0% found this document useful (0 votes)
28 views7 pages

Mobile Computing

mobile computing document

Uploaded by

nagalakr1
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
28 views7 pages

Mobile Computing

mobile computing document

Uploaded by

nagalakr1
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 7

MOBILE COMPUTING

YEAR & SEM: 4-1

BRANCH: CSE & IT

UNIT-1

1(a).Explain the protocol of GSM

(b).Explain in detail about GSM services.

2(a).Explain architecture of mobile computing.

(b).Explain (1) handover in GSM (2) Security services in GSM

3(a).Explain applications & limitations of mobile computing.

(b).Explain about localization & calling in GSM.

4. Where and when can collision occur while accessing the GSM system? Compare
possible collisions caused by data transmission in standard GSM, HSCSD & GPRS

5. Name the main elements of specifying not only rad interface but also all
internal interfaces of GSM system.

6(a).What is mobile computing?

(b).Explain late services of GSM.

7(a).Write short note on HSCSD.

(b)Explain security services in GSM.

8(a).How is synchronization achieved in GSM? Who is responsible for


synchronization & why is it so important?

(b).How is localization, location update, roaming done in GSM &reflected in


database? What are typical roaming scenarios?
9(a).What are functions or authentications & encryption in GSM? How is system
security maintained?

(b)What are reasons for delays in GSM system for packet data traffic? Distinguish
between circuit &packet oriented transmission.

UNIT-2

1(a).Explain polling & inhibit sense multiple access.

(b).Explain SDM & SDMA in detail.

2(a).Compare the following SDMA, TDMA, FDMA, CDMA.

3(a) what is CDMA? Explain them.

(b)Explain following problems of wireless transmission

(1)Exposed terminal (2) hidden terminal (3) Near & far

4(a) Explain how MACA can avoid hidden terminals & exposed terminals
problems.

(b)Explain TDMA & its features.

5(a).What are benefits of reservation schemas? How are collisions avoided during
data transmission, why is probability of collisions lower compared to aloha?

6(a).What is motivation for MAC.

(b).Who performs MAC algorithm for SDMA? What could be possible roles of
mobile stations, base stations & planning from network provider?

7(a).How are guard spaces released between users in CDMA?

(b).Define the problem of hidden & exposed terminals in aloha, slotted aloha,
reserved aloha & MACA?

8. What is the reason for failure of MAC schemes in wireless network? What is
done in wired network to avoid this effect? Explain FDMA.
UNIT-3

1(a).What is the requirements of mobile IP? Explain them.

(b)Write detail notes on IP encapsulation mechanisms.

2(a) Write enlists of mobile IP.

(b).Describe data transfer from mobile node to fixed node.

3(a).What is IP packet delivery? Explain.

(b)What is main purpose of registration of mobile node? Explain.

4(a).What is purpose of DHCP? Explain client initialization via DHCP.

(b)Explain about agent advertisement and delivery.

5(a).What is main purpose of registration of mobile node? Explain.

(b).Write short notes in IPv6.

6(a).What are general problems of mobile IP regarding security and support of


quality of service?

(b).What is meant by encapculation? Explain various types of encapsulation.

7(a).Explain client initialization via DHCP.

(b).Explain packet flow of two mobile nodes communicates and both are in
foreign networks. What additional routes do packets take if reverse tunneling is
required?

8(a).Explain congestion control in traditional TCP.

(b).Describe transaction oriented TCP.How does integration of connection


establishment, data transfer, and close functions with one help in transmitting
and receiving TCP nodes.

9(a).What could be quick solution and why don’t they work.


(b).List entities of mobile IP and describe data transfer from mobile node to fixed
node. Why encapsulation needed?

10. Explain how tunneling works in general and especially for mobile IP using IP in
IP minimal and generate routing encapsulation respectivectively.Explain
advantages and disadvantages of three methods.

11(a).What are general problems of mobile IP regarding security and support of


QOS?

(b).How can DHCP can used for mobility and support of mobile IP?

UNIT-4

1(a).Explain mobile TCP and also write its advantages and disadvantages

(b).Explain selective retransmission and transaction oriented techniques.

2(a) Write detail note on fast retransmit/fast recovery of mobile transport layer.

(b).Explain transmission/timeout freezing approach.

3(a).Write difference between TCP and UDP.

(b).Explain indirect TCP, What are its advantages and disadvantages.

4(a).Explain concept of fast retransmit/fast recovery in traditional TCP.

(b).Explain snooping TCP.What are its advantages and disadvantages.

5(a) What is reaction of standard TCP in case of packet loss. In what situation does
this reaction make sense and why is it quite often problematic in case of wireless
network and mobility.

6(a).Compare different types of transmission errors that can occur in wireless and
wired network. What additional roles does mobility?

(b).Explain about mobile TCP and write advantages and disadvantages of mobile
TCP.
7(a).Write notes on congestion control in traditional TCP.

(b).Compare several enhancements to TCP for mobility.

8(a).Describe transaction oriented TCP.

(b).Explain mobile TCP.How does supervisory host send TCP packets to mobile
node and fixed TCP connection.

9(a) Explain snooping TCP.

(b)Describe slow start of congestion control. How can fast recovery take place in
congestion avoidance phase?

10(a).Explain indirect TCP.

(b).Why timeout freezing required in case of mobile nodes? What are


modifications made in data link and TCP layers to enforce time out freezing?

UNIT-5

1(a).Explain about power aware computing.

(b).Explain data recovery processing in detail.

2(a).Explain concept of cache invalidation mechanism

(b).Explain (1) data cache maintenance (2) Web cache maintenance

3(a).What are advantages of hording data at mobile device?

(b).Describe data caching architecture. Explain data caching maintenance in


mobile environment.

4(a).Explain database transaction model and acid rules.

(b).Explain three tier client server architecture.

5(a).stateless asynchronous and stateful synchronous cache invalidation


mechanism in detail.
(b).Explain advantages and disadvantages of stateless asynchronous and stateful
asynchronous cache invalidation mechanisms.

6. Explain issues related to QOS in mobile networks.

UNIT-6

1(a).Explain interleaved push pull based data delivery mechanism.

(b).Explain distributed index based and flexible indexing selective tuning


technique.

2(a).Explain pull based data delivery mechanisms.

(b).Explain following selective tuning technique (1) Broad cast addressing (2)
Directory and hash based methods.

3. Explain communication asymmetry with the help of diagram.

4. Explain flexible indexing method.

5. Explain hybrid data delivery mechanism.

UNIT-7

1(a).How does dynamic source routing handle routing? What is motivation behind
dynamic source routing compared to other routing algorithm for fixed networks?

(b).Describe security problems in MANET?

2(a).compare reactive and proactive routing protocols?

(b).Explain properties of MANET.

3(a).Explain dynamic source routing in MANET.

(b).Explain destination sequence distance vector routing algorithm in MANET.

4. What is difference between AODV and standard distance vector routing?


5. What are benefits of location information for routing in adhoc network which
problem arise?

UNIT-8

1(a).What are advantages and problems of forwarding mechanism in bluetooth


network regarding security power saving and network stability?

(b).Explain about wireless application environment logical model.

2(a).Explain functions of radio, baseband and link manage in bluetooth.

(b).Explain about wireless transaction protocol of transaction layer.

3(a).Explain physical layer in bluetooth.

(b).Name mechanism to improve web access for handheld services. What is their
common problem and what led finally to development of WAP?

4(a).Explain networking, security and link management in bluetooth.

(b).Write about J2ME briefly.

5. Explain wireless datagram protocol of transport layer.

6(a).Explain physical and networking layer of WAP.

(b).Explain packet format at base band layer of Bluetooth.

You might also like