Sie sind auf Seite 1von 16

2MARK QUESTION WITH ANSWERS UNIT I PHYSICAL AND WIRELESS MAC LAYER ALTERNATIVES 1. What is mu ti!

a""i#" m$%u ati$&' MCM takes the advantage of orthogonality of the channel and develops efficient implementation using FFT algorithm. (A)" 2**+, 2. What %$ -$u u&%#"sta&% a.$ut UVW t#!h&$ $/-' It is used in short range communication. In this technique, a very narrow width and low power pulse are used for transmission. The spectrum of this pulse occupies wideband in !". (A)" 2**+, 0. H$1 is a 1i"# #ss &#t1$"2 %i33#"#&t 3"$m a 1i"#% &#t1$"2' Stat# at #ast t1$ %i33#"#&!#s. # wired medium can provide reliable, guided link which conducts an electric signal associated with the transmission of information from one fi$ed terminal to another. The wireless medium is unreliable. It has low bandwidth. Ts supports mobility. %ireless transmission share the same medium which in nothing but air. (D#! 2**+, 4. What is th# s)#!ia "#5ui"#m#&t i&6$ 6#%7 1hi # i&t#/"ati$& $3 6$i!# a&% %ata t"a33i! is !a""i#% $ut' Multiuser access is the key problem in integrated systems. &oice and data oriented networks use different multiple access methods. In a wireless environment, the simple approach is to assign different frequency bands to voice and data packets. (D#! 2**+, 8. What a"# th# a%6a&ta/#s $3 UVW )u s# t"a&smissi$&' It is used in short range communication. In '%( pulse transmission stable received power is obtained with minimum fading effects. (Ma- 2**9, :. W"it# sh$"t &$t#s $& OOK m$%u ati$&. ))* means )+ )FF keying modulation. ,resence of carrier wave is specified as -. #bsence of carrier wave is specified as .. (Ma- 2**9, ;. Th# CPSD s-st#m us#s <MSK t$ )"$6i%# a %ata "at# $3 19.2 K.)s $6#" a 0* KH= !ha&&# 7 3i&% th# >a&%1i%th #33i!i#&!- $3 th# s-st#m. ../0bits1sec1!". +. What t-)# $3 a!!#ss t#!h&$ $/i#s a"# us#% 3$" th# 3$ $1i&/ s-st#ms' (a, AMPS (., <SM (!, IMT 2*** (%, ED<E 2lotted #)3!# is used for 2M, %C4M# is used for IMT 5.... (D#! 2**9, (D#! 2**9,

9. D#3i&# tim# a&% 3"#5u#&!- %i6#"sit-. Time diversity6 In the wireless medium, due to reflection, diffraction and scattering, the received signal arrives from different paths. 2o the signal arrive at different time delays. The signals coming from different paths are e$posed to different fading patterens. Frequency diversity6 In frequency diversity, the signal is transmitted at different frequencies. )nly a portion of the transmitted signal is damaged due to frequency selective fading. 74ec 5..89 1*. E?) ai& h$1 mu ti!a""i#" m$%u ati$& im)"$6#s s-st#m !a)a.i it-. In multicarrier modulation only less distortion is introduced. In MCM system, the received signal power is measured in different sub channels and the modulation or coding of the sub carrier is changed to improve the performance. 74ec 5..89 11. What is sh$"t %ista&!# .as#.a&% t"a&smissi$&' In baseband transmission, the digital signal is transmitted without modulating with a carrier. (Ma- 2*1*, 12. What is u&i5u# a.$ut 6$i!# $"i#&t#% 1i"# #ss &#t1$"2s' F4M#, T4M#, C4M# are designed for access to circuit switched voice oriented networks. (Ma- 2*1*, 10. What a"# th# 3#atu"#s $3 6$i!# .a&% m$%#m' !igh bandwidth efficiency, reduction connect time, It isnot necessary for additional circuits to support the application at hand. 14. What a"# th# 3a!t$"s i&3 u#&!i&/ ACI' Characteristics of transmit and receive filers, +on:linearity In transmitter, ;oll:off characteristics of transmitted signal spectrum. 18. What a"# th# imitati$&s $3 MCM' Implementation is difficult, lilitations in transmitted power, In between two )F4M pulses, the timing pulse is applied to avoid the overlap between consecutive symbols. 2o data rate is reduced. 1:. What a"# th# 6a"i$us %i6#"sit- t#!h&i5u#s' 2pace diversity, Time diversity, Frequency diversity. 1;. What is MLSE' M32< stands for Ma$imum 3ikelihood 2equence <stimation.

1+. What is D@E' 4F< means 4ecision Feedback <stimation. 19. What a"# th# t1$ /"$u)s $3 "a&%$m a!!#ss m#th$%s 3$" m$.i # %ata s#"6i!#' #3)!# and C2M# are the two groups of random access methods. 2*. What is RAALOHA' ;:#3)!# means ;eservation:#3)!#. Throughput of slotted #3)!# is very low for wireless data applications. 2o it is combined with T4M# system. It is known as ;:#3)!# protocol. 21. What is L>T' 3(T means 3isten (efore Talk. 22. What is &$&A)#"sist#&t m#!ha&ism' #fter sensing the channel, the terminal starts sensing another sensing after some time. It is known as non:persistent sensing mechanism. 20. What is )#"sist#&t m#!ha&ism' If the terminal sense the channel until the channel becomes free, this is known as persistent mechanism. 24. What is >TMA' It means (usy Tone Multiple #ccess. 28. What is DSMA' It means 4ata 2ense Multiple 2ense.

UNIT II WIRELESS NETWORK PLANNIN< AND OPERATION 1. D#3i&# C$A!ha&&# a&% a%Ba!#&t !ha&&# i&t#"3#"#&!#. #CI is the interference that a transmitting radio presents to the user channels immediately above and below the user=s channel. (Ma- 2**+, 2. What is Pi&/AP$&/ #33#!t' If the mobile station frequently crosses the boundary of location. Then, there is a effect of continually switching between two location areas. This is known as ,ing:,ong effect.(Ma-2**+, 0. What is a& a% h$! &#t1$"2 t$)$ $/-' It is applied to reconfigurable networks. These networks are operated without fi$ed infrastructure. (D#! 2**+, 4. What is !# s) itti&/' This is the concept to split cells into smaller cells and to permit additional channels in the smaller cells. (D#! 2**+, 8. What is m#a&t .- $6#" ai% !# !$&!#)t i& !# s) itti&/' Micro cells coming under the category of overlay network which is overlaid on the top of macro cellular network is known as underlay network. (Ma- 2**9, :. M#&ti$& th# !i"!umsta&!#s that )"#3#" t#m)$"a"- !ha&&# .$""$1i&/ i& !# u a" &#t1$"2s. !igh traffic cells return the borrowed channels after completing the call. If the traffic is not uniform one, then the blockage rate is ranged. (Ma- 2**9, ;. @i&% th# &um.#" $3 simu ta&#$us us#"s 3)" a !# u a" t$)$ $/- i3 W is th# t$ta a6ai a. # s)#!t"um7 > is th# .a&%1i%th &##%#% )#" us#"7 N is th# 3"#5u#&!- "#us# 3a!t$" a&% m is th# &um.#" $3 !# s "#5ui"#% t$ !$6#" a& a"#a. n > 7m?%917(?+9 +. E?) ai& C!# >"#athi&/D i& CDMA &#t1$"2s. In C4M#, the boundary of a cell in not fi$ed. It depends the value of < b1+t. If we consider the uplink value which is observed at a (2, the number of traffic channels on the uplink is increased. The hand:off boundary shifts closer to the (2. This effect is known aqs cell breathing. (D#! 2**9, 9. I3 a SIR E 1+%. is "#5ui"#% 3$" satis3a!t$"- )#"3$"ma&!# $3 a !# u a" s-st#m. What is th# 3"#5u#&!- "#us# 3a!t$" a&% ! ust#" that sh$u % .# us#% 3$" ma?ima !a)a!it- i3 th# )ath $ss #?)$&#&t &E47 Assum# th#"# a"# : !$A!ha&&# s a&% a a"# at #5ua %ista&!#. 2r > -.@/A 5. log + (Ma- 2**9,

!ere 2r > -B db , + > cluster si"e. 1*. E&um#"at# th# )"$)#"ti#s $3 th# CDMA !$%#.

(D#! 2**9,

C4M# can accommodate various wireless users with different band width requirements, switching methods etc. (Ma- 2*11, 11. Wh- is !# s) itti&/ %$&#' It is an architectural method of capacity e$pansion. 12. What is DCA' 4C# means 4ynamic Channel #llocation. 10. What a"# th# t1$ t$)$ $/i#s us#% i& 1i"# #ss &#t1$"2s' Infrastructure network topology and #d:hoc network topology. 14. What a"# th# t1$ t-)#s $3 i&t#"3#"#&!# i& !# u a" a"!hit#!tu"#' Co:channel Interference and #dCacent channel interferences. 18. What is th# 3$"mu a t$ 3i&% &um.#" $3 simu ta&#$us us#"s' n > 7m?%9 1 7(?+9 where %> total spectrum available ( > bandwidth needed m > number of calls needed to cover an area + > frequency reuse n > the number of simultaneous users. 1:. What a"# th# 6a"i$us !# sha)#s' <quilateral triangle, square, ;egular he$agon. 1;. What a"# th# 6a"i$us a"!hit#!tu"a m#th$%s $3 !a)a!it- #?)a&si$&' Cell splitting, using directional antennas, 3ee=s micro cell method, 'sing overlaid cells, using smart antennas. 1+. What a"# th# a%6a&ta/#s a&% %isa%6a&ta/#s $3 th# t#!h&i5u# usi&/ %i"#!ti$&a a&t#&&as 3$" !# s#!t$"i&/' A%6a&ta/#sF This method is less e$pensive. In this method, the average transmitted power from the mobile station is reduced. Disa%6a&ta/#sF (Ma- 2*1*, (Ma- 2*1*,

This method is less effective. 19. What a"# th# 6a"i$us !ha&&# a $!ati$& t#!h&i5u#s' FC#, 4C# D !C#. 2*. What a"# th# !ha&&# .$""$1i&/ t#!h&i5u#s' In one technique, high traffic cells borrow channel frequencies from low traffic cells. It is maintained until the change in traffic occur. It is known as channel borrowing technique. In simple borrowing technique, all the channels are available for borrowing. 21. What a"# th# im)$"ta&t 3u&!ti$&s i& m$.i # $)#"ati$&' Mobility management 3ocation management ;adio resources and power management 2ecurity 22. What is ha&%A$33 ma&a/#m#&t' 4uring the conservation, if the mobile is moving, then some steps are taken to continue the call which is known as hand:off management. 20. What a"# th# t-)#s $3 ha&%$33 m#th$%$ $/i#s' !ard handoff 2eamless handoff 24. What is MCHO' It means Mobile Controlled !andoff.

UNIT III WIRELESS WAN 1. Wh- is )$1#" !$&t"$ im)$"ta&t i& CDMA' Fast power control mechanism is needed to minimi"e interference and soft handoff. (Ma- 2**+, 2. List $ut th# 3$u" a-#"s i&6$ 6#% i& SMS. Four layers are The application layer The transfer layer The relay layer The link layer 0. Wh- is WACDMA' E ,, means Third eneration ,artnership ,roCect. Its second edition is known as E ,,5. E ,, specified is referred as %C4M#. (D#! 2**+, 4. H$1 ma&- )h-si!a !ha&&# s a"# a6ai a. # i& #a!h ISA98 !a""i#" a&% 1hat t-)# $3 !$%i&/ s#)a"at#s th#s# !ha&&# s 3"$m a&$th#"' The I2:8F forward channel consists of four type of logical channels, namely pilot channel, synchroni"ation channel, paging channel and traffic channels. These channels are separated from one another by using different spreading codes. (D#! 2**+, 8. Is CDMA a!!#ss m#th$% $" ai" i&t#"3#"#&!#' Gusti3- -$u" a&s1#". C4M# appears increasingly attractive as the wireless access method of choice. Integration of various types of traffic is readily accomplished in a C4M# environment as co: e$istence in such as an environment doesnot require any specific co:ordination among user terminals. C4M# is both an access method and air interface. (Ma- 2**9, :. What is m#a&t .- C!a)a!it- $& %#ma&%D )"i&!i) # i& <PRS &#t1$"2s' GCapacity on demand= principle6 It means that the capacity allocation for ,;2 is based on the actual need for packet transfer. ,;2 does not permanently allocated physical channels. (Ma- 2**9, ;. What a"# VLR a&% HLR7 1h#"# th#- a"# )h-si!a - $!at#% a&% 1h- 1# &##% th#m' (Ma- 2**+,

They are physically located in (ase station. !3; is database software that handles the management of the mobile subscriber account. &3; is a temporary software similar to the !3; identifying the subscriber=s visiting inside the coverage area of an M2C. (D#! 2**9, +. Disti&/uish .#t1##& s$3t ha&%$33 a&% ha"% ha&%$33. !ard handoff6 It occurs when the mobile terminal completely breaks connection with the old (2 before connecting to the new (2 and synchroni"ing itself to it. 2oft handoff6 It refers to the process by which an M2 is in communication with multiple candidate base stations before finally deciding to communicate its traffic through one of them. (D#! 2**9, 9. H$1 is 1a sh !$%# us#% i& 3$"1a"% a&% "#6#"s# ISA98 CDMA !ha&&# ' &arious walsh codes are used for spreading various channels in I2:8F. For pilot channel, "ero walsh code. (Ma- 2*11, 1*. D"a1 th# t-)i!a 3"am# 3$"mat $3 1i"# #ss ATM. %ireless !eader #TM !eader 7 Fbytes9 #TM ,ayload 7 0B bytes9 %ireless Trailer (Ma- 2*11, 11. What is CDMA 2***' It proposes multiples of -.55BBMcps chip rates. Mainly it employs E./B/0 Mcps. It is more compatible with I2:8F. In I2:8F D C4M# 5..., the (2s operate synchronously. Frame length is 5.ms. (Ma- 2*1*,

12. What a"# th# 3$u" m#!ha&ism us#% i& 6$i!#A$"i#&t#% 1i"# #ss &#t1$"2s that a $1 a m$.i # t$ #sta. ish a&% mai&tai& a !$&&#!ti$& 1ith th# &#t1$"2' ;egistration Call establishment !and over or !and off 2ecurity 10. What is Ha&%A$33 a&% 1hat a"# th# t-)#s $3 Ha&%$33' !and:off is the process of switch over to weak signal (2 to the strong signal (2. There are two types of !and:off. They are i9 Internal and ii9 <$ternal. 14. What is CM$.i # Hassist#%D ha&%$33' The M2 monitors the ;22 from the (CC!s of the neighboring cells and report these values to the M2C using 2#CC!. This is called H Mobile:assistedI !and:off.

18. What a"# th# a-#"s $3 )"$t$!$ sta!2' There are three layers of protocol stack. 3ayer -6 ,hysical layer 3ayer 56 4ata 3ink layer 74339 3ayer E6 +etworking or Messaging layer. 1:. What a"# th# t-)#s $3 $/i!a !ha&&# s' There are two types of logical channels. -. Traffic channels 5. Control channels 1;. D"a1 th# 3"am# 3$"mat $3 DLL i& LAPDm. #ddress field 7 B bits9 Control field 7B bits9 3ength Indicator 7 Bbits9 Information bits 7variable9 Fill in bits 7 variable9

1+. What a"# th# ISA98 3$"1a"% !ha&&# s' The I2:8F forward channel consists of four channels. ,ilot channel 2ynchroni"ation channel ,aging channel Traffic channel 19. What is th# m$%u ati$& s!h#m# us#% i& 3$"1a"% a&% "#6#"s# !ha&&# s' Forward channel6 J,2* ;everse channel6 )J,2* 2*. W"it# th# Wa sh !$%# us#% 3$" #&!$%i&/ i& ISA98. The %alsh code used for encoding is6 i > C. A 5C- A 0C5 A BCE A -/C0 A E5CF 21. What is th# us# $3 a!!#ss !ha&&# a&% s)#!i3- its %ata "at#' The access channel is used to transmit the control information such as call origination, response to a page from M2 to the (2.

22. What a"# th# imitati$&s $3 <PRS' There is only a limited cell capacity for all users. 2peed is lower. %hen Ms is not available, there is no storage and forward service. 20. What a"# th# t1$ t-)#s $3 s#"6i!#s )"$6i%#% .- SMS' 4elivery service if the destination M2 is active Forward service if the M2 is active. 24. What is PTP s#"6i!#' M2 may send a message to another M2 using a handset keypad. 2M2 messages can be transmitted via dial:up to the service centre and Internet. 28. What a"# th# m$.i # a)) i!ati$& )"$t$!$ ' %ireless #pplication ,rotocol 7%#,9 i: Mode

UNIT IV WIRELESS LAN 1. Nam# th# 3i6# maB$" !ha #&/#s 3$" im) #m#&tati$& $3 1i"# #ss LANs that #?ist#% 3"$m th# .#/i&&i&/ $3 this i&%ust"-. Comple$ity and cost (andwidth Coverage Interference Frequency #dministration. 2. What is 1i"# #ss ATM' %ireless #TM that intended to design a wideband local access that integrated with the #TM backbone to provide an end:to:end solution. (D#! 2**+, 0. What is a HAN' !#+ refers to !ome #rea +etwork. (D#! 2**+, (Ma- 2**+,

4. H$1 %$#s IEEE +*2.11a PHY a-#" %i33#" 3"$m that $3 IEEE +*2.11 PHY a-#"' The physical layer of I<<< B.5.--a is based on an )F4M transmission that operated in the F !" ':+II bands. I<<< B.5.-- is based on 4222 standard. (Ma- 2**9, 8. Stat# th# "# ati$&shi) .#t1##& HYPERLAN2 a&% WATM. !I,<;3#+:5 aims at higher data rated and intends to accommodate #TM as well as I, type access. (Ma- 2**9, :. What a"# th# %i33#"#&!#s .#t1##& th# +*2.11a a&% HYPERLANA2' The !K,<;3#+:5 standard uses the same ,!K layer as B.5.--a with a M#C that supports the needs of the cellular telephone industry in supporting mechanisms for tariff, integration with the e$isting cellular systems and providing J)2. (D#! 2**9, ;. D#3i&# /"a%# $3 s#"6i!# a&% !$6#"a/# !a)a!it- 1ith "#s)#!t t$ <#$ $!ati$& s-st#ms. In geo location systems, the probability that a location request will not be fulfilled is a measure of the grade of service. In geo location systems, coverage corresponds to the availability of a sufficient number of T)#, #)#, ;22 or fingerprint measurements to perform a location measurement. (D#! 2**9, +. What a"# th# &#1 # #m#&ts a%%#% t$ <SM t$ su))$"t <PRS' ,;2 reuses the 2M architecture and also added new networks such as ,;2 support nodes that are responsible for delivery and routing of data packets between the mobile ststion and e$ternal packet network. (Ma- 2*11,

9. D"a1 th# IEEE+*2.11 . MAC 3"am# 3$"mat Frame control 4uration 4# 2# (22I4 2equence control Frame control FC2 (Ma- 2*11, 1*. What is ATM' #TM: #synchronous Transfer Mode. 11. What is th# a%6a&ta/# $3 HYPER LAN 2' It supports both connectionless and connection oriented services and aims at I, and #TM type services at high data rates for indoor and outdoor applications. (Ma- 2*1*, 12. What a"# th# a%6a&ta/#s $3 1i"# #ss LAN' o Fle$ibility o ,lanning o ;obustness o 4esign o Cost 10. What a"# th# )"$)#"ti#s $3 ISM .a&%' Frequencies of operation6 8.5:85B M!" 5.0: 5.0BEF !" F.@5F L F.B@F !" 14. M#&ti$& th# th"## .asi! "u #s $3 s)#!t"um. 3isten before talk 3ow transmitter power (Ma- 2*1*,

;estricted duration of transmission.

18. Stat# th# 3#atu"#s $3 WLAN. ,ower management to save the battery power. !andling of hidden nodes. #bility to operate world wide. 1:. List th# t-)#s $3 a"!hit#!tu"# us#% i& IEEE +*2.11 Infrastructure based. #d:hoc based. 1;. What a"# th# !ha"a!t#"isti!s $3 DSSS' ;obustness against interference Insensitivity to multipath propagation. Implementation is comple$ compared to F!22. 1+. What is m#a&t .- HPNA' !,+# means H !ome ,hone +etwork #llianceI. It is an <thernet compatible 3#+ over random tree home phone lines. 19. What is m#a&t .- HAN' !#+ means H!ome #rea +etworkI. It interconnect a variety of home appliances and enable them to access the internet through a central home gateway. 2*. What is m#a&t .- Data i&2 a-#"' 43C layer provides the logical link between an access point and the mobile terminals over the )F4M physical layer.

UNIT V WPAN AND <EOLOCATION SYSTEMS 1. What is WPAN' It refers to wireless ,#+. ,#+ means ,ersonal #rea +etwork. 2. What a"# th# .asi! # #m#&ts $3 a 1i"# #ss /#$ $!ati$& s-st#ms' %ireless network infrastructure. +etwork Mobile terminal 0. What is > u#t$$th' (luetooth is an open specification for short range wireless voice and data communications that was originally developed for cable replacement in ,#+. (D#! 2**+, 4. What a"# th# m#"its $3 1i"# #ss /#$ $!ati$&' In geolocation systems, some of the performance issued are still although new performance bench marks required to be introduced. (D#! 2**+, 8. M#&ti$& th# "$ # ) a-#% .- L2CAP i& > u#t$$th &#t1$"2s. It provides connection oriented and connectionless data services ti the upper layer protocols. (Ma- 2**9, :. What is th# %i33#"#&!# .#t1##& TDOA a&% TOA i& <PS' T4)# means Time 4ifference of #rrival. It is used to locate mobile. T)# means Time of #rrival Method. (Ma- 2**9, (Ma- 2**+, (Ma- 2*1*,

;. D#3i&# th# /"a%# $3 s#"6i!# a&% !$6#"a/# !a)a!it- 1ith "#s)#!t t$ /#$ $!ati$& s-st#ms. In geolocation system, the probability that a location request will not be fulfilled is a measure of the grade of service. In geolocation systems, coverage corresMponds to the availability of a sufficient number of T)#, #)#, ;22 or fingerprint measurements to perform a location measurement. (D#! 2**9, +. What is > u#t$$th' <i6# its %ata "at#. (luetooth is an open specification for short range wireless voice and data communications that was originally developed for cable replacement in ,#+. Ma$imum data rate is @5- for asymmetric mode. (D#! 2**9, 9. What a"# th# ma?imum %ata "at# su))$"t#% .- th# 3$ $1i&/ s-st#msF I<<< B.5.-F.0, (luetooth, I<<< B.5.-- a and !iperlann:5. 4ata rate of I<<< B.5.-F.0 > 5@ Mbps (luetooth > EMbps

I<<< B.5.-- a > -- Mbps !iperlan 5 is F0Mbps. 1*. What is POS' ,)2 means ,ersonal )perating 2pace. It is a space about a person or obCect that can be e$tended upto -. meters in all the directions. 11. What is SWAP' 2%#, means 2hared %ireless #ccess ,rotocol. 12. What a"# th# %i33#"#&!# s!#&#"i#s $3 !$&&#!ti$& $3 > u#t$$th' %ire replacement in ,C conection.N #d:hoc networks. #ccess point in large networks. 10. What is Pa/i&/' It is a procedure used to connect two (luetooth devices. (Ma- 2*11,

Das könnte Ihnen auch gefallen