0% found this document useful (0 votes)
11 views4 pages

Iat1 2M

Mobile computing enables the use of devices like smartphones and laptops for data access and communication while on the move, offering advantages such as portability and flexibility. It faces challenges like security vulnerabilities and limited battery life, and is classified into various wireless network types like PAN, LAN, and WAN. Multiple access techniques like SDMA, FDMA, and CDMA are employed to manage communication resources effectively, while GSM architecture components facilitate mobile communication and routing.

Uploaded by

21vcetcse058
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views4 pages

Iat1 2M

Mobile computing enables the use of devices like smartphones and laptops for data access and communication while on the move, offering advantages such as portability and flexibility. It faces challenges like security vulnerabilities and limited battery life, and is classified into various wireless network types like PAN, LAN, and WAN. Multiple access techniques like SDMA, FDMA, and CDMA are employed to manage communication resources effectively, while GSM architecture components facilitate mobile communication and routing.

Uploaded by

21vcetcse058
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

1. What is Mobile Computing?

Definition:
Mobile computing refers to the ability to use computing devices while being mobile. This includes
using smartphones, tablets, laptops, and other devices to access data, run applications, and stay
connected to the internet from anywhere.

2. What are the advantages of Mobile Computing?

Advantages:

• Portability: Users can carry their devices anywhere, staying connected on the move.

• Flexibility: Access to work, entertainment, and communication from any location.

• Time-Saving: Perform tasks quickly without the need to be at a fixed location.

• Improved Productivity: Allows for multitasking and quick responses to tasks.

3. What is the difference between Infrastructure-Based and Infrastructure-Less Networks?

Infrastructure-Based Networks:

• Definition: These networks rely on fixed infrastructure like routers, base stations, and access
points to manage communication.

• Example: Wi-Fi networks, cellular networks.

Infrastructure-Less Networks:

• Definition: These networks do not rely on a fixed infrastructure; devices communicate


directly with each other.

• Example: Ad hoc networks, peer-to-peer networks.

4. What are the challenges in Wireless Communication?

Challenges:

• Interference: Signals can be disrupted by other electronic devices or obstacles.

• Security: Wireless networks are more vulnerable to unauthorized access.

• Bandwidth Limitations: Limited spectrum availability can lead to slower speeds.

• Signal Degradation: Distance, physical barriers, and weather can weaken signals.

5. How are Wireless Networks classified?

Types of Wireless Networks:

• PAN (Personal Area Network): For short-range communication, like Bluetooth.

• LAN (Local Area Network): Covers a small area, such as Wi-Fi in a home or office.

• MAN (Metropolitan Area Network): Spans a city or large campus.

• WAN (Wide Area Network): Covers a broad area, like cellular networks.

6. Illustrate Ad Hoc Networks with a pictorial representation.


Description: Ad hoc networks are decentralized networks where each device communicates directly
with other devices without relying on a fixed infrastructure.

7. What are the limitations of Mobile Computing?

Limitations:

• Battery Life: Mobile devices often have limited battery capacity.

• Network Stability: Connectivity can be inconsistent, especially in remote areas.

• Data Security: Increased risk of data breaches and loss.

• Processing Power: Mobile devices are generally less powerful than desktops.

8. What are the issues with Wireless MAC?

Issues:

• Collision: Multiple devices trying to send data simultaneously can cause collisions.

• Hidden Terminal Problem: Devices out of range of each other can interfere with
communication.

• Power Consumption: MAC protocols must balance performance with battery usage.

9. What is the role of a MAC protocol?

Role:
A MAC (Media Access Control) protocol manages how devices share the same communication
medium, ensuring that data packets are transmitted efficiently without collisions.

10. What are the Hidden and Exposed Terminal Problems in an Infrastructure-Less Network?

Hidden Terminal Problem:


Occurs when two devices cannot detect each other's signals but are both within range of a third
device, leading to collisions.

Exposed Terminal Problem:


Arises when a device is prevented from sending data because it senses another transmission, even
though that transmission would not cause interference.

11. When does the Exposed Terminal Problem arise?

Description:
The exposed terminal problem arises when a device unnecessarily holds back from sending data
because it detects another device transmitting, even though it could transmit without causing
interference.

12. What is the primary characteristic of SDMA?

Primary Characteristic:
SDMA (Space Division Multiple Access) divides the communication space into different spatial
sectors, allowing multiple users to use the same frequency channel by separating them based on
their physical location.

13. How does FDMA differentiate between multiple users?

Explanation:
FDMA (Frequency Division Multiple Access) assigns each user a specific frequency band, ensuring
that each user has a separate, non-overlapping channel for communication.

14. How does CDMA enable multiple users to share the same frequency band?

Explanation:
CDMA (Code Division Multiple Access) allows multiple users to share the same frequency band by
assigning a unique code to each user. The codes are orthogonal, ensuring that users do not interfere
with each other.

15. What is a common challenge across all multiple access techniques?

Common Challenge:
A common challenge is managing interference between multiple users sharing the same
communication resources, such as time, frequency, or code.

16. How does TDMA allocate communication channels?

Explanation:
TDMA (Time Division Multiple Access) allocates communication channels by dividing the available
time into slots. Each user is assigned a specific time slot, ensuring that only one user transmits at a
time.

17. Define FDD.

Definition:
FDD (Frequency Division Duplexing) is a technique where separate frequency bands are used for
transmitting and receiving data, allowing for simultaneous two-way communication.

18. What are the applications of SDMA?

Applications:

• Cellular Networks: Enhancing capacity by reusing frequencies in different spatial sectors.

• Satellite Communication: Directing beams to specific areas to maximize signal strength.

• Wi-Fi Networks: Using smart antennas to direct signals towards active users.

19. What are the main components of the GSM architecture?

Components:

• Mobile Station (MS): The user's mobile device.


• Base Station Subsystem (BSS): Controls communication between the mobile device and the
network.

• Network and Switching Subsystem (NSS): Manages call routing and mobility.

• Operation and Support Subsystem (OSS): Monitors and manages the network.

20. What is the function of the Base Station Subsystem in GSM?

Function:
The Base Station Subsystem (BSS) manages the radio communication between the mobile devices
and the network, including signal transmission, reception, and handovers between cells.

21. What role do GSM protocols play in mobile communication?

Role:
GSM protocols govern how data is transmitted and received across the network, ensuring reliable
communication, efficient use of resources, and proper authentication and encryption.

22. What is the role of the Home Location Register (HLR) in GSM routing?

Role:
The HLR is a database that stores the permanent information of users, such as their subscriber
profile, current location, and services they are subscribed to. It plays a key role in routing calls and
messages to the correct location.

23. What is the purpose of the Visitor Location Register (VLR) in GSM?

Purpose:
The VLR temporarily stores information about mobile subscribers currently in its area. This allows the
network to quickly manage calls and services for visitors without repeatedly querying the HLR.

24. What is MSC?

Definition:
MSC (Mobile Switching Center) is a core component of the GSM network that manages
communication switching between mobile users and the network, handling call setup, routing, and
mobility management.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy