0% found this document useful (0 votes)
2 views

Wireless Networks Assignment-cat (1)

The document outlines an assignment on wireless networks, detailing various topics such as TDMA, PAM signal generation, multiplexing differences, UTRAN architecture, Hamming codes, MAC protocols, and more. It includes specific questions with marks allocated, covering both theoretical concepts and practical applications in wireless communication. Additionally, there is a 'Take Away CAT' section with further questions related to TCP variations, 4G challenges, and routing protocols.

Uploaded by

machariateresa3
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views

Wireless Networks Assignment-cat (1)

The document outlines an assignment on wireless networks, detailing various topics such as TDMA, PAM signal generation, multiplexing differences, UTRAN architecture, Hamming codes, MAC protocols, and more. It includes specific questions with marks allocated, covering both theoretical concepts and practical applications in wireless communication. Additionally, there is a 'Take Away CAT' section with further questions related to TCP variations, 4G challenges, and routing protocols.

Uploaded by

machariateresa3
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

WIRELESS NETWORKS

ASSIGNMENT
Due in two wek
1. What are the pros and cons of Time Division Multiple Access (TDMA) 6 marks
2. Discuss thetTwo operations involved in the generation of the PAM signal Two operations involved in
the generation of the Pulse Amplitude Modulation (PAM) signal 6 marks
3. Outline the difference between frequency division multiplexing (FDM), and time division
multiplexing (TDM), 4 marks
4. Explain in detail about UTRAN Logical Architecture with a neat sketch 5 marks
5. Describe the Error Detection and Correction Capabilities of Hamming Codesin wireless networks 6 marks
6. Explain the different features of MAC Protocols 5 marks
7. What are the advantages of spread spectrum over a fixed-frequency transmission? 3 marks
8. What are the significance of Radio transmission over infrared 2 marks
9. Mention 3- types of address assignment policies used in DHCP 3 marks
10. What are the general problems of mobile IP regarding security and support of quality of service?
3 marks
11. Differentiate wired networks and adhoc wireless networks based on routing. 2 marks
12. How does I-TCP isolate problems on the wireless link? 3 marks
13. Explain LTE network architecture and associated protocols in detail. 4 marks
14. Distinguish between Iur and Iub interfaces of UTRAN 3 marks

TAKE AWAY CAT


DUE IN ONE WEEK

1. Write your understanding on indirect TCP, Snooping TCP, Mobile TCP and transaction oriented
TCP 6 marks
2. With a neat block diagram explain the concept of BLAST architecture in detail. 6 marks
3. Explain in detail about Software Defined Radio (SDR). 3 marks
4. Explain the concept of Cognitive Radio and enumerate in detail its role in field of spectrum
sensing by highlighting its bottlenecks 4 marks
5. Explain the key challenges faced by 4G networks and also propose solutions of how to mitigate
those challenges.5 marks
6.
a. Discuss how Snooping TCP acts as a Transparent TCP and explain the role of foreign agent
in it in detail. 4 marks
b. What happens in the case of I-TCP if the mobile is disconnected? Discuss 5 marks
7. How efficient packet data transmission can be achieved in 4G networks? 4 marks
8. Explain with an example the DSR Routing protocol. And Discuss how power management done
in IEEE 802.11 infrastructure architecture 6 marks
9. List the key features of 5G networks from the user point of view. 5 marks
10. describe the three different protocol planes of Iu interface. 6 marks

pros and Cons of Time Division Multiple Access (TDMA) (6 marks)


Pros:
 Efficient Bandwidth Utilization: TDMA allocates time slots to multiple users on the same
frequency channel, maximizing bandwidth efficiency.
 Reduced Interference: Users transmit in separate time slots, minimizing intra-channel
interference.
 Scalability: Supports adding more users by assigning new time slots.
 Deterministic Access: Each user has guaranteed access within its time slot, aiding QoS.
Cons:
 Time Synchronization Required: All users and base stations must be synchronized, increasing
complexity.
 Latency: Data transmission waits for the allocated time slot, introducing delay.
 Underutilization: If a user has no data to transmit, the time slot is wasted.
 Complex Implementation: Requires precise time management and scheduling.

2. Two Operations in the Generation of Pulse Amplitude Modulation (PAM) Signal (6 marks)
1. Sampling:
The continuous-time analog signal is sampled at uniform time intervals. According to the Nyquist
theorem, the sampling rate must be at least twice the maximum frequency of the analog signal to
avoid aliasing.
2. Amplitude Modulation of Pulses:
Each sample is then represented by a pulse whose amplitude is proportional to the sampled value.
This produces a series of amplitude-modulated pulses, which collectively represent the original
analog signal.

3. Difference Between Frequency Division Multiplexing (FDM) and Time Division Multiplexing
(TDM) (4 marks)
Feature FDM TDM
Basis of Division Frequency bands Time slots
Channel Usage Simultaneous transmission Sequential transmission
Synchronization Not required Strict synchronization needed
Hardware Complexity High due to filters Moderate
Example FM radio broadcasting GSM mobile communication
Conclusion: FDM is suitable for continuous data streams, while TDM is ideal for digital signals with
bursty traffic.

4. UTRAN Logical Architecture with a Neat Sketch (5 marks)


UTRAN (UMTS Terrestrial Radio Access Network) is a key component of the 3G UMTS system. It
consists of:
 Node B: Handles radio transmission/reception, similar to a base station.
 Radio Network Controller (RNC): Manages resources, mobility, and handovers.
Interfaces:
 Iub: Connects Node B to RNC.
 Iur: Connects two RNCs for soft handovers.
 Iu: Connects RNC to Core Network (Circuit/Packet switched).
Diagram Description:
css
CopyEdit
UE ←→ Node B ←→ RNC ←→ Core Network
↑ ↑
Iub Iu

Node B (other cells)

Iur (to another RNC)

5. Error Detection and Correction Capabilities of Hamming Codes in Wireless Networks (6 marks)
 Hamming Code is a linear error-correcting code that adds parity bits at specific positions in data.
 Error Detection: It can detect two-bit errors.
 Error Correction: Can correct all single-bit errors by calculating a syndrome vector.
 Suitability in Wireless: In wireless environments where noise and interference cause bit flips,
Hamming Codes are effective for reliable data delivery without requiring retransmission.
 Trade-off: Increases overhead (parity bits) and is less efficient for correcting burst errors.

6. Features of MAC (Medium Access Control) Protocols (5 marks)


 Collision Avoidance: Prevents simultaneous transmission in shared mediums (e.g., CSMA/CA).
 Efficient Channel Access: Manages how multiple users access the wireless channel.
 QoS Support: Prioritizes traffic for voice, video, or data to meet latency and throughput needs.
 Scalability: Must support large numbers of devices with varying traffic demands.
 Energy Efficiency: Especially in sensor or mobile networks, MAC protocols reduce idle
listening and overhearing.

Would you like me to continue with the rest of the assignment (questions 7–14 and TAKE AWAY
CAT) in the same detailed style?
4o
You said:
you have given me not all answers
ChatGPT said:
Thanks for the heads up — let's complete the remaining answers for your Wireless Networks assignment
with the same level of depth and clarity. Here's the continuation from Question 7:

7. Advantages of Spread Spectrum Over Fixed-Frequency Transmission (3 marks)


 Interference Resistance: Spread spectrum techniques, such as FHSS and DSSS, spread the
signal over a wide frequency band, making it resilient to narrowband interference.
 Security: Signals are harder to intercept or jam due to the pseudorandom frequency changes.
 Multipath Fading Mitigation: By spreading the signal, it is less vulnerable to frequency-
selective fading, a common issue in wireless environments.

8. Significance of Radio Transmission Over Infrared (2 marks)


 Longer Range: Radio waves can travel further and through obstacles, unlike infrared which
requires line-of-sight.
 Mobility Support: Radio transmission supports mobile users better, enabling seamless
communication in dynamic environments like WLANs or mobile networks.

9. Types of Address Assignment Policies in DHCP (3 marks)


1. Manual Allocation: Admin assigns a specific IP address to a MAC address.
2. Automatic Allocation: DHCP assigns a permanent IP address to a device from a pool.
3. Dynamic Allocation: IP addresses are leased for a limited time and reassigned as needed.

10. General Problems of Mobile IP Regarding Security and QoS (3 marks)


 Security:
o Susceptible to IP spoofing and man-in-the-middle attacks.
o Tunneling introduces vulnerabilities if not encrypted.
 QoS:
o Frequent handovers can cause latency and packet loss.
o Difficult to maintain session continuity and bandwidth guarantees.
11. Differentiation Between Wired and Ad-hoc Wireless Networks Based on Routing (2 marks)
 Wired Networks: Use static or dynamic routing with fixed infrastructure and predictable
topology.
 Ad-hoc Wireless Networks: Routing is dynamic and decentralized, often using protocols like
AODV or DSR, due to changing node positions and topology.

12. How I-TCP Isolates Problems on the Wireless Link (3 marks)


 I-TCP splits the TCP connection at the base station into:
o One connection from the sender to the base station.
o Another from the base station to the mobile host.
 This approach isolates wireless errors (e.g., high BER, handoffs) from the wired part of the
connection, improving performance by preventing unnecessary congestion control activation on
the wired segment.

13. LTE Network Architecture and Associated Protocols (4 marks)


Architecture Components:
 eNodeB: Manages radio access and signaling.
 MME (Mobility Management Entity): Controls signaling and handovers.
 Serving Gateway (SGW): Routes and forwards user data.
 PDN Gateway (PGW): Connects LTE to external networks.
Key Protocols:
 RRC: Controls connection setup and mobility.
 PDCP: Handles header compression and security.
 RLC: Manages retransmission and segmentation.
 MAC: Channel access and scheduling.
LTE’s flat architecture minimizes latency and supports high-speed broadband.

14. Difference Between Iur and Iub Interfaces of UTRAN (3 marks)


Interface Function Connects
Iur Supports inter-RNC communication and soft handovers RNC ↔ RNC
Iub Carries user/control data between Node B and RNC Node B ↔ RNC
 Iub is used for managing radio resources.
 Iur enhances seamless mobility across different RNC domains.

You might also like