0% found this document useful (0 votes)
15 views24 pages

Unit Wise Question Bank

Uploaded by

Sivadharshini
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views24 pages

Unit Wise Question Bank

Uploaded by

Sivadharshini
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 24

UNIT WISE QUESTION BANK (2MARK QUESTIONS – 20, 13/15-MARK QUESTIONS – 12)

UNIT I
INTRODUCTION

Introduction to Mobile Computing – Applications of Mobile Computing- Generations of Mobile


Communication Technologies- Multiplexing – Spread spectrum -MAC Protocols – SDMA- TDMA-
FDMA- CDMA

PART A – (20 x 2 = 40 marks) CO KL


1. Distinguish Mobile Computing vs. Wireless Networking APR/MAY 2017, CO1 K1
NOV/DEC2017, APR/MAY 2018
Mobile computing essentially denotes accessing information and remote
computational services while, wireless networking provides the basic
communication infrastructure necessary to make this possible. Mobile
computing is based on wireless networking and helps one to invoke
computing services on remote servers while on the move wireless networking
is an important ingredient of mobile computing
2. Why “MAC protocol designed for infrastructure based wireless network may CO1 K2
not work satisfactory in infrastructure less environment “ – justify?
NOV/DEC 2017, APR/MAY 2018

• Bandwidth Efficiency
• BW available is very limited

– MAC should be designed such that the scarce bandwidth


is utilized in an efficient manner

• Hidden and Exposed Node Problem

• Collision-prone shared channel

– Multiple nodes may contend for the medium leading to collision

– MAC should make sure that collision is minimized


• Mobility of Nodes

• Control information exchanged may become useless due to mobility

• MAC performance should be satisfactory when nodes are mobile

• Power consumption
QoS support Criticial for real time applications
3. List the Characteristics of Mobile Computing CO1 K1
Ubiquity
Location awareness Adaptation Broadcast Personalization
4. What is Hidden and Exposed Terminal problem? CO1 K1
MAY/JUNE 2016
Hidden and Exposed Terminals
Consider the scenario with three mobile phones as shown below. The
transmission range of A reaches B, but not C (the detection range does not reach
C either). The transmission range of C reaches B, but not A. Finally, the
transmission range of B reaches A and C, i.e., A cannot detect C and vice versa.

Hidden terminals
A sends to B, C cannot hear A,C wants to send to B, C senses a “free” medium (CS
fails) and starts transmittingCollision at B occurs, A cannot detect this collision
(CD fails) and continues with its transmission to B A is “hidden” from C and vice
versa

Exposed terminals
B sends to A, C wants to send to another terminal (not A or B) outside the range C
senses the carrier and detects that the carrier is busy.C postpones its transmission
until it detects the medium as being idle again but A is outside radio range of C,
waiting is not necessary C is “exposed” to B Hidden terminals cause collisions,
where as Exposed terminals causes unnecessary delay.
5. What are the limitations / challenges of mobile computing? NOV/DEC 2016 , CO1 K1
NOV/DEC2018
Quality of connectivity Security concerns Power Consumption
6. What are the features / objectives of MAC protocols? NOV/DEC 2018 CO1 K1
It should implement some rules that help to enforce discipline when multiple
nodes contend for a shared channel.
It should help maximize the utilization of the channel.
Channel allocation needs to be fair. No node should be discriminated against at
any time and made to wait for an unduly long time for transmission.
It should be capable of supporting several types of traffic having different
maximum and average bit rates.
It should be robust in the face of equipment failures and changing network
conditions.
7. Categories of wireless networks CO1 K1
Wireless networks can be divided mainly into two categories: (a)
infrastructure-based wireless networks that include the WLANs, and
(b) infrastructure-less wireless networks that include the mobile ad hoc networks
(MANETs).
8. What are the different types of mobile Middleware? CO1 K1
1.Adaptation 2.Agent
9. What are the logical channels in GSM? CO1 K1
 Traffic channel(TCH)
 Control channel(CCH)
10. What are the disadvantages of small cells? CO1 K1
 Infrastructure
 Handover
 Frequency

11. What are the characteristics of mobile computing devices? CO1 K1


 Adaptation Data dissemination and Management
 Heterogeneity Interoperability Context awareness
12 What are the key constraints of mobile computing? CO1 K1
 unpredictable variation in network quality
 lowered trust and robustness of mobile elements
13. What do you mean by Digital Signature? CO1 K2
Digital signatures are used to enable verification of the records.
A DSA (Digital Structure Algorithm) is used to sign a record before transmitting.
It provides for a variable key length of maximum 512 0r 1024 bits. The
DSS(Digital Signature Standard) is based on the DSA.
Signatures enable identification of the sender identify the orgin of the message, and
check message
14. How is GPRS higher than 2G? CO1 K2
General Packet Radio Service (GPRS) is an extension of GSM and is considered to
be the 2.5 generation technology. it is based on packet switching compared to
circuit switching used in 2G. This was a significant improvement over 2G and
helped to reduce call costs dramatically. it allows users to remain connected to the
Internet without incurring additional charge and supports multimedia
capabilities including graphics and
15. How is 3G higher than GPRS? CO1 K2
The 3G systems support much higher data transmission rates and offer increased
bandwidth, which makes them suitable for high-speed data applications as well
as for high quality
traditional voice calls. The 3G systems can be considered to be purely data
networks, since voice signals are converted to digital data
16. What are categories of MAC protocols? CO1 K2
These MAC protocols can be broadly divided into the following three
categories: Fixed assignment schemes Random assignment schemes
Reservation-based schemes
17. What are the categories of fixed assignment MAC CO1 K3
Frequency Division Multiple Access (FDMA) Time
Division Multiple Access (TDMA)
Code Division Multiple Access (CDMA)
18. What is Time Division Multiple Access (TDMA) CO1 K4
TDMA is an access method in which multiple nodes are allotted different time slots
to access the same physical channel. That is, the timeline is divided into fixed-sized
time slots and these are divided among multiple
19. What is CDMA CO1 K2
In CDMA, multiple users are allotted different codes that consist of sequences of 0
and 1 to access the same channels. A special coding scheme is used that allows
signals from multiple users to be multiplexed over the same physical channel.
20. What is the random assignment schemes that are used in MAC protocols. CO1 K1
ALOHA
Slotted ALOHA CSMA CSMA/CD
CSMA/CA

PART B – (05 x 13 = 65 marks) CO KL

Explain hidden and exposed terminal problem and near and far terminal problem. CO 1 K1
11.
12. Explain the various taxonomy of MAC Protocols. Differentiate various schemes. ( CO 1 K1

13. Explain the distinguishing features of various generations ofwireless networks. CO 1 K2


14. Explain MAC Issues CO 1 K2
15. Explain the structure, characteristics, Applications of mobile computing? CO 1 K2
Explain the issues in wireless MAC CO 1 K2
16.
17. Expalin about FDMA and TDMA schemes. CO 1 K3
18. Explain the structure of Mobile computing? CO 1 K4
19. Explain 1G,2G and 3G of wireless network? CO 1 K2
20. Describe the various random assignment schemes used in MAC protocol CO 1 K1
PART C – (01 x 15 = 15 marks) CO KL
21. Apply mobile computing to design taxi dispatcher and monitoring service. Explain the CO 1 K6
components in detail.
22. Distinguish wireless LAN and wired LAN CO 1 K4
UNIT II

MOBILE TELECOMMUNICATION SYSTEM

Introduction to Cellular Systems – GSM – Services & Architecture – Protocols – Connection


Establishment – Frequency Allocation – Routing – Mobility Management – Security – GPRS-
UMTS – Architecture – Handover – Security

PART A – (20 x 2 = 40 marks) CO KL


1. List GSM services? CO2 K1
Bearer services Tele services Supplementary services
2. What are the entities of operation sub system (OSS)? Operation and CO2 K2
maintenance center Authentication center Equipment Identity Register
3. List out the different interfaces present in GSM? A interface CO2 K1
Abis interface
O interface
4. List out the different subsystems of GSM? NOV/DEC 2018 CO2 K1
Radio sub system (RSS)
Network and switching subsystem (NSS) Operation subsystem (OSS).
5. What are the services offered by GPRS? CO2 K1
NOV/DEC2017 GPRS offers end-to-end packet-
switched data transfer services which can be
categorized into the following two types:
Point-to-Point (PTP) service
Point-to-Multipoint (PTM) service
6. Name the Tele Services provided by GSM? APR/MAY 2017 CO2 K1
1. Telephony
2. Emergency Number
3. Short Message services
Fax
7. What is HLR? NOV/DEC 2018 CO2 K1
The home location register is a database used for mobile user information
management.
An HLR record consists of three types of information Mobile station information
Location information Service information
8. What is IMEI? CO2 K1
The IMEI is international mobile equipment identity number and which is
used to identify the Mobile Station (MS).
9. What is VLR overflow? CO2 K1
The VLR associated to each MSC is a dynamic database which stores all
important information needed for the MS users currently in the LA that is
associated to the MSC. If a new MS comes into an LA the VLR is
responsible for, it copies all relevant information for this user from the HLR
10. What is Authentication Center (AUC)? CO2 K1
The Authentication Center is mainly used for security. The AUC contains the
algorithms for authentication as well as the keys for encryption and generates the
values needed for user authentication
in the HLR
11. What is multicasting? NOV/DEC2016 CO2 K1
Multicasting is the networking technique of delivering the same packet
simultaneously to a group of clients. In this case there is may be one or more
senders, and the information is distributed to a
set of receivers (there may be no receivers or any other number of receivers).
12 What are the services provided by supplementary services? NOV/DEC2016 CO2 K1
● User identification
● Call redirection
● Call forwarding
Closed user group Multiparty communication
13. List GSM Network management functions? CO2 K2
BSS function for BSS management HLR function for HLR management
VLR function for VLR management, MSC function, AUC function,Call recording
function.
14. Define Handoff. What are its types? NOV/DEC2017 CO2 K2
A handoff refers to the process of transferring an active call or data session from
one cell in a cellular network to another or from one channel in a cell to another. A
well- implemented handoff is important for delivering uninterrupted service to a
caller or data session user.
 Hard Handoff: Characterized by an actual break in the connection while
switching from one cell or base station to another. The switch takes place
so quickly that it can hardly be noticed by the user. Because only one
channel is needed to serve a system designed for hard handoffs, it is the
more affordable option. It is also sufficient for services that can allow
slight delays, such as mobile broadband Internet.
 Soft Handoff: Entails two connections to the cell phone from two different
base stations. This ensures that no break
ensues during the handoff. Naturally, it is more costly than a hard handoff.
15. What are the information in SIM? APR/MAY 2018 Card type, CO2 K2
serial no., list of subscribed services Personal identity number
Pin unlocking key, Authentication key
16. What is IMSI? CO2 K2
IMSI is the unique subscriber identity that identifies the HLR of the MSI. TMSI
(temporary mobile subscriber identity) is used to avoid
sending the IMSI on the radio path.
17. List three important features of GSM security? MAY/JUNE 2016 CO2 K3
Authentication Confidentiality Anonymity
18. What are the four types of handover available in GSM? CO2 K4
● Intra cell handover
● Inter cell intra BSC handover
● Inter BSC Intra MSC handover
Inter MSC handover
19. What do you mean by Roaming? CO2 K2
Moving between access points is called roaming. Even wireless networks may
require more than one access point to cover all rooms. In order to provide
uninterrupted services, we require
roaming when the user moves from one access point to another.
20. What are the categories of Mobile services? CO2 K1
Bearer services Tele services Supplementary services

PART B – (05 x 13 = 65 marks) CO KL

Explain in detail about the system architecture of GSM.[ CO2 K1


11. MAY/JUNE 2016, NOV/DEC 2016 , APR/MAY 2017 ,
NOV/DEC2017,NOV/DEC 2018 ] Pg- 35
12. Explain about the architecture of GPRS? [May2014]. Pg- 41 CO2 K1
13. Discuss the architecture of UMTS? pg- 42 MAY/JUNE 2016 , NOV/DEC 2017, CO2 K2
APR/MAY2018
14. Explain about the various handover by GSM? Pg- 36 CO2 K2
NOV/DEC 2016, APR/MAY2018
15. What kind of security will be provided for GSM? Explain. Pg- 40 MAY/JUNE CO2 K2
2016 NOV/DEC2016
Explain about the protocol architecture of GPRS? Pg- 34 CO2 K2
16. MAY/JUNE 2016, NOV/DEC 2016, APR /MAY 2017]
17. Explain about the GSM services ? Pg -33 CO2 K3
18. Explain about inter cell and intra cell handovers n GSM ? Pg- 36 CO2 K4
19. Discuss about the interfaces in UMTS pg- 42 CO2 K2
20. Explain about MOT and MTO in GSM pg- 38 CO2 K1
PART C – (01 x 15 = 15 marks) CO KL
21. Explain about call forwarding in GSM Pg- 39 CO2 K6
22. Explain about the types of protocols used in GPRS Pg- 41 CO2 K4
UNIT III

MOBILE NETWORK LAYER

Mobile IP – DHCP – AdHoc– Proactive protocol-DSDV, Reactive Routing


Protocols – DSR, AODV , Hybrid routing –ZRP, Multicast Routing-
ODMRP, Vehicular Ad Hoc networks ( VANET) –MANET Vs VANET –
Security.

PART A – (20 x 2 = 40 marks) CO KL


1. What is Ad-Hoc ? CO3 K1
In a simplistic realization of this concept, a mobile device wanting to
communicate can forward its packets to its neighbours, and the neighbour
nodes in turn can forward those to their neighbours, and so on until the
destination is reached.
2. Define MANET. CO3 K2

A mobile ad hoc network (MANET) is a continuously self- configuring,


infrastructure- less network of mobile devices connected without wires.
However, of late several specialized MANETs such as Wireless Sensor Networks
(WSNs) and Vehicular Ad hoc Networks (VANETs) have emerged. Each of these
specialized ad hoc networks is suitable for a specific kind of application
3. Define VANET. CO3 K1

- The Vehicular Ad-Hoc Network, or VANET, is a technology that uses


moves cars as nodes in a network to create a mobile network.
- Each of these specialized ad hoc networks is suitable for a specific
kind of application.
-Being ad hoc networks after all, all these networks share some basic
characteristics. However, there exist significant differences among them with
respect to their operation, design, and
applications.
4. List the Characteristics of mobile Adhoc Network ? MAY/JUNE CO3 K1
2016
 Nodes are connected through a wireless link.
 Each of the nodes act as a router and as a host.
 The network lacks infrastructure leading to decentralized administration
(control).
 The network is less cost effective, due to lack of infrastructure.
 MANET can easily be setup anywhere especially where there is no internet.
5. Difference Between Proactive & Reactive protocols APR/MAY 2017 CO3 K1

Proactive (table-driven) protocols


A proactive routing protocol is also known as a table-driven routing protocol. In
this protocol, each node in a routing table maintains information about routes to
every other node in the network. These tables are periodically updated in the face
of random network topology changes. An example of
a proactive (table-driven) protocol is the Destination Sequenced Distance Vector
(DSDV) protocol.
Reactive (on-demand) protocols

A reactive routing protocol is also known as an on-demand routing protocol, since


in this protocol nodes do not maintain up-to-date routes to different destinations,
and new routes are discovered only when required.
When a node does not have knowledge about any route to a specific destination, it
uses a flooding technique to determine the route.
6. CO3 K1
What are the Applications of MANETs

Communication among portable computers


Miniaturization has allowed the development of many types of portables and
computerized equipment, which have become very popular. Many of these
portables work meaningfully when connected to some network, possibly a LAN or
the Internet.

Military
-The present-day military equipment have become quite sophisticated, have many
automated parts and contain one or more computers.

7. What are the MANET Design Issues? NOV/DEC2018 CO3 K1


We point out below a few important issues that are relevant to the design of suitable
MANET protocols.
1.Network size and node density

2.Connectivity 3.Network topology

4.User traffic
5. Operational environment
Energy constraint
8. What is Routing ? and purpose of Routing ? CO3 K1
Packet routing is usually a much more complex task in an ad hoc network
compared to that of an infrastructure-based network.- main complications arise on
account of continual topology changes and limited battery power of the nodes.
Recall that we discussed these issues in Section 7.4 and a few other issues that are
inherent to MANETs.
- When the destination node is not in the transmission range of the source node, the
route has to be formed with the help of the intervening nodes in the network.
-As we know, the purpose of routing is to find the best path between
the source and the destination for forwarding packets in any store- and-
forward network.
9. What are the Several types of routing protocols have been proposed for CO3 K1
MANETs.?
Different routing protocols essentially implement the above steps
(a) and (b) while meeting the constraints inherent to the network, such as low
energy consumption, through the deployment of various techniques.
-We will now review the essential concepts of a traditional routing technique.
Later, we will build upon these concepts to introduce the routing protocols for
ad hoc networks. No simple IP-address based routing
is possible in a MANET due to the continual topology changes on
account of node movements.
10. What are the essentials needs of traditional routing Protocols CO3 K1
- It is necessary to have a clear understanding of the routing mechanisms deployed
in a traditional network.
It will help us appreciate the specific changes made to traditional routing protocols
to support the specific requirements of an ad hoc network.
11. Define link state protocols (LSP) CO3 K1
-The term link state denotes the state of a connection of one router with one of its
neighbours.
- A neighbour of a router is one with which it can directly communicate without
taking any help from the intervening routers. Each router determines its local
connectivity information, and floods the network with this information with
a link state advertisement.
- As a router in the network receives this link state advertisement, it stores this
packet in a link state packet database (LSPDB).
-This storage of link state advertisements in an LSPDB is in addition to the routing
table that each router maintains.
12 Compare AODV & DSR protocols? NOV/DEC2017 CO3 K1

 DSR has less routing overhead than AODV

 AODV has less normalized MAC overhead than DSR.

 DSR is based on a source routing mechanism whereas AODV uses a


combination of DSR and DSDV mechanisms.
AODV has better performance than DSR in higher-mobility
13. Difference Between MANET Vs VANET MAY/JUNE 2016 , NOV/DEC 2016, CO3 K2
APR/MAY2018
-A MANET, as we have already defined, is a collection of mobile nodes that
communicate with each other over bandwidth constrained wireless links without
any infrastructure support.

-In this sense, we can consider a VANET to be a special category of MANET. The
nodes are mobile in
- VANETs as well as in MANETs. However, the VANET nodes (vehicles) can
communicate with certain roadside infrastructures or base stations.
- Further, the node mobility in a VANET is constrained to the road topologies,
whereas the movement of nodes in a MANET is more
random in nature.
14. What are the Types of communications? CO3 K2

In a network, a node can initiate the following types of communications:


Unicast: In this, a message is sent to a single destination node.
Multicast: In this type of transmission, a message is sent to a selected subset of
the network nodes.
Broadcast: In this type of transmission, a message is sent to all the nodes in the
network. Since unrestrained broadcast communications can choke a MANET,
applications usually do not use broadcast
communication.
15. CO3 K2
What is Hybrid routing protocols

- Hybrid routing protocols have the characteristics of both proactive and reactive
protocols. These protocols combine the good features of both the protocols.
- The hybrid routing protocols are designed to achieve increased scalability by
allowing nodes with close proximity to work together to form some sort of a
backbone to reduce the route discovery
overheads.
16. What are the Popular MANET Routing Protocols: CO3 K2

A few popular MANET routing protocols

1. Destination-Sequenced Distance-Vector Routing Protocol


2. Dynamic Source Routing (DSR) Protocol.
3. Ad Hoc On-demand Distance Vector (AODV).
Zone Routing Protocol
17. Write the Important steps in the operation of DSDV? NOV/DEC2018 CO3 K3

The important steps in the operation of DSDV are summarized below:


1. Each router (node) in the network collects route information from all
its neighbours.
2. After gathering information, the node determines the shortest path to
the destination based on the gathered information.
3. Based on the gathered information, a new routing table is generated.
4. The router broadcasts this table to its neighbours. On receipt by
neighbours, the neighbour nodes recompute their respective routing tables.
This process continues till the routing information becomes stable.
18. What are the contents of link state advertisement message? NOV/DEC2017 CO3 K4

All link state advertisements begin with a common 20 byte header.

This header contains enough information to uniquely identify the advertisement


(LS type, Link State ID, and Advertising Router).
Multiple instances of the link state advertisement may exist in the routing
domain at the same time. It is then necessary to determine which instance is more
recent.
19. What do you mean by Roaming? CO3 K2
Moving between access points is called roaming. Even wireless networks may
require more than one access point to cover all rooms. In order to provide
uninterrupted services, we require
roaming when the user moves from one access point to another.
20. What is the concept of RTT? NOV/DEC 2016 CO3 K1

Round-trip time (RTT), also called round-trip delay, is the time required for a
signal pulse or packet to travel from a specific source to a specific destination and
back again. In this context, the source is
the computer initiating the signal and the destination is a remote computer or
system that receives the signal and retransmits it

PART B – (05 x 13 = 65 marks) CO KL

Explain about characteristics and applications of MANET? Pg - 118 MAY/JUNE CO3 K1


11. 2016, APR/MAY2018
12. Explain, Compare and contrast the traditional routingprotocols? NOV/DEC CO3 K1
2016
13. Explain how routing is done in MANET? Explain about DSR in detail and CO3 K2
compare with DSDV ?MAY/JUNE2016,NOV/DEC2017,NOV/DEC2018
14. Explain the various MANET routing protocols with advantages and CO3 K2
disadvantages?
NOV/DEC2016]
15. What is VANET? Differentiate MANET and VANET? Architecture of CO3 K2
VANET?
MAY/JUNE 2016, NOV/DEC2017, APR/MAY2018
Explain the security issues and attacks in MANET &VANET? MAY/JUNE 2016 CO3 K2
16.
17. Explain the Design issues of MANET routing protocols in detail? APR/MAY CO3 K3
2017, APR/MAY2018
18. Explain the various VANET routing protocols in detail ? APR/MAY 2017 CO3 K4
19. Illustrate the process of route discovery,route reply,data CO3 K2
delivery and route caching using DSR(notes) APR/MAY2018
20. Explain about the On demand routing protocols? CO3 K1
PART C – (01 x 15 = 15 marks) CO KL
21. Explain about the multicast routing protocol CO3 K6
22. Differentiate VANET and MANET CO3 K4
UNIT IV

MOBILE TRANSPORT AND APPLICATION LAYER

Mobile TCP– WAP – Architecture – WDP – WTLS –


WTP –WSP – WAE – WTA Architecture – WML

PART A – (20 x 2 = 40 marks) CO KL


1. Define Mobile IP: CO4 K1

Mobile IP (Mobile Internet Protocol): A protocol that allows mobile devices to


maintain a connection to the internet even when they move between different
networks (like switching from wifi to cellular data).
 How it works: Mobile IP introduces two key entities: a Home Agent (HA)
and a Foreign Agent (FA). The HA is on the mobile device's home network,
while the FA is on the network the device is currently visiting. Packets are
tunneled between the HA and FA to ensure the device remains connected.
2. Specify the goals of MOBILE IP CO4 K2
 Scalability: The protocol should function efficiently even with a large number of
mobile devices.
 Efficiency: Minimize overhead and ensure smooth operation.
 Compatibility: Remain compatible with existing internet protocols and
applications.
3. CO4 K1
What are the basic requirement needed for mobile IP:
 Compatibility: Mobile IP needs to be compatible with existing IP protocols.
This ensures smooth integration with current network infrastructure and avoids the
need to overhaul existing systems.
 Transparency: Ideally, mobile devices should be able to move between
networks without applications or users being aware of the change. This transparency
allows applications to function seamlessly regardless of the mobile device's location.
 Scalability and Efficiency: Mobile IP should function efficiently even with a
large number of mobile nodes on the network. This is crucial for real-world
deployments where there can be many mobile devices accessing the network.
 Security: Mobile IP must incorporate security mechanisms to ensure secure
communication. This includes authentication of messages to prevent unauthorized
access and ensure packets are delivered to the intended recipient.
4. Define COE? CO4 K1

 It could be a specific exam: There might be an exam in India called COE


(Common Entrance Exam) where 2 marks are awarded for a certain question or
section. Without more context, it's difficult to say for sure.

 It could be a grading system: In some educational institutions, marks might be


awarded in increments of 2. So, a COE 2 mark could indicate a score within that
system.

 It might not be related to marks at all: COE could stand for something else
entirely, and "2" could be referring to something else related to that concept.

5. Define Tunneling CO4 K1


Tunneling is a phenomenon in quantum mechanics where a particle can pass
through a potential energy barrier that it classically wouldn't have enough energy
to overcome. In essence, the particle seems to "tunnel" through the barrier.

6. CO4 K1
Define encapsulation in mobile IP
Mobile IP is a protocol that allows mobile devices to maintain a single IP address while
roaming between different networks. Encapsulation, a general networking concept, might
be relevant here. In encapsulation, data from a higher layer protocol is wrapped inside a
lower layer protocol's header. In Mobile IP, this could refer to how the mobile device's
original IP address is encapsulated within the header of packets sent over the visited
network.

7. What are the two types of COA CO4 K1


 Foreign Agent
 CO-Located Agent
8. What is meant by agent-discovery: CO4 K1

In the context of Mobile IP, agent discovery is the process by which a mobile device
finds out information about the network it's connected to. This includes figuring out:

 Whether it's on its home network or a foreign network (visiting another


network).
 The address of a foreign agent (a device that helps route data to the mobile
device when it's on a foreign network).

9. What is Agent advertisement: CO4 K1


Agent advertisement is the process where a foreign agent periodically sends out a
message announcing its presence and services on the network. This message is like a
beacon, letting mobile nodes know that the agent is available.

By receiving these advertisements, mobile nodes can figure out:

 Their current point of attachment to the network.


 Whether they are still in range of a previously used foreign agent.

10. Agent solicitation: CO4 K1

Agent solicitation is a process used by mobile devices to find helper agents on a


network. (1 mark)

When a device moves, it needs to know how to receive data. Solicitation messages
help it discover available agents. (1 mark)
11. M-TCP splits a standard TCP connection into two parts at an intermediate host, CO4 K1
often called a supervisory host. This intermediate host acts as a relay between the
fixed network and the mobile network, where the mobile device resides. Here's a
breakdown of the split in 2 points:

1. Separate Connections: M-TCP creates two separate TCP connections:


o One connection between the fixed network host and the supervisory
host. This leg uses standard TCP.
o Another connection between the supervisory host and the mobile
device on the wireless network. This connection uses an optimized
TCP variant designed for handling potential packet loss due to
frequent disconnections.
2. Supervisory Host's Role: The supervisory host plays a key role in
managing the split connection:
o It forwards data packets received from the fixed network towards the
mobile device.
o However, it does not acknowledge them immediately. This helps
avoid congestion control kicking in on the fixed network side during
periods of mobile network disconnection.
o When the mobile device reconnects, the supervisory host transmits
the data packets at full speed and relies on the mobile device's
acknowledgements to ensure delivery.

12 Define Fast Transmission. CO4 K1


 Vehicle transmissions: A Chinese company, Shaanxi Fast Gear Co., Ltd., is a
leading manufacturer of heavy-duty transmissions for trucks, buses, and
construction vehicles [FAST Products - Fast Group-Joint venture of Eaton clutch &
Caterpillar Transmission, fast-transmission.com].

 Data transmission speed: In general, fast transmission refers to the rapid


transfer of data from one location to another. This applies to various technologies
like fiber optics and high-speed internet connections.

13. Define Fast Recovery. CO4 K2


Fast Recovery, in the context of mobile computing (which often relies on
network data transfer), refers to a mechanism for efficient data packet
retransmission. It helps achieve faster recovery from packet loss during data
transmission.

14. Define selective retransmission. CO4 K2


In mobile computing, selective retransmission is a technique used in TCP
(Transmission Control Protocol) to improve efficiency over unreliable wireless
links. Unlike traditional TCP's go-back-n approach, selective retransmission allows
the receiver to acknowledge individual packets. This enables the sender to
pinpoint and retransmit only the missing packets, reducing wasted bandwidth on
unnecessary retransmissions.

15. Disadvantages of M-TCP: CO4 K2

 Increased Overhead: M-TCP relies on supervisory hosts, which can introduce


additional processing overhead and potential security vulnerabilities.

 Limited Error Handling: M-TCP assumes low bit error rates, common in wired
networks. In wireless environments with frequent errors, M-TCP can propagate
errors to the sender, leading to unnecessary retransmissions.

16. What are the possible location of care-of address: CO4 K2

 Foreign Agent (FA): The CoA can be the IP address of the Foreign Agent itself.
This is a shared CoA used by multiple mobile nodes in the same foreign network.

 Co-located: The CoA can be a separate IP address assigned to the mobile node
itself, typically obtained via DHCP. This is called a co-located care-of address.
17. What is meant by snooping TCP CO4 K3

Snooping TCP is a technique used in mobile networks to improve data transmission


efficiency. It works by:

 Monitoring TCP traffic between a mobile device and the internet.


 Buffering packets at a network element (like a base station) to handle
potential packet loss.
 Retransmitting lost packets locally without involving the distant server,
reducing delays.

18. Define WML: CO4 K4


WML stands for Wireless Markup Language. It's an obsolete markup language
designed for mobile devices with limited processing power and small screens.
Similar to HTML for webpages, WML was used to create content for early mobile
phones that used the Wireless Application Protocol (WAP).
19. Define WSP: CO4 K2
WSP is most often shorthand for the casual greeting "what's up?" This is used in
texting or online chats to ask someone how they're doing or to start a conversation.
20. Define WTP CO4 K1
WTP stands for Willingness To Pay. It's the maximum price a customer is prepared
to shell out for a product or service. It reflects the perceived value they associate
with it.

PART B – (05 x 13 = 65 marks) CO KL

Explain Entities and Terminology of Mobile IP. CO4 K1


11.
12. Explain the following term in detail. CO4 K1
Corresponding Node
Care of Address
13. Explain in detail about the key mechanisms of Mobile IP CO4 K2
14. Explain in detail about the route optimization CO4 K2
15. Explain about DHCP in detail CO4 K2
Explain WAP Architecture in detail CO4 K2
16.
17. Explain WTA architecture CO4 K3
18. Explain in detail about WSP CO4 K4
19. Write about WTLS CO4 K2
20. Explain in detail about WML CO4 K1
PART C – (01 x 15 = 15 marks) CO KL
21. Explain IP-in-IP, Minimal IP GRE Encapsulation in detail CO4 K6
22. Explain Indirect TCP CO4 K4

UNIT V

MOBILE PLATFORMS AND APPLICATIONS


Mobile Device Operating Systems – Special Constraints & Requirements –
Commercial Mobile Operating Systems – Software Development Kit: iOS, Android,
BlackBerry, Windows Phone – MCommerce – Structure – Pros & Cons – Mobile
Payment System – Security Issues

PART A – (20 x 2 = 40 marks) CO KL


1. What are the layers of Operating System? CO5 K1
The operating system is usually structured into a kernel layer and a shell
layer. The shell essentially provides facilities for user interaction with the
kernel. The kernel executes in the supervisor mode and can run privileged
instructions that could not be run in the user mode.
2. Why is kernel mode called memory resident part? CO5 K2
During booting, the kernel gets loaded first and continues to remain in the main
memory of the device. This implies that in a virtual memory system, paging does
not apply to the kernel code and kernel data. For this reason, the kernel is called the
memory resident part of an operating system.
3. What is monoloithic kernel design? CO5 K1
In a monolithic kernel OS design, the kernel essentially constitutes the entire
operating system code, except for the code for the shell. The principal motivation
behind this monolithic design was the belief that in the supervisor mode, the
operating system services can run more securely and efficiently.
4. What is M- commerce? MAY/JUNE 2016,APR/MAY 2018 CO5 K1
Mobile e-commerce (m-commerce) is a term that describes online sales
transactions that use wireless electronic devices such as hand-held computers,
mobile phones or laptops. These wireless devices interact with computer
networks that have the ability to conduct online merchandise purchases. Any
type of cash exchange is referred to as an e-commerce transaction. Mobile e-
commerce is just one of the many subsets of electronic commerce. Mobile e-
commerce may also be known as mobile commerce
5. What are Special Constraints of Mobile O/S APR/MAY 2017, NOV/DEC 2017, CO5 K1
APR/MAY2018
Limited memory Limited
screen size Miniature
keyboard
Limited processing power Limited battery power
Limited and fluctuating bandwidth of the wireless medium
6. What are the requirements of Mobile O/S APR/MAY 2017 CO5 K1
Support for specific communication protocols Support for a
variety of input mechanisms Compliance with open standards
Extensive library support

7. list the important features of the Windows mobile OS CO5 K1


NOV/DEC2018
• The Graphics/Window/Event manager (GWE) component handles all
input and output.
• Provides a virtual memory management.
• Supports security through the provision of a cryptographic library.
• Application development is similar to that in the Win32
environment. support true multitasking in the future versions of the Windows Phone
operating system.
8. list the pros & cons of M- commerce? APR/MAY 2017,APR/MAY 2018 CO5 K1

Providing a wider reach or Accessibility


Reducing the transaction cost
Ubiquity Personalization.
Reducing time.
Cons:
Limited Speed
Small Screen Size
No standard for M-commerce
Technology constraints of devices

9. What is Symbian OS? CO5 K1


Symbian OS is a real time, multitasking, pre-emptive, 32-bit operating system that
runs on ARM-based processor designs. The inherent design of the Symbian
operating system is microkernel-based.
10. What are the flavours of Symbian OS Series 60 CO5 K1
UIQ interface: UIQ (earlier known as User Interface Quartz)
11. What is Series 60? CO5 K1
The series-60 platform was until recently the leading smartphone platform in the
world. The relatively large sized colourscreen, easy-to- use interface and an
extensive suite of applications make it well-suited to support advanced features
such as rich content downloading and
MMS (Multimedia Messaging Service). Series 60 was mainly being used on
Nokia’s smartphones and Samsung handsets.
12 What are the features of BlackBerry OS? NOV/DEC2018 CO5 K1
 touchscreen
 Multitasking.
 BlackBerry Hub
 Third-party applications
Released Devices Canceled devices
13. What is POS? NOV/DEC 2016 CO5 K2
Point-of-Sale (PoS) usually means a checkout counter in a shop or supermarket.
More specifically, the point-of-sale often refers to the hardware and software used
for handling customer purchases at the checkout desks. An example of a PoS
terminal is an electronic cash register. Nowadays, the point-of-sale systems are used
in almost every supermarket and are used in many retail stores too.
14. What are the advantages and disadvantages of BlackBerry OS? NOV/DEC CO5 K2
2017
Pros
Excellent Connectivity (Messengers viz BBM, yahoo, gtalk, whatsapp work
seamlessly) Amazing email client (can also sync with your enterprise server) Most
user friendly qwerty keyboard (easy typing)
Very fast and snappy
Cons
Battery life not great in some models Camera
quality not great Application support is bad
Almost all models have similar utility and features. (Minor change in visuals cz of
the new OS).
15. What is iOS? CO5 K2
iOS is a closed and proprietary operating system fully owned and
controlled by Apple and not designed to be used by various mobile phone vendors
on their systems.
16. Structure of ANDROID stack: CO5 K2

17. Define Dalvik VM: CO5 K3


Dalvik translates a Java application program into machine code of the mobile device
and executes it by invoking the operating system.
These can be compiled to ARM native code and installed using the Android native
development kit (SDK).
18. Define Android kernel CO5 K4
Android kernel has been developed based on a version of Linux kernel.It has
excluded the native X Window System and does notsupport the full set of standard
GNU libraries. this makes it difficult to reuse the existing Linux applications or
libraries on Android. Based on the Linux kernel code, Android implements its own
device drivers, memory management, process management and
networking functionalities. Android is multitasking and allows applications to run
concurrently.
19. What is Business-to-consumer (B2C)? CO5 K2
Business-to-consumer (B2C) is a form of commerce in which products or services
are sold by a business firm to a consumer. B2C is
an important category of mobile commerce applications and is reported to be
nearly half of the total M-commerce market
20. List the Examples of B2C? CO5 K1
Advertising Comparison shopping
Information about a product Mobile
ticketing Loyalty and payment
services
Interactive advertisements Catalogue shopping

PART B – (05 x 13 = 65 marks) CO KL

Explain about Android OS , features, software stack , SDK and their layers CO5 K1
11. MAY/JUNE 2016, NOV/DEC 2017,NOV/DEC2018
12. Compare & contrast various popular mobile OS CO5 K1
NOV/DEC2016, APR/MAY 2017
13. What is RFID? Explain the few applications in which RFID is useful? (notes) CO5 K2
NOV/DEC2016
14. Explain the special constraints and requirements, components of Mobile OS CO5 K2
MAY/JUNE 2016
15. Explain in detail about M Commerce, its applications, advantages and CO5 K2
disadvantages
MAY/JUNE 2016 , NOV/DEC2016, APR/MAY 2017, NOV/DEC2018
Explain the mobile payment systems and payment schemes MAY/JUNE 2016 , CO5 K2
16. NOV/DEC2016, NOV/DEC2017, APR/MAY2018, NOV/DEC2018
17. Explain in detail components of iphone OS? List the special features of a Mobile CO5 K3
OS?
APR/MAY2018
18. Explain the features of Andriod OS? CO5 K4
19. Explain the features of Mobile OS NOV/DEC2018 CO5 K2
20. Discuss about the constraints of Mobile OS CO5 K1
PART-C CO KL
21. Explain the types of M-payment schemes ? CO5 K6
22. Explain in detail about iphone OS? CO5 K4

COURSE OUTCOMES:

CO1 : Explain the basics of mobile telecommunication systems


CO2 : Illustrate the generations of telecommunication systems in wireless networks
CO3 : Determine the functionality of MAC, network layer and Identify a routing protocol for a
given Ad hoc network
CO4 :Explain the functionality of Transport and Application layers
CO5 : Develop a mobile application using android/blackberry/ios/Windows SDK

COURSE FACULTY HOD

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy