Wireless Mobile Network Exam Solutions
Wireless Mobile Network Exam Solutions
To Winter -22
Summer-23 Winter-23 Summer-22
pic
Name of Topic
No
Question Marks Question Marks Question Marks Question Marks
.
Total 18 18 18
1.(b) 2 1.(b) 2 1.(b) 2 1.(b) 2
2.(b) 4 2.(b) 4 2.(b) 4 2.(b) 4
GPRS & Mobile 3.(b) 4 3.(b) 4 3.(b) 4 3.(b) 4
2 Data 4.(b) 4 4.(b) 4 4.(b) 4 4.(b) 4
Communication 4.(d) 4 4.(d) 4 4.(d) 4 4.(d) 4
Total 18 18 18
1.(c) 2 1.(c) 2 1.(c) 2 1.(g) 2
1.(g) 2 1.(g) 2 1.(g) 2 2.(c) 4
2.(c) 4 2.(c) 4 2.(c) 4 3.(a) 4
Wireless
application 3.(a) 4 3.(a) 4 3.(a) 4 4.(a) 4
3 4.(a) 4 4.(a) 4 4.(a) 4 5.(c) 6
protocol and 3G
mobile services 5.(c) 6 5.(c) 6 5.(c) 6 6.(c) 3
6.(c) 6 6.(c) 6 6.(c) 6
Total 28 Total 28 Total 28
1.(d) 2 1.(e) 2
WLL, Signal 1.(e) 2
1.(e) 2 2(d) 4
Encoding 2.(d) 4 2.(d) 4
2.(d) 4 3(c) 4
4 Techniques and 3.(c) 4 3.(c) 4
3.(c) 4 5(b) 6
Spread Spectrum 5.(b) 6 6.(b) 6
5.(b) 6
Modulation
Summer- Unit2: GPRS & Q 1 b State the processes involved in the use of RFID in 2
2022 Mobile Data student attendance in a college.
Communication Q 2 b Explain the functions performed by GPRS support 4
nodes.
Q 3 b Explain the Quality of service parameters of GPRS. 4
Q 4 b Compare GSM networks with GPRS networks. 4
Q 4 d Explain the Logical channels in a GPRS system in 4
short.
Summer- Unit3:Wireless Q 1 c State any two features of 4G technology 2
2023 application Q 1 g List two advantages of UMTS technology 2
protocol and Q2 c List and explain any four specifications of IMT 2000 4
3G mobile Q 3 a Compare 4G and 5G technologies on the basis of 4
services i) Latency ii) Mobility iii) Frequency band iv) Peak data rate
Q 4 a Compare W-CDMA and CDMA 2000 on the basis of 4
i) Peak data rate ii) Modes of Operation iii) Modulation used
iv) Channel bandwidth
Q 5 c Draw and explain the labeled architecture of UMTS, 6
also state its two applications.
Q 6 c Draw the WAP layered architecture and protocol stack 6
and state the functions of any four protocols
Winter-23 Unit3:Wireless Q1c Enlist the specification of IMT 2000 2
application Q1g State features of Volte 2
protocol and Q2c Write down note on WAP Gateway & WAP Protocol 4
3G mobile Q3a Draw architecture of 4G & explain 4
services Q4a Differentiate between 4G and 4G LTE 4
Q5C.Explain in details UMTS architecture. 6
Q6c.Compare 1G,2G,3G,4G,5G 6
Winter-22 Unit3:Wireless Q 1 c Enlist the features of VoLTE 2
application Q 1 g State the quality of services in 3Gnetwork 2
protocol and Q 2 c Draw and explain the architecture of UMTS 4
3G mobile Q 3 a Compare WCDMA and CDMA 2000. (Any four points). 4
services Q 4 a Describe Wireless Application Protocol Gateway. 4
(WAP)
Q 5 c i) State IMT 2000 specifications. ii) State the 6
advantages of 3G wireless network system
Q 6 c Compare 3G and 4G wireless system with respect to 6
:– i) Frequency band used. ii) Data rate. iii) Access
Technique. iv) Switching used
Summer- Unit3:Wireless Q 1 c State two features of 5G technology 2
2022 application Q 1 g State two specifications of IMT 2000 2
protocol and Q 2 c Draw the WAP protocol stack and state the functions 4
3G mobile of any four protocols
services Q 3 a Compare the features of 3G and 4G 4
Q 4 a Draw the architecture of UMTS and explain 4
Q 5 c Draw the architecture of 4G and explain 6
Q 6 c Compare WCDMA and CDMA 2000 on the basis of 6
channel Bandwidth, Chip rate, Duplex mode, Modulation,
Frame length and Power Control rate
Examination Paper Analysis and Solution
Summer- Unit 4: WLL, Q1 e State any two limitations of Delta Modulation 2
2023 Signal Q2 d Draw the labeled wireless local loop architecture and 4
Encoding list the two functions of each i) WANU ii) WASU
Techniques Q3 c Encode the datastream 01001110 using the following 4
and Spread techniques i) Unipolar – NRZ ii) Polar – RZ
Spectrum Q5b Explain the working principle of ASK and FSK with 6
Modulation suitable waveforms using the given bit sequence 10110
Winter -23 Unit 4: WLL, Q1d Define the term Quantization. 2
Signal Q 1e State the applications of WLL. 2
Encoding Q 3c Explain the types of digital carrier modulation( 4
Techniques Ask,FSK ,PSK)any one with waveform.
and Spread i)Unipolar RZ and NRZ.
Spectrum ii) Polar RZ and NRZ.
Modulation iii)Biploar NRZ.
Q 5b Draw given waveforms for 101110100101. 6
Summer - Unit 4: WLL, Q2 d Draw the block schematic of WLL architecture and 4
22 Signal explain.
Encoding Q3 c Encode the datastream 1011000101 using the 4
Techniques following techniques i) RZ-Bipolar ii) AMI iii) Manchester iv)
and Spread NRZ- unipolar
Spectrum Q5b Explain the principle of working of ASK and BPSK with 6
Modulation suitable waveforms for the bit sequence 110101100
Winter-22 Unit 4: WLL, Q1 e List the types of spread spectrum modulation 2
Signal technique.
Encoding Q2 d Compare PCM and DM. (Any four points) 4
Techniques Q3 c Draw the waveforms for 10110100 in following formats 4
and Spread :– i) UnipDraw neat block diagram of Wireless Local Loop
Spectrum (WLL) network and explain. State the importance of
Modulation WLL.olar NRZ ii) Polar RZ iii) AMI iv) Manchester
Q5 b Draw neat block diagram of Wireless Local Loop (WLL) 6
network and explain. State the importance of WLL.
GSM SERVICES :
1) TELE SERVICES Telecommunication services that enable voice communication via mobile phones
Offered services Mobile telephony Emergency calling
2) BEARER SERVICES or Data Services
• •Include various data services for information transfer between GSM and other networks like
PSTN, ISDN etc. at rates from 300 to 9600 bps
• •Short Message Service (SMS)-up to 160 character alphanumeric data transmission to/from
the mobile terminal
• •Voice mailbox
3)SUPPLEMENTARY SERVICES Call related services :
• Call Waiting-Notification of an incoming call while on the handset
• Call Hold-Put a caller on hold to take another call
• Call Barring-All calls, outgoing calls, or incoming calls
• •Call Forwarding-Calls can be sent to various numbers defined by the user
• •Multi Party Call Conferencing -Link multiple calls together
4)Advice of Charge (AoC) − This service was designed to give the subscriber an indication of the cost
of the services as they are used.
Furthermore, those service providers who wish to offer rental services to subscribers without their own
SIM can also utilize this service in a slightly different form. AoC for data calls is provided on the basis
of time measurements.
5)Closed User Groups (CUGs) − This service is meant for groups of subscribers who wish to call only
each other and no one else.
6)Unstructured supplementary services data (USSD) − This allows operator-defined individual
services.
Q Describe the call processing in GSM using suitable diagram and state how call is connected when
sender MS and receiver MS both are present within the same cell.(S-23/W-23)
(Note: Any other relevant diagram covering the above blocks can be considered.)
1. The MS sends the dialed number indicating the service requested to the MSC(via BSS)
2. The MSC checks from the VLR if the MS is allowed the requested service. If so, MSC asks BSS to
allocate necessary resources for the call.
Examination Paper Analysis and Solution
3. If the call is allowed, the MSC routes the call to GMSC.
4. The GMSC routes the call to the local exchange of called user.
5. The LE alerts (applies ringing) the called terminal.
6. Answer back (ring back tone) from the called terminal to LE.
7. Answer back signal is routed back to the MS through the serving MSC which also completes the
speech path to the MS.
Call connection when sender MS and receiver MS both are present within the same cell.
1. The MS sends the dialed number indicating the service requested to the MSC(via BSS)
2. The MSC checks from the VLR if the MS is allowed the requested service. If so, MSC asks BSS to
allocate necessary resources for the call.
3. If the call is allowed, the MSC routes the call to the receiver MS via BSS as both MS are in the same
cell.
Q Draw the labeled architecture of GSM and explain the functions of the following entities
i) MSC ii) HLR
BCCH (Broadcast Control Channel) : It broadcasts information about the serving cell.
SCH (Synchronization channel) : Carries information like frame number and BSIC (Base
Station Identity Code) for frame synchronization.
FCCH (Frequency Correction Channel) : Enable MS to synchronize to frequency.
CCCH (Common Control Channel) : It has following types –
RACH (Random Access Channel) : Used by MS when making its first access to network.It
is for up-link only.
AGCH (Access Grant Channel) : Used for acknowledgement of the access attempt sent on
RACH. It is for down-link only.
PCH (Paging Channel) : Network page the MS, if there is an incoming call or a short
message. It is for down-link only.
DCCH (Dedicated Control Channel) : It is for both up-link and down-link. It has following
types –
SDCCH (Stand-alone Dedicated Control Channel) : It is used for call setup, authentication,
ciphering location update and SMS.
SACCH (Slow Associated Control Channel) : Used to transfer signal while MS have
ongoing conversation on topic or while SDCCH is being used.
FACCH (Fast Associated Control Channel) : It is used to send fast message like hand over
message.
Q with neat diagram describe Hand off procedure.List types of Hand off.
In cellular telecommunications, the terms handover or handoff refers to the process of transferring an
ongoing call or data connectivity from one Base Station to another Base Station. When a mobile moves
into a different cell while the conversation is in progress then the MSC (Mobile Switching Center)
transfers the call to a new channel belonging to the new Base Station.
When a mobile user A moves from one cell to another cell then BSC 1 signal strength loses for the
mobile User A and the signal strength of BSC 2 increases and thus ongoing calls or data connectivity
for mobile users goes on without interrupting.
Types of Handoff
Hard Handoff
Soft Handoff
Delayed Handoff
Examination Paper Analysis and Solution
Mobile-Assisted Handoff
Q Write the important features of GSM and state the services offered by GSM.
9. Supports international roaming
10. Clear voice clarity
11. Ability to support multiple handheld devices.
12. Spectral / frequency efficiency
13. Low powered handheld devices.
14. Ease of accessing network
15. International ISDN compatibility.
16. Low service cost.
17. New features and services.
HLR : HLR stands for Home Location Register. HLR is a database containing pertinent data regarding
subscribers authorized to use a GSM network. If you purchase SIM card from in the HLR. HLR is like a
home which contains all data like your ID proof, which plan you are taking, which caller tune you are
using etc
VLR : VLR stands for Visitor Location Register. VLR is a database which contains the exact location of
all mobile subscribers currently present in the service area of MSC. If you are going from one state to
another state then your entry is marked into the database of VLR.
BTS : BTS stands for Base Transceiver Station which facilitates wireless communication between user
equipment and a network. Every tower has BTS.
Examination Paper Analysis and Solution
BSC : BSC stands for Base Station Controller. BSC has multiple BTS. You can consider the BSC as a
local exchange of your area which has multiple towers and multiple towers have BTS.
OMC : OMC stands for Operation Maintenance Center. OMC monitor and maintain the performance
of each MS, BSC and MSC within a GSM system.
Three subsystem BSS, NSS and OSS are connected with each other via some interfaces. Total three
interfaces are there:
1. Air Interface : Air interface is also known as UM interface. Interface between MS and BTS
is called as UM interface because it is mobile analog to the U interface of ISDN.
2. Abis Interface : It is a BSS internal interface linking with BTS and BSC.
3. A interface : It provides communication between BSS and MSC.
Q Describe the process of mobile terminated call (incoming call)in GSM with neat call flow sequence
diagram.
Mobile-Terminated Call
A terminated call in the GSM network is a call received on a mobile device. For a Mobile Terminal(MT)
to be placed, it is necessary to locate the network to which the called subscriber is currently connected,
and, once this is done, to route the call towards the destination MS.
1. When a call is made, the country code of the phone number is used to find the location of the receiver
and also to find the MSC which the subscriber is linked to.
2. It is the job of the HLR to keep track of the MSC/VLR the MS visits so that the authentication process
of the subscriber becomes easier.
3. A temporary roaming number called the Mobile Station Roaming Number(MSRN) is generated by
the MSC for the call to be transferred to the MSC
4. After that all the BSCs are paged by the MSC and also the BTSs are paged by the BSC.
5. After that a radio channel is established between MS and BTS.
6. the last step is to send the reply to MSC so that it initiates encoding of calls and sends a call
confirmation to the BS and the mobile starts to ring.
Examination Paper Analysis and Solution
QDefine the term
1)Routing area –
The routing area is the packet-switched domain equivalent of the location area.
A "routing area" is normally a subdivision of a "location area".
Routing areas are used by mobiles which are GPRS-attached.
2) Location area-
A "location area" is a set of base stations that are grouped together to optimize signaling.
Typically, tens or even hundreds of base stations share a single Base Station Controller(BSC) in GSM,
or a Radio Network Controller(RNC) in UMTS.
Q Draw the block diagram of the architecture of PCS (Personal Communication Services) and explain.
Q Explain location update procedure for a inter LA movement in GSM with suitable diagram.
Inter LA movement in GSM Step 1:
Step 1.
The MS moves from LA1 to LA2, where both LAs are connected to the same MSC .
A location update request message is sent from the MS to the MSC through the BTS, include the
address of the previously visited LA, MSC, and VLR .
TMSI is used to avoid sending the IMSI on the radio path
Step 2. The MSC forwards the location update request to the VLR by a o TCAP (TRANSACTION
CAPABILITY APPLICATION PART) message, MAP_UPDATE_LOCATION_AREA , Address of the
MSC ,TMSI of the MS ,Previous location area identification (LAI) ,Target LAI , Other related information
Step 3 and Step 4. MSC updates the LAI field of the VLR record, and replies with an acknowledgment
to the MS through the MSC
1. databases 2. Switches 3. Radio System Databases: GSM utilizes databases such as HLR, VLR and
AuC. It also consists of EIR which is used to maintain a list of legitimate , fraudulent mobile station(faulty)
EIR is optional in GSM. AuC /EIR is a combined Node To accomplish mobility management, VLRs
communicate using G interface and HLR to VLR using D interface Switches :
• The GMSC performs necessary switching functions for mobile stations within the geographical area it
controls. An MSC area is partitioned into several location areas. Each LA consists of many BTS. For
originating a call from MS to a wireline user, the MSC communicates with SSP in the PSTN using
SS7ISUP protocol
• To deliver a call from PSTN to MS, the originating SSP in PSTN with Gateway MSC using SS&ISUP
protocol
• In Intersystem Handoff, 2 MSCs are required to communicate through E interface
• To perform Mobility and call handling tasks, the MSC needs to communicate with HLR using the C
interface and with VLR using B interface
• To prevent Fraudulent handset usage, MSC communicates with EIR using F interface
Radio system It consists of BSc, BTS and MS. The BSCs connect to MSC through A interface. BSC
connects to BTS through A-Bis interface using ISDN link access protocol for D channel(LAPD). A BTS
communicates with MS through radio interface Um
Q Draw the architecture and explain the IEEE 802.11 Wireless LANs Services.
i) Basic Service Set (BSS)
ii) Extended Service Set
Examination Paper Analysis and Solution
1) Basic Service Set (BSS): A basic service set is a group of stations communicating at physical layer
level. BSS can be of two categories depending upon mode ofoperation:
Infrastructure BSS: Here, the devices communicate with other devices throughaccess points.
Independent BSS: Here, the devices communicate in peer-to-peer basis in an ad hoc manner.
2) Extended Service Set (ESS): It is a set of all connected BSS.
Q Define Mobile IP and explain principle of operation with suitable diagram showing home agent and
foreign agent.(W-22/S-23/W-23)
Mobile IP is a communication protocol (created by extending Internet Protocol, IP) that allows the users
to move from one network to another with the same IP address. It ensures that the communication will
continue without the user’s sessions or connections being dropped.
The correspondent node sends the data to the mobile node. Data packets contain the correspondent
node’s address (Source) and home address (Destination). Packets reach the home agent. But now
mobile node is not in the home network, it has moved into the foreign network. The foreign agent sends
the care-of-address to the home agent to which all the packets should be sent. Now, a tunnel will be
established between the home agent and the foreign agent by the process of tunneling. It is the process
of sending a packet via a tunnel and it is achieved by a mechanism called encapsulation. Now, the
home agent encapsulates the data packets into new packets in which the source address is the home
address and destination is the care-of-address and sends it through the tunnel to the foreign agent.
Foreign agent, on another side of the tunnel, receives the data packets, decapsulates them, and sends
them to the mobile node. The mobile node in response to the data packets received sends a reply in
response to the foreign agent. The foreign agent directly sends the reply to the correspondent node.
Q Draw the labeled GPRS network architecture and state the role of SGSN and GGSN in GPRS.
(W22/S23)
Examination Paper Analysis and Solution
Serving GPRS Support Node (SGSN) The Serving GPRS Support Node is responsible for
authentication of GPRS mobiles, registration of mobiles in the network, mobility management, and
collecting information on charging for the use of the air interface.
Gateway GPRS Support Node (GGSN) The Gateway GPRS Support Node acts as an interface and a
router to external networks. It contains routing information for GPRS mobiles, which is used to tunnel
packets through the IP based internal backbone to the correct Serving GPRS Support Node. The GGSN
also collects charging information connected to the use of the external data networks and can act as a
packet filter for incoming traffic
Data routing or routing of data packets to and fro from a mobile user, is one of the pivot requisites in
the GPRS network. The requirement can be divided into two areas:
The important roles of GGSN involve synergy with the external data network. The GGSN updates the
location directory using routing information supplied by the SGSNs about the location of an MS. It routes
the external data network protocol packet encapsulated over the GPRS backbone to the SGSN
currently serving the MS. It also decapsulates and forwards external data network packets to the
appropriate data network and collects charging data that is forwarded to a charging gateway (CG).
• Mobile-originated message - This path begins at the GPRS mobile device and ends at the host.
Examination Paper Analysis and Solution
• Network-initiated message when the MS is in its home network - This path begins at the host
and ends at the GPRS mobile device.
• Network-initiated message when the MS roams to another GPRS network - This path begins
at the host of visited network and ends at the GPRS mobile device.
Bluetooth Architecture:
The architecture of Bluetooth defines two types of networks:
1. Piconet
2. Scatternet
Examination Paper Analysis and Solution
Piconet:
Piconet is a type of Bluetooth network that contains one primary node called the master node and seven
active secondary nodes called slave nodes.
Thus, we can say that there is a total of 8 active nodes which are present at a distance of 10 meters.
The communication between the primary and secondary nodes can be one-to-one or one-to-many.
Possible communication is only between the master and slave; Slave-slave communication is not
possible.
It also has 255 parked nodes, these are secondary nodes and cannot take participation in
communication unless it gets converted to the active state.
Scatternet:
It is formed by using various piconets. A slave that is present in one piconet can act as master or we
can say primary in another piconet.
This kind of node can receive a message from a master in one piconet and deliver the message to its
slave in the other piconet where it is acting as a master. This type of node is referred to as a bridge
node. A station cannot be mastered in two piconets.
Frequency There are 6 basic frequencies on which RFID operates. These are 132.4 KHz, 13.56 MHz,
433 MHz, 918 MHz, 2.4 GHz & 5.8 GHz Low frequency systems (30KHz – 500 KHz) systems High
Frequency (850 MHz – 950 MHz & 2.4 GHz – 2.5 GHz) systems Application area Speed of object and
distance to read determines the type of tag to be used.
RFID used for livestock will be different from the tag used in rail road. Power Level There are 2 types
based on power requirements.
These are active and passive tags. Passive tags are generally in low frequency range whereas tags at
higher frequency range can be active or passive. Active: They are powered by an internal battery and
are typically read/ write type.
The life of active tag is limited to the life of battery. The memory can vary from few bytes to 1 MB.
Applications of RFID: 1. Automotive:
Auto makers have added security and convenience to automobiles by using RFID technology for anti-
theft immobilizers and passive entry systems.
Some auto manufacturers use RFID systems to move cars through an assembly line. At each
successive stage of production, the RFID tag tells the computers what the next step of the automated
assembly is.
Examination Paper Analysis and Solution
2. Animal tracking:
Ranchers and livestock producers use RFID technology to meet export regulations and optimize
livestock value.
Wild animals are tracked in ecological studies, and many pets that are tagged are returned to their
owners. Thus a tag can carry information as simple as a pet owner’s name and address.
3. Assets tracking:
Hospitals and pharmacies meet tough product accountability legislation with RFID; libraries limit theft
and keep books in circulation more efficiently.
4. Supply chain:
Wal-Mart, Target, Best Buy, and other retailers have discovered that RFID technology can keep
inventories at the optimal level, reduce out of stock losses, limit shoplifting, and speed customers
through check-out lines.
There is a variety of channels used within GPRS, and they can be set into groups dependent upon
whether they are for common or dedicated use. The system does use the GSM control and broadcast
channels for initial set up, but all the GPRS actions are carried out within the GPRS logical channels
carried within the PDCH Broadcast channels:
• Packet Broadcast Central Channel (PBCCH):
• This is a downlink only channel that is used to broadcast information to mobiles and informs them of
incoming calls etc.
• It is very similar in operation to the BCCH used for GSM.
• In fact, the BCCH is still required in the initial to provide a time slot number for the PBCCH.
• In operation the PBCCH broadcasts general information such as power control parameters, access
methods and operational modes, network parameters, etc., required to set up calls.
Common control channels:
• Packet Paging Channel (PPCH): This is a downlink only channel and is used to alert the mobile to an
incoming call and to alert it to be ready to receive data. It is used for control signaling prior to the call
set up. Once the call is in progress a dedicated channel referred to as the PACCH takes over.
• Packet Access Grant Channel (PAGCH): This is also a downlink channel and it sends information
telling the mobile which traffic channel has been assigned to it. It occurs after the PPCH has informed
the mobile that there is an incoming call.
• Packet Notification Channel (PNCH): This is another downlink only channel that is used to alert
mobiles that there is broadcast traffic intended for a large number of mobiles. It is typically used in what
is termed point-to-point multicasting.
• Packet Random Access Channel (PRACH): This is an uplink channel that enables the mobile to initiate
a burst of data in the uplink. There are two types of PRACH burst, one is an 8 bit standard burst, and a
second one using an 11 bit burst has added data to allow for priority setting. Both types of bursts allow
for timing advance setting.
Dedicated control channels:
• Packet Associated Control Channel (PACCH): : This channel is present in both uplink and downlink
directions and it is used for control signaling while a call is in progress. It takes over from the PPCH
once the call is set up and it carries information such as channel assignments, power control messages
and acknowledgements of received data.
• Packet Timing Advance Common Control Channel (PTCCH): This channel, which is present in both
the uplink and downlink directions is used to adjust the timing advance. This is required to ensure that
messages arrive at the correct time at the base station regardless of the distance of the mobile from
the base station. As timing is critical in a TDMA system and signals take a small but finite time to travel
this aspect is very important if long guard bands are not to be left.
Dedicated traffic channel:
• Packet Data Traffic Channel (PDTCH): This channel is used to send the traffic and it is present in both
the uplink and downlink directions. Up to eight PDTCHs can be allocated to a mobile to provide high
speed data.
Examination Paper Analysis and Solution
iv) Application. Mobile, home, business etc. Laptop , notebook, printer, scanner etc.
Q State the processes involved in the use of RFID in student attendance in a college.
Master Soft’s RFID-based attendance system is an advanced solution for managing attendance
records. It consists of an RFID reader, RFID tags, an LCD display, and a microcontroller unit.
Students, faculty, and staff members are provided with RFID tags, which they present to the reader to
mark their attendance.
The reader then emits radio frequency signals that are received by the tags, which respond by
transmitting their unique identification numbers.
The reader captures these UIN numbers and sends them to the microcontroller unit for processing.
The system records the attendance in a database and displays it on an LCD screen. This automated
system eliminates the need for manual record-keeping and offers speed, accuracy, and convenience.
Master Soft’s RFID-based attendance system simplifies attendance management by offering a
seamless and efficient solution that automates record-keeping, eliminates manual roll-calls, ensures
accuracy, and enhances overall productivity.
The preference given to a service when compared to another service is known as Service Precedence.
• high
• normal
• low
When there is network congestion, the packets of low priority are discarded as compared to high or
normal priority packets.
Reliability
This parameter signifies the transmission characteristics required by an application. The reliability
classes are defined which guarantee certain maximum values for the probability of loss, duplication,
mis-sequencing, and corruption of packets.
Delay
The delay is defined as the end-to-end transfer time between two communicating mobile stations or
between a mobile station and the GI interface to an external packet data network.
This includes all delays within the GPRS network, e.g., the delay for request and assignment of radio
resources and the transit delay in the GPRS backbone network. Transfer delays outside the GPRS
network, e.g., in external transit networks, are not taken into account.
Throughput
The throughput specifies the maximum/peak bit rate and the mean bit rate.
Using these QoS classes, QoS profiles can be negotiated between the mobile user and the network for
each session, depending on the QoS demand and the available resources.
The billing of the service is then based on the transmitted data volume, the type of service, and the
chosen QoS profile.
S.No.
GSM GPRS
GSM stands for Global Systems for GPRS stands for General Packet
1.
Mobile. Radio Service.
S.No.
GSM GPRS
modulation where SMS has a profound simple wireless access to packet data
effect on society. networks than standard GSM.
It does not allow direct connection to the It allows direct connection to the
8.
internet. internet.
In GSM, single time slot is allotted to a In GPRS, multiple time slots can be
10.
single user. allotted to a single user.
Q Draw and explain the labeled architecture of UMTS, also state its two applications.(S-23, W-23,S-
22,W-22),4 Marks
Examination Paper Analysis and Solution
UMTS system uses the same core network as the GPRS and uses an entirely new radio interface.
• The new radio network in UMTS is called UTRAN (UMTS Terrestrial Radio Access Network) and is
connected to the core network (CN) of GPRS via Iu interface.
• The Iu is the UTRAN interface between the Radio network controller RNC and CN.
The mobile terminal in UMTS is called User Equipment (UE). The UE is connected to Node-B over a
high-speed Uu (up to 2 Mbps) Interface. The Node-B are the equivalent of BTS in GSM and typically
serves a cell site. Several Node-Bs are controlled by a single RNCs over the Iub interface.
• _The RNCs are connected to CN through Iu interface.
• _The packet-switched data is transmitted through Iu-PS interface and circuit-switched data is
transferred over Iu-CS interface. One of the new interfaces in UTRAN is Iur interface which connects
two RNCs and has no equivalent in GSM system. The Iur interface facilitates the handling of 100 percent
of RRM (Radio Resource Management) and eliminates the burden from CN.
• _UMTS also supports GSM mode connections in which case the MS connects to the CN through Um
interface to BSS, and BSS connects through A (Gb interface in GPRS) interface to CN
Applications of UMTS
• Streaming and downloading of video and audio.
• Internet of things
• Mobile E-commerce
• Fast Internet and Intranet
• Mobile Entertainment(Gaming)
• Email and Multimedia Messages.
• Video Conferences.
Q Draw the WAP layered architecture and protocol stack and state the functions of any four protocols.
(S-23, W-23, S-22, W-22) 4 Marks
Examination Paper Analysis and Solution
Function of protocol
1. Wireless Datagram Protocol (WDP): The WDP allows WAP to be bearer-independent by adapting
the transport layer of the underlying bearer. The WDP presents a consistent data format to the higher
layers of the WAP protocol stack, thereby offering the advantage of bearer independence to application
developers.
2. Wireless Transport layer Security (WTLS): WTLS incorporates security features that are based upon
the established Transport Layer Security (TLS) protocol standard. It includes data integrity checks,
privacy, service denial, and authentication services.
3. Wireless Transaction Protocol (WTP): The WTP runs on top of a datagram service, such as User
Datagram Protocol (UDP) and is part of the standard suite of TCP/IP protocols used to provide a
simplified protocol suitable for low bandwidth wireless stations.
4. Wireless Session Protocol (WSP): Unlike HTTP, WSP has been designed by the WAP Forum to
provide fast connection suspension and reconnection.
5. Wireless Application Environment (WAE): This layer is of most interest to content developers
because it contains among other things, device specifications, and the content development
programming languages, WML, and WML Script
Q6c.Compare 1G,2G,3G,4G,5G
Q 3 a Compare WCDMA and CDMA 2000. (Any four points). (W-23 4 marks,S-22 6 marks,W-22,4M)
Examination Paper Analysis and Solution
Q 5 c i) State IMT 2000 specifications. ii) State the advantages of 3G wireless network system.(W-
23,W-226M)
Ans
IMT 2000 specifications (W-23/S-22 ,2 Marks)
i)IMT-2000 Stands for International Mobile Telecommunications2000.An Initiative of the International
Telecommunication Union (ITU) to create a global standard for wireless data networks.
• The goal of International Mobile Telecommunications-2000 (IMT-2000) is to support data transmission
rates of up to 2 Mbps for fixed stations and 384 Kbps for mobile stations.
• The "2000" in the term "International Mobile Telecommunications-2000 " refers to the transmission
speed (approximately 2000 Kbps),
• It provides Uplink frequency of 1885-2025 MHz and Downlink frequency of 2110-2200 MHz
Transmission mode: FDD for mobile and satellite applications and TDD for indoor and pedestrian type
applications.
• It is used for all radio environments. It supports both packet switched and circuit switched data
transmission.
• It offers high spectrum efficiency. It supports wide range of telecommunication services like voice,
data, multimedia and internet.
ii)
Parameters 3G Technology 4G Technology
Frequency band used. The frequency range of 3G While its frequency range is
technology is from 1.8 from 2 GHz to 8 GHz.
GHz to 2.5 GHz.
Data rate While the maximum upload
The maximum upload rate rate of 4G technology is 500
of 3G technology is 5 Mbps.
Mbps.
Features of 5G technology:
1.The 5G technology is providing up to 25Mbps connectivity speed.
2. 5G technology offer high resolution for crazy cell phone user and bi-directional large bandwidth
shaping.
3.5G technology also providing subscriber supervision tools for fast action.
4.The advanced billing interfaces of 5G technology makes it more attractive and effective.
5. The high-quality services of SG technology based on policy to avoid error.
6. The traffic statistics by SG technology makes it more accurate.
7. 5G technology is providing large broadcasting of data in Gigabit which supporting almost 65,000
connections.
8. The remote diagnostics also a great feature of 5G technology.
Examination Paper Analysis and Solution
Ans
4G Architecture
4G network is an integration of all heterogeneous wireless access networks such as Ad hoc, cellular,
hotspot and satellite radio component. Technologies used in 4G are smart antennas for multiple input
and multiple output (MIMO), IPv6, VoIP, OFDM and Software Defined Radio (SDR) System. Smart
Antennas: Smart Antennas are Transmitting and receiving antennas. It does not require increase
power and additional frequency.
IPV6 Technology: 4G uses IPV6 Technology in order to support a large number of wireless enable
devices. It enables a number of applications with better multicast, security and route optimization
capabilities.
VoIP: It stands for Voice over IP. It allows only packet to be transferred eliminating complexity of 2
protocols over the same circuit.
OFDM OFDM stands for Orthogonal Frequency Division Multiplexing. It is currently used as WiMAX
and Wi-Fi. SDR: SDR stands for Software Defined Radio. It is the form of open wireless architecture.
MME- Mobility Management Entity: It is used for Paging, Authentication, Handover and Selection of
Serving Gateway sGW-Serving Gateway: It is used to Routing and Forwarding user data packet.
PDN-GW Packet Data Network Gateway: It is used for User Equipment (UE) IP allocation.
HSS-Home Subscriber Server: It is a user Database used for service subscriber, user identification
and addressing PCRF-Policy and Charging Rule Function: It provide quality of service and charging
eNode B-evolved Node B: It is used as radio resources management and radio bearer control.
Advantages:
• It provides better spectral efficiency.
• It has high speed, high capacity and low cost per bit. Disadvantage:
• Battery usage is more.
• Hard to implement
Examination Paper Analysis and Solution
Q 2.Draw the labeled wireless local loop architecture and list the two functions of each i) WANU ii)
WASU. (S-23,S-22,W-22 -6M) 4 Marks
WLL stands for Wireless Local Loop. Microwave wireless links can be used to create a wireless local
loop as shown in figure above.
Wireless Access Network Unit (WANU):
• It is an interface between underlying telephone network and wireless link.
• It consists of Base Station Transceivers (BTS) or Radio ports (RP), Radio Port Controller Unit (RPCU)
or BSC Access Manager (AM).
Home Location register (HLR).
• It is present at the local exchange office.
• All local WASUs are connected to it. Its functions include: Authentication, Operation & maintenance,
Routing, Transreceiving voice and data.
Wireless Access Subscriber Unit (WASU)
• It is located at the subscriber.It translates wireless link into a traditional telephone connection.
• It provides an air interface toward the network and another interface to the subscriber. This interface
includes protocol conversion and transcoding, authentication functions
Q.3 Encode the datastream 01001110 using the following techniques i) Unipolar – NRZ ii) Polar – RZ
Ans:
Examination Paper Analysis and Solution
Q 4 Explain the working principle of ASK and FSK with suitable waveforms using the given bit sequence
10110
Ans:
ASK: Amplitude shift keying (ASK) is the digital modulation technique. In Amplitude shift keying, the
amplitude of the carrier signal is varied to create signal elements. Both frequency and phase remain
constant while the amplitude changes. In ASK, the amplitude of the carrier assumes one of the two
amplitudes dependent on the logic states of the input bit stream.
FSK: Frequency shift keying (FSK) is the digital modulation technique. In Frequency shift keying, the
frequency of the carrier signal is varied to create signal elements. Both amplitude and phase remain
constant while the frequency changes.
Examination Paper Analysis and Solution
In PCM Samples of signal are usually correlated as amplitude of signal does not change much i.e.
signal is correlated or carries redundant information. This aspect of speech signal is exploited in
Examination Paper Analysis and Solution
Differential Pulse Code Modulation (DPCM) technique. A predictor block, a summing unit and a
subtraction unit have been strategically added to the chain of blocks of PCM coder instead of feeding
the sampler output directly to a linear quantizer.
DPCM Receiver
The notation of the signals is the same as the previous ones. In the absence of noise, the encoded
receiver input will be the same as the encoded transmitter output. As mentioned before, the predictor
assumes a value, based on the previous outputs. The input given to the decoder is processed and that
output is summed up with the output of the predictor, to obtain a better output.
Q.8 Explain the types of digital carrier modulation (ASK, FSK, PSK) any one with waveform.
Ans.
1.The carrier is a sinewave of frequency.
2. The digital signal from the computer acts as the modulating signal.
3. The ASK modulator is nothing but a multiplier followed by a band pass filter.
4. Due to the multiplication, the ASK output will be present only when a binary “1”
is to be transmitted. The ASK output corresponding to a binary “0” is zero.
5. The carrier is transmitted when a binary 1 is to be sent and no carrier is transmitted when a binary 0
is to be sent.
Examination Paper Analysis and Solution
Q 10 Encode the datastream 1011000101 using the following techniques i) RZ Bipolar ii) AMI iii)
Manchester iv) NRZ-unipolar (S-22) 4 Marks
Examination Paper Analysis and Solution
Q .11 Explain the principle of working of ASK and BPSK with suitable waveforms for the bit sequence
110101100 ASK Block Diagram (S-22) ,6 Marks
Phase-shift keying (PSK) is a digital to analog modulation scheme based on changing, or modulating,
the initial phase of a carrier signal. • PSK is used to represent digital information, such as binary digits
zero (0) and one (1).The modulation of PSK is done using a balance modulator, which multiplies the
two signals applied at the input. • For a zero binary input, the phase will be 180° and for a high input,
the phase reversal is of 0° • Following is the diagrammatic representation of PSK Modulated output
wave along with its given input. • The output sine wave of the modulator will be the direct input carrier
or the inverted (180° phase shifted) input carrier, which is a function of the data signal. • Amplitude and
frequency of the original carrier signal is kept constant.
Ans
Examination Paper Analysis and Solution
Ans:
Applications of WSN are as follows:
Q.3 Draw the labeled block diagram of sensor node in WSN and define its role in WSN. (S- 23) 4Marks
Definition:
A Sensor Network is composed of a large number of sensor nodes, which are tightly positioned either
inside the phenomenon or very close to it. A wireless sensor network (WSN) can be defined as a
network of low-size and low-complex devices denoted as nodes that can sense the environment and
communicate the information gathered from the monitored field through wireless links.
Sensor node: A basic unit in a sensor network, with on-board sensors, processor, memory, wireless
modem, and power supply. It is often abbreviated as node. When a node has only a single sensor on
board, the node is sometimes referred as a sensor.
Q. 4 State and explain any four features of IOT in mobile computing. (S- 23) 4Marks
The most important features of IoT on which it works are connectivity, analyzing, integrating, active
engagement etc.
Connectivity: Connectivity refers to establish a proper connection between all the things of IoT-to-IoT
platform- it may be server or cloud. After connecting the IoT devices, it needs a high-speed messaging
between the devices and cloud to enable reliable, secure and bi-directional communication.
Analyzing: After connecting all the relevant things, it comes to real-time analyzing the data collected
and use them to build effective business intelligence. If we have a good insight into data gathered from
all these things, then we call our system has a smart system.
Integrating: IoT integrating the various models to improve the user experience as well.
Artificial Intelligence: IoT makes things smart and enhances life through the use of data. For example,
if we have a coffee machine whose beans have going to end, then the coffee machine itself order the
coffee beans of your choice from the retailer.
Examination Paper Analysis and Solution
Sensing: The sensor devices used in IoT technologies detect and measure any change in the
environment and report on their status. IoT technology brings passive networks to active networks.
Without sensors, there could not hold an effective or true IoT environment.
Active Engagement: IoT makes the connected technology, product, or services to active engagement
between each other.
Q.5 Describe the energy consumption in WSN and how does WSN reduce energy consumption
(S 23 4 Marks)
Ans
A huge effort has been made to design and implement an efficient energy management scheme to save
the limited energy available for each sensor node. • The energy consumption can be further classified
into: i) duty-cycling ii) mobility-based and iii) data-driven. • Through the duty cycle method, the sensor
node can alternate between sleep and active modes in order to minimize the power consumed in the
active mode.
In the mobility-based method, a mobile node is employed to collect the sensed data from stationary
sensor nodes, and therefore minimize the power consumed in multi-hop forwarding of data. • The data-
driven methods are based on prediction and aggregation algorithms to minimize the power consumed
in the transmission process.
Q.6 Define MANET, which topology is preferably suitable for MANET? List the four features of MANET.
(W-23) 6 Marks
Ans
MANET A mobile ad hoc network (MANET) is a collection of mobile nodes dynamically establishing
short-lived networks in the absence of fixed infrastructure. Each mobile node is equipped with a wireless
transmitter and receiver with an antenna. Topology preferably suitable for MANET is dynamic
autonomous topology.
Features of MANET
3. Autonomous Behavior: Each node can act as a host and router, which shows its autonomous
behavior.
4. No hardware or physical infrastructure: In MANET mobile devices can communicate and send data
to each other autonomously, no hardware or physical infrastructure is involved; Each node behaves as
a router and they forward traffic to other specified nodes in the network.
5. Self-configured wireless network: An ad hoc network is a self-configured wireless network that allows
each wireless node to forward and receive data dynamically.
7. Limited physical security: Wireless networks are more prone to security threats. than wire line
networks, such as eavesdropping, spoofing, and denial of services (DoS) attacks.
8. Energy-Constrained Operation: Mobile nodes are characterized by less memory, less power, and
lightweight features. Therefore, almost all the nodes rely on batteries or other exhaustible means for
their energy.
9. Bandwidth constrained & less Reliability: Wireless links usually have less reliability, efficiency,
stability, and capacity as compared to a wired network.
10. Anywhere connectivity: MANET allows users to access and exchange information regardless of
their geographic position or proximity to infrastructure.
Ans
Applications of MANET:
1. Military Sector: Military equipment now routinely contains some sort of computer equipment. Ad-hoc
networking would allow the military to take advantage of commonplace network technology to maintain
an information network between the soldiers, vehicles, and military information headquarters. The basic
techniques of Ad-hoc network came from this field.
2. Crisis -Management Application: Ad hoc can be used in emergency rescue operations for disaster
management, e.g., in fire, flood, or earthquake. This may be because all of the equipment’s were
destroyed, or perhaps because the region is at remote place.
3. Low Level: Appropriate low-level application might be in domestic networks where devices can
communicate directly to exchange information. Similarly in other civilian environments like taxi, sports
stadium, boat and small aircraft, mobile Ad-hoc communications have many applications.
4. Data Networks: A commercial application for MANETS include wide range computing. By allowing
computers to forward data to others, data networks may be extended far beyond the usual reach of
installed infrastructure. Networks may be made more widely available and easier to use
5. Vehicular Area Network: Ad-hoc network is useful in forming network among different vehicles on the
road and can propagate information like accidents, congestion. It is also helpful in determining nearby
facilities such as gas station, restaurants, hospitals, and other facilities.
6. Personal Area Network: PAN is short range, localized network where nodes are associated with a
given person. These nodes could be attached to someone's cell phone laptop and television and so on.
Examination Paper Analysis and Solution
Q.8 Explain protocol layer architecture of WSN. W-23 4M OR draw the architecture of WSN and explain.
(S-22 4M)
Ans
The most common WSN architecture follows the OSI architecture Model. The architecture of the WSN
includes five layers and three cross layers. Mostly in sensor network require five layers, namely
application, transport, network, data link and physical layer. The three cross planes are namely power
management, mobility management, and task management. These layers of the WSN are used to
accomplish the network and make the sensors work together in order to raise the complete efficiency
of the network.
Physical Layer: The physical layer provides an edge for transferring a stream of bits above physical
medium. This layer is responsible for the selection of frequency, generation of a carrier frequency, signal
detection, Modulation and data encryption.
• Data Link Layer: The data link layer is responsible for multiplexing of data streams, frame detection,
Media Access Control (MAC) and error control.
• Transport Layer: The function of the transport layer is to deliver congestion avoidance and reliability
where a lot of protocols intended to offer this function are either practical on the upstream. • Network
Layer: The main function of the network layer is routing, it has a lot of tasks based on the application,
but actually, the main tasks are in the power conserving, partial memory, buffers, and sensor don't have
a universal and have to be self-organized
. • Application Layer: The application layer is liable for traffic management and offers software for
numerous applications that convert the data in a clear form to find positive information.
IOT technology has a wide variety of applications and use of Internet of Things is growing so faster.
Depending upon different application areas of Internet of Things, it works accordingly as per it has been
designed/developed. But it has not a standard defined architecture of working which is strictly followed
universally. The architecture of IoT depends upon its functionality and implementation in different
sectors. Still, there is a basic process flow based on which IoT is built.
So here in this article we will discuss basic fundamental architecture of IoT i.e.4 Stage IoT architecture.
Examination Paper Analysis and Solution
So, from the above image it is clear that there is 4 layers are present that can be divided as follows:
Sensing Layer, Network Layer, Data processing Layer, and Application Layer.
These are explained as following below.
1. Sensing Layer –
The sensing layer is the first layer of the IoT architecture and is responsible for collecting
data from different sources. This layer includes sensors and actuators that are placed in
the environment to gather information about temperature, humidity, light, sound, and
other physical parameters. These devices are connected to the network layer through
wired or wireless communication protocols.
2. Network Layer –
The network layer of an IoT architecture is responsible for providing communication and
connectivity between devices in the IoT system. It includes protocols and technologies
that enable devices to connect and communicate with each other and with the wider
internet. Examples of network technologies that are commonly used in IoT include WiFi,
Bluetooth, Zigbee, and cellular networks such as 4G and 5G. Additionally, the network
layer may include gateways and routers that act as intermediaries between devices and
the wider internet, and may also include security features such as encryption and
authentication to protect against unauthorized access.
3. Data processing Layer –
The data processing layer of IoT architecture refers to the software and hardware
components that are responsible for collecting, analyzing, and interpreting data from IoT
devices. This layer is responsible for receiving raw data from the devices, processing it,
and making it available for further analysis or action. The data processing layer includes a
variety of technologies and tools, such as data management systems, analytics platforms,
and machine learning algorithms. These tools are used to extract meaningful insights
from the data and make decisions based on that data. Example of a technology used in
the data processing layer is a data lake, which is a centralized repository for storing raw
data from IoT devices.
4. Application Layer –
The application layer of IoT architecture is the topmost layer that interacts directly with the
end-user. It is responsible for providing user-friendly interfaces and functionalities that
enable users to access and control IoT devices. This layer includes various software and
applications such as mobile apps, web portals, and other user interfaces that are
designed to interact with the underlying IoT infrastructure. It also includes middleware
services that allow different IoT devices and systems to communicate and share data
seamlessly. The application layer also includes analytics and processing capabilities that
Examination Paper Analysis and Solution
allow data to be analyzed and transformed into meaningful insights. This can include
machine learning algorithms, data visualization tools, and other advanced analytics
capabilities.
Wireless sensor network (WSN) is a network that consists of large number of low power sensor nodes.
Leach is a less energy adaptive clustering hierarchy protocol. The main goal of cluster-based sensor
networks is to decrease system delay and reduce energy consumption. This is also a protocol that is
cluster based for micro sensor networks that achieves energy efficiency, scalable routing and fair media
access. Since security has an integral role to play here, some modifications have been done in the
wireless sensor network.
Wireless sensor networks have autonomous nodes to monitor environmental conditions like
temperature, sound, vibration etc. Leach protocol is a Time Division Multiple Access (TDMA) based
Multiple Access Control (MAC) protocol. The Purpose of this protocol is to elongate the lifespan of
wireless networks by lowering the energy. Leach protocol functions in rounds and each round contains
two phases; first is cluster setup stage and second is steady state storage with the aim to reduce trivial
energy costs.
Also, here in each round some fixed number of cluster heads are elected and do not then stand a
chance to become a cluster head next time in one cycle. This is needed to balance energy consumption.
These kinds of protocols are invented to minimize the energy consumption by aggregating data and to
reduce the transmission to the base station. A node can become a cluster head only if it has an energy
value greater than a threshold value that is set earlier.
Advantages
There are many advantages of leach protocol. Firstly, cluster heads combine the whole date which
leads to the reduction of traffic in the entire network. Secondly, there is a considerable saving in the
energy consumption as the routing is single hop from nodes to cluster heads. Thirdly, this protocol
improves and increases the lifespan of the network. Fourthly, to create a cluster the location information
of node is not necessary. And lastly, leach is self-organized and completely distributed as is does not
need any control information from the base station.
Disadvantages
Examination Paper Analysis and Solution
The leach protocol has three demerits. Firstly, it does not give a clue about exact number of cluster
heads in the network. Secondly, an important disadvantage is that if the cluster head due to some
reason dies, then the cluster will be of no use because the data that was collected by the cluster head
will never reach the base station. Lastly, since the clusters are distributed randomly, this sometimes
results into an increase in energy consumption and can affect the entire network’s performance.
Even though it has many merits and demerits, the Leach Protocol was the first protocol of hierarchical
routing which brought in data fusion. This protocol is of utmost importance in the clustering routing
protocol.
MANET is an autonomous system of mobile host connected by wireless link. In cellular network
communication between two Mobile Host (MH) completely rely on the wired backbone and fixed base
station.
• There are two approaches to providing network connectivity in a MANET namely, Hierarchical network
architecture and Flat-routed architecture
• A hierarchical network design involves dividing the network into discrete layers. Each layer, or tier, in
the hierarchy provides specific functions that define its role within the overall network. This helps the
network designer and architect to optimize and select the right network hardware, software, and
features to perform specific roles for that network layer.
• Hierarchical models apply to both LAN and WAN design. A typical enterprise hierarchical LAN campus
network design includes the following three layers: I. Access Layer: Provides workgroup/user access
to the network. II. Distribution Layer: Provides policy-based connectivity and controls the boundary
between the access and core layers. III. Core Layer: Provides fast transport between distribution
switches within the enterprise campus.
Examination Paper Analysis and Solution
2. Flat-Routed Architecture: • The benefit of dividing a flat network into smaller, more manageable
blocks is that local traffic remains local. • Only traffic that is destined for other networks is moved to a
higher layer. The flat network has now been divided into three separate broadcast domains.
There have been several different methods to classify the algorithms used for WSNs Clustering.
Four of the most common classifications are
• Heterogeneous algorithms
• Homogeneous algorithms
• Centralized algorithms
• Distributed algorithms
• Clustering algorithms
• Static algorithms
Q.15 Explain the energy constraints in sensor nodes in WSN and name the protocols to design energy
efficiency in WSN Energy constraints in sensor nodes in WSN: (S-22) ,4 Marks
Ans
Wireless sensor node is microelectronic device means it is equipped with a limited number of power
source. Nodes are dependent on battery for their power. Hence power conservation and power
management is an important issue in wireless sensor network. Due to this reason researchers are
focusing on the design of power aware protocols and algorithm for sensors network. Protocol used:
Hierarchal routing protocols are considered more energy efficient when compared with flat and location-
based routing protocols. A number of hierarchal based energy efficient routing protocols have been
referred to in the literature review such as LEACH, TEEN and APTEEN, PEGASIS, MECN and SMECN,
SOP, HPAR , VGA , Sensor Aggregate , TTDD , Energy Efficient Self-Healing , Energy Efficient Position
Based , and CELRP.
Q.16 Draw the MANET Topology and explain. State two applications of MANET. (S-22,4 marks)
Ans
Topology in MANET MANET may operate as standalone fashion or they can be the part of larger
internet. They form highly dynamic autonomous topology with the presence of one or multiple different
transceivers between nodes. Autonomous Behavior: Each node can act as a host and router, which
shows its autonomous behavior. Typically communicate at radio frequencies (30MHz-5GHz) • TORA is
a routing algorithm and is mainly used in MANETs to enhance scalability TORA is an adaptive routing
protocol. It is therefore used in multi-hop networks.
Examination Paper Analysis and Solution
Applications of MANET
• Defense applications: Many defense applications require on the fly communications set-up, and ad
Hoc/sensor networks are excellent candidates for use in battlefield management.
• Crisis management applications: These arise, for example, as a result of natural disasters in which
theentire communication infrastructure is in disarray. Restoring communications quickly is essential.
• Telemedicine: The paramedic assisting the victim of a traffic accident in a remote location must
access medical records (e.g. X-rays) and may need video conference assistance from a surgeon for an
emergency intervention. In fact, the paramedic may need to instantaneously relay back to the hospital
the victim's X-rays and other diagnostic tests from the site of the accident.
• Tele- Geoprocessing application: The combination of GPS, GIS (Geographical Information Systems),
andhigh-capacity wireless mobile systems enable a new type of application referred to as tele
geoprocessing WSN
• Virtual Navigation: A remote database contains the graphical representation of building, streets, and
physical characteristics of a large metropolis. They may also "virtually" see the internal layout of
buildings, including an emergency rescue plan, or find possible points of interest.
• For example, A VANET (Vehicular Ad Hoc Network), is a type of MANET that allows vehicles to
communicate with roadside equipment.
Q.17 Draw the block diagram of a sensor node in WSN and state the function of various components.
(S-22 4 Marks)
Ans
Sensors: Sensors are used by wireless sensor nodes to capture data from their environment. They are
hardware devices that produce a measurable response to a change in a physical condition like
temperature or pressure. • Sensors are classified into two categories: Passive and Active sensors.
Passive sensors sense the data without actually manipulating the environment by active probing. They
are self-powered, that is, energy is needed only to amplify their analog signal.
Active sensors actively probe the environment, for example, a sonar or radar sensor, and they require
continuous energy from a power source.
• Microcontroller: The controller performs tasks, processes data and controls the functionality of other
components in the sensor node. While the most common controller is a microcontroller, other
alternatives that can be used as a controller are: a general purpose desktop microprocessor, digital
signal processors, FPGAs (Field Programmable Gate Array) and ASICs (Application Specific Integrated
Circuits).
Digital signal Processors may be chosen for broadband wireless communication applications, but in
Wireless Sensor Networks the wireless communication is often modest: i.e., simpler, easier to process
modulation and the signal processing tasks of actual sensing of data is less complicated.
Transceivers: Sensor nodes often make use of ISM band, which gives free radio, spectrum allocation
and global availability. The possible choices of wireless transmission media are radiofrequency (RF),
optical communication (laser) and infrared.
Memory: Flash memories are used due to their cost and storage capacity. Memory requirements are
very much application dependent.
Power source: Two power saving policies used are Dynamic Power Management (DPM) and
Dynamic voltage Scaling (DVS). DPM conserves power by shutting down parts of the sensor node
which are not currently used or active. A DVS scheme varies the power levels within the sensor node
depending on the non-deterministic workload
Q3 d State different types of WSN architecture and explain any one type with diagram. (W-22,4M)
Depending on the environment, the types of networks are decided. Hence different types of
WSNsinclude Terrestrial WSNs, Underground WSNs, Underwater WSNs, Multimedia WSNs and
MobileWSNs.
Examination Paper Analysis and Solution
1. Terrestrial WSNs:
Terrestrial WSNs are capable of communicating base stations efficiently, and consist of hundreds
tothousands of wireless sensor nodes deployed either in unstructured (Ad hoc) or structured
(Preplanned) manner.
In an unstructured mode, the sensor nodes are randomly distributed within the target dropped from a
fixed plane that is
The preplanned or structured mode considers optimal placement, grid placement, and 2D,
3Dplacement models .
In this WSN, the battery power is limited; however, the battery is equipped with solar cells as a
secondary power source.
The Energy conservation of these WSNs is achieved by using low duty cycle operations, minimizing
delays, and optimal routing, and so on.
Ans
The dynamic collection of mobile nodes creating short-lived networks with the absence of mixed
infrastructure is called as MANET.
Every node in MANET has wireless transmitter and receiver with proper antenna. All nodes act
as routers connected by wireless links.
Examination Paper Analysis and Solution
Topology Formation:
1. Neighbour Discovery:
The performance of Ad-hoc Network depends on the interaction among communicating entities
in a given neighbourhood.
Thus, in general, before a node starts communicating, it must discover the set of nodes that
are within its direct communication range.
Once this information is gathered, the node keeps it in an internal data structure so that it can
be used in different networking activities such as routing.
The behaviour of an Ad-hoc node depends on the behaviour of its neighbouring nodes because
it must sense the medium before it starts transmitting packets to the nodes in its interfering
range, which can cause collision at the other nodes.
Node discovery can be achieved with periodic transmission of beacon packets or with
promiscuous snooping on the channel to detect the communication activity.
Q4 e Explain the ISO equivalent protocol layer architecture for WSN. (W-22,4M)
Examination Paper Analysis and Solution
Physical Layer:
The physical layer provides an edge for transferring a stream of bits above physical medium. This layer
is responsible for the selection of frequency, generation of a carrier frequency, signal detection,
Modulation and data encryption.
Transport layer
The function of the transport layer is to deliver congestion avoidance and reliability where a lot of
protocols intended to offer this function are either practical on the upstream.
Network layer
The main function of the network layer is routing, it has a lot of tasks based on the application, but
actually, the main tasks are in the power conserving, partial memory, buffers, and sensor don't have a
universal ID and have to be self-organized.
Application layer
The application layer is liable for traffic management and offers software for numerous applications that
convert the data in a clear form to find positive information.
market segmentation.
social network analysis.
search result grouping.
medical imaging.
image segmentation.
anomaly detection.