Professional Documents
Culture Documents
COLLEGE OF ENGINEERING
NH-47,Palakkad Main Road, Navakarai ,Coimbatore- 641 105
UNIT I
PART A
1. Calculate the capacity of a single IS-95 cell that uses QPSK modulation and
convolutionalcoding 3 db < Sr < 9 db, and bandwidth of the channel is 1.25 MHz
M= = 16 Users to M = = 65 Users
2. Determine the transfer time of a 20 kB file with a mobile data network with the transmissionrate of
10 Kbps.
Solution: For a data rate of around 10 kbps, it would take 20(KB) × 8(B/b) / 10 kbps = 16
seconds to transfer for such a file.
M=
M = 16.7 users per cell.
4. Compute the maximum throughput of a pure ALOHA networking with a large number ofusers
and transmission rate of 1 Mbps?
For a large number of mobile terminals each using a transmission rate of 1 Mbps to access a BS using
ALOHA protocol, the maximum rate that successfully passes through to the BS is 180 kbps.
6. Infer Handoff?
Handoff basically involves change of radio resources from one cell to other adjacent cells without
interrupting the call or alerting the user when the mobile unit moves from one cell to another
12. Classify the types of Random Access protocols and Collision Resolution protocols.
The types of random access protocols are
a. ALOHA type protocol
b. Carrier Sense Multiple Access (CSMA) type protocol
c. Busy tone multiple Access (BTMA) type protocol.
d. Idle Signal Multiple Access (ISMA) type protocol
Page | 3
d. Availability.
23. Draw the frame format of IEEE 802.11 physical layer using FHSS. The frame format of IEEE 802.11 physical
layer using FHSS are
24. Draw the frame format of IEEE 802.11 physical layer using DSSS.The frame format of IEEE 802.11 physical
layer using DSSS
25. Categorize the type of architecture used in IEEE 802.11 The type of architecture used in IEEE
802.11
(a) Infrastructure based.
(b) Ad-hoc based.
Octets:
2 2 6 6 6 2 6 0-2312 4
Frame control
Duration
DA-Destination Address
SA-Starting Address
BSSID
Sequence control
Frame body
FCS-Frame Check Sequence
ATM
Wireless Header ATM Header Payload Wireless
(5 bytes) (48 bytes) Trailor
33. Categorize the phases available in HIPER LAN-1 MAC layer?The phases
available in HIPER LAN-1 MAC layer
Prioritization Phase: It determines the highest priority of a data packet ready to besent by
competing nodes.
Contention phase : Eliminate all but one of the contenders if more than one senderhas the
current priority.
Transmission Phase: Transmit the packet of the remaining node.
PART B
1. What are the MAC services of IEEE 802.11 that are not provided in traditional LAN 802.3?
The MAC services of IEEE 802.11 that are not provided in traditional LAN
802.3 are
2. How many physical channels are available in each IS-95 carrier? What type of coding separates these channels
from one another?
The physical channels of IS-95 are available as
a. Forward Link Channel that consists of 64 logical channels each channel occupies 1228 kHZ
bandwidth. These 64 channels are separated by Walsh code.
b. Reverse Link Channel that consists of 94 logical CMDA channel each channel occupies 1228
kHZ bandwidth. The reverse links supports 32 access channel and 62 traffic channel. These 32 access
channels are separated by Distinct long code and the traffic channels are separated by User specific long
code
3.Why does an AP in wireless network act as a bridge?
Access Point in IEEE802.11 architecture acts as a bridge and a relay point. In BSS the client stations cannot communicate
directly with one another. Rather if one client wants to communicate to another client of same BSS a MAC frame format is
sent to AP and AP will connect to the requested destination. Similarly a MAC frame from a station in the BSS to the remote
station is sent from the local station to the AP and then relayed by the AP over the DS on its way to its destination station.
11. How can you evaluate the problems with the hidden terminal and exposed terminal.
• Hidden terminal problem➔if 2 nodes send data to same destinator simultaneously
• Exposed terminal problem➔while a node sending data at a time if it rx data same time
By using RTS/CTS,can avoid the above.
12. Analyze the Spread spectrum technique
• Spread spectrum techniques spread information over a very large bandwidth specifically, a
bandwidth that is much larger than the inverse of the data rate.
Page | 8
13. How can you differentiate IR transmission Vs UHF
Requires low BW,no need for license It support both unlicensed band(430-
450MHz) and licensed (450-470MHz)
• During network discovery, the Mobile Station (MS) discovers both the access service provider
and the available Network Service Provider (NSP).
Page | 9
• The MAC layer consists➔ (i) the MAC Convergence Sublayer (CS), (ii) the MAC Common Part
Sublayer, and (iii) the MAC Security Sublayer.
1) Convergence Sublayer➔ receives data packets from higher layers and modify the suitable
format for sending via air medium by suppressing redundant information in their headers..
2) Common Part Sublayer➔provides the essential support functions for the over the-air
transmission of the information.
• It includes such functions as signaling,modulation/coding scheme, feedback and bandwidth
allocation.
• It also provides fragmentation and packing…
3) Security Sublayer➔ assign service flow identifier (ID), Connection Identifier (CID), provisioned
QoS parameters and the authorization module.
16. Categorize HIPERLAN standards
• Data rate 23.529Mbps.
• Coverage 100m,frequency 5.2GHZ.
• Supports asynchronous and synchronous
• In FHSS PHY, data transmission over media is controlled by theFHSS PMD sublayer as directed by theFHS
PLCP sublayer.
• Binary information bits converts them into RF signals by using carrier modulation and FHSS techniques.
• Data whitening is used for the PSDU beforetransmission to minimize DC bias on the data if
long stringsof 1s or 0s are contained in the PSDU. The PHY stuffs a special symbol every 4 octets
of the PSDU in a PPDU frame.
Page | 11
18.Analyze DSSS PHY (Direct sequence spread spectrum)
• The encoding scheme that is used is DBPSK (differential binary phase shift keying) send 1 or 2 bits
per symbol.
• Total BW 2.4GHz is divided in to 11 channels with spaced by 5MHz.
• DSSS communicates non overlapping pulses at the chip rate of 11Mcps,which occupy 26 MHz.
• Short range (10 m), low power consumption, license-free 2.45 GHz ISM
• The first Bluetooth device in the piconet is the master, and other devices are slaves thatcommunicate with the
Page | 12
master.
• A piconet typically has a range of 10 metres (33 ft)
• A single channel is shared among all devices in the piconet
• Each of the active slaves has an assigned 3-bit active member address
• Linking of multiple co-located piconets through the sharing of common master or slave devices Devices
can be slave in one piconet and master of another
• Communication between piconets
• Devices jumping back and forth between the piconets
UNIT II
PART A
5. why do you think that Foreign and Home Agent need in Mobile IP
• Tunneling ➔ establishes a virtual pipe for data packets between a tunnel entry and a tunnel
endpoint.
• Reverse tunneling➔MN can directly send its packets to the CN.
• It provides local handovers without renewed registration by installing a single cellular IP gateway
(CIPGW) for each domain.
• In cellular IP domain, all nodes collect routing information from CIPGW.
• Soft handovers are achieved by allowing simultaneous forwarding of packets destined for a mobile
node along multiple paths.
• A mobile node moving between adjacent cells➔ temporarily be able to receive packets via both old
and new base stations (BS)
• Cellular IP requires changes to the basic mobile IP protocol and is not transparent to existing
systems.
• The foreign network‘s routing tables are changed based on messages sent by mobile nodes.
• These should not be trusted blindly even if they have been authenticated. This could be exploited
by systems in the foreign network
12. Why do you use HAWAII(Handoff-Aware Wireless Access Internet Infrastructure) and how does it
works?
13. How can you explain the agent discovery process in mobile IP?
15. How could you register the discovery agent and point out the registration process?
17. How could you asses the protocols used in the Dynamic source routing protocol?
• The protocol consists of two major phases: Route Discovery, Route Maintenance.
• When a mobile node has a packet to send to some destination, it first consults its route cache to
check whether it has a route to that destination.
• If it is an un-expired route, it will use this route.
• If the node does not have a route, it initiates route discovery by broadcasting a Route Request
packet.
• This Route Request contains the address of the destination, along with the source address.
• Each node receiving the packet checks to see whether it has a route to the destination. If it does not,
it adds its own address to the route record of the packet and forwards it.
• A route reply is generated when the request reaches either the destination itself or an intermediate
node that contains in its route cache an un-expired route to that destination.
• If the node generating the route reply is the destination, it places the route record contained in the
route request into the route reply.
• 2 phases, operating both on demand:
– Route discovery
• makes S able to detect, while using a source route to D, if it can no longer use its
Page | 19
route (because a link along that route no longer works)
• Route reply by reversing the route (as illustrated) works only if all the links along
the route are bidirectional
• If unidirectional links are allowed, then RREP may need a route discovery from D to
S
If multiple routes are available for the same destination the route with the smaller hops is used.
Any updates in the routing tables are periodically broadcast in the network to maintain table
consistency
The amount of traffic generated by these updates can be huge To alleviate this problem, the updates
are made through two types of packets (a) Full Dump (b) Incremental dump
The incremental packets fit into a standard NPDU and hence decrease the amount of traffic
generated.
Page | 20
UNIT-IV
PART A
PART B
1. Point out the Physical layer in UTRAN and explain different types of techniques involved in
UTRAN
2. Survey the RNC responsibilities and how the interfaces differ from one another?
3. Illustrate ALCAP and functions of RNC and provide how the functions involved in RNC?
Page | 23
• The transport network control plane contains access link control application part(ALCAP)
required to set up the transport bearers (data bearers) for the user plane.
RNC functions
• It supports the adv the UMTS supports the advanced data and information services and can
becalled a true multimedia network.
• Higher data rate - The UMTS supports 2 Mbps data rate, which is much higher than that
supported by the 2G mobile systems.
5. How can you differ the different types of logical interfaces in network architecture?
• Iu interface
• Iur interface
• Iub interface
• Uu interface
Page | 24
6. How can you compare the different parts of3G-MSC functions?
• 3G-MSC➔ provides the necessary control and corresponding signaling interfaces including
SS7, MAP, ISUP (ISDN user part).
• Firewalls filter based on IP addresses. Home firewalls rejects packet from MN.
• SGSN➔serves routing,mobility management and authentication to and from all GPRS users.
• GGSN➔ provides gateway for external IP network and handling security functions.
•
•
•
•
•
•
•
•
Page | 25
• Uu Interface➔ Radio interface between a Node B and one of its UE.
• lu Interface➔ interconnects one UTRAN to the UMTS core network
• Iur Interface➔ connection between two RNCs
• lub Interface➔ connection between the RNC and Node B
• Iu interface has three protocol planes➔ Radio network control plane (RNCP), Transport
network control plane (TNCP), and the user plane (UP).
11. How can you classify functions of UTRAN and how it is related to the protocol?
• It carries information for the general control of UTRAN radio network operations.
• It carries information for control of UTRAN in the context of each specific call.
• It carries user call control (CC) and mobility management (MM) signaling messages.
TNCP functions
• carries information for the control of transport network used within UCN.
UP functions
• carries user voice and packet data information.(up to 64 kbps)
• SSCF and SSCOP layers are specifically designed for signaling transport in ATM networks.
• Also it will take care of signaling connection management functions.
• AAL5 is used for segmenting the data to ATM cells.
• SCTP layer is specifically designed for signaling transport on the Internet.
Page | 26
12. What idea validate the functions of UMTS domains and analysis the entities involved in functions?
• UCN consists of a CS entity for providing voice and CS data services and a PS entity for
providing packet-based services.
• Network management systems (billing and provisioning, service management, element
management.
• CN has different functional areas:
• Functional entities needed to support PS services (e.g. 3G-SGSN, 3G-GGSN)
• Functional entities needed to support CS services (e.g. 3G-MSC/VLR)
• Functional entities common to both types of services (e.g. 3G-HLR)
Page | 27
13. What explanation do you have for 3G-MSC Services?
• Mobility management➔ Handles attach, authentication, updates to the HLR, RNS relocation, and
intersystem's handover.
• Call management➔ Handles call set-up messages from/to the UE.
• Supplementary services➔ Handles call-related services.(call waiting, etc.)
• CS data services➔ The IWF provides rate adaptation and message translation for circuit mode data
services, such as fax.
• Short message services (SMS)➔ allows the user to send and receive SMS data to and from the
SMS-GMSC/SMS-IWMSC.
• VLR functionality➔ database is located within the 3G-MSC and can serve as intermediate storage
for visitor subscriber data.
• OAM (operation, administration, and maintenance) agent functionality
14. How can you compare the responsibilities of RNC and Node B in UTRAN architecture?
• RNC is responsible for the use and allocation of all the radio resources of the RNS to which it
belongs.
• Responsibilities of RNC
• Intra UTRAN soft handover
• Macro diversity combining/splitting of data streams
• Frame synchronization
• Radio resource allocation & management
• Outer loop power control
Page | 28
Responsibilities of the Node B:
• Termination of Iub interface from RNC
• Termination of MAC protocol for transport channels RACH, FACH
• Termination of MAC, RLC, and RRC protocols for transport channels BCH, PCH
• Radio environment survey (BER estimate, receiving signal strength, etc.)
• power control and Radio channel coding/decoding
• Macro diversity combining/splitting of data streams from its cells (sectors)
• Termination of Uu interface from UE
• Error detection and correction(FEC),Mux and Demux
• Modulation and spreading/demodulation and despreading of physical channels
Frequency and time (chip, bit, slot, frame) synchronization
1) PCRF –( Policy Control and Charging Rules )➔Function is responsible for policy control
decision-making and controlling the flow-based charging .
2) HSS – (Home Subscriber Server)➔ contains users‘ SAE subscription data such as the EPS-
subscribed QoS profile and any access restrictions for roaming.
• It also holds information about the PDNs to which the user can connect.
• In addition the HSS holds dynamic information such as the identity of the MME to which the user
is currently attached or registered.
3) P-GW – (PDN Gateway)➔ responsible for IP address allocation for the UE and flow-based
charging.
• It is responsible for the filtering of downlink user IP packets into the different QoS-based bearers.
• It also serves as the mobility anchor for interworking with non-3GPP technologies such as
CDMA2000 and WiMAX networks.
4) S-GW ( Serving Gateway)➔ serves as the local mobility UE moves between eNodeBs.
Page | 29
• It also retainsthe information about the bearers when the UE is in the idle state IDLE.
• performs some administrative functions in the visited network such as collecting
information forcharging packet radio service (GPRS) and UMTS.
5) MME –( Mobility Management Entity)➔is the control node processes the
signaling between theUE and the CN.
• Functions related to bearer management – This includes the establishment,
maintenance and release of the bearers
• Functions related to connection management – This includes the establishment of
the connectionand security between the network and UE