Mobile Communication 2-MARK Questions and Answers

16
IT 72-Mobile Communication 2-MARK Questions and Answers UNIT-I 1. Why are electromagnetic waves with very low frequency not used for data transmission in computer networks? Low frequency has longer wavelength Data rates depends upon the bandwidth 2. Differentiate hard and soft handoff? Hard hand off Existing connection must be broken before a new connection is established There is a short break in transmission which can be noticed by the user Soft hand off A new connection is established before the old one is released 3.How are guard spaces realized between users in CDMA? The guard space between a pair of users in CDMA systems is the orthogonality between their spreading codes. The lower the correlation between any pair of spreading codes is, the better is the user separation. 4. What are the benefits of reservation schemes? No other station is allowed to transmit during that slot Avoidance of congestion Waiting time is clearly known 5. Define a cell. In mobile communication, the coverage area is divided into smaller areas which are each served by it’s own base station. These smaller areas are called cells. 6. What is frequency reuse? Spatially reusing the available spectrum so that the same spectrum can support multiple users separated by a distance is called frequency reuse. 7. Mention the various multiple access schemes used in wireless communication.

description

mobile comm. question bank

Transcript of Mobile Communication 2-MARK Questions and Answers

Page 1: Mobile Communication 2-MARK Questions and Answers

IT 72-Mobile Communication 2-MARK Questions and Answers

UNIT-I

1. Why are electromagnetic waves with very low frequency not used for data transmission in

computer networks?

Low frequency has longer wavelength

Data rates depends upon the bandwidth

2. Differentiate hard and soft handoff?

Hard hand off

Existing connection must be broken before a new connection is established

There is a short break in transmission which can be noticed by the user

Soft hand off

A new connection is established before the old one is released

3.How are guard spaces realized between users in CDMA?

The guard space between a pair of users in CDMA systems is the orthogonality between

their spreading codes. The lower the correlation between any pair of spreading codes is, the

better is the user separation.

4. What are the benefits of reservation schemes?

No other station is allowed to transmit during that slot

Avoidance of congestion

Waiting time is clearly known

5. Define a cell.

In mobile communication, the coverage area is divided into smaller areas which are each

served by it’s own base station. These smaller areas are called cells.

6. What is frequency reuse?

Spatially reusing the available spectrum so that the same spectrum can support multiple

users separated by a distance is called frequency reuse.

7. Mention the various multiple access schemes used in wireless communication.

Page 2: Mobile Communication 2-MARK Questions and Answers

Frequency Division Multiplexing Access, Time Division Multiplexing Access and Code

Division Multiplexing Access

8. What is co-channel interference?

Interference between signals from co channels are termed as co channel interference

9. What is adjacent channel interference?

Interference resulting from signals which are adjacent in frequency to the desired signal

is called adjacent channel interference.

10. Mention the different types of cells.

Femto cells, pico cells, micro cells, macro cells and mega cells.

11. What is a picocell?

Small cells inside a building that support local indoor networks such as wireless LANs.

Size of these cells are in the range of few tens of meters.

12. What is cellular topology?

Cellular topology refers to infrastructure topology employing frequency reuse concept.

13.What are the various channel allocation techniques used in cellular communication?

Fixed Channel Allocation, dynamic channel allocation and hybrid channel allocation.

14.What is a cluster?

The N cells which collectively use the complete set of available frequencies is

called a cluster.

15.What are the technical issues in planning of a cellular network?

Selection of frequency reuse pattern for different radio transmission techniques

Physical deployment and radio coverage modelling

Plans to account for the growth of the network

Analysis of the relationship between the capacity, cell size and the cost of infrastructure

16.What is cell splitting?

This is the process of subdividing a congested cell into smaller cells, each with it’s own

base station and a corresponding reduction in antenna height and transmitter power. Cell splitting

Page 3: Mobile Communication 2-MARK Questions and Answers

increases the capacity of a cellular system since it increases the number of times that channels

are reused.

17.What is cell sectoring?

The co channel interference in a cellular system may be decreased by replacing a single

omni directional antenna at the base station by several directional antennas, each radiating within

a specified sector. By using directional antennas, a given cell will receive interference and

transmit with only a fraction of the available co channel cells. This technique for reducing co

channel interference and thus increasing system performance by using directional antennas is

called sectoring.

18. What is a page?

It is a brief message which is broadcast over the entire service area, usually in a simulcast

fashion by many base stations at the same time.

19. What are the channels used in mobile communication systems?

Forward voice channels (FVC)

Reverse voice channels (RVC)

Forward control channels (FCC)

Reverse Control channels (RCC)

20. What are the basic units of a Cellular system?

Mobile stations

Base stations

Mobile Switching Center (MSC) or Mobile Telephone Switching Office (MTSO).

21. What are the limitations of conventional mobile telephone system?

Limited service capability

Poor service performance

Inefficient frequency spectrum utilization

22. What are the disadvantages of cellular systems with small cells?

Requires complex infrastructure

Requires frequent hand-over

Page 4: Mobile Communication 2-MARK Questions and Answers

Involves complicated frequency planning

UNIT-II

1.Is IEEE 802.11 and Wi-Fi same?State the purpose of WiFi

Ans: No ,WiFi is wireless internet. The laptop has an internal wireless card so it can be

connected to wireless routers.No need to have an Ethernet cable to connect to the web.

2.What are the various types of wireless network topologies?

Infrastructure network topology and ad hoc topology.

3.What are the classifications of Wireless technologies and systems?

Cellular mobile radio systems

Cordless telephones

Wide-area wireless data systems

High-speed WLANs

Paging/messaging systems

Satellite-based mobile systems

4. Define BCA.

Borrowing Channel Allocation is a method by which more frequencies are allotted

dynamically for high traffic cells.

5.Why 800 MHz frequency is selected for mobiles?

Fixed Station Services - 30 MHz to 100 MHz

Television Broadcasting - 41 MHz to 960 MHz

FM Broadcasting - 100 MHz

Air to Ground system - 118 MHz to 136 MHz

Maritime mobile services - 160 MHz

Military Aircraft use - 225 MHz to 400 MHz

Frequency bands between 30 MHz to 400 MHz is crowded with large number of services

and above 10 GHz is not used due to propagation path loss, multipath fading and

improper medium due to rain activity. So 800 MHz is chosen for mobile communication.

Page 5: Mobile Communication 2-MARK Questions and Answers

6. Mention the function of the base station.

The base station serves as a bridge between all mobile users in the cell and connects the

simultaneous mobile calls via telephone lines or microwave links to the mobile switching

center(MSC)

7. What are the functions of MSC?

The MSC coordinates the activities of all the base stations and connects the entire cellular

system to the PSTN.

8. Define foot print.

The actual radio coverage of a cell is known as the foot print. It is determined from field

measurements or propagation prediction models.

9. Mention the basic propagation mechanisms, which impact propagation in mobile

communication.

The basic propagation mechanisms are,

Reflection

Diffraction

Scattering

10.What is reflection?

Reflection occurs when a propagating electromagnetic wave impinges upon an object,

which has very large dimension when compared to the wavelength of propagating wave.

11. What is diffraction?

Diffraction occurs when the radio path between the transmitter and receiver is obstructed

by a surface that has sharp irregularities.

12. What is scattering?

Scattering occurs when the medium through which the wave travels consists of objects

with dimensions that are small compared to the wavelength and where the number of obstacles

per unit volume is large.

13. What are the principles of Cellular Architecture?

o Low power Transmitters and Coverage Zones.

Page 6: Mobile Communication 2-MARK Questions and Answers

o Frequency Reuse.

o Cell splitting to increase Capacity.

o Hand off and Central Control.

14. State the expression used to locate co channel cells.

N = i2 + ij + j2

15. Define co channel cells.

The cells that operate with the same set of frequencies are referred as co channel cells.

16.Write some features of TDMA?

In TDMA , no. of time slots depends upon modulation technique ,available bandwidth

Data transmission occurs in bursts It uses different time slots for transmission and

reception, then duplexers are not required

Adaptive equalization is necessary

Guard time should be minimized

17.Write some features of CDMA?

In CDMA system, many users share the same frequency either TDD or FDD may be used

Channel data rate is high

Multipath fading may be substantially reduced

CDMA uses co –channel cells, it can use macroscopic spatial diversity to provide soft

hand off

18.What is near-far effect in wireless network?

When used with FM or spread spectrum modulation, it is possible for the strongest user

to successfully capture the intended receiver , even when many users are also transmitting . If the

closest transmitter is able to capture a receiver because of small propagation path loss, it is called

as near –far effect in wireless network

19.What is the primary goal of IEE 802.11?

The primary goal of the standard was the specification of a simple, robust, WLAN which

offers time bounded and asynchronous services also it should be able to operate with multiple

physical layers

Page 7: Mobile Communication 2-MARK Questions and Answers

20.What are Advantages of wireless LAN?

Flexibility

Planning

Design

Robustness

Quality Service

Cost

Proprietary Solution

Restriction

Safety and Security

21.What are Design Goals of Wireless LAN?

Global Operation

Low Power

License-free Operation

Robust transmission technology

Simplified spontaneous co-operation

Easy to use

protection of investment

Safety and Security

Transparency for application.

UNIT-III

1.What is mobility management?

Mobility management refers to the operations required for tracking the mobile and

restructuring existing connections as it moves. Mobility management consists of Location

management and Handoff management

2.Define location management and handoff management.

Page 8: Mobile Communication 2-MARK Questions and Answers

Location management refers to the activities a wireless network should perform in order

to keep track of where the mobile is.

Handoff management handles the messages required to make the changes in the fixed

network to handle the change in location during a ongoing communication.

3.What is meant by GPRS?

General packet radio services, a technology for radio transmission of small packets of

data, esp. between cellular phones and the Internet

4.What do you meant by roaming?.

Extending of connectivity service in a location that is different from the home location

where the service was registered. Roaming ensures that the wireless device is kept connected to

the network, without losing the connection.

5. What are types of Handover?

Intra-cell handover Inter-cell , intra- BSC handover Inter-BSC, intra-MSC handover Inter

MSC handover

6.What are subsystems in GSM system?

Radio subsystem(RSS)

Network & Switching subsystem(NSS)

Operation subsystem(OSS)

7.What are the information in SIM?

card type, serial no, list of subscribed services

Personal Identity Number(PIN)

Pin Unlocking Key(PUK)

An Authentication Key(KI)

8. What is GSM?

GSM stands for Global System for mobile Communication. This is the most successful

digital mobile telecommunication system.this is second generation and it permits integration of

voice and data services.

9.What are the basic elements of telecommunication systems?

Transmitter – it takes the information and converts into signal

Transmission medium – it carries the signal

Receiver – receives the signal and converts it back into usable information.

Page 9: Mobile Communication 2-MARK Questions and Answers

10. List the databases of NSS in GSM?

Home location register

Visitor location register

Authentication center

11. What are the functions of OSS in GSM?

Manage all charging and billing procedures

Manage all mobile equipment in the system

12. What are the services offered by the GSM?

There are three user services offered by GSM, they are

Bearer or data service

Telephone service

Supplementary ISDNservice

13. What are the logical channels in GSM?

Traffic channels(TCH)

Control Channels(CCH)

14. What are the security services of GSM?

Access control and authentication

Confidentiality

Anonymity

15. What is MSC ?

Main Service Channel (MSC) carries all user data.eg. audio, multimedia data.

16.What is FIC ?

The Fast Information Channel(FIC) contains Fast Information Block(FIB) with 256bits

each(16 bit checksum). An FIC carries all control information which is required for interpreting

the configuration and content of the MSC.

17.What is meant by beacon?

A beacon contains a timestamp and other management information used for power

management and roaming. e.g., identification of the base station subsystem(BSS)

Page 10: Mobile Communication 2-MARK Questions and Answers

18.What is Active scanning?

Active scanning comprises sending a probe on each channel and waiting for response.

Beacon and Probe response contain the information necessary to join the new BSS.

19. What is Passive Scanning?

Passive Scanning Simply means listening into the medium to find other networks, i.e.

receiving the beacon of another network issued by the synchronization function within an access

point

20.What do you mean by Polling?

Polling is a strictly centralized scheme with one master and several slave stations. The

master can collect the list of stations during the contention phase and can poll these slaves

according to many schemes like round robin, random access, reservation scheme etc.

UNIT-IV

1. What is MobileIP?

Mobility in the network layer is termed as Mobile IP.

2. What are the requirements of Mobile IP?

Compatibility

Transparency

Scalability and Efficiency

Security

3. Define COA.

A COA defines the current location of the MN from an IP point of view. All IP packets

sent to the MN are delivered to the COA, not directly to the IP address of the MN. Packet

delivery toward the MN is done using a tunnel.

4. What is Co-located COA?

A COA is called co-located if the Mobile Node temporarily acquired an additional IP

address which acts as a COA. This address is now topologically correct, and the tunnel endpoint

is at the mobile node.

5. What is encapsulation and decapsulation?

Page 11: Mobile Communication 2-MARK Questions and Answers

Encapsulation is the mechanism of taking a packet consisting of packet header and data

and putting it into the data part of a new packet. The reverse operation, taking a packet out of the

data part of another packet, is called decapsulation.

6. What is the purpose of GRE?

GRE allows the encapsulation of packets of one protocol suite into the payload portion of

a packet of another protocol suite. The packet of one protocol suite with the original packet

header and data is taken and a new GRE header is prepended. Together this forms the new data

part of the new packet.

7. What do you mean by binding request?

Any node that wants to know the current location of the mobile node can send a binding

request to the home agent/ the home agent can check if the MN has allowed dissemination of its

current location. If the HA is allowed to reveal the location it sends back a binding update.

8. What are the enhancements made in DSDV?

DSDV adds to things to the Distance vector algorithm,

Sequence Number

Damping

9. What is Route Maintenance?

If a node is continuously sending packets via a route . it has to make sure that the route is

held upright. As soon as a node detects problems with the current route, it has to find an alternate

route.

10. What is route discovery?

A node only tries to discover a route to a destination of it has to send something to this

destination and there is currently no known route. If a node needs to discover a route, it

broadcasts a route request with a unique identifier and the destination address as parameters.

11. What is DHCP?

DHCP stands for Dynamic Host Configuration Protocol, meant for automatic

configuration of IP address.

12. What is the purpose of DHCPREQUEST?

Page 12: Mobile Communication 2-MARK Questions and Answers

When the client sends a DHCP discover message the server responds with the DHCP

offer message and offers a list of configuration parameters. Now the client can choose among

one of the offered configurations and rejecting the others using DHCPREQUEST.

13. What should be done to optimize the route discovery?

Too many broadcasts can be avoided by maintaining a counter. A node can cache path

fragments from recent requests.A node can also update this cache from packet headers.

14. What are the metrics should be considered while routing?

Number of hops

Interference

Reliability and Error rate

15. What is binding warning?

If a node decapsulates a packet for an MN, but it is not the current FA for this MN, this

node sends a binding warning to the HA of the MN. The warning contains the IP address of the

MN and the address of the node that has tried to send the packet to this MN. The HA should now

send binding update to the node that obviously has a wrong COA for the MN.

16. What is the main purpose of registration request in mobile IP?

The main purpose of registration is to inform the HA of the current location for correct

forwarding of packets. Registration is done by mobility binding

17. What do you mean by mobility binding?

The MN sends its registration request containing the COA to the FA which is forwarding

the request to the HA. The HA now sets up a mobility binding containing the mobile nodes home

IP address and the current COA.

18. What are the services provided by the foreign agent?

The FA can provide serveral services to the MN during its visist in the foreign network.

The FA can have the COA thus acting as tunnel endpoint and forwarding packets to the MN.

Furthermore the FA can be a default router for the MN. The FA can also provide security

services.

19. What is Foreign agent COA?

Page 13: Mobile Communication 2-MARK Questions and Answers

The COA could be located at the FA, ie., the COA is an IP address of the FA. Thus the

FA is the tunnel end point and forwards packets to the MN. many MN using the FA can share

this COA as common COA.

20. Mention the steps to deliver the packet in MobileIP.

Identification of current location of MN

Encapsulation and tunnelling of packets by HA

Decapsulation of packets by FA

MN receiving the packet.

21. Define tunnelling.

Tunnel establishes a virtual pipe for data packets between tunnel entry and tunnel

endpoint.Packets entering the tunnel are forwarded inside the tunnel and leave the tunnel

unchanged.

22. Why is routing in multihop adhoc networks complicated?

Traditional routing algorithms will not work efficiently

Centralised approaches will not work

Forwarding a packet in the case of unknown topology is flooding.

23. What are the two parts of DSR?

Route Discovery

Route Maintenance

24. What is proactive routing?

It maintains fresh lists of destinations and their routes by periodically distributing routing

tables throughout the network.

25. What is Reactive routing?

It finds a route on demand by flooding the network with route request packets.

26. What is multicasting?

The delivery of packets from one or more senders to a group of receivers.

Page 14: Mobile Communication 2-MARK Questions and Answers

UNIT-V

1.What is WAP?

Wireless application protocol(WAP) is a common effort of many companies and

organizations to set up a framework for wireless and mobile web access using many different

transport systems. Eg. GSM, GPRS, UMTS.

2. List the interfaces used in WAP architecture

Transport layer service access point

Security service access point

Transaction service access point

Appication service access point

3. What is the use of WAE?

The application layer with the Wireless Application Environment (WAE) offers a

framework for the integration of different www and mobile telephony application.

4.What are the benefits of using WTP?

It offers several advantages to higher layers, including an improved reliability over

datagram services, improved efficiency over connection oriented service, and support for

transaction oriented services such as web browsing.

5.How does the WTP achieves reliability?

The reliability can be achieved by duplicate removal, retransmission, acknowledgements

and unique transaction identifiers.

6.What are the features of WSP?

Session management

Capability management

Content management

7.List the basic features of WML?

The WML includes serveral basic features such as

Text and images

Page 15: Mobile Communication 2-MARK Questions and Answers

User interaction

Navigation

Context management

8.What is WDP?

The wireless datagram protocol operates on top of many different bearer services capable

of carrying data. The WDP offers more or less the same services as the UDP.In order to

multiplexing and demultiplexing of data the WDP offers a source anddestination port numbers.

9.What is WTA?

The wireless telephony application is a collection of telephony specific extension for call

and feature control mechanisms, merging data networks and voice networks.

10.What is WAP 2.0?

The WAP 2.0 continues to support WAP 1.x protocols but it additionally integrates IP,

TCP, TLS and HTTP. It supports WML as well as XHTML with a mobile profile.

11.What are the benefits of using WAP?

Interoperable

Scalable

Efficient

12. What is the use of WCMP?

The wireless control message protocol is used to provide the error handling mechanism

for WDP. It contains control messages that resemble the ICMP messages for IPV4. it can be used

for WDP nodes and gateways.

13.What is WTLS?

The Wireless transport layer security can provide different levels of security i.e., privacy,

data integrity, and authentication and it has been optimized for low bandwidth, high delay bearer

networks. It supports datagram and connection oriented transport layer protocols.

14.Define snooping TCP.

The FA buffers all packets with destination mobile host and additionally snoops the

packet flow in both directions to recognize acknowledgements is called snoopingTCP.

Page 16: Mobile Communication 2-MARK Questions and Answers

15.What is WML?

Wireless Markup Language is a tag based browsing language for screen management,

data input, hyperlinks and navigation support.

16. What is WML script?

Complement to WML. Derived from javascript. Provides general scripting capabilities.

17.What is WMLBrowser?

WMLBrowser is a library that provides several functions typical for a browser,such as

prev to go back one card or refresh to update the context of the user interface.

18.Define WAP

WAP is Wireless Application Protocol.It is the basic Objetive of the WAP forum are to

bring diverse Internet content and others data service to digital cellular phones and other

wireless,mobile terminals.Moreever a protocol suite should enable global wirless communication

across different wireless network technologies.All WAP forum solution must

be:interoperable,scaleable,efficient,reliable.

19.What is HTTP?

The Hypertext transfer protocol is a stateless, lightweight, application level protocol for

data transfer between servers and clients. An HTTP transaction consists of an HTTP request

issued by a client and an HTTP response from the server. Stateless means that all HTTP

transactions independent of each other.

20.What is image scaling?

If a page contains a true color, high-resolution picture, this picture can be scaled down to

fewer colors, lower resolution, or finally to only the title of the picture. The user can decide to

download the picture separately. Further one can offer clipping, zooming, or detail studies to

users if they are interested in a part of the picture.