CS8601-Mobile Computing Iq

Download as pdf or txt
Download as pdf or txt
You are on page 1of 12

www.studymaterialz.

in

SRM VALLIAMMAI ENGINEERING COLLEGE


SRM Nagar, Kattankulathur – 603203.

DEPARTMENT OF
COMPUTER SCIENCE AND ENGINEERING

VI SEMESTER

CS8601 – Mobile Computing

Regulation – 2017

Academic Year 2019 – 20

Prepared by

Ms.S.Benila, Assistant Professor/CSE

Mr.S.Venkatesh, Assistant Professor/CSE


www.studymaterialz.in

CS8601- Mobile Computing

UNIT I INTRODUCTION
Introduction to Mobile Computing – Applications of Mobile Computing- Generations of Mobile
Communication Technologies- Multiplexing – Spread spectrum -MAC Protocols – SDMA- TDMA-
FDMA- CDMA
PART-A
Q. Questions BT Competence
No Level
1 What is Mobile computing? BTL1 Remember
2 Tabulate the generations of mobile communication technologies. BTL1 Remember
3 Describe the characteristics of a communication device. BTL2 Understand
4 List the applications of Mobile Computing BTL1 Remember
5 Point out the features of 2.5 g communication technology. BTL4 Analyze
6 Give the advantages of mobile computing. BTL2 Understand
7 List the dimensions of multiplexing. BTL1 Remember
Describe the transport technologies used across generations of cellular BTL1 Remember
8 networks.
9 Point out the issues of MAC Protocol. BTL4 Analyze
10 Define multiplexing. BTL1 Remember
11 Illustrate the Structure of FHSS transmitter. BTL3 Apply
12 Classify the MAC Protocols. BTL4 Analyze
Distinguish between direct sequence spread spectrum and frequency BTL2 Understand
13
hopping spread spectrum.
14 Describe the Characteristics reservation based TDMA. BTL2 Understand
15 Show the schematic operation of CDMA scheme. BTL3 Apply
16 Classify hidden terminal and exposed terminal problem with the help BTL3 Apply
ofa diagram.
Compose a role which is played by MAC protocols in Mobile BTL6 Create
17 computing.
18 Assess why SDMA is not used in isolation. BTL5 Evaluate
Develop a MACA Protocol. In which environment is it suitable? BTL6 Create
19 Justify your answer.
Formulate a reason why Collision Detection based protocol is not BTL5 Evaluate
20 suitable for wireless networks.

PART-B
Q. No Questions BT Level Competence
1 (i) Explain in detail about Mobile Computing. (6) BTL4 Analyze
(ii) Compare the characteristics of cellular Communication systems.
www.studymaterialz.in

(7)
2 Summarize the applications of Mobile computing. (13) BTL2 Understand

3 (i) Explain the features of different generations of cellular BTL4 Analyze


technologies. (7)
(ii) Analyze the properties required for MAC Protocols. (6)
4 Demonstrate the working principle of BTL3 Apply
(i) FDMA scheme. (7)
(ii) SDMA scheme. (6)
5 Explain in detail about the multiplexing schemes for communication BTL1 Remember
systems. (13)
6 (i) Examine the operation of spreading and dispreading of spread BTL1 Remember
spectrum. (5)
(ii) Describe the Direct spread spectrum in detail. (8)
7 Compare and contrast SDMA,TDMA,FDMA and CDMA schemes. BTL4 Analyze
(13)
8 Illustrate the transmitter and receiver and explain the working BTL3 Apply
principle of FHSS. (13)
9 Generalize the role of various codes used in CDMA and explain the BTL6 Create
working of CDMA scheme. (13)
10 Describe the operations of the following technologies BTL1 Remember
(i) Fixed TDM. (4)
(ii) Classical ALOHA. (4)
(iii)Slotted ALOHA. (5)
11 Explain the different categories of MAC protocols in detail. (13) BTL2 Understand

12 Discuss: BLT-2 Understand


(i) Hidden terminal and Exposed terminal problem. (7)
(ii) Far and Near Terminal problem. (6)
13 (i)Describe the role of MAC protocol. In which layer of OSI model BTL1 Remember
the MAC protocols operated? (7)
(ii) Identify the role of CSMA /CA in wireless network. (6)
14 Summarize the Carrier Sense Multiple Access Protocols. (13) BTL5 Evaluate

PART-C
Q. No Questions BT Level Competence
1 Generalize the roles and application environments of mobile BTL -6 Create
computing. (15)
2 What do you understand by 2.5G? Mention few characteristics of this BTL-4 Analyze
technology. Analyze how it differs from 2G and 3G. (15)
3 Do you agree with the following statement: “In CSMA/CD protocol, BTL 5 Evaluate
when two nodes transmit on a shared medium, a collision can occur
only when two nodes start transmitting exactly at the same instant?”
Explain your answer. (15)
4 What is MACA protocol? In which environment is it suitable? Briefly BTL6 Create
expain its working. Compose a solution to solve the hidden and
www.studymaterialz.in

exposed terminal problem using MACA protocol. (15)


UNIT II MOBILE TELECOMMUNICATION SYSTEM
Introduction to Cellular Systems – GSM – Services & Architecture – Protocols – Connection Establishment
– Frequency Allocation – Routing – Mobility Management – Security – GPRS- UMTS – Architecture –
Handover – Security
PART-A
Q. BT
No Questions Level Competence
1. Define GSM. BTL1 Remember
2. Tabulate the services of GSM? BTL1 Remember
3. Show the connection establishment in GSM. BTL3 Apply
4. List the functions of mobility management. BTL 1 Remember
5. Classify the major functions in RSS. BTL 4 Analyze
6. Pointout the import features of GSM security. BTL 4 Analyze
7. Discuss about BTS. BTL 2 Understand
8. Classify the functions of HLR and VLR. BTL3 Apply
9. List the possible handover scenarios in GSM. BTL 1 Remember
10. Give the protocol architecture for signaling in GSM. BTL 2 Understand
11. What is SGSN? List the functions. BTL 1 Remember
12. Discuss about the services provided by GPRS. BTL 2 Understand
13. Analyze the purpose of UTRAN in UMTS. BTL 4 Analyze
14. Explain in what ways is GPRS better than GSM? BTL 5 Evaluate
15. Define UMTS. What are the elements of UMTS? BTL1 Remember
16. Generalize the tasks of radio network controller. BTL 6 Create
17. Assess the functions of core network in UMTS. BTL 5 Evaluate
18. Show the different classes of UMTS handover scenarios. BTL 3 Apply
19. Differentiate between a GSM network and UMTS network. BTL2 Understand
20. Develop UMTS network with its interfaces. BTL 6 Create

PART-B
Q. No Questions BT Competence
Level
1. Describe the GSM architecture in detail. (13) BTL 1 Remember
2. Classify various categories of GSM services in detail. (13) BTL 4 Analyze
(i)What are the functions of authentication and encryption in
3. GSM? (7) BTL 3 Apply
(ii)How a GSM network provides security to the customers? (6)
4. (i) Demonstrate protocol architecture of GSM in detail. (10) BTL 3 Apply
www.studymaterialz.in

(ii) Examine how the MS is located and addressed in GSM. (3)


(i)Generalize the role of Handover in GSM. (3) BTL 6
5. Create
(ii) Develop the solutions for effective handover. (10)
Describe in detail about
6. (i) Connection Establishment in GSM. (7) BTL 1 Remember
(ii) Signaling in GSM. (6)
(i) Explain GPRS transmission plane protocol reference
7. model. (7) BTL 5 Evaluate
(ii) Explain GPRS services. (6)
(i) Discuss UMTS system architecture in detail. (7)
8. (ii) Describe the functions of HLR and VLR in call routing BTL 2 Understand
and roaming. (6)
9. Describe the GPRS architecture in detail. (13) BTL 1 Remember

10. Discuss about the UTRAN interface of UMTS in detail . (13) BTL 2 Understand
(i)Explain the core network of UMTS architecture. (8)
11. (ii)Explain the radio network controller in detail. (5) BTL 1 Remember
12. Summarize the handover procedures in UMTS networks. (13) BTL 2 Understand
(i) Why UMTS technology is superior to GPRS technology?
13. Justify your answer. (8) BTL 4 Analyze
(ii)Analyze the advantages and limitations of GPRS. (5)
Explain the similarities and dissimilarities between a GSM
14. network and UMTS networks. (13) BTL 4 Analyze

PART-C
Q.
No Questions BT Level Competence
1. Which types of different services does GSM offer? Give some
BTL5 Evaluate
examples and reasons why these services can be separated? (15)
2. Give reasons for handover in GSM and the problems associated
with it. What are the typical steps for handover? What types of
BTL6 Create
handover can occur? Which resources are to be allocated during
data transmission? (15)
3. Analyze the interfaces and signaling used in GSM Network and
BTL4 Analyze
UMTS network. (15)
4. How does UMTS implement asymmetrical communication and
BTL5 Evaluate
different data rates? Explain OVSF code in UMTS. (15)

UNIT III MOBILE NETWORK LAYER

Mobile IP – DHCP – AdHoc– Proactive protocol-DSDV, Reactive Routing Protocols – DSR, AODV ,
Hybrid routing –ZRP, Multicast Routing- ODMRP, Vehicular Ad Hoc networks ( VANET) –MANET
Vs VANET – Security.
www.studymaterialz.in

PART-A
Q.
No Questions BT Level Competence
1 Define Mobile IP? Name its Functional entities. BTL-1 Remember
2 What is meant by DHCP? Why does an IP conflict occurs? BTL-1 Remember
Express the role of Subnet Mask , Router address ,DNS address in
3 BTL 2 Understand
DHCP.
BTL5 Evaluate
4 Assess the term ‘Ad-Hoc Network’ in a wireless Communication.

BTL 2 Understand
5 Give the role of agent solicitation message. When it is used?

6 Define COA. BTL1 Remember

7 Differentiate between Proactive and Reactive Routing Protocols. BTL 2 Understand

8 Identify the roles of DSR protocol. BTL 1 Remember

BTL3 Apply
9 Classify different types of MANET Routing Protocols.
Discuss the three steps used in DSDV for the reconfiguration of Understand
10 BTL 2
path used for ongoing data transfer.
11 Give the advantages of routing in wireless networks. BTL 2 Understand

Analyze the strategies used in Inter zone routing and Intra zone Analyze
12 BTL 4
routing.
Remember
13 List the disadvantages of DSDV. BTL 1

14 Classify Multicast Routing Protocols. BTL 4 Analyze

15 How to Create a Network Multicasting? BTL 6 Create

Evaluate
16 Discriminate between Unicasting and Multicasting. BTL 5

17 Show the basic operation of ODMRP using diagram. BTL 3 Apply

18 Pointout the differences between MANET and VANET. BTL 4 Analyze

Create
19 Generalize the threats in VANET. BTL 6
20 Remember
Define VANET. BTL 1

PART-B

Q. BT
No Questions Level Competence
Evaluate
1 (i) Explain the use of a Mobile Node and corresponding node. (7) BTL 5
www.studymaterialz.in

(ii) Explain the services that are provided by the Home Agent. (6)
2 Describe Route optimization in detail. (13) BTL 1 Remember

(i) Discover the requirements of Mobile IP. (7)


3 (ii) Show how Tunelling and encapsulation play a crucial role in BTL 3 Apply
packet delivery through routing. (6)
Demonstrate the operation of DHCP with a neat diagram and explain Apply
4 its protocol architecture. (13) BTL 3

(i) Generalize the working mechanism of Agent discovery. (7)


Create
5 (ii) Explain the registration of the packets during its delivery from BTL6
source to destination. (6)
(i) Discuss the problems the dynamic topology causes in the design
of routing protocol. (7) Remember
6 BTL 1
(ii) In what way the Dynamic Source Routing provides a possible
path for packet transmission to the destination. (6)
Classify the encapsulation types used in Mobile IP. (13) Analyze
7 BTL 4
(i) Describe with a diagram and an example the use of Ad-Hoc
networks. (7) Understand
8 BTL 2
(ii) Describe why the traditional packet routing protocol for wired
network cannot be used straightaway in a MANET. (6)
Remember
9 Describe at least three applications of Mobile Ad-Hoc Networks.(13) BTL 1
Discuss about the similarities and differences between MANET and Understand
10 BTL 2
VANET. (13)
(i) Explain in detail about the architecture of VANET. (7) Remember
11 BTL 1
(ii) Explain the design issues in MANET protocols. (6)
Summarize the characteristics and the creation of a basic Ad-hoc Understand
12 BTL 2
networks. (13)
(i) Explain the multicast protocols for MANET in detail. (7) Analyze
13 BTL 4
(ii) Analyze features of multicast routing protocols for MANET. (6)
14 Explain in detail about the security issues in VANET. (13) BTL 4 Analyze

PART-C

Q.
No Questions BT Level Competence
1 Give the factors that make mobile ad hoc networks more vulnerable
to security attacks compared to the traditional networks. Also
explain major types of security attacks that are possible in a mobile BTL 6 Create
ad hoc network. Compose a solution to overcome from these types
of attacks. (15)
2 i) Explain the discovery of care of address in the context of BTL5 Evaluate
movement of a mobile to a foreign network. (8)
ii) What do you mean by encapsulation and decapsulation in the
context of mobile IP? Explain why they are needed?
www.studymaterialz.in

(7)
3 What is meant by size and node density of a MANET? Explain these Analyze
two terms and discuss how these two parameters impact the design BTL 4
of a MANET. (13)
4 Analyze the working of DSR and DSDV in detail. (13) BTL 4 Analyze

UNIT IV MOBILE TRANSPORT AND APPLICATION LAYER


Mobile TCP– WAP – Architecture – WDP – WTLS – WTP –WSP – WAE – WTA Architecture – WML
PART-A
Q.
No Questions BT Level Competence
1 Define the TCP issues in Mobile IP networks. BTL1 Remember
BTL3 Apply
2 Illustrate Mobile TCP with a diagram.

3 Summarize the advantages and disadvantages of Mobile IP. BTL5 Evaluate


BTL3 Apply
4 Examine the use of snoop protocol in TCP.

5 What is meant by I-TCP? BTL1 Remember

Classify different types of TCP Approaches used in Mobile BTL4 Analyze


6
Networks.
BTL6 Create
7 How will you develop a WAP for Mobile Networks?

8 Give the different layers of WAP. BTL5 Evaluate

9 Analyze WAP using a Client – Server diagram. BTL4 Analyze

10 Express the different applications of WAP. BTL2 Understand

11 Distinguish between WDP and WTLS. BTL2 Understand

12 List the functions of WTLS. BTL1 Remember

BTL4 Analyze
13 Differentiate between WTP and WTA.
14 List the classes of WTP Transactions. BTL1 Remember
Design the connection mode and connectionless mode of WSP BTL6 Create
15
Protocols.
Interpret how synchronization markup language is used to connect BTL2 Understand
16
a node in internet.
17 Tabulate the different layers used in WAP. BTL1 Remember

18 Identify the logical model of WAE Mobile Computing. BTL1 Remember


Interpret the operation of WTA in Mobile Computing with BTL2 Understand
19
diagram.
www.studymaterialz.in

20 Show the use of WML in Mobile Computing. BTL3 Apply

PART-B
Q. No Questions BT Level Competence
1 (i) Discuss in detail about Mobile TCP. (7) BTL2 Understand
(ii) Summarize the TCP approaches used in Mobile Networks.(6)
2 (i) Illustrate the use of WAP in Mobile networks. (7) BTL3 Apply
(ii) Show the architecture of WAP and its working. (6)
3 Demonstrate the WAP Communication Protocols and its BTL3 Apply
components. (13)
4 (i) What is the role of WDP in Mobile Networks. (7)
(ii) How WDP enables transparent communication in the delivery
of packets. (6) BTL6 Create

5 (i) Evaluate the role of WTLS in providing privacy, data BTL5 Evaluate
integrity and authentication. (7)
(ii) Evaluate with the help of a diagram of how WTLS helps in
establishing a secure session. (6)
6
Describe in detail WTLS class 0, class 1, class 2 initiator and
responder used in WTLS. (13) BTL 2 Understand

7 Remember
(i) Draw the architecture of WSP Session establishment,
Suspension, resume, termination. (7) BTL 1
(ii) Explain in detail WSP as connectionless session service. (6)
8 Explain in detail with a diagram the use of Wireless BTL 1 Remember
Application environment. (13)
9 (i) Point out the use of WAE application models. (7) BTL 4 Analyze
(ii) Explain in detail WTA Logical Architecture. (6)
10 Define short notes on : Remember
(i) WTA voice message. (9) BTL 1
(ii) Classes of libraries in WTA. (4)
11 Describe in detail about the use of WML. (13) BTL 1 Remember

12 (i) Express the basic features of WML. (7) BTL 2 Understand


(ii) Summarize the role of WML in mobile computing. (6)
13 Classify and explain in detail about the different layers of Wireless BTL 4 Analyze
Application Protocol. (13)
www.studymaterialz.in

14 Analyze the role of i-mode in mobile computing with a diagram. BTL 4 Analyze
(13)
PART-C

Q. No Questions BT Level Competence


1 Generalize the M-TCP approach of extending TCP to work BTL6 Create
efficiently in mobile network. How does M-TCP maintain end to
end semantics? (15)

2 What role does initiator and responder play in the transport layer of BTL5 Evaluate
WTLS? Explain in detail. (15)

3 Classify wireless application protocol in different layers. (15) BTL4 Analyze

4 What role does WTA play in Mobile computing? How it is useful


BTL5 Evaluate
in terms of long distance communication. (15)

UNIT V MOBILE PLATFORMS AND APPLICATIONS


Mobile Device Operating Systems – Special Constrains & Requirements – Commercial Mobile
Operating Systems – Software Development Kit: iOS, Android, BlackBerry, Windows Phone –
MCommerce – Structure – Pros & Cons – Mobile PaymentSystem – Security Issues.
PART-A
Q.
No Questions BTLevel Competence
1. What is microkernel operating system? BTL1 Remember
2. Give four examples of Mobile OS. BTL2 Understand
3. Differentiate the operating system for mobile phone and the Understand
operating system for desktop. BTL2
4. Show the advantages of mobile operating system. BTL3 Apply
5. Define POS. BTL1 Remember
6. Assess the special constraints and requirements of Mobile OS. BTL5 Evaluate
7. What is M-commerce? BTL1 Remember
8. Assess the pros and cons of E-Commerce BTL5 Evaluate
9. Express micropayment in M-Commerce. BTL2 Understand
10. What are the different payment systems available in M-Commerce? BTL1 Remember
11. Examine why microkernel is preferred for developing a mobile OS. BTL3 Apply
12. List the different versions of Android. BTL1 Remember
13. Pointout the drawbacks of Symbian os. BTL4 Analyze
14. Analyze the features of windows iPhone. BTL4 Analyze
15. Describe UIQ interface. BTL3 Apply
16. Develop android software stack with neat diagram. BTL6 Create
17. Describe the features of Blackberry operating system. BTL2 Understand
18. Differentiate E-commerce and M- commerce BTL4 Analyze
www.studymaterialz.in

19. Compose the solutions for security issues in mobile OS. BTL6 Create
20. Differentiate mobile OS with Traditional OS. BTL 1 Remember

PART-B

Q.
No Questions BT Level Competence
1. Explain the special constraints and requirements of mobile OS.(13) BTL5 Evaluate

2. i) Discuss about the evolution and the features of Windows BTL2 Understand
mobile OS (6)
ii) Give the structure of Android software stack and explain. (7)
3. Compare and contrast the various mobile OS. (13) BTL4 Analyze

4. Summarize the various applications of M-Commerce. (13) BTL2 Understand

5 (i) List and explain the components of mobile operating system.(7) BTL1 Remember
(ii) Write short notes on Android SDK. (6)
6. (i)Illustrate mobile device OS with a suitable example. (8) Apply
(ii)Explain the flexibilities that a user would be required to take with
a single tasking operating system is used in the mobile device. (5) BTL3
7. i)Illustrate the architecture of Andriod operating system. (7) Apply
ii)Examine the evolution of Windows OS for mobile. (6) BTL3
8. Write detailed notes on E-Commerce. (13) BTL1 Remember
9. a) What do you understand by M-commerce? Explain the BTL1 Remember
advantages and disadvantages of M-commerce. (5)
b) Identify the situation where micropayments are essential
and how it can be achieved. (8)
10. Generalize the functions of BTL6 Create
(i)B2B Commerce. (8)
(ii) B2C commerce. (5)
11. (i)Identify the properties of mobile payment system. (8) BTL1 Remember
(ii) Describe about mobile payment solutions. (5)
12. Explain the different mobile payment schemes in detail. (13) BTL2 Understand
13. (i)What do you understand by the security issues in mobile payment BTL 4 Analyze
system? (5)
(ii)Analyze the mobile payment security solutions in detail. (8)
14. Explain the ways by which m-payments are settled along with BTL 4 Analyze
any two applications. (13)

PART-C

Q.
No Questions BT Level Competence
www.studymaterialz.in

1. Assess the special features that an operating system for mobile BTL5 Evaluate
device needs to support compared to the features provided by a
traditional operating system. (15)
2. i)Explain the principle functions of the operating system of a mobile BTL 4 Analyze
device. (8)
ii)Analyze how an example application can be implemented on
mobile device and the specific operating system service that it make
use of. (7)
3. What do you understand by the mobile payment system? Briefly BTL 5 Evaluate
explain an application where mobile payment may be useful.
Explain the different payment systems that are available. (15)
4. Integrate an application where E- commerce is used. Explain the BTL 6 Create
different types of e- commerce involved in the application with the
participants. (15)

You might also like