0% found this document useful (0 votes)
28 views13 pages

Review Question Mobille Computing

The document discusses various aspects of mobile computing, including the differences between wireless and mobile communication, mobile device types, and the role of mobile operating systems. It also covers mobile data synchronization, location-based services, and the significance of cellular networks, Wi-Fi, and Bluetooth. Additionally, it addresses security threats, mobile computing protocols, and the impact of 4G and 5G technologies on mobile experiences.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
28 views13 pages

Review Question Mobille Computing

The document discusses various aspects of mobile computing, including the differences between wireless and mobile communication, mobile device types, and the role of mobile operating systems. It also covers mobile data synchronization, location-based services, and the significance of cellular networks, Wi-Fi, and Bluetooth. Additionally, it addresses security threats, mobile computing protocols, and the impact of 4G and 5G technologies on mobile experiences.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 13

1. Differentiate between wireless communication and mobile communication?

2. With explanations, mind-map the architecture diagram for the following WLAN standards:
a. IEEE 802.11
b. HYPER LAN
c. MANET
3. Define mobility in the context of mobile computing?
4. What are the major types of mobile devices used in mobile computing?
5. Explain the role of mobile operating systems (e.g., Android, iOS) in mobile computing?
6. What is cloud computing, and how does it integrate with mobile computing?
7. How does wireless communication contribute to mobile computing?
8. What is mobile ad-hoc networking (MANET), and what are its applications?
9. What is the significance of Wi-Fi and Bluetooth in mobile computing?
10. What are mobile applications (apps), and how do they function on mobile devices?
11. Explain the concept of mobile data synchronization and its importance.
12. What is location-based service (LBS), and how is it used in mobile computing?
13. Explain the concept of cellular networks in mobile computing?
14. Explain the Bluetooth WLAN standard, and how it is used in mobile devices?
15. Describe the differences between Wi-Fi, LTE, and 5G for mobile data transmission?
16. What factors would you consider when selecting a mobile network for a rural area with
17. How does mobile security differ from traditional desktop security?
18. What are the key security threats in mobile computing?
19. Define mobile computing protocols and explain their importance in data transmission.
20. How does mobile device management (MDM) benefit businesses in mobile computing?
21. What are 4G and 5G technologies, and how do they affect mobile computing?
22. What is the role of Internet of Things (IoT) in mobile computing?
23. A VPN is a private data network that makes use of the public telecommunication infrastructure,
maintaining privacy through the use of a tunneling protocol and security procedures. Elucidate
four reasons why today’s Companies are looking at using a private virtual network (VPN) for both
extranets and wide-area intranets?
24. How does battery life impact mobile computing, and what technologies help improve it?
25. What are the challenges and limitations faced in mobile computing (e.g., network coverage,
device limitations)?
26.
27. Describe the components of Satellite Communication System?
28. Evaluate the roles of GPRS in today’s mobile technology and propose the upgrade strategy for
the next generations?
29. Discuss the role of 4G and 5G networks in enhancing mobile computing experiences?
30. Demonstrate the structure of the communication network architecture and describe its
components?
31. Wireless LANs are generally categorized according to the transmission technique that is used.
With examples, explain the following WLAN techniques: Infrared (IR) LANs, Spread Spectrum
LANs and Narrowband microwave?
32. With explanations, mind-map the architecture diagram for the following WLAN standards:
a. IEEE 802.11
b. HYPER LAN
c. MANET
33. Compare and contrast the SMS principle and MMS principle within the mobile applications
34. Expose your expected advancements of the mobile computing over the next 10 years?
35. The Link Manager protocol is used for managing the security, link set-up and control.
36. Explain seven functionalities within the Bluetooth peer to peer messaging?
37. Illustrate the network architecture of the GLOBAL STAR and explain its role in the mobile
network systems?

1. Difference between Wireless Communication and Mobile Communication

Aspect Wireless Communication Mobile Communication


Definition Transmission of data without Communication while being on the move
wires or cables using wireless tech
Mobility May or may not support user Always supports user mobility
Support mobility
Example Wi-Fi, Satellite Communication Cellular networks (GSM, 4G), mobile
devices
Usage Home, office networks, IoT Smartphones, tablets, mobile computing
Context systems

2. WLAN Architecture Mind-Map (IEEE 802.11, HYPER LAN, MANET)

a. IEEE 802.11 Architecture:

 Components:
o STA (Station)
o AP (Access Point)
o BSS (Basic Service Set)
o ESS (Extended Service Set)
o DS (Distribution System)
 Modes:
o Infrastructure Mode
o Ad-Hoc Mode

b. HYPER LAN Architecture:

 Developed by: ETSI (European Telecommunications Standards Institute)


 Types:
o HiperLAN/1 (20 Mbps, ATM-based)
o HiperLAN/2 (Up to 54 Mbps, IP support)
 Components:
o Access Points
o Mobile Terminals
o Control Channel
 Features: QoS support, high security

c. MANET (Mobile Ad-hoc Network):

 Characteristics:
o No fixed infrastructure
o Nodes act as routers and hosts
o Dynamic topology
 Architecture:
o Mobile Nodes
o Routing Protocols (AODV, DSR)
o Peer-to-peer communication

3. Define Mobility in Mobile Computing

Mobility refers to the ability of a user or device to move freely and maintain continuous network
connectivity and computing capability while moving. It enables real-time access to data and
services across different geographical locations.

4. Major Types of Mobile Devices in Mobile Computing

 Smartphones
 Tablets
 Laptops/Ultrabooks
 Wearables (e.g., smartwatches)
 e-Readers
 Embedded Mobile Devices (e.g., in vehicles or smart appliances)

5. Role of Mobile Operating Systems (e.g., Android, iOS)

 Device Management: Manages hardware and resources.


 App Platform: Supports application installation and execution.
 User Interface: Provides GUI for user interaction.
 Security: Enforces security policies and app sandboxing.
 Communication Services: Manages wireless communication protocols (Wi-Fi,
Bluetooth, etc.)

6. What is Cloud Computing, and How Does It Integrate with Mobile


Computing?

Cloud Computing is the delivery of computing services (e.g., storage, processing, databases,
software) over the internet ("the cloud").

Integration with Mobile Computing:


 Remote Access: Mobile devices can access data/applications stored in the cloud.
 Data Backup & Sync: Automatic synchronization and backup of mobile data.
 Scalability: Users can use powerful cloud resources regardless of mobile device
capacity.
 Examples: Google Drive, iCloud, Microsoft OneDrive

7. How Does Wireless Communication Contribute to Mobile Computing?

Wireless communication enables mobile computing by:

 Providing Connectivity: Allows mobile devices to access networks (Wi-Fi, cellular,


Bluetooth).
 Supporting Mobility: Users can work from anywhere without wired connections.
 Enabling Real-time Communication: Instant messaging, video calls, and online access.
 Examples: Wi-Fi for internet access, 4G/5G for cellular data, Bluetooth for short-range
sharing.

8. What is Mobile Ad-Hoc Networking (MANET), and What Are Its


Applications?

MANET (Mobile Ad-hoc Network):

 A self-configuring, infrastructure-less network of mobile devices connected wirelessly.


 Devices act as both hosts and routers.

Applications:

 Military communication in battlefields


 Disaster recovery scenarios (e.g., earthquakes)
 Vehicular ad-hoc networks (VANETs)
 Temporary networks in conferences or festivals

9. What Is the Significance of Wi-Fi and Bluetooth in Mobile Computing?

Wi-Fi:

 Enables high-speed internet access wirelessly.


 Used for browsing, streaming, file downloads/uploads.

Bluetooth:

 Facilitates short-range communication.


 Used for file sharing, wireless headsets, IoT device connectivity.

Significance:
 Both support wireless and mobile communication.
 Enhance user experience by enabling untethered interaction and seamless data transfer.

10. What Are Mobile Applications (Apps), and How Do They Function on
Mobile Devices?

Mobile Applications (Apps):

 Software programs designed to run on mobile devices like smartphones or tablets.

Functionality:

 Provide services such as social media, games, productivity tools, banking, etc.
 Installed via app stores (e.g., Google Play, Apple App Store).
 Interact with device hardware (GPS, camera, sensors) and often access cloud-based
services.

11. Explain the Concept of Mobile Data Synchronization and Its Importance

Mobile Data Synchronization is the process of keeping data consistent across multiple devices
(e.g., smartphones, tablets, cloud).

Importance:

 Ensures that changes on one device reflect on others (e.g., email, calendar).
 Enhances productivity and continuity.
 Prevents data loss with backup synchronization (e.g., Google Sync, iCloud).
 Allows offline work and updates once reconnected.

12. What Is Location-Based Service (LBS), and How Is It Used in Mobile


Computing?

LBS (Location-Based Services):

 Services that provide information or functionality based on a user's geographic location


using GPS, Wi-Fi, or cell tower data.

Uses in Mobile Computing:

 Navigation (Google Maps)


 Ride-hailing apps (Uber, Bolt)
 Geo-tagging photos
 Emergency services (SOS location tracking)
 Targeted advertising based on location
13. Explain the Concept of Cellular Networks in Mobile Computing

Cellular Networks are wireless networks divided into small geographic areas called cells, each
served by a base station.

In Mobile Computing:

 Allow users to make calls, send SMS, and use mobile data while moving.
 Support standards like 2G, 3G, 4G (LTE), and 5G.
 Enable seamless connectivity through handovers between cells.

14. Explain the Bluetooth WLAN Standard and How It Is Used in Mobile
Devices

Bluetooth WLAN Standard:

 A short-range wireless communication standard (IEEE 802.15.1).


 Operates in the 2.4 GHz frequency band.

Usage in Mobile Devices:

 Wireless file sharing


 Connecting accessories (headphones, smartwatches, keyboards)
 IoT connectivity
 Low power consumption ideal for battery-powered devices

15. Differences Between Wi-Fi, LTE, and 5G for Mobile Data Transmission

Feature Wi-Fi LTE (4G) 5G


Access Local (routers/APs) Cellular (broad coverage) Cellular (very high speed)
Speed High (up to 1 Gbps) Moderate (up to 100 Very High (1–10 Gbps)
Mbps)
Latency Low Moderate Ultra-low (1 ms)
Range Limited (within a Wide area Wide area with dense
building) nodes
Use Homes, offices Mobile internet IoT, smart cities,
Case streaming

16. Factors to Consider When Selecting a Mobile Network for a Rural Area

 Network Coverage – Strong signal availability in remote locations.


 Cost & Affordability – Budget-friendly plans for the population.
 Data Speed – Sufficient for basic browsing and communication.
 Infrastructure – Availability of towers and backhaul.
 Reliability – Consistent uptime and support.
 Technology Support – Compatibility with 3G/4G, potential upgrade to 5G.

17. How Does Mobile Security Differ from Traditional Desktop Security?

Aspect Mobile Security Desktop Security


Mobility Devices are often on the move Usually stationary
Network Usage Frequent use of public Wi-Fi Typically uses secured networks
OS & Updates Fragmented updates across devices Centralized control and updates
Authentication Biometrics (face, fingerprint) Passwords or tokens
App Control App store-based app distribution Software from various sources

18. Key Security Threats in Mobile Computing

 Malware & Spyware


 Phishing attacks
 Unsecured Wi-Fi access
 Data leakage through apps
 Lost or stolen devices
 Man-in-the-middle (MITM) attacks
 Unauthorized access due to weak passwords

19. Define Mobile Computing Protocols and Explain Their Importance in Data
Transmission

Mobile Computing Protocols are standardized rules that govern data communication in mobile
environments.

Examples:

 TCP/IP: For internet communication


 HTTP/HTTPS: For secure web services
 WAP: Wireless Application Protocol for mobile web
 Bluetooth & NFC protocols: For device-to-device communication

Importance:

 Enable consistent and secure data transfer.


 Manage session control, routing, and error detection.
 Support real-time mobile communication and application access.

20. How Does Mobile Device Management (MDM) Benefit Businesses in Mobile
Computing?
MDM (Mobile Device Management) is a system for monitoring, managing, and securing
employees' mobile devices.

Benefits:

 Security Enforcement: Controls over app usage and device encryption.


 Remote Management: Lock/wipe data from lost devices.
 Policy Compliance: Ensures usage aligns with company policies.
 Productivity: Enables safe use of business apps and data on the go.
 App Distribution: Easily push updates and apps to devices.

21. What Are 4G and 5G Technologies, and How Do They Affect Mobile
Computing?

4G (Fourth Generation):

 Speed: ~100 Mbps (mobile), up to 1 Gbps (stationary)


 Based on LTE technology
 Supports HD video, VoIP, online gaming

5G (Fifth Generation):

 Speed: Up to 10 Gbps
 Ultra-low latency (~1 ms)
 Supports massive IoT, AR/VR, real-time applications

Impact on Mobile Computing:

 Faster data transmission and real-time communication


 Supports smart cities, connected devices, and immersive experiences
 Enhances cloud integration and remote work

22. Role of Internet of Things (IoT) in Mobile Computing

IoT refers to the interconnection of physical devices via the internet.

In Mobile Computing:

 Mobile devices act as controllers and data monitors (e.g., controlling smart home
gadgets)
 Enables real-time data access and processing from sensors
 Supports automation and smart environments (health, agriculture, industry)
 Examples: Smartwatches, fitness trackers, connected cars
23. Four Reasons Why Companies Use VPNs for Extranets and WANs

1. Data Security: Encrypts data to prevent interception during transmission.


2. Remote Access: Allows secure access to internal systems from remote locations.
3. Cost Efficiency: Uses public infrastructure (e.g., internet) instead of private leased lines.
4. Privacy Compliance: Helps meet data privacy laws and regulations.

24. How Does Battery Life Impact Mobile Computing, and What Technologies
Help Improve It?

Impact:

 Limits operation time of mobile devices


 Affects usability for remote work and travel
 Can interrupt communication or data processing

Technologies to Improve Battery Life:

 Battery Optimization Software (power-saving modes)


 Efficient Chipsets (e.g., ARM-based processors)
 OLED/AMOLED Displays (consume less power)
 Fast Charging & Wireless Charging
 AI-based Power Management

25. Challenges and Limitations in Mobile Computing

 Limited Battery Life


 Weak Network Coverage in rural or remote areas
 Hardware Constraints (small screens, low processing power)
 Security Risks (data breaches, device theft)
 Latency and Bandwidth issues
 Device Compatibility across different OS and platforms

27. Components of Satellite Communication System

1. Satellite (Space Segment):


o Orbits Earth and relays signals
2. Ground Station (Earth Segment):
o Includes antennas, transceivers, and control systems
3. User Equipment (Mobile Segment):
o Handheld or vehicle-based receivers
4. Transponder:
o Receives, amplifies, and retransmits signals
5. Control Center:
o Monitors and manages satellite operation and health
28. Role of GPRS and Upgrade Strategy

GPRS (General Packet Radio Service):

 Introduced in 2G networks
 Enabled packet-switched data services like web browsing and MMS
 Speeds: 56–114 Kbps

Upgrade Strategy:

 EDGE (Enhanced GPRS) → 3G (UMTS) → 4G (LTE) → 5G


 Each upgrade improves speed, capacity, and latency.
 Integrate with IoT and real-time applications for modern needs.

29. Role of 4G and 5G in Enhancing Mobile Computing

4G Enhancements:

 Supports seamless video streaming, cloud apps, and gaming


 Reliable internet access for mobile workers

5G Enhancements:

 Ultra-low latency enables AR/VR, real-time robotics


 Massive device connectivity supports IoT ecosystems
 Energy-efficient, supports longer device uptime

30. Structure of the Communication Network Architecture and Its Components

Communication Network Architecture:

css
CopyEdit
[User Devices] ↔ [Access Network] ↔ [Core Network] ↔ [Internet/Services]

Components:

1. User Devices: Smartphones, tablets, laptops


2. Access Network: Wi-Fi, 4G/5G, Satellite — connects users to the core
3. Core Network: Switches, routers, base stations — manages data traffic
4. Service Network: Cloud services, web servers, app servers
5. Protocols: TCP/IP, HTTP, HTTPS — enable communication

31. WLAN Techniques: Infrared, Spread Spectrum, and Narrowband


Microwave
a. Infrared (IR) LANs:

 Use infrared light (non-visible spectrum) for communication.


 Short-range, line-of-sight required.
 Example: Remote control-like data transfer between laptops.

b. Spread Spectrum LANs:

 Spread data over a wider frequency range than needed.


 More secure and resistant to interference.
 Types:
o Frequency Hopping Spread Spectrum (FHSS)
o Direct Sequence Spread Spectrum (DSSS)
 Example: IEEE 802.11b/g Wi-Fi.

c. Narrowband Microwave:

 Uses a small, fixed range of frequencies.


 Higher bandwidth than IR, but prone to interference.
 Requires directional antennas for long distances.
 Example: Point-to-point microwave links in backhaul networks.

32. Mind-Map Architecture Diagrams for WLAN Standards

a. IEEE 802.11 (Wi-Fi)

 Components: Stations, APs, Distribution System


 Modes: Infrastructure and Ad-Hoc
 Security: WEP, WPA2

b. HYPERLAN

 Developed by ETSI (Europe)


 Higher speed than early IEEE 802.11
 Prioritized traffic handling and QoS

c. MANET (Mobile Ad-Hoc Network)

 No fixed infrastructure
 Nodes act as routers and hosts
 Dynamic topology
 Self-organizing and decentralized
33. Compare and Contrast: SMS vs. MMS

Feature SMS (Short Message MMS (Multimedia Messaging Service)


Service)
Content Text only (160 characters) Multimedia: images, video, audio, text
Data Usage No internet required Uses mobile data or internet
Compatibility Works on all phones Requires MMS-enabled devices
Cost Cheaper Usually more expensive
Speed Faster Slightly slower due to file size

34. Expected Advancements in Mobile Computing (Next 10 Years)

 6G Networks: Ultra-high speed and microsecond latency


 AI Integration: Smarter apps, real-time decisions
 Augmented Reality (AR)/Virtual Reality (VR): Fully immersive mobile experiences
 Foldable & Wearable Devices: Advanced and multi-use form factors
 Edge Computing: Real-time data processing near the source
 Quantum-Resistant Security: New encryption methods
 Global Satellite Internet: Like Starlink, covering remote areas
 Advanced IoT Ecosystem: Smarter homes, cities, industries

35. Link Manager Protocol (Bluetooth)

 A Bluetooth layer responsible for:


o Link setup and teardown
o Authentication
o Encryption
o Power control
o Role switching (master/slave)
o Quality of service (QoS)
o Security mode negotiation

36. Seven Functionalities in Bluetooth Peer-to-Peer Messaging

1. Device Discovery – Identifies nearby Bluetooth devices.


2. Link Setup – Establishes secure connection.
3. Authentication – Confirms trusted devices.
4. Encryption – Protects message content.
5. Data Exchange – Sends messages (text, file) peer-to-peer.
6. Error Detection – Ensures reliable data delivery.
7. Power Management – Optimizes battery during message exchange.
37. Globalstar Network Architecture & Role in Mobile Networks

Components:

 LEO Satellites: Provide global coverage


 User Terminals: Satellite-enabled phones
 Ground Stations: Route calls/data to terrestrial networks

Role in Mobile Networks:

 Extends communication to remote/rural/ocean regions


 Supports voice, SMS, GPS, and IoT
 Used in emergency response, maritime, and military sectors

You might also like