You are on page 1of 31

DHANALAKSHMI SRINIVASAN

COLLEGE OF ENGINEERING
NH-47,Palakkad Main Road, Navakarai ,Coimbatore- 641 105

DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING


III YEAR 6th SEM WIRELESS NETWORKS

UNIT I
PART A

1. Calculate the capacity of a single IS-95 cell that uses QPSK modulation and
convolutionalcoding 3 db < Sr < 9 db, and bandwidth of the channel is 1.25 MHz

Solution: No. Of Users M =

W is the bandwidth of the channel


R is the Transmission rate
Given Data:
W=
For QPSK Modulation R = 9600bps

M= = 16 Users to M = = 65 Users

2. Determine the transfer time of a 20 kB file with a mobile data network with the transmissionrate of
10 Kbps.
Solution: For a data rate of around 10 kbps, it would take 20(KB) × 8(B/b) / 10 kbps = 16
seconds to transfer for such a file.

3. Determine the capacity of GSM for k = 3.


Solution: For GSM system Carrier bandwidth Wc = 200 kHz
Number of users per carrier Nu = 8 Frequency
reuse factor K = 3 Bandwidth
W =1.25MHz
Capacity M=

M=
M = 16.7 users per cell.
4. Compute the maximum throughput of a pure ALOHA networking with a large number ofusers
and transmission rate of 1 Mbps?

For a large number of mobile terminals each using a transmission rate of 1 Mbps to access a BS using
ALOHA protocol, the maximum rate that successfully passes through to the BS is 180 kbps.

5. Differentiate Wired Network from Wireless Network

Sl.No Wired Networks Wireless Networks


1. Provides Reliable Transmission Provides Unreliable Transmission
2. Guided links provides transmission from Air interface provides transmission from
one fixed terminal to another terminal. one terminal to another.
3. It offers higher bandwidth It offers medium and lower bandwidth
4. It does not support mobility It supports mobility

6. Infer Handoff?
Handoff basically involves change of radio resources from one cell to other adjacent cells without
interrupting the call or alerting the user when the mobile unit moves from one cell to another

7. Infer hard handoff?


Hard handoff, also known as “Break before make”,is characterized by releasing current radio
resources from the prior base station before acquiring the resources from the next base station.
Page | 2
8. Infer soft handoff?
Soft handoff, also known as “Make before Break ” is a process that the Mobile Station communicates
simultaneously with the prior base station as well as the new base station for short duration of time before
deciding to communicate its traffic through one of them.

9. List the parameters that influence the handoff.


The parameters that influence the handoff are
a. The radio link.
b. Network management.
c. Service issues.
10. Classify the two types of protocols used to handle multiple access issues?
The two types of protocol that are used to handle multiple access issues are
a. Contention based protocols
b. Conflict free (collision free) protocols.

11. How contention based protocols are classified?


The contention based protocols can be classified into two groups according to the wayscollisions
are resolved. They are
a. Random access protocols
b. Collision resolution protocols

12. Classify the types of Random Access protocols and Collision Resolution protocols.
The types of random access protocols are
a. ALOHA type protocol
b. Carrier Sense Multiple Access (CSMA) type protocol
c. Busy tone multiple Access (BTMA) type protocol.
d. Idle Signal Multiple Access (ISMA) type protocol

The types of Collision resolution access protocols are


(i) TREE type protocol
(ii) Window type protocol.
13. Classify the different types of conflict free protocols?
The different types of conflict free protocols are
a. Frequency Division Multiple Access (FDMA)
(ii)Time Division Multiple Access (TDMA) (iii)Code
Division Multiple Access (CDMA)

14. List the classifications of the services of wireless security system.


The classifications of the services of wireless security system are
a. Confidentiality
b. Nonrepudiation
c. Authentication

Page | 3
d. Availability.

15. List the services wireless system security


The services of wireless system security are
a. Confidentiality
(ii)Nonrepudiation
(iii) Authentication
(iv) Integrity
(v) Availability

16. Point out the collision mechanism in Nonpersistent CSMA Protocol?


In Nonpersistent CSMA Protocol, the MS(Mobile Station) senses the medium first when the MS has a packet
ready to send. If the medium is busy, the MS waits for the random amount of time and senses the medium
again. If the medium is idle, the MS transmits the packet immediately. If collision occurs, the MS waits for a
random amount of time and starts all over again.

17. Point out the collision mechanism in 1-Persistent CSMA Protocol.


In 1-persistance protocol, the MS senses the medium when the MS has the packet ready to send.If the medium
is busy, the MS keep listening to the medium and transmits the packet immediately after the medium becomes
idle. This protocol is called as 1- Persistent because the MS transmits with a probability of 1 whenever it finds
the medium to be idle.

18. Point out the collision mechanism in p-Persistent CSMA Protocol.


In p-Persistent Protocol, the MS senses the medium when the MS has the packet ready to send. If the medium
is busy, the MS waits until the next slot and checks the medium again .If the medium is idle, the MS transmits
with the probability p or defers transmission with probability (1-p) until the next slot. If collision occurs, the
MS waits for a random amount of time and starts all over again.

19. Classify the advantages of wireless LAN?


The advantages of wireless LAN are
a. Flexibility
b. Planning
c. Robustness
d. Simple Design

20. Categorize the properties of ISM band?


The properties of ISM band
a. Frequency of operation
i) 902-928 MHZ
ii) 2.4-2.483 GHZ
iii) 5.725-5.875 GHZ
b. Transmit power limitation
i. 1 watt for DSSS and
ii. Low power with any modulation for FHSS.
21. Classify the three basic rules (or) etiquette of spectrum.
The three basic rules (or) etiquette of spectrum are
Page | 4
c. Listen Before Talk (or Transmit)
d. Low Transmit Power
e. Restricted duration of transmission

22. Classify the features of wireless LAN.


The features of wireless LAN are
(a) Power management to save the battery power.
(b) The handling of hidden nodes.
(c) The ability to operate worldwide.

23. Draw the frame format of IEEE 802.11 physical layer using FHSS. The frame format of IEEE 802.11 physical
layer using FHSS are

Sync SFD PLW PSF HEC MPDU


(80) (16) (12) (4) (16) variable

SFD –Start Frame Delimiter PLW- PDU


Length Word
PSF – PLCP Signalling Field
HEC – Header 23 Error Check
MPDU – MAC Protocol Data Unit

24. Draw the frame format of IEEE 802.11 physical layer using DSSS.The frame format of IEEE 802.11 physical
layer using DSSS

Sync SFD Signal Service Length HEC MPDU


128 bits (16) (8) (8) (16) (16) variable

25. Categorize the type of architecture used in IEEE 802.11 The type of architecture used in IEEE
802.11
(a) Infrastructure based.
(b) Ad-hoc based.

26. Classify the characteristics of DSSS?


The characteristics of DSSS are
(a) Robustness against interference.
(b) Insensitivity to multipath propagation.
(c) Implementation is complex compared to FHSS.

27. Draw the MAC layer frame format of IEEE 802.11.


The MAC layer frame format of IEEE 802.11

Octets:
2 2 6 6 6 2 6 0-2312 4

Duration/ Address Address Address Sequence Address Frame Frame CRC


ID 1 2 3 control 4 body ……….. control
(data)

CRC is Cyclic Redundancy Check


Page | 5
28. Draw the MAC management frame format.The MAC management frame format

Frame control
Duration
DA-Destination Address
SA-Starting Address
BSSID
Sequence control
Frame body
FCS-Frame Check Sequence

29. Point out the wireless ATM?


Wireless ATM also called as mobile ATM or WATM describes a transmission technologyand specify a
complete communication system. It develops a set of specifications that extends the use of ATM
technology to wireless network.
30. Draw the packet frame format of WATM.The packet
frame format of WATM

ATM
Wireless Header ATM Header Payload Wireless
(5 bytes) (48 bytes) Trailor

31. Classify the versions of HIPER LAN?


The versions of HIPER LAN are
a. HIPER LAN-1
b. HIPER LAN-2
c. HIPER Access
d. HIPER Link

32. Classify the protocols used in HIPER LAN-2.


The protocols used in HIPER LAN-2
a. Radio Link Control (RLC) protocol.
b. DLC connection Protocol.
c. Radio Resource Protocol (RRC)
d. Association control Function (ACF)

33. Categorize the phases available in HIPER LAN-1 MAC layer?The phases
available in HIPER LAN-1 MAC layer
Prioritization Phase: It determines the highest priority of a data packet ready to besent by
competing nodes.
Contention phase : Eliminate all but one of the contenders if more than one senderhas the
current priority.
Transmission Phase: Transmit the packet of the remaining node.

34. Classify the services provided by IEEE 802.11.


The services provided by IEEE 802.11 are
Page | 6
a. Association b)Deauthentication
c)Disassociation d)Integration
e)MSDU Delivery
f) Privacy
g) Reassociation
35. Classify the three types of service provided by GSM
The three basic types of services offered through GSM are
a. Telephony (also referred to as tele services) Services
b. Data (also referred to as bearer services) Services
c. Supplementary Services

PART B

1. What are the MAC services of IEEE 802.11 that are not provided in traditional LAN 802.3?
The MAC services of IEEE 802.11 that are not provided in traditional LAN
802.3 are

Services Provider Used to Support


Association Distribution system MSDU delivery
Authentication Station LAN access and security
De authentication Station LAN access and security
Disassociation Distribution system MSDU delivery
Distribution Distribution system MSDU delivery
Integration Distribution system MSDU delivery
MSDU Station MSDU delivery
Privacy Station LAN access and security
Reassociation Distribution system MSDU delivery

2. How many physical channels are available in each IS-95 carrier? What type of coding separates these channels
from one another?
The physical channels of IS-95 are available as
a. Forward Link Channel that consists of 64 logical channels each channel occupies 1228 kHZ
bandwidth. These 64 channels are separated by Walsh code.
b. Reverse Link Channel that consists of 94 logical CMDA channel each channel occupies 1228
kHZ bandwidth. The reverse links supports 32 access channel and 62 traffic channel. These 32 access
channels are separated by Distinct long code and the traffic channels are separated by User specific long
code
3.Why does an AP in wireless network act as a bridge?
Access Point in IEEE802.11 architecture acts as a bridge and a relay point. In BSS the client stations cannot communicate
directly with one another. Rather if one client wants to communicate to another client of same BSS a MAC frame format is
sent to AP and AP will connect to the requested destination. Similarly a MAC frame from a station in the BSS to the remote
station is sent from the local station to the AP and then relayed by the AP over the DS on its way to its destination station.

4. List the challenges faced by WLAN industry.


The challenges faced by WLAN industry are
a. Data rate enhancements
Page | 7
b. Minimizing size and cost
c. Low power networking
d. User security

5. Analyze the responsibilities of MAC management sublayer 802.11


• The MAC layer management sublayer is responsible for roaming in ESS,power management
and association, dissociation and reassociation processesfor registration connection
management.

6. Classify the functions of physical layer IEEE 802.11


• Encoding/Decoding of signals
• Preamble generation/removal
• Bit transmission/reception
• Includes specification of the transmission medium.

7. Point out the Wimax features


Wimax-Worldwide Inter-operability for Microwave access.
Features:
• Service area range 50km
• Very high spectrum utilization;3.8 bit/Hz
• Upto 280 Mbps per BS.

8. Categorize the functions of HIPERLAN-2 protocols


• Radio Link Control(RLC) Protocol
• DLC connection Protocol
• Radio Resource Protocol (RRP)
• Association Control Function (ACF)

9.Compare the Logical channels in Bluetooth.


• Link Control (LC)
• Link Manager(LM)
• User Asynchronous (UA)
• User Isochronous (UI)
• User Synchronous (US)
10. How would you explain the responsibilities of MAC sub layer IEEE 8021.11
• MAC Sub Layer➔Fragmentation and reassembly of packets

11. How can you evaluate the problems with the hidden terminal and exposed terminal.
• Hidden terminal problem➔if 2 nodes send data to same destinator simultaneously
• Exposed terminal problem➔while a node sending data at a time if it rx data same time
By using RTS/CTS,can avoid the above.
12. Analyze the Spread spectrum technique
• Spread spectrum techniques spread information over a very large bandwidth specifically, a
bandwidth that is much larger than the inverse of the data rate.

Page | 8
13. How can you differentiate IR transmission Vs UHF

INFRARED UHF Narrowband

light based Txn using 900nm wavelength RF based transmission

Requires direct LOS for good Tx Not required LOS

cannot penetrate through walls canpenetrate through walls

Requires low BW,no need for license It support both unlicensed band(430-
450MHz) and licensed (450-470MHz)

14. Point out the characteristics of MANET


• Infrastructure-less dynamic multihop network. It does not have a definite Topology.No central
router required. Data takes multiple hops before reaching destination

15. Analyze the WiMAX architecture

• Worldwide Interoperability for Microwave Access (WiMAX) is a wireless communications


standard for Metropolitan Area Networks..
• Networks covering whole cities or even whole countries.
• It is a IEEE 802.16d.. originally intended for data communications.
• For voice communication( is enabled by Voice over Internet Protocol (VoIP)).
• The modulation format ➔MIMO/OFDM/OFDMA…
• This uses licensed worldwide spectrum ➔2.3 GHz, 2.5GHz, 3.3 GHz, and 3.5 GHz frequency
bands
• A main goal of this architecture is to separate the over-the-air access (the Access Service
Network (ASN) from the Internet access (Connectivity Service Network (CSN).
• The ASN provides the over-the-air connectivity corresponding to the PHY and MAC layer as
defined in the IEEE 802.16 (scheduling and resource management)
• It discovers which networks are available and connects the user to the preferred (permissible)
CSN..

• Each BS is connected to an ASN Gateway,which has somewhat similar functionality as the BS


controller in GSM.

• During network discovery, the Mobile Station (MS) discovers both the access service provider
and the available Network Service Provider (NSP).

Page | 9
• The MAC layer consists➔ (i) the MAC Convergence Sublayer (CS), (ii) the MAC Common Part
Sublayer, and (iii) the MAC Security Sublayer.
1) Convergence Sublayer➔ receives data packets from higher layers and modify the suitable
format for sending via air medium by suppressing redundant information in their headers..
2) Common Part Sublayer➔provides the essential support functions for the over the-air
transmission of the information.
• It includes such functions as signaling,modulation/coding scheme, feedback and bandwidth
allocation.
• It also provides fragmentation and packing…
3) Security Sublayer➔ assign service flow identifier (ID), Connection Identifier (CID), provisioned
QoS parameters and the authorization module.
16. Categorize HIPERLAN standards
• Data rate 23.529Mbps.
• Coverage 100m,frequency 5.2GHZ.
• Supports asynchronous and synchronous

• Support power saving


• Each HIPERLAN node is either forwarder (F) or non-forwarder.
• Forwarder Node ➔receive packet and retransmit it to the other node.

• Non-forwarder Node ➔Simply it accept a packet intended for it.


• Each non forwarder node select at least one forwarder node as a neighbor.
• Both nodes periodically update the routing database.
• Connection between the MS and AP is similar to WLAN.

• But communication between APs are different.


Page | 10
• It allows handover in a subnet and IP based handover for non homogeneous network.
• It support seamless interoperation Ethernet and point-point connection.
• DSSS communicates non overlapping pulses at the chip rate of 11Mcps,which occupy 26 MHz.

17. Point out FHSS PHY (Frequency-hopping spread spectrum)


Two data rates for transmission at 1 and 2Mbps.
• Available channel 78 with a BW of 1GHz.
• Modulation technique is GFSK.
• Each BSS select one of the three patterns of 26 hops with the 3 groups..
Group1➔(0,3,6,….75),Group2➔(1,4,…76) and Group3➔(2,5,…77)

• In FHSS PHY, data transmission over media is controlled by theFHSS PMD sublayer as directed by theFHS
PLCP sublayer.
• Binary information bits converts them into RF signals by using carrier modulation and FHSS techniques.
• Data whitening is used for the PSDU beforetransmission to minimize DC bias on the data if
long stringsof 1s or 0s are contained in the PSDU. The PHY stuffs a special symbol every 4 octets
of the PSDU in a PPDU frame.

Page | 11
18.Analyze DSSS PHY (Direct sequence spread spectrum)
• The encoding scheme that is used is DBPSK (differential binary phase shift keying) send 1 or 2 bits
per symbol.
• Total BW 2.4GHz is divided in to 11 channels with spaced by 5MHz.
• DSSS communicates non overlapping pulses at the chip rate of 11Mcps,which occupy 26 MHz.

19. Analyze Bluetooth Architecture


• Universal radio interface for ad-hoc wireless connectivity
• Interconnecting computer and peripherals, handheld devices, PDAs, cell phones – replacement of IrDA
• Embedded in other devices, goal: 5€/device (already < 1€)

• Short range (10 m), low power consumption, license-free 2.45 GHz ISM

• Voice and data transmission, approx. 1 Mbit/s gross data rate


• Bluetooth PAN is also called a piconet and is composed of to 8 active devices in a master-slaverelationship

• The first Bluetooth device in the piconet is the master, and other devices are slaves thatcommunicate with the
Page | 12
master.
• A piconet typically has a range of 10 metres (33 ft)
• A single channel is shared among all devices in the piconet
• Each of the active slaves has an assigned 3-bit active member address

• Linking of multiple co-located piconets through the sharing of common master or slave devices Devices
can be slave in one piconet and master of another
• Communication between piconets
• Devices jumping back and forth between the piconets

• Collection of devices connected in an ad hoc fashion


One unit acts as master and the others as slaves for the lifetime of the piconet Master
determines hopping pattern, slaves have to synchronize
Each piconet has a unique hopping pattern
Participation in a piconet = synchronization to hopping sequence
Each piconet has one master and up to 7 simultaneous slaves (> 200 could be parked)

UNIT II

PART A

1. Point out about mobile IP?


Mobile IP communication protocol refers to the forwarding of Internet traffic with a fixed IP address even
outside the home network. It allows users having wireless or mobile devices to use the Internet remotely.
2. Classify the features of Mobile IP?
▪ Transparency : Mobile end system should continue to keep its IP address
▪ Compatibility : It should be compatible with existing internet protocol
▪ Scalability : It should be scalable to support billions of moving host worldwide.
▪ Security : provide users with secure communication over the internet
3. Categorizes 3- types of address assignment policies used in DHCP.
Manual configuration – manager can configure a specific address for a specific computer.
Dynamic configuration – server loans an address to a computer for a limited time.
Automaticconfiguration – DHCP server assigns permanent address when a computer first attaches to the network.
4. Classify the different terminologies of mobile IP?
Page | 13
▪ Home Network
▪ Home address
▪ Foreign agent
▪ Foreign Network
▪ Mobile IP
6. Point out the agent advertisement?
Foreign and the home agents advertise their presence through periodic agent advertisement messages. An
agent advertisement message, lists one or more care of address and a flag indicating whether it is a home agent or
a foreign agent.
7. Categorizes the key mechanisms in mobile IP?
▪ Discovering the care of address
▪ Registering the care of address
▪ Tunneling to the care of address.
8. Classify the different entities in a mobile IP.
Mobile Node, Correspondent Node, Home Network, Foreign Network, Foreign Agent, Home Agent,
Care-Of address, Foreign agent COA and Co-located COA.
9. Infer encapsulation and de-capsulation?
Encapsulation is the mechanism of taking a packet consisting of packet header and data putting it into the
data part of a new packet. The reverse operation, taking a packet out of the data part of another packet, is called
de-capsulation.
10. Point out an outer header and outer header.
The HA takes the original packet with the MN as destination, puts it into the data part of a new packet and
sets the new IP header in such a way that the packet is routed to the COA.The new header is called the outer
header.There is an inner header which can be identical to the original header as this case for IP-in-IP
encapsulation, or the inner header can be computed during encapsulation.
11. Infer generic routing encapsulation?
Generic routing encapsulation allows the encapsulation of packets of one protocol suite into the payload
portion of a packet of another protocol suite
12. Point out the general problems of mobile IP regarding security and support of quality of service?
Mobility poses many security problems. A minimum requirement is the authentication of all messages related
to the management of mobile IP. It must be sure for the IP layer if it forwards a packet to a mobile host that this host
really is the receiver of the packet. The IP layer can only guarantee that the IP addresses of the receiver is correct. There
are no ways of preventing faked IP address or other attacks
13. Infer Tunnel?
Tunnel establishes a virtual pipe for data packets between a tunnel entry and a tunnel endpoint. Packets entering a
tunnel are forwarded inside the tunnel and leave the tunnel unchanged. Sending a packet through a tunnel is
achieved by using encapsulation.
14. How will you use the care of address in Mobile–IP?
Care-of address (COA): The COA defines the current location of the MN from an IP point of view. All IP
packets sent to the MN are delivered to the COA, not directly to the IP address of the MN. Packet delivery
toward the MN is done using a tunnel. To be more precise, the COA marks the tunnel endpoint, i.e., the address
where packets exit the tunnel.
15. Classify the types of care of address?
It is the address that is used to identify the present location of a foreign agent
▪ Foreign agent care of address
▪ Co-located care of address
16. Categorize the different operation of mobile IP?
▪ The remote client sends a datagram to the MN using its home address it reaches the home agent asusual.
▪ The home agent encapsulates the datagram in a new packet and sends it to the foreign agent.
17. Point out the home agent
It is located in home network and it provides several services for the Mobile Network (MN).Home agent
maintains a location registry. The location registry keeps track of the node locations using the current care of
address of the mobile network.
18. Point out the Ad hoc wireless network with example?
Page | 14
An ad-hoc network is a local area network (LAN) that is built spontaneously as devices connect. Instead
of relying on a base station to coordinate the flow of messages to each node in the network, the individual
network nodes forward packets to and from each other. In Latin, ad hoc literally means "for this," meaning "for
this special purpose" and also, by extension, improvised or impromptu. In the Windows operating system, ad-hoc
is a communication mode (setting) that allows computers to directly communicate with each other without a
router.
19. Infer advantage of Infra-red technology?
The main advantages of infra-red technology are its simple and extremely cheap senders and receivers.
20. Differentiate wired networks and adhoc wireless networks based on routing.
For wired networks, generally the network is partitioned into two levels: intra-domain and inter- domain.
These current routing protocols are mostly designed to deal with simple network failures (e.g., links going up and
down, nodes crashing) and can have much vulnerability facing malicious intruders. The compromise of routing
function can lead to the denial of network service, the disclosure or modification of sensitive routing information,
the disclosure of network traffic, or the inaccurate accounting of network resource usage. For wireless Ad Hoc
networks, the situation is even worse. Ad Hoc networks have no pre- deployed infrastructure available for routing
packets end-to-end in a network. Nodes communicate with each other without the intervention of centralized
access points or base stations, so each node acts both as a router and as a host. Securing Ad Hoc routing presents
difficulties not present in traditional network: neither centrally administrated secure routers nor strict policy exist
in an Ad Hoc network; the nodes in the networks can be highly mobile, thus rapidly changing the node
constellation and the presence or absence of links. So the routing in ad hoc networks is an especially hard task to
accomplish securely, robustly and efficiently
21. Point out tunneling?
A tunnel establishes a virtual pipe for data packets between a tunnel entry and a tunnel endpoint. Packets
entering a tunnel are forwarded inside the tunnel and leave the tunnel unchanged. Tunneling, i.e., sending a
packet through a tunnel is achieved by using encapsulation.
22. Give examples for mobile adhoc networks.
Another application example of a mobile ad-hoc network is Bluetooth, which is designed to support a
personal area network by eliminating the need of wires between various devices, such as printers and personal
digital assistants. A mobile ad-hoc network can also be used to provide crisis management services applications.
23. Infer DHCP?
The dynamic host configuration protocol is mainly used to simplify the installation and maintenance of
networked computers. If a new computer is connected to a network, DHCP can provide it with all the necessary
information for full system integration into the network, e.g., addresses of a DNS server and the default router,
the subnet mask, the domain name, and an IP address.

24. Differentiate infrastructure and ad-hoc networks.


Infrastructure network- In this communication typically takes place only between the wireless nodes and
the access point. Any two wireless network nodes can communicate with the use of AP.
Ad-hoc networks- This type of network has no infrastructure and it does not have any Ap. Here anywireless
nodes from two different wireless networks cannot communicate.
25. Infer roaming?
If a user walks around with a wireless station, the station has to move from one access point to another to
provide uninterrupted service. Moving between access points is called roaming.
PART B

1. Why do you think tunnel is secure path from HA to FA?


Tunnel is a secure path from HA to FA that ensures the successful delivery of packets to the MN.
Care of Address is a termination point of a tunnel toward a MH, for data grams forwarded tothe
MH while it is away from home.

2. Categorize Mobile IP Messages and how it can used?


Page | 15
Message Types:
Binding Request (BR)
Binding Acknowledgement (BA)
Binding Update (BU)
Binding Warning(BW)

3. how could you classify the requirements for mobile IP.


Compatibility Transparency
Scalability
Efficiency Security
4. what can you point out about Triangular routing.
In the mobile IP, packets that are sent to a mobile host by thecorrespondent host are first routed to
the mobile host's home agent and thenforwarded to the mobile host at its current location by its
home agent.

5. why do you think that Foreign and Home Agent need in Mobile IP

Home Agent (HA)


• System in the home network of the MN, typically a router
• Registers the location of the MN, tunnels IP datagrams to the COA
Foreign Agent (FA)
• System in the current foreign network of the MN, typically a router
• Forwards the tunneled datagrams to the MN, typically also the default router for the MN.

6. Infer Care of address and categorizes it.


Care of address is a address of Foreign agent (router)

7. The least essential statements about Encapsulation and Decapsulation


• Encapsulation➔is the mechanism of taking a packet consisting of packet header and data and
putting it into the data part of a new packet.
• Decapsulation➔ The reverse operation, taking a packet out of the data part of another packet.

8. How can you compare proactive and reactive protocols?

• Proactive: when a packet needs to be forwarded, the route is already known.


• Reactive: Determine a route only when there is data to send.

9. what explanation do you have for tunneling and reverse tunneling?

• Tunneling ➔ establishes a virtual pipe for data packets between a tunnel entry and a tunnel
endpoint.
• Reverse tunneling➔MN can directly send its packets to the CN.

10. How do you classify the routing protocol in MANET?

• Destination-Sequenced Distance-Vector Routing-DSDV


Page | 16
• Cluster Head Gateway Switch Routing-CGSR
• Ad Hoc On-Demand Distance Vector Routing-AODV
• Dynamic Source Routing-DSR
• Temporarily Ordered Routing Algorithm-TORA
• Associativity-Based Routing-ABR

11. How do you use the micro mobility support in optimization?

• Efficient local handover inside foreign domain without involving a HA.


• Reduces control traffic on backbone Especially needed for route optimization
a) Cellular IP

• It provides local handovers without renewed registration by installing a single cellular IP gateway
(CIPGW) for each domain.
• In cellular IP domain, all nodes collect routing information from CIPGW.
• Soft handovers are achieved by allowing simultaneous forwarding of packets destined for a mobile
node along multiple paths.
• A mobile node moving between adjacent cells➔ temporarily be able to receive packets via both old
and new base stations (BS)
• Cellular IP requires changes to the basic mobile IP protocol and is not transparent to existing
systems.
• The foreign network‘s routing tables are changed based on messages sent by mobile nodes.
• These should not be trusted blindly even if they have been authenticated. This could be exploited
by systems in the foreign network

12. Why do you use HAWAII(Handoff-Aware Wireless Access Internet Infrastructure) and how does it
works?

• Keep micro-mobility support as transparent as


possible for both HA and MN.
• It doesn‘t replace IP but works better than IP.
• Each station maintains routing cache to deal with
mobility and hop-hop tx of pkts.
• It support 2types of Handover.
• Page request reach all stations (multicast group)
• step 1➔MN obtains a COA
• step 2 ➔MN registers with the HA
• MN moving to foreign domain
Page | 17
• step 3➔MN sends a registration request to the new
base station as to a FA

• step 4 ➔New BS intercepts the registration request.


• Also it sends out a handoff message, and routers paths from the old and new BS.

13. How can you explain the agent discovery process in mobile IP?

• HA and FA advertise their presence periodically using AA messages.


• These advertisement messages(ICMP) is a beacon broadcast into the subnet.
14. Survey the different characteristics of agent in mobile IP.
1. Bit H and F denotes whether agent offers services on the link
2. Bit Mand G specify the method of encapsulation
3. M➔min;G➔Generic
4. B➔represents agent busy
5. T➔reverse tunneling

15. How could you register the discovery agent and point out the registration process?

• Get a COA from FA


• Inform its HA of its current COA
• Renew registration with FA.
• De-register when it back to Home

• Type➔ set to 1 for a registration request


• Lifetime ➔denotes the validity of the registration in seconds.
• B bit➔indicates broadcast packets which have been received by the HA in the home network.
• D bit ➔indicates this behavior of MN
• M and G➔ denote the use of minimal encapsulation or generic routing encapsulation
• T➔indicates reverse tunneling, r and x are set to zero.
• home address➔ is the fixed IP address of the MN
• home agent➔ is the IP address of the HA
• COA represents the tunnel endpoint. The 64 bit identification is generated by the MN to identify a
Page | 18
request and match it with registration replies.

• extensions➔ contain parameters for authentication.

17. How could you asses the protocols used in the Dynamic source routing protocol?

• The protocol consists of two major phases: Route Discovery, Route Maintenance.
• When a mobile node has a packet to send to some destination, it first consults its route cache to
check whether it has a route to that destination.
• If it is an un-expired route, it will use this route.
• If the node does not have a route, it initiates route discovery by broadcasting a Route Request
packet.
• This Route Request contains the address of the destination, along with the source address.
• Each node receiving the packet checks to see whether it has a route to the destination. If it does not,
it adds its own address to the route record of the packet and forwards it.
• A route reply is generated when the request reaches either the destination itself or an intermediate
node that contains in its route cache an un-expired route to that destination.
• If the node generating the route reply is the destination, it places the route record contained in the
route request into the route reply.
• 2 phases, operating both on demand:
– Route discovery

• Used only when source S attempts to to send a packet to destination D

• Based on flooding of Route Requests (RREQ)


– Route maintenance

• makes S able to detect, while using a source route to D, if it can no longer use its
Page | 19
route (because a link along that route no longer works)

• Route reply by reversing the route (as illustrated) works only if all the links along
the route are bidirectional

• If unidirectional links are allowed, then RREP may need a route discovery from D to
S

18. Destination sequenced distance vector routing protocol

Destination-Sequenced Distance Vector Routing-DSDV


Each mobile node maintains a routing table with a route
every possible destination in the network and the number hops to the destination
The sequence number of the information received about the destination and a new sequence
number unique to the broadcast the destination address

If multiple routes are available for the same destination the route with the smaller hops is used.
Any updates in the routing tables are periodically broadcast in the network to maintain table
consistency
The amount of traffic generated by these updates can be huge To alleviate this problem, the updates
are made through two types of packets (a) Full Dump (b) Incremental dump

The incremental packets fit into a standard NPDU and hence decrease the amount of traffic
generated.

Page | 20
UNIT-IV

PART A

1. Classify the sub-systems of UMTS Terrestrial Radio Access Network (UTRAN).


The UTRAN consists of a set of radio network subsystems (RNSs). The RNS has two main logical
elements: Node B and an RNC.
2. State the responsibilities of an RNC.
An RNC is responsible for the use and allocation of all the radio resources of the RNS to which it
belongs. The RNC also handles the user voice and packet data traffic, performing the actions on the user data
streams that are necessary to access the radio bearers.
3. State the responsibilities of Node B.
A Node B is responsible for radio transmission and reception in one or more cells to/from the user
equipment (UE).
4. Draw the UTRAN logical architecture.

5. Opinion about the need for Iu interface?


The UMTS Iu interface is the open logical interface that interconnects one UTRAN to the UMTS core
network (UCN). On the UTRAN side the Iu interface is terminated at the RNC, and at the UCN side it is
terminated at U-MSC.
6. State the three different protocol planes of Iu interface.
The Iu interface consists of three different protocol planes — the radio network control plane (RNCP), the
transport network control plane (TNCP), and the user plane (UP).
7. Classify the functions of RNCP.
It carries information for the general control of UTRAN radio network operations. It carries information
for control of UTRAN in the context of each specific call. It carries user call control (CC) and mobility
management (MM) signaling messages.
8. Opinion the need for Iur interface?
The connection between two RNCs (serving RNC (SRNC) and drift RNC (DRNC)) is the Iur interface. It
is used in soft handoff scenarios when different macro diversity streams of one communication are supported by
Node Bs that belong to different RNCs. Communication between one RNC and one Node B of two different
RNCs are realized through the Iur interface.
9. Point out the functions carried out by Iur interface?
Basic inter-RNC mobility support, Dedicated channel traffic support, Common channel traffic support
and Global resource management support.
10. Opinion about the need for Iub interface?
Page | 21
The connection between the RNC and Node B is the Iub interface. There is one Iub interface for each
Node B. The Iub interface is used for all of the communications between Node B and the RNC of the same RNS.
11. State the functionality of Uu interface.
The UMTS Uu interface is the radio interface between a Node B and one of its UE. The U u is the interface
through which UE accesses the fixed part of the system.
12. State the functions of 3G-MSC.
The 3G-MSC is the main CN element to provide CS services. The 3G-MSC also provides the necessary
control and corresponding signaling interfaces including SS7, MAP, ISUP (ISDN user part), etc. The 3G MSC
provides the interconnection to external networks like PSTN and ISDN.
13. Draw UMTS core network architecture.

14. Identity about 3G-SGSN.


The 3G-SGSN is the main CN element for PS services. The 3G-SGSN provides the necessary control
functionality both toward the UE and the 3G-GGSN. It also provides the appropriate signaling and data interfaces
including connection to an IP-based network toward the 3G-GGSN, SS7 toward the HLR/EIR/AUC and TCP/IP
or SS7 toward the UTRAN.
15. Categorize the functions of 3G-GGSN
The GGSN provides interworking with the external PS network. It is connected with SGSN via an IP-
based network. The GGSN may optionally support an SS7 interface with the HLR to handle mobile terminated
packet sessions.
16. Infer the tasks carried out by SMS-GMSC?
Reception of short message packet data unit (PDU), Interrogation of HLR for routing information and
Forwarding of the short message PDU to the MSC or SGSN using the routing information.
17. Why do we need Firewall in a network?
This entity is used to protect the service providers’ backbone data networks from attack from external
packet data networks. The security of the backbone data network can be ensured by applying packet filtering
mechanisms based on access control lists or any other methods deemed suitable.

18. Point out about DNS.


The DNS server is used, as in any IP network, to translate host names into IP addresses, i.e., logical
names are handled instead of raw IP addresses. Also, the DNS server is used to translate the access point name
(APN) into the GGSN IP address. It may optionally be used to allow the UE to use logical names instead of
physical IP addresses.
19. Classify the need for DHCP.
A dynamic host configuration protocol server is used to manage the allocation of IP configuration
information by automatically assigning IP addresses to systems configured to use DHCP.
20. State the salient features of HSDPA.
HSDPA is based on the same set of technologies as high data rate (HDR) to improve spectral efficiency
for data services — such as shared downlink packet data channel and high peak data rates (8–10 Mbps) — using
high-order modulation and adaptive modulation and coding, hybrid ARQ (HARQ) retransmission schemes, fast
scheduling and shorter frame sizes. HSDPA also shortens the round-trip time between the network and terminals
and reduces variance in downlink transmission delay.
Page | 22
21. Point out the role of firewall used in UMTS network?
All traffic coming in and going out of the private network is handled by the firewall. The firewall ensures
that only authenticated traffic is allowed to pass through it.

PART B

1. Point out the Physical layer in UTRAN and explain different types of techniques involved in
UTRAN

• Forward error correction, bit-interleaving, and rate matching


• Signal measurements
• Micro-diversity distribution/combining and soft handoff execution
• Multiplexing/mapping of services on dedicated physical codes
• Modulation, spreading, demodulation, despreading of physical channels
• Frequency and time (chip, bit, slot, frame) synchronization
• Fast closed-loop power control
• Power weighting and combining of physical channels
• Radio frequency (RF) processing.

2. Survey the RNC responsibilities and how the interfaces differ from one another?

• Intra UTRAN handover


• Macro diversity combining/splitting of Iub data streams
• Frame synchronization
• Radio resource management
• Outer loop power control
• Iu interface user plane setup
• Serving RNS (SRNS) relocation
• Radio resource allocation (allocation of codes, etc.)
• Frame selection/distribution function necessary for soft handover (functions
of UMTS radio interface physical layer)
• UMTS radio link control (RLC) sublayers function execution

3. Illustrate ALCAP and functions of RNC and provide how the functions involved in RNC?

Page | 23
• The transport network control plane contains access link control application part(ALCAP)
required to set up the transport bearers (data bearers) for the user plane.

RNC functions

• Basic inter-RNC mobility support


• Dedicated channel traffic support
• Common channel traffic support
• Global resource management support

4. How can you compare UMTS from 2G networks?

• It supports the adv the UMTS supports the advanced data and information services and can
becalled a true multimedia network.
• Higher data rate - The UMTS supports 2 Mbps data rate, which is much higher than that
supported by the 2G mobile systems.

5. How can you differ the different types of logical interfaces in network architecture?

• Iu interface
• Iur interface
• Iub interface
• Uu interface

Page | 24
6. How can you compare the different parts of3G-MSC functions?

• 3G-MSC➔ provides the necessary control and corresponding signaling interfaces including
SS7, MAP, ISUP (ISDN user part).

7. Analyze Firewall protection and how it is useful?

• Firewalls filter based on IP addresses. Home firewalls rejects packet from MN.

8. How can you sorts the parts of SGSN and GGSN?

• SGSN➔serves routing,mobility management and authentication to and from all GPRS users.
• GGSN➔ provides gateway for external IP network and handling security functions.

9. What explanation do you have for HSDPA channels?


• UTRAN➔ Radio channel coding/decoding.Macro diversity combining/splitting of data
streams from its cells (sectors).Termination of Uu interface from UE.Error detection and
correction.
10. How would you explain Protocol model of UTRAN?
New Radio Access network needed mainly due

to new radio access technology
Core Network (CN) is based on GSM/GPRS

Radio Network Controller (RNC) corresponds

roughly to the Base Station Controller (BSC)
in GSM
Node B corresponds roughly to the Base

Station in GSM









Page | 25
• Uu Interface➔ Radio interface between a Node B and one of its UE.
• lu Interface➔ interconnects one UTRAN to the UMTS core network
• Iur Interface➔ connection between two RNCs
• lub Interface➔ connection between the RNC and Node B
• Iu interface has three protocol planes➔ Radio network control plane (RNCP), Transport
network control plane (TNCP), and the user plane (UP).
11. How can you classify functions of UTRAN and how it is related to the protocol?
• It carries information for the general control of UTRAN radio network operations.
• It carries information for control of UTRAN in the context of each specific call.
• It carries user call control (CC) and mobility management (MM) signaling messages.
TNCP functions
• carries information for the control of transport network used within UCN.
UP functions
• carries user voice and packet data information.(up to 64 kbps)
• SSCF and SSCOP layers are specifically designed for signaling transport in ATM networks.
• Also it will take care of signaling connection management functions.
• AAL5 is used for segmenting the data to ATM cells.
• SCTP layer is specifically designed for signaling transport on the Internet.

Page | 26
12. What idea validate the functions of UMTS domains and analysis the entities involved in functions?

• UCN consists of a CS entity for providing voice and CS data services and a PS entity for
providing packet-based services.
• Network management systems (billing and provisioning, service management, element
management.
• CN has different functional areas:
• Functional entities needed to support PS services (e.g. 3G-SGSN, 3G-GGSN)
• Functional entities needed to support CS services (e.g. 3G-MSC/VLR)
• Functional entities common to both types of services (e.g. 3G-HLR)

Page | 27
13. What explanation do you have for 3G-MSC Services?
• Mobility management➔ Handles attach, authentication, updates to the HLR, RNS relocation, and
intersystem's handover.
• Call management➔ Handles call set-up messages from/to the UE.
• Supplementary services➔ Handles call-related services.(call waiting, etc.)
• CS data services➔ The IWF provides rate adaptation and message translation for circuit mode data
services, such as fax.
• Short message services (SMS)➔ allows the user to send and receive SMS data to and from the
SMS-GMSC/SMS-IWMSC.
• VLR functionality➔ database is located within the 3G-MSC and can serve as intermediate storage
for visitor subscriber data.
• OAM (operation, administration, and maintenance) agent functionality

14. How can you compare the responsibilities of RNC and Node B in UTRAN architecture?

• RNC is responsible for the use and allocation of all the radio resources of the RNS to which it
belongs.
• Responsibilities of RNC
• Intra UTRAN soft handover
• Macro diversity combining/splitting of data streams
• Frame synchronization
• Radio resource allocation & management
• Outer loop power control

Page | 28
Responsibilities of the Node B:
• Termination of Iub interface from RNC
• Termination of MAC protocol for transport channels RACH, FACH
• Termination of MAC, RLC, and RRC protocols for transport channels BCH, PCH
• Radio environment survey (BER estimate, receiving signal strength, etc.)
• power control and Radio channel coding/decoding
• Macro diversity combining/splitting of data streams from its cells (sectors)
• Termination of Uu interface from UE
• Error detection and correction(FEC),Mux and Demux
• Modulation and spreading/demodulation and despreading of physical channels
Frequency and time (chip, bit, slot, frame) synchronization

15. How would you explain the LTE Protocol structure?

1) PCRF –( Policy Control and Charging Rules )➔Function is responsible for policy control
decision-making and controlling the flow-based charging .
2) HSS – (Home Subscriber Server)➔ contains users‘ SAE subscription data such as the EPS-
subscribed QoS profile and any access restrictions for roaming.
• It also holds information about the PDNs to which the user can connect.
• In addition the HSS holds dynamic information such as the identity of the MME to which the user
is currently attached or registered.
3) P-GW – (PDN Gateway)➔ responsible for IP address allocation for the UE and flow-based
charging.
• It is responsible for the filtering of downlink user IP packets into the different QoS-based bearers.
• It also serves as the mobility anchor for interworking with non-3GPP technologies such as
CDMA2000 and WiMAX networks.
4) S-GW ( Serving Gateway)➔ serves as the local mobility UE moves between eNodeBs.

Page | 29
• It also retainsthe information about the bearers when the UE is in the idle state IDLE.
• performs some administrative functions in the visited network such as collecting
information forcharging packet radio service (GPRS) and UMTS.
5) MME –( Mobility Management Entity)➔is the control node processes the
signaling between theUE and the CN.
• Functions related to bearer management – This includes the establishment,
maintenance and release of the bearers
• Functions related to connection management – This includes the establishment of
the connectionand security between the network and UE

You might also like