2 Marks & 13 Marks
2 Marks & 13 Marks
4) Define diffraction?
This propagation effect is undergone by a wave when it hits an impenetrable object. The
wave bends at the edges of the object, thereby propagating in different directions. This phenomenon is
termed as diffraction.
1
10) Define roaming?
Roaming refers to providing uninterrupted service when the user walks around with a
wireless station when the station realizes that the quality of the current link is poor, it starts scanning
for another AP. This scanning can be done in two ways.
1. Active scanning
2. Passive scanning.
11) What is meant by Wireless sensor networks?
It is highly distributed networks of small, lightweight wireless nodes, deployed in large
numbers to monitor the environment or system by the measurement of physical parameters such as
temperature, pressure or relative humidity.
12) List the comparison with AD HOC wireless networks and sensor networks?
The both consist of wireless nodes communicating with each other, there are certain
challenges posed by sensor networks. The number nodes in a sensor network can be several orders of
magnetic larger than the number of nodes in an ad hoc network.
13) What are the applications of sensor networks?
Military applications, environment application, patient diagnosis and monitoring,
monitor their physiological data, office buildings.
2
20) Define Scattering?
When the wave travels through a medium, which contains many objects with dimensions small
when compared to its wavelength, scattering occurs. The wave gets scattered into several weaker
outgoing signals.
21) List out the factors that restrict the range, data rate, reliability of the wireless
transmission? (Or) List out the characteristics of the wireless communication?
Path loss, interference and blockage.
24) Define Two ray model or two path model? May/June-2012, APR/MAY 2013
This model assumes that the signal reaches the receiver through two paths , one a line-of-sight
path and the other path through which the reflected wave is received, the relation between the
transmitter power and receiver power is given by
Pr = Pt Gt Gr (ht hr/ d2)2
Pt ,Pr = transmitter & receiver power Gt , Gr = transmitter & receiver antenna gains
ht , hr = heights of the transmitter & receiver d = distance between transmitter and receiver.
25) Define fading and give their types?
Fading refers to the fluctuations in signal strength at the receiver. Fading can be classified into
two types
1. fast/small scale fading
2. slow/large scale fading
3
29) What are the classifications of the interference?
There are two types
1. Adjacent channel interference
2. Co-channel interference or narrow band interference.
30) What is meant by inter symbol interference?
It is another type of interference, where distortion in the received signal is caused by the
temporal spreading and the consequent overlapping of individual pulses in the signal.
4
40) What is the requirement of WPAN? April/May-2010
Power management: Low current consumption.
Range : 0-10meters
Speed 19.2-100 kHz
Small size : 5 cubic inches without antenna
Low cost relative to target device
Should allow the overlap of multiple networks in the same area.
Networking support for minimum 16 devices
42) Mention the role played by L2CAP in Bluetooth networks? (MAY 2009)
L2CAP provides connection oriented and connectionless data services to the upper layer
protocols. These services include protocol multiplexing, Segmentation and reassembly.
5
16 MARK QUESTIONS:
3) Define wireless Sensor Networks & explain about the architecture of wireless Sensor
Networks? Page No (669-672)
4) Explain about the MAC Protocols for Sensor networks? May/June-2012.Page No (688-689)
5) Explain in detail about the WLAN? April/May-2010, Apr/May 2013 Page No (85-107)
7) Explain about the Data Dissemination in wireless sensor networks? Page No (677-685)
11) What is the relation between the Bluetooth & Home RF? Page No (110-123)
13) Discuss in detail about interference between Bluetooth and 802.11? Page No (91-101, 110-
121)
6
UNIT – II NETWORK PRINCIPLES
2 MARK QUESTIONS:
4) What are the various architectural methods for capacity expansion technique?
Cell splitting
Using directional antenna for cell sectoring
Lee’s micro cell method
Using overlaid cells
Using smart antenna
7
If the mobile stations frequently crosses the boundary of location. Then
there is the effect of continually switching between two location areas. This is known as ping pong
effect.
8
21) What are the four methods used to expand the capacity of cellular network? Nov/Dec-
2010
To getting addition spectrum for new subscribers
To change the cellular architecture
To change the frequency allocation
To change the modem and access technology.
25) What are the issues related to Handoff? (NOV /DEC 2008)
Architecture related issues
Decision algorithm issues.
26) What are the two types of topologies used in wireless networks?
Infrastructure network topology
Adhoc network topology
27) Name the five major challenges for implementation of wireless LANs that existed from
the beginning of this industry? APRIL/MAY-2008
Complexity and cost
Bandwidth
Coverage
Interference
28) What are the basic elements of a wireless geolocation system? APRIL/MAY-2008
Wireless network infrastructure
Network
Mobile terminal
9
16 MARK QUESTIONS:
1) With neat diagram explain how the capacity is increased by using directional antennas for cell
sectoring and cell splitting? (APRIL/MAY-2008, 2013) (P.No:256-259)
2) Explain the concept of channel borrowing techniques and dynamic channel allocation (DCA)?
(APRIL/MAY-2008) (P.No:268-272)
3) List and explain the four mechanisms that are embedded in all voice oriented wireless networks
that allow a mobile to establish and maintain connection with the network? (NOV/DEC-2008,
APR/MAY 2013) (P.No:175-193)
4) Explain in detail about the random access for data-oriented networks? (P.No:193-215)
7) Discuss the comparison between infrastructure network topology with Ad Hoc network
topology? APRIL/MAY-2010.(P.No:242-245)
10) Explain in detail about cell fundamentals and signal to noise ratio calculation? (P.No:248-254)
1) What are the mechanisms used in voice oriented wireless networks that allow the mobile
to establish and maintain connection with the network?
Registration
Call establishment
Handover or Handoff
Security
10
Internal
External
9) What are the channels available in IS-95 forward channel? APRIL/MAY-2011, 2013
Pilot channel
Synchronization channel
Paging channel
Traffic channel
TI PD MT IE IEI
TI-Transaction identifier
PD- Protocol discriminator
MT-Message type
IE-Information element
IEI- Information element identifier
10) What are the modulation schemes used in forward and reverse channel?
Forward channel: QPSK
11
Reverse Channel: OQPSK (Orthogonal Quadrature Phase shift Keying)
12
19)
Sl.no CDMA 2000 W-CDMA 2000
It proposes multiples of 1.2288 It employs 3.84 Mcps.
1 Mcps chip rates. Mainly it
employs 3.6864Mcps
The MS may send a message to another MS using handset keypad.SMS messages can be
transmitted via dial up to the service center and internet.
13
Disadvantage:
There have to be used carefully because encryption with stream ciphers uses simple
XOR operation.
16 MARK QUESTIONS:
1) Explain the mechanisms to support the mobile environment? (MAY 2008, MAY 2009) P.No:
341-346
9) What is CDMA? Write brief notes about forward and reverse CDMA in IS-95? (NOV
2008,MAY 2009)
P.No:370-379
10) Discuss about the radio resources and power management? P.No:298-311
14
11) Explain about GSM Protocol Architecture? (NOV 2008, APR/MAY 2013) P.No:334-341
2 MARK QUESTIONS:
1. Define ALOHA.
ALOHAnet, also known as the ALOHA System, or simply ALOHA, was a pioneering computer
networking system developed at the University of Hawaii. The ALOHAnet used a new method of
medium access (ALOHA random access) and experimental UHF frequencies for its operation,
since frequency assignments for communications to and from a computer were not available for
commercial applications in the 1970s.
3. Mention some difference between cellular netwoks and adhoc networks. (APR/MAY
2013)
cellular netwoks adhoc networks
Fixed infrastructure-based Infrastrucure-less
Single-hop wireless links Multi-hop wireless links
Circuit-switched Packet-switched
Centralized routing Distributed routing
4. Define synchronization.
Data synchronization is the process of establishing consistency among data from a source to target
data storage and vice versa and the continuous harmonization of the data over time. It is
fundamental to a wide variety of applications, including file synchronization and mobile device
synchronization.
15
8. Define multicasting. (MAY/JUNE-2011, 2013)
In computer networking, multicast is the delivery of a message or information to a group of
destination computers simultaneously in a single transmission from the source creating copies
automatically in other network elements, such as routers, only when the topology of the network
requires it.
16
20. Mention the classification of energy management.
Transmission power management, battery energy management, processor power management and
devices power management.
24. What are the major issues in designing multicast routing protocols?
Robustness, efficiency, control overhead, Quality of Service, Efficient group management,
scalability and security.
17
16 MARK QUESTIONS:
2. Define MACAW.
Multiple Access with Collision Avoidance for Wireless (MACAW) is a slotted Medium Access
Control (MAC) protocol widely used in Ad-hoc networks. Furthermore, it is foundation of
many other MAC protocols used in Wireless Sensor Networks (WSN). The IEEE 802.11
RTS/CTS mechanism is adopted from this protocol. It uses RTS-CTS-DS-DATA-ACK frame
sequence for transferring data, sometimes preceded by an RTS-RRTS frame sequence, in view
to provide solution to the hidden terminal problem.
5. Define DBTMA.
18
The dual busy tone multiple access (DBTMA) protocol is based on the RTS packet and two
narrow bandwidth,out-of-band busy tones. With the use of the RTS packet and the receive busy
tone, which is set up by the receiver, our scheme completely solves the hidden- and the
exposed-terminal problems.
6. Define CATA.
Collision Avoidance Time Allocation (CATA) Protocol supports broadcast, unicast, and
multicast transmissions at the same time.
8. Give the design goals of MAC protocols. (MAY 2011, APR/MAY 2013)
The operation of the protocol should be distributed.
The protocol should provide QoS support for real-time traffic.
The available bandwidth must be utilized efficiently.
Control overhead must be kept as low as possible
12. What are three main components of MACA with Piggy-backed Reservation (MACA/PR)
Protocol?
A MAC protocol; A reservation protocol; A QoS routing protocol.
19
Distributed Wireless Ordering Protocol (DWOP) is to achieve a distributed FIFO schedule
among multiple nodes in an ad hoc network.
20
Throughput or network throughput is the average rate of successful message delivery over a
communication channel. The throughput is usually measured in bits per second (bit/s or bps).
31. Mention the main features of Directional busy tone based MAC protocol.
it uses directional antenna consisting of N elements;
for broadcast all elements are used;
for unicast only one element is used;
when a node is idle all elements sensing the channel;
while receiving only one element receives the signal.
21
16 MARK QUESTIONS:
1. Explain the various contention based MAC protocols. (P.No:255-269) MAY/JUNE-2011, APR
MAY 2013
2. Brief about the use of directional antennas. (P.No: 297-298) APRIL/MAY-2010
3. Explain the various contention based MAC protocols with reservation mechanisms. (P.No: 270-
289)
4. Explain the various contention based MAC protocols with scheduling mechanisms. (P.No: 289-
297)
5. Explain about MAC protocols that use directional antennas.(NOV/DEC 2008) (P.No: 297-304)
6. Explain in detail about MACAW. (P.No: 256-261)
7. Explain in detail about FPRP. (P.No: 279-283)
8. Explain in detail about RTMAC. (P.No: 286-289)
9. Explain in detail about HRMA. (P.No: 274-276)
10. Explain in detail about CATA.APRIL/MAY-2010, 2013.(P.No: 272-274)
11. Explain in detail about D-PRMA. (P.No: 270-271)
12. Mention the design goals of a MAC protocol for ad hoc wireless networks. (P.No: 252-253)
22
UNIT-I
1. Explain the overview of the IEEE 802.11?
2. Explain in detail about the WPAN?
3. Explain the operation of HIPERLAN. May/June-2012
UNIT-II
1. With neat diagram explain how the capacity is increased by using directional antennas for cell
sectoring and cell splitting?
2. Explain the concept of channel borrowing techniques and dynamic channel allocation (DCA)?
3. Discuss the comparison between infrastructure network topology with Ad Hoc network
topology? APRIL/MAY-2010.
4. Explain in detail about the cellular topology?
UNIT-III
1. Explain the mechanisms to support the mobile environment?
2. What is CDMA? Write brief notes about forward and reverse CDMA in IS-95?
3. Explain about GSM Protocol Architecture?
4. Explain about GPRS and its architecture?
UNIT- IV
1. Write notes on deployment considerations
2. Write notes on pricing scheme.( 8 MARK)
3. Explain in detail about the security threats that exist in ad hoc wireless internet.(8 MARK)
4. Explain about synchronization, hidden and exposed terminals problems.(8 MARK)
5. Write notes on QoS provisioning. (8 MARK)
6. Explain the energy management of infrastrucureless networks.(8 MARK)
7. Explain the transport layer protocol of infrastrucureless networks.
UNIT – V
1. Explain the various contention based MAC protocols.
2. Brief about the use of directional antennas.
3. Explain in detail about CATA.
4. Explain the various contention based MAC protocols with reservation mechanisms.
5. Explain the various contention based MAC protocols with scheduling mechanisms.
23