Wireless Technology Exam Notes
Repeated Questions
- Based on the analysis of six Wireless Technology (WT) question papers from May 2022 to Dec 2024, certain questions have appeared verbatim in multiple papers.
Exact Repeated Questions
- Outline the method that supports mobility in CISCO Unified Wireless Network
- Appeared in May 2023, Dec 2023, and May 2024.
- Give the significance of WEP protocols. What are the features of WPA2?
- Appeared in May 2023 and Dec 2023.
- Compare GSM and UMTS with diagram
- Appeared in May 2023, May 2024, and Dec 2023.
- Features of VANET and MANET
- Appeared in Dec 2023 and May 2024.
- Explain Zigbee protocol stack
- Appeared in May 2023, Dec 2023, and May 2024.
- Explain UMTS and GSM security
- Appeared in Dec 2023 and May 2024.
Conceptually Similar Questions
- Some questions are slightly modified but conceptually similar.
Variants Seen
Wireless Sensor Networks (WSN)
- Layered architecture and challenges (May 2023).
- Architecture with issues (May 2024).
- Challenges in WSN (Dec 2023).
Spread Spectrum
- Explain DSSS and FHSS repeated with small phrasing changes (May 2022, Dec 2023, May 2024).
1G to 5G Evolution
- Asked directly (May 2023) and paired with Massive MIMO (Dec 2023, May 2024).
Wi-MAX Architecture & Features
- Common in May 2022, Dec 2023, May 2024.
Zigbee
- What is Zigbee? (May 2023).
- Zigbee protocol stack (Dec 2023 and May 2024).
Emerging Trends (2023–2024)
- Recent shift in focus in the question papers.
Topics
LoRaWAN
- Introduced and repeated in May 2023 and May 2024 – rising importance.
RF Site Survey with WLC/AP
- Gaining focus – seen in Dec 2023 and May 2024.
OFDMA & Massive MIMO
- More recent interest in advanced modulation and antenna techniques (2023–24).
Wi-Fi Protocol Architecture
- Paired with Zigbee/WiMAX for protocol stack comparison in 2023 & 2024.
Highest Probability Questions for 2025
- Ranked for likely repetition.
- Outline the method that supports mobility in CISCO Unified Wireless Network (Very High)
- Compare GSM and UMTS with diagram (Very High)
- Explain Zigbee protocol stack (Very High)
- Explain WEP and WPA2 protocols (Very High)
- State features of VANET and MANET (Very High)
- Explain WSN architecture and challenges (High)
- Explain DSSS and FHSS (Spread Spectrum) (High)
- Explain LoRaWAN architecture (High)
- Describe UMTS and GSM security (High)
- Write short note on evolution from 1G to 5G with Massive MIMO (High)
Answers to High Probability Questions
Q1. Outline the method that supports mobility in Cisco Unified Wireless Network
Mobility in Cisco Unified Wireless Network (UWN) is supported using centralized architecture and features that allow seamless roaming of wireless clients across multiple Access Points (APs) without disconnecting the session.
Main methods that support mobility:
- Centralized Wireless Controller (WLC):
- Cisco UWN uses a central Wireless LAN Controller (WLC) that manages all APs.
- The controller handles user authentication, session management, and ensures continuous connectivity during movement from one AP to another.
- Mobility Group:
- A Mobility Group is a collection of multiple WLCs that share client information.
- When a user roams between APs connected to different controllers within the same mobility group, the session remains active and uninterrupted.
- Fast Secure Roaming (FSR):
- Cisco enables fast handoff between APs by pre-authenticating the client device with nearby APs.
- This allows the device to connect instantly to the new AP without repeating the full authentication process.
- Mobility Services Engine (MSE):
- The MSE enhances mobility by tracking client location, monitoring traffic, and optimizing network paths.
- It supports seamless roaming with additional services like location-based tracking, wireless planning, etc.
- Centralized Wireless Controller (WLC):
Diagram:
Device ---> AP1 ----+
|
|
----> Wireless LAN Controller (WLC)
|
Device ---> AP2 ----+(MSE + Mobility Group)
|
Seamless handoff supportedPractical Examples:
- Example 1: A student walks around the campus during a video call. The call does not drop because the Cisco controller automatically switches the connection from one AP to another.
- Example 2: In a hospital, when doctors move between rooms with tablets, they stay connected to patient records wirelessly through fast AP-to-AP switching.
Memory Trick: Just remember "C-M-F-M"
- C = Centralized Control (WLC)
- M = Mobility Group
- F = Fast Secure Roaming
- M = Mobility Services Engine (MSE)
Q2. Compare GSM and UMTS with architecture diagram
- GSM (Global System for Mobile Communication):
- GSM is a 2nd Generation (2G) digital mobile communication system.
- It primarily supports voice and SMS services using TDMA and FDMA as access techniques.
- The switching technique is circuit-switched, with limited internet access via GPRS or EDGE.
- UMTS (Universal Mobile Telecommunication System):
- UMTS is a 3rd Generation (3G) mobile system.
- It supports voice, video, SMS, and high-speed internet using WCDMA (Wideband Code Division Multiple Access).
- UMTS supports both circuit-switched and packet-switched services.
- Comparison Table:
| Feature | GSM (2G) | UMTS (3G) |
|---|---|---|
| Generation | 2G | 3G |
| Access Technique | TDMA / FDMA | WCDMA |
| Data Rate | Up to 64 kbps (with GPRS/EDGE) | Up to 2 Mbps |
| Switching Type | Circuit Switching | Circuit + Packet Switching |
| Main Services | Voice and SMS | Voice, Video, Internet, Multimedia |
| Core Network | MSC, HLR, VLR | MSC, SGSN, GGSN |
| Internet Support | Basic (Slow) | Advanced (Fast) |
| Architecture Complexity | Simple | Complex |
Architecture Diagrams:
- GSM Architecture: [Mobile Station] → [BTS] → [BSC] → [MSC] → [PSTN/ISDN]
- BTS = Base Transceiver Station
- BSC = Base Station Controller
- MSC = Mobile Switching Center
- UMTS Architecture: [User Equipment] → [Node B] → [RNC]
- [MSC for voice]
- [SGSN] → [GGSN] → [Internet]
- Node B = Similar to BTS
- RNC = Radio Network Controller
- SGSN = Serving GPRS Support Node
- GGSN = Gateway GPRS Support Node
- GSM Architecture: [Mobile Station] → [BTS] → [BSC] → [MSC] → [PSTN/ISDN]
Examples:
- GSM: Used in basic feature phones for calling and SMS.
- UMTS: Used in smartphones for voice, internet browsing, and video calling.
Memory Tip:
- “GSM is for Simple Messaging”
- “UMTS = Ultimate Mobile with Speed”
Q3. Explain Zigbee Protocol Stack
Zigbee is a wireless communication protocol based on the IEEE 802.15.4 standard.
It is designed for low-power, low-cost, short-range communication, especially in IoT (Internet of Things) applications like smart homes, sensors, automation, etc.
The Zigbee protocol stack is composed of four main layers, each with specific responsibilities.
Zigbee Protocol Stack Diagram:
|----------------------------------------------|
Application Layer (ZDO + APS) Network Layer ---------------------------------------------- MAC Layer ---------------------------------------------- Physical Layer (PHY) ---------------------------------------------- Zigbee Protocol Stack Layers:
- Physical (PHY) Layer:
- Responsible for actual transmission and reception of raw bits.
- Defines frequency, modulation, and data rate.
- Operates mainly on 2.4 GHz band.
- Handles energy detection and link quality.
- MAC (Medium Access Control) Layer:
- Manages access to the physical medium.
- Ensures collision-free transmission using CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance).
- Handles frame validation, acknowledgment, and beacon management.
- Network Layer:
- Manages routing, addressing, and device joining/leaving the network.
- Supports different network topologies: Star, Tree, and Mesh.
- Performs network formation, route discovery, and maintenance.
- Application Layer:
- The topmost layer that interacts with the end-user applications.
- Consists of Application Framework, Zigbee Device Objects (ZDO), and Application Support Sublayer (APS).
- ZDO helps in device discovery, binding, and service discovery.
- Physical (PHY) Layer:
Features of Zigbee:
- Low power consumption
- Secure communication (128-bit AES encryption)
- Supports up to 65,000 devices
- Cost-effective and reliable for IoT
Examples of Zigbee Use:
- Smart light bulbs and remotes (like Philips Hue)
- Wireless motion detectors and sensors in security systems
Memory Tip: "P M N A" = Please Make Network Alive"
- Stands for: Physical → MAC → Network → Application
Q4. Give the significance of WEP protocols. What are the features of WPA2?
- This question breaks into two parts:
- Significance of WEP protocols
- Features of WPA2
- Significance of WEP Protocols:
- WEP (Wired Equivalent Privacy) was one of the first security protocols designed to provide a level of security equivalent to a wired network for Wi-Fi.
- Significance:
- Provided basic encryption to protect wireless data.
- Used RC4 encryption algorithm with 40 or 64-bit keys.
- Ensured only authorized users could access the Wi-Fi.
- Was easy to implement in early wireless devices.
- Enabled early adoption of wireless LANs in businesses and homes.
- However, WEP became obsolete because of serious security flaws, such as static key usage and weak IV (Initialization Vector), making it vulnerable to attacks.
- Features of WPA2:
- WPA2 (Wi-Fi Protected Access 2) replaced WEP and WPA as a stronger, more secure protocol for wireless networks.
- Key Features of WPA2:
- Advanced Encryption:
- Uses AES (Advanced Encryption Standard) — a robust encryption standard.
- Dynamic Key Generation:
- Encryption keys are automatically and regularly refreshed to prevent reuse.
- Strong Authentication:
- Supports 802.1X (Enterprise) and Pre-Shared Key (PSK) modes.
- Replay Protection:
- Prevents attackers from capturing and reusing old encrypted data packets.
- Integrity Checking:
- Ensures data is not tampered with during transmission.
- Mandatory in Devices:
- Since 2006, WPA2 certification is mandatory for all Wi-Fi devices.
- Advanced Encryption:
- Conclusion: While WEP helped kickstart wireless security, it was eventually replaced by WPA2, which offers highly secure, modern encryption and authentication methods suitable for today’s networks.
- Memory Tip:
- WEP = Weak Early Protection
- WPA2 = Wi-Fi Protection Advanced (2nd version)
Q5. State Features of VANET and MANET
- MANET (Mobile Ad-hoc Network):
- A MANET is a self-configuring wireless network of mobile nodes connected without any fixed infrastructure or centralized access point.
- Features of MANET:
- Infrastructure-less:
- No fixed base stations or routers.
- Dynamic Topology:
- Nodes move freely, causing frequent changes in the network structure.
- Multi-hop Communication:
- Devices forward data for others (act as routers).
- Limited Resources:
- Nodes often have limited battery, bandwidth, and processing power.
- Decentralized Control:
- Network operations are distributed among the nodes.
- Self-Healing:
- Network can automatically adapt to node failures or mobility.
- Infrastructure-less:
- VANET (Vehicular Ad-hoc Network):
- VANET is a specialized type of MANET where vehicles act as nodes and communicate with each other and roadside infrastructure.
- Features of VANET:
- High Mobility:
- Vehicles move fast, making topology change very frequently.
- Predictable Movement:
- Vehicle movement follows roads, traffic rules, which helps in route prediction.
- Large Scale:
- Can cover city-wide or highway-wide networks.
- Communication Types:
- V2V (Vehicle to Vehicle), V2I (Vehicle to Infrastructure)
- Real-time Data Sharing:
- Supports safety apps like collision warnings, traffic alerts, etc.
- High Power Availability:
- Vehicles can provide more power and processing than mobile devices.
- High Mobility:
- Comparison Table:
| Feature | MANET | VANET |
|---|---|---|
| Node Type | Mobile devices (phones, laptops) | Vehicles (cars, buses, traffic systems) |
| Mobility | Medium | Very high |
| Topology Change | Frequent | Very frequent |
| Infrastructure | None | May include roadside units (RSUs) |
| Applications | Military, rescue, temporary setups | Traffic control, safety, smart transport |
| Energy Constraint | High (battery-powered) | Low (vehicles have more power) |
- Memory Tip:
- M-A-N-E-T = Mobile Anytime Network Easily Travels
- V-A-N-E-T = Vehicles Are Now Efficient Talkers
Q6. Explain the architecture of Wireless Sensor Network (WSN) and state the issues/challenges in WSN
Wireless Sensor Network (WSN):
- Wireless Sensor Network (WSN) is a network of spatially distributed sensor nodes that monitor physical or environmental conditions like temperature, sound, pressure, etc., and transmit data wirelessly to a central location (sink or base station).
WSN Architecture:
- WSN follows a layered architecture similar to OSI but optimized for sensor communication. It includes the following layers:
- Application Layer:
- Interface between user and network.
- Provides data visualization, decision making, and user alerts.
- Transport Layer:
- Ensures reliable data delivery between source and destination.
- Manages congestion and flow control.
- Network Layer:
- Handles routing of data packets from node to sink.
- Uses energy-efficient routing protocols.
- Data Link Layer:
- Provides MAC addressing, error detection and correction.
- Manages access to the shared wireless medium.
- Physical Layer:
- Manages actual transmission and reception of bits via radio signals.
- Defines modulation, frequency, data rate, etc.
- Application Layer:
- WSN follows a layered architecture similar to OSI but optimized for sensor communication. It includes the following layers:
WSN Architecture Diagram:
+-------------------+
| Application |
+-------------------+
| Transport |
+-------------------+
| Network |
+-------------------+
| Data Link |
+-------------------+
| Physical |
+-------------------+Additionally, WSN consists of:
- Sensor Nodes – collect and process data.
- Base Station – gathers data from sensor nodes.
- End User – analyzes data (cloud, app, etc.)
Challenges in WSN:
| Challenge | Description |
|---|---|
| Energy Constraint | Nodes have limited battery; energy must be used wisely. |
| Scalability | Handling thousands of nodes becomes complex. |
| Security | Wireless links are vulnerable to attacks like eavesdropping or tampering. |
| Limited Processing | Sensor nodes have low CPU, memory, and storage. |
| Fault Tolerance | Network must continue working even if some nodes fail. |
| Data Aggregation | Combining data from many nodes can lead to loss of accuracy if not managed. |
- Applications of WSN:
- Environmental monitoring
- Smart agriculture
- Military surveillance
- Industrial automation
- Smart homes
- Memory Tip: "P-D-N-T-A" = Please Don’t Neglect Tiny Antennas" (Physical, Data link, Network, Transport, Application)
Q7. Explain Spread Spectrum and briefly outline DSSS and FHSS
- Spread Spectrum: Spread Spectrum is a wireless communication technique where the transmitted signal is spread over a wide range of frequencies. It is used to reduce interference, resist jamming, and enhance signal security.
- Spread Spectrum improves:
- Reliability
- Security
- Resistance to noise and interference
- There are two main types:
- Direct Sequence Spread Spectrum (DSSS)
- Frequency Hopping Spread Spectrum (FHSS)
- Direct Sequence Spread Spectrum (DSSS):
- Working:
- In DSSS, the data signal is multiplied with a high-frequency pseudo-noise (PN) code.
- This spreads the signal over a wider frequency band.
- At the receiver end, the same PN code is used to retrieve the original data.
- Features:
- High resistance to interference and noise.
- Difficult to intercept — more secure.
- Used in Wi-Fi (802.11b) and Zigbee.
- Working:
- Frequency Hopping Spread Spectrum (FHSS):
- Working:
- In FHSS, the signal is transmitted by hopping (switching) rapidly across different frequencies.
- Sender and receiver follow the same hopping pattern.
- Even if one frequency has interference, others will work.
- Features:
- Good resistance to narrowband interference.
- Secure — hard to predict hopping pattern.
- Used in Bluetooth and Military communications.
- Working:
- Comparison Table:
| Feature | DSSS | FHSS |
|---|---|---|
| Spreading Method | Uses PN code | Uses frequency hopping |
| Interference Handling | High | Medium to high |
| Bandwidth Usage | Wideband | Narrowband at a time |
| Application | Wi-Fi, Zigbee | Bluetooth, Military radios |
| Complexity | Medium | Simple |
- Memory Tip:
- “DSSS = Directly Spread Signal”
- “FHSS = Frequency Hop, Signal Skip”
- Conclusion: Spread Spectrum techniques like DSSS and FHSS improve wireless communication by enhancing security, reducing interference, and increasing reliability, making them ideal for modern wireless systems.
Q8. How LoRaWAN Enables Long-Range, Low-Power Communication using Spread Spectrum (CSS) OR Explain LoRaWAN Architecture (10 Marks)
- Chirp Spread Spectrum (CSS) Technique:
- LoRa (Long Range) uses a type of spread spectrum modulation called Chirp Spread Spectrum (CSS).
- A "chirp" is a signal in which frequency increases or decreases over time.
- CSS spreads the data over a wide bandwidth by changing (modulating) the frequency in a chirp pattern.
- Why Chirp Spread Spectrum (CSS)?
| Feature | Explanation |
|---|---|
| Long Range | Chirps are highly resistant to noise and interference, allowing signals to travel several kilometers, even in noisy environments. |
| Low Power | CSS allows successful data transmission at low signal levels, meaning less power consumption by the end device. |
| High Sensitivity | LoRa receivers can detect very weak signals (as low as -137 dBm), enabling communication over long distances. |
- Spreading Factor (SF):
- LoRaWAN uses Spreading Factors (SF7 to SF12) to adjust data rate and range:
- Higher SF → Longer range, lower data rate, more airtime, better sensitivity
- Lower SF → Shorter range, higher data rate, less airtime, less power
- Devices dynamically choose the best SF using Adaptive Data Rate (ADR) to optimize power and network performance.
- LoRaWAN uses Spreading Factors (SF7 to SF12) to adjust data rate and range:
- Spread Spectrum Benefits in LoRaWAN:
- Robust against interference – Spread signal over wide bandwidth
- Multiple devices can transmit without interfering
- Reduced collision risk with random chirps and SFs
- Energy-efficient for battery-powered IoT sensors
- Memory Tip: "Chirp like a bird – slow but long! LoRa chirps its data slowly over wide airwaves, reaching far with little energy."
- LoRaWAN Architecture:
- LoRaWAN (Long Range Wide Area Network) is a communication protocol designed for long-range, low-power IoT networks. It uses LoRa modulation and a star-of-stars topology.
- Main Components of LoRaWAN Architecture:
- End Devices (Nodes):
- These are IoT devices or sensors (e.g., temperature, humidity sensors).
- Communicate using LoRa (Chirp Spread Spectrum).
- Designed to be low-power and battery-operated.
- Send uplink data to Gateways.
- Gateways:
- Act as bridges between end devices and the network server.
- Receive LoRa packets from devices and forward them to the Network Server via IP (Wi-Fi, Ethernet, or cellular).
- One Gateway can serve thousands of devices.
- Do not process or decrypt the data.
- Network Server:
- Central control unit that manages the network.
- Performs:
- Packet deduplication
- Device authentication
- Security checks
- Routing to Application Server
- Also controls Adaptive Data Rate (ADR) for optimizing battery and bandwidth.
- Application Server:
- Responsible for data processing and visualization.
- It decrypts and processes the data received from sensors via the Network Server.
- Provides the output to the end-user or system (e.g., dashboards, alerts, cloud apps).
- End Devices (Nodes):
- Data Flow in LoRaWAN:
- Uplink (Device → Server)
- End Device → Gateway → Network Server → Application Server
- Downlink (Server → Device)
- Application Server → Network Server → Gateway → End Device
- Uplink (Device → Server)
- Key Features:
- Star-of-stars topology
- Long-range (2-15 km)
- Low power consumption
- High scalability
- Strong security with AES encryption
- Memory Tip: "4 Key Parts – Devices, Gateways, Network Server, App Server. Like a post office: device writes, gateway delivers, server sorts, app reads.
Q9. Explain UMTS and GSM Security (10 Marks)
- GSM & UMTS Security Overview
- Both GSM (2G) and UMTS (3G) are mobile communication technologies with built-in security mechanisms. However, UMTS provides stronger security than GSM due to improved encryption, mutual authentication, and integrity protection.
- GSM Security Features
- GSM (Global System for Mobile Communication) uses basic but effective security methods:
- a) Authentication
- Uses a shared secret key (Ki) stored on the SIM card and the network.
- Network sends a random number (RAND) → SIM applies algorithm (A3) → returns a response (SRES).
- b) Encryption
- After authentication, GSM uses A5 algorithm for data encryption.
- Voice/data is encrypted over the air between mobile device and base station.
- Limitations:
- No mutual authentication – Only network authenticates user, not vice versa.
- No integrity protection – Can’t verify if messages were altered.
- Encryption is only between user and base station (not end-to-end).
- a) Authentication
- GSM (Global System for Mobile Communication) uses basic but effective security methods:
- UMTS Security Features
- UMTS (Universal Mobile Telecommunications System) improves over GSM and follows 3GPP security architecture.
- a) Mutual Authentication
- Both user and network authenticate each other, reducing chances of fake base stations (a major GSM flaw).
- Uses AKA (Authentication and Key Agreement) protocol.
- b) Stronger Encryption & Integrity
- Uses more secure algorithms: UEA1/UEA2 for encryption
- Adds Integrity Protection using UIA1/UIA2 algorithms to protect control messages.
- c) Key Management
- Temporary session keys are generated using advanced algorithms (f1, f2, f3, f4, f5).
- Keys are used for:
- Authentication
- Encryption
- Integrity checks
- a) Mutual Authentication
- UMTS (Universal Mobile Telecommunications System) improves over GSM and follows 3GPP security architecture.
- GSM vs UMTS Security (Quick Comparison Table)
| Feature | GSM (2G) | UMTS (3G) |
|---|---|---|
| Authentication | One-way (SIM only) | Mutual (SIM and network) |
| Encryption | A5 (weaker) | UEA1/UEA2 (stronger) |
| Integrity Protection | Not available | Available |
| Protection Scope | User ↔ Base Station | End-to-End path |
| Algorithm Security | Older algorithms | Advanced cryptographic methods |
- Memory Tip: "GSM = Basic Security, UMTS = Upgrade with Mutual Auth + Integrity. Think: 2G locks the door, 3G adds CCTV + password + alarm!
Q10. Explain the evolution from 1G to 5G and describe Massive MIMO
- Evolution of Mobile Communication (1G to 5G):
- Mobile technology has evolved over several generations, each improving speed, capacity, and services.
- Comparison Table:
| Generation | Year (Approx) | Key Features | Technology Used |
|---|---|---|---|
| 1G | 1980s | Analog voice only | FDMA, AMPS |
| 2G | 1990s | Digital voice, SMS, low data | TDMA, GSM, CDMA |
| 3G | 2000s | Voice + video calling + mobile internet | WCDMA, UMTS |
| 4G | 2010s | High-speed internet, HD streaming | LTE, OFDMA |
| 5G | 2020s | Ultra-high-speed, IoT, real-time apps | mmWave, Massive MIMO, Beamforming |
- Massive MIMO (Multiple Input Multiple Output):
- MIMO is a wireless technology that uses multiple antennas at both transmitter and receiver to improve communication.
- In Massive MIMO:
- Dozens to hundreds of antennas are used at the base station.
- Multiple users can be served simultaneously using the same frequency band.
- It enables beamforming – focused signals sent in specific directions.
- Features of Massive MIMO:
- Higher Capacity:
- Supports more users at the same time without interference.
- Better Spectral Efficiency:
- Same bandwidth can carry more data.
- Improved Coverage & Reliability:
- Stronger, focused signals reach farther with better clarity.
- Reduced Latency:
- Real-time apps like gaming and remote surgery benefit.
- Energy Efficiency:
- Uses less power per user due to directional transmission.
- Higher Capacity:
- Memory Tip: "G-G-G-G-G" for 1G to 5G:
- 1G – Ghaas phus voice (Analog)
- 2G – G for GSM + SMS
- 3G – G for Good internet (video calls)
- 4G – G for Giga speed
- 5G – G for God mode (Ultra-speed, IoT, AI)
- Conclusion: The evolution from 1G to 5G shows rapid improvement in speed, connectivity, and smart applications. Massive MIMO plays a vital role in 5G by providing high-speed, low-latency, and reliable communication for modern smart services.