Você está na página 1de 3

Solutions to Sample Questions on Wireless and Mobile

Networks
1) Consider the single-sender CDMA example in Figure 6.5 of the textbook. What would
be the senders output (for the 2 data bits shown) if the senders CDMA code were (1, -1,
1, -1, 1, -1, 1, -1)?
Answer:
Output corresponding to bit d1 = [-1,1,-1,1,-1,1,-1,1]
Output corresponding to bit d0 = [1,-1,1,-1,1,-1,1,-1]
2) Consider sender 2 in Figure 6.6 of the textbook. What is the senders output to the
channel before it is added to the signal from sender 1, Z2i,m?
Answer:
Sender 2 output = [1,-1,1,1,1,-1,1,1]; [ 1,-1,1,1,1,-1,1,1]
3) Suppose that the receiver in Figure 6.6 of the textbook wanted to receive the data
being sent by sender 2. Show that the receiver is indeed able to recover sender 2s data
from the aggregate channel signal by using sender 2s code.
Answer:
d21 = (-2) x (-1) + 2x1 + 2x1 + 2x1 / 8 = 1
d22 = 2x1 + 2x1 + 2x1 + (-2)x(-1) / 8 = 1
4) Why are acknowledgements used in 802.11 but not used in wired Ethernet?
Answer: In wireless channels bit error rates are high and collision detection cannot be
effectively done.
5) Describe the role of the beacon frames in 802.11.
Answer: Beacon frame is one of the management frames in IEEE 802.11 based WLANs.
It contains all the information about the network. Beacon frames are transmitted
periodically to announce the presence of a Wireless LAN network. Beacon frames are
transmitted by the Access Point (AP) in an infrastructure BSS. The beacon frame
contains a number of important fields:
Timestamp: this allows all devices connected to the AP to synchronize with the
AP.

Beacon interval: this is the time interval between beacon transmissions.


SSID: Service Set Identifier.
Supported data rates
Parameter sets: This includes information about the specific signaling methods
(such as frequency hopping spread spectrum, direct sequence spread spectrum,
etc.).
Capability information: This signifies requirements of stations that wish to belong
to the wireless LAN that the beacon represents. For example, this information may
indicate that all stations must use WPA security.
Traffic Indication Map (TIM): This is useful to the nodes that are in power-saving
mode. The TIM identifies the nodes using power-saving for which the AP has
frames waiting for them in the APs buffer.

6) Suppose the correspondent in Figure 6.22 of the textbook were mobile. Sketch the
additional network-layer infrastructure that would be needed to route the datagram from
the original mobile user to the (now mobile) correspondent. Show the structure of the
datagram(s) between the original mobile user and the (now mobile) correspondent, as in
Figure 6.23.
Answer:
If the correspondent is mobile, then any datagrams destined to the correspondent would
have to pass through the correspondents home agent. The foreign agent in the
network being visited would also need to be involved, since it is this foreign agent that
notifies the correspondents home agent of the location of the correspondent. Datagrams
received by the correspondents home agent would need to be encapsulated/tunneled
between the correspondents home agent and foreign agent, (as in the case of the
encapsulated diagram at the top of Figure 6.23.
See figure on next page

Você também pode gostar