You are on page 1of 18

Question bank

a. Discuss the reason behind more errors in wireless link compared to wired
link?
b. What is connection oriented from the perspective of transport layer.
c. What is the full form of FEC?
d. What is the difference between centralized and decentralized system?
e. What is encapsulation?
f. What do you mean by mobility binding?
g. Explain the terminologies
a. Foreign agent
b. Correspondent node
c. Home network
h. Explain any two methods to control congestion?
i. Discuss the transaction oriented TCP.
j. Short Note on 4G
k. Challenges of 4g and explain any 2
l. Explain the features of Transaction Oriented TCP.
m. What are the functions of network layers?

1. Discuss the reason behind more errors in wireless link compared to wired
link?
[1]Wireless links are not as strong as wired links. The radio quality may differ
significantly over time, thus, the bandwidth is generally lower, and transmission errors
occur more often. [2] More errors are generated while sending signals over a
unidirectional radio based medium than in a guided medium such as coax or fiber. Signal
strength is weakened with the distance between the portable station and the base station,
and radio signals bounce off objects, leading to interference and multi-path effects. To
screen upper protocol layers from transmission errors, interleaving, error correction and
retransmissions can be used at lower layers. In several wireless networks, the Data link
layer performs error recovery according to an Automatic repeat request (ARQ) protocol
The Transmission Control Protocol (TCP) has proved proficient in classical wired
networks, presenting an ability to acclimatize to modern, high-speed networks and
present new scenarios for which it was not formerly designed. Wireless access to the
Internet requires that information reliability be reserved while data is transmitted over the
radio channel. Automatic repeat request (ARQ) schemes and TCP techniques are often
used for error-control at the link layer and at the transport layer, respectively.
Since TCP uses an ARQ mechanism based on positive acknowledgments, reliability is
achieved. Every byte is numbered and the number of the first byte in a segment is used as
a sequence number in the TCP header.
A cumulative acknowledgment is transmitted by a receiver in reply to an incoming
segment, which implies that many segments can be acknowledged at the same time.
TCP manages a retransmission timer which starts when a segment is transmitted. If
the timer expires before the acknowledgement of the segment, TCP retransmits the
segment.
Intermittent connectivity and High bit error rates characterize wireless links. This can
result in considerable deprivation in the performance of TCP over wireless networks
because non-congestion related packet losses can be misunderstood by TCP as
indications of network congestion which results in unnecessary congestion control. TCP
interprets the entire data loss as congestion in the network and thus, TCP decreases its
transmission rate to reduce the congestion. TCP was primarily designed for wired
networks which have a very different character from wireless.
2) Wireless Internet should work indoor and outdoor, for both fixed and movable users.
The complex performance of TCP over wireless has been the center of attention in recent
years, and researchers experimenting with TCP are always intense to show the efficiency
of their enhancements by displaying results from numerous tests over varying network
conditions, largely making use of accepted network simulators, and seldom using
wireless testbeds. The key issue for TCP over wireless is of elevated packet loss rate of
unsystematic nature on the transmission channels, which was not present in TCP's design
from day one.
As packet switched Internet is reaching more and more private and business users, The
challenge in modeling the performance of TCP over wireless channels is the complexity
in setting up a true wireless testbed and performing experiments, and gathering precise
statistics on TCP's true performance of a server placed somewhere in the Internet
transporting data over HTTP or FTP. Another challenge is in the acquirement of right
equipment and tools to set up the wireless testbed. Hence, researchers frequently choose
to simulate and emulate as the mode of experimenting with TCP, using predefined
wireless channel models. Once limited, Wi-Fi hotspots are widespread now easily
connecting users to web pages, email, or file downloads from a larger wired Internet. The
innovative communication standard is a wireless network communicating to a fixed
wired host at an end point. Mixing wired and wireless networks underneath the TCP/IP
presents numerous challenges. TCP was formerly proposed for wired networks which are
of a very different nature from wireless networks. A few of the challenges presented by
wireless networks are elevated bit error rates, route changes, and disconnections due to
mobility [6]. If placed in this setting without any modifications, TCP will offer a
consistent transport; on the other hand, performance will decline considerably. Numerous
solutions have been proposed to adapt TCP to pure wireless and heterogeneous networks.

2. what is connection oriented from the perspective of transport layer


The Connection oriented services establish a connection prior to sending the packets
belonging to the same message from source to the destination
3. What is the full form of FEC?
Forward error correction (FEC) is a method of obtaining error control in data
transmission in which the source (transmitter) sends redundant data and the destination
(receiver) recognizes only the portion of the data that contains no apparent errors
4. What is the difference between centralized and decentralized system?

The primary difference between centralized and decentralized communication networks


has to do with the question of who has control over the network itself. In a centralized
system, a singular authority or administrator retains total control over all aspects of the
network. This authority is typically exerted through a central server that manages all data
and permissions. A centralized network also locates all major processing power in this
primary server.

Decentralized networks are organized in a much more distributed fashion. Each node
within the network functions as a separate authority with independent decision-making
power regarding how it interacts with other systems. These networks also distribute
processing power and workload functions among connected servers

5. What is encapsulation?
simple method that describes how to take an IP datagram and make it the payload
of another IP datagram.
Encapsulation is required because each datagram we intercept and forward needs to
be resent over the network to the device's care-of address.
6. What do you mean by mobility binding?
The Mobile Node sends its registration request to the Home Agent. The HA now sets
up a mobility binding containing the mobile node's home IP address and the current
COA.
7. Explain the terminologies in Mobile IP
 a.Foreign agent: It is a router in foreign network to which mobile node is
currently connected. The packets from the home agent are sent to the foreign
agent which delivers it to the mobile node.

b. Correspondent node : It is a device on the internet communicating to the


mobile node.

 c. Home network: It is a network to which the mobile node originally


belongs to as per its assigned IP address (home address).

 Mobile Node (MN):


It is the hand-held communication device that the user caries e.g. Cell phone.
 Home Network:
It is a network to which the mobile node originally belongs to as per its assigned
IP address (home address).
 Home Agent (HA):
It is a router in home network to which the mobile node was originally connected
 Home Address:
It is the permanent IP address assigned to the mobile node (within its home
network).
 Foreign Network:
It is the current network to which the mobile node is visiting (away from its home
network).
 Foreign Agent (FA):
It is a router in foreign network to which mobile node is currently connected. The
packets from the home agent are sent to the foreign agent which delivers it to the
mobile node.
 Correspondent Node (CN):
It is a device on the internet communicating to the mobile node.
 Care of Address (COA):
It is the temporary address used by a mobile node while it is moving away from
its home network.
8. explain any two method to control congestion?

Open Loop Congestion Control

Open loop congestion control policies are applied to prevent congestion before it
happens. The congestion control is handled either by the source or the destination.

Closed Loop Congestion Control

Closed loop congestion control technique is used to treat or alleviate congestion after it
happens. Several techniques are used by different protocols; some of them are: 
 

1. Backpressure : 
Backpressure is a technique in which a congested node stop receiving packet from
upstream node. This may cause the upstream node or nodes to become congested
and rejects receiving data from above nodes. Backpressure is a node-to-node
congestion control technique that propagate in the opposite direction of data flow.
The backpressure technique can be applied only to virtual circuit where each node
has information of its above upstream node. 

 
1. In above diagram the 3rd node is congested and stops receiving packets as a result
2nd node may be get congested due to slowing down of the output data flow.
Similarly 1st node may get congested and informs the source to slow down. 
 
2. Choke Packet Technique : 
Choke packet technique is applicable to both virtual networks as well as datagram
subnets. A choke packet is a packet sent by a node to the source to inform it of
congestion. Each router monitor its resources and the utilization at each of its
output lines. whenever the resource utilization exceeds the threshold value which
is set by the administrator, the router directly sends a choke packet to the source
giving it a feedback to reduce the traffic. The intermediate nodes through which
the packets has traveled are not warned about congestion. 
 

9. Discuss transaction oriented TCP

TCP for Transactions (T/TCP) is a possible successor to both TCP and UDP. It is a
transaction-oriented protocol based on a minimum transfer of segments, so it does not
have the speed problems associated with TCP. By building on TCP, it does not have the
unreliability problems associated with UDP. With this in mind, RFC1379 was published
in November 1992. It discussed the concepts involved in extending the TCP protocol to
allow for a transaction-oriented service. Some of the main points the RFC discussed were
bypassing the three-way handshake and shortening the TIME-WAIT state from 240
seconds to 12 seconds. Eighteen months later, RFC1644 was published, with the
specification for Transaction TCP. T/TCP cuts out much unnecessary handshaking and
error detection done by the current TCP protocol, and as a result, increases the speed of
connection and reduces the necessary bandwidth.

Transaction Transmission Control Protocol


T/TCP can be considered a superset of the TCP protocol. The reason for this is that
T/TCP is designed to work with current TCP machines seamlessly. What follows is a
brief description of T/TCP and how it differs from the current TCP standard in operation.

What is a Transaction?

The term “transaction” refers to the request sent by a client to a server, along with the
server's reply. RFC955 lists some of the common characteristics of transaction processing
applications:

 Asymmetrical Model: the two end points take different roles; this is a typical
client-server role where the client requests the data and the server responds.
 Short Duration: normally, a transaction runs for a short time span.
 Few Data Packets: each transaction is a request for a small piece of information,
rather than a large transfer of information both ways.

Background to T/TCP

The growth of the Internet has put a strain on the bandwidth and speed of networks.
There are now more users than ever, and a more efficient form of data transfer is needed.

The absolute minimum number of packets required in a transaction is two: one request
followed by one response. UDP is the one protocol in the TCP/IP protocol stack that
allows this, but the problem is the unreliability of the transmission.

T/TCP has the reliability of TCP and comes very close to realizing the 2-packet exchange
(three in fact). T/TCP uses the TCP state model for its timing and retransmission of data,
but introduces a new mechanism to allow the reduction in packets.

Even though three packets are sent using T/TCP, the data is carried on the first two, thus
allowing the applications to see the data with the same speed as UDP. The third packet is
the acknowledgment to the server by the client that it has received the data, which is how
the TCP reliability is incorporated.

Basic Operation

Consider a DNS system, one where a client sends a request to a server and expects a
small amount of data in return. A diagram of the transaction can be seen in Figure 1. This
diagram is very similar to a UDP request with a saving of 66% in packets transferred
compared to TCP. Obviously, in cases where a large amount of data is being transferred,
there will be more packets transmitted and thus a decrease in the percentage saved.

10 Write a short note on 4G technology


4G – LTE {Long Term Evolution} VOLTE {Voice Over Long-Term Evolution}.
It is a standard for wireless communication of high-speed data for mobile phone and data
terminals.
It is based on GSM/EDGE and UMTS/HSPA network technologies, increases the
capacity due to the high-speed nature.
11. enlist some challenges of 4G and explain any two in brief.
 Mobility Management (MM)

MM includes location registration, paging, and handover. MS should be able to


access the service at any possible place. The handoff technique should be
designed so that they make efficient use of network and make sure that handoff is
not done that often.

 Congestion Control (CC)

There are two approaches based on the connection you are using – Wired Connection -
> Detection and recovery after the congestion
This thing needs to -> have better flow control mechanism.

Wireless Connection -> Avoidance and prevention of congestion.


This thing needs to -> scheduling techniques (allocation time of station).

 Multiaccess Interface and Timing and Recovery.


 Complexity – error control, digital to analog conversion.
 Issue with another network -> adhoc network, Bluetooth, 802.11b
 Security.

12. What are the functions of network layer?


The network layer has two main functions. One is breaking up segments into network
packets, and reassembling the packets on the receiving end. The other is routing packets
by discovering the best path across a physical network. The network layer uses network
addresses (typically Internet Protocol addresses) to route packets to a destination node.
Chpater 8

39 Explain 4G Architecture – WiMAX

The high-level network architecture of LTE is comprised of following three main


components:

 The User Equipment (UE).

 The Evolved UMTS Terrestrial Radio Access Network (E-UTRAN).

 The Evolved Packet Core (EPC).

The evolved packet core communicates with packet data networks in the outside world
such as the internet, private corporate networks or the IP multimedia subsystem. The
interfaces between the different parts of the system are denoted Uu, S1 and SGi as shown
below:

The User Equipment (UE)

The internal architecture of the user equipment for LTE is identical to the one used by
UMTS and GSM which is actually a Mobile Equipment (ME). The mobile equipment
comprised of the following important modules:

 Mobile Termination (MT) : This handles all the communication functions.

 Terminal Equipment (TE) : This terminates the data streams.

 Universal Integrated Circuit Card (UICC) : This is also known as the SIM card
for LTE equipments. It runs an application known as the Universal Subscriber
Identity Module (USIM).
A USIM stores user-specific data very similar to 3G SIM card. This keeps information
about the user's phone number, home network identity and security keys etc.

The E-UTRAN (The access network)

The architecture of evolved UMTS Terrestrial Radio Access Network (E-UTRAN) has
been illustrated below.

The E-UTRAN handles the radio communications between the mobile and the evolved
packet core and just has one component, the evolved base stations, called eNodeB or
eNB. Each eNB is a base station that controls the mobiles in one or more cells. The base
station that is communicating with a mobile is known as its serving eNB.

LTE Mobile communicates with just one base station and one cell at a time and there are
following two main functions supported by eNB:

 The eBN sends and receives radio transmissions to all the mobiles using the
analogue and digital signal processing functions of the LTE air interface.

 The eNB controls the low-level operation of all its mobiles, by sending them
signalling messages such as handover commands.

Each eBN connects with the EPC by means of the S1 interface and it can also be
connected to nearby base stations by the X2 interface, which is mainly used for signalling
and packet forwarding during handover.
A home eNB (HeNB) is a base station that has been purchased by a user to provide
femtocell coverage within the home. A home eNB belongs to a closed subscriber group
(CSG) and can only be accessed by mobiles with a USIM that also belongs to the closed
subscriber group.

The Evolved Packet Core (EPC) (The core network)

The architecture of Evolved Packet Core (EPC) has been illustrated below. There are few
more components which have not been shown in the diagram to keep it simple. These
components are like the Earthquake and Tsunami Warning System (ETWS), the
Equipment Identity Register (EIR) and Policy Control and Charging Rules Function
(PCRF).

Below is a brief description of each of the components shown in the above architecture:

 The Home Subscriber Server (HSS) component has been carried forward from
UMTS and GSM and is a central database that contains information about all the
network operator's subscribers.

 The Packet Data Network (PDN) Gateway (P-GW) communicates with the
outside world ie. packet data networks PDN, using SGi interface. Each packet
data network is identified by an access point name (APN). The PDN gateway has
the same role as the GPRS support node (GGSN) and the serving GPRS support
node (SGSN) with UMTS and GSM.
 The serving gateway (S-GW) acts as a router, and forwards data between the base
station and the PDN gateway.

 The mobility management entity (MME) controls the high-level operation of the
mobile by means of signalling messages and Home Subscriber Server (HSS).

 The Policy Control and Charging Rules Function (PCRF) is a component which is
not shown in the above diagram but it is responsible for policy control decision-
making, as well as for controlling the flow-based charging functionalities in the
Policy Control Enforcement Function (PCEF), which resides in the P-GW.

The interface between the serving and PDN gateways is known as S5/S8. This has two
slightly different implementations, namely S5 if the two devices are in the same network,
and S8 if they are in different networks.

WiMAX {Worldwide Interoperability for Microwave Access} – 4G.


It is having IEEE standard -> 802.16
Supports Mobile, Fixed and Nomadic Wireless Application.
Expected to provide you -> 75Mbps with NLOS (non-line of sight)
But it provides you speed of Gbps if the connection is in LOS (line of sight)
The principle behind any 4g network is OFDM – Orthogonal Frequency Division
Multiplexing.
The bandwidth allocation of WiMAX – 5-20Mhz

40 Explain Challenges and Applications of 4G.


Challenges of 4G / Issue in 4G

 Mobility Management (MM)

MM includes location registration, paging, and handover. MS should be able to


access the service at any possible place. The handoff technique should be
designed so that they make efficient use of network and make sure that handoff
is not done that often.

 Congestion Control (CC)


There are two approaches based on the connection you are using – Wired Connection -
> Detection and recovery after the congestion
This thing needs to -> have better flow control mechanism.

Wireless Connection -> Avoidance and prevention of congestion.


This thing needs to -> scheduling techniques (allocation time of station).

 Multiaccess Interface , Timing and Recovery.


 Complexity – error control, digital to analog conversion.
 Issue with another network -> adhoc network, Bluetooth, 802.11b
Security.
1) Multimode software Application
2) Mobile Gaming
3) Real Time Traffic Conditions
4) Low Latency
5) Location Based Service
6) Remote Patient Monitoring System.
7) Online Conferencing
8) Cloud Gaming
9) Google Stadia
41 Explain the priniciple behind WiMAX – OFDM (refer the block diagrams).

Orthogonal Frequency Division Multiplexing (OFDM) is a digital multi-carrier modulation


scheme that extends the concept of single subcarrier modulation by using multiple
subcarriers within the same single channel. Rather than transmit a high-rate stream of
data with a single subcarrier, OFDM makes use of a large number of closely spaced
orthogonal subcarriers that are transmitted in parallel

Explain the terminologies in Mobile IP


a. Foreign agent
b. Correspondent node
c. Home network
Question: 2.
[12]

(a) Explain Traditional TCP methods - Congestion Control, Slow Start , Fast
Retransmission.
[6]

(b) Explain Challenges and Applications of 4G.


[6]

OR

(c) Explain the priniciple behind WiMAX - OFDM (refer the block diagrams)
[6]

Question: 3.
[12]

(a) Explain GSM Architecture - RSS, NSS and OS. [8]

(b) Explain Classical TCP Improvement - Indirect, Snoop, Mobile,


Selective and Transaction Oriented TCP. [4]

OR

(a) Explain the working of mobile IP.


[8]

(b) What is 4G technology? Write a brief note on it.


Chapter wise question list for the final
examinations
Chapter 1

1 Mobile Computing Definition - Advantage and Disadvantage


2 MCQ - History of Wireless Communication
3 Evolution of Wireless Data - MCQ - Full Forms
4 Types of Mobility
5 Wireless Propagation Mode - Sky, Ground and LOs and NLOs
6 Mobile Computing 3 tier Architecture - Presentation, Data, Application
7 Mobile Computing Security (one possible attack you need to derive).

Chapter 2

8 Explain Cellular System with its Advantage and Disadvantage


9 Explain Cellular System Component (6 Components).
10 Explain Frequency Reuse and provide the relevant derivation. ( from the videos)
11 Explain Channel Assignment Strategies - 3 strategies.

Chapter 3

12 Explain GSM Architecture - RSS, NSS and OSS.


13 GSM Address and Identifier - 7 Identifiers.
14 Call Routing in GSM - MTC and MOC. (Refer the videos)
** GSM Frequency Allocation ( ** Not that Important)
15 Explain Authentication and Security - A3, A5 and A8.

16 Explain GPRS Architecture - SGSN and GGSN.


17 Explain GPRS Network Operation + PLMN Interface
18 Explain GPRS Application.

Chapter 4

19 Requirement of Mobile IP - 4 Requirement - C,T,Sc & E and Security.

20 Explain the entities and terminologies of Mobile IP.


21 Explain the working of mobile IP.
22 How does MN discover the Foreign Agent - Agent Advertisment + Agent Solicitation.
23 Explain the registration process of HA - Registration and Registration Request and Reply.

24 Explain Encapsulation - Minimal and GRE.


25 Explain Route Optimization or Triangular Routing.
Chapter 5

26 Explain Traditional TCP methods - Congestion Control , Slow Start , Fast Retranmission.

27 Explain Classical TCP Improvment - Indirect, Snoop, Mobile, Selective and Transaction
Oriented TCP.

Question can be formed like - Explain Indirect TCP with its adv and disadv. *** ( *** very
important).

Chapter 6

28 Explain WAP architecture


29 Explain WAE and its logical components.
30 Explain WDP
31 Explain WTP with its Class 0, Class 1 and Class 2 diagrams.
32 Explain WTLS

Chapter 7

33 Explain Adhoc network with its adv and disad and with its usage.

34 Explain MANET with its adv and disadv


35 Explain Routing.
36 Difference between Wired and Adhoc network
37 Explain AODV
38 Explain DSDV.

Chpater 8

39 Explain 4G Architecture - WiMAX


40 Explain Challenges and Applications of 4G.
41 Explain the priniciple behind WiMAX - OFDM (refer the block diagrams).

You might also like