ST.ANNE’S COLLEGE OF ENGINEERING AND TECHNOLOGY ANGUCHETTYPALAYAM, PANRUTI – 607 110

EC1016 – WIRELESS NETWORKS QUESTION BANK

(FOR III B.E ELECTRONICS AND COMMUNICATION ENGINEERING)

AS PER ANNA UNIVERSITY (TRICHY) SYLLABUS 2008 REGULATION

DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING Prepared By, Mr.S.BALABASKER (LECT/ECE)

UNIT I PHYSICAL AND WIRELESS MAC LAYER ALTERNATIVES PART – A (2 Marks) 1. Name five design consideration in selecting a modulation scheme for a wireless networks. i. Bandwidth efficiency, ii. Power efficiency, iii. Out of band radiation, iv. Resistance to multi path, v. Constant envelope modulation. 2. Why is out of band of radiation an important issue in designing modulation scheme? Because, out of band radiation is the source of interference. 3. Why is PPM used with IR communication instead of PAM? In PAM as the signal is through amplitude, the wireless channels suffer amplitude fluctuations because of fading and near far problems. So PPM is used in wireless communication instead of PAM. 4. Name four space diversity techniques. i. Multiple antennas, ii. Polarization diversity, iii Sectored antennas, iv. Adaptive angle diversity. 5. What are the advantages of high efficiency voice band modems? The advantages of high efficiency voice band modems are, i. It provides good bandwidth efficiency. ii. It can reduce the connect time 6. Define DFE. DFE - Decision Feed back Equalizer. This Equalizer is used for multipath fading channels. 7. Define ACI. ACI means adjacent carrier interference. It is the interference caused by a transmitting channel to its above and below channels. It is because of out of band radiation. 8. What are the types of diversity? i. Time Diversity, ii. Frequency Diversity, iii. Space Diversity 9. In an OFDM modem with 48 channels, each channel uses 16 QAM modulations. if the overall transmission rate is 10 Mbps. What is the symbol transmission rate per channel? The symbol transmission rate per channel= (10/4)/48 = 52.083 KHz.

10. What are the sectored antennas? How they are useful in combating multipath? A sectored antenna has several sectors each selecting only the signal arriving in their field of view. A sectored antenna reduces the interference from other users operating in the same band because it restricts the spatial angle of the arriving interference signals. 11. What are the popular access schemes for data networks? Classify them. i. Different ALOHA Techniques, ii. CSMA Techniques, iii CSMA/CD, iv.CSMA/CA, v. RTS/CTS 12. What is the difference between the access technique of IEEE802.3 and IEEE802.11? IEEE802.3 uses CSMA/CD but IEEE802.11 uses CSMA/CA protocol. Because when CSMA/CD is used in IEEE802.11, collision cannot be identified. 13. What is the difference between performance evaluations of voice oriented fixed assignment and data oriented random access? In voice oriented fixed assignment network, circuit switching is used and delay cannot be tolerated, but packet loss can be accepted. In data oriented random access networks, packet switching is used. Here delay can be tolerated but packet loss cannot be tolerated. As the requirements of data and voice networks differ their performance evaluations also differ. 14. What is the difficulty of implementing CSMA /CD in a wireless environment? When we use CSMA/CD in wireless applications collision cannot be detected because of multipath effect and near far problem. 15. Explain about CSMA. CSMA - it is also called as Listen Before Talk. This technique reduces collision considerably compared to ALOHA, because it senses the availability of the channel first and then transmits. 16. Explain about hidden terminal problem. In wireless networks, when two terminals are not within the radio range to each other then they cannot transmit directly. This is called hidden terminal problem. 17. Explain about capture effect. In FM reception, when we have more than one signal the stronger signal is selected that is called capture effect. 18. Write down the formula for N idle. N idle = N – ρ (1- B(N, ρ))

19. Define: a. persistent, b. non persistent, c. 1-persistent, d. p-persistent After sensing a busy channel, if the terminal continues sensing the channel until the channel becomes free the protocol is called Persistent CSMA. If After sensing the channel, the terminal attempts another sensing only after a random waiting period, the protocol is called Non Persistent CSMA . In Persistent operation, after the channel becomes free, if the terminal transmits immediately then the protocol is called 1- Persistent. In Persistent operation, if it runs a random number generator and based on outcome transmit its packet with a probability p, it is called p- Persistent. 20. Difference between ALOHA and slotted ALOHA. ALOHA 1.It is very simple. No Synchronization 2.Throughput is 18%

Slotted ALOHA Synchronization between time slots. Throughput is 36%

21. Explain about space diversity. In a fading multipath channel, the received signal at the antenna of a receiver is composed of a number of signals arriving through different paths from different spatial angles. Spatial diversity is provided by multiple antennas.

UNIT II WIRELESS NETWORK PLANNING AND OPERATION PART –A (2 Marks) 1. Name any three advantages of an infrastructure topology over an adhoc network topology. i. Scalability, ii. Controllability, iii. Store and Forward 2. Compare single hop and multihop networks topologies. Single Hop Network i. Routing Complexity is less ii. Information is transmitted only once.

Multihop network Routing is more complicated. Store and forward facility is available.

3. Name the five different cell types in the cellular hierarchy and compare them in terms of Coverage area antenna site. i. Femto cells, ii. Pico cells, iii. Micro cells, iv. Macro cells, v. Mega Cells 4. Why is hexagonal cell shape preferred over square or triangular cell shape to represent the cellular architecture? Because the hexagonal shape has the largest area for a given radius. 5. Name five architecture methods that are used to increase the capacity of an analog Cellular system without increasing the number of antenna sites. i. Cell splitting ii. Cell sectoring iii. Lee’s Micro cell method iv. Using Overlaid cells v. Using smart antennas 6. Explain the following: a. Cell splitting, b. Cell sectoring, c. Cell partitioning. Cell Splitting: In order to increase the number channels in an area the cells are splitted into smaller cells. This is called cell slitting. Cell Sectoring: Cell sectoring is done using directional antennas to increase the capacity of the cellular system. This method reduces the co channel interference. Cell Partitioning: This technique increases the network capacity by cell partitioning. In this method channels are divided among larger macro cell and a smaller micro cell.

7. Explain how smart antennas can improve the capacity of cellular network. Space division multiple access (SDMA) is used smart antennas. The directional antennas are very narrow. SDMA and narrow directional antennas reduce the co channel interference greatly. The sectored cells also reduce the reuse factor. Thus the smart antenna improves the capacity of a cellular network. 8. What are channel allocation techniques? There are three channel allocation techniques. They are, i.Fixed Channel Allocation ii. Dynamic Channel Allocation iii. Hybrid Channel Allocation 9. Explain the terms FCA, DCA, HCA. FCA - Fixed Channel Allocation : In this technique the entire bandwidth is divided among the channels in a cell permanently. DCA –Dynamic Channel Allocation: Channel Allocation is done based on the load in the network. HCA – Hybrid Channel Allocation: In this kind of Channel Allocation the channels are divided fixed and dynamic sets and they are allocated accordingly. 10. Compare FCA and DCA. Attribute

FCA

DCA

Traffic Load

Better under heavy traffic

Better under light traffic

Flexibility in channel

Low

High

Allocation Call setup delay

Low

Moderate/high

Control

Centralized

Centralized or Distributed.

11. Define channel borrowing technique and give its types. The high traffic cells borrow the channels form the low traffic cells in order to increase the system capacity. This is called channel borrowing. There are two types of channel borrowing: i. Static Channel borrowing and ii. Dynamic Channel borrowing. 12. Define mobility management. Location and Hand off management together are commonly referred to as mobility management.

13. Name the two important issues in mobility management. i.Location Management and ii. Hand off Management 14. What is location management? What are the three components? Location management refers to the activities a wireless network should perform in order to keep track of where the Ms is. The three components of mobility management are i. Location update algorithms, ii. Paging schemes, iii. Location information Dissemination 15. Name three paging mechanisms. i. Blanket paging, ii. Closest – cells first paging, iii. Sequential paging 16. Explain about paging. Paging is broadcasting a message in a cell or a group of cells to elicit a response from the MS for which a call or a message is incoming. 17. Mention the three traditional handoff techniques. 1. Hard handoff 2. Soft handoff 18. Difference between mobile controlled and mobile assisted hand off? Mobile controlled hand off

Mobile assisted hand off

i. Hand is controlled by the mobile

Hand off is controlled by the network

nodes.

and the mobile node.

19. Difference between centralized and distributed power control. Centralized Power control i.Centralized power controller controls the power. ii. Complexity is more.

Distributed Power control The mobile terminals individually Adjust their power. Complexity is less.

20. What are the two steps in hand off? i. Architectural issues in hand off ii. Hand off decision time Algorithms 21. What are the privacy and authentication requirements of wireless networks? In order to avoid the attack of unauthorized nodes in the network authentication is required in wireless networks.

22. How are public key and secret key algorithms different? Secret key i. Same key is used for encryption and decryption. ii. They are fast.

Public key Different keys are used for encryption and decryption. Not faster.

23. Explain the importance of key sizes in the security of an encryption algorithm? When the key size is very small, it can be identified by eves by brute force method.But when key size is large it is very difficult to apply brute force method. 24. What is challenge response scheme? This is used in IS 136 digital TDMA. The network generates a random number and sends it to the mobile terminal. The mobile terminal computes a value using the encryption algorithm. The value is transmitted over the air. The network computes its version of authentication and compares the two values. If the values match, the mobile terminal is identified. 25. What are the parts in location management? i. Location updates ii. Paging iii. Location information dissemination

UNIT III WIRELESS WAN PART –A ( 2 Marks) 1. Difference between registration and call establishment? Registration Call establishment During a registration procedure, network have In mobile environment we separate call two provides the MS with a channel for establishment for mobile to fixed and fixed separate procedure preliminary signaling to calls. mobile

2. What are the reasons to perform handoff? i. Signal strength deterioration, ii Traffic balancing, iii. Mobility of the terminal 3. Mention the different types of handoffs. i. Mobile assisted hand off, ii. Network assisted hand off. 4. Difference between logical and physical channel? Logical Channel

Physical channel

Similar to computers, we need a set of The physical layer specifies how the information instructions and ports to instruct different from different voice and data services are formatted elements of the network to perform specific into packets and sent through the radio channel. duties. In telecommunications, these ports are called as logical channels. 5. Name five most important logical channels in GSM 1.Traffic Channels & 2 pilot channels Types of Traffic channels: i. Full rate traffic channel & Half rate traffic channel Types of Control channels: i. Broadcast channels (BCH). ii. Common control Channels (CCCH) & Dedicated control channels(DCCH). 6. list the types of stack layers. i. Physical layer, ii. Data link layer, iii. Networking or Messaging layer. 7. mention the types of bursts. 1. Normal burst, 2. Frequency correction burst, 3. Synchronization burst, iv. Random access burst.

8. Mention the Three types of control channels. i. Broadcast channels (BCH). ii. Common control Channels (CCCH) & Dedicated control channels(DCCH). 9. What is IS-95? IS –95 is Interim Standards developed by TIA. Forward channel: 824-849 Mhz Reverse channel: 869-894 MHz .1.25 MHz/channel. 10. What is the chip rats used in WCDMA? WCDMA – Chip rate = 3.84 Mcps 11. How many physical channels are available in each IS-95 carrier? What type of coding separates these channels from one another? In IS – 95, we have 64 physical channels. Walsh code is used to separate the channels. 12. Name the forward and reverse channels used in IS-95? Forward Channels: i. Pilot channel, ii. Synchronization channel, iii. Paging channel and Traffic channel Reverse channels: i. Access Channel, ii. Traffic channel, iii. Synchronization channel, iv. Paging channel 13. Difference between Walsh codes used in the forward and reverse channels of cdma In reverse channels there is no spreading of the code. In reverse channel orthogonal codes are used for waveform encoding. 14. What are the bit rates of the data services supported by IS-95? RS1: 9.6, 4.8, 2.4, & 1.2 kbps RS2: 14.4,7.2,3.6, &1.8 kbps 15. Why is power control important in CDMA? In CDMA the interference is from other users transmitting in the same frequency band at the same time. So in order to avoid near far effect and to maintain a good link quality it is necessary to control power in CDMA. 16. What forward channels are involved in IS-95 for power control? Traffic channel and control channel.

17. Why are several pilot channels monitored in IS-95? When does a pilot channels from a base station move from an active set to a candidate set? Several pilot channels are monitored in IS –95 in order to perform handoff. When the signal strength of the pilot exceeds T-ADD it is transferred to a candidate set. 18. What are the new elements added to the GSM infrastructure to support GPRS? GPRS uses the same physical radio channels and only new logical GPRS radio channels are defined. 19. What are different services offered by GPRS? i. Point to multi point, ii. Point to point 20. Name the connectionless and connection oriented services provided by the GPRS. In GPRS Point to point communication, there are two types, i. IP – connection less service, and ii. CLNP Connection oriented onX.25. 21. What is GPRS-136? How does it differ from GPRS? The adaptation of GPRS to the IS –136 TDMA cellular standard is called GPRS-136.It uses 30kHz physical channel instead of 200KHz. 22. What is the importance of the framing hierarchy in GSM? A framing hierarchy is needed to identify the location of certain bursts among the large stream of bursts that are directed toward different terminals. 23. Name three sub systems in the GSM architecture. Connection management, Mobility management, radio resource management. 24. What are VLR and HLR and why we need them? VLR- Visitor Location Register, HLR – Home Location Register. They are used for mobility management.

UNIT IV WIRELESS LAN PART –A ( 2 Marks) 1. Name three categories of unlicensed bands used in U.S and compare them in terms of size of the available band coverage. ISM is unlicensed band used in U.S. ISM Frequencies of operation : 902 –928 MHz, 2.4- 2.4835 GHz, 5.725 – 5.875 GHz. 2. Name the five major challenges for implementation of wireless LANs compare with one another. Single mac to support multiple physical layers. Mechanisms to allow multiple overlapping network in the same area. Provisions to handle the interference from other ISM band radios and microwave ovens. Mechanism to handle ‘Hidden Terminals’. Options to support time bounded services. Provision to handle privacy and access control. 3. Explain the difference between wireless inter-LAN bridges and WLANs A wireless bridge is a hardware component used to connect two or more network segments (LANs or parts of a LAN) which are physically and logically (by protocol) separated. A wireless local area network (WLAN) links devices via a wireless distribution method (typically spread-spectrum or OFDM radio), and usually provides a connection through an access point to the wider internet 4. What are the differences between IEEE802.11 and HIPERLAN standards? IEEE 802.11

HIPERLAN

WLAN is connectionless Based on products

HIPERLAN-2 is connection oriented HIPERLAN-1 is based on certain functional Requirements.

5.What is WATM? It is wireless ATM. 6.Draw the frame format of WATM? Wireless Header

ATM header

ATM payload

Wireless trailer

7. What are the responsibilities of the MAC management sub layer in 802.11? The responsibilities of the MAC management sub layer are to define the access mechanisms and packet format, also it provides roaming support,power management and security. 8. What are the purpose of scrambler and interleaver in the HIPERLAN-2 modem? In HIPERLAN – 2 modems, Scrambler is used to perform whitening process and interleaver is used to improve the reliability over temporal fading.

9. What is the purpose of guard time? Guard time is to avoid overlapping of adjacent frames. 10. Similarities between the Medium access control of the HIPERLAN-2 and DECT. Both MAC layer of HIPERLAN- 2 and DECT use TAMA/TDD access method. MT –MT peer to peer transmission is also similar in both HIPERLAN- 2 and DECT. 11. What does HiperLAN stands for? High performance Radio LAN.It was initiated by RES10 group of ETSI as a PAN European standard for high speed wireless local network. 12.Specify requirements for HiperLAN1? Data rates of 23.529Mbps Coverage of upto 100m Multihop Adhoc Networking capability Support of time bounded services Support of power saving 13. How many transport channels and logical channels are implemented in the HIPERLAN2 DLC layer? HIPERLAN-2 DLC layer has four transport channels and five logical channels. 14. What is HAN? HAN(Home Area Network) provides an infrastructure to interconnect a variety of home applications and enable them to access the Internet through a central home gateway.

UNIT-V WPAN AND GEOLOCATION SYSTEMS PART –A ( 2 Marks) 1. What is home RF? Home RF working group is to provide th e foundation for a broad range of interoperable consumer devices by establishing an open industry specification for wireless digital communication between PC’s and consumer electronic devices anywhere in and around the home. 2. What is the IEEE 802.15 and what is the relation to the Bluetooth and homeRF? The IEEE 802.15 WPAN group is focused on development of standards for short distance wireless networks used for networking of portable and mobile computing devices such as PC’s, PDA’s, cell phones, printers, speakers, microphones, and other consumer electronics. Home RF has a higher data rate than Bluetooth. 3. Name the four states that a Bluetooth terminal. 1. 2. 3. 4.

Master. (M) Slave. (S) Stand By. (SB) Parked or hold. (P)

4. Name the three classes of application that are considered for Bluetooth technology? 1. Cable replacement. 2. Ad hoc personal network. 3. Integrated AP. 5. Difference between 802.11 and 802.15. IEEE 802.11 It is an independent standard to define PHY and MAC layers of WLAN.

IEEE 802.15 It is focused on the standards for short distance Wireless networks used for networking of portable and mobile computing devices.

6. What is the maximum data rate of an overlay blue tooth network? It allows a maximum data rate of 11 Mbit/s 7. Difference between the implementation of paging and inquiry algorithms in blue tooth? With the paging procedure, an actual connection can be established. The paging procedure takes a very short time (at most 20 ms) while the inquiry procedure might cause a significant delay (up to a few seconds on average) The inquiry message is typically used for finding Bluetooth devices including publicprinters ,fax machines and similar devices with an unknown address.

8. Difference between GPS, wireless cellular assisted GPS, and indoor geo location systems. The Global Positioning System (GPS) is a satellite-based navigation system made up of a network of 24 satellites placed into orbit by the U.S. Department of Defense Assisted GPS, generally abbreviated as A-GPS, is a carrier network dependent system which can, under certain conditions, improve the startup performance of a GPS satellite-based positioning system. It is used extensively with GPS-capable cellular phones. Indoor Geolocation is the process of finding geolocation of an electronic device inside a building 9. Differentiate between remote and self positioning systems. In a self positioning system the MS locates its own position using measurements of its distance or its direction from known location of transmitter. In remote positioning system recievers at known locations on a network together compute the location of a mobile transmitter usong the measurements of the distance of this mobile from each of the receivers.It is also called as network based or network centric positioning system. 10.What is WPAN? Wpan is a short distance wireless networkused for networking of portable and mobile computing devices such as PCs, PDAs, cellphones, printers speakers…etc and other consumer electronics. 11.What is Bluetooth? Bluetooth is an open specification for short range wireless voice and data communication that was originally developed for cable replacement in personal area networking to operate all over the world. 12.What are the requirements of WPAN? Power management : Low current consumption. Range:0-10m Speed:19.2-100kbps Small size 0.5 cubic in without antenna Low cost relative to target device 13.What is SWAP? Shared wire access protocol it defines a new common interface that supports wireless voice and data networking in the home. The SWAP specification is an extension of DECT for voice and relaxed 802.11 for high speed data applications. 14.Name the topology for blue tooth architecture? The topology of blue tooth is referred to as scattered adhoc topology. In scattered hoc environment a number of small network supports a few terminals to coexist or possibly interoperate with one another.

UNIT I PHYSICAL AND WIRELESS MAC LAYER ALTERNATIVES PART – A (2 Marks) 1. Name the five design considerations in selecting a modulation scheme for a wireless networks. 2. Name four space diversity techniques. 3. What are the advantages of high efficiency voice bond modems? 4. What are the types of diversity? 5. Why is out of band of radiation is an important issue in designing modulation scheme? 6. Define ACI 7. Why is PPM used with IR communication instead of PAM? 8. Write down the formula for Nidle. 9. What is CSMA? 10. Explain about hidden terminal problem. 11. What is capture effect? 12. Define: (i) Persistent (ii) non- Persistent (iii) 1-Persistent (iv) P-Persistent. 13. What is the difficulty of implementing CSMA/CD in a wireless environment? 14. What are the popular access schemes for data network? Classify them. 15. Explain about Space Diversity. 16. What are the sectored antennas? How they are useful in combating multipath? 17. Difference between ALOHA and slotted ALOHA. 18. What is the difference between the access technique of IEEE802.3 and IEEE802.11? 19. What is the difference between performances evaluation of voice oriented fixed assignment and data oriented random access? 20. What is Multi carrier Modulation? 21. What do you understand about Ultra Wide Band (UWB) Technology? PART B 1. With necessary diagram explain the different type of Random Access Methods of Mobile Data Services. (16) 2. List out the different type of diversity. Techniques and explain each with necessary diagram. (16) 3. What are the considerations needed in the design of wireless modems? Substantiate. 4. a) what is UWB pulse transmission? Describe the salient features. (8) b) Explain about short distance range in wireless networks. (8) 5. What are the broad band modems for higher speeds and explain. (16) 6. Explain about traditional modems and equalizers. (16) 7. Explain about integration of voice and data traffic. (16) UNIT II WIRELESS NETWORK PLANNING AND OPERATION PART –A (2 Marks) 1. Name any three advantages of an infrastructure topology over an adhoc network topology. 2. Compare single hop and multihop networks topologies. 3. Name the five different cell types in the cellular hierarchy and compare them in terms of coverage area antenna site. 4. Why is hexagonal cell shape preferred over square or triangular cell shape to represent the cellular architecture? 5. Name five architecture methods that are used to increase the capacity of an analog cellular system without increasing the number of antenna sites. 6. Explain the following: a. Cell splitting b. Cell sectoring c. Cell partitioning

7. Explain how smart antennas can improve the capacity of cellular network. 8. What are channel allocation techniques? 9. Explain the terms FCA, DCA, HCA. 10. Compare FCA and DCA. 11. Define channel borrowing technique and give its types. 12. Define mobility management. 13. Name the two important issues in mobility management. 14. What is location management? What are the three components? 15. Name three paging mechanisms. 16. Explain about paging. 17. Explain three traditional handoff techniques? 18. Difference between mobile controlled and mobile assisted hand off? 19. Difference between centralized and distributed power control. 20. What are the two steps in hand off? 21. What are the privacy and authentication requirements of wireless networks? 22. How are public key and secret key algorithms different? 23. Explain the importance of key sizes in the security of an encryption algorithm? 24. What is challenge response scheme? 25. What are the parts in location management? PART-B 1. Explain the two fundamental types topologies used in the wireless networks? (16) 2. Comparison of adhoc and infrastructure topologies. (16 ) 3. Explain the concept of cellular topology and cell fundamentals with examples. (16) 4. Explain in detail about capacity expansion technique. (16) 5. Explain in detail about channel allocation technique. (16) 6. Comparison of FCA and DCA. (16) 7. What are the parts available in location management and explain in detail. (16) 8. What is meant by handoff? What are the issues available in hand off management explains with neat diagram. (16) 9. Discuss about power control mechanism with example. (16) 10. Explain in detail about security in wireless networks. (16) UNIT III - WIRELESS WAN PART –A ( 2 Marks) 1. Difference between registration and call establishment? 2. What are the reasons to perform handoff? 3. Difference between network decided and mobile assisted handovers? 4. Difference between logical and physical channel? 5. Name five most important logical channels in GSM 6. What are the stack layers? 7. Three types of bursts. 8. Three types of control channels. 9. What is IS-95? 10. What are the bandwidth and chip rates used in WCDMA and how they compare with cdmaone? 11. How many physical channels are available in each IS-95 carrier? What type of coding separates these channels from one another? 12. Name the forward and reverse channels used in IS-95?

13. Difference between Walsh codes and cdmaone forward and reverse channels? 14. What are the bit rates of the data services supported by IS-95? 15. Why is power control important in CDMA? 16. What forward channels are involved in IS-95 for power control? 17. Why are several pilot channels monitored in IS95? When does a pilot channels from a base station move from an active set to a candidate set? 18. Sketch handoff threshold in WCDMA? 19. What are the new elements added to the GSM infrastructure to support GPRS? 20. How does GPRS provides a variety of data rates? 21. Name the connectionless and connection oriented services provided by the GPRS. 22. What is GPRS-136? How does it differ from GPRS? 23. What is the importance of the framing structure in GSM? 24. What is the difference between registration and call establishment? 25. Name three sub systems in the GSM architecture. 26. What are VLR and HLR and why we need them? PART –B 1. What are the mechanisms available to support mobile environment? (16) 2. Draw the protocol architecture of GSM and explain in detail. (16) 3. Explain in detail about IS-95 CDMA forward channels? (16) 4. Explain in detail about IS-95 CDMA reverse channels? (16) 5. Explain in detail about IMT-2000. (16) 6. What is GPRS? Explain in detail about GPRS. (16) 7. Explain in detail about SMS and mobile application protocol. (16) UNIT IV - WIRELESS LAN PART –A ( 2 Marks) 1. What is the difference between nomadic access and adhoc networking? 2. Name three categories of unlicensed bands used in U.S and compare them in terms of size of the available band coverage. 3. Explain the difference between WLAN and PAN. 4. Name the five major challenges for implementation of wireless LANs compare with one another. 5. Explain the difference between wireless inter-LAN bridges and WLANs 6. What are the differences between IEEE802.11 and HIPERLAN standards? 7. Compare WCAN and WHAN. 8. Why does the military shoe how much of interest in wireless ATM approach? 9. Name three military projects related to broadband wireless local access. 10. Name different alternatives for internet access to the home and different medium for home distribution. 11. What are the difference between LAN and HAN? 12. Explain the specific challenges for the design of HAN. 13. Name the classes of home appliances that are emerging in the networking market. 14. Compare wireless and wired solution for home access and in home distribution. 15. Name four major transmission technique considered for WLAN standards and give the standard activity associated with each of them. 16. Compare OFDM and spread spectrum technology for the WLAN application. 17. Give the physical specification summary of the DSSS and FHSS used by the IEEE802.11. 18. Difference between probe and beacon signal in 802.11 19. Difference between power control in 802.11 and power control in cellular system. 20. Why an AP in the 802.11 also acts as a bridge.

21. What are the responsibilities of the MAC management sub layer in 802.11? 22. 22. What are the difference between the 802.11a and HIPERLAN-2? 23. Compare packet form ATM and WATM. 24. What are the similarities between HIPERLAN -1 and HIPERLAN-2 25. What are the purpose of scrambler and interleaver in the HIPERLAN-2 modem? 26. What is the purpose of guard time? 27. Similarities between the Medium access control of the HIPERLAN-2 and DECT. 28. How many transport channels and logical channels are implemented in the HIPERLAN- 2 DLC layer? 29. Why do we need HAN? 30. Explain briefly about HYPERLAN-2. PART –B 1. What are the layers available in HYPERLAN-2? explain each layer with suitable diagram. (16) 2. What is HYPERLAN? Explain in detail about HYPERLAN-1. (16) 3. Explain in detail about wireless ATM. (16) 4. Explain in detail about overview, reference architecture, layered architecture of IEEE802.11? (16) 5. Explain in detail about three choices of PHY layer. (16) 6. Explain in detail about MAC sub layer with suitable diagram. (16) 7. What is HAN? Explain about HAN technologies? (16) 8. Explain the following: a. Overview of the LAN industry (8) b. Evolution of the WLAN industry (8)

UNIT-V - WPAN AND GEOLOCATION SYSTEMS PART –A ( 2 Marks) 1. What is home RF? 2. What is the IEEE 802.15 and what is the relation to the Bluetooth and homeRF? 3. Name the four states that a Bluetooth terminal. 4. Name the three classes of application that are considered for Bluetooth technology? 5. Difference between 802.11 and 802.15. 6. How many different voice services does Bluetooth support? 7. How many different symmetric and asymmetric data services does Bluetooth support? 8. What is the maximum data rate of an overlay bluetooth network? 9. Difference between the implementation of paging and inquiry algorithms in bluetooth? 10. What are the two standard MAC protocols that are combined in the home RF SWAP protocol? 11. Difference between GPS, wireless cellular assisted GPS, and indoor geolocation systems. 12. Differentiate between remote and self positioning systems. 13. Compare mobile centric and network centric geolocation technique in terms of complexity and accuracy. 14. Give some examples of location dependent services. 15. What are the E-911 services and who has mandated these services? 16. What are the basic elements of a wireless geolocation system? 17. Name three major metrics used for location finding. 18. Why are AOA techniques not popular in indoor geolocation applications? 19. Why is RSS not a very good measure of the distance between a transmitter and a receiver? 20. What is Bluetooth? PART –B

1. Explain in detail about geolocation standards for E.911 services (16) 2. What are the technologies available for wireless geo location? And explain (16) 3. What is geolocation? And give the architecture of geolocation. (16) 4. Explain about bluetooth technology. (16) 5. Explain in detail about interface between Bluetooth and 802.11. (16) 6. Explain about IEEE 802.5 WPAN and home RF. (16) ****************

All events - St. ANNE'S College of Engineering & Technology | St ...

St.Annes college of Engineering and Technology offers courses in B.E(Computer Science Engg, Electronics and Communication Engineering,Electrical and ...

166KB Sizes 7 Downloads 266 Views

Recommend Documents

ADHD Checklist - St Annes Catholic Primary School
prefers their own company. 2. will shut off and not ... www.HumansNotRobots.co.uk ... This student requires continuous support with their additional needs.

ST Engineering
J.P. Morgan does and seeks to do business with companies covered in its research reports. As a result, investors .... 3. F e b. -1. 4. J u l-. 1. 4. D e c. -1. 4. 12M Fwd P/E. Mean. -2 S.D.. -1 S.D.. +1 S.D.. +2 S.D.. Mean: 19.1x. +1 SD: 22.0x. +2 SD

St Thomas Aquinas College -
Aug 27, 2015 - Financial and Business Advice. 48 Albert Street, WARRAGUL ... school families who may be eligible for the program. Saver Plus is ... hope, and charity. At the end of the day the children were escorted home by the masters, so.

St Thomas Aquinas College -
May 30, 2014 - Uniform Shop Open. 8.00-10.30 ... Please note that the Primary Cross Country events will take place during normal sports lessons ... the Convent for the Sisters, you can pay in directly using the following bank account details;.

St Thomas Aquinas College -
Aug 27, 2015 - There is planning for something special for the respective schools during the final lesson of the day. From the 14th .... MacDonald, Bernadette MacLean, Madeleine Nivet and Georgia Stevenage, also Mia, ... Online Lodgement.

St Thomas Aquinas College -
May 30, 2014 - Uniform Shop Open .... Sisters, you can pay in directly using the following bank account details; ... NAB Pakenham, BSB: 083 827 account no.

THE TEMPTATION OF ST WARREN
Of course there was nothing illegal about any of this; it was even ethical to some peo- ple's way of thinking. The trouble is that. Buffett wasn't one of those people.

THE TEMPTATION OF ST WARREN
Brothers trading floor in the summer of 1987 when. Warren Btiffett ... of telling business school students, "hold your nose and ... only as raw materials for trades.

35711424 - 13_08_2015 - ST^ST - FIRST - A4.pdf
could dampen China's demand .... among a generation of transport. pioneers thanked ... transporting passengers, and when ... LTA rail director Ow Chun Nam,.

st johns.pdf
18 John Stephen M S0173/0051/1993 S0131/0665/1996. Bachelor of Science. Education. The applicant is currently a. continuing student. 19. Benson Hezron.

St. Xavier's College Magazine 2016-17.pdf
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. St. Xavier's College Magazine 2016-17.pdf. St. Xavier's College Magazine 2016-17.pdf. Open. Extract. Open wi

A035 St. Joseph School Decatur Adams A040 St ...
University High School of Indiana. Carmel. Hamilton. B246. Our Lady of Grace. Noblesville. Hamilton. B248. Legacy Christian School. Noblesville. Hamilton.