PART – A (2 Marks)
i. Bandwidth efficiency, ii. Power efficiency, iii. Out of band radiation, iv.
Resistance to multi path, v. Constant envelope modulation.
In PAM as the signal is through amplitude, the wireless channels suffer amplitude
fluctuations because of fading and near far problems. So PPM is used in wireless
communication instead of PAM.
i. Multiple antennas, ii. Polarization diversity, iii Sectored antennas, iv. Adaptive
angle diversity.
6. Define DFE.
DFE - Decision Feed back Equalizer. This Equalizer is used for multipath fading
channels.
7. Define ACI.
10. What are the sectored antennas? How they are useful in combating
multipath?
A sectored antenna has several sectors each selecting only the signal arriving in
their field of view. A sectored antenna reduces the interference from other users
operating in the same band because it restricts the spatial angle of the arriving
interference signals.
11. What are the popular access schemes for data networks? Classify them.
v. RTS/CTS
12. What is the difference between the access technique of IEEE802.3 and
IEEE802.11?
In voice oriented fixed assignment network, circuit switching is used and delay
cannot be tolerated, but packet loss can be accepted. In data oriented random
access networks, packet switching is used. Here delay can be tolerated but packet
loss cannot be tolerated. As the requirements of data and voice networks differ
their performance evaluations also differ.
CSMA - it is also called as Listen Before Talk. This technique reduces collision
considerably compared to ALOHA, because it senses the availability of the
channel first and then transmits.
In wireless networks, when two terminals are not within the radio range to each
other then they cannot transmit directly. This is called hidden terminal problem.
In FM reception, when we have more than one signal the stronger signal is selected
that is called capture effect.
After sensing a busy channel, if the terminal continues sensing the channel until
the channel becomes free the protocol is called Persistent CSMA.
If After sensing the channel, the terminal attempts another sensing only after a
random waiting period,
In Persistent operation, after the channel becomes free, if the terminal transmits
immediately then the protocol is called 1- Persistent.
In Persistent operation, if it runs a random number generator and based on outcome
transmit its packet with a probability p, it is called p- Persistent.
UNIT II
PART –A (2 Marks)
topology.
ii. Information is transmitted only Store and forward facility is available.
once.
3. Name the five different cell types in the cellular hierarchy and compare
them in terms of
i. Femto cells, ii. Pico cells, iii. Micro cells, iv. Macro cells, v. Mega Cells
4. Why is hexagonal cell shape preferred over square or triangular cell shape
to represent
Because the hexagonal shape has the largest area for a given radius.
5. Name five architecture methods that are used to increase the capacity of an
analog
Cell Splitting: In order to increase the number channels in an area the cells are
splitted into smaller cells. This is called cell slitting.
Cell Sectoring: Cell sectoring is done using directional antennas to increase the
capacity of the cellular system. This method reduces the co channel interference.
Cell Partitioning: This technique increases the network capacity by cell
partitioning. In this method channels are divided among larger macro cell and a
smaller micro cell.
7. Explain how smart antennas can improve the capacity of cellular network.
Space division multiple access (SDMA) is used smart antennas. The directional
antennas are very narrow. SDMA and narrow directional antennas reduce the co
channel interference greatly. The sectored cells also reduce the reuse factor. Thus
the smart antenna improves the capacity of a cellular network.
Allocation
Call setup delay Low Moderate/high
The high traffic cells borrow the channels form the low traffic cells in order to
increase the system capacity. This is called channel borrowing. There are two types
of channel borrowing: i. Static Channel borrowing and ii. Dynamic Channel
borrowing.
Location and Hand off management together are commonly referred to as mobility
management.
i. Blanket paging, ii. Closest – cells first paging, iii. Sequential paging
1. Hard handoff
2. Soft handoff
18. Difference between mobile controlled and mobile assisted hand off?
22. How are public key and secret key algorithms different?
i. Same key is used for encryption Different keys are used for encryption
When the key size is very small, it can be identified by eves by brute force
method.But when key size is large it is very difficult to apply brute force method.
This is used in IS 136 digital TDMA. The network generates a random number and
sends it to the mobile terminal. The mobile terminal computes a value using the
encryption algorithm. The value is transmitted over the air. The network computes
its version of authentication and compares the two values. If the values match, the
mobile terminal is identified.
UNIT III
WIRELESS WAN
PART –A ( 2 Marks)
Similar to computers, we need a set of The physical layer specifies how the
information
instructions and ports to instruct different from different voice and data services
are formatted
elements of the network to perform specific into packets and sent through the
radio channel.
i. Broadcast channels (BCH). ii. Common control Channels (CCCH) & Dedicated
control channels(DCCH).
1. Normal burst,
2. Frequency correction burst,
3. Synchronization burst, iv. Random access burst.
i. Broadcast channels (BCH). ii. Common control Channels (CCCH) & Dedicated
control channels(DCCH).
9. What is IS-95?
11. How many physical channels are available in each IS-95 carrier? What
type of coding
In IS – 95, we have 64 physical channels. Walsh code is used to separate the
channels.
Forward Channels:
i. Pilot channel, ii. Synchronization channel, iii. Paging channel and Traffic
channel
Reverse channels:
i. Access Channel, ii. Traffic channel, iii. Synchronization channel, iv. Paging
channel
13. Difference between Walsh codes used in the forward and reverse channels
of cdma
14. What are the bit rates of the data services supported by IS-95?
In CDMA the interference is from other users transmitting in the same frequency
band at the same time. So in order to avoid near far effect and to maintain a good
link quality it is necessary to control power in CDMA.
16. What forward channels are involved in IS-95 for power control?
17. Why are several pilot channels monitored in IS-95? When does a pilot
channels from a
Several pilot channels are monitored in IS –95 in order to perform handoff. When
the signal strength of the pilot exceeds T-ADD it is transferred to a candidate set.
18. What are the new elements added to the GSM infrastructure to support
GPRS?
GPRS uses the same physical radio channels and only new logical GPRS radio
channels are defined.
In GPRS Point to point communication, there are two types, i. IP – connection less
service, and ii. CLNP Connection oriented onX.25.
The adaptation of GPRS to the IS –136 TDMA cellular standard is called GPRS-
136.It uses 30kHz physical channel instead of 200KHz.
A framing hierarchy is needed to identify the location of certain bursts among the
large stream of bursts that are directed toward different terminals.
24. What are VLR and HLR and why we need them?
VLR- Visitor Location Register, HLR – Home Location Register. They are used
for mobility management.
UNIT IV
WIRELESS LAN
PART –A ( 2 Marks)
1. Name three categories of unlicensed bands used in U.S and compare them
in terms of
ISM Frequencies of operation : 902 –928 MHz, 2.4- 2.4835 GHz, 5.725 – 5.875
GHz.
2. Name the five major challenges for implementation of wireless LANs
compare with one
another.
A wireless local area network (WLAN) links devices via a wireless distribution
method (typically spread-spectrum or OFDM radio), and usually provides a
connection through an access point to the wider internet
Requirements.
5.What is WATM?
Wireless Header ATM header ATM payload Wireless trailer
7. What are the responsibilities of the MAC management sub layer in 802.11?
The responsibilities of the MAC management sub layer are to define the access
mechanisms and packet format, also it provides roaming support,power
management and security.
10. Similarities between the Medium access control of the HIPERLAN-2 and
DECT.
Both MAC layer of HIPERLAN- 2 and DECT use TAMA/TDD access method.
MT –MT peer to peer transmission is also similar in both HIPERLAN- 2 and
DECT.
High performance Radio LAN.It was initiated by RES10 group of ETSI as a PAN
European standard for high speed wireless local network.
13. How many transport channels and logical channels are implemented in the
HIPERLAN-2 DLC layer?
HIPERLAN-2 DLC layer has four transport channels and five logical channels.
UNIT-V
PART –A ( 2 Marks)
2. What is the IEEE 802.15 and what is the relation to the Bluetooth and
homeRF?
The IEEE 802.15 WPAN group is focused on development of standards for short
distance wireless networks used for networking of portable and mobile computing
devices such as PC’s, PDA’s, cell phones, printers, speakers, microphones, and
other consumer electronics. Home RF has a higher data rate than Bluetooth.
1. Master. (M)
2. Slave. (S)
3. Stand By. (SB)
4. Parked or hold. (P)
4. Name the three classes of application that are considered for Bluetooth
technology?
1.
1. Cable replacement.
2. Ad hoc personal network.
3. Integrated AP.
With the paging procedure, an actual connection can be established. The paging
procedure takes a very short time (at most 20 ms) while the inquiry procedure
might cause a significant delay (up to a few seconds on average) The inquiry
message is typically used for finding Bluetooth devices including publicprinters
,fax machines and similar devices with an unknown address.
8. Difference between GPS, wireless cellular assisted GPS, and indoor geo
location
systems.
In a self positioning system the MS locates its own position using measurements of
its distance or its direction from known location of transmitter.
10.What is WPAN?
11.What is Bluetooth?
Bluetooth is an open specification for short range wireless voice and data
communication that was originally developed for cable replacement in personal
area networking to operate all over the world.
13.What is SWAP?
Shared wire access protocol it defines a new common interface that supports
wireless voice and data networking in the home. The SWAP specification is an
extension of DECT for voice and relaxed 802.11 for high speed data applications.