Вы находитесь на странице: 1из 6

B3.

5-R3: Networking And Mobile Comns


Jan04 Overview of Computer Networks 0 Multiple Access Technologies for Wireless Comn 8 Mobile Data Comn 62 Personal Wireless Comn Systems 4 Digital Cellular Systems and Standards (2 G) 9 Third Generation Mobile Services (3 G) 0 Wireless LAN : IEEE 802.11 22 Wireless Application Protocol (WAP) 18 Wireless in Local Loop (WLL) 9 VSAT systems and Networks Security 4 Total 136 Chapter No.
Q. Q.

Jul04 10 0 52 3 17 6 18 8 0 22 136

Jan05 10 23 8 0 31 18 13 24 6 15 148

Jul05 18 22 38 0 24 17 14 22 5 4 164

Jan06 16 28 17 18 31 9 4 9 0 4 136

Jul06 30 10 10 0 24 6 8 24 12 12 136

Jan07 9 18 19 0 23 13 10 21 7 16 136

Jul07 23 19 9 8 10 18 13 19 4 13 136

Jan- Jul- Jan- Jul- Jan- JulTotal 08 08 09 09 10 10 8 35 3 12 15 4 193 21 4 15 4 13 17 202 31 20 29 23 18 18 354 10 15 0 12 12 9 91 15 8 10 22 6 22 252 0 9 15 4 13 0 128 29 30 27 17 25 22 252 12 20 12 24 13 27 253 0 8 0 6 9 4 70 10 4 19 12 12 0 147 136 153 130 136 136 1231942

Q Q. Q. Q. Q. Q. Q. Q. Q. Q. Q. Q. Q Q. Q. Q.

Q. Q. Q. Q.

Chapter-1: Overview of Computer Networks Give an example protocol for each of the following layers in the OSI network stack: MAC, Network, Transport, Session. [4] What are the advantages of a layered protocol design and implementation? Suppose a new link layer technology is invented today, explain, how layering helps in integrating this technology into the current Internet? [4] Can there be a network stack implementation, which does not include all the layers of the OSI reference model? Explain the significance of the word "reference". [2] Explain the relationship between layers at an interface by defining PDU, SDU and IDU. [4] Discuss major advantages and disadvantages of layered model? How many layers are used in mobile comn systems? Name them. [9] What do you understand by broadcast network? Discuss the need for a network layer (OSI layer 3) in a broadcast network. [9] How do the layers of TCP/IP protocol suite correlate to the layers of the OSI? [4] What are connection oriented and connectionless services? What are service primitives? Explain with an example how these are used. [6] Discuss the role of transport layer and data link layer in the OSI model. [6] What is a bridge? Discuss purpose and advantages of a bridge. [4] Explain the terms Attenuation, Delay, distortion and noise. [4] Explain the concept of interfaces and services. What is the relation between Layers at an interface? [4] Discuss the advantages and disadvantages of packet switching over circuit switching? [6] Write short notes on Comparison between OSI reference model and TCP/IP suite [6] Write short notes on Traditional & mobile transport layer [6] Explain the data transfer services that OSI defines for the discrete data components passed across the interface and between peer entities. [9] What are the types of care-of-address in mobile IP? [4]] Mobile IP provides the ability of a host to stay connected to the internet regardless of their location and without needing to change the mobile hosts long-term IP address. Explain Mobile IP operation with suitable diagrams. [9] OSI is widely used for comn standard. What are Interface Data Unit, Service Data Unit and Protocol Data Unit with reference to OSI model? [6] How does LLC sublayer ensure to transport efficiently multimedia traffic over the radio interface? [4] What are the classes of IP addressing scheme and how many Nos of host-IDs and network IDs are there in each class? [4] Explain the data transfer services that OSI defines for the discrete data components passed across the interface and between peer entities. [10]

Q. What is a Broadcast Network? What is the significance of network layer in broadcast network? b) Explain the OSI model in detail. [9+9] Q. What is a Protocol Data Unit? List and explain its fours fields. [3] Q. Why is standard TCP not adequate for mobile wireless network? [4] Q. Discuss the role of sessions layer in the OSI model. [4] Q. Discuss functionality of Physical and MAC layers. [9] Q. In context of OSI model, illustrate relationship amongst PDUs, SDUs and IDUs. [6] Chapter-2: Multiple Access Technologies for Wireless Comn Q. Is it possible to transmit a digital signal e.g. coded as square wave as used inside a computer using radio transmission without any loss? If yes, how and why? [4] Q What limits the number of simultaneous users In a TDM/FDM system compared to a CDMA system? What happens to the transmission quality of connections if the load gets higher in a cell? How does an additional user Influence the other users in the cell? [4] Q. Give four reasons for the failure of many MAC layer (used in wired networks) protocols being applied to wireless networks. [4] Q. What is QPSK? How is it used in CDMA? [4] Q. Explain, how does Slotted ALOHA work? Compare and contrast the basic MAC technologies used in FDMA, TDMA and CDMA. [9] Q. Write short notes on Efficient frequency utilization techniques employed in mobile comns. [6] Q. For a cluster of size N, how many total channels are available if each cell is allocated a group of k channel in a Cellular System using FDMA? [4] Q. Discuss the problems of hidden and exposed terminals. What happens in the case of such terminals if ALOHA, slotted ALOHA or MACA is used? [9] Q. Briefly discuss the operation of a CDMA multiple-access system. In what ways is it superior to TDMA? Mention the potential applications of CDMA. [9] Q. Compare the performance of slotted aloha with that of pure aloha. What is the limitation of aloha protocol in general? [4] Q. What is spread spectrum comn. Explain the terms processing gain, pseudo random code generator and Walsch code. [6] Q. Draw detailed block diagram of a cellular system and explain. [9] Q. What is frequency management? Discuss different fixed channel assignment strategies. What are its limitations are compared to non-fixed channel assignment methods. [9] Q. What are the various multiple access technologies for Cellular Systems? Explain any one of them. [4] Q. i) What is the maximum throughput of a pure ALOHA network with large number of users and transmission rate of 1 Mbps? ii) What is the throughput of a TDMA network with transmission rate of 1 Mbps?

Q. Q. Q. Q. Q.

Q. Q. Q. Q. Q. Q. Q. Q. Q. Q. Q. Q. Q.

What is the throughput of the ALOHA network if only one user was effective with transmission rate of 1 Mbps? [6] How does CDMA system use signals that arrive in the receivers with different time delays? [4] What are the various strategies implemented to avoid interferences in TDMA, FDMA & CDMA systems. [5] Discuss the problems of hidden and exposed terminals. What happens in the case of such terminals if ALOHA, slotted ALOHO or MACA is used? [9] Time Division Multiple Access is a technique of transmitting / receiving data between two devices. How is data transferred in TDMA? [4] A pure ALOHA system used packets of size 1000 bits and channel transmission rate of 10 Mbps. The packet generation is a Poisson process with average rate of 103 packets/sec. Obtained the normalization throughput. [9] How is spread spectrum implemented by using frequency hopping? [6] A pure ALOHA network transmits 200-bit frames on a shared channel of 200 kbps. What is the throughput if the system (all stations together) produces 1000 frames? [6] Briefly discuss the operation of a CDMA multiple access system. In what ways it is superior to TDMA? Mention the potential application of CDMA. [9] Differentiate between slotted ALOHA and Pure ALOHA? Discuss the limitation of pure ALOHA. [6] Determine the maximum throughput that can be achieved using ALOHA and slotted ALOHA. [4] If a US AMPS Cellular operator is allocated 12 MHz for each simplex band and if Bt is 12 MHz, Bguard is 10 KHz and Bc is 30 KHz, find the number of channels available in FDM system. [9] Explain pure ALOHA and slotted ALOHA with their usage in mobile comn system. [6] Discuss slotted ALOHA in detail. Under what conditions ALOHA method fails and what are the possible solutions for the same.[4] Why is throughput higher in slotted ALOHA in comparison to pure ALOHA? [4] How do TDMA, FDMA and CDMA work? Compare the capacities of these three technologies [9] Show the block schematic diagram of a direct sequence CDMA receiver. [4] Explain and illustrate TDMA technique. What are the limitations of TDMA systems? [9] In a slotted ALOHA find the load to obtain the maximum throughput. [4] Chapter-3: Mobile Data Comn Why is frequency reuse necessary in cellular telephony? Find out the expression for frequency reuse. [4] Sometimes when a cellular user crosses the boundary from one cell to another, the current call is abruptly terminated, even though all transmitters and receivers are functioning perfectly. Why? [4] What are the main problems of signal propagation? Why do radio waves not always follow a straight line? Why Is reflection both useful and harmful? [9] Discuss the following techniques used to improve capacity in cellular system: i) Cell Splitting ii) Sectoring. Which technique Is more efficient and why? [9] Explain various channel assignment strategies used in cellular comn. Describe how a mobile to wire line call is established in cellular radio system. [9] Determine the number of full duplex channels available in a cluster and the total capacity for a cellular system where there are 10 clusters, each containing 20 cells with 18 channels in each cell. Also, determine the co-channel reuse ratio for each cluster. [9] Describe the handoff feature in a cellular radio system. Explain the difference between soft and hard handoff. [10] What is co-channel interference? List various strategies to reduce co-channel interference. Explain any two in detail. [8]

iii)

Q. Q. Q. Q. Q. b)

Q. Q.

Q. What are the different ways in which radio waves can propagate? Mention the role of the radio wavelength where it is relevant. What causes multi-path interference? [4] Q. Briefly mention as to why control channels are required between a BTS and a mobile. What is the control channel used by the BTS for passing information regarding the cell parameters? What is the control channel used to find out if a particular mobile is present in a cell? [3] b) Which control channel is used for setting up a mobile originated call? Why is collision between multiple mobiles possible in this case? What is the multiple-access protocol used? How is the Access Grant Channel (AGCH) used to reduce the number of collisions? [5] Q. What is the need of a Fast Associated Dedicated Control Channel (FACCH)? How is FACCH implemented? When is it used? [3] Q. Suppose that you have a simple packet switched network with three nodes A, Band C connected as A-B-C, with B acting as a router for packets between A and C. Suppose that both links A-B and B-C have a capacity of B bytes/sec. The packets from A to C have a payload size of P bytes and a header size of 40 bytes. What is the maximum throughput possible' between A and C in terms of P and B? [2] (a) What is the latency experienced by packets between A and C? Assume that the propagation delays are negligible. [1] (b) Suppose now that each payload is split into two fragments of (P/2) bytes each. Each fragment thus has a separate header. What is the maximum throughput possible in this scenario? [2] (c) In the same fragmentation scenario as above, what is the latency seen by packets between A and C (compute the latency of packets, not each of the fragments). [3] (d) By comparing your answers in parts (d) and (f) above, determine the value of payload size P for which the latency is the same even after fragmentation. How do the two latencies compare for lower values of P than what you determined for higher values of P? [4] Q. While measuring the signal strength to decide whether or not to handoff to an adjacent cell, why is it important to average over time? Is soft-handoff possible in a GSM network? Why or why not? [2] Q. What is ping-ponging effect in hand off? Does it occur in softhandoff or hard-handoff? How can it be prevented? [5] Q. Differentiate between terminal mobility, personal mobility and service portability with a brief explanation for each. [6] Q. What is the difference between error-detection and errorcorrection? Which requires more overheads? [2] Q. What is Hamming distance? Suppose the Hamming distance between two codewords in an error-correcting scheme is 4, how many bit errors can this scheme correct? Why? [3] Q. What are the trade-offs in the use of error-correcting codes as opposed to using ARQ? For what kind of applications is an error correcting code more appropriate? [3] f) What is an error burst? Explain, how this can be countered using block interleaving. [4] Q. Give the relations to calculate transmitted power and co-channel reuse distance of wireless cellular systems. [4] Q. Explain the terms Handoff mechanism and Cell splitting. [4] Q. Find the co-channel reuse ratio Q if the cluster size N is 9. [4] Q. What is the difference between inter-cell handoff and intra-cell handoff? [4] f) Assume all stations can hear all other stations. One station wants to transmit and senses the carrier idle. Why can a collision still occur after the start of transmission? [4] Q. Differentiate between Circuit Switched Data Services and Packet Switched Data Services on Cellular Networks. [9]R7 Q. Discuss the make-before-break and break-before-make handoff procedures. Propose methods that could be used by a base station to determine the vehicular speed of a mobile user. Are these methods useful for handoff algorithms? [9] Q. What are the factions that influence small scale fading? What causes multipath fading? How can Multipath fading be reduced [8] Q. Explain the concepts of handoff and dropped call rate. What are

Q. Q. Q.

Q.

Q. Q. Q. Q. Q. Q. Q. b) Q. Q. Q. Q. Q. Q. Q. Q. Q. Q. Q.

soft and hard handoffs. [4] What are mobile data comn services and name them. Describe the architecture of HSCSD (High Speed Circuit Switched Data). [9] Explain the Circuit-Switched Data Services on Analog Cellular Networks. [4] If 20 (30) (50) MHz of total spectrum is allocated for a duplex wireless cellular system, with Simplex channel has 25 (35) (30) KHz RF bandwidth, find No of duplex channels and No of channels per cell site, if N=12 (12) (7) cell reuse is used. [4] A network is to be planned using cellular topology. If total available bandwidth is 25MHz and each user requires 30KHz bandwidth for voice comn. 20 lower power antennas are used and the frequency band is divided in to four sets and one set is assigned to each cell. Find the number of simultaneous users. [6] For a cluster of size N, how many total channels are available if each cell is allocated a group of k channel is a Cellular System using FDMA? [6] Cellular Digital Packet Data (CDPD) was designed to maximize the use of existing functions and capabilities in Analog Mobile Phone System. Explain CDPD network architecture. [9] List four significant factors which influence the choice of speechcoders in mobile comn. Which factor influences more as per your opinion? Give reasons. [4] Explain the architecture and features of SMS. [4] What is channelization? Explain at least two channelization protocols in detail? [9] Explain small scale multipath propagation. Discuss the factors that influence small scale fading. [5] What are the advantages and disadvantages of cellular systems with small cells? [4] Name the three basic propagation mechanisms which impact propagation in a mobile comn system. When do they occur? [4] What is Handoff and roaming? How is handoff performed during roaming? [4] Draw and discuss the conceptual model of operation of MTSO. Give its role in providing Mobile services. [4] Explain frequency reuse in Cellular Comns. What are the advantages of this approach? List different frequency reuses schemes and explains any one of them. [9] Explain the concepts of handoff and dropped call rate. What is queuing and how does it help in reducing the call drop rate and blocking rate. [4] Compare between the omni directional and directional models in creating cellular structures. Suggest the best model for handling dynamically changing traffic patterns. [9] Explain Circuit switching technique using a diagram. [4] Using appropriate diagrams, explain hard and soft hand-off in cellular comn systems. [4] How is channel bandwidth affected by multipath and Doppler spread in mobile comns? [4] Explain Mobile Assisted hand-off and Mobile Controlled hand-off strategies for hand-off detection. [6] What are the reasons of fading in cellular mobile comn? [4 How are handoffs in cellular mobile comn affected by handoff threshold and minimum acceptable signal level? Illustrate Hard Handoff and Soft Handoff in cellular mobile comn systems. [9]

Q. Q. Q. Q. Q. Q. Q. Q. Q.

Describe Digital Enhanced Cordless Telecomn system and the protocol architecture. [8] What are the data and messaging services supported by Personal Access Comn System (PACS)? Explain briefly. [4] What are the application areas of DECT? Discuss the conceptual model of DECT in brief. [6] What do you mean by DECT? Explain its system architecture. [6] Discuss the general system features of personal access comn system. [9] What are the key features of DECT logical channels? Explain them briefly. [6] What is PACS? Discuss its frame structure and radio aspects. [6] Explain the architecture of Personal Comn System? Compute the uplink and downlink information data rates in this system. [12] How do signaling and application processes interact with layers in DECT protocol? What type of multiple access is used in DECT and how? [9] Chapter-5: Digital Cellular Systems and Standards (2G)

Q. Q. Q. Q. Q.

Q. Describe the GPRS architecture and protocols. How many of them already exist In GSM? Compare the channel request procedure in GPRS with that in GSM. [9] Q. Both GSM and DECT are digital wireless comn standards for voice. What is the difference in terms of the intended coverage area and mobility supported by the two? Which one of them defines detailed network architecture for roaming across various providers' networks? [4] Q. Draw the GPRS architecture showing the main components. Which is the component responsible for assignment of an IP address to the mobile? Why does there need to be a mapping between the mobile's IMSI and its IP address? [7] Q. GSM uses the SIM card to identify a particular user. The user can use the same SIM card on any cellular phone. Is this an example of terminal mobility or personal mobility? Why? [2] Q. Which is the 2G technology, which uses CDMA? How do the three CDMA variants 1XMC, 3XMC and HDR differ in terms of bandwidth usage? [4] Q Draw the CDMA based mobile system architecture and explain how it provides reliable basic phone services. Write the benefits of CDMA to users. [9] Q Draw the basic reference architecture and signaling interfaces of GSM. Why SIM card needed in GSM, while it is not required in AMPS? [9] b) How do you compare AMPS (DAMPS) and GSM systems in terms of coverage area, transmitted power and error control system? Explain, what you can do to address adjacent channel and co-channel interference. [9] Q. If 8 speech channels are supported on a single radio channel and if no guard band is assumed, what is the number of simultaneous users that can be accommodated in GSM? [9] Q. Discuss the GSM Reference Architecture in detail. What is the function of the following: i) Mobile Station (MS) ii) Base Station System (BSS) iii) HLR iv) VLR Chapter-4: Personal Wireless Comn Systems v) Authentication Centre [10] What is likely to happen to a DECT if it is deployed outdoors in an Q. Write short note on GPRS Architecture [5] environment where significant multipath could occur? Explain your Q. Compare and contrast the various 2.5G technology paths that answer and provide qualitative analysis. [4] each of the major 2G standards provide. Which path has the What is the role of the unique personal number in Universal highest Internet access speed? [4] Personal Telecomns (UPT)? [3] Q. What are the main elements of GSM System architecture? Draw and discuss the conceptual model of DECT (Digital Discuss the reasons of separate MS and SIM in GSM. [6] European Cordless Telephone). Give its application areas. [4] Q. Using QPSK modulation and convolutional coding, the IS-95 Give an account of radio specifications for cordless telecomn digital cellular systems require 3dB < Sr < 9 dB. The systems such as CT2and DECT. [6] bandwidth of the channel is 1.25 MHz., and the transmission Draw and explain the functional architecture for PACS (Personal rate is R = 9600 bps. Find the capacity of a single cell IS-95 Access Comn System). Discuss the frame structure and its radio cell. [6] aspects. [8] Q. What is GPRS? Describe GPRS architecture and protocols. [12] Q. In each GSM multi frame, 24 frames are used for traffic and two

Q. c) Q. b) Q.

Q. Q. Q. Q.

Q. Q. Q. Q. Q.

for associated control signaling. Considering the detailed burst frame and multi frames infrastructures, explain, how the effective transmission rate for each GSM voice traffic is 22.8 kbps. [4] How is signaling protocol in GSM structured into layers? What are the specific functions performed by Layer 3 of the GSM signaling protocol? [9] If a normal GSM time slot consists of six trailing bits, 8.25 guard bits, 26 trailing bits and two traffic bursts of 58 bits of data, find the frame efficiency. [4] General Packet Radio System is radio access technology and provides packet data service. Explain the protocol architecture. [5] Explain GSM architecture and frequency planning. [5] If GSM uses a frame structure where each frame consists of eight time frame slots, and each time slot contains 156.25 bits, and data is transmitted at 270.833 kbps in the channel. Find i) The time duration of a bit ii) The time duration of a slot iii) The time duration of frame. [6] Explain the typical call flow sequences in GSM. [9] Explain briefly SMS with security aspects for secure SMS? [4] Discuss the basic architecture of GPRS and explain, how it is used to enhance data rates in a GSM system. [6] What are the factors that determine the need for power control and the amount of power adjustment for a mobile unit in comn with a base station? How is power control effective in reducing interferences? [7] How is the problem of adjacent and co-channel interference handled in GSM systems? [6] Name the main elements of the GSM System architecture and describe their functions in brief. [6] How is GPRS different from GSM? [4] Show the frequency allocation plan and explain frame and multiframe in GSM systems. [9] Why is power control necessary in CDMA systems but not in GSM systems? Justify your answer using multiplexing schemes. [9] Chapter-6: Third Generation Mobile Services (3G) Give an application as an example, which will find use for the "streaming" class of QoS offered by UMTS. Also give an example application for the "interactive" class. Which 2.5G architecture is the UMTS core network based on? [4] What is W-CDMA? What are its advantages over TDMA? [2] What are the bandwidths and chip rates used in CDMA? Why does WCDMA use walsh codes in forward and reverse channels for separating users while in CDMA, one uses them only in forward channel. Assume we want to support a 19.2 kbps data service with ber (bit error rate) of 10 -3 over WCDMA system. What is the minimum chip rate and bandwidth needed to support 100 simultaneous users with one carrier? Assume a performance improvement factor of K = 4(6dB). [9] Explain various key characteristics that distinguish third generation cellular systems from second-generation cellular systems. [9] Differentiate between W-CDMA and CDMA-2000 mobile services and standards. [8] With the help of a neat diagram explain the UMTS (Universal Mobile Telecomn System) network architecture. Discuss in detail the logical parts: I) user equipment and ii) core network. How is the number of handoffs reduced of r the fast moving traffic? [9] What are the key features of IMT-2000? What are the general requirements for Radio Access to IMT-2000? [6] Compare and contrast the various 2.5G technology paths that each of the major 2G standards provide. Which path has the highest Internet access speed? [4] How does UMTS implement asymmetrical comn and different data rates? [9] Describe Functional Network Architecture for IMT-2000. What are the general requirements for IMT 2000? [9] What are the key features of IS-95 CDMA System? Comment on the capability of CDMA systems. [9] Explain the functional Network Architecture of IMT-2000. [9]

Q. How do the third generation cellular systems differ from second generation cellular systems? [6] Q. What are the general requirements for Radio Access to IMT2000? Discuss the evaluation and specification process for IMT2000 radio access technologies. [9] Q. What are the key issues in 3G technologies? How are they resolved? [4] Q. Discuss the Quality of Service issue in 3G. [4] Q. Write the main features of 3rd Generation Mobile Phone Systems. How do they achieve higher capacities and higher data rates? [9] Chapter-7: Wireless LAN : IEEE 802.11 Q. How does IEEE 802.11 solve the hidden terminal problem? [4] Q. What are the basic differences between wireless WANs and WLANs and what are the common features? Consider mode of operation, administration, frequencies, capabilities of nodes, services and national /internatlonal regulations for comparison. [9] Q. What are advantages and problem of forwarding mechanisms in ad hoc networks regarding security, power saving and network stability? [9] Q. What is the difference between a LAN and a PAN? Why is 802.11 inappropriate for a PAN? [3] Q. The hidden-node problem is specific to wireless networks and no such problem exists in wired LANs. Why? [2] Q. What is narrow-band interference? Why is this to be avoided? What are the two spreading techniques in 802.11 to avoid this? Briefly explain how each of them work. Mention the modulation scheme used by each. Draw the transmit spectrum before and after spreading for each of the two techniques. [10] Q. In an 802.11 system implementing CSMA/CA, suppose the physical layer header size is H and the MAC/Link layer header size is M. Further, a stop-and-wait protocol is used at the link layer, with the acknowledgement packet size being A (including all headers). The size of RTS and CTS packets (including all headers) are Rand C respectively. For a MAC-level payload size of P, what is the throughput achieved as a fraction of the raw physical layer throughput? (Assume that all portions of the packet and the headers are all transmitted at the same speed). [3] Q. Name four major transmission techniques considered for WLAN standards and give the standard activity associated with each of them. [4] Q. What are the advantages and problems of forwarding mechanisms in adhoc networks regarding security, power saving and network stability? Describe briefly infrastructure requirements of adhoc networks. [9] Q. Discuss the working of adhoc WLANs. Under what circumstances ad-hoc networks are preferred over Infrastructure WLAN? [9] Q. Write short notes ) FHSS vs. DSSS. [5] Q. Draw and explain the wireless LAN architecture and also explain the terms infrastructure mode and Adhoc mode. [4] Q. What are the benefits of spread spectrum? What is frequencyhopping spread spectrum? [4] Q. If a computer is connected to a wireless LAN then it can communicate with the Computers in wired LAN. Is the statement true? Justify by giving reasons. [4] Q. Why do we need different MAC schemes for wireless LANS? Explain briefly the hidden and exposed terminal problem associated with CSMA/CD. [6] Q. In context of Wireless Local Area Network give difference between ad-hoc Wireless LAN and Infrastructure Wireless LAN. [4] Q. Explain the operation of MACAW protocol in WLANS. [9] Q. Differentiate between Direct Sequence and Frequency Hopping spread spectrum techniques. [4] Q. Discuss advantages and disadvantages of Ad-Hoc Networks. [4] Q. Discuss the advantages of WLAN. What are its disadvantages? What are design goals for WLANS? [6] Q. What are the limitations in wireless networking? Discuss the security issues in wireless networks. [6] Q. Explain, how MACAW protocol is operated in WLANS? [9] Q. What are the reasons for the use of infrared transmission for

Q.

Q. b)

Q. Q. Q.

Q. Q. Q. Q. Q. Q.

WLANs? [4] Q. Discuss the benefits of spread spectrum system? How the spread spectrum can be achieved? [6] c) Discuss the basic differences and similarities between wireless WAN and WLAN. [4] Q. Discuss the problems and advantages of forwarding mechanisms in ad-hoc networks regarding security, power saving and network stability. [6] Q. What are the requirements for a mobile IP? What are the entities for mobile IP? Explain how data is transferred from a mobile node to a fixed node. [10] Q. Differentiate between Narrow Band System and Broad Band System. [4] Q. The MAC protocol for the wired network cannot be used for wireless. Is the statement true or false? Justify your answer. [4] Q. Explain Ad-Hoc Network Topology. Compare the Ad-Hoc Topology with Infrastructure Topology. [4] Q. Explain the following terms: i) Processing Gain ii) Pseudo random code generator iii) Walsh code [6] Q. Name the layers specified by IEEE 802.11 standard. Discuss role of these layers. [6] Q. Write short notes on Direct Sequence Spread Technology & Frequency Hopping Spread Spectrum Technology. [9] Q. What is FHSS and how is it different from DSSS? Can they be used simultaneously? [4] Q. Explain the difference between slow FHSS and fast FHSS. Explain the terms processing gain, pseudo random code generator and Walsh code. [7] Q. What is the hidden node problem in wireless LANs? [6] Q. List and briefly discuss transmissions techniques for infrared LANs. [4] Q. Explain Frequency-hopping spread spectrum and Direct Sequence spread spectrum techniques. [9] Q. What are the advantages of Wireless LANs? Explain the architecture of infrastructure-based Wireless LANs. [6] Q. Why are RTS and CTS packets used in IEEE 802.11 WLAN protocol? Explain using diagrams. [6] Q. Why is CSMA/CD not useful in WLANs? [4] Q. Differentiate between slow and fast frequency hopping. How is a frequency hopping system implemented and provides antijamming capability? [9] Q. Use appropriate diagrams, illustrate all the events in IEEE 802.11 protocol for mobile adhoc WLANs. What is the use of RTS-CTS exchange in the above protocol? [9] Q. Q.

Q. Q. Q. Q. Q. Q. g) Q.

Q. Write short notes on Blue-tooth Protocol stock [5] Q. Draw and explain the WAP network configuration. Also discuss the WAP protocol stack. [9] Q. What is mobile IP? Draw & describe the mobile IP architecture and its functional components. [12] Q. Explain each of the following in detail with reference to WAP: i) Wireless Datagram Protocol ii) Wireless Transaction Protocol iii) Wireless Session Protocol [6] Q. Why do not other RF (Radio Frequency) devices interfere with Bluetooth Devices? [4] b) How does a WAP Gateways act as a bridge between the mobile world and the Internet? [4] Q. What is mobile IP? Explain with help of a neat diagram how a mobile user remains on line irrespective of his current posn. [9] Q. Explain briefly types of links available with Bluetooth network. [4] Q. Wireless Markup Language (WML) is optimized for limited capability devices and networks. Describe WML constrains, features and document model? [6] Q. Bluetooth is aimed for ad-hoc network with a very limited coverage and without need for an infrastructure. Explain its Physical and Medium Access Control Layers. [9] Q. What is a Bluetooth technology? Discuss the different layers that Bluetooth uses. [4] Q. Differentiate between: i) Wireless Datagram Protocol & Wireless Transaction Protocol ii) Wireless Session Protocol & Wireless Application Environment [8] Q. What is a WAP gateway? Discuss its important functions.[4] Q. Compare and contrast Bluetooth with HIPERLAN. [6] Q. What are the requirements for a mobile IP? What are the entities for mobile IP? Explain how data is transferred from a mobile node to a fixed node. [10] Q. What are the reasons for WAP defining its own security layers? Discuss the important function of WSP and WAE. [6] Q. What is the function of a WAP gateway? Discuss WAP protocols [6] Q. Why does WAP defines its own security layers and does not rely on the security provided by the mobile phone network? Discuss the important functions of WSP and WAE. [9] Q. What frequency range(s) is/are used for the IEEE 802.11 and Bluetooth wireless network standards, and why? [6] Q. What is Wireless Markup language and mentions their features? Chapter-8: Wireless Application Protocol (WAP) [4] What is the fundamental difference between WML and HTML? Q. Describe Bluetooth architecture and protocol? Also discuss its Why is this difference important with respect to hand held limitations. [9] devices? [10] Q. Discuss Bluetooth Protocol and show its architecture. [9] What are the primary goals of the WAP Forum efforts and how are Q. What is the need for mobile IP and how is it implemented? [9] they reflected In the WAP protocol architecture? In which situation Q. Discuss the components and architecture in Wireless Access is WTP not used? What are the disadvantages of implementing Protocol (WAP). How does an application use WAP which requires TCP/IP directly over the mobile network? [8] reliability but no security? [9] How can a Bluetooth network have more than 8 nodes? Draw such a network with 10 nodes and clearly mark the different nodes Chapter-9: WLL and parts of the network. [4] Q. Describe four major technologies for WLL system. What are What is the functionality of the WAP gateway? Why is this the advantages and disadvantages of these approaches? What functionality required? Draw a simple diagram showing how the are the benefits of using 15-95 CDMA technology for WLL? [9] WAP gateway interfaces with wireless devices. [4] Q. Write short notes on WLL. [6] Explain WAP stack. Prove that WAP session protocol and WAP Q. Write short notes on WLL Architecture [5] transaction protocol over UDP conserves bandwidth as compared Q. Discuss the deployment issues with WLL. Explain Satellite based to TCP over IP. [9] technology for WLL Systems. [12] How Internet may be supported on mobile links. Draw the Q. What are the factors that govern use and reuse of spectrum for architecture & functional components of mobile IP. Describe data WiLL? How does modulation efficiency influence use and reuse of transfer from a mobile node to a fixed node and vice-versa. [9] spectrum? [7] Write short notes on Wireless markup language. [6] Q. What are the benefits of using WLL Technologies in broadband What is the fundamental difference between WML and HTML? [4] wireless access radio in loop? [4] What are the important functions of a WAP Gateway? [4] Q. Write a note on WLL technologies. Describe cellular based systems Why does WAP define its own security layers and does not rely on in detail. [6] the security provided by the mobile phone network? Discuss the Q. List and describe major technologies for WLL Systems. [9] important functions WSP and WAE. [9] Q. Show the main modules in the WLL reference model [4]

Chapter-10: VSAT systems and Networks Security Q. Why does VSAT operate at slow data rates? [4] Q. Why is security in a wireless network a greater concern than in wired networks? Describe what is meant by authentication and point out how is it different from data protection through encryption? [4] Q. What is a VSAT? What are its two main modules in instln and their functionalities? What are some advantages of using a VSAT? [6] Q. Depict the star topology of VSAT architecture in a simple diagram. Explain, how the latency of comn between two VSAT nodes could be high in this configuration. For what kinds of applications is this inappropriate? [4] Q. How does a mesh topology differ from a star topology? What is its advantage over a star topology? [2] Q. What is the main difference between TDMA and DAMA access methods for VSATs? Which is better in terms of cost and why? [3] Q. Explain, how VSATs can be used for one-way data systems (only the downlink). For what application is this useful and why? [3] Q. What are four aspects of Network security? Explain why public key encryption requires fewer keys than secret key encryption. Given two prime numbers p= 37 and q=23, define the private and public key by soliciting appropriate value of the number e. [9] Q. Write short notes on VSAT Access Schemes. [6] Q. Which topology is generally deployed by VSATs and why? [4] Q. What is VSAT? Give the components of VSAT systems. [4] Q. What are the security requirements of wireless networks? [6] Q. What is VSAT? What are the services supported by VSAT networks? [6] Q. Why is TDM/TDMA technology widely used in most of the VSATs installed globally? How can the frequency carrier be assigned between any two VSATs on a demand basis? [6] Q. Explain how VSATs can be used for one-way data systems (only the downlink). For what application is this useful and why? [3] Q. Explain why public key encryption requires fewer keys than secret key encryption. Given two prime numbers p= 37 and q=23, define the private and public key by soliciting appropriate value of the number e. [7] Q. What are the basic problems which need to be addressed in VSAT networks? [4] Q. Very Small Aperture Terminal (VSAT) in a satellite comn functions is an overhead wireless repeater station that provides a microwave comn link between two geographically remote sites. Specify the operation of VAST networks. Give suitable examples. [9] Q. Discuss the advantages and disadvantages of VSAT networks. Explain the operation of VSAT. [10] Q. VSAT operates at slow data rates. Justify the statement by giving reasons. [4] Q. Discuss goals of cryptography. What is Cryptosystem and Encryption? [4] Q. What are the different ways in which secret keys can be distributed to two different communicating parties? [6] Q. Which technology is generally used in most of VSATs installed globally? What are reasons of using it? How can frequency carrier be assigned between any two VSATs on a demand basis? [9] Q. topology is generally deployed by VSAT and why? Under what condition is VSAT advantageous over competing technologies? [6] Q. Discuss the various options for security in wireless comn. What are public key and private key algorithms? [6] Q. Describe RSA algorithm. How is it more secure then other symmetric key encryption techniques? [6] Q. What is a VSAT? What are the different VSAT transmission methods? [6] Q. Show the schematic diagram of a VSAT network. [4]

Вам также может понравиться