Mobile Computing Questions and Answers communication in remote areas, and sensor
networks, thanks to their flexibility and
1. Define Mobile Computing: infrastructure independence. Mobile computing involves using portable devices to access computing resources, data, 9. Applications of Ad-Hoc Networks: and networks without being tied to a specific Used in disaster recovery, military rapid location. It leverages wireless technology for deployment, and vehicular networks (VANETs), remote data access and connectivity. ad hoc networks are essential for direct communication in dynamic, infrastructure-less 2. Advantages of Mobile Computing: settings. Mobility, flexibility to work from anywhere, increased productivity, easy access to 10. Characteristics of Mobile Computing: information, and improved collaboration are Mobile computing is defined by portability, primary advantages. Challenges include data wireless connectivity, resource constraints security and battery limitations. (battery, bandwidth), location independence, and real-time data access. 3. Mobile Computing vs. Wireless Networking: Mobile computing involves devices with 11. Function of Presentation, Application, and computing power and connectivity, while Data Tiers in Mobile Environment: wireless networking provides the The presentation tier handles the user infrastructure that enables these devices to interface, the application tier processes connect without physical wires. requests, and the data tier manages information storage, ensuring a responsive 4. Infrastructure-based vs. Infrastructure-less mobile application. Network: Infrastructure-based networks use central 12. Role of a MAC Protocol: entities (e.g., routers, base stations), while The Medium Access Control (MAC) protocol infrastructure-less networks, like ad hoc regulates data transmission on shared networks, allow direct device-to-device channels, managing access and reducing communication without a central controller. collisions to ensure efficient bandwidth use. 5. Constraints and Applications of Mobile 13. Issues of Wireless MAC Protocol: Computing: Wireless MAC protocols encounter issues like Constraints include battery life, network hidden and exposed terminal problems, and reliability, and security. Applications include interference, affecting network efficiency and healthcare, education, business, and requiring contention management. emergency response, offering flexible access to 14. Types of MAC Protocol: data. MAC protocols are divided into contention- 6. Challenges in Wireless Communication: based (e.g., CSMA) and contention-free (e.g., Wireless communication faces interference, TDMA, FDMA) protocols. Each has unique limited bandwidth, signal fading, and security approaches for managing simultaneous data concerns. Reliability and data optimization are access. essential to counter these issues. 15. Hidden Terminal Problem in Infrastructure- 7. Illustrate Ad Hoc Networks with Pictorial less Network: Representation: Hidden terminal issues arise when devices out Ad hoc networks use a decentralized model of range collide with data intended for another where each device acts as a router, enabling device. RTS/CTS protocols help mitigate such communication without infrastructure. They collisions. adapt dynamically to topology changes. 16. When Exposed Terminal Problem Arises: 8. Uses of Ad-Hoc Networks: Exposed terminal problems occur when a These networks are beneficial for military device unnecessarily holds back transmission operations, emergency responses, mobile due to a neighboring device’s unrelated 25. Protocols of Bluetooth: transmission, reducing efficiency. Bluetooth protocols include Baseband, L2CAP, RFCOMM, and OBEX, covering everything from 17. Why MAC Protocols in Infrastructure-based data link to service and file transfer protocols. Wireless Networks May Fail in Infrastructure- less Networks: 26. Entities in PCS Architecture and Their MAC protocols designed for centralized Functions: networks may not adapt to dynamic, peer-to- PCS architecture includes Mobile Switching peer ad hoc networks, leading to inefficiency in Centers, Base Station Systems, and databases decentralized communication. (HLR, VLR) that manage call routing, registration, and handovers. 18. Why Collision Detection Protocol is Unsuitable for Wireless Networks: 27. Protocol Layers of WAP: Collision detection requires simultaneous WAP consists of application, session, send-and-listen abilities, which wireless transaction, security, and transport layers, systems lack due to signal attenuation and each serving to enhance mobile web interference, making it ineffective. communication and data delivery. 19. TDMA, FDMA, and CDMA and Their 28. Difference between DSDV & AODV Routing Differences: Algorithm: TDMA divides time, FDMA divides frequency, DSDV is proactive, maintaining up-to-date and CDMA uses code-based separation for routes, while AODV is reactive, establishing multiple accesses. Each has unique trade-offs routes only when needed, making AODV more in bandwidth and latency. efficient in dynamic networks. 20. Basic Scheme of CDMA Protocol: 29. DSDV Routing Algorithm: CDMA allows multiple users by assigning DSDV uses a table-driven approach, with each unique codes to data streams, enabling node maintaining a complete route table, simultaneous communication on the same updating it periodically to ensure current frequency without interference. routes in the network. 21. Role of Pseudorandom Generator in CDMA 30. AODV Routing Algorithm: Protocol: AODV is an on-demand protocol that discovers The pseudorandom generator creates unique routes only when required, reducing code sequences for each user, ensuring that unnecessary data transmission and overhead CDMA channels remain separate and secure. in mobile ad hoc networks. 22. Responsibilities of MAC Protocol: 31. Different Types of Handoffs: MAC protocols manage data channel access, Types include hard handoff (break-before- ensuring fair use of bandwidth, minimizing make), soft handoff (make-before-break), and collisions, and optimizing network efficiency forced handoff (due to network conditions), and throughput. each affecting call continuity. 23. Characteristics of 1G, 2G, 3G, 4G, 5G: 32. Frequency Reusing: Generations vary in speed, bandwidth, and Frequency reuse allows the same frequency to technology, with 1G offering analog voice, 2G be used in different cells, separated by digital voice, 3G data services, 4G broadband sufficient distance to avoid interference, internet, and 5G IoT support. maximizing bandwidth utilization. 24. Properties of Bluetooth: 33. 3-cell & 7-cell Cellular Structure: Bluetooth enables short-range communication, Cellular structures, like 3-cell and 7-cell operates on low power, supports device models, organize frequency allocation to pairing, and provides a secure, flexible data minimize interference, with each cell shape exchange in personal area networks. supporting frequency reuse strategies. 34. Co-channel & Adjacent Channel Interference: 43. UMTS Architecture: Co-channel interference occurs between cells UMTS architecture combines radio access and using the same frequency, while adjacent core networks, enabling high-speed data and channel interference happens between cells multimedia services in 3G networks. with neighboring frequencies. 44. UMTS Core Network: 35. Signal-to-Noise Ratio (SNR): The UMTS core network manages switching, SNR measures the quality of a signal relative to data routing, and user authentication, serving background noise, with higher ratios indicating as the backbone for 3G data and voice clearer signals and better communication services. reliability. 45. 802.11 Architecture: 36. Types of Frequency Channel Assignment The 802.11 standard includes MAC and Techniques: physical layers, supporting Wi-Fi Techniques include fixed, dynamic, and hybrid communication in wireless local area networks frequency assignments, balancing efficient (WLANs). spectrum use with reduced interference and 46. Issues of GSM Location Management: adaptable to demand changes. Issues include tracking user location accurately 37. Blocks of GSM Architecture: while preserving privacy and managing GSM architecture includes mobile stations, database updates to ensure timely service. base stations, network switching subsystems, 47. Mobile Databases in GSM: and operation subsystems, each supporting Databases like HLR and VLR manage user mobile communication. information, registration, and roaming, 38. Security Algorithms in GSM (Block Diagram): essential for call routing and mobility GSM security includes algorithms for management. authentication, encryption, and integrity, 48. HLR Failure Restoration: protecting user identity, call content, and HLR restoration includes database replication signaling data. and backup protocols to ensure data 39. HSCSD (High-Speed Circuit-Switched Data): availability and minimal disruption during HSCSD provides faster data transmission by failures. combining multiple GSM time slots, ideal for 49. VLR Failure Restoration: applications needing stable, high-speed VLR restoration involves re-registering users connections. and restoring recent data updates to maintain 40. GPRS Architecture and Each Entity: service continuity after system failures. GPRS architecture includes SGSN and GGSN, 50. O-I & O-II Algorithms: which handle packet-switched data routing, These algorithms address call processing and improving data rates and enabling mobile routing efficiency in GSM, optimizing network internet. resources and handling call transfers. 41. GSM Protocol Architecture: 51. Performance Evaluation Metrics of Handoff: GSM protocol includes layers for physical Metrics include call drop rate, handoff delay, transmission, signaling, and data services, signal strength, and latency. Effective handoff ensuring reliable and secure communication. aims to maintain call continuity and network 42. GPRS Protocol Architecture: quality during user movement. GPRS architecture includes IP-based protocols 52. Factors Affecting Handoff: for packet data transmission, enhancing data Factors include signal strength, network load, speeds for mobile internet and messaging speed of mobile nodes, and environmental services. conditions. These factors determine when and how a handoff should be initiated. 53. Traditional IP vs. Mobile IP: 62. Advantages and Disadvantages of Mobile TCP: Traditional IP lacks mobility support as it binds Advantages include TCP’s reliability and end- IP to a fixed location, while Mobile IP allows a to-end communication. Disadvantages involve mobile device to maintain a constant IP performance issues over wireless links due to address while roaming. high error rates. 54. Encapsulation in Mobile IP: 63. Indirect TCP Model (Pictorial Representation): Encapsulation in Mobile IP is the process of Indirect TCP separates the connection into wrapping a data packet to redirect it from the wired and wireless segments, with a base home network to a foreign network, enabling station managing handoffs to maintain continuous data delivery. seamless communication. 55. Advantages and Disadvantages of Mobile IP: 64. Functions of SMTP and SNMP Protocols: Advantages include seamless roaming and SMTP manages email transmission, while constant connectivity. Disadvantages include SNMP monitors network devices, collects data, increased overhead due to encapsulation and and supports network management tasks potential security concerns. across IP networks. 56. Binding of Mobile Node: 65. Snooping TCP with Examples: Binding refers to associating a mobile node’s Snooping TCP caches packets at the base home IP with its current care-of address, station, retransmitting lost packets locally, allowing it to receive data while on a foreign improving performance over unreliable network. wireless connections. 57. Agent Advertisement in Mobile IP: 66. Key Terminologies in Mobile IP: Agents periodically advertise their presence, 1. Home Address: Permanent IP address allowing mobile nodes to discover if they are in of the mobile node. a foreign or home network, and establish their care-of address. 2. Mobile Node: Device capable of changing its point of attachment. 58. Agent Solicitation and Agent Discovery: Mobile nodes send agent solicitation messages 3. Foreign Agent: Supports mobile nodes to discover nearby agents if no advertisements by providing care-of addresses. are received. This process helps nodes find 4. Foreign Network: Network where the connectivity in new networks. mobile node currently resides. 59. Schematic Model of Mobile IP (Neat Sketch): 5. Home Network: Original network of Mobile IP schematic includes the home agent, the mobile node. foreign agent, and mobile node, where packets are tunneled to the care-of address, ensuring 6. Corresponding Node: Device data flow continuity. communicating with the mobile node. 60. IP Packet Delivery (Diagram): 7. Care of Address: Temporary IP in the Packet delivery in Mobile IP involves foreign network. forwarding packets through a home agent to a 8. Agent Discovery: Process to identify mobile node’s foreign network, ensuring home and foreign agents. uninterrupted communication. 9. Tunneling and Encapsulation: 61. DHCP (Dynamic Host Configuration Protocol): Techniques to route packets to mobile DHCP automatically assigns IP addresses and nodes. network configuration to devices, simplifying network management and supporting dynamic 67. 3G vs. 2G Technology: IP allocation. 3G supports higher data rates and multimedia services, providing better internet and streaming capabilities than 2G, which primarily services, location tracking, and handovers focuses on voice services. within the GSM network, enabling seamless communication and mobility. 68. Characteristics of 4G and 5G Cellular Networks: 77. Need for EIR (Equipment Identity Register): 4G offers broadband speeds and IP-based EIR verifies device authenticity using IMEI, services, while 5G supports ultra-fast speeds, preventing unauthorized devices from low latency, and massive IoT connectivity, accessing the network, thus enhancing security revolutionizing mobile internet. and reducing fraud. 69. Important Features of GSM Security: 78. Define GPRS (General Packet Radio Service): GSM security includes user authentication, GPRS enhances GSM networks by providing data encryption, and confidentiality of user packet-switched data services, supporting identity, ensuring privacy and secure internet access and multimedia messaging on communication. mobile devices. 70. Define MSC and BSC: 79. Functions of GGSN (Gateway GPRS Support MSC (Mobile Switching Center) manages calls Node): and mobility, while BSC (Base Station GGSN connects the GPRS network to external Controller) handles radio resources, managing networks, handles IP allocation, and routes connections to mobile stations. data packets between mobile devices and the internet. 71. Define Call Routing: Call routing directs a call from the originating 80. Categories of GPRS Services: device to the destination, involving network GPRS services are categorized as internet nodes, signal processing, and potentially access, multimedia messaging, and location- handoff if mobility is involved. based services, offering diverse data applications for mobile users. 72. Define OMC (Operations and Maintenance Center): 81. GPRS Advantages over GSM: OMC oversees network maintenance, GPRS supports higher data rates, efficient use monitoring performance, managing faults, and of network resources, and packet-switched ensuring network availability and reliability in data, enabling internet browsing and GSM systems. multimedia applications on mobiles. 73. Services of GSM: 82. Limitations of GPRS: GSM services include voice calls, SMS, data GPRS has lower speeds than newer services, roaming, and supplementary services technologies, limited support for real-time like call forwarding, waiting, and caller ID. services, and requires significant power and bandwidth resources. 74. Function of HLR and VLR: HLR stores permanent subscriber information, 83. Main Elements of UMTS: while VLR temporarily holds user data when UMTS includes core network components, the mobile is in its service area, enabling call radio access network, and user equipment, routing and services. forming the 3G architecture to support high- speed data services. 75. Subsystems of GSM: GSM subsystems include the mobile station 84. Differences Between UMTS and 2G Networks: (user device), base station subsystem (radio UMTS offers higher data speeds, multimedia management), and network subsystem (core capabilities, and IP-based services, unlike 2G, operations and switching). which focuses primarily on voice and basic data services. 76. Major Functions in NSS (Network Switching Subsystem): 85. UMTS Compatibility with GSM/GPRS NSS manages call switching, subscriber Networks: UMTS networks can interoperate with 94. HSUPA (High-Speed Uplink Packet Access): GSM/GPRS networks, allowing seamless HSUPA improves uplink speeds, enabling faster transitions and service continuity between 2G, data uploading and supporting real-time 3G, and 4G networks. applications like video conferencing on mobile networks. 86. Routing Protocol Issues in MANET (Mobile Ad-hoc Network): 95. HSDPA (High-Speed Downlink Packet Access): MANET routing protocols face challenges such HSDPA enhances downlink speeds for quicker as dynamic topology, limited bandwidth, downloads and streaming, significantly energy constraints, and frequent route improving user experience on 3G networks. changes. 96. LTE Technology (Long-Term Evolution): 87. Dynamic Topology in MANET: LTE is a high-speed 4G technology offering MANET’s dynamic topology refers to faster data transfer, reduced latency, and constantly changing network connections, as support for mobile broadband and high- nodes move freely, requiring adaptive routing definition streaming. protocols. 97. 5G Architecture: 88. Ad-Hoc Routing Protocols Classification: 5G architecture includes the radio access Ad-hoc routing protocols are classified into network, core network, and service layer, proactive (maintain routes), reactive (on- providing ultra-fast connectivity and enabling demand routes), and hybrid, combining both massive IoT and AI integration. approaches. 98. Role of 5G in IoT: 89. Applications of MANET: 5G supports IoT with low latency, high speed, MANETs are used in disaster response, military and massive device connectivity, facilitating communication, remote sensing, and vehicular smart cities, automated industries, and networks due to their adaptability and connected devices. infrastructure-less design. 99. W-CDMA and Its Applications: 90. MANET Routing Algorithms Classification: W-CDMA is a 3G technology using wideband MANET routing algorithms are classified as code division for high-speed table-driven (proactive) and on-demand (reactive), each catering to different network needs. 91. Define VANET (Vehicular Ad-Hoc Network): VANETs are networks in which vehicles communicate with each other and roadside infrastructure, enhancing traffic management and safety. 92. Comparison of MANET and VANET: MANETs are general mobile networks, while VANETs specifically involve vehicles, with higher mobility and unique challenges like fast topology changes. 93. HSPA (High-Speed Packet Access): HSPA is an advanced 3G technology offering faster data speeds, enhancing mobile internet and multimedia experiences on compatible devices.