2 Mark Question and Answers PDF
2 Mark Question and Answers PDF
2
15. Define hidden terminal.
The transmission range of A reaches B but not C. The transmission range of C reaches B but not A. B
reaches A and C. A cannot detect C and vice versa.
A starts sending to B, but C does not receive this transmission. C also wants to send something to B
and senses the medium. The medium appears to be free, the carrier sense fails. C also starts sending,
causing a collision at B. But A can’t detect this collision at B and continues with its Transmission. A is hidden
for C and vice versa.
16. What is Mobile Computing and the applications ?
Mobile computing is the process of computation on a mobile device. In such computing, a set of distributed
computing systems or service provider servers participate, connect , and synchronise through mobile
communication protocols.
APPLICATIONS:
I. Mobile computing offers mobility with computer power.
II. It provides decentralized computations on diversified devices, systems, and networks, which are
mobile, synchronized , and interconnected via mobile communication standards and protocols.
III. Mobile computing facilitates a large number of applications on a single device.
17. Limitations of Mobile Computing?
i. Resource constraints.
ii. Interface
iii. Bandwidth
iv. Dynamic changes in communication environment.
v. Network issues.
vi. Interoperability issues.
vii. Security Constraints.
18. Give the difference between the network 1G, 2G, 2.5G, 3G mobile communication?
1G ‐ Voice‐only communication.
2G – Communicate voice as well as data signals.
2.5G – Enhancements of the second generation and sport data rates up to 100 kpbs.
3G – Mobile devices communicate at even higher data rates and support voice, data, and multimedia
streams. High data rates in 3G devices enable transfer of video clips and faster multimedia
communication.
19. What is MAC?
Message authentication codes (MAC) are also used to authenticate messages during transmission.
MAC of a message is created using a cryptographic MAC function which is similar to the hash function but
has different security requirements.
20. Define Mobile Binding?
A binding created for providing mobility to a mobile node after registration at a foreign network.
21. Define Agent‐based Computing
An agent is any program that acts on behalf of a (human) user. A software mobile agent is a process
capable of migrating from one computer node to another.
3
22. Define Ubiquitous computing
Ubiquitous computing enhances computer use by making many computers available throughout the
physical environment, while making them effectively invisible to users.
23. Define Client‐Server Computing
An architecture in which the client is the requesting machine and the server is the supplying
machine. The client contains the user interface and may perform some or all of the application processing.
24. What do you mean by Digital Signature?
Digital signatures are used to enable verification of the records. A DSA (Digital Structure Algorithm)
is used to sign a record before transmitting. It provides for a variable key length of maximum 512 0r 1024
bits. The DSS(Digital Signature Standard) is based on the DSA.Signatures enable identification of the sender
identify the orgin of the message, and check message integrity.
25. Define the term wireless?
Wireless telecommunications refers to the transfer of information between two or more points that
are not physically connected. Distances can be short, such as a few metres for television remote control, or
as far as thousands or even millions of kilometers for deep‐space radio communications. It encompasses
various types of fixed, mobile, and portable applications, including two‐way radios, cellular telephones,
personal digital assistants (PDAs), and wireless networking.
26. What are the different types of mobile Middleware?
Adaptation
Agent
27. What are the logical channels in GSM?
Traffic channel(TCH)
Control channel(CCH)
28. Define the term wireless?
Wireless telecommunications refers to the transfer of information between two or more points that
are not physically connected. Distances can be short, such as a few metres for television remote control, or
as far as thousands or even millions of kilometers for deep‐space radio communications. It encompasses
various types of fixed, mobile, and portable applications, including two‐way radios, cellular telephones,
personal digital assistants (PDAs), and wireless networking.
29. Define GPRS?
General Packet Radio Service (GPRS) is a packet oriented service for mobile devices data
communication which utilizes the unused channels in TDMA mode in a GSM network and also sends and
receives packet of data through the internet.
30. What is Communication?
Communication is a two‐way transmission and reception and reception of data streams. Transmissions are
of two types,
Guided Transmission
Unguided Transmission
4
31. Types of Wireless Devices
Laptops
Palmtops
PDAs
Cell phones
Pagers
Sensors
32. Why Mobile Computing?
Enable anywhere/anytime connectivity
Bring computer communications to areas without pre‐existing infrastructure Enable mobility
Enable new applications
An exciting new research area
33. What are the New Forms of Computing available?
Wireless Computing
Nomadic Computing
Mobile Computing
Ubiquitous Computing
Pervasive Computing
Invisible Computing
34. Mobile Communication Networks: Examples
GSM (Global System for Mobile Communications): worldwide standard for digital, cellular Mobile Radio
Networks
UMTS (Universal Mobile Telecommunications System): European Standard for future digital Mobile
Radio Networks
AMPS (Advanced Mobile Phone System): analog Mobile Radio Networks in USA
DECT (Digital Enhanced Cordless Telecommunications): European standard for cordless phones
TETRA (Terrestrial Trunked Radio): European standard for circuit switched radio networks
ERMES (European Radio Message System): European standard for radio paging systems (Pager)
802.11: International standard for Wireless Local Networks
Bluetooth: wireless networking in close/local area Inmarsat: geostationary satellite systems
Teledesic: planned satellite system on a non‐geostationary orbit
35. Components of a wireless communication system
Transmitter,
receiver,
filter,
antenna,
amplifier,
mixers
36. Wireless Networking Standards (Table1.1)
ITU, IEEE and ISO
IEEE 802.11 standards (a,bc,d,e,f…u)
5
37. Classification of wireless MAC protocols
38. What are the disadvantages of small cells?
Infrastructure
Handover
Frequency
39. What are the benefits of reservation schemes?
Increased no other station is allowed to transit during this slot
Avoidance of congestion.
Waiting time in clearly known.
40. Define hidden terminal.
The transmission range of A reaches B but not C. The transmission range of C reaches B but not A. B reaches
A and C. A cannot detect C and vice versa.
A starts sending to B, but C does not receive this transmission. C also wants to send something to B and senses
the medium. The medium appears to be free, the carrier sense fails. C also starts sending, causing a collision at
B. But A can’t detect this collision at B and continues with its transmission. A is hidden for C and vice versa.
41. What are the different types of modulation ?
The Modulation types are:
i).Amplitude Modulation.
ii).Frequency Modulation.
iii).Phase Modulation.
42. What are the multiplexing techniques ?
The Multiplexing techniques are: i)Space division multiplexing. ii)Time division
multiplexing. iii)Frequency division multiplexing. iv)Code division multiplexing.
43. Define Space Division Multiplexing Access?
Space division multiple access (SDMA) means division of the available space so that multiple
sources can access the medium at the same time. SDMA is the technique in which a wireless
transmitter transmits the modulated signals and accesses a space slot and another transmitter accesses
another space slot such that signals from both can propagate in two separate spaces in the medium
without affecting each other.
44. Define Code division multiplexing Access?
CDMA(Code Division Multiple Access) is an access method in which multiple users are allotted
different codes (sequence of symbols) to access the same channel (set of frequencies)
6
45. Define Time division multiplexing Access?
Time division multiplexing (TDMA) is an access method in which multiple users, data services,
or sources are allotted different time‐slices to access the same channel. The available time‐slice is
divided among multiple modulated‐signal sources. These sources use the same medium, the same set of
frequencies, and the same channel for transmission
46. Define Frequency division multiplexing Access?
Frequency division multiple access (FDMA) is an access method in which entails assignments of
different frequency‐slices to different users for accessing the same carrier.
47. Difference between Circuit Switching and Packet Switching?
CIRCUIT SWITCHING :
Circuit switching is a method of data transmission in which a circuit (Communication channel or
path) once established, continues to be used till the transmission is complete.
PACKET SWITCHING :
Packet switching is a means of establishing connection and transmitting data in which the
message consists of packets containing the data frames. A packet is a formatted series of data, which
follows a distinct path directed by a router from among a number of paths, available at that instant.
48. What is CSMA
The capacity of ALOHA or slotted ALOHA is limited by the large vulnerability period of a packet.
By listening before transmitting, stations try to reduce the vulnerability period to one propagation delay.
This is the basis of CSMA (Kleinrock and Tobagi, UCLA, 1975).
The capacity of ALOHA or slotted ALOHA is limited by the large vulnerability period of a packet.
By listening before transmitting, stations try to reduce the vulnerability period to one propagation delay.
This is the basis of CSMA (Kleinrock and Tobagi, UCLA, 1975).
Station that wants to transmit first listens to check if another transmission is in progress (carrier sense).
If medium is in use, station waits; else, it transmits.
Collisions can still occur.
Transmitter waits for ACK; if no ACKs, retransmits.
49. What is the aim of ubiquitous computing? (AUT‐NOV/DEC 2012)
The aim of ubiquitous computing is to design computing infrastructures in such a manner that
they integrate seamlessly with the environment and become almost invisible.
Present Everywhere Bringing mobile, wireless and sensor Ubiquitous computing (ubicomp) integrates
computation into the environment, rather than having computers which are distinct objects
50. What are the characteristics of mobile computing devices?
Adaptation
Data dissemination and Management
Heterogeneity
Interoperability Context awareness
51. What are the key constraints of mobile computing?
a. unpredictable variation in network quality
b. lowered trust and robustness of mobile elements
7
52. Define FDMA?
Frequency division multiple access (FDMA). This comprises all algorithms allocating frequencies to
transmission channels according to the frequency division multiplexing (FDM). Frequency can be fixed or
dynamic
53. Define CDMA?
An access method in which multiple carriers, channels, or sources are allotted different codes
(Sequences and Symbols) to access the same channel (set of frequencies at the same time in same space).
54. What is ALOHA?
The ALOHAnet used a new method of medium access (ALOHA random access) and experimental UHF
frequencies for its operation, since frequency assignments for communications to and from a computer were
not available for commercial applications in the 1970s. But even before such frequencies were assigned there
were two other media available for the application of an ALOHA channel – cables and satellites. In the 1970s
ALOHA random access was employed in the widely used Ethernet cable based network and then in the
Marisat (now Inmarsat) satellite network.
In the early 1980s frequencies for mobile networks became available, and in 1985 frequencies
suitable for what became known as Wi‐Fi were allocated in the US. These regulatory developments made it
possible to use the ALOHA random access techniques in both Wi‐Fi and in mobile telephone networks.
UNIT –II
1. What are the requirements of mobile IP?
Compatibility
Transparency
Scalability and efficiency
Security
2. Mention the different entities in a mobile IP.
Mobile Node
Correspondent Node
Home Network
Foreign Network
Foreign Agent
Home Agent
Care‐Of address
Foreign agent COA
Co‐located COA
3. Define Mobile node:
A mobile node is an end‐system or router that can change its point of attachment to the Internet
using mobile IP. The MN keeps its IP address and can continuously with any other system in the Internet as
long as link layer connectivity is given.
4. Explain Cellular IP.
Cellular IP provides local handovers without renewed registration by installing a single cellular IP
gateway for each domain, which acts to the outside world as a foreign agent.
8
5. What do you mean by mobility binding?
The Mobile Node sends its registration request to the Home Agent. The HA now sets up a mobility
binding containing the mobile node’s home IP address and the current COA.
6. Define COA.
The COA (care of address) defines the current location of the MN from an IP point of view. All IP
packets sent to the MN are delivered to the COA, not directly to the IP address of the MN. Packet delivery
toward the MN is done using the tunnel. DHCP is a good candidate for supporting the acquisition of Care Of
Addresses.
7. Define a tunnel.
A tunnel establishes a virtual pipe for data packets between a tunnel entry and a tunnel endpoint.
Packets entering a tunnel are forwarded inside the tunnel and leave the tunnel unchanged.
8. What is encapsulation?
Encapsulation is the mechanism of taking a packet consisting of packet header and data putting it
into the data part of a new packet.
9. What is decapsulation?
The reverse operation, taking a packet out of the data part of another packet, is called decapsulation.
10. What is MOT? Give its primary goal.
DAB faces a broad range of different receiver capabilities. So to solve this problem it defines a common
standard for data transmission, the multi‐media object transfer (MOT) protocol. The primary goal of MOT is
the support of data formats used in other multi‐ media systems.
11. What is SUMR?
An important register in satellite networks is the satellite user mapping register (SUMR).
This stores the current position of satellites and a mapping of each user to the current satellite through which
communication with a user is possible.
12. Give the two basic reasons for a handover in GSM.
The mobile station moves out of the range of a BTS or a certain antenna of a BTS. The received signal
level decreases continuously until it falls below the minimal requirements for communication. The error rate
may grow due to interference. All these effects may diminish the quality of the radio link.
The wired infrastructure may decide that the traffic in one cell is too high and shift some MS to other
cells with a lower load. Handover may be due to load balancing.
13. Give the security services offered by GSM.
Access control and authentication
Confidentiality
Anonymity
14. What is the primary goal of GSM?
The primary goal of GSM was to provide a mobile phone system that allows users to roam throughout
Europe and provides voice services compatible to ISDN and other PSTN systems.
9
15. Differentiate GSM and DECT.
GSM DECT
Global systems for mobile communications Digital enhanced cordless Telecommunications
Range is up to 70km. Range is limited to about 300m.
16. What are the two new network elements in GPRS architecture?
Gateway GPRS support node (GGSN): It is the inter‐working unit between the GPRS network and external
packet data networks (PDN). Serving GPRS support node (SGSN): It supports the MS.
17. Describe about MAC layer in DECT architecture.
The medium access control (MAC) layer establishes, maintains and releases channels for higher layers by
activating and deactivating physical channels. MAC multiplexes several logical channels onto physical
channels. Logical channels exist for signaling network control, user data transmission, paging or sending
broadcast messages. Additional services offered include segmentation/reassembly of packets and error
control/error correction.
18. Give the full form for the following: a) CKSN b) EIR c) DTMF d) MOC
a) CKSN‐ Ciphering key sequence number
b) EIR‐ Equipment Identity Register
c) DTMF‐ Dual Tone multiple frequency
d) MOC‐ Mobile originated call
19. Define Snooping TCP?
A protocol in which an agent buffers the packets from the fixed connection layer for transmission to
the mobile node on a wireless transceiver; the agent also buffers the packets on the wireless transceiver from
the node for transmitting to a layer at the fixed line. The agent snoops at the transmission and reception in
place of acknowledgement‐or‐timeout‐based TCP method in the mobile part of the network.
20. Define Mobile TCP?
A method of splitting the TCP layer into two TCP sub‐layers using a mechanism that reduces window
size to zero. The split is asymmetric; The window is set to zero to prevent the transmission from the TCP
transport layer at the mobile node (MN) or at the fixed node when disconnection is noticed. The window
opens again on getting the packet, there is no slow start by the base transceiver and it is presumed that
packet loss is due to disconnection and not due to congestion or interference.
21. Explain the concept “Fast Retransmit/ Fast Recovery Transmission”?
A method in which there are four or more phases of fast retransmit and fast recovery –first phase as
slow start and beginning (exponential), then fast retransmit/recovery phase 1 (FRR1) on three duplicate
acknowledgements, fast retransmit/fast recovery phase 2 (FRR2), and wait (Constant time out and window
size).
22. Define T‐TCP?
A protocol which is efficient and is used in situations where short messafes are to be sent in
sequence and a packet is delivered after the SYN and SYN_ACK packet exchanges and the connection closes
after the packet exchanges of FIN, FIN_ACK, and CLOSING.
23. Define ISR?
Interrupt Service Routine(ISR): A program unit (function, method, or subroutine) which runs when a
hardware or software event occurs and running of which can be masked and can be prioritized by assigning a
10
priority.
24. Define IST?
Interrupt Service Thread(IST): A special type of ISR or ISR unit (function, method , or subroutine) which
initiates and runs on an event and which can be prioritized by assigning a priority.
25. Features of TCP?
The main features of TCP are:
Transmission as data Streams
Buffering and retransmission
Session‐start, data transfer, and session‐finish fully acknowledged end to end. 4)In‐order delivery
Congestion Control and avoidance
26. What is explicit notification?
A method of congestion control by explicit notification of congestion, for example, when a base
transceiver at the receiver end is not able to transmit a packet to the mobile node then it sends an ESBN
(explicit bad state notification) to the sender (on fixed line ) at the other end.
27. What is selective retransmission?
A method in which there is an additional acknowledgement, known as selective acknowledgement; a
timeout is set at transmitting end for receiving SACKs. Only the lost packet corresponding ta a SACK needs to
be retransmitted.
28. Methods of Congestion Control.
The methods of congestion control:
Slow start and congestion avoidance
Fast recovery after packet loss
Fast retransmit and fast recovery
Selective acknowledgement
Explicit congestion notification
29. TCP header.
A header used in the TCP protocol; it consists of fields in five 32‐bit words followed by words for the option
fields and padding.
30. Describe the three subsystems of GSM.
Radio subsystem (RSS): It comprises all radio specific entities i.e. the mobile stations (MS) and the
base station subsystem (BSS).
Networking and switching subsystem (NSS): The heart of the GSM system is formed by the NSS. This
connects the wireless network with standard public networks.
Operating subsystem (OSS): It monitors and controls all other network entities.
31. What are the applications of satellites?
Weather forecasting
Radio and TV broadcast satellites Military satellites
Satellites for navigation
11
32. Application Layer n protocols
File Transfer Protocol (FTP)
Trivial File Transfer Protocol (TFTP) Network File System (NFS)
Simple Mail Transfer Protocol (SMTP) Terminal emulation protocol (telnet) Remote login application
(rlogin)
Simple Network Management Protocol (SNMP) Domain Name System (DNS)
Hypertext Transfer Protocol (HTTP)
33. What are Advantage and Disadvantage of MobileTCP?
Advantages:
M‐TCP maintains the TCP end‐to‐end semantic. The SH does not send any ACK itself but forwards
the ACKs from the MH.
If the MH is disconnected, M_TCP avoids useless retransmissions, slow starts or breaking
connections by simply shrinking the sender’s window to 0;
Since M‐TCP does not buffer data in the SH as I‐TCP does, it is not necessary to forward buffers to
a new SH. Lost packets will be automatically retransmitted to the new SH
Disvantages:
As the SH does not act as proxy as in I‐TCP, packet loss on the wireless link due to bit errors is
propagated to the sender. M‐TCP assumes low bit error rates, which is not always a valid
assumption.
A modified TCP on the wireless link not only requires modification to the MH protocol software but
also new network elements like the bandwidth manager
34. What is mobile routing?
Even if the location of a terminal is known to the system, it still has to route the traffic through the
network to the access point currently responsible for the wireless terminal. Each time a user moves to a new
access point, the system must reroute traffic. This is known as mobile routing.
35. What are the functions which support service and connection control?
Access point control function
Call control and connection control function
Network security agent
Service control function
Mobility management function
36. What are the examples for service scenarios identified in WATM ?
Office environments
Universities, schools, training, centres >Industry >Hospitals
Home
Networked vehicles
37. What is slow start?
TCP’s reaction to a missing acknowledgement is necessary to get rid of congestion quickly. The
behaviour TCP shows after the detection of congestion is called slow start.
38. What is the use of congestion threshold?
The exponential growth of the congestion window in the slow start mechanism is dangerous as it
doubles the congestion window at each step. So a congestion threshold is set at which the exponential
12
growth stops.
39. What led to the development of Indirect TCP?
TCP performs poorly together with wireless links
TCP within the fixed network cannot be changed. This led to the development of I‐TCP which segments a TCP
connection into a fixed part and a wireless part.
40. What is the goal of M‐TCP?
The goal of M‐TCP is to prevent the sender window from shrinking if bit errors or disconnection but not
congestion cause current problems. It wants
• To provide overall throughput
• To lower the delay
• To maintain end‐to‐end semantics of TCP
• To provide a more efficient handover.
41. What do you mean by persistent mode?
Persistent mode is the state of the sender will not change no matter how long the receiver is
disconnected. This means that the sender will not try to retransmit the data.
42. What are the characteristics of 2.5G/3.5G wireless networks?
Data rates Latency Jitter Packet loss
43. What are the configuration parameters to adapt TCP to wireless environments?
Large Windows Limited Transmit Large MTU
Selective Acknowledgement Explicit Congestion Notification Timestamp
No header compression
44. Requirements to Mobile IP
Transparency
mobile end‐systems keep their IP address
continuation of communication after interruption of link possible point of connection to the fixed
network can be changed Compatibility
support of the same layer 2 protocols as IP
no changes to current end‐systems and routers required mobile end‐systems can communicate with
fixed systems Security
authentication of all registration messages Efficiency and scalability
only little additional messages to the mobile system required (connection typically via a low
bandwidth radio link)
world‐wide support of a large number of mobile systems in the whole Internet
45. Mobile IP Terminology
Mobile Node (MN) system (node) that can change the point of connection to the network without
changing its IP address
Home Agent (HA)
system in the home network of the MN,
typically a router registers the location of the MN, tunnels IP datagrams to the COA
13
Foreign Agent (FA)
system in the current foreign network of the MN,
typically a router forwards the tunneled datagrams to the MN,
typically also the default router for the MN
Care‐of Address (COA)
address of the current tunnel end‐point for the MN (at FA or MN)
actual location of the MN from an IP point of view can be chosen, e.g., via DHCP
Correspondent Node (CN)
communication partner
46. What Mobile IP
Mobile IP solves the following problems:
if a node moves without changing its IP address it will be unable to receive its packets,
if a node changes its IP address it will have to terminate and restart its ongoing connections every
time it moves to a new network area (new network prefix).
Mobile IP is a routing protocol with a very specific purpose.
Mobile IP is a network layer solution to node mobility in the Internet.
Mobile IP is not a complete solution to mobility, changes to the transport protocols need to be made
for a better solution (i.e., the transport layers are unaware of the mobile node’s point of attachment
and it might be useful if, e.g., TCP knew that a wireless link was being used!).
UNIT – III
MOBILE TELECOMMUNICATION SYSTEM
1. Define GSM?
The global system for mobile communication (GSM) was developed by Group Special Mobile (GSM)
which was founded in Europe in 1992. The GSM is a standard for mobile telecommunication through a
cellular network at data rates if up to 14.4 kbps. Now a days it consist of a set of standards and protocols
for mobile telecommunication.
2. Define GPRS?
General Packet Radio Service (GPRS) is a packet oriented service for mobile devices data
communication which utilizes the unused channels in TDMA mode in a GSM network and also sends and
receives packet of data through the internet.
3. What are subsystems in GSM system?
Radio subsystem (RSS)
Network & Switching subsystem (NSS)
Operation subsystem (OSS)
4. What are the control channel groups in GSM?
The control channel groups in GSM are:
Broadcast control channel (BCCH)
Common control channel (CCCH)
Dedicated control channel (DCCH)
14
5. What are the four types of handover available in GSM?
Intra cell Handover
Inter cell Intra BSC Handover
Inter BSC Intra MSC handover
Inter MSC Handover
6. What is the frequency range of uplink and downlink in GSM network?
The frequency range of uplink in GSM network is 890‐960 MHz The frequency range of downlink in
GSM network is 935‐960 MHz
7. What are the security services offered by GSM?
The security services offered by GSM are:
Access control and authentication.
Confidentiality.
Anonymity.
8. What are the reasons for delays in GSM for packet data traffic?
Collisions only are possible in GSM with a connection establishment. A slotted ALOHA mechanism is
used to get access to the control channel by which the base station is told about the connection
establishment attempt. After connection establishment, a designated channel is installed for the
transmission.
9. What is meant by beacon?
A beacon contains a timestamp and other management information used for power management
and roaming. e.g., identification of the base station subsystem (BSS)
10. List out the numbers needed to locate an MS and to address the MS.
The numbers needed to locate an MS and to address the MS are: Mobile station international ISDN
number (MSISDN) International mobile subscriber identity (IMSI)
Temporary mobile subscriber identity (TMSI) Mobile station roaming number (MSRN)
11. What is meant by GPRS?
The General Packet Radio Service provides packet mode transfer for applications that exhibit traffic
patterns such as frequent transmission of small volumes.
12. What is meant by GGSN?
GGSN is Gateway GPRS Support Node. It is the inter‐working unit between the GPRS network and
external packet data networks. The GGSN is connected to external networks via the Gi interface and
transfers packets to the SGSN via an IPbased GPRS backbone network.
13. What is meant by SGSN?
SGSN is Serving GPRS Support Node. It supports the MS via the Gb interface. The GSN is connected
to a BSC via frame relay.
15
14. What is meant by BSSGP?
BSSGP is Base Station Subsystem GPRS Protocol. It is used to convey routing and QoS‐ related
information between the BSS and SGSN.BSSGP does not perform error correction and works on top of a
frame relay network.
15. Expand GSM, GPRS and UMTS.
Global System for Mobile Communication (GSM)
General Packet Radio Service (GPRS)
Universal Mobiie Telecommunication System (UMTS)
16. Mention the types of Interface in GSM system and its use.
A interface
Makes the connection between the RSS and the NSS
Based on circuit‐switched PCM‐30 systems (2.048 Mbit/s), carrying up to 30 64 kbit/s connections
0 interface
Makes the connection between the RSS and the OSS
Uses the Signalling System No.7 (SS7) based on X.25 carrying management data to/from the RSS
U interface
Makes the connection between the BTS and MS
Contains all the mechanisms necessary for wireless transmission
Ab. Interface IS Makes the connection between the BTS.and BSC Consists of 16 or 64 kbitls connections
17. What is RSS?
RSS stands for Radio subsystem (RSS)
RSS comprises all radio specific entities
18. Name the entities of RSS.
Base Station Subsystem (BSS)
Base Transceiver Station (BTS)
Base Station Controller (BSC)
Mobile Station (MS)
19. Mention the advantages of GSM.
Communication
Total mobility
Worldwide connectivity
High capacity
High transmission quality'
Security functions
20. What does SIM card contain?
personal identity number (PIN)
PIN unblocking key (PUK)
an authentication key Ki
the international mobile subscriber identity (IMSI)
16
21. Mention the disadvantages of GSM.
No end‐to‐end encryption of user data
Reduced concentration while moving
Electromagnetic radiation
High complexity of system
Several incompatibilities within the GSM standards
Card‐type
Serial number
A list of subscribed services
22. Mention the use of SS7.
Used for handling all signaling needed for
connection setup,
connection release and
handover of connections to other MSCs
17