WMN w-23

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 15

23124

3 Hours / 70 Marks Seat No.

1. Attempt any FIVE of the following : 10


a) Define Roaming.

b) State advantages of GPRS.


constant Internet connectivity
quick messaging
improved SMS transfers
c) State any two features of VOLTE.
VoLTE Features :
1. Set up of the transmission path between the terminal and IMS.
2. Security features for user authentication providing.
3. Providing the core functionality for the establishment and termination
of the call(via SIP).
4. Support to call forwarding, caller ID presentation and restriction, call
waiting and multiparty conference.
5. Designed for both voice and data traffic.
d) Define –
i) Quantization Noise
ii) Companding with reference to PCM.
Quantization Noise: In the context of PCM (Pulse Code
Modulation), quantization noise refers to the error or
distortion introduced during the process of approximating
analog signals into discrete digital values. It occurs
because the analog signal is sampled and then quantized
into a finite number of levels, resulting in a difference
between the original analog signal and its digital
representation.

iii) Companding: Companding, short for


"compressing" and "expanding," is a
technique used in PCM systems to
improve the efficiency of digital
transmission and storage by reducing
the dynamic range of the signal. In
companding, the dynamic range of the
analog signal is compressed before
quantization and then expanded back to
its original range at the receiver end.
This helps to allocate more bits to the
lower amplitude signals, where they are
more effective, while reducing the
quantization error for higher amplitude
signals. It is commonly used in
telecommunications and audio
processing to minimize quantization
noise.
e) Define Bitrate and Baud rate.
Bitrate: Bitrate refers to the rate at which bits are transmitted or processed over a
communication channel, usually measured in bits per second (bps) or multiples
thereof (e.g., kilobits per second, megabits per second). It indicates the amount of
data that can be transmitted per unit of time and is commonly used to describe the
speed of digital data transmission, such as in network connections, audio/video
encoding, and digital storage.

Baud rate: Baud rate, also known as symbol rate, is the number of signal changes
(voltage, frequency, or phase) per second in a communication channel. It is
measured in symbols per second (baud). Baud rate is often used in serial
communication to indicate how fast data is being transmitted between devices. It's
important to note that baud rate and bitrate are not the same, as one baud can
represent multiple bits of data in modulation schemes like QPSK (Quadrature
Phase Shift Keying) or QAM (Quadrature Amplitude Modulation).
f) List the characteristics of MANET (Any two)
1. Dynamic Topologies
2. Bandwidth constrained, variable capacity links:
3. Autonomous Behavior
4. Energy Constrained Operation.
5. Limited Security.
6. Less Human Intervention

g) Enlist the features of CDMA. (Any two)


 At a defined time, it enables more users to communicate and thus offers
enhanced capacity for voice and data communication.
 To reduce interference & noise and thereby increase the efficiency of the
network, CDMA systems make use of power control.
2. Attempt any THREE of the following : 12
a) State and explain GSM channel types.
b) Describe GPRS architecture with neat diagram.
c) State the characteristics of Wireless Markup Language.
o Text and image support : Formatting and layout commands are
provided for text and limited image capability.
 Deck/card organizational metaphor : WML documents are subdivided into
small, well-defined units of user interaction called cards. Users navigate by
moving back and forth between cards. A card specifies one or more unit of
interaction (a menu, a screen of text, or a text entry field). A WML deck is
similar to an HTML page in that it is identified by a web address (URL)
and is the unit of content transmission.
 Support for navigation among cards and decks : WML includes provisions
for event handling, which is used for navigation or executing scripts. In an
HTML-based web browser, a user navigates by clicking on links. At a
WML capable mobile device, a user interacts with cards, moving forward
and back through the deck.
 WML is tagged language, similar to HTML, in which individual
language elements are delineated by lowercase tags enclosed in
angle brackets. Typically, The WML definition of a card begins with
the non visible portion, which contains executable elements,
followed the visible content
.  WML Script WML Script is a scripting language with
similarities to JavaScript. It is designed for defining script-type
programs in a user device with limited processing power and
memory.
d) Differentiate between DSSS & FHSS.

3. Attempt any THREE of the following : (4 marks each) 12


a) Explain UMTS architecture with suitable diagram.
ANSWER IS IN S-22

b) Explain the operational principle of Mobile IP with suitable


diagram.
c) Draw the block schematic of WLL architecture and explain
following components of it.
h) WANU
ii)WASU
Ans is in S-22

d) Explain design challenges in MANET.

Designing Mobile Ad hoc Networks (MANETs) comes with several challenges


due to their dynamic and decentralized nature. Some of the key design challenges
include:

1. *Dynamic Topology:* MANETs consist of mobile nodes that can move


arbitrarily, resulting in frequent changes in network topology. Designing efficient
routing protocols that can adapt to these dynamic changes while maintaining
connectivity and minimizing overhead is a significant challenge.

2. *Limited Resources:* Nodes in MANETs typically have limited resources such


as battery power, processing capability, and bandwidth. Efficient resource
management and optimization techniques are essential to prolong network
lifetime and ensure optimal performance.

3. *Scalability:* MANETs can range from small-scale networks with a few nodes
to large-scale networks with hundreds or thousands of nodes. Designing scalable
protocols and algorithms that can handle the increasing number of nodes while
maintaining efficiency and low overhead is challenging.

4. *Node Heterogeneity:* MANETs may consist of nodes with different


capabilities, such as varying transmission ranges, processing power, and energy
levels. Designing protocols that can accommodate node heterogeneity and
effectively utilize the capabilities of different nodes is crucial for optimal network
performance.

5. *Security:* MANETs are susceptible to various security threats due to their


decentralized and dynamic nature, such as node compromise, eavesdropping, and
denial-of-service attacks. Designing robust security mechanisms to protect against
these threats while minimizing overhead and preserving network performance is a
significant challenge.

6. *Quality of Service (QoS) Support:* Providing QoS guarantees for different


types of applications (e.g., real-time multimedia streaming, data transfer) in
MANETs is challenging due to the dynamic and unpredictable nature of the
network. Designing QoS-aware routing and resource allocation mechanisms to
meet the diverse QoS requirements of applications is essential.

7. *Interference and Channel Fading:* MANETs operating in wireless


environments are susceptible to interference from other devices and obstacles, as
well as channel fading due to multipath propagation and environmental
conditions. Designing robust communication protocols that can mitigate the
effects of interference and channel fading to maintain reliable communication is
crucial.

4. Attempt any THREE of the following : 12


a) Describe WAP protocol with suitable diagram.
Answer in s-22
b) Differentiate between GSM and GPRS.
Answer in s-22
c) State and explain four features of IOT in mobile computing.
d) Explain IEEE 802.11 system architecture.
e) Describe WSN and state two applications of it.
• A wireless sensor network (WSN) is a wireless network consisting of
spatially distributed autonomous devices using sensors to monitor
physical or environmental conditions. A WSN system incorporates a
gateway that provides wireless connectivity back to the wired world and
distributed nodes. The wireless protocol you select depends on your
application requirements
• Some of the available standards include 2.4 GHz radios based on either
IEEE 802.15.4 or IEEE 802.11 (Wi-Fi) standards or proprietary radios,
which are usually 900 MHz.
• WSN is special case of ad-hoc networks with reduced or no mobility
and are known as “Data Centric”. This means, unlike traditional ad hoc
network where data is requested from specific node or location, here the
data is requested based on sensed attributes.
• The use of particular type of query might depend on the application
requirements. The query may ask for multiple parameters.
• Sensor node sense the parameters and transmit the values only once or
over the period of time or use past history to gain statistical information.
Application of WSN are:
1. Environmental Monitoring
2. Entertainment
3. Security and surveillance
4. Health care
5. Smart buildings

5. Attempt any TWO of the following : 12


a) Explain Network signaling in GSM with block diagram.
Answer in S-22
b) Draw the encoded waveforms for the bit sequence 11001001 by using
the following Line Coding mechanisms.
i) Unipolar RZ ii)
Polar RZ
iii) Manchester (Biphase)
iv) Alternate Mark Inversion.

c) Draw the block diagram of 4G Architecture and explain.


State two features of 4G.

Answer in s-22

• 4G Features : 4G technology is basically the extension in the 3G technology with


more bandwidth and services offered in the 3G features of 4G are :

1. 4G support for interactive multimedia, voice, streaming video, internet and other
broadband services.
2. 4G is IP based mobile system.
3. 4G has high speed, high capacity and low cost per bit.
4. 4G has global access, service portability and scalable mobile services. 5. 4G has
seamless switching and a variety of Quality of service driven services.
6. 4G has better scheduling and call admission control techniques.

6. Attempt any TWO of the following : 12


a) Draw the labelled architecture of GSM and explain the function of
the following entities.
i) MSC
ii)HLR

OR
Mobile Services Switching Centre (MSC) :  The main element within the core
network area of the overall GSM network architecture is the Mobile switching
Services Centre (MSC). The MSC acts like a normal switching node within a
PSTN or ISDN, but also provides additional functionality to enable the
requirements of a mobile user to be supported.
 These include registration, authentication, call location, inter-MSC handovers
and call routing to a mobile subscriber. It also provides an interface to the PSTN so
that calls can be routed from the mobile network to a phone connected to a
landline. Interfaces to other MSCs are provided to enable calls to be made to
mobiles on different networks.
Home Location Register (HLR) :
 This database contains all the administrative information about each subscriber
along with their last known location. In this way, the GSM network is able to route
calls to the relevant base station for the MS. When a user switches on their phone,
the phone registers with the network and from this it is possible to determine
which BTS it communicates with so that incoming calls can be routed
appropriately. Even when the phone is not active (but switched on) it re-registers
periodically to ensure that the network (HLR) is aware of its latest position. There
is one HLR per network, although it may be distributed across various sub-centres
to for operational reasons.

b) Draw block diagram of a sensor node and state the function of each
block.
In s-22

c) Differentiate between W-CDMA and CDMA-2000 in terms with chip


rate, speed, frame length, bandwidth, modulation technique and
overheads.
In S-22

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy