It6601 Mobile Computing 2 Marks With Answers
It6601 Mobile Computing 2 Marks With Answers
It6601 Mobile Computing 2 Marks With Answers
UNIT I
INTRODUCTION
SYLLABUS
Mobile Computing Mobile Computing Vs wireless Networking Mobile Computing
Applications Characteristics of Mobile computing Structure of Mobile Computing
Application. MAC Protocols Wireless MAC Issues Fixed Assignment Schemes
Random Assignment Schemes Reservation Based Schemes.
1) WHAT IS MOBILE COMPUTING ?
Mobile Computing is the interaction between the human and computer
by which a computer is expected to share some different data
(transmitting voice, text, video, audio)
Mobile Computing is a technology for transmitting data without
having to be connected in a fixed medium.
Example: ad-hoc Network and infrastructure Network.
2) DEFINE WIRELESS COMMUNICATION :
Wireless communication is the transfer of information over a distance
without the use of electrical conductors (or) wires.
The distance involved may be short, long.
3) APPLICATIONS OF MOBILE COMPUTING :
Multipath propagation
Spectrum Limitations
Limited Energy
User Mobility
Ubiquting Computing :
o Share information at anywhere, anytime in any place.
Location Awareness :
o GPS
Adaptation :
o Accessing continuous information
Broadcast :
o Hotspot, WiFi
Personalization :
o Playstore, notification, GPS
Location Flexibility
Saves Time
Enhanced Productivity
Ease of research
Entertainment
Stream lining of Business processes
GSM
UMTS
AMPS
DECT
TETRA
ERMES
User Mobility
Network Mobility
Device Mobility
Service Mobility
Session Mobility
Host Mobility
PRESENTATION TIER
APPLICATION TIER
Data BaseDD
DATA
TIER
Data Base
Storage
Fetch the result based on Register number
Query
UNIT-II
MOBILE INTERNET PROTOCOL AND TRANSPORT LAYER
SYLLABUS
7) AGENT SOLICITATION :
In case a mobile node ( MN ) does not receive any COA , then the MN
should send an agent solicitation message.
However, it is important to ensure that these agent solicitation
messages do not flood the network
A mobile node can usually send up to three solicitation messages ( one
per second ) as soon it enters a new network.
8) AGENT DISCOVERY :
Computing
Accessing continuous information
While on the move, we can route the packets which is to be
delivered on the opposite side.
19) HLR :
Home Location Register.
The GPRS Register is a part of HLR which stores all relevant
GPRS data.
In a port of HLR which stores all the relevant data of GPRS in
a mobile.
I/P Network, GGSN and SGSNs can be compared with Home
Agent and Foreign Agent.
20) VLR :
It is essentially a temporary database that is updated whenever
a new Mobile node enters its area by roaming. The information
is obtained from the corresponding HLR database.
The function of the VLR is to reduce the number of queries to
the HLR and make the user feel as if he is in his Home
Network.
21) CONGESTIOIN AVOIDANCE :
The Congestion Avoidance Algorithm starts where the
Slow Start Process stops.
Once the congestion window reaches the congestion
threshold level, then after that if an acknowledgement is
received the window size is increased linearly i.e.)
window size doubled is avoided.
22) ADVANTAGE AND DISADVANTAGE OF MOBILE TCP :
Advantage :
o Maintain Semantics
o Support Disconnection
o No buffer forwarding
Disadvantage :
o Loss on wireless link propagated into fixed network
o Adapted TCP on wireless link wireless Networks spring 2005
M TCP
FREEZE - TCP
Indirect TCP mechanism is The Mobile TCP segments It freezes the TCP, later it
used to segment the TCP the connection. It chokes the resumes the TCP after
connection into two.
sender through the window reconnection.
sizes.
Merits :
Merits :
i) Simple
i)
ii) Isolation of wire and
wireless links is possible
ii)
Demerits :
i)Loss of TCP semantics
ii)Security problem.
Merits :
End to End Works even when there is
segments
is long Interruption.
maintained.
Handles frequent
Disconnection.
Demerits :
Demerits :
i)
Poor
isolation
i)
Change in TCP
ii)
MAC dependant.
wireless links
ii)
Security problem.
UNIT III
MOBILE TELECOMMUNICATION SYSTEM
SYLLABUS
Global System for Mobile Communication (GSM) General Packet Radio Service (GPRS)
Universal Mobile Telecommunication System (UMTS).
1) Define GSM
The Global System for Mobile Communication is at present being
used in India.
GSM was founded in Europe in 1992.
The GSM is the standard for mobile telecommunication through
cellularnetworks at data rates if upto 14.4 kbps.
2) GSM SERVICES :
Bearer services
Teleservices
Supplementary services
3)WHAT ARE SUBSYSTEMS IN GSM SYSTEM (OR) SYSTEM ARCHITECTURE IN
GSM ?
Radio Subsystem (RSS)
Network and Switching subsystem(NSS)
Operation subsystem(OSS)
4)WHAT ARE THE CONTROL CHANNEL GROUPS IN GSM?
Broadcast control channel (BCC)
Common control channel(CCC)
Dedicated control channel(DCC)
5)WHAT IS FREQUENCY RANGE OF UPLINK AND DOWNLINK IN GSM
NETWORK?
o The frequency range of uplink in GSM network is 890-960 mHz
o The frequency range of downlink in GSM network is 935-960 mHz
6) WHAT IS RSS ?
8)ADVANTAGES OF GSM :
Communication
Total mobility
World wide connectivity
High capacity
High transmission quality
Security functions
9)DISADVANTAGE OF GSM :
o User equipment(UE)
o Radio network subsystem(RNS)
o Core network
UNIT IV
1.What is wireless ad-hoc network?
A wireless ad hoc network (WANET) is a decentralized type of wireless network. The
network is ad hoc because it does not rely on a pre existing infrastructure, such as routers in
wired networks or access points in managed (infrastructure) wireless networks
2.what are the characteristics of mobile ad hoc network?
Lack of fixed infrastructure
Dynamic topologies
Bandwidth constrained,variable capacity llinks
Energy constrained operation
Increased vulnerability
Ad hoc On-Demand Distance Vector (AODV) Routing is a routing protocol for mobile ad
hoc networks (MANETs) and other wireless ad hoc networks.
8.define DSDV.
Destination-Sequenced Distance-Vector Routing (DSDV) is a table-driven routing scheme for
ad hoc mobile networks based on the BellmanFord algorithm. It was developed by C.
Perkins. The main contribution of the algorithm was to solve the routing loop problem.
9.what is link state routing protocol?
Link-state routing protocols, such as OSPF and IS-IS, create a topology of the network and
place themselves at the root of the tree. Link-state protocols implement an algorithm called
the shortest path first (SPF, also known as Dijkstra's Algorithm) to determine the path to a
remote destination.
10.define DSR protocol
Dynamic Source Routing (DSR) is a routing protocol for wireless mesh networks. It is
similar to AODV in that it forms a route on-demand when a transmitting node requests one.
However, it uses source routing instead of relying on the routing table at each intermediate
device.
11.mention the important steps in DSDV.
1. Each router in the network collects route information from all its neighbor
2. After gathering the information,the node determines the shortest path to the
destination based on gathered information
3. Based on gathered information ,a new routing table is generated.
4. The router broadcast the table to its neighbours.on receipt by neighbors ,the
neighbors node recomputed their respective routing table.
5. This process continues till the routing information becomes stable.
12.define reactive protocols.
On-demand (reactive) routing. This type of protocol finds a route on demand by flooding
the network with Route Request packets. The main disadvantages of such algorithms are:
High latency time in route finding.
13.define proactive protocols.
Proactive protocols. In networks utilizing a proactive routing protocol, every node
maintains one or more tables representing the entire topology of the network. These tables
are updated regularly in order to maintain a up-to-date routing information from each
node to every other node.
14.mention some application of MANET.
Communication among portable computers
Environmental monitoring
Military
Emergency applications.
15.define routing.
Routing is the process of selecting best paths in a network. In the past, the term
routing also meant forwarding network traffic among networks. However, that latter function
is better described as forwarding.
Vehicular Ad hoc Networks (VANETs) are the promising approach to provide safety
and other applications to the drivers as well as passengers. It becomes a key
component of the intelligent transport system. A lot of works have been done towards
it but security in VANET got less attention.
23.state Appications of VANET .
Cooperative Driving
Traffic optimisation
Peer to peer application
Internet Connectivity.
24.what are the Characteristics of VANET
1. High Mobility
2. Rapidly changing network topology
3. Unbounded network size
4. Frequent exchange of information
5. Wireless Communication
6. Time Critical
25.state some Technical Challenges in VANET.
a) Network Management
b) Congestion and collision Control
c) Environmental Impact
d) MAC Design
e) Security
26.differnce between MANET and VANET.
UNIT V
MOBILE PLATFORMS AND APPLICATIONS
SYLLABUS:
Mobile Device Operating Systems Special Constrains & Requirements
Commercial Mobile Operating Systems Software Development Kit: iOS, Android,
BlackBerry, Windows Phone M-Commerce Structure Pros & Cons Mobile Payment
System Security Issues.
1)WHAT IS THE SIGNIFICANCE OF DEVICE OS?
o Expanded reach: the presence of a wireless link between the customer and the
service provider eliminates the need for a fixed interface such as a computer
for communication.
o Quicker access: connecting through a mobile is faster than dial-up connections
using wire line modems.
o Electronic wallet: Analysts believe that easy mobile payment is one of the
main prerequisites for the success of m-commerce.
ADVANTAGES
to
hard wares
know
OF
and soft
any
MOBILE
wares of
technical
OS?
use
friendly
the system
languages