WIRELESS NETWORKS

Published on November 2016 | Categories: Documents | Downloads: 26 | Comments: 0 | Views: 544
of 19
Download PDF   Embed   Report

Comments

Content

UNIT I PHYSICAL AND WIRELESS MAC LAYER ALTERNATIVES PART ± A (2 Marks) 1. Name five design consideration in selecting a modulation scheme for a wireless networks. i. Bandwidth efficiency, ii. Power efficiency, iii. Out of band radiation, iv. Resistance to multi path, v. Constant envelope modulation. 2. Why is out of band of radiation an important issue in designing modulation scheme? Because, out of band radiation is the source of interference. 3. Why is PPM used with IR communication instead of PAM? In PAM as the signal is through amplitude, the wireless channels suffer amplitude fluctuations because of fading and near far problems. So PPM is used in wireless communication instead of PAM. 4. Name four space diversity techniques. i. Multiple antennas, ii. Polarization diversity, iii Sectored antennas, iv. Adaptive angle diversity. 5. What are the advantages of high efficiency voice band modems? The advantages of high efficiency voice band modems are, i. It provides good bandwidth efficiency.

1. It can reduce the connect time 6. Define DFE. DFE - Decision Feed back Equalizer. This Equalizer is used for multipath fading channels.

7. Define ACI. ACI means adjacent carrier interference. It is the interference caused by a transmitting channel to its above and below channels. It is because of out of band radiation. 8. What are the types of diversity? i. Time Diversity, ii. Frequency Diversity, iii. Space Diversity 9. In an OFDM modem with 48 channels, each channel uses 16 QAM modulations. if the overall transmission rate is 10 Mbps. What is the symbol transmission rate per channel? The symbol transmission rate per channel= (10/4)/48 = 52.083 KHz. 10. What are the sectored antennas? How they are useful in combating multipath? A sectored antenna has several sectors each selecting only the signal arriving in their field of view. A sectored antenna reduces the interference from other users operating in the same band because it restricts the spatial angle of the arriving interference signals. 11. What are the popular access schemes for data networks? Classify them. i. Different ALOHA Techniques, ii. CSMA Techniques, iii CSMA/CD, iv.CSMA/CA, v. RTS/CTS 12. What is the difference between the access technique of IEEE802.3 and IEEE802.11? IEEE802.3 uses CSMA/CD but IEEE802.11 uses CSMA/CA protocol. Because when CSMA/CD is used in IEEE802.11, collision cannot be identified. 13. What is the difference between performance evaluations of voice oriented fixed assignment and data oriented random access? In voice oriented fixed assignment network, circuit switching is used and delay cannot be tolerated, but packet loss can be accepted. In data oriented random

access networks, packet switching is used. Here delay can be tolerated but packet loss cannot be tolerated. As the requirements of data and voice networks differ their performance evaluations also differ. 14. What is the difficulty of implementing CSMA /CD in a wireless environment? When we use CSMA/CD in wireless applications collision cannot be detected because of multipath effect and near far problem. 15. Explain about CSMA. CSMA - it is also called as Listen Before Talk. This technique reduces collision considerably compared to ALOHA, because it senses the availability of the channel first and then transmits. 16. Explain about hidden terminal problem. In wireless networks, when two terminals are not within the radio range to each other then they cannot transmit directly. This is called hidden terminal problem. 17. Explain about capture effect. In FM reception, when we have more than one signal the stronger signal is selected that is called capture effect. 18. Write down the formula for N idle. N idle = N ± (1- B(N, ))

19. Define: a. persistent, b. non persistent, c. 1-persistent, d. p-persistent After sensing a busy channel, if the terminal continues sensing the channel until the channel becomes free the protocol is called Persistent CSMA. If After sensing the channel, the terminal attempts another sensing only after a random waiting period, the protocol is called Non Persistent CSMA . In Persistent operation, after the channel becomes free, if the terminal transmits immediately then the protocol is called 1- Persistent.

In Persistent operation, if it runs a random number generator and based on outcome transmit its packet with a probability p, it is called p- Persistent. 20. Difference between ALOHA and slotted ALOHA. ALOHA 1.It is very simple. No Synchronization 2.Throughput is 18% 21. Explain about space diversity. In a fading multipath channel, the received signal at the antenna of a receiver is composed of a number of signals arriving through different paths from different spatial angles. Spatial diversity is provided by multiple antennas. Slotted ALOHA Synchronization between time slots. Throughput is 36%

UNIT II WIRELESS NETWORK PLANNING AND OPERATION

PART ±A (2 Marks) 1. Name any three advantages of an infrastructure topology over an adhoc network topology. i. Scalability, ii. Controllability, iii. Store and Forward 2. Compare single hop and multihop networks topologies. Single Hop Network i. Routing Complexity is less ii. Information is transmitted only Multihop network Routing is more complicated. Store and forward facility is available.

once. 3. Name the five different cell types in the cellular hierarchy and compare them in terms of Coverage area antenna site. i. Femto cells, ii. Pico cells, iii. Micro cells, iv. Macro cells, v. Mega Cells 4. Why is hexagonal cell shape preferred over square or triangular cell shape to represent the cellular architecture? Because the hexagonal shape has the largest area for a given radius. 5. Name five architecture methods that are used to increase the capacity of an analog Cellular system without increasing the number of antenna sites. i. Cell splitting ii. Cell sectoring iii. Lee¶s Micro cell method iv. Using Overlaid cells v. Using smart antennas 6. Explain the following: a. Cell splitting, b. Cell sectoring, c. Cell partitioning. Cell Splitting: In order to increase the number channels in an area the cells are splitted into smaller cells. This is called cell slitting. Cell Sectoring: Cell sectoring is done using directional antennas to increase the capacity of the cellular system. This method reduces the co channel interference.

Cell Partitioning: This technique increases the network capacity by cell partitioning. In this method channels are divided among larger macro cell and a smaller micro cell. 7. Explain how smart antennas can improve the capacity of cellular network. Space division multiple access (SDMA) is used smart antennas. The directional antennas are very narrow. SDMA and narrow directional antennas reduce the co channel interference greatly. The sectored cells also reduce the reuse factor. Thus the smart antenna improves the capacity of a cellular network. 8. What are channel allocation techniques? There are three channel allocation techniques. They are, i.Fixed Channel Allocation ii. Dynamic Channel Allocation iii. Hybrid Channel Allocation 9. Explain the terms FCA, DCA, HCA. FCA - Fixed Channel Allocation : In this technique the entire bandwidth is divided among the channels in a cell permanently. DCA ±Dynamic Channel Allocation: Channel Allocation is done based on the load in the network. HCA ± Hybrid Channel Allocation: In this kind of Channel Allocation the channels are divided fixed and dynamic sets and they are allocated accordingly. 10. Compare FCA and DCA. Attribute Traffic Load light traffic Flexibility in channel Allocation FCA Better under heavy traffic Low DCA Better under High

Call setup delay Control Distributed.

Low Centralized

Moderate/high Centralized or

11. Define channel borrowing technique and give its types. The high traffic cells borrow the channels form the low traffic cells in order to increase the system capacity. This is called channel borrowing. There are two types of channel borrowing: i. Static Channel borrowing and ii. Dynamic Channel borrowing. 12. Define mobility management. Location and Hand off management together are commonly referred to as mobility management. 13. Name the two important issues in mobility management. i.Location Management and ii. Hand off Management 14. What is location management? What are the three components? Location management refers to the activities a wireless network should perform in order to keep track of where the Ms is. The three components of mobility management are i. Location update algorithms, ii. Paging schemes, iii. Location information Dissemination 15. Name three paging mechanisms. i. Blanket paging, ii. Closest ± cells first paging, iii. Sequential paging 16. Explain about paging. Paging is broadcasting a message in a cell or a group of cells to elicit a response from the MS for which a call or a message is incoming. 17. Mention the three traditional handoff techniques. 1. Hard handoff 2. Soft handoff

18. Difference between mobile controlled and mobile assisted hand off? Mobile controlled hand off i. Hand is controlled by the mobile nodes. Mobile assisted hand off Hand off is controlled by the network and the mobile node.

19. Difference between centralized and distributed power control. Centralized Power control i.Centralized power controller controls the power. ii. Complexity is more. 20. What are the two steps in hand off? i. Architectural issues in hand off ii. Hand off decision time Algorithms 21. What are the privacy and authentication requirements of wireless networks? In order to avoid the attack of unauthorized nodes in the network authentication is required in wireless networks. 22. How are public key and secret key algorithms different? Secret key i. Same key is used for encryption and decryption. Public key Different keys are used for encryption and decryption. Distributed Power control The mobile terminals individually Adjust their power. Complexity is less.

ii. They are fast.

Not faster.

23. Explain the importance of key sizes in the security of an encryption algorithm? When the key size is very small, it can be identified by eves by brute force method.But when key size is large it is very difficult to apply brute force method. 24. What is challenge response scheme? This is used in IS 136 digital TDMA. The network generates a random number and sends it to the mobile terminal. The mobile terminal computes a value using the encryption algorithm. The value is transmitted over the air. The network computes its version of authentication and compares the two values. If the values match, the mobile terminal is identified. 25. What are the parts in location management? i. Location updates ii. Paging iii. Location information dissemination

UNIT III WIRELESS WAN PART ±A ( 2 Marks) 1. Difference between registration and call establishment?

Registration During a registration procedure, network have two provides the MS with a channel for separate procedure preliminary signaling. to mobile

Call establishment In mobile environment we separate call establishment for mobile to fixed and fixed

Calls. 2. What are the reasons to perform handoff? i. Signal strength deterioration, ii Traffic balancing, iii. Mobility of the terminal 3. Mention the different types of handoffs. i. Mobile assisted hand off, ii. Network assisted hand off. 4. Difference between logical and physical channel? Logical Channel Similar to computers, we need a set of information instructions and ports to instruct different are formatted Physical channel The physical layer specifies how the from different voice and data services

elements of the network to perform specific into packets and sent through the radio channel. duties. In telecommunications, these ports are called as logical channels. 5. Name five most important logical channels in GSM 1.Traffic Channels & 2 pilot channels Types of Traffic channels: i. Full rate traffic channel & Half rate traffic channel Types of Control channels: i. Broadcast channels (BCH). ii. Common control Channels (CCCH) & Dedicated control channels(DCCH). 6. list the types of stack layers.

i. Physical layer, ii. Data link layer, iii. Networking or Messaging layer. 7. mention the types of bursts. 1. Normal burst, 2. Frequency correction burst, 3. Synchronization burst, iv. Random access burst.

8. Mention the Three types of control channels. i. Broadcast channels (BCH). ii. Common control Channels (CCCH) & Dedicated control channels(DCCH). 9. What is IS-95? IS ±95 is Interim Standards developed by TIA. Forward channel: 824-849 Mhz Reverse channel: 869-894 MHz .1.25 MHz/channel. 10. What is the chip rats used in WCDMA? WCDMA ± Chip rate = 3.84 Mcps 11. How many physical channels are available in each IS-95 carrier? What type of coding separates these channels from one another? In IS ± 95, we have 64 physical channels. Walsh code is used to separate the channels. 12. Name the forward and reverse channels used in IS-95? Forward Channels: i. Pilot channel, ii. Synchronization channel, iii. Paging channel and Traffic channel Reverse channels:

i. Access Channel, ii. Traffic channel, iii. Synchronization channel, iv. Paging channel 13. Difference between Walsh codes used in the forward and reverse channels of cdma In reverse channels there is no spreading of the code. In reverse channel orthogonal codes are used for waveform encoding. 14. What are the bit rates of the data services supported by IS-95? RS1: 9.6, 4.8, 2.4, & 1.2 kbps RS2: 14.4,7.2,3.6, &1.8 kbps 15. Why is power control important in CDMA? In CDMA the interference is from other users transmitting in the same frequency band at the same time. So in order to avoid near far effect and to maintain a good link quality it is necessary to control power in CDMA. 16. What forward channels are involved in IS-95 for power control? Traffic channel and control channel. 17. Why are several pilot channels monitored in IS-95? When does a pilot channels from a base station move from an active set to a candidate set? Several pilot channels are monitored in IS ±95 in order to perform handoff. When the signal strength of the pilot exceeds T-ADD it is transferred to a candidate set. 18. What are the new elements added to the GSM infrastructure to support GPRS? GPRS uses the same physical radio channels and only new logical GPRS radio channels are defined. 19. What are different services offered by GPRS? i. Point to multi point, ii. Point to point

20. Name the connectionless and connection oriented services provided by the GPRS. In GPRS Point to point communication, there are two types, i. IP ± connection less service, and ii. CLNP Connection oriented onX.25. 21. What is GPRS-136? How does it differ from GPRS? The adaptation of GPRS to the IS ±136 TDMA cellular standard is called GPRS136.It uses 30kHz physical channel instead of 200KHz. 22. What is the importance of the framing hierarchy in GSM? A framing hierarchy is needed to identify the location of certain bursts among the large stream of bursts that are directed toward different terminals. 23. Name three sub systems in the GSM architecture. Connection management, Mobility management, radio resource management. 24. What are VLR and HLR and why we need them? VLR- Visitor Location Register, HLR ± Home Location Register. They are used for mobility management. UNIT IV WIRELESS LAN PART ±A ( 2 Marks) 1. Name three categories of unlicensed bands used in U.S and compare them in terms of size of the available band coverage. ISM is unlicensed band used in U.S. ISM Frequencies of operation : 902 ±928 MHz, 2.4- 2.4835 GHz, 5.725 ± 5.875 GHz.

2. Name the five major challenges for implementation of wireless LANs compare with one another.
y y y y y y

Single mac to support multiple physical layers. Mechanisms to allow multiple overlapping network in the same area. Provisions to handle the interference from other ISM band radios and microwave ovens. Mechanism to handle µHidden Terminals¶. Options to support time bounded services. Provision to handle privacy and access control.

3. Explain the difference between wireless inter-LAN bridges and WLANs A wireless bridge is a hardware component used to connect two or more network segments (LANs or parts of a LAN) which are physically and logically (by protocol) separated. A wireless local area network (WLAN) links devices via a wireless distribution method (typically spread-spectrum or OFDM radio), and usually provides a connection through an access point to the wider internet 4. What are the differences between IEEE802.11 and HIPERLAN standards? IEEE 802.11 WLAN is connectionless Based on products HIPERLAN HIPERLAN-2 is connection oriented HIPERLAN-1 is based on certain functional Requirements. 5.What is WATM? It is wireless ATM. 6.Draw the frame format of WATM?

Wireless Header ATM header ATM payload Wireless trailer

7. What are the responsibilities of the MAC management sub layer in 802.11? The responsibilities of the MAC management sub layer are to define the access mechanisms and packet format, also it provides roaming support,power management and security. 8. What are the purpose of scrambler and interleaver in the HIPERLAN-2 modem? In HIPERLAN ± 2 modems, Scrambler is used to perform whitening process and interleaver is used to improve the reliability over temporal fading. 9. What is the purpose of guard time? Guard time is to avoid overlapping of adjacent frames. 10. Similarities between the Medium access control of the HIPERLAN-2 and DECT. Both MAC layer of HIPERLAN- 2 and DECT use TAMA/TDD access method. MT ±MT peer to peer transmission is also similar in both HIPERLAN- 2 and DECT.

11. What does HiperLAN stands for? High performance Radio LAN.It was initiated by RES10 group of ETSI as a PAN European standard for high speed wireless local network. 12.Specify requirements for HiperLAN1?
y y y y y

Data rates of 23.529Mbps Coverage of upto 100m Multihop Adhoc Networking capability Support of time bounded services Support of power saving

13. How many transport channels and logical channels are implemented in the HIPERLAN-2 DLC layer? HIPERLAN-2 DLC layer has four transport channels and five logical channels. 14. What is HAN? HAN(Home Area Network) provides an infrastructure to interconnect a variety of home applications and enable them to access the Internet through a central home gateway. UNIT-V WPAN AND GEOLOCATION SYSTEMS PART ±A ( 2 Marks)

1. What is home RF? Home RF working group is to provide th e foundation for a broad range of interoperable consumer devices by establishing an open industry specification for wireless digital communication between PC¶s and consumer electronic devices anywhere in and around the home. 2. What is the IEEE 802.15 and what is the relation to the Bluetooth and homeRF? The IEEE 802.15 WPAN group is focused on development of standards for short distance wireless networks used for networking of portable and mobile computing devices such as PC¶s, PDA¶s, cell phones, printers, speakers, microphones, and other consumer electronics. Home RF has a higher data rate than Bluetooth. 3. Name the four states that a Bluetooth terminal. 1. 2. 3. 4. Master. (M) Slave. (S) Stand By. (SB) Parked or hold. (P)

4. Name the three classes of application that are considered for Bluetooth technology? 1. 1. Cable replacement. 2. Ad hoc personal network. 3. Integrated AP. 5. Difference between 802.11 and 802.15. IEEE 802.11 It is an independent standard to define PHY and MAC layers of WLAN. IEEE 802.15 It is focused on the standards for short distance Wireless networks used for networking of portable and mobile computing devices.

6. What is the maximum data rate of an overlay blue tooth network? It allows a maximum data rate of 11 Mbit/s 7. Difference between the implementation of paging and inquiry algorithms in blue tooth? With the paging procedure, an actual connection can be established. The paging procedure takes a very short time (at most 20 ms) while the inquiry procedure might cause a significant delay (up to a few seconds on average) The inquiry message is typically used for finding Bluetooth devices including publicprinters ,fax machines and similar devices with an unknown address. 8. Difference between GPS, wireless cellular assisted GPS, and indoor geo location systems. The Global Positioning System (GPS) is a satellite-based navigation system made up of a network of 24 satellites placed into orbit by the U.S. Department of Defense Assisted GPS, generally abbreviated as A-GPS, is a carrier network dependent system which can, under certain conditions, improve the startup performance of a

GPS satellite-based positioning system. It is used extensively with GPS-capable cellular phones Indoor Geolocation is the process of finding geolocation of an electronic device inside a building 9. Differentiate between remote and self positioning systems. In a self positioning system the MS locates its own position using measurements of its distance or its direction from known location of transmitter. In remote positioning system recievers at known locations on a network together compute the location of a mobile transmitter usong the measurements of the distance of this mobile from each of the receivers.It is also called as network based or network centric positioning system. 10.What is WPAN? Wpan is a short distance wireless networkused for networking of portable and mobile computing devices such as PCs, PDAs, cellphones, printers speakers«etc and other consumer electronics. 11.What is Bluetooth? Bluetooth is an open specification for short range wireless voice and data communication that was originally developed for cable replacement in personal area networking to operate all over the world. 12.What are the requirements of WPAN?
y y y y y

Power management : Low current consumption. Range:0-10m Speed:19.2-100kbps Small size 0.5 cubic in without antenna Low cost relative to target device

13.What is SWAP? Shared wire access protocol it defines a new common interface that supports wireless voice and data networking in the home. The SWAP specification is an extension of DECT for voice and relaxed 802.11 for high speed data applications.

14.Name the topology for blue tooth architecture? The topology of blue tooth is referred to as scattered adhoc topology. In scattered hoc environment a number of small network supports a few terminals to coexist or possibly interoperate with one another.

Sponsor Documents

Or use your account on DocShare.tips

Hide

Forgot your password?

Or register your new account on DocShare.tips

Hide

Lost your password? Please enter your email address. You will receive a link to create a new password.

Back to log-in

Close