0% found this document useful (0 votes)
6 views

IT8602 Mobile Communication

Uploaded by

Syed Rashool
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views

IT8602 Mobile Communication

Uploaded by

Syed Rashool
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 43

PANIMALAR INSTITUTE OF TECHNOLOGY DEPT.

OF INFORMATION TECHNOLOGY

IT8602 MOBILE COMMUNICATION LT P C


3 0 0 3
OBJECTIVES:
The student should be made to:
Understand the basic concepts of mobile computing
Understand Wireless LAN, Bluetooth and WiFi Technologies
Be familiar with the network protocol stack
Learn the basics of mobile telecommunication system
Be exposed to Ad-Hoc networks

UNIT I INTRODUCTION 9
Introduction to Mobile Computing – Applications of Mobile Computing- Generations of Mobile
Communication Technologies-MAC Protocols – SDMA- TDMA- FDMA- CDMA
UNIT II MOBILE TELECOMMUNICATION SYSTEM 9
GSM – Architecture – Protocols – Connection Establishment – Frequency Allocation – Routing –
Mobility Management – Security –GPRS- UMTS- Architecture
UNIT III WIRELESS NETWORKS 9
Wireless LANs and PANs – IEEE 802.11 Standard – Architecture – Services – Blue Tooth- Wi-Fi –
WiMAX
UNIT IV MOBILE NETWORK LAYER 9
Mobile IP – DHCP – AdHoc– Proactive and Reactive Routing Protocols – Multicast Routing-
Vehicular Ad Hoc networks ( VANET) –MANET Vs VANET – Security
UNIT V MOBILE TRANSPORT AND 9
APPLICATION LAYER
Mobile TCP– WAP – Architecture – WDP – WTLS – WTP –WSP – WAE – WTA Architecture –
WML
TOTAL: 45 PERIODS
OUTCOMES:
At the end of the course, the student should be able to:
Explain the basics of mobile telecommunication system

III YEAR / VI SEMESTER /2019-2020

1
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT. OF INFORMATION TECHNOLOGY

Illustrate the generations of telecommunication systems in wireless network


Understand the architecture of Wireless LAN technologies
Determine the functionality of network layer and Identify a routing protocol for a given Ad hoc
networks
Explain the functionality of Transport and Application layer
TEXT BOOKS:
1. Jochen Schiller, ―Mobile Communications‖, PHI, Second Edition, 2003.
2. Prasant Kumar Pattnaik, Rajib Mall, ―Fundamentals of Mobile Computing‖, PHI Learning
Pvt.Ltd, New Delhi – 2012
REFERENCES:
1. Dharma Prakash Agarval, Qing and An Zeng, "Introduction to Wireless and Mobile
systems",Thomson Asia Pvt Ltd, 2005.
2. Uwe Hansmann, Lothar Merk, Martin S. Nicklons and Thomas Stober, ―Principles of Mobile
Computing‖, Springer, 2003.
3. William.C.Y.Lee,―Mobile Cellular Telecommunications-Analog and Digital Systems‖, Second
Edition,Tata Mc Graw Hill Edition ,2006.
4.C.K.Toh, ―AdHoc Mobile Wireless Networks‖, First Edition, Pearson Education, 2002.
5.Android Developers : http://developer.android.com/index.html
6. Apple Developer : https://developer.apple.com/
7. Windows Phone Dev Center : http://developer.windowsphone.com
8.BlackBerry Developer : http://developer.blackberry.com

UNIT – I INTRODUCTION

Intoduction to Mobile Computing , Application of Mobile Computing – Generation of Mobile


Communication Technologies – MAC Protocols – SDMA-TDMA –FDMA-CDMA.
COURSE OBJECTIVE: Understand the basic concepts of mobile computing.
PART – A
1. Define Mobile Computing.[R] May/June 2019
Mobile Computing also called as Ubiquitous Computing or Nomadic Computing is described as
the ability to compute remotely while on the move. It makes possible for people to access
information from anywhere and at any time.

III YEAR / VI SEMESTER /2019-2020

2
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT. OF INFORMATION TECHNOLOGY

Mobile Computing = Mobility + Computing


2. What do you mean by the terms Mobility and Computing? [R]
Mobility: Provides the capability to change location while communicating to invoke computing
services at some remote computers.
Computing: Capability to automatically carry out certain processing related to services
invocation on a remote computer.
3. Name the type of Mobility. [R]
a) User Mobility
b) Device Portability
4. List out the advantages of Mobile Computing. [R] May/June 2016
(i) Location Flexibility
(ii) User Mobility
(iii)Device Portability
(iv) Saves Time
(v) Enhanced Productivity
(vi) Entertainment
5. Mention the disadvantages of Mobile Computing. [R]
(i) Expensive
(ii) Power Consumption
(iii)Small Screen Display
(iv) Slow Internet Speed
(v) Risky to carry
(vi) Security Concerns
(vii) Communication depends upon network
6. Compare Wired Networks and Mobile Networks. [U]
S.No Wired Networks Mobile Networks
Users cannot get any information at Users can get information at any place
1.
any place (does not support mobility) (Supports Mobility)
2. Bandwidth is high Bandwidth is low
3. Low bandwidth variability High bandwidth variability
4. Listen on wire Hidden Terminal problem

III YEAR / VI SEMESTER /2019-2020

3
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT. OF INFORMATION TECHNOLOGY

5. Productivity is low Productivity is high


6. High Power Machines Low Power machines
7. High Resource machines Low Resource machines
8. Need physical access Need proximity
9. Low delay Higher delay
10. Connected Operations Disconnected Operations

7. List out the differences between Mobile Computing and Wireless Networking.
May/June 2017,Dec 2017 ,May 2018, May 2021 [U]
S.No Mobile Computing Wireless Networking
It is a technology that access data It is a network that uses wireless data
1. through wireless network connections for connecting network
nodes
It denotes accessing information and It provides the basic communication
2. remote computational services while on infrastructure necessary for mobile
the move computing
It refers to computing devices that are It is a method of transferring
not restricted to a desktop. Eg: Smart information between a computing
3.
Phone, PDA, Laptop etc., devices such as PDA & data sources
without a physical connection
It refers to a device performing It refers to the data communication
computation that is not always without the use of a landline. Eg.
4.
connected to a central network Cellular Telephone, Two way radio,
Satellite, Wireless Connection.

8. Name some of the Mobile Computing Devices. [R]


 Mobile Phones
 Laptops
 PDA
 Notebook PCs

9. Specify the functionalities of Application Tier. [U]

III YEAR / VI SEMESTER /2019-2020

4
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT. OF INFORMATION TECHNOLOGY

 Responsible for making logical decisions and performing calculations.


 Moves and Process data between the presentation and data layers.
10. What is the use of Data Tier? [U]
 Responsible for providing the basic facilities of data storage, access and
manipulation.
 Contains a database where the information is stored and retrieved.
11. Describe about MAC Protocol. [U]
MAC Protocol is access control protocol which is responsible for regulating access to the
shared channel when multiple nodes compete to access that channel. It is a sub layer of the data
link layer protocol and it directly invokes the physical layer protocol.
12. What are the Objectives of MAC Protocol? [U] NOV/DEC-2018
 Maximization of the channel utilization
 Minimization of average latency of transmission
13. List out the properties required of MAC protocol. [U]
(i) It should implement some rules to enforce discipline wen multiple nodes
compete for a shared channel.
(ii) It should help maximize the channel utilization.
(iii) Channel allocation needs to be fair. No node should be discriminated against at
any time and made wait for an long time for transmission.
(iv) It should be capable of supporting several types of traffic having different bit
rates.
(v) It should be robust in the face of equipment failure and changing network
conditions.

14. What is meant by Hidden Node and Exposed Node? [R]


 Hidden Node: A hidden node is a node that does not hear the transmission that a
node within its range is receiving and thus does not attempting to gain access.
 Exposed Node: An exposed node is a node that hears multiple disjoint sections of
a network and never gets an opportunity to compete for transmission since it is always
deferring to someone.
15. Explain hidden and exposed terminal problem in infrastructure-less network. [An]
May/June 2016
Hidden Terminal Problem:

III YEAR / VI SEMESTER /2019-2020

5
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT. OF INFORMATION TECHNOLOGY

The Hidden Terminal Problem arises when at least three nodes (A, B and C) communicating.

B is in the radio range of A, and B is also with the radio range of C. The nodes A and C are not
in the radio range of each other. If both A and C start to transmit to B at the same time, the data
received at B would get garbled. This situation arises because A and C are “hidden” from each
other, because they are outside each other’s transmission range.
Note:- Hidden Terminal causes Collisions.
Exposed Terminal Problem:
Exposed Terminal Problem arises when all the three nodes are in the radio range of all nodes.

Now B is transmitting to A, C wants to send to another terminal (not A or B) outside the range. C
senses the carrier and detects that the carrier is busy, so C postpones the transmission until it
detects the medium is free. But A is outside the radio range of C. This problem arises because “C
is exposed to B”.
III YEAR / VI SEMESTER /2019-2020

6
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT. OF INFORMATION TECHNOLOGY

Note:- Exposed Terminal leads to inefficient spectrum usage and unnecessary transmission
delays.
16. What are the classifications of MAC Protocols? [R]
Wireless MAC protocols are classified into
A. Fixed-assignment schemes (Circuit-switched)
B. Random-Assignment schemes(CL packet-switched)
C. Reservation-based schemes(CO packet-switched)

(i) Fixed Assignment


a. FDMA
b. TDMA
c. CDMA
(ii) Random Assignment
a. ALOHA
b. Slotted ALOHA
c. CSMA
d. CSMA/CD
e. CSMA/CA

17. Compare CSMA / CD and CSMA / CA. [U]

S.No CSMA / CD CSMA / CA


1. It takes effect after a collision It takes effect before a collision
It will not take steps to prevent It will take actions not to take place any
2. transmission collision until it is taken collision
place
3. It only minimizes the recovery time It reduces the possibility of a collision
Typically used in wired networks Typically used in wireless networks &
4.
WLANs
5. Standardized in IEEE 802.3 Standardized in IEEE 802.11

18. Summarize the steps involved in RTS / CTS scheme. [An]


 Sender transmits an RTS packet to the receiver before the actual data transmission.
III YEAR / VI SEMESTER /2019-2020

7
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT. OF INFORMATION TECHNOLOGY

 Receiver sends a CTS packet to the sender.


 Actual data transfer commences between the sender and receiver.
 Receiver will send acknowledgement to the sender.
19. Formulate a reason why Collision Detection is based protocol not suitable for
wireless networks? [An]
Because, in a wireless network, it is very difficult for a transmitting node to detect a
collision, since any received signal from other nodes would be too weak compared to its original
signal and can easily be masked by noise. As a result the transmitting node would continue to
transmit the frame which leads to corrupted frame.
In wired network, when a node detects a collision, it immediately stops transmitting, thereby
minimizing channel wastage.
20. Assess why is the MAC protocol designed for infrastructure based wireless N/W
may not work satisfactory in infrastructure-less environment. Justify your answer? [An]
Dec 2017
Because,
 It is for a transmitting node to detect collisions
 Hidden and Exposed terminal problems makes MAC protocols inefficient.
21. What are the limitations of mobile computing? [U] Nov/Dec2016
 Insufficient Bandwidth
 Security Standards
 Power consumption
 Transmission interferences
 Potential health hazards
 Human interface with device
22. What are the different random assignment scheme in MAC? [R] Nov/Dec 2016,
May/June 2017
 ALOHA
 Slotted ALOHA
 CSMA
 CSMA/CD
 CSMA/CA
23. List the issues of Wireless MAC[R]. May 2018

III YEAR / VI SEMESTER /2019-2020

8
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT. OF INFORMATION TECHNOLOGY

 Half Duplex operation –> either send or receive but not both at a given
time
 Time varying channel
 Burst channel errors
24. What are the challenges in mobile communication?
Portability: Portable computers face physical challenges (volume, weight, power
consumption, cost),
pragmatic challenges (increased chance of data loss, small user-interface issues), and
systems issues (network integration, resource imbalance such as lack of local storage,
impoverished computational power).
25. Give some Examples of Reservation based schemes in MAC Protocols.[U] May 2019

Examples of protocols in this category are, D-PRMA [3], CATA, and R- CSMA.

 Distributed Packet Reservation Multiple Access Protocol D-PRMA


 Collision avoidance time allocation protocol (CATA)
 RCSMA: Receiver-Based Carrier Sense Multiple Access in
PART - B
1. Explain the characteristics of Mobile Computing. [An] May/June 2016, May 2019
2. Discuss briefly about Wireless Network Classifications. [An]
3. Explain the structure of Mobile Computing Applications with neat sketch. [An] May/June
2016, Dec 2017, May 2018, May 2019, May 2021
4. Explain the various taxonomy of MAC protocols in detail. [U] May/June 2016, May/June
2017
5. Briefly explain FDMA, CDMA, and TDMA. [An] Nov/Dec 2011, May/June 12, May
/June 2013, Nov/Dec 2013, May/June 2014, Nov/Dec2014
6. Differentiate FDMA, TDMA & CDMA. [An] Nov/Dec 2016
7. Explain in detail about the motivation for specialized MAC. [U] May/June 2013, May 2021
8. Explain the following: [U]
(i) Random Assignment Schemes Nov/Dec 2018
(ii) Reservation-based schemes Nov/Dec 2018
9. Explain the distinguishing features of various generations of wireless networks.[U] Nov/Dec
2016

III YEAR / VI SEMESTER /2019-2020

9
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT. OF INFORMATION TECHNOLOGY

10. Describe the applications of mobile computing[Ap]. Nov/Dec 2016, May/June 2017
11. Explain the various MAC issues in detai[U]l. May/June 2017
12. Explain fixed assignment scheme with a neat diagram.[R] May/June 2017, Dec 2017, May
2019
13. Explain hidden and exposed terminal problem in infrastructure-less network [U]Dec 2017, May
2021
14. Apply Mobile computing to design Taxi disapatcher and monitoring service. Explain the
components in detail. [Ap]May 2018 Nov/Dec 2018
15. List the characteristics of mobile systems.[U] May 2018
16. What is CSMA? What are the categories of CSMA? Explain their working with advantages
and disadvantages?[U] May 2018

17. How does MAC protocol for wireless networks differ from those in wired network?
Explain. May 2021
COURSE OUTCOME: Explain the basics of mobile telecommunication system.

III YEAR / VI SEMESTER /2019-2020

10
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT. OF INFORMATION TECHNOLOGY

UNIT – II MOBILE TELECOMMUNICATION SYSTEM

GSM – Architecture – Protocols – Connection Estabilishment - Frequency Allocation-Routing


Mobility Management – Security- GPRS- UMTS- Architecture

COURSE OBJECTIVE: Understand Wireless LAN, Bluetooth and WiFi Technologies.

PART A
1. Expand GSM, GPRS and UMTS. [R]
GSM – Global System for Mobile Communication
GPRS – General Packet Radio Services
UMTS – Universal Mobile Telecommunication Systems
2. What is meant by GSM? [R]
Global System for Mobile Communication (GSM) is a wide area wireless
communications system that uses digital radio transmission to provide voice, data and
multimedia communication services. A GSM system coordinates the communication between a
mobile telephones (Mobile Stations), base stations (Cell Sites) and switching systems.
3. What is the important characteristic of GSM? [U]
GSM provides data services in addition to voice services and it is compatible to 1G
system.
4. What is the use of GSM in mobile telecommunication? [U] Nov/Dec 2011&12
May/June 12
This system was soon named the Global System for Mobile communications (GSM), The
primary goal of GSM was to provide a mobile phone system that allows users to roam and
provides voice services compatible to ISDN and other PSTN systems
5. Specify the three different categories of services defined by GSM [U]
 Bearer services
 Tele services
 Supplementary services
6. What is the use of emergency number? [U]

III YEAR / VI SEMESTER /2019-2020

11
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT. OF INFORMATION TECHNOLOGY

Another service offered by GSM is the emergency number. This service is mandatory for
all providers and free of charge. This connection also has the highest priority, possibly pre-
empting other connections, and will automatically be set up with the closest emergency center.
7. List the important supplementary services offered by GSM. [R] Nov/Dec 2016
 User Identification
 Call Forwarding (or Redirection)
 Automatic call-back
 Conferencing with up to 7 participants
8. What is meant by SMS and EMS? [R]
 A useful service for very simple message transfer is the short message
service(SMS), which offers transmission of messages of up to 160 characters
 The successor of SMS, the Enhanced Message Service (EMS), offers a larger
message size (e.g., 760 characters, concatenating several SMs), formatted text,
and the transmission of animated pictures
9. What are the sub systems available in GMS? [R] Nov/Dec2018
 Radio subsystem
 Network and switching subsystem
 Operation subsystem
10. What is RSS? [R]
RSS stands for Radio Sub System. It compri2ses of all radio specific entities.
11. Name the entities of RSS. [R]
1. Mobile Station (MS)
2. Base Station Subsystem (BSS)
3. Base Transceiver Station (BTS)
4. Base Station Controller (BSC)
12. Classify the functions of HLR and VLR. [U]
Home Location Registers(HLR) Visitor Location Registers(VLR)
HLR is a mobile operator database that VLR is a temporary database that is
includes details specific to each subscriber updated whenever a new MS enters its
such as phone number, subscriber’s IMSI, area by roaming. The information is
pre/postpaid, user’s current location, obtained from the corresponding HLR.

III YEAR / VI SEMESTER /2019-2020

12
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT. OF INFORMATION TECHNOLOGY

billing details, phone status – parameters. i.e., VLR supports roaming functions for
users outside the coverage area of their
own HLR.
Basic Parameters stored in the HLR: The additional data stored in the VLR in
 Subscriber ID (IMSI and MSISDN) telecom is listed below:
 Current Locationo f the user 1. Location Area Identity (LAI).
 Supplementary Services Subscriber to 2. Temporary Mobile Subscriber
(Caller Tone, Missed Call Alert, Any Identity (TMSI).
Other Services etc.) 3. Mobile Station Roaming Number
 Subscriber Status (Registered or (MSRN).
Deregistered) 4. Mobile status (busy/free/no answer
 Authentication Key and AUC etc.).
Functionality
 Mobile Subscriber Roaming Number

13. List out the functions of OMC. [U]


 Traffic Monitoring 

 Subscribers

 Security Management 

 Account Billing

14. List the 3 important features of GSM Security. [R] May/June 2016
1. Authentication – used to protect the network against unauthorized use.
2. Confidentiality – Data on the radio path is encrypted between the Mobile
Equipment (ME) and the BTS which protects user traffic and sensitive signaling
data against eavesdropping.
3. Anonymity – Anonymity is achieved by allocating Temporary Mobile
Subscriber Identity (TMSI) instead of permanent identities to protect against
tracking a user’s location and obtaining information about a user’s call log.
15. What are the characteristics of GSM? [U]
1. Communication
2. Total Mobility
3. World Wide Connectivity

III YEAR / VI SEMESTER /2019-2020

13
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT. OF INFORMATION TECHNOLOGY

4. High Capacity
5. High Transmission Quality
6. Security Functions
7. SIM Card Bounded Service
16. Give the block diagram of GSM Authentication. [R]May/June 2014

17. What is meant by GPRS? [R] May/June 12


GPRS (General Packet Radio Services) is a packet-oriented mobile data service on the
GSM of 3G and 2G cellular communication systems. It is a non-voice, high-speed and useful
packet-switching technology for GSM networks.
18. List out the features of GPRS. [R]
1. Speed
2. Immediacy
3. Packet Switched Resource Allocation (Spectrum Efficiency)
4. Flexible Channel Allocation
5. Traffic characteristics suitable for GPRS
6. Mobility
7. Localization
19. Explain in what ways is GPRS better than GSM? [An]
GSM uses a billing system based on the time of connection whereas GPRS uses a billing
system based on the amount of transmitted data.
20. What are the goals of GPRS? [U]
1. Open Architecture

III YEAR / VI SEMESTER /2019-2020

14
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT. OF INFORMATION TECHNOLOGY

2. Consistent IP services
3. Same infrastructure for different air interfaces
4. Integrated telephony and Internet infrastructure
5. Service innovation independent of infrastructure
21. What are the services offered by GPRS? [U] (Dec 2017) May/June 2019
22. GPRS offers end-to-end packet-switched data transfer services which can be
categorized into the following two types:
1. Point-To-Point Service (PTP): It is between two users and can either be
connectionless or connection-oriented.
2. Point-To-Multipoint Service (PTM): It is a data transfer service from one user to
multiple users.
23. Point out the purpose of EIR in Mobile Computing. [U]
Equipment Identity Register (EIR) is a database that used to track handsets using the
IMEI. It helps to block calls from stolen, unauthorized, or defective mobiles.
24. What is the use of VOIP? [U] May/June 2013
Voice over Internet protocol, a technology for making telephone calls over the Internet in
which speech sounds are converted into binary.
25. What is meant by roaming? [R]
In wireless telecommunications, roaming is a general term referring to the extension of
connectivity service in a location that is different from the home location where the service was
registered. Roaming ensures that the wireless device is kept connected to the network, without
losing the connection.
26. What is the function of GGSN? [U] May/June 2014 Nov/Dec2018
 The gateway GPRS support node (GGSN) is the interworking unit between the
GPRS network and external packet data networks (PDN). This node contains routing
information for GPRS users, performs address conversion, and tunnels data to a user
via encapsulation.
 The GGSN is connected to external networks (e.g., IP or X.25) via the Gi
interface and transfers packets to the SGSN via an IP-based GPRS backbone network
(Gn interface).

27. What is UMTS? [R]

III YEAR / VI SEMESTER /2019-2020

15
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT. OF INFORMATION TECHNOLOGY

The Universal Mobile Telecommunications System (UMTS) is a 3G mobile


communication system that provides a range of broadband services to wireless and mobile
communications. The UMTS was developed mainly for countries with GSM networks.
28. What are the main elements of UMTS? [U] May/June 2016
1. User Equipment / Mobile Station (MS): is the name by which a cell phone is
referred to.
2. Radio Network Subsystem (RNS): Equivalent of Base Station Subsystem (BSS)
in GSM. It provides and manages the wireless interface for the overall network.
3. Core Network (CN): Equivalent of the Network Switching Subsystem (NSS) in
GSM.
29. Draw Architecture of UMTS? [R]

30. List out UMTS Problems. [U]


 Require more battery power
 Can handoff UMTS to GSM but not GSM to UMTS
 Initial poor coverage
 More expensive than GSM
31. Name the teleservices provided by GSM. [U] May/June 2017
 Call forwarding.
 Barring of Outgoing Calls.
 Barring of Incoming Calls.
 Call Hold.

III YEAR / VI SEMESTER /2019-2020

16
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT. OF INFORMATION TECHNOLOGY

 Call Waiting.
 Multiparty service.
32. Write the suggestions of mobile phone with respect to human body. [An] May/June
2017
Based on mixed epidemiological evidence on humans regarding an association between
exposure to RF radiation from wireless phones and head cancers (glioma and acoustic
neuroma), RF fields have been classified by the International Agency for Research on Cancer
as possibly carcinogenic to humans (Group 2B). Studies to date provide no indication that
environmental exposure to RF fields, such as from base stations, increases the risk of cancer or
any other disease.
33. Defrne Handoff. What are its types ?(U)(Dec 2017)

A handoff refers to the process of transferring an active call or data session from one cell
in a cellular network to another or from one channel in a cell to another. ...

hard handoff and soft handoff.

34.What is frequency range of uplink and downlink in GSM network?(U) May 2018

In satellite telecommunication, a downlink is the link from a satellite down to one or more
ground stations or receivers, and an uplink is the link from a ground station up to a satellite.
Some companies sell uplink and downlink services to television stations, corporations, and to
other telecommunication carriers.

GSM-900 uses 890 - 915 MHz to send information from the Mobile Station to the Base
Transceiver Station (uplink) and 935 - 960 MHz for the other direction (downlink), providing
124 RF channels

35.What are the information are stored in SIM?(U) May 2018

A SIM card, also known as a subscriber identity module, is a smart card that stores data for GSM
cellular telephone subscribers. Such data includes user identity, location and phone number,
network authorization data, personal security keys, contact lists and stored text messages.

III YEAR / VI SEMESTER /2019-2020

17
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT. OF INFORMATION TECHNOLOGY

36. List out the advantages of UMTS networks over 2G networks. [U]May 2019

UMTS (Universal Mobile Telecommunications Service) is a third-generation (3G) broadband,


packet-based transmission of text, digitized voice, video, and multimedia at data rates up to 2
megabits per second (Mbps). UMTS offers a consistent set of services to mobile computer and
phone users, no matter where they are located in the world

PART-B
1. Explain GSM architecture and its services with neat diagram. [U] Nov/Dec2011&12,
May/June 12, May /June 2013, Nov/Dec 2013, May/June 2014, Nov/Dec2014, May/June
2016, May/June 2017, (Dec 2017) Nov/Dec2018
2. Explain services offered by GSM. [U] December 2012, Nov/Dec 2013, May/June 2019
3. Explain GSM Authentication and analyze the important features associated with Security
Services.[U] May/June 2016, May/June 2019
4. Draw a neat diagram of GPRS and explain its protocol architecture and services. List its
advantages and disadvantages [An] Nov/Dec 2011&12, May/June 12, May /June 2013,
Nov/Dec 2013, May/June 2014, Nov/dec2014, May/June 2016, Nov/Dec 2016, May/June
2017, May/June 2019
5. Explain in detail about UMTS Architecture and its Services. Describe the function of
HLR and VLR in ceall routing and roaming [U] May/June 2016, Nov/Dec 2016, Dec 2017,
May 2018 Nov/Dec2014, May 2021
6. What are the functions of authentication and encryption in GSM? How is system security
maintained? [U]Nov/Dec 2016
7. Explain in detail about the handovers of GSM. Also discuss the timeline diagram of the
Intra MSC handover. [U]Nov/Dec 2016, May 2018, May 2021
COURSE OUTCOME: Understand the architecture of Wireless LAN technologies.

UNIT III WIRELESS NETWORKS

Wireless LANs and PANs – IEEE 802.11 Standard – Architecture – Services- Bluetooth –
WiMAX.
COURSE OBJECTIVE: Be familiar with the network protocol stack

III YEAR / VI SEMESTER /2019-2020

18
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT. OF INFORMATION TECHNOLOGY

1. What are the functions of MAC? (U)


MAC sub layer resolves the contention for the shared media. It contains synchronization, flag,
flow and error control specifications necessary to move information from one place to
another, as well as the physical address of the next station to receive and route a packet.
2. Why wireless LANs implement cannot CSMA/CD?? (U) MAY 2021
For this reason, CSMA/CD works well for wired networks, however, in wireless networks, there is no
way for the sender to detect collisions the same way CSMA/CD does since the sender is only able to
transmit and receive packets on the medium but is not able to sense data traversing that medium
3. What is Ethernet? (R)
Ethernet is a multiple-access network, meaning that a set of nodes send and receive frames
over a shared link.
4. Define the term carrier sense in CSMA/CD? (R) (Nov/Dec 2011)
All the nodes can distinguish between idle and a busy-link and “collision detect” means that a
node listens as it transmits and can therefore detect when a frame it is transmitting has
interfered (collided) with a frame transmitted by another node.
5. Define collision detection? (R)
In Ethernet, all these hosts are competing for access to the same link, and as a consequence,
they are said to be in the same collision detection.
6. Why Ethernet is said to be an I-persistent protocol? (U)
An adaptor with a frame to send transmits with probability ‘1 ‘whenever a busy line goes idle.
7. What is meant by exponential back off? (U) (Nov/Dec 2016)
Once an adaptor has detected a collision and stopped its transmission, it waits a certain
amount of time and tries again. Each time it tries to transmit but fails, the adaptor doubles the
amount of time it waits before trying again. This strategy of doubling the delay interval
between each transmission attempt is a general technique known as exponential back off.
8. What is token holding time (R) (THT)?
It defines that how much data a given node is allowed to transmit each time it possesses the
token or equivalently, how long a given node is allowed to hold the token.
9. What are the four prominent wireless technologies? (R)
 Bluetooth
 Wi-Fi(formally known as 802.11)

III YEAR / VI SEMESTER /2019-2020

19
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT. OF INFORMATION TECHNOLOGY

 WiMAX(802.16)
 Third generation or 3G cellular wireless.
10. Define Bluetooth? (R) (May/June 2016)
Bluetooth fills the niche of very short-range communication between mobile phones, PDAs,
notebook computers, and other personal or peripheral devices. For example, Bluetooth can be
used to connect mobile phones to a headset, or a notebook computer to a printer.

11. Explain the term handoff? (R)


If the phone is involved in a call at the time, the call must be transferred to the new base
station in what is called a hand off.

12. State the functions of bridges? (R) (Nov/Dec 2010 & April/May 2015 & May/June 2017)
 A bridge functions by blocking or forwarding data, based on the destination MAC
address written into each frame of data.
 If the bridge believes the destination address is on a network other than that from
which the data was received, it can forward the data to other networks to which it is
connected. If the address is not on the other side of the bridge
 Bridges learn the MAC addresses of devices on connected networks by listening to
network traffic and recording.
 It maintains a table that maps addresses to ports

13. What is the advantage of FDDI over a basic token ring? (R) (Nov/Dec 2010)
Token ring uses priority and reservation bits, but the priority operation of the FDDI ring
uses a principle that is based on a parameter known as the Token Rotation Time or TRT.
FDDI uses dual rings. When one ring fails, second ring performs data transfer process.
14. Mention some of the physical properties of Ethernet. (R) (April/May 2011)
Implemented on coaxial cable of up to 500 meters in length
 Hosts connect by “tapping” into it.
Taps at least 2.5 meters apart
 Transceiver is small device directly attached to tap
Detects when line is idle and drives signal when host is transmitting
 All protocol logic implemented in the adaptor (not transceiver)
15. What is maximum transmission unit? (U) (May/June 2012)
MTU-Maximum Transmission Unit, which is the largest IP datagram that it can carry in a

III YEAR / VI SEMESTER /2019-2020

20
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT. OF INFORMATION TECHNOLOGY

frame. It is the largest physical packet size, measured in bytes, that a network can transmit.
Any messages larger than the MTU are divided into smaller packets before being sent.
16. What is DHCP? (R) (Nov/Dec 2012)
The Dynamic Host Configuration Protocol (DHCP) is a network protocol used to configure
devices that are connected to a network (known as hosts) so they can communicate on that
network using the Internet Protocol (IP). It involves clients and a server operating in a client-
server model.
17. Differentiate fast Ethernet and gigabit. (An)(Nov/Dec 2012)

III YEAR / VI SEMESTER /2019-2020

21
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT. OF INFORMATION TECHNOLOGY

Fast Ethernet Network was developed as an upgrade to traditional Ethernet networking.


Fast Ethernet improved traditional Ethernet by increasing transfer rates 10 times, from 10
Megabit to 100 Megabit speed.
Gigabit Ethernet Network is an upgrade on Fast Ethernet Network equivalent to Fast
Ethernet Networks improvement over Fast Ethernet Network, offering speeds of 1000
Megabits (1 Gigabit)
18. List out any four IEEE 802 standards with its name. (R) (May/June 2012)

Standard Description
802.1 Internetworking
802.2 Logical link control
802.3 Ethernet
802.4 Token bus
802.5 Token ring
802.6 Metropolitan area network (MAN)

19. How is the minimum size of an Ethernet frame determined? (E) (May/June 2013)
Minimum Frame Size = 2 * Maximum distance *(data rate / propagation speed)
20. How does an FDDI node determine whether it can send asynchronous traffic and
synchronous traffic? (U) (May/June 2013)
Synchronous traffic can consume a portion of the 100-Mbps total bandwidth of an FDDI
network, while asynchronous traffic can consume the rest. Synchronous bandwidth is
allocated to those stations requiring continuous transmission capability. Such capability is
useful for transmitting voice and video information. Other stations use the remaining
bandwidth asynchronously.
21. What is the average size of an Ethernet frame? (U) (May/June 2014)
The average size of an Ethernet frame is 1000 bytes.
22. What is the access method used by wireless LAN? (U) (May/June 2014)
 Wi-MAX(802.16)
 Wi-Fi
 Bluetooth

III YEAR / VI SEMESTER /2019-2020

22
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT. OF INFORMATION TECHNOLOGY

23. What is the network Address in a class A subnet with the IP address of one of the hosts
as 25.34.12.56 and mask 255.255.0.0? (E) (May/June 2014)
The network Address in a class A subnet is 25.34.0.0
24. What do you understand by CSMA protocol? (U) (April/May 2015)
The “carrier sense” in CSMA/CD means that all the nodes can distinguish between an idle
and a busy link, and “collision detect” means that all the nodes listens as it transmits and can
therefore detect when a frame it is transmitting has interfered (collided) with a frame
transmitted by another node.
25. Identify the class of the following IP Address: (E) (Nov/Dec 2015)
(a) 110.34.56.45 (b)212.208.63.23
110.34.56.45 : Class A
212.208.63.23: Class C
26. Define hidden node problem. (R) (May/June 2016)
In wireless networking, the hidden node problem or hidden terminal problem occurs when a
node is visible from a wireless access point (AP), but not from other nodes communicating
with said AP. This leads to difficulties in media access control.
27. What is scatternet? (R) (Nov/Dec 2016)
 Connection of piconet is called scatternet
 A secondary station in one piconet can be the primary in another piconet. (or) A device
can be slave in one piconet and master of another.
 This station can receive message from the primary in the first piconet (as a secondary) and
acting as a primary, deliver them to secondary in the second piconet
 A station can be a member of two piconets

III YEAR / VI SEMESTER /2019-2020

23
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT. OF INFORMATION TECHNOLOGY

PART B

1. Explain the functioning of wireless LAN in detail.(R) (Nov/Dec 2010), May 2021
2. Write architecture of Wi-Fi, Wi-Max. (R) May 2021
3. Explain CSMA in detail(R) (April/May 2011)
4. Explain the physical properties of Ethernet 802.3 with necessary diagram of Ethernet
transceiver and adapter. (R) (Nov/Dec 2012)
5. Explain the physical properties and medium access protocol of Ethernet. (R) (May/June
2012)
6. Describe the transmitter algorithm implemented at the sender side of the Ethernet protocol.
Why should Ethernet frame should be 512 bytes long? (E) (10) (Nov/Dec 2013)
7. Explain how the hidden node and exposed node problem is addressed in 802.11? (U)(6)
8. Explain in detail about the access method and frame format used in Ethernet and token ring.
(U) (16) (April/May 2015)
9. (i) Discuss the MAC layer functions of IEEE802.11 (R) (8) (April/May 2015)
(ii) Briefly define key requirements of wireless LAN (U) (8)
10. Write short notes on: (R) (Nov/Dec 2015)
(i) Ethernet (ii) Wireless LAN
11. Explain the physical properties of Ethernet 802.3 with necessary diagram of Ethernet
transceiver and adapter. (U) (16)(Nov/Dec 2016)
12. Give the comparison between different wireless technologies? Enumerate 802.11 protocol
stack in detail.(U/An)(16)(May/June 2016)
13. Explain the media access control algorithm, CSMA/CD used in Ethernet.Why the same
algorithm cannot be used in wireless LAN (U)(8),(Nov/Dec2018)
14. Explain the services offered by IEEE 802.11 standard.(8), May 2021
Course Outcome: Understand the architecture of Wireless LAN technologies

UNIT IV MOBILE NETWORK LAYER

Mobile IP – DHCP – AdHoc– Proactive and R active Routing Protocols- Multicast Routing-
Vehicular Ad Hoc networks ( VANET) –MANET Vs VANET – Security.

III YEAR / VI SEMESTER /2019-2020

24
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT. OF INFORMATION TECHNOLOGY

COURSE OBJECTIVE: Learn the basics of mobile telecommunication system

PART – A

1. What is meant by Ad-hoc network? [R]


The term implies spontaneous or impromptu construction. An ad hoc network is a
network that is composed of individual devices communicating with each other directly. Instead
of relying on a base station to coordinate the flow of messages to each node in the network, the
individual network nodes forward packets to and from each other.
2. What are the basic principles of Ad-hoc networking? [U]
 Mobile device communicate in peer-to-peer fashion
 Self-organizing network without the need of fixed network infrastructure„
 Multi-hop communication„
 Decentralized, mobility-adaptive operation
3. What are the needs of ad hoc networks? [U]
 Ease of deployment
 Speed of deployment
 Decreased dependence on infrastructure
4. What are the advantages of ad hoc networks? [U]
The advantages of an ad hoc network include:
 Separation from central network administration.

 Self-configuring nodes are also routers.

 Self-healing through continuous re-configuration.

 Scalability incorporates the addition of more nodes.

 Mobility allows ad hoc networks created on the fly in any situation where there are

multiple wireless devices. 


 Flexible ad hoc can be temporarily setup at any time, in any place.

 Lower getting - started costs due to decentralized administration.

 The nodes in ad hoc network need not rely on any hardware and software. So, it can be

connected and communicated quickly. 


5. What are the key challenges in ad hoc networks? [An]
1. All network entities may be mobile ⇒ very dynamic topologyƒ

III YEAR / VI SEMESTER /2019-2020

25
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT. OF INFORMATION TECHNOLOGY

2. Network functions must have high degree of adaptability (mobility, outage)ƒ


3. No central entities ⇒ operation in completely distributed manner
6. What is meant by MANET? [R]
A mobile ad hoc network (MANET) is a continuously self-configuring, infrastructure-less
network of mobile devices connected without wires. MANETs are established and maintained on
the fly and work without the support of any form of fixed infrastructure such as base station or an
access point.
7. Give the difference between cellular and ad-hoc networks. [U] May 2018

S.No Cellular Networks Ad-hoc Networks


1 Infrastructure Networks Infrastructure-less Networks
2 Fixed, pre-located cell sites and No base station and rapid
base stations deployment
3 Static backbone network topology Highly dynamic network
topologies
4 Relatively caring environment and Hostile environment and irregular
stable connectivity connectivity
5 Detailed planning before base Ad-hoc networks automatically
station can be installed forms and adapts to changes
6 High setup costs Cost-effective
7 Large setup time Less setup time

8. List out the characteristics of MANETs. [U] May/June 2016


1) Lack of fixed infrastructure
2) Dynamic Topologies
3) Bandwidth constrained, variable capacity links
4) Energy Constrained Operation
5) Increased Vulnerability
6) Distributed peer-to-peer mode of operation
7) Multi-hop Routing
8) Autonomous Terminal

III YEAR / VI SEMESTER /2019-2020

26
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT. OF INFORMATION TECHNOLOGY

9) Lightweight Terminals
10) Shared Physical Medium
9. Analyze the operational constraints (challenges) associated with MANET. [An]
1. Low Processing Capabilities & low bandwidth
2. Computational & Communication overhead
3. Mobility-induced route changes
4. Battery Constraints
5. Packet losses due to transmission errors
6. Security Threats
7. Dynamic Topology
10. What are the advantages of MANETs? [U]
 They provide access to information and services regardless of geographic position.
 Independence from central network administration
 Self-configuring network, nodes are also act as routers. Less expensive as compared to
wired network.
 Scalable—accommodates the addition of more nodes.
 Improved Flexibility.
 Robust due to decentralize administration.
 The network can be set up at any place and time.
11. What are the disadvantages of MANET? [U]
1. Limited Resource
2. Limited Physical Security
3. Vulnerable to attacks. Lack of authorization facilitates
4. Variable network topology makes it hard to detect malicious nodes
5. Security protocols for wired network cannot work for adhoc network
6. Battery constraints
7. Frequent route changes leads to computational overhead
12. List out some of the applications of MANETs. [U] May/June 2017
Some of the typical applications include:
1) Communication among portable computers
2) Environmental Monitoring

III YEAR / VI SEMESTER /2019-2020

27
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT. OF INFORMATION TECHNOLOGY

3) Sensor Networks
4) Military Sector
5) Personal Area Network and Bluetooth
6) Emergency Applications
13. Analyze and list out the various design issues associated with MANET. [An] Nov/Dec2018
1) Network Size and Node Density
2) Connectivity
3) Network Topology
4) User Traffic
5) Operational Environment
6) Energy Constraints
14. What is meant by routing in ad hoc networks? [U]
“Routing is the process of finding the best path between the source and the destination for
forwarding packets in any store-and-forward network. Routing is the mechanism of forwarding
packet towards its destination using most efficient path. Efficiency of the path is measured in
various metrics like, Number of hops, traffic, security, etc. In Ad-hoc network each host node
acts as specialized router itself.
15. Compare Link State and Distance Vector Routing. [U]

S.NO Link Sate Routing Distance Vector Routing


1 It can be used in larger networks It can be used in smaller networks
2 It has unlimited number of hops It has limited number of hops
3 Convergence time is low Convergence time is high
4 Advertises only new changes Periodically advertise updates
5 Only advertise the updates and flood Advertises the entire routing tables to
the advertisement all its neighbors
6 Metric used is cost Metric used is hop count

III YEAR / VI SEMESTER /2019-2020

28
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT. OF INFORMATION TECHNOLOGY

16. Differentiate between MANET routing strategies with routing strategies of traditional
networks. [U]

S.NO MANET routing strategies Routing strategies of traditional


networks
1 In MANET, each node acts as a In traditional network, ordinary nodes
router do not participate in routing the
packets.
2 In MANET, the topology is dynamic In traditional networks, the topology is
because of the mobility of the nodes. static and the routing table is also
Thus the routing table quickly constant during the data transmission.
becomes obsolete.
3 IP address encapsulated in the subnet Simple IP-based addressing scheme is
structure does not work because of deployed in wired network.
the node mobility

17. Give the classification of MANET routing protocols. [U]

18. List the types of communication in MANET. [R]


 Unicast: Message is sent to a single destination node
 Multicast: Message is sent to a selected subset of network nodes
 Broadcast: Broadcasting is a special case of multicasting. Message is sent to all the
nodes in the network.

III YEAR / VI SEMESTER /2019-2020

29
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT. OF INFORMATION TECHNOLOGY

19. What is meant by VANET? [U]


A Vehicular Adhoc Network (VANET) is a special type of MANET in which moving
automobiles form the nodes of the network. i.e., vehicles are connected to each other through an
adhoc formation that forms a wireless network.
20. Summarize the security issues in MANET. [U] MAY 2021
 Vulnerabilities can lead to message eavesdropping, injection of fake messages, denial of service
attack or poor monitoring of routing information. MANETs are susceptible to both internal and
external attacks.
21. Identify the issues that are addressed by routing protocol in MANET? [U] MAY 2021
One of the major issues for routing in MANETs is the constant movement of nodes or node mobility
Disruption and frequent path breaks occur due to the movement of intermediate nodes in the path and
end nodes. Efficient mobility management for dynamic MANETs should be an important feature for
routing protocols in MANETs.
22. Mention the uses of VANET. [U]
1) A VANET can help drivers to get advance information and warnings from a nearby
environment via message exchanges.
2) A VANET can help disseminate geographical information to the driver as he continues
to drive.
3) Drivers may have the opportunity to engage in other task.
23. List out the applications of VANETs. [U]
1) Safety oriented
a) Real-time traffic
b) Cooperative message transfer
c) Post-crash notification

III YEAR / VI SEMESTER /2019-2020

30
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT. OF INFORMATION TECHNOLOGY

d) Road hazard control notification


e) Traffic vigilance

2) Commercial oriented
a) remote vehicle personalization
b) internet access
c) digital map downloading
d) real time video relay
e) value-added advertisement

3) Convenience oriented
a) route diversion
b) electronic toll collection
c) parking availability

4) Productive Applications
a) Environmental Benefits
b) Time Utilization
c) Fuel Saving
24. Compare MANET Vs VANET. [U] May/June 2016, Nov/Dec 2016, May 2018, May 2019

VANET – Vehicular Adhoc MANE – Mobile Adhoc


S.No
Network Network
Basic Idea It is a collection of
nodes(vehicles) that It is a collection nodes that
communicate with each other communicate with each other
1 over bandwidth constrained over bandwidth constrained
wireless links with certain wireless links without any
road side infrastructure or infrastructure support
base station

III YEAR / VI SEMESTER /2019-2020

31
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT. OF INFORMATION TECHNOLOGY

2 Production Cost Costly Inexpensive


Network
3 Frequent and very fast Sluggish / Slow
Topology Change
4 Mobility High Low
5 Density in Node Frequent variable and dense Sparse
6 Bandwidth 1000 kbps 100 kbps
7 Range Up to 600 m Up to 100 m
Node lifetime It is depend on vehicle life
8 It is depend on power source
time
9 Reliability High Medium
Nodes moving
10 Regular Random
Pattern

25. What is multicasting? [R] Nov/Dec 2016


Multicast is communication between a single sender and multiple receivers on a network.
Together with any cast and unicast, multicast is one of the packet types in the Internet Protocol
Version 6 (IPv6).
26. Outline the concept of RTT? [R] Nov/Dec 2016
Round-trip time (RTT), also called round-trip delay, is the time required for a signal pulse or
packet to travel from a specific source to a specific destination and back again. The source is the
computer initiating the signal and the destination is a remote computer or system that receives
the signal and retransmits it.
27. Distinguish reactive and proactive protocols. [U] May/June 2017
 Average end-to-end delay or the time taken by the data to reach the destination from the
source is variable in Reactive Protocols but remains constant in Proactive Protocols for a
given Ad hoc network.
 • The delivery of packet data is much more efficient in Reactive Protocols than in
Proactive Protocols.
 • Reactive Protocols are much faster in performance than Proactive protocols.
 • Reactive Protocols are much more adaptive and work much better in different
topographies than Proactive Protocols.

III YEAR / VI SEMESTER /2019-2020

32
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT. OF INFORMATION TECHNOLOGY

28. Compare AODV and DSR protocols[An](Dec 2017)

 DSR has less routing overhead than AODV.


 AODV has less normalized MAC overhead than DSR.
 DSR is based on a source routing mechanism whereas AODV uses a combination of
 DSR and DSDV mechanisms.
 AODV has better performance than DSR in higher-mobility scenarios.
 DSR has less frequent route discovery processes than AODV.

29. What are the contents of link state advertisement message ?[U](Dec 2017)

 Authentication.
 Hello Dead Timers.
 Area ID.
 Nieghbor List (If not a nieghbor, sends more info)
 Designated Router IP.
 Backup DR IP.
 Priority of Interfaces.

30 What are the important steps in DSDV(Destination sequenced Distance Vector


Routing) [U] Nov/Dec2018

 DSDV protocol uses and maintains a single table only, for every node individually. The
table contains the following attributes.
 Routing Table : It contains the distance of a node from all the neighboring nodes along
with the sequence number( SEQ No means the time at which table is updated).
 This table is updated on every step and ensures that each node broadcast as well as
receives correct information about all the nodes including their distance and sequence
number.
31. Why routing in MANET so complex task.[An] May/June 2019
Routing is to find correct path between the source and destination for forwarding
packets. Routing is complex task in MANET's because. ... While forwarding packet

III YEAR / VI SEMESTER /2019-2020

33
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT. OF INFORMATION TECHNOLOGY

sender much check the parameters: a) Packet reaching the destination. b) Minimize the
number of hops/path length
32. Outline the basic objective of WAP.. [R] MAY 2021
The goal of WAP is to create recommendations and specifications that support the creation of
advanced services on wireless devices, with particular emphasis on the mobile telephone. The
WAP Forum is creating recommendations and technologies which enable these services on all
mobile devices and on all networks.

33. Infer the advantage of snooping TCP MAY 2021


o The end-to-end TCP semantic is preserved
o The packet is not acknowledged by the FA.
o No Modifications at Fixed Host
o The fixed computer TCP does not need any changes.

PART – B

1. Explain the basic characteristics and applications of Mobile Ad hoc networks. [U]
May/June2016, May/June2019
2. Explain in detail about the key mechanisms associated with Mobile IP. [U] Nov/Dec 2016
3. Express brief account of route optimization in Mobile IP. [U]
4. Explain the various routing strategies in mobile ad-hoc networks. [U]
5. MANET Routing protocols. [An] Nov/Dec 2014
6. Explain DSR Routing Protocol in detail. [An] May/June 2016, May 2021
,

III YEAR / VI SEMESTER /2019-2020

34
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT. OF INFORMATION TECHNOLOGY

7. Explain the following: [U]


(i) DSDV routing protocol
(ii) Ad-hoc DSR routing protocol
8. Explain Dynamic Source Routing. [U] May/June2014
9. Organize the steps involved in operation of DSDV . I llustrate with an example. [An] Nov/Dec
2019
10. What are the differences between AODV and the standard distance vector algorithm? Why are
extensions needed? [An]
11. Explain about Hybrid Routing protocols in MANETs. [U]
12. Demonstrate how multicast routing is carried out in ad-hoc networks. [An] Nov/Dec 2016
13. Define VANET? Explain how does it differ from MANET? Explain any one application of
VANET. [An]
14. Draw and explain the architecture of VANET. Compare VANET and MANET [U] May/June
2016, Dec 2017. May 2018 Nov/Dec 2018
15. Discuss about various schemes in VANET routing. [An]
16. Explain the various security attacks on VANET. [U] May/June 2016
17. Summarize the two important classes of Routing Protocols for Traditional Networks.[U]
Nov/Dec 2016, Nov/Dec 2019
18. What are reactive and proactive protocols? Specify its advantages and disadvantages.[An]
Nov/Dec 2016
19. Explain any two VANET routing protocols with an example. [U]May/June 2017, May 2021
20. Explain the design issues of MANET routing protocols in detail and the application of adhoc
network. May/June 2016, May 2018
21. Discuss route discovery and route maintenance mechanisms in DSR with illustrations. List its
merits and demerits and compare it with DSDV[An]Dec 2017 Nov/Dec 2018, May 2021
22. What is the reaction of standard TCP in case of packet loss? In what situation does this reaction
make sense and why in it quite often problematic to the case of wireless networks and
mobility?[An] Nov/Dec 2018
23. Consider the following network given below. Here ‘S’ is Source node and ‘D’ is the Destination
node. Illustrate the process of route discovery , route reply , data delivery and route caching
using DSR. Explain the approach. [An]May 2018.
24. Describe in detail the registration procedure in Mobile IP.(7) May 2021.

III YEAR / VI SEMESTER /2019-2020

35
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT. OF INFORMATION TECHNOLOGY

25. A major task of the designer of a wireless sensor network is prolonging the life of the network.
Explain how this is achieved while designing a MANET. May 2021.

26. Consider the network given below in figure 1. Here “S” is source node and “D” is target node.
Illustrate the process of route discovery, route reply, data delivery and route caching using
DSR. Explain the approach. May 2021.

27. With a neat diagram explain how packet delivery to and from a mobile node is transferred in
mobile IP[U]. May/June 2017, Dec 2017

COURSE OUTCOME: Determine the functionality of network layer and Identify routing
protocol for a given Ad hoc networks.

UNIT V MOBILE TRANSPORT AND APPLICATION LAYER


Mobile TCP– WAP – Architecture – WDP – WTLS – WTP –WSP – WAE – WTA- Architecture
– WML.
COURSE OBJECTIVE: Be exposed to Ad-Hoc networks.

PART – A

1. List out advantage of M-TCP. [U]


 It maintains the TCP end-to-end semantics. The SH does not send any ACK itself but
forwards the ACKs from the MH.
 If the MH is disconnected, it avoids useless retransmissions, slow starts or breaking
connections by simply shrinking the sender’s window to 0
2. List out disadvantage of M-TCP. [U]
 As the SH does not act as proxy as in I-TCP, packet loss on the wireless link due to bit
errors is propagated to the sender. M-TCP assumes low bit error rates, which is not
always a valid assumption.

III YEAR / VI SEMESTER /2019-2020

36
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT. OF INFORMATION TECHNOLOGY

 A modified TCP on the wireless link not only requires modifications to the MH protocol
software but also new network elements like the bandwidth manager
3. How does M-TCP split the connections? [An]
 Unmodified TCP

III YEAR / VI SEMESTER /2019-2020

37
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT. OF INFORMATION TECHNOLOGY

Used to handle wired part of connection and used in between the Fixed Host (FH) and
the Supervisory Host (SH).
 Optimized TCP
Used to handle wireless part of connection and used in between the Supervisory Host
(SH) and the Mobile Host (MH).
4. What is WAP protocol stack?[R]

WAP specifies an application framework and network protocols for wireless devices such as
mobile telephones, pagers, and personal digital assistants (PDAs)." WAP is the mobile phone
industry's answer to interactive web applications. WAP defines its own set of protocols but
models after existing web protocols.
5. What is WAP model?[R]
WAP is a set of protocols that allow wireless devices like hand-held cell phones to access the
internet. But it has programming model similar to that of WWW Transport of content is based
on standard communication protocols which are based on that of WWW. The micro browser is
analogous to standard web browser.
6. What are the various protocols in a WAP protocol suite?[U]
 Wireless Session Protocol (WSP)
 Wireless Transaction Protocol (WTP)
 Wireless Transport Layer Security (WTLS)
 Wireless Datagram Protocol (WDP)

7. What is WAP and its uses.[U]


Wireless application protocol (WAP) is a communications protocol that is used for wireless data
access through most mobile wireless networks. WAP enhances wireless specification
interoperability and facilitates instant connectivity between interactive wireless devices (such as
mobile phones) and the Internet.
8. List down the WTLS features[U]
Support for other cryptographic algorithms. ...
Definition of a new compact public key certificate, WTLS certificates. ...
UDP datagram support. ...
A key refresh option. ...
An expanded set of alerts. ...
Optimized handshakes.

III YEAR / VI SEMESTER /2019-2020

38
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT. OF INFORMATION TECHNOLOGY

9. What are the WAP Components. [U]


The WAP architecture comprises several components,
These components include a wireless application environment, session and transaction support,
security, and data transfer.

10. What are the WAP - Key Features[U]


A programming model similar to the Internet's. Though WAP is a new technology, but it
reuse the concepts found on the Internet. ...
Wireless Markup Language (WML) You must be using HTML language to develop your
web-based application. ...
WMLScript. ...
Wireless Telephony Application Interface (WTAI) ...
Optimized protocol stack.
11. What are the goals of WAE[R]
device and network independent application environment
for low-bandwidth, wireless devices
considerations of slow links, limited memory, low computing power, small display,
simple user interface (compared to desktops)
integrated Internet/WWW programming model
high interoperability.
12. What is WTA in mobile computing?[U]
Wireless Telephony Application (WTA)
. WTA is a collection of telephony specific extensions for call and feature control
mechanisms, merging data networks and voice networks
13. Define WTAI?[U]
WTAI (Wireless Telephony Application Interface) WTAI defines a set of WTA-related
functions in a wireless device that can be invoked via WML or WMLScript.
14. Why is a WAP needed?[An]
Wireless Application Protocol commonly known as WAP is used to enable the access of
internet in the mobile phones or PDAs. WAP is an international standard for the devices
that use the wireless communications. ... There is a need of certain applications to make
the full use of WAP in your device.

III YEAR / VI SEMESTER /2019-2020

39
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT. OF INFORMATION TECHNOLOGY

15. What is WAP on a phone?[U]


Wireless Application Protocol (WAP) is a technical standard for accessing information
over a mobile wireless network. A WAP browser is a web browser for mobile devices
such asmobile phones that uses the protocol. in this case., its just a generic description of
accessing teh internet.
16. What is the need of WML?[An]
WML browsers should act like thin clients and perform minimal processing on the
device. Network Capabilities: Small computing devices have a low bandwidth and high
network latency. WML has to ensure maximum efficiency in fetching requested Web
pages from the server.
17. What is the difference between WML and HTML?[An]
WML (Wireless Markup Language) and HTML (Hypertext Markup Language) are
markup languages, the main function of which is to serve content from web sites. The
main difference between WML and HTML is the target devices that they aim to serve. ...
On the other hand, HTML is quite full featured, even in its earlier versions.
18. What is card in WML? [U]
WML <card> tag. Complete WML Reference. A WML deck contains one or more cards.
The <card> tag defines a card. A card can contain text, markup, links, input-fields, tasks,
images and more.
19 What are the ADVANTAGES OF WML[U]
Transmission of WML (WMLC) documents requires less bandwidth compared to HTML
documents because WML documents are simpler and WML is compressed before it is
sent to the WAP device. Compared to HTML documents, displaying WML documents
requires less processing power and memory.
20. What is WML and WML script?[U]
WML stands for Wireless Markup Language. It is a mark-up language inherited from
HTML, but WML is based on XML, so it is much stricter than HTML. WML is used to
create pages that can be displayed in a WAP browser. Pages in WML are called DECKS.
Decks are constructed as a set of CARDS.
21. What are the services provided by the WSP[U]

III YEAR / VI SEMESTER /2019-2020

40
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT. OF INFORMATION TECHNOLOGY

provides shared state between client and server, optimizes content transfer
session management (establish, release, suspend, resume)
efficient capability negotiation
content encoding
push
PART – B

1. Describe how mobile TCP improves TCP efficiency for mobile networks? How does
mobile TCP maintain end to end semantics? [An]May 2018
2. Describe in detail about the architecture of the WAP protocol stack[U]
3.Explain in detail about the components of WAP.[U]
4. Summarize the challenges in WAP[An]
5. Interpret the WTP class 2 protocols..[U] May 2021
6. Explain in detail about the different communication scenarios in WTP[An]
7.Describe about WML with example program[U]
8. Explain in detail about the WAP Architcture[U]
9. Summarize the working of Snooping TCP. May 2021
10. Describe WTA Framework in detail[U]
11. Illustrate the classical TCP improvements. May 2021
12. Explain the wireless transport layer security. May 2021

COURSE OUTCOME: Explain the functionality of Transport and Application layer

III YEAR / VI SEMESTER /2019-2020

41
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT. OF INFORMATION TECHNOLOGY

COURSE OUTCOMES
COURSE NAME : IT8602 - MOBILE COMMUNICATION

YEAR/SEMESTER : III / VI
YEAR OF STUDY : 2019 –2020 EVEN (R – 2017)
On Completion of this course student will gain

Ability to Develop an understanding on quality management philosophies and


C311.1
frameworks
Ability to Learn the applications of quality tools and techniques in both manufacturing
C311.2
and service industry

C311.3 Ability to Learn the architecture of Wireless LAN technologies

Ability to Develop analytical skills for investigating and analyzing quality management
C311.4
issues in the industry and suggest implement able solutions to those..

C311.5 Ability to learn the functionality of Transport and Application layer

CO-PO MATRIX

CO PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
C311.1 2 2 1 - - - - - - - 1 1
C311.2 2 2 2 - - - - - - - 1 1
C311.3 1 2 1 - - - - - - - 1 1
C311.4 1 2 2 - - - - - - - 1 2
C311.5 2 2 1 - - - - - - - 1 2
C311 1.6 2 1.4 - - - - - - - 1 1.4

III YEAR / VI SEMESTER /2019-2020

42
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT. OF INFORMATION TECHNOLOGY

CO-PSO MATRIX:

CO PSO1 PSO2 PSO3


C311.1 1 - 1
C311.2 1 - 1
C311.3 1 - 1
C311.4 1 - 1
C311.5 1 - 1
C311 1 - 1

III YEAR / VI SEMESTER /2019-2020

43

You might also like