Authentication and encryption in the gsm


Q1. Illustrate the various types of Inter Frame Space (IFS) which is used by IEEE 802.11 protocol? Describe their purpose.

Q2. Describe in brief the Frequency Hopping Spread Spectrum (FHSS) method.

Q3. Most of the wired LANs products use Carrier Sense Multiple Access with Collision Detection (CSMA/CD) as the MAC protocol. Though wireless topologies can make a problem for the CSMA/CD. What challenges should be dealt with by the MAC which is used for IEEE 802.11? Describe the main steps of the solution to such problems.

Q4. Write down the overview of mechanism, merits and demerits of the given classical enhancements to TCP for mobility:

a) Indirect TCP
b) Snooping TCP
c) M-TCP
d) Fast retransmit or fast recovery

Q5. Describe the two fundamental transport mechanisms which are used by Digital Audio Broadcasting (or DAB).

Q6. Illustrate the functions of authentication and encryption in the GSM? Illustrate how is system security maintained?

Q7. Describe three various forms of human-computer interaction: active, passive and coercive with respect to the pervasive computing.

Q8. Describe the working of Mobile agent. For what kinds of applications mobile agents are appropriate?

Request for Solution File

Ask an Expert for Answer!!
Computer Engineering: Authentication and encryption in the gsm
Reference No:- TGS010786

Expected delivery within 24 Hours