model answer and the answer written by candidate may vary but the examiner may
try to assess the understanding level of the candidate.
3) The language errors such as grammatical, spelling errors should not be given more
Importance (Not applicable for subject English and Communication Skills.
4) While assessing figures, examiner may give credit for principal components indicated in
the figure. The figures drawn by candidate and model answer may vary. The examiner
may give credit for anyequivalent figure drawn.
5) Credits may be given step wise for numerical problems. In some cases, the assumed
constant values may vary and there may be some difference in the candidate’s answers
and model answer.
6) In case of some questions credit may be given by judgement on part of examiner of
relevant answer based on candidate’s understanding.
7) For programming language papers, credit may be given to any other program based on
equivalent concept.
8) As per the policy decision of Maharashtra State Government, teaching in English/Marathi
and Bilingual (English + Marathi) medium is introduced at first year of AICTE diploma
Programme from academic year 2021-2022. Hence if the students in first year (first and
second semesters) write answers in Marathi or bilingual language (English +Marathi), the
Examiner shall consider the same and assess the answer based on matching of concepts
with model answer.

Q. Sub Answer Marking


No Q.N. Scheme
1. Attempt any FIVE of the following: 10M
a) Enlist two applications of personal communication services. 2M
Ans. Application of PCS Any 2
1)Voice Communication applications
1M each
2)Messaging
3)Internet access
4)Location based services

b) List the two networks used in Bluetooth technology. 2M


Ans. Bluetooth technology uses two types of networks: listing 2
1) Piconet networks
1M each
2) Scatternet.

Page 1 / 19
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

SUMMER – 2023 EXAMINATION


MODEL ANSWER-Only for the Use of RAC Assessors

Subject: Wireless & Mobile Network Subject Code: 22622

c) State any two features of 4G technology. 2M


Ans. Features of 4G technology are :
1) 4G is IP based mobile system. Any 2
features 1M
2) It supports interactive multimedia, voice, streaming video, each
internet and other broadband service.
3) It has better spectrum efficiency.
4) It supports Ad-hoc and multi hop network.
5) 4G has high speed, high capacity and low cost per bit.
6) 4G has global access, service portability and scalable mobile
services.
7) 4G has seamless switching and a variety of Quality-of-service
driven services.
8) 4G has better scheduling and call admission control techniques.

d) List any two applications of WSN 2M


Ans. Applications of WSN are as follows:
1) Security and Surveillance Applications Any two
applications
2) Precision Agriculture and Animal Tracking
1M each
3) Environmental Monitoring
4) Transportation and logistics
Note: Any other relevant application shall be considered
e) State any two limitations of Delta Modulation 2M
Ans. The two limitations of Delta Modulation are as follows: Any two
1) Slope Overload Distortion limitations
1M each
2) Granular or Idle Noise

f) List any two design challenges in MANET 2M


Ans. The design challenges in MANET are as follows: Any two
1) Dynamic Topology challenges
1M each
2) Bandwidth Optimization
3) Security threats/ risks
4) Scalability
5) Power Consumption:
6) Restricted Wireless Transmission Range
7) Time-varying Wireless Link Characteristics
8) Battery Constraints

Page 2 / 19
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

SUMMER – 2023 EXAMINATION


MODEL ANSWER-Only for the Use of RAC Assessors

Subject: Wireless & Mobile Network Subject Code: 22622

g) List two advantages of UMTS technology 2M


Ans. The advantages of UMTS technology are as follows: Any two
1. Send picture messages to other mobile phones. advantages
1M each
2.Download the latest games and polyphonic ringtones
3. View news bulletins, sports highlights and music videos streamed
to their mobile handset.
4. Experience video telephony

Note: Any other relevant advantage shall be considered


2. Attempt any THREE of the following: 12M
a) List and explain any four GSM services 4M
Ans. GSM SERVICES : Explanation
of any four
1) TELE SERVICES services
Telecommunication services that enable voice communication via 1M each
mobile phones
Offered services
Mobile telephony
Emergency calling
2) BEARER SERVICES or Data Services
•Include various data services for information transfer between GSM
and other networks like PSTN, ISDN etc. at rates from 300 to 9600
bps
•Short Message Service (SMS)-up to 160 character alphanumeric data
transmission to/from the mobile terminal
•Voice mailbox
3)SUPPLEMENTARY SERVICES
Call related services :
•Call Waiting-Notification of an incoming call while on the handset
•Call Hold-Put a caller on hold to take another call
•Call Barring-All calls, outgoing calls, or incoming calls
•Call Forwarding-Calls can be sent to various numbers defined by
the user
•Multi Party Call Conferencing -Link multiple calls together
4)Advice of Charge (AoC) − This service was designed to give the
subscriber an indication of the cost of the services as they are used.
Furthermore, those service providers who wish to offer rental services

Page 3 / 19
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

SUMMER – 2023 EXAMINATION


MODEL ANSWER-Only for the Use of RAC Assessors

Subject: Wireless & Mobile Network Subject Code: 22622

to subscribers without their own SIM can also utilize this service in a
slightly different form. AoC for data calls is provided on the basis of
time measurements.
5)Closed User Groups (CUGs) − This service is meant for groups of
subscribers who wish to call only each other and no one else.
6)Unstructured supplementary services data (USSD) − This allows
operator-defined individual services.
b) Draw the architecture and explain the IEEE 802.11 Wireless 4M
LANs Services.
i) Basic Service Set (BSS)
ii) Extended Service Set
Ans.

Diagram
2M

Correct
1) Basic Service Set (BSS): A basic service set is a group of explanation
stations communicating at physical layer level. BSS can be of two 2M
categories depending upon mode ofoperation:

 Infrastructure BSS: Here, the devices communicate with other


devices throughaccess points.
 Independent BSS: Here, the devices communicate in peer-to-
peer basis in an ad hoc manner.

2) Extended Service Set (ESS): It is a set of all connected BSS.

Page 4 / 19
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

SUMMER – 2023 EXAMINATION


MODEL ANSWER-Only for the Use of RAC Assessors

Subject: Wireless & Mobile Network Subject Code: 22622

c) List and explain any four specifications of IMT 2000 4M


Ans.  IMT-2000 Stands for International Mobile Telecommunications-
Explanation
2000.An Initiative of the International Telecommunication Union of any four
(ITU) to create a global standard for wireless data networks. specificatio
 The goal of International Mobile Telecommunications-2000 ns
1M each
(IMT-2000) is to support data transmission rates of up to 2 Mbps
for fixed stations and 384 Kbps for mobile stations.
 The "2000" in the term "International Mobile
Telecommunications-2000 " refers to the transmission speed
(approximately 2000 Kbps),
 It provides Uplink frequency of 1885-2025 MHz and Downlink
frequency of 2110-2200 MHz Transmission mode: FDD for
mobile and satellite applications and TDD for indoor and
pedestrian type applications.
 It is used for all radio environments.It supports both packet
switched and circuit switched data transmission.
 It offers high spectrum efficiency.It supportswide range of
telecommunication services like voice, data, multimedia and
internet

Note: Any other relevant point shall be considered


d) Draw the labeled wireless local loop architecture and list the two 4M
functions of each
i) WANU ii) WASU
Ans.
Diagram
2M

Page 5 / 19
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

SUMMER – 2023 EXAMINATION


MODEL ANSWER-Only for the Use of RAC Assessors

Subject: Wireless & Mobile Network Subject Code: 22622

WLL stands for Wireless Local Loop. Microwave wireless links can Explanati
be used to create a wireless local loop as shown in figure above. on of each
Wireless Access Network Unit (WANU): term 1M

 It is an interface between underlying telephone network and


wireless link.
 It consists of Base Station Transceivers (BTS) or Radio ports
(RP), Radio Port Controller Unit (RPCU) or BSC Access
Manager (AM) , Home Location register(HLR).
 It is present at the local exchange office.
 All local WASUs are connected to it. Its functions include:
Authentication, Operation & maintenance, Routing,
Transreceiving voice and data.

Wireless Access Subscriber Unit (WASU)


 It is located at the subscriber.It translates wireless link into a
traditional telephone connection.
 It provides an air interface toward the network and another
interface to the subscriber. This interface includes protocol
conversion and transcoding, authentication functions.

3. Attempt any THREE of the following: 12M


a) Compare 4G and 5G technologies on the basis of 4M
i) Latency
ii) Mobility
iii) Frequency band Each
iv) Peak data rate comparison
Parameters 4G 5G 1M
Ans.
Latency 10-100ms Less than 5ms
Mobility Up to 350km/hr Up to 500km/hr
Frequency band Below 6GHz 30GHz to 300GHz
Peak Data rate 1Gbps 10Gbps

b) Define Mobile IP and explain principle of operation with suitable 4M


diagram showing home agent and foreign agent.

Page 6 / 19
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

SUMMER – 2023 EXAMINATION


MODEL ANSWER-Only for the Use of RAC Assessors

Subject: Wireless & Mobile Network Subject Code: 22622

Ans. Mobile IP is a communication protocol (created by extending


Definition
Internet Protocol, IP) that allows the users to move from one network 1M
to another with the same IP address. It ensures that the
communication will continue without the user’s sessions or
connections being dropped.

Diagram
2M

The correspondent node sends the data to the mobile node. Data
Explanation
packets contain the correspondent node’s address (Source) and home 1M
address (Destination). Packets reach the home agent. But now mobile
node is not in the home network, it has moved into the foreign
network. The foreign agent sends the care-of-address to the home
agent to which all the packets should be sent. Now, a tunnel will be
established between the home agent and the foreign agent by the
process of tunneling. It is the process of sending a packet via a tunnel
and it is achieved by a mechanism called encapsulation.
Now, the home agent encapsulates the data packets into new packets
in which the source address is the home address and destination is the
care-of-address and sends it through the tunnel to the foreign agent.
Foreign agent, on another side of the tunnel, receives the data
packets, decapsulates them, and sends them to the mobile node. The
mobile node in response to the data packets received sends a reply in
response to the foreign agent. The foreign agent directly sends the
reply to the correspondent node.

Page 7 / 19
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

SUMMER – 2023 EXAMINATION


MODEL ANSWER-Only for the Use of RAC Assessors

Subject: Wireless & Mobile Network Subject Code: 22622

c) Encode the datastream 01001110 using the following techniques 4M


i) Unipolar – NRZ
ii) Polar – RZ
Ans. Each
technique
2M

d) Draw the labeled block diagram of sensor node in WSN and 4M


define its role in WSN.
Ans.
Diagram
3M

Definition
1M
Definition: A Sensor Network is composed of a large number of
sensor nodes, which are tightly positioned either inside the
phenomenon or very close to it.
A wireless sensor network (WSN) can be defined as a network of
low-size and low-complex devices denoted as nodes that can sense
the environment and communicate the information gathered from the
monitored field through wireless links.

Page 8 / 19
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

SUMMER – 2023 EXAMINATION


MODEL ANSWER-Only for the Use of RAC Assessors

Subject: Wireless & Mobile Network Subject Code: 22622

Sensor node: A basic unit in a sensor network, with on-board


sensors, processor, memory, wireless modem, and power supply. It is
often abbreviated as node. When a node has only a single sensor on
board, the node is sometimes referred as a sensor
4. Attempt any THREE of the following: 12M
a) Compare W-CDMA and CDMA 2000 on the basis of 4M
i) Peak data rate
ii) Modes of Operation
iii) Modulation used
iv) Channel bandwidth
Ans. Parameters W-CDMA CDMA 2000 each
comparison
Peak Data rate 2Mbps 614kbps
1M
Modes of operation FDD and TDD FDD
Modulation used QPSK QPSK (forward link),
BPSK (reverse link)
Channel Bandwidth 5MHz 1.25MHz

b) Draw the labeled GPRS network architecture and state the role 4M
of SGSN and GGSN in GPRS.
Ans. Diagram
2M

Serving GPRS Support Node (SGSN)


The Serving GPRS Support Node is responsible for authentication of Role of
SGSN
GPRS mobiles, registration of mobiles in the network, mobility 1M
management, and collecting information on charging for the use of
the air interface.

Page 9 / 19
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

SUMMER – 2023 EXAMINATION


MODEL ANSWER-Only for the Use of RAC Assessors

Subject: Wireless & Mobile Network Subject Code: 22622

Gateway GPRS Support Node (GGSN)


Role of
The Gateway GPRS Support Node acts as an interface and a router to GGSN
external networks. It contains routing information for GPRS mobiles, 1M
which is used to tunnel packets through the IP based internal
backbone to the correct Serving GPRS Support Node. The GGSN
also collects charging information connected to the use of the external
data networks and can act as a packet filter for incoming traffic

c) State and explain any four features of IOT in mobile computing 4M


Ans. The most important features of IoT on which it works are
Explanation
connectivity, analyzing, integrating, active engagement etc. of any four
Connectivity: Connectivity refers to establish a proper connection features
between all the things of IoT to IoT platform- it may be server or 1M each
cloud. After connecting the IoT devices, it needs a high speed
messaging between the devices and cloud to enable reliable, secure
and bi-directional communication.
Analyzing: After connecting all the relevant things, it comes to real-
time analyzing the data collected and use them to build effective
business intelligence. If we have a good insight into data gathered
from all these things, then we call our system has a smart system.
Integrating: IoT integrating the various models to improve the user
experience as well.
Artificial Intelligence: IoT makes things smart and enhances life
through the use of data. For example, if we have a coffee machine
whose beans have going to end, then the coffee machine itself order
the coffee beans of your choice from the retailer.
Sensing: The sensor devices used in IoT technologies detect and
measure any change in the environment and report on their status. IoT
technology brings passive networks to active networks. Without
sensors, there could not hold an effective or true IoT environment.
Active Engagement: IoT makes the connected technology, product,
or services to active engagement between each other.

Page 10 / 19
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

SUMMER – 2023 EXAMINATION


MODEL ANSWER-Only for the Use of RAC Assessors

Subject: Wireless & Mobile Network Subject Code: 22622

d) List the types of RFID and state its two applications. 4M


Ans. RFIDs are categorized on the basis of
1. Frequency Types 2M
2. Application area
3. Power level
Frequency
There are 6 basic frequencies on which RFID operates. These are
132.4 KHz, 13.56 MHz, 433 MHz, 918 MHz, 2.4 GHz & 5.8 GHz
Low frequency systems(30KHz – 500 KHz) systems
High Frequency (850 MHz – 950 MHz & 2.4 GHz – 2.5 GHz)
systems
Application area
Speed of object and distance to read determines the type of tag to be
Any two
used. RFID used for livestock will be different from the tag used in
Applications
rail road. 1M each
Power Level
There are 2 types based on power requirements. These are active and
passive tags. Passive tags are generally in low frequency range where
as tags at higher frequency range can be active or passive.
Active: They are powered by an internal battery and are typically
read/ write type. The life of active tag is limited to the life of battery.
The memory can vary from few bytes to 1 MB.
Applications of RFID:
1. Automotive:
 Auto makers have added security and convenience to automobiles
by using RFID technology for anti-theft immobilizers and passive
entry systems.
 Some auto manufacturers use RFID systems to move cars through
an assembly line. At each successive stage of production, the
RFID tag tells the computers what the next step of the automated
assembly is.
2. Animal tracking:
 Ranchers and livestock producers use RFID technology to meet
export regulations and optimize livestock value.
 Wild animals are tracked in ecological studies, and many pets that
are tagged are returned to their owners. Thus a tag can carry
information as simple as a pet owner’s name and address.

Page 11 / 19
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

SUMMER – 2023 EXAMINATION


MODEL ANSWER-Only for the Use of RAC Assessors

Subject: Wireless & Mobile Network Subject Code: 22622

3. Assets tracking:
 Hospitals and pharmacies meet tough product accountability
legislation with RFID; libraries limit theft and keep books in
circulation more efficiently.
4. Supply chain:
 Wal-Mart, Target, Best Buy, and other retailers have discovered
that RFID technology can keep inventories at the optimal level,
reduce out of stock losses, limit shoplifting, and speed customers
through check-out lines.
Note: Marks to be credited if classification is given on frequency
basis.
e) Describe the energy consumption in WSN and how does WSN 4M
reduce energy consumption.
Ans.
Correct
Explanation
4M

 A huge effort has been made to design and implement an efficient


energy management schemes to save the limited energy available
for each sensor node.
 The energy consumption can be further classified into:
i) duty-cycling
ii) mobility-based and
iii) data-driven.
 Through the duty cycle method, the sensor node can alternate
between sleep and active modes in order to minimize the power
consumed in the active mode.

Page 12 / 19
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

SUMMER – 2023 EXAMINATION


MODEL ANSWER-Only for the Use of RAC Assessors

Subject: Wireless & Mobile Network Subject Code: 22622

 In the mobility-based method, a mobile node is employed to


collect the sensed data from stationary sensor nodes, and therefore
minimize the power consumed in multi-hop forwarding of data.
 The data-driven methods are based on prediction and aggregation
algorithms to minimize the power consumed in the transmission
process.
Note: If diagram is drawn 2Marks to be credited and 2Marks for
explanation
5. Attempt any TWO of the following: 12
a) Describe the call processing in GSM using suitable diagram and 6M
state how call is connected when sender MS and receiver MS both
are present within the same cell.
Ans.

Diagram
2M

(Note: Any other relevant diagram covering the above blocks can be
considered.)
Description
1. The MS sends the dialed number indicating the service requested 2M
to the MSC(via BSS)
2. The MSC checks from the VLR if the MS is allowed the requested
service. If so, MSC asks BSS to allocate necessary resources for the
call.
3. If the call is allowed, the MSC routes the call to GMSC.
4. The GMSC routes the call to the local exchange of called user.
5. The LE alerts (applies ringing) the called terminal.
6. Answer back (ring back tone) from the called terminal to LE.
7. Answer back signal is routed back to the MS through the serving
MSC which also completes the speech path to the MS.

Page 13 / 19
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

SUMMER – 2023 EXAMINATION


MODEL ANSWER-Only for the Use of RAC Assessors

Subject: Wireless & Mobile Network Subject Code: 22622

Call connection when sender MS and receiver MS both are Explanation


of call
present within the same cell. connection
1. The MS sends the dialed number indicating the service requested 2M
to the MSC(via BSS)
2. The MSC checks from the VLR if the MS is allowed the requested
service. If so, MSC asks BSS to allocate necessary resources for the
call.
3. If the call is allowed, the MSC routes the call to the receiver MS
via BSS as both MS are in the same cell.
b) Explain the working principle of ASK and FSK with suitable 6M
waveforms using the given bit sequence 10110
Ans. ASK:
ASK
Amplitude shift keying (ASK) is the digital modulation technique. In working
Amplitude shift keying, the amplitude of the carrier signal is varied to 1M
create signal elements. Both frequency and phase remain constant
while the amplitude changes.
In ASK, the amplitude of the carrier assumes one of the two
amplitudes dependent on the logic states of the input bit stream.

ASK
waveforms
2M

FSK:
Frequency shift keying (FSK) is the digital modulation technique. In FSK
Frequency shift keying, the frequency of the carrier signal is varied to create working 1M
signal elements. Both amplitude and phase remain constant while the
frequency changes.

Page 14 / 19
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

SUMMER – 2023 EXAMINATION


MODEL ANSWER-Only for the Use of RAC Assessors

Subject: Wireless & Mobile Network Subject Code: 22622

FSK
waveforms
2M

c) Draw and explain the labeled architecture of UMTS, also state its 6M
two applications.
Ans.

Diagram
2M

Note: Any other relevant diagram covering the above blocks can be
considered
UMTS system uses the same core network as the GPRS and uses an Explanation
2M
entirely new radio interface.
• _The new radio network in UMTS is called UTRAN (UMTS
Terrestrial Radio Access Network) and is connected to the core
network (CN) of GPRS via Iu interface.
• _The Iu is the UTRAN interface between the Radio network
controller RNC and CN.

Page 15 / 19
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

SUMMER – 2023 EXAMINATION


MODEL ANSWER-Only for the Use of RAC Assessors

Subject: Wireless & Mobile Network Subject Code: 22622

• _The mobile terminal in UMTS is called User Equipment (UE). The


UE is connected to Node-B over a high-speed Uu (up to 2 Mbps)
Interface. The Node-B are the equivalent of BTS in GSM and
typically serves a cell site. Several Node-Bs are controlled by a single
RNCs over the Iub interface.
• _The RNCs are connected to CN through Iu interface.
• _The packet-switched data is transmitted through Iu-PS interface
and circuit-switched data is transferred over Iu-CS interface. One of
the new interfaces in UTRAN is Iur interface which connects two
RNCs and has no equivalent in GSM system. The Iur interface
facilitates the handling of 100 percent of RRM (Radio Resource
Management) and eliminates the burden from CN.
• _UMTS also supports GSM mode connections in which case the
MS connects to the CN through Um interface to BSS, and BSS
connects through A (Gb interface in GPRS) interface to CN

Applications of UMTS Any two


 Streaming and downloading of video and audio. Applications
1M each
 Internet of things
 Mobile E-commerce
 Fast Internet and Intranet
 Mobile Entertainment(Gaming)
 Email and Multimedia Messages.
 Video Conferences.

6. Attempt any TWO of the following: 12M


a) Draw the labeled architecture of GSM and explain the functions 6M
of the following entities
i) MSC ii) HLR

Page 16 / 19
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

SUMMER – 2023 EXAMINATION


MODEL ANSWER-Only for the Use of RAC Assessors

Subject: Wireless & Mobile Network Subject Code: 22622

Ans Diagram
2M

i) MSC Mobile switching Centre:


 It manages communication between GSM and other networks.
MSC
 It manages call set up function, routing, and basic switching. functions
 It performs mobility management including registration, location 2M
updating and inter BSS and inter MSC call handoff.
 MSC perform gateway function while its customers roam to
another network by using HLR/VLR.
 It provides billing information.
ii) HLR Home Location Registers : - HLR
functions
 It maintains permanent database about mobile subscriber. – 2M
 Its database contains IMSI, IMSISDN, prepaid/post-paid,
roaming restrictions, supplementary services.
b) Define MANET, which topology is preferably suitable for 6M
MANET? List the four features of MANET.
Ans. MANET Definition
A mobile ad hoc network (MANET) is a collection of mobile nodes 1M
dynamically establishing short-lived networks in the absence of fixed
infrastructure. Each mobile node is equipped with a wireless
transmitter and receiver with an antenna.
Topology preferably suitable for MANET is dynamic Topology
autonomous topology. 1M

Page 17 / 19
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

SUMMER – 2023 EXAMINATION


MODEL ANSWER-Only for the Use of RAC Assessors

Subject: Wireless & Mobile Network Subject Code: 22622

Features of MANET

1. Autonomous collection of Devices: Mobile Ad hoc Network


(MANET) is an autonomous collection of mobile devices such as Any four
laptops, smart phone etc. that communicate with each other over features 1M
each
wireless link.
2. Dynamic topologies: The network topology may change
randomly and unpredictably as nodes are free to move arbitrarily;
thus, links may be bidirectional or unidirectional.
3. Autonomous Behavior: Each node can act as a host and router,
which shows its autonomous behavior.
4. No hardware or physical infrastructure: In MANET mobile
devices can communicate and send data to each other
autonomously, no hardware or physical infrastructure is involved;
Each node behaves as a router and they forward traffic to other
specified nodes in the network.
5. Self-configured wireless network: An ad hoc network is a self-
configured wireless network that allows each wireless node to
forward and receive data dynamically.
6. It is self-repairing: They consist of a set of mobile nodes
connected wirelessly in a self-configured, self-healing network.
7. Limited physical security: Wireless networks are more prone to
security threats. than wire line networks, such as eavesdropping,
spoofing, and denial of services (DoS) attacks.
8. Energy-Constrained Operation: Mobile nodes are characterized
by less memory, less power, and lightweight features. Therefore,
almost all the nodes rely on batteries or other exhaustible means
for their energy.
9. Bandwidth constrained & less Reliability: Wireless links usually
have less reliability, efficiency, stability, and capacity as compared
to a wired network.
10. Anywhere connectivity: MANET allows users to access and
exchange information regardless of their geographic position or
proximity to infrastructure

Page 18 / 19
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

SUMMER – 2023 EXAMINATION


MODEL ANSWER-Only for the Use of RAC Assessors

Subject: Wireless & Mobile Network Subject Code: 22622

c) Draw the WAP layered architecture and protocol stack and state 6M
the functions of any four protocols.
Ans. Diagram
2M

Function of protocol
1. Wireless Datagram Protocol (WDP): The WDP allows WAP to Any four
be bearer-independent by adapting the transport layer of the functions
underlying bearer. The WDP presents a consistent data format to 1M each
the higher layers of the WAP protocol stack, thereby offering the
advantage of bearer independence to application developers.
2. Wireless Transport layer Security(WTLS) :WTLS incorporates
security features that are based upon the established Transport
Layer Security (TLS) protocol standard. It includes data integrity
checks, privacy, service denial, and authentication services.
3. Wireless Transaction Protocol(WTP): The WTP runs on top of a
datagram service, such as User Datagram Protocol (UDP) and is
part of the standard suite of TCP/IP protocols used to provide a
simplified protocol suitable for low bandwidth wireless stations.
4. Wireless Session Protocol (WSP):Unlike HTTP, WSP has been
designed by the WAP Forum to provide fast connection
suspension and reconnection.
5. Wireless Application Environment (WAE). This layer is of most
interest to content developers because it contains among other
things, device specifications, and the content development
programming languages, WML, and WML Script.

Page 19 / 19

You might also like