CS2402 MOBILE AND PERVASIVE COMPUTING L T P C
3 0 0 3
UNIT I MOBILE
NETWORKS 9
Cellular Wireless Networks
– GSM – Architecture – Protocols – Connection Establishment – Frequency
Allocation – Routing – Mobility Management – Security – GPRS.
UNIT II WIRELESS
NETWORKS 9
Wireless LANs and PANs –
IEEE 802.11 Standard – Architecture – Services –Network –HiperLAN – Blue Tooth-
Wi-Fi – WiMAX
UNIT III ROUTING 9
Mobile IP – DHCP – AdHoc–
Proactive and Reactive Routing Protocols – Multicast Routing.
UNIT IV TRANSPORT AND
APPLICATION LAYERS 9
Mobile TCP– WAP –
Architecture – WWW Programming Model– WDP – WTLS – WTP – WSP – WAE – WTA
Architecture – WML – WMLScripts.
UNIT V PERVASIVE
COMPUTING 9
Pervasive computing
infrastructure-applications- Device Technology - Hardware, Human-machine
Interfaces, Biometrics, and Operating systems– Device Connectivity –Protocols,
Security, and Device Management- Pervasive Web Application architecture- Access
from PCs and PDAs - Access via WAP
TOTAL: 45 PERIODS
TEXT BOOKS:
1. Jochen Schiller, “Mobile Communications”, PHI, Second Edition, 2003.
2. Jochen
Burkhardt, Pervasive Computing: Technology and Architecture of Mobile Internet
Applications, Addison-Wesley Professional; 3rd edition, 2007
REFERENCES:
1. Frank Adelstein, Sandeep KS
Gupta, Golden Richard, Fundamentals of Mobile and Pervasive Computing,
McGraw-Hill 2005
2. Debashis Saha,
Networking Infrastructure for Pervasive Computing: Enabling Technologies,
Kluwer Academic Publisher, Springer; First edition, 2002
3. Introduction to
Wireless and Mobile Systems by Agrawal and Zeng, Brooks/ Cole(Thomson
Learning), First edition, 2002
4. Uwe Hansmann,
Lothar Merk, Martin S. Nicklons and Thomas Stober, Principles of Mobile
Computing, Springer, New York ,
2003.
MOBILE AND PERVASIVE COMPUTING
UNIT-I- MOBILE
NETWORKS
1. How to improve signal reception by
countered the negative effects of multipath propagation?
Signal degradations due to multipath
are fading and delay spread. Fading can be overcome by diversity reception.
Delay spread will result in Inter Symbol Interference which can be compensated
by equalizers.
2. What are the advantages of cellular systems?
The advantages of cellular systems are,
- Higher capacity
- Less transmission power
- Local interface only
- Robustness
3.
List out
disadvantages of cellular systems. (Nov/Dec-2008)
(i)
Self-jamming:
Unless all of the mobile users are perfectly synchronized, the arriving
transmission from multiple users will not be perfectly aligned on chip
boundaries. Thus the spreading sequences of the different users are not
orthogonal and there is some level of cross correlation.
(ii)
Near-far
problem: Signals closer to the receiver are received with less attenuation than
signals farther away. Given the lack of complete orthogonality, the
transmissions from the more remote mobile units may be more difficult to
recover. Thus, power control techniques are very important in a CDMA system.
(iii)
Soft
handoff: A smooth handoff from one cell to the next requires that the mobile
unit acquires the new cell before it relinquishes the old. This referred to as
a soft handoff and is more complex than the hard handoff used in FDMA and TDMA
schemes.
4.
What are the
three services offered by GSM ?
Three
services offered by GSM are
·
Bearer services
·
Tele services
·
Supplementary services
5.
What are the
tele services of GSM ?
GSM mainly
focuses on voice oriented tele services. The main services are
·
Telephony
·
Emergency number
·
Short message service
·
Group 3 fax
6.
State the
three subsystems of GSM.
A
GSM system consists of three subsystems,
- Radio Subsystems – it comprises all radio specific entities
·
Network
and switching subsystems – The NSS connects wireless networks with standard
public networks.
- Operating Subsystem – It contains all functions necessary for network operation and maintenance.
7.
What are the
supplementary services offered by GSM ?
Supplementary services offer various enhancements for the standard
telephony service. Typical services are
·
User identification
·
Call redirection or forwarding of ongoing calls
·
Closed user group
·
Multiparty communication
8.
What are the
main task of the physical layer in GSM ?
The
main tasks of the physical layer comprise channel coding and error
detection/correction, which is directly combined with the coding mechanisms.
Channel coding makes extensive use of different forward error correction(FEC)
schemes. FEC adds redundancy to user data, thus allowing for the detection and
correction of selected errors.
9.
What are the
four possible handover scenarios in GSM ?
The
following are the four possible handover scenarios in GSM.
- Intra-cell
handover
- Inter-cell,
intra-BSC handover
- Inter-BSC,
intra-MSC handover
- Inter MSC
handover
10.
What are the
two basic reason for handover ?
There
are two basic reasons for handover.
- The mobile station moves out of the range of a BTS or a certain antenna of a BTS respectively.
- The wired infrastructure may decide that the traffic in one cell is too high and shift some MS to other cells with a lower load.
11.
State the
security services offered by GSM.
The
security services offered by GSM are explained in the following.
- Access control and Authentication : Authentication of valid user for the SIM
·
Confidentiality
: All user-related data is encrypted. After authentication, BTS and MS
apply encryption to voice, data and signals.
- Anonymity : To provide user anonymity, all data are encrypted before transmission, and user identifiers which would reveal an identity are not used over the air.
12.
What are the
channel types of GSM system?
i) GSM traffic
channel
ii) GSM control
channel
·
Broad cost channel
·
Common control channel
·
Dedicated control channel
13.
What is
error correction code ?
A code in which
each expression conforms to specific rules of construction so that departures
from this construction can be automatically detected and permits the automatic
correction of some or all of the errors.
14.
What is
Error detecting code ?
A code in which
each expression conforms to specific rules of constructions so that if certain
errors occur in an expression, the resulting expression will not conform to the
rules of construction and thus the presence of the errors is detected.
15.
What is FEC
?
FEC stands for
forward error correction, it is a procedures whereby a receiver, using only
information contained in the incoming digital transmission, a receiver corrects
bit errors in the data.
16.
What are the
switches and databases consists of NSS ?
The Network and
Switching subsystem consists of the following switches and databases,
- Mobile services switching centre (MSC)
- Home location register (HLR)
- Visitor location register (VLR)
17.
What is the
function of operation subsystem(OSS )
?
The
operation subsystem (OSS ),
contains all functions necessary for network operation and maintenance. The OSS possess the following
entities;
- Operation and maintenance centre (OMC)
- Authentication centre (AuC)
- Equipment identity register (EIR)
18.
What is
burst and burst error ?
Burst :Data is transmitted in small
portions, called burst.
Burst error :A burst error of length B
is a contiguous sequence of B bits in which the first and last bits and any
number of intermediate bits are received in error.
19.
What is the
use of training sequence field in GSM TDMA frame ?
The training
sequence in the middle of a slot is used
to adapt the parameters of the receiver to the current pat propagation
characteristics and to select the strongest signal in case of multi path
propagation.
20.
What is the
use of guard space in GSM TDMA frame ?
The guard space
is used to avoid overlapping with other bursts due to different path delays and
to leave the transmitter time to turn on and off.
21.
What is the
use of different burst in GSM TDMA frame ?
Frequency correction burst : allows the MS to correct the local
oscillator to avoid interference with neighboring channels.
Synchronization burst : synchronizes the MS with the BTS in time.
Access burst : used for the initial connection setup between MS and
BTS.
Dummy burst : it is used if no data is available for a slot.
22.
What is the
purpose of comfort noise generated by physical layer of GSM ?
In
voice data transmission, during periods of silence (e.g., if a user needs time
to think before talking), the physical layer generates a comfort noise to fake
a connection (complete silence would probably confuse a user), but no actual
transmission takes place.
23.
What is the
use of TMSI ?
TMSI
is a temporary mobile subscriber identity, it is used to hide the IMSI, which
would give away the exact identity of the user which is signaling over the air
interface.
24.
What are the
numbers needed to locate and address MS in GSM system ?
To
locate an MS and to address the MS, the following numbers are needed,
- Mobile station international ISDN number (MSISDN)
- International mobile subscriber identity (IMSI)
- Temporary mobile subscriber identity (TMSI)
- Mobile station roaming number (MSRN)
25.
What are the
security services offered by the GSM ?
The
security services offered by the GSM are,
- Access control and authentication
- Confidentiality
- Anonymity
26.
What are the
three algorithms have been specified to provide security services in GSM?
The
three algorithms have been specified to provide security services in GSM are,
- Algorithm A3 : used for authentication
- Algorithm A5 : used for encryption
- Algorithm A8 : used for generation of a cipher key.
27.
What is
challenge-response method ?
In
GSM, authentication uses a challenge-response method: the access control AC
generates a random number RAND as challenge, and the SIM within the MS answers
with SRES (signed response) as response. Both sides, network and subscriber
module, perform the same operation with RAND and the key Ki called A3. The MS
sends back the SRES generated by the SIM, the VLR can now compare both values.
If they are the same, the VLR accepts the subscriber, otherwise the subscriber
is rejected.
28.
What is
HSCSD ?
A
straightforward improvement of GSM’s data transmission capabilities is high
speed circuit switched data (HSCSD). In this system, higher data rates are
achieved by bundling several TCHs(Traffic Channel). An MS requests one or more
TCHs from the GSM network, i.e., it allocates several TDMA slots within a TDMA
frame.
29.
What is GPRS
?
GPRS
stands for general packet radio service, it is a more flexible and powerful
data transmission technique. GPRS provides packet mode transfer for
applications.
30.
What is the
big difference between GSM and DECT ?
A
big difference between GSM and DECT exists in terms of cell diameter and cell
capacity. While GSM is designed for outdoor use with a cell diameter of up to
70 km, the range of DECT is limited to about 300 m from the base station.
31. List the three different categories of
services of GSM. (Nov/Dec-2007)(Nov/Dec-2013)
Three
categories of services of GSM are:
·
Bearer services
·
Tele services
·
Supplementary services
32.
Differentiate
symmetric and asymmetrical communication system
(Nov/Dec-2008)
Sl.No.
|
Symmetrical Communication System
|
Asymmetrical Communication System
|
1.
|
Channel
characteristics from one direction to other and vice-versa are same.
|
Refers to any system
in which the data speed or quality differ in one direction as compared with
other direction.
|
2.
|
Bandwidth ,
transmission power, cost factor are same on both direction.
|
Differences in
transmission power, antenna characteristics.
|
33. Compared in the TCHs offered, standard GSM could provide a
much higher data rate(33.8kbits/s) when looking at the air interface. What
lowers the data rates available to a user? (Nov/Dec-2008)
Data transmission in GSM is possible at
many different data rates.
Example: TCH/F4.8 for 4.8 kbps
TCH/F9.6 for 9.6 kbps
TCH/F14.4 for 14.4 kbps
(OR)
Main reason is the
forward error correction to mitigate transmission errors. Furthermore bandwidth
is needed for signaling guard spaces
34. How much of the original GSM network does GPRS need? Which
elements of the network perform the data transfer? (Nov/Dec-2008)
GPRS is an enhancement of SM. It uses
same physical channel as GSM and only new logical GPRS radio channels are
defined. Elements needed for data transfer:
¨ GPRS Support Nodes(GSN)
¨ Gate way GPRS Support
Node(GSN)
¨ Serving GPRS Support
Node(SGSN)
¨ GPRS Register(GR)
35. What are the reasons for delays in GSM for packet data
traffic? (April/May 2008)
(i)
Different
data rates provided by traffic channels are low.
(ii)
Authentication
and encryption also makes the packet data transmission slow.
(iii)Various
interferences and noises from the channel also courses delay.
36. State the objectives of UMTS. (April/May 2008)
One initial enhancement
of GSM toward UMTS was Enhanced Data rates for Global Evolution (EDGE), which
uses enhanced modulation (SPSK) and data rates upto 384kbits/s using 200 kHz
wider carrier.
37.
What are the
general problems of satellite signals traveling from a satellite to a receiver?
(Nov/Dec-2008)
Terrestrial object that
would block the LOS, may result in attenuation of the signal absorption or in
distortion due to multipath reflection. Atmospheric attenuation is greater at
low elevation angle because the signal traverse the atmosphere for longer
distances. Electrical noise generated by the earth’s heat near its surface
adversely affects reception.
38.
What are the
reasons for delays in GSM for packet data traffic? (May/June 2009)
Connection
setup(some seconds), FEC coding/decoding and interleaving(about 100 ms),
Propagation delay(some ms).
39.
Differentiate
hard and soft hand-off (April/May 2008), (Apr/May 2010)
Sl.No.
|
Hard Handoff
|
Soft Handoff
|
1.
|
UTRA TDD can only use
this type
|
This is available only
in FDD mode
|
2.
|
All inter system
handovers are hard handovers.
|
UE receives data from
different antennas at the same time makes a handover soft.
|
40. What are the two basic classes of handover? (Nov/Dec 2011)
There are two basic
classes in handover:
(i)Hard handover:
Switching between different antennas or different system is performed at a
certain point in time.
(ii)Soft handover: This
is a real mechanism in UMTS compare to GSM and this is available in FDD mode
41. Define Elevation angle? (Nov/Dec 2011)
The elevation angle is
defined as a angle between the centre of satellite beam and the plane
tangential to the earth’s surface.
42. Which are the new components added to GPRS networks?
(May/Jun-2012)
Serving GPRS Support
Node(SGSN),
Gateway GPRS Support
Node(GGSN)
43. Why are so many different identifiers/addresses needed in
GSM? (May/Jun-2012)
Users of GSM systems works with telephone
numbers. This phone numbers are completely independent of the current location
of the user. The system itself needs some additional information. However, it
must not reveal the identity of users. The international identification of
users is done with the IMSI. During operation within a location area, only a
temporary identifier, the TMSI is needed. This hides the identity of user. The
TMSI is not forwarded to the HLR. But instead another temporary number reflects
the location and any roaming required is the MSRN is used internally by the
system.
44. What are the effects of multipath propagation?( Nov/Dec
2013)
The effects of
multipath include constructive and destructive interference, and phase shifting
of the signal. In digital radio communications (such as GSM) multipath can cause
errors and affect the quality of communications.
45.
What is
polling? ( Nov/Dec 2013)
Where one
station is to be heard by others(Base Station of mobile network or any other dedicated
system) polling scheme can be applied. Polling is a strictly centralized scheme
with one master station and several Slave station.
UNIT-II-TELECOMMUNICATION NETWORKS
1.
What are the
advantages exhibit by WLANs ?
Advantages
–
Flexible
deployment
–
Minimal
wiring difficulties
–
More
robust against disasters (earthquake etc)
–
Historic
buildings, conferences, trade shows,…
2.
What are the
disadvantages exhibit by WLANs ?
Disadvantages
–
Low
bandwidth compared to wired networks (1-10 Mbit/s)
–
Proprietary
solutions
–
Need to follow
wireless spectrum regulations
–
High cost
–
Restrictions
–
Safety and Security
3.
What are the
design goals have to taken into account for WLANs to ensure their commercial
success ?
·
Global Operation
·
Low power
·
License-free operation
·
Robust transmission technology
·
Simplified spontaneous co-operation
·
Easy to use
·
Protection of investment
·
Safety and security
·
Transparency for application
4.
Give the
different field names of FHSS PHY frame. (Nov/Dec 2013)
FHSS PHY packet format
Synchronization
q
synch with 010101... pattern
SFD (Start Frame
Delimiter)
q
0000110010111101 start pattern
PLW (PLCP_PDU
Length Word)
q
length of payload incl. 32 bit CRC of payload,
PLW < 4096
PSF (PLCP
Signaling Field)
q
data of payload (1 or 2 Mbit/s)
HEC (Header
Error Check)
q
CRC with x16+x12+x5+1
5.
What are the
three basic access mechanisms of IEEE 802.11?
The
following three basic access mechanisms have been defined for IEEE 802.11:
- Mandatory basic method – based on a version of CSMA/CA,
- An optional method - avoiding the hidden terminal problem,
- Contention free polling method – for time bounded service.
6.
What are the
functional groups of MAC management?
Synchronization
·
try to find a LAN, try to stay within a LAN
·
timer etc.
Power management
·
sleep-mode without missing a message
·
periodic sleep, frame buffering, traffic
measurements
Association/Reassociation
·
integration into a LAN
·
roaming, i.e. change networks by changing access
points
·
scanning, i.e. active search for a network
MIB
- Management Information Base
·
managing, read, write
7.
Give the
characteristics of HIPERLAN.
HIPERLAN – High Performance Local Area Network
Data
transmission
q
point-to-point, point-to-multipoint,
connectionless
q
23.5 Mbit/s, 1 W power, 2383 byte max. packet
size
Services
q
asynchronous and time-bounded services with
hierarchical priorities
q
compatible with ISO MAC
Topology
q
infrastructure or ad-hoc networks
q
transmission range can be larger then coverage
of a single node („forwarding“
integrated in mobile terminals)
8.
What are the
three phases of medium access for EY-NPMA ?
EY-NPMA
(Elimination Yield Non-preemptive Priority Multiple Access) divides the medium
access of different competing nodes into three phases.
·
Prioritization : Determines the highest priority
of a data packet ready to be sent on competing nodes.
·
Contention : Eliminates all but one of the
contenders, if more than one sender has the highest priority.
·
Transmission : Finally, transmit the packet of
the remaining node.
9.
State two
service primitives offers MAC layer, for data transfer.
For
data transfer, the MAC layer offers two service primitives.
- HM-UNIDATA.req : This primitive can be used to send the MSDU with a certain priority and lifetime to one or more destinations.
- HM-UNIDATA.ind : This primitive indicates an MSDU received and also includes the residual lifetime.
10.
Write a note
on Bluetooth .
- Universal radio interface for ad-hoc wireless connectivity
- Interconnecting computer and peripherals, handheld devices, PDAs, cell phones – replacement of IrDA
- Embedded in other devices, goal: 5€/device (2005: 40€/USB Bluetooth)
- Short range (10 m), low power consumption, license-free 2.45 GHz ISM
- Voice and data transmission, approx. 1 Mbit/s gross data rate
11.
Write a note
on Piconet.
- Collection of devices connected in an ad hoc fashion
- One unit acts as master and the others as slaves for the lifetime of the piconet
- Master determines hopping pattern, slaves have to synchronize
- Each piconet has a unique hopping pattern
- Participation in a piconet = synchronization to hopping sequence
- Each piconet has one master and up to 7 simultaneous slaves (> 200 could be parked
12.
What are the
primary goal of IEEE 802.11 Wireless LAN ?
The
primary goal of the standard was the specifications of a simple and robust WLAN
which offers time bounded and asynchronous services.
13.
What is
station and access point ?
Station :
Several
nodes in the network are called stations or terminals with access mechanisms to
the wireless medium and radio contact to access points (AP).
Access Point :
Various
stations are connected to Access Points, which connects the WLANs to other
network or to the other WLAN.
14.
What are the
sub layers of physical layer in 802.11 ?
There
are two sub layers of physical layer in 802.11 are
- PLCP (Physical layer convergence protocol)
- PMD (Physical medium dependent)
15.
What are the
functions of MAC management ?
The
MAC management supports the association and re-association of a station to an
access point and roaming between different access points.
16.
Define FHSS.
FHSS
(Frequency Hopping Spread Spectrum) is a spread spectrum technique which allows
for the coexistence of multiple networks in the same area by separating
different networks using different hopping sequence.
17.
What is DIFS,
PIFS, SIFS ?
DCF
Interference spacing (DIFS) denotes the longest waiting time and thus the
lowest priority for medium access. PCF Interference spacing (PIFS) is the
waiting time between DIFS and SIFS is used for a time bounded service. Shortest
interference spacing (SIFS) is the shortest waiting time for medium access is
defined for short control messages such as acknowledgements for data packets or
polling responses.
18.
Write note
on problems in the access scheme ?
The
access scheme has the problems under heavy or light load, depending on the size
of the contention window(CW), the random values can either be too close
together, causing too many collisions and cause unnecessary delay.
19.
What are the
fields in the format of an IEEE 802.11 PHY frame using FHSS?
The fields in
the frame fulfill the following functions :
·
Synchronization
·
Start frame delimiter (SFD)
·
PLCP-PDU length word(PLW)
·
PLCP signaling field(PSF)
·
Header error check(HEC)
20.
What is the
use of sequence control field in IEEE 802.11 MAC data frame ?
Due
to the acknowledgement mechanism it may happen that frames are duplicated.
Therefore a sequence number is used to filter duplicates.
21.
What is CRC & Checksum?
The
cyclic redundancy check is an error detecting code in which the code is the
remainder resulting from dividing the bits to be checked by a predetermined
binary number. Checksum is an error detecting code based on a summation
operation performed on the bits to be checked.
22.
What are the
functional groups have been identified in MAC management of IEEE 802.11 ?
The
following functional groups have been identified in MAC management of IEEE
802.11
- Synchronization
- Power management
- Roaming
- Management information base (MIB)
23.
What is
roaming?
Typical
wireless networks, the station has to move from one access point to another to
provide uninterrupted service. Moving between access points is called roaming.
24.
When the
station starts scanning in IEEE 802.11?
A
station decides that the current link quality to its access point AP1is too
poor. The station then starts scanning for another access point.
25.
Differentiate
Passive and Active scanning ?
Passive Scanning :
Passive
Scanning simply means, station listening into the medium to find other
networks, i.e., receiving the beacon of another network issued by the
synchronization function within an access point.
Active Scanning :
Active
Scanning comprises sending a probe on each channel and waiting for response.
Beacon and probe response contain the information necessary to join the new
BSS.
26.
State two
service primitives offers CAC sub layer, for data transfer.
For
data transfer, the CAC sub layer offers two service primitives.
- HC-UNITDATA.req (source HCSAP, destination HCSAP, HCSDU, HIPERLAN identifier, channel access priority): This service primitive is used for sending data.
- HC-UNITDATA.ind (source HCSAP, destination HCSAP, HCSDU, HIPERLAN identifier): This service primitive indicates incoming data.
27.
What are the
subdivisions of contention phase in HIPERLAN?
The
contention phase is further subdivided into an elimination phase and a yield
phase. The purpose of the elimination phase is to eliminate as many contending
nodes as possible. The result of the elimination phase is a more or less
constant number of remaining nodes, almost independent of the initial number of
competing nodes. Finally, the yield phase completes the work of the elimination
phase with the goal of only one remaining node.
28.
What are the
states a Bluetooth device can go for save battery power?
To
save battery power, a Bluetooth device can go into the one of the three low
power states if no data is ready to sent :
- PARK state
- HOLD state
- SNIFF state
29.
What are the
services offered by Bluetooth?
Bluetooth
offers two different types of services
- Synchronous connection-oriented link(SCO)
- Asynchronous connectionless link(ACL)
30.
What is scatternet?
The
idea of forming groups of piconets called scatternet.
31.
What are the
main security features offered by Bluetooth?
The
main security features offered by Bluetooth include a
- Challenge-response routine for authentication
- A stream cipher for encryption
- Session key generation
32.
What are the
functions of LM in Bluetooth?
A Bluetooth
system is managed by a link manager (LM0. An LM handles the authentication
procedures, negotiates authentication parameters, carries out link setup and
release, configures links etc.
33. What are the two different basic
transmission technologies used to setup WLANs? (Nov/Dec-2007)
Three possible
transmission technologies used in WLANs are:
(i)
Infrared communication
(ii)
Spread spectrum communication
(iii)
Narrowband microwave communication
34. What is WiMax?
WiMAX(Worldwide
Interoperability for Microwave Access) is a communication protocol
providing fixed and mobile Internetr access. It is implemented with standards
specified in IEEE 802.16. It currently
offers data transfer rate upto 40MB/Sec but with IEEE 802.16m it goes upto 1
GB/sec. It is similar to Wi-Fi but it allows longer distance connections.
35. Where the WiMAX application is useful?
It is useful in,
·
Providing portable mobile connectivity across
cities.
·
Providing suitable alternative for the ‘lat
mile’ connection.
·
Providing three types of services, namely data, telecommunications and IPTV.
·
Acting as a source of Internet services.
36. Compare WiMAX with Wi-Fi.
·
WiMAX is a long range system. It can support
wireless connectivity over a few kilometers using licensed spectrum for
Internet access.
·
Wi-Fi is used to support connectivity to local
network in unlicensed spectrum.
·
WiMAX uses a connection oriented MAC whereas
Wi-Fi uses a connectionless contention based CSMA/CA protocol for MAC.
·
In WiMAX each connection to base station is
based on scheduling algorithm. Wi-Fi uses contention access.
37. List the different user scenario for wireless
piconets. (Nov/Dec-2007)
In scatternet,
overlapped piconets can exist. It devices in one piconet can be member in
another piconet. There can be two piconets without overlap.
38. What is HIPERLAN? (Nov/Dec-2008)
HIPERLAN (High Performance Radio LAN): It is
a new standard for radio LAN developed by ETIS. Offers interoperability
standard which specifies a common air interface. EITS developed a standard that
would be equivalent in performance to wired LAN such as Ethernet.
39. How is mobility restricted using WLANS? (Nov/Dec-2008)
WLAN: Mobile
restricted with respected to the Access Point. When moving the mobile entity
needs to change Network Access Point. Every mobile entity(person,terminal) must
have its own identity. An identifier is assigned uniquely to one mobile entity.
40. Why the PHY layer of IEEE 802.11 is
subdivided?(April/May 2008),(Nov/Dec-2008)
Physical
layer is subdivided into,
1.PLCP(physical Layer Convergence
Protocol):It provides a carrier sense signal, called Clear Channel
Assesment(CCA), and provides a common PHY Service Access Point (SAP)
independent of transmission technology.
2.PMD(Physical Medium Dependent) sublayer:
It handles modulation and encoding/ decoding of signals.
41. What is the functionality L2CAP? List the
different types of logical channels it provides. (Nov/Dec-2008)
The Logical Link Control and Adaptation
Protocol (L2CAP) is a data link control protocol on top of the baseband layer
offering logical channels between Bluetooth devices with QoS properties.L2CAP
provides three different types of logical channels are,
Connectionless: It is
used for broadcasting from a master to its slaves, which is a unidirectional
one.
Connection-Oriented: It
supports QoS flow specifications for each bidirectional channels.
Signalling: It is
used for exchanging signaling messages between L2CAP entities.
42. How mobility is restricted using WLANs?
(April/May 2008)
WLAN: Mobile
restricted with respected to the Access Point. When moving the mobile entity
needs to change Network Access Point. Every mobile entity (person,terminal)
must have its own identity. An identifier is assigned uniquely to one mobile
entity.
43.
Why the PHY
layer of IEEE802.11 is subdivided? What about HIperLAN2 and Bluetooth? (Nov/Dec
2008)
a.
PHY layer:
To allow coexistence of multiple Network in the same area
b.
Hiper LAN2:
BRAN PHY-1
BRAN PHY-2
ü
Bluetooth: One layer based on Infrared
ü
Two layers based
on Radio Transmission (FHSS, DSSS)
ü
Bluetooth Protocol stack divided to a core
specification which describe the protocol from physical layer to the data link
control together with management function.
ü
Profile Specification
44.
Is
IEEE802.11 and WiFi same? State the purpose of WiFi. (May/June 2009)
The newest IEEE standard in the Wi-Fi category is 802.11n.
It was designed to improve on 802.11g in the amount of bandwidth supported by
utilizing multiple wireless signals and antennas (called MIMO
technology) instead of one.
Purpose of
WiFi:
It is wireless internet. Your laptop has an internal
wireless card so you can connect to wireless routers. If you goto a hotel that
advertises free wireless internet, you should be able to connect to it. You
don't have to have an ethernet cable to connect to the web at home either. You
could buy a wireless router, and be able to have internet in most of your
house. It also works at school/library/internet cafe, etc.
45.
Why
Bluetooth specification comprises so
many protocols and components? (May/June 2009)
Since
it is a single chip low cost radio based wireless network technology. It should be operated within a Personal Operating
Space(POS).
46.
State the
three phases of the medium access of different competing nodes. (Apr/May 2010)
Ø
State sender has to sense the medium to see
if it is free.
Ø
If the medium is free the sender states for data
and continues to listen to medium
Ø
If it is busy the sender waits until if is free
47.
What are the
powers saving mechanism in Blue tooth? (Apr/May 2010)
Ø
To save power Bluetooth devices can go into one
of 3 low power state
Ø
If sender defects a collision while sending if
slops at once and sends a jamming signals
Ø
Sniff State
highest power consumption
48.
What are the
draw backs of wired networks? (Apr/May 2010)
Ø
Infra Structure Required.
Ø
It will not survive disaster
Ø
It is not flexible.
Ø
Planning is required to establish a wired
network.
Ø
Additional cabling with the right plugs and
probably internetworking units
Ø
have to
be provided.
49. Mention the features of HIPERLAN. (Nov/Dec
2011)
(i)
Integration of time sensitive data transfer
services.
(ii)
Standardization efforts had lot of impact on QOS
suppoting wireless broadband.
(iii)
The current focus is on HIPERLAN2 a standard that
comprises many elements from ETSI’s BRAN and wireless ATM activites.
50. List out the various elements of Bluetooth
core protocol. (Nov/Dec 2011)
·
Radio
·
Baseband
·
Link Manager protocol
·
L2CAP
·
Service Discovery Protocol
51. In what situations can collision occur in
IEEE802.11? (May/Jun 2012)
For 802.11 collisions on the
MAC layer are nothing unusual. The MAC algorithm with backoff solves this
problem. In 802.11 networks MAC collisions are also collisions at PHY layer.
Important packets in 802.11 have higher priorities implemented via shorter
waiting times(SIFS,PIFS).
52. What is Adaptive modulation? (May/Jun 2012)
It is a term used in
wireless communications to denote the matching of the modulation, coding and
other signal and protocol parameters to the conditions on the radio link.
Adaptive modulation systems improve rate of transmission and bit error rates by
exploiting the channel information that is present at the transmitter.
Especially over fading channels, adaptive modulation system exhibit great
performance enhancements compared to systems that do not exhibit channel
knowledge at the transmitter.
53. What
is difference between Piconet and Scatternet? (Nov/Dec 2013)
A piconet is the type of connection
that is formed between two or more Bluetooth-enabled
devices, one device takes the role of 'master', and all other devices assume a 'slave' role for synchronization reasons.
Scatternet is a number of
interconnected piconets that supports communication between
more than 8 devices. Scatternets can be formed when a member of one piconet (either the master or one of the slaves) elects to
participate as a slave in a second, separate piconet.
UNIT-III - ROUTING
1.
State the
Motivation for Mobile IP.
Routing
·
Based on IP destination address, network prefix
(e.g. 129.13.42) determines physical subnet
·
Change of physical subnet implies change of IP
address to have a topological correct address (standard IP) or needs special entries
in the routing tables
Specific
routes to end-systems
·
Change of all routing table entries to forward
packets to the right destination
·
Does not scale with the number of mobile hosts
and frequent changes in the location, security problems
Changing
the IP-address
·
Adjust the host IP address depending on the
current location almost impossible to find a mobile system, DNS updates take to
long time
·
TCP connections break, security problems
2.
What are the
requirements for Mobile IP.(Nov/Dec 2013)
·
Transparency
·
Compatibility
·
Security
·
Efficiency and scalability
3.
What are all
the entities and terminologies needed for understanding Mobile
IP?
·
Mobile Node (MN)
·
Correspondent Node (CN)
·
Home network
·
Foreign network
·
Home Agent (HA)
·
Foreign Agent (FA)
·
Care-of Address (COA)
4.
Define Mobile Node(MN), Correspondent Node (CN),
A mobile node is an end system or router that can change the point of connection
to the network without changing its IP address. At least one partner is needed for communication. The CN represents the partner for the MN. The CN can be a fixed or mobile node.
to the network without changing its IP address. At least one partner is needed for communication. The CN represents the partner for the MN. The CN can be a fixed or mobile node.
5.
Define Home
Network and Foreign Network.
The
home network is the subnet the MN belongs to with respect to its IP address.
Within the home network no mobile IP support is needed.
The
Foreign Network is the current subnet the MN visits and which is not the home
network.
6.
Define Home
Agent (HA) and Foreign Agent (FA).
Home Agent (HA):
·
System in the home network of the MN, typically
a router
·
Registers the location of the MN, tunnels IP
datagrams to the COA
Foreign Agent (FA):
·
System in the current foreign network of the MN,
typically a router
·
Forwards the tunneled datagrams to the MN,
typically also the default router for the MN
7.
Define Care-of
Address (COA)
·
address of the current tunnel end-point for the
MN (at FA or MN)
·
actual location of the MN from an IP point of
view e.g., via DHCP
8.
What are the
two different possibilities for the location of the COA?
·
Foreign agent COA : The COA is an IP address of the FA.
·
Co-located COA :
The COA is called co-located if the MN temporarily acquired an additional IP
address with acts as COA.
9.
What are the
three alternatives exist for the implementation of an HA?
·
The HA can be implemented on a router that is
responsible for the home network.
·
If changing the router’s software is not
possible, the HA could implemented on an arbitrary node in the subnet.
·
Finally, a home network is not necessary al all.
The HA could be again on the ‘router’ but this time only acting as a manager
for MNs belonging to a virtual home network.
10.
What is the
main purpose of the registration in mobile IP ?
The
main purpose of the registration is to inform the HA of the current location
for correct forwarding of packets. Registration can be done in two different
ways depending on the location of the COA.
11.
Define
Encapsulation and decapsulation.
Encapsulation :
Encapsulation
is the mechanism of taking a packet consisting of packet header and data and
putting into the data part of a new packet.
Decapsulation.
The
reverse operation, taking a packet out of the data part of another packet, is
called decapsulation.
12.
In agent
advertisement packet, Lifetime and Registration lifetime denotes what?
Lifetime :
Lifetime denotes the length of time the advertisement is valid.
Registration lifetime
: By the registration lifetime the agent can specify the maximum lifetime in
seconds a node can request during registration.
13.
What is
tunnel ?
A
Tunnel establishes a virtual pipe for data packets between a tunnel entry and a
tunnel endpoint.
14.
Mention different
types of encapsulation.
- IP-in-IP-encapsulation (mandatory)
- Minimal encapsulation (optional)
- Generic routing encapsulation
15.
What is
IP-in-IP-encapsulation ?
IP-in-IP-encapsulation represents tunnel between Home Address (HA) and Care Of Address (COA).
16.
What is Minimal
encapsulation ?
- Avoids repetition of identical fields
- e.g. TTL, IHL, version, DS (RFC 2474, old: TOS)
- Only applicable for unfragmented packets, no space left for fragment identification
17.
What is Generic
routing encapsulation ?
Generic routing
encapsulation allows the encapsulation of packets of one protocol suite into
the payload portion of a packet of another protocol suite.
18.
What is the
function of recursion control field in generic routing encapsulation?
The
recursion control field is an important field that additionally distinguishes
GRE from IP-in-IP and minimal encapsulation. This field represents a counter
that shows the number of allowed recursive encapsulation.
19.
What is
triangular routing ?
- sender sends all packets via HA to MN
- higher latency and network load
20.
What are the
additional messages needed by the optimized mobile IP ?
- Binding request
- Binding update
- Binding Acknowledgement
- Binding Warning
21.
What is
Agent Advertisement in Mobile IP ?
·
HA and FA periodically send advertisement message
in to their physical subnets.
·
MN listens to these messages and detects, if it
is in the home or a foreign network.
·
MN reads COA from the FA advertisement messages.
22.
In what way
routing optimization is to be done ?
One
way to optimize the route is to inform the CN of the current location of the
MN. The CN can thus learn the location by caching it in a binding cache which
is a part of the local routing table for the CN.
23.
What are all
the areas the Ad hoc networks are used ?
- Instant infrastructure
- Disaster relief
- Remote areas
- Effectiveness
24.
What is the
function of Dynamic Source Routing ? (Apr/May 2010)
Split routing
into discovering a path and maintaining a path
Discover a path:
q
Only if a path for sending packets to a certain
destination is needed and no path is currently available
Maintaining a path:
q
Only while the path is in use one has to make
sure that it can be used continuously
25.
What are the
severe problems associated with Reverse Tunneling ?
- Firewalls : Firewalls only allow packets with topologically correct addresses to pass. However, MN still sends packets with its fixed IP address as source which is not topologically correct in a foreign network.
- Multicast : An MN in the foreign network cannot transmit multicast packets in a way that they emanate from its home network without a reverse tunnel.
- TTL : The TTL is low enough so that no packet s transmitted outside a certain region.
26.
What are the
fundamental differences between wired networks and ad hoc networks related to routing ?
- Asymmetric links
- Redundant links
- Interference
- Dynamic topology
27.
What are the
two things DSDV adds to the distance vector algorithm ?
- Sequence numbers : Sequence no. help to apply the advertisement in correct order.
·
Damping : Transient changes in topology that are
of short duration should not destabilize the routing mechanism.
28.
What are the
work done by a node while it receives a route request ?
- If the node has already received the request, it
drops the request packet.
- If the node recognizes its own address as the
destination, the request has reached its target.
- Otherwise, the node appends its own address to a list
of traversed hops in the packet and broadcasts this updated route request.
29.
What is Ad
hoc networks ?
Ad
hoc networks, do not need any infrastructure to work. Each node can communicate
with another node, no access point controlling medium access is necessary.
30.
What is the
necessity of routing in infrastructure
network ?
The
routing is needed to find a path between source and destination and to forward
the packets appropriately.
31.
What is
distance vector routing ?
- Periodic exchange of messages with all physical neighbors that contain information about who can be reached at what distance.
- Selection of the shortest path if several paths available.
32.
How dynamic
source routing divides the task of routing into two separate problems ?
The
Dynamic source routing divides the task of routing into two separate problems :
- Route discovery: A node only tries to discover a route to a destination if it has to send something to this destination and there is currently no known route.
- Route maintenance: If a node is continuously sending packets via a route, it has to make sure that the route is held upright. As soon as a node detects problems with the current route, it has to find an alternative route.
33.
How does the
registration on layer 3 of a mobile node work?
Registration
can be done in two different ways,
i.
If the COA is at the FA, and
ii.
If the COA is
co-located.
34.
. What are
the advantages does the use of IPv6 offer for mobility?
i. COA can be auto configured.
ii. No need for a separate FA instead all the routers perform routing
advertisement.
iii.The address
are always collocated COA.
iv.Sending a
signal via HA not needed.
35. What are the problems related to the use of
DHCP? (Nov/Dec-2007)
i)
Security is a major problem with DHCP. There is no
authentication procedure for DHCP messages.
ii)
There is no specific protocol for DHCP server to server
communication.
36. Discuss some of the routing metrics to be
considered in a mobile network layer. (Nov/Dec-2007)
(i)
Destination Sequence Distance Vector (DSDV).
(ii)
Dynamic Source Routing (DSR)
(iii)No. of hops in each route.
37. What could be quick ‘solutions’ and why
don’t they work? (Nov/Dec-2008)
¨ Change
of all routing table entries to forward packets to the right destination and
frequent changes in the location, and security problem needs a quick solution
by assigning the computer a new topologically correct IP address.
¨ Adjust
the host IP address depending on the current location.
¨ Mobile
nodes would have to notify all communication parties about new address.
¨ Router
always chooses the best filling prefix for the routing decision.
38. What advantages does the use of IPv6 offer
for mobility? (Nov/Dec-2008)
¨COA can be auto configured.
¨No need for a separate FA
instead all the routers perform routing advertisement.
¨The address are always
collocated COA.
¨Sending a signal via HA not
needed(Automatic path optimization)
39. How does registration on layer 3 of a
mobile node work? (Nov/Dec-2008)
Registration
can be done in two different ways,
(i)
If the COA is at the FA, and
(ii)
If the COA is co-located.
|
|
MN FA HA MN HA
T t
Figure: Registration of a mobile node via
the FA or directly with the HA
40. Why is routing in multi-hop ad-hoc networks
complicated? (April/May 2008)
The
routing in multi-hop ad-hoc network is complicated because,
(i) Traditional
routing algorithms will not work efficiently.
(ii) Routing
in wireless ad-hoc cannot rely on layer three knowledge alone.
(iii)Centralized approaches
will not work, because it takes too long to collect the current status.
(iv)Forwarding a packet in the case of unknown topology is
flooding.
41. Why is the basic purpose of DHCP?
(April/May 2008)
The
basic purpose of DHCP is to provide an IP address. The Dynamic host
configuration protocol (DHCP) is mainly used for the simplification of
installation and maintenance of networked computers. The DHCP model is based on
a client/server model. DHCP clients send a request to a server to which the
server responds. A client sends requests using MAC broadcasts. A DHCP relay
might be needed to forward requests to a DHCP server.
42. Specify the DHCP state transition diagram
for acquiring the IP address. (Nov/Dec-2008)
43. Specify the fields of minimal encapsulation
method in mobile network layer. (Nov/Dec-2008)
Minimal encapsulation is an optional
encapsulation method for mobile IP, which comprises the following fields
44.
What are the
difference between AODV and the standard distance vector algorithm? (May/June 2009)
Dynamic Source Routing (DSR):
The key distinguishing feature of DSR is the use of source routing. Dynamic
DSR is a reactive protocol
i.e. it doesn’t use periodic advertisements. It computes the routes when
necessary and then maintains them. Source routing is a
routing technique in which the sender of a packet determines the complete sequence of nodes through which the packet has to pass, the
sender explicitly lists this route in the packet’s
header, identifying each forwarding “hop” by the address of the next node to
which to transmit the packet on its way to the
destination host.
AdHoc On-Demand Distance Vector
Routing (AODV):
AODV is essentially a combination of
both DSR and DSDV. It borrows the basic on-demand mechanism of Route
Discovery and Route Maintenance from DSR, plus the use of hop-by-hop routing,
sequence numbers, and periodic beacons from DSDV. It uses
destination sequence numbers to ensure loop freedom at
all times and by avoiding the Bellman-Ford ”count-to -infinity” problem offers
quick convergence when the ad hoc network topology
changes
45.
How can DHCP
be used for mobility and support of mobile IP? (May/June2009)
It will support
the acquisition of care of address for mobile nodes the same holed for all
other parameters needed such as the address of default router, DNS server, the
time server etc. The DHCP server should be located in the sub net of the access
point of the mobile node. Authentication for DHCP messages which is needed to
protect mobile nodes from malicious DHCP server.
46.
What
contains in Mobility binding ? (Nov/Dec 2011)
The
Home Agent sets up a mobility binding containing the mobile node’s IP address
and the current COA. Additionally, the mobility binding contains the lifetime
of the registration which is negotiated during the registration process.
47.
What is
reverse tunneling? (May/Jun 2012)
A reverse tunnel is a tunnel that starts at
the care-of-address of the mobile node and terminates at the Home Agent. It is
a mechanishm, of taking a packet out of the data part of another packet.
UNIT-IV-TRANSPORT & APPLICATION LAYERS
1.
What are the
two function’s of Transport Layer in the internet ?
The two function’s
of Transport Layer in the internet is checksumming over user data and
multiplexing / de multiplexing of data from/to applications. While the network
layer only addresses a host, ports in UDP or TCP allow addressing of dedicated
applications.
2.
Differentiate
TCP and UDP. (Apr/May 2010)
The
main difference between UDP and TCP is that TCP offers connections between two
applications. Within a connection TCP can give certain guarantees, such as
in-order delivery or reliable data transmission using retransmission
techniques. Further, TCP has built-in mechanisms to behave ‘network friendly’. UDP
on the other hand provides a connectionless and unreliable datagram service. Furthermore,
UDP does not behave network friendly, i.e., does not pull back in case of
congestion.
3.
What is slow
start and Fast retransmit ?
Slow start: TCP’s reaction to a missing
acknowledgement is quite drastic, but necessary to get rid of congestion fast
enough. The behavior TCP after the detection of congestion is called slow
start.
Fast retransmit: While transmission,
there is a chance for simple packet loss due to a transmission error. The
sender can now retransmit the missing packet(s) before the timer expires. This
behaviour is called fast retransmit.
4.
What are the
advantages come with I-TCP ?
·
I-TCP does not require any changes in the TCP
protocol as used by the hosts in the fixed network for other hosts in a
wireless network that do not use this optimization.
·
Due to the strict partitioning into two
connections, transmission errors on the wireless link.
·
It is always dangerous to introduce new
mechanisms into a huge network such as the internet without exactly knowing
their behaviour.
5.
What are the
disadvantages come with I-TCP ?
- The loss of the end-to-end semantics of TCP might cause problems if the foreign agent partitioning the TCP connection crashes.
- In practical use, an increased handover latency may be much more problematic.
- The foreign agent must be a trusted entity because the TCP connections end at this point.
6.
What are the
advantages of ‘snooping’ TCP ?
- Preservation of the end-to-end TCP semantic.
- No correspondent host needs to be changed, most of the enhancements are in the foreign agent.
- It needs no handover of state as soon as the mobile host moves to another foreign agent.
- It does not matter if the next foreign agent uses the enhancement or not.
7.
What are the
disadvantages of ‘snooping’ TCP ?
·
Snooping TCP does not isolate the behaviour of
the wireless link as good as I-TCP.
·
Using negative acknowledgements between the
foreign agent and mobile hosts assumes additional mechanisms on the mobile
host.
·
All efforts for snooping and buffering data may
be useless if certain encryption schemes are applied end-to-end between the
correspondent host and mobile host
8.
State
about M-TCP.
The
M-TCP(Mobile TCP) prevent the sender window from shrinking if bit errors or
disconnection but not congestion cause current problems. M-TCP wants to improve
overall throughput, to lower the delay, to maintain end-to-end semantics of
TCP, and to provide a more efficient handover.
9.
Why M-TCP
needs a bandwidth manager ?
On
the wireless side an adapted TCP is used that can recover from packet loss much
faster. This modified TCP does not use slow start, thus, M-TCP needs a
bandwidth manager to implement fair sharing over the wireless link.
10. What are the advantages of M-TCP ?
(Nov/Dec-2008)
- M-TCP maintains the TCP end-to-end semantics
- If the MH is disconnected, M-TCP avoids useless retransmissions, slow starts or breaking connections by simply shrinking the sender’s window to 0.
- Since M-TCP does not buffer data in the SH AS I-TCP does, it is not necessary to forward buffers to a new SH.
11. What are the disadvantages of M-TCP ?
(Nov/Dec-2008)
·
As the SH does not act as a proxy as in I-TCP,
packets loss on the wireless link due to the bit errors is propagated to the
sender.
·
A modified TCP on the wireless link not only
requires modifications to the MH protocol software but also new network
elements like the bandwidth manager.
12.
What are the
advantages of fast retransmit/fast recovery approach ?
- The advantages of fast retransmit/fast recovery approach is its simplicity.
- Only minor changes in the mobile host’s software already result in a performance increase.
- No foreign agent or correspondent host has to be changed.
13.
What are the
disadvantages of fast retransmit/fast recovery approach ?
- Insufficient isolation of packet losses.
- Forcing fast retransmission increases the efficiency,
but retransmitted packets still have to cross the whole network between
correspondent host and mobile host.
14.
What are the
advantages of Transmission /time-out freezing approach ?
- It offers a way to resume TCP connections even after the longer interruptions of the connectivity.
- It is the independent of the any other TCP mechanism.
15.
What are the
disadvantages of Transmission /time-out freezing approach ?
- Not only the software on the mobile host has to be
changed.
- To be more effective, the correspondent node cannot remain
unchanged.
- All mechanisms rely on the capability of the MAC
layer to detect future interruptions.
16.
What is
selective retransmission ?
A
very useful extension of TCP is the use of selective retransmission. TCP
acknowledgements are cumulative, i.e, they acknowledge in-order receipt of
packets up to a certain packet. If the single packet is lost, the sender has to
retransmit everything starting from the lost packet.
17.
What are the
advantages of selective retransmission approach ?
- A sender retransmits only the lost packets.
- This lowers bandwidth requirements and helps especially in case of slow wireless links.
- The gain in efficiency is not restricted to wireless links and mobile environment.
18.
What are the
disadvantages of selective retransmission approach ?
There
might be minor disadvantage of more complex software on the receiver side,
because now more buffer is necessary to re sequence data and to wait for gaps
to be filled. But while memory sizes and CPU performance permanently increased,
the bandwidth of the air interface remains almost the same.
19.
What is
Transaction oriented TCP ?
T-TCP
can combine packets for connection establishment and connection release with
user data packets. This can reduce the number of packets down to only two
instead of seven.
20.
What is WAP and what are its key aspects?
•
A standard for bringing Internet content and services
to mobile devices.
•
WAP is not a service or a product but a protocol
for delivering applications.
Key
aspects:
•
It can run on any network
–
e.g. GSM, CDMA, 3G networks
•
It can run on any kind of device
–
e.g. cell phones, PDAs, and laptops.
–
achieves device-independence through the Wireless
Application Environment (WAE).
•
WAP defines a new format, the Wireless markup Language
(WML)
–
designed for efficient content delivery
21.
Give the
protocol stack of WAP.
•
Five Layers
–
Transport (WDP)
–
Security (WTLS)
–
Transaction (WTP)
–
Session (WSP)
–
Application(WAE)
22.
Write short
note on Wireless Datagram Protocol .
•Offers a consistent datagram
transport service independent of the underlying bearer
(GSM, CDMA, etc.).
•Offers more or less the same services
UDP does.
–
e.g. application addressing by port numbers.
23.
Write short
note on WML.
•A WML document is made up multiple cards.
–
Each card represents a screen of information.
•Cards can be grouped together in a
deck.
–
A WML deck is similar to an HTML page.
•Web servers deliver web pages one at
a time but WAP delivers a deck of related cards.
–
There is no waiting for the next screen (card) to
display, which differs from the web, where clicking on a new link typically
means waiting for the server to deliver that page.
24.
Write short
note on WML Script.
•A complement to WML
•Provides a general scripting
capability (like JavaScript)
–
Example: before user input is sent to a server, WML Script
can check the validity and save bandwidth and latency in case of an error.
25.
Say
something about the push architecture of WAP.
•WAP 1.2 introduces a push
architecture (2000)
•Clients pulling content from servers
are typical for today’s web.
•In a push context, the server
initiates the message transfer, not the client.
–
Useful for services such as online auctions or stock
trading, where it’s important for users to receive information whenever
something interesting happens.
26.
List out
main features of WAP. (Apr/May 2010)
§
Browser: “Micro browser”, similar to existing
web browsers
§
Markup language: Similar to HTML, adapted to
mobile devices
§
Script language: Similar to Javascript, adapted
to mobile devices
§
Gateway: Transition from wireless to wired world
§
Server: “Wap/Origin server”, similar to existing
web servers
§
Protocol layers: Transport layer, security
layer, session layer etc.
§
Telephony application interface: Access to
telephony functions
27.
What is WAP
Micro browser?
§
Optimized for wireless devices
§
Minimal RAM, ROM, Display, CPU and keys
§
Provides consistent service UI across devices
§
Provides Internet compatibility
§
Enables wide array of available content and
applications
28.
Say some WAP
“Killer” Applications.
§
Location-based services
–
Real-time traffic reporting, Event/restaurant
recommendation
§
Enterprise solutions
–
Email access, Database access, “global” intranet access
–
Information updates “pushed” to WAP devices
§
Financial services
–
Banking, Bill-paying, Stock trading, Funds transfers
§
Travel services
–
Schedules and rescheduling, Reservations
§
Gaming and Entertainment
–
Online, real-time, multi-player games
–
Downloadable horoscopes, cartoons, quotes, advice
§
M-Commerce
–
Shopping on the go
–
Instant comparison shopping
–
Location-based special offers and sales
29.
What are the
goals of Wireless Application Environment (WAE) ?
§
Goals
–
device and network independent application environment
–
for low-bandwidth, wireless devices
–
considerations of slow links, limited memory, low
computing power, small display, simple user interface (compared to desktops)
–
integrated Internet/WWW programming model
–
high interoperability
30.
What are the
things included in the WAP forum solutions ?
·
Interoperable
·
Scaleable
·
Efficient
·
Reliable
·
Secure
31.
What are the
functions offered by WTLS ?
The
WTLS – Wireless Transport Layer Security is based on transport layer security.
WTLS can offer data integrity, privacy, authentication, and denial-of-service
protection.
32.
What are the
functions offered by WTP ?
The
Wireless Transaction Protocol offers a lightweight transaction service at the
transaction SAP (TR-SAP). A transaction is defined as a request with its
response. This service efficiently provides reliable or unreliable requests and
asynchronous transactions.
33.
What are the
three classes of transaction services in WTP ? (Nov/Dec 2011)
Three
classes of transaction service offered by WTP are
- Class 0 : Unreliable one-way request
o
No retransmission if the sent message is lost.
- Class 1 : Reliable one way request.
o
Message is resent if no ACK received.
- Class 2: Reliable two-way request-response.
o
A data request is sent and a result is received
which finally is ACK’ed by the sender.
34.
What are the
service primitives offered by WTP?
The
three service primitives offered by WTP are
- TR-Invoke: to initiate a new transaction.
- TR-Result: to send back the result of a previously initiated transaction.
- TR-Abort : to abort an existing transaction.
35.
What are the
PDUs exchanged between two WTP entities?
The
Protocol Data Units exchanged between two WTP entities for normal transactions
are the
·
Invoke PDU
·
Ack PDU
·
Result PDU
36.
What are the
features offered by WSP?
Wireless
Session Protocol offers the following three general features,]
·
Session Management :
o
Capabilities of suspending and resuming a session.
-
Assume a mobile device is disconnected. The user is
able to continue operation at exactly the point where the device was switched
off.
·
Capability negotiation :
o
Clients and servers can agree upon a common
level of protocol functionality during session management.
·
Content encoding :
o
Defines the efficient binary encoding for the
content it transfers.
37.
What are the
features offered by WSP/B adapted to web browsing ?
WSP/B
– Wireless Session Protocol / Browsing – offers the following features adapted
to web browsing:
·
HTTP/1.1 functionality :
WSP/B
supports the functions HTTP/1.1 offers, such as extensible request/reply methods, composite objects, and content type negotiation
·
Exchange of session headers :
Client and server can exchange
request/reply headers that remain constant over the
lifetime of the session.
·
Push and Pull data transfer :
Pulling data from a server is on the basis of client
request.
Pushing data transfer means, with out client request
the server automatically pushing data to client.
·
Asynchronous request :
WSP/P, supports
a client that can send multiple requests to a server simultaneously.
38.
What is
T-SAP?
T-SAP
(Transport Layer Service Access Point) is the common interface to be used by
higher layers independent of the underlying network.
39.
Mention the
components of WAP.
The
various components of WAP are:
- Wireless Datagram Protocol
- Wireless Transport Layer Security
- Wireless Transaction Protocol
- Wireless session Protocol
- Wireless Application Environment
- Wireless Markup Language
- WML Script
- Wireless Telephony Application
- Push Architecture
- Push / Pull Services
40.
Why the TCP
protocols used in wired netwoks cannot be as such used in wireless networks?
(Nov/Dec-2007)
While it is
normal for TCP to assume congestion in the case of non receipt of ACK in a
fixed network. In a wireless network, the non receipt of ACK may be due to
other reasons. Moreover, packet loss in common in wireless networks. To
accommodate these situations, TCP used in wired networks cannot be used in
wireless networks.
41. Discuss the problems of a file system in
mobile environment. (Nov/Dec-2007)
Problems of file system in mobile environment:
(i)
Efficiency of bandwidth is low, protocol overhead must
be minimum.
(ii)
Transparency, i.e., file system must support mobility
& provide identical views of directories, file names & access rights.
(iii)
Consistency due to replication of data among many
mobile clients.
42. Define fast retransmit. (Nov/Dec-2008)
Fast retransmit: FR is an
enhancement to TCP which reduces the time a sender waits before retransmitting
a lost segment. The fast retransmit enhances the works as follows as follows if a TCP sender
receives three duplicated acknowledgement with the acknowledgement number the
sender can be reasonably confident that the packet loss due to transmission
error. The sender now retransmits the missing packets before the time expires.
This behavior is called fast retransmit.
43. Can the problems using TCP for mobile
communication be solved by replacing TCP with snooping TCP? Justify your
answer. (Nov/Dec-2008)
Yes.
Drawbacks of I-TCP:
¨ The one
of the demerit of I-TCP is the segmentation of single TCP connection into two
TCP connections.
¨ This
loses the original end-to-end semantic.
¨ This
problem can be solved using snooping TCP.
44. How does I-TCP isolate problems on the
wireless link? (April/May 2008),(May/Jun 2012)
(i) It
doesn’t require any changes in the TCP protocol.
(ii) Due to
strict partitioning into wireless and fixed networks, transmission errors on
the wireless link cannot propagate into fixed network.
(iii) TCP
performance can be improved using new mechanisms, with I-TCP only between MH
and foreign agent allows for testing different solutions without jeopardizing
the stability of the network.
(iv) Partitioning
into two connections also allows the use of a different transport layer
protocol between the foreign agent and the MH or the use of compressed headers
etc.
(v) Delay
on wireless links will be higher than the delay on wired networks it will be
reduced by I-TCP.
45.
Compare the
different types of transmission errors that can occur in wireless and wired
networks. (May/June 2009)
§
Packet
loss due to transmission errors:
Relatively low
in fixed networks quit high in wireless networks/ large variation/typically
compensated by FEC/ARQ.
§
Packet
loss due to congestion:
No
difference between fixed and wireless networks.
§
Packet
loss due to mobility:
Happens
only in mobile networks
46.
Name the
libraries specified by WML script. (Nov/Dec 2011)
(i)
Lang: provides function closely related to WML script
itself
(ii)
Float: Many typical arithmetic floating point operation
in this library
(iii)
String: Many string manipulation function are in this
library.
(iv) URL:
This library provides many function for handling URLs with the syntax defined
inn fielding
(v)
WML Browser: This library provides several function
typical for the browser
(vi) Dialogs:
For interaction with the user, this library has been defined.
47.
What are the
problem of proactive routing? (May/Jun 2012)
Count to infinity problem: It performs extremely poor with certain
network changes.
48.
Name the
advantages and Disadvantages of user acknowledgement in WTP? (May/Jun
2012)
Advantage:
Users can control the acknowledgement
process, users may want to know if something went wrong, sometimes it is also
possible to slow down a sender by inserting artificial delays in
acknowledgement process, the acknowledgement of the user is stronger as it
shows the sender that intended receiver and not the WTP process actually got
the message.
Disadvantage:
Users have to interact, this may take some
more time. Classical transactional services typically benefit from user
acknowledgement, for most push service user acknowledgement are not necessary,
still WTP acknowledgements can improve reliability.
49.
What is
hoarding? (Nov/Dec 2013)
The
hoarding is a cache maintenance scheme used for facilitating any disconnected
operations
50.
Draw the
components and interface of the WAP 1.x architecture. (Nov/Dec 2013)
.
UNIT – V PERVASIVE COMPUTING
1.What is pervasive computing?
Pervasive
computing also called as ubiquitous computing is the trend toward embedding
micro processors in everyday objects so that they can communicate information.
2.Discuss the problems of a file system in mobile environment.
Problems of a
file system in mobile environment:
Ø Limited resources on portable devices
Ø Low bandwidth of the wireless access
Ø Cannot rely on large caches in the end . system
or perform many updates via
the wireless
link.
3.What are the three technologies involved in
pervasive computing?
i)
Micro electronic technology.
ii)
Digital communication technology
iii)
The international standardization.
4.What are the Key characteristics of
pervasive computing?
i)
Multiple devices are integrated in the system.
ii)
Devices are used for multipurpose
iii)
A large no.of different interfaces are used to build an
optimized user interface.
iv)
Security elements are integrated to prevent
unauthorized access.
5.
What are
application of pervasive devices?
i)
Retail
ii)
Airlines check in and booking
iii)Health care
iv)car
information system
v)Tracking
6.
What are the
technologies that support the evolution of
mobile device in pervasive computing?
It
has three categories,
·
Hardware technologies
·
Software technologies for human-machine
interaction
·
Operating systems and Java platforms for PDA
7.
What are the
h/w device involved in pervasive computing?
The
hardware components required to be designed especially for mobile applications
are,
·
Batteries
·
Diaplays
·
Memory
·
Processors
8.
What are the
factors to be considered for device management to incorporate with software?
The factors are,
·
Hardware capabilities
·
Hardware Version Management
·
Software Version Management
·
Library Management
·
Devices are not connected always
·
Insecure connections
·
Unstable connections
·
Operating Syatem updates
9.
What are the
two types of error that may occur in Fingerprint authentication?
·
False
Accept Rate(FAR) – It is a rate at which the wrong person is allows access
to system
·
False
Reject Rate(FRR) – It is the rate at which a genunine person is denied
access to system
10.
List the
Functions/Features of Palm OS.
·
Task management
·
Power management
·
User management
·
Memory management
·
User Interface
·
OS size
11.
What are the
types of protocols used in Device Connectivity?
·
Wireless protocols
·
Mobile Phone technologies
·
Bluetooth
·
Mobile IP
·
Synchronization protocol
·
Transaction Protocol
·
Protocol enabled with distributed services
12.
What is
OBEX? What are its two modes?
OBEX(Object
Exchange) is defined for IrDA. It is independent of transport protocol. With
Bluetooth, it has become high level protocol to be independent of underlying
transport protocol. It is intended to make communication through IrDA as
complete as possible. It has two modes.
1. The
Session mode: For structuring the dialogue between two devices. It is based on
binary pocket-based client/server request/response model.
2. The
Object mode: It carries the information about the objects or the object
themselves. The object is a sequence of header.
13.
Distinguish the characteristics of Bluetooth and IrDA?
Characteristics
|
Bluetooth
|
IrDA
|
Frequency range
|
2.5 GHz ISM band
|
Infrared light is the physical medium
|
Security
|
Authentication based on private keys and encryption are specified
|
No inbuilt security
|
Transmission Capabilities
|
It has range of 10m supporting isochronous and synchronous
transmission
|
Point to Point connection with a narrow angle between center and
receiver is only possible.
|
Bandwidth
|
Data rate up to 1Mbps
|
Data rate up to 4Mbps
|
Speech
|
Three digital speech channels can be supported simultaneously
|
One digital speech channel is supported
|
14.
Differentiate
the different generations of mobile phone communications.
Characteristics
|
1G
|
2G
|
2+G
|
3G
|
Protocol
|
AMPS, C-Net
|
GSM, TDMA, CDMA
|
GPRS, HSCSD, EDGE
|
UMTS, W-CDMA
|
Technology
|
Analog, Circuit switched
|
Digital, Circuit switched
|
Digital, Circuit or Packet switched
|
Digital, Packet switched
|
Speech Quality
|
Poor
|
High
|
High
|
High
|
Bandwidth
|
Low
|
Low
|
Medium
|
High
|
Security
|
None
|
Depending on protocol, Low to High
|
High
|
High
|
15.
What are the
steps involved in Mobile Internet Protocol?
1.
Discover the care of address
2.
Register the care of address
3.
Tunnel the care of address
16.
What is Jini
and what are the services offered by it?
Jini is for Java
Software systems. The basic requirement is that all devices must be running
java. It ensures the uniformity of data types. It is easy to distribute data
and code among all systems.The services offered by it is,
·
Discovery
·
Look-Up
·
Leasing
·
Remote events
·
Transactions
17.
What are the
services offered by Universal Plug and Play?
·
IP addressing
·
Discovery
·
Description
·
Control
·
Events
·
Presentation
18.
What are the
security services offered by Device connectivity in Pervasive computing?
·
Identification
·
Authentication
·
Authorization
·
Transaction authorization
·
Non-repudiation
19.
What are the
features contained in Smart card?
The card contains
the following information,
1.
Private key for generating digital signatures
2.
Certificate containing data about the customer
3.
Public key associated with private key of the customer
4.
Signature for all these data
20.
Compare the
implementation method in Access from PCS and PDAs
Features
|
Implementation
for synchronized devices
|
Implementation
for intermittently connected devices
|
Implementation
for connected devices
|
Tools
Used
|
iSilo and iSilo web
|
Metroworks Code Warrior
|
KBrowser
|
Client
Data Format
|
Proprietary document format
|
Proprietary document format
|
Not Applicable
|
Client
Application
|
Special viewer for the relevant PDA operating system
|
Native application for the PDA operating
system
|
Standard WAP browser
|
Data
Actuality
|
Initial replication without enforced
updates
|
Initial replication with regular updates
|
No replication, but immediate access to
data
|
Connection
|
One-time connection for the initial
replication
|
Regular connections to synchronize data
|
Permanent connection during application
use
|
21.
How the
security is provided in WAP phones?
WAP phones allow
secured connection to WAP gateways or WAP servers. It allows RSA encryption
algorithm. Currently WAP gateway terminate the secure WTLS connection between
the WAP phone and the telecommunication company and establish a secure SSL
connection instead to the application server.
22.
Give the
other terms of pervasive computing.(Nov/Dec 2011)
·
Automobile
·
Workplace
·
Home
·
Personal Communication
·
Location based services
23.
How
biometric signals are used in pervasive computing? .(Nov/Dec 2011)
Personal characteristics such as finger
print,iris scan,signatute,hand geometry,face recognition and voice recognition
are used for biometric authentication. Since they use small sensors,
fingerprint,speaker verification are used in pervasive computing.
24.
What is
meant by pervasive computing? How is it done? (May/Jun 2012)
Pervasive
computing also called ubiquitous computing which means “exisisting everywhere”.
Pervasive computing devices are completely connected and constantly available.
It relies on the convergence of wireless technologies, advanced electronics and
internet. The goal of researches working in pervasive computing is to create a
smart products that communicate unobtrusively. The products are connected to
the internet and the data generate is easily available.
25.
What makes
Device connectivity possible in pervasive computing? .(Nov/Dec 2011)
Pervasive
devices cannot be used in stand alone mode. They have to be connected to the
services and applications through internet. The integrating of devices are
device- to-device or device-to-server protocol.
UNIT- I
BIG QUESTIONS
1.
Explain the wireless cellular system.
2.
Explain GSM architecture?
3.
Explain Protocol architecture of GSM.
4.
Explain the bearer services, tele services and
supplementary services of GSM networks.
5.
Discuss the localization and handover features of
GSM system.
6.
Explain the security features in GSM.
7.
Explain the GPRS architecture.
UNIT- II
BIG QUESTIONS
1.
Explain the IEEE 802.11 protocol architecture and
bridging with other networks.
2.
How do IEEE 802.11 solve hidden terminal problem?
Explain with necessary diagrams.
3.
Write notes on IEEE 802.11 focusing on functionalities
and also explain the concept of routing,
localization and handover in them.
4.
Present and explain the schematic of Bluetooth protocol
architecture.
5.
Compare IEEE 802.11, HiperLAN2, and Bluetooth with
regard to their ad-hoc capabilities.
6.
Where is the focus of these technologies?
7.
Explain the concept of Bluetooth architecture.
8.
Explain the concept of IEEE 802.11 medium access
control layer.
9.
Explain the fields of IEEE 802.11 MAC packet structure.
Compare them with IEEE 802.11 MAC
fields.
10.
Explain the handover scenarios of HiperLAN2 in detail.
11.
How is roaming on layer 2 achieved, and how are changes
in topology reflected. What are the
different between infrastructure based and ad-hoc networks regarding roaming?
12.
Write short notes on ad hoc networks.
13.
Explain the concept of WiFi.
14.
Explain in detail about the WiMAX.
UNIT- III
BIG QUESTIONS
1.
Explain the following with respect to mobile IP.
(i)
IP packet delivery
(ii)
Agent discovery
(iii)
Registration
(iv)
Tunneling & encapsulation
2.
Write notes on IP packet delivery, Agent Advertisement
and Discovery.
3.
Specify the inefficiencies of mobile IP regarding data
forwarding from a correspondent node to
a mobile node. State the general problems of mobile IP regarding security and support of quality of service.
4.
With a suitable example compare the behavior of DSDV
and DSR algorithm with their routing
table or cache contents.
5.
Discuss about tunneling and encapsulation mechanism and
reverse tunneling
6.
What is DSDV and explain it in detail.
7.
Explain the approaches of IP micro-mobility support ‘in
detail’.
8.
Define DSR, principle of DSR, discuss.
9.
Explain DSR protocol with example. What are the
advantage and pitfalls of cache maintenance
in DSR?
10. Explain the role of different entities in
mobile IP with an example.
11. What are the types of registration in mobile
IP? Explain.
12. Explain the different types of encapsulation
techniques in mobile IP.
13. Explain the different routing techniques
available for mobile ad hoc network with an example.
14. Explain the agent discovery process in mobile
IP.
15. Explain the different approaches available
for IPv6 to support mobility.
16.
Compare
the features of wired network with ad hoc network related to routing.
UNIT- IV
BIG QUESTIONS
1.
Explain in detail about classical enhancements to TCP
for mobility.
2.
How many types of TCP exist? Explain them in detail.
3.
Compare I-TCP, Snooping and mobile TCP
4.
Compare and contrast I-TCP, Snooping TCP, and Mobile
TCP.
5.
What is the reaction of standard TCP in case of packet
loss? In what situation does this reaction
make sense and why it is quire problematic in the case of wireless networks and
mobility?
6.
What are the primary goals or objectives of WAP forum
efforts and how the effected in the initial
WAP protocol architecture?
7.
Explain a digital video broadcasting scenario.
8.
Explain in detail about traditional TCP.
9.
Explain about indirect and snooping TCP.
10.
Briefly discuss about WAP.
11.
Compare snooping TCP with Mobile TCP with example
network scenarios.
12.
How and why does I-TCP isolate problems on the wireless
link? What are the main drawbacks
of this solution?
13.
Explain in detail about the architecture of WAP.
13. State the features of I-TCP
14. Explain the features of S-TCP.
15. State the features of M-TCP.
16. Explain the architecture of WAP.
17. Explain the features of WML.
18. Explain the function of WDP.
19. Explain the services offered by WSP.
20. Describe Transaction and Session protocols of
wireless.
21. Explain the services offered by WTA with an
example.
UNIT- V
1.
Discuss in detail about any two Pervasive
Applications of your choice in detail.
2.
Explain about the various hardware components involved in
Pervasive Computing Devices.
3.
Write brief notes on the following.
a. Speech Recognition
b. Handwriting recognition
c. Haptic Interfaces
d. QWERTY and FITALY keyboards
a. Speech Recognition
b. Handwriting recognition
c. Haptic Interfaces
d. QWERTY and FITALY keyboards
4.
Explain in detail about Bio-Metrics. List out
its merits and demerits.
5.
How is synchronization carried out in a
Pervasive Environment? Write brief notes on the syncML tool.
6.
What
are the various issues related to device management and how are they dealt
with?
7.
Explain how a Pervasive Web Application can be
secured using an ‘Authentication Proxy’.
8.
How security is achieved in MVC and JSP based
applications?
9.
Discuss in detail about the access form PCs.
10.
How is
access carried out in case of a PDA?
11. Explain in detail about access via WAP.
B.E/B.Tech Degree Examination APRIL /MAY 2010
Eighth Semester
Computer Science and Engineering
IT1402-MOBILE COMPUTING
(Regulation 2004)
Eighth Semester
Computer Science and Engineering
IT1402-MOBILE COMPUTING
(Regulation 2004)
Answer all questions
Part -A(10*2=20)Marks
1 What is spreading factor?
2.What is polling?
3.Distinguish between soft handover& hard Hand over.
4.Define foot print with respect to satellite systems.
5.State the 3 phases of the medium access of different competing nodes.
6.what are the power saving mechanisms in bluetooth?
7.What are the drawbacks of wired networks?
8.Define Dynamic Source Routing.
9.What is the difference between TCP & UDP.
10. Mention any 2 salient features of WAP.
Part-B
(5*16=80)Marks
11 (a) i Discuss in detail about
the types of antennas with their radiation patterns.(12)
ii Explain Diversity techniques.(4)
[or]
11 (b) Explain space Frequency,code & Time division Multiplexing in detail.(16)
12 (a) Describe Digital Audio Broadcasting.(16)
ii Explain Diversity techniques.(4)
[or]
11 (b) Explain space Frequency,code & Time division Multiplexing in detail.(16)
12 (a) Describe Digital Audio Broadcasting.(16)
[or]
(b) Explain routing
,localization and handover in satellite systems.(16)
13 (a) Describe architecture of BLUE TOOTH.(16)
13 (a) Describe architecture of BLUE TOOTH.(16)
[or]
(b)Explain Channel control sub
layer in HIPERLAN.(16)
14 (a) Explain optimization in Mobile IP in detail.(16)
14 (a) Explain optimization in Mobile IP in detail.(16)
[or]
(b)Explain IPV6 Protocol in
detail.(16)
15 (a) Discuss the role of WWW in support for mobility.(16)
[or]
15 (a) Discuss the role of WWW in support for mobility.(16)
[or]
(b) Explain the following:
(i) Indirect TCP. (6)
(ii)Snooping TCP.(6)
(iii)Explain about performance enhancing proxies.(4)
(i) Indirect TCP. (6)
(ii)Snooping TCP.(6)
(iii)Explain about performance enhancing proxies.(4)
B.E./B.Tech. DEGREE
EXAMINATION, NOVEMBER/DECEMBER 2011.
Seventh Semester
Computer Science and Engineering
CS 2402 — MOBILE AND PERVASIVE COMPUTING
(Regulation 2008) www.2webworld.com
Time : Three hours Maximum : 100 marks
Answer ALL questions.
PART A — (10 × 2 = 20 marks)
1. What are the four types of handover available in GSM?
2. Distinguish between mobile terminated call and mobile originated call.
3. Mention the advantages of WLAN?
4. What are the three Low Power States provided by Bluetooth?
5. What are the requirements of mobile IP standard?
6. Differentiate wired networks routing from ad-hoc wireless networks routing. www.2webworld.c
7. List the advantages and disadvantages of mobile TCP?
8. Define WAE.
9. What is Pervasive Computing?
10. What are the various issues related to device management in pervasive
computing?
PART B — (5 × 16 = 80 marks)
11. (a) (i) Explain the GSM system architecture with a neat diagram. (8)
(ii) Describe the security services provided by GSM. (8)
Or
(b) (i) Explain the protocol architecture of GSM for signaling. (8)
(ii) Explain the architecture of GPRS with a neat diagram. (8)
Seventh Semester
Computer Science and Engineering
CS 2402 — MOBILE AND PERVASIVE COMPUTING
(Regulation 2008) www.2webworld.com
Time : Three hours Maximum : 100 marks
Answer ALL questions.
PART A — (10 × 2 = 20 marks)
1. What are the four types of handover available in GSM?
2. Distinguish between mobile terminated call and mobile originated call.
3. Mention the advantages of WLAN?
4. What are the three Low Power States provided by Bluetooth?
5. What are the requirements of mobile IP standard?
6. Differentiate wired networks routing from ad-hoc wireless networks routing. www.2webworld.c
7. List the advantages and disadvantages of mobile TCP?
8. Define WAE.
9. What is Pervasive Computing?
10. What are the various issues related to device management in pervasive
computing?
PART B — (5 × 16 = 80 marks)
11. (a) (i) Explain the GSM system architecture with a neat diagram. (8)
(ii) Describe the security services provided by GSM. (8)
Or
(b) (i) Explain the protocol architecture of GSM for signaling. (8)
(ii) Explain the architecture of GPRS with a neat diagram. (8)
12. (a) (i) Describe HiperLAN architectural components and
their interactions. (8)
(ii) Explain the architecture of WiFi in detail. (8)
Or
(b) (i) Explain the system architecture of IEEE 802. (8)
(ii) Describe the architecture of WiMAX in detail. (8)
(ii) Explain the architecture of WiFi in detail. (8)
Or
(b) (i) Explain the system architecture of IEEE 802. (8)
(ii) Describe the architecture of WiMAX in detail. (8)
13. (a) (i) List the entities involved in mobile IP and
describe the process of data transfer from a mobile
node to a fixed node and vice versa. (8)
(ii) Why is conventional routing in wired networks not suitable for wireless networks? Substantiate your answers with suitable examples. (8)
Or
(b) (i) Explain in detail Dynamic Host Configuration Protocol. (8)
(ii) Describe how the multicast routing is done in ad-hoc networks. (8)
14. (a) (i) State the requirements of WAP. Explain its architectural components. (8)
(ii) Explain WML and WML scripts with an example. (8)
Or
(b) (i) What is WTP? Discuss about its classes. (8)
(ii) Explain the architecture of WTA. (8)
15. (a) (i) Describe the various hardware components involved in pervasive computing devices. (8)
(ii) Explain how a pervasive web application can be secured using an ‘Authentication Proxy’. (8)
Or
(b) (i) What are the applications of pervasive computing? Discuss any two of them. (8)
(ii) Explain how pervasive web applications can be accessed via WAP.(8) w
(ii) Why is conventional routing in wired networks not suitable for wireless networks? Substantiate your answers with suitable examples. (8)
Or
(b) (i) Explain in detail Dynamic Host Configuration Protocol. (8)
(ii) Describe how the multicast routing is done in ad-hoc networks. (8)
14. (a) (i) State the requirements of WAP. Explain its architectural components. (8)
(ii) Explain WML and WML scripts with an example. (8)
Or
(b) (i) What is WTP? Discuss about its classes. (8)
(ii) Explain the architecture of WTA. (8)
15. (a) (i) Describe the various hardware components involved in pervasive computing devices. (8)
(ii) Explain how a pervasive web application can be secured using an ‘Authentication Proxy’. (8)
Or
(b) (i) What are the applications of pervasive computing? Discuss any two of them. (8)
(ii) Explain how pervasive web applications can be accessed via WAP.(8) w
Such a huge collection of questions with answers! It is very helpful! Thank you so much!!! :)
ReplyDelete