IT2041 – information security question bank Question Bank
IT2042 information security
Question Bank
IV YEAR IT (A & B)
(7th Semester)
UNIT I
- What
are the disadvantages of small cells?
a) Infrastructure
b) Handover
c) Frequency
- What
are the benefits of reservation schemes?
a) Increased
no other station is allowed to transit during this slot
b) Avoidance
of congestion.
c) Waiting
time in clearly known.
- Differentiate
between free space loss and path loss.
Free space loss
|
Path loss
|
1) Even if no
matter exists between the sender and the receiver, signals still experience
free space loss.
|
1) If there
exists any matter between the sender and the receiver, then it experiences
the path loss.
|
2) There is a
gradual degradation in the strength of the signal with the distance traveled.
|
2) There is a
sudden decrease in the strength of the signal due to obstacles in the path.
|
- Define
multipath propagation
Radio waves
emitted by the sender can either travel along a straight line, or they may be
reflected at a large building or scattered at smaller obstacles. This leads to
one of the most severe radio channel impairments called multipath propagation.
- Define
dwell time.
The time spent in a channel with a
certain frequency is called the dwell time.
- Why
CSMA/CD scheme fails in wireless networks?
CSMA/CD is not
really interested in collisions at the sender, but rather in those at the
receiver. The sender applies carrier sense and detects an idle medium. The
sender starts sending but a collision happens at the receiver due to a second
sender. The sender detects no collision and assumes that the data has been
transmitted without errors, but a collision might actually have destroyed the
data at the mission. The power in the area of the transmitting antenna is
several magnitudes higher than the receiving power.
- Define
hidden terminal.
The
transmission range of A reaches B but not C. The transmission range of C
reaches B but not A. B reaches A and C. A cannot detect C and vice versa.
A starts sending to B, but C does not receive this transmission. C also
wants to send something to B and senses the medium. The medium appears to be
free, the carrier sense fails. C also starts sending, causing a collision at B.
But A can’t detect this collision at B and continues with its transmission. A
is hidden for C and vice versa.
- What
is orthogonal and autocorrelation thickness?
Orthogonal: Two
vectors are called orthogonal if their inner product is 0. E.g.) the two
vectors are(2,5,0) & (0,0,17): (2,5,0)* (0,0,17)=0+0+0.
Autocorrelation:
The barker code (+1, -1, +1, +1, -1, +1, +1, +1, -1, -1, -1) for example has a
good autocorrelation (i.e.) the inner product with itself is large the result is
11.
- Mention
the merits and demerits of spread spectrum.
Merits:
=>The main advantage is the resistance
to narrowband interference.
=>coexistence of several
signals without co-ordination.
=>robustness against narrowband
interference.
=>relative high frequency.
=>characteristics like
background noise.
Demerits:
*Increase in complexity of
receivers that have to despread a signal.
*Large frequency band that is
needed due to the spreading of the signal.
- Why
can waves with a very low frequency follow the earth’s surface ? Why are
they not used for data transmission in computer networks?
The waves with
low frequencies follow the earth’s surface and can propagate long distance.
Generally, the lower the frequency, the better the penetration.
Low frequency waves are bent by the
atmosphere due to refraction. High frequency waves follow straight line of
sight. This enables direct communication with satellites or microwave link on
the ground.
- Why don’t
radio waves always follow a
straight line? Why is reflection both
useful and harmful?
We have a line
of sight between the sender and the receiver of the radio signals. Mobile
phones are typically used in big cities with skyscrapers, on mountains, inside
buildings, while driving through an alley, etc.
Here several
effects occur in addition to the attenuation caused by the distance between the
sender and the receiver.
Reflection is
useful because,
z It
helps transmitting signals as soon as no line of sight exists.
Reflection is
harmful because,
z The
reflected signal is not as strong as original, as objects can absorb some of
the signal’s power.
- What
are the 3 fundamental propagation behaviors depending on their frequency?
Ê Ground
wave
Ê Sky
wave
Ê Line
of Sight
- What’s
the use of Phase Lock Loop (PLL)?
To receive the signal
correctly, the receiver must synchronize in frequency and phase with the
transmitter
- What
is OVSF?
Using
orthogonal code separation of data streams of a sender UMTS uses so-called
orthogonal variable spreading factor codes (OVSF).
- Explain
about transparent mode?
The transparent
mode transfer simply forwards MAC data without any further processing .The
system then has to rely on the FEC which is always used in the radio layer.
- Specify
the steps to be performed during the search for a cell after power on?
þ Primary
synchronization
þ Secondary
synchronization
þ Identification
of the scrambling code.
- What
is browsing channel allocation and fixed channel allocation?
Cells with more
traffic are dynamically allotted more frequencies.
This scheme is
known as browsing channel allocation, while the first fixed scheme is called
fixed channel allocation.
- What
is digital sense multiple access?
The scheme
which is used for the packet data transmission service cellular Digital packet
Data in the AMPS mobile phone system is also known as digital sense multiple
access (DSMA).
- What
is called burst and normal burst?
Data is transmitted in small
portions called bursts. Normal burst are used for data transmission inside a
slot.
- What
is frequency hopping spread spectrum and mention their variants?
The total
available bandwidth is split into many channels of smaller bandwidth plus guard
spaces between the channels, hopping take place between the transmitter and
receiver staying on one of these channels. This is known as Frequency hopping
spread spectrum.
Two variants
? Slow
hopping
? Fast
hopping
- What
do you mean by spread factor?
It determines the bandwidth of the
resulting signal in direct sequence spread spectrum
S
= tb/tc
tb – user bit duration; tc – chip duration
- What
are the types of antennae?
Ø Theoretical
Ø Real
Ø Directional
Ø Multi-element
Ø Smart
- What
are the different considerations for a signal to be propagated?
F Transmission Range
F Detection Range
F Interface Range
- Mention
the several effects when a signal is propagated.
] Blocking
or Shadowing
] Reflection
] Refraction
] Scattering
] Diffraction
UNIT II
1)
What are the different types of handovers used in GSM?
Intra-cell
handover: Within a cell, narrow-band interference could make transmission at a certain
frequency impossible. The BSC could then decide to change the carrier
frequency.
Inter-cell,
intra-BSC handover: This is a typical handover scenario. The mobile station
moves from one cell to another, but stays within the control of the same BSC.
Inter-BSC,
intra-MSC handover: As a BSC only controls a limited number of cells. GSM
also has to perform handovers between cells. This has to be controlled by the
MSC.
Inter
MSC handover: A handover could be required between two cells belonging to
different MSCs. Now both MSCs perform the handover together.
2)
What is meant by Inclination angle and Elevation angle?
Inclination angle is defined
as the angle between the equatorial plane and the plane described by the
satellite orbit.
Elevation angle is defined
as the angle between the center of the satellite beam and the plane tangential
to the earth’s surface.
3)
Write the different types of orbits used in the
satellite systems?
·
Geostationary earth orbit(GEO)
·
Medium earth orbit(MEO)
·
Low earth orbit(LEO)
·
Highly elliptical orbit(HEO)
4)
What are different broadcast patterns available to send
the data?
·
Flat disk
·
Skewed disk
·
Multi-disk
5)
What is the need of SIM?
The need for
SIM is that one can personalize any MS using his or her SIM i.e. user-specific
mechanisms like charging and authentication are based on the SIM not on the
device itself.
6) How
authentication is performed in GSM systems?
Authentication
is based on the SIM, which stores the individual authentication key Kj,
the user identification IMSI and the algorithm used for authentication A3.
The VLR sends the random value RAND to the
SIM. Both sides network and subscriber module perform the same operation with RAND and the Kj called A3. The MS
sends back the SRES (signed response) generated by the SIM. The VLR can now
compare both values. If they are the same, the VLR accepts the subscriber,
otherwise the subscriber is rejected.
7) Draw the UMTS architecture
Uu Iu
UTRAN- the
UTRAN network
UE-User
requirement
CN-Core network
Uu-Interface
that connects UE and UTRAN
Iu -
Interface that connects UTRAN and CN
8)
What is meant by footprint?
A footprint can
be defined as the area on earth where the signals of the satellite can be
received.
9)
What the two basic transport mechanisms of DAB?
Main service
channel (MSC): It carries all user data. The MSC consists of common interleaved
frames (CIF) i.e, data fields of 55,296 bits that are sent every 24 ms. A CIF
consists of capacity units (CU) with a size of 64 bits which form the smallest
addressable unit within a DAB system.
10) What is MOT? Give its primary goal.
DAB faces a
broad range of different receiver capabilities. So to solve this problem it defines a common
standard for data transmission, the multi-media object transfer (MOT) protocol.
The primary
goal of MOT is the support of data formats used in other multi-media systems.
11) What is SUMR?
An important
register in satellite networks is the satellite user mapping register (SUMR).
This stores the current position of satellites and a mapping of each user to
the current satellite through which communication with a user is possible.
12)
Give the two basic reasons for a handover in GSM.
·
The mobile station moves out of the range of a
BTS or a certain antenna of a BTS. The received signal level decreases
continuously until it falls below the minimal requirements for communication.
The error rate may grow due to interference. All these effects may diminish the
quality of the radio link.
·
The wired infrastructure may decide that the
traffic in one cell is too high and shift some MS to other cells with a lower
load. Handover may be due to load balancing.
13)
Give the security services offered by GSM.
·
Access control and authentication
·
Confidentiality
·
Anonymity
14)
What is the primary goal of GSM?
The primary
goal of GSM was to provide a mobile phone system that allows users to roam
throughout Europe and provides voice services
compatible to ISDN and other PSTN systems.
15)
Differentiate GSM and DECT.
GSM
|
DECT
|
1. Global systems for mobile
communications
|
1. Digital enhanced cordless
telecommunications
|
2. Range is up to 70km.
|
2. Range is limited to about
300m.
|
16) What are the two new network elements in GPRS
architecture?
·
Gateway GPRS support node (GGSN): It is the
inter-working unit between the GPRS network and external packet data networks
(PDN).
·
Serving GPRS support node (SGSN): It supports
the MS.
17)
Describe about MAC layer in DECT architecture.
The medium
access control (MAC) layer establishes, maintains and releases channels for
higher layers by activating and deactivating physical channels. MAC multiplexes
several logical channels onto physical channels. Logical channels exist for
signaling network control, user data transmission, paging or sending broadcast
messages. Additional services offered include segmentation/reassembly of
packets and error control/error correction.
18)
Give the full form for the following:
a)
CKSN
b)
EIR
c)
DTMF
d)
MOC
a)
CKSN- Ciphering key sequence number
b)
EIR- Equipment Identity Register
c)
DTMF- Dual Tone multiple frequency
d)
MOC- Mobile originated call
19) Describe the three subsystems of GSM.
Radio
subsystem (RSS): It comprises all radio specific entities i.e. the mobile
stations (MS) and the base station subsystem (BSS).
Networking
and switching subsystem (NSS): The heart of the GSM system is formed by the
NSS. This connects the wireless network with standard public networks.
Operating
subsystem (OSS ):
It monitors and controls all other network entities.
20) What are the applications of satellites?
·
Weather forecasting
·
Radio and TV broadcast satellites
·
Military satellites
·
Satellites for navigation
UNIT III
1. List
the advantages of Wireless LANs
Ø Flexibility
Ø Planning
Ø Design
Ø Robustness
and
Ø Cost
2. List
the disadvantages of Wireless LANs
¨ Quality
of service
¨ Proprietary
solutions
¨ Restrictions
¨ Safety
and security
3. What
are the advantages and disadvantages of infra red technology?
Advantages:
Ø It
is simple and extremely cheap
Ø No
licenses are needed
Ø Shielding
is very simple
Ø Electrical
devices do not interfere with infra red
transmission.
Disadvantages:
Ø It
has low bandwidth compared to other LAN technologies.
Ø It
cannot penetrate walls or other obstacles.
Ø For
good transmission quality and high data rates a LOS, i.e., direct connection is
needed.
4. Explain
briefly about an infrastructure network
Infrastructure networks not only provide
access to other networks, but also include forwarding functions, medium access
control etc. In these infrastructure-based wireless networks, communication
typically takes place only between the wireless nodes and the access point, but
not directly between the wireless nodes.
5. Explain
briefly about an Ad-hoc network
Ad-hoc wireless networks do not need any
infrastructure to work. Each node can communicate directly other nodes, so no
access point controlling medium access is necessary. Nodes within an ad-hoc
network can only communicate if they can reach each other physically, i.e., if
they are within each others radio range.
6. What
are the basic tasks of the MAC layer?
·
Medium access
·
Fragmentation of user data
·
Encryption
7. What
are the basic services provided by the MAC layer?
Ø Asynchronous
data service (mandatory)
Ø Time-bounded
service (optional)
8. List
the basic access mechanisms defined for IEEE 802.11
] The
mandatory basic method based on a version of CSMA/CA
] An
optional method avoiding the hidden terminal problem
] A
contention-free polling method for time bounded service.
9. What
is the basic idea of IEEE 802.11 power management?
The basic idea is to switch off the
transceiver whenever it is not needed. Switching off the transceiver should be
transparent to existing protocols and should be flexible enough to support
different applications. The power saving includes two states for a station:
Sleep and awake, and buffering of data in senders.
10. What
are the techniques used for MAC management?
? Synchronization
? Power
management
? Roaming
? Management
information base(MIB)
11.Define beacon?
Beacon
frame is used to convey timing information within a BSS.It contains a timestamp
and other management information used for power management and roaming.The
timestamp is used by the node to adjust its local clock.
12.What are the handovers in hiperLAN?
The
handovers in hiperLAN are
*Sector
handover
*Radio
handover
*
Network handover
13.Distinguish infrastructure and adhoc networks?
Infrastructure networks
|
adhoc networks
|
Communication takes place only between a wireless node and
an access point
|
Communication takes place only between two wireless nodes
|
The wireless node is simple as functionality is based on
the access point
|
The wireless node is complex
|
Can forward messages across networks
|
Can forward messages only within the specified range
|
14.Why is physical layer in IEEE802.11 subdivided ? What are
its sublayers?
The
physical layer in IEEE802.11 is subdivided because a sublayer has to be
dependant on the upper layers (architecture dependant)and the other has to be medium dependant. The two
sublayers are namely,
*Physical
layer convergence protocol
*
Physical medium dependant sublayer
15.Define MSDU lifetime?
MSDU
lifetime is used to provide time bounded service which specifies the maximum
time that can elapse between sending and receiving a MSDU. It has a range of
0-16000 ms.
16.What are the
elements in core protocols in Bluetooth?
The elements in core protocols in Bluetooth are,
*Radio
*Baseband
*Link
Manager protocol
*Logical
Link control and adaptation protocol
*Service
discovery protocol
1 7.What are the low power states in Bluetooth?
The
low power states in Bluetooth are
*Sniff
state
*Hold
state
*Park
state
18.Define SDP?
SDP
stands for Service discovery protocol.SDP defines the discovery of services
enabled by a SDP server which has some information about the list of services
available called the service record.
19.What is EY-NPMA?
EY-NPMA
stands for Elimination-yield non preemptive priority multiple access which is
the heart of channel access providing priorities and different access mechanisms.
20.What do you mean by ESSID?
ESSID
means Extended Service Set Identifier.It is the name of the network and is used
to separate two networks.Without knowing ESSID it is impossible to participate
in a WLAN.
UNIT IV
1.What are the two possibilities for the location of
the Care-of address(COA)?
Foreign
agent COA:The COA could be located at the Foreign Agent.i.e;the COA is an
IP address of the FA.The FA is the tunnel end-point and forwards packets
to the Mobile Node.
Co-located
COA:The COA is co-located if the MN temporarily acquired an additional IP
address which acts as COA.This address is now topologically correct, and the
tunnel end point is at the MN.Co-located addresses can be acquired using
services such as DHCP
2.What are the three alternatives for the implementation of
Home Agent(HA)?
The HA can
be implemented
*on a router that is responsible
for the home network.
*on an arbitrary node in the subnet
*again on the router.But here the router acts as a manager for MNs belonging to
a virtual home network.
3.What is generic routing encapsulation?
Generic
routing encapsulation allows the encapsulation of packets of one
protocol suite into the payload portion of a packet of another protocol
suiteThis encapsulation supports other network layer protocols in
addition to IP.
4.What are the four additional messages in optimized
mobile IP Protocol?
Binding request
Binding update
Binding acknowledgement
Binding warning
5.What are the disadvantages of Cellular IP?
Efficiency:Additional network load is induced by forwarding packets on multiple
paths
Transparency: Changes to Mobile Nodes are required
Security:Routing tables are changed based on messages sent by mobile nodes
6.What is the function performed by Mobility anchor
point(MAP)?
MAP is responsible
for a certain domain and acts as a local Home Agent within this domainfor
visiting Mobile Nodes.The MAP receives all packets on behalf of the Mobile
Node,encapsulates and forwards them directly to the Mobile Node’s current
address.As long as a Mobile Node stays within the domain of a MAP,the globally
visible COA does not change.
7.What is the use of dynamic host configuration protocol?
The dynamic
host configuration protocol is mainly used to simplify the installation and
maintenance of networked computers.If a new computer is connected to a network,
DHCP can provide it with all the necessary information for full system
integration into the network.
8.What is meant by destination sequence distance vector?
Destination
sequence distance vector(DSDV) routing is an enhancement to distance vector
routing for ad-hoc networks. Distance vector routing is used as routing
information protocol in wired networks.DSDV adds sequence numbers and dambling
to the distance vector algorithm.
9.What do you mean by dampling in DSDV?
Transient
changes in topology that are of short duration should not destabilize the
routing mechanisms.Advertisements containing changes in the topology currently
stored are therefore not disseminated further.A node waits with dissemination
if these changes are probably unstable.Waiting time depends on the time between
the first and best announcement of a path to a certain destination.
10. How does Dynamic source routing divide the task of
routing?
Dynamic
source routing divides the task of routing into two separate problems:
Route discovery:A node only tries
to discover a route to a destination if it has to send something to this
destination and there is currently no known route.
Route maintenance:If a node is
continuously sending packets via a route,it has to make sure that the route is
held upright.As soon as a node detects problems with the current route,it has
to find an alternative.
11.What is the goal of a mobile IP?
The goal of
a mobile IP can be summarized as: supporting end-system mobility while
maintaining scalability,efficiency,and compatibility in all respects with existing
applications and Internet protocols.
12.What is the use of Mobile Node?
A mobile
node is an end-system or router that can change its point of attachment to the
internet using mobile IP.The MN keeps its IP address and can continuously
communicate with any other system in the internet as long as link-layer
connectivity is given.Mobile nodes are not necessarily small devices such as
laptops with antennas or mobile phones; a router onboard an aircraft can be a
powerful mobile node.
13.What are the services provided by a foreign agent(FA)?
The FA can
provide several services to the MN during its visit to the foreign
network.The FA can have the Care-of address acting as tunnel point and
forwarding packets to the MN.The FA can be the default router for the MN.
FAs can also provide security services.
14.What are the entities and terminologies in mobile IP?
Mobile Node
Correspondent node
Home network
Foreign network
Foreign agent
Care-of address
Home agent
15.What are encapsulation and decapsulation?
Encapsulation is the mechanism of taking a packet consisting of packet header
and data and putting it into the data part of a new packet.The reverse
operation, taking a packet out of the data part of another packet,is called
decapsulation.Encapsulation and decapsulation are the operations typically
performed when a packet is transferred from a higher protocol layer to a lower
layer or from a lower to a higher layer respectively.
16.What are the problems associated with reverse
tunneling?
Firewalls
Multi-cast
TTL
17.What are the disadvantages of Cellular IP?
Efficiency: Additional network load is induced by forwarding packets on
multiple paths.
Transparency: Changes to MNs are required
Security: Routing tables are changed based on messages sent by mobile
nodes.Additionally,all systems in the network can easily obtain a copy of
all packets destined for an MN by sending packets with the MN’s source address
to the cellular IP gateway.
18.What are the advantages of HAWALI?
Security: Challenge-response extensions are mandatory.In contrast to Cellular
IP,routing changes are always initiated by the foreign domain’s infrastructure.
Transparency: HAWALI is mostly transparent to mobile nodes.
19. What are the disadvantages of HAWALI?
Security: There are no provisions regarding the setup of IPSec tunnels.
Implementation: No private address support is possible because of co-located
Care-of Addresses
20.What is the use of sequence numbers in DSDV?
Each routing
advertisement comes with a sequence number.Within ad-hoc
networks,advertisements may propagate along many paths.Sequence numbers help to
apply the advertisements in correct order.This avoids the loops that are likely
with the unchanged distance vector algorithm
UNIT V
1. What is the function of transport layer in WAP?
The transport
layer offers a bearer independent, consistent datagram-oriented service to the
higher layers of the WAP architecture. Communication is done transparently over
one of the available bearer services.
2. What is the use of WCMP?
The wireless
control message protocol provides error handling mechanisms for WDP. WCMP is
used for diagnostic and informational purposes. It is used by WDP nodes and
gateways to report errors.
3. What are the advantages of WTP?
WTP offers
several advantages to higher layers, including an improved reliability over
datagram services, improved efficiency over connection-oriented services and
support for transaction-oriented services such as web browsing.
4. How is reliability achieved in WTP?
WTP achieves
reliability using duplicate removal, retransmission, acknowledgements and
unique transaction identifiers.
5. What are the service primitives offered by WTP?
The three
service primitives offered by WTP are
o TR-Invoke
to initiate a new transaction
o TR-Result
to send back the result of a previously initiated transaction
o TR-Abort
to abort an existing transaction.
6. What are the features offered by WSP?
WSP offers certain features for
content exchange between cooperating clients and servers:
] Session
management
] Capability
negotiation
] Content
encoding.
7. What are the features offered by WSP/B?
In addition to the general features
of WSP, WSP/B offers the following features adapted to web browsing:
? HTTP/1.1
functionality
? Exchange
of session headers
? Push
and pull data transfer
? Asynchronous
requests
8. What is meant by WML?
The
wireless markup language(WML) is based on the standard HTML known from the www
and on HDML. WML is specified as an XML document type. WML follows a deck and
card metaphor.
9. What are the capabilities of WMLScript?
WMLScript offer several capabilities:
Ê Validity
check of user input
Ê Access
to device facilities
Ê Local
user interaction
Ê Extension
to the device software
10. Define WTA
Wireless
telephony application (WTA) is a collection of telephony specific extensions for
call and feature control mechanisms, merging data networks and voice networks.
11. Define XHTML
XHTML is the
extensible hypertext mark-up language developed by the w3c to replace and
enhance the currently used HTML.
12. What do you mean by MMS?
The multimedia
messaging service (MMS) transfers asynchronous multi-media content. MMS
supports different media types such as JPEG, GIF, text and AMR coded audio.
There is no fixed upper bound for the message size. Depending on the network
operator and device capabilities typical sizes are 30-100 Kbytes.
13. What are the two functions of transport layer in the
internet ?
1) Checksumming
over user data.
2) Multiplexing/Demultiplexing
from /to applications.
14. Distinguish TCP& UDP ?
TCP
|
UDP
|
1) Connection oriented protocol
|
Connection less protocol
|
2) TCP is network friendly
|
UDP is not network friendly
|
3) TCP guarantees in-order
delivery or reliable data transmission using Retransmission techniques.
|
Does not pull back in case of congestion to send packets in to an
already congested network.
|
15. What is congestion & how it is identified in TCP?
When there is a
temporary overload at some point in the transmission path it is referred to as
congestion. Congestion result in packet loss. If acknowledgement does not
arrive in time or if any acknowledgement is missing, TCP assumes network
congestion.
16. How congestion is controlled in TCP?
TCP shows a behavior after
congestion is called slow start. The sender has a congestion window &
congestion threshold for receiver. For each acknowledgement the window size is
increased exponentially until the congestion threshold & then it increases
linearly (by 1). When congestion occurs the threshold is reduced to half its
current size.
17. State whether standard TCP alone support mobile users or
wireless links and why?
No, standard TCP alone cannot
support wireless links because wireless links have much higher error rates
compared to wired links. The link layer may try to correct errors which results
in higher delays and mobility (Handover between access points) may result in
packet loss. In both cases standard TCP goes into slow start state.
18. State some of the classical solutions to improve the
efficiency of TCP in wireless?
1) Indirect
TCP (I-TCP)
2) Snooping
TCP
3) Mobile
TCP(M-TCP)
4) Fast
retransmit/font recovery
5) Transmission/time
–out freezing
6) Selective
retransmission
7) Transaction
oriented TCP.
19. What is indirect TCP?
Indirect
TCP segments a TCP connection in 2 parts
·
Fixed part
·
Wireless part.
20. What are the steps to be taken by I-TCP when hand over
take place?
1) The
old proxy must forward buffered data to new proxy
2) After
registration with new foreign agent, the new foreign agent informs the old one
about its location to enable packet forwarding.
3) The
sockets of proxy must mitigate to the new foreign agent located in the access
point.
16
MARKS
1.Explain
in detail about Signal Propagation.
« Path
loss of radio signals
v Ground
wave
v Sky
wave
v Line-of-sight
« Additional
Signal propagation effects
v Blocking (or) Shadowing, Reflection,
Refraction, Scattering, Diffraction
« Multi-path
propagation
v Delay
Spread
v Intersymbol
Interference
v Short-term
fading, long-term fading
v Doppler
Shift
2. Write
a brief note about multiplexing.
« Space
division multiplexing
v Guard
space
v disadvantages
« Frequency
division multiplexing
v Adjacent
Channel Interference
v disadvantages
« Time
division multiplexing
v Guard
spaces
v Co-channel
Interference
v Advantages,
disadvantages
« Code
division multiplexing
v Guard
spaces- orthogonal codes
v Advantages, disadvantages
3. What
is modulation? Explain in detail.
« Introduction
v Digital
modulation, Analog modulation
v Antennas
v Frequency
division Multiplexing
v Medium
Characteristics
v Spectral
efficiency, Power efficiency, Robustness
« Amplitude
Shift Keying
v Advantages,
disadvantages, Applications
« Frequency
Shift Keying
v Binary
FSK
v Continuous
Phase Modulation
« Phase
Shift Keying
v Binary
PSK
v Phase
lock loop
« Advanced
Frequency Shift Keying
v Minimum
Shift Keying, Gaussian MSK
« Advanced
Phase Shift Keying
v Quadrature
PSK
·
Reference signal
·
Differential QPSK
v Quadrature
Amplitude Modulation
« Multi-carrier
modulation
v Advantages
4. Briefly
demonstrate the concept of spread spectrum.
« Direct
Sequence Spread Spectrum
v Chipping
Sequence
v Pseudo-noise
Sequence
v Spreading
factor
v DSSS
transmitter & receiver
« Frequency
hopping Spread Spectrum
v Hopping
Sequence
v Dwell
Time
v Slow
& Fast Hopping
v FHSS
transmitter & receiver
5. Describe
in detail about cellular systems.
« Base
Station, cell
« Advantages
v Higher
capacity, less transmission power, local interference only, Robustness
« Disadvantages
v Infrastructure
needed, Handover needed, Frequency planning
« Clusters,
sectorized antennas, Borrowing Channel Allocation(BCA), Fixed Channel
Allocation(FCA), Dynamic Channel Allocation(DCA)
6. Describe
the mobile services provided by GSM in detail.
« Bearer
Services
v Transparent
& Non- transparent Bearer Services
« Tele
Services
v Telephony
v Emergency
number
v Short
Message Service
v Enhanced
Message Service
v Multimedia
Message Service
v Group
3 fax
« Supplementary
Services
v Typical
services
7. Explain
in detail about the GSM architecture.
« Radio
Subsystem
v Base
Station Subsystem
v Base
Transceiver Station
v Base
Station Controller
v Mobile
Station
·
Subscriber Identity Module
·
Personal Identity Number, PIN Unblocking
Key
« Network
and Switching Subsystem
v Mobile
Services Switching center
v Home
Location register
v Visitor
Location register
« Operation
Subsystem
v Operation
and Maintenance center
v Authentication
center
v Equipment
Identity Register
8. Briefly
explain about GPRS
Ø GPRS concepts
§
Time
slots
Ø PTP packet transfer service
Ø QoS profile
Ø Delay
Ø GPRS architecture
§
GSN
Ø Mobility management
9. Give
a detailed explanation about DECT
« System architecture
v Global
network
v Local
network
v Home
database, visitor database
« Protocol
architecture
v Physical
layer
v Medium
access control layer
v Data
link control layer
v Network
layer
10. Explain
briefly about Satellite systems
« History
v SPUTNIK
v SYNCOM
v INTELSAT1
« Applications
v Weather
forecasting, Radio & TV broadcast satellites, military satellites,
satellites for navigation.
v Global
telephone backbone, connections for remote or developing areas, global mobile
communication
« Basics
v Fg=Fc
v Inclination
angle, elevation angle
v Footprint
v GEO(Geostationary
Earth Orbit)
·
Advantages, disadvantages
v LEO(Low
Earth Orbit)
·
Advantages, disadvantages
v MEO(Medium
Earth Orbit)
·
Advantages, disadvantages
v HEO(Highly
Elliptical Orbit)
·
Advantages, disadvantages
« Routing
« Localization
v Home
Location register(HLR)
v Visitor
Location register (VLR)
v Satellite
user mapping register(SUMR)
« Handover.
v Intra-satellite,
inter-satellite, Gateway, Intersystem handover
11. Explain
the types of broadcasting in detail.
« Digital
Audio Broadcasting (DAB)
v Transport
mechanisms
·
Main Service Channel
·
Fast Information Channel
v Multi-media
object Transfer protocol
·
Header core, Header extension, Body
·
Object repetition, Interleaved objects,
segment repetition, Header repetition
« Digital
Video Broadcasting (DVB)
v Contents
of DVB
·
Network Information Table, Service
Description table, Event Information table, Time and date table
v DVB
Data Broadcasting
·
Data pipe, Data Streaming,,
multiprotocol encapsulation, data carousels, object carousels.
v DVB
for high-speed Internet access
12. Give
a detailed description about the physical layer of IEEE 802.11
« Frequency
hopping Spread Spectrum
v Functions
·
Synchronization, Start frame delimiter,
PLCP_PDU length word, PLCP signaling field, Header error check
« Direct
Sequence Spread Spectrum
·
Synchronization, Start frame delimiter,
signal, Service, Length, Header error check
« Infra
red
13. Make
a detailed description about MAC management.
« Synchronization
v Timing
Synchronization function
v Beacon
v Beacon
transmission in
·
Infrastructure network
·
Ad-hoc network
« Power
management
v Sleep
& awake states
v Power
management in
·
Infrastructure network
E Traffic
indication map
E Delivery
Traffic indication map
E PS(power
saving) poll
·
Ad-hoc network
E Ad-hoc
Traffic indication map
v Roaming
·
Steps
E Scanning
E Passive
& active scanning
E Association
request
E Association
response
E Updation
of database
14. Explain
briefly about HIPERLAN1
« Phases
v Prioritization
v Elimination
v Yield
v Transmission
« Quality
of Service support and other specialities
v MSDU
Lifetime
v Power
Conservation
v Encryption,
decryption
15. Give
a short description of the Bluetooth architecture
« Networking
v Piconet
v Scatternet
« Protocol
stack
v Core
specifications, profile specifications
v Core
protocols
·
Link manager protocol, Logical link
control & adaptation protocol, service discovery protocol
v Cable
replacement protocol, telephony control protocol specification
v Host
controller interface
16. What
are the advantages and disadvantages of WLANs? Explain.
« Advantages
v Flexibility
v Planning
v Design
v Robustness
v Cost
« Disadvantages
v Quality
of service
v Proprietary
solutions
v Restrictions
v Safety
and security
17. Briefly explain about the goals, assumptions
and requirements of mobile IP.
« Quick
‘solutions’
« Requirements
v Compatibility
v Transparency
v Scalability
and efficiency
v Security
18. Give
a detailed note about tunneling and optimization in mobile IP.
« Tunneling
& Encapsulation
v IP-in-IP
encapsulation
v Minimal
encapsulation
v Generic
routing encapsulation
« Optimization
v Triangular
routing, binding cache
v Four
additional messages
·
Binding request
·
Binding update
·
Binding acknowledgement
·
Binding warning
« Reverse
tunneling
v Firewalls
v Multi-cast
v TTL
19. Explain
the concept of routing in MANET
« Fundamental
differences between wired & wireless ad-hoc networks
v Asymmetric
links
v Redundant
links
v Interference
v Dynamic
topology
« Problems
with ad-hoc routing
v Need
for algorithms with high dynamic topology
v Information
from lower layers essential
v Centralized
approaches will not work
v Efficient
routing capabilities are needed
v Notion
of connection with certain characteristics will not work
v Flooding
20. Write
short notes on DSR and DSDV
« Dynamic
Source Routing (DSR)
v 2
phases in routing
·
Route discovery
·
Route Maintenance
v Basic
operation
v Optimization
of the basic algorithm
v Approaches
for Route Maintenance
« Destination
Sequence Distance Vector (DSDV)
v Sequence
numbers
v Damping
v Routing
table
21. Give
a detailed explanation about Agent Discovery and registration of mobile IP.
« Agent
advertisement.
v Agent
advertisement message
v Agent
advertisement packet
·
Type
·
#addresses
·
Lifetime
·
Preference
·
Length, bits
« Agent
solicitation
v Three
solicitations: one per second
v Decrease
solicitations exponentially
v Registration
22. Give
a detailed view of traditional TCP.
« Congestion
Control
v Dropped
packet
v Retransmission
of missing packet
« Slow
Start
v Congestion
window
v Congestion
threshold
v Exponential
growth
« Fast
retransmit/ Fast recovery
« Implications
on mobility
v Error
rates
v Packet
loss
23. Explain
indirect TCP in detail.
« Socket
and state migration after handover of a mobile host
« Advantages
v No
change in TCP protocol
v Transmission
errors on wireless links cannot propagate into the fixed network
v Different
solutions can be tested without jeopardizing the stability of the internet
v Uses
precise time-outs to guarantee retransmissions as fast as possible
v Partitioning allows the use of different transport layer
protocol
« Disadvantages
v Loss
of end-to-end semantics of TCP might cause problems
v Increased
handover latency may be problematic
v FA
must be a trusted entity.
24. Give
a detailed description about Mobile TCP.
« 2
parts
v Unmodified
TCP
v Optimized
TCP
« Persistent
mode
« Bandwidth
manager
« Advantages
« Disadvantages
25. Describe
in detail about WAP architecture
« Bearer
services
v Transport
layer Service Access point (T-SAP)
« Security
layer
v Security
SAP (SEC-SAP)
« Transaction
layer
v Transaction
SAP (TR-SAP)
« Session
layer
v Session-SAP
(S-SAP)
« Application
layer
v Integration
of www and mobile telephony applications
« Integration
of WAP components
0 comments:
Post a Comment