SlideShare a Scribd company logo
1 of 24
VELAMMAL INSTITUTE OF TECHNOLOGY
DEPARTMENT OF INFORMATION TECHNOLOGY
IT6601 – MOBILE COMPUTING
UNIT-I
INTRODUCTION
1. What are the benefits of reservation schemes? [April/May 2005]
a) No other station is allowed to transmit during this slot b) Avoidance of congestion.
c) Waiting time is clearly known.
2. Enumerate the properties of MAC protocols? [Nov/Dec 2010]
1) It should help maximize the utilization of the channel.
2) It should be capable of supporting several types of traffic having different maximum and
average bits rates.
3) It should be in the face of equipment failure and changing network conditions.
3. Why CSMA/CD scheme fails in wireless networks?
In Carrier Sense Multiple Access/Collision Detection, (CSMA/CD) collisions occur at the receiver
and not at the sender. The sender applies carrier sense and detects an idle medium. The sender starts
sending but a collision happens at the receiver due to a second sender. The sender detects no
collision and assumes that the data has been transmitted without errors, but a collision might actually
have destroyed the data at the receiver. The power in the area of the transmitting antenna is several
magnitudes higher than the receiving power.
4. Define hidden terminal. [Nov/Dec 2015]
The transmission range of A reaches B but not C. The transmission range of C reaches B but not A.
B reaches A and C. A cannot detect C and vice versa.
A starts sending to B, but C does not receive this transmission. C also wants to send something to B
and senses the medium. The medium appears to be free, the carrier sense fails. C also starts sending,
causing a collision at B. But A can’t detect this collision at B and continues with its transmission. A
is hidden for C and vice versa.
5. What is orthogonal and autocorrelation thickness? [Nov/Dec 2008]
Orthogonal: Two vectors are called orthogonal if their inner product is 0.
E.g.) the two vectors are(2,5,0) & (0,0,17): (2,5,0)* (0,0,17)=0+0+0.
Autocorrelation: The barker code (+1, -1, +1, +1, -1, +1, +1, +1, -1, -1, -1) for example has a good
autocorrelation (i.e.) the inner product with itself is large the result is 11.
6. Draw the taxonomy of MAC protocol?
7. What is mobile computing? List out the characteristics of mobile computing. [A/M 11]
Mobile computing is the computational technique used for the people to access information from
anywhere and at anytime. It is also called as ubiquitous computing and also nomadic computing.
The characteristics of mobile computing are:
1]location awareness
2]Ubiquity
3]Adaptation
4]Broadcast
5]Personalization
8. Define CDMA. [Nov/Dec 2012]
Code Division Multiple Access systems use codes with certain characteristics to separate
different users. To enable access to the shared medium without interference. The users use the same
frequency and time to transmit data. The main problem is to find good codes and to separate this
signal from noise. The good code can be found the following 2 characteristic 1. Orthogonal. 2. Auto
Correlation.
9. What the features are of Code Division multiple Accesses?
It does not require external synchronization networks. • CDMA offers gradual degradation in
performance when the no. of users is increased But it is easy to add new user to the system. If offers
an external interference rejection capability.
10. How are guard spaces realized between users in CDMA?
The guard space between a pair of users in CDMA systems is the orthogonality between their
spreading codes. The lower the correlation between any pair of spreading codes is, the better is the
user separation.
11. What are the several versions in CSMA? [Nov/Dec 2014]
There are several versions in CSMA, they are as follows
a) Non-persistent CSMA
b) p-persistent CSMA
c) 1-persistent CSMA
12. What is meant by non-persistent CSMA?
In, non-persistent CSMA, stations sense the carrier and start sending immediately if the medium
is idle, if the medium is busy, the station pauses a random amount of time before sensing the
medium again and repeating this pattern.
13. What is meant by p-persistent CSMA? [Nov/Dec 2014]
In p-persistent CSMA system nodes also sense the medium, but only transmit with a
probability of p. With the station deferring to the next slot with the probability1-p, i.e. access is
slotted in addition.
14. What is the difference between wireless networking(communication) and Mobile
computing? Or Distinguish between mobile computing and wireless networking.
15. What are applications of Mobile Computing? [Nov/Dec 2014]
• Vehicles
• Emergencies
• Business
• Replacement of wired networks
• Infotainment
• Location dependent services
• Follow-on services
• Location aware services
16. What is the function of Medium Access Control Layer? [Nov/Dec 2013] or State the need
for Medium access control in network communication.
The functions of Medium Access Control Layer are responsible for establishes, maintains, and
releases channels for higher layers by activating and deactivating physical channels
17. Distinguish FDMA and TDMA [Nov/Dec 12]
Time division multiple access (TDMA) is a channel access method for shared medium (usually
radio) networks. It allows several users to share the same frequency channel by dividing the signal
into different time slots. This allows multiple stations to share the same transmission medium (e.g.
radio frequency channel) while using only a part of its channel capacity.
Frequency Division Multiple Access or FDMA is a channel access method used in multiple-access
protocols as a channelization protocol. FDMA gives users an individual allocation of one or several
frequency bands, allowing them to utilize the allocated radio spectrum without interfering with each
other.
18. Give the use of SDMA. What is SDMA? [May/Jun 2013]
Space Division Multiple Access (SDMA) is used for allocating separated spaces to users in
wireless networks. The basis for the SDMA algorithm is formed by cells and sectored antennas
which constitute the infrastructure implementing space division multiplexing (SDM).
19. What is the difference between CSMA CA and CSMA CD?
CSMA/CD: Carrier Sense Multiple Access / Collision Detection. When a collision is detected, all
the stations will stop transmitting and wait a random length of time before retransmitting. It is used
in Ethernet networks
CSMA/CA: Carrier Sense Multiple Access / Collision Avoidance. Instead of detecting and reacting
to collisions, CSMA/CA tries to avoid the collision by having each computer signal its intention to
transmit before the actual transmission. i.e Pre fixed timing for each station. It is used in Apple
networks and WiFi.
20. How MACA solves the exposed terminal problem? [Nov/Dec 2015]
By using MACA, B has to transmit an RTS(Ready to Send) first containing the name of the receiver
(A) and the sender (B). C does not react to this message as it is not the receiver, but A acknowledge
using a CTS (Clear to Send) which identifies B as the sender and A as the receiver of the data
transmission. C does not receive these CTS and concludes that A is outside the range. Therefore, C
can start its transmission assuming it will not cause a collision at A. Thus the problem with exposed
terminal is solved.
UNIT 2
MOBILE INTERNET PROTOCOL AND TRANSPORT LAYER
1. How do you classify TCPs? (May 2012)
a. TCP in single hop wireless networks
 Indirect TCP (I-TCP)
 Fast retransmission
 Snooping TCP(S-TCP)
 Mobile TCP(M-TCP)
 Freeze TCP
b. TCP in multihop wireless networks
2. What are the possible locations of tunnel end point in mobile IP? (June 2014) (Or)
What are the possible locations for care of Address? (Dec 2013)
Tunnel is a secure path from HA to FA that ensures the successful delivery of
packets to the MN.Care of Address is a termination point of a tunnel toward a MH, for
data grams forwarded to the MH while it is away from home.
1. Foreign agent care-of address: the address of a foreign agent that MH registers with
2. co-located care-of address: an externally obtained local address that a MH gets.
3. What should be the value of TTL field in the IP packet of agent advertisement? (June
2014)
The value of TTL field in the IP packet of agent advertisement is set to “1” for all
advertisements to avoid forwarding them.
4. What is Care of Address? Differentiate types of Care of Address. (Dec 2012)
Care of Address gives the current location of the mobile Node. There are two types of
CoA. They are:
• Foreign agent care-of address (FACoA): The mobile node receives the same CoA as
the foreign agent. All mobile nodes in the foreign network are given the same CoA.
• Co-located care-of address(Co-CoA): A mobile node acquires a co-located care-of
address as a local IP address through some external means, which the mobile node then
associates with one of its own network interfaces. The address might be dynamically
acquired as a temporary address by the mobile node, such as through DHCP.
5. When and why binding update is generated in mobile IP? (May 2015(MP))
A binding is the association of the home address with a care-of address. Binding
Update (BU) message is used to notify the respective node about current location (CoA) of
the MN. BU is sent by HA to CN. The message contains the fixed IP address of the mobile
node and the care-of-address.
6. List the requirements for mobile IP. (Dec 2014(MP))
 Compatibility
 Transparency
 Scalability
 Efficiency and
 Security
7. List the advantages in transaction - oriented TCP. (Nov 2015) (June 2012)
1. RFC1644, T-TCP, describes a TCP version to avoid this overhead.
2. Connection setup, data transfer and connection release can be combined.
3. Thus, only 2 or 3 packets are needed.
4. It is highly efficient.
8. What advantage does the use of IPV6 offer for mobility?(Nov 2015)
IPv6 mobility provides a mechanism for the host to roam around different links
without losing any communication/connection and its IP address
9. What is Selective retransmission? (Dec 2012)
Selective retransmission allows for acknowledgements of single packets, not only
acknowledgements of in-sequence packet streams without gaps. Sender can now retransmit
only the missing packets
10. Why does I –TCP isolate problems on Wireless Link? (May 2013)
I-TCP splits the connection into two parts – a wired/fixed and a wireless/mobile
part. This isolates problems on the wireless link from the fixed network. However, this
also requires that intermediate systems are able to look into IP packets to split the
connection. This prevents the usage of IPsec – end-to-end security and I-TCP (or proxy
solutions in general) does not go together.
11. What is Timeout freezing?(May 2013)
• Mobile hosts can be disconnected for a longer time - no packet exchange is
possible, e.g., in a tunnel, disconnection due to overloaded cells or mux.
• with higher priority traffic TCP disconnects after time-out completely
• TCP freezing
MAC layer is often able to detect interruption in advance
MAC can inform TCP layer of upcoming loss of connection
TCP stops sending, but does now not assume a congested link
MAC layer signals again if reconnected
12. Differentiate Snooping and mobile TCP.(Nov 2014)
Snooping TCP Mobile TCP
Foreign agent buffers all packets
with destination mobile host and
additionally snoops the packet flow
in both direction that is (MH-FA
and FA-CH)
Splits the TCP connection into an
unmodified TCP between the
standard host and supervisory host
(SH) and an optimized TCP
between the SH and MH. SH is
responsible for exchanging data
between both parts.
13. Define triangular routing.(Nov. 2015)
In the mobile IP, packets that are sent to a mobile host by the correspondent host are first
routed to the mobile host's home agent and then forwarded to the mobile host at its current
location by its home agent.
14. Give the advantages and disadvantages of Indirect – TCP. (May 2015)
Advantages of I-TCP:
 I-TCP segments a TCP connection into a fixed and wireless part.
 It does not require any changes in the TCP protocol.
 Transmission errors on wireless link do not propagate into the fixed network.
 Allows the use of a different transport layer protocol between foreign agent and
mobile host.
 Optimizations of new mechanisms are easy.
Disadvantages of I- TCP:
 Increased Handover Latency
 The Foreign agent must be a trusted entity.
 Loss of end-end semantics of TCP causes problems.
15. What is the use of DHCP? (May 2015)
DHCP is a Dynamic Host Configuration Protocol (DHCP) used to simplify the
installation and maintenance of networked computers. If a new computer is connected to
the network, DHCP can provide it with all the necessary information for full system
integration into the network.
16. Differentiate Foreign and Home Agent in Mobile IP technology. (Nov 2012)
Home Agent (HA)
• system in the home network of the MN, typically a router
• registers the location of the MN, tunnels IP datagrams to the COA
Foreign Agent (FA)
• system in the current foreign network of the MN, typically a router
• forwards the tunneled datagrams to the MN, typically also the default router for
the MN
17. What is generic routing encapsulation?
Generic routing encapsulation (GRE) is an encapsulation scheme which supports other
network protocols in addition to IP. It allows the encapsulation of packets of one protocol
suite into the payload portion of a packet of another protocol suite.
18. What is called the exponential growth of the congestion window? [Nov/Dec 09]
The sender always calculate congestion window for a window start size of the congestion
window is one segment. Sender sends one packet and waits for acknowledgement. If
acknowledgement arise it raises the level of congestion window by one. If sender sends two
packet if acknowledgement arises it raises the level of congestion window by two. This
scheme raises the level of congestion window every time the acknowledges come back,
which takes roundtrip time(RTT).This is called the exponential growth of the congestion
window.
19. What is Fast retransmit? [Nov/Dec 11]
In TCP, a receiver sends acknowledgements only if it receive any packets from the sender.
Thus receiving acknowledgements from a receiver shows additionally that the receiver
continuously receives something from the sender. Therefore, the gap in the packet stream is
not due to severe congestion, but a simple packet loss due to a transmission error. The sender
can now retransmit the missing packets before the timer expires. This behaviour is called fast
retransmit.
20. What is fast recovery? [Nov/Dec 11]
The receipt of acknowledgement shows that there is no congestion justifying slow start. The
sender can continue with the current congestion window. The sender performs a fast recovery
from the packet loss. This mechanism can improve the efficiency of TCP dramatically.
UNIT III
TELECOMMUNICATION SYSTEMS
1. Define GSM. [MAY/JUN 2007]
 GSM (Global System for Mobile communication) is a digital mobile telephony system that is
widely used in Europe and other parts of the world. GSM uses a variation of time division
multiple access (TDMA) and is the most widely used of the three digital wirelesstelephony
technologies (TDMA, GSM, and CDMA).
 GSM digitizes and compresses data, then sends it down a channel with two other streams of user
data, each in its own time slot. It operates at either the 900 MHz or 1800 MHz frequency band.
2. List the three different categories of services of GSM. [NOV/DEC 2007]
(or)
What are the types of services in GSM? [MAY/JUN 2014]
 Bearer services
 Tele services
 Supplementary services
3. What are the two basic classes of handover? [APR/MAY 2011]
There are two basic classes in handover:
Hard handover: Switching between different antennas or different system is performed at a certain
point in time.
Soft handover: This is a new real mechanism in UMTS compare to GSM and this only available in
FDD mode.
4. Distinguish between soft handover and hard handover? [APR/MAY 2010]
A hard handover is one in which the channel in the source cell is released and only then the channel
in the target cell is engaged. Thus the connection to the source is broken before or 'as' the connection
to the target is made—for this reason such handovers are also known as break-before-make.
A soft handover is one in which the channel in the source cell is retained and used for a while in
parallel with the channel in the target cell. In this case the connection to the target is established
before the connection to the source is broken, hence this handover is called make-before-break.
Hard Hand - Off
 Occurs in GSM
 Available in FDD / TDD modes
 Inter frequency handover, Inter system handover
Soft Hand - Off
 Occurs in UMTS
 Available only in FDD mode
 Macro diversity
5. What are the different control channels used in GSM? [NOV/DEC 2012]
The control channel groups in GSM are:
 Broadcast control channel (BCCH)
 Common control channel (CCCH)
 Dedicated control channel (DCCH)
6. What are the four types of handover available in GSM? [NOV/DEC 2011]
 Intra cell Handover
 Inter cell Intra BSC Handover
 Inter BSC Intra MSC handover
 Inter MSC Handover
7. Why are so many different identifiers/address needed in GSM? [MAY/JUNE2012]
Users of the GSM systems work with telephone numbers. That is all users should see. These phone
numbers are completely independent of the current location of the user. The system itself needs some
additional information; however, it must not reveal the identity of users. The international
identification of users is done with the IMSI (=country code + network code + subscriber ID). During
operation within a location area, only a temporary identifier, the TMSI is needed. This hides the
identity of a user. The TMSI is not forwarded to the HLR. But instead another temporary number
reflects the location and any roaming required is the MSRN is used internally by the system.
8. What are the security services offered by GSM? [NOV/DEC 2012]
The security services offered by GSM are:
 Access control and authentication.
 Confidentiality.
 Anonymity.
9. How is authentication done in GSM networks? [NOV/DEC 2013]
The GSM network authenticates the identity of the subscriber through the use of a challenge-response
mechanism. A 128-bit Random Number (RAND) is sent to the MS. The MS computes the 32-bit
Signed Response (SRES) based on the encryption of the RAND with the authentication algorithm
(A3) using the individual subscriber authentication key (Ki). Upon receiving the SRES from the
subscriber, the GSM network repeats the calculation to verify the identity of the subscriber.
If the received SRES agrees with the calculated value, the MS has been successfully authenticated
and may continue. If the values do not match, the connection is terminated and an authentication
failure is indicated to the MS.
10. What are the advantages and disadvantages of GSM? [NOV/DEC 2014]
Advantages
 Communication
 Total mobility
 Worldwide connectivity
 High capacity
 High transmission quality
 Security functions
Disadvantages
 No end-to-end encryption of user data
 Reduced concentration while moving
 Electromagnetic radiation
 High complexity of system
 Several incompatibilities within the GSM standards
11. What are the services provided by supplementary services? [MAY/JUN 2009]
 User identification
 Call redirection
 Call forwarding
 Closed user groups
 Multiparty Communication
12. Distinguish between mobile terminated call and mobile originated call. [NOV/DEC 2011]
MOC-Mobile Originating Call
MTC-Mobile Terminating Call
The Mobile/MS which initiate a Call is known as MOC, whereas the destination Mobile/MS for
which the call has been initiate is known as MTC.
MOC: MS (A party)->BSC->MSC/VLR
MTC: MSC/VLR->BSC->MS (B party)
MOC starts from A party sending service request to core network
MTC starts when core network receives B number and start analysis for paging, or IAM sending
13. What is meant by GPRS? [NOV/DEC 2008]
The General Packet Radio Service provides packet mode transfer for applications that exhibit traffic
patterns such as frequent transmission of small volumes.
General Packet Radio Services (GPRS) is a packet-based wireless communication service that
promises data rates from 56 up to 114 Kbps and continuous connection to the Internet for mobile
phone and computer users.
14. What is meant by GGSN and SGSN? [NOV/DEC 2007]
GGSN is Gateway GPRS Support Node. It is the inter-working unit between the GPRS
network and external packet data networks. The GGSN is connected to external networks via the Gi
interface and transfers packets to the SGSN via an IPbased GPRS backbone network.
SGSN is Serving GPRS Support Node. It supports the MS via the Gb interface. The GSN is
connected to a BSC via frame relay.
15. What are the new components added to GPRS network? [MAY/JUN 2012]
Two new components, called Gateway GPRS Support Nodes (GSNs) and, Serving GPRS Support Node
(SGSN) are added.
16. Specify the functions provided by radio network subsystem (RNS). [MAY/JUN 2008]
 Radio channel ciphering
 Deciphering
 Handover Control
 Radio resource management
17. Mention the advantages and drawbacks of GPRS. [MAY/JUN 2012 - ME]
Advantages
 Allow broadcast, multicast and unicast services
 Cheaper packet transfer for internet applications
 Needs no connection setup prior to data transfer
Disadvantages
 Needs additional hardware and software
18. Mention the applications of GPRS [NOV/DEC 2011 - ME]
 Communications—E-mail; fax; unified messaging; intranet/Internet access
 Value-added services—Information services; games
 E-commerce—Retail; ticket purchasing; banking; financial trading
 Location-based applications—Navigation; traffic conditions; airline/rail schedules; location
finder
 Vertical applications—Freight delivery; fleet management; sales-force automation
 Advertising
19. Define UMTS. [MAY/JUN 2010 - ME]
 The Universal Mobile Telecommunication System (UMTS) is a third generation (3G) mobile
communications system that provides a range of broadband services to the world of wireless and
mobile communications.
 UMTS delivers low-cost, mobile communications at data rates of up to 2 Mbps. It preserves the
global roaming capability of second generation GSM/GPRS networks and provides new
enhanced capabilities.
20. What are the advantages and disadvantages of UMTS? [MAY/JUN 2013 - ME]
Advantages:
 Overcrowding is relieved in existing systems with radio spectrum
 Bandwidth, security and reliability are more
 Provides interoperability among service providers
 Availability of fixed and variable rates
 Always online devices – 3G uses IP connectivity which is packet based
 Rich multi-media services are available
Disadvantages:
 Roaming and data/voice work together has not yet been implemented
 Needs different handset
 The cost of cellular infrastructure , upgrading base stations is very high
 Power consumption is high
 Requires closer base stations and are expensive
UNIT IV
PART A
1. What are the differences between AODV and the standard distance vector algorithm? Why are
extensions needed? [APR/MAY 2008]
AODV is capable of both unicast and multicast routing. It is a reactive routing protocol, meaning that it
establishes a route to a destination only on demand Routers use distance vectorbased routing protocols to
periodicallyadvertise the routes in their routing tables. Routing information exchanged between typical
distance vectorbased routers is unsynchronized and unacknowledged.
AODV is a reactive protocol. Route calculation is only performed if necessary. This improves scalability
under light load, but causes a higher initial latency.
2. What are the drawbacks of wired networks? [APR/MAY 2010]
 Running the wires from each room within the home can be a difficult task.
 Network cables can look disorganized.
 Network cables can disconnect or become faulty consequently causing the connection to fail.
 Adding more computers to a wired network may result in unexpected expense if you run out of
connections on your network and could slow down the network.
 All wired networks differ from each other. The most familiar type of wired network is an Ethernet
network.
3. Distinguish between infrastructure and ad hoc networks. [NOV/DEC 2012]
Infrastructure networks not only provide access to other networks, but also include forwarding functions,
medium access control etc. In these infrastructure based wireless networks, communication typically
takes place only between the wireless nodes and the access point, but not directly between the wireless
nodes. Ad-hoc wireless networks, however ,do not need any infrastructure to work .Each node can
communicate directly with other nodes, so no access point controlling medium access is necessary.
4. Differentiate wired networks routing from ad-hoc wireless networks routing. [NOV/DEC 2011]
S.No Wired Networks Adhoc Networks
1 Nodes do not participate in packet routing Each node acts as a router
2 Topology is static Topology is dynamic
3 Simple IP-based addressing scheme is
deployed
Simple IP-based addressing scheme is
deployed
5. Mention certain situation where Ad hoc networks are the only choice. [NOV/DEC 2012]
 Instant requirements
 Natural disasters
 Remote areas
 Effectiveness
6. Write any two factors that affect the performance of Adhoc networking. [NOV/DEC 2013]
 Throughput
 Average routing overhead
 Power consumption
7. Discuss some of the routing metrics to be considered in a mobile network layer? [NOV/DEC 2007]
 HOP counting
 Destination sequence distance vector
 Dynamic source routing
 Least interference routing
8. Why is routing in multi-hop adhoc networks complicated? [MAY/JUN 2007]
Routing is complicated because of frequent topology changes, differentcapabilities of the nodes, varying
propagation characteristics. Further, no controlinstance can support routing.
9. What are the differences between wired networks and adhoc wireless networks related to routing?
[MAY/JUNE2012]
S.
No
Factor Wired Network Wireless Network
1
Asymmetric
links
Routing algorithm asymmetric Routing algorithm symmetric
2
Redundant links Less number of redundant links More number of redundant link
3
Interference Links exist only where a wire
exist
Links come and go depending
transmission characteristics.
10. What are adhoc networks? [MAY/JUN 2009]
A wireless ad-hoc network is a decentralized type of wireless network. The network is ad hoc because it
does not rely on a preexisting infrastructure, such as routers in wired networks or access points in
managed (infrastructure) wireless networks. Instead, each node participates in routing by forwarding data
for other nodes, and so the determination of which nodes forward data is made dynamically based on the
network connectivity. In addition to the classic routing, ad hoc networks can use flooding for forwarding
the data.
11. List out the some of the popular Routing protocols.[MAY/JUN 2010]
DSDV(Destination Sequence Distance Vector)
DSR(Dynamic Source Routing)
AODV(Ad-Hoc On Demand Vector Routing)
ZRP (Zone Routing Protocol)
Multicast Routing Protocol
12. Define VANET. [NOV/DEC 2010]
Vehicular Ad-Hoc Network, or VANET, is a form of mobile ad-hoc network, to provide communications
among nearby vehicles and between vehicles and nearest fixed equipment, usually described as roadside
equipment.
13. How VANET differs from MANET?[MAY/JUN 2012]
Similar to Mobile ad hoc networks (MANETs), nodes in VANETs self-organize and self-manage
information in a distributed fashion without a centralized authority or a server dictating the
communication. In this type of network, nodes engage themselves as servers and/or clients, thereby
exchanging and sharing information like peers. Moreover, nodes are mobile, thus making data
transmission less reliable and suboptimal.
Apart from these characteristics, VANETs possess a few distinguishing characteristics:
• Highly dynamic topology
• Frequently disconnected network
• Patterned Mobility
• Propagation Model
• Unlimited Battery Power and Storage
• On Board Sensors
14. What are the security requirements in VANET? [QB]
• Authentication
• Availability
• Non Repudiation
• Privacy
• Data verification
15. What is the difference between proactive and reactive routing protocol ? May/June 2015
A proactive routing protocol is also called a “table-driven” routing protocol. In this, nodes continuously
evaluate routes to all reachable nodes and attempt to maintain consistent, up-to-date routing information.
Therefore, a source node can get a routing path immediately if it needs one.Reactive routing protocols for
mobile ad hoc networks are also called “on-demand” routing protocols. In a reactive routing protocol,
routing paths are searched only when needed.
16. Define DSR protocol. [NOV/DEC 2011]
• Dynamic Source Routing is a source initiated on-demand routing protocol for ad-hoc
networks.
• In this protocol, the nodes do not need to exchange the routing table information periodically,
which helps to reduce the bandwidth overhead associated with this protocol.
17. Define ZRP. [QB]
The Zone Routing Protocol is a hybrid protocol. It incorporates the merits of both on-demand
and proactive routing protocol. A routing zone comprises a few MANET nodes within a few
hops from the central zone. Within a zone, a table-driven routing protocol is used.
18. What are the design issues in ad hoc networks? May/June 2013
• Network size and node density
• Connectivity
• Network Topology
• User Traffic
• Operational Environment
• Energy Constraint
19. What are the characteristics/features of Adhoc networks? [QB]
• Lack of fixed infrastructure
• Dynamic Topologies
• Bandwidth constrained, variable capacity links
• Energy constrained operation
• Increased vulnerability
20. What are the important steps to be performed in the operation of DSDV?[MAY/JUN
2013]
• Each router in the network collects route information from all its neighbours.
• After gathering information, the node determines the shortest path to the destination
based on the gathered information.
• Based on the gathered information, a new routing table is generated.
• The router broadcasts this table to its neighbours. On receipt by the neighbours, the
node re computes their respective routing table.
• This process continues till the routing information becomes stable.
UNIT V
PART – A
1. What are the constraints of Mobile O/S? [QB]
The special constraints of mobile o/s are;
• Limited memory
• Limited screen size
• Miniature keyboard
• Limited processing power
• Limited battery power
• Limited and fluctuating bandwidth of the wireless medium
2. What are the requirements of Mobile O/S? [QB]
• Support for specific communication protocols
• Support for a variety of input mechanisms
• Compliance with open standards
• Extensive library support
3. Define Windows Mobile. [QB]
• Window Mobile operating system is based on Pocket PC 2000 and was targeted
as an operating system for mobile phones which the different vendors can use in
their cell phones.
4. What is palm OS? [QB]
• Palm OS is a Proprietary operating system that was developed by Palm
Computing .
• It was designed with the provision of a touch screen based graphical user
interface.
• It has an elementary memory management system, to keep the operating system
small and fast.
5. Define Symbian OS? [QB]
The key features of Symbian os are:
• It supports a number of communication and networking protocols including TCP,
UDP, PPP, DNS, FTP etc.
• It also supports pre-emptive multitasking scheduling and memory protection.
• Symbian is a micro kernel based operating system.
6. What is iOS? [QB]
• iOS is a closed and proprietary operating system fully owned and controlled by
Apple and not designed to be used by various mobile phones vendors on their
systems.
7. Define M-Commerce. [QB]
• Mobile Commerce involves carrying out an activity related to buying and selling
of commodities, service or information using the mobile hand-held devices.
8. What are the applications of M-Commerce? [QB]
• Business –to-consumer application
• Business-to-business application
9. State the functionalities of Mobile commerce framework? [QB]
• Mobile devices
• Mobile middleware
• Networks
• Host computers
10. What are the advantages of M-Commerce? [QB]
• The benefits of using m-Commerce include customer convenience, cost saving
and new business opportunities.
• It provides the flexibility of anytime, anywhere shopping using a light weight
device.
• It can be highly personalized
11. What are disadvantages of M-commerce? [QB]
• It do not offer graphics of a PC.
• The users are constrained to use small screen and keyboard and low resolution
pictures and videos.
• The small screens of mobile devices limit the complexity of application.
12. What are the three popular types of mobile payment schemes? [QB]
• Bank account based
• Credit card based
• Micropayment.
13. What are the security issues in M-commerce? [QB]
• It is anticipated to introduce new security and privacy risks those found in theE-
commerce.
• It provides facility against risk of lost or theft.
14. Define micropayment. [QB]
• It is intended for payment for small purchases such as from vending machines.
• The mobile devices can communicate with the vending machine directly using a
Bluetooth or wireless LAN connection to negotiate the payment and then the
micropayment is carried out.
15. Define Android.[QB]
• Android is an operating system for mobile devices based on Linux.
• Android is used as open source software for mobile devices.
• Google embed its search engine into Android, the way Internet Explorer is
embedded into windows.
16. Draw the structure of Android.[QB]
Application Layer
Application Framework
Libraries and Runtime
Kernel
17. Define Blackberry OS.[QB]
Blackberry operating system is a proprietary operating system designed for blackberry
smartphones produced by Research In Motion Limited (RIM). Being a proprietary
operating system, details of its architecture have not been published. It provides a very
good email system.
18. What are the applications of M-Commerce?[QB]
• Advertising
• Comparison shopping
• Information about a product
• Mobile Ticketing
• Loyalty and payment services
• Catalogue shopping
19. Draw the structure of M-Commerce.[QB]
20. What are the features required for a mobile device to enable mobile commerce?
[QB]
• Good internet connectivity
• Ability to dispatch rich content such as image.
• Have a good quality camera with auto focus.
• Ability to read the RFID tags.

More Related Content

What's hot

Wireless routing protocols
Wireless routing protocolsWireless routing protocols
Wireless routing protocols
barodia_1437
 
Lecture 11 14. Adhoc routing protocols cont..
Lecture 11 14. Adhoc  routing protocols cont..Lecture 11 14. Adhoc  routing protocols cont..
Lecture 11 14. Adhoc routing protocols cont..
Chandra Meena
 
Modified rts cts exchange mechanism for manet
Modified rts cts exchange mechanism for manetModified rts cts exchange mechanism for manet
Modified rts cts exchange mechanism for manet
IAEME Publication
 
A Novel Acknowledgement based Intrusion Detection System for MANETs
A Novel Acknowledgement based Intrusion Detection System for  MANETsA Novel Acknowledgement based Intrusion Detection System for  MANETs
A Novel Acknowledgement based Intrusion Detection System for MANETs
IJMER
 

What's hot (19)

A SIMULATION-BASED PERFORMANCE COMPARISON OF MANETS CDS CREATION ALGORITHMS U...
A SIMULATION-BASED PERFORMANCE COMPARISON OF MANETS CDS CREATION ALGORITHMS U...A SIMULATION-BASED PERFORMANCE COMPARISON OF MANETS CDS CREATION ALGORITHMS U...
A SIMULATION-BASED PERFORMANCE COMPARISON OF MANETS CDS CREATION ALGORITHMS U...
 
Wireless routing protocols
Wireless routing protocolsWireless routing protocols
Wireless routing protocols
 
Dynamic Source Routing Sink hole attack
Dynamic Source Routing Sink hole attackDynamic Source Routing Sink hole attack
Dynamic Source Routing Sink hole attack
 
SIMULATION AND ANALYSIS OF AODV, DSDV, ZRP IN VANET
SIMULATION AND ANALYSIS OF AODV, DSDV, ZRP IN VANETSIMULATION AND ANALYSIS OF AODV, DSDV, ZRP IN VANET
SIMULATION AND ANALYSIS OF AODV, DSDV, ZRP IN VANET
 
Lecture 11 14. Adhoc routing protocols cont..
Lecture 11 14. Adhoc  routing protocols cont..Lecture 11 14. Adhoc  routing protocols cont..
Lecture 11 14. Adhoc routing protocols cont..
 
COMPARISON OF ROUTING PROTOCOLS FOR AD HOC WIRELESS NETWORK WITH MEDICAL DATA
COMPARISON OF ROUTING PROTOCOLS FOR AD HOC WIRELESS NETWORK WITH MEDICAL DATA COMPARISON OF ROUTING PROTOCOLS FOR AD HOC WIRELESS NETWORK WITH MEDICAL DATA
COMPARISON OF ROUTING PROTOCOLS FOR AD HOC WIRELESS NETWORK WITH MEDICAL DATA
 
F41023946
F41023946F41023946
F41023946
 
PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2
PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2
PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2
 
Jb2516071610
Jb2516071610Jb2516071610
Jb2516071610
 
MAC Protocols: A Review
MAC Protocols: A ReviewMAC Protocols: A Review
MAC Protocols: A Review
 
VIRTUAL CIRCUIT NETWORKS, atm , frame relay
VIRTUAL CIRCUIT NETWORKS, atm , frame relayVIRTUAL CIRCUIT NETWORKS, atm , frame relay
VIRTUAL CIRCUIT NETWORKS, atm , frame relay
 
Minimizing mobiles communication time using modified binary exponential backo...
Minimizing mobiles communication time using modified binary exponential backo...Minimizing mobiles communication time using modified binary exponential backo...
Minimizing mobiles communication time using modified binary exponential backo...
 
A018210109
A018210109A018210109
A018210109
 
Ijariie1150
Ijariie1150Ijariie1150
Ijariie1150
 
Modified rts cts exchange mechanism for manet
Modified rts cts exchange mechanism for manetModified rts cts exchange mechanism for manet
Modified rts cts exchange mechanism for manet
 
Eec702, dcn, important question
Eec702, dcn, important questionEec702, dcn, important question
Eec702, dcn, important question
 
Ismail&&ziko 2003
Ismail&&ziko 2003Ismail&&ziko 2003
Ismail&&ziko 2003
 
International Journal of Computational Engineering Research (IJCER)
International Journal of Computational Engineering Research (IJCER) International Journal of Computational Engineering Research (IJCER)
International Journal of Computational Engineering Research (IJCER)
 
A Novel Acknowledgement based Intrusion Detection System for MANETs
A Novel Acknowledgement based Intrusion Detection System for  MANETsA Novel Acknowledgement based Intrusion Detection System for  MANETs
A Novel Acknowledgement based Intrusion Detection System for MANETs
 

Similar to It6601 mc - qb - part a (2) (1)

IEEE 802.11 general questions Summarize and describe the basic funct.pdf
IEEE 802.11 general questions  Summarize and describe the basic funct.pdfIEEE 802.11 general questions  Summarize and describe the basic funct.pdf
IEEE 802.11 general questions Summarize and describe the basic funct.pdf
arkurkuri
 

Similar to It6601 mc - qb - part a (2) (1) (20)

CS8601-IQ.pdf
CS8601-IQ.pdfCS8601-IQ.pdf
CS8601-IQ.pdf
 
CS8601-IQ.pdf
CS8601-IQ.pdfCS8601-IQ.pdf
CS8601-IQ.pdf
 
Cs6003 ahsn-add-qb
Cs6003 ahsn-add-qbCs6003 ahsn-add-qb
Cs6003 ahsn-add-qb
 
12.7.2018
12.7.201812.7.2018
12.7.2018
 
Unit 2
Unit 2Unit 2
Unit 2
 
Unit 4 MC QA.pdf
Unit 4 MC  QA.pdfUnit 4 MC  QA.pdf
Unit 4 MC QA.pdf
 
dcn.pdf
dcn.pdfdcn.pdf
dcn.pdf
 
IJCTET2015123106
IJCTET2015123106IJCTET2015123106
IJCTET2015123106
 
A QoS Based MAC Protocol For Wireless Ad-hoc Network
A QoS Based MAC Protocol For Wireless Ad-hoc NetworkA QoS Based MAC Protocol For Wireless Ad-hoc Network
A QoS Based MAC Protocol For Wireless Ad-hoc Network
 
Ccn(Data communication and networking) edited solution-manual suitable to be ...
Ccn(Data communication and networking) edited solution-manual suitable to be ...Ccn(Data communication and networking) edited solution-manual suitable to be ...
Ccn(Data communication and networking) edited solution-manual suitable to be ...
 
Simulation based Evaluation of a Simple Channel Distribution Scheme for MANETs
Simulation based Evaluation of a Simple Channel Distribution Scheme for MANETsSimulation based Evaluation of a Simple Channel Distribution Scheme for MANETs
Simulation based Evaluation of a Simple Channel Distribution Scheme for MANETs
 
IT6601 MOBILE COMPUTING UNIT1
IT6601 MOBILE COMPUTING UNIT1IT6601 MOBILE COMPUTING UNIT1
IT6601 MOBILE COMPUTING UNIT1
 
Ad-Hoc Networks
Ad-Hoc NetworksAd-Hoc Networks
Ad-Hoc Networks
 
Some Ccna basic detail
Some Ccna basic detailSome Ccna basic detail
Some Ccna basic detail
 
IEEE 802.11 general questions Summarize and describe the basic funct.pdf
IEEE 802.11 general questions  Summarize and describe the basic funct.pdfIEEE 802.11 general questions  Summarize and describe the basic funct.pdf
IEEE 802.11 general questions Summarize and describe the basic funct.pdf
 
MULTIPLE ACCESS IN WIRELESS COMMUNICATION
MULTIPLE ACCESS IN WIRELESS COMMUNICATIONMULTIPLE ACCESS IN WIRELESS COMMUNICATION
MULTIPLE ACCESS IN WIRELESS COMMUNICATION
 
Computer Networking Tasks.docx
Computer Networking Tasks.docxComputer Networking Tasks.docx
Computer Networking Tasks.docx
 
IT6601 Mobile Computing
IT6601 Mobile  Computing IT6601 Mobile  Computing
IT6601 Mobile Computing
 
Cyclic Sensing MAC Protocol for Multicast Routing in Mobile
Cyclic Sensing MAC Protocol for Multicast Routing in MobileCyclic Sensing MAC Protocol for Multicast Routing in Mobile
Cyclic Sensing MAC Protocol for Multicast Routing in Mobile
 
P26093098
P26093098P26093098
P26093098
 

Recently uploaded

01-vogelsanger-stanag-4178-ed-2-the-new-nato-standard-for-nitrocellulose-test...
01-vogelsanger-stanag-4178-ed-2-the-new-nato-standard-for-nitrocellulose-test...01-vogelsanger-stanag-4178-ed-2-the-new-nato-standard-for-nitrocellulose-test...
01-vogelsanger-stanag-4178-ed-2-the-new-nato-standard-for-nitrocellulose-test...
AshwaniAnuragi1
 
一比一原版(NEU毕业证书)东北大学毕业证成绩单原件一模一样
一比一原版(NEU毕业证书)东北大学毕业证成绩单原件一模一样一比一原版(NEU毕业证书)东北大学毕业证成绩单原件一模一样
一比一原版(NEU毕业证书)东北大学毕业证成绩单原件一模一样
A
 

Recently uploaded (20)

Adsorption (mass transfer operations 2) ppt
Adsorption (mass transfer operations 2) pptAdsorption (mass transfer operations 2) ppt
Adsorption (mass transfer operations 2) ppt
 
Path loss model, OKUMURA Model, Hata Model
Path loss model, OKUMURA Model, Hata ModelPath loss model, OKUMURA Model, Hata Model
Path loss model, OKUMURA Model, Hata Model
 
SLIDESHARE PPT-DECISION MAKING METHODS.pptx
SLIDESHARE PPT-DECISION MAKING METHODS.pptxSLIDESHARE PPT-DECISION MAKING METHODS.pptx
SLIDESHARE PPT-DECISION MAKING METHODS.pptx
 
Independent Solar-Powered Electric Vehicle Charging Station
Independent Solar-Powered Electric Vehicle Charging StationIndependent Solar-Powered Electric Vehicle Charging Station
Independent Solar-Powered Electric Vehicle Charging Station
 
Diploma Engineering Drawing Qp-2024 Ece .pdf
Diploma Engineering Drawing Qp-2024 Ece .pdfDiploma Engineering Drawing Qp-2024 Ece .pdf
Diploma Engineering Drawing Qp-2024 Ece .pdf
 
Signal Processing and Linear System Analysis
Signal Processing and Linear System AnalysisSignal Processing and Linear System Analysis
Signal Processing and Linear System Analysis
 
01-vogelsanger-stanag-4178-ed-2-the-new-nato-standard-for-nitrocellulose-test...
01-vogelsanger-stanag-4178-ed-2-the-new-nato-standard-for-nitrocellulose-test...01-vogelsanger-stanag-4178-ed-2-the-new-nato-standard-for-nitrocellulose-test...
01-vogelsanger-stanag-4178-ed-2-the-new-nato-standard-for-nitrocellulose-test...
 
Working Principle of Echo Sounder and Doppler Effect.pdf
Working Principle of Echo Sounder and Doppler Effect.pdfWorking Principle of Echo Sounder and Doppler Effect.pdf
Working Principle of Echo Sounder and Doppler Effect.pdf
 
analog-vs-digital-communication (concept of analog and digital).pptx
analog-vs-digital-communication (concept of analog and digital).pptxanalog-vs-digital-communication (concept of analog and digital).pptx
analog-vs-digital-communication (concept of analog and digital).pptx
 
CLOUD COMPUTING SERVICES - Cloud Reference Modal
CLOUD COMPUTING SERVICES - Cloud Reference ModalCLOUD COMPUTING SERVICES - Cloud Reference Modal
CLOUD COMPUTING SERVICES - Cloud Reference Modal
 
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
 
UNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptxUNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptx
 
Presentation on Slab, Beam, Column, and Foundation/Footing
Presentation on Slab,  Beam, Column, and Foundation/FootingPresentation on Slab,  Beam, Column, and Foundation/Footing
Presentation on Slab, Beam, Column, and Foundation/Footing
 
一比一原版(NEU毕业证书)东北大学毕业证成绩单原件一模一样
一比一原版(NEU毕业证书)东北大学毕业证成绩单原件一模一样一比一原版(NEU毕业证书)东北大学毕业证成绩单原件一模一样
一比一原版(NEU毕业证书)东北大学毕业证成绩单原件一模一样
 
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdflitvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
 
NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024
NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024
NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024
 
Dynamo Scripts for Task IDs and Space Naming.pptx
Dynamo Scripts for Task IDs and Space Naming.pptxDynamo Scripts for Task IDs and Space Naming.pptx
Dynamo Scripts for Task IDs and Space Naming.pptx
 
Raashid final report on Embedded Systems
Raashid final report on Embedded SystemsRaashid final report on Embedded Systems
Raashid final report on Embedded Systems
 
Developing a smart system for infant incubators using the internet of things ...
Developing a smart system for infant incubators using the internet of things ...Developing a smart system for infant incubators using the internet of things ...
Developing a smart system for infant incubators using the internet of things ...
 
handbook on reinforce concrete and detailing
handbook on reinforce concrete and detailinghandbook on reinforce concrete and detailing
handbook on reinforce concrete and detailing
 

It6601 mc - qb - part a (2) (1)

  • 1. VELAMMAL INSTITUTE OF TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY IT6601 – MOBILE COMPUTING UNIT-I INTRODUCTION 1. What are the benefits of reservation schemes? [April/May 2005] a) No other station is allowed to transmit during this slot b) Avoidance of congestion. c) Waiting time is clearly known. 2. Enumerate the properties of MAC protocols? [Nov/Dec 2010] 1) It should help maximize the utilization of the channel. 2) It should be capable of supporting several types of traffic having different maximum and average bits rates. 3) It should be in the face of equipment failure and changing network conditions. 3. Why CSMA/CD scheme fails in wireless networks? In Carrier Sense Multiple Access/Collision Detection, (CSMA/CD) collisions occur at the receiver and not at the sender. The sender applies carrier sense and detects an idle medium. The sender starts sending but a collision happens at the receiver due to a second sender. The sender detects no collision and assumes that the data has been transmitted without errors, but a collision might actually have destroyed the data at the receiver. The power in the area of the transmitting antenna is several magnitudes higher than the receiving power. 4. Define hidden terminal. [Nov/Dec 2015] The transmission range of A reaches B but not C. The transmission range of C reaches B but not A. B reaches A and C. A cannot detect C and vice versa. A starts sending to B, but C does not receive this transmission. C also wants to send something to B and senses the medium. The medium appears to be free, the carrier sense fails. C also starts sending, causing a collision at B. But A can’t detect this collision at B and continues with its transmission. A is hidden for C and vice versa. 5. What is orthogonal and autocorrelation thickness? [Nov/Dec 2008] Orthogonal: Two vectors are called orthogonal if their inner product is 0. E.g.) the two vectors are(2,5,0) & (0,0,17): (2,5,0)* (0,0,17)=0+0+0. Autocorrelation: The barker code (+1, -1, +1, +1, -1, +1, +1, +1, -1, -1, -1) for example has a good autocorrelation (i.e.) the inner product with itself is large the result is 11. 6. Draw the taxonomy of MAC protocol?
  • 2. 7. What is mobile computing? List out the characteristics of mobile computing. [A/M 11] Mobile computing is the computational technique used for the people to access information from anywhere and at anytime. It is also called as ubiquitous computing and also nomadic computing. The characteristics of mobile computing are: 1]location awareness 2]Ubiquity 3]Adaptation 4]Broadcast 5]Personalization 8. Define CDMA. [Nov/Dec 2012] Code Division Multiple Access systems use codes with certain characteristics to separate different users. To enable access to the shared medium without interference. The users use the same frequency and time to transmit data. The main problem is to find good codes and to separate this signal from noise. The good code can be found the following 2 characteristic 1. Orthogonal. 2. Auto Correlation. 9. What the features are of Code Division multiple Accesses? It does not require external synchronization networks. • CDMA offers gradual degradation in performance when the no. of users is increased But it is easy to add new user to the system. If offers an external interference rejection capability. 10. How are guard spaces realized between users in CDMA? The guard space between a pair of users in CDMA systems is the orthogonality between their spreading codes. The lower the correlation between any pair of spreading codes is, the better is the user separation.
  • 3. 11. What are the several versions in CSMA? [Nov/Dec 2014] There are several versions in CSMA, they are as follows a) Non-persistent CSMA b) p-persistent CSMA c) 1-persistent CSMA 12. What is meant by non-persistent CSMA? In, non-persistent CSMA, stations sense the carrier and start sending immediately if the medium is idle, if the medium is busy, the station pauses a random amount of time before sensing the medium again and repeating this pattern. 13. What is meant by p-persistent CSMA? [Nov/Dec 2014] In p-persistent CSMA system nodes also sense the medium, but only transmit with a probability of p. With the station deferring to the next slot with the probability1-p, i.e. access is slotted in addition. 14. What is the difference between wireless networking(communication) and Mobile computing? Or Distinguish between mobile computing and wireless networking. 15. What are applications of Mobile Computing? [Nov/Dec 2014] • Vehicles • Emergencies • Business • Replacement of wired networks • Infotainment • Location dependent services • Follow-on services • Location aware services
  • 4. 16. What is the function of Medium Access Control Layer? [Nov/Dec 2013] or State the need for Medium access control in network communication. The functions of Medium Access Control Layer are responsible for establishes, maintains, and releases channels for higher layers by activating and deactivating physical channels 17. Distinguish FDMA and TDMA [Nov/Dec 12] Time division multiple access (TDMA) is a channel access method for shared medium (usually radio) networks. It allows several users to share the same frequency channel by dividing the signal into different time slots. This allows multiple stations to share the same transmission medium (e.g. radio frequency channel) while using only a part of its channel capacity. Frequency Division Multiple Access or FDMA is a channel access method used in multiple-access protocols as a channelization protocol. FDMA gives users an individual allocation of one or several frequency bands, allowing them to utilize the allocated radio spectrum without interfering with each other. 18. Give the use of SDMA. What is SDMA? [May/Jun 2013] Space Division Multiple Access (SDMA) is used for allocating separated spaces to users in wireless networks. The basis for the SDMA algorithm is formed by cells and sectored antennas which constitute the infrastructure implementing space division multiplexing (SDM). 19. What is the difference between CSMA CA and CSMA CD? CSMA/CD: Carrier Sense Multiple Access / Collision Detection. When a collision is detected, all the stations will stop transmitting and wait a random length of time before retransmitting. It is used in Ethernet networks CSMA/CA: Carrier Sense Multiple Access / Collision Avoidance. Instead of detecting and reacting to collisions, CSMA/CA tries to avoid the collision by having each computer signal its intention to transmit before the actual transmission. i.e Pre fixed timing for each station. It is used in Apple networks and WiFi. 20. How MACA solves the exposed terminal problem? [Nov/Dec 2015] By using MACA, B has to transmit an RTS(Ready to Send) first containing the name of the receiver (A) and the sender (B). C does not react to this message as it is not the receiver, but A acknowledge using a CTS (Clear to Send) which identifies B as the sender and A as the receiver of the data transmission. C does not receive these CTS and concludes that A is outside the range. Therefore, C
  • 5. can start its transmission assuming it will not cause a collision at A. Thus the problem with exposed terminal is solved. UNIT 2 MOBILE INTERNET PROTOCOL AND TRANSPORT LAYER 1. How do you classify TCPs? (May 2012) a. TCP in single hop wireless networks  Indirect TCP (I-TCP)  Fast retransmission  Snooping TCP(S-TCP)  Mobile TCP(M-TCP)  Freeze TCP b. TCP in multihop wireless networks 2. What are the possible locations of tunnel end point in mobile IP? (June 2014) (Or) What are the possible locations for care of Address? (Dec 2013) Tunnel is a secure path from HA to FA that ensures the successful delivery of packets to the MN.Care of Address is a termination point of a tunnel toward a MH, for data grams forwarded to the MH while it is away from home. 1. Foreign agent care-of address: the address of a foreign agent that MH registers with 2. co-located care-of address: an externally obtained local address that a MH gets. 3. What should be the value of TTL field in the IP packet of agent advertisement? (June 2014) The value of TTL field in the IP packet of agent advertisement is set to “1” for all advertisements to avoid forwarding them. 4. What is Care of Address? Differentiate types of Care of Address. (Dec 2012) Care of Address gives the current location of the mobile Node. There are two types of CoA. They are: • Foreign agent care-of address (FACoA): The mobile node receives the same CoA as the foreign agent. All mobile nodes in the foreign network are given the same CoA. • Co-located care-of address(Co-CoA): A mobile node acquires a co-located care-of address as a local IP address through some external means, which the mobile node then associates with one of its own network interfaces. The address might be dynamically acquired as a temporary address by the mobile node, such as through DHCP.
  • 6. 5. When and why binding update is generated in mobile IP? (May 2015(MP)) A binding is the association of the home address with a care-of address. Binding Update (BU) message is used to notify the respective node about current location (CoA) of the MN. BU is sent by HA to CN. The message contains the fixed IP address of the mobile node and the care-of-address. 6. List the requirements for mobile IP. (Dec 2014(MP))  Compatibility  Transparency  Scalability  Efficiency and  Security 7. List the advantages in transaction - oriented TCP. (Nov 2015) (June 2012) 1. RFC1644, T-TCP, describes a TCP version to avoid this overhead. 2. Connection setup, data transfer and connection release can be combined. 3. Thus, only 2 or 3 packets are needed. 4. It is highly efficient. 8. What advantage does the use of IPV6 offer for mobility?(Nov 2015) IPv6 mobility provides a mechanism for the host to roam around different links without losing any communication/connection and its IP address 9. What is Selective retransmission? (Dec 2012) Selective retransmission allows for acknowledgements of single packets, not only acknowledgements of in-sequence packet streams without gaps. Sender can now retransmit only the missing packets 10. Why does I –TCP isolate problems on Wireless Link? (May 2013) I-TCP splits the connection into two parts – a wired/fixed and a wireless/mobile part. This isolates problems on the wireless link from the fixed network. However, this also requires that intermediate systems are able to look into IP packets to split the connection. This prevents the usage of IPsec – end-to-end security and I-TCP (or proxy solutions in general) does not go together.
  • 7. 11. What is Timeout freezing?(May 2013) • Mobile hosts can be disconnected for a longer time - no packet exchange is possible, e.g., in a tunnel, disconnection due to overloaded cells or mux. • with higher priority traffic TCP disconnects after time-out completely • TCP freezing MAC layer is often able to detect interruption in advance MAC can inform TCP layer of upcoming loss of connection TCP stops sending, but does now not assume a congested link MAC layer signals again if reconnected 12. Differentiate Snooping and mobile TCP.(Nov 2014) Snooping TCP Mobile TCP Foreign agent buffers all packets with destination mobile host and additionally snoops the packet flow in both direction that is (MH-FA and FA-CH) Splits the TCP connection into an unmodified TCP between the standard host and supervisory host (SH) and an optimized TCP between the SH and MH. SH is responsible for exchanging data between both parts. 13. Define triangular routing.(Nov. 2015) In the mobile IP, packets that are sent to a mobile host by the correspondent host are first routed to the mobile host's home agent and then forwarded to the mobile host at its current location by its home agent. 14. Give the advantages and disadvantages of Indirect – TCP. (May 2015) Advantages of I-TCP:  I-TCP segments a TCP connection into a fixed and wireless part.  It does not require any changes in the TCP protocol.  Transmission errors on wireless link do not propagate into the fixed network.
  • 8.  Allows the use of a different transport layer protocol between foreign agent and mobile host.  Optimizations of new mechanisms are easy. Disadvantages of I- TCP:  Increased Handover Latency  The Foreign agent must be a trusted entity.  Loss of end-end semantics of TCP causes problems. 15. What is the use of DHCP? (May 2015) DHCP is a Dynamic Host Configuration Protocol (DHCP) used to simplify the installation and maintenance of networked computers. If a new computer is connected to the network, DHCP can provide it with all the necessary information for full system integration into the network. 16. Differentiate Foreign and Home Agent in Mobile IP technology. (Nov 2012) Home Agent (HA) • system in the home network of the MN, typically a router • registers the location of the MN, tunnels IP datagrams to the COA Foreign Agent (FA) • system in the current foreign network of the MN, typically a router • forwards the tunneled datagrams to the MN, typically also the default router for the MN 17. What is generic routing encapsulation? Generic routing encapsulation (GRE) is an encapsulation scheme which supports other network protocols in addition to IP. It allows the encapsulation of packets of one protocol suite into the payload portion of a packet of another protocol suite. 18. What is called the exponential growth of the congestion window? [Nov/Dec 09]
  • 9. The sender always calculate congestion window for a window start size of the congestion window is one segment. Sender sends one packet and waits for acknowledgement. If acknowledgement arise it raises the level of congestion window by one. If sender sends two packet if acknowledgement arises it raises the level of congestion window by two. This scheme raises the level of congestion window every time the acknowledges come back, which takes roundtrip time(RTT).This is called the exponential growth of the congestion window. 19. What is Fast retransmit? [Nov/Dec 11] In TCP, a receiver sends acknowledgements only if it receive any packets from the sender. Thus receiving acknowledgements from a receiver shows additionally that the receiver continuously receives something from the sender. Therefore, the gap in the packet stream is not due to severe congestion, but a simple packet loss due to a transmission error. The sender can now retransmit the missing packets before the timer expires. This behaviour is called fast retransmit. 20. What is fast recovery? [Nov/Dec 11] The receipt of acknowledgement shows that there is no congestion justifying slow start. The sender can continue with the current congestion window. The sender performs a fast recovery from the packet loss. This mechanism can improve the efficiency of TCP dramatically. UNIT III TELECOMMUNICATION SYSTEMS 1. Define GSM. [MAY/JUN 2007]  GSM (Global System for Mobile communication) is a digital mobile telephony system that is widely used in Europe and other parts of the world. GSM uses a variation of time division multiple access (TDMA) and is the most widely used of the three digital wirelesstelephony technologies (TDMA, GSM, and CDMA).  GSM digitizes and compresses data, then sends it down a channel with two other streams of user data, each in its own time slot. It operates at either the 900 MHz or 1800 MHz frequency band. 2. List the three different categories of services of GSM. [NOV/DEC 2007] (or)
  • 10. What are the types of services in GSM? [MAY/JUN 2014]  Bearer services  Tele services  Supplementary services 3. What are the two basic classes of handover? [APR/MAY 2011] There are two basic classes in handover: Hard handover: Switching between different antennas or different system is performed at a certain point in time. Soft handover: This is a new real mechanism in UMTS compare to GSM and this only available in FDD mode. 4. Distinguish between soft handover and hard handover? [APR/MAY 2010] A hard handover is one in which the channel in the source cell is released and only then the channel in the target cell is engaged. Thus the connection to the source is broken before or 'as' the connection to the target is made—for this reason such handovers are also known as break-before-make. A soft handover is one in which the channel in the source cell is retained and used for a while in parallel with the channel in the target cell. In this case the connection to the target is established before the connection to the source is broken, hence this handover is called make-before-break. Hard Hand - Off  Occurs in GSM  Available in FDD / TDD modes  Inter frequency handover, Inter system handover Soft Hand - Off  Occurs in UMTS  Available only in FDD mode  Macro diversity 5. What are the different control channels used in GSM? [NOV/DEC 2012] The control channel groups in GSM are:  Broadcast control channel (BCCH)  Common control channel (CCCH)
  • 11.  Dedicated control channel (DCCH) 6. What are the four types of handover available in GSM? [NOV/DEC 2011]  Intra cell Handover  Inter cell Intra BSC Handover  Inter BSC Intra MSC handover  Inter MSC Handover 7. Why are so many different identifiers/address needed in GSM? [MAY/JUNE2012] Users of the GSM systems work with telephone numbers. That is all users should see. These phone numbers are completely independent of the current location of the user. The system itself needs some additional information; however, it must not reveal the identity of users. The international identification of users is done with the IMSI (=country code + network code + subscriber ID). During operation within a location area, only a temporary identifier, the TMSI is needed. This hides the identity of a user. The TMSI is not forwarded to the HLR. But instead another temporary number reflects the location and any roaming required is the MSRN is used internally by the system. 8. What are the security services offered by GSM? [NOV/DEC 2012] The security services offered by GSM are:  Access control and authentication.  Confidentiality.  Anonymity. 9. How is authentication done in GSM networks? [NOV/DEC 2013] The GSM network authenticates the identity of the subscriber through the use of a challenge-response mechanism. A 128-bit Random Number (RAND) is sent to the MS. The MS computes the 32-bit Signed Response (SRES) based on the encryption of the RAND with the authentication algorithm (A3) using the individual subscriber authentication key (Ki). Upon receiving the SRES from the subscriber, the GSM network repeats the calculation to verify the identity of the subscriber. If the received SRES agrees with the calculated value, the MS has been successfully authenticated and may continue. If the values do not match, the connection is terminated and an authentication failure is indicated to the MS.
  • 12. 10. What are the advantages and disadvantages of GSM? [NOV/DEC 2014] Advantages  Communication  Total mobility  Worldwide connectivity  High capacity  High transmission quality  Security functions Disadvantages  No end-to-end encryption of user data  Reduced concentration while moving  Electromagnetic radiation  High complexity of system  Several incompatibilities within the GSM standards 11. What are the services provided by supplementary services? [MAY/JUN 2009]  User identification  Call redirection  Call forwarding  Closed user groups  Multiparty Communication 12. Distinguish between mobile terminated call and mobile originated call. [NOV/DEC 2011]
  • 13. MOC-Mobile Originating Call MTC-Mobile Terminating Call The Mobile/MS which initiate a Call is known as MOC, whereas the destination Mobile/MS for which the call has been initiate is known as MTC. MOC: MS (A party)->BSC->MSC/VLR MTC: MSC/VLR->BSC->MS (B party) MOC starts from A party sending service request to core network MTC starts when core network receives B number and start analysis for paging, or IAM sending 13. What is meant by GPRS? [NOV/DEC 2008] The General Packet Radio Service provides packet mode transfer for applications that exhibit traffic patterns such as frequent transmission of small volumes. General Packet Radio Services (GPRS) is a packet-based wireless communication service that promises data rates from 56 up to 114 Kbps and continuous connection to the Internet for mobile phone and computer users. 14. What is meant by GGSN and SGSN? [NOV/DEC 2007] GGSN is Gateway GPRS Support Node. It is the inter-working unit between the GPRS network and external packet data networks. The GGSN is connected to external networks via the Gi interface and transfers packets to the SGSN via an IPbased GPRS backbone network. SGSN is Serving GPRS Support Node. It supports the MS via the Gb interface. The GSN is connected to a BSC via frame relay. 15. What are the new components added to GPRS network? [MAY/JUN 2012] Two new components, called Gateway GPRS Support Nodes (GSNs) and, Serving GPRS Support Node (SGSN) are added. 16. Specify the functions provided by radio network subsystem (RNS). [MAY/JUN 2008]  Radio channel ciphering  Deciphering  Handover Control  Radio resource management
  • 14. 17. Mention the advantages and drawbacks of GPRS. [MAY/JUN 2012 - ME] Advantages  Allow broadcast, multicast and unicast services  Cheaper packet transfer for internet applications  Needs no connection setup prior to data transfer Disadvantages  Needs additional hardware and software 18. Mention the applications of GPRS [NOV/DEC 2011 - ME]  Communications—E-mail; fax; unified messaging; intranet/Internet access  Value-added services—Information services; games  E-commerce—Retail; ticket purchasing; banking; financial trading  Location-based applications—Navigation; traffic conditions; airline/rail schedules; location finder  Vertical applications—Freight delivery; fleet management; sales-force automation  Advertising 19. Define UMTS. [MAY/JUN 2010 - ME]  The Universal Mobile Telecommunication System (UMTS) is a third generation (3G) mobile communications system that provides a range of broadband services to the world of wireless and mobile communications.  UMTS delivers low-cost, mobile communications at data rates of up to 2 Mbps. It preserves the global roaming capability of second generation GSM/GPRS networks and provides new enhanced capabilities. 20. What are the advantages and disadvantages of UMTS? [MAY/JUN 2013 - ME] Advantages:  Overcrowding is relieved in existing systems with radio spectrum  Bandwidth, security and reliability are more
  • 15.  Provides interoperability among service providers  Availability of fixed and variable rates  Always online devices – 3G uses IP connectivity which is packet based  Rich multi-media services are available Disadvantages:  Roaming and data/voice work together has not yet been implemented  Needs different handset  The cost of cellular infrastructure , upgrading base stations is very high  Power consumption is high  Requires closer base stations and are expensive UNIT IV PART A 1. What are the differences between AODV and the standard distance vector algorithm? Why are extensions needed? [APR/MAY 2008] AODV is capable of both unicast and multicast routing. It is a reactive routing protocol, meaning that it establishes a route to a destination only on demand Routers use distance vectorbased routing protocols to periodicallyadvertise the routes in their routing tables. Routing information exchanged between typical distance vectorbased routers is unsynchronized and unacknowledged. AODV is a reactive protocol. Route calculation is only performed if necessary. This improves scalability under light load, but causes a higher initial latency. 2. What are the drawbacks of wired networks? [APR/MAY 2010]  Running the wires from each room within the home can be a difficult task.  Network cables can look disorganized.  Network cables can disconnect or become faulty consequently causing the connection to fail.  Adding more computers to a wired network may result in unexpected expense if you run out of connections on your network and could slow down the network.  All wired networks differ from each other. The most familiar type of wired network is an Ethernet network.
  • 16. 3. Distinguish between infrastructure and ad hoc networks. [NOV/DEC 2012] Infrastructure networks not only provide access to other networks, but also include forwarding functions, medium access control etc. In these infrastructure based wireless networks, communication typically takes place only between the wireless nodes and the access point, but not directly between the wireless nodes. Ad-hoc wireless networks, however ,do not need any infrastructure to work .Each node can communicate directly with other nodes, so no access point controlling medium access is necessary. 4. Differentiate wired networks routing from ad-hoc wireless networks routing. [NOV/DEC 2011] S.No Wired Networks Adhoc Networks 1 Nodes do not participate in packet routing Each node acts as a router 2 Topology is static Topology is dynamic 3 Simple IP-based addressing scheme is deployed Simple IP-based addressing scheme is deployed 5. Mention certain situation where Ad hoc networks are the only choice. [NOV/DEC 2012]  Instant requirements  Natural disasters  Remote areas  Effectiveness 6. Write any two factors that affect the performance of Adhoc networking. [NOV/DEC 2013]  Throughput  Average routing overhead  Power consumption 7. Discuss some of the routing metrics to be considered in a mobile network layer? [NOV/DEC 2007]  HOP counting  Destination sequence distance vector  Dynamic source routing  Least interference routing 8. Why is routing in multi-hop adhoc networks complicated? [MAY/JUN 2007]
  • 17. Routing is complicated because of frequent topology changes, differentcapabilities of the nodes, varying propagation characteristics. Further, no controlinstance can support routing. 9. What are the differences between wired networks and adhoc wireless networks related to routing? [MAY/JUNE2012] S. No Factor Wired Network Wireless Network 1 Asymmetric links Routing algorithm asymmetric Routing algorithm symmetric 2 Redundant links Less number of redundant links More number of redundant link 3 Interference Links exist only where a wire exist Links come and go depending transmission characteristics. 10. What are adhoc networks? [MAY/JUN 2009] A wireless ad-hoc network is a decentralized type of wireless network. The network is ad hoc because it does not rely on a preexisting infrastructure, such as routers in wired networks or access points in managed (infrastructure) wireless networks. Instead, each node participates in routing by forwarding data for other nodes, and so the determination of which nodes forward data is made dynamically based on the network connectivity. In addition to the classic routing, ad hoc networks can use flooding for forwarding the data. 11. List out the some of the popular Routing protocols.[MAY/JUN 2010] DSDV(Destination Sequence Distance Vector) DSR(Dynamic Source Routing) AODV(Ad-Hoc On Demand Vector Routing) ZRP (Zone Routing Protocol) Multicast Routing Protocol 12. Define VANET. [NOV/DEC 2010] Vehicular Ad-Hoc Network, or VANET, is a form of mobile ad-hoc network, to provide communications among nearby vehicles and between vehicles and nearest fixed equipment, usually described as roadside equipment. 13. How VANET differs from MANET?[MAY/JUN 2012] Similar to Mobile ad hoc networks (MANETs), nodes in VANETs self-organize and self-manage information in a distributed fashion without a centralized authority or a server dictating the
  • 18. communication. In this type of network, nodes engage themselves as servers and/or clients, thereby exchanging and sharing information like peers. Moreover, nodes are mobile, thus making data transmission less reliable and suboptimal. Apart from these characteristics, VANETs possess a few distinguishing characteristics: • Highly dynamic topology • Frequently disconnected network • Patterned Mobility • Propagation Model • Unlimited Battery Power and Storage • On Board Sensors 14. What are the security requirements in VANET? [QB] • Authentication • Availability • Non Repudiation • Privacy • Data verification 15. What is the difference between proactive and reactive routing protocol ? May/June 2015 A proactive routing protocol is also called a “table-driven” routing protocol. In this, nodes continuously evaluate routes to all reachable nodes and attempt to maintain consistent, up-to-date routing information. Therefore, a source node can get a routing path immediately if it needs one.Reactive routing protocols for mobile ad hoc networks are also called “on-demand” routing protocols. In a reactive routing protocol, routing paths are searched only when needed.
  • 19. 16. Define DSR protocol. [NOV/DEC 2011] • Dynamic Source Routing is a source initiated on-demand routing protocol for ad-hoc networks. • In this protocol, the nodes do not need to exchange the routing table information periodically, which helps to reduce the bandwidth overhead associated with this protocol. 17. Define ZRP. [QB] The Zone Routing Protocol is a hybrid protocol. It incorporates the merits of both on-demand and proactive routing protocol. A routing zone comprises a few MANET nodes within a few hops from the central zone. Within a zone, a table-driven routing protocol is used. 18. What are the design issues in ad hoc networks? May/June 2013 • Network size and node density • Connectivity • Network Topology • User Traffic • Operational Environment • Energy Constraint 19. What are the characteristics/features of Adhoc networks? [QB] • Lack of fixed infrastructure • Dynamic Topologies • Bandwidth constrained, variable capacity links
  • 20. • Energy constrained operation • Increased vulnerability 20. What are the important steps to be performed in the operation of DSDV?[MAY/JUN 2013] • Each router in the network collects route information from all its neighbours. • After gathering information, the node determines the shortest path to the destination based on the gathered information. • Based on the gathered information, a new routing table is generated. • The router broadcasts this table to its neighbours. On receipt by the neighbours, the node re computes their respective routing table. • This process continues till the routing information becomes stable. UNIT V PART – A 1. What are the constraints of Mobile O/S? [QB] The special constraints of mobile o/s are; • Limited memory • Limited screen size • Miniature keyboard • Limited processing power • Limited battery power • Limited and fluctuating bandwidth of the wireless medium 2. What are the requirements of Mobile O/S? [QB] • Support for specific communication protocols • Support for a variety of input mechanisms • Compliance with open standards • Extensive library support 3. Define Windows Mobile. [QB]
  • 21. • Window Mobile operating system is based on Pocket PC 2000 and was targeted as an operating system for mobile phones which the different vendors can use in their cell phones. 4. What is palm OS? [QB] • Palm OS is a Proprietary operating system that was developed by Palm Computing . • It was designed with the provision of a touch screen based graphical user interface. • It has an elementary memory management system, to keep the operating system small and fast. 5. Define Symbian OS? [QB] The key features of Symbian os are: • It supports a number of communication and networking protocols including TCP, UDP, PPP, DNS, FTP etc. • It also supports pre-emptive multitasking scheduling and memory protection. • Symbian is a micro kernel based operating system. 6. What is iOS? [QB] • iOS is a closed and proprietary operating system fully owned and controlled by Apple and not designed to be used by various mobile phones vendors on their systems. 7. Define M-Commerce. [QB] • Mobile Commerce involves carrying out an activity related to buying and selling of commodities, service or information using the mobile hand-held devices. 8. What are the applications of M-Commerce? [QB] • Business –to-consumer application • Business-to-business application 9. State the functionalities of Mobile commerce framework? [QB] • Mobile devices • Mobile middleware • Networks • Host computers
  • 22. 10. What are the advantages of M-Commerce? [QB] • The benefits of using m-Commerce include customer convenience, cost saving and new business opportunities. • It provides the flexibility of anytime, anywhere shopping using a light weight device. • It can be highly personalized 11. What are disadvantages of M-commerce? [QB] • It do not offer graphics of a PC. • The users are constrained to use small screen and keyboard and low resolution pictures and videos. • The small screens of mobile devices limit the complexity of application. 12. What are the three popular types of mobile payment schemes? [QB] • Bank account based • Credit card based • Micropayment. 13. What are the security issues in M-commerce? [QB] • It is anticipated to introduce new security and privacy risks those found in theE- commerce. • It provides facility against risk of lost or theft. 14. Define micropayment. [QB] • It is intended for payment for small purchases such as from vending machines. • The mobile devices can communicate with the vending machine directly using a Bluetooth or wireless LAN connection to negotiate the payment and then the micropayment is carried out. 15. Define Android.[QB] • Android is an operating system for mobile devices based on Linux. • Android is used as open source software for mobile devices. • Google embed its search engine into Android, the way Internet Explorer is embedded into windows. 16. Draw the structure of Android.[QB]
  • 23. Application Layer Application Framework Libraries and Runtime Kernel 17. Define Blackberry OS.[QB] Blackberry operating system is a proprietary operating system designed for blackberry smartphones produced by Research In Motion Limited (RIM). Being a proprietary operating system, details of its architecture have not been published. It provides a very good email system. 18. What are the applications of M-Commerce?[QB] • Advertising • Comparison shopping • Information about a product • Mobile Ticketing • Loyalty and payment services • Catalogue shopping 19. Draw the structure of M-Commerce.[QB]
  • 24. 20. What are the features required for a mobile device to enable mobile commerce? [QB] • Good internet connectivity • Ability to dispatch rich content such as image. • Have a good quality camera with auto focus. • Ability to read the RFID tags.