You are on page 1of 5

************************************

I. Study Guide: July 26, 2005


************************************
A. General Guideline:
1.
2.
3.
4.
5.
6.
7.
8.

Study the summary in each chapter.


Study the lecture notes.
Study the study guide.
Study the previous exams.
Study the sample programs (J2ME Web service).
Study the homeworks.
Study the textbook.
Do the exercises.

B. Review for the Final:


1. Understand the basic terminologies.
2. Understand fundmentals of mobile and wireless communications (Chap 1)
3. Understand wireless local area networks (LANs) and personal area networks
(PANs) (Chap 2)
4. Understand wireless wide area networks (WANs) and metropolitan area networks
(MANs) (Chap 3)
5. Understand wireless Internet (Chap 4)
6. Understand ad hoc wireless networks (Chap 5)
7. Understand MAC protocols for ad hoc wireless networks (Chap 6 - Lecture Notes
)
8. Understand transport layer for ad hoc wireless networks (Chap 9)
9. Understand security for ad hoc wireless networks (Chap 9)
10. (bonus points) Understand recent advances (Chap 14 - Lecture notes)
11. Understand Web servcies
***********************
II. Sample Questions:
***********************
A. Multiple Choice Questions:
(B) 1. Which is a split approach based solution for TCP over wireless
networks?
(A) Snoop TCP (B)ITCP (C) ELN (D) TTCP
(B) 2. Which organization specifies Wireless Application Protocol?
(A) WAP Consortium (B) WAP Forum (C) CCITT (D) IEEE
(A) 3. What programming model is the WAP programming model similar to?
(A) WWW (B) OSI (C) electromagnetic spectrum (D) none of the above
(C) 4. Which layer protocol is WTP?
(A) application (B) presentation (C) session (D) transport
(B) 5. What is WML similar to?
(A) HTTP (B) HTML (C) FTP (D) none of the above
(C) 6. Which language is used to describe pages in i-mode?
(A) WML (B) XML (C) cHTML (D) DHTML
(D) 7. Which layer protocol is WAE?
(A) transport (B) session (C) presentation (D) application

(A) 8. What is WCMP similar to?


(A) ICMP (B) DNS (C) RARP (D) none of the above
(D) 9. Which is not an disadvantage of hybrid wireless networks?
(A) higher capacity (B) increased flexibility and reliability in routing
(C) better coverage and connectivity (D) none of above
(B) 10. Which typically buids a ad-hoc network?
(A) IEEE 802.11 (B) Bluetooth (C) HiperLAN2 (D) DECT
(C) 11. Which MAC protocol is used in 802.11?
(A) FAMA (B) D-PRMA (C) MACAW (D) ZZ
(A) 12. Which is a contention-based MAC protocol for ad hoc wireless networks?
(A) MACAW (B) D-PRMA (C) DWOP (D) MCSMA
(D) 13. Which is not a reason why TCP does not perform well in ad hoc
network?
(A) misinterpretation of packet loss
(B) frequent path breaks
(C) network partitioning and remerging
(D) none of above
(A) 14. Which is not a security protocol?
(A) TCP (B) TLS (C) SSL (D) HTTPS
(C) 15. Which is not a security threat?
(A) interception (B) modification (C) intimidation (D) None of above
(B) 16. Which is not a security mechanism?
(A) encryption (B) replication (C) authorization (4) auditing
(C) 17. Which is public-key cryptography?
(A) Caesar cipher (B) Transposition cipher (C) RSA (D) DES
B. Question and Answer:
1. Define the following:
A.
B.
C.
D.
E.
F.
G.
H.
I.
J.
K.
L.
M.
N.
O.
P.
Q.
R.
S.

WDP
WTLS
WTP
WSP
WAE
WAP
WCMP
WML
WMLScript
WTA
i-mode
CA
PKI
UWB
WiMedia
WiMax
WiFi
WAR
WSDL

2. (Chap 4)
Describe the machanism, advantages, and disadvantages of snooping TCP,
indirect TCP (ITCP), and M-TCP respectively.
3. (Chap 4)
Briefly discuss the main goals of WAP.
Explain the WAP client-server model.
Describe the WAP protocol stack.
4. (Chap 4)
Describe the WAP componets in transport, security, transaction, session,
and application layer respectively.
5. (Chap 5)
What is a wireless mesh network?
List three advantages of hybrid wireless networks.
1) A wireless mesh network is a network forming a mesh in which each
node is connected directly or indirectly to the other node through
wireless communication.
2) The advantages of hybrid wireless networks are:
a) Higher capacity than cellular networks
b) Increased flexibility and reliability in routing
c) Better coverage and connectivity
6. (Chap 6)
Briefly classify MAC protocols for ad hoc wireless networks.
Briefly explain the idea behind each type of protocols.
Give application scenarios where contention-based, reservation-based,
and packet scheduling-based MAC protocols can be used.
7. (Chap 6)
What are the advantages and disadvantages of MAC protocols using
directional antennas.
8. (Chap 4, 9)
What are the problems of TCP over wireless networks.
9. (Chap 9)
1) What are network security requirements?
2) List four types of security threats.
1) A security protocol should meet following requirements:
o Data confidentiality/secrecy is concerned with ensuring that data is
not exposed to unauthorized users.
o Data integrity means that unauthorized users should not be able to
modify any data without the owner's permission.
o System availability means that nobody can disturb the system to have it
unusable.
o Authentication is concerned with verifying the identity of a user.
o Non-repudiation means that the sender cannot deny having sent a message
and the recipient cannot deny have received the message.
2) Four types of security threats:
o Interception refers to the situation that an unauthorized party has
gained access to a service or data.
o Interruption refers to the situation in which services or data become
unavailable, unusable, or destroyed.
o Modifications involve unauthorized changing of data or tampering with a

service.
o Fabrication refers to the situation in which additional data or activity
are generated that would normally not exist.
10. (Chap 9)
What is a secret key algorithm?
What is a public key algorithm?
Ans:
Secret key algorithm - Communication participants use the same key.
Public key algorithm - Communication participants use different keys
to encrypt and decrypt.
11. (Chap 9)
Encrypt the following plaintext using a transposition cipher based on
the key MEGABUCK.
plaintext = p l e a s e t r a n s f e r o n e h u n d r e d
ciphertext = _______________________________________________
Ans:
plaintext = p l e a s e t r a n s f e r o n e h u n d r e d
ciphertext = a f n s e d t o e l n h e s u r n d p a e e r r
7 4 5 1 2 8 3 6
--------------p l e a s e t r
a n s f e r o n
e h u n d r e d
12. (Chap 9)
Using the RSA public key cryptography algorithm.
Given p = 5, q = 11, find a possible d and e.
Ans: n = p * q = 55
z = (p - 1) * (q - 1) = 4 * 10 = 40
Choose d = 7 which is relatively prime to 40.
7 e % 40 = 1, 41, 81, 121, 161
7 e = 161
e = 23
Note:
1) You can also choose 3, 9, 11, 13, 17, 19, 21, 23, 29, and etc. to be
decryption key as long as those numbers are relatively prime to 40.
But most of time a prime number is choosen becasue RSA depends on
the difficulity to find that prime number.
2) Two integers are relatively prime if they have no common factors. For
example, 14 and 25 are relatively prime, while 14 and 91 are not; 7 is
a common factor.
3) The decryption key is kept by yourself and the encryption key is given
to others.
13. (Chap 9)
Describe the properties of hash functions that are used in cryptographic
systems.

Ans: The properties of hashing functions are:


o Oneway function: Given some output M_out of Es, it is (analytically or)
computationally infeasible to find M_in
o Weak collision resistance: Given an input m and its associated output
h = H(m) it is computationally infeasible to find an m' such that
H(m) = H(m').
o Strong collision resistance: given only H, it is computationally infeasible
to find any two different inputs m and m' such that H(m) = H(m').
14. (Chap
1) What
2) What
3) What

9)
is a key encryption key (KEK)?
is a traffic encryption key (TEK)?
is a reflection attack?

Ans:
1) Key encryption keys are those keys used to encrypt keys.
2) Traffic encryption keys are those keys used to encrypt data traffic.
3) A reflection attack is a potential way of attacking a challenge-response
authentication system which uses the same protocol in both directions.
The attacker initiates two separate connection attempts to the same
target, and sends back the challenges received on one connection as
its responses on the second connection. If the authentication protocol
is not carefully designed, it will accept its own responses as valid,
thereby leaving the attacker with one fully-authenticated channel
connection.
15. (Chap 9)
Describe the four key management approaches.
Ans:
o Key predistribution: Keys are distributed to all participants before the
communication.
o Key transport: Keys are generated in one communication entity and
transported to all participants.
o Key arbitration: Keys are created and distributed by a central arbitrator
to all participants.
o Key agreement: Participants agree on a secret key for the further
communications.
16. (Chap 14) (Bonus)
What is UWB?
Why can UWB archieve a very high data transfer rate?
Why does UWB cause no interference to other radio?
17. (Lab)
What is a Web service?
What is Web service standard composed of?
What is the purpose of a WSDL file?

You might also like