You are on page 1of 17

1. WHAT IS MEANT BY NON-PERSISTENT CSMA?

In this method, the station that has frames to send, only that station senses
for the channel. In case of an idle channel, it will send frame immediately to
that channel. In case when the channel is found busy, it will wait for the
random time and again sense for the state of the station whether idle or
busy. In this method, the station does not immediately sense for the
channel for only the purpose of capturing it when it detects the end of the
previous transmission. The main advantage of using this method is that it
reduces the chances of collision. The problem with this is that it reduces
the efficiency of the network.

2. WHAT IS MEANT BY P-PERSISTENT CSMA?

This is the method that is used when channel has time-slots and that
time-slot duration is equal to or greater than the maximum propagation
delay time. When the station is ready to send the frames, it will sense the
channel. If the channel found to be busy, the channel will wait for the next
slot. If the channel found to be idle, it transmits the frame with probability p,
thus for the left probability i.e. q which is equal to 1-p the station will wait
for the beginning of the next time slot. In case, when the next slot is also
found idle it will transmit or wait again with the probabilities p and q. This
process is repeated until either the frame gets transmitted or another
station has started transmitting.

3. WHAT DO YOU MEAN BY POLLING?

Pooling is the continuous checking of other programs or devices by one


program or device to see what state they are in, usually to see whether
they are still connected or want to communicate.

4. WHAT ARE THE TWO TYPES OF HANDOVER AVAILABLE IN GSM?

In cellular networks, base stations have a limited reach, to achieve connectivity


between mobile devices – which are mostly on the move – handover is
necessary. Handover or hand off is a process in telecommunication and mobile
communication in which cellular transmission (voice or data) is transferred from
one base station (cell site) to another without losing connectivity to the cellular
transmission. Handover is a core element in deploying mobile transmission as it
creates data sessions or connects phone calls between mobile devices which are
constantly on the move.

There are two types of handover. Soft handover and hard handover.

​ Hard handover: hard handover is one in which the channel source cell is
released before the channel in the target is engaged. In this type of
handover, the connection to the source is broken just before or along with
when the connection to the target is made. It is also called break before
making handover.
​ Soft handover: soft handover is one in which the source cell is retained
and works in parallel with the target cell for a while. In this case,
connection to the target cell is established before connection to the source
is broken. Soft handover allows a parallel connection between several
channels to provide better service. It is very effective in areas with poor
coverage.

5. WHAT ARE THE CATEGORIES OF MOBILE SERVICES?

GSM offers three basic types of services −


● Telephony services or teleservices
● Data services or bearer services
● Supplementary services

1. Teleservices
The abilities of a Bearer Service are used by a Teleservice to transport data.
These services are further transited in the following ways −

2. Voice Calls
The most basic Teleservice supported by GSM is telephony. This includes
full-rate speech at 13 kbps and emergency calls, where the nearest
emergency-service provider is notified by dialing three digits.
3. Videotext and Facsimile
Another group of teleservices includes Videotext access, Teletext transmission,
Facsimile alternate speech and Facsimile Group 3, Automatic Facsimile Group,
3 etc.

4. Short Text Messages


Short Messaging Service (SMS) service is a text messaging service that allows
sending and receiving text messages on your GSM mobile phone. In addition to
simple text messages, other text data including news, sports, financial,
language, and location-based data can also be transmitted.

5. Bearer Services
Data services or Bearer Services are used through a GSM phone. to receive
and send data is the essential building block leading to widespread mobile
Internet access and mobile data transfer. GSM currently has a data transfer rate
of 9.6k. New developments that will push up data transfer rates for GSM users
are HSCSD (high speed circuit switched data) and GPRS (general packet radio
service) are now available.

6. WHAT ARE THE SERVICES PROVIDED BY SUPPLEMENTARY SERVICES?

Supplementary services are additional services that are provided in addition to


teleservices and bearer services. These services include caller identification, call
forwarding, call waiting, multi-party conversations, and barring of outgoing
(international) calls, among others. A brief description of supplementary services
is given here −
● Conferencing − It allows a mobile subscriber to establish a multiparty
conversation, i.e., a simultaneous conversation between three or more
subscribers to set up a conference call. This service is only applicable to
normal telephony.
● Call Waiting − This service notifies a mobile subscriber of an incoming call
during a conversation. The subscriber can answer, reject, or ignore the
incoming call.
● Call Hold − This service allows a subscriber to put an incoming call on hold
and resume after a while. The call hold service is applicable to normal
telephony.
● Call Forwarding − Call Forwarding is used to divert calls from the original
recipient to another number. It is normally set up by the subscriber himself.
It can be used by the subscriber to divert calls from the Mobile Station
when the subscriber is not available, and so to ensure that calls are not
lost.
● Call Barring − Call Barring is useful to restrict certain types of outgoing
calls such as ISD or stop incoming calls from undesired numbers. Call
barring is a flexible service that enables the subscriber to conditionally bar
calls.
● Number Identification − There are following supplementary services related
to number identification −
○ Calling Line Identification Presentation − This service displays the
telephone number of the calling party on your screen.
○ Calling Line Identification Restriction − A person not wishing their
number to be presented to others subscribes to this service.
○ Connected Line Identification Presentation − This service is provided
to give the calling party the telephone number of the person to whom
they are connected. This service is useful in situations such as
forwarding's where the number connected is not the number dialed.
○ Connected Line Identification Restriction − There are times when the
person called does not wish to have their number presented and so
they would subscribe to this person. Normally, this overrides the
presentation service.
○ Malicious Call Identification − The malicious call identification service
was provided to combat the spread of obscene or annoying calls.
The victim should subscribe to this service, and then they could
cause known malicious calls to be identified in the GSM network,
using a simple command.

7. WHAT ARE THE INFORMATION IN SIM?

Information Stored On A SIM Card


1. Advice of Charge (AoC):
This is a GSM (Global System for Mobile Communications) service, which
estimates the costs of the mobile services.

2. Authentication Key (Ki)


It is unique for each SIM. It consists of a 128-bit value used to authenticate
the SIM card on the network.

3. International Mobile Subscriber Identity (IMSI)


It is a number that identifies your SIM card within your mobile network
operator.

4. Mobile Country Code (MCC)


It represents the first three digits of the IMSI number. Together with the
Mobile Network Code (MNC), identify GSM networks worldwide.

5. Mobile Subscriber Identification Number (MSIN)


This number identifies a subscriber from a mobile network. It works as a
link between the network and the user.

6. Mobile Station Integrated Services Digital Network (MSISDN)


It is the phone number you need to dial to establish communication. It can
be changed if the subscriber requires it.

7. Local Area Identity (LAI)


This code works as an identifier and is composed of the mobile country
code (MCC), the mobile network code (MNC), and a location area code
(LAC).

8. Personal Identification Number (PIN)


It is a code used to lock and unlock the mobile device. The mobile operator
provides it but it can be changed if necessary. It is usually made up of four
digits, and can also be disabled.

9. Service Dialing Number (SDN)


They are numbers provided by the mobile operator, which the user can use
to access services such as check current balance or voicemail.

10. Service Provider Name (SPN)


The name of your mobile operator.

11.Short Message Service Center (SMSC)


The service center that stores, processes and delivers your text messages
(Short Message Service).

12. Unblocking Code (PUK)


This code is used when the user enters the wrong PIN code three times.
The phone locks and asks for the PUK code that is provided by the mobile
operator. If you enter the PUK code wrong more than 10 times, you will
lock the SIM card without the chance of getting it back.

13. Integrated Circuit Card ID (ICCID)


It is a number that identifies a SIM card. It consists of an 18 – 22 digits
code, which is unique for each SIM card in the world. There are not two
SIM cards with the same information stored.

14. Value-Added Services (VAS)


It refers to additional services, which the customer uses and pays for.

8. DEFINE NORMAL BURST?

This GSM burst is used for the standard communications between the
base station and the mobile, and typically transfers the digitized voice data.

9. WHAT IS THE FUNCTION OF MEDIUM ACCESS CONTROL LAYER?

The MAC layer functions as an adaptation layer between the physical layer
and the upper protocol layers. Its main task is to receive MAC service data
units (MSDUs) from the layer above, encapsulate them into MAC protocol
data units (MPDUs) and pass them down to the physical layer for
transmission.

10. WHAT IS MEANT BY GEO? WHAT ARE THE ADVANTAGES OF GEO? WHAT
ARE THE REGISTERS MAINTAINED BY THE GATEWAY OF SATELLITE?

Geolocation is the process of finding, determining and providing the exact


location of a computer, networking device or equipment. It enables device
location based on geographical coordinates and measurements.

Geolocation commonly uses Global Positioning System (GPS) and other related
technologies to assess and specify geographical locations.

11. ADVANTAGES OF MEO? WHAT ARE THE ADVANTAGES OF LEO?

Advantages of MEO orbit. MEO satellites are launched at a lesser height


compared to GEO satellites. Hence time delay from earth to satellite and
viceversa is less (about 40 ms) compared to GEO satellites (about 120
ms). It requires slightly higher transmission power compared to LEO
satellites.

The advantage of LEO systems is that the satellites’ proximity to the


ground enables them to communicate with minimal time delay. Thus for
services that are delay sensitive such as voice communication, these
constellations are ideal.

12. WHAT IS MEANT BY BEACON?

Beacon is a small bluetooth device that repeatedly transmits signals that


other devices like your smartphone can see. Beacon broadcasts a radio
signal that is a combination of letters and numbers approximately every
1/10th of a second. All smartphones “see” beacons when they receive a
signal, much like sailors see light from a lighthouse.
Beacons deliver campaigns, help navigate and collect customer data.
Beacons are one of the best ways to establish connection with your
customers in a physical world. They trigger and deliver proximity
campaigns to a person's phone based on his/hers location. Beacons also
enable them to collect important data on customer behavior and increase
their engagement.

13. WHAT IS THE PRIMARY GOAL OF IEEE 802.11?

The primary goal of the standard was the specification of a simple, robust,
WLAN which offers time-bounded and asynchronous services. Also, it
should be able to operate with multiple physical layers.

14. WHAT ARE THE ADVANTAGES OF WIRELESS LAN? WHAT ARE THE
DESIGN GOALS OF WIRELESS LAN?

● It’s a reliable sort of communication.


● As WLAN reduces physical wires so it’s a versatile way of
communication.
● WLAN also reduces the value of ownership.
● It’s easier to feature or remove workstation.
● It provides a high rate thanks to small area coverage.
● You’ll also move the workstation while maintaining the connectivity.
● For propagation, the sunshine of sight isn’t required.
● The direction of connectivity is often anywhere i.e. you’ll connect
devices in any direction unless it’s within the range of access point.
● Easy installation and you would n't need extra cables for installation.
● WLAN are often useful in disaster situations e.g. earthquake and fire.
WIreless network can connect people in any disaster
● It's economical due to the tiny area access.
● The amount of power it requires is more as it uses a transmitter;
therefore, the battery life of laptops can be affected.
● Design of wireless LANS must incorporate features to enable a mobile user
to quickly set up and access network services in a simple and efficient
manner.

15. WHAT ARE THE ADVANTAGES AND DISADVANTAGES OF INFRARED?

Advantages of Infrared sensor :


Following are the benefits of Infrared sensor :
● It makes sure about correspondence because of the view or highlight
point method of correspondence.
● The battery utilized in infrared gadgets keeps going for long term
because of lower power utilization.
● Infrared movement sensors identify movement in daytime and evening
dependably.
● The sensor doesn’t need any contact with the item to be detected. The
infrared gadgets are more proper for targets which are closer than 10
mm.
● Infrared gadgets can quantify distance to delicate items which may not
be effortlessly identified by ultrasound.
● They are truly more modest in size and are more moderate.
● It has reaction time quicker than thermocouple.
● It gives great soundness after some time.
● No consumption or oxidation can influence the precision of an infrared
sensor.
● It conveys high repeatability.

Disadvantages of Infrared sensor :


Following are the burdens of Infrared sensor :
● Infrared frequencies are influenced by hard articles (for example
dividers, entryways), smoke, dust, haze, daylight and so on Thus it
doesn’t work through dividers or entryways.
● Infrared waves at high force can harm eyes.
● In screen and control applications, it can control just a single gadget at
one time. Additionally it is hard to control things which are not in LOS
(Line of Sight). It requires a view among the transmitter and collector to
convey.
● It underpins more limited reach and consequently its execution corrupts
with longer distances.
● It upholds lower information rate transmission contrast with wired
transmission.

16. WHAT DO YOU MEANT BY ROAMING? WHAT IS MOBILE ROUTING?


DEFINE MOBILE IP.

Roaming refers to a wireless network service extension in an area that


differs from the registered home network location. Roaming enables a
mobile device to access the Internet and other mobile services when out of
its normal coverage area. It also gives a mobile device the ability to move
from one access point to another.

Mobile Routing :

Goal is to allow a host to be disconnected from one network and connected to


another

– With normal IP addresses, host would either become unreachable, or it would


need to get a new IP address somehow (DHCP, manual reconfiguration)

– Want to create a transparent mechanism for relocation – “Mobile IP”

Mobile IP :

Mobile node assigned permanent home

address

• Add functionality to one router, the home router

– Router attached to original, or home, network of mobile node (same


network number as home address)

– Serves as home agent for mobile node

17. EXPLAIN HOME AGENT, FOREIGN AGENT, MOBILITY BINDING,


TUNNELING, ENCAPSULATION IN RELATION TO MOBILE IP.

18. EXPLAIN THE BASIC REQUIREMENTS OF MOBILE IP.


● Compatibility
● Transparency
● Scalability and Efficiency
● Security

19. DESCRIBE LOCALIZATION AND CALLING IN GSM. DESCRIBE THE TYPES


OF WIRELESS APPLICATIONS

The GSM system always knows where a user is currently located, and the
same phone number is valid worldwide. To have this ability the GSM
system performs periodic location updates, even if the user does not use
the MS, provided that the MS is still logged on to the GSM network and is
not completely switched off. The HLR contains information about the
current location, and the VLR that is currently responsible for the MS
informs the HLR about the location of the MS when it changes. Changing
VLRs with uninterrupted availability of all services is also called roaming.
Roaming can take place within the context of one GSM service provider or
between two providers in one country, however this does not normally
happen but also between different service providers in different countries,
known as international roaming.
To locate an MS and to address the MS, several numbers are needed:
MSISDN (Mobile Station International ISDN Number)16. The only
important number for the user of GSM is the phone number, due to the fact
that the phone number is only associated with the SIM, rather than a
certain MS. The MSISDN follows the E.164, this standard is also used in
fixed ISDN networks.
IMSI (International Mobile Subscriber Identity). GSM uses the IMSI for
internal unique identification of a subscriber.
TMSI (Temporary Mobile Subscriber Identity). To disguise the IMSI that
would give the exact identity of the user which is signaling over the radio
air interface, GSM uses the 4 byte TMSI for local subscriber identification.
The TMSI is selected by the VLR and only has temporary validity within the
location area of the VLR. In addition to that the VLR will change the TMSI
periodically.
MSRN (Mobile Station [Subscriber] Roaming Number)17. This is another
temporary address that disguises the identity and location of the
subscriber. The VLR generates this address upon request from the MSC
and the address is also stored in the HLR. The MSRN is comprised of the
current VCC (Visitor Country Code), the VNDC (Visitor National
Destination Code) and the identification of the current MSC together with
the subscriber number, hence the MSRN is essential to help the HLR to
find a subscriber for an incoming call.

20. DISCUSS DATA MANAGEMENT IN MOBILE COMPUTING. HOW IS IT


ACHIEVED?

Data management technology that can support easy data access from and to
mobile devices is among the main concerns in mobile information systems.
Mobile computing may be considered a variation of distributed computing. The
two scenarios in which mobile databases is distributed are: Among the wired
components, the entire database is distributed, possibly with full or partial
replication. A base station or fixed host manages its own database with a DBMS
like functionality, with additional functionality for locating mobile units and
additional query and transaction management features to meet the requirements
of mobile environments.
Among the wired and wireless components, the database is distributed. Among
the base stations or fixed hosts and mobile units, the data management
responsibility is shared.
Here are some of the issues which arises in data management of the mobile
databases:
1. Mobile database design –
Because of the frequent shutdown and for handling the queries, the global name
resolution problem is compounded.
2. Security –
The data which is left at the fixed location is more secure as compared to mobile
data. That is mobile data is less secure. Data are also becoming more volatile
and techniques must be able to compensate for its loss. The most important
thing needed in this environment is the authorizing access to critical data and
proper techniques.
3. Data distribution and replication –
Uneven distribution of data among the mobile units and the base stations take
place here. Higher data availability and low cost of remote access is there in data
distribution and replication. The problem of Cache management is compounded
by the consistency constraints. The most updated data and frequently accessed
data is provided by the Caches to the mobile units. It process their own
transactions. There is most efficient access of data and higher security is
available.
4. Replication issues –
There is increase of costs for updates and signaling due to increase in number of
replicas. Mobile hosts can move anywhere and anytime.
5. Division of labor –
There is a certain change in the division of labor in query processing because of
certain characteristics of the mobile environment. There are some of the cases in
which the client must function independently of the server.
6. Transaction models –
In mobile environment, the issues of correctness of transactions and fault
tolerance are aggravated. All transactions must satisfy the ACID properties,
these are atomic, consistency, isolation, and durability.
Depending upon the movement of the mobile unit, possibly on multiple data sets
and through several base station, a mobile transaction is executed sequentially.
When the mobile computers are disconnected, ACID properties gets hard to
enforce. Because of the disconnection in mobile units, there is expectation that a
mobile transaction will be lived long.
7. Recovery and fault tolerance –
Fault tolerance is the ability of a system to perform its function correctly even in
the presence of internal faults. Faults can be classified in two types: transient and
permanent. Without any apparent intervention, a transient fault will be eventually
disappeared but a permanent fault will remain unless it is removed by some
external agency.
The mobile database environment must deal with site, transaction, media, and
communication failures. Due to limited battery power there is a site failure at MU.
If a voluntary shutdown occurs in MU, then it should not be treated as a failure.
Whenever Mu crosses the cells, most frequently there will be a transaction
failures during handoff. Due to failure of MU, there is a big cause of network
partitioning and affection of the routing algorithms. The characterization of mobile
computing is done by:
● Limiting resource availability
● Frequent disconnection
● High mobility
● Low bandwidth

8. Location based service –


One of the most challenging tasks which must be undertaken is determining the
location of mobile users, which must be undertaken in order to enable a location
based service. A cache information becomes sale when clients move location
dependent. Eviction techniques are important in this case.Issues that arises in
location and services are:
● User Privacy
● Diverse mobile mapping standards
● Market capability
● Interoperability

Updation of the location dependent queries and then applying spatial queries to
refresh the cache causes a problem.
9. Query processing –
Because of the mobility and rapid resource changes of mobile units, Query
optimization becomes the most complicated. That is query processing is affected
when mobility is considered. There is a need to returned a query response to
mobile units that may be in transit.The cost that affects the most in centralized
environments is the input/output.
Communication cost is the most important in distributed environments. It is
possible to formulate location dependent queries. There is difficulty in estimating
the communication costs in distributed environments because the mobile host
may be situated in different locations. There is a requirement of dynamic
optimization strategies in the mobile distributed context.

21. WHAT IS LOCATION MANAGEMENT.

Location management is an important area of mobile computing. Location


management in mobile networks deals with location registration and
tracking of mobile terminals. The location registration process is called
location update and the searching process is called paging. Various types
of location management methods exist such as mobility based location
management, data replication based location management, signal
attenuation based location tracking, time, zone and distance based
location update etc. In this paper, existing location management schemes
are discussed and compared with respect to their cost consumption in
terms of bytes. Finally the key issues are addressed in the context of
location management for future generation mobile networks. Different
types of location management schemes for mobile networks are
discussed.The location management cost in terms of message is
calculated for these schemes.Comparative analysis is performed between
the methods based on cost.Future scopes of location management are
also explored.

22. EXPLAIN CODA. TWO MODES OF OPERATION IN CODA.

Coda is a distributed file system with its origin in AFS2. It has many
features that are very desirable for network filesystems. Currently, Coda
has several features not found elsewhere. disconnected operation for
mobile computing. is freely available under a liberal license.

23. DEFINE VENUS PROCESS. WHAT ARE THE DIFFERENT STATES THAT A
VENUS PROCESS CAN BE IN.

Venus is implemented as a user-level process instead of kernel level


process, this is to increase the portability of the system.
24. WHAT IS MOBILE AGENT? DRAW THE LIFE CYCLE OF MOBILE AGENT.

Mobile Agent is an autonomous program that is capable of moving from host to host in
a network and interact with resources and other agents. In this process, the chance of
data loss is scarce because the state of the running program is saved and then
transported to the new host. It allows the program to continue execution from where it
left off before migration. The most significant advantage of mobile agents is the
possibility of moving complex processing functions to the location where you have
enormous amounts of data and that have to be processed.

You might also like