BTL Questions No. Illustrate how hidden terminal and exposed node problems affect the communication between mobile devices?
|
|
- Grant Miles
- 7 years ago
- Views:
Transcription
1 SRM NAGAR, KATTANKULATHUR 0 0 ACADEMIC YEAR: 0 7 SEMESTER: ODD BRANCH: MCA YEAR: III SEMESTER: V SUBJECT CODE AND NAME: MC70 MOBILE COMPUTING NAME OF THE FACULTY MEMBER AND DESIGNATION: Mr. C. VIJAYAKUMARAN ASSISTANT PROFESSOR (SEL.G) UNIT I PART A Qn, L What is Signal Propagation? Explain the meaning of Burst and list its types List the components of the Frequency Spectrum Identify the needs for Multiplexing of signals? Compare FDM and TDM Write the uses of Spread Spectrum 7 Distinguish between FHSS and DSSS 8 Illustrate the frequency ranges of uplink and downlink in GSM network 9 List the different types of handover mechanisms used in GSM 0 Show the functions of Radio Sub System in GSM architecture Discuss about call routing in GSM? What is GPRS? Mention its services Analyze the different address identifiers used in a GSM System Invent the basic requirements of Mobility Management? Summarize the limitations of Frequency Allocation? Plan the steps involved in GSM s A Authentication algorithm? 7 Explain the SMS protocol services and features? 8 Classify the Value Added Services available through SMS in GSM 9 Illustrate how hidden terminal and exposed node problems affect the communication between mobile devices? 0 Judge the features of Packet Data Networks
2 SRM NAGAR, KATTANKULATHUR 0 0 PART - B Briefly discuss about i. Components of Frequency Spectrum (8) ii. Multiplexing (8) Write in detail on Functional Architecture of GSM system Compare and contrast i. G and G Networks (8) ii. Mobile originated call and mobile terminated call (8) Assess the following i. Authentication and Security in GSM(8) ii. PLMN () iii. Operation and Maintenance Sub Systems () Discuss with neat sketches about i. Direct Sequence Spread Spectrum (DSSS) (8) and ii. Frequency Hopping Spread Spectrum (8) Describe the features i. CDMA (8) ii. Entities in GSM () iii. Identifiers in GSM () 7 Explain in detail about GPRS Protocols architecture with neat diagram () 8 Illustrate the Principles of i. Frequency Allocation in GSM () ii. Address structures used in GSM () iii. Packet Data Network () Generalize the following with respect to GSM 9 i. G Mobile Wireless System Services (8) ii. Mobility Management (8) 0 Show the overview of i. Cellular Networks () ii. GPRS data services and its applications () iii. Handover and Call Routing in GSM (8) Explain i. The concept behind Code Division Multiple Access. (8) ii. Compare GSM and CDMA (8) Examine i. How is the communication in GSM secure? Explain the different algorithms used. (8) ii. Location Management in GSM (8) Describe in detail the GPRS Network Architecture () Analyze in detail the protocol architecture of GSM with a neat sketch ()
3 SRM NAGAR, KATTANKULATHUR 0 0 UNIT II PART A Define. Quality of Service (QoS) What are the byte ordering functions? Describe the features of Adhoc networks Analyze about topologies of WLAN What are the security features offered by Bluetooth? Discuss the features of Bluetooth enabled devices 7 What is meant by IRDA? 8 Explain the concept of Piconet 9 Show the features of Scatter-net in Bluetooth 0 Classify the topologies of WLAN Generalize the technologies of WLAN Show the metrics used in WLAN medium access control mechanisms Explain the security features of Bluetooth List the uses of MANET Summarize the features of WAP Distinguish between hidden node and exposed node problem is WLAN 7 Compose the role of Transport layer in WAP 8 Describe the functions of ZigBee 9 Distinguish between wired and Wireless LANs 0 Assess the usage of infrared communication? PART B Identify the following i. WLAN Equipments () ii. WLAN Topologies () iii. WLAN Standards () Show the various Power Management Standards of WLAN in detail () Compare and contrast i. DCF Vs PCF in WLAM MAC (8) and ii. Infra-structure based Vs Adhoc topologies (8) Write short notes on i. IRDA () ii. Issues in Wireless MAC () iii. Hidden node and Exposed Terminal Problems () Generalize features of i. WAP.0 (8)
4 SRM NAGAR, KATTANKULATHUR 0 0 ii. ZigBee (8) Discuss i. The system architecture of IEEE Standard 80. in detail (8) ii. The Security components and SDP protocol in Bluetooth (8) Assess the following with respect to WLAN 7 I. MAC Performance Metrics (8) II. Features of MAC Protocols (8) Examine the following 8 i. Security of WLAN (8) ii. System architecture of Bluetooth (8) Describe the features of the following 9 i. Wireless Transport Layer Security WTLS (8) ii. Bluetooth Protocols (8) 0 Examine in detail about the WAP Architecture with a neat sketch () Explain the protocol layers of Bluetooth protocol in detail () Describe the Medium Access Control scheme of IEEE 80. () Explain the following protocols of WAP architecture: i. Wireless Session Protocol () ii. Wireless Transaction Protocol (WTP) () iii. Wireless Transport Layer Security (WTLS) () iv. Wireless Datagram Protocol (WDP) () Distinguish between i. Infrared and Radio Transmissions (8) ii. Internet and WAP architecture (8) PART A UNIT III Design the structure of an IP Packet Write brief outline about Selective Retransmission Assess the goals of Mobile IP Describe the features of Mobile TCP Show the functions of DHCP Examine the features of Snooping TCP 7 Analyze how does the I-TCP isolate problems on wireless link? 8 Illustrate the distinct phases of Dynamic Host Configuration Protocol 9 Demonstrate the capability of standard TCP in handling link disconnection 0 Explain the fast retransmission and fast recovery features of TCP Describe the steps involved in IP packet delivery What is Care of Address? Compose the characteristics of VoIP Summarize the purpose of IPSec What are the functions of Mobile Transport Layer List out the benefits of Transaction Oriented TCP 7 Show how Mobile IP handles the location of a mobile device?
5 SRM NAGAR, KATTANKULATHUR Distinguish between I-TCP and S-TCP 9 Infer the functions of Handover Management in Mobile IP 0 Order the steps involved in the registration process of Mobile IP PART B Compose the following with respect to Mobile IP i. Registration of a node (8) ii. Agent Discovery (8) Recommend the process involved in i. Tunneling and Encapsulation (8) ii. Rout Optimization (8) Write short notes on i. Entities used in Mobile IP (8) ii. Reverse Tunneling (8) Describe the functions of i. IP Security Protocols (8) i. Voice over Internet Protocol (8) Illustrate the concepts involved in i. Mobile IP hand over management () ii. Location Management (8) Explain i. How packet delivery takes place in mobile network layer? (8) ii. Dynamic Host Configuration Protocol with neat diagram (8) Show the steps involved in 7 i. Traditional TCP (8) ii. Snooping TCP (8) 8 Describe the various Encapsulation Techniques used in Mobile IP () Summarize the features of 9 i. Generic Encapsulation (8) ii. IP-in-IP Encapsulation (8) Write a short notes on 0 ii. Mobile TCP (8) iii. Transaction oriented TCP (8) Explain how data transfer is done using Mobile IP from a mobile node to a fixed node and vice versa. Why and where is encapsulation needed? () How does Indirect TCP work? Discuss its advantages & disadvantages () Differentiate between traditional TCP and mobile oriented TCP () Analyze the necessity of i. Mobile IP (8) ii. Mobile TCP (8)
6 SRM NAGAR, KATTANKULATHUR 0 0 PART A UNIT- IV Tabulate the Adhoc Proactive routing protocols Name the phases of AODV List the applications of MANET Write the uses of Wireless Sensor Networks Show the features of TORA routing algorithm Illustrate the types of localization techniques used in Adhoc networks 7 Write the expansion for i) DSDV and ii) CGSR 8 Summarize the features of WSN 9 Discuss ant two features of Personal Area Networks 0 Assess the types of PAN Decide the features of reactive routing techniques Differentiate between Proactive and Reactive Routing Protocols Show a block diagram for typical arrangement of protocol stack in WSN Analyze the security threats involved in Adhoc networks Interpret the phases of TORA routing algorithm Compose the characteristics of WSN 7 Invent the features of routing algorithms used in WSN 8 Explain the features of Distributed Networks 9 Explain about sensing coverage of WSN 0 List out the scheduling techniques in the distributed networks PART B Discuss about i. MANET (8) ii. PAN (8) Explain the protocol stack of WSN with a neat sketch () Assess the features of the following with suitable examples i. Proactive Routing Protocols (8) ii. Reactive Routing Protocols (8) Describe the process of i. AODV routing protocol (8) ii. DSR Routing Protocol (8) Write short notes on i. Security Issues in MANET () ii. Routing Issues in MANET () iii. Routing issues in WSN ()
7 SRM NAGAR, KATTANKULATHUR 0 0 Describe the applications of i. Distributed Network (8) ii. Wireless Sensor Network () iii. Adhoc Networks () Explain a mechanism to implement the following routing protocols 7 i. TORA (8) ii. CGSR (8) Generalize the following functions of WSN 8 i. Communication Coverage (8) ii. Sensing Coverage (8) Examine the following with respect to Distributed Networks 9 i. Load balancing techniques (8) ii. Scheduling techniques (8) 0 Illustrate the DSDV routing protocol in mobile Adhoc networks () Explain in detail the working of any one routing protocol for mobile adhoc networks, with appropriate diagrams () Write about the different ways in which routing is done in Sensor Networks () Compare i. Routing in Wireless Sensor Network and Adhoc Networks (8) ii. Distributed network and Client/Server network (8) Describe the following features of WSN i. Rumor Routing (8) ii. Selective Flooding (8) PART A UNIT V List out the Android SDK features Find the meaning of Android Virtual Device State the advantages of SDK Manager Determine the comparative advantage of using Dalvik Virtual Machine over Java Virtual Machine in Android OS Outline the core components of Android application life cycle Describe the features of Activity Class 7 Illustrate the functions of Geo Service 8 Invent the steps for a new mobile application 9 Show the features of Android Studio 0 Assess the states of an activity Write short notes on Activity Stack Examine the components related to Android application layer Demonstrate the uses of Service class Explain the use of Broadcast Receiver class Analyze components of content provider class Generalize the features of Medea Framework
8 SRM NAGAR, KATTANKULATHUR Show the uses of SQLite database 8 What is the use of Intents? 9 Compare the application layer and the application frame work in the Android software stack. 0 Distinguish between oncreate() and onstart() methods. Part B Assess the steps involved in mobile application development () Discuss the features of i. Activity Manager (8) ii. Window Manager (8) Illustrate the techniques used to compose a mobile application with suitable example () Describe in detail on i. Active Life Cycle in Mobile Application (8) ii. The Android software stack with neat diagram (8) Explain the following i. Package Manager (8) ii. Resource Manager (8) Summarize the features of i. Android Libraries (8) ii. Android Runtime Components (8) Write short notes on 7 i. Storing and Loading of files and tools associated with Android (8) ii. Retrieving the content of a table from the database (8) Explain the features of 8 i. Android Application Frameworks (8) ii. Content Provider Classes (8) 9 Generalize the processes involved in Activity Life Cycle () What is 0 i. Map View and Map Activity? How to create a map based activity? (0) ii. Intent and Intent Activity? Give example () List the functions of i. Android Widgets () ii. Web Kit () iii. Geo Services (8) Differentiate between Android application life cycle and Activity life cycle () Analyze the features of i. SQLite Database (8) ii. Broadcast Receiver classes (8) Explain the steps involved in creating the following Android applications i. Static digital clock (8) ii. Phone Book (8)
VALLIAMMAI ENGNIEERING COLLEGE SRM Nagar, Kattankulathur 603203.
VALLIAMMAI ENGNIEERING COLLEGE SRM Nagar, Kattankulathur 603203. DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING Year & Semester : VII/ IV Section : CSE-1 & 2 Subject Code : CS2402 Subject Name : MOBILE
More informationCEB620MOBILE COMPUTING
CEB620MOBILE COMPUTING UNIT 1 1. What is mobile communication? 2. List out the mobile computing function? 3. What are the mobile computing devices? 4. Define mobile? 5. What is wireless device? 6. List
More information10CS64: COMPUTER NETWORKS - II
QUESTION BANK 10CS64: COMPUTER NETWORKS - II Part A Unit 1 & 2: Packet-Switching Networks 1 and Packet-Switching Networks 2 1. Mention different types of network services? Explain the same. 2. Difference
More informationLecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol
Lecture 2 : The DSDV Protocol Lecture 2.1 : The Distributed Bellman-Ford Algorithm Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol The Routing Problem S S D D The routing problem
More informationEPL 657 Wireless Networks
EPL 657 Wireless Networks Some fundamentals: Multiplexing / Multiple Access / Duplex Infrastructure vs Infrastructureless Panayiotis Kolios Recall: The big picture... Modulations: some basics 2 Multiplexing
More informationQuestions for Mobile Communications 2 nd ed.
Questions for Mobile Communications 2 nd ed. Jochen H. Schiller, Freie Universität Berlin, Germany schiller@computer.org, www.jochenschiller.de 1. Introduction 1.1 Discover the current numbers of subscribers
More informationIT 3202 Internet Working (New)
[All Rights Reserved] SLIATE SRI LANKA INSTITUTE OF ADVANCED TECHNOLOGICAL EDUCATION (Established in the Ministry of Higher Education, vide in Act No. 29 of 1995) Instructions for Candidates: Answer any
More informationContents. Preface to the Second Edition Preface to the First Edition. Mobility Management 48
MOBILE COMPUTING SECOND EDITION RAJ KAMAL Senior Professor and Faculty School ofcomputer Sciences andelectronics Devi Ahilya University, Indore OXFORD UNIVERSITY PRESS Contents Preface to the Second Edition
More informationBehavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji
More informationCourse Duration: Course Content Course Description Course Objectives Course Requirements
Course: TCS 201 Telecommunication and Networks I (3 credits compulsory) Course Duration: The course shall comprise of 45hours of theory and practical classes. The theory will be taught for 30hours of 2hours
More informationTCP in Wireless Networks
Outline Lecture 10 TCP Performance and QoS in Wireless s TCP Performance in wireless networks TCP performance in asymmetric networks WAP Kurose-Ross: Chapter 3, 6.8 On-line: TCP over Wireless Systems Problems
More informationEnterprise VoIP Services over Mobile Ad-Hoc Technologies
Enterprise VoIP Services over Mobile Ad-Hoc Technologies 1 System Architecture Figure 1 illustrates the system architecture. We can divide it into 2 parts. One is the Mobile VoIP Box (MVB) node and the
More informationIT4504 - Data Communication and Networks (Optional)
- Data Communication and Networks (Optional) INTRODUCTION This is one of the optional courses designed for Semester 4 of the Bachelor of Information Technology Degree program. This course on Data Communication
More informationIT4405 Computer Networks (Compulsory)
IT4405 Computer Networks (Compulsory) INTRODUCTION This course provides a comprehensive insight into the fundamental concepts in data communications, computer network systems and protocols both fixed and
More informationIntroduction Chapter 1. Uses of Computer Networks
Introduction Chapter 1 Uses of Computer Networks Network Hardware Network Software Reference Models Example Networks Network Standardization Metric Units Revised: August 2011 Uses of Computer Networks
More informationProfessur Technische Informatik Prof. Dr. Wolfram Hardt. Network Standards. and Technologies for Wireless Sensor Networks. Karsten Knuth 16.07.
Network Standards and Technologies for Wireless Sensor Networks Karsten Knuth 16.07.2008 Index 1. Motivation 2. Introduction 3. Bluetooth 4. ZigBee 5. nanonet 6. Roundup 16.07.2008 Network Standards 2
More informationTCP and Wireless Networks Classical Approaches Optimizations TCP for 2.5G/3G Systems. Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme
Chapter 2 Technical Basics: Layer 1 Methods for Medium Access: Layer 2 Chapter 3 Wireless Networks: Bluetooth, WLAN, WirelessMAN, WirelessWAN Mobile Networks: GSM, GPRS, UMTS Chapter 4 Mobility on the
More informationwww.mindteck.com 6LoWPAN Technical Overview
www.mindteck.com 6LoWPAN Technical Overview 6LoWPAN : Slide Index Introduction Acronyms Stack Architecture Stack Layers Applications IETF documents References Confidential Mindteck 2009 2 6LoWPAN - Introduction
More informationTCP for Wireless Networks
TCP for Wireless Networks Outline Motivation TCP mechanisms Indirect TCP Snooping TCP Mobile TCP Fast retransmit/recovery Transmission freezing Selective retransmission Transaction oriented TCP Adapted
More informationSecurity in Ad Hoc Network
Security in Ad Hoc Network Bingwen He Joakim Hägglund Qing Gu Abstract Security in wireless network is becoming more and more important while the using of mobile equipments such as cellular phones or laptops
More informationDesign and Implementation of Ad-hoc Communication and Application on Mobile Phone Terminals
Design and Implementation of Ad-hoc Communication and Application on Mobile Phone Terminals Yujin Noishiki Hidetoshi Yokota Akira Idoue KDDI R&D Laboratories, Inc. 2-1-15 Ohara, Fujimino-Shi, Saitama,
More informationWireless LAN advantages. Wireless LAN. Wireless LAN disadvantages. Wireless LAN disadvantages WLAN:
WLAN: Wireless LAN Make use of a wireless transmission medium Tipically restricted in their diameter: buildings, campus, single room etc.. The global goal is to replace office cabling and to introduce
More informationA Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks
A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.
More informationISSUES AND CHALLENGES OF QUALITY OF SERVICE IN MOBILE ADHOC NETWORK
ISSUES AND CHALLENGES OF QUALITY OF SERVICE IN MOBILE ADHOC NETWORK Mukesh Kumar Student (Ph.D) Department of Computer Engineering The Technological Institute of Textile and Science, Bhiwani-127021, Haryana
More informationUNIT 8:- Mobile Ad-Hoc Networks, Wireless Sensor Networks
UNIT 8:- Mobile Ad-Hoc Networks, Wireless Sensor Networks a Mobile Ad hoc NETwork (MANET) is one that comes together as needed, not necessarily with any support from the existing infrastructure or any
More informationLIST OF FIGURES. Figure No. Caption Page No.
LIST OF FIGURES Figure No. Caption Page No. Figure 1.1 A Cellular Network.. 2 Figure 1.2 A Mobile Ad hoc Network... 2 Figure 1.3 Classifications of Threats. 10 Figure 1.4 Classification of Different QoS
More informationRemote Home Security System Based on Wireless Sensor Network Using NS2
Remote Home Security System Based on Wireless Sensor Network Using NS2 #Rajesh Banala 1, Asst.Professor,E-mail: rajesh.banal@gmail.com #D.Upender 2, Asst.Professor, E mail: upender584@gmail.com #Department
More informationPerformance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc
(International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan dr.khalidbilal@hotmail.com
More informationBluetooth voice and data performance in 802.11 DS WLAN environment
1 (1) Bluetooth voice and data performance in 802.11 DS WLAN environment Abstract In this document, the impact of a 20dBm 802.11 Direct-Sequence WLAN system on a 0dBm Bluetooth link is studied. A typical
More informationIntelligent Agents for Routing on Mobile Ad-Hoc Networks
Intelligent Agents for Routing on Mobile Ad-Hoc Networks Y. Zhou Dalhousie University yzhou@cs.dal.ca A. N. Zincir-Heywood Dalhousie University zincir@cs.dal.ca Abstract This paper introduces a new agent-based
More informationFormal Measure of the Effect of MANET size over the Performance of Various Routing Protocols
Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols Er. Pooja Kamboj Research Scholar, CSE Department Guru Nanak Dev Engineering College, Ludhiana (Punjab) Er.
More informationSecurity for Ad Hoc Networks. Hang Zhao
Security for Ad Hoc Networks Hang Zhao 1 Ad Hoc Networks Ad hoc -- a Latin phrase which means "for this [purpose]". An autonomous system of mobile hosts connected by wireless links, often called Mobile
More informationCustomer Specific Wireless Network Solutions Based on Standard IEEE 802.15.4
Customer Specific Wireless Network Solutions Based on Standard IEEE 802.15.4 Michael Binhack, sentec Elektronik GmbH, Werner-von-Siemens-Str. 6, 98693 Ilmenau, Germany Gerald Kupris, Freescale Semiconductor
More informationCS263: Wireless Communications and Sensor Networks
CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 4: Medium Access Control October 5, 2004 2004 Matt Welsh Harvard University 1 Today's Lecture Medium Access Control Schemes: FDMA TDMA
More informationCHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs
CHAPTER 6 VOICE COMMUNICATION OVER HYBRID MANETs Multimedia real-time session services such as voice and videoconferencing with Quality of Service support is challenging task on Mobile Ad hoc Network (MANETs).
More informationSERVICE DISCOVERY AND MOBILITY MANAGEMENT
Objectives: 1) Understanding some popular service discovery protocols 2) Understanding mobility management in WLAN and cellular networks Readings: 1. Fundamentals of Mobile and Pervasive Computing (chapt7)
More informationCHAPTER 1 1 INTRODUCTION
CHAPTER 1 1 INTRODUCTION 1.1 Wireless Networks Background 1.1.1 Evolution of Wireless Networks Figure 1.1 shows a general view of the evolution of wireless networks. It is well known that the first successful
More informationComputer Networks. Wireless and Mobile Networks. László Böszörményi Computer Networks Mobile - 1
Computer Networks Wireless and Mobile Networks László Böszörményi Computer Networks Mobile - 1 Background Number of wireless (mobile) phone subscribers now exceeds number of wired phone subscribers! Computer
More informationECE/CS 372 introduction to computer networks. Lecture 13
ECE/CS 372 introduction to computer networks Lecture 13 Announcements: HW #4 hard copy due today Lab #5 posted is due Tuesday June 4 th HW #5 posted is due Thursday June 6 th Pickup midterms Acknowledgement:
More informationCSMA/CA. Information Networks p. 1
Information Networks p. 1 CSMA/CA IEEE 802.11 standard for WLAN defines a distributed coordination function (DCF) for sharing access to the medium based on the CSMA/CA protocol Collision detection is not
More informationPERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2
International Journal of Computer Engineering & Technology (IJCET) Volume 7, Issue 1, Jan-Feb 2016, pp. 01-08, Article ID: IJCET_07_01_001 Available online at http://www.iaeme.com/ijcet/issues.asp?jtype=ijcet&vtype=7&itype=1
More information4.1 CD 301 - BSc (Hons) Information Technology (Diploma to Degree Upgrade 1.5 Years Part Time)
4.1 CD 301 - BSc (Hons) Information Technology (Diploma to Degree Upgrade 1.5 Years Part Time) 1. OBJECTIVES This Programme is geared towards producing computer professionals, with a thorough understanding
More informationCCNA 1: Networking Basics. Cisco Networking Academy Program Version 3.0
CCNA 1: Networking Basics Cisco Networking Academy Program Version 3.0 Table of Contents CCNA 1: NETWORKING BASICS...1 TARGET AUDIENCE...3 PREREQUISITES...3 COURSE DESCRIPTION...3 COURSE OBJECTIVES...3
More informationAttenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction
Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit
More information4.1 CD304 - BSc (Hons) Information Technology (Diploma to Degree Top-up 1 year Full Time)
4.1 CD304 - BSc (Hons) Information Technology (Diploma to Degree Top-up 1 year Full Time) 1. OBJECTIVES The Programme is geared towards producing computer professionals, with a thorough understanding of
More information1 Introduction to mobile telecommunications
1 Introduction to mobile telecommunications Mobile phones were first introduced in the early 1980s. In the succeeding years, the underlying technology has gone through three phases, known as generations.
More informationMobile Communications Chapter 8: Network Protocols/Mobile IP
Mobile Communications Chapter 8: Network Protocols/Mobile IP Motivation Data transfer Encapsulation Security IPv6 Problems Micro mobility support DHCP Ad-hoc networks Routing protocols Prof. Dr.-Ing. Jochen
More informationLehrstuhl für Informatik 4 Kommunikation und verteilte Systeme
Chapter 2 Technical Basics: Layer 1 Methods for Medium Access: Layer 2 Chapter 3 Wireless Networks: Bluetooth, WLAN, WirelessMAN, WirelessWAN Mobile Telecommunication Networks: GSM, GPRS, UMTS Chapter
More informationComparative Study of Performance Evaluation for Mobile Ad hoc networks using a proxy node
Comparative Study of Performance Evaluation for Mobile Ad hoc networks using a proxy node G. E. RIZOS georizos@teiep.gr D. C. VASILIADIS dvas@teiep.gr E. STERGIOU ster@teiep.gr Abstract: In this paper,
More informationWireless Personal Area Networks (WPANs)
Wireless Personal Area Networks (WPANs) Bluetooth, ZigBee Contents Introduction to the IEEE 802 specification family Concept of ISM frequency band Comparison between different wireless technologies ( and
More informationLecture 1: Introduction
Mobile Data Networks Lecturer: Victor O.K. Li EEE Department Room: CYC601D Tel.: 857 845 Email: vli@eee.hku.hk Course home page: http://www.eee.hku.hk/courses.msc/ 1 Lecture 1: Introduction Mobile data
More informationChapter 6: Conclusion
Chapter 6: Conclusion In this research we have designed the bandwidth optimization control protocol to manage the proposed Dual-bandwidth data path for the CDMA2000-WLAN integrated network. The user s
More informationMobile Communications Chapter 9: Mobile Transport Layer
Mobile Communications Chapter 9: Mobile Transport Layer Motivation TCP-mechanisms Classical approaches Indirect TCP Snooping TCP Mobile TCP PEPs in general Additional optimizations Fast retransmit/recovery
More informationROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS
International Journal of Science, Environment and Technology, Vol. 1, No 2, 2012, 72-79 ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS Ramesh Kait 1, R. K. Chauhan
More informationConfiguration Notes Trapeze Networks Infrastructure in Ascom VoWiFi System
Configuration Notes Trapeze Networks Infrastructure in Ascom VoWiFi System Contents 1 Introduction... 1 1.1 Abbreviations and Glossary... 1 2 Configuration... 2 2.1 Radio Settings... 2 2.1.1 Radio Channels...
More informationIntroduction: Why do we need computer networks?
Introduction: Why do we need computer networks? Karin A. Hummel - Adapted slides of Prof. B. Plattner, plattner@tik.ee.ethz.ch - Add-on material included of Peterson, Davie: Computer Networks February
More informationGSM Network and Services
GSM Network and Services GPRS - sharing of resources 1 What is the problem? Many data applications are very bursty in its traffic pattern: http, smtp, pop, telnet,... Why reserve physical resources at
More informationTHE BCS PROFESSIONAL EXAMINATIONS BCS Level 5 Diploma in IT. October 2009 EXAMINERS' REPORT. Computer Networks
THE BCS PROFESSIONAL EXAMINATIONS BCS Level 5 Diploma in IT October 2009 EXAMINERS' REPORT Computer Networks General Comments The responses to questions were of marginally better quality than April 2009
More informationCROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING
CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility
More information8/27/2014. What is a computer network? Introduction. Business Applications (1) Uses of Computer Networks. Business Applications (2)
What is a computer network? Introduction Chapter 1 A number of separate but interconnected computers A collection of autonomous computers interconnected by a single technology COURSE FOCUS: design and
More informationSBSCET, Firozpur (Punjab), India
Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Layer Based
More informationIndustrial Networks & Databases
Industrial Networks & Databases LONWORKS KNX 1 HVAC and BEMS HVAC - Heating, Ventilation & Air Conditioning BEMS - Building & Energy Management Systems 2 3 4 LONWORKS (Local Operating Networks) Open solution
More information12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust
Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or
More informationMobile Computing/ Mobile Networks
Mobile Computing/ Mobile Networks TCP in Mobile Networks Prof. Chansu Yu Contents Physical layer issues Communication frequency Signal propagation Modulation and Demodulation Channel access issues Multiple
More informationWireless LANs vs. Wireless WANs
White Paper Wireless LANs vs. Wireless WANs White Paper 2130273 Revision 1.0 Date 2002 November 18 Subject Supported Products Comparing Wireless LANs and Wireless WANs Wireless data cards and modules,
More informationCCT vs. CCENT Skill Set Comparison
Operation of IP Data Networks Recognize the purpose and functions of various network devices such as Routers, Switches, Bridges and Hubs Select the components required to meet a given network specification
More informationWPAN. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1
Contents Bluetooth (IEEE 802.15.1) Network topology FHSS operation Link delivery services System architecture & protocols Usage models ZigBee (IEEE 802.15.4) Network topology Physical layer operation CSMA/CA
More informationWireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring 2011. Mike Freedman
1 Wireless Networks Reading: Sec5on 2.8 COS 461: Computer Networks Spring 2011 Mike Freedman hep://www.cs.princeton.edu/courses/archive/spring11/cos461/ 2 Widespread Deployment Worldwide cellular subscribers
More information10. Wireless Networks
Computernetzwerke und Sicherheit (CS221) 10. Wireless Networks 1. April 2011 omas Meyer Departement Mathematik und Informatik, Universität Basel Chapter 6 Wireless and Mobile Networks (with changes CS221
More informationSecurity and Scalability of MANET Routing Protocols in Homogeneous & Heterogeneous Networks
Security and Scalability of MANET Routing Protocols in Homogeneous & Heterogeneous Networks T.V.P. Sundararajan 1, Karthik 2, A. Shanmugam 3 1. Assistant Professor, Bannari Amman Institute Of Technology,
More informationSIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS
Journal of Engineering Science and Technology Vol. 4, No. 2 (2009) 243-250 School of Engineering, Taylor s University College SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS SHEENU SHARMA
More informationLecture 7 Multiple Access Protocols and Wireless
Lecture 7 Multiple Access Protocols and Wireless Networks and Security Jacob Aae Mikkelsen IMADA November 11, 2013 November 11, 2013 1 / 57 Lecture 6 Review What is the responsibility of the link layer?
More informationIntroduction to Ad hoc Networks
Introduction to Ad hoc Networks CS-647: Advanced Topics in Wireless Networks Drs. Baruch Awerbuch & Amitabh Mishra Department of Computer Science Johns Hopkins University Amitabh Mishra & Baruch Awerbuch
More informationPerformance Comparison of AODV, DSDV, DSR and TORA Routing Protocols in MANETs
International Research Journal of Applied and Basic Sciences. Vol., 3 (7), 1429-1436, 2012 Available online at http:// www. irjabs.com ISSN 2251-838X 2012 Performance Comparison of AODV, DSDV, DSR and
More informationGujarat University Syllabus M.Tech (Networking & Communications) II
Gujarat University M.Tech (Networking & Communications) II Subject Name: Network Security Subject Code: MTNT 121 Objectives: To enable students to learn The various security standards set by the global
More informationCPS221 Lecture: Layered Network Architecture
CPS221 Lecture: Layered Network Architecture Objectives last revised 9/10/12 1. To discuss the OSI layered architecture model 2. To discuss the specific implementation of this model in TCP/IP Materials:
More informationFirst Semester Examinations 2011/12 INTERNET PRINCIPLES
PAPER CODE NO. EXAMINER : Martin Gairing COMP211 DEPARTMENT : Computer Science Tel. No. 0151 795 4264 First Semester Examinations 2011/12 INTERNET PRINCIPLES TIME ALLOWED : Two Hours INSTRUCTIONS TO CANDIDATES
More informationFrom reconfigurable transceivers to reconfigurable networks, part II: Cognitive radio networks. Loreto Pescosolido
From reconfigurable transceivers to reconfigurable networks, part II: Cognitive radio networks Loreto Pescosolido Spectrum occupancy with current technologies Current wireless networks, operating in either
More informationAchieving Energy Efficiency in MANETs by Using Load Balancing Approach
International Journal of Computer Networks and Communications Security VOL. 3, NO. 3, MARCH 2015, 88 94 Available online at: www.ijcncs.org E-ISSN 2308-9830 (Online) / ISSN 2410-0595 (Print) Achieving
More informationMASTER THESIS REPORT MSc IN ELECTRICAL ENGINEERING WITH EMPHASIS ON TELECOMMUNICATION
MEE 09: 17 MASTER THESIS REPORT MSc IN ELECTRICAL ENGINEERING WITH EMPHASIS ON TELECOMMUNICATION TRASMISSION CONTROL PROTOCOL (TCP) PERFORMANCE EVALUATION IN MANET BLEKINGE INSTITUTE OF TECHNOLOGY MARCH
More informationWireless Technologies for Automation
Wireless Technologies for Automation Prof. Dr.-Ing. Jörg F. Wollert Wireless Technologies for Automation Why using wireless communication? Pros and cons in wireless networks Embedded Wireless Hardware
More informationTOWARDS STUDYING THE WLAN SECURITY ISSUES SUMMARY
TOWARDS STUDYING THE WLAN SECURITY ISSUES SUMMARY SUBMITTED TO THE KUMAUN UNIVERSITY, NAINITAL BY MANOJ CHANDRA LOHANI FOR THE AWARD OF THE DEGREE OF DOCTOR OF PHILOSOPHY IN COMPUTER SCIENCE UNDER THE
More informationAn Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks *
An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks * Inwhee Joe College of Information and Communications Hanyang University Seoul, Korea iwj oeshanyang.ac.kr Abstract. To satisfy the user requirements
More informationWireless LAN Concepts
Wireless LAN Concepts Wireless LAN technology is becoming increasingly popular for a wide variety of applications. After evaluating the technology, most users are convinced of its reliability, satisfied
More informationFigure 1. The Example of ZigBee AODV Algorithm
TELKOMNIKA Indonesian Journal of Electrical Engineering Vol.12, No.2, February 2014, pp. 1528 ~ 1535 DOI: http://dx.doi.org/10.11591/telkomnika.v12i2.3576 1528 Improving ZigBee AODV Mesh Routing Algorithm
More informationNokia Call Connect v1.1 for Cisco User s Guide. Part Number: N450000431 Rev 003 Issue 1
Nokia Call Connect v1.1 for Cisco User s Guide Part Number: N450000431 Rev 003 Issue 1 Reproduction, transfer, distribution or storage of part or all of the contents in this document in any form without
More informationTECHNICAL NOTE. GoFree WIFI-1 web interface settings. Revision Comment Author Date 0.0a First release James Zhang 10/09/2012
TECHNICAL NOTE GoFree WIFI-1 web interface settings Revision Comment Author Date 0.0a First release James Zhang 10/09/2012 1/14 Web interface settings under admin mode Figure 1: web interface admin log
More informationVolume 12 Issue 4 Version 1.0 Fabruary 2012 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals Inc.
Volume 12 Issue 4 Version 1.0 Fabruary 2012 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals Inc. (USA) Online ISSN: & Print ISSN: Voice Calls between Wireless
More informationIntroduction to IPv6 and Benefits of IPv6
Introduction to IPv6 and Benefits of IPv6 Ammar Yasir Korkusuz 2012 Bogazici University, Electrical-Electronics Engineering Department MSc. Student EE 545 TERM PROJECT Abstract: IPv6 is a new internet
More informationAn Evaluation of Security Services schemes For IEEE 802.11 Wireless LAN s Using Qualnet
An Evaluation of Security Services schemes For IEEE 802.11 Wireless LAN s Using Qualnet Richa Gupta 1, Hamid Ali 2, munendra kumar das 3, Shalini Chaudhary 4 P.G. Student, Department of Electronics and
More informationWHITE PAPER. Mobility Services Platform (MSP) Using MSP in Wide Area Networks (Carriers)
WHITE PAPER Mobility Services Platform (MSP) Using MSP in Wide Area Networks (Carriers) Table of Contents About This Document... 1 Chapter 1 Wireless Data Technologies... 2 Wireless Data Technology Overview...
More informationComputer Networks CS321
Computer Networks CS321 Dr. Ramana I.I.T Jodhpur Dr. Ramana ( I.I.T Jodhpur ) Computer Networks CS321 1 / 22 Outline of the Lectures 1 Introduction OSI Reference Model Internet Protocol Performance Metrics
More informationWireless Mesh Networks under FreeBSD
Wireless Networks under FreeBSD Rui Paulo rpaulo@freebsd.org The FreeBSD Project AsiaBSDCon 2010 - Tokyo, Japan Abstract With the advent of low cost wireless chipsets, wireless mesh networks became much
More informationOutline. Wireless System Integration WLAN. WAN Technologies ดร. อน นต ผลเพ ม LAN. WAN Server LAN. Wireless System Architecture Protocols
204526 Wireless LANs 1 st semester 2002 (June September) Wireless System Integration ดร. อน นต ผลเพ ม Anan Phonphoem, Ph.D. anan@cpe.ku.ac.th Intelligent Wireless Network Group (IWING Lab) http://iwing.cpe.ku.ac.th
More informationIP and Mobility. Requirements to a Mobile IP. Terminology in Mobile IP
IP and Mobility Chapter 2 Technical Basics: Layer Methods for Medium Access: Layer 2 Chapter Wireless Networks: Bluetooth, WLAN, WirelessMAN, WirelessWAN Mobile Telecommunication Networks: GSM, GPRS, UMTS
More informationLecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References
Lecture Objectives Wireless Networks and Mobile Systems Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks Introduce security vulnerabilities and defenses Describe security functions
More informationPerformance Evaluation of Large-Scale Wireless Sensor Networks Communication Protocols that can be Integrated in a Smart City
Performance Evaluation of Large-Scale Wireless Sensor Networks Communication Protocols that can be Integrated in a Smart City A. Lavric 1, V. Popa 2 PhD.,Computers, Department of Electronics and Automation,
More informationFast and Secure Data Transmission by Using Hybrid Protocols in Mobile Ad Hoc Network
Middle-East Journal of Scientific Research 15 (9): 1290-1294, 2013 ISSN 1990-9233 IDOSI Publications, 2013 DOI: 10.5829/idosi.mejsr.2013.15.9.11514 Fast and Secure Data Transmission by Using Hybrid Protocols
More informationCOMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 5 May, 2013 Page No. 1680-1684 COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK ABSTRACT: Mr.Upendra
More information