Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

WMN Winter 23 (1)

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 15

WMN Winter 23 Question Paper

1.Attempt any FIVE of the following : 10


a) Define Roaming.
Ans.Roaming in mobile communication is the ability to use a mobile phone to make and receive calls, send and receive
messages, and access data when outside of a mobile service provider's coverage area.

b) State advantages of GPRS.


Ans.Advantages of GPRS
 A high-speed data transfer cost is offered to mobile devices through General Packet Radio Service or GPRS.
 Web browsing, email sending and receiving, and online shopping are just a few of the online services that GPRS
users can access while they are on the move.
 Because GPRS is always operational, customers can access the internet quickly and without any problems
without utilizing dial-up.
 GPRS offers a cost-effective approach to transmitting statistics because it only charges for the volume of data
transferred, not for the amount of time spent online.
 GPRS offers users a flexible option because it functions well with a variety of mobile devices.

c) State any two features of VOLTE.


Ans.High-Quality Voice Calls:VoLTE provides HD (High Definition) voice quality compared to traditional voice
services. It uses a wider frequency range, leading to clearer and more natural-sounding calls.
Simultaneous Voice and Data:With VoLTE, users can make voice calls while simultaneously using mobile data for
browsing, streaming, or other internet activities. This is in contrast to traditional circuit-switched networks, where data
sessions are usually suspended during voice calls.
Faster Call Setup Times:VoLTE significantly reduces the time it takes to establish a call, leading to quicker connections.
Call setup times are typically reduced to about 1-2 seconds, compared to longer times with traditional networks.
Enhanced Coverage:VoLTE can provide better indoor coverage and performance, especially in areas where LTE signals
are strong but older 2G or 3G signals may be weak. This is particularly beneficial in urban areas with high buildings.
Rich Communication Services (RCS) Support:VoLTE supports RCS, allowing users to send rich media messages (such
as images, videos, and audio) alongside voice calls, enhancing communication capabilities beyond traditional SMS.
Network Efficiency:VoLTE optimizes the use of the network by utilizing packet-switched technology for voice calls,
which makes it more efficient than circuit-switched alternatives. This leads to improved bandwidth usage and reduced
costs for network operators.

d) Define –
i) Quantization Noise
ii) Companding with reference to PCM.
Ans.Quantization Noise:Quantization noise is a type of error that occurs when an analog signal is converted to a digital
signal with a limited number of discrete amplitudes. It's caused by the rounding or truncation of the analog signal values to
the nearest digital values.
Companding with reference to PCM:Companding is a signal processing technique used in pulse code modulation
(PCM) to compress and expand analog or digital signals. It's a portmanteau of the words "compressing" and "expanding".

e) Define Bitrate and Baud rate.


Ans.Bitrate:Bit rate is the rate at which data is processed or transferred. The unit of measuring bit rate in seconds. The bit
rate measuring units range from bps for small units and Kbps, Mbps, and Gbps are from higher bit rates. Bit rate is also
known as data rate. The bit rate is calculated from the bandwidth of the system. If the bandwidth of the communication
channel is known, then divide it by 8 to calculate the bit rate.
Baud rate:Baud rate is the rate at which the number of signal elements or changes to the signal occurs per second when it
passes through a transmission medium. The higher a baud rate is the faster the data is sent/received.

f) List the characteristics of MANET (Any two)


Ans.
 Dynamic topologies: nodes are free to move arbitrarily; thus the network topology may be changed randomly
and unpredictably and primarily consists of bidirectional links. In some cases where the transmission power of
two nodes is different, a unidirectional link may exist.
 Bandwidth-constrained and variable capacity links: wireless links continue to have significantly lower
capacity than infrastructure networks.
 Energy-constrained operation: some or all of the MSs in a MANET may rely on batteries or other exhaustible
means for their energy. For these nodes or devices, the most important system design optimization criteria may
be energy conservation.
 Limited physical security: MANETs are generally more prone to physical security threats than wire line
networks. The increased possibility of eavesdropping, spoofing, and denial of services (DoS) attacks should be
considered carefully. To reduce security threats, many existing link security techniques are often applied within
wireless networks.

g) Enlist the features of CDMA. (Any two)


Ans.
 Ability to access multiple locations at once: Through the use of unique codes assigned to each user, CDMA
enables numerous users to share the same frequency band. Interference between users is avoided as a result.
 Control of power: Power control is a tool used by CDMA systems to lower noise and interference while
boosting network performance.
 Higher-quality voice: Increased capacity for voice and data communication is made possible via CDMA, which
enables more people to communicate at once. CDMA is noted for its ability to deliver good call quality and
support for high data rates.
 Disperse the spectrum: Spread-spectrum technology, such as CDMA, divides digital signals or frequencies into
many channels or over a whole spectrum.
 Rejecting interference: The spread spectrum characteristic of CDMA renders it a more secure communication
method. It makes things challenging for any user’s signal to be intercepted and decoded by an attacker.

2.Attempt any THREE of the following : 12

a) State and explain GSM channel types.


Ans.

b) Describe GPRS architecture with neat diagram.


Ans.Components of GPRS Architecture
1. Mobile Station (MS)
GPRC requires enhanced mobile stations, as existing mobile stations were designed according to the GSM network, and
they were unable in handling enhanced data packets. A variety of high-speed mobile stations are available to support
enhanced data packets. These mobile stations are also capable of handling the GSM architecture to make voice calls.
2. Base Station Controller (BSC)
In GSM architecture there is one component called BSC. But in GPRS there is one component is added to BSC called
PCU. PCU stands for Packet Control Unit. If the signal comes to BSC and that signal contains data, then PCU routes to the
SGSN. The interface is used between BSC and PCU is the FRI interface. After the signal comes to SGSN, it delivers the
data packet to the GGSN. GGSN routes the data packet to the data network (PDN- Predefined Data Network).
3. GPRS Support Nodes
GPRS support nodes are of two types:
(a) Serving GPRS Support Node (SGSN): It is responsible for the following tasks:
Packet Delivery
Mobility management
apply/ sign off of terminals
localization
LLC (Logical Link Control) management
Authentication
Billing
(b) Gateway GPRS Support Node (GGSN): It is responsible for the following tasks:
Mediator between GPRS between backbone and external data networks.
Saves current data for the SGSN address of the participant as well as their profile and data for authentication and invoice.
4. Internal Backbone Network
It is an IP-based network that is used to support the working of GPRS and this is responsible to carry new packets between
different GSNs. The tunneling is used between SGSNs and GGSNs to exchange information without informing the
internal backbone.
5. Mobility Support
GPRS has the following mechanism to support mobility in the network:
Attachment Procedure
Location and Handoff Management
6. Routing Area
This is similar to the location area in GSM the only difference is routing area use fewer cells as routing areas are smaller
than the location area.
7. SMS in GSM
GSM introduced a mechanism of Short Messaging Service(SMS) which is similar to peer-to-peer Instant messaging.
Benefits Of GPRS
Mobility: The capacity to keep up consistent voice and information interchanges while moving.
Cost Efficient: Communication via GPRS is cheaper than through the regular GSM network.
Immediacy: Allows customers to obtain connectivity when needed, regardless of location and without a lengthy login
session.
Localization: Enables customers to acquire data applicable to their present area.
Easy Billing: GPRS packet transmission offers an easier to use billing than that offered by circuit switched
administrations.
Conclusion
In conclusion, GPRS is a GSM advancement that allows for packet-switched data services in addition to standard voice
services. GPRS enables efficient data packet transfer, increased mobility, and cost-effective communication by adding
new components such as the SGSN and GGSN while utilizing the current GSM infrastructure. The development enables
mobile devices to manage both voice and data, allowing for a variety of apps and services that are essential to modern
mobile communication.
GPRS Logical Channels
 Packet Common Control Channels.
 PRACH : Packet Random Access Channel (Uplink)
 PPCH : Packet Paging Channel (Downlink)
 PAGCH : Packet Access Grant Channel (Downlink)
 PTCCH: Packet Timing advance Control Channel (Up/downlink)
 PNCH: Packet Notification Channel (Downlink)

c) State the characteristics of Wireless Markup Language.
Ans.Wireless Markup Language (WML) is a markup language used for creating pages that can be displayed in handheld
wireless devices such as mobile phones and Personal Digital Assistants (PDAs). It was developed as part of the Wireless
Application Protocol (WAP) specification, specifically designed to optimize content for low-bandwidth mobile networks
and devices with small screens and limited input capabilities.
Characteristics of Wireless Markup Language (WML)
1. Text-Based Language:
a. WML is a text-based language, similar to HTML, but it is specifically optimized for wireless devices. It
uses a structured format based on XML (eXtensible Markup Language) syntax, making it more suited
for defining the presentation and layout of content on small screens.
2. Card and Deck Structure:
a. WML content is organized into units called "cards," and a group of cards forms a "deck."
b. Each card represents a single interaction or display on the device's screen, similar to a page in HTML.
c. The deck, containing multiple cards, is sent to the mobile device in one go, reducing the need for
multiple requests to the server. Users can navigate between cards within a deck using links and
navigation commands.
3. Event-Based Navigation:

a. WML supports event-based navigation, allowing the user to move between cards using predefined
actions such as selecting a menu item, pressing a key, or using a form control.
b. Events can trigger actions like loading a new card, sending information to the server, or updating the
current card’s content.
4. Limited Multimedia Support:

a. Due to the limited bandwidth and processing capabilities of early mobile devices, WML supports only
basic multimedia elements such as text and monochrome images.
b. It does not support complex multimedia elements like videos or high-resolution images, which are
commonly used in modern HTML.
5. Variable and Conditional Statements:

a. WML includes scripting capabilities through the WMLScript language, which allows the use of
variables and conditional statements.
b. This functionality enables dynamic content generation and basic user interactivity, such as validating
form inputs or performing calculations.
6. Lightweight and Efficient:

a. WML is designed to be lightweight, with a focus on low data consumption. This helps in minimizing
download time and cost for users accessing content over slow or expensive mobile networks.
b. The compact nature of WML reduces the memory and processing overhead on devices with limited
hardware resources.
7. Optimized for Small Screens and Limited Input:

a. WML’s structure and tags are optimized for small screens, ensuring that content is displayed in a
manner suitable for devices with limited screen real estate.
b. It also includes special input elements like single-line text inputs, selection lists, and option groups,
which are more convenient for users with limited input methods such as keypads.
8. Support for WMLScript:
a. WMLScript is a client-side scripting language similar to JavaScript but with fewer capabilities. It is
used for validating user inputs, handling exceptions, and controlling user interactions with the WML
deck.
b. WMLScript can access and manipulate WML content dynamically, allowing basic form validation, data
formatting, and other client-side logic.
9. Hyperlinks and Navigation:

a. WML supports hyperlinking with the <a> and <anchor> elements, enabling users to navigate between
cards or decks within a WML document or to other WML documents on the internet.
b. Links can be external (pointing to another WML document) or internal (within the same deck).
10. User Agent Profile Adaptation:

a.WML pages can adapt to different device capabilities by using the User Agent Profile (UAProf).
UAProf provides information about the device’s display, processing power, and supported formats.
b. Based on this information, WML content can be customized to ensure compatibility and optimal
display on various devices.
11. Backward Compatibility and Standardization:

a. WML adheres to the WAP standards, ensuring that WML content can be rendered consistently across
WAP-enabled devices.
b. It is backward compatible with early WAP versions, ensuring that content can be accessed by a wide
range of mobile devices, even older models.
12. Support for Forms and User Interaction:

a. WML supports the creation of forms using <input>, <select>, and <option> elements.
b. It enables basic interaction, such as capturing user input (e.g., text, passwords, or numbers) and sending
this information to the server for processing.
13. Content Presentation and Formatting:

a. WML provides limited content formatting options, such as line breaks, paragraphs, and bold or italic
text. It doesn’t support complex formatting options available in HTML.
b. Elements like <b> (bold), <i> (italic), and <br> (line break) are used for simple text styling and layout
management.
14. Security and Privacy:

a. WML, along with the WAP protocol, includes features for secure communication, such as encryption
using Wireless Transport Layer Security (WTLS). This ensures that data transmitted between the client
and the server is secure.
b. WMLScript also includes functions to handle security-sensitive operations like password management
and secure transactions.

d) Differentiate between DSSS & FHSS.


Ans.
Category FHSS DSSS
Abbreviat FHSS is Frequency-Hopping Spread Spectrum DSSS is Direct-Sequence Spread Spectrum
ion
Definition FHSS is a type of spread spectrum technology in which the DSSS is a type of spread spectrum
frequency of the transmitted signal changes according to a technology in which the transmitted signal
specific pattern. is spread across multiple frequency bands.
Pattern In FHSS, the data transmission is encoded and decoded using In DSSS, the data transmission is encoded
a specific pattern called hopset. and decoded using a pseudo-random binary
sequence or chip code.
Frequenc FHSS transmits data using a narrowband carrier that hops DSSS transmits data using a wider
y band among different frequency channels. frequency band.
Interferen FHSS is more resistant to interference because it uses DSSS is more vulnerable to interference
ce frequency hopping, which makes it difficult to intercept the because it uses a wider frequency band.
resistant signal.
Susceptibi FHSS is less susceptible to multipath fading, it is a DSSS is more susceptible to multipath
lity phenomenon in which the transmitted signal arrives at the fading because it uses a wider frequency
receiver via multiple paths, resulting in a loss of signal band.
quality.
Transmiss FHSS has low transmission rates (up to 3 Mbps). DSSS has high transmission rates (up to 11
ion speed Mbps).
Modulatio Multilevel Frequency Shift Keying (FSK) was used. BPSK (Binary Phase-Shift Keying) was
n used.
technique
s used
Efficiency FHSS is generally more efficient than DSSS in terms of DSSS is less efficient because it uses a
bandwidth utilization. wider frequency band.
Applicatio It is widely used in a variety of applications, including It is well-suited for particular applications
n areas wireless networking like Bluetooth, mobile communications, where the signal must travel over long
and military communications. distances like GPS, and WIFI.
3.Attempt any THREE of the following: (4 marks each) 12

a) Explain UMTS architecture with suitable diagram.


Ans.

UMTS system uses the same core network as the GPRS and uses an
entirely new radio interface.
• _The new radio network in UMTS is called UTRAN (UMTS
Terrestrial Radio Access Network) and is connected to the core
network (CN) of GPRS via Iu interface.
• _The Iu is the UTRAN interface between the Radio network
controller RNC and CN.
• _The mobile terminal in UMTS is called User Equipment (UE). The
UE is connected to Node-B over a high-speed Uu (up to 2 Mbps)
Interface. The Node-B are the equivalent of BTS in GSM and
typically serves a cell site. Several Node-Bs are controlled by a single
RNCs over the Iub interface.
• _The RNCs are connected to CN through Iu interface.
• _The packet-switched data is transmitted through Iu-PS interface
and circuit-switched data is transferred over Iu-CS interface. One of
the new interfaces in UTRAN is Iur interface which connects two
RNCs and has no equivalent in GSM system. The Iur interface
facilitates the handling of 100 percent of RRM (Radio Resource
Management) and eliminates the burden from CN.
• _UMTS also supports GSM mode connections in which case the
MS connects to the CN through Um interface to BSS, and BSS
connects through A (Gb interface in GPRS) interface to CN

b) Explain the operational principle of Mobile IP with suitable diagram.


Ans.Mobile IP is a communication protocol (created by extending
Internet Protocol, IP) that allows the users to move from one network
to another with the same IP address. It ensures that the
communication will continue without the user's sessions or
connections being dropped.

The correspondent node sends the data to the mobile node. Data
packets contain the correspondent nodes address (Source) and home
address (Destination). Packets reach the home agent. But now mobile
node is not in the home network ,it has moved into the foreign
network. The foreign agent sends the care-of-address to the home
agent to which all the packets should be sent. Now, a tunnel will be
established between the home agent and the foreign agent by the
process of tunneling. It is the process of sending a packet via a tunnel
and it is achieved by a mechanism called encapsulation.
Now, the home agent encapsulates the data packets into new packets
in which the source address is the home address and destination is the
care-of-address and sends it through the tunnel to the foreign agent.
Foreign agent, on another side of the tunnel, receives the data
packets, decapsulates them, and sends them to the mobile node. The
mobile node in response to the data packets received sends a reply in
response to the foreign agent. The foreign agent directly sends the
reply to the correspondent node.

c) Draw the block schematic of WLL architecture and explain following components of it.
i) WANU
ii) WASU
Ans.

WANU:
It is short for Wireless Access Network Unit. It is present at the
local exchange office. All local WASUs are connected to it. Its
functions include: Authentication, Operation & maintenance,
Routing, Transceiving voice and data. It consists of following
sub-components:
i. Transceiver: It transmits/receives data.
ii. WLL Controller: It controls the wireless local loop component
with WASU.
iii. AM: It is short for Access Manager. It is responsible for
authentication.
iv. HLR: It is short for Home Location Register. It stores the
details of all local WASUs.
Wireless Access Subscriber Unit (WASU)
ï‚· It is located at the subscriber. It translates wireless link into a
traditional telephone connection.
ï‚· It provides an air interface toward the network and another
interface to the subscriber. This interface includes protocol
conversion and transcoding, authentication functions.
It is short for Wireless Access Subscriber Units. It is present at
the house of the subscriber. It connects the subscriber to WANU
and the power supply for it is provided locally.

d) Explain design challenges in MANET.


Ans.The challenges that can be faced by MANET are:-
4.1 Restricted wireless transmission range: The radio group will be restricted in the wireless networks and as a result data
amounts it can provide much slighter than what a bound network can provide. This involves routing procedures of wireless
networks must be use bandwidth in ideal way. This can be achieved through protecting the overhead as minimum as
conceivable. The restricted transmission range also enforces restraint on routing procedures for sustaining the
topographical information. Particularly in MANETs because of regular variations in topology, preserving the topological
data for every node includes more controller overhead which results in additional bandwidth depletion .
4.2 Time-varying wireless link characteristics: Wireless channel is liable to a range of broadcast disorders such as path
harm, declining, intervention and obstruction. These features resist the series, data rate, and consistency of these cordless
transmissions.The range of which these features disturb the transmission that rest on atmospheric situations and flexibility
of receiver and transmitter. Even two dissimilar key restraints, Nyquist’s and Shannon’s theorems that rule over capability
to communicate the information at diverse data degrees can be measured. 4.3 Broadcast nature of the wireless medium:
The broadcast nature of the radio channel, such as transmissions prepared by a device is established by all devices that are
in its straight transmission covering area. When a device receives data, no other device in its neighborhood, apart from the
sender, must transfer. A device can acquire access to the mutual medium when its communications cannot disturb any
constant session. Meanwhile several devices may resist for medium contemporarily, chance of data-packet crashes is very
tall in wireless networks. Even the network is liable to concealed terminal issue and transmits storms. Concealed terminal
issue mentions to the smash of data-packets at a receipt device because of immediate transmission of the nodes which are
outside the straight communication series of the transmitter, but are inside the communication series of the receiver .
4.4 Packet losses due to transmission errors Ad hoc wireless networks practices very advanced packet damage due to
reasons such as extraordinary bit error rate (BER) in the wireless channel, enlarged crashes because of the existence of
unseen terminals, occurrence of interventions, position reliant controversy, single directional associations, regular pathway
breakages due to device movements, and the integral declining characteristics of the wireless passage.
4.5 Mobility-induced route changes The system topography in ad hoc wireless network is extremely active because of
node movement; as a result, a constant meeting undergoes numerous pathway breakages. Such position often results in
regular path alterations . So flexibility administration is massive -investigation theme in ad hoc networks.
4.6 Mobility-induced packet losses Communication contacts in an ad hoc network are insecure such that consecutively
conservative procedures for MANETs over a great damage frequency will suffer from performance deprivation. Though,
with large frequency of inaccuracy, it is problematic to supply a data-packet to its target.
4.7 Battery constraints It is due to restricted resources that arrange main limitation on the mobile devices in an ad hoc
network. Nodes which are contained in such network have restrictions on the supremacy foundation in order to preserve
moveability, dimension and capacity of the node. Due to accumulation of power and the processing capacity make the
nodes heavyweight and less portable. Consequently only MANET devices have to use this resource.
4.8 Potentially frequent network partitions Casually stirring nodes in an ad-hoc network may result in network panels.
certain cases involve middle nodes to be extremely effected by such separation.
4.9 Ease of snooping on wireless transmissions (security issues) Wireless passage being employed for ad hoc networks
transmitted in natural surroundings. It is also shared by all devices in the network. Transmission of data through a device
is acknowledged by all devices inside straight communication series. So invader is certain to sneak data/information which
is communicated within network. The conditions of secrecy could be disrupted if enemy is capable in inferring data
assembled by snooping .
4.10 Routing In MANETs routing is an important challenge for the performance degradation due to unicasting,
multicasting and geocasting demands by the network nodes in contrast to single hope wireless networks. It’s because of
rapid -change in network topology and with different mobility speeds .
4.11 Quality of Service In MANETs quality of service is an important challenge for the differed kind of quality level
demands by the network nodes. Its becomes very difficult to fulfill the different levels or priority demands related to
quality of service so these network required best control of QoS specially in case of multimedia.
4.12 ecurity In MANET, security is one the important challenge due to its wireless environment. The data of users from
one node to another node must be transferred safely and completely.The least privilege principle can also enhance the
security of MANET systems as proposed for organizations.

4.Attempt any THREE of the following : 12


a) Describe WAP protocol with suitable diagram.
Ans.

1. Wireless Datagram Protocol (WDP):


The WDP allows WAP to be bearer-independent by adapting the
transport layer of the underlying bearer. The WDP presents a
consistent data format to the higher layers of the WAP protocol stack,
thereby offering the advantage of bearer independence to application
developers.
2.Wireless Transport layer Security(WTLS)
WTLS incorporates security features that are based upon the
established Transport Layer Security (TLS) protocol standard. It
includes data integrity checks, privacy, service denial, and
authentication services.
3.Wireless Transaction Protocol:
The WTP runs on top of a datagram service, such as User Datagram
Protocol (UDP) and is part of the standard suite of TCP/IP protocols
used to provide a simplified protocol suitable for low bandwidth
wireless stations.
4. Wireless Session Protocol:
Unlike HTTP, WSP has been designed by the WAP Forum to provide
fast connection suspension and reconnection.
5. Wireless Application Environment (WAE).
This layer is of most interest to content developers because it contains
among other things, device specifications, and the content
development programming languages, WML, and WMLScript.

b) Differentiate between GSM and GPRS.


Ans.
GSM GPRS
GSM stands for Global Systems for Mobile. GPRS stands for General Packet Radio Service.
GSM is a cellular standard for mobile phone GPRS is an up-gradation of GSM features over the basic
communications to cater to voice services and data delivery features to obtain much higher data speeds and simple
using digital modulation where SMS has a profound effect wireless access to packet data networks than standard
on society. GSM.
System generation is 2G. System generation is 2.5G.
The frequency bands used in the GSM system are 900 and The frequency bands used in the system are 850, 900,
1800 MHz. 1800 and 1900 MHZ.
The type of connection is a circuit-switched network. Here the type of connection is a packet-switched network.
It provides data rates of 9.6 kbps. It provides data rates of 14.4 to 115.2 kbps.
In GSM billing is based on the duration of the connection. In GPRS billing is based on the features amount of data
transferred.
It does not allow direct connection to the internet. It allows direct connection to the internet.
It is based on system TDMA. It is based on system GSM.
In GSM, single time slot is allotted to a single user. In GPRS, multiple time slots can be allotted to a single
user.
It takes long time to connect. It provides faster connection.
In this location area concept is used. In this routing area concept is used.
SMS (Short Messaging Service) is one of the popular MMS (Multimedia Messaging Service) is one of the
features. popular features.
c) State and explain four features of IOT in mobile computing.
Ans.The most important features of IoT on which it works are
connectivity, analyzing, integrating, active engagement etc.
Connectivity: Connectivity refers to establish a proper connection
between all the things of IoT to IoT platform- it may be server or
cloud. After connecting the IoT devices, it needs a high speed
messaging between the devices and cloud to enable reliable, secure
and bi-directional communication.
Analyzing: After connecting all the relevant things, it comes to real
time analyzing the data collected and use them to build effective
business intelligence. If we have a good insight into data gathered
from all these things, then we call our system has a smart system.
Integrating: IoT integrating the various models to improve the user
experience as well.
Artificial Intelligence: IoT makes things smart and enhances life
through the use of data. For example, if we have a coffee machine
whose beans have going to end, then the coffee machine itself order
the coffee beans of your choice from the retailer.
Sensing: The sensor devices used in IoT technologies detect and
measure any change in the environment and report on their status. IoT
technology brings passive networks to active networks. Without
sensors, there could not hold an effective or true IoT environment.
Active Engagement: IoT makes the connected technology, product,
or services to active engagement between each other.

d) Explain IEEE 802.11 system architecture.


Ans.

e) Describe WSN and state two applications of it.


Ans.There are 2 types of architecture used in WSN:
1. Layered Network Architecture:Layered Network Architecture
makes use of a few hundred sensor nodes and a single powerful base
station. Network nodes are organized into concentric Layers. It
consists of 5 layers and three cross layers.
The 5 layers are:
1. Application -Responsible for traffic management and provide
software for differentapplicationsthat translate the data in an
understandable form or send queries to obtain certain information
2. Transport Layer-Layer-The function of this layer is to provide
reliability and congestiona voidance where a lot of protocols designed
to provide this function are either applied on the upstream or
downstream.
3. Network Layer-The major function of this layer is
routing,handling the major challenges are in the powersaving, limited
memory and buffers,sensor does not have a global IDand have to be
self organized. The basic idea of the routing protocol is to define a
reliable path and redundant paths.
4. Data Link Layer-Responsible for multiplexing data streams, data
frame detection, MAC, and error control, ensure reliability of Point–
point or point– multipoint. Errors or unreliability comesfrom.
5. Physical Layer -Responsible for frequency selection, carrier
frequency generation,signal detection, Modulation and data
encryption The cross layers : These layers are used to manage the
network and make the sensors work together in order to increase the
overall efficiency of the network

Three functions are-


1.Power Management Plane
2.Mobility Management Plane-detect sensor nodes movement. Node
can keep track of neighbors and power levels (for power balancing )
3.Task Management Plane-schedule the sensing tasks to a given area.
Determine which nodes are off and which ones are on.
2. Clustered Network Architecture:
• In Clustered Network Architecture, Sensor Nodes autonomously
clubs into groups called clusters. It isbased on the Leach Protocol
which makes use of clusters. Leach Protocol stands for Low Energy
AdaptiveClustering Hierarchy.
Properties of Leach Protocol:
• It is a 2-tier hierarchy clustering architecture.
• It is a distributed algorithm for organizing the sensor nodes into
groups called clusters.
• The cluster head nodes in each of the autonomously formed clusters
create the Time-division multiple access
(TDMA) schedules.
• It makes use of the concept called Data Fusion which makes it
energy efficient.

Applications of WSN are as follows:


1) Security and Surveillance Applications
2) Precision Agriculture and Animal Tracking
3) Environmental Monitoring
4) Transportation and logistics

5.Attempt any TWO of the following : 12


a) Explain Network signaling in GSM with block diagram.
Ans.

b) Draw the encoded waveforms for the bit sequence 11001001 by using the following Line Coding mechanisms.
i) Unipolar RZ
ii) Polar RZ
iii) Manchester (Biphase)
iv) Alternate Mark Inversion.
Ans.

c) Draw the block diagram of 4G Architecture and explain.State two features of 4G.
Ans.

4G network is an integration of all heterogeneous wireless access


networks such as Ad-hoc, cellular, hotspot and satellite radio
component.
Technologies used in 4G are smart antennas for multiple input and
multiple output (MIMO), IPv6,VoIP, OFDM and Software Defined
Radio (SDR) System.
Smart Antennas:
Smart Antennas are Transmitting and receiving antennas.
It does not require increase power and additional frequency.
IPV6 Technology:
4G uses IPV6 Technology in order to support a large number of
wireless enable devices.
It enables a number of application with better multicast, security and
route optimization
capabilities.
VoIP:
It stands for Voice over IP.
It allows only packet to be transferred eliminating complexity of 2
protocols over the same circuit.
OFDM
OFDM stands for Orthogonal Frequency Division Multiplexing.It is
currently used as WiMax and WiFi.
SDR:
SDR stands for Software Defined Radio.It is the form of open
wireless architecture.
MME- Mobility Management Entity:
It is used for Paging, Authentication, Handover and Selection of
Serving Gateway
SGW-Serving Gateway:
It is used to Routing and Forwarding user data packet.
PDN-GW Packet Data Network Gateway:
It is used for User Equipment (UE) IP allocation.
HSS-Home Subscriber Server:
It is a user Database used for service subscriber, user identification
and addressing
PCRF-Policy and Charging Rule Function:
It provide quality of service and charging
eNode B-evolved Node B:
It is used as radio resources management and radio bearer control.

6.Attempt any TWO of the following : 12


a) Draw the labelled architecture of GSM and explain the function of the following entities.
i) MSC
ii) HLR
Ans.

b) Draw block diagram of a sensor node and state the function of each block.
Ans.

A Wireless Sensor Network (WSN) is a wireless network


consisting of spatially distributed autonomous devices using
sensors to monitor physical or environmental conditions.
• A WSN system incorporates a gateway that provides wireless
connectivity back to the wired worldand distributed nodes.
Sensors: Sensors are used by wireless sensor nodes to capture data
from their environment. They arehardware devices that produce a
measurable response to a change in a physical condition
liketemperature or pressure.
• Sensors are classified into two categories: Passive and Active
sensors.
 Passive sensors sense the data without actually manipulating the
environment by activeprobing. They are self-powered, that is,
energy is needed only to amplify their analog signal.
 Active sensors actively probe the environment, for example, a
sonar or radar sensor, and theyrequire continuous energy from a
power source.
• Microcontroller: The controller performs tasks, processes data and
controls the functionality ofother components in the sensor node.
While the most common controller is a microcontroller,
otheralternatives that can be used as a controller are: a general
purpose desktop microprocessor, digitalsignal processors, FPGAs
(Field Programmable Gate Array) and ASICs (Application
SpecificIntegrated Circuits).
ï‚— Digital signal Processors may be chosen for broadband wireless
communication applications,but in Wireless Sensor Networks the
wireless communication is often modest: i.e., simpler, easierto
process modulation and the signal processing tasks of actual
sensing of data is lesscomplicated.
ï‚— Transceivers: Sensor nodes often make use of ISM band, which
gives free radio, spectrum allocationand global availability. The
possible choices of wireless transmission media are radiofrequency
(RF), optical communication (laser) and infrared.
ï‚— Memory: Flash memories are used due to their cost and storage
capacity. Memory requirements arevery much application
dependent.
ï‚— Power source: Two power saving policies used are Dynamic
Power Management (DPM) andDynamic voltage
Scaling (DVS). DPM conserves power by shutting down parts of
the sensor node which are not currently used or active. A DVS
scheme varies the power levels within the sensor node depending
on the non-deterministic workload.

c) Differentiate between W-CDMA and CDMA-2000 in terms with chip rate, speed, frame length, bandwidth,
modulation technique and overheads.
Ans.

S Parameters CDMA 2000 WCDMA


r
.
N
o
.
1 Basic CDMA is an algorithm that brings in more channels WCDMA uses the basic technology of
Concept in a specified bandwidth. CDMA but incorporates it into GSM and
EDGE.
2 Network Used in 2G Networks. Used in 3G Networks.
3 Carrier Spacing between CDMA operators to obtain channel spacing between WCDMA operators to
Spacing protection 3.75 MHz. obtain channel protection 5 MHz.
4 Chip Rate Number of DSSS pulses per second are 3.68 MHz. Number of DSSS pulses per second is 4.096
MHz.
5 Speed Slower than WCDMA. Faster than CDMA.
6 GSM Act as a competitor to GSM. Work with GSM.
7 Base Stations Base stations may require synchronous timings. Base stations do not require synchronous
Synchronizat timings.
ion
8 Frame The time duration of a frame between the beginning The time duration of a frame between
Length and end of the frame is 20 ms, also uses 5, 30, 40 ms beginning and end of the frame is 10 ms
frames.
9 Bandwidth 1.25 MHz. 5 MHz.
1 Power The output power of the transmitter is controlled by The output power of the transmitter is
0 Control itself at the frequency of 800 Hz. controlled by itself at the frequency of 1500
Frequency Hz
1 Peak Data 614 kbps. 2 Mbps.
1 Rate
1 Spreading It is lower in CDMA. It is higher in WCDMA.
2 Factor
1 Forward CDM and Common Pilot used for channel TDM and Dedicated pilot used for channel
3 Link Pilot modulation from the PN (Pseudo Noise) spreading modulation from the PN (Pseudo Noise)
codes spreading codes
1 Antenna Auxiliary pilot used for directional signal TDM and Dedicated pilot used for directional
4 Beam transmission & reception. signal transmission & reception.
Forming
1 Overhead Low (because of the shared pilot, code Channel) High (because of non-shared, pilot code
5 Channel)
1 Voice Coder Uses EVRC voice coder. Uses AMR voice coder.
6

You might also like