cs9059 mobile computing
Post on 03-Jun-2018
219 Views
Preview:
TRANSCRIPT
-
8/12/2019 Cs9059 Mobile Computing
1/25
CS9059 MOBILE COMPUTINGUNIT I
Wireless Transmission Signal Propagation Sprea Spe!tr"m Satellite
Net#or$s Capa!it% &llo!ation '&M& (&M& M&C)
1. What are the 3 fundamental propagation behaviors depending on their
frequency?
Ground Wave
Sky Wave
Line of Sight
2.What is multipath propagation?
Multipath propagation is the direct from a sender to a receiver, the propagationeffects mentioned in the previous section lead to one of the most severe radio channel
impairments.
3. What is guard space?
Guard spaces are needed to avoid frequency band overlapping is also called
channel interference.
4. What are the 3 different basic shemes analog modulation?
Amplitude modulation
requency modulation
!hase modulation
5. What is the use of Phase oc! oop "P#?
"o receive the signal correctly, the receiver must synchroni#e in frequency and
phase $ith the transmitter.
$. What is hopping sequence?
"ransmitter and receiver stay on one of these channels %M and "%M. "he
pattern of channel usage is called the hopping sequence,
%. What is d&ell time?
-
8/12/2019 Cs9059 Mobile Computing
2/25
"he time spend on a channel $ith a certain frequency is called the d$ell time
'. What are the advantages of cellular systems?
"he advantages of cellular systems are,
i& 'igher capacity ii& Less transmission po$er iii& Local interface only iv&(obustness
(. What is bro&sing channel allocation and fi)ed channel allocation?
)ells $ith more traffic are dynamically allotted more frequencies. "his scheme iskno$n as bro$sing channel allocation, $hile the first fi*ed scheme is called fi*ed
channel allocation.
1*. What are the disadvantages of cellular systems?
"he advantages of cellular systems are,
+nfrastructure needed
'andover needed
requency planning
11. What is digital sense multiple access?
"he scheme $hich is used for the packet data transmission service. )ellular %igital
!acket %ata in the AM!S mobile phone system is also kno$n as digital sense multiple
access %SMA&.
12. What is +et&or! and ,&itching subsystem?
"he heart of the GSM is formed by the -et$ork and S$itching System -SS&. -SS
consists of the follo$ing s$itches and databases
Mobile Services s$itching centerMS)&
'ome Location register 'L(&
/isitor Location (egister /L(&
13. What is authentication centre?
As the radio interface and mobile stations are particularly vulnerable. A separate Au)has been defined to protect user identity and data transmission. "he Au) contains the
algorithms for authentication as $ell as the keys for encryption and generates the values
needed for user authentication in the 'L(.
-
8/12/2019 Cs9059 Mobile Computing
3/25
14. What is called burst and normal burst?
%ata is transmitted in small portions called bursts, normal burst are used for data
transmission inside a slot user and signaling data&.
15. What are the basic groups of logical channels?
GSM specifies 0 basic groups of logical channels,
"raffic channels
)ontrol channels
1$. -efine traffic multiframe and control multiframe?
"he periodic pattern of 01 slots occurs in all "%MA frames $ith a ")'.
"he combination of these frames is called traffic multiframe
"%MA frames containing data for the other logical channels are combined
to a control multiframe.
1%. What is /,02
3sing orthogonal codes separates the different data streams of a sender
3M"S uses so4called 5rthogonal /ariable Spreading factor codes 5/S&.
*+) Spe!i,% t-e steps per,orm "ring t-e sear!- ,or a !ell a,ter po#er on.
!rimary synchroni#ation
Secondary synchroni#ation
+dentification of the scrambling code
*9) E/plain ao"t transparent moe.
"he transparent mode transfer simply for$ards MA) data $ithout any furtherprocessing. "he system then has to rely on the 6) $hich is al$ays used in the radio
layer.
10) W-at are t-e asi! !lasses o, -ano2ers.
3M"S has 0 basic classes of handovers,
'ard handover
-
8/12/2019 Cs9059 Mobile Computing
4/25
Soft handover
6,7+,8
7.6)plain ,9 architecture?
Mobile services
o 8earer services
o "ele services
o Supplementary services
System architecture
(adio subsystem
-et$ork and s$itching subsystem
5peration subsystem
2. 6)plain ,ystem architecture?
!rotocol architecture
o !hysical Layer
o Medium access control Layer
o %ata link control layer
9.6)plain briefly about 767:;?
"he 0 standards are,
/oice %ata !acket data optimi#ed !%5&
"he system architecture of "6"(A is similar to GSM. "6"(A offers 0
channels similar to GSM as,
"raffic channels
control channels
4.Write brief about 97, and 97
-
8/12/2019 Cs9059 Mobile Computing
5/25
3ser equipment
)ore net$ork
'and over
UNIT31
TELECOMMUNIC&TION NETWO4S
Part3&
1. ,pecify the security services offered by ,9.
"here are three security services offered by GSM."hey are
8earer Services.
"ele Services.
Supplementary Services.
2. What is the frequency range of uplin! and do&nlin! in ,9 net&or!?
"he frequency range of uplink in GSM net$ork is :;
-
8/12/2019 Cs9059 Mobile Computing
6/25
+nternational mobile subscriber identity +MS+&.
"emporary mobile subscriber identity "MS+&.
Mobile station roaming number MS(-&.
$. What are the four possible handover scenarios in ,9?
"he four possible handover scenarios in GSM are
+ntra4cell handover.
+nter4cell, intra48S) handover.
+nter48S), intra4MS) handover.
+nter MS) handover.
%. What are the security services offered by ,9?
"he security services offered by GSM are
Access control and authentication.
)onfidentiality.
Anonymity.
'. What is meant by ,+?
GGS- is Gate$ay G!(S Support -ode. +t is the inter4$orking unit bet$een the
G!(S net$ork and e*ternal packet data net$orks. "he GGS- is connected to e*ternal
net$orks via the Gi interface and transfers packets to the SGS- via an +!4based G!(Sbackbone net$ork.
(. What is meant by ,,+?
SGS- is Serving G!(S Support -ode. +t supports the MS via the Gb interface."he SGS- is connected to a 8S) via frame relay.
1*. What is meant by ,,P?
8SSG! is 8ase Station Subsystem G!(S !rotocol. +t is used to convey routingand >oS4related information bet$een the 8SS and SGS-.8SSG! does not perform errorcorrection and $orks on top of a frame relay net$ork.
11. -efine the protocol architecture of -6=7.
"he protocol architecture of %6)" consists of three layers. "hey are
-
8/12/2019 Cs9059 Mobile Computing
7/25
!hysical Layer.
Medium Access Layer.
%ata Link )ontrol Layer.
-et$ork Layer.
"he first three layers are common for both )ontrol !lane )4!lane& and 3ser !lane34!lane&. "he net$ork layer has been specified only for 34!lane, so
that user data from layer t$o is directly for$arded to the 34!lane.
12. ,pecify the standards offered by 767:;.
"6"(A offers t$o standards. "hey are
/oice?%ata /?%&.
!acket %ata 5ptimi#ed !%5&.
13. >o& many 7 standardied groups of 3 radio access technologies
are there in 97
-
8/12/2019 Cs9059 Mobile Computing
8/25
1$. What are the t&o basic transport mechanisms used by -;?
"he t$o basic transport mechanisms used by %A8 are
Main Service )hannel MS)&.
ast +nformation )hannel +)&.
1%. What are the t&o transport modes defined for 9,=?
"he t$o transport modes defined for MS) are
Stream Mode
!acket Mode.
1'. -efine the terms8
i. 6arth ,tation.
ii. plin!.iii. -o&nlin!.
6arth ,tation8uality of service
!roprietary solutions.
(estrictions
Safety and Security
3.9ention the design goals of W;+,?
Global operation
Lo$ po$er
License4free operation
(obust transmission technology
Simplified spontaneous cooperation
6asy to use
!rotectiopn of investment
Safety and security
"ransparency for applications.
4.What is the difference bet&een infrastructure and ad
-
8/12/2019 Cs9059 Mobile Computing
11/25
point,but not directly bet$een the $ireless nodes.
Ad4hoc $ireless net$orks
)ommunication takes place directly $ith other nodes,so no access point
controlling medium acces is necessary.=.Give the primary goal of +666:
-
8/12/2019 Cs9059 Mobile Computing
12/25
77.-efine random bac!off time?
+f the medium is busy,nodes have to $ait for the duration of %+S,entering a contention
phase after$ards.6ach node no$ chooses a random backoff time $ithin a contention
$indo$ and delays medium access for this random amount of
time.
70.What is 7raffic ndication 9ap?
"he "+M contains a list of stations for $hich unicast data frames are
buffered in the access point.
79.What is -elivery 7raffic ndication 9ap
"he access point maintains a %"+M interval for sending broadcastmulticast
frames."he %"+M interval is al$ays a multiple of the "+M interval.
14.What is ;d
-
8/12/2019 Cs9059 Mobile Computing
13/25
8aseband
Link manager protocol
Logical link control and adaptation protocol
Service discovery protocol
1(.What is the purpose of sniff state?
"he sniff state has the highest po$er consumption."he device listens to the
piconet at a reduced rate.
2*.What is the use of hold state?
"he device does not release its AMA but stops A)L transmission.A slave may still
e*change S)5 packets.
21.What is the purpose of par! state?
+n this stae the device has the lo$est duty cycle and the lo$est po$er
consumption."he device releases its AMA and receives a parked member address."he
device is still a member of the piconet,but gives room for another device to become
active.
-
8/12/2019 Cs9059 Mobile Computing
14/25
!art48
1. 6)plain the architecture of 666 '*2.11.
System Architecture
!rotocol Architecture
!hysical layer
MA) layer
2. 6)plain the 9;= layer in 666'*2.11
3sing )SMA)A
With ("S)"S e*tension
With polling
MA) frames
9.6)plain >P6:;+ 1 in detail
'+!6(LA- 7
!rioriti#ation phase
6limination phase
Bield phase
"ransmission phase
>5S
4. 6)plain W;79
Working group
Services
(eference model
'andover
Location management
Mobile >5S
-
8/12/2019 Cs9059 Mobile Computing
15/25
5. Writ e short notes on luetooth.
_ 3ser Scenarios
_ Architecture
_
(adio Layer_ 8aseband layer
_ Link manager protocol
_ Security
_ S%!
UNIT8
MOBILE NETWO4 L&7E4
1. What are the requirements of mobile P?
)ompatibility
"ransparency
Scalability and efficiency
Security
2. 9ention the different entities in a mobile P
.
Mobile -ode
)orrespondent -ode
'ome -et$ork
oreign -et$ork
oreign Agent
'ome Agent
)are45f address
o oreign agent )5A
o )o4located )5A
3. What do you mean by mobility binding?
"he Mobile -ode sends its registration request to the 'ome Agent. "he 'A no$sets up a mobility binding containing the mobile nodeCs home +! address and the current
)5A.
4. -efine a tunnel.
-
8/12/2019 Cs9059 Mobile Computing
16/25
A tunnel establishes a virtual pipe for data packets bet$een a tunnel entry
and a tunnel endpoint. !ackets entering a tunnel are for$arded inside the
tunnel and leave the tunnel unchanged.
5. What is encapsulation?
6ncapsulation is the mechanism of taking a packet consisting of packet header and data
putting it into the data part of a ne$ packet.
$. What is decapsulation?
"he reverse operation, taking a packet out of the data part of another packet, is
called decapsulation.
%. -efine an outer header.
"he 'A takes the original packet $ith the M- as destination, puts it into the datapart of a ne$ packet and sets the ne$ +! header in such a $ay that the packet is
routed to the )5A."he ne$ header is called the outer header.
'. -efine an inner header.
"here is an inner header $hich can be identical to the original header as this case for +!4
in4+! encapsulation, or the inner header can be computed duringencapsulation.
9) What is meant by generic routing encapsulation.
Generic routing encapsulation allo$s the encapsulation of packets of one protocol suiteinto the payload portion of a packet of another protocol suite.
1*. What is the use of net&or! address translation?
"he net$ork address translation is used by many companies to hide internal
resources and to use only some globally available addresses.
11. -efine triangular routing.
"he inefficient behavior of a non4optimi#ed mobile +! is called triangular routing.
"he triangle is made up of three segments, )- to 'A, 'A to )5ADM-, and M-
back to )-.
-
8/12/2019 Cs9059 Mobile Computing
17/25
70. What is meant by a binding cache?
5ne $ay to optimi#e the route is to inform the )- of the current location by
caching it in a binding cache $hich is a part of the local routing table for the )-.
13. -efine binding request.
Any node that $ants to kno$ the current location of an M- can send a binding
request to the 'A. "he 'A can check if the M- has allo$ed dissemination of its current
location. +f the 'A is allo$ed to reveal the location it sends back a binding update.
14. What is !no&n as inding update?
"his message sent by the 'A to )-s reveals the current location of the M-."he
message contains the fi*ed +! address of the M- and the )5A."he binding update can
request an ackno$ledgement.
7=.6)plain binding ac!no&ledgement.
+f requested, a node returns this ackno$ledgement receiving a binding updatemessage.
71.-efine binding &arning.
+f a node decapsulates a packet for a M-, but it is not the current A for this M-,this node sends a binding $arning. "he $arning contains M-Cs home address and a
target node address.
1%. 6)plain cellular P
.
)ellular +! provides local handovers $ithout rene$ed registration by installing asingle cellular +! gate$ay for each domain, $hich acts to the outside $orld as a
foreign agent.
1'. What are the advantages of cellular P?
Manageability
-
8/12/2019 Cs9059 Mobile Computing
18/25
)ellular +! is mostly self4configuring, and integration of the )+!GW into a
fire$all $ould facilitate administration of mobility4related functionality.
6fficiency
"ransparency and security
1(. What is !no&n as mobility anchor point?
'M+!v1 provides micro4mobility support by installing a mobility anchor point,
$hich is responsible for a certain domain and acts as a local 'A $ithin this
domain for visiting M-s.2*. 6)plain destination sequence distance vector routing..
%estination sequence distance vector routing is an enhancement to distance vector
routing for ad4hoc net$orks and is used as routing information protocol in $ired
net$orks.
21. What are the t&o things added to the distance vector algorithm?
Sequence -umbers
%amping
00.>o& the dynamic source routing does divide the tas! of routing into t&o separate
problems2
7. (oute discovery
0. (oute Maintenance
P;:7 @
AAAAAAA
1. What are the requirements of a mobile P?
)ompatibility
"ransparency
Scalability and 6fficiencySecurity
0. What are the entities in mobile P?
Mobile -ode
)orrespondent node
-
8/12/2019 Cs9059 Mobile Computing
19/25
'ome -et$ork
oreign -et$ork
oreign Agent
)are45f4Address
oreign Agent
)o4located )5A'ome Agent
3. 6)plain tunneling and encapsulation in mobile P.
+!4in4+! encapsulation
Minimal encapsulation
Generic (outing encapsulation
4. -escribe -ynamic host configuration protocol.
%escription $ith diagram
Advantages
%isadvantages
5. 6)plain routing in Pv$.
6*ample ad4hoc net$orkAsymmetric links
(edundant Links
+nterference
-
8/12/2019 Cs9059 Mobile Computing
20/25
(%nami! Topolog%
UNIT3:
Part3&
1. What is slo& start?
")!Cs reaction to a missing ackno$ledgement is necessary to get rid of congestionquickly. "he behavior ")! sho$s after the detection of congestion is
called slo$ start.
2. What is the use of congestion threshold?
"he e*ponential gro$th of the congestion $indo$ in the slo$ start mechanism is
dangerous as it doubles the congestion $indo$ at each step. So a congestion threshold isset at $hich the e*ponential gro$th stops.
3. What led to the development of ndirect 7=P?
")! performs poorly together $ith $ireless links
")! $ithin the fi*ed net$ork cannot be changed.
"his led to the development of +4")! $hich segments a ")! connection
into a fi*ed part and a $ireless part.
4. What is the goal of 9
-
8/12/2019 Cs9059 Mobile Computing
21/25
-
8/12/2019 Cs9059 Mobile Computing
22/25
Security layer
"ransaction layer
Session layer
Application layer
1*. +ame some =9P messages.
%estination unreachable
!arameter problem
Message too big
(eassembly failure
6cho requestreply
11. What is W7P? What are its classes?
W"! stands for Wireless "ransaction !rotocol. +t has been designed to runon very thin clients such as mobile phones. +t has three classes.
)lass
-
8/12/2019 Cs9059 Mobile Computing
23/25
"e*t and +mages
3ser interaction
-avigation
)onte*t Management
1$. What are the advantages of W9 ,cript over W9?
WML Script offers several capabilities not supported by WML
/alidity check of user input
Access to device facilities
Local user interaction
6*tension to the device soft$are
1%. +ame the libraries specified by W9,cript. Lang
loat
String
3(L
WML 8ro$ser
%ialogs
1'. What are the classes of libraries?
)ommon net$ork services
-et$ork specific services
!ublic services
1(. +ame the operations performed by P;P.
!ush access !rotocol performs the follo$ing operations
!ush submission
(esult notification
!ush cancellation
Status query
)lient capabilities query
2*. What are the components of W;P2.*?
-
8/12/2019 Cs9059 Mobile Computing
24/25
-
8/12/2019 Cs9059 Mobile Computing
25/25
_ WML Script
_ Wireless "elephony Application
_ +ntroduction to WA!0.
top related