0% found this document useful (0 votes)
13 views4 pages

Internal 01 (Mobile Communication)

Question bank
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views4 pages

Internal 01 (Mobile Communication)

Question bank
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

SRM VALLIAMMAI ENGINEERING COLLEGE

(An Autonomous Institution)


SRM Nagar, Kattankulathur – 603 203.

DEPARTMENT OF INFORMATION TECHNOLOGY


QUESTION BANK
SUBJECT : 1908601 – Mobile Communication
SEM / YEAR: VI Sem / III Year

UNIT I - INTRODUCTION
Introduction to Mobile Computing – Applications of Mobile Computing- Generations of Mobile
Communication Technologies-MAC Protocols – SDMA- TDMA- FDMA- CDMA
PART - A

BT
Q.No Questions Competence
Level
1. Define Mobile computing. BTL1 Remembering

2. List the advantages of mobile computing. BTL1 Remembering

3. Distinguish between Mobile Computing and Wireless Networking. BTL2 Understanding

4. Recall the wireless networking standards used in Mobile computing. BTL1 Remembering
Distinguish between infrastructure-based network and infrastructure less BTL2 Understanding
5. network.
6. Analyze the challenges in Wireless Communication. BTL4 Analyzing

7. Classify the types of wireless networks. BTL3 Applying

8. Illustrate Ad hoc Networks with pictorial representation. BTL3 Applying

9. Give the uses of Ad-Hoc networks. BTL2 Understanding

10. What are the limitations of Mobile computing? BTL1 Remembering

11. List the issues of wireless MAC. BTL4 Analyzing


Describe the function of presentation, application and data tier of mobile BTL2 Understanding
12. environment.
13. What is the role of a MAC protocol? BTL1 Remembering

14. Classify the types of MAC Protocol. BTL3 Applying

15. List some random assignment scheme. BTL1 Remembering


Inspect hidden and exposed terminal problems in infrastructure-less BTL4 Analyzing
16. network.
When does the exposed terminal problem arise? Compose a role which is BTL6 Creating
17. played by Radio/Infrared signals play in Mobile Computing?
“MAC protocol designed for infrastructure based wireless network may BTL5 Evaluating
18. not work satisfactory in infrastructure-less environment”-Justify.
Formulate a reason why Collision Detection based protocol is not suitable BTL6 Creating
19. for wireless networks?
20. Evaluate the working of RTS/CTS in MACA. BTL5 Evaluating
PART-B
(i) What is Mobile Computing? Explain its applications in the real world
1. scenario. (7) BTL4 Analyzing
(ii) Differentiate between mobile computing and wireless networking. (6)
(i) Classify the generations of mobile communication technologies. (8)
2. (ii) Apply mobile computing to design Taxi dispatcher and monitoring BTL4 Analyzing
service. Explain the components in detail. (5)
(i) Explain hidden and exposed terminal problem in infrastructure-less
3. network. (7) BTL1 Remembering
(ii) Describe architecture of mobile computing.(6)
(i) Describe the important functional difference between 1G, 2G and 3G
cellular networks.(8) BTL1 Remembering
4. (ii) Is 3G cellular wireless technology superior to 2G technology? Justify
your answer. (5)
5. Explain the various taxonomy of MAC protocols in detail. (13) BTL3 Applying
(i) Explain the wireless MAC issues in detail. (7) BTL2 Understanding
6. (ii) Illustrate the working of SDMA and gives its application. (6)
What are the fixed assignment schemes of MAC protocol? Explain their BTL1 Remembering
7. mechanism in detail. Compare and contrast them. (13)
8. Differentiate between FDMA, TDMA and CDMA. (13) BTL1 Remembering

9. Discuss the basic scheme of the CDMA protocol. (13) BTL2 Understanding
(i) What are the principle responsibilities of the MAC Protocol?
(6) BTL2 Understanding
10. (ii) How does MAC protocol for wireless networks differ from those in
wired network? (7)
Explain the various random assignment schemes that are used in MAC BTL3 Applying
11. protocol. (13)
What is MACA protocol? In which environment is it suitable? Briefly BTL4 Analyzing
12. explain its working. (13)
Explain why MAC scheme in wired network fail in wireless networks. BTL5 Evaluating
13. (13)
14. Name any one scheduled based MAC protocol and explain in detail. (13) BTL6 Creating
PART - C
1. Prepare a brief account of scheduled based MAC protocol. (15) BTL 6 Creating
(i) Compare 1G and 2G cellular wireless communication technologies.
(8) BTL 5 Evaluating
2.
(ii) What do you understand by 2.5G? How is it different from 2G and 3G
technologies? (7)
How does MACA protocol solve the hidden/exposed terminal problem? BTL 4 Analyzing
3.
(15)
How does the multiple accesses with collision avoidance (MACA) BTL 4 Analyzing
4.
scheme work? (15)
UNIT II - MOBILE TELECOMMUNICATION SYSTEM
GSM – Architecture – Protocols – Connection Establishment – Frequency Allocation – Routing –
Mobility Management – Security –GPRS- UMTS- Architecture
PART - A
Q.No Questions BT Level Competence
Is 3G cellular wireless technology superior to 2G technology? Justify BTL5 Evaluating
1. your answer.
2. Identify the characteristics of 4G and 5G Cellular Networks. BTL3 Applying
3. List the 3 important features of GSM security. BTL1 Remembering
Summarize the following.
4. MSC and BSC. BTL2 Understanding

5. Experiment with Call Routing. BTL3 Applying


6. Name the Teleservices provided by GSM. BTL1 Remembering
What is the frequency range of uplink and downlink in GSM BTL1 Remembering
7. network?
8. Describe the function of HLR and VLR. BTL2 Understanding
9. What is multicasting? BTL1 Remembering
10. Point out the major functions in NSS. BTL4 Analyzing
11. Analyse the need for EIR. BTL4 Analyzing
12. Define GPRS and list its services. BTL2 Understanding
13. Give the Functions of GGSN? BTL2 Understanding
14. What are the information are stored in SIM? BTL1 Remembering
15. GPRS is advantageous than GSM. Justify the statement. BTL5 Evaluating
16. Generalize the limitations of GPRS. BTL6 Creating
17. What are the main elements of UMTS? BTL1 Remembering
18. Define Handoff. What are its types? BTL4 Analyzing
Can UMTS networks easily work with the existing GSM/GPRS
19. networks? Justify your answer. BTL3 Applying

20. Write the suggestions of mobile phone with respect to human body. BTL6 Creating
PART-B
(i) Describe GSM architecture and its services in detail. (7) BTL2 Understanding
1. (ii) Explain GSM Authentication and Security. (6)
2. Identify the services offered by GSM and explain in detail. (13) BTL3 Applying
3. Analyze the purpose of radio interface Um in GSM. (13) BTL4 Analyzing
4. Explain the protocol architecture for signaling in GSM. (13) BTL5 Evaluating
(i) Recall the terms
a. MSISDN (2)
b. IMSI (2) BTL1 Remembering
5. c. TMSI (2)
d. MSRN (2)
(ii) Show the procedure for MTC and MOC. (5)
Examine in detail about the various types of handover in GSM. Also BTL4 Analyzing
6. discuss the timeline diagram of the Intra MSC handover. (13)
7. Elaborate frequency allocation with its various methods.(13) BTL6 Creating
(i) Describe the GPRS architecture reference model. (7) BTL1 Remembering
8. (ii) State its Advantages and Disadvantages. (6)
9. Explain the functions of GPRS protocol stack with a diagram. (13) BTL2 Understanding
10. (i) Discuss the services of GPRS. (7) BTL1 Remembering
(ii) What are the advantages of GPRS over GSM? (6)
What do you mean by Virtual Home Environment (VHE)? Identify BTL3 Applying
11. how VHE is realized in 3G networks? (13)
Explain in detail network architecture of UMTS with a neat diagram. BTL2 Understanding
12. (13)
13. Recall the two basic classes of handovers in UMTS. (13) BTL1 Remembering
What is UMTS? Analyze the functions of HLR and VLR in call BTL4 Analyzing
14. routing & roaming?(13)
PART-C
What are the functions of authentication and encryption in GSM? BTL 4 Analyzing
1.
How is system security maintained? (15)
Do mobile phones affect the human body negative? Explain your BTL 5 Evaluating
2.
answer. (15)
Analyze the applications of GPRS with its advantages and BTL 4 Analyzing
3.
disadvantages. (15)
Discuss the domains and interfaces of Universal Mobile BTL 6 Creating
4.
Telecommunication System. (15)

UNIT III - WIRELESS NETWORKS


Wireless LANs and PANs – IEEE 802.11 Standard – Architecture – Services – Blue Tooth- Wi-Fi –
WiMAX
PART - A
Q.No Questions BT Level Competence
1. What is WLL? BTL1 Remembering
2. What is the advantage of infra-red technology? BTL1 Remembering
3. Give examples for mobile adhoc networks. BTL2 Understanding
What is the format of frame control field of 802.11 MAC packet
4. structure?
BTL1 Remembering
5. Define Ad hoc wireless network with example. BTL2 Understanding
6. Differentiate between Wi-Fi and WiMAX. BTL4 Analyzing
7. Why is WiMAX forum formed? BTL3 Applying
Identify why wireless LAN services are of lower quality than wired
8. LAN.
BTL3 Applying
Compare wired networks and adhoc wireless networks based on
9. routing.
BTL2 Understanding
10. What are the three low power states of a Bluetooth state? BTL1 Remembering
11. Why cannot wireless LANs implement CSMA/CD? BTL4 Analyzing
12. Mention the design goals of WLANs. BTL2 Understanding
13. What is the difference between infrastructure and ad-hoc networks? BTL1 Remembering
14. Identify the design goals of 802.11. BTL3 Applying
What is piconet? What restricts the number of active devices in a
15. piconet?
BTL1 Remembering
16. Inspect the advantages of WLANs. BTL4 Analyzing
17. Propose the elements of Bluetooth core protocols. BTL6 Creating
18. Compare infra-red and radio transmission. BTL5 Evaluating
19. Imagine the user scenarios for WPANs. BTL6 Creating
Evaluate the criteria’s under which WPAN is discussed using IEEE
20. 802.11.
BTL5 Evaluating
PART-B

You might also like