Академический Документы
Профессиональный Документы
Культура Документы
ANSWERS(ALLUNITS)M.E(CSE)
UNIT I
PART-A
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
17.
18.
19.
20.
21.
22.
23.
24.
25.
26.
27.
28.
29.
30.
31.
32.
33.
34.
35.
36.
37
38
39
40
41
42
43
44
45
46
47
48
49
Primary synchronization
Secondary synchronization
Follow on services
Privacy
Information services
Support services
Describe lower security, simpler to attack?
Not only can portable devices be stolen more easily, but the radio interface is also
prone to the dangers of eavesdropping. Wireless access must always include encryption,
authentication, and other security mechanisms that must be efficient and simple to use.
What are the benefits of reservation schemes?
Increased no other station is allowed to transit during this slot
Avoidance of congestion
Waiting time in clearly known
What limits the number of simultaneous users in a TDM/FDM system compared to a CDM
system?
TDM/FDM system has a hard upper limit of simultaneous users. The system assigns a
certain time-slot at a certain frequency to a user. If all time-slots at all frequencies are occupied
no more users can be accepted. Compare to this hard capacity a CDM system has so called
soft capacity. The system can accept an additional user. However the noise level may then
increase above a certain threshold where transmission is impossible.
What is meant by software defined radio?
A Software-defined radio (SRD) system is a radio communication system where
components that have typically been implemented in hardware are instead implemented using
software on a personal computer or other embedded computing devices.
What is the importance of digital signals?
The signal processing is better with digital signal formats (0s and 1s) where noise is
minimized. Hence analog to digital converters are used to convert input analog signal to its
equivalent digital signal and after processing the signal is again converted to original analog
signal with digital to analog signal at the end entity for proper reception of the signal.
50
Vehicles
Emergencies
Business
benefit
from
wireless
networks
and
mobile
PART-B
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
UNIT II
PART A
1.
2.
Define GSM.
In early GSM was called as Groupe Speciale Mobile was founded on 1982, lateral it was
renamed as Global System for Mobile Communication (GSM). The primary goal of GSM is to
provide a mobile phone system that allows user to roam throughout Europe and PSTN systems.
What are the reasons for delays in GSM for packet data traffic?
The data traffics in asymmetric at the wireless channels which means the down link
traffic volume is much higher than the one in the uplink. The aggregated data traffic within one
routing area is usually different with the one in the other RA, in which case will cause different
traffic load on SGSN and CGSN nodes. The CGSN with high traffic load will cause more packet
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
delay.
List out the different categories of services offered by GSM.
Bearer Services.
Tele Services.
Supplementary Services.
What is the frequency range of uplink and downlink in GSM network?
Intra-cell handover.
Confidentiality.
Anonymity.
What is meant by GGSN?
GGSN is Gateway GPRS Support Node. It is the inter-working unit between the GPRS
network and external packet data networks. The GGSN is connected to external networks via the
Gi interface and transfers packets to the SGSN via an IP-based GPRS backbone network.
What is meant by BSSGP?
BSSGP is Base Station Subsystem GPRS Protocol. It is used to convey routing and
QoSrelated information between the BSS and SGSN.BSSGP does not perform error correction
and works on top of a frame relay network.
Define the protocol architecture of DECT.
The protocol architecture of DECT consists of three layers. They are:
Physical Layer.
Network Layer.
The first three layers are common for both Control Plane (C-Plane) and User Plane
(UPlane). The network layer has been specified only for U-Plane, so that user data from layer
two is directly forwarded to the U-Plane.
Specify the standards offered by TETRA.
Voice+Data (V+D).
15.
16.
17.
18.
19.
20.
21.
22.
23.
24.
25.
IMT-DS
IMT-TC
IMT-MC
IMT-SC
IMT-FT
What are the steps perform during the search for a cell after power on?
The steps perform during the search for a cell after power on is:
Primary Synchronization.
Secondary Synchronization.
Hard Handover.
Soft Handover.
What are the two basic transport mechanisms used by DAB?
The two basic transport mechanisms used by DAB are:
Crosstalk.
Define Digital cellular networks.
Digital cellular networks are the segment of the market for mobile and wireless devices
which are growing most rapidly. They are the wireless extensions of traditional PSTN or ISDN
networks and allow for seamless roaming with the same mobile phone nation or even worldwide.
What is meant by worldwide market?
The worldwide market figures for cellular networks are as follows. The most popular digital
system is GSM, with approximately 70 percent market share. The remainder is split between
CDMA (12 percent) and TDMA (10 percent) systems, and other technologies.
Describe Mobile services.
GSM permits the integration of different voice and data services and the inter-working
with existing networks. Services make a network interesting for customers. GSM has defined
three different categories of services.
A mobile station MS is connected to the GSM public land mobile network (PLMN) via the
Um inter-network is connected to transit networks.
What is meant by Bearer Services?
GSM specifies different mechanisms for data transmission, the original GSM allowing for
data rates of up to 9600 bits/s for non-voice services. Bearer services permit transparent and
nontransparent, synchronous or asynchronous data transmission.
Define Transparent bearer services.
Transparent bearer services only use the functions of the physical layer to transmit data.
Data transmission has a constant delay and throughput id no transmission errors occur.
26.
27.
28.
29.
30.
31.
32.
33.
34.
35.
36.
37.
38.
39.
40.
41.
42.
43.
44.
45.
46.
47.
Emergency number
Group fax
Define Protocols.
The main interest lies in the Um interface, as the other interfaces occur between entities
in a fixed network. Layer 1, the physical layer, handles all radio-specific functions. This includes
the creation of bursts according to the five different formats, multiplexing of bursts into a TDMA
frame, synchronization with the BTS, detection of idle channels, and measurement of the channel
quality on the downlink.
What are the numbers needed to locate an MS and to address the MS?
o Mobile station international ISDN number (MSISDN)
o International mobile subscriber identity (IMSI)
o Temporary mobile subscriber identity (TMSI)
o Mobile station roaming number (MSRN)
What are the two basic reasons for a handover?
The mobile station moves out of the range of a BTS or a certain antenna of a BTS
respectively. The received signal level decreases continuously until it falls below the minimal
requirements for communication. The error rate may grow due to interference, the distance to the
BTS may be too high. The wire infrastructure may decide that the traffic in cell is too high and
shift some MS to other cells with a lower load (if possible). Handover may be due to load
balancing.
Define HSCSD.
A straightforward improvement of GSMs data transmission capabilities is high speed
circuit switched data (HSCSD), which is available with some providers. In this system, higher
data rates are achieved by bundling several TCHs. An MS requests one or more TCHs from the
GSM network, i.e., it allocates several TDMA slots within a TDMA frame.
What is meant by GPRS?
The next step toward more flexible and powerful data transmission avoids the problems of
HSCSD by being fully packet-oriented. The general packet radio service (GPRS) provides packet
mode transfer for applications that exhibit traffic patterns such as frequent transmission of small
volumes according to the requirement specification.
Define DECT.
Fully digital cellular network is the digital enhanced cordless telecommunications
(DECT) system specified by ETSI. DECT is also a more powerful alternative to the digital system
CT2 which is
mainly used in the UK and has even been selected as one of the 3G candidates in the IMT-2000
family.
What is meant by System Architecture?
A global network connects the local communication structure to the outside world and
offers its services via the interface D1. Global networks could be integrated services digital
networks (ISDN), public switched telephone networks (PSTN), public land mobile networks
(PLMN)
or packet switched public data network (PSDDN).
Define Protocol Architecture.
The DECT protocol reference architecture follows the OSI reference model. The physical
layer, medium access control, and data link control for both the control plane (C-plane) and the
user
plane (U-plane).
What are the three physical channels used for the data transmission?
1) Dedicated physical data channel (DPDCH)
2) Dedicated physical control channel (DPCCH)
48.
49.
50.
51.
52.
53.
54.
55.
PART-B
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
UNIT III
PART A
1.
2.
3.
4.
5.
What is WLAN?
WLANs is to replace office cabling, to enable ether less access to the internet and, to
introduce a higher flexibility for ad-hoc communication in e.g., group meetings.
List out the advantages of WLANs.
a. Flexibility
b. Planning
c. Design
d. Robustness
e. Cost
List out disadvantage of WLANs.
a. Quality of service
b. Proprietary solutions
c. Restrictions
d. Safety and security
List out WLANs to ensure their commercial success.
a. Global operation
b. Low power
c. License free operation
d. Robust transmission technology
e. Simplified spontaneous cooperation
f. Easy to use
g. Protection of investment
h. Safety and security
List out two different basic transmission technologies can be used to transmission
technologies can be used to set up WLANs.
a. Infra red
b. Radio transmission
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
17.
18.
19.
20.
21.
22.
23.
24.
25.
26.
27.
28.
29.
30.
31.
32.
33.
34.
35.
36.
37.
38.
39.
40.
41.
42.
43.
44.
45.
46.
47.
48.
49.
50.
PART-B
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
UNIT IV
PART A
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
requirements of mobile IP was to support hiding the mobility of the MN. CN does not need to
know anything about the MNs current location and sends the packet as usual to the IP address
of MN.
What is meant by agent discovery?
One initial problem of an MN after moving is how to find a foreign agent. How does the
MN discover that it has moved? For this purpose mobile IP describes two methods:
Agent advertisement
Agent solicitation
Define four addition message needed in optimization.
The optimized mobile IP protocol needs four additional messages.
a. Binding request
b. b. Binding update
c. Binding acknowledgement
d. d. Binding warning
Define IPV6.
Comparing to IP version 4, IP version 6 makes life much easier. Several mechanisms that
had to be specified separately for mobility support come free in IPv6. One issue is security with
regard to authentication, which is now a required feature for all IPv6 nodes. Every IPv6 node
can send binding updates to another node so the MN can send its current COA directly to the CN
and HA.
List out micro mobility problems presents a comparison of the three approaches.
a. Cellular IP
b. Hawali
c. Hierarchical mobile IPv6 (HMIPv6)
Explain DHCP.
The dynamic host configuration protocol is mainly used to simplify the installation and
Maintenance of networked computers. If a new computer is connected to a network, DHCO can
provide it with all the necessary information for full system integration into the network, e.g.,
addresses of a DNS server and the default router, the subnet mask, the domain name and IP
Address.
What is meant by mobile ad-hoc network?
There may be several situations where users of a network cannot rely on an
Infrastructure. The ad-hoc setting up of a connection with an infrastructure is not the main issue
Here. These networks should be mobile and use wireless communications.
Define routing.
Routing is needed to find a path between source and destination and to forward the
Packets appropriately. In wireless networks using an infrastructure, cells have been defined.
Within a cell, the base station can reach all mobile nodes without routing via a broadcast.
List out some fundamental differences between wired networks and Ad-hoc Wireless
Networks related to routing.
a. Asymmetric links
b. Redundant links
c. Interference and
d. Dynamic topology
Define DSDV.
Destination sequence distance vector (DSDV) routing is an enhancement to distance
vector routing for ad-hoc networks. Distance vector routing is used as routing information
protocol (RIP) in wired networks. It performs extremely poorly with certain network changes
due to the count to infinity problem.
What are the requirements of mobile IP?
Compatibility
Transparency
Scalability and efficiency
Security
14.
15.
16.
17.
18.
19.
20.
21.
22.
23.
24.
25.
26.
27.
28.
29.
30.
31.
32.
33.
34.
35.
36.
37.
38.
39.
40.
41.
If a node decapsulates a packet for a MN, but it is not the current FA for this MN, this
node sends a binding warning. The warning contains MNs home address and a target node
address.
Explain cellular IP.
Cellular IP provides local handovers without renewed registration by installing a single
cellular IP gateway for each domain, which acts to the outside world as a foreign agent.
What are the advantages of cellular IP?
Manageability
Efficiency
Transparency and Security
What is known as mobility anchor point?
HMIPv6 provides micro-mobility support by installing a mobility anchor point, which is
responsible for a certain domain and acts as a local HA within this domain for visiting MNs.
Explain destination sequence distance vector routing.
Destination sequence distance vector routing is an enhancement to distance vector routing
for ad-hoc networks and is used as routing information protocol in wired networks.
What are the two things added to the distance vector algorithm?
Sequence Numbers
Damping
How the dynamic source routing does divide the task of routing into two separate
problems?
Route discovery
Route Maintenance
State the requirements of mobile IP.
i. Compatibility
ii. Transparency
iii. Scalability and efficiency
iv Security
What is COA? How is it assigned?
Care-or address (COA): The COA defines the current location of the MN from an IP point of view.
There are two different possibilities for the location of the COA:
Foreign agent COA
Co-located COA
How does a MN identify that it has moved?
Mobile IP describes two methods: agent advertisement and agent solicitation, which are in
fact router discovery methods plus extensions.
What are the contents of mobility binding?
Mobility binding containing the mobile nodes home IP address and the current COA.
Additionally, the mobility binding contains the lifetime of the registration which is negotiated
during the registration process.
List the types of encapsulation.
IP-in-IP encapsulation
Minimal encapsulation
Generic routing encapsulation
What are the messages used for mobile IP optimization?
Binding request
Biding update
Binding acknowledgement
Binding warning
State the reasons for reverse tunneling.
Firewalls
Multi-cast
42.
43.
44.
45.
46.
47.
48.
49.
TTL
State any 4 features of IPv6.
a. No special mechanisms as add-ons are needed for securing mobile IP registration.
b. Every IPv6 node masters address auto configuration the mechanisms for acquiring a COA
are already built in.
c. Neighbor discovery as a mechanism mandatory for every node is also included in the
specification; special foreign agents are no longer needed to advertise services.
d. Combining the features of auto configuration and neighbor discovery means that every
mobile node is able to crate or obtain a topologically correct address for the current point of
attachment.
e. Every IPv6 node can send binding updates to another node, so the MN can send its current
COA directly to the CN and HA.
State the advantages of cellular IP.
Manageability: Cellular IP is mostly self-configuring, and integration of the CIPGW into a firewall
would facilitate administration of mobility-related functionality.
State the disadvantages of cellular IP.
Efficiency : Additional network load is induced by forwarding packets on multiple paths.
Transparency: Changes to MNs are required.
Security : Routing tables are changed based on messages sent by mobile nodes. Additionally,
all systems in the network can easily obtain a copy of all packets destined fro an MN by sending
packets with the MNs source address to the CIPGW.
State the advantages of Hawaii.
Security : Challenge-response extensions are mandatory. In contrast to Cellular IP, routing
changes are always initiated by the foreign domains infrastructure.
Transparency : HAWAII is mostly transparent to mobile nodes.
State the disadvantages of Hawaii.
Security : There are no provisions regarding the setup of IPSec tunnels.
Implementation : No private address support is possible because of co-located COAs.
State the advantages of HMIPv6.
Security : MNs can have (limited) location privacy because LCOAs can be hidden.
Efficiency : Direct routing between CNs sharing the same link is possible.
State the disadvantages of HMIPv6.
Transparency : Additional infrastructure component (MAP).
Security : Routing tables are changed based on messages sent by mobile nodes. This requires
strong authentication and protection against denial of service attacks. Additional security
functions might be necessary in MAPs.
State the uses of mobile ad hoc networks.
Instant infrastructure
Disaster relief
Remote areas
Effectiveness
PART B
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
Discuss and detail the differences in topology reorganization in DSDV and DSR routing protocols.
What are the general problems of mobile IP regarding security and support of quality of service?
Name the inefficiencies of mobile IP regarding data forwarding from a correspondent node to a
mobile node. What are optimizations and what additional problems do they cause?
What are the types of registration in mobile IP? Explain.
Explain the different routing techniques available for mobile ad hoc network
with an example.
Explain the agent discovery process in mobile IP.
Explain the different approaches available for IPv6 to support mobility.
Compare the features of wired network with ad hoc network related
to routing.
11.
12.
13.
14.
15.
UNIT V
PART A
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
17.
Efficient
Reliable
Secure
Name the layers of WAP.
Transport layer
Security layer
Transaction layer
Session layer
Application layer
Name some ICMP messages.
Destination unreachable
Parameter problem
Message too big
Reassembly failure
Echo request/reply
What is WTP? What are its classes?
WTP stands for Wireless Transaction Protocol. It has been designed to run on very thin
clients such as mobile phones. It has three classes.
Class 0: provides unreliable message transfer without any result message.
Class 1: provides reliable message transfer without exactly one reliable result
message.
Class 2: provides reliable message transfer with exactly one reliable result message.
What is WSP?
The Wireless Session Protocol has been designed to operate on top of the datagram
service WDP or the transaction service WTP. It provides a shared state between a client and a
server to optimize content transfer.
Name some features of WSP adapted to web browsing.
HTTP/1.1 functionality
Exchange of session headers
Push and pull data transfer
Asynchronous request
What is WML?
The Wireless Markup Language is based on the standard HTML known from the www and
on HDML. WML is specified as an XML document type.
What are the features of WML?
Text and Images
User interaction
Navigation
Context Management
What are the advantages of WML Script over WML?
WML Script offers several capabilities not supported by WML:
Validity check of user input
Access to device facilities
Local user interaction
Extension to the device software
Name the libraries specified by WML Script.
Lang
Float
String
URL
18.
19.
20.
21.
22.
23.
24.
25.
26.
27.
WML Browser
Dialogs
What are the classes of libraries?
Common network services
Network specific services
Public services
Name the operations performed by PAP.
Push access Protocol performs the following operations:
Push submission
Result notification
Push cancellation
Status query
Client capabilities query
What are the components of WAP2.0?
The protocol framework of WAP2.0 consists of four components:
Bearer networks
Transport services
Transfer services
Session services
State any 4 improvements to the classical TCP.
1. Indirect TCP 2. Mobile TCP
3. Snooping TCP 4. Fast retransmit / Fast recovery.
State any 2 advantages of I-TCP.
I-TCP does not require any changes in the TCP protocol as used by the hosts in the fixed
network or other hosts in a wireless network that do not use this optimization.
Due to the strict partitioning into two connections, transmission errors on the wireless link,
i.e., lost packets cannot propagate into the fixed network.
State any 2 disadvantages of I-TCP.
The loss of the end-to-end semantics of TCP might cause problems if the foreign agent
partitioning the TCP connection crashes.
In practical use, increased handover latency may be much more problematic.
State any 2 advantages of S-TCP.
The end-to-end TCP semantic is preserved. No matter at what time the foreign agent
crashes (if this is the location of the buffering and snooping mechanisms), neither the
correspondent host nor the mobile host have an inconsistent view of the TCP connection as
is possible with I-TCP.
The correspondent host does not need to be changed; most of the enhancements are in the
foreign agent.
State any 2 disadvantages of S-TCP.
Snooping TCP does not isolate the behaviour of the wireless link as well as I-TCP.
Using negative acknowledgements between the foreign agent and the mobile host assumes
additional mechanisms on the mobile host. This approach is no longer transparent for arbitrary
mobile hosts.
State any 2 advantages of M-TCP.
It maintains the TCP end-to-end semantics. The SH does not send any ACK itself but forwards
the ACKs form the MH.
If the MH is disconnected, it avoids useless retransmissions, slow starts or breaking
connections
by simply shrinking the senders window to 0.
State any 2 disadvantages of M-TCP.
As the SH does not act as proxy as in I-TCP, packet loss on the wireless link due to bit errors is
propagated to the sender.
M-TCP assumes low bit error rates, which is not always a valid assumption.
28.
29.
30.
31.
32.
33.
34.
35.
36.
37.
38.
39.
40.
41.
42.
43.
44.
45.
46.
47.
48.
49.
50.
Transport service
Transfer service
Session service.
PART B
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.