Download as pdf or txt
Download as pdf or txt
You are on page 1of 13

Mobile Computing IA2 Question Bank Answers

Module 4 (7marks)
1. What is Bluetooth? Demonstrate the architecture of Bluetooth along
with its advantages and disadvantages.
Answer-
1. Bluetooth simply follows the principle of transmitting and receiving data
using radio waves.
2. It can be paired with the other device which has also Bluetooth but it should
be within the estimated communication range to connect.
3. When two devices start to share data, they form a network called piconet and
a group of interconnected piconets is called a scatternet.
4. The spreading method that it uses is FHSS (Frequency-hopping unfold
spectrum).
Key Features of Bluetooth
• The transmission capacity of Bluetooth is 720 kbps.
• Bluetooth is a wireless device.
• Bluetooth is a Low-cost and short-distance radio communications
standard.
• Bluetooth is robust and flexible.
• The basic architecture unit of Bluetooth is a piconet.
Architecture of Bluetooth
The architecture of Bluetooth defines two types of networks:
Piconet:
1. Piconet is a type of Bluetooth network that contains one primary node called
the master node and seven active secondary nodes called slave nodes.
2. Thus, we can say that there is a total of 8 active nodes which are present at a
distance of 10 meters.
3.The communication between the primary and secondary nodes can be one-to-
one or one-to-many.
4.Possible communication is only between the master and slave; Slave-slave
communication is not possible.
5.It also has 255 parked nodes, these are secondary nodes and cannot take
participation in communication unless it gets converted to the active state.
Scatternet:

1. It is formed by using various piconets. A slave that is present in one piconet


can act as master or we can say primary in another piconet.
2. This kind of node can receive a message from a master in one piconet and
deliver the message to its slave in the other piconet where it is acting as a
master.
3. This type of node is referred to as a bridge node. A station cannot be
mastered in two piconets.
Advantages of Bluetooth
• It is a low-cost and easy-to-use device.
• It can also penetrate through walls.
• It creates an Ad-hoc connection immediately without any wires.
• It is used for voice and data transfer.
Disadvantages of Bluetooth
• It can be hacked and hence, less secure.
• It has a slow data transfer rate of 3 Mbps.
• Bluetooth communication does not support routing.
Applications of Bluetooth
• It can be used in wireless headsets, wireless PANs, and LANs.
• It can connect a digital camera wireless to a mobile phone.
• It can transfer data in terms of videos, songs, photographs, or files from
one cell phone to another cell phone or computer.
• It is used in the sectors of Medical healthcare, sports and fitness, Military.

2. Interpret the motive of WLAN. Analyze the difference between


infrastructure and ad-hoc network.
Answer-
1. The primary motive behind WLAN (Wireless Local Area Network) is to
provide wireless connectivity within a limited geographic area such as a home,
office, campus, or public hotspot.
2. WLANs offer users the flexibility to access network resources and the
internet without being tethered to a physical connection via cables.
3.This mobility enables greater convenience and productivity, as users can move
around freely while staying connected.

Infrastructure Network:
1. In an infrastructure WLAN, communication between wireless devices (like
laptops, smartphones, tablets) occurs through a central hub called an access
point (AP) or router.
2. The access point acts as a bridge between wireless devices and the wired
network, facilitating communication and providing internet access.
3. Typically, infrastructure networks are used in settings where continuous
internet connectivity and centralized management are required, such as offices,
homes, or public spaces like airports and cafes.
4. Security measures like encryption and authentication are often implemented
to secure the network.
Ad-hoc Network:
1. In contrast, an ad-hoc WLAN, also known as a peer-to-peer or Independent
Basic Service Set (IBSS) network, does not rely on a central access point.
2. Devices in an ad-hoc network communicate directly with each other, forming
a decentralized network without the need for any infrastructure.
3. Ad-hoc networks are useful in scenarios where establishing infrastructure is
impractical or unnecessary, such as temporary gatherings, emergency situations,
or peer-to-peer file sharing between devices.
4. However, ad-hoc networks generally lack the robustness, scalability, and
security features of infrastructure networks. Security mechanisms need to be
implemented separately, and the network can be more vulnerable to
unauthorized access.

3. List different WLAN security threats and discover how to secure


wireless networks? Compare WEP and WPA
Answer-
1. Unauthorized Access (Intrusion): Unauthorized users gaining access to the
WLAN can lead to data theft, network misuse, or other malicious activities.
Secure your network with strong authentication methods like WPA2 (Wi-Fi
Protected Access 2) or WPA3.
Use strong, unique passwords for Wi-Fi access points (APs) and change them
regularly.
Implement MAC (Media Access Control) address filtering to only allow trusted
devices to connect.
2. Eavesdropping (Sniffing): Attackers can intercept and capture wireless data
packets, potentially exposing sensitive information.
Use encryption protocols like WPA2-PSK (Pre-Shared Key) or WPA3 to
encrypt data transmission.
Implement VPN (Virtual Private Network) solutions to create a secure tunnel
for data traffic over the WLAN.
3. Denial of Service (DoS) Attacks: Attackers flood the WLAN with excessive
traffic or malicious packets, causing disruption or rendering it unusable.
Configure firewalls and intrusion detection/prevention systems to filter and
block malicious traffic.
Enable DoS protection features on wireless routers or access points to detect
and mitigate such attacks.
4. Weak Passwords and Credentials: Default or weak passwords make WLANs
susceptible to brute-force attacks or password guessing.
Enforce strong password policies for Wi-Fi networks, including minimum
length and complexity requirements.
Implement multi-factor authentication (MFA) to add an extra layer of security
beyond passwords.
5. Man-in-the-Middle (MitM) Attacks: Attackers intercept communication
between devices on the WLAN, allowing them to eavesdrop or manipulate data.
Use secure protocols like HTTPS for web browsing and SSL/TLS for email
communication.
Deploy Intrusion Detection Systems (IDS) to detect and respond to MitM
attacks in real-time.
Educate users about the risks of connecting to unsecured or public Wi-Fi
networks.
4.Construct and explain protocol architecture of IEEE 802.11 . Also
identify the responsibility of MAC management in IEEE 802.11 (optional)
Module 5 (7marks)
1. Demonstrate the concept of Micro mobility along with its
approaches.(optional)
2. Compare MIPv6 and HMIPv6

3. Interpret how IP mobility is achieved in wireless networks.


Answer-
Mobile IP Protocol:
Mobile IP allows a mobile device to move across different networks while
maintaining its IP address.
It involves the concept of home agents and foreign agents to facilitate
communication.
Home Agent (HA):
A router on the home network of a mobile node which maintains the permanent
address of the mobile node.
It intercepts packets destined for the mobile node and forwards them to the
current location.
Foreign Agent (FA):
A router on a foreign network that assists mobile nodes in routing packets to
and from their home network.
It informs the home agent about the current location of the mobile node.
Registration Process:
When a mobile node enters a new network, it registers its current location with
its home agent through the foreign agent.
This involves updating the home agent with the care-of address, which is the
temporary address assigned to the mobile node on the foreign network.
Tunneling:
To maintain connectivity, packets destined for the mobile node are encapsulated
and tunneled to the care-of address.
The foreign agent decapsulates these packets and forwards them to the mobile
node.
Routing Optimization:
Some implementations of Mobile IP use routing optimization techniques to
minimize the tunneling of packets through the home agent.
Direct communication between the correspondent node and the mobile node can
be established if supported by both ends.
IPv6 and MIPv6:
IPv6 has built-in support for mobility through Mobile IPv6 (MIPv6), which
simplifies the mobility management process compared to Mobile IPv4.
Seamless Handover:
To provide seamless mobility, protocols like Fast Handovers for Mobile IPv6
(FMIPv6) and Hierarchical Mobile IPv6 (HMIPv6) are employed.
These protocols aim to reduce handover latency and signaling overhead during
the movement of mobile nodes.
Dynamic Host Configuration Protocol (DHCP):
DHCP is used to assign IP addresses to mobile nodes dynamically as they move
between networks.
It ensures that the mobile node always has a valid IP address regardless of its
location.
4. What is the motive of Cellular IP? Distinguish between Micro mobility
and Macro mobility.
Answer-
Cellular IP, also known as Mobile IP, is a networking protocol that allows
mobile devices to maintain continuous Internet connectivity as they move
between different networks.
1. Seamless Connectivity: Ensure uninterrupted internet access for mobile
devices as they transition between different networks or locations.
2. Mobility Support: Enable mobile devices to maintain communication
sessions while moving between network access points or infrastructure.
3. Location Independence: Allow users to access online services and
applications regardless of their physical location.
4. Enhanced User Experience: Minimize service disruptions and provide
consistent connectivity for mobile applications.
5. Network Efficiency: Optimize network resources by efficiently managing
handovers and maintaining service quality during transitions.
6. Scalability: Support a large number of mobile devices while ensuring
efficient network operation.
7. Flexibility: Accommodate various types of mobile devices and network
technologies, including cellular and Wi-Fi connections.
Module 6 (6marks)
1. Demonstrate the use of self-organizing networks (SON) for
heterogeneous networks.
Answer-
Let's illustrate the use of Self-Organizing Networks (SON) for managing
Heterogeneous Networks (HetNets) with an example scenario:
Scenario:
Imagine a dense urban area with a HetNet deployment consisting of macrocells,
small cells (microcells, picocells, and femtocells), and Wi-Fi hotspots. The area
experiences high user density and varying traffic patterns throughout the day.
Use of SON in HetNets:
1.Automatic Configuration:
SON algorithms automatically adjust parameters such as transmit power,
antenna tilt, and frequency allocation for each cell type based on real-time
measurements and network conditions.
Macrocells may have higher transmit power and larger coverage areas to serve a
large number of users, while small cells use lower power levels to avoid
interference and provide better indoor coverage.
2. Load Balancing:
SON dynamically balances traffic load across cells to optimize resource
utilization and user experience.
During peak hours, when macrocells become congested, SON may redirect
some users to nearby small cells with lower traffic load to alleviate congestion
and improve throughput.
3. Interference Management:
SON employs interference coordination mechanisms such as power control,
adaptive modulation, and interference avoidance to mitigate interference
between neighboring cells.
For instance, SON adjusts transmission power levels and frequency allocations
to minimize interference between co-channel cells, ensuring better signal
quality and throughput for users.
4. Mobility Management:
SON optimizes handover parameters and mobility management procedures to
facilitate seamless mobility across heterogeneous cells.
As users move between different cell types, SON ensures smooth handovers by
adjusting handover thresholds and triggering handovers at appropriate signal
levels, minimizing handover failures and improving user experience.
5. Energy Efficiency:
SON enhances energy efficiency by dynamically adjusting operational
parameters such as cell activation/deactivation and sleep mode activation based
on traffic demand and network conditions.
During periods of low traffic, SON may deactivate some small cells or switch
them to low-power sleep mode to conserve energy while still maintaining
coverage and capacity.
6. Fault Detection and Self-Healing:
SON enables proactive fault detection and self-healing mechanisms to identify
and address network anomalies, equipment failures, or performance
degradation.
If a small cell experiences a hardware failure or coverage gap, SON may
automatically reconfigure neighboring cells or activate backup cells to maintain
service continuity and minimize user impact.
In summary, SON plays a vital role in optimizing HetNets by automating
network management tasks, improving performance, and enhancing the overall
quality of service for users in diverse environments such as dense urban areas.

2. Explain in short the motive of voice over LTE. Also analyze how LTE is
evolved from UMTS
Answer-
Voice over LTE (VoLTE) aims to improve the quality and efficiency of voice
calls by transmitting them over LTE networks, which are designed primarily for
data transmission.
Motive of Voice over LTE (VoLTE):
Traditional voice calls are primarily carried over circuit-switched networks,
which use a dedicated portion of the network bandwidth for each call. However,
LTE networks are optimized for packet-switched data transmission, offering
higher data speeds and more efficient use of spectrum.
VoLTE aims to leverage the benefits of LTE networks to provide high-quality
voice calls over the same IP-based network used for data services. By
transmitting voice calls as data packets, VoLTE can offer improved call quality,
faster call setup times, and support for advanced features such as HD voice and
simultaneous voice and data transmission.

Analysis of LTE's Evolution from UMTS:


1. Technology Transition:
UMTS (Universal Mobile Telecommunications System) is a third-generation
(3G) wireless technology, while LTE (Long-Term Evolution) is a fourth-
generation (4G) technology. LTE represents a significant evolution from UMTS,
offering higher data speeds, lower latency, and improved spectral efficiency.
2. Radio Interface:
UMTS uses Wideband Code Division Multiple Access (WCDMA) as its radio
interface, while LTE uses Orthogonal Frequency Division Multiple Access
(OFDMA) for downlink transmission and Single Carrier Frequency Division
Multiple Access (SC-FDMA) for uplink transmission. LTE's use of OFDMA
and SC-FDMA enables higher data speeds and more efficient use of spectrum
compared to UMTS.
3. Core Network Architecture:
LTE introduces a simplified and optimized core network architecture known as
the Evolved Packet Core (EPC). The EPC is more efficient and flexible than the
core network architecture used in UMTS, enabling faster data transmission,
improved mobility management, and support for new services and applications.
4. IP-Based Network:
LTE is designed as an all-IP (Internet Protocol) network, while UMTS supports
both circuit-switched and packet-switched connections. LTE's all-IP architecture
offers greater flexibility, scalability, and efficiency, allowing for seamless
integration of voice, data, and multimedia services over a single network.
5. Backward Compatibility:
LTE networks are designed to be backward compatible with existing UMTS and
GSM (Global System for Mobile Communications) networks, enabling smooth
migration and interoperability between different generations of wireless
technologies. This ensures continuity of service for users and enables gradual
deployment of LTE networks alongside existing 3G and 2G networks.

3. List and interpret the different components used in LTE architecture


with diagram.(optional)
4. Distinguish between UTRAN and E-UTRAN

You might also like