SlideShare a Scribd company logo
1 of 12
QUESTION BANK
DEPARTMENT OF INFORMATION TECHNOLOGY
Academic year : 2019-2020 Subject Code : IT8602
Year / Semester : III / VI
Course Code (as
per NBA)
:R17C312
Name of the Subject :MOBILE COMMUNICATION
Name of Staff with
designation/Department
:Ms.Kaviya.P, AP/IT
Course Outcomes(COs)
CO Code CO Statement
Blooms
Taxonomy
Level
R17C312.1
Explain the evolution of mobile communication and the
existing MAC protocols
K2
R17C312.2
Illustrate the generations of telecommunication systems in
wireless network along with their routing, mobility and
security issues
K2
R17C312.3
Outline the architecture of various Wireless LAN
technologies such as Wireless LAN, Bluetooth and WiFi
Technologies
K2
R17C312.4
Summarize the functionalities of network layer with their
routing protocols and recognize the security issues related
an Ad hoc networks
K2
R17C312.5
Explain the functionalities of Transport and Application
layer in a mobile network
K2
Prepared by
Name &Signature of Staff member Signature of HOD
DEPARTMENT OF INFORMATION TECHNOLOGY
Course : B.Tech Subject Code : IT8602
Staff Name : Kaviya.P Subject Name : MOBILE COMMUNICATION
Class : IIIIT Academic Year: 2019 - 2020 EVEN
QUESTION BANK
UNIT I - INTRODUCTION
Introduction to Mobile Computing – Applications of Mobile Computing- Generations of Mobile Communication
Technologies-MAC Protocols – SDMA- TDMA- FDMA- CDMA
Q.No Questions Marks
Knowledg
e Level
No. of
times
in AU
PART-A
Introduction to Mobile Computing
1. Define mobile computing. [May 2019, Nov 2019]
2
K1 2
2. List the advantages of mobile computing. [May 2016] K1 1
3. What are the limitations of Mobile Computing? [Nov 2016] K1 1
4.
Differentiate mobile computing and Wireless Networking.
[May 2017, Nov 2017, May 2018]
K2 3
5.
What are the challenges in Mobile communication?
[Nov 2018]
K1 1
Applications of Mobile Computing
6. List the applications of Mobile Computing.
2
K1
7. List some Mobile and Wireless devices. K1
Generations of Mobile Communication Technologies
8. List the Wireless LAN technologies.
2
K1
9. State some cellular phone standards. K1
MAC Protocols
10. What is the motivation for a specialized MAC? [May 2012]
2
K1 1
11. State the objectives of MAC protocols. [Nov 2018] K1 1
12. List the issues in wireless MAC. [May 2018, Nov 2019] K1 2
13.
Differentiate hidden and exposed terminal problems in infrastructure-
less network. [May 2016]
K2 1
14.
“MAC protocol designed for infrastructure based wireless network may
not work satisfactory in infrastructure-less environment.” – Justify.
[Nov 2017]
K2 1
15. Which TDMA scheme is suitable for satellite systems? [May 2014] K1 1
16.
List some random assignment schemes in MAC.
[Nov 2016, May 2017]
K1 2
17.
Give some examples of reservation-based schemes in MAC protocols.
[May 2019]
K1 1
18. Draw the frequency assignment for radio transmission.[May 2013] K1 1
19.
Justify that a Barker code has good autocorrelation.
[Nov 2012, Nov 2013]
K2 2
PART-B
Introduction to Mobile Computing
1.
Describe the characteristics of Mobile Computing.
[May 2016, May 2018, May 2019]
6 / 5 K2 3
Applications of Mobile Computing
2. Describe the applications of mobile computing. [Nov 2016, May 2017] 8 K2 2
Generations of Mobile Communication Technologies
3. Explain in detail about various technologies in mobile communication. 13 K2
MAC Protocols
4.
Explain in detail about the motivation for a specialized MAC.
[May 2013]
10 K2 1
5. Explain the wireless MAC protocol issues in detail. [May 2017] 8 K2 1
6.
Explain in detail about hidden terminal problem and exposed terminal
problem. [Nov 2017, Nov 2018]
8 / 13 K2 2
7.
Compare the characteristic features of FDMA, TDMA, and CDMA
mechanisms. [Nov 2011, May 2012, Nov 2016]
6 / 16
K2 6
8.
Compare and contrast SDMA, FDMA, TDMA, and CDMA.
[Nov 2012, May 2013, Nov 2013]
10 / 8 /
12
9.
Explain clearly the various schemes for Medium Access Control with
Time Division Multiple Access. [Nov 2012]
16 K2 1
10.
What is CSMA? What are the categories of CSMA? Explain their
working with advantages and disadvantages. [May 2018]
7 K2 1
11.
Explain in detail Multiple Access with Collision Avoidance scheme.
Also explain the advantage of the same. [Nov 2013]
12
K2 2
12.
What is hidden and exposed terminal problem? Explain how Multiple
Access with Collision Avoidance scheme avoids hidden and exposed
terminal problem. [May 2014]
16
13.
Explain with an example the behavior of CDMA with the spreading
using orthogonal codes. [May 2014]
8 K2 1
PART-C
1.
Apply mobile computing to design Taxi dispatcher and monitoring
service. Explain the components in detail. [May 2018]
7 K3 1
2. Consider the following scenarios:
i. Node A and C want to transmit data to B at the same time.
ii. Node B transmits data to Node A meanwhile Node C wants to
transmit data to Node D in the network.
Identify the problems during this data transmission. Explain it. Suggest
a method of your choice to overcome this problem.
14 K3
3.
Consider a scenario of video conferencing in mobile network with 10
participants. During the transmission of data in a low congestion
network suddenly, if 100 participants are involved in transmission in
the same network, what are the problems you face and list out the
MAC protocols that you would suggest for efficient channel access and
data transmission in congested network?
14 K3
Staff In-charge Subject Matter Expert HoD/IT
DEPARTMENT OF INFORMATION TECHNOLOGY
Course : B.Tech Subject Code : IT8602
Staff Name : Kaviya.P Subject Name : MOBILE COMMUNICATION
Class : IIIIT Academic Year: 2019 - 2020 EVEN
QUESTION BANK
UNIT II -MOBILE TELECOMMUNICATION SYSTEM
GSM – Architecture – Protocols – Connection Establishment – Frequency Allocation – Routing – Mobility
Management – Security –GPRS- UMTS- Architecture
Q.No Questions Marks
Knowledge
Level
No. of
times
in AU
PART-A
GSM
1. List the standards similar to GSM. [May 2012]
2
K1 1
2.
What is frequency range of uplink and downlink in GSM network?
[May 2018]
K1 1
3. State the pros and cons of GSM. [Nov 2011] K1 1
4. List the subsystems of GSM. [Nov 2018] K1 1
5. What is the information stored in SIM? [May 2018] K1 1
6. Name the Teleservices provided by GSM. [May 2017, Nov 2019] K1 2
7. Write about the supplementary services in GSM. [Nov 2016] K1 1
8. State the purpose of Home Location Register (HLR). [Nov 2018] K1 1
9. What is Equipment Identity Register? [Nov 2013] K1 1
10.
Give the block diagram of subscriber authentication in GSM
architecture. [May 2014]
K1 1
11. List the 3 important features of GSM security. [May 2016] K1 1
12. What is handoff? List out its characteristics. [May 2013] K1 1
13. Differentiate soft and hard handoff. [Nov 2011] K2 1
14. Draw a model to illustrate the effect of handoff. [May 2012] K1 1
15. Define handoff. What are its types? [Nov 2012, Nov 2017] K1 2
16. What are the reasons for handover?[Nov 2013] K1 1
GPRS
17. What is the functionality of GGSN? [May 2014, Nov 2018]
2
K1 2
18. Draw the GPRS transport plane. [May 2012] K1 1
19. What are the advantages of GPRS? [Nov 2012] K1 1
20. Identify the services offered by GPRS.[Nov 2017, May 2019] K1 2
21. In which way GPRS is better than GSM? [Nov 2019] K2 1
UMTS
22. What are the main elements of UMTS?[May 2016]
2
K1 1
23.
List out the advantages of UMTS networks over 2G networks.
[May 2019]
K1 1
PART-B
GSM
1. Outline the services offered by GSM.[May 2019] 7 K2 1
2.
Describe GSM architecture and its services in detail. [May 2016,
Nov 2017]
8 /16 K2 2
3.
Explain the mobile services, system architecture, localization and
calling of GSM in detail. [Nov 2012]
16 K2 1
4.
Explain in detail about the system architecture of Global System for
Mobile communication. [Nov 2011, May 2012, May 2013, Nov
2013, May 2017, Nov 2018, Nov 2019]
16 / 8 /
13
K2 7
5.
Explain in detail the architecture of GSM. Also explain mobility
management and handover. [May 2014]
16 K2 1
6.
Explain the message flow between mobile station and BTS during
Mobile Originated call with suitable illustrations.
[Nov 2013, May 2014]
8 / 4 K2 2
7.
Explain security services of GSM system.
[Nov 2012, Nov 2013, May 2019]
6 / 8 K2
5
8. Explain GSM Authentication and Security. [May 2016, Nov 2016] 8 / 6 K2
9.
Explain in detail about the handovers of GSM.
[May 2013, Nov 2016]
6 / 8 K2
3
10.
Write in detail about the various types of handover in GSM. Also
discuss the timeline diagram of the Intra MSC handover. [May 2018]
13 K2
GPRS
11.
Discuss GPRS architecture and data services in detail.
[Nov 2011, Nov 2012, Nov 2019]
10 / 16 K2
512.
Draw and explain the architecture of GPRS. List its advantages and
limitations. [May 2019]
13 K2
13.
What are the advantages of GPRS over GSM? Also explain the
architecture of GPRS. [Nov 2013]
8 K2
14. Explain GPRS and its Protocol architecture. [May 2016] 8 K2 1
15.
Explain the functions of GPRS protocol stack with a diagram.
[Nov 2016, May 2017]
8 / 16 K2 2
UMTS
16.
Explain in detail about UMTS architecture and its services.
[May 2016, Nov 2016, Nov 2017, May 2018]
8 / 16
/13
K2 4
17.
What is UMTS? Describe the function of HLR and VLR in call
routing and roaming. [Nov 2018]
13 K2 1
PART C
1.
Node A wants to communicate with Node B located at different
geographical location. Model the call initiation and call termination
steps in GSM.
14 K3
2.
In cellular networks, build the various handover mechanisms used
when the mobile station moves out of station that causes decrease in
received signal strength or due to increase in load.
14 K3
3.
GSM allows a subscriber to move throughout the coverage area with
a capability to make or receive calls. Sketch the components
involved in make or receive calls in roaming.
14 K3
Staff In-charge Subject Matter Expert HoD/IT
DEPARTMENT OF INFORMATION TECHNOLOGY
Course : B.Tech Subject Code : IT8602
Staff Name : Kaviya.P Subject Name : MOBILE COMMUNICATION
Class : IIIIT Academic Year: 2019 - 2020 EVEN
QUESTION BANK
UNIT III -WIRELESS NETWORKS
Wireless LANs and PANs – IEEE 802.11 Standard – Architecture – Services – Blue Tooth- Wi-Fi – WiMAX
Q.No Questions Marks
Knowledge
Level
No. of
times in
AU
PART-A
Wireless LANs and PANs
1. List the advantages and disadvantages of Wireless LANs. [May 2013]
2
K1 1
2. State the various standards in Wireless PANs. K1
3.
Why wireless LAN services are of lower quality than wired LAN?
[May 2014]
K2 1
IEEE 802.11 Standard
4. List any four Wireless LAN standards.
5. Why cannot wireless LANs implement CSMA/CA? [May 2012]
2
K2 1
6.
What is the format of Frame control field of 802.11 MAC packet
structure? [May 2014]
K1 1
7. List the services provided by IEEE 802.11. 2 K1
Bluetooth
8. What are the three low power states of a Bluetooth state? [Nov 2012] 2 K1 1
Wi-Fi and WiMAX
9. List the applications of Wi-Fi.
2
K1
10. State the advantages of Wi-Fi. K1
11. Differentiate between WiFi and WiMAX. [Nov 2011] K2 1
12. Why was WiMAX forum formed? [May 2012] K1 1
PART-B
IEEE 802.11 Standard
1. Describe IEEE 802.11. [Nov 2011] 16 K2 1
2.
Draw the schematic for physical layer of IEEE 802.11 infrared and
explain. [May 2012]
8 K2 1
3.
List the two MAC sublayers defined by IEEE 802.11 standard and
explain. [May 2012]
16 K2 1
4.
Explain about the system and protocol architecture of 802.11 standard
with MAC layer and its management. [Nov 2012]
16 K2 1
5.
Explain in detail about the system and protocol architecture of IEEE
802.11. [May 2013, Nov 2013, May 2014]
12 / 16 K2 3
6.
Discuss how power management is done in IEEE 802.11
infrastructure architecture. [Nov 2013, May 2014]
6 / 8 K2 2
Bluetooth
7.
Explain the system and protocol architecture of Bluetooth / IEEE
802.15.
13 K2
Wi-Fi and WiMAX
8.
Explain in detail about the system and protocol architecture of IEEE
802.16 standard. [Nov 2012]
16 K2 1
PART-C
1.
Consider the following three different scenarios of designing a generic
WLAN which takes into account the number of users and their
activities rather than the size / type of the business itself:
o A small office or a workgroup deployment
o An enterprise deployment
o A telecommuters deployment
Identify the MAC layer mechanisms used to deploy successful
WLAN that supports very fast, secure and scalable wireless network
for the above scenario.
14 K2
2.
Consider a conference that is conducted at Chicago. It is a conference
where a number of delegates from across the World gather to discuss
on various business issues. Participants are permitted to use only their
laptops and they are restricted from possessing any secondary storage
devices or mobile phones. You are a participant of this conference
and to your surprise, you meet one of your school friends in the same
conference. Both of you would like to share some files with a
considerable size. It is later identified that the conference hall
possesses neither an Ethernet facility nor is the Wi-Fi password
known to both of you. Identify a suitable mobile technology that can
be used for the above scenario. Model the system and protocol
architecture for the same.
14 K3
3.
E-health is one of the areas where WiMAX technologies can
substantially contribute to improve the daily activities and thus
enhance the quality of life. Remote diagnosis is one of the possible
cases where WiMAX plays an important role. For instance, an
ambulance equipped with a portable ultrasound device, connected to a
notebook, as well as to the hospital through a Mobile WiMAX
channel, can help a doctor in the hospital to intervene in a car
accident. Construct a system and protocol architecture for the given
scenario.
14 K3
Staff In-charge Subject Matter Expert HoD/IT
DEPARTMENT OF INFORMATION TECHNOLOGY
Course : B.Tech Subject Code : IT8602
Staff Name : Kaviya.P Subject Name : MOBILE COMMUNICATION
Class : IIIIT Academic Year: 2019 - 2020 EVEN
QUESTION BANK
UNIT IV -MOBILE NETWORK LAYER
Mobile IP – DHCP – AdHoc– Proactive and Reactive Routing Protocols – Multicast Routing- Vehicular Ad Hoc
networks (VANET) –MANET Vs VANET – Security
Q.No Questions Marks
Knowledge
Level
No. of
times
in AU
PART-A
Mobile IP
1. What is the need for Mobile IP? [May 2019]
2
K1 1
2. Differentiate types of Care of Address. [Nov 2012] K2 1
3. Define COA. [Nov 2016] K1 1
4.
What should be the value of TTL field in the IP packet of agent
advertisement? Why? [May 2014]
K2 1
5. What is encapsulation in Mobile IP? [May 2016] K1 1
6. What is route optimization? [May 2017, Nov 2019] K1 2
7.
Differentiate the functionalities of a foreign agent and home agent.
[Nov 2017]
K2 1
8. What is the purpose of agent solicitation message? [May 2018] K1 1
9. What is the key mechanism in Mobile IP? [Nov 2018] K1 1
10. What is DHCP? [May 2016] K1 1
11. What is the purpose of DHCP? [May 2018] K1 1
12. Identify the desirable features of Mobile IP. [May 2019] K1 1
AdHoc Networks
13. Define AdHoc wireless network with example. [May 2013]
2
K1 1
14.
Differentiate wired networks and adhoc wireless networks based on
routing. [Nov 2013]
K2 1
15. Differentiate cellular with adhoc networks. [May 2018] K2 1
16. Give examples for mobile adhoc networks. [May 2013] K1 1
17. List the characteristics of MANETs. [May 2016] K1 1
18. List the applications of MANETs. [May 2017] K1 1
19. Mention two main design issues of MANET. [Nov 2018] K1 1
20. Why is routing in MANET so complex task? [May 2019, Nov 2019] K2 2
21. Distinguish Proactive and Reactive protocols.[May 2017] K2 1
22.
What are the important steps in Destination-Sequenced Distance-
Vector Routing (DSDV)? [Nov 2018]
K1 1
23. Compare AODV and DSR protocols. [Nov 2017] K2 1
24. What is multicasting? [Nov 2016] K1 1
Vehicular Adhoc Networks (VANETs)
25.
Compare MANET Vs. VANET. [May 2016, Nov 2016, May 2018 ,
May 2019, Nov 2019]
2 K2 5
PART-B
Mobile IP
1.
Explain the goals, assumptions, terminologies, and requirements of
Mobile IP. [May 2012, Nov 2018]
16 / 8 K2 2
2.
With a neat diagram, explain how packet delivery to and from a
mobile node is transferred through Mobile IP.
[May 2017, Nov 2017, May 2019]
16 / 13 K2 3
3.
What is Mobile IP? Explain agent discovery, registration and
encapsulation. [Nov 2012, Nov 2016]
12 / 16 K2 2
4. Discuss agent discovery in Mobile IP. [Nov 2013, May 2018] 8 / 5 K2 2
5. Describe in detail the registration procedure in Mobile IP. [Nov 2013] 8 K2 1
6.
How can the tunneling and encapsulation be performed in Mobile IP?
Explain. [May 2013, May2017]
10 /16 K2 2
7.
Describe the client server configuration of DHCP.
[May 2013, Nov 2013, May 2014]
6 / 8 K2
58.
With a diagram explain DHCP and its protocol architecture.
[May 2016]
8 K2
9.
What are the main functions of DHCP? Why is DHCP needed? Can it
be used when nodes are mobile? Explain your answer. [Nov 2019]
13 K2
AdHoc Networks
10.
Explain the design issues in MANET routing protocols in detail.
[May 2017]
16 K2
2
11.
Explain the design issues in MANET and the applications of adhoc
networks. [May 2018]
13 K2
12.
Explain about features and applications of adhoc networks.
[May 2014, May 2016, May 2019]
8 / 13 K2 3
13.
What are reactive and proactive protocols? Specify its advantages and
disadvantages. [Nov 2016]
8 K2 1
14.
Explain the Dynamic Source Routing with an example.
[Nov 2013 , May 2016]
10 / 8 K2
415.
Discuss route discovery and route maintenance mechanisms in DSR
with illustrations. List its merits and demerits. [Nov 2017]
16 K2
16.
Illustrate DSR routing in detail and compare it with DSDV.
[Nov 2018]
13 K2
17. Explain multicast routing protocols. [Nov 2016] 8 K2 1
Vehicular AdHoc Networks (VANETs)
18. Draw and explain the architecture of VANET. [May 2016, May 2018] 8 / 13 K2
3
19.
Describe the architecture of VANET with the functionality of the
components. Compare VANET with MANET. [Nov 2017]
16 K2
20.
Explain the architecture of VANET and various security attacks on
VANET. [Nov 2018]
13 K2 1
21. Explain the various security and attacks on VANET. [May 2016] 8 K2
2
22.
Explain the factors that make mobile ad-hoc networks are more
vulnerable to security attacks compared to the traditional networks.
Also explain the major types of security attacks that are possible in a
mobile adhoc network. How can each of these types of attacks be
overcome? [Nov 2019]
13 K2
PART-C
1.
Discuss with neat diagram how a packet is delivered from a mobile
node to another mobile node without losing its information during
mobility of the nodes. [May 2018, May 2019, Nov 2019]
15 K2 3
2.
Organize the steps involved in operation of Destination-Sequenced
Distance-Vector Routing protocol. For a given network, trace the
routing table using DSDV.
[May 2019]
15 K3 1
3.
Consider the networks given below. Here „S‟ is source node and „D‟
is target node. Illustrate the process of route discovery, route reply,
data delivery and route caching using DSR. Explain the approach.
[May 2018]
15 K3 1
Staff In-charge Subject Matter Expert HoD/IT
DEPARTMENT OF INFORMATION TECHNOLOGY
Course : B.Tech Subject Code : IT8602
Staff Name : Kaviya.P Subject Name : MOBILE COMMUNICATION
Class : IIIIT Academic Year: 2019 - 2020 EVEN
QUESTION BANK
UNIT V - MOBILE TRANSPORT AND APPLICATION LAYER
Mobile TCP– WAP – Architecture – WDP – WTLS – WTP –WSP – WAE – WTA Architecture – WML
Q.No Questions Marks
Knowledge
Level
No. of
times in
AU
PART-A
Mobile TCP
1. How does mobile TCP maintain end to end semantics? [May 2018]
2
K2 1
2. State the advantages and disadvantages of Mobile TCP. K1
WAP
3.
When do you call an environment to be a wireless application
environment?[May 2012]
2
K2 1
4. What does WAP specification include? [May 2012] K1 1
5. Mention the primary goals of WAP. [May 2013] K1 1
6. What is Wireless Application Environment? [Nov 2013] K1 1
7. What are the parameters of TR_Invoke.req primitive? [May 2014] K1 1
WTA Architecture
8. What is the role of the WTA server? [May 2013]
2
K1 1
9. How can we extend the basic WAE to WTA? K2
WML
10. List the features of WML. [Nov 2012]
2
K1 1
11. What are the capabilities of WML script? [Nov 2013, May 2014] K1 2
PART-B
Mobile TCP
1.
Describe how mobile TCP improves TCP efficiency for mobile
networks? How does mobile TCP maintain end to end semantics?
[May 2018]
8 K2 1
WAP
2. Explain a detail note on WAP. [Nov 2011] 16 K2 1
3.
Give the architecture of WAP and explain the functions of each of the
blocks. [May 2012]
16 K2 1
4.
Discuss in detail the WAP architecture and protocol.
[Nov 2012, May 2014]
16 K2 2
5.
Explain in detail the components and interfaces of the WAP
architecture. [May 2013]
16 K2 1
6.
With neat sketches and illustrations, discuss the Wireless Application
Protocol architecture in detail. [Nov 2013]
16 K2 1
7. Briefly explain about Wireless Application Environment. [May 2014] 8 K2 1
8.
Explain the parameters of transaction and session protocols.
[May 2012]
16 K2 1
WTA Architecture
9.
Discuss the architecture of wireless telephony application in detail.
[May 2013]
10 K2 1
10.
What is Wireless Telephony Application? Explain WTA logical
architecture. [Nov 2013]
8 K2 1
WML
11.
Explain the following:
i. WML and
ii. WML scripts
[Nov 2011, Nov 2012]
16 / 8 K2 2
12.
Describe the several standard libraries for WML Script specified by
WAP. [May 2013]
6 K2 1
PART-C
1.
Construct WAP architecture and explain each module in WAP
protocol stack.
14 K2
2.
Recent days Internet sites offer facilities to download music files
from video store directly and get the payment billed to our mobile
phones. Sketch a Wireless Telephony Application (WTA)
architecture that would provide a similar facility for Mobile Games.
14 K3
3.
Develop a WML script for the following scenario.
14 K3
Staff In-charge Subject Matter Expert HoD/IT

More Related Content

What's hot

IEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesIEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesSayed Chhattan Shah
 
GSM, Cell Planning & Frequency Reuse
GSM, Cell Planning & Frequency ReuseGSM, Cell Planning & Frequency Reuse
GSM, Cell Planning & Frequency Reusesanjida2222
 
Mac protocols
Mac protocolsMac protocols
Mac protocolsjuno susi
 
Evolution of mobile radio communication
Evolution of mobile radio communicationEvolution of mobile radio communication
Evolution of mobile radio communicationjadhavmanoj01
 
Energy consumption of wsn
Energy consumption of wsnEnergy consumption of wsn
Energy consumption of wsnDeepaDasarathan
 
introduction to channel borrowing scheme in cellular networks
introduction to channel borrowing scheme in cellular networksintroduction to channel borrowing scheme in cellular networks
introduction to channel borrowing scheme in cellular networksTanmoy Barman
 
wireless sensor network
wireless sensor networkwireless sensor network
wireless sensor networkA. Shamel
 
cellular concepts in wireless communication
cellular concepts in wireless communicationcellular concepts in wireless communication
cellular concepts in wireless communicationasadkhan1327
 
Chapter 3 Charateristics and Quality Attributes of Embedded System
Chapter 3 Charateristics and Quality Attributes of Embedded SystemChapter 3 Charateristics and Quality Attributes of Embedded System
Chapter 3 Charateristics and Quality Attributes of Embedded SystemMoe Moe Myint
 
LTE Architecture
LTE ArchitectureLTE Architecture
LTE ArchitectureManje Gowda
 
wireless network IEEE 802.11
 wireless network IEEE 802.11 wireless network IEEE 802.11
wireless network IEEE 802.11Shreejan Acharya
 
W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)Parvesh Taneja
 

What's hot (20)

Frequency Reuse
Frequency ReuseFrequency Reuse
Frequency Reuse
 
Mobile computing
Mobile computing Mobile computing
Mobile computing
 
IEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesIEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and Services
 
GSM, Cell Planning & Frequency Reuse
GSM, Cell Planning & Frequency ReuseGSM, Cell Planning & Frequency Reuse
GSM, Cell Planning & Frequency Reuse
 
Cellular communication
Cellular communicationCellular communication
Cellular communication
 
MIMO Calculation
MIMO Calculation MIMO Calculation
MIMO Calculation
 
Mac protocols
Mac protocolsMac protocols
Mac protocols
 
GSM channels
GSM channelsGSM channels
GSM channels
 
Gprs architecture ppt
Gprs architecture pptGprs architecture ppt
Gprs architecture ppt
 
Evolution of mobile radio communication
Evolution of mobile radio communicationEvolution of mobile radio communication
Evolution of mobile radio communication
 
Ch6
Ch6Ch6
Ch6
 
Gsm overview
Gsm overviewGsm overview
Gsm overview
 
Energy consumption of wsn
Energy consumption of wsnEnergy consumption of wsn
Energy consumption of wsn
 
introduction to channel borrowing scheme in cellular networks
introduction to channel borrowing scheme in cellular networksintroduction to channel borrowing scheme in cellular networks
introduction to channel borrowing scheme in cellular networks
 
wireless sensor network
wireless sensor networkwireless sensor network
wireless sensor network
 
cellular concepts in wireless communication
cellular concepts in wireless communicationcellular concepts in wireless communication
cellular concepts in wireless communication
 
Chapter 3 Charateristics and Quality Attributes of Embedded System
Chapter 3 Charateristics and Quality Attributes of Embedded SystemChapter 3 Charateristics and Quality Attributes of Embedded System
Chapter 3 Charateristics and Quality Attributes of Embedded System
 
LTE Architecture
LTE ArchitectureLTE Architecture
LTE Architecture
 
wireless network IEEE 802.11
 wireless network IEEE 802.11 wireless network IEEE 802.11
wireless network IEEE 802.11
 
W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)
 

Similar to IT8602 Mobile Communication Question Bank

IT6601 Mobile Computing Question Bank-2019
IT6601 Mobile Computing Question Bank-2019IT6601 Mobile Computing Question Bank-2019
IT6601 Mobile Computing Question Bank-2019Gobinath Subramaniam
 
Gis in telecomm
Gis in telecommGis in telecomm
Gis in telecommAtiqa khan
 
Optimization of Quality of Service in 4G Wireless Networks
Optimization of Quality of Service in 4G Wireless NetworksOptimization of Quality of Service in 4G Wireless Networks
Optimization of Quality of Service in 4G Wireless NetworksIDES Editor
 
Mobile Plots - From EPC to 5G
Mobile Plots - From EPC to 5GMobile Plots - From EPC to 5G
Mobile Plots - From EPC to 5GAlberto Diez
 
IRJET- Mobile Wimax Technology
IRJET- Mobile Wimax TechnologyIRJET- Mobile Wimax Technology
IRJET- Mobile Wimax TechnologyIRJET Journal
 
Quality of service performances of video and voice transmission in universal ...
Quality of service performances of video and voice transmission in universal ...Quality of service performances of video and voice transmission in universal ...
Quality of service performances of video and voice transmission in universal ...journalBEEI
 
Network Architecture Work in ITU Focus Group IMT-2020
Network Architecture Work in ITU Focus Group IMT-2020 Network Architecture Work in ITU Focus Group IMT-2020
Network Architecture Work in ITU Focus Group IMT-2020 ITU
 
Industrial Training Report- I-SLT
Industrial Training Report- I-SLTIndustrial Training Report- I-SLT
Industrial Training Report- I-SLTThushan Sivalingam
 
Gis in telecomm ppt
Gis in telecomm pptGis in telecomm ppt
Gis in telecomm pptAtiqa khan
 
project report file on telecommunication(report file on vodafone)
project report file on telecommunication(report file on vodafone)project report file on telecommunication(report file on vodafone)
project report file on telecommunication(report file on vodafone)Mukesh Kumar
 
InfiniteMoney.docx
InfiniteMoney.docxInfiniteMoney.docx
InfiniteMoney.docxKanhaJi5
 
Evolution of wireless communication networks: from 1G to 6G and future persp...
Evolution of wireless communication networks: from 1G to 6G  and future persp...Evolution of wireless communication networks: from 1G to 6G  and future persp...
Evolution of wireless communication networks: from 1G to 6G and future persp...IJECEIAES
 
5 g network white paper
5 g network white paper 5 g network white paper
5 g network white paper Ravi Sharma
 
Seminar-Presentation_TE088.pptx
Seminar-Presentation_TE088.pptxSeminar-Presentation_TE088.pptx
Seminar-Presentation_TE088.pptxVivekMishra65355
 

Similar to IT8602 Mobile Communication Question Bank (20)

CS8601-QB.pdf
CS8601-QB.pdfCS8601-QB.pdf
CS8601-QB.pdf
 
CS8601-QB.pdf
CS8601-QB.pdfCS8601-QB.pdf
CS8601-QB.pdf
 
IT6601 Mobile Computing Question Bank-2019
IT6601 Mobile Computing Question Bank-2019IT6601 Mobile Computing Question Bank-2019
IT6601 Mobile Computing Question Bank-2019
 
Gis in telecomm
Gis in telecommGis in telecomm
Gis in telecomm
 
Adhoc qb14 (1)
Adhoc qb14 (1)Adhoc qb14 (1)
Adhoc qb14 (1)
 
It6601 mobile computing unit 3 questions
It6601 mobile computing unit 3 questionsIt6601 mobile computing unit 3 questions
It6601 mobile computing unit 3 questions
 
Optimization of Quality of Service in 4G Wireless Networks
Optimization of Quality of Service in 4G Wireless NetworksOptimization of Quality of Service in 4G Wireless Networks
Optimization of Quality of Service in 4G Wireless Networks
 
Mobile Plots - From EPC to 5G
Mobile Plots - From EPC to 5GMobile Plots - From EPC to 5G
Mobile Plots - From EPC to 5G
 
IRJET- Mobile Wimax Technology
IRJET- Mobile Wimax TechnologyIRJET- Mobile Wimax Technology
IRJET- Mobile Wimax Technology
 
Quality of service performances of video and voice transmission in universal ...
Quality of service performances of video and voice transmission in universal ...Quality of service performances of video and voice transmission in universal ...
Quality of service performances of video and voice transmission in universal ...
 
Network Architecture Work in ITU Focus Group IMT-2020
Network Architecture Work in ITU Focus Group IMT-2020 Network Architecture Work in ITU Focus Group IMT-2020
Network Architecture Work in ITU Focus Group IMT-2020
 
Industrial Training Report- I-SLT
Industrial Training Report- I-SLTIndustrial Training Report- I-SLT
Industrial Training Report- I-SLT
 
Gis in telecomm ppt
Gis in telecomm pptGis in telecomm ppt
Gis in telecomm ppt
 
project report file on telecommunication(report file on vodafone)
project report file on telecommunication(report file on vodafone)project report file on telecommunication(report file on vodafone)
project report file on telecommunication(report file on vodafone)
 
InfiniteMoney.docx
InfiniteMoney.docxInfiniteMoney.docx
InfiniteMoney.docx
 
Wireless Broadband
Wireless BroadbandWireless Broadband
Wireless Broadband
 
Qb
QbQb
Qb
 
Evolution of wireless communication networks: from 1G to 6G and future persp...
Evolution of wireless communication networks: from 1G to 6G  and future persp...Evolution of wireless communication networks: from 1G to 6G  and future persp...
Evolution of wireless communication networks: from 1G to 6G and future persp...
 
5 g network white paper
5 g network white paper 5 g network white paper
5 g network white paper
 
Seminar-Presentation_TE088.pptx
Seminar-Presentation_TE088.pptxSeminar-Presentation_TE088.pptx
Seminar-Presentation_TE088.pptx
 

More from pkaviya

IT2255 Web Essentials - Unit V Servlets and Database Connectivity
IT2255 Web Essentials - Unit V Servlets and Database ConnectivityIT2255 Web Essentials - Unit V Servlets and Database Connectivity
IT2255 Web Essentials - Unit V Servlets and Database Connectivitypkaviya
 
IT2255 Web Essentials - Unit IV Server-Side Processing and Scripting - PHP.pdf
IT2255 Web Essentials - Unit IV Server-Side Processing and Scripting - PHP.pdfIT2255 Web Essentials - Unit IV Server-Side Processing and Scripting - PHP.pdf
IT2255 Web Essentials - Unit IV Server-Side Processing and Scripting - PHP.pdfpkaviya
 
IT2255 Web Essentials - Unit III Client-Side Processing and Scripting
IT2255 Web Essentials - Unit III Client-Side Processing and ScriptingIT2255 Web Essentials - Unit III Client-Side Processing and Scripting
IT2255 Web Essentials - Unit III Client-Side Processing and Scriptingpkaviya
 
IT2255 Web Essentials - Unit II Web Designing
IT2255 Web Essentials - Unit II  Web DesigningIT2255 Web Essentials - Unit II  Web Designing
IT2255 Web Essentials - Unit II Web Designingpkaviya
 
IT2255 Web Essentials - Unit I Website Basics
IT2255 Web Essentials - Unit I  Website BasicsIT2255 Web Essentials - Unit I  Website Basics
IT2255 Web Essentials - Unit I Website Basicspkaviya
 
BT2252 - ETBT - UNIT 3 - Enzyme Immobilization.pdf
BT2252 - ETBT - UNIT 3 - Enzyme Immobilization.pdfBT2252 - ETBT - UNIT 3 - Enzyme Immobilization.pdf
BT2252 - ETBT - UNIT 3 - Enzyme Immobilization.pdfpkaviya
 
OIT552 Cloud Computing Material
OIT552 Cloud Computing MaterialOIT552 Cloud Computing Material
OIT552 Cloud Computing Materialpkaviya
 
OIT552 Cloud Computing - Question Bank
OIT552 Cloud Computing - Question BankOIT552 Cloud Computing - Question Bank
OIT552 Cloud Computing - Question Bankpkaviya
 
CS8791 Cloud Computing - Question Bank
CS8791 Cloud Computing - Question BankCS8791 Cloud Computing - Question Bank
CS8791 Cloud Computing - Question Bankpkaviya
 
CS8592 Object Oriented Analysis & Design - UNIT V
CS8592 Object Oriented Analysis & Design - UNIT V CS8592 Object Oriented Analysis & Design - UNIT V
CS8592 Object Oriented Analysis & Design - UNIT V pkaviya
 
CS8592 Object Oriented Analysis & Design - UNIT IV
CS8592 Object Oriented Analysis & Design - UNIT IV CS8592 Object Oriented Analysis & Design - UNIT IV
CS8592 Object Oriented Analysis & Design - UNIT IV pkaviya
 
CS8592 Object Oriented Analysis & Design - UNIT III
CS8592 Object Oriented Analysis & Design - UNIT III CS8592 Object Oriented Analysis & Design - UNIT III
CS8592 Object Oriented Analysis & Design - UNIT III pkaviya
 
CS8592 Object Oriented Analysis & Design - UNIT II
CS8592 Object Oriented Analysis & Design - UNIT IICS8592 Object Oriented Analysis & Design - UNIT II
CS8592 Object Oriented Analysis & Design - UNIT IIpkaviya
 
CS8592 Object Oriented Analysis & Design - UNIT I
CS8592 Object Oriented Analysis & Design - UNIT ICS8592 Object Oriented Analysis & Design - UNIT I
CS8592 Object Oriented Analysis & Design - UNIT Ipkaviya
 
Cs8591 Computer Networks - UNIT V
Cs8591 Computer Networks - UNIT VCs8591 Computer Networks - UNIT V
Cs8591 Computer Networks - UNIT Vpkaviya
 
CS8591 Computer Networks - Unit IV
CS8591 Computer Networks - Unit IVCS8591 Computer Networks - Unit IV
CS8591 Computer Networks - Unit IVpkaviya
 
CS8591 Computer Networks - Unit III
CS8591 Computer Networks - Unit IIICS8591 Computer Networks - Unit III
CS8591 Computer Networks - Unit IIIpkaviya
 
CS8591 Computer Networks - Unit II
CS8591 Computer Networks - Unit II CS8591 Computer Networks - Unit II
CS8591 Computer Networks - Unit II pkaviya
 
CS8591 Computer Networks - Unit I
CS8591 Computer Networks - Unit ICS8591 Computer Networks - Unit I
CS8591 Computer Networks - Unit Ipkaviya
 
IT8602 Mobile Communication - Unit V
IT8602 Mobile Communication - Unit V IT8602 Mobile Communication - Unit V
IT8602 Mobile Communication - Unit V pkaviya
 

More from pkaviya (20)

IT2255 Web Essentials - Unit V Servlets and Database Connectivity
IT2255 Web Essentials - Unit V Servlets and Database ConnectivityIT2255 Web Essentials - Unit V Servlets and Database Connectivity
IT2255 Web Essentials - Unit V Servlets and Database Connectivity
 
IT2255 Web Essentials - Unit IV Server-Side Processing and Scripting - PHP.pdf
IT2255 Web Essentials - Unit IV Server-Side Processing and Scripting - PHP.pdfIT2255 Web Essentials - Unit IV Server-Side Processing and Scripting - PHP.pdf
IT2255 Web Essentials - Unit IV Server-Side Processing and Scripting - PHP.pdf
 
IT2255 Web Essentials - Unit III Client-Side Processing and Scripting
IT2255 Web Essentials - Unit III Client-Side Processing and ScriptingIT2255 Web Essentials - Unit III Client-Side Processing and Scripting
IT2255 Web Essentials - Unit III Client-Side Processing and Scripting
 
IT2255 Web Essentials - Unit II Web Designing
IT2255 Web Essentials - Unit II  Web DesigningIT2255 Web Essentials - Unit II  Web Designing
IT2255 Web Essentials - Unit II Web Designing
 
IT2255 Web Essentials - Unit I Website Basics
IT2255 Web Essentials - Unit I  Website BasicsIT2255 Web Essentials - Unit I  Website Basics
IT2255 Web Essentials - Unit I Website Basics
 
BT2252 - ETBT - UNIT 3 - Enzyme Immobilization.pdf
BT2252 - ETBT - UNIT 3 - Enzyme Immobilization.pdfBT2252 - ETBT - UNIT 3 - Enzyme Immobilization.pdf
BT2252 - ETBT - UNIT 3 - Enzyme Immobilization.pdf
 
OIT552 Cloud Computing Material
OIT552 Cloud Computing MaterialOIT552 Cloud Computing Material
OIT552 Cloud Computing Material
 
OIT552 Cloud Computing - Question Bank
OIT552 Cloud Computing - Question BankOIT552 Cloud Computing - Question Bank
OIT552 Cloud Computing - Question Bank
 
CS8791 Cloud Computing - Question Bank
CS8791 Cloud Computing - Question BankCS8791 Cloud Computing - Question Bank
CS8791 Cloud Computing - Question Bank
 
CS8592 Object Oriented Analysis & Design - UNIT V
CS8592 Object Oriented Analysis & Design - UNIT V CS8592 Object Oriented Analysis & Design - UNIT V
CS8592 Object Oriented Analysis & Design - UNIT V
 
CS8592 Object Oriented Analysis & Design - UNIT IV
CS8592 Object Oriented Analysis & Design - UNIT IV CS8592 Object Oriented Analysis & Design - UNIT IV
CS8592 Object Oriented Analysis & Design - UNIT IV
 
CS8592 Object Oriented Analysis & Design - UNIT III
CS8592 Object Oriented Analysis & Design - UNIT III CS8592 Object Oriented Analysis & Design - UNIT III
CS8592 Object Oriented Analysis & Design - UNIT III
 
CS8592 Object Oriented Analysis & Design - UNIT II
CS8592 Object Oriented Analysis & Design - UNIT IICS8592 Object Oriented Analysis & Design - UNIT II
CS8592 Object Oriented Analysis & Design - UNIT II
 
CS8592 Object Oriented Analysis & Design - UNIT I
CS8592 Object Oriented Analysis & Design - UNIT ICS8592 Object Oriented Analysis & Design - UNIT I
CS8592 Object Oriented Analysis & Design - UNIT I
 
Cs8591 Computer Networks - UNIT V
Cs8591 Computer Networks - UNIT VCs8591 Computer Networks - UNIT V
Cs8591 Computer Networks - UNIT V
 
CS8591 Computer Networks - Unit IV
CS8591 Computer Networks - Unit IVCS8591 Computer Networks - Unit IV
CS8591 Computer Networks - Unit IV
 
CS8591 Computer Networks - Unit III
CS8591 Computer Networks - Unit IIICS8591 Computer Networks - Unit III
CS8591 Computer Networks - Unit III
 
CS8591 Computer Networks - Unit II
CS8591 Computer Networks - Unit II CS8591 Computer Networks - Unit II
CS8591 Computer Networks - Unit II
 
CS8591 Computer Networks - Unit I
CS8591 Computer Networks - Unit ICS8591 Computer Networks - Unit I
CS8591 Computer Networks - Unit I
 
IT8602 Mobile Communication - Unit V
IT8602 Mobile Communication - Unit V IT8602 Mobile Communication - Unit V
IT8602 Mobile Communication - Unit V
 

Recently uploaded

Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...ranjana rawat
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)simmis5
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 

Recently uploaded (20)

Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 

IT8602 Mobile Communication Question Bank

  • 1. QUESTION BANK DEPARTMENT OF INFORMATION TECHNOLOGY Academic year : 2019-2020 Subject Code : IT8602 Year / Semester : III / VI Course Code (as per NBA) :R17C312 Name of the Subject :MOBILE COMMUNICATION Name of Staff with designation/Department :Ms.Kaviya.P, AP/IT Course Outcomes(COs) CO Code CO Statement Blooms Taxonomy Level R17C312.1 Explain the evolution of mobile communication and the existing MAC protocols K2 R17C312.2 Illustrate the generations of telecommunication systems in wireless network along with their routing, mobility and security issues K2 R17C312.3 Outline the architecture of various Wireless LAN technologies such as Wireless LAN, Bluetooth and WiFi Technologies K2 R17C312.4 Summarize the functionalities of network layer with their routing protocols and recognize the security issues related an Ad hoc networks K2 R17C312.5 Explain the functionalities of Transport and Application layer in a mobile network K2 Prepared by Name &Signature of Staff member Signature of HOD
  • 2. DEPARTMENT OF INFORMATION TECHNOLOGY Course : B.Tech Subject Code : IT8602 Staff Name : Kaviya.P Subject Name : MOBILE COMMUNICATION Class : IIIIT Academic Year: 2019 - 2020 EVEN QUESTION BANK UNIT I - INTRODUCTION Introduction to Mobile Computing – Applications of Mobile Computing- Generations of Mobile Communication Technologies-MAC Protocols – SDMA- TDMA- FDMA- CDMA Q.No Questions Marks Knowledg e Level No. of times in AU PART-A Introduction to Mobile Computing 1. Define mobile computing. [May 2019, Nov 2019] 2 K1 2 2. List the advantages of mobile computing. [May 2016] K1 1 3. What are the limitations of Mobile Computing? [Nov 2016] K1 1 4. Differentiate mobile computing and Wireless Networking. [May 2017, Nov 2017, May 2018] K2 3 5. What are the challenges in Mobile communication? [Nov 2018] K1 1 Applications of Mobile Computing 6. List the applications of Mobile Computing. 2 K1 7. List some Mobile and Wireless devices. K1 Generations of Mobile Communication Technologies 8. List the Wireless LAN technologies. 2 K1 9. State some cellular phone standards. K1 MAC Protocols 10. What is the motivation for a specialized MAC? [May 2012] 2 K1 1 11. State the objectives of MAC protocols. [Nov 2018] K1 1 12. List the issues in wireless MAC. [May 2018, Nov 2019] K1 2 13. Differentiate hidden and exposed terminal problems in infrastructure- less network. [May 2016] K2 1 14. “MAC protocol designed for infrastructure based wireless network may not work satisfactory in infrastructure-less environment.” – Justify. [Nov 2017] K2 1 15. Which TDMA scheme is suitable for satellite systems? [May 2014] K1 1 16. List some random assignment schemes in MAC. [Nov 2016, May 2017] K1 2 17. Give some examples of reservation-based schemes in MAC protocols. [May 2019] K1 1 18. Draw the frequency assignment for radio transmission.[May 2013] K1 1 19. Justify that a Barker code has good autocorrelation. [Nov 2012, Nov 2013] K2 2
  • 3. PART-B Introduction to Mobile Computing 1. Describe the characteristics of Mobile Computing. [May 2016, May 2018, May 2019] 6 / 5 K2 3 Applications of Mobile Computing 2. Describe the applications of mobile computing. [Nov 2016, May 2017] 8 K2 2 Generations of Mobile Communication Technologies 3. Explain in detail about various technologies in mobile communication. 13 K2 MAC Protocols 4. Explain in detail about the motivation for a specialized MAC. [May 2013] 10 K2 1 5. Explain the wireless MAC protocol issues in detail. [May 2017] 8 K2 1 6. Explain in detail about hidden terminal problem and exposed terminal problem. [Nov 2017, Nov 2018] 8 / 13 K2 2 7. Compare the characteristic features of FDMA, TDMA, and CDMA mechanisms. [Nov 2011, May 2012, Nov 2016] 6 / 16 K2 6 8. Compare and contrast SDMA, FDMA, TDMA, and CDMA. [Nov 2012, May 2013, Nov 2013] 10 / 8 / 12 9. Explain clearly the various schemes for Medium Access Control with Time Division Multiple Access. [Nov 2012] 16 K2 1 10. What is CSMA? What are the categories of CSMA? Explain their working with advantages and disadvantages. [May 2018] 7 K2 1 11. Explain in detail Multiple Access with Collision Avoidance scheme. Also explain the advantage of the same. [Nov 2013] 12 K2 2 12. What is hidden and exposed terminal problem? Explain how Multiple Access with Collision Avoidance scheme avoids hidden and exposed terminal problem. [May 2014] 16 13. Explain with an example the behavior of CDMA with the spreading using orthogonal codes. [May 2014] 8 K2 1 PART-C 1. Apply mobile computing to design Taxi dispatcher and monitoring service. Explain the components in detail. [May 2018] 7 K3 1 2. Consider the following scenarios: i. Node A and C want to transmit data to B at the same time. ii. Node B transmits data to Node A meanwhile Node C wants to transmit data to Node D in the network. Identify the problems during this data transmission. Explain it. Suggest a method of your choice to overcome this problem. 14 K3 3. Consider a scenario of video conferencing in mobile network with 10 participants. During the transmission of data in a low congestion network suddenly, if 100 participants are involved in transmission in the same network, what are the problems you face and list out the MAC protocols that you would suggest for efficient channel access and data transmission in congested network? 14 K3 Staff In-charge Subject Matter Expert HoD/IT
  • 4. DEPARTMENT OF INFORMATION TECHNOLOGY Course : B.Tech Subject Code : IT8602 Staff Name : Kaviya.P Subject Name : MOBILE COMMUNICATION Class : IIIIT Academic Year: 2019 - 2020 EVEN QUESTION BANK UNIT II -MOBILE TELECOMMUNICATION SYSTEM GSM – Architecture – Protocols – Connection Establishment – Frequency Allocation – Routing – Mobility Management – Security –GPRS- UMTS- Architecture Q.No Questions Marks Knowledge Level No. of times in AU PART-A GSM 1. List the standards similar to GSM. [May 2012] 2 K1 1 2. What is frequency range of uplink and downlink in GSM network? [May 2018] K1 1 3. State the pros and cons of GSM. [Nov 2011] K1 1 4. List the subsystems of GSM. [Nov 2018] K1 1 5. What is the information stored in SIM? [May 2018] K1 1 6. Name the Teleservices provided by GSM. [May 2017, Nov 2019] K1 2 7. Write about the supplementary services in GSM. [Nov 2016] K1 1 8. State the purpose of Home Location Register (HLR). [Nov 2018] K1 1 9. What is Equipment Identity Register? [Nov 2013] K1 1 10. Give the block diagram of subscriber authentication in GSM architecture. [May 2014] K1 1 11. List the 3 important features of GSM security. [May 2016] K1 1 12. What is handoff? List out its characteristics. [May 2013] K1 1 13. Differentiate soft and hard handoff. [Nov 2011] K2 1 14. Draw a model to illustrate the effect of handoff. [May 2012] K1 1 15. Define handoff. What are its types? [Nov 2012, Nov 2017] K1 2 16. What are the reasons for handover?[Nov 2013] K1 1 GPRS 17. What is the functionality of GGSN? [May 2014, Nov 2018] 2 K1 2 18. Draw the GPRS transport plane. [May 2012] K1 1 19. What are the advantages of GPRS? [Nov 2012] K1 1 20. Identify the services offered by GPRS.[Nov 2017, May 2019] K1 2 21. In which way GPRS is better than GSM? [Nov 2019] K2 1 UMTS 22. What are the main elements of UMTS?[May 2016] 2 K1 1 23. List out the advantages of UMTS networks over 2G networks. [May 2019] K1 1 PART-B GSM 1. Outline the services offered by GSM.[May 2019] 7 K2 1
  • 5. 2. Describe GSM architecture and its services in detail. [May 2016, Nov 2017] 8 /16 K2 2 3. Explain the mobile services, system architecture, localization and calling of GSM in detail. [Nov 2012] 16 K2 1 4. Explain in detail about the system architecture of Global System for Mobile communication. [Nov 2011, May 2012, May 2013, Nov 2013, May 2017, Nov 2018, Nov 2019] 16 / 8 / 13 K2 7 5. Explain in detail the architecture of GSM. Also explain mobility management and handover. [May 2014] 16 K2 1 6. Explain the message flow between mobile station and BTS during Mobile Originated call with suitable illustrations. [Nov 2013, May 2014] 8 / 4 K2 2 7. Explain security services of GSM system. [Nov 2012, Nov 2013, May 2019] 6 / 8 K2 5 8. Explain GSM Authentication and Security. [May 2016, Nov 2016] 8 / 6 K2 9. Explain in detail about the handovers of GSM. [May 2013, Nov 2016] 6 / 8 K2 3 10. Write in detail about the various types of handover in GSM. Also discuss the timeline diagram of the Intra MSC handover. [May 2018] 13 K2 GPRS 11. Discuss GPRS architecture and data services in detail. [Nov 2011, Nov 2012, Nov 2019] 10 / 16 K2 512. Draw and explain the architecture of GPRS. List its advantages and limitations. [May 2019] 13 K2 13. What are the advantages of GPRS over GSM? Also explain the architecture of GPRS. [Nov 2013] 8 K2 14. Explain GPRS and its Protocol architecture. [May 2016] 8 K2 1 15. Explain the functions of GPRS protocol stack with a diagram. [Nov 2016, May 2017] 8 / 16 K2 2 UMTS 16. Explain in detail about UMTS architecture and its services. [May 2016, Nov 2016, Nov 2017, May 2018] 8 / 16 /13 K2 4 17. What is UMTS? Describe the function of HLR and VLR in call routing and roaming. [Nov 2018] 13 K2 1 PART C 1. Node A wants to communicate with Node B located at different geographical location. Model the call initiation and call termination steps in GSM. 14 K3 2. In cellular networks, build the various handover mechanisms used when the mobile station moves out of station that causes decrease in received signal strength or due to increase in load. 14 K3 3. GSM allows a subscriber to move throughout the coverage area with a capability to make or receive calls. Sketch the components involved in make or receive calls in roaming. 14 K3 Staff In-charge Subject Matter Expert HoD/IT
  • 6. DEPARTMENT OF INFORMATION TECHNOLOGY Course : B.Tech Subject Code : IT8602 Staff Name : Kaviya.P Subject Name : MOBILE COMMUNICATION Class : IIIIT Academic Year: 2019 - 2020 EVEN QUESTION BANK UNIT III -WIRELESS NETWORKS Wireless LANs and PANs – IEEE 802.11 Standard – Architecture – Services – Blue Tooth- Wi-Fi – WiMAX Q.No Questions Marks Knowledge Level No. of times in AU PART-A Wireless LANs and PANs 1. List the advantages and disadvantages of Wireless LANs. [May 2013] 2 K1 1 2. State the various standards in Wireless PANs. K1 3. Why wireless LAN services are of lower quality than wired LAN? [May 2014] K2 1 IEEE 802.11 Standard 4. List any four Wireless LAN standards. 5. Why cannot wireless LANs implement CSMA/CA? [May 2012] 2 K2 1 6. What is the format of Frame control field of 802.11 MAC packet structure? [May 2014] K1 1 7. List the services provided by IEEE 802.11. 2 K1 Bluetooth 8. What are the three low power states of a Bluetooth state? [Nov 2012] 2 K1 1 Wi-Fi and WiMAX 9. List the applications of Wi-Fi. 2 K1 10. State the advantages of Wi-Fi. K1 11. Differentiate between WiFi and WiMAX. [Nov 2011] K2 1 12. Why was WiMAX forum formed? [May 2012] K1 1 PART-B IEEE 802.11 Standard 1. Describe IEEE 802.11. [Nov 2011] 16 K2 1 2. Draw the schematic for physical layer of IEEE 802.11 infrared and explain. [May 2012] 8 K2 1 3. List the two MAC sublayers defined by IEEE 802.11 standard and explain. [May 2012] 16 K2 1 4. Explain about the system and protocol architecture of 802.11 standard with MAC layer and its management. [Nov 2012] 16 K2 1 5. Explain in detail about the system and protocol architecture of IEEE 802.11. [May 2013, Nov 2013, May 2014] 12 / 16 K2 3 6. Discuss how power management is done in IEEE 802.11 infrastructure architecture. [Nov 2013, May 2014] 6 / 8 K2 2
  • 7. Bluetooth 7. Explain the system and protocol architecture of Bluetooth / IEEE 802.15. 13 K2 Wi-Fi and WiMAX 8. Explain in detail about the system and protocol architecture of IEEE 802.16 standard. [Nov 2012] 16 K2 1 PART-C 1. Consider the following three different scenarios of designing a generic WLAN which takes into account the number of users and their activities rather than the size / type of the business itself: o A small office or a workgroup deployment o An enterprise deployment o A telecommuters deployment Identify the MAC layer mechanisms used to deploy successful WLAN that supports very fast, secure and scalable wireless network for the above scenario. 14 K2 2. Consider a conference that is conducted at Chicago. It is a conference where a number of delegates from across the World gather to discuss on various business issues. Participants are permitted to use only their laptops and they are restricted from possessing any secondary storage devices or mobile phones. You are a participant of this conference and to your surprise, you meet one of your school friends in the same conference. Both of you would like to share some files with a considerable size. It is later identified that the conference hall possesses neither an Ethernet facility nor is the Wi-Fi password known to both of you. Identify a suitable mobile technology that can be used for the above scenario. Model the system and protocol architecture for the same. 14 K3 3. E-health is one of the areas where WiMAX technologies can substantially contribute to improve the daily activities and thus enhance the quality of life. Remote diagnosis is one of the possible cases where WiMAX plays an important role. For instance, an ambulance equipped with a portable ultrasound device, connected to a notebook, as well as to the hospital through a Mobile WiMAX channel, can help a doctor in the hospital to intervene in a car accident. Construct a system and protocol architecture for the given scenario. 14 K3 Staff In-charge Subject Matter Expert HoD/IT
  • 8. DEPARTMENT OF INFORMATION TECHNOLOGY Course : B.Tech Subject Code : IT8602 Staff Name : Kaviya.P Subject Name : MOBILE COMMUNICATION Class : IIIIT Academic Year: 2019 - 2020 EVEN QUESTION BANK UNIT IV -MOBILE NETWORK LAYER Mobile IP – DHCP – AdHoc– Proactive and Reactive Routing Protocols – Multicast Routing- Vehicular Ad Hoc networks (VANET) –MANET Vs VANET – Security Q.No Questions Marks Knowledge Level No. of times in AU PART-A Mobile IP 1. What is the need for Mobile IP? [May 2019] 2 K1 1 2. Differentiate types of Care of Address. [Nov 2012] K2 1 3. Define COA. [Nov 2016] K1 1 4. What should be the value of TTL field in the IP packet of agent advertisement? Why? [May 2014] K2 1 5. What is encapsulation in Mobile IP? [May 2016] K1 1 6. What is route optimization? [May 2017, Nov 2019] K1 2 7. Differentiate the functionalities of a foreign agent and home agent. [Nov 2017] K2 1 8. What is the purpose of agent solicitation message? [May 2018] K1 1 9. What is the key mechanism in Mobile IP? [Nov 2018] K1 1 10. What is DHCP? [May 2016] K1 1 11. What is the purpose of DHCP? [May 2018] K1 1 12. Identify the desirable features of Mobile IP. [May 2019] K1 1 AdHoc Networks 13. Define AdHoc wireless network with example. [May 2013] 2 K1 1 14. Differentiate wired networks and adhoc wireless networks based on routing. [Nov 2013] K2 1 15. Differentiate cellular with adhoc networks. [May 2018] K2 1 16. Give examples for mobile adhoc networks. [May 2013] K1 1 17. List the characteristics of MANETs. [May 2016] K1 1 18. List the applications of MANETs. [May 2017] K1 1 19. Mention two main design issues of MANET. [Nov 2018] K1 1 20. Why is routing in MANET so complex task? [May 2019, Nov 2019] K2 2 21. Distinguish Proactive and Reactive protocols.[May 2017] K2 1 22. What are the important steps in Destination-Sequenced Distance- Vector Routing (DSDV)? [Nov 2018] K1 1 23. Compare AODV and DSR protocols. [Nov 2017] K2 1 24. What is multicasting? [Nov 2016] K1 1 Vehicular Adhoc Networks (VANETs) 25. Compare MANET Vs. VANET. [May 2016, Nov 2016, May 2018 , May 2019, Nov 2019] 2 K2 5
  • 9. PART-B Mobile IP 1. Explain the goals, assumptions, terminologies, and requirements of Mobile IP. [May 2012, Nov 2018] 16 / 8 K2 2 2. With a neat diagram, explain how packet delivery to and from a mobile node is transferred through Mobile IP. [May 2017, Nov 2017, May 2019] 16 / 13 K2 3 3. What is Mobile IP? Explain agent discovery, registration and encapsulation. [Nov 2012, Nov 2016] 12 / 16 K2 2 4. Discuss agent discovery in Mobile IP. [Nov 2013, May 2018] 8 / 5 K2 2 5. Describe in detail the registration procedure in Mobile IP. [Nov 2013] 8 K2 1 6. How can the tunneling and encapsulation be performed in Mobile IP? Explain. [May 2013, May2017] 10 /16 K2 2 7. Describe the client server configuration of DHCP. [May 2013, Nov 2013, May 2014] 6 / 8 K2 58. With a diagram explain DHCP and its protocol architecture. [May 2016] 8 K2 9. What are the main functions of DHCP? Why is DHCP needed? Can it be used when nodes are mobile? Explain your answer. [Nov 2019] 13 K2 AdHoc Networks 10. Explain the design issues in MANET routing protocols in detail. [May 2017] 16 K2 2 11. Explain the design issues in MANET and the applications of adhoc networks. [May 2018] 13 K2 12. Explain about features and applications of adhoc networks. [May 2014, May 2016, May 2019] 8 / 13 K2 3 13. What are reactive and proactive protocols? Specify its advantages and disadvantages. [Nov 2016] 8 K2 1 14. Explain the Dynamic Source Routing with an example. [Nov 2013 , May 2016] 10 / 8 K2 415. Discuss route discovery and route maintenance mechanisms in DSR with illustrations. List its merits and demerits. [Nov 2017] 16 K2 16. Illustrate DSR routing in detail and compare it with DSDV. [Nov 2018] 13 K2 17. Explain multicast routing protocols. [Nov 2016] 8 K2 1 Vehicular AdHoc Networks (VANETs) 18. Draw and explain the architecture of VANET. [May 2016, May 2018] 8 / 13 K2 3 19. Describe the architecture of VANET with the functionality of the components. Compare VANET with MANET. [Nov 2017] 16 K2 20. Explain the architecture of VANET and various security attacks on VANET. [Nov 2018] 13 K2 1 21. Explain the various security and attacks on VANET. [May 2016] 8 K2 2 22. Explain the factors that make mobile ad-hoc networks are more vulnerable to security attacks compared to the traditional networks. Also explain the major types of security attacks that are possible in a mobile adhoc network. How can each of these types of attacks be overcome? [Nov 2019] 13 K2
  • 10. PART-C 1. Discuss with neat diagram how a packet is delivered from a mobile node to another mobile node without losing its information during mobility of the nodes. [May 2018, May 2019, Nov 2019] 15 K2 3 2. Organize the steps involved in operation of Destination-Sequenced Distance-Vector Routing protocol. For a given network, trace the routing table using DSDV. [May 2019] 15 K3 1 3. Consider the networks given below. Here „S‟ is source node and „D‟ is target node. Illustrate the process of route discovery, route reply, data delivery and route caching using DSR. Explain the approach. [May 2018] 15 K3 1 Staff In-charge Subject Matter Expert HoD/IT
  • 11. DEPARTMENT OF INFORMATION TECHNOLOGY Course : B.Tech Subject Code : IT8602 Staff Name : Kaviya.P Subject Name : MOBILE COMMUNICATION Class : IIIIT Academic Year: 2019 - 2020 EVEN QUESTION BANK UNIT V - MOBILE TRANSPORT AND APPLICATION LAYER Mobile TCP– WAP – Architecture – WDP – WTLS – WTP –WSP – WAE – WTA Architecture – WML Q.No Questions Marks Knowledge Level No. of times in AU PART-A Mobile TCP 1. How does mobile TCP maintain end to end semantics? [May 2018] 2 K2 1 2. State the advantages and disadvantages of Mobile TCP. K1 WAP 3. When do you call an environment to be a wireless application environment?[May 2012] 2 K2 1 4. What does WAP specification include? [May 2012] K1 1 5. Mention the primary goals of WAP. [May 2013] K1 1 6. What is Wireless Application Environment? [Nov 2013] K1 1 7. What are the parameters of TR_Invoke.req primitive? [May 2014] K1 1 WTA Architecture 8. What is the role of the WTA server? [May 2013] 2 K1 1 9. How can we extend the basic WAE to WTA? K2 WML 10. List the features of WML. [Nov 2012] 2 K1 1 11. What are the capabilities of WML script? [Nov 2013, May 2014] K1 2 PART-B Mobile TCP 1. Describe how mobile TCP improves TCP efficiency for mobile networks? How does mobile TCP maintain end to end semantics? [May 2018] 8 K2 1 WAP 2. Explain a detail note on WAP. [Nov 2011] 16 K2 1 3. Give the architecture of WAP and explain the functions of each of the blocks. [May 2012] 16 K2 1 4. Discuss in detail the WAP architecture and protocol. [Nov 2012, May 2014] 16 K2 2 5. Explain in detail the components and interfaces of the WAP architecture. [May 2013] 16 K2 1 6. With neat sketches and illustrations, discuss the Wireless Application Protocol architecture in detail. [Nov 2013] 16 K2 1 7. Briefly explain about Wireless Application Environment. [May 2014] 8 K2 1 8. Explain the parameters of transaction and session protocols. [May 2012] 16 K2 1
  • 12. WTA Architecture 9. Discuss the architecture of wireless telephony application in detail. [May 2013] 10 K2 1 10. What is Wireless Telephony Application? Explain WTA logical architecture. [Nov 2013] 8 K2 1 WML 11. Explain the following: i. WML and ii. WML scripts [Nov 2011, Nov 2012] 16 / 8 K2 2 12. Describe the several standard libraries for WML Script specified by WAP. [May 2013] 6 K2 1 PART-C 1. Construct WAP architecture and explain each module in WAP protocol stack. 14 K2 2. Recent days Internet sites offer facilities to download music files from video store directly and get the payment billed to our mobile phones. Sketch a Wireless Telephony Application (WTA) architecture that would provide a similar facility for Mobile Games. 14 K3 3. Develop a WML script for the following scenario. 14 K3 Staff In-charge Subject Matter Expert HoD/IT