Net-Centric Past Questions Answers
Net-Centric Past Questions Answers
Net-Centric Past Questions Answers
ii. what are the basic building blocks for mobile computing?
iv. list the different types of application in which mobile computing is used.
b. list and explain four advantages and three disadvantages in mobile computing.
ii. be it technology, protocols, services offered or speed, the changes in mobile telephone have been
recorded as generation of mobile communication. define and discuss the characteristics of five basic
feature of these generation.
ii. what are the advantages and disadvantages question 3Bi above?
4B. list ten steps to follow for a successful implementation of mobile application.
6a. with good examples explain the term distributed operating system.
c. explain reasons why mobile apps are different from "regular" apps.
d. i. what is an android
a)
i. Mobile computing refers to the use of portable computing devices, such as smartphones, tablets,
and laptops, to access digital data and applications from any location.
ii. The basic building blocks for mobile computing include mobile devices, wireless networks, and
mobile applications. Mobile devices are portable computing devices such as smartphones, tablets,
and laptops. Wireless networks provide the means for mobile devices to connect to the internet,
either through cellular data networks or Wi-Fi networks. Mobile applications are software
applications designed specifically for mobile devices, providing functionality such as messaging,
social media, navigation, and entertainment.
iii. The two different types of mobility in mobile computing are physical mobility and device mobility.
Physical mobility refers to the ability to access data and applications from any physical location,
whereas device mobility refers to the ability to use the same mobile device to access data and
applications from different physical locations.
iv. Mobile computing is used in a variety of applications, including but not limited to:
Mobile banking
Mobile gaming
Mobile healthcare
Mobile education
Increased productivity and efficiency - Mobile devices allow users to access data and
applications from any location, enabling them to work and communicate on-the-go.
Improved communication and collaboration - Mobile devices provide instant communication
capabilities such as voice, messaging, and video conferencing, improving collaboration
among team members.
Enhanced customer experience - Mobile computing enables businesses to provide
personalized and location-based services to customers, improving customer satisfaction.
Flexibility and convenience - Mobile computing allows users to access data and applications
from anywhere, at any time, providing greater flexibility and convenience.
Security risks - Mobile devices are vulnerable to various security risks such as data theft,
malware, and phishing attacks.
Health risks - The prolonged use of mobile devices can cause health problems such as eye
strain, neck and back pain, and carpal tunnel syndrome.
Dependence on technology - The overreliance on mobile devices can lead to a lack of social
interaction, addiction to technology, and decreased physical activity.
3A.
i. GPRS stands for General Packet Radio Service, which is a packet-switching technology used for
mobile communications. It is a 2.5G (second and a half generation) mobile data service that allows
users to send and receive data over a mobile network. GPRS enables the transmission of data in
small packets, allowing for more efficient use of network resources.
ii. The changes in mobile telephone technology have been categorized into different generations of
mobile communication. The five basic features and characteristics of these generations are:
1G (First Generation): Analog voice-only cellular networks with low capacity and coverage.
These networks used FDMA (Frequency Division Multiple Access) technology.
2G (Second Generation): Digital voice and data networks with better coverage and capacity
than 1G. These networks used TDMA (Time Division Multiple Access) and CDMA (Code
Division Multiple Access) technology. 2G introduced the first mobile data service, SMS (Short
Message Service).
2.5G (Second and a half Generation): GPRS technology was introduced as an upgrade to 2G,
offering faster data transmission speeds than 2G. It allowed for the transmission of data in
small packets, making more efficient use of network resources.
3G (Third Generation): High-speed mobile data networks that offer increased capacity and
faster data transmission speeds than 2G and 2.5G. These networks support multimedia
services such as video calling, mobile TV, and mobile internet. 3G uses CDMA2000 and UMTS
(Universal Mobile Telecommunications System) technology.
4G (Fourth Generation): High-speed mobile data networks that offer faster data transmission
speeds than 3G, supporting advanced multimedia services and applications such as video
conferencing, online gaming, and high-definition video streaming. 4G uses LTE (Long-Term
Evolution) technology.
i. In client-server architecture, there are two common types of architectures: two-tier and three-tier
architectures.
ii. The advantages and disadvantages of two-tier and three-tier architectures are:
Faster communication between the client and server due to the direct communication between the
two layers.
Limited scalability and performance due to the lack of an intermediate application server layer.
Security issues due to the direct communication between the client and server, which makes it
vulnerable to attacks.
More complex and expensive to design and implement compared to two-tier architecture.
Slower communication between the client and server due to the presence of an
intermediate application server layer.
More resources are required to maintain and manage the additional layer in the
architecture.
4A.
ii. Some of the basic information stored on a SIM card includes the subscriber's phone number,
unique identifier number (IMSI), network authentication key, network identification number
(MCC/MNC), and contacts.
4B. The ten steps to follow for a successful implementation of a mobile application are:
Continuously update and improve the application based on user feedback and changing needs.
4C.
i. TCP stands for Transmission Control Protocol, which is a communication protocol used for
transmitting data over networks.
ii. In mobile computing, TCP works by establishing a connection between a mobile device and a
server using a three-way handshake. Once the connection is established, data is sent in segments
from the sender to the receiver. TCP ensures that the data is delivered accurately and in order by
assigning a sequence number to each segment and acknowledging the receipt of each segment. If a
segment is lost or corrupted during transmission, TCP will request that the sender retransmit the
segment until it is received correctly. Once all segments have been received and acknowledged, the
connection is closed. TCP also regulates the flow of data to prevent overload on the network and
ensures that data is transmitted reliably and efficiently.
a. A distributed operating system is a type of operating system that manages the resources of a
distributed computing system, where multiple interconnected computers work together to achieve a
common goal. The operating system provides a unified view of the system, and manages the
distribution of tasks and resources across the network. Examples of distributed operating systems
include Amoeba, Plan 9, and Inferno.
User interface: Mobile apps are designed to be used on smaller screens, and often have a different
user interface than desktop or web applications. They may also incorporate touch gestures and other
mobile-specific interactions.
Platform-specific features: Mobile apps can take advantage of platform-specific features such as
camera, GPS, and push notifications. They may also be designed to work offline, or to integrate with
other mobile apps.
Performance considerations: Mobile apps must be designed to run efficiently on limited hardware
resources such as battery life, memory, and CPU.
d. i. Android is a mobile operating system developed by Google. It is based on the Linux kernel, and is
used on a wide range of devices including smartphones, tablets, and smartwatches.
Open source: Android is an open source operating system, which means that its source code is freely
available and can be modified by developers.
Customizability: Android allows users to customize their devices with different home screen
launchers, widgets, and apps.
App store: Android has a large app store called Google Play, which offers a wide range of apps for
download.
Multi-tasking: Android supports multi-tasking, which means that users can run multiple apps
simultaneously.
Customizability: Android allows users to customize their devices with different launchers, widgets,
and apps, giving them more control over their user experience.
App store: Android has a large app store with a wide range of apps to choose from.
Multi-tasking: Android supports multi-tasking, which can be useful for productivity and efficiency.
Fragmentation: Because Android is used on a wide range of devices from different manufacturers, it
can be fragmented, meaning that different devices may have different versions of the operating
system and different levels of support for certain features.
Security concerns: Android has been criticized for its security vulnerabilities, and users may need to
take extra precautions to protect their devices.
Performance issues: Because Android is used on a wide range of devices with varying hardware
specifications, app performance may vary widely depending on the device.
e. a. Internet Group Management Protocol (IGMP): IGMP is used to manage multicast group
membership, which is useful for applications such as streaming media. It allows hosts to join or leave
multicast groups and helps routers to forward multicast traffic to only the necessary hosts.
b. Simple Network Management Protocol (SNMP): SNMP is a protocol used for managing and
monitoring network devices. It provides a framework for managing devices such as routers, switches,
and servers, and allows network administrators to monitor and troubleshoot network issues.
c. Transmission Control Protocol (TCP): TCP is a connection-oriented protocol that provides reliable
data delivery between applications over a network. It ensures that data packets are transmitted in
the correct order and that lost packets are retransmitted.
d. User Datagram Protocol (UDP): UDP is a connectionless protocol that is used for applications that
require low latency and high-speed data transmission, such as online gaming and streaming media.
Unlike TCP, it does not provide error checking or retransmission of lost packets, making it less reliable
but faster.