Suggestive Questions - Answer (MobileComputing)
Suggestive Questions - Answer (MobileComputing)
2. What are the different applications of mobile communications? Illustrate with suitable examples.
3. What are the advantages and disadvantages of wireless communication?
4. Can you explain the simplified reference model of mobile communication? Provide a brief explanation
of all the layers in the context of mobile communication.
5. What are the features of mobile equipment connected to the GSM network?
6. What is WiMAX? What services are offered by WiMAX? Illustrate with suitable examples.
7. How does the architecture of WLL work? Provide an example.
8. What is the basic structure of cellular telephony? Use appropriate examples or illustrations.
9. What is frequency reuse? Why is it done? What is the reuse factor?
10. What is an antenna? Explain radiation patterns with suitable illustrations.
11. What is signal propagation? Explain with suitable illustrations.
12. What are the different propagation effects? Provide appropriate illustrations.
13. What is the purpose of multiplexing techniques? What are the different types of multiplexing
techniques used in communication?
14. Can you explain FDM with a suitable example?
15. What is CDM? Explain with suitable illustrations.
16. What is digital modulation? Why is it required? What are the different types of digital modulation
techniques used?
17. Explain ASK, FSK, PSK, QPSK, and QAM with appropriate illustrations.
18. What is advanced frequency shift keying? Explain with appropriate illustrations.
19. What is the multi-carrier modulation OFDM technique? Why is the OFDM technique preferred in
mobile communication? Provide appropriate illustrations.
20. What is the spread spectrum technique? Explain FHSS and DSSS with appropriate illustrations.
21. What are the benefits of DSSS?
22. What are the basic differences between circuit-switched and packet-switched networks?
23. What is Signalling System 7 (SS-7)? Explain with an example.
24. Can you explain the IP-based SS-7 protocol stack? Why is it necessary?
25. What are the purposes of IP-based SS-7 SGW and MGW?
26. What is the hidden terminal problem? Explain with appropriate illustrations.
27. What is the exposed terminal problem? Explain with appropriate illustrations.
28. What is the MACAW protocol? How does it mitigate the exposed and hidden terminal problems?
Provide appropriate examples.
29. What is CSMA/CA? Why is it necessary for wireless communication? Draw a flowchart to explain the
CSMA/CA protocol.
30. What is controlled access? Explain the polling and reservation techniques.
31. Can you explain the GSM architecture with appropriate illustrations?
32. How do HLR and VLR work?
33. What are the key features of GSM?
34. What is the functionality of BTS?
35. What is the functionality of BSC/MSC?
36. What is EIR? Why is it an important database maintained by the Mobile Switching Centres?
37. Why are the Internetworking Function (IWF) and International Switching Centre (ISC) used in GSM?
1. What is the meaning of "Mobile Computing"? Explain device mobility and device portability.
Mobile computing refers to the use of portable computing devices (such as smartphones, tablets, laptops)
that can connect to wireless networks and perform various tasks traditionally done on desktop computers,
enabling users to access information, communicate, and perform tasks while on the move.
Device Mobility
Device mobility refers to the ability of a device to maintain seamless connectivity and functionality while
moving through different environments.
Characteristics:
o Continuous Connectivity: The device stays connected to networks (Wi-Fi, cellular) while moving.
o Session Persistence: Applications and services continue to operate without interruption as the
device changes location.
o Adaptability: The device can adapt to varying network conditions and handovers between different
types of networks.
Examples:
o A smartphone maintaining a voice call or data session while moving from one cell tower to another.
Device Portability
Device portability refers to the ease with which a device can be carried and used in different locations. It
focuses on the physical characteristics and design of the device.
Characteristics:
o Lightweight: The device is light enough to be easily carried.
o Compact Size: The device is small enough to fit in a bag, pocket, or be worn.
o Battery Operated: The device can operate without a constant power supply, relying on battery
power.
Examples:
o A laptop that can be carried in a backpack and used in various locations like a café, office, or park.
2. Mobile communications have a wide range of applications across various fields. Here are some key
applications, along with suitable examples:
1. Personal Communication:
o Example: Voice calls, text messaging (SMS), and instant messaging apps (e.g., WhatsApp,
Facebook Messenger) allow people to stay connected with friends and family.
2. Business Communication:
o Example: Email and collaboration tools (e.g., Microsoft Teams, Slack) enable professionals
to communicate and collaborate remotely, enhancing productivity and flexibility.
3. Internet Access:
o Example: Smartphones and tablets provide access to web browsing, social media platforms
(e.g., Facebook, Twitter), and streaming services (e.g., Netflix, YouTube).
4. Navigation and Location-Based Services:
o Example: GPS-enabled apps like Google Maps and Waze offer real-time navigation, traffic
updates, and location-based recommendations for restaurants, hotels, and other services.
5. Mobile Banking and Financial Services:
o Example: Mobile banking apps (e.g., PayPal, Venmo, banking apps from institutions like
Chase or Bank of America) allow users to perform financial transactions, pay bills, and
transfer money from their mobile devices.
6. Healthcare:
o Example: Telemedicine apps (e.g., Teladoc, Doctor on Demand) allow patients to consult
with healthcare providers remotely. Fitness apps (e.g., MyFitnessPal, Fitbit) help users track
their health and fitness metrics.
7. Education:
o Example: E-learning platforms (e.g., Coursera, Khan Academy) and educational apps (e.g.,
Duolingo, Quizlet) enable users to learn new skills and access educational content from
anywhere.
8. Entertainment:
o Example: Mobile games (e.g., Candy Crush, PUBG Mobile) and streaming apps (e.g.,
Spotify for music, Netflix for video) provide on-the-go entertainment.
Advantages:
1. Mobility: Users can access information or communicate from anywhere within the coverage area
without being tethered to a specific location.
2. Convenience: Wireless devices are easy to set up and use, reducing the need for complex
infrastructure like cables and connectors.
3. Flexibility: Wireless networks can be easily expanded or reconfigured compared to wired networks,
making them more adaptable to changing needs.
4. Cost savings: Initial setup costs may be lower since there's no need to lay down extensive cables or
wires.
5. Scalability: It's easier to add new devices to a wireless network without the physical limitations of
cables.
6. Accessibility: Remote or rural areas can access communication networks without the need for
extensive physical infrastructure.
7. Integration: Wireless technology can be integrated with other devices and technologies such as IoT
(Internet of Things) devices and smart home systems.
Disadvantages:
1. Interference: Wireless signals can be prone to interference from other devices or physical obstacles
like walls, leading to reduced signal quality or dropped connections.
2. Security: Wireless networks are more vulnerable to unauthorized access compared to wired
networks, necessitating stronger security measures like encryption.
3. Speed: Wired connections generally offer faster data transfer rates than wireless, especially in
scenarios where high bandwidth is required.
4. Reliability: Wireless networks may experience reliability issues due to signal loss, weather
conditions, or electronic interference.
5. Coverage: Wireless signals have limited range depending on the technology used, which can restrict
the coverage area compared to wired networks.
6. Compatibility: Compatibility issues can arise with different wireless standards or between older and
newer devices.
7. Health concerns: There are ongoing debates about potential health risks associated with long-term
exposure to wireless radiation.
4. Can you explain the simplified reference model of mobile communication? Provide a brief
explanation of all the layers in the context of mobile communication.
The above figure shows a personal digital assistant (PDA) which provides an example for a wireless
and portable device. This Personal digital assistant communicates with a base station in the middle of
the picture. The base station consists of a radio transceiver (receiver and sender) and an interworking
unit connecting the wireless link with the fixed link. The communication partner of the Personal Digital
Assistant, a conventional computer, is shown on the right hand side. Under earth each network
element (such as PDA, interworking unit, computer), the figure shows the protocol
stack implemented in the system according to the reference model.
Physical layer
This is the lowest layer in a communication system and is responsible for the conversion of a stream
of bits into signals that are transmitted on the sender side. The physical layer of the receiver
transforms the signals back into a bit stream. For wireless communication, the physical layer is
responsible for generation of the carrier frequency, frequency selection, signal detection (although
heavy interference may disturb the signal), modulation of data into a carrier frequency and
encryption.
Network layer
The third layer which is called network layer is responsible for routing packets through network or
establishing a connection between two entities over many other intermediate systems. Some topics
are addressing, routing, device location, and handover between different networks. The several
solutions for the network layer protocol of the internet (the Internet Protocol IP).
Transport layer
Transport layer is used in the reference model to establish an end to end connection. Topics like
quality of service, flow and congestion control are relevant, especially if the transport protocols
known from the internet, TCP and UDP, are to be used over a wireless link.
Application layer
The applications (complemented by additional layers that can support applications) are situated on
top of all transmission oriented layers. Some context on this layer are service location, support for
multimedia applications, adaptive applications that can handle the variations in transmission
characteristics, and wireless access to the World Wide Web using a portable device. Most demanding
applications are video (high data rate) and interactive gaming (low jitter, low latency).
5. What are the features of mobile equipment connected to the GSM network?
Mobile equipment connected to the GSM (Global System for Mobile Communications) network typically
has several key features:
1. Subscriber Identity Module (SIM): GSM mobile devices use SIM cards to authenticate users on
the network and store subscriber information.
2. Radio Interface: GSM devices operate on specific radio frequencies and use GSM modulation
techniques for transmitting and receiving signals.
3. Voice and Data Services: GSM supports both voice calls and data services (such as SMS messaging
and GPRS for internet connectivity).
4. International Roaming: GSM networks facilitate international roaming, allowing users to use their
mobile devices in different countries with compatible networks.
5. Security: GSM provides encryption and authentication mechanisms to ensure secure communication
between the mobile device and the network.
6. Handover and Cell Selection: GSM devices support seamless handover between different cell sites
(base stations) to maintain connectivity while moving.
7. Compatibility: GSM devices adhere to the GSM standard, ensuring compatibility with networks
globally that support GSM technology.
8. Battery Efficiency: GSM devices are designed to be energy-efficient to prolong battery life, crucial
for mobile use.
9. Network Services: GSM supports various network services such as call forwarding, call waiting,
conference calling, and caller ID.
10. SIM Toolkit (STK): Some GSM devices support the SIM Toolkit, which allows additional
applications to be installed and executed on the SIM card itself.
These features collectively enable GSM mobile equipment to provide reliable voice and data communication
services to users across diverse geographical locations served by GSM networks worldwide.
6. What is WiMAX? What services are offered by WiMAX? Illustrate with suitable examples
WiMAX (Worldwide Interoperability for Microwave Access) is a wireless broadband technology based on
the IEEE 802.16 standard. It provides high-speed internet access over long distances, offering both fixed and
mobile deployment options.
Services Offered by WiMAX:
1. Broadband Internet Access: Provides high-speed internet in areas lacking traditional wired
infrastructure, ideal for rural and temporary deployments.
2. VoIP and Telephony: Supports Voice over IP (VoIP) services, enabling voice calls over the
internet, often bundled with data plans.
3. Video Surveillance: Facilitates wireless video surveillance systems for security in urban or remote
areas.
4. Public Safety Networks: Enables reliable communication channels for emergency responders.
5. Enterprise Connectivity: Provides secure and fast connections between offices or remote sites,
enhancing business operations.
Examples:
Clearwire: Deployed WiMAX networks in the U.S. for widespread broadband access.
Fixed Wireless ISPs: Utilize WiMAX to serve rural and underserved areas globally.
Mobile WiMAX Networks: Used in countries like South Korea and Japan for mobile broadband
services.
WiMAX's flexibility and speed make it a valuable option where traditional wired solutions are impractical
or costly to deploy.
WLL Architecture:
The Wireless Local Loop (WLL) architecture replaces traditional copper wires with
wireless links, connecting subscribers to the local central office. It consists of several
components, including the PSTN (Public Switched Telephone Network), Switch
Function, WANU (Wireless Access Network Unit), and WASU (Wireless Access
Subscriber Unit).
The PSTN serves as a circuit-switched network, while the Switch Function manages
connections between WANUs. The WANU takes care of authentication, operation,
routing, and data transmission, whereas the WASU is installed at the subscriber’s
location. With its cost-effectiveness, enhanced security through digital encryption,
scalability options, and various features like internet access, voice services, data
transfer capabilities, and fax services – WLL proves to be a dependable solution for
telecommunication requirements specifically in remote or rural areas.
WLL components:
1. PSTN: It is Public Switched Telephone Network which is a circuit switched
network. It is a collection of world’s interconnected circuit switched telephone
networks.
2. Switch Function: Switch Function switches the PSTN among various WANUs.
3. WANU: It is short for Wireless Access Network Unit. It is present at the local
exchange office. All local WASUs are connected to it. Its functions includes:
Authentication, Operation & maintenance, Routing, Transceiving voice and data. It
consists of following sub-components:
Transceiver: It transmits/receives data.
WLL Controller: It controls the wireless local loop component with WASU.
AM: It is short for Access Manager. It is responsible for authentication.
HLR: It is short for Home Location Register. It stores the details of all local
WASUs.
4. WASU: It is short for Wireless Access Subscriber Units. It is present at the house
of the subscriber. It connects the subscriber to WANU and the power supply for it is
provided locally.
Example Scenario:
8.What is the basic structure of cellular telephony? Use appropriate examples or illustrations.
Cellular telephony operates on a structured framework known as the cellular network, which divides
geographic regions into smaller areas called cells. Each cell is served by a base station that communicates
with mobile devices within that cell. Here’s the basic structure of cellular telephony:
1. Cells:
o Definition: Geographic areas divided into smaller cells, each with its own base station.
o Purpose: Cells enable the efficient use of radio frequencies and allow for seamless handovers as
mobile devices move between cells.
2. Base Stations:
o Role: Base stations (also known as cell towers or base transceiver stations) provide wireless coverage
within each cell.
o Function: They transmit and receive radio signals to and from mobile devices within their coverage
area.
3. Mobile Switching Center (MSC):
o Central Hub: MSCs are central components that manage calls and mobility within the cellular
network.
o Functions: They route calls between mobile devices within the same network or to external
networks (like landlines or other mobile networks).
4. Network Elements:
o Home Location Register (HLR): Stores subscriber information such as phone numbers, service
profiles, and current location information.
o Visitor Location Register (VLR): Temporarily stores subscriber information when they are roaming in
another network’s area.
o Authentication Center (AUC): Provides authentication and encryption services to ensure secure
communications.
o Equipment Identity Register (EIR): Manages a database of mobile device identities to prevent
unauthorized device usage.
Example Scenario:
User Movement: A mobile user moves from one cell (served by Base Station A) to another cell (served by
Base Station B).
Handover: As the user moves, the network ensures seamless handover of the call from Base Station A to
Base Station B without interrupting the call quality.
Network Management: MSCs manage the call routing and ensure that the call reaches its destination
efficiently, whether to another mobile user within the same network or to a landline.
Coverage and Capacity: Cells enable efficient use of radio frequencies and provide uniform coverage across
large geographic areas.
Mobility: Users can move between cells without losing connectivity, thanks to seamless handover
mechanisms.
Scalability: Cellular networks can expand by adding more cells and base stations to accommodate increasing
numbers of users.
Frequency Reuse
Frequency reuse is a fundamental concept in cellular network design that involves the repeated use of the
same frequency channels within a cellular system. This concept allows for efficient use of the available
spectrum by dividing a service area into multiple smaller regions called cells, each with its own base station.
Each cell can use the same set of frequencies, provided the cells using the same frequencies are sufficiently
spaced apart to avoid interference.
1. Increased Capacity: By reusing frequencies across different cells, a cellular network can support
more users than if each frequency could only be used once. This increases the overall capacity of the
network.
2. Efficient Spectrum Utilization: The available spectrum is a limited resource. Frequency reuse
allows for more efficient use of this spectrum, enabling a greater number of communications within
the same bandwidth.
3. Enhanced Coverage: By deploying multiple cells, network coverage can be extended to cover larger
geographic areas, including rural and urban locations.
4. Improved Quality of Service: Properly managed frequency reuse can help to minimize interference
and improve the quality of service for users by ensuring that the same frequencies are not used by
adjacent cells.
Reuse Factor
The reuse factor, also known as the frequency reuse factor, is a measure of how often the same frequency is
used within the cellular network. It is defined as:
Where N is the number of cells in a cluster that use different frequencies to avoid interference with each
other. The reuse factor indicates the fraction of the available spectrum that can be reused in other cells
within the network.
Reuse Factor = 1: Indicates that every cell can use the same set of frequencies (e.g., no frequency
planning or reuse).
Reuse Factor = 1/N: Indicates that a frequency set is reused once every N cells.
For example, in a cluster with 7 cells (N=7) each using a different set of frequencies, the reuse factor would
be:
An antenna is a metallic structure that is used to transmit radio EM waves. We can define it as the
launching of waves or radiations in space, which is efficiently accomplished with dielectric structures
called antennas. An antenna acts as a transducer that converts the electrical power into EM waves.
The electric charges are the source of the EM or electromagnetic waves.
The antenna uses voltage and current from the source (transmission line) to launch Electromagnetic
waves into the particular medium.
Radiation Pattern
A radiation pattern refers to the spatial distribution of the electromagnetic energy emitted by an antenna. It's a visual
representation of how strongly the antenna radiates in different directions. Understanding radiation patterns is
crucial in antenna design and deployment for various applications, such as radio communication, radar, and wireless
networking.
There are three main types of radiation patterns, each with its own characteristics and applications:
1. Omnidirectional Pattern:
o This pattern radiates energy almost equally in all horizontal directions, resembling a
doughnut shape in 3D or a figure-eight shape in 2D plots.
o Applications: Wi-Fi routers, cell phone base stations (for covering a local area).
2. Directional Pattern:
o This pattern concentrates energy in a specific direction, often resembling a lobe or beam
shape.
o Applications: Satellite communication dishes, directional Wi-Fi antennas (for long-range
connections).
Directional Radiation Pattern
3. Bi-directional Pattern:
o This pattern radiates energy primarily in two opposite directions, often resembling a
cloverleaf shape in 3D or a double-lobed shape in 2D plots.
o Applications: Yagi antennas (for point-to-point communication).
Optimizing antenna performance: Choosing the right antenna for the application based on its
directionality and coverage needs.
Minimizing interference: Directing antenna radiation towards desired areas and reducing
interference with other devices.
Effective signal transmission and reception: Ensuring strong enough signals reach the intended
receivers.
Signal propagation refers to the transfer of information-carrying signals through a medium. It's the fundamental
concept behind numerous technologies critical to modern communication, from wireless networks to satellite
communication.
Propagation Modes:
Guided Propagation: Here, the signal follows a well-defined path within a medium. This is akin to
sending a message through a dedicated wire, similar to electrical signals in cables.
o Example: Light signals in fiber optic cables.
Unguided Propagation: This mode involves signals traversing open spaces like air or interstellar
medium. There are many type of unguided propagation here we discuss thee..
1. Reflection:
o Example: TV signals bouncing off buildings or mountains.
o Explanation: Waves change direction when they encounter a surface.
2. Diffraction:
o Example: Radio signals bending around hills.
o Explanation: Waves bend around obstacles and spread out.
3. Scattering:
o Example: Radio signals scattering due to atmospheric particles.
o Explanation: Waves spread in different directions when encountering small objects.
Enhanced Cellular Communication: Knowledge of signal propagation aids in designing cell phone
towers and networks that guarantee strong and clear connections across vast distances.
Reliable Wi-Fi Networks: By understanding signal diffraction and attenuation, Wi-Fi routers can be
strategically placed to provide consistent and strong coverage within a building.
Effective Space Communication: Sending messages to and from spacecraft millions of kilometers
away necessitates a thorough understanding of how signals propagate through the vast emptiness of
space.
13. What is the purpose of multiplexing techniques? What are the different types of multiplexing
techniques used in communication?
Multiplexing techniques are used in communication systems to maximize the utilization of available
bandwidth by allowing multiple signals to share a single transmission medium. This improves efficiency,
reduces costs, and increases the capacity of the communication system. Key purposes include:
1. Efficient Use of Resources: Allows multiple signals to be combined and transmitted over a single
medium, making better use of available bandwidth.
2. Cost Reduction: Reduces the need for multiple physical connections by enabling the use of a single
transmission path for multiple signals.
3. Increased Capacity: Enhances the overall capacity of the communication system, allowing more
data to be transmitted simultaneously.
4. Flexibility: Supports various types of data (voice, video, data) to be transmitted together.
What is Multiplexing?
Multiplexing is the sharing of a medium or bandwidth. It is the process in which
multiple signals coming from multiple sources are combined and transmitted over a
single communication/physical line.
Types of Multiplexing
There are Five types of Multiplexing :
1. Frequency Division Multiplexing (FDM)
2. Time-Division Multiplexing (TDM)
3. Wavelength Division Multiplexing (WDM)
4. Code-division multiplexing (CDM)
5. Space-division multiplexing (SDM):
Digital modulation involves encoding digital information onto an analog carrier signal by varying its
properties (amplitude, frequency, or phase) to facilitate transmission over analog communication channels.
1. Enables efficient use of bandwidth for transmitting digital data over analog media.
2. Enhances noise immunity and reduces error rates.
3. Allows multiplexing of multiple signals over the same channel.
4. Supports error detection and correction.
5. Ensures compatibility with digital systems.
There are mainly three types of Digital Modulation techniques. They are:
Amplitude Shift Keying
Frequency Shift Keying
Phase Shift Keying
Amplitude Shift Keying
In Amplitude Shift Keying (ASK), each symbol in the message signal gives a unique
amplitude to the carrier wave. There are two types of ASK, Binary and M-ary. In Binary
ASK, logic 1 is associated with certain amplitude of carrier wave e.g. 12V and logic 0 is
associated with different amplitude other than 12V e.g. 0V. In M-ary ASK, a group of
log2M bits are considered together rather than 1 bit at a time and the amplitude level is
associated with this group of bits.
For example, in 16-ary ASK, a group of 4 bits are considered and are given a
respective amplitude. Since there are 16 possible 4 bit binary numbers (24), 16
different amplitude levels are required for modulation. If all such amplitudes are
created using a single carrier wave, then it is called as coherent ASK. If multiple
carrier wave each with different amplitudes are used for modulation then it is called as
non-coherent ASK.
The analog message signal is converted to digital signal using Analog to Digital
Converter. This digital signal is then passed to two multipliers which takes two inputs
each. A sine wave with frequency f1 is considered as carrier signal for logic 1 and a sine
wave with frequency f2 is considered as carrier signal for logic 0. These carrier waves
are multiplied with the digital message signal. When logic 1 present in the digital signal
gets multiplied with the carrier Asin(2πf1t+p) it results in Asin(2πf1t+p) only since the
other multiplier gets logic 0 as input since it is passed through a NOT gate.
When logic 0 present in the digital signal gets multiplied with the carrier Asin(2πf2t+p)
it results in Asin(2πf2t+p) only since the multiplier gets logic 1 as input since it is passed
through a NOT gate. Both this signals are added to form FSK wave
A[sin(2πf1t+p)+sin(2πf2t+p)]. However this FSK wave contains abrupt changes in
frequency which causes unnecessary high bandwidth usage. Hence this signal is
passed through Band Pass Filter which limits the bandwidth usage.
For demodulating, the FSK wave is passed through two multipliers again where their
respective carrier waves are multiplied again. This signal is passed through two Band
Pass Filters out of which the top BPF allows f1 frequency to pass if logic is 1 and the
bottom allows f2 frequency to pass if logic is 0. The output of both BPF is compared with
each other where the output of the comparator is high if output of BPF1 is greater than
output of BPF2 and is low if output of BPF2 is greater than output of BPF1. Hence a
digital signal is received at the output of the comparator. This digital signal is converted
to analog wave using Digital to Analog Converter.
Phase Shift Keying
In Phase Shift Keying (PSK), each symbol in the message signal gives a unique phase
shift to the carrier wave. There are two types of PSK, Binary and M-ary. In Binary PSK,
logic 1 is associated with certain phase shift of carrier wave e.g. 90° and logic 0 is
associated with different phase shift other than 90° e.g. 0°. In M-ary PSK, a group of
log2M bits are considered together rather than 1 bit at a time and the phase shift is
associated with this group of bits.
For example, in 16-ary PSK, a group of 4 bits are considered and are given a respective
phase shift. Since there are 16 possible 4 bit binary numbers (24), 16 different phase
shifts are required for modulation. If all such phase shifts are created using a single
carrier wave, then it is called as coherent PSK. If multiple carrier wave each with
different phase shifts are used for modulation then it is called as non-coherent PSK.
The analog message signal is converted to digital signal using Analog to Digital
Converter. This digital signal is then passed to two multipliers which takes two inputs
each. A sine wave with phase shift p1 is considered as carrier signal for logic 1 and a
sine wave with phase shift p2 is considered as carrier signal for logic 0. These carrier
waves are multiplied with the digital message signal. When logic 1 present in the
digital signal gets multiplied with the carrier Asin(2πft+p1) it results in Asin(2πft+p1)
only since the other multiplier gets logic 0 as input since it is passed through a NOT
gate.
When logic 0 present in the digital signal gets multiplied with the carrier Asin(2πft+p2)
it results in Asin(2πft+p2) only since the multiplier gets logic 1 as input since it is passed
through a NOT gate. Both this signals are added to form PSK wave
A[sin(2πft+p1)+sin(2πft+p2)]. However this PSK wave contains abrupt changes in
phases which causes unnecessary high bandwidth usage. Hence this signal is passed
through Band Pass Filter which limits the bandwidth usage.
For demodulating, the PSK wave is passed through two multipliers again where their
respective carrier waves are multiplied again. This signal is passed through two Band
Pass Filters out of which the top BPF allows the signal with phase shift p1 to pass if
logic is 1 and the bottom allows the signal with phase shift p2 to pass if logic is 0. The
output of both BPF is compared with each other where the output of the comparator is
high if output of BPF1 is greater than output of BPF2 and is low if output of BPF2 is
greater than output of BPF1. Hence a digital signal is received at the output of the
comparator. This digital signal is converted to analog wave using Digital to Analog
Converter.
17. Explain ASK, FSK, PSK, QPSK, and QAM with appropriate illustrations.
18. What is advanced frequency shift keying? Explain with appropriate illustrations.
19.What is the multi-carrier modulation OFDM technique? Why is the OFDM technique
preferred in mobile communication? Provide appropriate illustrations
Multi-Carrier Modulation (MCM) is a technique where the available bandwidth is divided into multiple
carrier frequencies, and data is transmitted simultaneously on these carriers. Orthogonal Frequency
Division Multiplexing (OFDM) is a type of MCM where the subcarriers are orthogonal to each other,
meaning they do not interfere with each other despite being closely spaced.
Understanding OFDM
1. Subcarrier Division: OFDM divides the available spectrum into multiple narrowband subcarriers.
2. Orthogonality: Each subcarrier is orthogonal to the others, preventing interference.
3. Parallel Transmission: Data is split into parallel streams, each transmitted over a different
subcarrier.
Advantages of OFDM in Mobile Communication
Illustration:
o Single Carrier vs. OFDM: Imagine a single broad lane for traffic (single carrier) versus multiple narrow
lanes (OFDM subcarriers), allowing more vehicles to pass simultaneously.
2. Robustness to Multipath Fading:
o Multipath fading occurs when signals reflect off objects and take multiple paths to the receiver,
causing interference. OFDM handles this by treating the channel as flat fading for each narrowband
subcarrier.
Illustration:
o Multipath Scenario: Visualize signals bouncing off buildings and arriving at different times. OFDM's
subcarriers manage these echoes better than a single wideband signal.
3. Simplified Equalization:
o Each subcarrier in OFDM experiences flat fading, making it easier to equalize than a single wideband
carrier that might experience frequency-selective fading.
Illustration:
o Equalization: Equalizing a wideband signal is like flattening a large sheet of paper with many
wrinkles, whereas equalizing narrowband subcarriers is like flattening multiple small pieces of paper,
which is simpler.
4. Resistance to Interference:
o OFDM is less affected by narrowband interference since only a few subcarriers might be impacted,
not the entire signal.
Illustration:
o Interference Handling: If one narrow lane (subcarrier) on a highway is blocked, traffic (data) can still
move through other lanes, minimizing disruption.
5. High Spectral Efficiency:
o By packing subcarriers closely together, OFDM achieves high spectral efficiency, essential for
accommodating the high data rates needed in mobile communication.
Illustration:
o Spectral Packing: Imagine books tightly packed on a shelf (subcarriers), making efficient use of the
space (spectrum).
6. Support for High Data Rates:
o OFDM supports high data rates by transmitting data across multiple subcarriers simultaneously.
Illustration:
o Parallel Transmission: Distributing a heavy load across several trucks (subcarriers) allows faster and
more reliable delivery compared to using a single truck (carrier).
20. What is the spread spectrum technique? Explain FHSS and DSSS with appropriate illustrations.
Spread Spectrum
In wireless LAN, the sequence with n = 11 is used. The original data is multiplied
by chips (spreading code) to get the spread signal. The required bandwidth of the
spread signal is 11 times larger than the bandwidth of the original signal.
Advantages of DSSS:
The DSSS System combats the jamming most effectively.
The performance of DSSS in presence of noise is superior to FHSS.
Interference is minimized against the signals.
The delay between data units in circuit switching is The delay between data units in packet
uniform. switching is not uniform.
Resource reservation is the feature of circuit switching There is no resource reservation because
because the path is fixed for data transmission. bandwidth is shared among users.
Congestion can occur during the connection establishment Congestion can occur during the data
phase because there might be a case where a request is transfer phase, a large number of packets
being made for a channel but the channel is already comes in no time.
occupied.
Circuit Switching Packet Switching
Circuit switching is not convenient for handling bilateral Packet switching is suitable for handling
traffic. bilateral traffic.
SCCP –
It completes the function of the OSI network layer, end to end addressing and
routing, connectionless messages (UDTs), and management services for users.
1. Protocol Translation:
o SGW translates signaling protocols between SS7 (used in traditional PSTN networks) and IP-
based signaling protocols like SIGTRAN (an adaptation of SS7 for IP networks).
2. Network Interconnection:
o SGW facilitates the interconnection between legacy SS7 networks and modern IP-based
networks, enabling seamless communication and interoperability.
3. Signaling Transport:
o SGW ensures the reliable transport of signaling messages over IP networks, maintaining the
integrity and performance of signaling communication.
4. Network Modernization:
o SGW supports the transition from traditional circuit-switched networks to packet-switched
(IP) networks, allowing telecom operators to modernize their infrastructure.
5. Scalability:
o SGW provides scalability, allowing network operators to handle increasing signaling traffic
as they expand their services and subscriber base.
In summary, the SS-7 SGW focuses on the signaling aspect, providing protocol translation and
interconnection between SS7 and IP-based networks, while the MGW focuses on media stream conversion
and interworking, enabling voice and multimedia communication across different network types. Both play
a crucial role in the evolution of telecommunications networks towards IP-based architectures.
26. What is the hidden terminal problem? Explain with appropriate illustrations
In wireless LANs ( wireless local area networks), the hidden terminal problem is a
transmission problem that arises when two or more stations who are out of range of each
other transmit simultaneously to a common recipient.
Problem Illustration
Suppose that there are three stations labelled STA, STB, and STC, where STA and STC are
transmitting while STB is receiving. The stations are in a configuration such that the two
transmitters STA and STC are not in the radio range of each other. This is shown in the
following figure −
The above diagram shows that station STA starts transmitting to station STB. Since station
STC is out of radio range of STA, it perceives that the channel is free and starts transmitting
to STB. The frames received by STC are garbled and collision occurs. This situation is known
as the hidden terminal problem.
Solution
The exposed terminal problem is solved by the MAC (medium access control) layer protocol
IEEE 802.11 RTS/CTS, with the condition that the stations are synchronized and frame
sizes and data speed are the same. RTS stands for Request to Send and CTS stands for
Clear to Send.
A transmitting station sends a RTS frame to the receiving station. The receiving station
replies by sending a CTS frame. On receipt of CTS frame, the transmitting station begins
transmission.
Any station hearing the RTS is close to the transmitting station and remains silent long
enough for the CTS. Any station hearing the CTS is close to the receiving station and
remains silent during the data transmission.
In the above example, station STC hears does not hear RTS from station STA, but hears
CTS frame from station STB. So, it understands that STB is busy defers its transmission
thus avoiding collision.
27. What is the exposed terminal problem? Explain with appropriate illustrations
Let’s assume there are four stations with the names A, B, C, and D, where B and C are
transmitters and A and D are receivers. The stations are set up so that the two emitters
B and C can hear each other but the two receivers A and D cannot hear each other
over radio waves. Transmission from B to A is happening. As a result, C ceases
attempting to transmit to D after mistakenly assuming that the above transmission will
cause interference. However, since the communication from C to D is outside of B’s
range, interference would not have happened. Known as the exposed terminal issue.
How To Prevent Exposed Terminal Problems?
The use of RTS/CTS (Request to Send/Clear to Send) mechanisms, which can stop
two or more nodes from transmitting data at the same time, is the solution to the
exposed terminal issue. An RTS message is the first thing a node sends to the intended
recipient when it wishes to send data. The sender knows it has a clear route to transmit
data unhindered by other nodes if the intended recipient replies with a CTS message.
Any station that hears the RTS is near the transmitter and stays silent long enough for
the CTS to arrive. During the data transmission, any station that hears the CTS is near
to the receiving station and stays silent.
In this case, station C receives RTS from station B but not CTS from station A. To
station D, it is therefore open to transmit.
In this way the Exposed terminal problem can be solved by using MAC (medium access
control) layer protocol, the RTS stands for Request to Send and CTS stands for Clear
to Send.
28. What is the MACAW protocol? How does it mitigate the exposed and hidden
terminal problems? Provide appropriate examples.
The MACAW (Multiple Access with Collision Avoidance for Wireless) protocol is a medium
access control protocol designed for wireless networks to address the issues of collisions due
to the hidden and exposed terminal problems. It is a variant of the CSMA/CA (Carrier Sense
Multiple Access with Collision Avoidance) protocol used in IEEE 802.11 wireless LANs.
Exposed Terminal Problem: A node refrains from transmitting due to sensing activity from another
transmitter, which is out of range of the intended receiver.
Solution in MACAW:
1. RTS/CTS Mechanism:
o Node A sends an RTS (Request to Send) to Node B.
o Node B replies with a CTS (Clear to Send).
o Nodes like C, which hear the CTS, know not to transmit, preventing unnecessary
transmission blocking.
Example:
A ------> B <------ C
RTS CTS
Node A's RTS and Node B's CTS prevent Node C from transmitting unnecessarily.
Hidden Terminal Problem: Two nodes out of each other's range transmit to a common receiver, causing
collisions.
Solution in MACAW:
1. RTS/CTS Exchange:
o Node A sends an RTS to Node B.
o Node B replies with a CTS.
o Node C, hearing the CTS from B, refrains from transmitting, preventing a collision.
Example:
A ------> B <------ C
RTS CTS
Node A's RTS and Node B's CTS inform Node C to defer its transmission, avoiding collisions.
Summary:
MACAW uses RTS/CTS exchanges to inform nodes about ongoing transmissions and prevent hidden and
exposed terminal problems, improving network efficiency and reducing collisions.
29. What is CSMA/CA? Why is it necessary for wireless communication? Draw a flowchart to explain
the CSMA/CA protocol.
CSMA/CA, or Carrier Sense Multiple Access with Collision Avoidance, is a protocol designed for
wireless networks to manage data transmission and prevent collisions. Unlike wired networks where devices
can directly detect collisions during transmission, wireless networks face limitations due to signal
propagation.
Collision Detection Issues: In wired networks, CSMA/CD (Collision Detection) allows devices to detect
collisions while transmitting. However, wireless signals can overlap, making real-time collision detection
during transmission challenging.
Hidden Terminal Problem: Node A might not hear Node C trying to transmit to the same receiver (Node B)
due to signal limitations. This can lead to collisions.
Exposed Terminal Problem: Node C might detect a busy channel due to Node A transmitting to Node B, even
though Node C wouldn't cause a collision. This leads to wasted bandwidth as Node C avoids transmitting
unnecessarily.
Algorithm
Step 1 − The station is ready to transmit. It senses the line by using any one of the persistent
strategies.
Step 2 − If the found line is to be idle, the station waits for an IFG (Interframe gap) amount
of time.
Step 3 − Then waits for some random time and sends the frame.
Step 4 − After sending the frame, it sets a timer and waits for the ACK from the receiver.
Step 5 − If the ACK is received before the expiry of timer, then the transmission is
successful.
Step 6 − But if the transmitting station does not receive the expected ACK before the timer
expires then it increments the back off parameter, waits for the back off time and re-senses
the line.
CSMA/CA Flow Chart
30. What is controlled access? Explain the polling and reservation techniques
In controlled access, the stations seek information from one another to find which
station has the right to send. It allows only one node to send at a time, to avoid the
collision of messages on a shared medium.
The three controlled-access methods are:
1. Reservation
2. Polling
3. Token Passing
Reservation
In the reservation method, a station needs to make a reservation before sending
data.
The timeline has two kinds of periods:
1. Reservation interval of fixed time length
2. Data transmission period of variable frames.
If there are M stations, the reservation interval is divided into M slots, and each
station has one slot.
Suppose if station 1 has a frame to send, it transmits 1 bit during the slot 1. No
other station is allowed to transmit during this slot.
In general, i th station may announce that it has a frame to send by inserting a 1 bit
into i th slot. After all N slots have been checked, each station knows which stations
wish to transmit.
The stations which have reserved their slots transfer their frames in that order.
After data transmission period, next reservation interval begins.
Since everyone agrees on who goes next, there will never be any collisions.
The following figure shows a situation with five stations and a five-slot reservation
frame. In the first interval, only stations 1, 3, and 4 have made reservations. In the
second interval, only station 1 has made a reservation.
Polling
Polling process is similar to the roll-call performed in class. Just like the teacher, a
controller sends a message to each node in turn.
In this, one acts as a primary station (controller) and the others are secondary
stations. All data exchanges must be made through the controller.
The message sent by the controller contains the address of the node being
selected for granting access.
Although all nodes receive the message the addressed one responds to it and
sends data if any. If there is no data, usually a “poll reject”(NAK) message is sent
back.
Problems include high overhead of the polling messages and high dependence on
the reliability of the controller.
31. Can you explain the GSM architecture with appropriate illustrations?
GSM (Global System for Mobile Communications) is a standard developed to describe protocols for second-
generation (2G) digital cellular networks. Here is a detailed explanation of the GSM architecture along with
appropriate illustrations to help you understand its components and their interactions.
Mobile Equipment (ME): The physical device, like a mobile phone or a modem.
Subscriber Identity Module (SIM): A detachable smart card containing the user's subscription information,
such as the IMSI (International Mobile Subscriber Identity) and authentication keys.
The BSS connects the mobile station to the network and is composed of:
Base Transceiver Station (BTS): It handles the radio communication with the mobile station. Each BTS covers
a cell in the network.
Base Station Controller (BSC): It manages multiple BTSs, handling resource allocation, handovers, and
frequency hopping.
The NSS is the core part of the GSM network, responsible for call routing, mobility management, and
subscriber data management. It includes:
Mobile Switching Center (MSC): The primary component of NSS, it performs call switching, manages call
setup, and handles mobility management.
Home Location Register (HLR): A database that contains the permanent subscriber information, such as the
IMSI, MSISDN (Mobile Station ISDN number), and services subscribed by the user.
Visitor Location Register (VLR): A temporary database linked to an MSC, containing information about
subscribers currently in the MSC's service area.
Authentication Center (AUC): It stores the authentication and encryption keys for subscribers.
Equipment Identity Register (EIR): A database that stores information about the validity of mobile
equipment.
Public Switched Telephone Network (PSTN) : PSTN connects with MSC. PSTN originally a network of fixed line
analog telephone systems.
Operation and Maintenance Center (OMC): Part of the OSS, it is used by network operators to monitor,
control, and maintain the GSM network. It provides a centralized interface for network management,
including fault management, configuration management, and performance monitoring.
GSM (Global System for Mobile Communications) is known for its robust and reliable mobile
communication technology. Here are the key features that make GSM distinct and widely adopted:
1. International Roaming
o GSM allows users to use their mobile phones in different countries with compatible networks. This
global interoperability is a significant advantage for travelers.
2. High Voice Quality
o GSM ensures high voice quality through its digital nature and various error correction techniques.
This minimizes noise and distortion in voice communication.
3. Security Features
o GSM provides secure communication through encryption and authentication mechanisms. It uses
algorithms like A5/1 and A5/2 for encryption and a challenge-response protocol for authentication.
4. Spectral Efficiency
o GSM employs frequency division multiple access (FDMA) combined with time division multiple
access (TDMA), allowing multiple users to share the same frequency channel efficiently.
5. SIM Cards
o The use of Subscriber Identity Module (SIM) cards in GSM networks allows easy switching between
devices while retaining the user's mobile number and subscription details.
6. Support for Data Services
o GSM supports various data services, including SMS (Short Message Service), MMS (Multimedia
Messaging Service), and basic internet access through technologies like GPRS (General Packet Radio
Service) and EDGE (Enhanced Data rates for GSM Evolution).
7. Wide Coverage
o GSM networks offer extensive coverage, making them accessible in urban and rural areas worldwide.
This widespread coverage is facilitated by the standardization and widespread deployment of GSM
technology.
8. Enhanced Privacy
o GSM enhances user privacy through temporary identifiers (TMSI - Temporary Mobile Subscriber
Identity), which are used instead of the permanent identifier (IMSI) over the air interface.
9. Efficient Handover
o GSM supports seamless handover processes, allowing users to move from one cell to another
without dropping calls. This is crucial for maintaining call continuity in mobile environments.
10. Compatibility with Various Services
o GSM networks can interoperate with other networks, including public switched telephone networks
(PSTN), integrated services digital networks (ISDN), and other mobile networks.
11. Supplementary Services
o GSM offers various supplementary services, such as call forwarding, call waiting, call barring, caller
ID, conference calling, and voicemail.
12. Frequency Bands
o GSM operates on multiple frequency bands, such as 900 MHz, 1800 MHz, and 1900 MHz, which
allows for flexibility in network planning and deployment in different regions.
13. Efficient Use of Spectrum
o GSM uses frequency re-use techniques and cell splitting to maximize the efficient use of the available
spectrum, allowing for higher capacity in densely populated areas.
14. Network Management
o GSM networks incorporate robust network management systems, including operations and
maintenance centers (OMC), which help in monitoring, controlling, and maintaining the network for
optimal performance.
34. What is the functionality of BTS?
Sure, here are the key functionalities of a Base Transceiver Station (BTS) in a shortened format:
1. Radio Transmission and Reception: Manages radio communication with mobile stations.
2. Frequency and Time Slot Management: Allocates frequencies and time slots for communication.
3. Signal Encoding and Decoding: Handles modulation and demodulation of signals.
4. Error Correction and Detection: Applies techniques to ensure data integrity.
5. Power Control: Adjusts signal power levels to optimize transmission.
6. Timing Advance Calculation: Adjusts transmission timing for signal synchronization.
7. Handover Management: Facilitates seamless transition between cells.
8. Ciphering: Encrypts data for secure communication.
9. Monitoring and Reporting: Tracks and reports signal quality metrics.
10. Channel Coding: Adds redundancy for error detection and correction.
35. Key Functionalities of Base Station Controller (BSC) and Mobile Switching Center
(MSC)
1. Radio Resource Management: Allocates and manages radio frequencies and time slots.
2. Handover Management: Ensures seamless transition of mobile stations between BTSs.
3. Power Control: Optimizes signal strength and reduces interference.
4. Traffic Management: Manages active calls and data sessions.
5. BTS Control: Configures and manages BTS operations.
1. Call Routing and Switching: Routes voice calls and data sessions.
2. Mobility Management: Tracks location and manages handovers between BSCs and MSCs.
3. Authentication and Security: Authenticates subscribers and implements security measures.
4. Interworking Functions: Interfaces with external networks like PSTN and ISDN.
5. Billing and Charging: Collects billing information for calls and data sessions.
6. Subscriber Data Management: Retrieves and updates subscriber information.
36. What is EIR? Why is it an important database maintained by the Mobile Switching Centres?
EIR stands for Equipment Identity Register. It is an important database maintained within the Mobile
Switching Centers (MSCs) in GSM (Global System for Mobile Communications) networks. The primary
purpose of the EIR is to store information related to mobile equipment (ME), specifically the International
Mobile Equipment Identity (IMEI) numbers. Here’s why the EIR is crucial:
Importance of EIR:
1. Security: EIR prevents unauthorized or stolen devices from accessing the network, enhancing
overall security.
2. Regulatory Compliance: It helps operators comply with regulations by managing authorized device
usage.
3. Customer Assurance: Subscribers benefit from knowing their devices are protected and can report
losses to block unauthorized use.
4. Network Management: EIR ensures only compliant devices use network resources, optimizing
network performance.
37. Why are the Internetworking Function (IWF) and International Switching Centre (ISC) used
in GSM?
IWF (Internetworking Function) and ISC (International Switching Centre) are used together in GSM
networks to enable seamless communication between the GSM network and external networks, particularly
for international calls.
IWF (Internetworking Function): Acts as a translator and bridge between the GSM network and
other networks like the PSTN (Public Switched Telephone Network). It performs tasks like:
o Protocol conversion: GSM uses its own protocols for communication, while PSTN has
different protocols. IWF converts between these protocols to ensure messages are understood
by both networks.
o Call routing: IWF helps route calls to the appropriate network based on the destination phone
number.
ISC (International Switching Centre): The core element for international call routing in GSM
networks. It connects the GSM network to telephone networks worldwide. Here's what ISC does:
o Selects the most efficient route for international calls: ISC considers factors like call quality,
cost, and traffic congestion to choose the best path for connecting the call.
o Routes calls to the destination network: Once the optimal route is identified, ISC directs the
call to the appropriate international carrier or network.
In essence, IWF prepares the information for the call (translation and routing), while ISC handles the actual
connection and path selection for international communication within the GSM network.
X
@mija