0% found this document useful (0 votes)
28 views12 pages

MC Que Bank

Uploaded by

Bangtan Twtt
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
28 views12 pages

MC Que Bank

Uploaded by

Bangtan Twtt
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 12

SRM VALLIAMMAI ENGINEERING COLLEGE

(An Autonomous Institution)


SRM Nagar, Kattankulathur – 603 203

DEPARTMENT OF INFORMATION TECHNOLOGY

QUESTION BANK

VI SEMESTER

1908601-Mobile Communication

Regulation – 2019

Academic Year 2023-2024 (Even Semester)

Prepared by

Ms.Sakthi, Assistant Professor (O.G)/IT

Ms. M. Kanmani, Assistant Professor (O.G)/IT


SRM VALLIAMMAI ENGINEERING COLLEGE
(An Autonomous Institution)
SRM Nagar, Kattankulathur – 603 203.

DEPARTMENT OF INFORMATION TECHNOLOGY


QUESTION BANK
SUBJECT : 1908601 – Mobile Communication
SEM / YEAR: VI Sem / III Year

UNIT I - INTRODUCTION
Introduction to Mobile Computing – Applications of Mobile Computing- Generations of Mobile
Communication Technologies-MAC Protocols – SDMA- TDMA- FDMA- CDMA
PART – A
BT
Q.No Questions Competence
Level
1. Define Mobile computing. BTL1 Remembering
2. List the advantages of mobile computing. BTL1 Remembering
3. Distinguish between Mobile Computing and Wireless Networking. BTL2 Understanding
4. Identify the types of Mobility BTL1 Remembering

5. Distinguish between infrastructure-based network and infrastructure less


BTL2 Understanding
network.
6. Analyze the challenges in Mobile Computing. BTL4 Analyzing
7. Classify the types of wireless networks. BTL3 Applying
8. Illustrate Ad hoc Networks with pictorial representation. BTL3 Applying
9. Give the uses of Ad-Hoc networks. BTL2 Understanding
10. What are the limitations of Mobile computing? BTL1 Remembering
11. State the objectives of MAC protocols. BTL2 Understanding

12. Describe the function of presentation, application and data tier of mobile
BTL2 Understanding
environment.
13. What is the role of a MAC protocol? BTL1 Remembering
14. Classify the types of MAC Protocol. BTL3 Applying
15. List some random assignment scheme. BTL1 Remembering

16. Inspect hidden and exposed terminal problems in infrastructure-less


BTL4 Analyzing
network.
17. What is the primary factor influencing signal strength between near and far
BTL2 Understanding
terminals in wireless communication?
18. “MAC protocol designed for infrastructure based wireless network may
BTL5 Evaluating
not work satisfactory in infrastructure-less environment”-Justify.
Formulate a reason why Collision Detection based protocol is not suitable
19. for wireless networks? BTL6 Creating
20. Evaluate the working of RTS/CTS in MACA. BTL5 Evaluating
21. Find the difference between Circuit switching and packet switching. BTL1 Remembering
22. Infer some cellular phone standards. BTL2 Understanding
23. Which TDMA scheme is suitable for satellite system? BTL3 Applying
24. Identify the problems faced by devices in wireless transmission. BTL4 Analyzing
PART-B
What is Mobile Computing? Explain its applications in the real world
1. scenario. (7) BTL4 Analyzing
Detail about Characteristics of Mobile Computing (6)
Classify the generations of mobile communication technologies. (8)
2. Apply mobile computing to design Taxi dispatcher and monitoring service. BTL4 Analyzing
Explain the components in detail. (5)
Explain hidden and exposed terminal problem in infrastructure-less network.
3. (7) BTL1 Remembering
Describe architecture of mobile computing.(6)
Describe the important functional difference between 1G, 2G and 3G cellular
4. networks.(8)
Is 3G cellular wireless technology superior to 2G technology? Justify BTL1 Remembering
your answer. (5)
5. Explain the various taxonomy of MAC protocols in detail. (13) BTL3 Applying
6. Explain the wireless MAC issues in detail. (7)
BTL2 Understanding
Illustrate the working of SDMA and gives its application. (6)
7. What are the fixed assignment schemes of MAC protocol? Explain their
BTL1 Remembering
mechanism in detail. Compare and contrast them. (13)
8. Compare SDMA/TDMA/FDMA/CDMA (13) BTL1 Remembering
9. Discuss the basic scheme of the CDMA protocol. (13) BTL2 Understanding
What are the principle responsibilities of the MAC Protocol? (6)
10. How does MAC protocol for wireless networks differ from those in wired
network? (7) BTL2 Understanding

11. Explain the various random assignment schemes that are used in MAC
BTL3 Applying
protocol. (13)
12. What is MACA protocol? In which environment is it suitable? Briefly
BTL4 Analyzing
explain its working. (13)
13. Explain why MAC scheme in wired network fail in wireless networks. (13) BTL5 Evaluating
14. Name any one scheduled based MAC protocol and explain in detail. (13) BTL6 Creating
15. Explain in detail about various technologies of mobile computing. (13) BTL2 Understanding
16. What is CSMA? What are the categories of CSMA? Explain their working
with advantages and disadvantages.(7)
BTL3 Applying
Compare the characteristic feature of TDMA, CDMA and FDMA
mechanisms.(6)
17. (i)Why CDMA is needed and explain it with an example. (6)
BTL5 Evaluating
(ii)Explain in detail multiple access with Collision Avoidance scheme. (7)
PART – C
1. Prepare a brief account of scheduled based MAC protocol. (15) BTL 6 Creating
Compare 1G and 2G cellular wireless communication technologies. (8)
2. What do you understand by 2.5G? How is it different from 2G and 3G
BTL 5 Evaluating
technologies? (7)
3. How does MACA protocol solve the hidden/exposed terminal problem? (15) BTL 5 Evaluating
4. How does the multiple accesses with collision avoidance (MACA) scheme
BTL 5 Evaluating
work? (15)
5. Consider the following scenarios:
Node A and c wants to transmit data to B at the same time.
Node B transmits daa to node A meanwhile Node C wants to transmit data
to node D in the network. BTL 6 Creating
Identify the problems during this data transmission. Explain it. Suggest a
method of your choice to overcome this problem. (15)

UNIT II - MOBILE TELECOMMUNICATION SYSTEM


GSM – Architecture – Protocols – Connection Establishment – Frequency Allocation – Routing – Mobility
Management – Security –GPRS- UMTS- Architecture
PART – A
Q.No Questions BT Level Competence
1. Is 3G cellular wireless technology superior to 2G technology? Justify BTL5 Evaluating
your answer.
2. Identify the characteristics of 4G and 5G Cellular Networks. BTL3 Applying
3. List the 3 important features of GSM security. BTL1 Remembering
4. Summarize the following. BTL2 Understanding
MSC and BSC.
5. Experiment with Call Routing. BTL3 Applying
6. List some disadvantages of GSM BTL1 Remembering
7. What is the frequency range of uplink and downlink in GSM network? BTL1 Remembering

8. Describe the function of HLR and VLR. BTL2 Understanding


9. List the four possible handover scenarios of GSM BTL1 Remembering
10. what are the three levels at which security measures are implemented BTL2 Understanding
in GSM.
11. Analyse the need for EIR. BTL4 Analyzing
12. Define GPRS and list its services. BTL2 Understanding
13. Give the Functions of GGSN? BTL2 Understanding
14. What are the information are stored in SIM? BTL1 Remembering
15. GPRS is advantageous than GSM. Justify the statement. BTL5 Evaluating
16. Generalize the limitations of GPRS. BTL6 Creating
17. What are the main elements of UMTS? BTL1 Remembering
18. Define Handoff. What are its types? BTL4 Analyzing
19. Can UMTS networks easily work with the existing GSM/GPRS BTL3 Applying
networks? Justify your answer.
20. Write the suggestions of mobile phone with respect to human body. BTL6 Creating
21. Recall the purpose of HLR. BTL1 Remembering
22. Compare soft and hard handoff BTL2 Understanding
23. Identify the reasons for handover? BTL3 Applying
24. Discover a model to illustrate the effect of handoff. BTL4 Analyzing

PART-B
(i) Describe GSM architecture and its services in detail. (7)
1. BTL2 Understanding
(ii) Explain GSM Authentication and Security. (6)
2. Identify the services offered by GSM and explain in detail. (13) BTL3 Applying
3. Analyze the purpose of radio interface Um in GSM. (13) BTL4 Analyzing
4. Explain the protocol architecture for signaling in GSM. (13) BTL5 Evaluating
(i) Recall the terms
a. MSISDN (2)
b. IMSI (2)
5. BTL1 Remembering
c. TMSI (2)
d. MSRN (2)
(ii) Show the procedure for MTC and MOC. (5)
Examine in detail about the various types of handover in GSM. Also
6. BTL4 Analyzing
discuss the timeline diagram of the Intra MSC handover. (13)
7. Elaborate frequency allocation with its various methods.(13) BTL6 Creating

8. (i) How is the GSM connection established? Provide a step-by-step BTL1 Remembering
explanation of the call setup and termination procedure in GSM.
(ii) Explain in detail about GSM Security and its security services

9. Describe the GPRS architecture reference model. (7) BTL2 Understanding


State its Advantages and Disadvantages. (6)

10. Explain the functions of GPRS protocol stack with a diagram. (13) BTL1 Remembering

11. (i) Discuss the services of GPRS. (7)


(ii) What are the advantages of GPRS over GSM? (6)

12. Explain in detail network architecture of UMTS with a neat diagram. BTL2 Understanding
(13)

13. Recall the two basic classes of handovers in UMTS. (13) BTL1 Remembering

14. What is UMTS? Analyze the functions of HLR and VLR in call routing BTL4 Analyzing
& roaming? (13)

15. Explain the message flow between mobile station and BTS during
mobile originated call with suitable illustrations. (7) BTL2 Understanding
Explain security services of GSM system. (6)

16. Explain about inter cell and intra cell handovers in GSM ? (13) BTL3 Applying

17. Explain about MOT and MTO in GSM. (7)


BTL5 Evaluating
Discuss about the interfaces in UMTS. (6)

PART-C

1. Determine what are the functions of authentication and encryption in BTL 5 Evaluating
GSM? How is system security maintained? (15)

2. Do mobile phones affect the human body negative? Explain your BTL 5 Evaluating
answer. (15)

3. Assess the applications of GPRS with its advantages and disadvantages. BTL 5 Evaluating
(15)

4. Discuss the domains and interfaces of Universal Mobile BTL 6 Creating


Telecommunication System. (15)

5. GSM allows a subscriber to move throughout the coverage area with a BTL 6 Creating
capability to make or receive calls. Sketch the components involved in
make or receive calls in roaming. (15)

UNIT III - WIRELESS NETWORKS

Wireless LANs and PANs – IEEE 802.11 Standard – Architecture – Services – Blue Tooth- Wi-Fi – WiMAX

PART – A

Q.No Questions BT Level Competence

1. What is WLL? BTL1 Remembering

2. Why wireless LAN services are of lower quality than wired LAN? BTL1 Remembering

3. Why cannot wireless LANs implement CSMA/CD? BTL2 Understanding

4. Mention the design goals of WLANs. BTL1 Remembering

5. Imagine the user scenarios for WPANs. BTL2 Understanding

6. State the various standards in Wireless PANs. BTL4 Analyzing

7. Inspect the advantages of WLANs. BTL3 Applying

8. List any four Wireless LAN standards. BTL1 Remembering

9. List the advantages and disadvantages of Wireless LANs. BTL1 Remembering

10. Define Ad hoc wireless network with example. BTL1 Remembering

11. What is the difference between infrastructure and ad-hoc networks? BTL4 Analyzing

12. Compare wired networks and adhoc wireless networks based on BTL2 Understanding
routing.

13. What is the format of Frame control field of 802.11 MAC packet BTL1 Remembering
structure?

14. Evaluate the criteria’s under which WPAN is discussed using IEEE BTL3 Applying
802.11.

15. List the services provided by IEEE 802.11 BTL1 Remembering

16. Propose the elements of Bluetooth core protocols. BTL4 Analyzing


17. What is piconet? What restricts the number of active devices in a BTL6 Creating
piconet?

18. Compare infra-red and radio transmission. BTL5 Evaluating

19. What is the advantage of infra-red technology? BTL6 Creating

20. Assess the elements in core protocols in Bluetooth? BTL5 Evaluating

21. What are the three low power states of a Bluetooth state? BTL1 Remembering

22. List the applications of Wi-Fi. BTL2 Understanding

23. Differentiate between Wi-Fi and WiMAX. BTL3 Applying

24. Why is WiMAX forum formed? BTL4 Analyzing

PART-B

Explain the system architecture of IEEE 802.11. (7)


1. Analyze HiperLAN architectural components and BTL4 Analyzing
their interactions. (6)

2. Explain the IEEE 802.11 MAC management. (13) BTL1 Remembering

3. Describe Bluetooth in detail. (13) BTL1 Remembering

4. Explain the various IEEE 802.11 standards in detail. (7) BTL2 Understanding
Explain the services offered by IEEE 802.11 standard. (6)

5. Explain the features of HiperLAN. (7) BTL2 Understanding


Explain WLL in detail. (6)

Explain contention free access using polling mechanism in IEEE


6. 802.11. (8) BTL2 Understanding
Explain the protocol stack of Bluetooth. (5)

Briefly explain about features and applications of ad-hoc networks. (7)


7. Explain how power management is done in IEEE 802.11 BTL4 Analyzing
infrastructure architecture. (6)

8. Explain the working principle of the MAC layer of Bluetooth. (13) BTL1 Remembering

9. (i) Why is the physical layer in IEEE 802.11 subdivided? Discuss.(7) BTL4 Analyzing
(ii)Can a network be wireless, but not mobile? Discuss. (6)

10. Model the architecture of WiFi in detail. (7) BTL3 Applying


Describe the architecture of WiMAX in detail. (6)

11. Identify the system and protocol structure of 802.16 standard. (13) BTL3 Applying

12. Elaborate on mobile ad-hoc networks. (13) BTL6 Creating

13. With a suitable diagram explain the extended service set. (7) BTL1 Remembering
Discuss the advantages and disadvantages of WLAN. (6)

14. Briefly explain about features and applications of adhoc networks. (13) BTL5 Evaluating

15. Draw the schematic for the physical layer of IEEE802.11 infrared and
explain. (7)
BTL2 Understanding
Discuss with suitable diagram distributed coordination function with
IEEE802.11 medium access control logic. (6)

16. What are the advantages and disadvantages of wireless LAN? Under
what situation is a wireless LAN desirable over wired LAN. (7)
BTL3 Applying
List types of Wireless LAN. Also explain mobility in wireless LAN.
(6)

17. Explain the following protocol used in Bluetooth technology (a) Link
Manager Protocol (2)
(b) Logic Link Control and Adaption Protocol (2)
(c) Service Discovery Protocol (2) BTL5 Evaluating
(d) RFCOMM (1)
How does a Bluetooth device discover a Bluetooth network? Describe
the security principles in Bluetooth. (6)

PART - C

1. Compose the system and protocol architecture of IEEE 802.11


BTL 6 Creating
standard. (15)

2. Interpret the two MAC sublayers defined by IEEE 802.11 standard


BTL 5 Evaluating
and explain. (15)

3. Inspect the functions of MAC & physical layer of IEEE 802.16 in


BTL 5 Evaluating
detail. (15)

4. Analyze the various types of HiperLANs. (15) BTL 5 Evaluating

5. Consider the following three different scenarios of designing a


generic WLAN which takes into account the number of users and their
activities rather than the size/ type of the business itself:
A small office or a workgroup deployment
An enterprise deployment BTL 6 Creating
A telecommuters deployment
Identify the MAC layer mechanisms used to deploy successful WLAN
that supports very fast, secure and scalable wireless network for the
above scenario.

UNIT IV - MOBILE NETWORK LAYER

Mobile IP – DHCP – AdHoc– Proactive and Reactive Routing Protocols – Multicast Routing- Vehicular Ad
Hoc networks ( VANET) –MANET Vs VANET – Security

PART - A

Q.No Questions BT Level Competence


1. What is ad hoc network? BTL1 Remembering

2. Differentiate cellular with Ad Hoc networks. BTL4 Analyzing

3. List the characteristics of MANETs. BTL1 Remembering

4. Identify the issues that are addressed by routing protocol in BTL1 Remembering
MANET?

5. What is Mobile IP? BTL1 Remembering

6. List the advantages in DSR. BTL1 Remembering

7. Compare AODV and DSR protocols. BTL2 Understanding


8. What is multicast routing in Manet? BTL2 Understanding
9. What is IP-in –IP encapsulation? BTL2 Understanding
10. List the applications of MANET. BTL1 Remembering
11. Classify the agent discovery in mobile IP. BTL3 Applying
12. Compare minimal encapsulation and IP -in –IP encapsulation. BTL3 Applying
13. What is DHCP and why it is used? BTL3 Applying
14. Distinguish Proactive and Reactive protocols. BTL4 Analyzing
15. Summarize about security issues in MANET. BTL5 Evaluating
16. Compare DSDV and DSR. BTL5 Evaluating
17. Outline the concept of RTT. BTL2 Understanding
Can cellular network and wireless LAN be considered as ad hoc
18. BTL6 Creating
networks? Justify.
19. Construct a VANET. BTL6 Creating
20. Analyze the types of attacks on adhoc networks. BTL4 Analyzing
21. What is the need for mobile IP? BTL1 Remembering
22. Differentiate the functionalities of a foreign agent and home agent. BTL2 Understanding
23. Apply the purpose of agent solicitation message? BTL3 Applying
24. What should be the value of TTL field in the IP packet of agent BTL4 Analyzing
advertisement? Why?
PART-B
(i) Explain Characteristics, Applications of MANET. (7)
1. BTL2 Understanding
(ii) Explain DSR Routing Protocols in detail. (6)
Explain about DHCP client initialization procedure. (6)
2. What are reactive and proactive routing protocols ? Specify its BTL1 Remembering
advantages and disadvantages.(7)
3. Explain the traditional routing protocols. (13) BTL2 Understanding
(i) What are multicast routing protocols? (7)
4. (ii) What are reactive and proactive protocols? Specify BTL1 Remembering
its advantages and disadvantages. (6)
(i)Briefly discuss about agent discovery in Mobile IP.(7)
5. BTL1 Remembering
(ii)Describe in detail the registration procedure in Mobile IP.(6)
(i) Analyze DSDV routing in detail. (7)
6. BTL4 Analyzing
(ii) Mention the advantages and Disadvantages of DSDV. (6)
Discuss route discovery and route maintenance mechanisms in DSR
7. BTL2 Creating
with illustrations. List its merits and demerits. (13)
Explain the design issues in MANET and the applications of adhoc
8. BTL5 Evaluating
network. (13)
(i) Illustrate the classification of unicast MANET Routing
Protocols. (7) BTL3 Applying
9. (ii) Explain how multicast routing is carried out in ad-hoc networks.
(6)
(i) What are the security threats in a MANET? What are the factors
responsible for limited security in MANETs? (6)
10. (ii) For every layer of MANET protocol stack, show at least one BTL3 Applying
type of security attack that exploits vulnerability at that layer.
(7)
With a diagram explain about DHCP and its protocol architecture.
11. BTL4 Analyzing
(13)
12. Describe the architecture of VANET with a neat diagram. (13) BTL1 Remembering
13. Explain any two VANET routing protocol with an example. (13) BTL4 Analyzing
14. (i) Compare and contrast MANET vs VANET. (7)
BTL2 Understanding
(ii) Discuss the various security and attacks on VANET. (6)
15. With a neat diagram , explain how packet delivery to and from a BTL2 Understanding
mobile node is transferred through mobile IP. (13)
16. Proactive and Reactive Routing Protocols. (13) BTL3 Applying
17. Illustrate DSR routing in detail and compare it with DSDV.(13) BTL5 Evaluating
PART - C
1. Consider the network given below. Here ‘S’ is source node and
‘D’ is target node. Illustrate the process of route discovery, route BTL 6 Creating
reply, data delivery and route caching using DSR. Explain the
approach. (15)

2. Write the three approaches to support the IP micro-mobility.(15) BTL 5 Evaluating


Write short notes on: BTL 5 Evaluating
3. (i) Ad Hoc On-demand Distance Vector(AODV) (8)
(ii) Zone Routing Protocol. (7)
A major task of the designer of a wireless sensor network is
4. prolonging the life of the network. Explain how this is achieved BTL 6 Creating
while designing a MANET.(15)
5. Discuss with a neat diagram how apacket is delivered from a mobile BTL 5 Evaluating
node to another mobile node without losing its information during
mobility of the nodes. (15)
UNIT V - MOBILE TRANSPORT AND APPLICATIONLAYER
Mobile TCP– WAP – Architecture – WDP – WTLS – WTP –WSP – WAE – WTA Architecture – WML
PART - A
Q.No Questions BT Level Competence
1. Mention the basic features of WML. BTL2 Understanding
2. Define Mobile TCP. BTL1 Remembering
3. What are the functions of WTLS? BTL1 Remembering
4. Explain in detail about Handshake Protocol. BTL1 Remembering
5. Name the classes of wireless transaction protocol. BTL1 Remembering
6. Write the features of WSP. BTL2 Understanding
7. What are the components of are in WAP? BTL2 Understanding
8. Write the applications of M-TCP. BTL3 Applying
9. Organize standard libraries for WML script. BTL3 Applying
10. Write a note on session management. BTL3 Applying
11. What is indirect TCP? BTL4 Analyzing
12. Analyze the mechanism of the Transmission Control Protocol. BTL4 Analyzing
13. Evaluate the service request structure of WTP class 0. BTL5 Evaluating
14. Compose the basic objective of WAP. BTL6 Creating
15. Draw the time sequence chart for WSP /B session termination. BTL6 Creating
16. Define wireless application environment. BTL1 Remembering
17. Where i-mode is used? BTL1 Remembering
18. Why we used SyncML? BTL2 Understanding
19. Examine the advantages of Snooping TCP. BTL4 Analyzing
20. Assess the transaction oriented TCP connection setup. BTL5 Evaluating
21. Recall how does mobile TCP maintain end to end semantics? BTL1 Remembering
22. Summarize the parameters of TR_Invoke.req primitive? BTL2 Understanding
23. Experiment with how can we extend basic WAE to WTA? BTL3 Applying
24. Infer the capabilities of WML script? BTL4 Analyzing
PART-B
1. What is wireless markup language? Write its features. (13) BTL1 Remembering
2. Illustrate the classical TCP improvements. (13) BTL2 Understanding
3. Describe WSP/B over WTP. (13) BTL1 Remembering
4. Elaborately explain about Push architecture. (13) BTL4 Analyzing
(i) Interpret the WTP class 2 protocols. (7)
5. BTL2 Understanding
(ii) Summarize the working of Snooping TCP. (6)
Draw and explain the logical model of wireless application
6. BTL2 Understanding
environment. (13)
7. Examine the wireless transport layer security. (13) BTL4 Analyzing
8. Compare the functions of various types of TCPs. (13) BTL5 Evaluating
List the components of WAP architecture and explain in detail.
9. BTL4 Analyzing
(13)
Discuss about the
10. i) i- mode protocol stack (7) BTL6 Creating
ii) SyncML (6)
11. Recall about traditional TCP protocol. (13) BTL1 Remembering
12. Organize the wireless application protocol architecture. (13) BTL3 Applying
13. Identify the service primitives of WDP. (13) BTL5 Evaluating
14. Relate the WML script complements to WML. (13) BTL1 Remembering
15. (i) What is Wireless Telephony application? Explain WTA logical
architecture. (7)
BTL2 Understanding
(ii) Describe the several standard libraries for WML script specified
by WAP. (6)
16. (i) Discuss the architecture of Wireless Telephony application in
detail. (7) BTL3 Applying
(ii) Explain the following: (a) WML (3) and (b)WML scripts. (3)
17. Recent days Internet sites offer facilities to download music files
from video store directly and get the payment billed to our mobile
phones. Sketch a Wireless Telephony Application(WTA) BTL5 Evaluating
architecture that would provide a similar facility for Mobile games.
(13)
PART - C
Elaborately discuss about functions of
i) Indirect TCP (5)
1. BTL 5 Evaluating
ii) Snooping TCP (5)
iii) Mobile TCP (5)
2. Explain the functions of the wireless transaction protocol. (15) BTL 5 Evaluating
3. With neat timing chart explain about wireless session protocol. (15) BTL 5 Evaluating
4. Describe the logical diagram of wireless telephone applications. (15) BTL 6 Creating
5. Formulate the parameters of transaction and session protocols. (15) BTL 6 Creating

You might also like