Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

Understanding Electromagnetic Waves in Networks & Wireless Communication, Schemes and Mind Maps of Physics

The reasons why electromagnetic waves with very low frequency are not used for data transmission in computer networks. It also covers various topics related to wireless communication, including multiple access schemes, channel allocation techniques, and cellular networks. Insights into the technical issues in planning a cellular network and introduces concepts such as cell splitting and sectoring.

Typology: Schemes and Mind Maps

2023/2024

Uploaded on 02/12/2024

prakhar-kesari
prakhar-kesari 🇮🇳

1 document

1 / 16

Toggle sidebar

Related documents


Partial preview of the text

Download Understanding Electromagnetic Waves in Networks & Wireless Communication and more Schemes and Mind Maps Physics in PDF only on Docsity! IT 72-Mobile Communication 2-MARK Questions and Answers UNIT-I 1. Why are electromagnetic waves with very low frequency not used for data transmission in computer networks?  Low frequency has longer wavelength  Data rates depends upon the bandwidth 2. Differentiate hard and soft handoff? Hard hand off  Existing connection must be broken before a new connection is established  There is a short break in transmission which can be noticed by the user Soft hand off  A new connection is established before the old one is released 3.How are guard spaces realized between users in CDMA? The guard space between a pair of users in CDMA systems is the orthogonality between their spreading codes. The lower the correlation between any pair of spreading codes is, the better is the user separation. 4. What are the benefits of reservation schemes?  No other station is allowed to transmit during that slot  Avoidance of congestion  Waiting time is clearly known 5. Define a cell. In mobile communication, the coverage area is divided into smaller areas which are each served by it’s own base station. These smaller areas are called cells. 6. What is frequency reuse? Spatially reusing the available spectrum so that the same spectrum can support multiple users separated by a distance is called frequency reuse. 7. Mention the various multiple access schemes used in wireless communication. Frequency Division Multiplexing Access, Time Division Multiplexing Access and Code Division Multiplexing Access 8. What is co-channel interference? Interference between signals from co channels are termed as co channel interference 9. What is adjacent channel interference? Interference resulting from signals which are adjacent in frequency to the desired signal is called adjacent channel interference. 10. Mention the different types of cells. Femto cells, pico cells, micro cells, macro cells and mega cells. 11. What is a picocell? Small cells inside a building that support local indoor networks such as wireless LANs. Size of these cells are in the range of few tens of meters. 12. What is cellular topology? Cellular topology refers to infrastructure topology employing frequency reuse concept. 13.What are the various channel allocation techniques used in cellular communication? Fixed Channel Allocation, dynamic channel allocation and hybrid channel allocation. 14.What is a cluster? The N cells which collectively use the complete set of available frequencies is called a cluster. 15.What are the technical issues in planning of a cellular network?  Selection of frequency reuse pattern for different radio transmission techniques  Physical deployment and radio coverage modelling  Plans to account for the growth of the network  Analysis of the relationship between the capacity, cell size and the cost of infrastructure 16.What is cell splitting? This is the process of subdividing a congested cell into smaller cells, each with it’s own base station and a corresponding reduction in antenna height and transmitter power. Cell splitting 6. Mention the function of the base station.  The base station serves as a bridge between all mobile users in the cell and connects the simultaneous mobile calls via telephone lines or microwave links to the mobile switching center(MSC) 7. What are the functions of MSC? The MSC coordinates the activities of all the base stations and connects the entire cellular system to the PSTN. 8. Define foot print. The actual radio coverage of a cell is known as the foot print. It is determined from field measurements or propagation prediction models. 9. Mention the basic propagation mechanisms, which impact propagation in mobile communication. The basic propagation mechanisms are,  Reflection  Diffraction  Scattering 10.What is reflection? Reflection occurs when a propagating electromagnetic wave impinges upon an object, which has very large dimension when compared to the wavelength of propagating wave. 11. What is diffraction? Diffraction occurs when the radio path between the transmitter and eceiver is obstructed by a surface that has sharp irregularities. 12. What is scattering? Scattering occurs when the medium through which the wave travels consists of objects with dimensions that are small compared to the wavelength and where the number of obstacles per unit volume is large. 13. What are the principles of Cellular Architecture? o Low power Transmitters and Coverage Zones. o Frequency Reuse. o Cell splitting to increase Capacity. o Hand off and Central Control. 14. State the expression used to locate co channel cells. N = i2 + ij + j2 15. Define co channel cells. The cells that operate with the same set of frequencies are referred as co channel cells. 16.Write some features of TDMA?  In TDMA , no. of time slots depends upon modulation technique ,available bandwidth  Data transmission occurs in bursts It uses different time slots for transmission and reception, then duplexers are not required  Adaptive equalization is necessary  Guard time should be minimized 17.Write some features of CDMA?  In CDMA system, many users share the same frequency either TDD or FDD may be used  Channel data rate is high  Multipath fading may be substantially reduced  CDMA uses co –channel cells, it can use macroscopic spatial diversity to provide soft hand off 18. What is near-far effect in wireless network? When used with FM or spread spectrum modulation, it is possible for the strongest user to successfully capture the intended receiver , even when many users are also transmitting . If the closest transmitter is able to capture a receiver because of small propagation path loss, it is called as near –far effect in wireless network 19. What is the primary goal of IEE 802.11? The primary goal of the standard was the specification of a simple, robust, WLAN which offers time bounded and asynchronous services also it should be able to operate with multiple physical layers 20. What are Advantages of wireless LAN?  Flexibility  Planning  Design  Robustness  Quality Service  Cost  Proprietary Solution  Restriction  Safety and Security 21. What are Design Goals of Wireless LAN?  Global Operation  Low Power  License-free Operation  Robust transmission technology  Simplified spontaneous co-operation  Easy to use  protection of investment  Safety and Security  Transparency for application. UNIT-III 1.What is mobility management? Mobility management refers to the operations required for tracking the mobile and restructuring existing connections as it moves. Mobility management consists of Location management and Handoff management 2.Define location management and handoff management. 18. What is Active scanning? Active scanning comprises sending a probe on each channel and waiting for response. Beacon and Probe response contain the information necessary to join the new BSS. 19. What is Passive Scanning? Passive Scanning Simply means listening into the medium to find other networks, i.e. receiving the beacon of another network issued by the synchronization function within an access point 20. What do you mean by Polling? Polling is a strictly centralized scheme with one master and several slave stations. The master can collect the list of stations during the contention phase and can poll these slaves according to many schemes like round robin, random access, reservation scheme etc. UNIT-IV 1. What is MobileIP? Mobility in the network layer is termed as Mobile IP. 2. What are the requirements of Mobile IP?  Compatibility  Transparency  Scalability and Efficiency  Security 3. Define COA. A COA defines the current location of the MN from an IP point of view. All IP packets sent to the MN are delivered to the COA, not directly to the IP address of the MN. Packet delivery toward the MN is done using a tunnel. 4. What is Co-located COA? A COA is called co-located if the Mobile Node temporarily acquired an additional IP address which acts as a COA. This address is now topologically correct, and the tunnel endpoint is at the mobile node. 5. What is encapsulation and decapsulation? Encapsulation is the mechanism of taking a packet consisting of packet header and data and putting it into the data part of a new packet. The reverse operation, taking a packet out of the data part of another packet, is called decapsulation. 6. What is the purpose of GRE? GRE allows the encapsulation of packets of one protocol suite into the payload portion of a packet of another protocol suite. The packet of one protocol suite with the original packet header and data is taken and a new GRE header is prepended. Together this forms the new data part of the new packet. 7. What do you mean by binding request? Any node that wants to know the current location of the mobile node can send a binding request to the home agent/ the home agent can check if the MN has allowed dissemination of its current location. If the HA is allowed to reveal the location it sends back a binding update. 8. What are the enhancements made in DSDV?  DSDV adds to things to the Distance vector algorithm,  Sequence Number  Damping 9. What is Route Maintenance? If a node is continuously sending packets via a route . it has to make sure that the route is held upright. As soon as a node detects problems with the current route, it has to find an alternate route. 10. What is route discovery? A node only tries to discover a route to a destination of it has to send something to this destination and there is currently no known route. If a node needs to discover a route, it broadcasts a route request with a unique identifier and the destination address as parameters. 11. What is DHCP? DHCP stands for Dynamic Host Configuration Protocol, meant for automatic configuration of IP address. 12. What is the purpose of DHCPREQUEST? When the client sends a DHCP discover message the server responds with the DHCP offer message and offers a list of configuration parameters. Now the client can choose among one of the offered configurations and rejecting the others using DHCPREQUEST. 13. What should be done to optimize the route discovery? Too many broadcasts can be avoided by maintaining a counter. A node can cache path fragments from recent requests.A node can also update this cache from packet headers. 14. What are the metrics should be considered while routing?  Number of hops  Interference  Reliability and Error rate 15. What is binding warning? If a node decapsulates a packet for an MN, but it is not the current FA for this MN, this node sends a binding warning to the HA of the MN. The warning contains the IP address of the MN and the address of the node that has tried to send the packet to this MN. The HA should now send binding update to the node that obviously has a wrong COA for the MN. 16. What is the main purpose of registration request in mobile IP? The main purpose of registration is to inform the HA of the current location for correct forwarding of packets. Registration is done by mobility binding 17. What do you mean by mobility binding? The MN sends its registration request containing the COA to the FA which is forwarding the request to the HA. The HA now sets up a mobility binding containing the mobile nodes home IP address and the current COA. 18. What are the services provided by the foreign agent? The FA can provide serveral services to the MN during its visist in the foreign network. The FA can have the COA thus acting as tunnel endpoint and forwarding packets to the MN. Furthermore the FA can be a default router for the MN. The FA can also provide security services. 19. What is Foreign agent COA?  User interaction  Navigation  Context management 8.What is WDP? The wireless datagram protocol operates on top of many different bearer services capable of carrying data. The WDP offers more or less the same services as the UDP.In order to multiplexing and demultiplexing of data the WDP offers a source anddestination port numbers. 9.What is WTA? The wireless telephony application is a collection of telephony specific extension for call and feature control mechanisms, merging data networks and voice networks. 10. What is WAP 2.0? The WAP 2.0 continues to support WAP 1.x protocols but it additionally integrates IP, TCP, TLS and HTTP. It supports WML as well as XHTML with a mobile profile. 11. What are the benefits of using WAP?  Interoperable  Scalable  Efficient 12. What is the use of WCMP? The wireless control message protocol is used to provide the error handling mechanism for WDP. It contains control messages that resemble the ICMP messages for IPV4. it can be used for WDP nodes and gateways. 13. What is WTLS? The Wireless transport layer security can provide different levels of security i.e., privacy, data integrity, and authentication and it has been optimized for low bandwidth, high delay bearer networks. It supports datagram and connection oriented transport layer protocols. 14. Define snooping TCP. The FA buffers all packets with destination mobile host and additionally snoops the packet flow in both directions to recognize acknowledgements is called snoopingTCP. 15. What is WML? Wireless Markup Language is a tag based browsing language for screen management, data input, hyperlinks and navigation support. 16. What is WML script? omplement to WML. Derived from javascript. Provides general scripting capabilities. 17. What is WMLBrowser? WMLBrowser is a library that provides several functions typical for a browser,such as prev to go back one card or refresh to update the context of the user interface. 18. Define WAP WAP is Wireless Application Protocol.It is the basic Objetive of the WAP forum are to bring diverse Internet content and others data service to digital cellular phones and other wireless,mobile terminals.Moreever a protocol suite should enable global wirless communication across different wireless network technologies.All WAP forum solution must be:interoperable,scaleable,efficient,reliable. 19. What is HTTP? The Hypertext transfer protocol is a stateless, lightweight, application level protocol for data transfer between servers and clients. An HTTP transaction consists of an HTTP request issued by a client and an HTTP response from the server. Stateless means that all HTTP transactions independent of each other. 20. What is image scaling? If a page contains a true color, high-resolution picture, this picture can be scaled down to fewer colors, lower resolution, or finally to only the title of the picture. The user can decide to download the picture separately. Further one can offer clipping, zooming, or detail studies to users if they are interested in a part of the picture.
Docsity logo



Copyright © 2024 Ladybird Srl - Via Leonardo da Vinci 16, 10126, Torino, Italy - VAT 10816460017 - All rights reserved