0% found this document useful (0 votes)
15 views12 pages

Mcad QB

Uploaded by

Sarang Hae
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as XLSX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views12 pages

Mcad QB

Uploaded by

Sarang Hae
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as XLSX, PDF, TXT or read online on Scribd
You are on page 1/ 12

Course Code-Course Name

20CS5104 - Mobile Computing and Application Development

Question Bank

Define Mobile computing.

Distinguish Mobile Computing vs. Wireless Networking

“MAC protocol designed for infrastructure based wireless network may not work satisfactory in infrastructure less
environment “ – justify.
A mobile service provider has been allotted a limited number of frequency bands.However he wants to
accommodate more customers. Point out What is the technique to be applied by him to achieve this.

Point out the issues of Wireless MAC Protocol.

List the features / objectives of MAC protocols.

List the advantages and Disadvantages of mobile Computing

Illustrate the structure of mobile computing applications.

Distinguish between direct sequence spread spectrum and frequency hopping spread spectrum.

Define multiplexing.

How does guard spaces realized between users in CDMA?

Assess why SDMA is not used in isolation.

Formulate a reason why Collision Detection based protocol is not suitable for wireless networks

Give some examples of resevation based schemes in MAC protocols

List the issues of wireless MAC

"The CSMA/CD technique, the sender starts to transmit if it senses the channel to be free. But, even if it senses
the channel to be free, there can be a collision why?
Generalize the features of different generations of cellular technologies and application environments of mobile
computing.

Catagorize in detail about the multiplexing schemes for communication systems.

Examine the operation of spreading and dispreading of spread spectrum.

Compare and contrast direct sequence spread spectrum and frequency hopping spread spectrum.
Generalize the roles and application environments of mobile computing.

Model the different categories of MAC protocols in detail.

Why do MAC scheme in wired network fail in wireless networks and how does the multiple access with collision
avoidance (MACA) scheme work?

Discuss with the several examples for fixed and dynamic schemes in TDMA used for wireless transmission.

Compare and contrast SDMA,TDMA,FDMA and CDMA schemes.

Generalize the role of various codes used in CDMA and explain the working of CDMA scheme.

Define GSM.

Tabulate the services of GSM

Classify the major functions in RSS.

Classify the functions of HLR and VLR.

Pointout the import features of GSM security.

Define LAPDm.

List the information in SIM.

Name the services provided by supplementary services

Define Handoff. What are its types?

List three important features of GSM security.

Name the services offered by GPRS?

Analyze the purpose of UTRAN in UMTS.

List the characteristics that used to specify the GPRS.

Define UMTS. List the elements of UMTS.

Assess the functions of core network in UMTS.

List the suggestion on mobile phone with respect to human body


Explain in detail about the system architecture of GSM.

Demonstrate protocol architecture of GSM in detail.


Describe the process of connection establishment in GSM networks, detailing the steps involved from call
initiation to connection setup. Additionally, explain the principles of frequency allocation and management in
cellular systems, including the challenges faced in urban environments.
Give reasons for handover in GSM and the problems associated with it. What are the typical steps for handover?
What types of handover can occur? Which resources are to be allocated during data transmission?

Illustrate about the functions of authentication and encryption in GSM. How is the system security maintained?

What do you understand by 2.5G? Mention a few characteristic feature of this technology. Analyze how is it
different from 2G and 3G technologies.
Describe the architecture of the General Packet Radio Service (GPRS). Highlight the roles of key components
such as the GPRS Support Nodes (GSNs), Serving GPRS Support Node (SGSN), and Gateway GPRS Support
Node (GGSN), and discuss how they facilitate packet-switched data services.
Why UMTS technology is superior to GPRS technology? Justify your answer. Analyze the advantages and
limitations of GPRS
Analyze the handover mechanisms in GPRS and UMTS. Discuss the types of handovers (hard handover, soft
handover) used in both systems and the challenges associated with maintaining service quality during the
handover process.
Develop UMTS system architecture in detail. Describe the functions of HLR and VLR in call routing and roaming.

Why the traditional IP cannot be used in a mobile network. What are the main differences between the traditional
IP and the mobile IP? How does mobile IP support mobile hubs?

Differentiate the functionalities of a foreign agent & Home agent.

Define agent solicitation? Why are agent advertisement messages needed

Express encapsulation and decapsulation in the context of mobile IP and why these are needed.

Define DHCP?

Assess the term ‘Ad-Hoc Network’ in a wireless Communication.

Analyze the Proactive and Reactive Routing Protocols.

Define COA.

Discuss the roles of Mobile IP. Explain how Mobile IP facilitates seamless connectivity for mobile users while
DHCP assists in dynamic IP address allocation.
Enumerate the Process involved in data packet delivery using Mobile IP in adhoc networks. Explaining the
tunneling operation with a encapsulated format message.
Describe the key characteristics of Ad Hoc networks. Discuss how these characteristics differentiate Ad Hoc
networks from traditional wireless networks. Provide examples of real-world applications where Ad Hoc networks
are particularly beneficial.
Illustrate the process of route discovery, route reply, data delivery, and route caching using DSR. Explain the
approach with an example
Compare and Contrast proactive (DSDV) and reactive (DSR) routing protocols in the context of Ad Hoc networks.

Explain the basic concept of the Zone Routing Protocol (ZRP) in hybrid routing.

Summarize the key features of the On-Demand Multicast Routing Protocol (ODMRP).

Analyze the key differences between unicasting and multicasting by examining their uses in real-world network
scenarios

Outline the security issues that are prevalent in VANET systems

Define VANET.

Analyze the fundamental differences between MANET and VANET by evaluating their respective architectures,
communication protocols, and applications

Represent the security issues in MANET.

Classify the attacks at different layers of MANET protocol Stack.

Explain the application of Zone Routing Protocol (ZRP) in hybrid routing for large-scale ad hoc networks.
Illustrate how ZRP combines the strengths of both proactive and reactive routing protocols.
Analyze the performance of ODMRP in a highly dynamic network topology. Discuss its strengths and limitations
when deployed in VANETs as compared to MANETs.
Illustrate how VANETs can be used to implement a real-time traffic management system. Include the
communication patterns and protocols required for efficient implementation.
Analyze the interaction between routing and security in VANETs. How do security challenges like DoS attacks
affect the performance of routing protocols like ODMRP?
Analyze the security threats in VANETs and evaluate the effectiveness of different countermeasures against
these attacks

Explain how Mobile TCP differs from traditional TCP in communication

Examine the use of snoop protocol in TCP.

Define I-TCP.

Classify different types of TCP Approaches used in Mobile Networks.

Inspect the need of WAP in mobile computing.

Draw the WAP Architecture.

List the functions of WTLS.

Analyze the differences between WDP and WTLS in terms of their functionalities and significance in secure
communication protocols.
Analyze the key differences between WTP and WTA in terms of behavioral economics, and evaluate how each
concept influences consumer decision-making in various market scenarios.

List the classes of WTP Transactions.

Design the connection mode and connectionless mode of WSP Protocols.

Analyze how synchronization markup language is used to connect a node in internet.

Identify the logical model of WAE Mobile Computing

Interpret the operation of WTA in Mobile Computing with diagram.

Show the use of WML in Mobile Computing.

Analyse the differences between WML and HTML in terms of mobile device compatibility and user interaction.

Compare the Mobile TCP approaches in all aspects such as operating mechanisms, performance, effectiveness,
challenges, advantages and disadvantages.
Illustrate the WAP architecture and apply it to design a mobile e-commerce platform. Explain how each layer in
the architecture supports the application.
Demonstrate the working of WTP in a mobile banking system. Explain how its transaction classes (Class 0, Class
1, Class 2) ensure efficient communication.
Demonstrate how WDP functions as an adaptation layer in WAP architecture. Apply its features to provide
seamless communication over different wireless networks
Interpret the security mechanisms of WTLS in WAP. Compare its features with TLS in terms of encryption,
scalability, and resource efficiency in wireless networks.Evaluate with the help of a diagram of how WTLS helps
in establishing a secure session (8)
Analyze the role of WAE in enabling mobile internet applications. Discuss how it bridges the gap between
wireless devices and web content delivery.
Draw the architecture of WSP Session establishment, Suspension, resume, termination and Explain in detail
WSP as connectionless session service.
Analyze the significance of WTA architecture in integrating telephony services with mobile applications. Inspect
How it is useful in terms of long distance communication.
Compare the markup structures and features of WML and HTML in terms of adaptability to mobile networks.
Discuss how WML’s design principles can still be relevant for future lightweight mobile technologies
Develop a WML-based mobile application for a simple navigation menu system. Explain how WML elements and
scripting enable lightweight content delivery.

Define microkernel operating system

Give four examples of Mobile OS.

Analyze how Mobile Operating System is dfiffer from Desktop Operating System.

Express the advantages of mobile operating system.


Give short notes on Palm OS

Pointout the drawbacks of Symbian OS.

Analyze the key differences between iOS and Android in terms of system architecture and security features. How
do these differences influence their usage in specific industries?

Analyze why microkernel is preferred for developing a mobile OS.

Define M- Commerce.

Analyze the pros of M-Commerce.

Draw the Architecture of a mobile commerce framework.

Describe the features of Blackberry operating system.

List out the Mobile Payment Schemes.

Analyze the Security Issues in M-Commerce.

Compare B2B and B2C applications

Analyze the key differences between E-commerce and M-commerce in terms of technology infrastructure, user
experience, and market reach.
Explore the special features that an operating system for mobile device needs to support compared to the
features provided by a traditional operating system.
Compare and contrast the features, architecture, and performance of various Mobile Operating Systems .
Discuss how they address key aspects such as application management, security, user interface, and hardware
integration.
Name three commercial operating systems for mobile phones. Outline the important functionalities supported by
any one of them which are not supported by a traditional operating system.
Discuss the architecture of the Android operating system. Briefly identify the possible reasons as to why it has
been able to rapidly improve its market share compared to its peers since its introduction a few years ago.
What is a microkernel operating system? Analyse Why is microkernel-based design being preferred for
developing a mobile OS.
Demonstrate the process of developing a simple mobile application using an Android or iOS SDK. Explain the
tools, APIs, and libraries provided by the SDK and how they simplify application development.
Analyze the relationship between M-Commerce structure and mobile payment systems. Discuss how security
issues in payment systems impact the overall effectiveness of M-Commerce platforms.
Illustrate the advantages and disadvantages of M-Commerce with a real-world case study, such as a mobile-
based food delivery system. Explain how the pros outweigh the cons in this context.

Explain the ways by which m-payments are settled along with any two applications.
Analyze the security challenges encountered by mobile payment systems, considering vulnerabilities such as
fraud and data theft. Evaluate how technologies like tokenization, biometric authentication, and blockchain can
be leveraged to address these issues, and discuss the potential impact of these technologies on the long-term
security and user adoption of mobile payments
Semester IM/DM Level
V DM L2

Unit Marks Part

1 2 1

1 2 1

1 2 1

1 2 1

1 2 1

1 2 1

1 2 1

1 2 1

1 2 2

1 2 2

1 2 2

1 2 2

1 2 2

1 2 2

1 2 2

1 2 2

1 16 1

1 16 1

1 16 1

1 16 1
1 16 1

1 16 2

1 16 2

1 16 2

1 16 2

1 16 2

2 2 1

2 2 1

2 2 1

2 2 1

2 2 1

2 2 1

2 2 1

2 2 1

2 2 2

2 2 2

2 2 2

2 2 2

2 2 2

2 2 2

2 2 2

2 2 2
2 16 1

2 16 1

2 16 1

2 16 1

2 16 1

2 16 2

2 16 2

2 16 2

2 16 2

2 16 2

3 2 1

3 2 1

3 2 1

3 2 1

3 2 1

3 2 1

3 2 1

3 2 1

3 16 1

3 16 1

3 16 1

3 16 1
3 16 1

3 2 2

3 2 2

3 2 2

3 2 2

3 2 2

3 2 2

3 2 2

3 2 2

3 16 2

3 16 2

3 16 2

3 16 2

3 16 2

4 2 1

4 2 1

4 2 1

4 2 1

4 2 1

4 2 1

4 2 1

4 2 1
4 2 2

4 2 2

4 2 2

4 2 2

4 2 2

4 2 2

4 2 2

4 2 2

4 16 1

4 16 1

4 16 1

4 16 1

4 16 1

4 16 2

4 16 2

4 16 2

4 16 2

4 16 2

5 2 1

5 2 1

5 2 1

5 2 1
5 2 1

5 2 1

5 2 1

5 2 1

5 2 2

5 2 2

5 2 2

5 2 2

5 2 2

5 2 2

5 2 2

5 2 2

5 16 1

5 16 1

5 16 1

5 16 1

5 16 1

5 16 2

5 16 2

5 16 2

5 16 2

5 16 2

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy