Unit Wise Question Bank
Unit Wise Question Bank
UNIT I
INTRODUCTION
• Bandwidth Efficiency
• BW available is very limited
• Power consumption
QoS support Criticial for real time applications
3. List the Characteristics of Mobile Computing CO1 K1
Ubiquity
Location awareness Adaptation Broadcast Personalization
4. What is Hidden and Exposed Terminal problem? CO1 K1
MAY/JUNE 2016
Hidden and Exposed Terminals
Consider the scenario with three mobile phones as shown below. The
transmission range of A reaches B, but not C (the detection range does not reach
C either). The transmission range of C reaches B, but not A. Finally, the
transmission range of B reaches A and C, i.e., A cannot detect C and vice versa.
Hidden terminals
A sends to B, C cannot hear A,C wants to send to B, C senses a “free” medium (CS
fails) and starts transmittingCollision at B occurs, A cannot detect this collision
(CD fails) and continues with its transmission to B A is “hidden” from C and vice
versa
Exposed terminals
B sends to A, C wants to send to another terminal (not A or B) outside the range C
senses the carrier and detects that the carrier is busy.C postpones its transmission
until it detects the medium as being idle again but A is outside radio range of C,
waiting is not necessary C is “exposed” to B Hidden terminals cause collisions,
where as Exposed terminals causes unnecessary delay.
5. What are the limitations / challenges of mobile computing? NOV/DEC 2016 , CO1 K1
NOV/DEC2018
Quality of connectivity Security concerns Power Consumption
6. What are the features / objectives of MAC protocols? NOV/DEC 2018 CO1 K1
It should implement some rules that help to enforce discipline when multiple
nodes contend for a shared channel.
It should help maximize the utilization of the channel.
Channel allocation needs to be fair. No node should be discriminated against at
any time and made to wait for an unduly long time for transmission.
It should be capable of supporting several types of traffic having different
maximum and average bit rates.
It should be robust in the face of equipment failures and changing network
conditions.
7. Categories of wireless networks CO1 K1
Wireless networks can be divided mainly into two categories: (a)
infrastructure-based wireless networks that include the WLANs, and
(b) infrastructure-less wireless networks that include the mobile ad hoc networks
(MANETs).
8. What are the different types of mobile Middleware? CO1 K1
1.Adaptation 2.Agent
9. What are the logical channels in GSM? CO1 K1
Traffic channel(TCH)
Control channel(CCH)
10. What are the disadvantages of small cells? CO1 K1
Infrastructure
Handover
Frequency
Explain hidden and exposed terminal problem and near and far terminal problem. CO 1 K1
11.
12. Explain the various taxonomy of MAC Protocols. Differentiate various schemes. ( CO 1 K1
Military
-The present-day military equipment have become quite sophisticated, have many
automated parts and contain one or more computers.
4.User traffic
5. Operational environment
Energy constraint
8. What is Routing ? and purpose of Routing ? CO3 K1
Packet routing is usually a much more complex task in an ad hoc network
compared to that of an infrastructure-based network.- main complications arise on
account of continual topology changes and limited battery power of the nodes.
Recall that we discussed these issues in Section 7.4 and a few other issues that are
inherent to MANETs.
- When the destination node is not in the transmission range of the source node, the
route has to be formed with the help of the intervening nodes in the network.
-As we know, the purpose of routing is to find the best path between
the source and the destination for forwarding packets in any store- and-
forward network.
9. What are the Several types of routing protocols have been proposed for CO3 K1
MANETs.?
Different routing protocols essentially implement the above steps
(a) and (b) while meeting the constraints inherent to the network, such as low
energy consumption, through the deployment of various techniques.
-We will now review the essential concepts of a traditional routing technique.
Later, we will build upon these concepts to introduce the routing protocols for
ad hoc networks. No simple IP-address based routing
is possible in a MANET due to the continual topology changes on
account of node movements.
10. What are the essentials needs of traditional routing Protocols CO3 K1
- It is necessary to have a clear understanding of the routing mechanisms deployed
in a traditional network.
It will help us appreciate the specific changes made to traditional routing protocols
to support the specific requirements of an ad hoc network.
11. Define link state protocols (LSP) CO3 K1
-The term link state denotes the state of a connection of one router with one of its
neighbours.
- A neighbour of a router is one with which it can directly communicate without
taking any help from the intervening routers. Each router determines its local
connectivity information, and floods the network with this information with
a link state advertisement.
- As a router in the network receives this link state advertisement, it stores this
packet in a link state packet database (LSPDB).
-This storage of link state advertisements in an LSPDB is in addition to the routing
table that each router maintains.
12 Compare AODV & DSR protocols? NOV/DEC2017 CO3 K1
-In this sense, we can consider a VANET to be a special category of MANET. The
nodes are mobile in
- VANETs as well as in MANETs. However, the VANET nodes (vehicles) can
communicate with certain roadside infrastructures or base stations.
- Further, the node mobility in a VANET is constrained to the road topologies,
whereas the movement of nodes in a MANET is more
random in nature.
14. What are the Types of communications? CO3 K2
- Hybrid routing protocols have the characteristics of both proactive and reactive
protocols. These protocols combine the good features of both the protocols.
- The hybrid routing protocols are designed to achieve increased scalability by
allowing nodes with close proximity to work together to form some sort of a
backbone to reduce the route discovery
overheads.
16. What are the Popular MANET Routing Protocols: CO3 K2
Round-trip time (RTT), also called round-trip delay, is the time required for a
signal pulse or packet to travel from a specific source to a specific destination and
back again. In this context, the source is
the computer initiating the signal and the destination is a remote computer or
system that receives the signal and retransmits it
It might not be related to marks at all: COE could stand for something else
entirely, and "2" could be referring to something else related to that concept.
6. CO4 K1
Define encapsulation in mobile IP
Mobile IP is a protocol that allows mobile devices to maintain a single IP address while
roaming between different networks. Encapsulation, a general networking concept, might
be relevant here. In encapsulation, data from a higher layer protocol is wrapped inside a
lower layer protocol's header. In Mobile IP, this could refer to how the mobile device's
original IP address is encapsulated within the header of packets sent over the visited
network.
In the context of Mobile IP, agent discovery is the process by which a mobile device
finds out information about the network it's connected to. This includes figuring out:
When a device moves, it needs to know how to receive data. Solicitation messages
help it discover available agents. (1 mark)
11. M-TCP splits a standard TCP connection into two parts at an intermediate host, CO4 K1
often called a supervisory host. This intermediate host acts as a relay between the
fixed network and the mobile network, where the mobile device resides. Here's a
breakdown of the split in 2 points:
Limited Error Handling: M-TCP assumes low bit error rates, common in wired
networks. In wireless environments with frequent errors, M-TCP can propagate
errors to the sender, leading to unnecessary retransmissions.
Foreign Agent (FA): The CoA can be the IP address of the Foreign Agent itself.
This is a shared CoA used by multiple mobile nodes in the same foreign network.
Co-located: The CoA can be a separate IP address assigned to the mobile node
itself, typically obtained via DHCP. This is called a co-located care-of address.
17. What is meant by snooping TCP CO4 K3
UNIT V
Explain about Android OS , features, software stack , SDK and their layers CO5 K1
11. MAY/JUNE 2016, NOV/DEC 2017,NOV/DEC2018
12. Compare & contrast various popular mobile OS CO5 K1
NOV/DEC2016, APR/MAY 2017
13. What is RFID? Explain the few applications in which RFID is useful? (notes) CO5 K2
NOV/DEC2016
14. Explain the special constraints and requirements, components of Mobile OS CO5 K2
MAY/JUNE 2016
15. Explain in detail about M Commerce, its applications, advantages and CO5 K2
disadvantages
MAY/JUNE 2016 , NOV/DEC2016, APR/MAY 2017, NOV/DEC2018
Explain the mobile payment systems and payment schemes MAY/JUNE 2016 , CO5 K2
16. NOV/DEC2016, NOV/DEC2017, APR/MAY2018, NOV/DEC2018
17. Explain in detail components of iphone OS? List the special features of a Mobile CO5 K3
OS?
APR/MAY2018
18. Explain the features of Andriod OS? CO5 K4
19. Explain the features of Mobile OS NOV/DEC2018 CO5 K2
20. Discuss about the constraints of Mobile OS CO5 K1
PART-C CO KL
21. Explain the types of M-payment schemes ? CO5 K6
22. Explain in detail about iphone OS? CO5 K4
COURSE OUTCOMES: