Tuesday, 29 October 2013

// // 1 comment

GTU Paper Solution For Mobile Computing Free Download


Solution of GTU-PAPERS

Unit -1: Mobile Computing Introduction 

11. What are three ways of content and behaviour adaptation? Mention various types of context information used for content adaptation.                                 (May 2013)

The mobile computing environment must be context independent as well as context sensitive. Context information is the information related to surrounding of the actor in that environment.

All the information that helps to determine the state of the object is called context. The context data is captured so that decisions can be made about how to adapt content or behavior to suit this context. The content and behavior of applications should be adapted to suit the current situation.

The following are the three ways of content and behavior adaptation.

1) Content with context awareness
There are different services for different client context.
For example: if a bank decides to provide mobile banking applications through internet, PDA and mobile phones using WAP then the services are http://mybank.com/inet.html, http://mybank.com/palm.html and  http://mybank.com/wap.wml respectively.

http://mybank.com/inet.html will assume that user is using computers to access this service. So it offers big pages with text boxes and drop down menus. It may also contain high resolution pictures and animations.

http://mybank.com/palm.html is a service for palmOS PDA. As the display size is small, screen size should be compact and no high resolution images or animations should be displayed.

http://mybank.com/wap.wml is for mobile phones so the drop down options available will be replaced by option button and all graphics and animations are removed.

2) Content switch on context
 In this case, the service is same for internet, PDA and WAP. All access banking services through http://mybank.com/. The code identifies the agent to decide what type of device or context it is. This intelligent code does the adaptation at run time based upon the agent. Agent will decide whether to route the request to http://mybank.com/inet.html, http://mybank.com/palm.html or http://mybank.com/wap.wml

3) Content transcoding on context
Other way is performing adaptation of content based on the context and behavior of the device. This adaption happens transparent to the client and application. The middle ware is intelligent to identify the context either from the http parameters or additional customized parameters. In this case the service may be in html or xml, the middleware platform transcode the code from html to wml.



2.  Explain three tier architecture of Mobile Computing. (May 2013, june 2012, dec 2012)        




Presentation tier
       User facing system
      Runs on client’s device
      Offers all user interface
      Present the information to the user
      Mozilla, IE, NN, customized client programs, applet running on browser
Application tier
      Behaves as engine of application
      Processes input, obtaining data and making decisions
      Presentation and database independent
      Java, JSP, .NET, PHP, ColdFusion
      Functions other then business logic are network management, security, database access
      Middleware
      Software between user interface and operating system
      Types of middleware
Database tier

3     3. Explain difference between 1st , 2ndand 3rd generation of wireless network networks (june 2012)

1stgeneration
Analog technology
Introduced in 80’s in UK by Vodafone
Operates on
a.      Frequency division multiple access (FDMA)
b.      900MHz frequency range

Breaks up the available frequency into 30 KHz channels
            • Allocates a single channel to each phone call
            • The channel is agreed with the Base station before transmission takes place on agreed and reserved channel
            • The device can then transmit on this channel
                        – No other device can share this channel
                        – A different channel is required to receive
As the communication is analog, large data is need to be transmitted.
      Poor voice quality
      Poor battery life
      Large phone size
      No security
      Frequent call drops
      Poor handoffs

2nd generation
      2G networks are digital
      Operates on
     TDMA
     CDMA
      Speech compression
Improved security
      GSM was primary service provided by 2G
      Initially data rate limited to 9.6 Kbps
      Then enhanced to 57.6 Kbps
      Applications
     Text and SMS
     Internet on mobile

3rd generation
      Wide range of advanced services
      Vision of 3G technology
     Global roaming
     Multimedia (voice, data and video)
     Increased data rates
     384 kbps while moving
     2 Mbps when stationary at specific locations
     Phone calls/ fax
     Global roaming
     Send/receive large email messages
     High speed web
     Navigation / maps
     Video conferencing
     TV streaming
     Speed: 200 kb/sec-2mb/sec
Limitations
Challenge to build necessary infrastructure for 3G
Expense of 3G



44.     Explain TDMA, FDMA, CDMA, SDMA (june 2012, nov 2011)




      Radio channel is shared by multiple users.
      Need to provide and control simultaneous access
      Avoid collision
      Fixed or predetermined allocation of channel resources
      Dynamic allocation

      FDMA – single band, single user
      TDMA – single band, multiple time slots
               Single time slot, single user
      CDMA – same band, same time slot, multiple users
Explanation is given in above answer.



Unit -2: Mobile Technologies 




55.     How does a new Bluetooth device discover a Bluetooth network? Describe the security principles in Bluetooth. (May 2013,dec 2012)

      Operates at 2.4 GHz (2400 -2480MHz) ISM frequency band
     Unlicensed
      79 channels spaced 1MHz apart from 2.402 GHz to 2.480GHz
      Power levels
     1mW  covering 10cm to 100mW covering 100meters
      Unicast as well as multicast
      Follows master – slave architecture
      Slave has to wait till master allows them
      Each terminal can be either M or S
      One M is master of maximum 7 S
      One S can be member of other piconet too
      SB – not getting access
      P – low power mode
      M –laptop
      S – mouse, keyboard, printer, projector





Multiple piconet
At least one S in other piconet 



      When two Bluetooth devices are brought into each other’s range they will notice each other and make a connection.
      Known as “paging”. Each device will send “I am here” message regularly within its range.
      Once they do hit on a common frequency, the device that “found” other device becomes a master and the other becomes a slave
Security parameters
      Operates in 3 modes
     Mode 1
      No security
      No use of Encryption algorithms
     Mode 2
      Use encryption for communication with specific devices but not for broadcast messages
     Mode 3
      Uses encryption for all data/devices

66.    Explain GSM architecture ( may 2013 )  




      GSM network divided into four groups
     Mobile station (MS)
      Mobile equipment (ME)
      Subscriber identity module (SIM)
     Base station subsystem (BSS)
      BTS
      BSC
     Network and switching subsystem (NSS)
      MSC
      Home location register (HLR)
      Visitor location register (VLR)
      Equipment identity register (EIR)
      Authentication center (AUC)
     Operation and support subsystem (OSS)
      Operation maintenance center (OMC)





Mobile station
      Mobile or cellular phone
      Two main element
     ME
     SIM
      Without SIM, terminal is not operational
      SIM contains IMSI – international mobile subscriber identity
     Unique and secret key for the authentication 
BSS
      BSS connects MS and NSS
      Two parts
     BTS
     BSC
      BTS- Transreceiver and antennas
      Large urban area contains large number of BTS deployed in it
      Power of BTS and number of user, defines the size of cell
      BSC provides connection between BTS and MSC
      Manages the radio resources for one or more BTS
      Handles handover, radio- channel setup, controlling radio frequency, power level of BTS, frequency hopping
NSS
      Responsible for network operation
      Provides communication with other wired and wireless devices
      Switch that communicates with other switches and provide support functionalities to cellular environment
      MSC with HLR and VLR, provides the call routing and roaming capabilities
      HLR stores information of subscribers belonging to the covering area of MSC
      HLR contains all administrative information
      Address
      Service type
      Current location
      Billing information
      Authentication/ cipher keys
      Roaming is enabled or not
      Auxiliary services like voice mail
      International calls allowed or not
      Pointer to VLR
      Power off status of ME
      HLR is fixed and stored in home network
      VLR moves with the subscriber
      Assigns  TMSI to MS
      VLR can be considered as temporary copy of some important information stored in HLR
      VLR is similar to cache, HLR is persistent storage
      When a MS enters the covering area of a new MSC, the VLR associated with this MSC will request information about it from HLR
      GMSC (gateway MSC)
      Node interconnecting two networks
      Interface between cellular network and PSTN (public switched telephone network )
      Call routing from fixed to GSM network and vive versa
      GIMSC (GSM interworking unit )
      Interface to various networks of data communications
      AUC
      Different algorithms used for authentication of ME
      Different classes of SIM have different algorithms
      Stores the secret key
      Verify the user’s identity
      EIR
      List of all valid mobile equipment in network
      Each ME identified by IMEI
      IMEI marked as invalid, if its not approved or stolen 
      Prevents the call from unauthorized terminal
OSS
      Controls and monitors the GSM system
      Controls the traffic load of BSS
      Main functions
     Maintain all hard ware’s and network operation
     Manage charging and billing procedure

77.    List various handoffs carried out in GSM and explain them (dec 2012, dec 2011)
Handover 

Internal ( involve one BSC)
Channels (time , frequency slots) in same cells
Cells (BTS) under control of same BSC
External (handled by MSC)
Cells under control of different BSCs, but belongs to same MSC
Cells under control of different MSC
Hard handover
Soft handover 




      Inter cell handover
      Inter MSC handover
      Inter BSC handover
      Inter BSC, Inter MSC handover
      Intra cell
      Inter cell, intra BSC
      Inter cell, intra MSC 

88.     Explain mobility management, call routing and roaming in GSM (july 2012)

UMTS and GSM are each made up of separate cells (base stations) that cover a specific geographical area. All base stations are integrated into one area, allowing a cellular network to cover a wider area (location area).

The location update procedure allows a mobile device to notify a cellular network when shifting between areas. When a mobile device recognizes that an area code differs from a previous update, the mobile device executes a location update, by sending a location request to its network, prior location and specific Temporary Mobile Subscriber Identity (TMSI). A mobile device provides updated network location information for several reasons, including reselecting cell location coverage due to a faded signal.

Location area includes a group of base stations assembled collectively to optimize signalling. Base stations are integrated to form a single network area known as a base station controller (BSC). The BSC manages allocation of radio channels, acquires measurements from cell phones, and handles handovers from one base station to another.

Roaming is among the basic procedures of mobility management. It enables subscribers to use mobile services when moving outside of the geographical area of a specific network.



99)     Explain RFID (nov 2011 ) explain active and passive RFID with applications of each (dec 2012)

      Uses radio-frequency waves to transfer data between a reader and item to identify, categorize, track.
      Entity in manufacturing
      Goods in transit
      Items in retail store
      Vehicle in parking area
      Tracking animals
      Books in library
      Does not require physical sight or contact.
      Transponder is a device that emits an identifying signal in response to an interrogating received signal.
      RFID is a transponder(tags) carrying an ID that can be read through radio interfaces.
      RFID Tags are attached to the object

 

      Active
     Powered by internal battery
     Read/write
     Higher storage facility
     Memory from few bytes to 1 MB
     Greater cost and limited operational life
     Longer read range
      Passive
     Do not require power – Draws from antenna
     Lower storage capacities (few bits to 1 KB)
     Shorter read ranges
     Usually Write-Once-Read-Many/Read-Only tags
     Cheaper
     High operational life time

110) What are the limitations of traditional IP? How mobile IP works? (june 2012, dec 2012)

      IP assumes end hosts are fixed
     What if they move between networks
      IP address enables routing algorithms to send packets to correct network
      What if a user wants to roam between network
     Mobile users don’t want to know that they are moving between networks
      Data connection between two end points requires a source IP, source TCP port, target IP, target TCP port
      TCP port is application specific and remains constant
      IP address is network specific
      Mobile node moves from one subnet to other, so IP will also change and connection will terminate
Working of IP
      IP address of node
     Network address
     Node address
      Network address used by routers to deliver packets the router of that particular network
      Node address is used by router to send that packet to the node
      IP changes when node moves from one subnet to other
      Conventional IP is not feasible
      Solution – two IP address
     Home  address
     Care -of address
      Mobile node (MN)
     Change point of attachment from one network to other
      Home address
     Original static IP
      Care-of address
     Changes at each new point of attachment
     Location specific address
      Home agent
     Located on home network
     Forwards packets to appropriate network when MN is away from home network
     Communicate with MN all the time independent of its location
     HA must know physical location of MN
      Foreign agent
     When MN enters foreign network, it registers to foreign agent
     It provides care-of address
     Foreign agent communicates this address to home agent 





      Step 1
     Server X wants to transmit packet to node A
     Home address of A is known to X
     X does not know whether A is in home network or not
     X sends packet to A’s home address as destination address
      Step 2
     Packet is intercepted by home agent
     A is in foreign network
     COA is allocated to A and it is available to HA
     Packet is retransmitted
      Step 3
     In foreign network, the packet is intercepted by FA.
     It delivers packet to A.
      Step 4
     A responds to this message to X via FA
      Step 5
     FA sends reply to X

111)Explain tunnelling and encapsulation. (may 2013, nov 2011)

·        When the mobile node moves, it registers its new care of address with its home agent.
·        the home agent forwards the packets to the foreign network using the care of address,
·        the delivery requires that the packet header is modified so that the care of address becomes the destination IP address,
·        this new header encapsulates the original packet, causing the mobile node’s home address to have no impact on the encapsulated packets packet’s routing. This process is called encapsulation.
·        In the mobile IP, IP within IP encapsulation mechanism is used. Using IP-within IP
·        the home agent, adds a new IP header called tunnel header.
·        The new header uses the mobile node’s care of address as the tunnel destination IP address.
·        The tunnel source IP address is the home agent’s IP address.
·        The entire original IP header is preserved as the first part of the payload of the tunnel header.
·        The foreign agent after receiving the packet, drops the tunnel header and delivers the rest to mobile node.

112)Explain the working of wimax. And differentiate wimax and wifi technology. (june 2012, dec 2012)

      The Goal is to Provide high-speed Internet access to home and business subscribers, without wires.
      Alternative names are as follow:
      Wireless broadband
      Wireless MAN
      WLL – wireless local loop
      WiMax- world wide interoperability for microwave access
      Combination of voice, data and video
      Interoperability and high data rate
      Provides up to 10Mbps bandwidth without need of cables
      Exterior antenna communicating with radio base stations
      Network can be created just in few weeks by deploying small number of base stations on buildings or poles
      Initial investment in wired system is very high
      In wireless system, Active users are always fraction of the total subscribers




      Wireless LANs (WiFi – IEEE 802.11)
     infrastructure as well as ad-hoc networks
     home/office networking
      Wireless MANs (WiMAX-802.16)
     Similar to cellular networks
     traditional base station infrastructure systems


113)What are various strengths of SMS? State the application areas where these strengths can be used? (dec 2012, may 2013)

      Omnibus nature of SMS
     International calling functionality required
     No such additional functionality required for SMS
      Stateless and session less
     No sessions or previous state info maintained
      Asynchronous
     No such pair of request and response or acknowledgement 
      Self configurable and last mile problem resistant
      Nonrepudiable
     Msg contains SC address and MSISDN number
     Not easy to handcraft
     Can be identified it so
      Always connected

114)What is difference between SM-MT and SM-MO? (june 2012)









      Once a message is sent, it is received by a Short Message Service Center (SMSC), then it must send the msg to appropriate terminal.
      To do this, the SMSC sends a SMS Request to (HLR) to find the roaming customer.
      Once the HLR receives the request, it will respond to the SMSC with the subscriber's status: 1) inactive or active 2) where subscriber is roaming.
      If the response is "inactive", then the SMSC will hold the message for a period of time.
      When the subscriber accesses his device, the HLR sends a SMS Notification to the SMSC, and the SMSC will attempt delivery.
      The SMSC receives verification msg, then the message is marked as "sent" and will not attempt to send again.

115  )Explain push and pull service in SMS. (nov 2011)

      Push
     Ex bank sending some account details to customer’s phone
     Mobile marketing and alert msgs 






      Pull
     Sent from user’s mobile
     Ex HDFC’s customer wants to know the balance then, he will send HDFCBAL to 333
     MS -> MSC -> GMSC/ IWMSC -> SC -> SME -> Enterprise server

116)   Explain direct and indirect snooping TCP. (nov 2011,june 2012,dec 2012)

·        Problems with traditional TCP are as follow:
·        Slow start mechanism in fixed networks decreases the efficiency of TCP if used with mobile receivers or senders.
·        Error rates on wireless links are orders of magnitude higher compared to fixed fiber or copper links.
·        Mobility itself can cause packet loss. There are many situations where a soft handover from one access point to another is not possible for a mobile system
·        Standard TCP reacts with slow start if acknowledgements are missing, which does not help in the case of transmission errors over wireless links and which does not really help during handover. 




·        It Splits a TCP connection at the foreign agent into 2 TCP connections
·        The hosts in the fixed part of the network do not notice the characteristics of the   wireless part
·        No changes to the TCP protocol for hosts connected to the wired Internet, millions of computers use (variants of) this protocol
·        Optimized TCP protocol is used for mobile host
·        The access point acts as proxy in both direction
·        AP acknowledges to both the sender and receiver
·        Re-transmission on wireless links is handled locally.
·        During handover, the buffered packets, as well as the system state (packet sequence number, acknowledgements, ports, etc), must migrate the new agent.


Unit -3: General Packet Radio Service (GPRS) 



117)  Explain architecture of GPRS ( nov 2011,june 2012, may 2013)

GPRS is a step to efficiently transport high-speed data over the current GSM infrastructures.
      Deployment of GPRS network allows variety of new applications 





      Uses GSM Architecture
      To offer packet data service through GPRS, new network components are added to upgrade GSM network
      GPRS support nodes (GSN)
     Responsible for delivering and routing of data packets between MS and external packet data network.
      Types of GSN
     Gateway GSN (GGSN)
     Serving GSN (SGSN)
SGSN
      Same hierarchical level as MSC
      MSC functions for voice, SGSN functions for packet data
     Packet switching
     Routing
     Mobility management
     Logical link management
     Authentication
     Charging
      Registration of new mobile subscribers
      Keeps record of their location
      Location register of SGSN stores current cell, current VLR etc information
      Once user is registered, SGSN sends request to HLR about user information
GGSN
      Interface between GPRS backbone network and external PDNs.
      Converts GPRS packets coming from the SGSN into appropriate packet format for the network
      Receives incoming data packets from data network and convert them to GSM address of destination user
      BSS
      Needs enhancement to recognize and send packet data.
      Up gradation of BTS to allow transport of user data to SGSN.
      Up gradation of BTS to support packet data transfer between BTS and MS.
      HLR
      Enhancement to register GPRS user profile
      Respond to queries originating from GSNs for these profile
      MS
      Mobile station must be GPRS enabled and should have hardware support

118)  Explain limitations, applications of GPRS and give difference between GPRS and GSM architecture. (may 2013, dec 2012,nov 2011)

Limitations
      Limited cell capacity for all users
      Low speed in reality
Applications

Difference between architecture of GSM and GPRS
GSM is basically for voice data
GPRS is for packet data
Two components are different in GPRS
            SGSN and GGSN
Explain as answer 17
Various enhancements in components of GPRS and GSM
Explained in answer 17



119)  How data routing is done in GPRS (may 2013)




·        Let as assume the home PLMN of the mobile station is PLMN 2.
·        An IP address has been assigned to the mobile by the GGSN of PLMN2.
·        Thus, the MS’s IP address has the same network prefix as the IP address of GGSN in PLMN2.
·        The correspondent host is now sending IP packets to the MS. The packets are sent out onto the IP network and are routed to the GGSN of PLMN2.
·        The later queries the HLP and obtains the information that the MS is currently located in PLMN1.
·        It encapsulates the incoming IP packets and tunnels them through the inter PLMN GPRS backbone to the appropriate SGSN in PLMN1.
·         The SGSN decapsulates the packets and delivers them to MS.
·        The HLR stores the user profile, the current SGSN address, and the PDP addresses for every GPRS user in the PLMN.
·        For example, the SGSN informs the HLR about the current location of the MS.
·        When the MS registers with a new SGSN, the HLR will send the user profile to the new SGSN.
·        The signalling path between GGSN and HLR may be used by GGSN to query a user’s location and profile in order to update its location register. 



Unit -4: Wireless Application protocol, MMS, CDMA and 3G 


220) Explain frequency hopping and direct hopping spread spectrum technology. (nov 2011,dec 2012, may 2013)

      Communication technique that spreads a narrowband communication signal over a wide range of frequencies for transmission then de-spreads it into the original data bandwidth at the receive
      The signal occupies a bandwidth much larger than is needed for the information signal.
      The spread spectrum modulation is done using a spreading code, which is independent of the data in the signal
      Dispreading at the receiver is done by correlating the received signal with a synchronized copy of the spreading code.





      Input is fed into a channel encoder
     Produce an analog signal with a relatively narrow bandwidth around some center frequency
      Further modulated using a sequence of digits known as a spreading code or spreading sequence
     The spreading code is generated by a pseudonoise, or pseudorandom number generator
     The effect of this modulation is to increase the bandwidth of the signal to be transmitted
      At the receiver, the same digit sequence is used to demodulate the spread spectrum signal
      The signal is fed into a channel decoder to recover the data.
Frequency hopping
      Signal is transmitted, hopping from frequency to frequency at fixed intervals
      A receiver, hopping between frequencies in synchronization with the transmitter, picks up the message







221)  Differentiate CDMA and GSM (may 2013,june 2012)

CDMA
GSM
Code Division Multiple Access
Global System for Mobile communication
Storage type : internal memory
SIM memory
Global market share : 25%
75%
Dominant standard in the U.S.
Dominant standard worldwide except the U.S.
There is one physical channel and a special code for every device in the coverage network. Using this code, the signal of the device is multiplexed, and the same physical channel is used to send the signal
Every cell has a corresponding network tower, which serves the mobile phones in that cellular area.
Less Accessible
Most Accessible
Frequency band : Single(850 MHz)
Multiple(850/900/1800/1900 MHz)
Handset specific
SIM specific. User has option to select handset of his choice.
Emits less radiation
Emits 28 times more radiations than CDMA


222) State requirement of WAP and explain different layers of WAP(protocol stack of WAP). (nov 2011, dec 2012, may 2013)

      WAP is designed for accessing Internet and Advanced telephony services from mobile phone
      Consider the constraints like small display, limited keys on keypad, no pointing device as mouse, limited memory, limited user-input functionality, etc.
      Using WAP,  user can access the same wealth of information from pocket device too.





      Application layer (WAE)
Following components
      User agent – browser or client program
      User agent – working on behalf of user
      Browsers
      Gateway does encoding and decoding of data to minimize its size over the network
      Process the request, retrieves content from the server
      Data is converted into WML form and returned to client

      Wireless markup language (WML)
      Tag based document manipulation language.
      Quite resembling to HTML
      Can be used to display static pages and contents fetched by CGI, JSP or ASP
      The support is not as wide as that of HTML
      WML Script – lightweight client side scripting language, similar to java script
      Extended subset of JavaScript
      Adds intelligence to client  and enhance user interface
      Provides ability to do local validations of user input
      Ability to access device resources, functions and peripherals
      Ability to interact with user without reference to the origin server
      Wireless Telephony Application
      Creates telephony applications
      WTAI libraries provide following functionalities
      Voice call control
      Network text integration
      Phonebook manipulations
      Call logs access
      WAP Push services
      Push 
      Server initiated
      Sending information to client without being request for it
      Pull
      Client initiated
      Sending information to server to pull some information from server 
      Content format – formats for data, images, calendar records, phone book, etc.
      Wireless Session Protocol (WSP)
      Establishes a reliable session from client to server
      Closes it in orderly manner
      Exchange content between client and server using compact encoding
      Suspend and resume the session
      Designed to function between WAE and WTP
      Wireless Transaction Protocol(WTP)
      Provides light weight transaction oriented protocol suitable for clients
      Each new transaction has a new Transaction ID (seq no.)
      Supports three transactions as following
      Unreliable one way request
      Sender sends a message but does not wait for an ack
      Receiver delivers message to application w/o checking for duplicates
      No acks are sent
      Sample app: unreliable weather update (push)
      Reliable one way request
      Sender sends a message and waits for an ack
      Receiver checks for duplicates before delivering message to application
      Acks are sent and retransmitted if error occurred
      Reliable two way request – reply transaction
      Sender sends a message and waits for an ack
      Receiver checks for duplicates before delivering message to application
      Ack for request is piggy-backed on top of the reply from the server application
      Client acks the receipt of the result
      Wireless Transport Layer Security(WTLS)
      Security protocol based on transport layer security (TLS) and secure socket layer (SSL)
      Functionalities
      Data integrity
      Privacy
      Authentication
      Denial of service protection
      Wireless Data Protocol (WDP)
      Allows transport, security, and session protocols to operate independent of the underlying bearer (e.g. GSM, CDMA, etc.)
      Segmentation/Reassembly: only present if underlying bearer does not support it already
      Provides common interface to upper layer protocols to they can function independently irrespective of underlying bearer. 

223)  What is VoIP? Explain its architecture. Compare and explain both H.323 and SIP. (nov 2011, june 2012, may 2013)

Voice over Internet Protocol, is a method for taking analog audio signals, like the kind you hear when you talk on the phone, and turning them into digital data that can be transmitted over the Internet.  VoIP can turn a standard Internet connection into a way to place free phone calls. The practical upshot of this is that by using some of the free VoIP software that is available to make Internet phone calls, you're bypassing the phone company (and its charges) entirely.

VoIP has many protocols to choose from for every type of signalling involved. For example, Device Control Protocols like H.248 (more popularly known as Megaco), Media Gateway Control Protocol (MGCP), NCP, Real-time Transport Protocol (RTP); Access Service Signalling protocols like Session Initiation Protocol (SIP) and H.323; Network Service Signalling Protocols like SIP, SIP-T, CMSS, BICC etc. The most popular among these are Megaco and RTP for Device Control and SIP for Signalling. Proprietary software like Skype use P2P based protocols.

The main components of the contemporary VoIP systems are as highlighted below.
Call Agent/ SIP Server: It is located in the service provider’s network for call logic and control functions. It maintains call states for every call in the network. Additional functionalities like Caller ID etc. can be added and the call details necessary for billing are also provided by the same. A SIP server is similar to Call Agent, in a SIP based networks and routes the SIP requests. A SIP Client is the terminating or originating SIP server rather than the forwarding server. It can convert MGCP or H.248 protocols for call setup. These are also termed as Media Gateway Controllers, softswitches and call controllers depending on the network topology and features used.

Service Broker: Placed on the edge of the service provider’s network, it is responsible for service distribution, control and coordination between application servers, media servers and call agents.

Application Server: It provides service logic and execution for one or more applications which are otherwise not hosted on the call agents like Voice Mail etc.

Media Server: Often referred to as Announcement server, it is responsible for playing announcements, codec transcoding, tone generation and detection, IVR etc.

Signalling Gateway: It is the gateway between the call agent signalling like SIP and SS7 based PSTN networks or between different packets based carrier domains allowing communication between various service providers.

Trunking Gateway: Gateway between IP networks working on H.248 or MGCP protocols and TDM based PSTN for transcoding of packet based voice into TDM networks.

Access Gateway and Subscriber Gateway: These are meant for providing compatibility support for POTS (Plain old telephone system). The difference between the two is the capacity the two can handle with the latter offering support for very few subscribers.

Access Concentrator: These act as terminations for service providers over WAN links like DSLAMs for DSL links and CMTS in Cable networks.

Bandwidth Manager: Caters to providing and maintaining the required QoS pre user on a per call basis.

Edge Routers: These are responsible for routing traffic onto the carrier backbone network.

24)           24)  Explain advantages and disadvantages of WLAN. Explain the design goals and security measures for wireless LAN (dec 2012,nov 2011)
Advantages of WLAN are as follow:


Mobility is a significant advantage of WLANs. User can access shared resources without looking for a place to plug in, anywhere in the organization. A wireless network allows users to be truly mobile as long as the mobile terminal is under the network coverage area.


The distance over which RF and IR waves can communicate depends on product design (including transmitted power and receiver design) and the propagation path, especially in indoor environments. Interactions with typical building objects, such as walls, metal, and even people, can affect the propagation of energy, and thus also the range and coverage of the system. IR is blocked by solid objects, which provides additional limitations. Most wireless LAN systems use RF, because radio waves can penetrate many indoor walls and surfaces. The range of a typical WLAN node is about 100 m. Coverage can be extended, and true freedom of mobility achieved via roaming. This means using access points to cover an area in such a way that their coverages overlap each other. Thereby the user can wander around and move from the coverage area of one access point to another without even knowing he has, and at the same time seamlessy maintain the connection between his node and an access point.

Ease of use

WLAN is easy to use and the users need very little new information to take advantage of WLANs. Because the WLAN is transparent to a user's network operating system, applications work in the same way as they do in wired LANs.


Installation of a WLAN system can be fast and easy and can eliminate the need to pull cable through walls and ceilings. Furthermore, wireless LAN enables networks to be set up where wires might be impossible to install.


Wireless networks can be designed to be extremely simple or complex. Wireless networks can support large numbers of nodes and large physical areas by adding access points to extend coverage.


Finally, the cost of installing and maintaining a WLAN is on average lower than the cost of installing and maintaining a traditional wired LAN, for two reasons. First, WLAN eliminates the direct costs of cabling and the labor associated with installing and repairing it. Second, because WLANs simplify moving, additions, and changes, the indirect costs of user downtime and administrative overhead are reduced.

Disadvantages 


  • As the number of computers using the network increases, the data transfer rate to each computer will decrease accordingly.
  • As standards change, it may be necessary to replace wireless cards and/or access points.
  • Lower wireless bandwidth means some applications such as video streaming will be more effective on a wired LAN.
  • Security is more difficult to guarantee and requires configuration.
  • Devices will only operate at a limited distance from an access point, with the distance determined by the standard used and buildings and other obstacles between the access point and the user.
  • A wired LAN is most likely to be required to provide a backbone to the WLAN; a WLAN should be a supplement to a wired LAN and not a complete solution.
  • Long-term cost benefits are harder to achieve in static environments that require few moves and changes.
  • Security issues and measures
·         Basic 802.11 security deters accidental association or casual eavesdropping. In most WLAN products, however, these security features are disabled by default. Disabled means the WLAN operates in "open system" mode--any station can join because they know the network's Service Set Identifier (SSID) or by capturing beacon frames broadcast by APs.
·         The 802.11 standard's security is composed of authentication and encryption. When shared-key authentication is enabled, stations can associate with the AP only if they have a 40- or 128-bit key known to both parties. When Wired Equivalent Privacy (WEP) is enabled, the same key is fed into the RC4 cipher to encrypt data frames. Only stations that possess the shared key can join the WLAN, but the same key decrypts frames transmitted by other stations. If your policy requires authentication of individual stations, or confidentiality beyond the air link, you must adopt other measures.
·         Configuring a hard-to-guess SSID makes neighbors less likely to mistake your WLAN for their own. Stations running Windows XP automatically join any discovered network by default. Enabling shared-key authentication prevents this. Using WEP is like locking your office desk. Motivated intruders can jimmy a low-grade lock. Given enough data, a persistent attacker can use freeware tools to crack WEP. Nevertheless, these can be your first line of defense. Small business and home networks should always use them; enterprises may opt for higher-level measures. The 802.1X standard addresses the need for more robust authentication, and the 802.11i standard's Temporal Key Integrity Protocol (TKIP) provides for more robust encryption
25)             
a.                  Compare wifi and 3G technology. (nov 2011,may 2013)
Refer previous answers for the description
b.                  Compare wifi and wimax technology( dec 2012)
Wimax is a criterion based wireless technology which is used to provide internet access and multimedia services at very high speed to the end user while Wi-Fi technology uses local area network (LAN) for internet access. Wimax covers a greater distance than Wi-Fi thus can cover a metropolitan area network. wifi is faster but much lower range - a few hundred feet at most. Wimax is slower still faster than broadband.
Wi-Fi works at 2.7 bps/Hz and can peak up to 54 Mbps in 20 MHz channel. WiMAX works at 5 bps/Hz and can peak up to 100 Mbps in a 20 MHz channel.


           

1 comment:

  1. I don't have words for explain that what a great information you have shared with us.

    During SEO - I am learning and reading very informative things. :)

    android call recorder

    ReplyDelete