Sunteți pe pagina 1din 23

EC8004 WIRELESS NETWORKS

UNIT – I WIRELESS LAN


2 MARK QUESTIONS:

1) What are the principles are used in wireless communication?


Wireless communication is based on the principle of broadcast and reception of
electromagnetic waves.

2) What is meant by wireless networks?


On wireless networks, electromagnetic radio waves are used for communication (exchange of
information).

3) What is meant by Reflection?


When the propagating radio wave hits an object which is very large compared to its
wavelength.

4) Define diffraction?
This propagation effect is undergone by a wave when it hits an impenetrable object. The
wave bends at the edges of the object, thereby propagating in different directions. This phenomenon is
termed as diffraction.

5) What is the difference between wired and wireless networks?


A Wired medium can provide reliable, guided link which conducts an electric signal
associated with the transmission of information from one fixed terminal to another
The wireless network is unreliable. It has a low bandwidth. It supports mobility.
Wireless transmission share the same medium which is nothing but air.

6) List out the types of WLAN? April/May-2010


WLANs can be classified into two types.
1. Infrastructure networks.(having fixed infrastructure)
2. Ad hoc LANS. (No need of having fixed infrastructure)

7) What is meant by hidden terminal problem?


The hidden terminal problem is a major problem that is observed in wireless networks.
This is a classic example s of problems arising due to incomplete topology information in wireless
networks. That was maintained initially.

8) What is meant by virtual carrier sensing?


The usage of RTS-CTS the dialogue before data packed transmission is a form of
virtual carrier sensing.

9) What is meant by Bit error rates and how it will be reduced?


Bit error rates in the wireless medium are much higher than in other media. The bit error rate in fiber
optics is only about 10-9 whereas in wireless as large as 10-4 one way of decreasing the frame error rate
is using by shorter frames.

1
10) Define roaming?
Roaming refers to providing uninterrupted service when the user walks around with a
wireless station when the station realizes that the quality of the current link is poor, it starts scanning
for another AP. This scanning can be done in two ways.
1. Active scanning
2. Passive scanning.
11) What is meant by Wireless sensor networks?
It is highly distributed networks of small, lightweight wireless nodes, deployed in large
numbers to monitor the environment or system by the measurement of physical parameters such as
temperature, pressure or relative humidity.

12) List the comparison with AD HOC wireless networks and sensor networks?
The both consist of wireless nodes communicating with each other, there are certain
challenges posed by sensor networks. The number nodes in a sensor network can be several orders of
magnetic larger than the number of nodes in an ad hoc network.
13) What are the applications of sensor networks?
Military applications, environment application, patient diagnosis and monitoring,
monitor their physiological data, office buildings.

14) What is meant by flooding?


In flooding, each node which receives a packet broadcast it if the maximum hop-count
of the packet is not reached and the node itself is not the destination of the packet.

15) Define gossiping?


It is a modified version of flooding , where the nodes do not broadcast a packet, but
send it to a randomly selected neighbor. This avoids the problems of implosion.

16) What is meant by rumor routing?


It is an agent –based path creation algorithm. Agents or ants are long-lived entities
created at random by nodes.

17) Define exposure?


It is defined as the expected ability of observing a target in the sensor field. It is
formally defined as the integral of the sensing function on a path from source node Ps to destination
node Pd.

18) Define optical wireless networks?


It enables communication using infrared rays and light waves operating at frequencies
well beyond the visible spectrum for high data rate local communication. Optical wireless
communication technology exhibits a number of properties that makes it a suitable alternative to
indoor RF communication.

19) What is Optical wireless WDM? (APR/MAY 2013)


The use of wireless division multiplexing (WDM), which is a method of sending many
light beams of different wavelengths simultaneously down the core of an optical fiber, has been
successful in utilizing the tremendous bandwidth offered by the optical fiber.

2
20) Define Scattering?
When the wave travels through a medium, which contains many objects with dimensions small
when compared to its wavelength, scattering occurs. The wave gets scattered into several weaker
outgoing signals.
21) List out the factors that restrict the range, data rate, reliability of the wireless
transmission? (Or) List out the characteristics of the wireless communication?
Path loss, interference and blockage.

22) Define Path loss?


Path loss can be expressed as the ratio of the power of the transmitted signal to the power of the
same signal received by the receiver, on a given path. It is a function of the propagation distance.
Estimation of path loss is very important for designing and deploying wireless communication
networks.

23) What is meant by free space propagation model?


It is the simplest path loss model in which there is a direct path signal between the transmitter
and receiver, with no atmospheric attenuation or multipath components, the relation between the
transmitter power and receiver power is given by
Pr = Pt Gt Gr(λ/4л d)2
Pt Pr = transmitter & receiver power
Gt Gr = transmitter & receiver antenna gains
d = distance between transmitter and receiver.
Λ = c/f

24) Define Two ray model or two path model? May/June-2012, APR/MAY 2013
This model assumes that the signal reaches the receiver through two paths , one a line-of-sight
path and the other path through which the reflected wave is received, the relation between the
transmitter power and receiver power is given by
Pr = Pt Gt Gr (ht hr/ d2)2

Pt ,Pr = transmitter & receiver power Gt , Gr = transmitter & receiver antenna gains
ht , hr = heights of the transmitter & receiver d = distance between transmitter and receiver.
25) Define fading and give their types?
Fading refers to the fluctuations in signal strength at the receiver. Fading can be classified into
two types
1. fast/small scale fading
2. slow/large scale fading

26) Define Fast fading?


It is defined as the rapid fluctuations in the amplitude, phase or multipath delays of the received
signal, due to the interference between multipath versions of the transmitted signal arriving at the
receiver at slightly different times.

27) What is meant by delay spread?


Time difference between the reception of the first version of the signal and the last echoed
signal is called delay spread.

28) Define slow fading?


It may cause the received signal power to vary, through the distance between the transmitter
and receiver remains the same. Slow fading is also called as shadow fading.

3
29) What are the classifications of the interference?
There are two types
1. Adjacent channel interference
2. Co-channel interference or narrow band interference.
30) What is meant by inter symbol interference?
It is another type of interference, where distortion in the received signal is caused by the
temporal spreading and the consequent overlapping of individual pulses in the signal.

31) What is meant by Doppler shift? (NOV/DEC 2012)


The Doppler shift is defined as the change /shift in the frequency of the received signal when
the transmitter and the receiver are mobile with respect to each other. The Doppler shift is given by
fd =υ/ λ
υ = relative velocity between transmitter and receiver.
Λ = wavelength of the signal.

32) Define Nyquist theorem?


It gives the maximum data rate possible on a channel. If B is the bandwidth of the channel & L
is the number of discrete signal levels/voltage values used, C is the maximum channel capacity.
C = 2* B *log2 L bits/sec

33) Define Shannon’s theorem?


It is the theorem on the maximum data rate possible on a noisy channel. The maximum data
rate C is given by
C = B* log2 (1+(S/N)) bits/sec

34) List out the profiles of the Bluetooth? May/June-2012


Generic profiles.
Telephony profiles.
Networking profiles.
Serial and object exchange profiles.

35) What is Bluetooth?(NOV 2008), April/May-2011


It’s an open specification for short range wireless voice and data
Communication that was originally developed for cable replacement in PAN.

36) What are the different scenarios of connection of Bluetooth?


Wire replacement in Pc connection
Ad hoc network
Access point in large network.

37) What are the 3 lower layers of Bluetooth protocol stack?


1. Base band layer 2. RF layer 3. Link management
protocol
38) What is the random back off delay?
If two Bluetooth device B1 and B2 are used which are in same coverage area. Then upon
reception of inquiry, B2 waits for a time which is known as random back off delay.

39) What is paging?


It’s a procedure used to connect the two Bluetooth devices.

4
40) What is the requirement of WPAN? April/May-2010
Power management: Low current consumption.
Range : 0-10meters
Speed 19.2-100 kHz
Small size : 5 cubic inches without antenna
Low cost relative to target device
Should allow the overlap of multiple networks in the same area.
Networking support for minimum 16 devices

41) What is home RF?


It represents the use of the radio frequency (RF) spectrum to transmit voice and data in
confined areas such as homes and small offices. It’s a working group is to provide the foundation for a
board range of interoperable consumer device by establishing an open industry specification for
wireless digital communication between Pcs and consumer electronic devices anywhere in and around
home.

42) Mention the role played by L2CAP in Bluetooth networks? (MAY 2009)
L2CAP provides connection oriented and connectionless data services to the upper layer
protocols. These services include protocol multiplexing, Segmentation and reassembly.

43) Define interference range?


It’s a distance between two terminals to interfere, if they are operated at the same frequency.

44) What is RFCOMM?


RFCOMM is a “cable replacement” protocol that emulates the standard RS-232 control and
data signals over Bluetooth baseband. Using RFCOMM a number of non Bluetooth specific protocols
can be implemented on the Bluetooth devices to support legacy applications.

45) What is meant by scattered ad hoc topology?


It is the Bluetooth topology. In this topology, number of small networks Supports few
terminals to coexist or possibly interoperate with the one another in plug and play environment.

46) Write the features of Bluetooth?


Bluetooth is first popular technology for short range.
It’s a ad hoc networking that is designed for an integrated voice and data application.
It has a less data rate than WLAN.
It has the mechanism to support voice application.
It is operated at unlicensed band.

47) Define scattering?


When the wave travels through a medium, which contains many objects with
dimensions small when compared to its wavelength, scattering occurs.

5
16 MARK QUESTIONS:

1) With necessary diagram explain the operations of Bluetooth? Page No (110-121)

2) Explain the overview of the IEEE 802.11? May/June-2012 Page No (91-101)

3) Define wireless Sensor Networks & explain about the architecture of wireless Sensor
Networks? Page No (669-672)

4) Explain about the MAC Protocols for Sensor networks? May/June-2012.Page No (688-689)

5) Explain in detail about the WLAN? April/May-2010, Apr/May 2013 Page No (85-107)

6) Explain in detail about the WPAN? April/May-2010.Page No (110-123)

7) Explain about the Data Dissemination in wireless sensor networks? Page No (677-685)

8) Discuss the operations of Optical Wireless networks? Page No (821-825)

9) Explain the operation of HIPERLAN. May/June-2012

10) /1 in detail? Page No (102-107)

11) What is the relation between the Bluetooth & Home RF? Page No (110-123)

11) Explain the operation of Data gathering in Wireless Sensor Networks?


Page No (685- 686)

12) Explain the operation of HIPERLAN/2 in detail? Page No (107-111)

13) Discuss in detail about interference between Bluetooth and 802.11? Page No (91-101, 110-
121)

6
UNIT – II NETWORK PRINCIPLES
2 MARK QUESTIONS:

1) What is meant by Doppler spectrum?


It is the spectrum of the fluctuations of the received signal strength. It demonstrates the results
of amplitude fluctuations in a signal and its spectrum under different conditions.

2) What are the two types of interference in cellular architecture?


 Co-channel interference
 Adjacent channel interference

3) What is the various cell shapes?


 Equilateral triangle
 Square
 Regular hexagon

4) What are the various architectural methods for capacity expansion technique?
 Cell splitting
 Using directional antenna for cell sectoring
 Lee’s micro cell method
 Using overlaid cells
 Using smart antenna

5) How to find the number of channels per cell in FCA?


No .of channel per cell = Nc/N
N=Cluster size
Nc = Available spectrum/B in Hz

6) Write the advantage and disadvantage of DCA. April/May-2010, 2013


Advantage:
 Very Efficient
 Simple method
 Fast
 DCA is Suitable to Spatial changes in the traffic load.

7) What are the important functions in mobile operation?


 Mobility Management
 Location management
 Radio Resource and Power management.
 Security

8) What is the use of Location Management?


It is used to keep the track of mobile station.

9) What is Hand off Management?


During the conversation, if the mobile is moving, then, some steps are taken
to continue the conversation which is known as Handoff Management.

10) What is ping pong Effect?APRIL/MAY-2008

7
If the mobile stations frequently crosses the boundary of location. Then
there is the effect of continually switching between two location areas. This is known as ping pong
effect.

11) What are the types of Hand-off Methods?


 Hard handoff
 Seamless Handoff

12) Define hard handoff?


When the mobile station completely breaks the connection with the old base station before
connecting to the new base station. Hand off is executed.
13) Write the basic design criteria of Mobile IP?
 Compatibility with existing Network
 Transparency to higher layers
 Scalability
 Efficiency
 Security

14) Define seamless Handoff/


If the mobile station sets the traffic channel with new base
station before breaking the old Connection.

15) Define Handoff control?


If this mechanism is located into network entity, then it is known as network
controlled handoff (NCHO).If this mechanism is located into mobile station then it is known as mobile
controlled handoff. (MCHO)

16) Write the types of location update algorithm?


 Static location update algorithm
 Dynamic location update algorithm.

17) What are the processes available in location management?


 Location updates
 Paging
 Location update dissemination

18) Define Mobility Management?


It is the combination of location management and handoff management.

19) Define channel borrowing technique?


In this technique, high traffic cells borrow channel frequencies from low traffic cells. It is
maintained until the change in traffic occurs. It is known as channel borrowing technique.

20) Write types of cellular hierarchy?


Femeto cell
Pico cell
Micro cell
Macro cell
Mega cell

8
21) What are the four methods used to expand the capacity of cellular network? Nov/Dec-
2010
 To getting addition spectrum for new subscribers
 To change the cellular architecture
 To change the frequency allocation
 To change the modem and access technology.

22) Define reuse portioning.


The channel allocated to micro cell can be reused in every third and fourth
micro cells. The channel is allocated to macro cell can be reused in every seventh or twelfth cell.

23) Write the advantage and disadvantage of reuse partitioning?


Advantage:
Modification in base station is not needed in reuse partitioning
It is easily applied to other modulation technique.
Disadvantage:
Signal to noise ratio cannot be applied for digital system
straightly.

24) Define sequential paging? (NOV / DEC 2011)


A timer is used to declare that the mobile station is not reachable in a particular
paging cycle. This is known as sequential paging.

25) What are the issues related to Handoff? (NOV /DEC 2008)
 Architecture related issues
 Decision algorithm issues.

26) What are the two types of topologies used in wireless networks?
 Infrastructure network topology
 Adhoc network topology

27) Name the five major challenges for implementation of wireless LANs that existed from
the beginning of this industry? APRIL/MAY-2008
 Complexity and cost
 Bandwidth
 Coverage
 Interference

28) What are the basic elements of a wireless geolocation system? APRIL/MAY-2008
 Wireless network infrastructure
 Network
 Mobile terminal

9
16 MARK QUESTIONS:

1) With neat diagram explain how the capacity is increased by using directional antennas for cell
sectoring and cell splitting? (APRIL/MAY-2008, 2013) (P.No:256-259)

2) Explain the concept of channel borrowing techniques and dynamic channel allocation (DCA)?
(APRIL/MAY-2008) (P.No:268-272)

3) List and explain the four mechanisms that are embedded in all voice oriented wireless networks
that allow a mobile to establish and maintain connection with the network? (NOV/DEC-2008,
APR/MAY 2013) (P.No:175-193)

4) Explain in detail about the random access for data-oriented networks? (P.No:193-215)

5) Discuss about the integration of voice and data traffic? (P.No:215-229)

6) Explain in detail about the wireless network topologies? (P.No:239-243)

7) Discuss the comparison between infrastructure network topology with Ad Hoc network
topology? APRIL/MAY-2010.(P.No:242-245)

8) Mention the techniques of capacity expansion and explain in detail? ((P.No:254-273)

9) Discuss about the cellular hierarchy? (P.No:247-248)

10) Explain in detail about cell fundamentals and signal to noise ratio calculation? (P.No:248-254)

11) Explain in detail about the cellular topology? APRIL/MAY-2012 (P.No:243-248)

UNIT – III NETWORK OPERATIONS


2 MARK QUESTIONS:

1) What are the mechanisms used in voice oriented wireless networks that allow the mobile
to establish and maintain connection with the network?
 Registration
 Call establishment
 Handover or Handoff
 Security

2) What is handoff and what are the types of handoff?


Handoff is the process switchover to weak signal base station to strong signal base
station. There are two types of handoff.

10
 Internal
 External

3) What is mobile assisted handoff?


The MS Monitors the RSS from the BCCHs of the neighboring cells and
report these values to the MSC using SACCH. This is called mobile assisted Handoff.

4) What are the layers of protocol channel?


There 3 layers of protocol stack
 Physical layer
 Data link layer
 Networking or Messaging layer

5) What are the types of logical channel?


 Traffic channel
 Control channel

6) Write the types of control channel?


 Broadcast control channel
 Common control channel
 Dedicated control channel

7) Draw the frame format of DLL in LAPD.

Address Control field Length Information bit Fill in bits


field(8-bit) (8-bits) indicator (variable) (variable)
(8-bits)

9) What are the channels available in IS-95 forward channel? APRIL/MAY-2011, 2013

 Pilot channel
 Synchronization channel
 Paging channel
 Traffic channel

8) Draw the format of network layer.

TI PD MT IE IEI

TI-Transaction identifier
PD- Protocol discriminator
MT-Message type
IE-Information element
IEI- Information element identifier

10) What are the modulation schemes used in forward and reverse channel?
Forward channel: QPSK

11
Reverse Channel: OQPSK (Orthogonal Quadrature Phase shift Keying)

11) Write the Walsh code used for encoding inIS-95.


Walsh code used for encoding is:
I= C0+2C1+4C2+8C3+16C4+32C5
Where C5-MSB

12) What is the use of access channel?


The access channel is used to transmit the control information such as call
organization, response to page from MS to BS. The data rate of access channel is fixed at 4800 bps.

14) What is GPRS? May/June- 2011, 2012


GPRS is an overlay on top of the GSM physical layer and its extends data capabilities of GSM and
provides the connection to external packet data networks through the GSM infrastructure with short
access time.The GPRS services are provided based on ‘Capacity on Demand Principle’

15) What are the limitations of GPRS?


 There is only a limited cell capacity for all users.
 Speed is lower
When Ms is not available, there is no storage and forward service

16) What is SMS? April/May-2008


SMS was developed as part of GSM Phase -2specifications operated over all GSM networks. It
uses same network entites, same physical layer and intelligently reuses the the logical channel of the
GSM to transmit very short alphanumeric messages.

17) What are two types of services provided by SMS?


 Delivery service if the destination MS is active.
 Forward service if the MS is active.

18) What is cell broad cast service?


It’s a one way service used to send whether forecast, stock quotas, etc.The message is
transmitted to all MSs that are active in cell and that are subscribed to the service.

13) Write the difference between CDMA and W-CDMA.(APR/MAY 2013)

12
19)
Sl.no CDMA 2000 W-CDMA 2000
It proposes multiples of 1.2288 It employs 3.84 Mcps.
1 Mcps chip rates. Mainly it
employs 3.6864Mcps

2. It is more compatible with IS-95 It is less compatible with Is-95

3. In IS-95 and CDMA 2000, the BS BS operates asynchronously.


operates synchronously.

4 Frame length is 20ms Frame length is 10ms.

What is the PTP service?

The MS may send a message to another MS using handset keypad.SMS messages can be
transmitted via dial up to the service center and internet.

20) What are the Drawback of Wireless application protocols?


 Does not support colour PDA terminals
 Does not support roaming between diffent link services.
 Multimedia communications are not supported very well on WAP.

21) What are mobile application protocols?


 Wireless application protocol
 I-Mode.

22) Define i-mode.


It’s a service that tries to eliminate the use of gateway and provide direct access to internet.

23) Define IMT-2000.


Its a third generation mobile communication standard referred to as international mobile
telecommunications beyond the year 2000.It was implemented to achieve high data rate

24) Define soft hand off. (APR/MAY 2013)


Soft hand off refers to the process by which MS in communication with multiple BSs before
finally deciding to communicate its traffic through one of them.

25) What is meant by sleep modes?


A common approach for saving battery power is to allow the MS to enter into a sleep mode
during periods of inactivity.

26) What is advantages and disadvantages of stream ciphers?


Advantage:
There is no need for buffering data up to the block size and for padding.

13
Disadvantage:
There have to be used carefully because encryption with stream ciphers uses simple
XOR operation.

27) What are the two types of Location update algorithms?


i) Static
ii) Dynamic

28) What is meant by paging?


Paging is broadcasting a message in a cell or a group of cells to elicit a response from the MS
for which a call or message is incoming. Transmitting the page bin only the cell in which the
mobile terminal is located, which makes the most accurate location estimate, can reduce the cost of
paging. What are the components in global 3G Standard?

29) What are the types of interface in CDPD?


 The A-interface is the air link interface, and parts 400-409 of the
CDPD specifications specify it.
 The E-interface is the external interface, and it is the means by which
CDPD operates with the rest of data network.

30) Define CDMA. May /June-2010


Code Division Multiple Access systems use codes with certain characteristics
to separate different users. To enable access to the shared medium without interference. The users use
the same frequency and time to transmit data.

16 MARK QUESTIONS:

1) Explain the mechanisms to support the mobile environment? (MAY 2008, MAY 2009) P.No:
341-346

2) Explain packet and frame format in IS-95?( APRIL/MAY-2010P.No:369-372

3) Explain mobile application protocols?P.No:407-410

4) Explain short message service in GPRS? P.No:405-407

5) Explain about GPRS and its architecture? (APR/MAY 2013) P.No:410-419

6) Explain about WCDMA or IMT-2000? APRIL/MAY-2012.P.No:385-389

7) Explain in detail about the data-oriented CDPD network? P.No:397-405

8) Explain in detail about mobility management? P.No:280-298

9) What is CDMA? Write brief notes about forward and reverse CDMA in IS-95? (NOV
2008,MAY 2009)
P.No:370-379

10) Discuss about the radio resources and power management? P.No:298-311

14
11) Explain about GSM Protocol Architecture? (NOV 2008, APR/MAY 2013) P.No:334-341

UNIT-IV AD-HOC NETWORKS

2 MARK QUESTIONS:

1. Define ALOHA.
ALOHAnet, also known as the ALOHA System, or simply ALOHA, was a pioneering computer
networking system developed at the University of Hawaii. The ALOHAnet used a new method of
medium access (ALOHA random access) and experimental UHF frequencies for its operation,
since frequency assignments for communications to and from a computer were not available for
commercial applications in the 1970s.

2. What is the basic principle of ad hoc networking?


The principle behind ad hoc networking is multi-hop relaying, which traces its roots to 500 B.C.

3. Mention some difference between cellular netwoks and adhoc networks. (APR/MAY
2013)
cellular netwoks adhoc networks
Fixed infrastructure-based Infrastrucure-less
Single-hop wireless links Multi-hop wireless links
Circuit-switched Packet-switched
Centralized routing Distributed routing

4. Define synchronization.
Data synchronization is the process of establishing consistency among data from a source to target
data storage and vice versa and the continuous harmonization of the data over time. It is
fundamental to a wide variety of applications, including file synchronization and mobile device
synchronization.

5. Define adaptive rate control.


This refers to the variation in the data bit rate achieved over a channel.

6. Give the issues in adhoc wireless networks. (MAY/JUNE-2011)


Medium access scheme, routing, multicasting, transport layer protocol, pricing scheme, quality of
service provisioning, self-organization, security, energy management, addressing and service
discovery, scalability, deployment considerations.

7. What is the main objective of transport layer protocol?


Setting up and maintaining end-to-end connections, reliable end-to-end delivery of data packets,
flow control and congestion control.

15
8. Define multicasting. (MAY/JUNE-2011, 2013)
In computer networking, multicast is the delivery of a message or information to a group of
destination computers simultaneously in a single transmission from the source creating copies
automatically in other network elements, such as routers, only when the topology of the network
requires it.

9. Define access delay.


The access delay refers to the average delay that any packet experiences to get transmitted.
10. Give an example of connection oriented and connectionless oriented transport layer
protocol.
Connection oriented transport layer protocol- TCP
Connectionless oriented transport layer protocol-UDP

11. Give the issues in adhoc wireless internet. APRIL/MAY-2010


Gateways, address mobility, routing, transport layer protocol, load balancing, pricing/billing,
provisioning of security, QoS support, service, address, and location discovery.

12. Define scalability.


Scalability is the ability of the routing protocol to scale well (i.e., perform efficiently) in a network
with a large number of nodes. This requires minimization of control overhead and adaptation of the
routing protocol to the network size.

13. What is energy management? (MAY/JUNE-2011, 2012)


Energy management is defined as the process of managing the sources and consumers of energy in
a node or in the network as a whole for enhancing the lifetime of the network.

14. Mention the activities required to perform self-organization.


Neighbor discovery, topology organization and topology reorganization.

15. What is QOS support? (MAY/JUNE-2011)


Quality of Service is the performance level of services offered by a service provider or a network
to the user. QoS provisioning offers requires negotiation between the host and the network,
resource reservation schemes, priority scheduling and call admission control.

16. Define service availability.


The availability of service is defined as the ability of an ad hoc wireless network to provide service
even with the failure of certain nodes.

17. What are the major types of resource consumption?


Energy depletion and buffer overflow.

18. Define authentication.


Authentication is the act of confirming the truth of an attribute of a datum or entity. This might
involve confirming the identity of a person, tracing the origins of an artifact, ensuring that a
product is what its packaging and labeling claims to be, or assuring that a computer program is a
trusted one.

19. Define interference.


Interference (communication), anything which alters, modifies, or disrupts a message as it travels
along a channel.

16
20. Mention the classification of energy management.
Transmission power management, battery energy management, processor power management and
devices power management.

21. What are the advantages of hybrid wireless networks?


Higher capacity than cellular networks. Increased flexibility and reliability in routing. Better
coverage and connectivity in holes.
22. What are the advantages in using variable power MAC protocol? May/June-2012
Energy saving at the nodes, increase in bandwidth reuse and reduction in interference.

23. What are the advantages in using directional antennas?


Increased spectrum reuse, reduction in interference and reduced power consumption.

24. What are the major issues in designing multicast routing protocols?
Robustness, efficiency, control overhead, Quality of Service, Efficient group management,
scalability and security.

25. Define MAN.


A metropolitan area network (MAN) is a computer network that usually spans a city or a large
campus. A MAN usually interconnects a number of local area networks (LANs) using a high-
capacity backbone technology, such as fiber-optical links, and provides up-link services to wide
area networks (or WAN) and the Internet.

26. Define routing. (APR/MAY 2008)


Routing is the process of selecting paths in a network along which to send network traffic. Routing
is performed for many kinds of networks, including the telephone network (Circuit switching),
electronic data networks (such as the Internet), and transportation networks.

27. Define TORA. NOV/DEC-2010


The Temporally-Ordered Routing Algorithm (TORA) is an algorithm for routing data across
Wireless Mesh Networks or Mobile ad-hoc networks.

28. Define service discovery.


Service discovery in any network refers to the activity of discovering or identifying the party
which provides a particular service or resource.

29. Define address discovery.


Address discovery refers to the services such as those provided by address resolution
protocol(ARP) or domain name service(DNS) operating within the wireless domain.

30. What is the use of load balancing?


Load balancing techniques are essential to distribute the load so as to avoid the situation where the
gateway nodes become bottleneck nodes.

31. Define location discovery.


Location discovery services can provide enhanced services such as routing of packets, location-
based services and selective region-wide broadcasts.

17
16 MARK QUESTIONS:

1. Explain the transport layer protocol of infrastrucureless networks.(P.No:231-232) (MAY 2011,


NOV/DEC 2012)
2. Explain about Medium Access Scheme. (P.No: 227-228)
3. Explain about routing in infrastrucureless networks.(P.No:228-230)
4. Write notes on addressing and service discovery. (P.No:236) (MAY 2011)
5. Explain about synchronization, hidden and exposed terminals problems. (P.No: 227) (MAY
2011)
6. Write notes on QoS provisioning. May /June-2012, 2013. (P.No:233-234)
7. Explain the energy management of infrastrucureless networks.(P.No:236-238)
8. Write notes on deployment considerations. (P.No: 238-242)
9. Explain in detail about the issues in ad hoc wireless internet. (P.No: 242-245)
10. Write notes on multicating and the issues in designing multicat routing protocols.
APRIL/MAY-2011, 2013. (P.No: 230-231)
11. Write notes on pricing scheme. (P.No: 232-233)
12. Explain in detail about the security threats that exist in ad hoc wireless internet.(P.No: 235-236)

UNIT-V MAC PROTOCOLS


2 MARK QUESTIONS:

1. What is bandwidth efficiency? (MAY/JUNE-2011, 2013)


Bandwidth efficiency can be defined as the ratio of the bandwidth used for actual data
transmission to the total available bandwidth.

2. Define MACAW.
Multiple Access with Collision Avoidance for Wireless (MACAW) is a slotted Medium Access
Control (MAC) protocol widely used in Ad-hoc networks. Furthermore, it is foundation of
many other MAC protocols used in Wireless Sensor Networks (WSN). The IEEE 802.11
RTS/CTS mechanism is adopted from this protocol. It uses RTS-CTS-DS-DATA-ACK frame
sequence for transferring data, sometimes preceded by an RTS-RRTS frame sequence, in view
to provide solution to the hidden terminal problem.

3. Define FAMA protocol.


The floor acquisition multiple access protocols are based on a channel access discipline which
consists of a carrier-sensing operation and a collision-avoidance dialog between the sender and
the intended receiver of a packet.

4. Mention the classification of MAC protocols.NOV/DEC-2010


Contention-based protocols, Contention-based protocols with reservation mechanisms,
Contention-based protocols with scheduling mechanisms.

5. Define DBTMA.

18
The dual busy tone multiple access (DBTMA) protocol is based on the RTS packet and two
narrow bandwidth,out-of-band busy tones. With the use of the RTS packet and the receive busy
tone, which is set up by the receiver, our scheme completely solves the hidden- and the
exposed-terminal problems.

6. Define CATA.
Collision Avoidance Time Allocation (CATA) Protocol supports broadcast, unicast, and
multicast transmissions at the same time.

7. Mention the basic principle of CATA.


 The receiver of a flow must inform other potential source nodes about the reservation of the
slot, and also inform them about interferences in the slot.
 Negative acknowledgements are used at the beginning of each slot for distributing slot
reservation information to senders of broadcast or multicast sessions.

8. Give the design goals of MAC protocols. (MAY 2011, APR/MAY 2013)
 The operation of the protocol should be distributed.
 The protocol should provide QoS support for real-time traffic.
 The available bandwidth must be utilized efficiently.
 Control overhead must be kept as low as possible

9. Draw the frame format of CATA.

10. Define HRMA.


HRMA (Hop-reservation multiple access) is a time slot-reservation protocol where each slot is
assigned a separate frequency channel. A handshake mechanism is used for reservation to
enable node pairs to reserve a frequency hop, thus providing collision-free communication and
avoiding the hidden terminal problem.

11. Draw the frame format of HRMA.

12. What are three main components of MACA with Piggy-backed Reservation (MACA/PR)
Protocol?
A MAC protocol; A reservation protocol; A QoS routing protocol.

13. Define DWOP.

19
Distributed Wireless Ordering Protocol (DWOP) is to achieve a distributed FIFO schedule
among multiple nodes in an ad hoc network.

14. Define PDR.


Packet Delivery Ratio is defined as the ratio of acksRcvd(count information carried by ACK
packets) to pktsSent(count of DATA packets transmitted)

15. Write the formula for Priority Index.


PI=PDR/M * ULB
ULB=deadline-currentTime/(remHops)

16. What is token bucket scheme? MAY/JUNE-2011, APR/MAY 2012


The token bucket is an algorithm used in packet switched computer networks and
telecommunications networks to check that data transmissions conform to defined limits on
bandwidth and burstiness (a measure of the unevenness or variations in the traffic flow).

17. Define DPS.


Distributed Priority Scheduling (DPS) uses the RTS-CTS-DATA-ACK packet exchange
mechanism. The RTS packet contains the priority label for the DATA packet that is to be
transmitted. The corresponding CTS contains it also. Neighbor nodes receiving the RTS packet
update their scheduling tables with the node and its priority. When the DATA packet is sent, it
contains piggybacked information about the priority of the next packet from this node and its
priority, so the other nodes can record this information. Finally, when the acknowledgement
comes, the nodes delete the entry for the data packet that is being acknowledged.
18. What is a broadcast channel? MAY/JUNE-2011, NOV/DEC 2012
In broadcasting, a channel is a range of frequencies (or, equivalently, wavelengths) assigned by
a government for the operation of a particular radio station, television station or television
channel. In common usage, the term also may be used to refer to the station operating on a
particular frequency.

19. Define ICSMA.


Carrier sense multiple access with collision detection (CSMA/CD) is a Media Access Control
method in which:
 a carrier sensing scheme is used.
 a transmitting data station that detects another signal while transmitting a frame, stops
transmitting that frame, transmits a jam signal, and then waits for a random time interval before
trying to resend the frame.

20. Define FPRP protocol.


The FPRP is a contention-based protocol which uses a five phase reservation process to
establish TDMA slot assignments that are non-conflicting with high probability.

21. Mention the five phases of the reservation process.


Reservation Request phase (RR), Collision Report phase (CR), Reservation Confirmation
phase(RC), Reservation Acknowledgment phase(RA) Packing and Elimination phase (P/E).

22. Define throughput.

20
Throughput or network throughput is the average rate of successful message delivery over a
communication channel. The throughput is usually measured in bits per second (bit/s or bps).

23. What do you mean by hidden terminal problem?


In Carrier Sense Multiple Access (CSMA), all terminals listen to the inbound (terminal to base)
channel. No new packet transmission is initiated when the inbound channel is sensed busy. This
requires that all mobile terminals can receive each others signals on the inbound frequency.
However, in mobile radio nets with fading channels and path loss, a mobile terminal might not
be able to sense a transmission by another (remote) terminal. This is called the hidden terminal
problem.

24. Define MARCH.


The media access with reduced handshake (MARCH) protocol utilizes the broadcast
characteristics of an omnidirectional antenna to reduce the number of control messages
required to transmit a data packet in multihop ad hoc networks.

25. Mention two types of transmission channel.


Data channel and a control channel.

26. Define SRMA/PA.


A new medium access control (MAC) protocol-soft reservation multiple access with priority
assignment (SRMA/PA) protocol-is introduced for supporting the integrated services of real-
time and non-real-time applications in mobile ad-hoc networks.

27. Mention some advantages and shortcomings of MARCH.


Advantages: very high throughput; very low control overhead;
Shortcomings: access to routing information is required -> cross-layering!

28. Mention some advantages and shortcomings of DPRMA.


Advantages: D-PRMA is best suited for voice applications;
Shortcomings: requires synchronization (TDMA).

29. Write two basic principle of SRMA/PA.


o collision-avoidance handshake mechanism;
o soft reservation mechanism for time slot reservation.

30. Mention the main features of SRMA/PA.


o unique frame structure;
o soft reservation capability for dynamic slot scheduling;
o dynamic and distributed priority assignment and update policies;
o time-constrained back-off algorithm.

31. Mention the main features of Directional busy tone based MAC protocol.
 it uses directional antenna consisting of N elements;
 for broadcast all elements are used;
 for unicast only one element is used;
 when a node is idle all elements sensing the channel;
 while receiving only one element receives the signal.

21
16 MARK QUESTIONS:

1. Explain the various contention based MAC protocols. (P.No:255-269) MAY/JUNE-2011, APR
MAY 2013
2. Brief about the use of directional antennas. (P.No: 297-298) APRIL/MAY-2010
3. Explain the various contention based MAC protocols with reservation mechanisms. (P.No: 270-
289)
4. Explain the various contention based MAC protocols with scheduling mechanisms. (P.No: 289-
297)
5. Explain about MAC protocols that use directional antennas.(NOV/DEC 2008) (P.No: 297-304)
6. Explain in detail about MACAW. (P.No: 256-261)
7. Explain in detail about FPRP. (P.No: 279-283)
8. Explain in detail about RTMAC. (P.No: 286-289)
9. Explain in detail about HRMA. (P.No: 274-276)
10. Explain in detail about CATA.APRIL/MAY-2010, 2013.(P.No: 272-274)
11. Explain in detail about D-PRMA. (P.No: 270-271)
12. Mention the design goals of a MAC protocol for ad hoc wireless networks. (P.No: 252-253)

16 - MARK QUESTIONS FOR SLOW-LEARNERS

22
UNIT-I
1. Explain the overview of the IEEE 802.11?
2. Explain in detail about the WPAN?
3. Explain the operation of HIPERLAN. May/June-2012

UNIT-II
1. With neat diagram explain how the capacity is increased by using directional antennas for cell
sectoring and cell splitting?
2. Explain the concept of channel borrowing techniques and dynamic channel allocation (DCA)?
3. Discuss the comparison between infrastructure network topology with Ad Hoc network
topology? APRIL/MAY-2010.
4. Explain in detail about the cellular topology?

UNIT-III
1. Explain the mechanisms to support the mobile environment?
2. What is CDMA? Write brief notes about forward and reverse CDMA in IS-95?
3. Explain about GSM Protocol Architecture?
4. Explain about GPRS and its architecture?

UNIT- IV
1. Write notes on deployment considerations
2. Write notes on pricing scheme.( 8 MARK)
3. Explain in detail about the security threats that exist in ad hoc wireless internet.(8 MARK)
4. Explain about synchronization, hidden and exposed terminals problems.(8 MARK)
5. Write notes on QoS provisioning. (8 MARK)
6. Explain the energy management of infrastrucureless networks.(8 MARK)
7. Explain the transport layer protocol of infrastrucureless networks.
UNIT – V
1. Explain the various contention based MAC protocols.
2. Brief about the use of directional antennas.
3. Explain in detail about CATA.
4. Explain the various contention based MAC protocols with reservation mechanisms.
5. Explain the various contention based MAC protocols with scheduling mechanisms.

23

S-ar putea să vă placă și