Net-Centric Past Questions Answers

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 7

2. (a)i.

what is mobile computing

ii. what are the basic building blocks for mobile computing?

iii. Explain the two different types of mobility in mobile computing.

iv. list the different types of application in which mobile computing is used.

v. list five obstacles that occurred in mobile communication.

b. list and explain four advantages and three disadvantages in mobile computing.

3A. i. explain the understanding of GPRS in communication.

ii. be it technology, protocols, services offered or speed, the changes in mobile telephone have been
recorded as generation of mobile communication. define and discuss the characteristics of five basic
feature of these generation.

3B. i. in client-server architecture explain two-tier and three-tier architecture.

ii. what are the advantages and disadvantages question 3Bi above?

4A. i. what is the full form of a SIM card?

ii. list some of the basic information stored on a SIM card.

4B. list ten steps to follow for a successful implementation of mobile application.

4C. i. what do you understand by the term TCP?

ii. explain the working of TCP in mobile computing.

6a. with good examples explain the term distributed operating system.

b. lists explain in detail the issues in designing a distributed operating system

c. explain reasons why mobile apps are different from "regular" apps.

d. i. what is an android

ii. list and explain the features of android.

iii. what are the advantages and disadvantages of using android.

e. name and explain any four muting protocols in a network configuration.


answers:

a)

i. Mobile computing refers to the use of portable computing devices, such as smartphones, tablets,
and laptops, to access digital data and applications from any location.

ii. The basic building blocks for mobile computing include mobile devices, wireless networks, and
mobile applications. Mobile devices are portable computing devices such as smartphones, tablets,
and laptops. Wireless networks provide the means for mobile devices to connect to the internet,
either through cellular data networks or Wi-Fi networks. Mobile applications are software
applications designed specifically for mobile devices, providing functionality such as messaging,
social media, navigation, and entertainment.

iii. The two different types of mobility in mobile computing are physical mobility and device mobility.
Physical mobility refers to the ability to access data and applications from any physical location,
whereas device mobility refers to the ability to use the same mobile device to access data and
applications from different physical locations.

iv. Mobile computing is used in a variety of applications, including but not limited to:

Mobile commerce (m-commerce)

Mobile banking

Mobile gaming

Mobile social media

Mobile healthcare

Mobile education

v. Some of the obstacles that have occurred in mobile communication include:

 Limited battery life of mobile devices


 Network connectivity issues
 Security concerns, including data theft and malware
 Limited processing power and memory of mobile devices
 Fragmentation of operating systems and hardware across different devices
b)

Advantages of mobile computing:

 Increased productivity and efficiency - Mobile devices allow users to access data and
applications from any location, enabling them to work and communicate on-the-go.
 Improved communication and collaboration - Mobile devices provide instant communication
capabilities such as voice, messaging, and video conferencing, improving collaboration
among team members.
 Enhanced customer experience - Mobile computing enables businesses to provide
personalized and location-based services to customers, improving customer satisfaction.
 Flexibility and convenience - Mobile computing allows users to access data and applications
from anywhere, at any time, providing greater flexibility and convenience.

Disadvantages of mobile computing:

 Security risks - Mobile devices are vulnerable to various security risks such as data theft,
malware, and phishing attacks.
 Health risks - The prolonged use of mobile devices can cause health problems such as eye
strain, neck and back pain, and carpal tunnel syndrome.
 Dependence on technology - The overreliance on mobile devices can lead to a lack of social
interaction, addiction to technology, and decreased physical activity.

3A.

i. GPRS stands for General Packet Radio Service, which is a packet-switching technology used for
mobile communications. It is a 2.5G (second and a half generation) mobile data service that allows
users to send and receive data over a mobile network. GPRS enables the transmission of data in
small packets, allowing for more efficient use of network resources.

ii. The changes in mobile telephone technology have been categorized into different generations of
mobile communication. The five basic features and characteristics of these generations are:

 1G (First Generation): Analog voice-only cellular networks with low capacity and coverage.
These networks used FDMA (Frequency Division Multiple Access) technology.
 2G (Second Generation): Digital voice and data networks with better coverage and capacity
than 1G. These networks used TDMA (Time Division Multiple Access) and CDMA (Code
Division Multiple Access) technology. 2G introduced the first mobile data service, SMS (Short
Message Service).
 2.5G (Second and a half Generation): GPRS technology was introduced as an upgrade to 2G,
offering faster data transmission speeds than 2G. It allowed for the transmission of data in
small packets, making more efficient use of network resources.
 3G (Third Generation): High-speed mobile data networks that offer increased capacity and
faster data transmission speeds than 2G and 2.5G. These networks support multimedia
services such as video calling, mobile TV, and mobile internet. 3G uses CDMA2000 and UMTS
(Universal Mobile Telecommunications System) technology.
 4G (Fourth Generation): High-speed mobile data networks that offer faster data transmission
speeds than 3G, supporting advanced multimedia services and applications such as video
conferencing, online gaming, and high-definition video streaming. 4G uses LTE (Long-Term
Evolution) technology.

i. In client-server architecture, there are two common types of architectures: two-tier and three-tier
architectures.

Two-tier architecture, also known as client-server architecture, is a client-server model in which a


client communicates directly with a server. It consists of two layers: the client layer and the server
layer. The client layer interacts with the user and sends requests to the server layer. The server layer
processes the requests and sends back responses to the client.

Three-tier architecture, also known as multi-tier architecture, is a client-server model in which a


client communicates with an application server, which then communicates with a database server. It
consists of three layers: the client layer, the application server layer, and the database server layer.
The client layer interacts with the user and sends requests to the application server layer. The
application server layer processes the requests and communicates with the database server layer to
retrieve or store data. The application server layer then sends back responses to the client.

ii. The advantages and disadvantages of two-tier and three-tier architectures are:

Advantages of Two-Tier Architecture:

Simple and easy to design and implement.

Faster communication between the client and server due to the direct communication between the
two layers.

Suitable for small-scale applications with a limited number of users.

Disadvantages of Two-Tier Architecture:

Limited scalability and performance due to the lack of an intermediate application server layer.

Difficult to maintain and update when the application grows or changes.

Security issues due to the direct communication between the client and server, which makes it
vulnerable to attacks.

Advantages of Three-Tier Architecture:

 Improved scalability and performance due to the presence of an intermediate application


server layer.
 Easy to maintain and update when the application grows or changes.
 Better security due to the separation of the presentation, application, and data layers.

Disadvantages of Three-Tier Architecture:

 More complex and expensive to design and implement compared to two-tier architecture.
 Slower communication between the client and server due to the presence of an
intermediate application server layer.
 More resources are required to maintain and manage the additional layer in the
architecture.

4A.

i. The full form of a SIM card is Subscriber Identity Module.

ii. Some of the basic information stored on a SIM card includes the subscriber's phone number,
unique identifier number (IMSI), network authentication key, network identification number
(MCC/MNC), and contacts.

4B. The ten steps to follow for a successful implementation of a mobile application are:

Identify the target audience and their needs.

Define the purpose and goals of the application.

Choose the appropriate development platform and programming language.

Design the user interface and user experience.

Develop the application and perform thorough testing.

Choose an appropriate hosting platform for deployment.

Develop a marketing strategy for the application.

Launch the application and monitor its performance.

Collect feedback from users and incorporate it into future updates.

Continuously update and improve the application based on user feedback and changing needs.

4C.

i. TCP stands for Transmission Control Protocol, which is a communication protocol used for
transmitting data over networks.

ii. In mobile computing, TCP works by establishing a connection between a mobile device and a
server using a three-way handshake. Once the connection is established, data is sent in segments
from the sender to the receiver. TCP ensures that the data is delivered accurately and in order by
assigning a sequence number to each segment and acknowledging the receipt of each segment. If a
segment is lost or corrupted during transmission, TCP will request that the sender retransmit the
segment until it is received correctly. Once all segments have been received and acknowledged, the
connection is closed. TCP also regulates the flow of data to prevent overload on the network and
ensures that data is transmitted reliably and efficiently.

a. A distributed operating system is a type of operating system that manages the resources of a
distributed computing system, where multiple interconnected computers work together to achieve a
common goal. The operating system provides a unified view of the system, and manages the
distribution of tasks and resources across the network. Examples of distributed operating systems
include Amoeba, Plan 9, and Inferno.

b. Some of the major issues in designing a distributed operating system include:

 Resource allocation and management: In a distributed system, resources such as CPU,


memory, and I/O devices are shared among multiple nodes. The operating system must be
able to allocate these resources efficiently and fairly, while also ensuring that they are used
optimally.
 Communication and synchronization: Communication and synchronization between nodes is
a key challenge in a distributed system. The operating system must provide mechanisms for
inter-process communication and synchronization, while also ensuring that data consistency
is maintained across the network.
 Fault tolerance and recovery: In a distributed system, nodes can fail or become disconnected
from the network. The operating system must provide mechanisms for detecting and
recovering from these failures, while also ensuring that data integrity is maintained.
 Security and privacy: Distributed systems are often used for sensitive applications and must
therefore be designed to be secure and protect user privacy. The operating system must
provide mechanisms for authentication, access control, and encryption.

c. Mobile apps are different from "regular" apps in several ways:

User interface: Mobile apps are designed to be used on smaller screens, and often have a different
user interface than desktop or web applications. They may also incorporate touch gestures and other
mobile-specific interactions.

Platform-specific features: Mobile apps can take advantage of platform-specific features such as
camera, GPS, and push notifications. They may also be designed to work offline, or to integrate with
other mobile apps.

Performance considerations: Mobile apps must be designed to run efficiently on limited hardware
resources such as battery life, memory, and CPU.

d. i. Android is a mobile operating system developed by Google. It is based on the Linux kernel, and is
used on a wide range of devices including smartphones, tablets, and smartwatches.

ii. Some features of Android include:

Open source: Android is an open source operating system, which means that its source code is freely
available and can be modified by developers.
Customizability: Android allows users to customize their devices with different home screen
launchers, widgets, and apps.

App store: Android has a large app store called Google Play, which offers a wide range of apps for
download.

Multi-tasking: Android supports multi-tasking, which means that users can run multiple apps
simultaneously.

iii. Some advantages of using Android include:

Customizability: Android allows users to customize their devices with different launchers, widgets,
and apps, giving them more control over their user experience.

App store: Android has a large app store with a wide range of apps to choose from.

Multi-tasking: Android supports multi-tasking, which can be useful for productivity and efficiency.

Some disadvantages of using Android include:

Fragmentation: Because Android is used on a wide range of devices from different manufacturers, it
can be fragmented, meaning that different devices may have different versions of the operating
system and different levels of support for certain features.

Security concerns: Android has been criticized for its security vulnerabilities, and users may need to
take extra precautions to protect their devices.

Performance issues: Because Android is used on a wide range of devices with varying hardware
specifications, app performance may vary widely depending on the device.

e. a. Internet Group Management Protocol (IGMP): IGMP is used to manage multicast group
membership, which is useful for applications such as streaming media. It allows hosts to join or leave
multicast groups and helps routers to forward multicast traffic to only the necessary hosts.

b. Simple Network Management Protocol (SNMP): SNMP is a protocol used for managing and
monitoring network devices. It provides a framework for managing devices such as routers, switches,
and servers, and allows network administrators to monitor and troubleshoot network issues.

c. Transmission Control Protocol (TCP): TCP is a connection-oriented protocol that provides reliable
data delivery between applications over a network. It ensures that data packets are transmitted in
the correct order and that lost packets are retransmitted.

d. User Datagram Protocol (UDP): UDP is a connectionless protocol that is used for applications that
require low latency and high-speed data transmission, such as online gaming and streaming media.
Unlike TCP, it does not provide error checking or retransmission of lost packets, making it less reliable
but faster.

You might also like