You are on page 1of 25

PART A (2 Marks)

UNIT I

1. What is guard space?
Guard spaces are needed to avoid Irequency band overlapping is also called channel
interIerence.

2. What is the 3 diIIerent basic schemes analog modulation?
Amplitude modulation
Frequency modulation
Phase modulation

3. What is multipath propagation?
Multipath propagation is the direct Irom a sender to a receiver the propagation eIIects mentioned
in the previous section lead to one oI the most severe radio channel impairments.

4. What is hopping sequence?
Transmitter and receiver stay on one oI these channels FDM and TDM. The pattern oI channel
usage is called the hopping sequence.

5. What are the advantages oI cellular systems?

The advantages oI cellular systems are,
Higher capacity
Less transmission power
Local interIace only
Robustness

6. What is borrowing channel allocation and Iixed channel allocation?
Cells with more traIIic are dynamically allotted more Irequencies. This scheme is known as
borrowing channel allocation, while the Iirst Iixed scheme is called Iixed channel allocation.

7. What is modulation?
Modulation is the process oI varying one or more properties oI a high-Irequency periodic
waveIorm, called the carrier signal, with respect to a modulating signal (which typically contains
inIormation to be transmitted).

8. What is multiplexing?
Multiplexing is a Iundamental mechanism in communication system. Multiplexing describes
how several users can share a medium with minimum or no interIerence.
9. What are the 3 Iundamental propagation behaviors depending on their Irequency?
Ground Wave
Sky Wave
Line oI Sight.

10. What are the disadvantages oI cellular systems?
The advantages oI cellular systems are,
InIrastructure needed
Handover needed
Frequency planning

11. What is digital sense multiple access?
The scheme which is used Ior the packet data transmission service Cellular Digital
Packet Data in the AMPS mobile phone system is also known as digital sense multiple
access (DSMA).

12. What is OVSF?
Using orthogonal codes separates the diIIerent data streams oI a sender UMTS uses so-called
Orthogonal Variable Spreading Iactor codes (OVSF).

13. SpeciIy the steps perIorm during the search Ior a cell aIter power on?
Primary synchronization
Secondary synchronization
IdentiIication oI the scrambling code

14. Why baseband signals cannot be directly transmitted in a wireless system?
Antennas must be the order oI magnitude oI the signal`s wavelength.
Medium Characteristics.

15. DeIine beacon?
Beacon Irame is used to convey timing inIormation within a BSS. It contains a
timestamp and other management inIormation used Ior power management and roaming.
The timestamp is used by the node to adjust its local clock.

16. What are the handovers in hiperLAN?
The handovers in hiperLAN are
Sector handover
Radio handover
Network handover

17. Distinguish inIrastructure and adhoc networks?
Infrastructure networks adhoc networks
O Communication takes place only
between a wireless node and an
access point
The wireless node is simple as
Iunctionality is based on the access
point
The wireless node is complex
Can Iorward messages across
networks
Can Iorward messages only within the
speciIied range
18. Why is physical layer in IEEE802.11 subdivided? What are its sublayers?
The physical layer in IEEE802.11 is subdivided because a sublayer has to be
dependent on the upper layers (architecture dependant) and the other has to be medium
dependant. The two sublayers are namely,
Physical layer convergence protocol
Physical medium dependant sublayer
19. DeIine MSDU liIetime?
MSDU liIetime is used to provide time bounded service which speciIies the
maximum time that can elapse between sending and receiving a MSDU. It has a range oI
0-16000 ms.
20. What are the elements in core protocols in Bluetooth?
The elements in core protocols in Bluetooth are,
Radio
Baseband
Link Manager Protocol
Logical Link control and adaptation protocol
Service discovery protocol.
UNIT II
1. What are the basic elements oI telecommunication systems?
Transmitter it takes the inIormation and converts into signal
Transmission medium it carries the signal
Receiver receives the signal and converts it back into usable inIormation.
2. What are the major subsystems in GSM?
GSM consists oI three major components
Base station subsystem
Network and switching subsystem
Operation support subsystem
3. List the databases oI NSS in GSM?
Home location register
Visitor location register
Authentication center
4. What are the Iunctions oI OSS in GSM?
Manage all charging and billing procedures
Manage all mobile equipment in the system
5. Write the interIaces used in GSM
There are three interIaces used in GS, they are
GSM radio air interIace
Abis interIace
A interIace
6. What are the services oIIered by the GSM?
There are three user services oIIered by GSM, they are
Bearer or data service
Telephone service
Supplementary ISDN service
7. List the security services oIIered by GSM?
Access Control and Authentication
ConIidentiality
Anonymity
8. DeIine the protocol architecture oI DECT.
The protocol architecture oI DECT consists oI three layers. They are:
Physical Layer.
Medium Access Layer.
Data Link Control Layer.
Network Layer.
The Iirst three layers are common Ior both Control Plane (C-Plane) and User
Plane (U-Plane). The network layer has been speciIied only Ior U-Plane, so that user data
Irom layer two is directly Iorwarded to the U-Plane.
9. What is meant by GGSN?
GGSN is Gateway GPRS Support Node. It is the inter-working unit between the
GPRS network and external packet data networks. The GGSN is connected to external
networks via the Gi interIace and transIers packets to the SGSN via an IP-based GPRS
backbone network.
10. What is meant by BSSGP?
BSSGP is Base Station Subsystem GPRS Protocol. It is used to convey routing
and QoS-related inIormation between the BSS and SGSN.BSSGP does not perIorm error
correction and works on top oI a Irame relay network.
11. What are the Iour possible handover scenarios in GSM?
The Iour possible handover scenarios in GSM are:
Intra-cell handover.
Inter-cell, intra-BSC handover.
Inter-BSC, intra-MSC handover.
Inter MSC handover.
12. List out the numbers needed to locate an MS and to address the MS.
The numbers needed to locate an MS and to address the MS are:
Mobile station international ISDN number (MSISDN).
International mobile subscriber identity (IMSI).
Temporary mobile subscriber identity (TMSI).
Mobile station roaming number (MSRN).
13. Write the application oI satellite network?
Weather Iorecasting
Radio and TV broadcast satellite
Military satellite
Satellites Ior navigation
14. DeIine elevation angle?
The Elevation angle is the angle Irom the horizontal to the point on the center oI
the main beam oI the antenna when the antenna is pointed directly at the satellite.
15. What are the advantages GEO?
Three GEO satellites are enough Ior a complete coverage oI almost any spot on
earth. Senders and receivers can use Iixed antenna positions, no adjusting is needed.
ThereIore GEO are ideal Ior TV and radio bradcasting
16. List the advantages oI MEO?
Using orbits around 10,000 km, the system only requires a dozen satellites which
is more than a GEO system, but much less than a LEO system. Furthermore these
satellites move slower relative to the earth`s rotation allowing a simpler system design.
17. What are the types oI transport mechanism used in DAB?
The two basic transport mechanisms used by DAB are:
Main Service Channel (MSC).
Fast InIormation Channel (FIC).
18. What are the Iactors limited the number oI sub channels provided within the satellite
channel?
There are three Iactors limited the number oI sub channels provided within the
satellite channel. They are:-
Thermal Noise.
Intermodulation Noise.
Crosstalk.
19. What is the Irequency range oI uplink and downlink in GSM network?
The Irequency range oI uplink in GSM network is 890-960 MHz.
The Irequency range oI downlink in GSM network is 935-960 MHz.
20. What are the two basic groups oI logical channels in GSM?
The two basics groups oI logical channels in GSM are:
TraIIic channels (TCH).
Control Channels (CCH).
UNIT III
1. What are the advantages oI WLAN?
High Ilexibility
Simple Design
Easy planning
Low cost
2. What are the beneIits oI using inIrared Ior transmission?
It is simple and extremely cheap senders and receivers
It deIines higher data rates
The electrical devices do not interIere with the inIrared transmission
3. What are adhoc networks?
Adhoc networks do not need any inIrastructure to work and each node can
communicate with other nodes directly, so that the access point controlling medium is not
necessary.
4. What are the disadvantages oI WLAN?
Lower quality oI service
Slow standardization procedures
Frequency restriction
Less saIety and security.
5. What is IEEE 802.11 standard?
The IEEE 802.11 standard speciIies the physical and medium access layer
adapted to the special requirements oI wireless LANs. This standard oIIers the time
bounded and asynchronous services. The data rate oI this standard is 54 Mbits/s at 5
GHZ.
6. What is ESS and ESSID?
A distribution system is used to connect a several BSS via the access point to
Iorm a single network and thereby extends the wireless coverage area. This network is
called extended service set and it has own identiIier is called ESSID. The ESSID is used
to separate diIIerent networks.
7. How the physical layer is subdivided in IEEE 802.11 standard?
The physical layer is subdivided into two parts.
Physical layer convergence protocol.
Physical medium dependent sublayer
8. What are the Iunctions oI MAC management?
Supports the association and reassociation oI a station to an access point and
roaming between diIIerent access points.
It maintains the MAC inIormation base (MIB)
It also controls the authentication mechanisms, encryption, power management
9. DeIine SIFS and PIFS.
The shortest waiting time Ior medium access is called the short interIrame
spacing. For DSSS the SIFS is 10 microsec and Ior FHSS is 8 microssec.
The waiting time between DCF interIrame spacing and SIFS is called PCF
interIrame spacing.
10. What are the services provided by the MAC layer?
Asynchronous data service
Time bounded services
11. DeIine HIPERLAN.
HIPERLAN means high perIormance local area network. The ETSI standardized
HIPERLAN1 as a WLAN allowing Ior node mobility and supporting inIrastructure based
adhoc topologies. It includes topology discovery, Iorwarding mechanism, user data
encryption, power conservation nmechnism.
12. List the phases in EY-NPMA.
The heart oI channel access providing priorities is elimination yield non preemptive
priority multiple access. It divides the medium access oI diIIerent competing nodes into
three phases.
Prioritization phase
Contention phase
Transmission phase
13. What are the diIIerent channels used in HIPERLAN2?
Broadcast channel
Long transport channel
Random channel
Access Ieedback channel
Short transport channel
Frame channel
14. What are the Ieatures oI HIPERLAN2?
High throughput transmission
Connection oriented
Security support
Quality oI service support
15. What are the Iunctions oI link manager protocol?
Authentication, paging and encryption
Capability negotiation
Power control
Synchronization
Link supervision
16. What is Bluetooth?
The bluetooth technology also called as adhoc piconets. It is a local area network
with aver limited coverage and does not need Ior an inIrastructure. It is used to connect
diIIerent small devices in close proximity about 10m without the use oI wiring or the
need Ior wireless inIrastructure.
17. What are the advantages oI Bluetooth technology?
Bluetooth provides a range oI about 100 metres
It is also low power and low processing with an overhead protocol
The application with the Bluetooth are virtually endless.
18. Write some WATM service?
WATM is mainly designed Ior transIerring voice, classical data, video,
multimedia data.
OIIice environment
Universities, schools
Hospital
Industries.
19. DiIIerentiate p-scanners and p-supporters.
In HIPERLAN a node may have a speciIic wake up pattern. His pattern determines at
what time the node is read to receive, so that other times, the node can turn oII its
receiver and save the energy. These types oI nodes are called p-savers.
The inIormation about the wake-up patterns oI all the p savers are in p supporters.
When the p saver is awake, it Iorwards the data to a p saver.
20. What is scatternet?
Group oI piconets are called as scatternets. A scatter net may have two piconets,
in which one device participates in two diIIerent piconets.
UNIT IV
1. What is a socket?
A TCP connection can be identiIied by the tuple such as source IP address, source port,
destination IP address, destination port also known as socket. ThereIore, a TCP connection
cannot survive any address change.

2. What are the requirements oI Mobile IP?
Compatibility
Transparency
Scalability and EIIiciency
Security

3. DeIine COA.
A COA deIines the current location oI the MN Irom an IP point oI view. All IP packets sent to
the MN are delivered to the COA, not directly to the IP address oI the MN. Packet delivery
toward the MN is done using a tunnel.

4. What is Co-located COA?
A COA is called co-located iI the Mobile Node temporarily acquired an additional
IP address which acts as a COA. This address is now topologically correct, and the tunnel
endpoint is at the mobile node.
5. What is encapsulation and decapsulation?
Encapsulation is the mechanism oI taking a packet consisting oI packet header
and data and putting it into the data part oI a new packet. The reverse operation, taking a
packet out oI the data part oI another packet, is called decapsulation.
6. What is the purpose oI GRE?
GRE allows the encapsulation oI packets oI one protocol suite into the payload
portion oI a packet oI another protocol suite. The packet oI one protocol suite with the
original packet header and data is taken and a new GRE header is prepended. Together
this Iorms the new data part oI the new packet.
7. What do you mean by binding request?
Any node that wants to know the current location oI the mobile node can send a
binding request to the home agent/ the home agent can check iI the MN has allowed
dissemination oI its current location. II the HA is allowed to reveal the location it sends
back a binding update.
8. List the advantages oI using Adhoc networks?
Instant InIrastructure
Disaster RelieI
Dynamic Topology
9. What are the enhancements made in DSDV?
DSDV adds to things to the Distance vector algorithm,
Sequence Number
Damping
10. What is Route Maintenance?
II a node is continuously sending packets via a route . it has to make sure that the
route is held upright. As soon as a node detects problems with the current route, it has to
Iind an alternate route.
11. What is route discovery?
A node only tries to discover a route to a destination oI it has to send something to
this destination and there is currently no known route. II a node needs to discover a route,
it broadcasts a route request with a unique identiIier and the destination address as
parameters.
12. What is the purpose oI DHCPREQUEST?
When the client sends a DHCP discover message the server responds with the
DHCP oIIer message and oIIers a list oI conIiguration parameters. Now the client can
choose among one oI the oIIered conIigurations and rejecting the others using
DHCPREQUEST.
13. What should be done to optimize the route discovery?
Too many broadcasts can be avoided by maintaining a counter.
A node can cache path Iragments Irom recent requests.
A node can also update this cache Irom packet headers.
14. What are the metrics should be considered while routing?
Number oI hops
InterIerence
Reliability and
Error rate
All these above metrics should be minimum.
15. What is binding warning?
II a node decapsulates a packet Ior an MN, but it is not the current FA Ior this
MN, this node sends a binding warning to the HA oI the MN. The warning contains the
IP address oI the MN and the address oI the node that has tried to send the packet to this
MN. The HA should now send binding update to the node that obviously has a wrong
COA Ior the MN.
16. What is the main purpose oI registration request in mobile IP?
The main purpose oI registration is to inIorm the HA oI the current location Ior
correct Iorwarding oI packets. Registration is done by mobility binding
17. What do you mean by mobility binding?
The MN sends its registration request containing the COA to the FA which is
Iorwarding the request to the HA. The HA now sets up a mobility binding containing the
mobile node`s home IP address and the current COA.
18. What are the services provided by the Ioreign agent?
The FA can provide serveral services to the MN during its visist in the Ioreign
network. The FA can have the COA thus acting as tunnel endpoint and Iorwarding
packets to the MN. Furthermore the FA can be a deIault router Ior the MN. The FA can
also provide security services.
19. What is Foreign agent COA?
The COA could be located at the FA, ie., the COA is an IP address oI the FA.
Thus the FA is the tunnel end point and Iorwards packets to the MN~ many MN using
the FA can share this COA as common COA.
20. What does recursion control Iield represent?
It is an import Iield that distinguished GRE Irom IP-in-IP and minimal
encapsulation. This Iield represents a counter that shows the number oI allowed recursive
encapsulations.
1. What is the importance Ior congestion threshold?
Congestion widow gets doubled each time when there is a proper
acknowledgement. It is too dangerous to double the cogestion window each time because
the steps might become too large. ThereIore, the exponential growth oI the congestion
window has to be stopped by using the congestion threshold. As soon as the congestion
window reaches the congestion threshold , Iurther increase oI transmission rate is only
linear by adding 1 to the congestion window each time.
2. What is indirect TCP?
Indirect TCP is used to segment a TCP connection into a Iixed part and a wireless
part. Between the Iixed computer and the access point standard TCP is used. Thus, no
computer in the internet recognizes any changes to TCP~ the access point is now seen as
the mobile host Ior the Iixed host and as a Iixed host Ior the mobiel host.
3. What are the advantages oI snooping TCP?
Prevention oI End to end TCP semantic.
No Correspondent Node needs to be changed, most oI the enhancements are in the
Ioreign agent.
4. DeIine slow start?
In TCP, missing acknowledgement is quite drastic, but it is necessary to get rid oI
congestion quickly. The behavior oI TCP shows aIter the detection oI congestion is called
slow start.
5. What is Iast retransmit?
The gap in the packet stream is not due to the severe congestion it is also due to
the transmission error. The sender cab now retransmit the missing packet beIore the timer
expires. This behavior is called Iast retransmit.
6. What are the disadvantages oI I-TCP?
a. The loss oI the end to end semantics oI TCP might cause problems iI the FA
partitioning the TCP connection crashes.
b. The handover ltency increases. This may cause more problmes.
7. DeIine persistent mode.
The state oI the sender will not change no matter how long the receiver is
disconnected. This is called persistent mode.
8. List the interIaces used in WAP architecture
a. Transport layer service access point
b. Security service access point
c. Transaction service access point
d. Appication service access point
9. What is the use oI WAE?
The application layer with the Wireless Application Environment (WAE) oIIers a
Iramework Ior the integration oI diIIerent www and mobiel telephony application.
10. What are the beneIits oI using WTP?
It oIIers several advantages to higher layers, including an improved reliability
over datagram services, improved eIIiciency over connection oriented service, and
support Ior transaction oriented services such as web browsing.
11. How does the WTP achieves reliability?
The reliability can be achieved by duplicate removal, retransmission,
acknowledgements and unique transaction identiIiers.
12. What are the Ieatures oI WSP?
a. Session management
b. Capability management
c. Content management
13. List the basic Ieatures oI WML?
The WML includes serveral basic Ieatures such as
Text and images
User interaction
Navigation
Context management
14. What is WDP/
The wireless datagram protocol operates on top oI many diIIerent bearer services
capable oI carrying data. The WDP oIIers more or less the same services as the UDP. In
order to multiplexing and demultiplexing oI data the WDP oIIers a source and destination
port numbers.
15. What is WTA?
The wireless telephony application is a collection oI telephony speciIic extension
Ior call and Ieature control mechanisms, merging data networks and voice networks.
16. What is WAP 2.0?
The WAP 2.0 continues to support WAP 1.x protocols but it additionally
integrates IP, TCP, TLS and HTTP. It supports WML as well as XHTML with a mobile
proIile.
17. What are the beneIits oI using WAP/
Interoperable
Scalable
EIIicient
18. What is the use oI WCMP?
The wireless control message protocol is used to provide the error handling
mechanism Ior WDP. It contains control messages that resemble the ICMP messages Ior
IPV4. it can be used Ior WDP nodes and gateways.
19. What is WTLS?
The Wireless transport layer security can provide diIIerent levels oI security i.e.,
privacy, data integrity, and authentication and it has been optimized Ior low bandwidth,
high delay bearer networks. It supports datagram and connection oriented transport layer
protocols.
20. DeIine snooping TCP.
The FA buIIers all packets with destination mobile host and additionally snoops the packet Ilow
in both directions to recognize acknowledgements is called snoopingTCP.
UNIT V
1. What is pervasive computing?
Pervasive Computing is a technology that pervades the users` environment by making use oI
multiple independent inIormation devices (both Iixed and mobile, homogeneous or
heterogeneous) interconnected seamlessly through wireless or wired computer communication
networks which are aimed to provide a class oI computing / sensory / communication services to
a class oI users, preIerably transparently and can provide personalized services while ensuring a
Iair degree oI privacy / non-intrusiveness



2. What are the basic aspects or oI a Pervasive Computing environment?


O Multiple devices like car key, mobile phones, car audio system, and navigation system
are integrated in the system.
O A large number oI diIIerent interIaces are used to build an optimized user interIace.
O There is a concurrent operation oI oIIline, and temporary online systems.
O A large number oI specialized computer systems are interconnected via local buses and
the internet.
O Short range and wide area wireless communication are integrated.
O Security element provide unauthorized access.

3. List the characteristics oI a Pervasive Computing?
4 Privacy & Security
4 EIIectiveness oI Approach Across Networks
4 Economic considerations
4 Quality considerations
4 Monitoring mechanisms
4 Adaptability and Flexibility
4 Practicability
4 Sustainability
4. DeIine roaming environment?
Roaming Environment: An environment that allows connectivity and communication to the
services outside the home zone is called a RoamingEnvironment. Some sample devices that may
involve Roaming-based
access Iixed / mobile roaming~:
PDAs / Palmtops / Pocket PCs / Cell phones / Smart phones / WAP phones
Laptops / Tablet PCs / Notebook PCs
Desktop PCs / Servers / Web TVs
Kiosks
Invisible computing devices / Smart interactive posters
Wearable computers
5. What are the components oI pervasive computing?
Components oI InIrastructure Ior Pervasive Computing include Mobile computing devices,
Fixed computing devices, Multimode RF Mobile communication inIrastructure Fixed-to-
Mobile and Mobile-to- Fixed communication system interfaces~, Trust system (security and
privacy), Protocol stacks and Personalized service Irameworks.
6. List the issues involved in pervasive computing technology?
O Feature-speciIic issues
Form-Iactor-(size)-speciIic issues
Power-provisioning issues
Weight-speciIic issues
Shape-speciIic issues
Cooling-speciIic issues
Connectivity-speciIic issues
User InterIace-speciIic issues
Body-saIety-speciIic issues not Ior all devices~
Security-speciIic issues
Processor-choice-speciIic issues
Operating System-speciIic issues
Development and execution-environment-speciIic issues
O Cost-speciIic issues
7. What are the hardware Device Technology Ior Pervasive Computing?
Power-provisioning technologies
Display technologies
Memory technologies
Communication technologies
Processor technologies
InterIacing technologies
Sensor Technologies
Authentication Technologies
8. DeIine Low-power Device Technologies?
Since many oI the devices involved in the pervasive computing environment may have to be
small in size and may have to live on their battery / power units, consumption oI lower power,
extension oI power provisioning period etc. assume critical signiIicance. In addition, prevention
Irom excessive heating also requires attention. Power requirements can be reduced by several
means right Irom material selection and chip-level designing to soItware designing and
communication system designing. Power provisioning technology including the Battery design
technology plays a very important role in the process.
9. List the major display device technologies in pervasive computing?
O Cathode Ray Tube based Displays (CRTs)
O Liquid Crystal Displays (LCDs)
O Active Matrix Displays
O Thin Film Transistor Displays (TFTs)
O Passive Matrix displays
O Single Scan Displays (Colour Super-Twist Nematic: CSTNs)
O Dual Scan Displays (Dual Super-Twist Nematic: DSTN)
O High-PerIormance Addressing displays (HPAs)
Light Emitting Diode based Displays (LEDs)
Organic LED based Displays (OLEDs)
Light-Emitting Polymer based Displays (LEPs)
Chip-on-Glass Displays (CoGs)
Liquid Crystal on Glass Displays (LCoGs)
10.How do mobile internet protocol overcome the address problems oI IPv4?
To overcome the address problems oI IPv4 Ior mobile nodes mobile IP uses two IP addresses: a
Iixed home address and care oI address that changes at each new point oI attachment.
11.What is PALM OS?
Palm OS is the computer operating system that provides a soItware platIorm Ior the Palm series
oI handheld personal digital assistants (PDAs) made by Palm Inc. According to Palm, Palm OS
was designed Irom the beginning to Iit into a palm-size device oI a speciIic size and with a
speciIic display size.
12.Explain brieIly about BE OS.
BeOS is a powerIul OS designed primarily Ior Multimedia desktop use. Originally BeOS was
designed Ior a custom computer system known as the BeBox that had special multimedia
input/output Ieatures, and was later ported to the Macintosh, and Iinally ported to the PC.


13.List the characteristics oI IrDA.

O Frequency band
O Security
O Transmitting capabilities
O Bandwidth
O Speech

14.What is the latest technology emerged in batteries?
The latest in battery technology is the emergence oI lithium polymer cells, which use a gel
material Ior the electrolyte. The batteries are made Irom a Iew thin and Ilexible layers, and do
not require a leak-prooI casing. This means the batteries can be made in any shape or size.

15.DeIine Crusoe processor.
The crusoe processor consists mostly oI soItware. The relatively small processor is designed as a
128-bit very long instruction word processor capable oI executing up to Iour operations per
cycle.

16.What do you mean by 'Fitaly?
The Iitaly keyboard arranges the letters based on their individual Irequency and the probability oI
transitions in the English language. The name is derived Irom the orders oI letters in one oI the
top rows oI the layout, just as the QWERTY layout.

17.What is meant by Bio-Metrics?
Biometrics is the science and technology oI measuring and analyzing biological data. In
inIormation technology, biometrics reIers to technologies that measure and analyze human body
characteristics, such as DNA, Iingerprints, eye retinas and irises, voice patterns, Iacial patterns
and hand measurements, Ior authentication purposes.

18.What is a Octave`?.
Another approach to enter a text without real or on-screen keyboard is used by octave Irom e-
acute. Octave maps each letter oI the alphabet to one oI eight unique strokes. The strokes are
based on a common characteristics part oI the letters they represent and are located around the
tips oI a star shaped pattern.

19.What are three steps involved in the process oI Synchronization?
O Pre synchronization
O Synchronization
O Post synchronization.

20.Challenges oI device management in Pervasive Computing?

O Tracking the device location
O Device user relationship
O Version control oI devices and soItware that are out in the Iield
O SoItware updates oI existing devices
O Installation oI new soItware on existing devices
O Providing secure access to device inIormation

You might also like