MC
MC
2019 Pattern
( As Per New Revised Syllabus )
ScoreBooster
Semester- VIII
Electronics & Tele. Engineering
-: Syllabus Topic :-
:-
Mobile IP, DHCP, AdHoc, Proactive protocol-DSDV, Reactive Routing Protocols: DSR,
AODV, Hybrid routing: ZRP, Multicast Routing: ODMRP, Vehicular Ad Hoc networks
(VANET), MANET Vs VANET: Security.
Mobile IP: Need of mobile IP, IP packet delivery, Agent Discovery, Registration,
Tunnelling and encapsulation, Route optimization, IP Handoff.
Transport Layer: Overview of Traditional TCP and implications of mobility control.
Improvement of TCP: Indirect TCP, Snoop TCP, Mobile TCP, Fast Retransmit/fast
recovery, Time-out freezing, Selective retransmission, Transaction-oriented TCP.
Operating System: A Few Basic Concepts, Special Constraints and Requirements of Mobile
OS, A Survey of Commercial Mobile Operating Systems, Windows Mobile, Palm OS,
Symbian OS, iOS, Android, Blackberry OS, A Comparative study of Mobile OS, OS for
sensor Network.
Applications: M-Commerce, Business to Consumer (B2C) Applications, Business to Business
(B2B) Applications. Structure of M-Commerce, Pros and Cons of M-Commerce, Mobile
Payment System, Mobile Payment Schemes, Desirable properties of a Mobile Payment
system, Mobile Payment solutions, Process of Mobile Payment, Security Issues.
-: Imp, Expected & Pyq’s Question :-
:-
3. What is the basic purpose of DHCP? Explain the protocol with suitable diagram. [8]
4. Explain with suitable data flow diagram, client initialization via DHCP. [8]
7. How does Dynamic Source Routing (DSR) route the data? What are its advantages
and disadvantages? [8]
8. How does Ad Hoc On-Demand Distance Vector Routing (AODV) route the data? What
are its advantages and disadvantages? [8]
10. What is hybrid routing? Explain zone routing protocol (ZRP) with suitable diagram. [8]
11. Explain On-Demand Multicast Routing Protocol (ODMRP) with suitable diagram. [8]
1. Why is Mobile IP needed? Discuss the motivation behind its development. [5]
2. Describe IP packet delivery between two mobile nodes in a mobile IP network. Why
reverse tunneling is required? [8]
3. What is agent discovery in Mobile IP? Explain its role and procedure. [5]
4. Explain with diagram the registration process of a mobile node via foreign agent (FA)
and directly with home agent (HA). [8]
5. What is encapsulation in mobile IP? List different methods of encapsulation and explain
any one of them. [8]
6. Why and when encapsulation is needed? List different methods of encapsulation and
explain any one of them. [8]
10. Explain the modifications of Indirect TCP. What are its advantages and disadvantages?
[8]
11. Explain snooping TCP with proper diagram. List its advantages and disadvantages. [8]
12. Compare indirect TCP, snooping TCP and mobile-TCP. [8]
13. Write short note on mobile-TCP. List its advantages and disadvantages. [8]
14. What is fast retransmit and fast recovery in TCP? How do they help in mobility? [5]
15. Explain the concept of time-out freezing in TCP. Why is it used in mobile networks?
[5]
16. Write short note on selective retransmission, an extension of TCP. List its advantages
and disadvantages. [8]
17. Explain transaction-oriented TCP with suitable diagram. What are its advantages and
disadvantages? [8]
3. Explain Ricean fading channel model. Differentiate between Rayleigh fading and Ricean
fading. [7]
4. Compare wideband and narrowband channels. using table List any two channel models
used in mentioned channels. [7]
5. Describe multipath propagation with neat diagram. What is ISI in multipath fading
channels? [7]
6. Explain reflection, scattering and ISI in multipath fading channel with suitable
diagram. [7]
9. How is Bit Error Rate (BER) affected by fading? Discuss its implications on system
design. [5]
1. Explain mobile operating system. What are needs of a mobile OS? List different types
of OS. [7]
2. List and explain in brief the design issues of a mobile OS. [7]
3. What are the special constraints and requirements of mobile operating systems? [7]
4. Provide a comparative study of Windows Mobile, Palm OS, Symbian OS, iOS, Android,
and Blackberry OS. [7]
5. What are the unique features of Symbian OS and how does it differ from Android? [7]
8. Explain the design and components of an operating system for a sensor network. [7]
9. What is M-commerce? List out benefits of M-commerce. Briefly explain any three
applications of M-commerce. [7]
10. What is M-commerce? Explain in brief any five attributes of M-commerce. [7]
11. What is a mobile payment system? Explain payment process using credit card. [7]
12. What is a mobile payment system? Explain payment process using credit card. List
advantages and disadvantages of M-commerce. [10]
13. Draw B2B model and explain any one B2B application. [7]
14. Draw B2C model and explain any one B2C application. [7]
16. Explain the process of mobile payment with a suitable example. [7]
18. What are the desirable properties of a mobile payment system? [7]
19. Explain various mobile payment solutions and their pros and cons. [7]
20. Discuss the major security issues in mobile payment systems. [7]
21. How can mobile payments be secured against fraud and data theft? [7]
22. What is mobile computing? Describe three components of mobile computing. [7]
23. Write a short note on mobile computing and its three basic components. [7]
Unit 3 : Network Layer
Mobile Computing:
Pyq Question:
Explain any five characteristics of mobile computing. [10]
Introduction:
Mobile computing is a technology that allows transmission of data, voice, and video
via a computer or other wireless-enabled device without being connected to a fixed
physical link.
It enables users to access data and services from any location, improving flexibility
and real-time communication.
Definition:
Mobile computing is the process of computing through portable devices that support
mobility and wireless communication technologies such as Wi-Fi, 4G/5G, Bluetooth,
and more.
These devices allow the user to perform computing tasks without staying at a fixed
location.
Diagram:
Explanation of Diagram:
The user interacts with a mobile device like a smartphone or tablet.
The mobile device contains components like processor, OS, and a wireless adapter
that help in computation and communication.
It connects to a wireless network using technologies such as Wi-Fi or 4G/5G, which
further connects to the internet or cloud.
From the internet/cloud, the user can access web applications and cloud storage for
data retrieval and real-time work.
Additional Characteristics (Optional if Asked):
Data Synchronization:
o Synchronization ensures data consistency across devices and platforms
during mobile computing.
o This is crucial for accessing the most up-to-date information while moving
across different locations.
Security Concerns:
o As mobile devices often access public networks, security is a critical
characteristic of mobile computing.
o Techniques such as encryption, VPN, and biometric locks are used to protect
data.
Mobile IP:
Pyq Question:
Explain basic terminologies of Mobile IP. [8]
Introduction:
Mobile IP is a communication protocol that allows users to move across different
networks while maintaining a permanent IP address.
It supports seamless internet connectivity for mobile devices, even while they
change their network attachment point.
Definition:
Mobile IP is a standard protocol developed by IETF (Internet Engineering Task
Force) to facilitate mobility in IP networks without changing the IP address.
It enables continuous internet sessions during the handover process in mobile
environments.
Diagram:
Explanation of Diagram:
The Correspondent Node (CN) sends packets to the mobile node through the Home
Agent (HA), located in the mobile node’s original home network.
The Home Agent uses tunneling to forward these packets to the Foreign Agent (FA)
in the foreign network where the mobile node is currently present.
The Foreign Agent delivers the packets to the Mobile Node using its Care-of
Address (CoA).
The mobile node can reply directly to the CN, or through the same tunneling route.
Mobile IP in MANETs:
Pyq Question:
Explain MANETs using Mobile IP with suitable diagram. [8]
Introduction:
MANET stands for Mobile Ad hoc Network, a wireless network formed by a group
of mobile devices without fixed infrastructure or centralized access points.
Mobile IP enables seamless data communication and address consistency for devices
moving across different parts of MANETs or external networks.
Definition:
A MANET is a self-configuring network of mobile nodes connected via wireless links.
Each node acts as both a router and a host.
Mobile IP allows mobile nodes in MANETs to maintain their IP identity while moving
between networks, ensuring continuous data exchange.
Pyq Question:
What is the basic purpose of DHCP? Explain the protocol with suitable diagram. [8]
Explain with suitable data flow diagram, client initialization via DHCP. [8]
Introduction:
DHCP stands for Dynamic Host Configuration Protocol, and it is used to
automatically assign IP addresses to hosts in a network.
It reduces the administrative burden of manually assigning IP configurations like IP
address, subnet mask, default gateway, and DNS.
Definition:
DHCP is a network management protocol that assigns dynamic IP addresses and
other network configuration details to client devices.
It follows a client-server model, where a DHCP server provides configuration
parameters to requesting clients.
Purpose of DHCP:
Automatic IP Allocation:
o DHCP helps in automatically assigning IP addresses to devices joining a
network, ensuring there is no conflict or duplication.
o This automation is essential in networks with hundreds or thousands of
clients.
Ease of Network Management:
o Network administrators do not need to manually assign and track IP settings,
which simplifies management.
o DHCP can reassign IP addresses after leases expire or clients leave the
network.
Centralized Control:
o The DHCP server centrally controls the entire pool of available IP addresses
and allocates them as per availability.
o Other settings like DNS server, default gateway, and lease time are also
distributed centrally.
Supports Dynamic and Manual Allocation:
o DHCP supports both dynamic allocation (IP address assigned for a period) and
manual allocation (fixed IP based on MAC address).
o This flexibility is helpful in managing both servers (fixed IP) and client
devices (dynamic IP).
Diagram:
Explanation of Diagram:
In the DHCP Discover step, the client broadcasts a message on the network to find
available DHCP servers.
In the DHCP Offer step, the server responds with an available IP address and other
configurations.
The DHCP Request step is where the client accepts the offer and requests that
specific IP.
Finally, the DHCP Acknowledgment step confirms the assignment and the client can
start using the IP.
Real-World Importance:
DHCP is essential in environments like offices, colleges, or public Wi-Fi zones, where
users frequently join and leave the network.
It ensures consistent, automatic IP management and reduces configuration errors
across thousands of devices.
Related Concepts:
DHCP Lease Time:
o It defines how long the IP address is valid for a particular device. When it
expires, the IP can be reassigned.
DHCP Relay Agent:
o In networks where the DHCP server is on another subnet, a relay agent
forwards DHCP messages between clients and server.
Static vs Dynamic Configuration:
o In static mode, an IP is permanently assigned based on MAC address. In
dynamic mode, IPs are assigned temporarily from a pool.
AdHoc Networks:
Pyq Question:
What is an AdHoc network? Explain its characteristics and applications. [5]
Introduction:
An AdHoc network is a temporary wireless network formed by a group of mobile
nodes without relying on any fixed infrastructure or centralized access point.
It is often created spontaneously to enable direct communication between nearby
devices for quick and flexible connectivity.
Definition:
An AdHoc network is a self-configuring network of mobile or static nodes where
each node communicates directly with others using wireless links.
All devices in an AdHoc network act as both hosts and routers, forwarding data to
other nodes without any base station.
Diagram:
Explanation of Diagram:
In fig.4.232, mobile nodes A, B, C, D, and E are shown as part of an AdHoc network.
Node A sends data to Node C using Node B as an intermediate. Similarly, E reaches
B via D and C.
Each node functions as both a sender and a router, ensuring connectivity through
multi-hop transmission.
Pyq Question:
Explain the working of Destination-Sequenced Distance-Vector (DSDV) protocol
with example. [8]
Introduction:
In AdHoc networks, routing protocols decide how data is transferred between
mobile nodes in a decentralized, dynamic environment.
Proactive protocols maintain up-to-date routing tables even if data is not being
transmitted, ensuring immediate route availability.
Definition:
Destination-Sequenced Distance-Vector (DSDV) is a proactive routing protocol
designed for AdHoc networks based on the Bellman-Ford algorithm.
Each node maintains a table with information about all reachable destinations and
the number of hops to reach them.
Diagram:
Explanation of Diagram:
In fig.4.232, Node A advertises a route to itself with sequence number 22 and 0
hops to Node B.
Node B forwards this update to Node C, incrementing the hop count. Similarly, Node
C sends it to Node D.
Every node updates its routing table only if the received sequence number is newer
or has fewer hops.
Example:
Suppose Node A wants to communicate with Node D. Initially, D is unreachable, but
A receives updates from B, which gets information from C.
If C sends an update with Destination D and sequence number 25, A stores this
route with hop count 3.
If a later update from another path has Destination D with sequence number 24, A
ignores it since it is older.
This method ensures the latest and most efficient routes are always used in the
network.
Advantages of DSDV:
Guaranteed Loop-Free Routing:
o Sequence numbers eliminate routing loops, which are a common problem in
distance-vector protocols.
Quick Route Availability:
o Since routes are maintained proactively, data can be forwarded immediately
without delay.
Simple and Predictable Behavior:
o The protocol structure is easy to implement and debug due to its table-driven
approach.
Disadvantages of DSDV:
Frequent Updates:
o Periodic table broadcasting consumes bandwidth and battery, especially in
highly mobile networks.
Scalability Issues:
o It is not suitable for very large networks due to high update overhead and
memory usage in maintaining all routes.
Pyq Question:
How does Dynamic Source Routing (DSR) route the data? What are its advantages
and disadvantages? [8]
Introduction:
In AdHoc networks, reactive routing protocols find routes only when data needs to
be transmitted, reducing overhead compared to proactive approaches.
Dynamic Source Routing (DSR) is a reactive routing protocol designed for wireless
multi-hop networks, especially where nodes frequently change location.
Definition:
DSR protocol is an on-demand routing technique where the entire path to the
destination is included in the packet header.
It uses two main mechanisms: Route Discovery and Route Maintenance, eliminating
the need for periodic routing messages.
Diagram:
Explanation of Diagram:
In fig., the source node S initiates a route request (RREQ) by broadcasting to
neighbors.
Each intermediate node appends its address and forwards it further until it reaches
destination D.
The destination sends a route reply (RREP) with the complete path, allowing S to
send data along that path.
Route Maintenance:
While forwarding packets, each node confirms successful transmission using
acknowledgments.
If a link break is detected, a Route Error (RERR) message is sent to the source.
The source then removes the invalid route from its cache and may start a new route
discovery process.
Features of DSR:
Source Routing:
o Each data packet carries the full path to the destination in its header,
eliminating the need for routing tables.
Caching:
o Nodes maintain route caches to store learned paths, which helps in faster
route discovery in future transmissions.
No Periodic Updates:
o DSR avoids regular routing updates, saving battery and bandwidth in dynamic
environments.
Advantages of DSR:
Efficient for Small Networks:
o Works well in small or moderately sized networks with low to moderate
mobility due to minimal overhead.
Quick Recovery:
o Upon failure, it uses cached alternate paths or initiates new discovery quickly.
No Periodic Control Packets:
o Reduces unnecessary traffic, which saves energy and improves network
lifetime.
Route Learning:
o Nodes learn routes through observation, improving routing efficiency over
time.
Disadvantages of DSR:
Header Overhead:
o Since each packet carries the complete route, header size increases with path
length, wasting bandwidth.
Poor Performance in Large Networks:
o Scalability becomes an issue due to increased processing and memory
requirements for maintaining route caches.
Stale Cache Entries:
o Nodes may store outdated routes, leading to delivery failures or delays until
a new route is found.
Broadcast Storms:
o Initial route discovery using broadcasting can overload the network, especially
when many nodes are active.
Pyq Question:
How does Ad Hoc On-Demand Distance Vector Routing (AODV) route the data?
What are its advantages and disadvantages? [8]
Introduction:
AODV is a reactive routing protocol used in mobile AdHoc networks where routes
are established only when required by the source node.
It supports dynamic topology by minimizing routing overhead and maintains route
information only while actively communicating.
Definition:
AODV protocol is an on-demand, loop-free, distance-vector routing protocol that
discovers and maintains routes as needed between nodes in a mobile network.
It uses sequence numbers to ensure the freshness of routing information and
prevent routing loops.
Diagram:
Explanation of Diagram:
In fig.4.232, the source node S initiates a route request RREQ to destination D by
broadcasting through intermediate nodes A and B.
Once the destination receives the RREQ, it sends a route reply RREP along the
reverse path to S.
This establishes a complete forward path for communication from source to
destination.
Route Maintenance:
If a link in the active route breaks, a Route Error (RERR) message is generated and
sent to the source node.
The source can then reinitiate route discovery if the route is still needed.
Active routes are monitored by periodic HELLO messages or link-layer feedback.
Features of AODV:
On-demand Operation:
o Routes are only discovered when needed, which reduces unnecessary routing
traffic.
Sequence Numbers:
o Ensures the freshness of routing information and avoids looping by using
destination sequence numbers.
Scalability:
o Performs well in large networks due to its minimal control message overhead
during idle periods.
Advantages of AODV:
Efficient Use of Bandwidth:
o By avoiding periodic updates, it conserves battery and reduces unnecessary
bandwidth usage.
Fresh Routes:
o Sequence numbers ensure the most recent route is always used for packet
forwarding.
Loop-Free Routing:
o Prevents data looping with the help of updated and unique destination
sequence numbers.
Scalability and Flexibility:
o Suitable for networks with changing topology due to its adaptive route
discovery and maintenance mechanisms.
Disadvantages of AODV:
Latency in Route Discovery:
o Data transmission is delayed until a route is found, especially in high-mobility
environments.
High Control Overhead in Large Networks:
o Frequent RREQ and RREP messages may cause network congestion as the
number of nodes increases.
Route Maintenance Issues:
o Frequent topology changes may lead to broken links and require frequent
route rediscovery.
No Route Caching:
o Unlike DSR, AODV does not maintain multiple routes in cache, which may limit
flexibility.
Pyq Question:
Compare proactive routing protocols with reactive routing protocols using table. [8]
Introduction:
Routing protocols in AdHoc networks are mainly classified into proactive and
reactive types based on how they manage routing information.
Understanding their differences helps in choosing the right protocol for specific
network needs.
Definition:
Proactive routing protocols maintain fresh routes to all nodes at all times by
periodically updating routing tables.
Reactive routing protocols create routes only when needed by the source node,
discovering routes on-demand.
Comparison Table:
Aspect Proactive Routing Protocols Reactive Routing Protocols
Route Maintains routes continuously Routes created only when
Maintenance through periodic updates needed through route discovery
Route Discovery Low delay since routes are always High delay due to route
Delay available discovery before data sending
Control High due to periodic broadcasting Low during idle, high during
Overhead of routing information route discovery
Scalability Less scalable for large networks More scalable as routing
due to overhead messages are on-demand
Bandwidth Usage Higher bandwidth consumption for Efficient bandwidth usage,
maintaining routes fewer control messages
Routing Table Large routing tables to store all Smaller routing tables with
Size possible routes active routes only
Suitability Suitable for networks with low Best for highly dynamic or large
mobility and stable topology networks
Examples DSDV, OLSR AODV, DSR
Hybrid Routing
Pyq Question:
What is hybrid routing? Explain zone routing protocol (ZRP) with suitable diagram.
[8]
Introduction
Hybrid routing combines features of both proactive and reactive routing to get
benefits of both types.
It reduces control overhead like reactive routing and decreases route discovery
delay like proactive routing.
Definition
Hybrid routing protocols maintain routing information proactively within a local
region and use reactive methods for distant nodes.
This approach improves scalability and efficiency in dynamic and large networks.
Pyq Question:
Explain On-Demand Multicast Routing Protocol (ODMRP) with suitable diagram. [8]
Introduction
Multicast routing allows sending data from one source to multiple receivers
efficiently in a network.
ODMRP is a mesh-based on-demand multicast routing protocol designed for mobile
ad hoc networks (MANETs).
Definition
On-Demand Multicast Routing Protocol (ODMRP) creates multicast routes
dynamically only when needed.
It builds and maintains a forwarding mesh rather than a tree to improve robustness
against node mobility.
Working of ODMRP :
ODMRP works by periodically flooding a Join Query message from the source to
discover multicast group members.
Nodes that receive the Join Query and are part of the multicast group respond
with Join Reply messages.
The Join Reply message sets up a mesh of forwarding group nodes that forward
multicast data packets.
Forwarding group nodes form a redundant mesh instead of a strict tree, which
enhances route reliability.
The mesh is refreshed periodically to adapt to topology changes caused by mobility.
Data packets are sent only through the mesh members, reducing overhead compared
to flooding the entire network.
Pyq Question:
What is VANET? Explain its architecture and applications. [5]
Introduction
VANET stands for Vehicular Ad Hoc Network, a special type of Mobile Ad Hoc
Network (MANET).
It enables communication between vehicles and roadside infrastructure without
fixed networks.
VANET improves road safety, traffic management, and passenger comfort using
wireless communication.
Definition
VANET is a self-organizing network of vehicles equipped with communication
devices that connect dynamically while moving.
It uses Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure (V2I)
communication methods.
Architecture of VANET :
VANET architecture consists of three main components:
o Vehicles: Equipped with On-Board Units (OBUs) to communicate with other
vehicles and infrastructure.
o Roadside Units (RSUs): Fixed units along the road to provide communication
and traffic information.
o Communication links: Wireless links used for V2V and V2I communication
enabling data exchange.
Explanation of Diagram :
Fig.4.215 shows vehicles communicating directly with each other using Vehicle-to-
Vehicle links.
Vehicles also communicate with Roadside Units for information and services via
Vehicle-to-Infrastructure links.
RSUs connect to internet/cloud for further data services and traffic management.
Applications of VANET :
Enhances road safety by providing real-time warnings of accidents, traffic jams,
and hazards.
Supports intelligent traffic management by sharing traffic conditions with
infrastructure.
Enables infotainment and internet access for passengers inside vehicles.
Facilitates emergency vehicle communication to clear traffic and reduce response
time.
Assists in navigation and route planning by exchanging real-time traffic data.
Pyq Question:
What is MANET? Explain its architecture and applications. [5]
Introduction
MANET is a self-configuring, infrastructure-less network of mobile devices
connected wirelessly.
Each device in MANET acts as a router and communicates directly with other
devices within range.
MANETs are used where fixed infrastructure is not available or impractical.
Definition
MANET stands for Mobile Ad Hoc Network, a decentralized wireless network
formed by mobile nodes without any fixed infrastructure or centralized
management.
Architecture of MANET :
MANET architecture mainly includes:
o Mobile Nodes: Devices such as smartphones, laptops, or sensors that move
freely and communicate wirelessly.
o Routing Protocols: Algorithms used to discover and maintain routes between
nodes dynamically.
o Wireless Links: Connections between nodes formed over wireless
communication channels.
Explanation of Diagram :
Fig.4.101 shows mobile nodes connected wirelessly forming a network without any
fixed infrastructure.
Nodes communicate directly or via multi-hop routing through intermediate nodes to
reach distant nodes.
This dynamic and flexible architecture adapts as nodes move, joining, or leaving the
network.
Applications of MANET :
Military communications in battlefield where fixed infrastructure is unavailable.
Disaster recovery and emergency situations for quick deployment of communication
networks.
Vehicular communication systems for road safety and traffic management.
Temporary networks for conferences, meetings, and events to share information.
Wireless sensor networks for environmental monitoring and data collection.
Pyq Question:
Compare the security challenges in MANET and VANET using table. [5]
Introduction
MANET and VANET are types of wireless ad hoc networks with different
environments and mobility patterns.
Both face unique security challenges due to their decentralized nature and dynamic
topology.
Understanding these differences is important for designing effective security
solutions.
Mobile IP
Pyq Question:
Why is Mobile IP needed? Discuss the motivation behind its development. [5]
Introduction
Mobile IP is a protocol designed to enable mobile devices to maintain their Internet
connectivity while moving across different networks.
It allows devices to change their point of attachment to the Internet without
changing their IP address.
Definition
Mobile IP is a communication protocol that provides seamless internet access to
mobile devices by managing IP address changes during mobility.
Need of Mobile IP :
Mobile devices change their network locations frequently, which causes disruption
in ongoing internet sessions without Mobile IP.
Traditional IP addressing depends on fixed network location, making mobile
communication difficult.
Without Mobile IP, mobile users lose connectivity or must change IP address,
interrupting applications like video calls or file transfers.
Mobile IP enables continuous connectivity and session persistence while moving
between different networks.
It allows mobile devices to remain reachable via a permanent IP address regardless
of their current location.
Explanation of Diagram :
Fig.4.115 shows Mobile Node (MN) moving from Home Network (HN) to Foreign
Network (FN).
Home Agent (HA) in HN tracks MN’s location and tunnels packets to Foreign Agent
(FA) in FN.
FA receives packets on behalf of MN and delivers them locally.
This mechanism hides the movement of MN from the rest of the internet,
maintaining a permanent IP address.
Additional points:
Mobile IP supports both IPv4 and IPv6 networks for mobility.
It reduces packet loss and latency during handoffs.
Essential for mobile computing, telematics, and mobile internet services.
Mobile IP Packet Delivery
Pyq Question:
Describe IP packet delivery between two mobile nodes in a Mobile IP network. Why
is reverse tunneling required? [8]
Introduction
Mobile IP enables mobile nodes to maintain communication while moving across
different networks.
Packet delivery between two mobile nodes is complex due to mobility and changing
network locations.
Definition
IP packet delivery in Mobile IP refers to the process of routing data packets from
one mobile device to another despite their movement across networks.
Explanation of Diagram :
Fig.4.230 shows MN1 sending a packet to MN2’s home address.
HA2 intercepts and tunnels the packet to MN2’s care-of address on FN2.
MN2 receives the packet via CoA2.
Similarly, MN2’s reply goes through HA1 and is tunneled to MN1’s care-of address
CoA1 on FN1.
This maintains proper routing despite node mobility and changing IP locations.
Additional points:
Reverse tunneling maintains communication integrity for bidirectional data flow.
Without reverse tunneling, packets may be blocked or routed incorrectly.
Reverse tunneling supports roaming in enterprise or ISP networks with strict
policies.
Pyq Question:
What is agent discovery in Mobile IP? Explain its role and procedure. [5]
Introduction
Mobile IP allows mobile devices to stay connected while moving between networks.
Agent discovery helps a mobile node find its home agent or foreign agent in the
network.
Definition
Agent discovery is the process by which a mobile node identifies the presence and
availability of home agents or foreign agents on the network.
Explanation of Diagram :
Fig.4.231 shows the foreign agent periodically sending agent advertisements to the
mobile node.
The home agent may also send advertisements optionally.
If the mobile node does not receive any advertisements, it sends an agent
solicitation message to request advertisements.
Foreign agent responds with advertisements after solicitation.
Mobile node then sends a registration request to the foreign agent.
Foreign agent forwards registration to the home agent, enabling mobile node
communication.
Registration in Mobile IP
Pyq Question:
Explain with diagram the registration process of a mobile node via foreign agent
(FA) and directly with home agent (HA). [8]
Introduction
Registration is a key process in Mobile IP where a mobile node informs its home
agent about its current location.
It allows the mobile node to receive packets while moving between different
networks.
Definition
Registration is the process by which a mobile node updates its home agent with its
current care-of address, either via a foreign agent or directly.
Additional Points :
Registration ensures packets are tunneled correctly to the mobile node's current
location.
Authentication between mobile node, foreign agent, and home agent is essential to
secure registration.
Registration lifetime specifies how long the registration is valid before renewal is
required.
Pyq Question:
What is encapsulation in mobile IP? List different methods of encapsulation and
explain any one of them. [8]
Why and when encapsulation is needed? List different methods of encapsulation and
explain any one of them. [8]
Introduction
Encapsulation is a process in mobile IP to forward packets from the home agent to
the mobile node when it is away from home network.
It helps to hide original packet details and carry them inside another packet for
delivery.
Definition
Encapsulation means enclosing the original IP packet within a new IP packet with a
different IP header.
This allows tunneling the packet through intermediate networks to the mobile
node's current location.
Pyq Question:
What is route optimization in Mobile IP? Why is it important? [5]
Introduction:
In Mobile IP, route optimization is introduced to improve routing efficiency when a
mobile node moves away from its home network.
It reduces the delay and overhead caused by the triangular routing method used in
basic Mobile IP.
Definition:
Route optimization is a technique in Mobile IP that allows the correspondent node
to send packets directly to the mobile node’s current care-of address.
It avoids passing all traffic through the home agent, which causes inefficient
routing paths and additional delay.
Explanation of Diagram:
Fig.4.232 shows how the correspondent node sends the data directly to the mobile
node’s care-of address using route optimization.
The mobile node first informs the correspondent node about its current care-of
address using a Binding Update.
Once the update is received, the correspondent node maintains this information and
sends all future packets directly to the new location.
Additional Information:
Route optimization can include security features like authentication to prevent
misuse of binding updates.
The binding cache entry at the correspondent node has a lifetime, after which it
must be refreshed.
This method is crucial in mobile environments where delay-sensitive services are
affected by inefficient routing paths.
Mobile IPv6 has built-in support for route optimization, making it more efficient
compared to Mobile IPv4.
IP Handoff in Mobile IP
Pyq Question:
Explain IP handoff in Mobile IP. What challenges does it address? [5]
Introduction:
IP handoff in Mobile IP is the process of maintaining ongoing communication when a
mobile node changes its network point of attachment.
It ensures that active sessions like calls or downloads continue without interruption
as the device moves between networks.
Definition:
IP handoff is the mechanism that handles the transition of the mobile node’s IP
connectivity from one network (or access point) to another.
It allows seamless movement of the mobile node while maintaining the same IP
address using a new care-of address.
Types of IP Handoff:
Hard Handoff : The connection with the old access point is broken before
establishing a new connection. It may cause packet loss or delay.
Soft Handoff : The new connection is made before the old one is released. This
reduces packet loss and delay, providing smoother transition.
Explanation of Diagram:
Fig.4.232 shows a mobile node initially connected to an old network and moving to a
new network.
After moving, the mobile node acquires a new care-of address and registers it with
the home agent.
The home agent then redirects packets to the new care-of address, maintaining
seamless communication with the correspondent node.
Additional Information:
IP handoff is also known as handover and is crucial in both Mobile IPv4 and Mobile
IPv6 networks.
Techniques like Fast Handover for Mobile IPv6 (FMIPv6) and Hierarchical Mobile
IP (HMIP) are designed to reduce handoff delay.
These advanced methods improve performance for high-speed mobility scenarios
like vehicular networks or high-speed trains.
Overview of Traditional TCP and Mobility Implications
Pyq Question:
Discuss the limitations of traditional TCP in mobile environments. [5]
Introduction:
TCP (Transmission Control Protocol) is a reliable transport layer protocol designed
originally for wired, stable networks.
In mobile networks, the traditional TCP model shows performance issues due to
movement, disconnection, and varying signal quality.
Definition:
TCP is a connection-oriented protocol that ensures data is delivered in order and
without errors through acknowledgment, retransmission, and congestion control.
It assumes network topology is stable and packet losses occur only due to
congestion, not mobility.
Explanation of Diagram:
Fig.4.232 shows a mobile node connected to the TCP sender through a wired network
and base station.
Initially, data flows through the old network path. When the mobile node moves,
the path changes due to handoff.
During this handoff, TCP may misinterpret delay as congestion, reduce its rate, or
even drop the connection.
Additional Information:
Several enhancements like TCP Westwood, TCP Veno, and Mobile TCP (M-TCP) have
been proposed to improve TCP performance over mobile networks.
Mobile IP helps maintain connection across networks, but TCP still requires
optimization to work efficiently over dynamic links.
Split-connection approaches separate wireless and wired segments of TCP to isolate
wireless-induced issues.
TCP-aware handoff techniques aim to notify TCP stack about mobility events, so
unnecessary congestion control is avoided.
Indirect TCP (I-TCP)
Pyq Question:
Explain the modifications of Indirect TCP. What are its advantages and
disadvantages? [8]
Introduction:
Traditional TCP fails to perform efficiently in mobile environments due to frequent
disconnections, handoffs, and wireless losses.
Indirect TCP (I-TCP) is introduced to solve these problems by splitting the
connection at the base station level.
Definition:
Indirect TCP is a protocol that separates the TCP connection into two parts: one
over a wired network and another over a wireless network.
It is designed to isolate the mobile-related issues from the fixed host, maintaining
high performance in mobile environments.
Explanation of Diagram:
Fig.4.232 shows that the TCP connection is split into two parts at the base station.
The fixed host communicates with the base station over a standard wired TCP
connection.
The base station then communicates with the mobile host using a separate optimized
TCP connection for wireless communication.
The base station manages buffering, retransmissions, and mobility-related
activities like handoff.
Additional Information:
Indirect TCP was one of the early approaches for mobile support in TCP, but its
limitations led to development of other protocols like Mobile TCP and M-TCP.
Modern alternatives often use end-to-end mobility-aware protocols that preserve
TCP’s original design principles while supporting handoffs more smoothly.
Snoop TCP
Pyq Question:
Explain snooping TCP with proper diagram. List its advantages and disadvantages.
[8]
Compare indirect TCP, snooping TCP and mobile-TCP using table. [8]
Introduction:
In mobile environments, traditional TCP faces major performance issues due to
packet loss, mobility, and handoffs.
Snoop TCP is a protocol designed to improve TCP performance over wireless links by
enhancing error recovery at the base station.
Definition:
Snoop TCP is a TCP-aware link-layer mechanism where the base station snoops or
monitors the TCP packets and helps with local retransmissions.
It does not split the TCP connection but acts as a transparent agent between the
mobile node and the fixed host.
Explanation of Diagram:
Fig.4.232 shows the placement and function of the snoop agent at the base station.
The fixed host sends TCP packets to the mobile host through the base station,
where they are cached.
If the mobile host sends duplicate ACKs, the snoop agent retransmits the lost
packets directly.
Only necessary ACKs are passed to the fixed host, preserving end-to-end TCP
behavior.
This table highlights that while Snoop TCP is effective in improving wireless TCP
performance, it is restricted by encryption and mobility issues.
Mobile TCP was developed to solve mobility problems while maintaining end-to-end
performance without splitting the connection.
Mobile TCP
Pyq Question:
Write short note on mobile-TCP. List its advantages and disadvantages. [8]
Introduction:
Traditional TCP does not handle mobility and wireless link issues well, leading to poor
performance during handoffs and wireless losses.
Mobile TCP (M-TCP) was designed to improve TCP performance in mobile
environments without violating end-to-end TCP semantics.
Definition:
Mobile TCP is a protocol that separates the connection into two parts using a
"sender proxy" near the wireless edge while keeping end-to-end reliability intact.
It allows better support for handoffs and wireless errors by pausing the fixed-to-
proxy connection when the mobile device is temporarily unreachable.
Explanation of Diagram:
Fig.4.232 illustrates the architecture of Mobile TCP, where a proxy near the base
station interacts with both the fixed and mobile host.
The proxy helps monitor link status and can pause data flow during disconnection to
prevent congestion at the fixed sender.
ACKs continue to flow from mobile to fixed host through the proxy, ensuring
reliable data delivery.
Pyq Question:
What is fast retransmit and fast recovery in TCP? How do they help in mobility?
[5]
Introduction:
In TCP, data transmission may face packet loss due to congestion or mobility-
related issues such as handoffs or link errors.
Fast retransmit and fast recovery mechanisms are designed to improve TCP
performance by responding quickly to such events.
Definition:
Fast retransmit is a TCP technique that triggers retransmission of a lost segment
before the retransmission timer expires.
Fast recovery is used to avoid unnecessary reduction of the congestion window
during loss, thus maintaining better throughput.
Usefulness in Mobility:
Avoids Long Delays: In mobile networks, retransmission timers may delay recovery;
fast retransmit reduces this wait.
Minimizes Throughput Drop: Fast recovery prevents sudden drops in sending rate
during handoffs or link errors, improving data flow.
Adapts to Wireless Losses: Many losses in mobile scenarios are due to weak signals,
not congestion, so avoiding slow start helps.
Maintains Connection Stability: Helps in keeping the TCP connection alive during
momentary disconnections in mobile scenarios.
Additional Notes:
These mechanisms are implemented at the sender side and require no changes at
the receiver or intermediate network.
They are especially important in mobility protocols like mobile-TCP or snooping TCP
where link losses are frequent.
Time-out Freezing
Pyq Question:
Explain the concept of time-out freezing in TCP. Why is it used in mobile networks?
[5]
Introduction:
TCP is a reliable transport protocol designed for wired networks where link
conditions are generally stable and packet loss means congestion.
In mobile networks, frequent disconnections during handoff or movement can cause
unnecessary TCP time-outs and retransmissions.
Definition:
Time-out freezing is a technique used in mobile TCP to temporarily suspend TCP’s
retransmission timer during disconnections or handoffs.
It helps in preventing false time-outs and unnecessary retransmissions when the
mobile host becomes temporarily unreachable.
Working Principle:
The mobile host informs the fixed host (sender) about a temporary disconnection
or handoff.
Upon receiving this notification, the fixed host freezes its retransmission timers
to avoid triggering time-out events.
Once the mobile host reconnects and notifies the sender, timers are resumed
without resetting the connection.
Explanation of Diagram:
Fig.4.232 shows the interaction between the mobile host and fixed host during
time-out freezing.
When the mobile host knows it will be temporarily unreachable (e.g., during
handoff), it sends a freeze signal to the fixed host.
The fixed host freezes its retransmission timer to avoid unnecessary actions like
retransmitting or reducing window size.
After reconnection, the mobile host sends a resume signal, and the TCP session
continues normally.
Additional Notes:
Time-out freezing requires interaction with the mobility management layer to
detect and inform about expected disconnections.
This technique is used in protocols like M-TCP where TCP behavior is optimized for
mobile conditions.
Selective Retransmission
Pyq Question:
Write short note on selective retransmission, an extension of TCP. List its
advantages and disadvantages. [8]
Introduction:
Traditional TCP retransmits all segments after a packet loss, even if many of them
were successfully received.
Selective retransmission improves efficiency by retransmitting only the missing or
corrupted segments instead of the entire window of data.
Definition:
Selective retransmission (also known as Selective Acknowledgment or SACK) is a
TCP extension that enables the receiver to inform the sender about specific
segments that were received correctly.
This allows the sender to retransmit only those segments that were actually lost,
improving bandwidth usage and reliability.
Explanation of Diagram:
In fig.4.232, the sender transmits a sequence of segments from 1 to 5.
Segment 3 is lost in transit, but segments 4 and 5 arrive correctly.
The receiver sends an acknowledgment for segment 2 and includes a SACK option
listing segments 4 and 5.
The sender now only retransmits segment 3, avoiding redundant retransmissions.
Additional Notes:
SACK is typically enabled using TCP options during the connection setup via the SYN
segment.
Modern operating systems support SACK by default, especially in mobile and
broadband applications where network conditions fluctuate.
Transaction-oriented TCP
Pyq Question:
Explain transaction-oriented TCP with suitable diagram. What are its advantages
and disadvantages? [8]
Introduction:
Traditional TCP is connection-oriented, designed for long sessions with continuous
data transfer.
Transaction-oriented TCP adapts TCP for short-lived transactions, common in web
browsing or mobile applications.
It optimizes TCP behavior for quick request-response interactions to reduce delay
and overhead.
Definition:
Transaction-oriented TCP is a modification of standard TCP aimed at supporting
quick, short data exchanges without maintaining a long connection.
It reduces connection setup and teardown time to improve performance for small
data transfers like web transactions.
Explanation of Diagram:
In fig.4.245, the client initiates a TCP connection with SYN, server responds with
SYN-ACK, client replies with ACK.
Client sends a short HTTP request, server sends a short response.
Connection closes quickly with FIN and ACK packets exchanged, suitable for quick
transactions.
Transaction-oriented TCP reduces delays during connection setup and teardown
phases for faster interaction.
Advantages of Transaction-oriented TCP:
Reduced Latency: Faster connection setup and teardown leads to quicker data
transfers for small transactions.
Efficient for Short Data: Designed specifically for short request-response
patterns common in mobile and web applications.
Less Resource Usage: Reduces overhead by minimizing time connections remain
open, freeing resources for other tasks.
Improves User Experience: Faster response times improve performance perception
in interactive applications.
Additional Notes:
Transaction-oriented TCP is particularly useful in HTTP/1.0 and early mobile
networks but newer protocols like HTTP/2 and QUIC use multiplexing to solve
similar problems.
It balances the need for reliable TCP features with the speed demanded by short
data exchanges in modern networks.
Unit 5 : Fading Channels
Pyq Question:
Explain fading in detail? Classify types of fading. [7]
Introduction:
Fading is the variation in the strength of a received radio signal over time or space
caused by multiple propagation paths.
It occurs due to the constructive and destructive interference of the signal waves
arriving at the receiver from different paths.
Fading impacts the quality and reliability of wireless communication systems.
Definition:
Fading is the fluctuation or attenuation of signal amplitude and phase caused by the
propagation environment affecting the transmitted wave.
It leads to signal strength variation over time, frequency, or spatial position of the
receiver.
Causes of Fading:
Multipath propagation where signals reflect, diffract, and scatter due to obstacles
like buildings, trees, and terrain.
Movement of transmitter, receiver, or objects in the environment causing Doppler
shifts and time variations.
Atmospheric conditions also contribute to signal fluctuation.
Classification of Fading:
Large-scale fading:
o Occurs over large distances (hundreds of meters to kilometers).
o Caused mainly by path loss and shadowing due to obstacles blocking the signal
path.
o Results in slow variation of the received signal power.
Small-scale fading:
o Occurs over short distances (a few wavelengths) or short time durations.
o Caused by multipath propagation and rapid movement of transmitter or
receiver.
o Leads to rapid fluctuations of signal amplitude and phase.
Flat fading:
o All frequency components of the signal experience the same magnitude of
fading.
o Happens when the signal bandwidth is less than the channel coherence
bandwidth.
o The signal is affected uniformly across its frequency spectrum.
Frequency selective fading:
o Different frequency components of the signal experience different fading
levels.
o Occurs when the signal bandwidth is larger than the channel coherence
bandwidth.
o Causes distortion of the signal waveform due to unequal fading across
frequencies.
Slow fading:
o Signal variations happen slowly compared to the symbol duration.
o Often caused by shadowing or changes in large obstacles near the path.
Fast fading:
o Rapid changes in signal amplitude and phase within a symbol duration.
o Caused by multipath and Doppler shifts due to movement.
Explanation of Diagram:
Fig.3.12 shows fading divided mainly into large-scale and small-scale categories
based on range and cause.
Large-scale fading is due to path loss and shadowing, slow varying over distance.
Small-scale fading arises from multipath effects causing fast signal fluctuations.
Small-scale fading is further classified into flat fading (uniform across frequencies)
and frequency selective fading (varies with frequency).
Slow and fast fading refer to the rate of signal variation relative to the symbol
period.
Additional Information:
Understanding fading types helps in designing suitable mitigation techniques like
diversity, equalization, and error correction.
Rayleigh fading model is widely used to statistically describe multipath fading where
no direct line of sight exists.
Fading characterization includes statistical parameters like amplitude distribution,
Doppler spectrum, and correlation functions.
Rayleigh Distribution
Pyq Question:
Explain Rayleigh distribution. How mean and variance of Rayleigh distribution is
calculated? [7]
Introduction:
Rayleigh distribution models the statistical behavior of signal amplitude in multipath
fading environments.
It is used when there is no direct line of sight between transmitter and receiver.
This distribution applies to scenarios where received signal is the sum of many
random scattered waves.
Definition:
Rayleigh distribution is a continuous probability distribution for non-negative
random variables.
It describes the magnitude of a two-dimensional vector whose components are
independent Gaussian variables with zero mean.
It is widely used in wireless communication to model small-scale fading amplitude.
Additional Notes:
Rayleigh distribution is key to modeling wireless channel characteristics in urban
areas.
It helps predict signal fading and design robust communication systems using
diversity and error correction.
Understanding mean and variance assists in analyzing signal strength variability and
quality of service.
Ricean Fading
Pyq Question:
Explain Ricean fading channel model.
Differentiate between Rayleigh fading and Ricean fading. [7]
Introduction:
Ricean fading models wireless channels where there is a dominant direct signal path
plus multiple scattered paths.
It occurs when line of sight (LOS) exists between transmitter and receiver along
with reflected signals.
The model helps analyze real-world wireless communication with both direct and
multipath components.
Pyq Question:
Compare wideband and narrowband channels using table.
List any two channel models used in the mentioned channels. [7]
Introduction:
Wireless communication channels vary based on signal bandwidth and frequency
characteristics.
Narrowband and wideband channels represent two major types with distinct
properties and models.
Understanding their differences helps in designing communication systems properly.
Pyq Question:
Describe multipath propagation with neat diagram. What is ISI in multipath fading
channels?
Explain reflection, scattering and ISI in multipath fading channel with suitable
diagram. [7]
Introduction:
Multipath propagation occurs when transmitted signals reach the receiver via
multiple paths caused by obstacles.
This phenomenon affects the quality and reliability of wireless communication.
Understanding multipath effects is crucial for designing robust communication
systems.
Choice of Modulation
Pyq Question:
How does the choice of modulation scheme affect performance in fading
environments? [5]
Introduction:
Modulation schemes determine how information is transmitted over wireless
channels.
Their choice is crucial because wireless channels often experience fading, which
impacts signal quality.
Different modulation types behave differently under fading conditions, affecting
system reliability and data rates.
Pyq Question:
What is non-coherent detection? Explain with neat diagram, non-coherent detection
of FSK. [7]
Introduction:
Detection in communication refers to the process of recovering transmitted signals
at the receiver.
Coherent detection requires exact knowledge of carrier phase and frequency for
demodulation.
Non-coherent detection does not require phase information, making it simpler but
less efficient in noise.
Explanation of Diagram:
The input signal containing FSK frequencies enters two parallel bandpass filters
tuned at f₁ and f₂.
Each filter outputs the component energy around its center frequency.
Envelope detectors extract the amplitude (energy) of these filtered signals without
phase info.
Comparator compares the two envelope outputs.
The output symbol corresponds to the frequency with the higher envelope energy,
deciding the transmitted bit.
Pyq Question:
Compare coherent and differential detection techniques in the context of wireless
channels. [5]
Introduction:
Detection techniques are used in wireless communication to recover transmitted
signals from received signals.
Coherent and differential detection are two common methods used depending on
channel conditions and system complexity.
Explanation of Diagram:
Received signal is processed by two paths for comparison: coherent and differential
detection.
Coherent detector uses phase synchronizer to recover exact carrier phase before
demodulation.
Differential detector directly compares phase difference of received symbols
without synchronization.
Coherent detection output has lower error rate but requires more complex
hardware.
Differential detection output is simpler and more robust but has higher bit error
rate.
BER in Fading
Pyq Question:
How is Bit Error Rate (BER) affected by fading? Discuss its implications on system
design. [5]
Introduction:
Bit Error Rate (BER) measures the number of bit errors divided by total
transmitted bits in a communication system.
Fading causes variations in signal amplitude and phase due to multipath propagation
and movement.
Fading significantly impacts the reliability and performance of wireless systems by
increasing BER.
Definition of Fading:
Fading is the rapid fluctuation of signal strength caused by constructive and
destructive interference of multiple signal paths.
It can be slow or fast, flat or frequency-selective depending on the channel
characteristics.
Diagram:
Explanation of Diagram:
Transmitted signal passes through fading channel where signal strength varies
unpredictably.
Deep fades cause signal power drop resulting in increased bit errors at receiver.
Receiver uses diversity and error correction to reduce BER and improve
communication reliability.
System design includes adaptive techniques to handle fading-induced BER changes.
Pyq Question:
Explain mobile operating system. What are needs of a mobile OS? List different
types of OS. [7]
List and explain in brief the design issues of a mobile OS. [7]
What are the special constraints and requirements of mobile operating systems?
[7]
Introduction:
Mobile operating systems (OS) are software platforms that manage hardware and
software resources in mobile devices like smartphones and tablets.
They provide user interface, application management, and control over device
functions such as calls, data, and sensors.
Diagram:
Explanation of Diagram:
Hardware layer consists of physical components like CPU, memory, battery, and
sensors.
Kernel manages core resources and provides system services.
Connectivity and security modules handle wireless communication and protect data.
User interface provides interaction methods including touch and display.
Application framework supports app development and lifecycle management.
Applications are user-facing programs running on the OS.
Pyq Question:
Provide a comparative study of Windows Mobile, Palm OS, Symbian OS, iOS,
Android, and Blackberry OS. [7]
What are the unique features of Symbian OS and how does it differ from Android?
[7]
Discuss the evolution of commercial mobile operating systems. [7]
Describe the architecture and key features of Android OS. [7]
Explain the design and components of an operating system for a sensor network. [7]
Introduction:
Mobile operating systems have evolved to meet the growing needs of mobile devices
in communication, entertainment, and productivity.
Different OS platforms target diverse device capabilities and user demands.
Understanding their features and differences helps in selecting the right OS for
applications.
Diagram:
Explanation of Diagram:
Linux kernel manages core hardware resources and security features.
Native libraries and Hardware Abstraction Layer provide low-level services and
drivers.
Android Runtime executes app code using managed runtime environment.
Application framework offers reusable components and APIs for app developers.
Applications layer contains user-facing programs running on the OS.
Pyq Question:
What is M-commerce? List out benefits of M-commerce. Briefly explain any three
applications of M-commerce. [7]
What is M-commerce? Explain in brief any five attributes of M-commerce. [7]
What is a mobile payment system? Explain payment process using credit card. [7]
What is a mobile payment system? Explain payment process using credit card. List
advantages and disadvantages of M-commerce. [10]
Introduction:
Mobile computing allows users to access data, applications, and services anytime and
anywhere.
Mobile commerce (M-commerce) is the buying and selling of goods and services using
mobile devices.
M-commerce is a growing field with many applications in retail, banking,
entertainment, and more.
Definition of M-commerce:
M-commerce is commercial transactions conducted via wireless handheld devices
such as smartphones and tablets.
It enables users to perform financial and business transactions remotely using
mobile technology.
Benefits of M-commerce:
Provides convenience by allowing transactions anytime and anywhere.
Increases customer reach by connecting businesses to mobile users globally.
Supports real-time transactions and updates, enhancing customer experience.
Enables personalized services and targeted marketing through mobile data.
Reduces operational costs by automating business processes.
Attributes of M-commerce:
Ubiquity: M-commerce allows access to services without location constraints.
Convenience: Users can perform transactions quickly using mobile devices.
Personalization: Offers tailored services based on user preferences and history.
Localization: Uses location information to provide relevant offers and services.
Instant Connectivity: Enables real-time communication and transactions.
Applications of M-commerce:
Mobile Banking: Customers can check balances, transfer funds, and pay bills using
mobile apps.
Mobile Shopping: Users can browse catalogs, place orders, and make payments via
mobile websites or apps.
Mobile Ticketing: Purchase and use tickets for transport or events directly from
mobile devices.
Diagram:
Explanation of Diagram:
User initiates payment via mobile device.
Mobile device sends encrypted data to payment gateway for security.
Payment gateway forwards request to acquiring bank for processing.
Acquiring bank contacts credit card network which communicates with issuing bank.
Issuing bank verifies card details and fund availability.
Approval or decline message flows back through the chain.
User and merchant receive payment confirmation immediately.
Advantages of M-commerce:
Enables 24/7 access to shopping and services without physical presence.
Supports fast, secure, and convenient transactions.
Enhances customer engagement through personalized offers and notifications.
Reduces costs for businesses and consumers by streamlining processes.
Encourages impulse buying due to easy mobile access.
Disadvantages of M-commerce:
Security risks due to potential hacking or data theft in wireless networks.
Dependence on network connectivity can interrupt transactions.
Limited screen size and input capabilities on mobile devices can affect user
experience.
Privacy concerns due to collection of personal and location data.
Possible compatibility issues across different mobile platforms and devices.
Pyq Question:
Draw B2B model and explain any one B2B application. [7]
Introduction:
Business-to-Business (B2B) model refers to commercial transactions conducted
between businesses using electronic networks.
It involves companies selling products or services to other companies rather than
to individual consumers.
B2B supports supply chain management, procurement, and business collaborations
over the internet or private networks.
Diagram:
Explanation of Diagram:
Suppliers provide raw materials to manufacturers for product creation.
Manufacturers convert raw materials into products and send them to distributors.
Distributors supply the products to buyers or retailers.
Electronic marketplace acts as a digital platform enabling order placement, product
listings, and transaction management.
This platform simplifies business interactions and speeds up procurement
processes.
Pyq Question:
Draw B2C model and explain any one B2C application. [7]
Introduction:
Business-to-Consumer (B2C) model refers to transactions where businesses sell
products or services directly to individual customers.
It is the most common e-commerce model used by online retailers, service providers,
and digital platforms.
B2C focuses on customer experience, convenience, and fast delivery of goods or
services.
Diagram:
Explanation of Diagram:
Businesses list their products and services on the online store platform.
Consumers browse and place orders through the online store interface.
Payment gateway securely processes consumer payments like credit cards or digital
wallets.
After payment confirmation, the store arranges delivery through the logistics
system.
Delivery system ensures the ordered products reach the consumer’s address timely
and safely.
Pyq Question:
Describe the structure of a typical M-commerce system. [7]
Explain the process of mobile payment with a suitable example. [7]
List and explain various mobile payment schemes. [7]
What are the desirable properties of a mobile payment system? [7]
Explain various mobile payment solutions and their pros and cons. [7]
Introduction:
Mobile payment is a key part of M-commerce allowing users to pay for goods and
services using mobile devices.
It combines mobile technology, communication networks, and financial systems for
convenient transactions.
Diagram:
Explanation of Diagram:
User uses mobile device to start payment request through an app or website.
Mobile network operator routes this request securely to payment gateway.
Payment gateway checks transaction and authorizes payment with the merchant.
Financial institution moves the money through clearing and settlement systems.
Merchant receives confirmation and delivers goods or services.
Pyq Question:
Discuss the major security issues in mobile payment systems. [7]
How can mobile payments be secured against fraud and data theft? [7]
Introduction:
Mobile payment systems allow financial transactions through mobile devices, which
makes security a critical concern.
Many users rely on mobile payments daily, so protecting their data and money is
very important.
Diagram:
Explanation of Diagram:
User authentication ensures only legitimate users access payment systems.
Encryption protects data during transmission between devices and servers.
Tokenization hides real payment details by using substitutes.
Secure apps reduce risk of malware and unauthorized access.
Fraud detection continuously monitors for unusual transactions.
User education helps avoid falling victim to scams and phishing.
Additional Notes:
Combining multiple security measures increases protection against various attack
methods.
Mobile payment providers follow strict security standards such as PCI DSS to
safeguard user data.
Continuous security improvements are needed as hackers develop new attack
techniques.
Pyq Question:
What is mobile computing? Describe three components of mobile computing. [7]
Write a short note on mobile computing and its three basic components. [7]
Introduction:
Mobile computing allows users to access data and services from any location without
being connected by wires.
It supports communication and data exchange through portable devices like
smartphones, tablets, and laptops.
Definition:
Mobile computing is a technology that enables transmission of data, voice, and video
via a mobile device without fixed physical connections.
Three Basic Components of Mobile Computing:
Mobile Hardware: Devices such as smartphones, tablets, laptops, and wearable
gadgets used to perform computing tasks on the move.
Mobile Software: Applications and operating systems designed to support mobile
devices, enabling connectivity and user-friendly interaction.
Mobile Communication Infrastructure: Wireless networks like cellular, Wi-Fi, and
satellite systems that facilitate data transfer between mobile devices and servers.
Diagram:
Explanation of Diagram:
The user operates mobile hardware to access services.
Mobile hardware runs mobile software to process and manage data.
Mobile communication infrastructure connects devices with networks to exchange
information.
Interaction between these components allows seamless mobile computing
experience.
Additional Information:
Mobile computing supports real-time access and remote work.
Its efficiency depends on hardware capabilities, software design, and network
coverage.
Security and power management are important considerations in mobile computing.