Part A: To Be Connected To A Fixed Physical Link

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 17

UNIT I

MOBILE NETWORKS

Cellular Wireless Networks GSM Architecture Protocols Connection Establishment Frequency Allocation Routing Mobility Management Security GPRS

PART A
1.What is mobile computing? Mobile computing is a technolgythat allows transmission of data, via a computer,Without having to be connected to a fixed physical link. 2. What is Mobility? A person who moves oBetween different geographical locations oBetween different networks oBetween different communication devices oBetween different applications A device that moves oBetween different geographical locations oBetween different networks 3.What is guard space? Guard spaces are needed to avoid frequency band overlapping is also called channel interference. 4.What is multiplexing? Multiplexing is transmitting multiple signals over a single communications line or computer channel. The two common multiplexing techniques are FDM, which separates signals by modulating the data onto different carrier frequencies, and TDM, which separates signals by interleaving bits one after the other. 5.What is FDM FDM is frequency division multiplexing which describes schemes to subdivide the frequency dimension into several non overlapping frequency bands. 6.What is hopping sequence? Transmitter and receiver stay on one of the channels like and TDM.The pattern of channel usage is called the hopping sequence, 7. What is dwell time? The time spend on a channel with a certain frequency is called the dwell time 8. What are the two types of hopping sequence? 1) Slow hopping 2) Fast hopping

9. What are the advantages of cellular systems? The advantages of cellular systems are, _ Higher capacity _ Less transmission power _ Local interface only _ Robustness 10. What is digital cellular networks? Digital cellular networks are segment of the market for mobile and wireless device which are growing most rapidly. 11. What are the disadvantages of cellular systems? The advantages of cellular systems are, _ Infrastructure needed _ Handover needed _ Frequency planning 12. What is GSM? GSM is group special mobile.GSM is the successful digital mobile telecommunication system in the world today. 13. What is authentication centre? As the radio interface and mobile stations are particularly vulnerable a separate AuC has beendefined to protect user identity and data transmission. The AuC contains the algorithms for authentication as well as the keys for encryption and generates the values needed for user authentication in the HLR. The AuC may, in fact, be situated in a special protected part of the HLR. 14. What is called burst? Data is transmitted in small portions is called bursts, 15. What are the basic groups of logical channels? GSM specifies 2 basic groups of logical channels, _ Traffic channels _ Control channels 16. Define MSC? MSC is mobile services switching center.MSC are high performance digital ISDN switches. 17. What is GPRS? GPRS is general pachet radio service. 18. Specify the steps perform during the search for a cell after power on?

19. Explain about transparent mode? The transparent mode transfer simply forwards MAC data without any further processing. The system then has to rely on the FEC which is always used in the radio layer. 20. What are the basic classes of handovers? UMTS has 2 basic classes of handovers, _ Hard handover _ Soft handover 21. What is GPRS? GPRS is general packet radio service. 22. What are the control channel groups in GSM? The control channel groups in GSM are: _ Broadcast control channel (BCCH). _ Common control channel (CCCH). _ Dedicated control channel (DCCH).

PART B
1. Explain GSM architecture? _ Mobile services o Bearer services o Tele services o Supplementary services _ System architecture _ Radio subsystem _ Network and switching subsystem _ Operation subsystem 2. Explain GSM System architecture? _ Protocol architecture 3. Explain briefly about Multiplexing? Space division multiplexing Frequency division multiplexing Time division multiplexing Code division multiplexing 4. Explain medium access control? Motivation SDMA FDMA TDMA CDMA Comparison
3

5. Write a short note on Cellular Wireless Networks 6. Explain the Security mechanism implemented in GSM. 7.Explain the GPRS system.

UNIT II WIRELESS NETWORKS

Wireless LANs and PANs IEEE 802.11 Standard Architecture Services Network HiperLAN Blue Tooth- Wi-Fi WiMAX

PART A

PART B

6. Write a short note on Wi-Fi andWiMAX.

UNIT III ROUTING

Mobile IP DHCP AdHoc Proactive and Reactive Routing Protocols Multicast Routing.

PART A

10

PART B

11

UNIT IV TRANSPORT AND APPLICATION LAYERS

Mobile TCP WAP Architecture WWW Programming Model WDP WTLS WTP WSP WAE WTA Architecture WML WMLScripts. PART A

12

13

14

PART B

6.Write a short notes on mobile TCP.

15

UNIT V PERVASIVE COMPUTING

Pervasive computing infrastructure-applications- Device Technology - Hardware, Humanmachine Interfaces, Biometrics, and Operating systems Device Connectivity Protocols, Security, and Device Management- Pervasive Web Application architecture-Access from PCs and PDAs - Access via WAP

PART A
1. What is Pervasive computing? Pervasive computing is a rapidly developing area of Information and Communications Technology (ICT). The term refers to the increasing integration of ICT into peoples lives and environments, made possible by the growing availability of microprocessors with inbuilt communications facilities. 2. What are the three areas of pervasive computing technologies? Pervasive computing involves three converging areas ofICT: computing (devices), communications(connectivity) and user interfaces. 3. Give the history of pervasive computing. Pervasive computing is the third wave of computingtechnologies to emerge since computers first appeared: First Wave - Mainframe computing era: one computershared by many people, via workstations. Second Wave - Personal computing era: one computerused by one person, requiring a conscious interaction.Users largely bound to desktop. Third Wave Pervasive (initially called ubiquitous)computing era: one person, many computers. Millionsof computers embedded in the environment, allowingtechnology to recede into the background. 4. Give the applications of pervasive computing. Healthcare, home care, transport andenvironmental monitoring are among the most frequently cited. 5. List the devices used in pervasive computing. PCS devices are likely to assume many different forms and sizes, from handheld units (similar to mobile phones) to near-invisible devices set into everyday objects (like furniture and clothing). These will all be able to communicate with each other and act intelligently. Such devices can be separated into three categories: sensors: input devices that detect environmental changes, user behaviours, human commands etc; processors: electronic systems that interpret and analyse input-data; actuators: output devices that respond to processed information by altering the environment via electronic or mechanical means. For example, air temperature control is often done with actuators.

16

6. What is device connectivity? Pervasive computing systems will rely on the interlinking of independent electronic devices into broader networks. This can be achieved via both wired (such as Broadband (ADSL) or Ethernet) and wireless networking technologies (such as WiFi or Bluetooth), with the devices themselves being capable of assessing the most effective form of connectivity.

7. Define user interface in Pervasive computing. User interfaces represent the point of contact between ICT and human users. For example with a personal computer, the mouse and keyboard are used to input information, while the monitor usually provides the output.

8. List the different forms of human- computer interaction. Active Passive Coercive

9. How is privacy, security and safety defined in pervasive computing? Pervasive computing systems may have implications for privacy, security and safety, as a result of their ability to: gather sensitive data, for example on users' everyday interactions, movements, preferences and attitudes, without user intervention or consent; retrieve and use information from large databases/archives of stored data; alter the environment via actuating devices. 10.List the drawback of pervasive computing over health.
Non-ionising radiation is a by-product of the wireless signals that are likely to be used to connect pervasive computing devices into broader networks.

PART B
1. 2. 3. 4. 5.

Write a short note on pervasive computing infrastructure and also give its applications Explain the role of human machine interaction in pervasive computing. Write a short note on device connectivity Write a short note on security of pervasive computers Write short note on pervasive web application architecture.

17

You might also like