Imteyaz - PDF 2

Download as pdf or txt
Download as pdf or txt
You are on page 1of 9

Imteyaz Mallick Reg No:37250005

------------------------------------------------------------------------------
1.Write a short notes on imode.
Imode:
* i-Mode, stands for Internet Mode is a microbrowser technology that
supports text, graphics, audio, and video for Web access over the
Japanese cellular network. It was introduced by a team led by Mari
Matsunaga in February 1999 at NTT DoCoMo
* Fortune Magazine recently selected Mari Matsunaga as one of the
most powerful women in business in Japan.
* i-Mode is one of the most successful services offering wireless web
browsing and e-mail services from mobile phones in Japan.
* i-Mode provides packet-data transmission, which enables operators
to charge their customers according to the volume of data transmitted and
users do not pay for the time they are connected to a website or service.
* Transmission between the handhelds and the i-Mode-enabled cell
sites is via packet mode, using packets of 128 octets at high-speed data
transmission rates.
* i-Mode customer base is increasing exponentially every day in the
whole world and is being provided worldwide through DoCoMo's partners
through a licensing scheme.
* The current i-Mode center is called CiRCUS in DoCoMo's Kawasaki
office and the operation support system is called CARNiVAL, which is
hosted in the Toranomon JT Building.
* There are DoCoMo's competitors in the market who launched very
similar mobile data services − KDDI launched EZweb, and J-Phone
launched J-Sky etc.
* The service is mostly accessed directly via a menu on
I-Mode-compatible devices. i-mode makes use of DoCoMo’s
packet-switched technology, which provides subscribers with "always on"
network access. Thus, subscribers are billed based on the amount of data
sent and received, not by the time spent on the network to access the
service.
* i-mode websites are created using iHTML, a subset of Hypertext
Markup Language (HTML). Thus, Web developers who are familiar with
HTML can easily modify sites to be i-Mode ready.
I-MODE SERVICES:
*i-mode provides 6 types of services
1.e-mail
2.Transaction
3.Information
4.Database
5.Entertainment
6.Internet web browsing
1. e-mail:
I-mode user can send and receive mails from another i-mode enabled
phone,PDA or a computer
2.Transaction:
Transaction service include banking, ticket reservation,airline
information and credit card information
3.Information service:
Example of information service include news updates, wheather
information sports news and stock quotes
4.Database service:
The database service provide contents such as telephone directory
search, restuarand guide, dictionary service.
5.Entertainment:
Entertainment service include network game character download,
horoscope.
6.Internet web browsing:
Internet web browsing enables users to browse contents on the
internet.
----------------------------------------------------------------------------------------------------
-----------------
2 .Explain the different layers of WAP protocol stack.
1)Application Layer
* Wireless Application Environment (WAE). This layer is of most
interest to content developers because it contains among other things,
device specifications, and the content development programming
languages, WML, and WMLScript.
2)Session Layer
* Wireless Session Protocol (WSP). Unlike HTTP, WSP has been
designed by the WAP Forum to provide fast connection suspension and
reconnection.
3)Transaction Layer
* Wireless Transaction Protocol (WTP) runs on top of a datagram
service, such as User Datagram Protocol (UDP) and is part of the standard
suite of TCP/IP protocols used to provide a simplified protocol suitable for
low bandwidth wireless stations.
4)Security Layer
* Wireless Transport Layer Security (WTLS). WTLS incorporates
security features that are based upon the established Transport Layer
Security (TLS) protocol standard. It includes data integrity checks, privacy,
service denial, and authentication services.
5)Transport Layer
* Wireless Datagram Protocol (WDP). The WDP allows WAP to be
bearer-independent by adapting the transport layer of the underlying
bearer.
* The WDP presents a consistent data format to the higher layers of
the WAP protocol stack, thereby offering the advantage of bearer
independence to application developers.
* Each of these layers provides a well-defined interface to the layer
above it.
* This means that the internal workings of any layer are transparent
or invisible to the layers above it.
* The layered architecture allows other applications and services to
utilise the features provided by the WAP-stack as well.
* This makes it possible to use the WAP-stack for services and
applications that currently are not specified by WAP.
Uses:
* Wireless application protocol is a communications protocol that is
used for wireless data access through most mobile wireless networks.
* WAP enhances wireless specification interoperability and facilitates
instant connectivity between interactive wireless devices such as mobile
phones and the Internet.
Some of the key features of WAP technology are:
* A programming model similar to the Internet's
* Wireless Markup Language (WML)
* WML Script
* Wireless Telephony Application Interface (WTAI)
* Optimized protocol stack
----------------------------------------------------------------------------------------------------
3.Define Transaction Oriented Tcp.Explain its advantages and
disadvantages.
Transaction Oriented tcp:
* TCP for Transactions (T/TCP) is a possible successor to both TCP
and UDP.
* It is a transaction-oriented protocol based on a minimum transfer of
segments, so it does not have the speed problems associated with TCP.
By building on TCP, it does not have the unreliability problems associated
with UDP.
TCP Connection-Oriented Communications:
* TCP is called connection-oriented communication. TCP maintains
status information regarding the connections it makes and is therefore a
reliable protocol. A single TCP connection is identified by combination of IP
addresses and virtual port numbers used by both ends.
* For connection-oriented communications, each end point must be
able to transmit so that it can communicate. ... Because they can keep
track of a conversation, connection-oriented protocols are sometimes
described as stateful.
* For example, TCP or parts of it are used in the File Transfer
Protocol (FTP) and the Simple Mail Transfer Protocol (SMTP), both of
which do not use IP. If a datagram is corrupted or lost, it is usually TCP (not
the applications in the higher layers) that handles the retransmission. TCP
is not a piece of software.
* TCP is a transport layer protocol in the OSI layer and it is used to
create a connection between remote computers by transporting and
ensuring the delivery of messages over supporting networks and the
Internet.
TCP Reliability:
* TCP provides for the recovery of segments that get lost, are
damaged, duplicated or received out of their correct order. TCP is
described as a 'reliable' protocol because it attempts to recover from these
errors. ... TCP also requires that an acknowledge message be returned
after transmitting data.
Advantages:
* It is an industry–standard model that can be effectively deployed in
practical networking problems.
* It is interoperable, i.e., it allows cross-platform communications
among heterogeneous networks.
* It is an open protocol suite. It is not owned by any particular
institute and so can be used by any individual or organization.
* It is a scalable, client-server architecture. This allows networks to
be added without disrupting the current services.
* It assigns an IP address to each computer on the network, thus
making each device to be identifiable over the network. It assigns each site
a domain name. It provides name and address resolution services.
Disadvantages:
* It is not generic in nature. So, it fails to represent any protocol stack
other than the TCP/IP suite. For example, it cannot describe the Bluetooth
connection.
* It does not clearly separate the concepts of services, interfaces,
and protocols. So, it is not suitable to describe new technologies in new
networks.
* It does not distinguish between the data link and the physical
layers, which has very different functionalities. The data link layer should
concern with the transmission of frames. On the other hand, the physical
layer should lay down the physical characteristics of transmission. A proper
model should segregate the two layers.
* It was originally designed and implemented for wide area networks.
It is not optimized for small networks like LAN (local area network) and
PAN (personal area network).
* Among its suite of protocols, TCP and IP were carefully designed
and well implemented. Some of the other protocols were developed ad hoc
and so proved to be unsuitable in long run. However, due to the popularity
of the model, these protocols are being used even 30–40 years after their
introduction.
----------------------------------------------------------------------------------------------------
-----------------
4. Illustrate the dynamic source routing (DSR) algorithm step as in detail.
The Dynamic Source Routing protocol (DSR) is a
simple and efficient routing protocol designed specifically
for
use in multi-hop wireless ad hoc networks of mobile
nodes.
The sender of a packet determines the complete
sequence
of nodes through which, the packets are forwardedDSR
allows the network to be completely self-organizing and
self-configuring, without the need for any existing network
infrastructure or administration.
It is a reactive protocol and all aspects of the protocol
operate entirely on-demand basis.
It works on the concept of source routing. Source
routing is a routing technique in which the sender of a
packet
determines the complete sequence of nodes through
which,
the packets are forwarded.
The advantage of source routing is : intermediate
nodes do not need to maintain up to date routing
information
in order to route the packets they forward.
The protocol is composed of the two main mechanisms
of "Route Discovery" and "Route Maintenance".
DSR requires each node to maintain a route – cache
of all known self – to – destination pairs. If a node has a
packet to send, it attempts to use this cache to deliver the
packet.
If the destination does not exist in the cache, then a
route discovery phase is initiated to discover a route to
destination, by sending a route request.
This request includes the destination address, source
address and a unique identification number.
If a route is available from the route – cache,
but is not valid any more, a route maintenance procedure
may be initiated.
A node processes the route request packet only if it
has not previously processes the packet and its address is
not present in the route cache.
A route reply is generated by the destination or by any
of the intermediate nodes when it knows about how to
reach
the destination.
Example
In the following example, the route discovery procedure is
shown where S1 is the source node and S7 is the
destination
node.
In this example, the destination S7, gets the request
through two
paths. It chooses one path based on the route records in
the
incoming packet and sends a reply using the reverse path
to the
source node. At each hop, the best route with minimum
hop is
stored. In this example, it is shown the route record status
ate
each hop to reach the destination from the source node.
Here,
the chosen route is S1-S2-S4-S5-S7.
Advantages and Disadvantages:
a) DSR uses a reactive approach which eliminates the
need to
periodically flood the network with table update messages
which
are required in a table-driven approach. The intermediate
nodes
also utilize the route cache information efficiently to reduce
the
control overhead.
b) The disadvantage of DSR is that the route maintenance
mechanism does not locally repair a broken down link.
The
connection setup delay is higher than in table- driven
protocols.
Even though the protocol performs well in static and
low-mobility environments, the performance degrades
rapidly
with increasing mobility. Also, considerable routing
overhead is
involved due to the source- routing mechanism employed
in
DSR. This routing overhead is directly proportional to the
path
length.
5) Explain about GSM security.
GSM is the most secured cellular telecommunications
system available today. GSM maintains end-to-end
security by retaining the confidentiality of calls and
anonymity of the GSM subscriber. Temporary
identification numbers are assigned to the subscriber's
number to maintain the privacy of the user.
Mobile Station Authentication
The GSM network authenticates the identity of the subscriber through
the use of a challenge-response mechanism. A 128-bit Random Number
(RAND) is sent to the MS.
The MS computes the 32-bit Signed Response (SRES) based on the
encryption of the RAND with the authentication algorithm (A3) using the
individual subscriber authentication key (K).
Upon receiving the SRES from the subscriber, the GSM network
repeats the calculation to verify the identity of the subscriber.
The individual subscriber authentication key (Ki) is never transmitted
over the radio channel, as it is present in the subscriber's SIM, as well as
the AUC, HLR, and VLR databases.
If the received SRES agrees with the calculated value, the MS has
been successfully authenticated and may continue.
If the values do not match, the connection is terminated and an
authentication failure is indicated to the MS.
The calculation of the signed response is processed within the
SIM. It provides enhanced security, as confidential subscriber information
such as the IMSI or the individual subscriber authentication key (Ki) is
never released from the SIM during the authentication process.
Signalling and Data Confidentiality:
The SIM contains the ciphering key generating algorithm (A8)
that is used to produce the 64-bit ciphering key (Kc).
This key is computed by applying the same random number
(RAND) used in the authentication process to ciphering key generating
algorithm (A8) with the individual subscriber authentication key (Ki).
GSM provides an additional level of security by having a way to
change the ciphering key, making the system more resistant to
eavesdropping.
The ciphering key may be changed at regular intervals as
required. As in case of the authentication process, the computation of the
ciphering key (Kc) takes place internally within the SIM.
Therefore, sensitive information such as the individual subscriber
authentication key (Ki) is never revealed by the SIM.
Encrypted voice and data communications between the MS and the
network is accomplished by using the ciphering algorithm A5.
Encrypted communication is initiated by a ciphering mode request
command from the GSM network. Upon receipt of this command, the
mobile station begins encryption and decryption of data using the
ciphering algorithm (A5) and the ciphering key (Kc).
Subscriber Identity Confidentiality
To ensure subscriber identity confidentiality, the Temporary Mobile
Subscriber Identity (TMSI) is used. Once the authentication and encryption
procedures are done, the TMSI is sent to the mobile station.
After the receipt, the mobile station responds. The TMSI is valid in
the location area in which it was issued. For communications outside the
location area, the Location Area Identification (LAI) is necessary in
addition to the TMSI.
\

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy