A) - Text Books
A) - Text Books
Teaching
Lecture
Topics to be covered Aid Book No./Page No
Sl. No Hour
Required
UNIT-I INTRODUCTION
1. L1 Fundamentals of wireless BB TX2/pp 40-41, Rx3/pp 1-
communication 25, Rx4/pp 1-25, Rx2/pp 1-
11
2. L2 Spectrum overview BB TX2/pp 41-45, Rx4/pp 56-
68, Rx2/ pp 38-46
3. L3 Air interface design BB TX2/pp 45-50, Rx3/pp 46-
55, Rx4/pp 68-70,
Rx4/pp 85-88,
4. L4 Signal propagation OHP TX2/pp 206-211,
Rx3/pp137-171, Rx4/pp 94-
116, Rx2/pp 109-144
5. L5 Path loss modeling and signal BB Rx2/pp 211-215, Rx3/pp
coverage 55-61, Rx2/pp 109-44
6. L6 Effects of multipath and doppler BB TX2/pp 215-225, Rx3/pp
55-61, Rx4/pp 70-74,
Rx4/pp 88-89
7. L7, L8 Characteristics of the wireless channel OHP TX2/pp 582-586,RX4/pp
86-88
8. L9 Optical wireless networks. BB TX2/pp 570-580, Rx3/pp
61-72, Rx4/pp 89-94
UNIT- II NETWORK PRINCIPLES
Tx2 /pp 27-28
13. L10 Wireless medium access alternatives BB
Tx1 /pp 44-46
Fixed assignment access for voice-
14. L11, L12 BB Tx1 /pp 46-50
oriented networks
15. L13, L14 Random access for data oriented BB Tx1 /pp 50-58
16EC772 - WIRELESS NETWORKS
networks
16. L15, L16 Integration of voice and data traffic OHP Tx1 /pp 58-68
17. L17, L18 Wireless network topologies BB Tx1 /pp 68-71
UNIT- III WIRELESS LAN
L19 TX 1/ pp 239 - 240, 247 -
18. Fundamentals of WLAN BB
248
L20, L21 IEEE 802.11 WLAN Standard,
19. architecture and services, physical BB TX 1/ pp 240 - 248
layer
L22 MAC sub layer – MAC management BB
20. TX 1/ pp 249 - 257
sub layer
21. L23 IEEE standards OHP TX 1/ pp 262
22. L24 HIPER LAN BB TX 1/ pp 325 – 335
23. L25 Bluetooth BB TX 1/ pp 335 – 337
24. L26 Home RF BB TX 1/ pp 263 - 300
25. L27 Wireless ATM, WBRAN BB TX 1/ pp 263 - 300
UNIT – IV NETWORK OPERATIONS
26. L28 Wireless Network Operation BB Rx2 /pp 266
27. L29 Mobility Management BB Rx2 /pp 266-284
28. L30 Radio Resources and Power BB Rx2 /pp 284-297
Management
29. L31 Security in Wireless Networks OHP Rx2 /pp 297-310
30. L32 Wireless WANs LCD Rx2 /pp 319
31. L33 GSM and CDMA Technology BB Rx2 /pp 320-327
32. L34 IS-95, IMT-2000 BB Rx2 /pp 350-355
33. L35 Mobile Data Networks, DPD BB Rx2 /pp 371-376
Networks
34. L36 GPRS, Wi Fi - LTE / LTEA. BB Rx2 /pp 379
35. UNIT-V INFRASTRUCTURELESS NETWORK
36. L37 Introduction to ad hoc networks BB Rx1 /pp 213-215
Characteristics, Issues
37. L38 Medium Access Scheme, Routing LCD Rx1 /pp 226
38. L39 Multicasting, Transport Layer Rx1 /pp 227
BB
Protocols
39. L40 Pricing Scheme, Quality of Service Rx1 /pp 228
BB
Provisioning
40. L41 Self Organization, Security – Rx1 /pp 230
Addressing and Service Discovery BB
UNIT-I
1. What are the digital modulation schemes used in wired transmission
techniques?(Remembering)(CO1)
Amplitude shift keying (ASK), Frequency shift keying (FSK), Phase shift keying (PSK),
or quadrature amplitude modulation (QAM).
16EC772 - WIRELESS NETWORKS
2. List out the consideration in the design of wireless modems.(Understanding)(CO1)
Bandwidth Efficiency, power Efficiency, out-of –band radiation, Resistance to
Multipath, constant envelope modulation.
3. What are the two facets of the power requirement? (Remembering)(CO1)
One is the power needed to operate the electronics in the terminal. Other is the amount
of power needed at the output of the power amplifier in order to radiate a given amount of
signal power from the antenna.
4. What are the digital wireless transmission techniques? (Remembering)(CO1)
Pulse transmission techniques, Basic modulation techniques and Spread spectrum
systems.
5. What are the steps involved in base band transmission? (Remembering)(CO1)
I) Line coding, ii) pulse modulation.
6. What are the two methods for spread spectrum transmission? (Remembering)(CO1)
There are two basic methods for spread spectrum transmission:
Direct sequence spread spectrum (DSSS) and Frequency hopping spread spectrum
(FHSS).
7. What is a frequency hopping? (Remembering)(CO1)
The shifts in frequency, or frequency hops, occur according to a random pattern that is
Known only to the transmitter and the receiver.
8. Define equalization techniques. (Remembering)(CO1)
In-band time diversity and exploiting time diversity these two approaches serve the same
purpose of equalizing the effects of the channel, and for that reason they are referred to as
equalization techniques
9. What are the diversity techniques? (Remembering)(CO1)
1. Time diversity techniques 2. Frequency diversity techniques 3. Space diversity techniques.
10. What are the coding techniques used in wireless communication?
(Remembering)(CO1)
1. Error control coding 2.speach coding 3.coding for spread spectrum systems.
11. What is multicarrier modulation? (Remembering)(CO1) (April/ May 2008).
MCM takes the advantage of orthogonality of the channel and develops efficient
implementation using FFT algorithm. In this system, the received signal power is measured
in different sub channels and the modulation or coding of the subcarrier is changed to
improve the performance.
12. What do you understand about Ultra Wide Band (UWB)
technology(Understanding)(CO1) (Apr/ May 2008).
It is used in short range communication. In this technique, a very narrow width and low
power pulses (less than 1 ns) are used for transmission. The spectrum of this pulse
occupies wideband (in GHz).
13. What are the advantages of UWB pulse transmission? (Remembering)(CO1)
(May/June 2009).
In these techniques, a very narrow width and low power pulses (less than 1 ns) are used for
transmission, low power, high bandwidth and signal processing gain that interference from
existing systems into the system is negligible, its implantation is easy.
14. How is a wireless network different from a wired network? State at least two
differences(Understanding)(CO1).(Nov/Dec 2008)
A wired medium can provide reliable, guided link which conducts an electric signal
associated with the transmission of information of from one fixed terminal to another. The
wireless medium is unreliable. It has a low bandwidth. It supports mobility. Wireless
transmission share the same medium which is nothing but air.
15. What is the primary goal of IEE 802.11? (Remembering)(CO1) (May/June
2009).
16EC772 - WIRELESS NETWORKS
The primary goal of the standard was the specification of a simple, robust, WLAN.This
offers time bounded and asynchronous services also it should be able to operate with
multiple physical layers.
16. What are Advantages of wireless LAN? (Remembering)(CO1)
Flexibility, Planning, Design, Robustness, Quality Service, Cost, Proprietary Solution,
Restriction, Safety and Security.
17. What are Design Goals of Wireless LAN? (Remembering)(CO1)
Global Operation, Low Power, License-free Operation, Robust transmission technology,
simplified spontaneous co-operation, Easy to use, protection of investment, Safety and
Security, Transparency for application.
18. What are the three Low Power States provided by Bluetooth?
(Remembering)(CO1)
PARK state, HOLD state, SNIFF state
19. Define a LAN. (Remembering)(CO1)
A Local Area Network (LAN) is a privately owned network within a single
office,Buildings or campus, covering a distance of a few kilometers.
20. What is HIPERLAN? (Remembering)(CO1)
The HIPERLAN stands for High Performance Radio LAN and was initiated by
the RES-10 group of the ETSI as a pan-European standard for high-speed
wireless localNetwork.
21. What are the functional requirements for the HIPERLAN-1?
(Remembering)(CO1)
Data rates of 23.529 Mbps, Coverage of up to 100M, Multi-hop ad hoc networking
capability, Support of time-bounded services, Support of power saving
22. What are two periods of contention phase of the HIPERLAN-1?
(Remembering)(CO1)
I) Elimination ii) yield are the two contention phase.
23. What are two features required for the WLAN and cellular systems?
(Remembering)(CO1)
i) Support for vertical roaming between local area and wide areas as well as
Between corporate and public environments.
ii) Support for QoS control for integration into multiservice voice-oriented back
bone PSTN WHICH include ATM switches AND OTHER facilities.
24. Define HIPERLAN-2 (May/June 2009). (Remembering)(CO1)
HIPERLAN-2 aims at IP and ATM type services at high data for indoor and possibly
outdoor applications. It expects to support both connectionless and connection-oriented
services which will make its MAC layer far more complicated than 802.11 and HIPERLAN-
1 that support only connectionless services.
25. Name the five major challenges for implementation of wireless LANs that existed the
beginning of this industry. (April/ May 2008). (Analyzing)(CO1)
Complexity and cost, Bandwidth, Coverage, Interference, Frequency Administration.
26. What is a HAN? (Nov/Dec 2008). (Remembering)(CO1)
HAN means Home Area Network
27. What is home RF? (Remembering)(CO1)
The home RF working group has developed a specification for wireless communications in
the home called shared wireless access protocol (SWAP). The SWAP specification defines
new common interface that supports wireless voice and data networking in the home. The
SWAP specification defines a new common interface that supports wireless voice and data
networking in the home. The SWAP specifications an extension of DECT (using TDMA)
for voice and a relaxed 802.11(CSMA/CA) for high-speed data applications.
28. What is Bluetooth? (Nov/Dec 2008). (Remembering)(CO1)
Bluetooth is the popular technology for short-range, ad hoc networking that is designed for
a integrated voice and data applications. Unlike WLANs, Bluetooth has a lower data rate,
but it has an embedded mechanism to support voice application. Unlike 3G cellular
16EC772 - WIRELESS NETWORKS
systems, Bluetooth is an inexpensive personal area ad hoc network operating in unlicensed
bands and owned by the user.
29. What are the three modes of operating in Bluetooth? (Remembering)(CO1)
Bluetooth has three modes of operation- no secure, service-level, and link-level security.
30. What are the characteristic of radio wave propagation? (Remembering)(CO1)
Signal modulation mechanism and multiple access technique
31. What are the methods of radio propagation mechanism? (Remembering)(CO1)
Reflection, diffraction, scattering
32. What is reflection? (Remembering)(CO1)
Reflection occurs when a propagating electromagnetic wave impinges upon an
object, This has very large dimension when compared to the wavelength of
propagating wave
33. What is diffraction? (Remembering)(CO1)
Diffraction occurs when the radio path between the transmitter and receiver is
obstructed by a surface that has sharp irregularities.
34. What is scattering? (Remembering)(CO1)
Scattering occurs when the medium through which the wave travels consists of
objects with Dimensions that are small compared to the wavelength and where the
number of obstacles Per unit volume is large.
35. Define path loss? (Remembering)(CO1)
Path loss can be expressed as the ratio of power of the transmitted signal to the power of the
same signal received by the receiver, on a given path.
36. What is fading? (Remembering)(CO1)
Fading refers to the fluctuations in signal strength when received at the receiver.
37. What are the types of fading? (Remembering)(CO1)
Fast fading/small-scale fading and slow fading /large- scale fading.
38. State the effects of multipath Propagation (Remembering)(CO1) ( April/May 2008)
1. Rapid change in signal strength over a small travel distance or time interval.
2. Random frequency modulation due to varying Doppler shifts on different multipath
signals.
3. Time dispersion (echoes) caused by multipath propagation delays.
39. What is meant by Doppler Shift? (Remembering)(CO1)
The Phase change in received signal due to the difference in path length hence the apparent
change in frequency is called Doppler shift.
Fd = v/λ cosѳ = 1/2π (ΔΦ/Δt).
BIG QUESTIONS
1. List out the different types of diversity techniques and explain each with necessary diagram.
(Analyzing)(CO1) (April/May 2008), .(Nov/Dec 2008)
2. Explain inter- symbol interference. With source of ISI? What techniques can be used to
compact ISI? (Remembering)(CO1)
3. Explain the spread spectrum receivers can exploit multipath diversity using RACK
receivers. (Remembering)(CO1)
4. write shorts on: (Remembering)(CO1)
a. What is block interleaving? How it useful in combating the effects of fast fading?
b. Write short notes on frequency hopping and direct-sequence spread spectrum.
5. What are the considerations needed in the design of wireless modems? (Nov/Dec 2008)
UNIT II
1. What are the two fundamental types of topologies used in wireless networks?
(Remembering)(CO2)
i) Infrastructure Networks Topology ii) Ad HOC Networks Topology
2. Define Infrastructure Networks Topology. (Remembering)(CO2)
16EC772 - WIRELESS NETWORKS
In the infrastructure topology there is a fixed (wired) infrastructure that supports
communication between mobile terminals and fixed terminals. The infrastructure networks
are often designed for large coverage areas and multiple base station or access point
operation.
3. Define Ad Hoc networks Topology. (Remembering)(CO2)
Ad hoc or distributed network topology applies to reconfigurable networks that can
operate without the need for fixed infrastructure. These networks are primarily used by the
military and also few commercial for voice and data transmission.
4. Name the five different cell types in the cellular hierarchy.(Understanding)(CO2)
I) Femto cells II) Pico cells III) micro cells IV) macro cells V)mega cells
5. Why hexagonal cell shape preferred over square or triangular cell shapes to the
cellular architecture? (Analyzing)(CO2)
A hexagonal cell is the closest approximation to a circle of these three and has been used
traditionally for system design. The argument for a hexagonal shape crones from the fact
that among the three shapes mentioned, for a given radius (largest possible distance
between the polygon center and its edge),the hexagon has the largest area.
6. Define cell splitting. (Nov/Dec 2008). (Remembering)(CO2)
As the number of subscribers increase within a given area, the number of channels
allocated to a cell is no longer sufficient for supporting the subscriber demand. It then
becomes necessary to allocate more channels to the area that is being covered by this cell.
This can be done by splitting cells into smaller cells and allowing additional channels in the
smaller cells.
7. What is the use of Directional Antennas for cell sectoring? (Understanding)(CO2)
The simplest and the most popular scheme for expanding the capacity of cellular systems is
cell sectoring using directional antennas. This technique attempts to reduce the signal-to-
interference ratio and thus reduce the cluster size, thereby increasing the capacity. This
antenna is the reduction in co channel interference that results by focusing the radio
propagation in only the direction where it is required.
8. Define Lee’s microcell method. (Remembering)(CO2)
Lee’s microcell zone technique exploits corner excited BS to reduce the number of handoffs
and eliminate portioning of channels between sectors of a cell.
9. What is mean by overlaid cell concept method? (Remembering)(CO2) (May/June
2009).
The overlaid cell concept introduced in the section on cell splitting can be used to increase
the capacity of a cellular network. Here, channels are divided among a larger microcell that
coexists with a smaller microcell contained entirely within the macro cell. The same BASE
STATION serves both the macro and microcell.
10. Compare FCA and DCA frequency assignment techniques. (Analyzing)(CO2)
BIG QUESTIONS
1. How is the loop-free property in table driven routing protocols. (Analyzing)(CO4)
2. Describe a common method used in alleviating the hidden terminal problem at the MAC
layer. (Understanding)(CO4)
3. List the important issues for multi-hop wireless communication. (Analyzing)(CO4)
4. Why power management important for ad hoc wireless network? (Analyzing)(CO4)
16EC772 - WIRELESS NETWORKS
5. What role does the routing protocol play in the provisioning of qos guarantees for ad hoc
wireless network? (Remembering)(CO4)
6. List the major advantages of the ad hoc wireless internet. (Understanding)(CO4)
7. Differentiate cellular and ad hoc wireless network (Understanding)(CO4)
8. Write brief notes on wireless sensor network. (Remembering)(CO4)
UNIT-V
1. What are the issues in designing a MAC Protocol? (Remembering)(CO5)
i. Bandwidth efficiency, ii.Qos, iii.Synchronization,iv.Hidden and exposed Terminal
problem, v.Mobilty of nodes, vi. Distributed nature of central co ordination.
2. How you classify MAC protocols? (Analyzing)(CO5)
i.Contention based protocols, ii.Contention based protocols with reservation
mechanism, iii.Contention based protocols with scheduling mechanisms
3. What are the two types of Random access protocols? (Remembering)(CO5)
i. Sender initiated protocols, ii. Receiver initiated protocols
4. What do you mean by reservation mechanisms? (Remembering)(CO5)
Reservation of the resource (Bandwidth), once bandwidth is reserved the node gets
exclusive access to the reserved bandwidth.
5. List criteria to classify the MAC protocol. (Analyzing)(CO5)
i. Initiation approach, ii. Time synchronization, iii. Reservation approach.
6. What is back off algorithm? (Remembering)(CO5)
If a packet transmitted by a node is lost, the node uses back off algorithm to back off
for a random interval of time before retrying.
7. What is BTMA? (Remembering)(CO5)
Busy Tone Multiple Access is the earliest protocols proposed for overcoming the
hidden terminal problem. The transmission channel is split into two types, data channel
and control channel.
8. What do you mean by contention based protocol? (Remembering)(CO5)
Protocols that aid the nodes in effecting bandwidth reservations, contention occurs only
during the resource reservation phase. Once the bandwidth is reserved, the node gets
exclusive access to the reserved bandwidth.
9. List the different types of contention based protocols with reservation mechanism.
(Remembering)(CO5)
i. Distributed packet reservation multiple access protocol, ii. Collision avoidance time
allocation protocol, iii. Hop reservation multiple access protocol, iv. Soft reservation
multiple access with priority assignment, v. Five phase reservation protocol, vi.
MACA with piggy back reservation.
10. What do you mean by soft reservation? (Remembering)(CO5)
The soft reservation mechanism allows any urgent node, transmitting packets
generated by a real time application, to take over the radio resource from another
node of a real time application on an demand basis.
11. What is piggy back reservation? (Remembering)(CO5)
MACA with piggy backed reservation is a protocol used to provide real time traffic
support in multi hop wireless networks.
12. List the advantages of using directional antennas in MAC protocol?
i.Reduced signal interference, ii. Increase in the system throughput, and improved channel
reuse that leads to an increase in the overall capacity of the channel.
13. What is active or passive node?
In a MAC protocol, switching is possible with every antenna or all the antennas, when it uses
active antenna then the radiation pattern is similar to that of an Omni-directional antenna.
14. List some other types of MAC protocols. (Remembering)(CO5)
16EC772 - WIRELESS NETWORKS
i.Multichannel MAC protocol. ii. Multichannel CSMA MAC protocol, iii. Power control MAC
protocol for Ad hoc Networks. iv. Receiver based automates protocol. Inter leaved Carrier sense
multiple access protocol.
15. What do you mean by Hidden and Exposed terminal problems? (Remembering)(CO5)
The hidden and exposed terminal problems are unique to wireless networks. The hidden
terminal problem refers to the collision of packets at a receiving node due to the simultaneous
transmission of those nodes that are not within the transmission range of the sender, but are within
the transmission range of the receiver.
16. Define mobility of nodes. (Remembering)(CO5)
Nodes in adhoc wireless networks are mobile most of the time. The bandwidth reservations
made or the control information exchanged may end up being of no use if the node mobility of the
nodes.
17. What are synchronous protocols? (Remembering)(CO5)
Synchronous protocols require time synchronization among all nodes in the network, so that
reservations made by a node are known to other nodes in its neighborhood. Global time
synchronization is generally difficult to achieve.
18. What is Asynchronous Protocols? (Remembering)(CO5)
It does not require any global synchronization among nodes in the network. These protocols
usually use relative time information for effective reservations.
19. What is FAMA protocol? (Remembering)(CO5)
FAMA- Floor Acquisition Multiple Access Protocols, RTS-CTS exchange with no carrier
sensing (ALOHA) and RTS-CTS exchange with non persistent carrier sensing (CSMA)
20. Draw the Frame structure in SRMA/PA. (Remembering)(CO5)
Frame
SYNC SR RR RC DS ACK
21. What are the five phases in the reservation process? (Remembering)(CO5)
i. Reservation request phase. ii. Collision report phase, iii. Reservation confirmation phase-in.
Reservation acknowledgement phase. Packing and elimination phase.
22. What is dead lock condition? (Remembering)(CO5)
When more than two transmitting nodes are located nearby, it results in deadlock condition,
Deadlocks are of two types isolated and non isolated.
23. What do you mean by multi hop Co ordination? (Remembering)(CO5)
By means of multi hop Co ordination mechanism, the excess delay incurred by a packet at the
upstream nodes is compensated for at the downstream nodes, When a node receives a packet, it
would already received the priority index of the packet piggy packed on the previous RTS packet.
BIG QUESTION
1. What are the advantages of reservation based MAC protocols over contention based MAC
protocols? (Remembering)(CO5)
2. Compare the pros and cons of using scheduling based MAC protocols over reservation based
MAC protocols. (Understanding)(CO5)
3. What are the disadvantages of the binary exponential back off algorithm used in MACA? How
are they overcome in MACAW? (Remembering)(CO5)
4. Discuss the packet queuing mechanism of MACA. (Understanding)(CO5)
5. How synchronization between nodes achieved in the HRMA protocol? (Analyzing)(CO5)
6. What are the pros and cons of using multichannel MAC protocols over single channel MAC
protocols? (Remembering)(CO5)
16EC772 - WIRELESS NETWORKS
7. What are the advantages and disadvantages of MAC protocols using directional antennas?
(Remembering)(CO5)