Вы находитесь на странице: 1из 12

1 Raj Kamal: Mobile Computing (2/e)

Chapter 1: Mobile Communications: An Overview


Question Bank
OXFORD H i g h e r E d u c a t i o n
Oxford University Press, 2012. All rights reserved.



Q1. How would you represent a periodic signal?

The signal, s(t), at an instant t is given by the classical sinusoidal-equation:

s(t) =s
0
sin [(2t c/ t) +
t0
]
=s
0
sin [(2t f t) +
t0
] (1.1)

where s
0
is the peak amplitude (amplitude varies between s
0
and

s
0
), c is the velocity of the transmitted
wave,
t0
is the phase angle of the signal at t =0 (a reference point with respect to which t is considered),
and f is the signal frequency.

At the instant t
0
(t =0), the signal amplitude is s
0
sin(
t0
) and this value is repeated after every interval of
T =f
1
, i.e., f times in one second.

The phase angle term, (2t f t )+
t0
, varies between 0 and 2t radian during the interval t to t +T. The
angular frequency, e, is 2t f =2t / T.

Any periodic wave can also be defined by another classical equation called the Fourier equation:
s (t) =Ea
n
sin (2t n f t) +Eb
n
cos (2t n f t) +0.5 a
0
(1.2)

Here, a
n
and b
n
are the Fourier coefficients. The signal has basic frequency component f and harmonics of
frequencies 2f, 3f, 4f,

Page reference:
Signal: Page 2

Q2. What is the relationship between frequency and wavelength?

Refer Section 1.1.2.1.Frequency, f, in MHz and wavelength, , in meter of electromagnetic radiation are
related by the classical formula:

f MHz =c / =(300/) because velocity of electromagnetic waves =3 10
8
m/s =300 10
6
m/s (1.3a)
meter =c / f =(300/ f MHz) (1.3b)


Page reference:
Frequency and Wavelength: Pages 3 and 4


Q3. What are the frequencies of a GSM channel? What are the wavelengths in GSM 900 MHz band?

Frequencies in GSM 900 MHz band
Refer Figure 1.2 Section 1.1.2.1. GSM 900 MHz band is from 890 MHz to 960 MHz.

Wavelengths in GSM 900 MHz band
According to Eq. (1.3), is from (300 /890) m to (300/960) m =33.7 cm to 31.25 cm.

1 Raj Kamal: Mobile Computing (2/e)
Chapter 1: Mobile Communications: An Overview
Question Bank
OXFORD H i g h e r E d u c a t i o n
Oxford University Press, 2012. All rights reserved.
Page reference:
Figure 1.2 Section 1.1.2.1.: Page 4

Q4. What is the role of antenna?
Refer Sections 1.1.2.2. Electrical signals are transmitted by converting them into electromagnetic radiations.
These radiations are transmitted via antennae that radiate electromagnetic signals. Antennae are devices that
transmit and receive electromagnetic signals. Most antennae function efficiently for relatively narrow
frequency ranges. If an antenna isnt properly tuned to the frequency band in which the transmitting system
connected to it operates, the transmitted or received signals may be impaired. The forms of antennae are
chiefly determined by the frequency ranges they operate in and desired radiation pattern in space. The form
can vary from a single piece of wire to a parabolic dish. Mobile phone has printed metallic strip on Printed
Circuit Board that functions as the antenna.

Page reference:
Section 1.1.2.2: Pages 5 to 7

Q5. What does a radiation pattern give?

Refer Figures 1.3 and 1.4 and Section 1.1.2.2. The radiation pattern of a given antenna defines a path on
which each point will have identical signal strength at any given instant t. The radiation pattern is an
important feature of an antenna. A circular pattern means that radiated energy, and thus signal strength, is
equally distributed in all directions in the plane. A pattern in which the signal strength is directed along a
specific direction is shown in Fig. 1.4. A directed radiation pattern is required between a mobile user and the
base station.

Page reference:
Radiation patterns Figures 1.3 and 1.4: Page 5 to 7

Q6. How do MIMO antennae function?
Consider an example of use of two different colour sources from two neighbouring points.
Assume that two sources are physically separated by a distance. Assume a red light beam
from a source and a red or green light beam from another source reaching same point. The
beams are using different paths. Since phase of a signal depends on time and hence on
distance travelled, the colour which is visible after superimposition of the signals of two
sources will be different from the colour when only one source is used. This is because the
radiations from both sources follow a slightly different path. The colour intensity difference
between the sources will determine the end resultant intensity at receiver.

MI MO communication technology entails use of more than one physically spaced antenna.
The multiple antennae outputs are used for transmission, analogous to the use of two different
colour sources from two neighbouring points. The paths to the end-points for each output
(beam) will differ for each antenna output.

The two or more antennae which are appropriately spaced are used to communicate signals of
two or more sources along these different paths, and their frequencies and phase angles are
also appropriately selected then at the receiver end. The end multi-inputs are processed and
original voice or data recovered. 4G technology entails use of MI MOs.

Page reference:
Section 1.1.2.3: Page 8
1 Raj Kamal: Mobile Computing (2/e)
Chapter 1: Mobile Communications: An Overview
Question Bank
OXFORD H i g h e r E d u c a t i o n
Oxford University Press, 2012. All rights reserved.

Q7. Why is GSM 900 MHz suitable for mobile phones?

Refer Sections 1.1.2.1 and 1.1.2.2 and Example 1.3. The 900 MHz band is usually allotted for applications
other than the Defence. Attenuation in atmosphere is negligible at these wavelengths. is from 300 m/890
to 300m /960 =33.7 cm to 31.25 cm and hence antennae for these wavelengths are easier to fabricate and fit
into the pocket size devices. The transmitted signals reflect from the objects which are bigger than and
reach the receiver. The reflection causes delay and there are multi-hop paths. There are digital signal
processing techniques to eliminate the distortions due to delays from direct and multiple paths so that the
original signal is recovered in sufficient strength at the receiver.

Page reference:
Example 1.3: Page 7;
Propagation of signals: Pages 9 to 11.


Q8. Define modulation and digital modulation. Name the different methods of modulation used for
voice and digital signal communication.

Modulation is a technique by which f
c,
or a set of carrier frequencies is used for wireless transmission such
that peak amplitude, s
c0
, or frequency, f
c
, or phase angle
ct0
varies with t in proportion to the peak amplitude
of the modulating signal, s
m
(t) at instant t. The s
m
(t) is the voice or data signal to be communicated. The
modulation is referred to as amplitude, frequency, or phase modulation depending upon which parameter of
the carrier is varied.
Digital Modulation
Digital modulation is a technique by which amplitude, frequency, or phase angle parametersof carrier or
sub-carrier frequencies are varied according to the variation in modulating signal bit 1 or 0, or in the
modulating bit-pair, or in a set of bits.
Different methods of voice modulation
1. Amplitude modulation (AM)
2. Frequency modulation (FM)
3. Phase modulation (PM)
Different methods of digital signal modulation
1. Amplitude shifted keying (ASK)
2. Frequency shifted keying (FSK)
3. Phase shifted keying (PSK) BPSK and QPSK
4. QAM 16-QAM and 64-QAM.
5. Gaussian Minimum shift keying (GMSK)

(a) The modulation is called amplitude shift keying (ASK) modulation when the amplitude shifts as per 1 or
0.
(b) The modulation is called frequency shift keying (FSK) modulation when the frequency shifts as per 1 or
0.
(c) The modulation is called phase shift keying (PSK) modulation when the phase shifts as per 1 or 0 or as
per pair 00, 01, 10 or 11 or as per set of bits.
(d) The modulation is called quadrature phase shift keying (QPSK) modulation when the frequency shifts as
per pair 00, 01, 10 or 11 or as per set of bits.
Page reference:
Modulation: Page 11; Name of different methods: Page 13 to 16;
1 Raj Kamal: Mobile Computing (2/e)
Chapter 1: Mobile Communications: An Overview
Question Bank
OXFORD H i g h e r E d u c a t i o n
Oxford University Press, 2012. All rights reserved.

Q9. Define bandwidth. What is the bandwidth of a GSM channel? What is the bandwidth of a CDMA
channel?
Analog signal bandwidth or radio bandwidth or frequency bandwidth in Hz or kHz or MHz is equal to the
range of frequencies in which Fourier transform of the signal is not zero. Analog signal bandwidth is also
considered as the difference between lower and upper cut-off frequencies in the signal. A cut-off frequency
is defined as frequency where amplitude becomes of the maximum or 3 dB less than the maximum.
Digital signal bandwidth is considered as equal to data rate or bit per second or throughput per second.

GSM Channel Bandwidth:
Refer Table 1.2 rows 1 and 2. Each radio-carrier has analog signals of bandwidth 200 kHz.

CDMA Channel Bandwidth:
Refer Table 1.3. CDMA 2000 1x has 1.2288 Mbps and CDMA 3x uses three channels 3 1.2288 Mbps.
Page reference:
Bandwidth: Pages 13 to 15; GSM Channel: Page 20. CDMA Channel: Page21


Q10. Define multiplexing. Explain space division multiplexing (SDM), time division multiplexing
(TDM) and frequency di vision multiplexing (FDM).

Multiplexing means that different channels, users, or sources can share a common space, time, frequency, or
code for transmitting data.
Space di vision multiplexing (SDM)
Space division multiplexing means a division of the available space so that multiple sources can use the
medium at the same time. SDM is a technique in which a wireless transmitter transmits the modulated
signals and uses a space slot and another transmitter uses another space slot such that signals from both can
propagate in two separate spaces in the medium without affecting each other. For example, if there are four
sets of A, B, C, and D of mobile users and four different regional space slots, R1, R2, R3, and R4, then set A
uses R1, B uses R2, C uses R3, and D uses R4 for transmitting and receiving signals to and from a base
station.
Page reference:
SDM: Page 19


Q11. Define time division multiplexing and frequency division multiplexing.
Time di vi sion multiplexing (TDM)
Time division multiplexing entails different sources using different time-slices for transmission of signals.
TDM (Time Division Multiplexing) means that multiple users, data services, or sources are allotted different
time-slices to use a channel. The available time-slice is divided among multiple modulated-signal sources.
These sources use the same medium, the same set of frequencies, and the same channel for transmission of
data. For example, if there are eight radio-carriers (e.g., mobile phones) C
1
, C
2
, C
3
, C
4
, C
5
, C
6
, C
7,
and C
8
transmitting signals in a GSM channel, then the GSM channel provides for eight TDMA time-slices, one for
each radio carrier.
1 Raj Kamal: Mobile Computing (2/e)
Chapter 1: Mobile Communications: An Overview
Question Bank
OXFORD H i g h e r E d u c a t i o n
Oxford University Press, 2012. All rights reserved.

Frequency divi sion multiplexing (FDM)
Frequency multiplexing means that there is a separation of frequency bands used for transmission by
different channels. The available frequency range is divided into bands, which are used by multiple sources
or channels at the same time. Various channels are allotted distinct frequency bands for transmission.
Page references:
Multiplexing TDM and FDM : Pages 19 and 20


Q12. Explain code division multiplexing (CDM).

CDM (Code Division Multiplexing) means use of different codes (sequences of symbols) by different users.
The multiple users are allotted to access the same channel (set of frequencies) but different code. [A symbol
is a bit (0 or 1), which is transmitted after encoding and processing bits of data such as text, voice, pictures,
or video.]

Each code is uniquely made up of n symbols and is used for transmitting the signals of frequencies f
c0
, f
c0
+
f
s
, f
c0
+2f
s
, , f
c0
+(n2) f
s
, f
c0
+(n1) f
s
by the same channel. These frequencies are also called chipping
frequencies in one method and called hopping frequencies in another method.

First method is the DSSS (direct sequence spread spectrum). Second method is the FHSS (frequency
hopping spread spectrum).

DSSS method is that the frequencies are used in direct sequence f
c0
, f
c0
+f
s
, f
c0
+2f
s
, , f
c0
+(n2) f
s
, f
c0
+
(n1) f
s
. But the amplitude of each frequency component is 1 or 0 that depends upon the code used by the
user. It means at first instance frequency f
c0
, second instance f
c0
+f
s
, third instance f
c0
+2f
s
, and so on with
signal amplitude sequences =1, 1, 0, , if the code is 110 The signal amplitude sequences are called the
chips.

FHSS has frequencies hopping in the sequence as per the code among the f
c0
, f
c0
+f
s
, f
c0
+2f
s
, , f
c0
+(n2)
f
s
, f
c0
+(n1) f
s
. It means at an instance there is p
th
frequency, then at next instance q
th
, then at next instance
r
th
and so on in the CDM signal. The p, q, r, depend on the code used for a channel.
Page reference:
CDM: Pages 20 to 23


Q13. Explain circuit switching.

Switching means establishing a communication channel so that data can transmit from the source to
destination till the switch disconnects. There are two switching methods
Circuit switching
Circuit switching is a method of data transmission in which a circuit (communication channel or path) once
established continues to be used till the transmission is complete. Let us assume, for example, that there are
four routers or base stations, A, B, C, and D. A radio carrier (mobile device) T1 wants to communicate with
a receiver R1. Circuiting provides a path from the beginning to the termination of the transmission. A circuit
is established and a path T1 B D R1 is provided in a circuit switched transmission.

1 Raj Kamal: Mobile Computing (2/e)
Chapter 1: Mobile Communications: An Overview
Question Bank
OXFORD H i g h e r E d u c a t i o n
Oxford University Press, 2012. All rights reserved.

Each data frame transmitted along the path will take the same interval of time and the channel B D is not
available to any other circuit till the present circuit (interconnection) is terminated irrespective of whether T1
is idle during certain time intervals.

Circuit switching uses a protocol. The protocol specifications provides for the ways for establishment of the
connection, for adding header and appending trailing bits in the data frames, and for termination of the
connection (circuit).

Page reference:
Circuit Switching: Page 24


Q14. Explain packet switching. Can the packets be sent using circuit switching?

A packet is a formatted series of data, which follows a distinct path (circuit) directed by a router from among
a number of paths available at that instant. Packet switching improves the efficiency of the available
transmission capacity.

Let us go back to the example cited for circuit switching. If the transmission is packet switched, then
sequences of data from T1 are framed into packets. Let us say that the path T1 B D R1 is available
and at the same time the path T1 A B C D R1 is also available. In such a scenario T1
simultaneously transmits one packet through T1 A B C D R1 and another through T1 B
D R1. The packets following the first and the second paths take different amounts of time and hence have
different delays. Also, a packet may not reach their destination in a sequential manner. However, a unique
number called the sequence number is also transmitted along with each packet. Using these sequence
numbers the receiver sequentially arranges the messages and constructs full sequences of messages
transmitted through multiple packets.

Packet switching uses a protocol. The protocol specifications provides for the ways for adding header to
each packet. For example, an IP (internet protocol) packet has an IP header, which specifies the source and
destination IP addresses.
Packet Transmission using circuit switching
Circuit switching protocol can be used to send the packets formatted according to a circuit switching
protocol between the transmitter A and receiver R. There will be two headers, one is used for transmission
along a circuit (path) A to R and then the router at the R obtains the packet and uses it. The other header is
used in the packet for further redirection. The packet is used for further transmission or obtaining the data
frames. An advantage of this approach is that between A and R the packets can be transmitted fast as well
as in sequence with uniform delays.

Page reference:
Packet switching: Pages 24 and 25


Q15. What is the GSM voice oriented data communication standard?

The GSM (Groupe Spciale Mobile) was founded in Europe in 1982. It is a voice oriented data
communication standard. The group led to a communication standard being founded in 1988, which is also
called GSM (Global System for Mobile).

1 Raj Kamal: Mobile Computing (2/e)
Chapter 1: Mobile Communications: An Overview
Question Bank
OXFORD H i g h e r E d u c a t i o n
Oxford University Press, 2012. All rights reserved.
GSM uses GMSK [Section 1.1.2.5 Page 16] for transmitting 1s and 0s. GSM uses FDMA (page 20) for
channels and TDMA (page 19) for user access in each deployed channel. Up to 8 radio-carrier analog-
signals are transmitted using one common digital channel of bandwidth 200 kHz. [Example 1.13].

GSM 900 operates at 890-915 MHz for uplink and 935-960 MHz for downlink. Uplink and downlink
frequency bands of 25 MHz each provide FDMA access for each channel. Each link thus provides 124
channels, each of 200 kHz. Each channel during provides eight TDMA access for each user (radio-
carrier) every 4.615 ms. Users have time-slices of 577 s each. The data rates of a GSM mobile-
communication network are at maximum 14.4 kbps (kilobyte per second).

Page references:
GSM: Pages 25 and 26


Q16. Describe GPRS.

GPRS (General Packet Radio Service) is a packet-oriented service [Section 1.1.2.8] for data communication
of mobile devices and utilises the unused channels in the TDMA mode in a GSM network. GPRS is used for
providing Internet connectivity on the GSM system.

The system is connected to the SGSN (serving GPRS support node) and GGSN (gateway GPRS support
node) systems. The gateway connects to Internet.

A gateway means a system to receive the signals using one protocol and transmit using another protocol.

The details about the GPRS are given in Section 3.9.

Page reference:
GPRS: Page 27


Q17. What is the CDMA 2000 mobile communication standard?

The CDMA 2000 1x transmits data at f
s
=1.2288 Mbps. It is also backward compatible to 2.5G cdmaOne
IS-95.

3GPP2 is used for voice communication, for circuit as well as packet switched communication [Section
1.1.2.8], Internet Protocol (IP) packet transmission, and multimedia and real time multimedia applications.
CDMA2000 1x supports higher data rates, synchronous operations and 5, 10, 20, 40, or 80 ms frame length.
Each frame length is modulated by QPSK and BPSK for uplink and down link, respectively.

CDMA 2000 1x EVDO (Evolution for Data Optimized) and CDMA 2000 1x EVDV (Evolution for high
speed integrated data and voice) are enhancements, accepted as standards in 2004.

CDMA 2000 3x uses three 1.2288 Mbps channels.

Page references:
CDMA 2000: Pages 27 to 29






1 Raj Kamal: Mobile Computing (2/e)
Chapter 1: Mobile Communications: An Overview
Question Bank
OXFORD H i g h e r E d u c a t i o n
Oxford University Press, 2012. All rights reserved.

Q18. Describe UMTS standard.

UMTS (universal mobile telecommunication system) supports both 3GPP (3G partnership project) and
3GPP2. It communicates at data rates of 100 kbps to 2 Mbps. It combines CDMA for bandwidth efficiency
and GSM for compatibility. It supports several technologies for transmission and gives a framework for
security and management functions. It uses DS (direct sequence) CDMA and supports 3.84 Mbps chipping
rate.

For example, the BlackBerry 7130e device has CDMA 2000 1x EVDO (Evolution Data Optimized) support
and can also be used as a wireless tethered modem. [Tethered modem means when a laptop or PC is
connected to the device, the device works as wireless modem for it.]

Page reference:
UMTS: Page 228


Q19. Describe 4G standard.

Refer Section 1.1.6. Long Term Evolution (LTE) Advanced and WiMax 802.16m standards will provide the
features of 4G (1000 Mbps (1 Gbps) data rates).

Long Term Evolution (LTE) Advanced and WiMax 802.16m standards provide the features of 4G (1000
Mbps (1 Gbps) data rates).MIMOs are used in LTE and WMax 802.16m.

Page reference:
4G: Page 23



Q20. Describe Wireless Personal Area Network (WPAN). What are the protocols used in the WPANs?

A wireless personal area network (WPAN) enables wireless communication between devices that are at
short distances from each other. Figure 1.10 shows a wireless based personal area network. It facilitates
communication of mobile devices with home computers and with other devices at short distances.

A WPAN standard is Bluetooth IEEE 802.15.1. It operates at a frequency of 2.4 GHz radio spectrum, which
is identical to that of the IEEE 802.11b WLAN standard. Bluetooth provides short distance (1 m to 100 m
range as per the radio spectrum) mobile communication. The data rates between the wireless electronic
devices are up to 1 Mbps. Examples of such communications are transmissions between the mobile phone
handset and headset for hands-free talking, between the computer and printer, or computer and mobile phone
handset. Bluetooth facilitates object exchanges using OBEX protocol. An object can be a file, address book,
or presentation. Bluetooth thus enables user mobility in a short space with other Bluetooth enabled devices
or computers in the vicinity. It uses frequency hopping spread spectrum (FHSS).

A WPAN standard that is IEEE 802.15.4 based is called ZigBee. It has lower stack size (28 KB) in the
protocol and thus a lower network-joining latency when compared to Bluetooth (250 KB). Low transmitting
power systems use ZigBee. It is an interoperable standard based on RF wireless communication, designed
for robotic control, industrial, home, and monitoring applications. ZigBee is expected to provide large-scale
automation and the remote controls up to a range of 70 m with data rates of 250 kbps, 40 kbps, and 20 kbps
at the spectra of 2.4 GHz, 902 MHz to 928 MHz, and 868 MHz to 870 MHz, respectively. It uses (direct
sequence spread spectrum (DSSS).

1 Raj Kamal: Mobile Computing (2/e)
Chapter 1: Mobile Communications: An Overview
Question Bank
OXFORD H i g h e r E d u c a t i o n
Oxford University Press, 2012. All rights reserved.
Infrared-based communication devices are also used for short distance communication when there are no
obstacles, such as walls, between the devices. The devices use the IrDA (Infrared Data Association) 1.0
protocol for data rates up to 115 kbps. IrDA 1.1 supports data rates of 1.152 Mbps to 4 Mbps. Section 12.8
describes IrDA.

Page reference:
WPAN, Bluetooth, ZigBee and IrDA: Pages 32 and 33



Q21. Show a WLAN network.

Page references:

WLAN network: Pages 33 and 34.






































Fig. 1.15 Communication between mobile devices using a WLAN network through access points (hot-spots)



INTERNET


802.11 or
Bluetooth
Host Computers or PCs

Router
Access
Router LAN


Host Computers or PCs
802.11 or
Bluetooth
Access


LAN


1 Raj Kamal: Mobile Computing (2/e)
Chapter 1: Mobile Communications: An Overview
Question Bank
OXFORD H i g h e r E d u c a t i o n
Oxford University Press, 2012. All rights reserved.

Q22. What is meant by WiMax?

WiMax uses IEEE 802.16. It is a new generation innovative technology that delivers high-speed,
broadband, fixed, and mobile services wirelessly to large areas with much less infrastructure.

Page reference:

WiMax Page 31.



Q23. How does broadband access is made using wireless?

BWA (Broadband Wireless Access) is used for wireless access using broadband. Broadband means
instantaneous bandwidth greater than or near to 1 MHz. Wireless broadband (WiBB) using BWA supports
the data rates greater than or near to 1.5 Mbps. BWA service is up to 50 km from a BWA tower.

Page references:
BWA: Pages 214 and 215


Q24. What are the programming languages used in mobile computing?

A variety of programming languages is used in the mobile-computing architecture. One popular language
used for mobile computing is J ava. This is because of the most important characteristic of Java, i.e.,
platform independence. This means that the program codes written in J ava are independent of the CPU and
OS used in a system. This is due to a standard compilation into byte codes.

J ava 2 has a standard edition called J 2SE. It has two limited memory sized editions J 2ME (J ava2 Micro
edition) and J avaCard (J ava for smart card). These two are the most used languages for mobile computing
and for developing applications for a mobile device platform. The J ava enterprise edition (J 2EE) is used for
web and enterprise server based applications of mobile services. Chapters 13 and 14 will describe the
language features and development tools in detail.

C, C++and C#are other widely used programming languages. Program compilation depends on the CPU
and OS used. One can use the in-line-assembly codes directly in a C/C++program. The advantage of C/C++
is that it gives compact machine-specific codes.

C#, Visual C++and Visual Basic are also used for developing applications on a Pocket PC with a Windows
dot net platform.


Q25. What are the Operati ng Systems used in mobile computing?

An operating system (OS) enables the user to run an application without considering the hardware
specifications and functionalities. OS also provides OS functions, which are used for scheduling the multiple
tasks in a system. The OS provides management functions (such as creation, activation, deletion, suspension,
and delay) for tasks and memory. It provides the functions required for the synchronization of multiple tasks
in the system. A task may have multiple threads.

OS provides for synchronization and priority allocation of threads. It also provides interfaces for
communication between software components at the application layer, middleware layers, and hardware
devices. It facilitates execution of software components on diversified hardware.
1 Raj Kamal: Mobile Computing (2/e)
Chapter 1: Mobile Communications: An Overview
Question Bank
OXFORD H i g h e r E d u c a t i o n
Oxford University Press, 2012. All rights reserved.

An OS provides configurable libraries for the GUI (graphic user interface) in the device. User applications
GUIs, VUI (voice user interface) components, and phone API are a must in many user-operated devices. The
OS supplies these. The OS also provides the device drivers for the keyboard, display, USB, and other
devices.

Sections 14.214.5 describe some popular operating systems used in mobile computing (Windows Mobile,
Windows Phone 7, Android and Symbian)

Linux is also used in mobile devices for mobile computing. Android is a new OS from Google for mobile
computing. Android runs on the Linux kernel. It allows developers to write managed tools in J ava. A
mobile device runs the J ava libraries developed by Google. It supports the ARM and MIPS processors.
Android supports connectivity technologies including GSM, Edge, CDMA, EvDo, UMTS, Bluetooth and
WiFi.

Page references:
Programming Languages: Pages 39 and 40
OSes: Pages 40 and 41


Q26. What are the cryptographic algorithms for the security in mobile computing systems?

Various cryptography algorithms are used for encryption and decryption of transmitted data. These
algorithms enable the receiver and the sender to authenticate data as well as discover if the data security has
been compromised during transmission.

Cryptography algorithms generally use a secret key, to encrypt data into secret codes for transmission. For
example, the RSA (Rivest, Shamir, Adleman) algorithm is a cryptography algorithm uses private key
generation. Cryptography algorithms can be classified into two categories, symmetric and asymmetric.
Cryptographic algorithms are used to create a hash of the message or a MAC (message authentication code).

A hash function is used to create a small digital fingerprint of the data to be transmitted. This fingerprint is
called the hash value, hash sum, or, simply, hash. The hash of the message is a set of bits obtained after
applying the hash algorithm (or function). This set of bits is altered in case the data is modified during
transmission. Message authentication codes (MAC) are also used to authenticate messages during
transmission. The MAC of a message is created using a cryptographic MAC function, which is similar to the
hash function but has different security requirements. The receiver reviews the hash or the MAC of the
received message and returns it to the sender. This exchange enables the sender and the receiver to find out
if the message has been tampered with and thus helps verify message integrity and authenticity. Following
are the various standards for the security.












1 Raj Kamal: Mobile Computing (2/e)
Chapter 1: Mobile Communications: An Overview
Question Bank
OXFORD H i g h e r E d u c a t i o n
Oxford University Press, 2012. All rights reserved.

(a) Symmetric key based algorithm
Standard Description
DES Data Encryption Standard (DES) uses 56-bits for a key plus 8 bits for parity.
Block length is 64 bit. [Maximum block size =2
64
bits.] Triple DES is an
enhance version of DES, in which there can be multiple encryptions or
encryption-decryption-encryption steps in the cryptic message. There is a
different key at each step for cryptic message creation.
AES Advanced Encryption Standard (AES) has 9 possible combinations of key
lengths and block lengths. The key-length can be chosen as 128, 192, or 256
bits. The block lengths can also be chosen as 128, 192, or 256 bits. [Block
length of 128 bits means maximum block length =2
128
bits.]
(b) Asymmetric key based standards
RSA The RSA (Rivest, Shamir, Alderman) algorithm uses 128, 256, 512, or 1024
bit prime numbers for encryption.


Page reference:
Cryptographic algorithms: Pages 49 to 50

Вам также может понравиться