0% found this document useful (0 votes)
103 views

Mobile Communication: Two Marks Q&A

Spread Aloha Multiple Access (SAMA) is a combination of CDMA and TDMA that better suits connection-oriented services compared to CDMA alone. Code Division Multiple Access (CDMA) systems use orthogonal codes to separate different users transmitting over the same frequency and time. There are several versions of Carrier Sense Multiple Access (CSMA) including non-persistent, p-persistent, and 1-persistent CSMA.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
103 views

Mobile Communication: Two Marks Q&A

Spread Aloha Multiple Access (SAMA) is a combination of CDMA and TDMA that better suits connection-oriented services compared to CDMA alone. Code Division Multiple Access (CDMA) systems use orthogonal codes to separate different users transmitting over the same frequency and time. There are several versions of Carrier Sense Multiple Access (CSMA) including non-persistent, p-persistent, and 1-persistent CSMA.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 28

VII Sem/ IT

TWO MARKS Q&A


1.. Define SAMA.

IT2402 Mobile Communication

UNIT-I

Spread Aloha Multiple Access is a combination of CDMA and TDMA. The CDMA better suits for onne ti n
oriented services only and not for connection less bursty data traffic because it requires to program both sender and
receiver to access different users with different codes.
2.Define CDMA.

Code Division Multiple Access systems use codes with certain characteristics to se r te different users. To enable
access to the shared medium without interference. The users use the same frequency and time to transmit data. The
main problem is to find good codes and to separate this signal from noise. The good code can be found the following
2 characteristic 1.Orthogonal. 2.AutoCorrelation.
3.What are the several versions in CSMA?
There are several versions in CSMA, they are as follows
a) non-persistent CSMA
b) p-persistent CSMA
c) 1-persistent CSMA
4. What is meant by non-persistent CSMA?

In,non-persistentCSMA,stationssnsethe carrier and start sending immediately if the medium is idle., if the medium is busy, the
station paus s a random amount of time before sensing the medium again and repeating this

pattern.

5.What is meant by p-persistent CSMA?


In p-persistent CSMA system nodes also sense the medium, but only transmit with a probability of p. With the
station deferring to the next slot with the probability 1-p, i.e. access is slotted in addition.
6. What is SDMA?
Space Division Multiple Access (SDMA) is used for allocating separated spaces to users
in wireless networks. The basis for the SDMA algorithm is formed by cells and sectorized antennas which constitute
the infrastructure implementing space division multiplexing (SDM)

7. What is FDD?
In FDMA, the base station and the mobile station establish a duplex channel. The two directions, mobile station to
base station and vice versa are separated using different frequencies. This Scheme is called Frequency Division
Duplex (FDD)

Department of Information Technology

IT2402 Mobile

Communication

VII Sem/ IT

8. What are the 2 sub layers in DLC?


Logical Link Control(LLC), Media Access Control(MAC)
9.What is EY-NMPA?

Elimination yield Non Pre-emptive Multiple Access (EY-NMPA) is a scheme which uses several phases
to sense the medium. access the medium and for contention resolution.. Priority schemes can also be included. This
is actually used in HIPERLAN1 specification.
10. What do you mean by Polling?

Polling is a strictly centralized scheme with one master and several slave stations. The master can collect
the list of stations during the contention phase and can poll these slaves according to m ny schemes like round
robin, random access, reservation scheme etc.
11. What are the four types of handover available in GSM?
1. Intra cell Handover
2. Inter cell Intra BSC Handover
3. Inter BSC Intra MSC handover
4. Inter MSC Handover
12. What is TETRA?
TETRA (Terrestrial Trunked Radio) systems use different radio carrier frequencies, but they assign specific
carrier frequencies for a short period of time according to demand. TETRAs are highly reliable and extremely

cheap.
13. what are the categories of Mobile s rvices?
Bearer services
Tele services
Supp ementary services
14. What are the services provided by supplementary services?
User identification
Call redirection

com

Call forwarding
Closed user groups
Multiparty Communication

Department of Information Technology

IT2402 Mobile

Communication

VII Sem/

IT

UNIT -II

15. What are types of Handover?


Intra-cell handover
Inter-cell , intra- BSC handover
Inter-BSC, intra-MSC handover Inter MSC handover

Operation subsystem(OSS)
18. What are the information in SIM?
card type, serial no, list of subscribed services

16. What is meant by GPRS?

Personal Identity Number(PIN)

The General Packet Radio Service provides packet mode


patterns such as frequent transmission of small volumes.

Pin Unlocking Key(PUK)

17. What are subsystems in GSM system?


Radio subsystem(RSS)
Network & Switching subsystem(NSS)

An Authentication Key(KI)

transfer for applications that exhibit traffic

.
km to the earth. Examples are almost all TV and radio broadcast satellites, many weather satellites and satellites

1. What are the logical channels in GSM?


Traffic channel(TCH)
Control ch nnel(CCH)
What is the functi n f Medium Access Control Layer?
The fu cti ns f Medium Access Control Layer are responsible for establishes, maintains, and releases
channels for higher layers by activating and deactivating physical channels.
2. What is meant by GEO?

operating as backbone for the telephone network.


3. what are the advantages of GEO?
Three GEO satellites are enough for a complete coverage of almost any spot on earth, senders and
receivers can use fixed antennas positions, no adjusting is needed. Therefore GEOs are ideal for T.V and radio
broadcasting.

Department of Information Technology

IT2402 Mobile

CommunicationVII Sem/ IT

4. What is Handover?
The satellite is the base station in satellite communication systems and that it self is moving. So, additional
instance of handover are necessary due to the movement of the satellite
1. Intra Satellite handover, 2. Inter Satellite handover, 3.Gateway handover.
4. Inter System handover.
5. What are the registers maintained by the gateway of satellite?
1 .Home Location Register(HLR).

2. Visitor Location Register(VLR).


3. Satellite User Mapping Register (SUMR).

7. Applications of Satellite?
Satellites can be used in the Following A eas
Weather Forecasting
Radio and TV broadcast Satellites

Military Satellites
Satellites for Navigation
8. What are the applic tions in satellites?
Weather f recasting satellites
Radio & TV broadcast satellites

Military satellites
Satellites for navigation
Mobile communication
9. What are the advantages of LEO?
6. Advantages of MEO
Using Orbits around 10,000Km, the system only requires a doz n satell tes which is more than the GEO
system, but much less than a LEO system. Further more these sat llit s move slower relative to the earths rotation
allowing a simpler system design. Depending on the inclination a MEO can cover larger populations, thus
requiring less handovers.

Data rate is 2400 bit/s

Department of Information Technology

IT2402 Mobile

Communication

VII Sem/ IT

11. Define the elevation angle and footprint ?

12. Define Header core?

Packet delay is relatively low


Smaller footprints of LEO allows frequency reuse
Provide high elevations
10. Define the inclination angle and perigee?
The inclination angle is defined as the angle between the equatorial plane and the plane described by the
satellite orbit. An inclination angle of 0 degrees means that the satellite is exactly above the equator. If the satellite
does not have a circular orbit, the closest point to the earth is called the perigee.

.com
The elevation angle is defined as the angle between the centre of satellite be m nd The plane tangential to
the earths surface. The foot-print can be defined as the area on earth where the signals of the satellite can be
received.

Seven bytes field contains the sizes of the header and the body, the content type of the object. Depending
on this header information, the receiver may decide if it has enough sourc s(memory, cpu, power, display etc)
available to decode and further process the object.
13. What is MSC ?
Main Service Channel (MSC) carries all user data.eg. audio, multimedia data.
The Fast Information Channel(FIC) containsFastInformation Block(FIB) with 256bits each(16 bit checksum). An FIC

carries all control information which is required for interpreting the configuration and content of the MSC.
?

14. What is FIC ?

15. What are the different types of disk?


A flat disks
Skewed disks
Multi disks

The goal of DVB is to introduce digital TV broadcasting using satellite transmission (DVB-5) cable technology
(DVB-c) and terrestrial transmission (DVB-7).

Department of Information Technology

IT2402 Mobile

Communication

VII Sem/ IT

UNIT-III

1. Name some of the formats supported by MOT?.


_Multimedia and Hypermedia information coding experts group(MHEG)
_Join photographs experts group(JPEG)

_American standard code for information interchange(ASCII)


_Moving pictures expert group(MPEG)

com

_Hypertext markup language(HTML)


_Hypertext transfer protocol(HTTP)
_Bitmap(BMP)
_Graphics interchange format(GIF)

2. Give structure MOT object.


7bytes
variable size
variable size
Header core
Header Extension Body
Header core : cont in the size of the header and body and the content type of the object.
Header Extensi n : c ntains additional object handling data such as repetition distance to
support cachi g, segmentation information and priority of the data.
Body : co tai s arbitrary data to be transmitted.

3.What are different interleaving and repetition schemes applied by DAB to objects and segments?
1.Object Repetition.

downloaded

2.Interleaved Objects.
3.Segment repetition.

Department of Information Technology


Communication

IT2402 Mobile

VII Sem/ IT
4.Header repetition.
4. What are the advantages of DAB?
1.DAB can offer sound in CD like quality.
2.DAB can use single frequency network where all senders transmitting the same
radio program can operate at the same frequency.
3.DAB use VHF and UHF frequency bands.

4.DAB uses DQPSK modulation scheme.


5.DAB user COFDM and FEC.

com

6.DAB can transmit up to six stereo audio programs with a data rate of
192kbit/s each.

5. What is object repetition?


DAB can repeat objects several times. If an object A consists of four

segments(A1,A2,A3,A4)
a single repetition pattern would be A1A2A3A4A1A2A3A4A1A2A3A4..
6. What is EIT?
Event Information Table(EIT) contains status in ormation about the current
transmission and some additional information for set-top boxes.
7. What are the service information s nt by DVB?
Digital Video Bro dc st Cont iners are basically MPEG-2 frames. DVB
sends service inf rmati n. These information are,
1.Network i formation table(NIT).
2.Service Description Table(SDT).
3.Event Information Table(EIT).
4.Time and Date Table(TDT)

downloaded
8. What are the advantages of DVB?

Department of Information Technology

IT2402 Mobile

Communication

VII Sem/ IT

1.Data rates planned for users are 6-38mbit/s for the downlink and 33-100kbit/s for the uplink. 2.Transmitted along
with TV programmes and doesnt require additional lines or hardware per customer. 3.Can be used in remote areas
and developing countries where there is no high band width wired network.

9. what is meant by beacon?


A beacon contains a timestamp and other management information used for
power management and roaming.

e.g., identification of the base station subsystem(BSS)

com

10. What is Active scanning?


Active scanning comprises sending a probe on each channel and waiting for
response. Beacon and Probe response contain the information necessary to join the ew BSS.

11. What is Passive Scanning?


Passive Scanning Simply means listening into the medium to find other networks,
i.e. receiving the beacon of another network issued by the synchronization function
within an access point

12. what is the primary goal of IEE 802.11?


The primary goal of the standard was the specification of a simple, robust, WLAN
which offers time boun ed and asynchronous services also it should be able to operate
with multiple physic l l yers.

13. what is mea t by SIFS?


SIFS means Short Inter Frame Spacing. The shortest waiting time defined for
sh rt c ntrol message such as acknowledgements or polling response.

14. What are Advantages of wireless LAN?

downloaded
Flexibility,
Planning,

Department of Information Technology


Communication

IT2402 Mobile

VII Sem/ IT
Design,
Robustness,
Quality Service,
Cost,
Proprietary Solution,
Restriction,

Safety and Security

com

15. What are Design Goals of Wireless LAN?


Global Operation
Low Power
License-free Operation
Robust transmission technology
Simplified spontaneous co-operation
Easy to use
protection of investment
Safety and Security
Transparency for application

UNIT-IV
1.What are the three L w Power States provided by Bluetooth?
PARK state
HOLD state
SNIFF state

2.What is SCO?

downloaded
SCO-stands for Synchronous Connection Oriented Link
Standard telephone (voice) connection require symmetrical, circuit-switched, point-topoint

Department of Information Technology

IT2402 Mobile

Communication

VII Sem/ IT

connections.
For this type of link, the master reserves two consecutive slots at fixed intervals.

3.What are the three phases in EY-NPMA?


i. Prioritization: Determine the highest priority of a data packet ready to be sent on
competing nodes.
ii. Contention: Eliminate all but one of the contenders, if more than one sender has
the highest current priority.
iii. Transmission: Finally, transmit the packet of the remaining node.

4.What are Advantages and Disadvantages of Infrared?


Advantages:
i. Simple and extremely cheap senders and receivers which integ ated in almost all mobile devices

ii. No licenses are needed for infrared technology and shielding is very simple.
iii. Electrical devices do not interfere with infrared trans ission.

Disadvantages:
i. Low bandwidth
ii. Quite easily shielded
iii. Cannot Penetrate
5. What are the system integr tion functions of MAC management?
Synchronizati n
Power ma ageme t
Roami g
Management information base (MIB)

6. What do you meant by roaming?.

downloaded

Moving between access point is called roaming. Even wireless networks may require more

.
com

than one access point to cover all rooms. In order to provide uninterrupted service,

Department of Information Technology

IT2402 Mobile

Communication

VII Sem/ IT

we require roaming when the user moves from one access point to another.

7. What is mobile routing?


Even if the location of a terminal is known to the system, it still has to route the
traffic through the network to the access point currently responsible for the wireless terminal.
Each time a user moves to a new access point, the system must reroute traffic. This is
known as mobile routing.

com

8. What are the functions which support service and connection control?

>Access point control function


>Call control and connection control function
>Network security agent
>Service control function

>Mobility management function

9. What are the examples for service scena i s identified in WATM ?

>Office environments
>Universities, schools, training, c ntr s
>Industry
>Hospitals
>Home
>Networked vehic es

10. What is BRAN?


The br adband radio access networks(BRAN) which have been standardized by
European Telecommunications Standard Institute(ETSI) are a possible choice for an RAL

downloaded

for WATM. Although BRAN has been standardized independently from WATM, there is
co-operation between the two to concentrate the common efforts on one goal. The main

Department of Information Technology


Communication

IT2402 Mobile

VII Sem/ IT
motivation behind BRAN is the deregulation and privatization of the telecommunication
sector in Europe.

11. What are the different network types of BRAN?


>Hyperlan1
>Hyperlan2

>Hyper access
>Hyperlink

com

12. What is the main problem for WATM during handover?


The main problem for WATM during the handover is rerouting of all conn ctions
and maintaining connection quality.

13. What are the different segments in ATM end-to-end connection?


An ATM end-to-end connection is separated into di fe ent segments.
>A fixed segment is a part of the connection that is not affected by the handover
>Handover segment is affect d by the han over and is located completely within a
handover domain.

14. What is anch r p int?


The A chor poi t is the boundary between a handover segment and a fixed
segme t.

15. What are different types of handover?


>Hard handover

downloaded

>Terminal initiated
>Network initiated

Department of Information Technology


Communication

IT2402 Mobile

VII Sem/ IT
>Network initiated, terminal assisted
>Network controlled
>Backward handover
>Forward handover

UNIT - V
1. What is mobile terminal and wireless terminal?
Mobile terminal is a standard ATM terminal with the additional capability of

.
com

reconnecting after access point change. the terminal can be moved between different
access point within a certain domain.
Wireless terminal is accessed via a wireless link, but the terminal itself s f xed,
i.e., the terminal keeps its access point to the network.

2. What is generic routing encapsulation?


Generic routing encapsulation (GRE) is an encapsulati n sche

e which supports other

network protocols in addition to IP. It allows the encapsulation of packets of one protocol
suite into the payload portion of a packet of another protocol suite.

3. Define COA.
The COA (care of ddress) efines the current location of the MN from an IP point of
view. All IP packets sent to the MN are delivered to the COA, not directly to the IP
address of the MN. Packet delivery toward the MN is done using the tunnel.

4. What is meant by Transparency?


M bility should remain invisible for many higher layer Protocols and applications. The
only affects of mobility should be a higher delay and lower bandwidth which are natural

downloaded
in the case of mobile networks.

Department of Information Technology

IT2402 Mobile

Communication

VII Sem/ IT

5. What is Generic Routing encapsulation?

Generic Routing encapsulation (GRE) allows the encapsulation of packets of one


protocol suite into the payload portion of a packet of another protocol suit.

6.What is Binding Request?


Any node that wants to know the current location of an MN can send a binding request to
the HA. The HA can check if the MN has allowed dissemination of its current location.
7. What are the possibilities for the location of care-of-address (COA)?
The two possibilities for the location of care-of-address are:
i.Foreign agent COA

ii.Co-related COA

8. What are the requirements for the development of mobile IP standard?


The requirements are:

a.Compatibility
b.Transparency
c.Scalability and efficiency
d.Security

9. What is COA?
Care Of Address (COA) efine the current location of the MN (Mobile Node) from an IP
point of view. DHCP is a good candidate for supporting the acquisition of Care Of
Addresses.

10. What is Dynamic source Routing?


Dynamic Source Routing eliminates all periodic routing updates. If a node needs to
discover a route, it broadcast a route request with a unique identifier and the destination

.
com

downloaded

address as parameters. Any node that receivers a route request gives a list of addresses
representing a possible path on its way toward the destination.

Department of Information Technology

IT2402 Mobile

Communication

VII Sem/ IT

11. Why is need of routing?

Routing is to find the path between source and destination and to forward the packets
appropriately.
12. Define Mobile node:

13. What is Encapsulation and Decapsulation?

A mobile node is an end-system or router that can change its point of attachment to the Internet using m bile IP. The MN keeps its IP address and can continuously with any other system in the Internet as long as link layer connectivity is given.

.com

Encapsulation is the mechanism of taking a packet consisting of packet header a d data and putting it into the data
part of a new packet. The reverse operation, taking a packet out of the data part of a other packet,is called
decapsulation.

14. What are the two functions of the transport layer in the inte net?
The two functions of the transport layer in the internet are check summing over user
data and multiplexing/ demultiplexing of data f m applications.

15. What is called the exponential growth of the congestion window?


The sendor always calculate cong stion win ow for a window start size of the

congestion window is one segment. Sender sends one packet and waits for
acknowledgement.Ifcknowledgementarise it raises the level of congestion window by one. If sender
sends two packet if acknowledgement arrises it raises the level of congestion wi dow by two. This

scheme raises the level of congestion window every time the acknowledges come back,
which takes roundtrip time(RTT).This is called the exp nential growth of the congestion
window?

16. State the Advantages of I-TCP:


I-TCP does not require any changes in the TCP protocol as used by the hosts in the fixed network or other hosts in
a wireless network that do not use this optimization.

Department of Information Technology

IT2402 Mobile

Communication

VII Sem/ IT

Without partitioning retransmission of lost packets would take place between mobile host and correspondent host
across the whole network.
Optimization of new mechanisms is quite simple to be done in I-TCP as they only cover a single hop.
The short delay between the mobile host and foreign agent can be determined and is independent of other traffic
streams. Therefore an optimized TCP can use precise time-outs to guarantee retransmission as fast as possible.
Partitioning into two connections also allows the use of a different transport layer protocol between the f reign
agent and the mobile host or the use of compressed headers etc. The foreign agent can act as a gateway to translate
between different protocols.

17. State the Disadvantages of I-TCP.


The loss of the end to end semantics of TCP cause problems if the foreign

com

agent portioning the TCP connection crashes.


The foreign agent must be a trusted entity because the TCP connections e d.
18. Define Slow Start?
TCPs reaction to a missing acknowledgement is quite
drastic, but necessary to get rid of congestion. The
behaviour TCP shows after the detection of congestion is called Slow start.
19. How does data transmission takes place?
Data transmission takes place using network adapte s, fibre optics, copper wires,
special hardware for routers etc.
20.What is mean by Slow Start?
TCPs reaction to a missing acknowledgement is quite drastic, but necessary to get rid of congestion fast enough.
The behaviour TCP shows fter the etection of cogestion is called slowstart.

downloaded
Department of Information Technology

IT2402 Mobile

Communication

VII Sem/ IT

Part - B [16 Marks]


1. Explain different TDMA schemes in detail.
Fixed TDMA, Classical TDMA, Slotted TDMA, Carrier sense multiple access,
Demand assigned multiple access, PRMA Packet reservation multiple access,
Reservation multiple access, Reservation TDMA, Multiple access with collision
avoidance, Polling, Inhibit sense multiple access.

.
com

2. Write notes on DECT and TETRA


System architecture, Protocol Architecture
3. Write notes on UMTS and IMT 2000
UMTS basic architecture, UTRA FDD mode, UTRA TDD mode
4. Account on CDMA Scheme.

Good code, Orthogonal, Autocorrelation, Spread aloha


5. Explain broadcast systems in detail.

ultiple access.

Overview Cyclical repetition of data Digital audio br adcasting


Multimedia object transfer protocol Digital video broadcasting.
6. Explain satellite systems in d tail.
History Applications Basics GEO LEO MEO Routing
Localization Handover Ex mples.
7. Explain GSM systems in detail.
Mobile services- System Architecture Radio interface Protocols
Localization a d calling Handover Security - New data services HSCSD GPRS.
8. Explain IEEE802.11 standard for WLANS in detail.
System architecture Protocol architecture Physical layer Frequency hopping
spread spectrum, Direct spectrum spread spectrum, Infrared Medium access control

downloaded

layer- Basic DFWMAC-DCF using CSMA/CA, DFWMAC-DCF with RTS/CTS


extension, DFWMAC-PCF with polling, MC frames MAC management

Department of Information Technology

IT2402 Mobile

Communication

VII Sem/ IT

Synchronization, Power management, Roaming 802.11b.

9. Write notes on WATM services and Functions.

.com

Wireless mobile terminal side functions and mobility supporting network side
Functions.
10. Write notes on WATM handover.
Handover reference model, handover requirements, types of handover, hand
over scenarios, backward handover, and forward handover.
11. Write notes on location management, addressing and access

point control protocol.

Requirements for location management , procedures and entities


12. Explain mobile IP in detail.
Goals, assumptions and requirements Entities and terminology IP
packet delivery Agent discovery Agent advertisement, Agent solicitation Registration
Tunneling and encapsulation- IP-in-IPencapsulation, minimal encapsulation, generic
routing encapsulation ptimizati ns Reverse tunneling

IPv6.
13. Give a detailed account of mobile ad-hoc networks.

Instant infrastructure, Disast r r li f R mote areas Effectiveness Routing


Asymmetric links, redun ant links, int rf rence, dynamic topology - Destination
sequence distance vector sequence numbers, damping - Dynamic source routing
route discovery, r ute maintenance - Alternative metrics least interference routing.

14. Give a detail ote on HYPERLAN.


Reference model and configurations- Physical layer Data link control

layer broadcast phase, downlink phase, uplink phase, random access phasebroascast
channel, frame channel, access feedback channel, long transport
channel, short transport channel, random channel Convergence layer Ethernet,
IEEE 1394 (Firewire), ATM.

Department of Information Technology

IT2402 Mobile

Communication

VII Sem/ IT

15. Account on BLUETOOTH in detail.


User scenarios- Connection of peripheral devices, support of ad-hoc
networking, bridging of networks Architecture networking, protocol stackradio layer Baseband layer- physical links- synchronous connection-oriented
link, Asynchronous connectionless link link manager protocol L2CAP
Security SDP Profiles IEEE802.15 .
16. Write notes on traditional TCP.

.
com

Congestion control, slow start, fast retransmit/ fast recovery, implications


on mobility.
17. Write notes on wireless TCP.
Indirect TCP, snooping TCP, Mobile TCP, Fast retransmit/fast r cov ry,
transmission/time-out freezing, selective retransmission, transaction o iented TCP.

18. Write notes on WDP and WTLS.


Figure and explanation about WDP and WTLS.
19. Write notes on wireless transaction p ot c l.
Figure and explanation about WTP class 0, class 1 and class 2.
20. Write notes on wireless s ssions protocol.
WSP/B over WTP and WSP/ B as conn ctionless session service
21.Explain the various pplic tions of mobile computing:
Various app icati ns and explanation
22. Write otes on UMTS and IMT 2000
Architecture-Frame formats and explanation
23. Explain the various satellite orbit and the parameters associated
Parameters of satellites and explanations-Three orbits and explanation
24. Explain mobile IP in detail
Architecture-various techniques-explanation
25. Explain Traditional TCP

Department of Information Technology

IT2402 Mobile

Communication

VII Sem/ IT

Architecture-Types- Frame formats-Explanation

.
com

downloaded
Department of Information Technology

IT2402 Mobile

Communication

You might also like