Question Bank 2
Question Bank 2
Question Bank 2
2. What is Mobility?
2
Downloaded by sudam das ([email protected])
lOMoARcPSD|39670423
sending, causing a collision at B. But A can’t detect this collision at B and continues with its
transmission. A is hidden for C and vice versa.
APPLICATIONS:
i)Resource constraints.
ii)Interface
iii)Bandwidth
iv)Dynamic changes in communication environment.
v)Network issues.
vi)Interoperability issues.
vii)Security Constraints.
17. Give the difference between the network 1G,2G,2.5G,3G mobile communication?
1G - Voice-only communication.
2G – Communicate voice as well as data signals.
2.5G – Enhancements of the second generation and sport data rates up to 100 kpbs.
3G – Mobile devices communicate at even higher data rates and support voice, data , and
multimedia streams. High data rates in 3G devices enable transfer of video clips and faster
multimedia communication.
18. Difference between Hidden and Exposed Terminal, Near and Far Terminals.
Hidden and Exposed Terminals
3
Downloaded by sudam das ([email protected])
lOMoARcPSD|39670423
Let us consider another scenario where ‘B’ sends something to ‘A’ and ‘C’ wants to transmit
data to some other mobile phones outside the interference ranges pf A and B. C senses the
carrier and detects that the carrier is busy ; C postpones its transmission until it detects the
medium is free ; but as A is outside the interference range of C, waiting is not necessary. I.e.
collision at B does not matter because the collision is too weak to propagate to A.
B C
Let us consider that A and B both sending with the same transmission power. When the
signal strength decreases proportionally to the square of the distance B’s signal drowns out A’s
signal .As a result ‘C’ cannot receive ‘A’s transmission.
Now think of ‘C’ as being an arbiter for sending rights. In this case terminal B would already
drown out terminal A on the physical layer.
‘C’ in return would have no chance of applying a fair scheme as it would only hear B.
The near/far effect is a severe problem of the wireless network using the CDM.All signals should
arrive at the receiver with more or less the same strength.
Otherwise a person standing closer to somebody could always loud than a person farther away.
Even if the sender were separated by code , the closest one would simply drown out the others.
4
Downloaded by sudam das ([email protected])
lOMoARcPSD|39670423
5
Downloaded by sudam das ([email protected])
lOMoARcPSD|39670423
6
Downloaded by sudam das ([email protected])
lOMoARcPSD|39670423
GSM (Global System for Mobile Communications): worldwide standard for digital, cellular Mobile
Radio Networks
UMTS (Universal Mobile Telecommunications System): European Standard for future digital
Mobile Radio Networks
AMPS (Advanced Mobile Phone System): analog Mobile Radio Networks in USA
DECT (Digital Enhanced Cordless Telecommunications): European standard for cordless phones
TETRA (Terrestrial Trunked Radio): European standard for circuit switched radio networks
ERMES (European Radio Message System): European standard for radio paging systems (Pager)
802.11: International standard for Wireless Local Networks
Bluetooth: wireless networking in close/local area
Inmarsat: geostationary satellite systems
Teledesic: planned satellite system on a non-geostationary orbit
36. Components of a wireless communication system
Transmitter, receiver, filter, antenna, amplifier, mixers
a) Increased no other station is allowed to transit during this slot b) Avoidance of congestion.
7
Downloaded by sudam das ([email protected])
lOMoARcPSD|39670423
The transmission range of A reaches B but not C. The transmission range of C reaches B but not A. B
reaches A and C. A cannot detect C and vice versa.
A starts sending to B, but C does not receive this transmission. C also wants to send something to B and
senses the medium. The medium appears to be free, the carrier sense fails. C also starts sending, causing a
collision at B. But A can’t detect this collision at B and continues with its transmission. A is hidden for C
and vice versa.
8
Downloaded by sudam das ([email protected])
lOMoARcPSD|39670423
9
Downloaded by sudam das ([email protected])
lOMoARcPSD|39670423
10
Downloaded by sudam das ([email protected])
lOMoARcPSD|39670423
UNIT-II
11
Downloaded by sudam das ([email protected])
lOMoARcPSD|39670423
9. What is decapsulation?
The reverse operation, taking a packet out of the data part of another packet, is called
decapsulation.
12
Downloaded by sudam das ([email protected])
lOMoARcPSD|39670423
13
Downloaded by sudam das ([email protected])
lOMoARcPSD|39670423
14
Downloaded by sudam das ([email protected])
lOMoARcPSD|39670423
Disadvantages: i. As the SH does not act as proxy as in I-TCP, packet loss on the wireless link due
to bit errors is propagated to the sender. M-TCP assumes low bit error rates, which is not always a
valid assumption. ii. A modified TCP on the wireless link not only requires modification to the MH
protocol software but also new network elements like the bandwidth manager
34. What is mobile routing?
Even if the location of a terminal is known to the system, it still has to route the traffic
through the network to the access point currently responsible for the wireless terminal. Each time a
user moves to a new access point, the system must reroute traffic. This is known as mobile routing.
35. What are the functions which support service and connection control?
Access point control function
>Call control and connection control function
>Network security agent
>Service control function >Mobility management function
36. What are the examples for service scenarios identified in WATM?
>Office environments
>Universities, schools, training, centres
>Industry >Hospitals
>Home
>Networked vehicles
15
Downloaded by sudam das ([email protected])
lOMoARcPSD|39670423
Packet loss
43. What are the configuration parameters to adapt TCP to wireless environments?
Large Windows
Limited Transmit
Large MTU
Selective Acknowledgement
Explicit Congestion Notification
Timestamp
No header compression
if a node moves without changing its IP address it will be unable to receive its packets,
if a node changes its IP address it will have to terminate and restart its ongoing connections
everytime it moves to a new network area (new network prefix).
Mobile IP is a routing protocol with a very specific purpose.
Mobile IP is a network layer solution to node mobility in the Internet.
Mobile IP is not a complete solution to mobility, changes to the transport protocols need to be
made for a better solution (i.e., the transport layers are unaware of the mobile node’s point of
attachment and it might be useful if, e.g., TCP knew that a wireless link was being used!).
16
Downloaded by sudam das ([email protected])
lOMoARcPSD|39670423
UNIT III
1. Define GSM?
The global system for mobile communication (GSM) was developed by Group Speciale
Mobile(GSM) which was founded in Europe in 1992. The Gsm is a standard for mobile
telecommunication through a cellular network at data rates if upto 14.4 kbps. Now a days it consist
of a set of standards and protocols for mobile telecommunication.
2. Define GPRS?
General Packet Radio Service (GPRS) is a packet oriented service for mobile devices data
communication which utilizes the unused channels in TDMA mode in a GSM network and also
sends and receives packet of data through the internet.
3. What are subsystems in GSM system?
Radio subsystem (RSS)
Network & Switching subsystem (NSS)
Operation subsystem (OSS)
4. What are the control channel groups in GSM?
The control channel groups in GSM are:
Broadcast control channel (BCCH)
Common control channel (CCCH)
Dedicated control channel(DCCH)
5. What are the four types of handover available in GSM?
Intra cell Handover
Inter cell Intra BSC Handover
Inter BSC Intra MSC handover
Inter MSC Handover
10 . List out the numbers needed to locate an MS and to address the MS.
The numbers needed to locate an MS and to address the MS are:
Mobile station international ISDN number (MSISDN)
International mobile subscriber identity (IMSI)
Temporary mobile subscriber identity (TMSI)
Mobile station roaming number (MSRN)
17
Downloaded by sudam das ([email protected])
lOMoARcPSD|39670423
• 0interface
Makes the connection between the RSS and the OSS
Uses the Signalling System No.7 (SS7) based on X.25 carrying management
data to/from the RSS
U interface
18
Downloaded by sudam das ([email protected])
lOMoARcPSD|39670423
19
Downloaded by sudam das ([email protected])
lOMoARcPSD|39670423
UNIT IV
1. Define MANET.
• MANET - Mobile Adhoc NET works
. Continuously self-configuring, infrastructure-less network of mobile devices
connected without wires
Broadcast
Broadcasting is a special case of multicasting
Message is sent to all the nodes in the network
8. Define Proactive (table-driven)protocols.
Also known as table-driven routing protocols
Each node in the routing table maintains information about routes to every other
node in the network
o Tables are updates frequently due to
• Changes in network topology
• Node Movements
N odes shutting down
o Nodes can determine the best route to a destination
Generates a large number of control messages to keep. the routing tables
up-to-date
o Generates overhead which consumes large part of available bandwidth
9. Define Reactive protocols.
Also called as On-demand routing protocol
Nodes do not maintain up-to-date routing information
o New routes are discovered only when required
Uses flooding technique to determine the route
O Flooding technique is used when the node does not have routing knowledge
MANET VANET
MANET - Mobile AdhocNET work VANET- Vehicular AdhocNET works
Nodes moves randomly Nodes moves regularly
Mobility is low Mobility is high
Reliability is medium Reliability is high
Node lifetime depends on power source N ode lifetime depends on vehicle life
time
Network topology is sluggish and slow Network topology is frequent and fast
A computer network is an interconnected collection of independent computers which consists of two components
o Distributed applications
o Networking infrastructure
21
Downloaded by sudam das ([email protected])
lOMoARcPSD|39670423
13.List the high and low frequency bands in the electromagnetic spectrum.
18.Define fading.
Fading is fluctuations in signal strength when received at the receiver. It has two types, o Fast fading or small scale
fading o slow fading or large scale fading.
It is defined as change in the frequency of the received signal when the transmitter and receiver move with respect
to each other. The Doppler shift is given by fd=v/λ
The upper bound on the information rate of data which is sent with a given average signal power S through
an analog communication channel subject to additive white Gaussian noise of power N,is given as
22
Downloaded by sudam das ([email protected])
lOMoARcPSD|39670423
UNIT V
1. Define Operating System.
Interface between hardware and user
Manages hardware and software resources of the system
Provides set of services to application programs
2. Name the features of Operating System.
• Multitasking
• Scheduling
• Memory Allocation
• File System Interface
• Keypad Interface
• I/O Interface
• Protection and Security
• Multimedia features
3. How is the operating system structured?
Kernel Layer
Shell Layer
4. Give the types of Operating System.
Monolithic Kernel
Microkernel
5. Specify the motivation of Monolithic Kernel OS design.
Kernel contains the entire OS operations except shell code
Motivation
o OS services can run more securely and efficiently in supervisor mode
6. Mention the examples of Monolithic Kernel OS design.
Windows
Unix
7. List the Advantages of Monolithic Kernel OS design.
Provides good performance
23
Downloaded by sudam das ([email protected])
lOMoARcPSD|39670423
24
Downloaded by sudam das ([email protected])
lOMoARcPSD|39670423
• Device drivers
• Power management
• Networking Functionalities.
• Memory management
• Device management
• Resource access
B2C B2B
B2C stands for Business- to-Consumer B2B stands for Business- to- Business
Form of commerce in which products or Form of commerce in which products or
services are sold by a business firm to a services are sold from a company to its
consumer dealers
25
Downloaded by sudam das ([email protected])
lOMoARcPSD|39670423
26
Downloaded by sudam das ([email protected])
lOMoARcPSD|39670423
16 MARKS – KEYPOINTS
27
Downloaded by sudam das ([email protected])
lOMoARcPSD|39670423
Delay
GPRS architecture
GSN
Mobility management
9. Give a detailed explanation about DECT
System architecture
Global network
Local network
Home database, visitor database
Protocol architecture
Physical layer
Medium access control layer
Data link control layer
Network layer
10. Explain briefly about Satellite systems
History
SPUTNIK
SYNCOM
INTELSAT1
Applications
Weather forecasting, Radio & TV broadcast satellites, military satellites, satellites for navigation.
Global telephone backbone, connections for remote or
developing areas, global mobile communication
Basics
Routing
Fg=Fc
Inclination angle, elevation angle
Footprint
GEO(Geostationary Earth Orbit) Advantages, disadvantages
LEO(Low Earth Orbit)
Advantages, disadvantages
MEO(Medium Earth Orbit)
Advantages, disadvantages
HEO(Highly Elliptical Orbit) Advantages, disadvantages
Localization
Home Location register(HLR)
Visitor Location register (VLR)
Satellite user mapping register(SUMR)
Handover.
Intra-satellite, inter-satellite, Gateway, Intersystem handover
29
Downloaded by sudam das ([email protected])
lOMoARcPSD|39670423
30
Downloaded by sudam das ([email protected])
lOMoARcPSD|39670423
31
Downloaded by sudam das ([email protected])
lOMoARcPSD|39670423
32
Downloaded by sudam das ([email protected])
lOMoARcPSD|39670423
Structure
Application
Advantages
Disadvantages
33
Downloaded by sudam das ([email protected])
lOMoARcPSD|39670423
Questions Bank
Unit I
1. Discuss the advantage and disadvantage of cellular system with small cells.(06)
2.Briefly explain the Frequency Division Multiplexing.(06)
3.Write short notes on DHSS(04)
4.Write short note on FHSS(04)
5.Explain the GSM system architecture with a neat diagram.(16)
6.Describe the security services provided by GSM.(08)
7.Explain the protocol architecture of GSM for signaling. (16)
8.Explain the architecture of GPRS with a neat diagram.(10)
9. What are typical steps for handover on GSM network?(08)
10. Explain the steps involved in the call delivery procedure in GSM network in the following cases:
(i) GSM mobile terminated call(08)
(ii) GSM mobile originated call(08)
11. Why are so many different identifiers/addresses needed in GSM?
Give reasons and distinguish between user-related and system related identifiers.(08)
13. Explain the services provided by GSM?(08)
14. Write short notes on
(i) Mobile management.(08)
(ii) Connection Establishment.(08)
UNIT-II
1. Compare Hyperlink and Blue tooth in terms of ad-hoc capabilities, power saving mode, solving hidden
terminal problem, providing reliability fairness problem regarding channel access.(16)
2. Write short notes on wireless PAN?(04)
3. Explain the operation of DFWMAC_DCF with a neat timing diagram.(8)
4. Draw the MAC frame of 802.11 and list the use of the fields.(8)
5.Describe Hyperlink architectural components and their interactions. (16)
6.Explain the architecture of Wi-Fi in detail.(16)
7.Explain the system architecture of IEEE802. 11(16)
8.Describe the architecture of Wi MAX in detail. (16)
9.Compare and Contrast Wi-Fi and Wi Max.(06)
10. Briefly explain about BRAN.(04)
11. Explain in detail about Wireless ATM. (10)
12. Explain the information bases and networking of adhoc HIPERLAN.(8)
13. Discuss MAC layer Bluetooth system (08)
UNIT – III
1. Show the steps required for a handover from one FA to another FA including layer-2 andlayer-3.
Assume 802.11aslayer-2.(08)
2. Name the ineffiencies of Mobile IP regarding data forwarding from CN
to MN. W hat are the optimizations possible?(08)
3. What are the differences between wired networks and ad-hoc networks
related to routing?(06)
4. What is the need for DHCP? With a state chart explain the operation of DHCP?(10)
5. List the entities involved in mobile IP and describe the process of data transfer from a mobile node to a
fixed node and vice versa.(08)
6. Why is conventional routing in wired networks not suitable for wireless
networks? Substantiate your answers with suitable examples.(08)
7. Discuss DSDV routing in detail.(16)
34
Downloaded by sudam das ([email protected])
lOMoARcPSD|39670423
9. Explain how tunneling works in general and especially for mobile IP using IP-in-IP,MINIMAL, and
generic routing encapsulation, respectively. Discuss the advantages and disadvantages of these three
methods.(16)
10. How does dynamic source routing handle routing? What is the motivation between dynamic source
routing compared to other routing algorithms from fixed networks?(16)
11. Briefly explain about CGSR.(06)
12. Compare and Contrast about Proactive and Reactive routing protocol(4)
UNIT IV
UNIT V
1. What are the design and implementation issues in mobile device operating Systems. (08)
2. Explain the operating system issues related to miniature devices.(08)
3. Explain the commercial mobile operating systems.(16)
4. Describe the software Development kit with an example.(8)
5. Discuss the following:
i)Android
ii) Black Berry
iii)Windows Phone
iv)M- Commerce
v)Mobile payment system
35
Downloaded by sudam das ([email protected])