EC Wireless Networks VIII - Semester Questions Bank

Similar documents
Chapter 4. The Medium Access Control Sublayer

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.

Lecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University

CEN 538 Wireless LAN & MAN Networks

COLLEGE OF ENGINEERING DEPARTMENT OF INFORMATION TECHNOLOGY QUESTION BANK UNIT-1 WIRELESS COMMUNICATION FUNDAMENTALS

Lecture 23 Overview. Last Lecture. This Lecture. Next Lecture ADSL, ATM. Wireless Technologies (1) Source: chapters 6.2, 15

Mobile and Sensor Systems

Wireless Networking: An Introduction. Hongwei Zhang

B.E. ELECTRONICS & COMMUNICATION ENGINEERING SEMESTER - VII EC WIRELESS COMMUNICATION

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad

Wireless LAN. Access Point. Provides network connectivity over wireless media

DHANALAKSHMI COLLEGE OF ENGINEERING, CHENNAI DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING EC6802 WIRELESS NETWORKS UNIT - I: WIRELESS LAN

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1

Lecture Objectives. Lecture 1 Wireless Environment and Wireless LANs. Agenda (1) Agenda (2) Wireless Spectrum (1)

The Medium Access Control Sublayer

CSC 4900 Computer Networks: Wireless Networks

Wireless Communications

ROEVER COLLEGE OF ENGINEERING AND TECHNOLOGY Elambalur, Perambalur

Wireless Personal Area Networks & Wide Area Networks

MSIT 413: Wireless Technologies Week 8

Guide to Wireless Communications, 3 rd Edition. Objectives

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point

Wireless Local Area Networks. Networks: Wireless LANs 1

Wireless Local Area Networks (WLANs) and Wireless Sensor Networks (WSNs) Primer. Computer Networks: Wireless LANs

Advanced Computer Networks. WLAN, Cellular Networks

WIRELESS SENSOR NETWORK

WIRELESS-NETWORK TECHNOLOGIES/PROTOCOLS

MOBILE COMPUTING (Common to Computer Science & Engineering and Information Technology)

Bikash Sadhukhan. M.Tech(CSE) Lecturer. Dept of CSE/IT Techno India College of Technology

Wireless Security Background

INSTITUTE OF AERONAUTICAL ENGINEERING (AUTONOMOUS) Dundigal, Hyderabad

LTE : The Future of Mobile Broadband Technology

4G Wireless Systems. Outlines. Data Rates of Wireless Networks. Wireless Networks. Wireless Networks Throughput versus Range

Wireless Data-Introduction p. 1 Wireless Voice p. 2 Fixed Minimum Bandwidth p. 2 Vague Definition of Service Quality p. 3 Delay Requirements p.

Mobile Ad Hoc Networks: Basic Concepts and Research Issues

Long Distance Wireless Communication. Principally satellite communication:

CS263: Wireless Communications and Sensor Networks

CS 332 Computer Networks Wireless Networks

GOPALAN COLLEGE OF ENGINEERING AND MANAGEMENT Electronics and communication Department

Introduction to Wireless Networking ECE 401WN Spring 2009

SIDDHARTH GROUP OF INSTITUTIONS :: PUTTUR Siddharth Nagar, Narayanavanam Road QUESTION BANK (DESCRIPTIVE) Essay Answer (10 mark) Questions

Extending or Interconnecting LANS. Physical LAN segment. Virtual LAN. Forwarding Algorithm 11/9/15. segments. VLAN2, Port3. VLAN1, Port1.

ALL SAINTS COLLEGE OF TECHNOLOGY, BHOPAL

Wireless networks. Wireless Network Taxonomy

What is an Ad Hoc Network?

Understanding Carrier Wireless Systems

Wireless LANs/data networks

Current Trends in Wireless Networking. G Santhosh Kumar Cochin University of Science and Technology

Wireless# Guide to Wireless Communications. Objectives

Chapter 6 Local Area Networks and Media Access Control. School of Info. Sci. & Eng. Shandong Univ.

Announcements / Wireless Networks and Applications Lecture 9: Wireless LANs Wireless. Regular Ethernet CSMA/CD.

WPAN-like Systems. UWB Ultra Wide Band. IrDA Infrared Data Association. Bluetooth. Z-Wave. WPAN Wireless Personal Area Network

EL Wireless and Mobile Networking Spring 2002 Mid-Term Exam Solution - March 6, 2002

Chapter 1 Basic concepts of wireless data networks (cont d)

Faculty of Computer Science and Technology, UTU 2015

INTRODUCTION TO WIRELESS COMMUNICATION

EE 597: Wireless Networks (Spring 12)

Wireless Terms. Uses a Chipping Sequence to Provide Reliable Higher Speed Data Communications Than FHSS

Module 6: Wireless Mobile Networks

Lecture 6. Reminder: Homework 2, Programming Project 2 due on Thursday. Questions? Tuesday, September 13 CS 475 Networks - Lecture 6 1

Wireless Sensor Networks

Wireless# Guide to Wireless Communications. Objectives

WIRELESS TECHNOLOGIES

G 364: Mobile and Wireless Networking. CLASS 2, Wed. Jan Stefano Basagni Spring 2004 M-W, 11:40am-1:20pm, 109 Rob

E2-E3: CONSUMER MOBILITY. CHAPTER-5 CDMA x OVERVIEW (Date of Creation: )

ECE 4450:427/527 - Computer Networks Spring 2017

Solving the Interference Problem due to Wireless LAN for Bluetooth Transmission Using a Non- Collaborative Mechanism. Yun-Ming, Chiu 2005/6/09

VEL TECH MULTI TECH Dr RANGARAJAN Dr.SAKUNTHALA ENGINEERING COLLEGE

Wireless Grows Up. Craig J. Mathias. Principal, Farpoint Group. Strategic Interop - 10 September Our Objectives for This Morning

Wireless Network Introduction

Communications & Networks Introduction

Wireless WAN ห วข อ เคร อข ายไร สายระยะไกล. Cellular Network WiMAX

VEL TECH MULTI TECH Dr RANGARAJAN Dr.SAKUNTHALA ENGINEERING COLLEGE

CSC 8560 Computer Networks: Wireless and Mobility

Wireless systems overview

ECE 4450:427/527 - Computer Networks Spring 2017

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

Autonomous Infrastructure Wireless Networks: A Perspective on 4G

CS4516 Advanced Computer Networks. Final Review

Multiple Access in Cellular and Systems

MAC Sublayer(1) Principal service of the Medium Access Control Sublayer: Allocating a single broadcast channel (mostly a LAN) among competing users

Introduction to Wireless Networks. Chapter 7: Introduction to Heterogeneous Networks and

5105: BHARATHIDASAN ENGINEERING COLLEGE NATTARMPALLI UNIT I FUNDAMENTALS AND LINK LAYER PART A

Physical Layer. Medium Access Links and Protocols. Point-to-Point protocols. Modems: Signaling. Modems Signaling. Srinidhi Varadarajan

DEPARTMENT OF INFORMATION TECHNOLOGY QUESTION BANK UNIT I PART A (2MARKS)

Announcements: ECE/CS 372 introduction to computer networks. Assignment 4 due now. Chapter 7

WIRELESS ACCESS PRINCIPLES OF AND LOCALIZATION. Wiley. Kaveh Pahlavan. Prashant Krishnamurthy. University of Pittsburgh, Pittsburgh, Pennsylvania, USA

Advanced Computer Networks WLAN

Chapter 6 Wireless and Mobile Networks

Comparative Analysis of ZigBee, WLAN and Bluetooth System and its Throughput Enhancement

Fixed-Mobile Wireless Networks Convergence

Mobile Ad Hoc Networks Summary and Further Reading

Real-World Experience with a Mobile Broadband Network

Communication Systems for the Mobile Information Society

Topic 2b Wireless MAC. Chapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach

Wireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross

Junseok Kim Wireless Networking Lab (WINLAB) Konkuk University, South Korea

Chapter 3.1 Acknowledgment:

WIRELESS LANS. By: M. Habibullah Pagarkar Mandar Gori Rajesh Jaiswal

Ethernet. Lecture 6. Outline. Ethernet - Physical Properties. Ethernet - Physical Properties. Ethernet

Transcription:

EC 6802 - Wireless Networks VIII - Semester Questions Bank UNIT I PART A 1. Find out the capacity of a single IS-95 cell that uses QPSK modulation and convolutional coding 3 db < Sr < 9 db, and bandwidth of the channel is 1.25 MHz. (Nov/Dec2012), (May/June 2013) 2. Determine the transfer time of a 20 kb file with a mobile data network with the transmission rate of 10 Kbps. (May/June 2012) 3. Determine the capacity of GSM for k = 3. (Nov/Dec2012) 4. Compute the maximum throughput of a pure ALOHA networking with a large number of users and transmission rate of 1 Mbps? (May/ June 2013) 5. Differentiate Wired Network from Wireless Network (Nov/Dec 2009) 6. What is meant by Handoff? 7. What is meant by hard handoff? 8. What is meant by soft handoff? 9. List the parameters that influence the handoff. 10. What are the two types of protocols used to handle multiple access issues? 11. How contention based protocols are classified? 12. List the types of Random Access protocols and Collision Resolution protocols. 13. What are the different types of conflict free protocols? 14. List the classifications of the services of wireless security system. 15. List the services wireless system security 16.Write short notes on collision mechanism in No persistent CSMA Protocol? 17. Write short notes on collision mechanism in 1-Persistent CSMA Protocol. 18. Write short notes on collision mechanism in p-persistent CSMA Protocol. 19.Compare FDMA,TDMA and CDMA. ( April 2014) 20. Mention some key factors that contribute to security problems in wireless networks. ( April 2014)

Part B 1. Explain in detail the performance of the random access scheme for data oriented networks. (May/June 2013) (16). 2. Explain in detail the forward and reverse channels in W-CDMA and CDMA 2000,and also explain about the handoff and power control mechanisms. (May/June 2013) (16). 3. Explain in detail the methods of data services get integrated with Voice Oriented Networks (May/June 2012) (16). 4. Explain in detail the random access for mobile data services and wireless LAN data services. (Nov/ Dec 2012) (16) 5. Explain in detail the performance of fixed assignment access methods with traffic engineering and delay estimation methods. (Nov/ Dec 2012) (8) 6. Explain in detail the handoff parameters and underlying support. (8) 7. Explain in detail roaming support in wireless network. (8) 8. Explain in detail the wireless system security and privacy. (16) 9. i) Explain Non- Persistent, I-Persistent, and P- Persistent CSMA protocols. ( April 2014) ii) Compare the throughput performance of ALOHA, slotted ALOHA, and CSMA protocols. 10. Explain the principle, frame structures and working of TDMA system. ( April 2014) 11. What is meant by Handoff? Describe the different handoff mechanism. ( April 2014)

UNIT II PART A 1. List the four layers involved in SMS. (AU, A/M 2008) 2. List the five major challenges for implementation of Wireless LANs that existed from the beginning of this industry. (AU, A/M 2008) 3. Justify whether CDMA is an access method or an air interface method. (AU, M/J 2009) 4. What is meant by capacity on-demand principle in GPRS networks? (AU, M/J 2009) 5. What are VLR and HLR? Where they are physically located and why we need them? (AU, N/D 2009) 6. What is meant by AMPS? 7. What are the parameters used in AMPS? 8. What is meant by NAM? 9. What are the design consideration requirements for TDMA? 10.What is the purpose of developing the second generation systems? 11. List the components in Base Station Subsystem. 12. List the advantages of CDMA. 13 What is meant by near-far problem? 14. List the capabilities of third generation systems. 15. What are the parameters of W-CDMA? 16. What is meant by GPRS? 17. What is meant by SMS? 18. Distinguish between CDMA2000 and W-CDMA. 19. What are the limitations of GPRS? 20. What are the two types of service provided by SMS? 21. What is meant by self jamming? 22. List out the difference between 1G and 2G systems. ( April 2014) 23. Mention the key features of IS 95 systems. ( April 2014)

UNIT II PART B 1. Explain the three different functions that are used for the operational differences for MAC layer. (May/June 2013) (8) 2. Explain in detail the architecture of the 2G GSM system. (May/June 2013.) (8). 3. Why IEEE 802.11 standard has two divisions in the MAC layer? Explain in detail about the MAC sub layer ( May/ June 2012). (16). 4. Explain the mechanism of integrated elements of GSM with another one to implement the services in the GSM architecture. Explain with its layered format of communication. ( Nov/Dec 2012) (16) 5. Explain the following for the IS-95 reverse channel ( Nov/Dec 2012) (16) i)waveform encoding ii) Access channel iii)packets and frame formats 6. Explain the reference architecture of CDPD networks. (Nov/Dec 2012) 16) 7. Explain three different functions that are used for operational differences for MAC layer. (May/June 2013) (8) 8. i) Describe the different interface connection between MS and DTS in a GSM network. ( April 2014) ii) Compare GSM and CDMA. ( April 2014) 9. Explain the architecture, location and handoff management in GPRS network. ( April 2014)

UNIT -III Wireless LAN 1. What are the advantages of wireless LAN? 2. List the properties of ISM band? 3. List the three basic rules (or) etiquette of spectrum. 4. List the features of wireless LAN. 5. Draw the frame format of IEEE 802.11 physical layer using FHSS. 6. Draw the frame format of IEEE 802.11 physical layer using DSSS. 7. List the type of architecture used in IEEE 802.11 8. What are the characteristics of DSSS? 9. Draw the MAC layer frame format of IEEE 802.11. 10. Draw the MAC management frame format. 11. What is meant by wireless ATM? 12. Draw the packet frame format of WATM. 13. What are the versions of HIPER LAN? 14. List the protocols used in HIPER LAN-2. 15. What are the phases available in HIPER LAN-1 MAC layer? 16. List the services provided by IEEE 802.11. 17. List the three types of service provided by GSM. (May/Jun 2013) 18. What are the MAC services of IEEE 802.11 that are not provided in traditional LAN 802.3? (May/Jun 2013) 19. How many physical channels are available in each IS-95 carrier? What type of coding separates these channels from one another? (Nov/Dec 2012) 20. Why does an AP in wireless network act as a bridge? (Nov/Dec 2012) 21. List the challenges faced by WLAN industry. (May/Jun 2012) 22. What are the functions of physical layer of IEEE 802.11 system? ( April 2014) 23. Write the expansion for Wimax and features of the system. ( April 2014)

PART B 1. Explain the architecture and reference model of HIPERLAN- 2 in detail. (May/June 2013) (16) 2. Explain the physical and MAC layer details of Wi Max in detail. (May/June 2013) (8) 3. Compare the various parameters for WCDMA and CDMA2000. ( Nov/Dec 2012) (16) 4. Explain in detail the MAC mechanism of IEEE 802.11 WLAN. ( Nov/Dec 2012) (8) 5. Design a WLAN for an office building based on statistical models with certain information provided. There is a constraint on where to place an access point on the wireless environment. Consider the following information for network design: there is 4 maximum number of walls between an access point and a mobile terminal, transmit power possibility starts from 250 mw to 100mW, receiver sensitivity is -80 dbm, maximum access point to building edge is 30 m, and shadow finding margin is 8 db. ( Nov/Dec 2012) (8) 6. Explain any two MAC mechanism used in IEEE 802.11 WLAN systems. (May/June 2012) (16) 7. Explain the reference architecture of HIPERLAN -2. (May/June 2012) (16) 8. Explain the services provided by IEEE 802.11. (16) 9. Explain the architecture of IEEE 802.11 (8). 10. Explain the IEEE 802.11 standards. (16) 11. Explain the architecture and sublayers of HIPERLAN. ( April 2014) 12. Explain the following corresponding to 802.11 MAC sublayer i) Reliable data delivery, ii) access control iii) MAC frame format. ( April 2014) 13. Compare the Wimax and HIPERLAN standard. ( April 2014)

UNIT- IV ADHOC and Sensor Networks 1. Define MANET 2. List the characteristics of MANETs. 3. List the applications of MANET. 4. List the factors that involves in routing of a MANET. 5. List the major goals when selecting a routing protocol. 6. Give the classifications of routing protocol in MANET. 7. List the table driven protocols. 8. List the Source-initiated On-Demand Routing Protocols. 9. What are hybrid protocols? 10. List the hybrid protocols. 11. What is meant by wireless sensor network? 12. List the advantages of wireless sensor network. 14. List the classification of sensor networks. 15. List the two types of schemes available to allocate a single broadcast channel among competing nodes. 16. Compare hierarchical routing and flat routing in sensor networks. 17. What was the mission of the IAPP group? (May/June 13) 18. Define LEAP Protocol 19. Define LEACH Protocol 20. List the challenges involved in Adhoc network architecture. (Nov/Dec 12) 21. What are the characteristics of MANET? (May/June 12) 22. Differentiate the MAC protocol of WSN from traditional wireless MAC protocol. (May/June 12) 23. What are the characteristics of MANETs? ( April 2014) 24. Define the types of wireless sensor Networks. ( April 2014)

PART B 1. Explain the need for demand based routing protocol for wireless sensor networks. Explain the different types of wireless sensor networks in detail. (May/June 2013) (16) 2. Explain the MAC protocols of wireless sensor networks in detail. (May/June 2013) (16) 3. Explain the Wi- Max layer in detail. (Nov/Dec 2012) (8) 4. Explain the source initiated routing protocols for ad hoc networks in detail. (Nov/Dec 2012)(16) 5. Explain MAC layer challenges in wireless sensor networks in detail. Find out the remedies to the challenges and issues and discuss in detail about it. (Nov/Dec 2012) 6. Describe the architecture of wireless sensor network. (May/June 2012) (8) 7. Explain the key features of routing protocol in WSN and discuss any two energy efficient routing protocols. (May/June 2012) (16) 8. Explain the source initiated on- demand routing protocols in ad- hoc networks in detail.(8) 9. Explain any to table driven routing protocols in ad-hoc networks. (8) 10. Explain the routing protocols of wireless sensor networks in detail. (8) 11. explain the folling protocol in brief. (i) AODV routing protocol, (ii) DSDV. ( April 2014)

UNIT - V Wireless MANs and PANs 1. What is POS? 2. What is Bluetooth? What is the data rate of Bluetooth? 3. What are the different sceneries of connection of Bluetooth? 4. What is random back off delay? 5. List the Bluetooth applications. 6. What is piconet? 7. What are the advantages of piconet /scatternet? 8. List the five types of logical channels in Bluetooth. 9. List the two major states in the operation of Bluetooth. 10. List the seven sub states in the operation of Bluetooth. 11. List the logical channels provided by L2CAP. 12. Mention the service provided by L2CAP Bluetooth networks. 13. What is Ricochet? 14. Compare IEEE 802.16 and Ricochet. 15. What is the frequency band and channel bandwidth specification of WiMax Standard? ( April 2014) 16. Mention the three error correction mechanism used by Bluetooth systems. ( April 2014)

Part B 1. Describe the Bluetooth architecture with relevant sketch. (16) ( May/June 2012) 2. Discuss the interference handling mechanism adopted in Bluetooth technology with all other ISM band technologies. (16) ( May/June 2012). 3. Explain in detail about the interference details and the connection management procedure of Bluetooth (16) (May/June 2013) 4. Explain in detail about the IEEE 802.15 WPAN standards. (16) ( May/June 2013). 5. Explain in detail about IEEE 802.16(WMAN) architecture (16). 6. Explain in detail about IEEE 802.16MAC layer details (16). 7. Explain in detail about IEEE 802.15MAC layer details (8). 8. Write short notes of PICONETS and SCATTERNETS (8). 9. Explain in detail about IEEE 802.15(WPAN) architecture (8). 10. Explain in detail about Bluetooth architecture (8). 11. In detail explain the Physical and MAC layer details of Wimax Network. ( April 2014) 12. Explain the architecture and MAC layer details of Bluetooth systems. ( April 2014)