Explain Satellite communication with neat diagram

1 Answer

Answer :

SATELLITE COMMUNICATION: In satellite communication, signal transferring between the sender and receiver is done with the help of satellite. In this process, the signal which is basically a beam of modulated microwaves is sent towards the satellite called UPLINK (6 Ghz). Then the satellite amplifies the signal and sent it back to the receiver‟s antenna present on the earth‟s surface called as DOWNLINK (4Ghz), as shown in the diagram given 

image

As the entire signal transferring is happening in space. Thus this type of communication is known as space communication. The satellite does the functions of an antenna and the repeater together. If the earth along with its ground stations is revolving and the satellite is stationery, the sending and receiving earth stations and the satellite can be out of sync over time. Therefore Geosynchronous satellites are used which move at same RPM as that of the earth in the same direction. So the relative position of the ground station with respect to the satellite never changes. However 3 satellites are needed to cover earth‟s surface entirely.


image

Frequency band used in satellite communication:

image

Application of satellite:

Satellite television

digital cinema

satellite radio

satellite internet access

Related questions

Description : Explain the function of each layer of OSI reference model with neat diagram.

Last Answer : OSI model (open system interconnection) model was developed by ISO (international standard organization) Function of OSI model: i. It provides way to understand how internetwork operates. ... Network virtual terminal file transfer access and management mail services and directory services

Description : State the reason for keeping uplink and downlink frequency different in satellite communication.

Last Answer : Uplink frequency is used for transmission of signals from earth station transmitter to satellite. Downlink frequency is used for transmission of signals from satellite to earth station receiver. ... the same antenna to be used for both receiving and transmitting simplifying satellite hardware.

Description : Explain handoff procedure in mobile communication.

Last Answer : Assume that there is a call going on between two parties over a voice channel. When the mobile unit moves out of coverage area of a particular cell site the reception becomes weak. Then the cell ... arranges the handoff requests in a queue instead of rejecting them, if the new cell sites are busy.

Description : Explain horizontal and vertical communication.

Last Answer : Horizontal communication Fig: Horizontal Communication in OSI Model. 1) The horizontal communication is the logical connection between the layers, there is no direct communication ... communication, it becomes protocol at each layer simultaneously. Fig:Vertical communication

Description : Explain infrared communication. List any two disadvantages of infrared communication.

Last Answer : Infrared communication (IR) is an example of wireless communication. However, it is limited to very simple applications & suffers from several disadvantages, mainly very small bandwidth & distances ... areas require multiple emitter panels, which will increase the cost of the system.

Description : Explain the architecture of Bluetooth technology with suitable diagram.

Last Answer : Bluetooth is short range wireless technology. Range of Bluetooth is 10 meters. Bluetooth Architecture defines 2 types of networks. 1)Piconet 2)Scatternet Piconet: - It is a Bluetooth network that ... . This node is called bridge slave. This node cannot be the master of two piconets.

Description : Explain PAN with suitable diagram. Differentiate between PAN and CAN.

Last Answer : A personal area network(PAN) is a network organized around an individual person. A PAN can also be used for communication among personal devices themselves(interpersonal communication).PAN network can be ... used for personal communication. 4. CAN is mainly used for corporate campuses.

Description : A communication device that combines transmissions from several I/O devices into one line is a A) Concentrator B) Modifier C) Multiplexer D) Full duplex file

Last Answer : C) Multiplexer

Description : Which of the communication modes support two way traffic but in only once direction of a time? A) Simplex B) Half-duplex C) Three - quarter's duplex D) Full duplex

Last Answer : B) Half-duplex

Description : Discuss hybrid topology with suitable diagram. 

Last Answer : Discuss hybrid topology with suitable dig. Hybrid topology is one that uses two or more basic topologies together Fig.1 depicts this. In this case, the bus, star & ring topologies are used to ... many networks are quite complex but they can be reduced to some form of hybrid topology.

Description : Two unpedauces given by Z1 = 10 + j5 and Z2 = 8 + j9 are joined in parallel and connected across a voltage of V = 200 + j0. Calculate the circuit current and branch currents. Draw the vector diagram.

Last Answer : Solution: Given, Z1=10+j5, Z2=8+j9, V=200+j0

Description : For R-C series circuit draw (i) Circuit diagram (ii) Vector diagram (iii) Waveform of voltage and current

Last Answer : i) Circuit diagram ii)Vector diagram iii)Waveform of voltage and current

Description : Explain four features of computer networks.

Last Answer : A computer network is interconnection of two or more computers connected to each other so that they can exchange information such as e-mail, messages or documents, or share resources such as disk storage or printer. ... Digital Network (ISDN). 4. Cable TV. 5. Digital Subscriber Line (DSL).

Description : Explain following: I. Telnet II. FTP 

Last Answer : 1. Telnet: TELNET is abbreviation for Terminal Network. It is standard TCP/IP protocol for virtual terminal services proposed by ISO. TELNET enables establishment of connection to a remote system in such ... . FTP uses port 21 for the control connection and port 20 for the data connection. 

Description : Explain connectionless and connection oriented protocol. Give the example for each type.

Last Answer : Connection less protocol: These protocols do not establish a connection between devices. It is manually achieved by transmitting information in one direction, from source to destination without checking to ... SMTP establish a TCP connection between Sender And port number 25 of receiver

Description : Explain different modes of fibre optic cable.

Last Answer : Current technology supports two modes for propagating light along optical channels. 1. Multimode. 2. Single mode.  Multimode can be implemented in two form:  1. Step ... All the beams arrive at the destination together and can be recombined with little distortion to the signal.

Description : Explain sub-netting and super-netting with example.

Last Answer : Sub-netting:subnet mask is a net mask with the only real difference being that breaking a larger network into smaller parts and each smaller section will use different sets of address ... address) AND 11111111.11111111.11111100.00000000 (supernet mask) Returns 11000000.10101000.01000000.00000000

Description : Draw and explain fiber optic cable.

Last Answer : As shown in the figure, at the center is the glass core through which the light propagates. In multimode fibers, the core is typically 50 microns in diameter. In single mode fibers, the core is ... be fused to form a solid connection. A fusion splice is almost as good as a single drawn fiber.

Description : Explain following protocols: I. PPP II. SLIP

Last Answer : (i)PPP:-PPP means point to point protocol. It is a much more developed protocol than SLIP(which is why it is replacing it).It transfers additional data, better suited to data transmission over the ... character(the END character, the ASCII code of which is 192).A SLIP frame looks like:

Description : Explain the services provided by transport layer in TCP/IP model.

Last Answer : Responsibility of process to process delivery of message Ensure that whole message arrives in order. 1. Service point addressing: -several programs run at a time on computer. Delivery is ... transport layer without error(damage or loss or duplication). Error correction is done by retransmission.

Description : Explain encapsulation with example.

Last Answer : Each layer in the layered architecture provides service to the layers which are directly above and below it. The outgoing information will travel down through the layers to the lowest layer. While ... to each packet obtained from layer 3 and pass it to layer 1 for physical transmission. 

Description : Draw and explain Co-axial cable.

Last Answer : Coaxial cable (also called as coax) has an inner central copper conductor surrounded by an insulating sheath, which in turn is enclosed in the metal mesh. This outer conductor (shield) acts not ... building where a number of twists and turns are required.  4. limited to size of network.

Description : ..................mode is used whenever either end of a security association is gateway. A) Tunnel B) Encapsulating C) Transport D) Gateway

Last Answer : A) Tunnel

Description : In packet-filtering router, the following information can be external from the packet header. i) Source IP address ii) Destination IP address iii) TCP/UDP source port iv) ICMP message type v) TCP/UDP destination port A) i, ii, ... iv and v only C) ii, iii, iv and v only D) All i, ii, iii, iv and v

Last Answer : D) All i, ii, iii, iv and v

Description : State whether the following statement are true. i) An application-level gateway is often referred to as a proxy. ii) In proxy, a direct connection is established between the client and destination server. A) True, False B) False, True C) True, True D) False, False

Last Answer : A) True, False

Description : On the upper layer of SSL, a protocol for initial authentication and transfer of encryption keys, called the ………………… A) SSL handshake protocol B) SSL authentication protocol

Last Answer : A) SSL handshake protocol

Description : While initiating SSL session, the client code recognizes the SSL request and establishes a connection through TCP Part.................to the SSL code on the server. A) 420 B) 1032 C) 443 D) 322

Last Answer : C) 443

Description : At the lower layer of SSL, a protocol for transferring data using a variety of predefined cipher and authentication combinations called the ………………. A) SSL handshake protocol B) SSL authentication protocol C) SSL record protocol D) SSL cipher protocol

Last Answer : C) SSL record protocol

Description : The............................. Is a collection of protocols designed by Internet Engineering TaskForce(IETF) to provide security for a packet at the Network level. A) IPsec B) Netsec C) Packetsec D) Protocolsec

Last Answer : A) IPsec

Description : In........................mode, a common technique in packet-switched networks consists of wrapping a packet in a new one. A) Tunneling B) Encapsulation C) Both A and B D) None of the above

Last Answer : C) Both A and B

Description : The................is used to provide integrity check, authentication and encryption to IPdatagram. A) SSL B) ESP C) TSL D) PSL

Last Answer : B) ESP

Description : The primary goal of the......................protocol is to provide a private channel between communicating application, which ensures privacy of data authentication of the partners, and integrity. A) SSL B) ESP C) TSL D) PSL

Last Answer : A) SSL

Description : A ..................is an extension of an enterprise’s private intranet across a public Network such as the Internet across a public Network such as the Internet, creating a secure private connection. A) VNP B) VPN C) VSN D) VSPN

Last Answer : B) VPN

Description : State true or false. i) Socks are a standard for circuit level gateways. ii) The NAT is used for small number of the hosts in a private network. A) True, False B) False, True C) True, True D) False, False

Last Answer : C) True, True

Description : In.................. Mode, the authentication header is inserted immediately after the IP header. A) Tunnel B) Transport C) Authentication D) Both A and B

Last Answer : A) Tunnel

Description : .................... is used to carry traffic of one protocol over network that does not support that protocol directly. A) Tunneling

Last Answer : A) Tunneling

Description : The components of IP security includes …………………. A) Authentication Header (AH) B) Encapsulating Security Payload (ESP) C) Internet key Exchange (IKE) D) All of the above

Last Answer : D) All of the above

Description : Which of the following is / are the types of firewall? A) Packet Filtering Firewall B) Dual Homed Gateway Firewall C) Screen Host Firewall D) All of the above

Last Answer : D) All of the above

Description : A firewall is installed at the point where the secure internal network and untrusted external network meet which is also known as ……………… A) Chock point B) meeting point C) firewall point D) secure point

Last Answer : A) Chock point

Description : The following protocols and system are commonly used to provide various degrees of security services in computer network. i) IP filtering ii) Reverse Address Translation iii) IP security Architecture (IPsec) iv) Firewalls v) Socks A) ... v only C) ii, iii, iv and v only D) All i, ii, iii, iv and v

Last Answer : B) i, iii, iv and v only

Description : ................is to protect data and passwords. A) Encryption B) Authentication C) Authorization D) Non-repudiation

Last Answer : A) Encryption

Description : Which of the following are the solutions to network security? i) Encryption ii) Authentication iii) Authorization iv) Non-repudiation A) i, ii and iii only B) ii, iii and iv only C) i, iii and iv only D) All i, ii, iii and iv

Last Answer : Which of the following are the solutions to network security? i) Encryption ii) Authentication iii) Authorization iv) Non-repudiation A) i, ii and iii only B) ii, iii and iv only C) i, iii and iv only D) All i, ii, iii and iv

Description : A WAN typically spans a set of countries that have data ratesless than................ Mbps. A) 2 B) 1 C) 4 D) 100

Last Answer : B) 1

Description : A simple cabling method, known as the..................topology allows about 30 computers on a maximum cable length of about 600 feet. A) Ring B) Bus C) Star D) Mesh

Last Answer : Bus

Description : ............. is a set of information that is exchanged between a client and web browser and a web server during an HTTP transaction. A) infoset B) clientinfo C) cookie D) transkie

Last Answer : C) cookie

Description : Which of the following operations can be performed by using FTP. i) Connect to a remote host ii) Select directory iii) Define the transfer mode iv) List file available A) i, and ii only B) i, ii and iii only C) ii, iii and iv only D) All i, ii, iii and iv

Last Answer : D) All i, ii, iii and iv

Description : FTP server listens to connections on port ……………………. A) 19 and 20 B) 20 and 21 C) 21 and 22 D) 20 and 22

Last Answer : B) 20 and 21

Description : The examples of Interior Gateway Protocols (IGP) are. i) Open Short Path First (OSPF) ii) Routing Information Protocol (RIP) iii) Border Gateway Protocol (BGP) A) i only B) i, and ii only C) i and iii only D) All i, ii and iii

Last Answer : B) i, and ii only

Description : Which of the following is not a mechanism that DHCP supports for IP address allocation? A) Automatic allocation B) Static allocation C) Dynamic allocation D) Manual allocation

Last Answer : B) Static allocation

Description : Which of the following is not a mechanism that DHCP supports for IP address allocation? A) Automatic allocation B) Static allocation C) Dynamic allocation D) Manual allocation

Last Answer : B) Static allocation