Hint Wireless (ITT575)

nazzyhan: ni hint utk subject itt575 : wireless
nazzyhan: dr.k pesan
nazzyhan: tgk smua pastyears ques
nazzyhan: yg x penah kua dlm pastyears b4 diz insyaallah kua dlm final nnt
nazzyhan: n baca lebey wireless sensor network (wsn)
nazzyhan: jgn jwb dlm essay utk ques yg markah besar2
nazzyhan: nnt effect markah if dia xde mood tanda paper kte
nazzyhan: he asked to answer in point form
nazzyhan: 1. blablabla explaination: blablabla 2. blablabla explaination: blablabla

tambahan dari beliau…

Utk calculation, study mcm dlm test 2 jer… yg dia x ajar..mmg x masuk.

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Soalan2 yg pernah keluar..so boleh la kalau korang nak skip hafal (at your own risk okay)

++++++++++++++++++++++++++++ ++++++++++++++++++++++++++++++++

Discuss THREE (3) security issues pertaining to ubiquitous computing.

Discuss the tradeoffs between rate and:
(1)coverage, (2)delay, (3)cost and (4)energy respectively (2G vs 3G vs 4G)

Ad-Hoc Network
(1)When should a node update its location information?
(2) to whom should a node send its position information? and
(3) how should a node find the appropriate servers to query for a location. Give your answer to each of these questions.

Explain the concept of tunneling in Mobile IP and explain why it is important.

Why is it useful to have more than one possible path through a network for each pair of
stations?

Indicate THREE (3) major advantages of digital transmission over analog transmission.

State FIVE (5) key advantages of WLL over a wired subscriber loop.

Briefly explain TWO (2) different types of destination addresses that can be assigned to a
mobile node while it is attached to a foreign network.

Determine error correction schemes used in Bluetooth baseband.

Describe THREE (3) security components in Global System for Mobile Communication
(GSM).

(MOBILE IP)
Explain why (reason) if a correspondent host is able to do IP-in-IP decapsulation, it may be able to
communicate more efficiently with the mobile host despite the presence of ingress
filtering.

Explain why (reason) if a correspondent host is able to do IP-in-IP encapsulation, it may be able to
communicate more efficiently with the mobile host than is possible with standard
Mobile IP

———-

Discuss the advantages and disadvantages of wired network and wireless network

Discuss the physical and technological constraints of wireless network.

Discuss how QoS can assist wireless network to be more reliable.

Discuss the possible approaches that the service and network providers could take
to cope with the ever increasing demand (capacity) from the user. (Mobile celular)

One of the solution for this hidden node problem is by introducing the RTS/CTS scheme. Explain how this scheme
works by tailoring your solution based on Figure 2.

(MOBILE IP PROTOCOL)
a) Explain the function of a Home Agent.
b) Explain the function of a Foreign Agent.
c) Differentiate between COA and HA.

There are two general methodologies in deploying WLANs namely Coverage Oriented and
Capacity Oriented. Discuss both of these methodologies.

Explain how DCF uses CSMA/CA to achieve its objective (to avoid stations trasmint at the same time) i.e. as a channel access method.

    • expertester
    • October 23rd, 2010

    tambahan dari beliau…

    Utk calculation, study mcm dlm test 2 jer… yg dia x ajar..mmg x masuk.

    • expertester
    • October 23rd, 2010

    Discuss THREE (3) security issues pertaining to ubiquitous computing.

    Discuss the tradeoffs between rate and:
    (1)coverage, (2)delay, (3)cost and (4)energy respectively (2G vs 3G vs 4G)

    Ad-Hoc Network
    (1)When should a node update its location information?
    (2) to whom should a node send its position information? and
    (3) how should a node find the appropriate servers to query for a location. Give your answer to each of these questions.

    Explain the concept of tunneling in Mobile IP and explain why it is important.

    Why is it useful to have more than one possible path through a network for each pair of
    stations?

    Indicate THREE (3) major advantages of digital transmission over analog transmission.

    State FIVE (5) key advantages of WLL over a wired subscriber loop.

    Briefly explain TWO (2) different types of destination addresses that can be assigned to a
    mobile node while it is attached to a foreign network.

    Determine error correction schemes used in Bluetooth baseband.

    Describe THREE (3) security components in Global System for Mobile Communication
    (GSM).

    (MOBILE IP)
    Explain why (reason) if a correspondent host is able to do IP-in-IP decapsulation, it may be able to
    communicate more efficiently with the mobile host despite the presence of ingress
    filtering.

    Explain why (reason) if a correspondent host is able to do IP-in-IP encapsulation, it may be able to
    communicate more efficiently with the mobile host than is possible with standard
    Mobile IP

    ———-

    Discuss the advantages and disadvantages of wired network and wireless network

    Discuss the physical and technological constraints of wireless network.

    Discuss how QoS can assist wireless network to be more reliable.

    Discuss the possible approaches that the service and network providers could take
    to cope with the ever increasing demand (capacity) from the user. (Mobile celular)

    One of the solution for this hidden node problem is by introducing the RTS/CTS scheme. Explain how this scheme
    works by tailoring your solution based on Figure 2.

    (MOBILE IP PROTOCOL)
    a) Explain the function of a Home Agent.
    b) Explain the function of a Foreign Agent.
    c) Differentiate between COA and HA.

    There are two general methodologies in deploying WLANs namely Coverage Oriented and
    Capacity Oriented. Discuss both of these methodologies.

    Explain how DCF uses CSMA/CA to achieve its objective (to avoid stations trasmint at the same time) i.e. as a channel access method.

    • sibhus
    • October 24th, 2010

    thanx bro! eh eh..thanx arham..:) hee

    • hijau
    • May 1st, 2011

    ade x hint tuk itt575 soklan tuk 2011 punye???

  1. Hello to all, how is the whole thing, I think every one is getting more from this web page, and your
    views are pleasant in support of new visitors.

  2. In most states, you are required to inform people that
    they may be in an area that is being recorded by video or
    audio devices. Give them all the details upfront about the
    security camera and its compatibility with their system.

    It can operate on a 9 volt battery up to a couple of hours.

  1. No trackbacks yet.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: