IT1403 MOBILE COMPUTING Two Marks Questions With Answers 2014

Anna University, Chennai

Anna_University,_Chennai_logo

SRINIVASAN ENGINEERING COLLEGE

PERAMBALUR-621212.

DEPARTMENT OF INFORMATION TECHNOLOGY

IT1403 MOBILE COMPUTING

UNIT I-

WIRELESS COMMUNICATION FUNDAMENTALS

1. What are the disadvantages of small cells?

a) Infrastructure b) Handover

c) Frequency

2. What are the benefits of reservation schemes?

a) Increased no other station is allowed to transit during this slot b) Avoidance of congestion.

c) Waiting time in clearly known.

3. Differentiate between free space loss and path loss.

Free space loss

Path loss

1) Even if no matter exists

between the sender and the receiver, signals still experience free space loss.

1) If there exists any matter between

the sender and the receiver, then it experiences the path loss.

2) There is a gradual

degradation in the strength of the signal with the distance traveled.

2) There is a sudden decrease in the

strength of the signal due to obstacles in the path.

4. Define multipath propagation

Radio waves emitted by the sender can either travel along a straight line, or they may be reflected at a large building or scattered at smaller obstacles. This leads to one of the most severe radio channel impairments called multipath propagation.

5. Define dwell time.

The time spent in a channel with a certain frequency is called the dwell time.

6. Why CSMA/CD scheme fails in wireless networks?

CSMA/CD is not really interested in collisions at the sender, but rather in those at the receiver. The sender applies carrier sense and detects an idle

medium. The sender starts sending but a collision happens at the receiver due to a second sender. The sender detects no collision and assumes that the data has been transmitted without errors, but a collision might actually have destroyed the data at the mission. The power in the area of the transmitting antenna is several magnitudes higher than the receiving power.

7. Define hidden terminal.

The transmission range of A reaches B but not C. The transmission range of C reaches B but not A. B reaches A and C. A cannot detect C and vice versa.

A starts sending to B, but C does not receive this transmission. C also wants to send something to B and senses the medium. The medium appears to be free, the carrier sense fails. C also starts sending, causing a collision at B. But A can’t detect this collision at B and continues with its transmission. A is hidden for C and vice versa.

8. What is orthogonal and autocorrelation thickness?

Orthogonal: Two vectors are called orthogonal if their inner product is 0. E.g.) the two vectors are(2,5,0) & (0,0,17): (2,5,0)* (0,0,17)=0+0+0. Autocorrelation: The barker code (+1, -1, +1, +1, -1, +1, +1, +1, -1, -1, -1) for example has a good autocorrelation (i.e.) the inner product with itself is large the result is 11.

9. Mention the merits and demerits of spread spectrum.

Merits:

=>The main advantage is the resistance to narrowband interference.

=>coexistence of several signals without co-ordination.

=>robustness against narrowband interference.

=>relative high frequency.

=>characteristics like background noise.

Demerits:

*Increase in complexity of receivers that have to despread a signal.

*Large frequency band that is needed due to the spreading of the signal.

10. Why can waves with a very low frequency follow the earth’s surface ? Why are they not used for data transmission in computer networks?

The waves with low frequencies follow the earth’s surface and can propagate long distance. Generally, the lower the frequency, the better the penetration.

Low frequency waves are bent by the atmosphere due to refraction. High frequency waves follow straight line of sight. This enables direct communication with satellites or microwave link on the ground.

11. Why don’t radio waves always follow a straight line? Why is reflection both

useful and harmful?

We have a line of sight between the sender and the receiver of the radio signals. Mobile phones are typically used in big cities with skyscrapers, on mountains, inside buildings, while driving through an alley, etc.

Here several effects occur in addition to the attenuation caused by the distance between the sender and the receiver.

Reflection is useful because,

It helps transmitting signals as soon as no line of sight exists.

Reflection is harmful because,

The reflected signal is not as strong as original, as objects can absorb some of the signal’s power.

12. What are the 3 fundamental propagation behaviors depending on their frequency?

Ground wave

Sky wave

Line of Sight

13. What’s the use of Phase Lock Loop (PLL)?

To receive the signal correctly, the receiver must synchronize in frequency and phase with the transmitter

14. What is OVSF?

Using orthogonal code separation of data streams of a sender UMTS uses so-called orthogonal variable spreading factor codes (OVSF).

15. Explain about transparent mode?

The transparent mode transfer simply forwards MAC data without any further processing .The system then has to rely on the FEC which is always used in the radio layer.

16. Specify the steps to be performed during the search for a cell after power on?

Primary synchronization

Secondary synchronization

Identification of the scrambling code.

17. What is browsing channel allocation and fixed channel allocation?

Cells with more traffic are dynamically allotted more frequencies.

This scheme is known as browsing channel allocation, while the first fixed scheme is called fixed channel allocation.

18. What is digital sense multiple access?

The scheme which is used for the packet data transmission service cellular Digital packet Data in the AMPS mobile phone system is also known as digital sense multiple access (DSMA).

19. What is called burst and normal burst?

Data is transmitted in small portions called bursts. Normal burst are used for data transmission inside a slot.

20. What is frequency hopping spread spectrum and mention their variants?

The total available bandwidth is split into many channels of smaller bandwidth plus guard spaces between the channels, hopping take place between the transmitter and receiver staying on one of these channels. This is known as Frequency hopping spread spectrum.

Two variants

Slow hopping

Fast hopping

21. What do you mean by spread factor?

It determines the bandwidth of the resulting signal in direct sequence spread spectrum

S = tb/tc

tb – user bit duration; tc – chip duration

22. What are the types of antennae?

Theoretical

Real

Directional

Multi-element

Smart

23. What are the different considerations for a signal to be propagated?

Transmission Range

Detection Range

Interface Range

24. Mention the several effects when a signal is propagated.

Blocking or Shadowing

Reflection

Refraction

Scattering

Diffraction


UNIT-II

TELECOMMUNICATION NETWORKS

1) What are the different types of handovers used in GSM?

Intra-cell handover: Within a cell, narrow-band interference could make transmission at a certain frequency impossible. The BSC could then decide to change the carrier frequency.

Inter-cell, intra-BSC handover: This is a typical handover scenario. The mobile station moves from one cell to another, but stays within the control of the same BSC.

Inter-BSC, intra-MSC handover: As a BSC only controls a limited number of cells. GSM also has to perform handovers between cells. This has to be controlled by the MSC.

Inter MSC handover: A handover could be required between two cells belonging to different MSCs. Now both MSCs perform the handover together.

2) What is meant by Inclination angle and Elevation angle?

Inclination angle is defined as the angle between the equatorial plane and the plane described by the satellite orbit.

Elevation angle is defined as the angle between the center of the satellite beam and the plane tangential to the earth’s surface.

3) Write the different types of orbits used in the satellite systems?

Geostationary earth orbit(GEO) Medium earth orbit(MEO)

Low earth orbit(LEO) Highly elliptical orbit(HEO)

4) What are different broadcast patterns available to send the data?

Flat disk Skewed disk Multi-disk

5) What is the need of SIM?

The need for SIM is that one can personalize any MS using his or her SIM i.e. user-specific mechanisms like charging and authentication are based on the SIM not on the device itself.

6) How authentication is performed in GSM systems?

Authentication is based on the SIM, which stores the individual authentication key Kj, the user identification IMSI and the algorithm used for authentication A3.

The VLR sends the random value RAND to the SIM. Both sides network and subscriber module perform the same operation with RAND and the Kj called A3. The MS sends back the SRES (signed response) generated by the SIM. The VLR can now compare both values. If they are the same, the VLR accepts the subscriber, otherwise the subscriber is rejected.

7) Draw the UMTS architecture

Uu Iu

UE UTRAN CN

UTRAN- the UTRAN network

UE-User requirement

CN-Core network

Uu-Interface that connects UE and UTRAN Iu - Interface that connects UTRAN and CN

8) What is meant by footprint?

A footprint can be defined as the area on earth where the signals of the satellite can be received.

9) What the two basic transport mechanisms of DAB?

Main service channel (MSC): It carries all user data. The MSC consists of common interleaved frames (CIF) i.e, data fields of 55,296 bits that are sent every 24 ms. A CIF consists of capacity units (CU) with a size of 64 bits which form the smallest addressable unit within a DAB system.

10) What is MOT? Give its primary goal.

DAB faces a broad range of different receiver capabilities. So to solve this problem it defines a common standard for data transmission, the multi-media object transfer (MOT) protocol.

The primary goal of MOT is the support of data formats used in other multi- media systems.

11) What is SUMR?

An important register in satellite networks is the satellite user mapping register (SUMR). This stores the current position of satellites and a mapping of each user to the current satellite through which communication with a user is possible.

12) Give the two basic reasons for a handover in GSM.

The mobile station moves out of the range of a BTS or a certain antenna of a BTS. The received signal level decreases continuously until it falls below the minimal requirements for communication. The error rate may grow due to interference. All these effects may diminish the quality of the radio link.

The wired infrastructure may decide that the traffic in one cell is too high and shift some MS to other cells with a lower load. Handover may be due to load balancing.

13) Give the security services offered by GSM.

Access control and authentication

Confidentiality

Anonymity

14) What is the primary goal of GSM?

The primary goal of GSM was to provide a mobile phone system that allows users to roam throughout Europe and provides voice services compatible to ISDN and other PSTN systems.

15) Differentiate GSM and DECT.

GSM

DECT

1. Global systems for mobile

communications

1. Digital enhanced cordless

telecommunications

2. Range is up to 70km.

2. Range is limited to about 300m.

16) What are the two new network elements in GPRS architecture?

Gateway GPRS support node (GGSN): It is the inter-working unit between the GPRS network and external packet data networks (PDN). Serving GPRS support node (SGSN): It supports the MS.

17) Describe about MAC layer in DECT architecture.

The medium access control (MAC) layer establishes, maintains and releases channels for higher layers by activating and deactivating physical channels. MAC multiplexes several logical channels onto physical channels. Logical channels exist for signaling network control, user data transmission, paging or sending broadcast messages. Additional services offered include segmentation/reassembly of packets and error control/error correction.

18) Give the full form for the following:

a) CKSN

b) EIR

c) DTMF

d) MOC

a) CKSN- Ciphering key sequence number b) EIR- Equipment Identity Register

c) DTMF- Dual Tone multiple frequency d) MOC- Mobile originated call

19) Describe the three subsystems of GSM.

Radio subsystem (RSS): It comprises all radio specific entities i.e. the mobile stations (MS) and the base station subsystem (BSS).

Networking and switching subsystem (NSS): The heart of the GSM system is formed by the NSS. This connects the wireless network with standard public networks.

Operating subsystem (OSS): It monitors and controls all other network entities.

20) What are the applications of satellites?

Weather forecasting

Radio and TV broadcast satellites

Military satellites

Satellites for navigation


UNIT III WIRELESS LAN

1. List the advantages of Wireless LANs

Flexibility

Planning

Design

Robustness and

Cost

2. List the disadvantages of Wireless LANs Quality of service Proprietary solutions Restrictions

Safety and security

3. What are the advantages and disadvantages of infra red technology?

Advantages:

It is simple and extremely cheap

No licenses are needed

Shielding is very simple

Electrical devices do not interfere with infra red transmission.

Disadvantages:

It has low bandwidth compared to other LAN

technologies.

It cannot penetrate walls or other obstacles.

For good transmission quality and high data rates a

LOS, i.e., direct connection is needed.

4. Explain briefly about an infrastructure network

Infrastructure networks not only provide access to other networks, but also include forwarding functions, medium access control etc. In these infrastructure-based wireless networks, communication typically takes place only between the wireless nodes and the access point, but not directly between the wireless nodes.

5. Explain briefly about an Ad-hoc network

Ad-hoc wireless networks do not need any infrastructure to work. Each node can communicate directly other nodes, so no access point controlling

medium access is necessary. Nodes within an ad-hoc network can only communicate if they can reach each other physically, i.e., if they are within each others radio range.

6. What are the basic tasks of the MAC layer?

Medium access Fragmentation of user data Encryption

7. What are the basic services provided by the MAC layer?

Asynchronous data service (mandatory)

Time-bounded service (optional)

8. List the basic access mechanisms defined for IEEE 802.11

The mandatory basic method based on a version of CSMA/CA

An optional method avoiding the hidden terminal problem

A contention-free polling method for time bounded service.

9. What is the basic idea of IEEE 802.11 power management?

The basic idea is to switch off the transceiver whenever it is not needed. Switching off the transceiver should be transparent to existing protocols and should be flexible enough to support different applications. The power saving includes two states for a station: Sleep and awake, and buffering of data in senders.

10. What are the techniques used for MAC management?

Synchronization

Power management

Roaming

Management information base(MIB)

11.Define beacon?

Beacon frame is used to convey timing information within a BSS.It contains a timestamp and other management information used for power management and roaming.The timestamp is used by the node to adjust its local clock.

12.What are the handovers in hiperLAN?

The handovers in hiperLAN are

*Sector handover

*Radio handover

* Network handover

13.Distinguish infrastructure and adhoc networks?

Infrastructure networks

adhoc networks

Communication takes place only between a

wireless node and an access point

Communication takes place only between two

wireless nodes

The wireless node is simple as functionality is

based on the access point

The wireless node is complex

Can forward messages across networks

Can forward messages only within the specified

range

14.Why is physical layer in IEEE802.11 subdivided ? What are its sublayers?

The physical layer in IEEE802.11 is subdivided because a sublayer has to be dependant on the upper layers (architecture dependant)and the other has to be medium dependant. The two sublayers are namely,

*Physical layer convergence protocol

* Physical medium dependant sublayer

15.Define MSDU lifetime?

MSDU lifetime is used to provide time bounded service which specifies

the maximum time that can elapse between sending and receiving a MSDU. It has a range of 0-16000 ms.

16.What are the elements in core protocols in Bluetooth?

The elements in core protocols in Bluetooth are,

*Radio

*Baseband

*Link Manager protocol

*Logical Link control and adaptation protocol

*Service discovery protocol

1 7.What are the low power states in Bluetooth?

The low power states in Bluetooth are

*Sniff state

*Hold state

*Park state

18.Define SDP?

SDP stands for Service discovery protocol.SDP defines the discovery of services enabled by a SDP server which has some information about the list of services available called the service record.

19.What is EY-NPMA?

EY-NPMA stands for Elimination-yield non preemptive priority multiple access which is the heart of channel access providing priorities and different access mechanisms.

20.What do you mean by ESSID?

ESSID means Extended Service Set Identifier.It is the name of the

network and is used to separate two networks.Without knowing ESSID it is impossible to participate in a WLAN.


UNIT IV

MOBILE NETWORK LAYER

1.What are the two possibilities for the location of the Care-of address(COA)?

Foreign agent COA:The COA could be located at the Foreign Agent.i.e;the COA is an IP address of the FA.The FA is the tunnel end-point and forwards packets to the Mobile Node.

Co-located COA:The COA is co-located if the MN temporarily acquired an additional IP address which acts as COA.This address is now topologically correct, and the tunnel end point is at the MN.Co-located addresses can be acquired using services such as DHCP

2.What are the three alternatives for the implementation of Home Agent(HA)?

The HA can be implemented

*on a router that is responsible for the home network.

*on an arbitrary node in the subnet

*again on the router.But here the router acts as a manager for MNs belonging to a virtual home network.

3.What is generic routing encapsulation?

Generic routing encapsulation allows the encapsulation of packets of one protocol suite into the payload portion of a packet of another protocol suiteThis encapsulation supports other network layer protocols in addition to IP.

4.What are the four additional messages in optimized mobile IP Protocol?

Binding request

Binding update

Binding acknowledgement

Binding warning

5.What are the disadvantages of Cellular IP?

Efficiency:Additional network load is induced by forwarding packets on multiple paths

Transparency: Changes to Mobile Nodes are required

Security:Routing tables are changed based on messages sent by mobile nodes

6.What is the function performed by Mobility anchor point(MAP)?

MAP is responsible for a certain domain and acts as a local Home Agent within this domainfor visiting Mobile Nodes.The MAP receives all packets on behalf of the Mobile Node,encapsulates and forwards them directly to the Mobile Node’s current address.As long as a Mobile Node stays within the domain of a MAP,the globally visible COA does not change.

7.What is the use of dynamic host configuration protocol?

The dynamic host configuration protocol is mainly used to simplify the installation and maintenance of networked computers.If a new computer is connected to a network, DHCP can provide it with all the necessary information for full system integration into the network.

8.What is meant by destination sequence distance vector?

Destination sequence distance vector(DSDV) routing is an enhancement to distance vector routing for ad-hoc networks. Distance vector routing is used as routing information protocol in wired networks.DSDV adds sequence numbers and dambling to the distance vector algorithm.

9.What do you mean by dampling in DSDV?

Transient changes in topology that are of short duration should not destabilize the routing mechanisms.Advertisements containing changes in the topology currently stored are therefore not disseminated further.A node waits with dissemination if these changes are probably unstable.Waiting time depends on the time between the first and best announcement of a path to a certain destination.

10. How does Dynamic source routing divide the task of routing?

problems:

Dynamic source routing divides the task of routing into two separate

Route discovery:A node only tries to discover a route to a destination if it has to send something to this destination and there is currently no known route.

Route maintenance:If a node is continuously sending packets via a route,it has to make sure that the route is held upright.As soon as a node detects problems with the current route,it has to find an alternative.

11.What is the goal of a mobile IP?

The goal of a mobile IP can be summarized as: supporting end-system mobility while maintaining scalability,efficiency,and compatibility in all respects with existing applications and Internet protocols.

12.What is the use of Mobile Node?

A mobile node is an end-system or router that can change its point of attachment to the internet using mobile IP.The MN keeps its IP address and can continuously communicate with any other system in the internet as long as link-layer connectivity is given.Mobile nodes are not necessarily small devices such as laptops with antennas or mobile phones; a router onboard an aircraft can be a powerful mobile node.

13.What are the services provided by a foreign agent(FA)?

The FA can provide several services to the MN during its visit to the foreign network.The FA can have the Care-of address acting as tunnel point and forwarding packets to the MN.The FA can be the default router for the MN. FAs can also provide security services.

14.What are the entities and terminologies in mobile IP?

Mobile Node

Correspondent node

Home network

Foreign network

Foreign agent

Care-of address

Home agent

15.What are encapsulation and decapsulation?

Encapsulation is the mechanism of taking a packet consisting of packet header and data and putting it into the data part of a new packet.The reverse operation, taking a packet out of the data part of another packet,is called decapsulation.Encapsulation and decapsulation are the operations typically performed when a packet is transferred from a higher protocol layer to a lower layer or from a lower to a higher layer respectively.

16.What are the problems associated with reverse tunneling?

Firewalls

Multi-cast

TTL

17.What are the disadvantages of Cellular IP?

Efficiency: Additional network load is induced by forwarding packets on multiple paths.

Transparency: Changes to MNs are required

Security: Routing tables are changed based on messages sent by mobile nodes.Additionally,all systems in the network can easily obtain a copy of all packets destined for an MN by sending packets with the MN’s source address to the cellular IP gateway.

18.What are the advantages of HAWALI?

Security: Challenge-response extensions are mandatory.In contrast to Cellular IP,routing changes are always initiated by the foreign domain’s infrastructure.

Transparency: HAWALI is mostly transparent to mobile nodes.

19. What are the disadvantages of HAWALI?

Security: There are no provisions regarding the setup of

IPSec tunnels.

Implementation: No private address support is possible because of co-located Care-of Addresses

20.What is the use of sequence numbers in DSDV?

Each routing advertisement comes with a sequence number.Within ad-hoc networks,advertisements may propagate along many paths.Sequence numbers help to apply the advertisements in correct order.This avoids the loops that are likely with the unchanged distance vector algorithm


UNIT V

TRANSPORT AND APPLICATION LAYERS

1. What is the function of transport layer in WAP?

The transport layer offers a bearer independent, consistent datagram-oriented service to the higher layers of the WAP architecture. Communication is done transparently over one of the available bearer services.

2. What is the use of WCMP?

The wireless control message protocol provides error handling mechanisms for WDP. WCMP is used for diagnostic and informational purposes. It is used by WDP nodes and gateways to report errors.

3. What are the advantages of WTP?

WTP offers several advantages to higher layers, including an improved reliability over datagram services, improved efficiency over connection-oriented services and support for transaction-oriented services such as web browsing.

4. How is reliability achieved in WTP?

WTP achieves reliability using duplicate removal, retransmission, acknowledgements and unique transaction identifiers.

5. What are the service primitives offered by WTP?

The three service primitives offered by WTP are

o TR-Invoke to initiate a new transaction

o TR-Result to send back the result of a previously initiated transaction

o TR-Abort to abort an existing transaction.

6. What are the features offered by WSP?

WSP offers certain features for content exchange between cooperating clients and servers:

Session management

Capability negotiation

Content encoding.

7. What are the features offered by WSP/B?

In addition to the general features of WSP, WSP/B offers the following features adapted to web browsing:

HTTP/1.1 functionality

Exchange of session headers

Push and pull data transfer

Asynchronous requests

8. What is meant by WML?

The wireless markup language(WML) is based on the standard HTML known from the www and on HDML. WML is specified as an XML document type. WML follows a deck and card metaphor.

9. What are the capabilities of WMLScript?

WMLScript offer several capabilities:

Validity check of user input

Access to device facilities

Local user interaction

Extension to the device software

10. Define WTA

Wireless telephony application (WTA) is a collection of telephony specific extensions for call and feature control mechanisms, merging data networks and voice networks.

11. Define XHTML

XHTML is the extensible hypertext mark-up language developed by the w3c to replace and enhance the currently used HTML.

12. What do you mean by MMS?

The multimedia messaging service (MMS) transfers asynchronous multi-media content. MMS supports different media types such as JPEG, GIF, text and AMR coded audio. There is no fixed upper bound for the message size. Depending on the network operator and device capabilities typical sizes are 30-100 Kbytes.

13. What are the two functions of transport layer in the internet ?

1) Checksumming over user data.

2) Multiplexing/Demultiplexing from /to applications.

14. Distinguish TCP& UDP ?

TCP

UDP

1) Connection oriented protocol

Connection less protocol

2) TCP is network friendly

UDP is not network friendly

3) TCP guarantees in-order delivery or

reliable data transmission using

Retransmission techniques.

Does not pull back in case of congestion to

send packets in to an already congested network.

15. What is congestion & how it is identified in TCP?

When there is a temporary overload at some point in the transmission path it is referred to as congestion. Congestion result in packet loss. If acknowledgement does not arrive in time or if any acknowledgement is missing, TCP assumes network congestion.

16. How congestion is controlled in TCP?

TCP shows a behavior after congestion is called slow start. The sender has a congestion window & congestion threshold for receiver. For each acknowledgement the window size is increased exponentially until the congestion threshold & then it increases linearly (by 1). When congestion occurs the

threshold is reduced to half its current size.

17. State whether standard TCP alone support mobile users or wireless links and why?

No, standard TCP alone cannot support wireless links because wireless links have much higher error rates compared to wired links. The link layer may try to correct errors which results in higher delays and mobility (Handover between access points) may result in packet loss. In both cases standard TCP goes into slow start state.

18. State some of the classical solutions to improve the efficiency of TCP in wireless?

1) Indirect TCP (I-TCP)

2) Snooping TCP

3) Mobile TCP(M-TCP)

4) Fast retransmit/font recovery

5) Transmission/time –out freezing

6) Selective retransmission

7) Transaction oriented TCP.

19. What is indirect TCP?

Indirect TCP segments a TCP connection in 2 parts

Fixed part

Wireless part.

20. What are the steps to be taken by I-TCP when hand over take place?

1) The old proxy must forward buffered data to new proxy

2) After registration with new foreign agent, the new foreign agent informs the old one about its location to enable packet forwarding.

3) The sockets of proxy must mitigate to the new foreign agent located in the access point.

16 MARKS - KEYPOINTS

1.Explain in detail about Signal Propagation.

Path loss of radio signals

Ground wave

Sky wave

Line-of-sight

Additional Signal propagation effects

Blocking (or) Shadowing, Reflection, Refraction, Scattering, Diffraction

Multi-path propagation

Delay Spread

Intersymbol Interference

Short-term fading, long-term fading

Doppler Shift

2. Write a brief note about multiplexing.

Space division multiplexing

Guard space

disadvantages

Frequency division multiplexing

Adjacent Channel Interference

disadvantages

Time division multiplexing

Guard spaces

Co-channel Interference

Advantages, disadvantages

Code division multiplexing

Guard spaces- orthogonal codes

Advantages, disadvantages

3. What is modulation? Explain in detail.

Introduction

Digital modulation, Analog modulation

Antennas

Frequency division Multiplexing

Medium Characteristics

Spectral efficiency, Power efficiency, Robustness

Amplitude Shift Keying

Advantages, disadvantages, Applications

Frequency Shift Keying

Binary FSK

Continuous Phase Modulation

Phase Shift Keying

Binary PSK

Phase lock loop

Advanced Frequency Shift Keying

Minimum Shift Keying, Gaussian MSK

Advanced Phase Shift Keying

Quadrature PSK

Reference signal

Differential QPSK

Quadrature Amplitude Modulation

Multi-carrier modulation

Advantages

4. Briefly demonstrate the concept of spread spectrum.

Direct Sequence Spread Spectrum

Chipping Sequence

Pseudo-noise Sequence

Spreading factor

DSSS transmitter & receiver

Frequency hopping Spread Spectrum

Hopping Sequence

Dwell Time

Slow & Fast Hopping

FHSS transmitter & receiver

5. Describe in detail about cellular systems.

Base Station, cell

Advantages

Higher capacity, less transmission power, local interference only, Robustness

Disadvantages

Infrastructure needed, Handover needed, Frequency planning

Clusters, sectorized antennas, Borrowing Channel Allocation(BCA),

Fixed Channel Allocation(FCA), Dynamic Channel Allocation(DCA)

6. Describe the mobile services provided by GSM in detail.

Bearer Services

Transparent & Non- transparent Bearer Services

Tele Services

Telephony

Emergency number

Short Message Service

Enhanced Message Service

Multimedia Message Service

Group 3 fax

Supplementary Services

Typical services

7. Explain in detail about the GSM architecture.

Radio Subsystem

Base Station Subsystem

Base Transceiver Station

Base Station Controller

Mobile Station

Subscriber Identity Module

Personal Identity Number, PIN Unblocking

Key

Network and Switching Subsystem

Mobile Services Switching center

Home Location register

Visitor Location register

Operation Subsystem

Operation and Maintenance center

Authentication center

Equipment Identity Register

8. Briefly explain about GPRS

GPRS concepts

Time slots

PTP packet transfer service

QoS profile

Delay

GPRS architecture

GSN

Mobility management

9. Give a detailed explanation about DECT

System architecture

Global network

Local network

Home database, visitor database

Protocol architecture

Physical layer

Medium access control layer

Data link control layer

Network layer

10. Explain briefly about Satellite systems

History

SPUTNIK

SYNCOM

INTELSAT1

Applications

Weather forecasting, Radio & TV broadcast satellites, military satellites, satellites for navigation.

Global telephone backbone, connections for remote or

developing areas, global mobile communication

Basics

Routing

Fg=Fc

Inclination angle, elevation angle

Footprint

GEO(Geostationary Earth Orbit) Advantages, disadvantages

LEO(Low Earth Orbit)

Advantages, disadvantages

MEO(Medium Earth Orbit)

Advantages, disadvantages

HEO(Highly Elliptical Orbit) Advantages, disadvantages

Localization

Home Location register(HLR)

Visitor Location register (VLR)

Satellite user mapping register(SUMR)

Handover.

Intra-satellite, inter-satellite, Gateway, Intersystem handover

11. Explain the types of broadcasting in detail.

Digital Audio Broadcasting (DAB)

Transport mechanisms

Main Service Channel

Fast Information Channel

Multi-media object Transfer protocol

Header core, Header extension, Body Object repetition, Interleaved objects, segment repetition, Header repetition

Digital Video Broadcasting (DVB)

Contents of DVB

Network Information Table, Service Description table, Event Information table, Time and date table

DVB Data Broadcasting

Data pipe, Data Streaming,, multiprotocol encapsulation, data carousels, object carousels.

DVB for high-speed Internet access

12. Give a detailed description about the physical layer of IEEE 802.11

Frequency hopping Spread Spectrum

Functions

Synchronization, Start frame delimiter, PLCP_PDU length word, PLCP signaling field, Header error check

Direct Sequence Spread Spectrum

Synchronization, Start frame delimiter, signal, Service, Length, Header error check

Infra red

13. Make a detailed description about MAC management.

Synchronization

Timing Synchronization function

Beacon

Beacon transmission in

Infrastructure network

Ad-hoc network

Power management

Sleep & awake states

Power management in

Infrastructure network

Traffic indication map

Delivery Traffic indication map

PS(power saving) poll

Ad-hoc network

Ad-hoc Traffic indication map

Roaming

Steps

Scanning

Passive & active scanning

Association request

Association response

Updation of database

14. Explain briefly about HIPERLAN1

Phases

Prioritization

Elimination

Yield

Transmission

Quality of Service support and other specialities

MSDU Lifetime

Power Conservation

Encryption, decryption

15. Give a short description of the Bluetooth architecture

Networking

Piconet

Scatternet

Protocol stack

Core specifications, profile specifications

Core protocols

Link manager protocol, Logical link control &

adaptation protocol, service discovery protocol

Cable replacement protocol, telephony control protocol specification

Host controller interface

16. What are the advantages and disadvantages of WLANs? Explain.

Advantages

Flexibility

Planning

Design

Robustness

Cost

Disadvantages

Quality of service

Proprietary solutions

Restrictions

Safety and security

17. Briefly explain about the goals, assumptions and requirements of mobile IP.

Quick ‘solutions’

Requirements

Compatibility

Transparency

Scalability and efficiency

Security

18. Give a detailed note about tunneling and optimization in mobile IP.

Tunneling & Encapsulation

IP-in-IP encapsulation

Minimal encapsulation

Generic routing encapsulation

Optimization

Triangular routing, binding cache

Four additional messages Binding request Binding update

Binding acknowledgement

Binding warning

Reverse tunneling

Firewalls

Multi-cast

TTL

19. Explain the concept of routing in MANET

Fundamental differences between wired & wireless ad-hoc networks

Asymmetric links

Redundant links

Interference

Dynamic topology

Problems with ad-hoc routing

Need for algorithms with high dynamic topology

Information from lower layers essential

Centralized approaches will not work

Efficient routing capabilities are needed

Notion of connection with certain characteristics will not work

Flooding

20. Write short notes on DSR and DSDV

Dynamic Source Routing (DSR)

2 phases in routing

Route discovery

Route Maintenance

Basic operation

Optimization of the basic algorithm

Approaches for Route Maintenance

Destination Sequence Distance Vector (DSDV)

Sequence numbers

Damping

Routing table

21. Give a detailed explanation about Agent Discovery and registration of mobile IP.

Agent advertisement.

Agent advertisement message

Agent advertisement packet

Type

#addresses Lifetime Preference

Length, bits

Agent solicitation

Three solicitations: one per second

Decrease solicitations exponentially

Registration

22. Give a detailed view of traditional TCP.

Congestion Control

Dropped packet

Retransmission of missing packet

Slow Start

Congestion window

Congestion threshold

Exponential growth

Fast retransmit/ Fast recovery

Implications on mobility

Error rates

Packet loss

23. Explain indirect TCP in detail.

Socket and state migration after handover of a mobile host

Advantages

No change in TCP protocol

Transmission errors on wireless links cannot propagate into the fixed network

Different solutions can be tested without jeopardizing the stability of the internet

Uses precise time-outs to guarantee retransmissions as fast as possible

Partitioning allows the use of different transport layer

protocol

Disadvantages

Loss of end-to-end semantics of TCP might cause problems

Increased handover latency may be problematic

FA must be a trusted entity.

24. Give a detailed description about Mobile TCP.

2 parts

Unmodified TCP

Optimized TCP

Persistent mode

Bandwidth manager

Advantages

Disadvantages

25. Describe in detail about WAP architecture

Bearer services

Transport layer Service Access point (T-SAP)

Security layer

Security SAP (SEC-SAP)

Transaction layer

Transaction SAP (TR-SAP)

Session layer

Session-SAP (S-SAP)

Application layer

Integration of www and mobile telephony applications

Integration of WAP components

No comments:

Post a Comment