Mcad QB
Mcad QB
Question Bank
“MAC protocol designed for infrastructure based wireless network may not work satisfactory in infrastructure less
environment “ – justify.
A mobile service provider has been allotted a limited number of frequency bands.However he wants to
accommodate more customers. Point out What is the technique to be applied by him to achieve this.
Distinguish between direct sequence spread spectrum and frequency hopping spread spectrum.
Define multiplexing.
Formulate a reason why Collision Detection based protocol is not suitable for wireless networks
"The CSMA/CD technique, the sender starts to transmit if it senses the channel to be free. But, even if it senses
the channel to be free, there can be a collision why?
Generalize the features of different generations of cellular technologies and application environments of mobile
computing.
Compare and contrast direct sequence spread spectrum and frequency hopping spread spectrum.
Generalize the roles and application environments of mobile computing.
Why do MAC scheme in wired network fail in wireless networks and how does the multiple access with collision
avoidance (MACA) scheme work?
Discuss with the several examples for fixed and dynamic schemes in TDMA used for wireless transmission.
Generalize the role of various codes used in CDMA and explain the working of CDMA scheme.
Define GSM.
Define LAPDm.
Illustrate about the functions of authentication and encryption in GSM. How is the system security maintained?
What do you understand by 2.5G? Mention a few characteristic feature of this technology. Analyze how is it
different from 2G and 3G technologies.
Describe the architecture of the General Packet Radio Service (GPRS). Highlight the roles of key components
such as the GPRS Support Nodes (GSNs), Serving GPRS Support Node (SGSN), and Gateway GPRS Support
Node (GGSN), and discuss how they facilitate packet-switched data services.
Why UMTS technology is superior to GPRS technology? Justify your answer. Analyze the advantages and
limitations of GPRS
Analyze the handover mechanisms in GPRS and UMTS. Discuss the types of handovers (hard handover, soft
handover) used in both systems and the challenges associated with maintaining service quality during the
handover process.
Develop UMTS system architecture in detail. Describe the functions of HLR and VLR in call routing and roaming.
Why the traditional IP cannot be used in a mobile network. What are the main differences between the traditional
IP and the mobile IP? How does mobile IP support mobile hubs?
Express encapsulation and decapsulation in the context of mobile IP and why these are needed.
Define DHCP?
Define COA.
Discuss the roles of Mobile IP. Explain how Mobile IP facilitates seamless connectivity for mobile users while
DHCP assists in dynamic IP address allocation.
Enumerate the Process involved in data packet delivery using Mobile IP in adhoc networks. Explaining the
tunneling operation with a encapsulated format message.
Describe the key characteristics of Ad Hoc networks. Discuss how these characteristics differentiate Ad Hoc
networks from traditional wireless networks. Provide examples of real-world applications where Ad Hoc networks
are particularly beneficial.
Illustrate the process of route discovery, route reply, data delivery, and route caching using DSR. Explain the
approach with an example
Compare and Contrast proactive (DSDV) and reactive (DSR) routing protocols in the context of Ad Hoc networks.
Explain the basic concept of the Zone Routing Protocol (ZRP) in hybrid routing.
Summarize the key features of the On-Demand Multicast Routing Protocol (ODMRP).
Analyze the key differences between unicasting and multicasting by examining their uses in real-world network
scenarios
Define VANET.
Analyze the fundamental differences between MANET and VANET by evaluating their respective architectures,
communication protocols, and applications
Explain the application of Zone Routing Protocol (ZRP) in hybrid routing for large-scale ad hoc networks.
Illustrate how ZRP combines the strengths of both proactive and reactive routing protocols.
Analyze the performance of ODMRP in a highly dynamic network topology. Discuss its strengths and limitations
when deployed in VANETs as compared to MANETs.
Illustrate how VANETs can be used to implement a real-time traffic management system. Include the
communication patterns and protocols required for efficient implementation.
Analyze the interaction between routing and security in VANETs. How do security challenges like DoS attacks
affect the performance of routing protocols like ODMRP?
Analyze the security threats in VANETs and evaluate the effectiveness of different countermeasures against
these attacks
Define I-TCP.
Analyze the differences between WDP and WTLS in terms of their functionalities and significance in secure
communication protocols.
Analyze the key differences between WTP and WTA in terms of behavioral economics, and evaluate how each
concept influences consumer decision-making in various market scenarios.
Analyse the differences between WML and HTML in terms of mobile device compatibility and user interaction.
Compare the Mobile TCP approaches in all aspects such as operating mechanisms, performance, effectiveness,
challenges, advantages and disadvantages.
Illustrate the WAP architecture and apply it to design a mobile e-commerce platform. Explain how each layer in
the architecture supports the application.
Demonstrate the working of WTP in a mobile banking system. Explain how its transaction classes (Class 0, Class
1, Class 2) ensure efficient communication.
Demonstrate how WDP functions as an adaptation layer in WAP architecture. Apply its features to provide
seamless communication over different wireless networks
Interpret the security mechanisms of WTLS in WAP. Compare its features with TLS in terms of encryption,
scalability, and resource efficiency in wireless networks.Evaluate with the help of a diagram of how WTLS helps
in establishing a secure session (8)
Analyze the role of WAE in enabling mobile internet applications. Discuss how it bridges the gap between
wireless devices and web content delivery.
Draw the architecture of WSP Session establishment, Suspension, resume, termination and Explain in detail
WSP as connectionless session service.
Analyze the significance of WTA architecture in integrating telephony services with mobile applications. Inspect
How it is useful in terms of long distance communication.
Compare the markup structures and features of WML and HTML in terms of adaptability to mobile networks.
Discuss how WML’s design principles can still be relevant for future lightweight mobile technologies
Develop a WML-based mobile application for a simple navigation menu system. Explain how WML elements and
scripting enable lightweight content delivery.
Analyze how Mobile Operating System is dfiffer from Desktop Operating System.
Analyze the key differences between iOS and Android in terms of system architecture and security features. How
do these differences influence their usage in specific industries?
Define M- Commerce.
Analyze the key differences between E-commerce and M-commerce in terms of technology infrastructure, user
experience, and market reach.
Explore the special features that an operating system for mobile device needs to support compared to the
features provided by a traditional operating system.
Compare and contrast the features, architecture, and performance of various Mobile Operating Systems .
Discuss how they address key aspects such as application management, security, user interface, and hardware
integration.
Name three commercial operating systems for mobile phones. Outline the important functionalities supported by
any one of them which are not supported by a traditional operating system.
Discuss the architecture of the Android operating system. Briefly identify the possible reasons as to why it has
been able to rapidly improve its market share compared to its peers since its introduction a few years ago.
What is a microkernel operating system? Analyse Why is microkernel-based design being preferred for
developing a mobile OS.
Demonstrate the process of developing a simple mobile application using an Android or iOS SDK. Explain the
tools, APIs, and libraries provided by the SDK and how they simplify application development.
Analyze the relationship between M-Commerce structure and mobile payment systems. Discuss how security
issues in payment systems impact the overall effectiveness of M-Commerce platforms.
Illustrate the advantages and disadvantages of M-Commerce with a real-world case study, such as a mobile-
based food delivery system. Explain how the pros outweigh the cons in this context.
Explain the ways by which m-payments are settled along with any two applications.
Analyze the security challenges encountered by mobile payment systems, considering vulnerabilities such as
fraud and data theft. Evaluate how technologies like tokenization, biometric authentication, and blockchain can
be leveraged to address these issues, and discuss the potential impact of these technologies on the long-term
security and user adoption of mobile payments
Semester IM/DM Level
V DM L2
1 2 1
1 2 1
1 2 1
1 2 1
1 2 1
1 2 1
1 2 1
1 2 1
1 2 2
1 2 2
1 2 2
1 2 2
1 2 2
1 2 2
1 2 2
1 2 2
1 16 1
1 16 1
1 16 1
1 16 1
1 16 1
1 16 2
1 16 2
1 16 2
1 16 2
1 16 2
2 2 1
2 2 1
2 2 1
2 2 1
2 2 1
2 2 1
2 2 1
2 2 1
2 2 2
2 2 2
2 2 2
2 2 2
2 2 2
2 2 2
2 2 2
2 2 2
2 16 1
2 16 1
2 16 1
2 16 1
2 16 1
2 16 2
2 16 2
2 16 2
2 16 2
2 16 2
3 2 1
3 2 1
3 2 1
3 2 1
3 2 1
3 2 1
3 2 1
3 2 1
3 16 1
3 16 1
3 16 1
3 16 1
3 16 1
3 2 2
3 2 2
3 2 2
3 2 2
3 2 2
3 2 2
3 2 2
3 2 2
3 16 2
3 16 2
3 16 2
3 16 2
3 16 2
4 2 1
4 2 1
4 2 1
4 2 1
4 2 1
4 2 1
4 2 1
4 2 1
4 2 2
4 2 2
4 2 2
4 2 2
4 2 2
4 2 2
4 2 2
4 2 2
4 16 1
4 16 1
4 16 1
4 16 1
4 16 1
4 16 2
4 16 2
4 16 2
4 16 2
4 16 2
5 2 1
5 2 1
5 2 1
5 2 1
5 2 1
5 2 1
5 2 1
5 2 1
5 2 2
5 2 2
5 2 2
5 2 2
5 2 2
5 2 2
5 2 2
5 2 2
5 16 1
5 16 1
5 16 1
5 16 1
5 16 1
5 16 2
5 16 2
5 16 2
5 16 2
5 16 2