Академический Документы
Профессиональный Документы
Культура Документы
net
PART - A
• w.E
HIPERLAN-1
•
•
HIPERLAN-2
HIPER Access asy
• HIPERLINK
En
gin
3. List the protocols used in HIPERLAN-2. (Remember)
• Radio Link Control protocol.
• DLC Connection Control
• Radio Resource Control e eri
• Association Control Function.
4. What are the advantages of wireless LAN? (Remember) ng.
•
•
•
Flexibility
Planning
Robustness
n et
• Design
• Cost
5. DefineHIPERLAN-2. (Remember)
It is a mobile short-range access network specified in the Broadband Radio
Access Networks (BRAN) project chartered by the European
Telecommunications Standards Institute (ETSI). HIPERLAN-2, a competes
directly with IEEE 802.11g/n, aka Wi-Fi.
w.E
Transmitting power
frequency hopping
1 mill watt
Data speed
asy Asymmetric- 721+57.6
symmetric link – 432.6Kbps
Kbps,
Range
En 10ms
9. What are the layers in IEEE 802.11 architecture? (Analyze)
Physical Layer.
gin
- Physical layer convergence procedure(PLCP)
eri
- Logical Link Control Layer.(LLC)
- Medium Access Control (MAC ). ng.
10. What are the functions of Physical Layer? (Analyze) n
On transmission, assemble data into a frame with address and error detection et
fields.
On, reception, disassemble frame, and perform address and error detection.
Govern access to the LAN transmission medium.
Provide an interface to higher layers and perform flow and error control.
Data:
DSAP:
I/G DSAP value
I/G – Individual / Group
w.E C/R
C / R – Command / Response
SSAP value
gin
a network as needed, without any support from any existing Internet
infrastructure or any other kind of fixed stations.
e eri
13. What are the characteristics of MANET? (May /June 2012)(Analyze)
Dynamic topologies.
Bandwidth constrained and variable capacity links.
Energy constrained operations. ng.
Limited physical security
15. What are the building blocks of IEEE 802.11 architecture? (Understand)
5
ww
17. List out the IEEE 802.11 Services.(Remember)
a. Distribution of Messages within a DS.
w.E
o Distribution
o Integration.
No Transition.
BSS Transition.
asy
b. Association Related Services
ESS transition.
En
c. Access and Privacy Services.
Authentication. gin
DE authentication.
Privacy. e eri
18. Define WIMAX(Remember)
ng.
WiMAX (Worldwide Interoperability for Microwave Access) is a wireless
n
industry coalition dedicated to the advancement of IEEE 802.16 standards
for broadband wireless access (BWA) networks. WiMax is a standardized
wireless version of Ethernet intended primarily as an alternative to wire
et
technologies (such as Cable Modems, DSL and T1/E1 links) to provide
broadband access to customer premises.
19. List Some of the salient features supported by WiMAX are: (Remember)
i. High data rates: - WiMAX can typically support data rates from 500 Kbps
to 2 Mbps. - The inclusion of multi-input multi-output (MIMO) antenna
techniques along with flexible sub-channelization schemes, advanced coding
and modulation all enable mobile to support peak downlink data rates of 63
Mbps per sector and peak uplink data rates of up to 28 Mbps per sector in a 10
MHz channel.
ii. Quality of service (QoS):
WiMAX has clearly defined QoS classes for applications with different
requirements such as VoIP, real time video streaming, file transfer and web
traffic.
iii. Scalability:
w.E
iv. Security:
There is support for diverse set of user credentials like SIM/USIM cards, smart
asy
cards, digital certificates, username/password schemes.
All this is based on relevant ‗extensible authentication protocol (EAP)‘ methods
for credential type.
En
v. Mobility:
gin
e
Mobile WiMAX supports optimized handoff schemes with latencies less than
eri
50ms to ensure that real time applications such as VoIP can be performed
without service degradation.
ng.
Flexible key management schemes assume that security is maintained during
handoff.
ww
3.
OFDM,maximum rate=54Mbps.
The stations gain access to media There is time slot for each station
w.E
based on CSMA/CA and back off and there is scheduling algorithm
algorithm schemes. used by base station.
4.
asy
Range is less than 100 meters. A kilometer non-line-of-sight,
5.
6.
Indoor Environment.
e eri
by base station.
22. What are the differences between the 802.11a and HIPET LAN-2?
(Remember) ng.
n
The HIPER LAN-2 standard uses the same physical layer as 802.11a with a
MAC that supports the needs of the cellular telephone industry is supporting
mechanisms for tariff, integration with existing cellular systems and providing
et
QOS. IEEE 802.11camp is a connectionless WLAN camp that evolved from
data oriented computer communications. HIPER LAN-2 camp is connection
based WLANs addressing the needs of voice oriented cellular telephone.
23. State the relationship between HYPER LAN-2 and WATM. (Remember)
HIPER LAN-2 aims at higher data rates and intends to accommodate ATM as
well as IP type access.
24. How many transport channels and logical channels are implemented in
the HIPERLAN-2 DLC layer? (Analyze)
8
HIPERLAN-2 DLC layer has four transport channels and five logical
channels.
ww wireless access applications. The primary task of the WiMAX MAC layer is
to provide an interface between the higher transport layers and the
w.E
physical layer.
asy
En PART-B
gin
1. What are the basic differences between wireless WANs and WLANs, and
what are the common features? (Analyze)
e eri
2. What are the problems of WLANs? What level of security can WLANs
provide, what is needed additionally and how far do the standards
go?(Understand)
ng.
n
3. Compare IEEE 802.11, HiperLAN2, and Bluetooth with regard to their ad-
hoc Capabilities. (Analyze) et
4. What are the reasons for the use of infra-red transmission for
WLANs?(Understand)
5. Why is the PHY layer in IEEE 802.11 subdivided? What about HiperLAN2
and Bluetooth? (Analyze)
9. Discuss the methods by which data services get integrated with voice
oriented networks. (Understand) [AU May / June 2012]
ww
(Understand) (Nov/Dec 2014)
11. Write a note on security issues in wireless networks (April/May
2015)
w.E
12. Distinguish between collisions on PHY and MAC layer. How do the three
asy
wireless networks, try to solve the collisions or minimize the probability of
collisions? (Analyze)
En
gin
13. Compare the power saving mechanisms in all three LANs. What are the
negative effects of the power saving mechanisms, what are the trade-offs
e
between power consumption and transmission QoS? (Analyze)
eri
14. Compare the QoS offered in all three LANs in ad-hoc mode. What
ng.
advantages does an additional infrastructure offer? How is QoS provided in
Bluetooth? (Analyze)
ASSIGNMENT QUESTIONS n et
1. Discuss about reliable data delivery by the MAC layer? (PO1) (Remember)
2. Explain the overall architecture of HIPERLAN-1? (PO2) (Understand)
3. Explain the security services provided by IEEE 802.11?(PO4) (Analyze)
4. How do IEEE 802.11, HiperLAN2 and Bluetooth, respectively, solve the
hidden terminal problem? (PO4) (Analyze)
5. Compare IEEE 802.11, HiperLAN2, and Bluetooth with regard to their ad-hoc
capabilities. Where is the focus of these technologies? (PO4) (Analyze)
6. Name reasons for the development of wireless ATM. What is one of the main
differences to Internet technologies from this point of view? Why did WATM
10
w.E PART – A
asy
1. What is Dynamic source Routing? (Remember)
Dynamic Source Routing eliminates all periodic routing updates. If a node
En
needs to discover a route, it broadcast a route request with a unique identifier
and the destination address as parameters. Any node that receivers a route
gin
request gives a list of addresses representing a possible path on its way
toward the destination.
e
2. List the Mobile ad-hoc routing protocol? (Understand) eri
ng.
Destination-Sequenced Distance-Vector (DSDV) Routing protocol. Ad-
hoc on demand distance vector routing protocol. Dynamic source routing
protocol.
w.E
7. What is DHCP? (Remember)
Dynamic Host Configuration Protocol (DHCP) is a network protocol that
asy
enables a server to automatically assign an IP address to a computer from a
defined range of numbers (i.e., a scope) configured for a given network
En
8. Name the entities of DHCP? (Remember)
gin
The entities acquired via DHCP are, e.g., DHCP relay, DHCP server etc.
e eri
9. How can DHCP be used for mobility and support of mobile IP?
(Analyze)
ng.
DHCP is a good candidate for support the acquisition of COA for mobile
nodes. The same holds for all other parameters needed, such as address of
n
the default router, DNS servers etc. A DHCP server should be located in the
subnet of the access point of the mobile node, or at least a DHCP relay
should provide forwarding of the messages. et
10. What advantages does the use of IPv6 offer for mobility? (Understand)
Many mobility supporting function are already integrated in IPv6. An
explicit FA is not needed any more, all routers are capable of agent
advertisements, tunnelling, forwarding of data, setting up security
associations. Authentication is built-in as well as optimisation functions.
12
w.E
(Understand)
Destination sequenced distance vector Routing.
Cluster Head Gateway switch routing.
asy
Wireless routing protocols
En
14. Define Adhoc Networks? (Remember)
Adhoc network is an autonomous system node connected with wireless link.
gin
The node in the ad hoc network communicates with other node without any
physical representation. The nodes in the ad hoc organization instantly form
e
the network whenever the communication is established.
eri
15. Write the advantages of Adhoc Networks? (Remember)
Ease of deployment ng.
Speed of deployment
Decreased dependence on infrastructure
16. List the issues of MANET? (Remember)
n et
Lack of a centralized entity.
Network topology changes frequently and unpredictably
Channel access/bandwidth availability
Hidden/exposed station problem
13
asy
IPv6 in addition to offering a significantly larger address space, has
many other advantages over IPv4:
En
The IPv6 protocol has built in support for multicast 1 transmission,
while with IPv4 this feature is optional.
gin
IPv6 devices allocate also an only locally accessible and valid IPv6
address for a client connected, which allows communication between
e eri
endpoints on the same sub-network regardless of the presence of a
router. 2
ng.
As for security features, the IPsec support (authentication and
encryption) is a mandatory component of the IPv6 protocol, while in
case of IPv4 this feature is optional.
n
Contrary to the Mobile IPv4 protocol, the Mobile IPv6 (MIPv6) helps
avoid triangular routing experienced earlier, and makes it possible for et
mobile (Wi-Fi) clients to select a new router without renumbering,
which results in a more reliable and faster connection with less
network interruption.
In case of IPv4, data packages have an upper size limit of 64 kB
(kilobytes), while with IPv6 this may be extended up
to 4GB (gigabytes), significantly increasing the transmission rate.
14
IPv4/IPv6 Differences
IPv4 IPv6
ww
fragmentation hosts
Packet header
w.E
Does not identify
packet flow for QoS
Contains Flow Label field that
specifies packet flow for QoS handling
handling
asy
Includes a checksum Does not include a checksum
Includes
up to 40 bytes En
options Extension headers used for optional
data
gin
DNS records Address (A) records,
maps host names e
Address (AAAA)
eri
maps host names
records,
Address
configuration
DNS domain
Manual or via DHCP
n
Stateless address auto configuration et
(SLAAC) using Internet Control
Message Protocol version 6 (ICMPv6)
or DHCPv6
IP to MAC broadcast ARP Multicast Neighbour Solicitation
resolution
15
Broadcast Yes No
PART – B
ww
1. Name the consequences and problems of using IP together with the standard
routing protocols for mobile communications. (Understand)
w.E
2 What could be quick ‗solutions‘ and why don‘t they work? (Apply)
3 Name the requirements for a mobile IP and justify them. Does mobile IP fulfill
them all? (Understand)
asy
4 List the entities of mobile IP and describe data transfer from a mobile node to a
En
fixed node and vice versa. Why and where is encapsulation needed? (Remember)
gin
5 How does registration on layer 3 of a mobile node work? (Understand)
6 Show the steps required for a handover from one foreign agent to another foreign
agent including layer 2 and layer 3. (Apply)
e eri
7 Explain packet flow if two mobile nodes communicate and both are in foreign
ng.
networks. What additional routes do packets take if reverse tunneling is required?
(Understand)
n
8 Explain how tunneling works in general and especially for mobile IP using IP-in-
IP, minimal, and generic routing encapsulation, respectively. Discuss the et
advantages and disadvantages of these three methods. (Understand)
9 Name the inefficiencies of mobile IP regarding data forwarding from a
correspondent node to a mobile node. What are optimizations and what additional
problems do they cause? (Analyze)
10 What advantages does the use of IPv6 offer for mobility? Where are the entities
of mobile IP now? (Understand)
11 What are general problems of mobile IP regarding security and support of
quality of service? (Remember)
12 What is the basic purpose of DHCP? Name the entities of DHCP. (Analyze)
16
13 How can DHCP be used for mobility and support of mobile IP? (Understand)
14 Name the main differences between multi-hop ad-hoc networks and other
networks. What advantages do these ad-hoc networks offer? (Analyze)
15 Why is routing in multi-hop ad-hoc networks complicated, what are the special
challenges? (Analyze)
16 Recall the distance vector and link state routing algorithms for fixed networks.
Why are both difficult to use in multi-hop ad-hoc networks? (Remember)
ASSIGNMENT QUESTIONS
1. What are the solutions that were proposed to support mobility apart from
ww mobile IP? What are the problems associated with these
solutions?(PO1)(Remember )
w.E
2. List and explain the requirements for mobile IP fulfill them all? Justify.(PO2
)( Understand)
asy
3. Draw and explain the various fields of agent advertisement packet of mobile
IP? (PO1)(Remember)
En
4. Describe the registration of visiting mobile node on handover in Mobile IP
how is the binding between home agent and foreign agent
created?(PO2)(Understand)
gin
5. How can DHCP be used for mobility and support of mobile
IP?(PO2)(Analyze)
e eri
6. Name the requirements for a mobile IP and justify them. Does mobile IP
fulfill them all?(PO1)(Remember)
ng.
7. What advantages does the use of IPv6 offer for mobility? Where are the
entities of mobile IP now?(PO2)(Understand)
n
8. How does dynamic source routing handle routing? What is the motivation
behind dynamic source routing compared to other routing algorithms from et
fixed networks?(PO4)(Analyze)
9. Explain packet flow if two mobile nodes communicate and both are in
foreign networks. What additional routes do packets take if reverse tunneling
is required?(PO2)(Understand)
10. What is the basic purpose of DHCP? Name the entities of
DHCP?(PO1)(Remember)
17
PART – A
1. What is TCP?(Remember)
TCP is a connection-oriented protocol, which means a connection is established
and maintained until the application programs at each end have finished
exchanging messages. It determines how to break application data into packets
that networks can deliver, sends packets to and accepts packets from the
network layer, manages flow control, and—because it is meant to provide error-
free data transmission—handles retransmission of dropped or garbled packets
as well as acknowledgement of all packets that arrive. In the Open Systems
Interconnection (OSI) communication model, TCP covers parts of Layer 4,
wwthe Transport Layer, and parts of Layer 5, the Session Layer.
w.E
2. Draw the format for TCP header?(Apply)
asy
En
gin
e eri
ng.
n et
3. What is a TCP packet? (Remember)
Most networks use TCP/IP as the network protocol, or set of rules for
communication between devices, and the rules of TCP/IP require information to
be split into packets that contain both a segment of data to be transferred and
the address where the data is to be sent.
18
HTTP - Used between a web client and a web server, for non-secure data
transmissions. A web client (i.e. Internet browser on a computer) sends a
request to a web server to view a web page. The web server receives that
request and sends the web page information back to the web client.
HTTPS - Used between a web client and a web server, for secure data
transmissions. Often used for sending credit card transaction data or other
private data from a web client (i.e. Internet browser on a computer) to a web
server.
FTP - Used between two or more computers. One computer sends data to or
w.E
5. What do you mean by congestion control? (Analyze)
Congestion control Congestion control controls traffic entry into a
telecommunications network, to avoid congestive collapse by avoiding
asy
oversubscription by reducing the rate of packets. It should not be confused with
flow control, which prevents the sender from overwhelming the receiver.
En
6. What do you mean by congestion window? (Remember)
gin
The congestion window is a sender imposed window that was implemented to
avoid overrunning some routers in the middle of the network path. The sender,
e eri
with each segment sent, increases the congestion window slightly, i.e. the
sender will allow itself more outstanding sent data.
ng.
7. What is fast retransmit in TCP? (Remember)
n
Fast Retransmit is an enhancement to TCP which reduces the time a sender
waits before retransmitting a lost segment. A TCP sender uses a timer to et
recognize lost segments.
19
w.E
sender can now retransmit the missing packet(s) before the timer expires. This
behaviour is called fast retransmit.
asy
11. Define fast recovery in TCP? (Remember)
En
It is an early enhancement for preventing slow-start to trigger on losses not
caused by congestion. The receipt of acknowledgements shows that there is no
gin
congestion to justify a slow start. The sender can continue with the current
congestion window. The sender performs a fast recovery from the packet loss.
n
computer in the internet recognizes any changes to TCP. Instead of the mobile
host the access point now terminates the standard TCP connection, acting as a
proxy.
et
13. Enumerates the advantages of indirect TCP? (Understand)
No changes in the fixed network necessary, no changes for the host
necessary.
Simple to control
Transmission errors on wireless links do not propagate in to the fixed
network.
Fast retransmission of packets is possible.
20
w.E
16. List the advantages of snooping TCP? (Remember)
The end to end TCP semantics is preserved.
asy
Handover of state is not required
En
Most of the enhancements are done in the foreign agent itself.
17. Define Mobile TCP? (Remember)
gin
The M – TCP has the same goals as that of I – TCP and snooping TCP to
e
prevent the sender window from shrinking if bit errors or disconnection but
eri
not congestion cause current problems. The M – TCP improves the overall
throughput, to lower the delay, to maintain end to end semantics of TCP to
provide more efficient handover.
ng.
18. Write the advantages of M – TCP? (Understand)
It maintains the TCP end to end semantics.
n et
It avoids useless retransmission, slow starts or breaking connections
by simply shrinking the sender‘s window to 0.
No buffering is required
19. Write the disadvantages of M – TCP? (Apply)
M – TCP assumes low bit error rates which are not always a valid
assumption.
21
ww Applications of 3G
The bandwidth and location information available to 3G devices gives rise to
w.E
applications not previously available to mobile phone users. Some of the
applications are:
asy
Global Positioning System (GPS)
Location-based services
Mobile TV
Telemedicine En
Video Conferencing
gin
Video on demand
e eri
22. What is the speed of 3g network? (Apply)
ng.
The operators talk about 3G speeds of 3.6 mbps to 21 mbps on their network, but
n
the actual speed is much lower. Last year, telecom regulator TRAI proposed to set
a minimum of one mbps download speed for 3G networks. In fact, the difference
between the speeds of 2G and 3G is hardly visible. et
22
PART – B
w.E
What are the modifications required in the TCP receiver to implement the
selective retransmission protocol.(b)Explain snooping TCP. What are it's
asy
advantages and disadvantages? (Apply)
4. Describe indirect TCP. Explain the modifications of indirect TCP as the
En
selective repeat protocol and mobile - end transport protocol. What are the
gin
advantages and disadvantages of indirect TCP? (Understand)
e
5. (a) Why mobility results in packet loss?(b) Compare the error rate in wired
eri
networks and mobile networks.(c) Why we cannot change TCP completely
ng.
just to support mobile users? What are the consequences of it? (Apply)
n
6. (a) What are the applications in which packet delayed is equivalent to packet
lost? Explain.(b) What are the applications for which packet loss can create et
severe problems? (Analyze)
7. (a) Why Access point maintains buffers in Indirect TCP?(b) How Indirect
TCP hides the problems of wireless links from fixed host?(c) The foreign
agent can act as a gateway to translate between the different protocols in
Indirect TCP. (Apply)
8. Compare the different types of transmission errors that can occur in wireless
and wired networks. What additional role does mobility play? (Understand)
23
w.E
from a fixed host to a mobile host via a foreign agent. Then a handover takes
place. What are the following actions of mobile IP and how does TCP
react?(Apply) asy
En
13. Now show the required steps during handover for a solution with PEP. What
gin
are the state and function of foreign agents, home agents, correspondent
host, mobile host, PEP and care-of-address before, during, and after
e eri
handover? What information has to be transferred to which entity to
maintain consistency for the TCP connection? (Apply)
ng.
n
14. What are the influences of encryption on the proposed schemes? Consider
for example IP security that can encrypt the payload, i.e., the TCP packet.
(Understand)
et
15. Name further optimizations of TCP regarding the protocol overhead which
are important especially for narrow band connections. Which problems may
occur? (Remember)
ASSIGNMENT QUESTIONS
16. Explain the working of snooping TCP?(PO2)(Understand )
24
17. What are the mechanisms of TCP that are designed and suitable for wired
network environment but not mobile environment?(PO3)(Remember)
18. Explain in Indirect TCP Access point is seen as the mobile host for the fixed
host and as fixed host for mobile host? (PO2)(Understand)
19. How handover takes place in Indirect TCP?(PO4)(Analyze)
20. Show the interaction of mobile IP with standard TCP. Draw the packet flow
from a fixed host to a mobile host via a foreign agent. Then a handover takes
ww place. What are the following actions of mobile IP and how does TCP
react?(PO4)(Analyze)
w.E
21. How and why does I-TCP isolate problems on the wireless link? What are
the main drawbacks of this solution?(PO4)(Analyze)
asy
22. Compare the different types of transmission errors that can occur in wireless
En
and wired networks. What additional role does mobility play? (PO4)
(Analyze)
gin
23. Name further optimizations of TCP regarding the protocol overhead which
are important especially for narrow band connections. Which problems may
occur?(PO1)(Remember)
e eri
ng.
UNIT – IV WIRELESS WIDE AREA NETWORK]
n et
PART – A
1. What is UMTS?(Remember)
The Universal Mobile Telecommunications System (UMTS) is a third
generation mobile cellular system for networks based on the GSM standard.
Developed and maintained by the 3GPP (3rd Generation Partnership Project),
UMTS is a component of the International Telecommunications Union IMT-
2000 standard set and compares with the CDMA2000 standard set for networks
25
based on the competing cdma One technology. UMTS uses wideband code
division multiple access (W-CDMA) radio access technology to offer greater
spectral efficiency and bandwidth to mobile network operators.
w.E
Downlink Packet Access (HSDPA) handsets in the downlink connection. These
speeds are significantly faster than the 9.6 kbit/s of a single GSM error-corrected
asy
circuit switched data channel, multiple 9.6 kbit/s channels in High-Speed Circuit-
En
Switched Data (HSCSD) and 14.4 kbit/s for CDMAOne channels.
ng.
existing GSM mobile networks. UMTS makes use of WCDMA, a technology that
shares much with CDMA networks used throughout the world, though it is not
compatible with them.
transit for user traffic. Core network also contains the databases and network
management functions.
w.E
Air interface Transmission / Reception
Modulation / Demodulation
asy
CDMA Physical Channel coding
Micro Diversity
Error Handing
Closed loop power control En
8. What is SGSN? (Remember) gin
e eri
The SGSN or Serving GPRS Support Node element of the GPRS network
provides a number of takes focussed on the IP elements of the overall system.
27
The GGSN organizes the interworking between the GPRS network and
external packet switched networks to which the mobiles may be connected.
These may include both Internet and X.25 networks.
w.E
a short message, stored in the SM –SC to the recipient mobile subscriber.
asy
Dynamic Host Configuration Protocol (DHCP) is a client/server protocol that
automatically provides an Internet Protocol (IP) host with its IP address and
En
other related configuration information such as the subnet mask and default
gateway.
ng.
comes from a server or a client. With a TCP service there are also two ports.
28
w.E
19. What is the HSDPA? (Remember)
High-Speed Downlink Packet Access (HSDPA) is an enhanced 3G (third-
generation) mobile-telephone communications protocol in the High-Speed
asy
Packet Access (HSPA) family, also dubbed 3.5G, 3G+, or Turbo 3G, which
allows networks based on Universal Mobile Telecommunications System
(UMTS) to have higher data speed.
En
20. Is the EDGE network 2g or 3g? (Analyze)
gin
Letter E stands for EDGE (Enhanced Data Rates for GSM Evolution). It is
e
also called Enhanced GPRS. This technology lies somewhere in
eri
between 2G and 3Gtechnology. So, some people refer to it as 2.5G.
PART – B
1. Discuss two evolution paths for the GSM to offer 3G
services.(Understand)
2. What is the high-speed circuit switched data (HSCSD) in the
GSM?(Analyze)
29
3.What is the role of the general packet radio service (GPRS) in the
GSM?(Understand)
4. What are the QoS classes in the UMTS? (Remember)
5. Define roles of two new network entities in the GPRS. (Remember)
6. How are higher data rates achieved in the enhanced data rates for GSM
enhancement (EDGE)? Discuss.(Understand)
7. What are the modulation and coding schemes that are used for the packet
mode in the EDGE? (Analyze)
ww 8. Discuss the roles of 3G systems. (Understand)
w.E
9. What is the UMTS? List important features of the UMTS air interface.
(Remember)
asy
10. What are three channel types that are used in the UMTS? Discuss the role of
each channel type. (Remember)
En
gin
11. What are the three main entities of the UMTS network? Discuss their
functions.(Analyze)
e eri
12. Discuss the responsibilities of the RNC in the UMTS network.
(Remember)
ng.
n
13. What are the responsibilities of Node B in the UMTS network? (Analyze)
14. Discuss the role of the access link control application part (ALCAP) in the
UMTS.(Understand)
et
15. Discuss Iu, Iur, and Iub interfaces in the UMTS. (Analyze)
16. The core network of the UMTS is divided into three different functional
areas. Name these areas and discuss their roles. (Apply)
17. What is adaptive multi-rate (AMR) codec? (Remember)
18. Discuss the UMTS bearer service layered architecture. (Understand )
30
ww ASSIGNEMENT QUESTIONS
1. Discuss the roles of 3G systems.(PO2)(Understand)
w.E
2. Discuss the UMTS bearer service layered architecture. (PO2)(Understand )
3. What are the responsibilities of Node B in the UMTS network?
(PO4)(Analyze) asy
En
4. What are the new interfaces required for the UMTS R4 network? Mention
their functions?(PO1)(Remember)
gin
5. How are higher data rates achieved in the enhanced data rates for GSM
enhancement (EDGE)? Discuss.(PO4)(Analyze) e eri
ng.
6. What are the main functions of UMTS radio access bearer services?
(PO1)(Remember)
n
7. How many types of handoff are possible in UMTS networks? Describe the
basic handoff procedures when mobile terminals move within the RNC?
et
(PO4)(Analyze)
8. How is isolation between users in the downlink accomplished in a WCDMA
system?(PO4)(Analyze)
31
UNIT – V 4G NETWORKS
PART – A
1. What is 4 g? (Remember)
4G is the fourth generation of mobile phone technology and follows on from
ww 2G and 3G. 2G technologies was suitable for making calls and sending text
messages while 3G makes it possible to access the internet more effectively
w.E
through your mobile phone.
En
―true 4G‖ networks have upload and download speeds that are almost identical.
For now, LTE is the fastest connection available for wireless networks.
gin
e
3. What is the difference between 3G and 4G? (Remember)
eri
On the surface, the difference between 3G and 4G is pretty simple. The ―G‖ is
ng.
short for generation, so 3G and 4G represent the third and fourth generations of
mobile broadband Internet. As a rule, provided that you're on the same carrier,
a 4Gconnection will be faster than a 3G one.
ww
w.E
asy
En
gin
e eri
ng.
n et
33
ww
w.E
asy
En
gin
e eri
ng.
n et
8. List the challenges of 4G?(Understand)
High usability: anytime, anywhere, and with any technology
Support for multimedia services at low transmission cost
Personalization
Integrated services
34
w.E
10. What is multi carrier modulation? (Remember)
asy
Multicarrier modulation (MCM) is a derivative of frequency-division
multiplexing. Forms of multicarrier systems are currently used in DSL modems
and digital audio/video broadcast (DAB/DVB). MCM is a baseband process that
En
uses parallel equal bandwidth sub channels to transmit information and is
gin
normally implemented with fast Fourier transform (FFT) techniques.
Resilient to ISI
Resilient to narrow-band effects
Simpler channel equalization
ww (transmitter) and the destination (receiver). The antennas at each end of the
communications circuit are combined to minimize errors and optimize data speed.
w.E
16. What is MIMO support? (Remember)
asy
Multiple-Input Multiple-Output (MIMO) technology is a wireless technology that
uses multiple transmitters and receivers to transfer more data at the same time. All
wireless products with 802.11n support MIMO, which is part of the technology
En
that allows 802.11n to reach much higher speeds than products without 802.11n.
eri
transceiver can intelligently detect which communication channels are in use
and which are not, and instantly move into vacant channels while avoiding
occupied ones.
ng.
18. What is the meaning of cognitive network?(Understand)
In communication networks, cognitive network (CN) is a new type of n
data network that makes use of cutting edge technology from several research
et
areas (i.e. machine learning, knowledge representation,
computer network, network management) to solve some problems
current networks are faced with.
36
PART – B
ww
w.E
1. Define the role of the 4G system.(Remember)
2. Compare the 3G and 4G systems.(Analyze)
asy
3. Discuss multicarrier modulation (MCM).(Understand)
4. What is a multi-input multi-output (MIMO) system? Explain. (Understand)
En
5. How are higher spectral efficiency and increased throughput achieved in the
OFDM-MIMO system?(Analyze)
gin
6. What is the BLAST system? Explain. (Understand)
7. What is the software-defined radio system? (Remember)
8. What is cognitive radio? (Remember)
e eri
9. List some of the new technologies that will be used in the 4G system.
(Understand)
ASSIGNMENT QUESTIONS
ng.
OFDM-MIMO system?(PO4 )(Analyze)
n
1. How are higher spectral efficiency and increased throughput achieved in the
2. What is the driving force for 4G technologies? What basic changes are required
for implementing 4G from 3G networks?(PO1)(Remember )
et
3. Depending on the coverage areas, how many different wireless networks are
defined? Discuss the main features of each network?(PO2)(Analyze)
4. Explain about the Multicarrier modulation techniques?(PO2)(Understand)
5. What is cognitive radio?(PO1) (Remember)
6. List some of the new technologies that will be used in the 4G system.
(PO2)(Understand)
37