CMC 2 marks
CMC 2 marks
UNIT II
1.Define adaptive channel allocation
Adaptive channel allocation in TDMA eliminates system planning since it is not required
to plan frequencies for cells.
3. Define SDMA
Space division multiple access controls the radiated energy for each user in space. It
Serves different users by using spot beam antennas.
15.Define A Interface.
The interface between a BSC and a MSC is called the A interface , which is standardized
within GSM
105.Define Piconet.
The simplest Bluetooth networks called piconet can have from two to eight nodes.
Piconet is a collection of Bluetooth devices which are synchronized to the same hopping
sequence.
UNIT-IV
1. State the requirements of WAP.
¾ Interoperable
¾ Scalable
¾ Efficient
¾ Reliable
¾ Secure
2. Name the layers of WAP.
¾ Transport layer
¾ Security layer
¾ Transaction layer
¾ Session layer
¾ Application layer
3. Name some ICMP messages.
¾ Destination unreachable
¾ Parameter problem
¾ Message too big
¾ Reassembly failure
¾ Echo request/reply
4. What is WTP? What are its classes?
WTP stands for Wireless Transaction Protocol. It has been designed to run on very thin clients
such as mobile phones. It has three classes:
¾ Class 0: provides unreliable message transfer without any result message.
¾ Class 1: provides reliable message transfer without exactly one reliable result message.
¾ Class 2: provides reliable message transfer with exactly one reliable result message.
5. What is WSP?
The Wireless Session Protocol has been designed to operate on top of the datagram service
WDP or the transaction service WTP. It provides a shared state between a client and a server to
optimize content transfer.
6. Name some features of WSP adapted to web browsing.
¾ HTTP/1.1 functionality
¾ Exchange of session headers
¾ Push and pull data transfer
¾ Asynchronous request
7. What is WML?
The Wireless Markup Language is based on the standard HTML known from the www and on HDML.
WML is specified as an XML document type.
8. What are the features of WML?
¾ Text and Images
¾ User interaction
¾ Navigation
¾ Context Management
9. What are the advantages of WML Script over WML?
WML Script offers several capabilities not supported by WML:
¾ Validity check of user input
¾ Access to device facilities
¾ Local user interaction
¾ Extension to the device software
10. Name the libraries specified by WML Script.
¾ Lang
¾ Float
¾ String
¾ URL
¾ WML Browser
¾ Dialogs
11. What are the classes of libraries?
¾ Common network services
¾ Network specific services
¾ Public services
12. Name the operations performed by PAP.
Push access Protocol performs the following operations:
¾ Push submission
¾ Result notification
¾ Push cancellation
¾ Status query
¾ Client capabilities query
13. What are the components of WAP2.0?
The protocol framework of WAP2.0 consists of four components:
¾ Bearer networks
¾ Transport services
¾ Transfer services
¾ Session services
14. What is the use of congestion threshold?
The exponential growth of the congestion window in the slow start mechanism is dangerous as
it doubles the congestion window at each step. So a congestion threshold is set at which the
exponential growth stops.
15. What is image scaling?
If a page contains a true color, high-resolution picture, this picture can be called down to fewer
colors, lower resolution, or finally to only the title of the picture. The user can decide to download the
picture separately. Further one can offer clipping, zooming, or detail Studies to users if they are
interested in a part of the picture.
16. Define WAP
WAP is Wireless Application Protocol. It is the basic Objective of the WAP forum are to bring
diverse Internet content and others data service to digital cellular phones and other wireless, mobile
terminals. More ever a protocol suite should enable global wireless communication across different
wireless network technologies. All WAP forum solution must be: interoperable, scalable, efficient, and
reliable.
17. What is WML Browser?
WML Browser is a library that provides several functions typical for a browser, such as per to
go back one card or refresh to update the context of the user interface.
18. What are the features of WML?
WML includes several basic features.
i) Text and Images
ii)User Interaction
iii)Navigation
iv)Context Management
19. What are the two functions of the transport layer in the internet?
The two functions of the transport layer in the internet are check summing over user data and
multiplexing/ demultiplexing of data from applications.
20. What is called the exponential growth of the congestion window?
The senders always calculate congestion window for a window start size of the congestion
window is one segment. Sender sends one packet and waits for acknowledgement. If
acknowledgement arises it raises the level of congestion window by one. If sender sends two packets if
acknowledgement arises it raises the level of congestion window by two. This scheme raises the level
of congestion window every time the acknowledges come back, which takes roundtrip time
(RTT).This is called the exponential growth of the congestion window.
21. Advantages of I-TCP:
¾ I-TCP does not require any changes in the TCP protocol as used by the hosts in the fixed
network or other hosts in a wireless network that do not use this optimization.
¾ Without partitioning retransmission of lost packets would take place between mobile host and
correspondent host across the whole network.
¾ The short delay between the mobile host and foreign agent can be determined and is
independent of other traffic streams. Therefore an optimized TCP can use precise time-outs to
guarantee retransmission as fast as possible.
¾ Partitioning into two connections also allows the use of a different transport layer protocol
between the foreign agent and the mobile host or the use of compressed headers etc. The
foreign agent can act as a gateway to translate between different protocols.
22. Disadvantages of I-TCP:
¾ The loss of the end to end semantics of TCP cause problems if the foreign agent portioning the
TCP connection crashes.
¾ An_ increased handover latency is more problematic in practical use
¾ The_ foreign agent must be a trusted entity because the TCP connections end at this point.
¾
23. How does data transmission takes place?
Data transmission takes place using network adapters, fiber optics, copper wires, special
hardware for routers etc.
24. Mention two WAP service provides. Find two cell phones supporting WAP and identify
which WAP version they support.
Wireless application protocol (WAP) is a common effort of many companies and organizations
to set up a framework for wireless and mobile web access using many different transport systems. Eg.
GSM, GPRS, UMTS
25. How and why does I-TCP isolate problems on the wireless link? What are the main
drawbacks of this solution?
The loss of the end to end semantics of TCP causes problems if the foreign agent portioning
the TCP connection crashes. Increased handover latency is more problematic in practical use . The
foreign agent must be a trusted entity because the TCP connections end at this point.
26. Can the problems using TCP for mobile communication be solved by replacing TCP with
snooping TCP? Justify your answer.
Ans: yes
¾ Buffering of packets sent to the mobile host lost packets on the wireless link (both
retransmitted immediately by the mobile host or directions) will be foreign agent, respectively
(so called local retransmission)
¾ The foreign agent therefore snoops the packet flow and recognizes acknowledgements in both
directions, it also filters ACKs
¾ Changes of TCP only within the foreign agent
27. What are the key elements of the WAP specification?
¾ Networks and Network Bearers
¾ TCP/IP as Transport Protocol
¾ Processors
28. What are the goals of WTLS layer?
It provides the upper-level layer of WAP with a secure transport service interface that
preserves the transport service interface below it. In addition, WTLS provides an interface for
managing (e.g., creating and terminating) secure connections. It provides functionality similar to TLS
1.0 and incorporates additional features such as datagram support, optimized handshake and dynamic
key refreshing.
29. What is mean by SCPS-TP?
The set of protocols developed for space communication is known as space communications
protocol standards (SCPS),the extended TCP is called SCPS transport protocols(SCPS-TP).
30. What are Advantage and Disadvantage of Mobile TCP?
Advantage:
i. M-TCP maintains the TCP end-to-end semantic. The SH does not send any ACK itself
but forwards the ACKs from the MH.
ii. If the MH is disconnected, M_TCP avoids useless retransmissions, slow starts or breaking
connections by simply shrinking the sender’s window to 0.
iii. Since M-TCP does not buffer data in the SH as I-TCP does, it is not necessary to forward
buffers to a new SH. Lost packets will be automatically retransmitted to the new SH.
Disadvantage:
i. As the SH does not act as proxy as in I-TCP, packet loss on the wireless link due to bit errors is
propagated to the sender. M-TCP assumes low bit error rates, which is not always a valid
assumption.
ii. A modified TCP on the wireless link not only requires modification to the MH, protocol
software but also new network elements like the bandwidth manager.
Unit V
1.Define Piconet
A Bluetooth network is called Piconet .It can have up to eight stations one of
Which is called the master and the rest are called slaves
2. What is the frequency range of Bluetooth devices?
The frequency range of Bluetooth device is 2.4 GHZ
3. What is the need of connecting devices?
To connect LANs or segments of LAN we use connecting devices. These devices
can operate in different layers of internet model.
4. Wireless Local Loop (WLL) and LMDS
Microwave wireless links can be used to create a wireless local loop. The local loop can be
thought of as the "last mile" of the telecommunication network that resides between the central office
(CO) and the individual homes and business in close proximity to the CO. An advantage of WLL
technology is that once the wireless equipment is paid for, there are no additional costs for transport
between the CO and the customer premises equipment. Many new services have been proposed and
this includes the concept of Local Multipoint Distribution Service (LMDS), which provides broadband
telecommunication access in the local exchange
5. Compare W-CDMA and cdma2000
Wireless access subscriber unit (WASU). Provides an air interface, Uwll, toward the network, and a
"traditional" Twll, toward the subscriber. This interface includes protocol conversion and transcoding,
authentication authentication functions, OAM, and signaling functions. The power supply is provided
locally. A modern function may also be required to support voice-band data so that that analog signals
such as data and fax can be transported over the air digitally and reconstructed by the IWF in the
network.
9. What is switching function in WLL?
Switching function (SF). Associated with a switch that can be a digital switch with or without
Advanced Intelligent Network (AIN) capability, an ISDN switch, or a mobile switching center
(MSC). The transmission backhaul between WANU and SF can be leased line, cable, or
microwave.
10. Give the examples of WLL technologies.
WLL systems can be based on one of the following four technologies: satellite, cellular, low-tier
PCS / microcellular, and fixed wireless access.