You are on page 1of 3

CS&IT\QB\

IT 1402 MOBILE COMPUTING


QUESTION BANK
IT1402

MOBILE COMPUTING

3 0 0 100

AIM
To provide basics for various techniques in Mobile Communications and Mobile Content services.
OBJECTIVES

To learn the basics of Wireless voice and data communications technologies.


To build working knowledge on various telephone and satellite networks.
To study the working principles of wireless LAN and its standards.
To build knowledge on various Mobile Computing algorithms.
To build skills in working with Wireless application Protocols to develop mobile content applications.

UNIT I
Introduction to Mobile Communications and Computing : Mobile Computing (MC) : Introduction to MC, novel
applications, limitations, and architecture.
GSM : Mobile services, System architecture, Radio interface, Protocols, Localization and calling, Handover, Security, and
New data services.
UNIT II
(Wireless) Medium Access Control : Motivation for a specialized MAC (Hidden and exposed terminals, Near and far
terminals), SDMA, FDMA, TDMA, CDMA.
UNIT III
Mobile Network Layer : Mobile IP (Goals, assumptions, entities and terminology, IP packet delivery, agent advertisement
and discovery, registration, tunneling and encapsulation, optimizations), Dynamic
Host Configuration Protocol (DHCP).
UNIT IV
Mobile Transport Layer : Traditional TCP, Indirect TCP, Snooping TCP, Mobile TCP, Fast retransmit/fast recovery,
Transmission /time-out freezing, Selective retransmission, Transaction oriented TCP.
UNIT V
Database Issues : Hoarding techniques, caching invalidation mechanisms, client server computing with adaptation, poweraware and context-aware computing, transactional models, query processing, recovery, and quality of service issues.
UNIT VI
Data Dissemination: Communications asymmetry, classification of new data delivery mechanisms, push-based
mechanisms, pull-based mechanisms, hybrid mechanisms, selective tuning (indexing) techniques.
UNIT VII
Mobile Ad hoc Networks (MANETs): Overview, Properties of a MANET, spectrum of MANET applications, routing and
various routing algorithms, security in MANETs.
UNIT VIII
Protocols and Tools: Wireless Application Protocol-WAP. (Introduction, protocol architecture, and treatment of protocols of
all layers), Bluetooth (User scenarios, physical layer, MAC layer, networking, security, link management) and J2ME.
TEXT BOOKS:
1. Jochen Schiller,Mobile Communications,Addison-Wesley. (Chapters 4, 7, 9, 10, 11), second edition, 2004.
2. Stojmenovic and Cacute, Handbook of Wireless Networks and Mobile Computing, Wiley, 2002, ISBN 0471419028.
(Chapters 11, 15, 17, 26 and 27)
REFERENCES :
1. Reza Behravanfar, Mobile Computing Principles: Designing and Developing Mobile Applications with UML and
XML, ISBN: 0521817331, Cambridge University Press, October 2004,
2. Adelstein, Frank, Gupta, Sandeep KS, Richard III, Golden , Schwiebert, Loren, Fundamentals of Mobile and Pervasive
Computing, ISBN: 0071412379, McGraw-Hill Professional, 2005.
3. Hansmann, Merk, Nicklous, Stober, Principles of Mobile Computing, Springer, second edition, 2003.
4. Martyn Mallick, Mobile and Wireless Design Essentials, Wiley DreamTech, 2003.
TOTAL : 60

CS&IT\QB\

UNIT I
1. With a neat sketch of architectural diagram explain the important subsystems of GSM Protocol. [15].
2. (a) Discuss the Protocol Architecture of Hiper LAN.
(b) Compare the Infrastructure and Ad hoc WLANs with neat diagrams. [7+8]

3. Explain about GSM architecture in detail with a neat block diagram.


4. a) With a neat diagram explain the architecture of Mobile Computing.
b) What multiplexing schemes are used in GSM and for what purposes? Briefly describe.

UNIT II

1. (a) Explain the problems of hidden and exposed terminals.


(b) Explain how they are addressed in IEEE802.11 standard for WLANs. [7+8]
2. (a) What is Hidden and Exposed Terminal problem in wireless networks and how it is solved using protocols?
(b) Explain the CDMA multiple access technique and its advantages. [7+8]
3. a) Compare SDMA, FDMA, TDMA, and CDMA.
b) How can we avoid hidden and exposed terminal problem? Explain.
4. a) Explain the problems of hidden and exposed terminals.
b) Explain how they are addressed in IEEE 802.11 standard for WLANS. [7+8]
5. a) Define the far field region in free-space model. Find the far-field distance for an antenna
with maximum dimension of 1m and operating frequency of 600 MHz
b) What do you mean by hidden and exposed terminals? What happens in the case of such
terminals if Aloha, slotted Aloha, reservation Aloha, or MACA is used?

UNIT III
1. Explain how the problems of IP to support Host mobility with the help of following concepts,
(i) COA

(ii) Encapsulation

(iii) Tunneling and reverse tunneling. [15]

2. (a) Discuss the Location Management for Mobile IP in wireless networks.


(b) What is tunneling concept and why it is required in Mobile IP, describe with neat diagram? [7+8]

3. Discuss :
a) Goals of Mobile IP.
b) Packet delivery and registration of Mobile IP.

4. Give the working of Mobile IP. Explain features of discovery, registration and tunneling
features of Mobile IP.

5. (a) Write about the Route optimization in Mobile IPs. [7+8]


(b) Describe the DHCP protocol for Mobile IPs.

UNIT IV
1. Compare and contrast the following two solutions for TCP in mobile environment,
(i) Indirect TCP

(ii) Snooping TCP. [15]

2. (a) Write about the Route optimization in Mobile IPs. [7+8]


(b) Describe the DHCP protocol for Mobile IPs.

3. Give an overview of mechanism, advantages, disadvantages of following


a) Indirect TCP, b) Snooping TCP, c) M-TCP

4. Compare and Contrast the following two solutions for TCP in mobile environment:
i) Indirect TCP

ii) Snooping TCP

5. a) The M-TCP (Mobile TCP) approach has the same goals as I-TCP and Snooping TCP.
Justify the statement.
b) List and explain the transport layer protocols for mobile networks.

CS&IT\QB\
UNIT V
1. (a) Explain issues of host mobility towards implementation of transaction concept.
(b) List any mobile transaction models and compare them. [7+8]

2. (a) Discuss any one transport layer protocol for mobile networks.
(b) Describe the Transactional Models of Database. [7+8]

3. Explain in detail about selective tuning techniques.


4. (a) Explain issues of host mobility towards implementation of transaction concept.
(b) List any mobile transaction models, and compare them.

5. Explain in detail about Database Hoarding and Caching Techniques.


6. Write short notes on following:
(a) Caching invalidation.
(b) Query processing.

UNIT VI
1. (a) What is meant by communication asymmetry?
(b) What is a push model? Explain its pros and cons data dissemination to mobile hosts.

2. (a) Explain the Classification of Data Delivery Mechanisms.


(b) Describe the Data Dissemination Broadcast Models. [7+8]

3. What is push model Explain its pros and cons data dissemination to mobile hosts.
4. (a) Explain data dissemination process and broadcasting process in information
management of mobile computing devices.
(b) Write brief notes on data synchronization.

UNIT VII
1.

2.
3.

(a) What are the characteristics and challenges of mobile ad hoc networks?
(b) Compare and contrast the proactive and reactive routing protocols with examples. [7+8]
(a) What are the challenges of a MANETs?
(b) Explain the AODV routing algorithm in MANETs. [7+8]
Discuss how Ad-hoc network differs from a wired network in the aspect of routing.
Explain any two on demand routing protocol used for routing in this network.

4. (a) What are the characteristics and challenges of mobile ad hoc networks?
(b) Compare and contrast the proactive and reactive routing protocols with examples.

5. (a) List and explain challenges in MANETS.


(b) With an example explain AODV algorithm in detail.

UNIT VIII
1. Write short notes on any two,
(i) Bluetooth protocol architecture
(ii) J2ME architecture
(iii) Symbian OS.

2. (a)Brief about the protocols and platforms for Mobile Computing.


(b) Write notes on Symbian OS. [7+8]

3. Explain in detail about WAP protocol architecture with neat diagram.


4. (a) Explain the concept of security issue in Bluetooth.
(b) Discuss about the concepts in J2ME.

You might also like