This document contains a question bank for the subject "Mobile Communication" for the Department of Information Technology at an academic institution. It includes questions grouped by unit and categorized by knowledge level (K1, K2, K3) that have been used in prior assessment units (AU). The questions cover topics related to mobile communication systems including GSM, GPRS, UMTS, wireless networks, IEEE 802.11 standards, Bluetooth, Wi-Fi and WiMAX. Sample questions assess understanding of concepts like mobile network architectures, protocols, routing, mobility and security.
Presented by Andy Sutton, Principal Network Architect - Chief Architect’s Office, TSO, BT at IET "Towards 5G Mobile Technology – Vision to Reality" seminar on 25th Jan 2017
Shared with permission
TIME SYNCHRONIZATION IN WIRELESS SENSOR NETWORKS: A SURVEYijujournal
Time synchronization is a critical piece of infrastructure for any distributed system. Wireless sensor networks have emerged as an important and promising research area in the recent years. Time synchronization is important for many sensor network applications that require very precise mapping of gathered sensor data with the time of the events, for example, in tracking and vehicular surveillance. It also plays an important role in energy conservation in MAC layer protocols. The paper studies different existing methods, protocols, significant time parameters (clock drift, clock speed, synchronization errors, and topologies) to achieve accurate synchronization in a sensor network. The studied Synchronization protocols include conventional time sync protocols (RBS, Timing-sync Protocol for Sensor Networks -TPSN, FTSP), and other application specific
approaches such as all node-based approach, a diffusion-based method and group sync approaches aiming at providing network-wide time. The goal for writing this paper is to study most common existing time synchronization approaches and stress the need of a new class of secure-time synchronization protocol that is scalable, topology independent, fast convergent, energy efficient, less latent and less application dependent in a heterogeneous hostile environment. Our survey provides a valuable framework by which protocol designers can compare new and
existing synchronization protocols from various metric discussed in the paper. So, we are hopeful that this paper will serve a complete one-stop investigation to study the characteristics of existing time synchronization protocols and its implementation mechanism in a Sensor network environment.
Presented by Andy Sutton, Principal Network Architect - Chief Architect’s Office, TSO, BT at IET "Towards 5G Mobile Technology – Vision to Reality" seminar on 25th Jan 2017
Shared with permission
TIME SYNCHRONIZATION IN WIRELESS SENSOR NETWORKS: A SURVEYijujournal
Time synchronization is a critical piece of infrastructure for any distributed system. Wireless sensor networks have emerged as an important and promising research area in the recent years. Time synchronization is important for many sensor network applications that require very precise mapping of gathered sensor data with the time of the events, for example, in tracking and vehicular surveillance. It also plays an important role in energy conservation in MAC layer protocols. The paper studies different existing methods, protocols, significant time parameters (clock drift, clock speed, synchronization errors, and topologies) to achieve accurate synchronization in a sensor network. The studied Synchronization protocols include conventional time sync protocols (RBS, Timing-sync Protocol for Sensor Networks -TPSN, FTSP), and other application specific
approaches such as all node-based approach, a diffusion-based method and group sync approaches aiming at providing network-wide time. The goal for writing this paper is to study most common existing time synchronization approaches and stress the need of a new class of secure-time synchronization protocol that is scalable, topology independent, fast convergent, energy efficient, less latent and less application dependent in a heterogeneous hostile environment. Our survey provides a valuable framework by which protocol designers can compare new and
existing synchronization protocols from various metric discussed in the paper. So, we are hopeful that this paper will serve a complete one-stop investigation to study the characteristics of existing time synchronization protocols and its implementation mechanism in a Sensor network environment.
Evolution of Wireless Communication TechnologiesAkhil Bansal
Detailed presentation on Wireless Communication Technologies.
The communication technology has evolved to provide lower latency network, faster and efficient data services.
How to put these nodes together to form a meaningful network.
How a network should function at high-level application scenarios .
On the basis of these scenarios and optimization goals, the design of networking protocols in wireless sensor networks are derived
A proper service interface is required and integration of WSNs into larger network contexts.
This presentation is prepared for workshop session and is not in detail. You can ask your doubts here or you can email me at prakharbansal1@gmail.com. I'll try to answer to my best.
LTE Basic Parameters, Data Rates, Duplexing & Accessing, Modulation, Coding & MIMO, Explanation of different nodes and Advantage & Disadvantages of different nodes.
Evolution of Wireless Communication TechnologiesAkhil Bansal
Detailed presentation on Wireless Communication Technologies.
The communication technology has evolved to provide lower latency network, faster and efficient data services.
How to put these nodes together to form a meaningful network.
How a network should function at high-level application scenarios .
On the basis of these scenarios and optimization goals, the design of networking protocols in wireless sensor networks are derived
A proper service interface is required and integration of WSNs into larger network contexts.
This presentation is prepared for workshop session and is not in detail. You can ask your doubts here or you can email me at prakharbansal1@gmail.com. I'll try to answer to my best.
LTE Basic Parameters, Data Rates, Duplexing & Accessing, Modulation, Coding & MIMO, Explanation of different nodes and Advantage & Disadvantages of different nodes.
Optimization of Quality of Service in 4G Wireless NetworksIDES Editor
4G radio access technologies should be able to
provide different types of IP services. These services rang from
narrow-band to broadband, from non-real-time to real-time,
and from unicast to multicast broadcast applications. When
the need arises for different levels of user mobility the access
systems are required with advanced capabilities of radio
resource management and Quality of Service (QoS). We
present, in this paper, the different QoS approaches by the
various wireless and connectivity’s networks as well as the
issues that will face their implementations in 4G.
This report describes the 5G requirements, use cases and technologies which are modelling the transformation of the core network and a roadmap how the 3GPP Evolve Packet Core can be modified to become the core for the 5G networks.
Quality of service performances of video and voice transmission in universal ...journalBEEI
The universal mobile telecommunications system (UMTS) has distinct benefits in that it supports a wide range of quality of service (QoS) criteria that users require in order to fulfill their requirements. The transmission of video and audio in real-time applications places a high demand on the cellular network, therefore QoS is a major problem in these applications. The ability to provide QoS in the UMTS backbone network necessitates an active QoS mechanism in order to maintain the necessary level of convenience on UMTS networks. For UMTS networks, investigation models for end-to-end QoS, total transmitted and received data, packet loss, and throughput providing techniques are run and assessed and the simulation results are examined. According to the results, appropriate QoS adaption allows for specific voice and video transmission. Finally, by analyzing existing QoS parameters, the QoS performance of 4G/UMTS networks may be improved.
Network Architecture Work in ITU Focus Group IMT-2020 ITU
This presentation introduces the progress of the work on network architecture by ITU Focus Group IMT-2020, current status and the next steps. \
Author : Namseok Ko, ETRI
This was presented at ITU-T Focus Group IMT-2020 Workshop and Demo Day, 7 December 2016.
More details on the event : http://www.itu.int/en/ITU-T/Workshops-and-Seminars/201612/Pages/Programme.aspx
"Fossil fuels are the lifeblood of modern economies, providing energy to power industries, homes, and transportation. But their impact on the environment and climate change is a growing concern, driving innovation towards more sustainable alternatives."
Evolution of wireless communication networks: from 1G to 6G and future persp...IJECEIAES
Since about 1980, a new generation has appeared approximately every decade. Mobile phones started with first-generation (1G), then the successful second generation (2G), and then mixed successful auctions since the launch of 3G. According to business terms, 1G and 2G were providing voice and gradually include data (3G is unsuccessful, 4G is very successful). Today, we are seeing a stir over what 5G will provide. Key expectations currently being discussed include an ultra-high 20 Gb/s bit rate, an ultra-low latency of just 1 millisecond, and a very high capacity. Given the enormous potential of 5G communication networks and their expected evolution, what should 6G include that is not part of 5G or its long-term evolution? 6G communication networks should deliver improved range and data speeds, as well as the ability to connect users from anywhere. This article details possible 6G communication networks. More specifically, the primary influence of this research is to deliver a complete synopsis of the development of wireless communication networks from 1G to 6G.
IT2255 Web Essentials - Unit II Web Designingpkaviya
HTML - Form Elements - Input types and Media elements - HTML 5 - CSS3 - Selectors, Box Model, Backgrounds and Borders, Text Effects, Animations, Multiple Column Layout, User Interface.
IT2255 Web Essentials - Unit I Website Basicspkaviya
Internet Overview – Fundamental computer network concepts – Web Protocols – URL – Domain Name – Web Browsers and Web Servers – Working principle of a Website – Creating a Website – Client-side and server-side scripting.
BT2252 - ETBT - UNIT 3 - Enzyme Immobilization.pdfpkaviya
Enzymes are catalysts that perform all vital biological reactions within an organism’s body. Their distinguishing characteristic is that they endure the reaction unchanged.
Therefore, they can be utilised repeatedly. However, soluble enzymes are limited by their separation from the product and substrate.
The majority of Enzymes in a living organism are either connected to the cell membrane or encapsulated within the cells.
This result led to the hypothesis that pure separated enzymes may work better when immobilised on a solid substrate.
The phrase immobilised enzyme refers to “catalytically active enzymes that are physically limited or localised in a specific region of space and can be used again and continuously.”
The benefit of immobilisation is that it promotes work-up product isolation. Listed below are some potential advantages and disadvantages of immobility.
Soluble Enzyme + Substrate———– Product (single time usage of enzyme)
Immobilized Enzyme + Substrate———Product (Repeated usage of enzyme)
A number of essential considerations must be made when immobilising an enzyme.
The enzyme’s biological activity should be maintained.
The enzyme ought to be more stable than its soluble equivalent.
The price of immobilisation shouldn’t be excessively high.
The relationship between humans and enzymes has evolved over time. Even during historical times, where there was no concept of enzymes, ancient Egypt people produced beer and wine by enzymatic fermentation. After several thousand years, enzymatic studies have significantly progressed. Enzymes are proteins that accelerate many biochemical and chemical reactions. They are natural catalysts and are ubiquitous, in plants, animals, and microorganisms, where they catalyze processes that are vital to living organisms. The growing knowledge and technique improvement about protein extraction and purification lead to the production of many enzymes at an analytical grade purity for research and biotechnological applications. Enzymes are intimately involved in a wide variety of traditional food processes, such as cheese making, beer brewing, and wine industry. Recent advances in biotechnology, particularly in protein engineering, have provided the basis for the efficient development of enzymes with improved properties. This has led to establishment of novel, tailor-made enzymes for completely new applications, where enzymes were not previously used. The technology of immobilized enzymes is still going through a phase of evolution and maturation. Evolution is reflected in the ever-broadening range of applications of immobilized enzymes. Maturation is mirrored in the development of the theory of how immobilized enzymes function and how the technique of immobilization is related to their primary structure through the formation and configuration of their three dimensional structure. There still remains much room for the development of useful processes and materials based on this hard-won understanding.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfKamal Acharya
The College Bus Management system is completely developed by Visual Basic .NET Version. The application is connect with most secured database language MS SQL Server. The application is develop by using best combination of front-end and back-end languages. The application is totally design like flat user interface. This flat user interface is more attractive user interface in 2017. The application is gives more important to the system functionality. The application is to manage the student’s details, driver’s details, bus details, bus route details, bus fees details and more. The application has only one unit for admin. The admin can manage the entire application. The admin can login into the application by using username and password of the admin. The application is develop for big and small colleges. It is more user friendly for non-computer person. Even they can easily learn how to manage the application within hours. The application is more secure by the admin. The system will give an effective output for the VB.Net and SQL Server given as input to the system. The compiled java program given as input to the system, after scanning the program will generate different reports. The application generates the report for users. The admin can view and download the report of the data. The application deliver the excel format reports. Because, excel formatted reports is very easy to understand the income and expense of the college bus. This application is mainly develop for windows operating system users. In 2017, 73% of people enterprises are using windows operating system. So the application will easily install for all the windows operating system users. The application-developed size is very low. The application consumes very low space in disk. Therefore, the user can allocate very minimum local disk space for this application.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSEDuvanRamosGarzon1
AIRCRAFT GENERAL
The Single Aisle is the most advanced family aircraft in service today, with fly-by-wire flight controls.
The A318, A319, A320 and A321 are twin-engine subsonic medium range aircraft.
The family offers a choice of engines
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
IT8602 Mobile Communication Question Bank
1. QUESTION BANK
DEPARTMENT OF INFORMATION TECHNOLOGY
Academic year : 2019-2020 Subject Code : IT8602
Year / Semester : III / VI
Course Code (as
per NBA)
:R17C312
Name of the Subject :MOBILE COMMUNICATION
Name of Staff with
designation/Department
:Ms.Kaviya.P, AP/IT
Course Outcomes(COs)
CO Code CO Statement
Blooms
Taxonomy
Level
R17C312.1
Explain the evolution of mobile communication and the
existing MAC protocols
K2
R17C312.2
Illustrate the generations of telecommunication systems in
wireless network along with their routing, mobility and
security issues
K2
R17C312.3
Outline the architecture of various Wireless LAN
technologies such as Wireless LAN, Bluetooth and WiFi
Technologies
K2
R17C312.4
Summarize the functionalities of network layer with their
routing protocols and recognize the security issues related
an Ad hoc networks
K2
R17C312.5
Explain the functionalities of Transport and Application
layer in a mobile network
K2
Prepared by
Name &Signature of Staff member Signature of HOD
2. DEPARTMENT OF INFORMATION TECHNOLOGY
Course : B.Tech Subject Code : IT8602
Staff Name : Kaviya.P Subject Name : MOBILE COMMUNICATION
Class : IIIIT Academic Year: 2019 - 2020 EVEN
QUESTION BANK
UNIT I - INTRODUCTION
Introduction to Mobile Computing – Applications of Mobile Computing- Generations of Mobile Communication
Technologies-MAC Protocols – SDMA- TDMA- FDMA- CDMA
Q.No Questions Marks
Knowledg
e Level
No. of
times
in AU
PART-A
Introduction to Mobile Computing
1. Define mobile computing. [May 2019, Nov 2019]
2
K1 2
2. List the advantages of mobile computing. [May 2016] K1 1
3. What are the limitations of Mobile Computing? [Nov 2016] K1 1
4.
Differentiate mobile computing and Wireless Networking.
[May 2017, Nov 2017, May 2018]
K2 3
5.
What are the challenges in Mobile communication?
[Nov 2018]
K1 1
Applications of Mobile Computing
6. List the applications of Mobile Computing.
2
K1
7. List some Mobile and Wireless devices. K1
Generations of Mobile Communication Technologies
8. List the Wireless LAN technologies.
2
K1
9. State some cellular phone standards. K1
MAC Protocols
10. What is the motivation for a specialized MAC? [May 2012]
2
K1 1
11. State the objectives of MAC protocols. [Nov 2018] K1 1
12. List the issues in wireless MAC. [May 2018, Nov 2019] K1 2
13.
Differentiate hidden and exposed terminal problems in infrastructure-
less network. [May 2016]
K2 1
14.
“MAC protocol designed for infrastructure based wireless network may
not work satisfactory in infrastructure-less environment.” – Justify.
[Nov 2017]
K2 1
15. Which TDMA scheme is suitable for satellite systems? [May 2014] K1 1
16.
List some random assignment schemes in MAC.
[Nov 2016, May 2017]
K1 2
17.
Give some examples of reservation-based schemes in MAC protocols.
[May 2019]
K1 1
18. Draw the frequency assignment for radio transmission.[May 2013] K1 1
19.
Justify that a Barker code has good autocorrelation.
[Nov 2012, Nov 2013]
K2 2
3. PART-B
Introduction to Mobile Computing
1.
Describe the characteristics of Mobile Computing.
[May 2016, May 2018, May 2019]
6 / 5 K2 3
Applications of Mobile Computing
2. Describe the applications of mobile computing. [Nov 2016, May 2017] 8 K2 2
Generations of Mobile Communication Technologies
3. Explain in detail about various technologies in mobile communication. 13 K2
MAC Protocols
4.
Explain in detail about the motivation for a specialized MAC.
[May 2013]
10 K2 1
5. Explain the wireless MAC protocol issues in detail. [May 2017] 8 K2 1
6.
Explain in detail about hidden terminal problem and exposed terminal
problem. [Nov 2017, Nov 2018]
8 / 13 K2 2
7.
Compare the characteristic features of FDMA, TDMA, and CDMA
mechanisms. [Nov 2011, May 2012, Nov 2016]
6 / 16
K2 6
8.
Compare and contrast SDMA, FDMA, TDMA, and CDMA.
[Nov 2012, May 2013, Nov 2013]
10 / 8 /
12
9.
Explain clearly the various schemes for Medium Access Control with
Time Division Multiple Access. [Nov 2012]
16 K2 1
10.
What is CSMA? What are the categories of CSMA? Explain their
working with advantages and disadvantages. [May 2018]
7 K2 1
11.
Explain in detail Multiple Access with Collision Avoidance scheme.
Also explain the advantage of the same. [Nov 2013]
12
K2 2
12.
What is hidden and exposed terminal problem? Explain how Multiple
Access with Collision Avoidance scheme avoids hidden and exposed
terminal problem. [May 2014]
16
13.
Explain with an example the behavior of CDMA with the spreading
using orthogonal codes. [May 2014]
8 K2 1
PART-C
1.
Apply mobile computing to design Taxi dispatcher and monitoring
service. Explain the components in detail. [May 2018]
7 K3 1
2. Consider the following scenarios:
i. Node A and C want to transmit data to B at the same time.
ii. Node B transmits data to Node A meanwhile Node C wants to
transmit data to Node D in the network.
Identify the problems during this data transmission. Explain it. Suggest
a method of your choice to overcome this problem.
14 K3
3.
Consider a scenario of video conferencing in mobile network with 10
participants. During the transmission of data in a low congestion
network suddenly, if 100 participants are involved in transmission in
the same network, what are the problems you face and list out the
MAC protocols that you would suggest for efficient channel access and
data transmission in congested network?
14 K3
Staff In-charge Subject Matter Expert HoD/IT
4. DEPARTMENT OF INFORMATION TECHNOLOGY
Course : B.Tech Subject Code : IT8602
Staff Name : Kaviya.P Subject Name : MOBILE COMMUNICATION
Class : IIIIT Academic Year: 2019 - 2020 EVEN
QUESTION BANK
UNIT II -MOBILE TELECOMMUNICATION SYSTEM
GSM – Architecture – Protocols – Connection Establishment – Frequency Allocation – Routing – Mobility
Management – Security –GPRS- UMTS- Architecture
Q.No Questions Marks
Knowledge
Level
No. of
times
in AU
PART-A
GSM
1. List the standards similar to GSM. [May 2012]
2
K1 1
2.
What is frequency range of uplink and downlink in GSM network?
[May 2018]
K1 1
3. State the pros and cons of GSM. [Nov 2011] K1 1
4. List the subsystems of GSM. [Nov 2018] K1 1
5. What is the information stored in SIM? [May 2018] K1 1
6. Name the Teleservices provided by GSM. [May 2017, Nov 2019] K1 2
7. Write about the supplementary services in GSM. [Nov 2016] K1 1
8. State the purpose of Home Location Register (HLR). [Nov 2018] K1 1
9. What is Equipment Identity Register? [Nov 2013] K1 1
10.
Give the block diagram of subscriber authentication in GSM
architecture. [May 2014]
K1 1
11. List the 3 important features of GSM security. [May 2016] K1 1
12. What is handoff? List out its characteristics. [May 2013] K1 1
13. Differentiate soft and hard handoff. [Nov 2011] K2 1
14. Draw a model to illustrate the effect of handoff. [May 2012] K1 1
15. Define handoff. What are its types? [Nov 2012, Nov 2017] K1 2
16. What are the reasons for handover?[Nov 2013] K1 1
GPRS
17. What is the functionality of GGSN? [May 2014, Nov 2018]
2
K1 2
18. Draw the GPRS transport plane. [May 2012] K1 1
19. What are the advantages of GPRS? [Nov 2012] K1 1
20. Identify the services offered by GPRS.[Nov 2017, May 2019] K1 2
21. In which way GPRS is better than GSM? [Nov 2019] K2 1
UMTS
22. What are the main elements of UMTS?[May 2016]
2
K1 1
23.
List out the advantages of UMTS networks over 2G networks.
[May 2019]
K1 1
PART-B
GSM
1. Outline the services offered by GSM.[May 2019] 7 K2 1
5. 2.
Describe GSM architecture and its services in detail. [May 2016,
Nov 2017]
8 /16 K2 2
3.
Explain the mobile services, system architecture, localization and
calling of GSM in detail. [Nov 2012]
16 K2 1
4.
Explain in detail about the system architecture of Global System for
Mobile communication. [Nov 2011, May 2012, May 2013, Nov
2013, May 2017, Nov 2018, Nov 2019]
16 / 8 /
13
K2 7
5.
Explain in detail the architecture of GSM. Also explain mobility
management and handover. [May 2014]
16 K2 1
6.
Explain the message flow between mobile station and BTS during
Mobile Originated call with suitable illustrations.
[Nov 2013, May 2014]
8 / 4 K2 2
7.
Explain security services of GSM system.
[Nov 2012, Nov 2013, May 2019]
6 / 8 K2
5
8. Explain GSM Authentication and Security. [May 2016, Nov 2016] 8 / 6 K2
9.
Explain in detail about the handovers of GSM.
[May 2013, Nov 2016]
6 / 8 K2
3
10.
Write in detail about the various types of handover in GSM. Also
discuss the timeline diagram of the Intra MSC handover. [May 2018]
13 K2
GPRS
11.
Discuss GPRS architecture and data services in detail.
[Nov 2011, Nov 2012, Nov 2019]
10 / 16 K2
512.
Draw and explain the architecture of GPRS. List its advantages and
limitations. [May 2019]
13 K2
13.
What are the advantages of GPRS over GSM? Also explain the
architecture of GPRS. [Nov 2013]
8 K2
14. Explain GPRS and its Protocol architecture. [May 2016] 8 K2 1
15.
Explain the functions of GPRS protocol stack with a diagram.
[Nov 2016, May 2017]
8 / 16 K2 2
UMTS
16.
Explain in detail about UMTS architecture and its services.
[May 2016, Nov 2016, Nov 2017, May 2018]
8 / 16
/13
K2 4
17.
What is UMTS? Describe the function of HLR and VLR in call
routing and roaming. [Nov 2018]
13 K2 1
PART C
1.
Node A wants to communicate with Node B located at different
geographical location. Model the call initiation and call termination
steps in GSM.
14 K3
2.
In cellular networks, build the various handover mechanisms used
when the mobile station moves out of station that causes decrease in
received signal strength or due to increase in load.
14 K3
3.
GSM allows a subscriber to move throughout the coverage area with
a capability to make or receive calls. Sketch the components
involved in make or receive calls in roaming.
14 K3
Staff In-charge Subject Matter Expert HoD/IT
6. DEPARTMENT OF INFORMATION TECHNOLOGY
Course : B.Tech Subject Code : IT8602
Staff Name : Kaviya.P Subject Name : MOBILE COMMUNICATION
Class : IIIIT Academic Year: 2019 - 2020 EVEN
QUESTION BANK
UNIT III -WIRELESS NETWORKS
Wireless LANs and PANs – IEEE 802.11 Standard – Architecture – Services – Blue Tooth- Wi-Fi – WiMAX
Q.No Questions Marks
Knowledge
Level
No. of
times in
AU
PART-A
Wireless LANs and PANs
1. List the advantages and disadvantages of Wireless LANs. [May 2013]
2
K1 1
2. State the various standards in Wireless PANs. K1
3.
Why wireless LAN services are of lower quality than wired LAN?
[May 2014]
K2 1
IEEE 802.11 Standard
4. List any four Wireless LAN standards.
5. Why cannot wireless LANs implement CSMA/CA? [May 2012]
2
K2 1
6.
What is the format of Frame control field of 802.11 MAC packet
structure? [May 2014]
K1 1
7. List the services provided by IEEE 802.11. 2 K1
Bluetooth
8. What are the three low power states of a Bluetooth state? [Nov 2012] 2 K1 1
Wi-Fi and WiMAX
9. List the applications of Wi-Fi.
2
K1
10. State the advantages of Wi-Fi. K1
11. Differentiate between WiFi and WiMAX. [Nov 2011] K2 1
12. Why was WiMAX forum formed? [May 2012] K1 1
PART-B
IEEE 802.11 Standard
1. Describe IEEE 802.11. [Nov 2011] 16 K2 1
2.
Draw the schematic for physical layer of IEEE 802.11 infrared and
explain. [May 2012]
8 K2 1
3.
List the two MAC sublayers defined by IEEE 802.11 standard and
explain. [May 2012]
16 K2 1
4.
Explain about the system and protocol architecture of 802.11 standard
with MAC layer and its management. [Nov 2012]
16 K2 1
5.
Explain in detail about the system and protocol architecture of IEEE
802.11. [May 2013, Nov 2013, May 2014]
12 / 16 K2 3
6.
Discuss how power management is done in IEEE 802.11
infrastructure architecture. [Nov 2013, May 2014]
6 / 8 K2 2
7. Bluetooth
7.
Explain the system and protocol architecture of Bluetooth / IEEE
802.15.
13 K2
Wi-Fi and WiMAX
8.
Explain in detail about the system and protocol architecture of IEEE
802.16 standard. [Nov 2012]
16 K2 1
PART-C
1.
Consider the following three different scenarios of designing a generic
WLAN which takes into account the number of users and their
activities rather than the size / type of the business itself:
o A small office or a workgroup deployment
o An enterprise deployment
o A telecommuters deployment
Identify the MAC layer mechanisms used to deploy successful
WLAN that supports very fast, secure and scalable wireless network
for the above scenario.
14 K2
2.
Consider a conference that is conducted at Chicago. It is a conference
where a number of delegates from across the World gather to discuss
on various business issues. Participants are permitted to use only their
laptops and they are restricted from possessing any secondary storage
devices or mobile phones. You are a participant of this conference
and to your surprise, you meet one of your school friends in the same
conference. Both of you would like to share some files with a
considerable size. It is later identified that the conference hall
possesses neither an Ethernet facility nor is the Wi-Fi password
known to both of you. Identify a suitable mobile technology that can
be used for the above scenario. Model the system and protocol
architecture for the same.
14 K3
3.
E-health is one of the areas where WiMAX technologies can
substantially contribute to improve the daily activities and thus
enhance the quality of life. Remote diagnosis is one of the possible
cases where WiMAX plays an important role. For instance, an
ambulance equipped with a portable ultrasound device, connected to a
notebook, as well as to the hospital through a Mobile WiMAX
channel, can help a doctor in the hospital to intervene in a car
accident. Construct a system and protocol architecture for the given
scenario.
14 K3
Staff In-charge Subject Matter Expert HoD/IT
8. DEPARTMENT OF INFORMATION TECHNOLOGY
Course : B.Tech Subject Code : IT8602
Staff Name : Kaviya.P Subject Name : MOBILE COMMUNICATION
Class : IIIIT Academic Year: 2019 - 2020 EVEN
QUESTION BANK
UNIT IV -MOBILE NETWORK LAYER
Mobile IP – DHCP – AdHoc– Proactive and Reactive Routing Protocols – Multicast Routing- Vehicular Ad Hoc
networks (VANET) –MANET Vs VANET – Security
Q.No Questions Marks
Knowledge
Level
No. of
times
in AU
PART-A
Mobile IP
1. What is the need for Mobile IP? [May 2019]
2
K1 1
2. Differentiate types of Care of Address. [Nov 2012] K2 1
3. Define COA. [Nov 2016] K1 1
4.
What should be the value of TTL field in the IP packet of agent
advertisement? Why? [May 2014]
K2 1
5. What is encapsulation in Mobile IP? [May 2016] K1 1
6. What is route optimization? [May 2017, Nov 2019] K1 2
7.
Differentiate the functionalities of a foreign agent and home agent.
[Nov 2017]
K2 1
8. What is the purpose of agent solicitation message? [May 2018] K1 1
9. What is the key mechanism in Mobile IP? [Nov 2018] K1 1
10. What is DHCP? [May 2016] K1 1
11. What is the purpose of DHCP? [May 2018] K1 1
12. Identify the desirable features of Mobile IP. [May 2019] K1 1
AdHoc Networks
13. Define AdHoc wireless network with example. [May 2013]
2
K1 1
14.
Differentiate wired networks and adhoc wireless networks based on
routing. [Nov 2013]
K2 1
15. Differentiate cellular with adhoc networks. [May 2018] K2 1
16. Give examples for mobile adhoc networks. [May 2013] K1 1
17. List the characteristics of MANETs. [May 2016] K1 1
18. List the applications of MANETs. [May 2017] K1 1
19. Mention two main design issues of MANET. [Nov 2018] K1 1
20. Why is routing in MANET so complex task? [May 2019, Nov 2019] K2 2
21. Distinguish Proactive and Reactive protocols.[May 2017] K2 1
22.
What are the important steps in Destination-Sequenced Distance-
Vector Routing (DSDV)? [Nov 2018]
K1 1
23. Compare AODV and DSR protocols. [Nov 2017] K2 1
24. What is multicasting? [Nov 2016] K1 1
Vehicular Adhoc Networks (VANETs)
25.
Compare MANET Vs. VANET. [May 2016, Nov 2016, May 2018 ,
May 2019, Nov 2019]
2 K2 5
9. PART-B
Mobile IP
1.
Explain the goals, assumptions, terminologies, and requirements of
Mobile IP. [May 2012, Nov 2018]
16 / 8 K2 2
2.
With a neat diagram, explain how packet delivery to and from a
mobile node is transferred through Mobile IP.
[May 2017, Nov 2017, May 2019]
16 / 13 K2 3
3.
What is Mobile IP? Explain agent discovery, registration and
encapsulation. [Nov 2012, Nov 2016]
12 / 16 K2 2
4. Discuss agent discovery in Mobile IP. [Nov 2013, May 2018] 8 / 5 K2 2
5. Describe in detail the registration procedure in Mobile IP. [Nov 2013] 8 K2 1
6.
How can the tunneling and encapsulation be performed in Mobile IP?
Explain. [May 2013, May2017]
10 /16 K2 2
7.
Describe the client server configuration of DHCP.
[May 2013, Nov 2013, May 2014]
6 / 8 K2
58.
With a diagram explain DHCP and its protocol architecture.
[May 2016]
8 K2
9.
What are the main functions of DHCP? Why is DHCP needed? Can it
be used when nodes are mobile? Explain your answer. [Nov 2019]
13 K2
AdHoc Networks
10.
Explain the design issues in MANET routing protocols in detail.
[May 2017]
16 K2
2
11.
Explain the design issues in MANET and the applications of adhoc
networks. [May 2018]
13 K2
12.
Explain about features and applications of adhoc networks.
[May 2014, May 2016, May 2019]
8 / 13 K2 3
13.
What are reactive and proactive protocols? Specify its advantages and
disadvantages. [Nov 2016]
8 K2 1
14.
Explain the Dynamic Source Routing with an example.
[Nov 2013 , May 2016]
10 / 8 K2
415.
Discuss route discovery and route maintenance mechanisms in DSR
with illustrations. List its merits and demerits. [Nov 2017]
16 K2
16.
Illustrate DSR routing in detail and compare it with DSDV.
[Nov 2018]
13 K2
17. Explain multicast routing protocols. [Nov 2016] 8 K2 1
Vehicular AdHoc Networks (VANETs)
18. Draw and explain the architecture of VANET. [May 2016, May 2018] 8 / 13 K2
3
19.
Describe the architecture of VANET with the functionality of the
components. Compare VANET with MANET. [Nov 2017]
16 K2
20.
Explain the architecture of VANET and various security attacks on
VANET. [Nov 2018]
13 K2 1
21. Explain the various security and attacks on VANET. [May 2016] 8 K2
2
22.
Explain the factors that make mobile ad-hoc networks are more
vulnerable to security attacks compared to the traditional networks.
Also explain the major types of security attacks that are possible in a
mobile adhoc network. How can each of these types of attacks be
overcome? [Nov 2019]
13 K2
10. PART-C
1.
Discuss with neat diagram how a packet is delivered from a mobile
node to another mobile node without losing its information during
mobility of the nodes. [May 2018, May 2019, Nov 2019]
15 K2 3
2.
Organize the steps involved in operation of Destination-Sequenced
Distance-Vector Routing protocol. For a given network, trace the
routing table using DSDV.
[May 2019]
15 K3 1
3.
Consider the networks given below. Here „S‟ is source node and „D‟
is target node. Illustrate the process of route discovery, route reply,
data delivery and route caching using DSR. Explain the approach.
[May 2018]
15 K3 1
Staff In-charge Subject Matter Expert HoD/IT
11. DEPARTMENT OF INFORMATION TECHNOLOGY
Course : B.Tech Subject Code : IT8602
Staff Name : Kaviya.P Subject Name : MOBILE COMMUNICATION
Class : IIIIT Academic Year: 2019 - 2020 EVEN
QUESTION BANK
UNIT V - MOBILE TRANSPORT AND APPLICATION LAYER
Mobile TCP– WAP – Architecture – WDP – WTLS – WTP –WSP – WAE – WTA Architecture – WML
Q.No Questions Marks
Knowledge
Level
No. of
times in
AU
PART-A
Mobile TCP
1. How does mobile TCP maintain end to end semantics? [May 2018]
2
K2 1
2. State the advantages and disadvantages of Mobile TCP. K1
WAP
3.
When do you call an environment to be a wireless application
environment?[May 2012]
2
K2 1
4. What does WAP specification include? [May 2012] K1 1
5. Mention the primary goals of WAP. [May 2013] K1 1
6. What is Wireless Application Environment? [Nov 2013] K1 1
7. What are the parameters of TR_Invoke.req primitive? [May 2014] K1 1
WTA Architecture
8. What is the role of the WTA server? [May 2013]
2
K1 1
9. How can we extend the basic WAE to WTA? K2
WML
10. List the features of WML. [Nov 2012]
2
K1 1
11. What are the capabilities of WML script? [Nov 2013, May 2014] K1 2
PART-B
Mobile TCP
1.
Describe how mobile TCP improves TCP efficiency for mobile
networks? How does mobile TCP maintain end to end semantics?
[May 2018]
8 K2 1
WAP
2. Explain a detail note on WAP. [Nov 2011] 16 K2 1
3.
Give the architecture of WAP and explain the functions of each of the
blocks. [May 2012]
16 K2 1
4.
Discuss in detail the WAP architecture and protocol.
[Nov 2012, May 2014]
16 K2 2
5.
Explain in detail the components and interfaces of the WAP
architecture. [May 2013]
16 K2 1
6.
With neat sketches and illustrations, discuss the Wireless Application
Protocol architecture in detail. [Nov 2013]
16 K2 1
7. Briefly explain about Wireless Application Environment. [May 2014] 8 K2 1
8.
Explain the parameters of transaction and session protocols.
[May 2012]
16 K2 1
12. WTA Architecture
9.
Discuss the architecture of wireless telephony application in detail.
[May 2013]
10 K2 1
10.
What is Wireless Telephony Application? Explain WTA logical
architecture. [Nov 2013]
8 K2 1
WML
11.
Explain the following:
i. WML and
ii. WML scripts
[Nov 2011, Nov 2012]
16 / 8 K2 2
12.
Describe the several standard libraries for WML Script specified by
WAP. [May 2013]
6 K2 1
PART-C
1.
Construct WAP architecture and explain each module in WAP
protocol stack.
14 K2
2.
Recent days Internet sites offer facilities to download music files
from video store directly and get the payment billed to our mobile
phones. Sketch a Wireless Telephony Application (WTA)
architecture that would provide a similar facility for Mobile Games.
14 K3
3.
Develop a WML script for the following scenario.
14 K3
Staff In-charge Subject Matter Expert HoD/IT