Mobile Computing Questions and Answers

Download as pdf or txt
Download as pdf or txt
You are on page 1of 6

Mobile Computing Questions and Answers communication in remote areas, and sensor

networks, thanks to their flexibility and


1. Define Mobile Computing:
infrastructure independence.
Mobile computing involves using portable
devices to access computing resources, data, 9. Applications of Ad-Hoc Networks:
and networks without being tied to a specific Used in disaster recovery, military rapid
location. It leverages wireless technology for deployment, and vehicular networks (VANETs),
remote data access and connectivity. ad hoc networks are essential for direct
communication in dynamic, infrastructure-less
2. Advantages of Mobile Computing:
settings.
Mobility, flexibility to work from anywhere,
increased productivity, easy access to 10. Characteristics of Mobile Computing:
information, and improved collaboration are Mobile computing is defined by portability,
primary advantages. Challenges include data wireless connectivity, resource constraints
security and battery limitations. (battery, bandwidth), location independence,
and real-time data access.
3. Mobile Computing vs. Wireless Networking:
Mobile computing involves devices with 11. Function of Presentation, Application, and
computing power and connectivity, while Data Tiers in Mobile Environment:
wireless networking provides the The presentation tier handles the user
infrastructure that enables these devices to interface, the application tier processes
connect without physical wires. requests, and the data tier manages
information storage, ensuring a responsive
4. Infrastructure-based vs. Infrastructure-less
mobile application.
Network:
Infrastructure-based networks use central 12. Role of a MAC Protocol:
entities (e.g., routers, base stations), while The Medium Access Control (MAC) protocol
infrastructure-less networks, like ad hoc regulates data transmission on shared
networks, allow direct device-to-device channels, managing access and reducing
communication without a central controller. collisions to ensure efficient bandwidth use.
5. Constraints and Applications of Mobile 13. Issues of Wireless MAC Protocol:
Computing: Wireless MAC protocols encounter issues like
Constraints include battery life, network hidden and exposed terminal problems, and
reliability, and security. Applications include interference, affecting network efficiency and
healthcare, education, business, and requiring contention management.
emergency response, offering flexible access to
14. Types of MAC Protocol:
data.
MAC protocols are divided into contention-
6. Challenges in Wireless Communication: based (e.g., CSMA) and contention-free (e.g.,
Wireless communication faces interference, TDMA, FDMA) protocols. Each has unique
limited bandwidth, signal fading, and security approaches for managing simultaneous data
concerns. Reliability and data optimization are access.
essential to counter these issues.
15. Hidden Terminal Problem in Infrastructure-
7. Illustrate Ad Hoc Networks with Pictorial less Network:
Representation: Hidden terminal issues arise when devices out
Ad hoc networks use a decentralized model of range collide with data intended for another
where each device acts as a router, enabling device. RTS/CTS protocols help mitigate such
communication without infrastructure. They collisions.
adapt dynamically to topology changes.
16. When Exposed Terminal Problem Arises:
8. Uses of Ad-Hoc Networks: Exposed terminal problems occur when a
These networks are beneficial for military device unnecessarily holds back transmission
operations, emergency responses, mobile
due to a neighboring device’s unrelated 25. Protocols of Bluetooth:
transmission, reducing efficiency. Bluetooth protocols include Baseband, L2CAP,
RFCOMM, and OBEX, covering everything from
17. Why MAC Protocols in Infrastructure-based
data link to service and file transfer protocols.
Wireless Networks May Fail in Infrastructure-
less Networks: 26. Entities in PCS Architecture and Their
MAC protocols designed for centralized Functions:
networks may not adapt to dynamic, peer-to- PCS architecture includes Mobile Switching
peer ad hoc networks, leading to inefficiency in Centers, Base Station Systems, and databases
decentralized communication. (HLR, VLR) that manage call routing,
registration, and handovers.
18. Why Collision Detection Protocol is
Unsuitable for Wireless Networks: 27. Protocol Layers of WAP:
Collision detection requires simultaneous WAP consists of application, session,
send-and-listen abilities, which wireless transaction, security, and transport layers,
systems lack due to signal attenuation and each serving to enhance mobile web
interference, making it ineffective. communication and data delivery.
19. TDMA, FDMA, and CDMA and Their 28. Difference between DSDV & AODV Routing
Differences: Algorithm:
TDMA divides time, FDMA divides frequency, DSDV is proactive, maintaining up-to-date
and CDMA uses code-based separation for routes, while AODV is reactive, establishing
multiple accesses. Each has unique trade-offs routes only when needed, making AODV more
in bandwidth and latency. efficient in dynamic networks.
20. Basic Scheme of CDMA Protocol: 29. DSDV Routing Algorithm:
CDMA allows multiple users by assigning DSDV uses a table-driven approach, with each
unique codes to data streams, enabling node maintaining a complete route table,
simultaneous communication on the same updating it periodically to ensure current
frequency without interference. routes in the network.
21. Role of Pseudorandom Generator in CDMA 30. AODV Routing Algorithm:
Protocol: AODV is an on-demand protocol that discovers
The pseudorandom generator creates unique routes only when required, reducing
code sequences for each user, ensuring that unnecessary data transmission and overhead
CDMA channels remain separate and secure. in mobile ad hoc networks.
22. Responsibilities of MAC Protocol: 31. Different Types of Handoffs:
MAC protocols manage data channel access, Types include hard handoff (break-before-
ensuring fair use of bandwidth, minimizing make), soft handoff (make-before-break), and
collisions, and optimizing network efficiency forced handoff (due to network conditions),
and throughput. each affecting call continuity.
23. Characteristics of 1G, 2G, 3G, 4G, 5G: 32. Frequency Reusing:
Generations vary in speed, bandwidth, and Frequency reuse allows the same frequency to
technology, with 1G offering analog voice, 2G be used in different cells, separated by
digital voice, 3G data services, 4G broadband sufficient distance to avoid interference,
internet, and 5G IoT support. maximizing bandwidth utilization.
24. Properties of Bluetooth: 33. 3-cell & 7-cell Cellular Structure:
Bluetooth enables short-range communication, Cellular structures, like 3-cell and 7-cell
operates on low power, supports device models, organize frequency allocation to
pairing, and provides a secure, flexible data minimize interference, with each cell shape
exchange in personal area networks. supporting frequency reuse strategies.
34. Co-channel & Adjacent Channel Interference: 43. UMTS Architecture:
Co-channel interference occurs between cells UMTS architecture combines radio access and
using the same frequency, while adjacent core networks, enabling high-speed data and
channel interference happens between cells multimedia services in 3G networks.
with neighboring frequencies.
44. UMTS Core Network:
35. Signal-to-Noise Ratio (SNR): The UMTS core network manages switching,
SNR measures the quality of a signal relative to data routing, and user authentication, serving
background noise, with higher ratios indicating as the backbone for 3G data and voice
clearer signals and better communication services.
reliability.
45. 802.11 Architecture:
36. Types of Frequency Channel Assignment The 802.11 standard includes MAC and
Techniques: physical layers, supporting Wi-Fi
Techniques include fixed, dynamic, and hybrid communication in wireless local area networks
frequency assignments, balancing efficient (WLANs).
spectrum use with reduced interference and
46. Issues of GSM Location Management:
adaptable to demand changes.
Issues include tracking user location accurately
37. Blocks of GSM Architecture: while preserving privacy and managing
GSM architecture includes mobile stations, database updates to ensure timely service.
base stations, network switching subsystems,
47. Mobile Databases in GSM:
and operation subsystems, each supporting
Databases like HLR and VLR manage user
mobile communication.
information, registration, and roaming,
38. Security Algorithms in GSM (Block Diagram): essential for call routing and mobility
GSM security includes algorithms for management.
authentication, encryption, and integrity,
48. HLR Failure Restoration:
protecting user identity, call content, and
HLR restoration includes database replication
signaling data.
and backup protocols to ensure data
39. HSCSD (High-Speed Circuit-Switched Data): availability and minimal disruption during
HSCSD provides faster data transmission by failures.
combining multiple GSM time slots, ideal for
49. VLR Failure Restoration:
applications needing stable, high-speed
VLR restoration involves re-registering users
connections.
and restoring recent data updates to maintain
40. GPRS Architecture and Each Entity: service continuity after system failures.
GPRS architecture includes SGSN and GGSN,
50. O-I & O-II Algorithms:
which handle packet-switched data routing,
These algorithms address call processing and
improving data rates and enabling mobile
routing efficiency in GSM, optimizing network
internet.
resources and handling call transfers.
41. GSM Protocol Architecture:
51. Performance Evaluation Metrics of Handoff:
GSM protocol includes layers for physical
Metrics include call drop rate, handoff delay,
transmission, signaling, and data services,
signal strength, and latency. Effective handoff
ensuring reliable and secure communication.
aims to maintain call continuity and network
42. GPRS Protocol Architecture: quality during user movement.
GPRS architecture includes IP-based protocols
52. Factors Affecting Handoff:
for packet data transmission, enhancing data
Factors include signal strength, network load,
speeds for mobile internet and messaging
speed of mobile nodes, and environmental
services.
conditions. These factors determine when and
how a handoff should be initiated.
53. Traditional IP vs. Mobile IP: 62. Advantages and Disadvantages of Mobile TCP:
Traditional IP lacks mobility support as it binds Advantages include TCP’s reliability and end-
IP to a fixed location, while Mobile IP allows a to-end communication. Disadvantages involve
mobile device to maintain a constant IP performance issues over wireless links due to
address while roaming. high error rates.
54. Encapsulation in Mobile IP: 63. Indirect TCP Model (Pictorial Representation):
Encapsulation in Mobile IP is the process of Indirect TCP separates the connection into
wrapping a data packet to redirect it from the wired and wireless segments, with a base
home network to a foreign network, enabling station managing handoffs to maintain
continuous data delivery. seamless communication.
55. Advantages and Disadvantages of Mobile IP: 64. Functions of SMTP and SNMP Protocols:
Advantages include seamless roaming and SMTP manages email transmission, while
constant connectivity. Disadvantages include SNMP monitors network devices, collects data,
increased overhead due to encapsulation and and supports network management tasks
potential security concerns. across IP networks.
56. Binding of Mobile Node: 65. Snooping TCP with Examples:
Binding refers to associating a mobile node’s Snooping TCP caches packets at the base
home IP with its current care-of address, station, retransmitting lost packets locally,
allowing it to receive data while on a foreign improving performance over unreliable
network. wireless connections.
57. Agent Advertisement in Mobile IP: 66. Key Terminologies in Mobile IP:
Agents periodically advertise their presence,
1. Home Address: Permanent IP address
allowing mobile nodes to discover if they are in
of the mobile node.
a foreign or home network, and establish their
care-of address. 2. Mobile Node: Device capable of
changing its point of attachment.
58. Agent Solicitation and Agent Discovery:
Mobile nodes send agent solicitation messages 3. Foreign Agent: Supports mobile nodes
to discover nearby agents if no advertisements by providing care-of addresses.
are received. This process helps nodes find
4. Foreign Network: Network where the
connectivity in new networks.
mobile node currently resides.
59. Schematic Model of Mobile IP (Neat Sketch):
5. Home Network: Original network of
Mobile IP schematic includes the home agent,
the mobile node.
foreign agent, and mobile node, where packets
are tunneled to the care-of address, ensuring 6. Corresponding Node: Device
data flow continuity. communicating with the mobile node.
60. IP Packet Delivery (Diagram): 7. Care of Address: Temporary IP in the
Packet delivery in Mobile IP involves foreign network.
forwarding packets through a home agent to a
8. Agent Discovery: Process to identify
mobile node’s foreign network, ensuring
home and foreign agents.
uninterrupted communication.
9. Tunneling and Encapsulation:
61. DHCP (Dynamic Host Configuration Protocol):
Techniques to route packets to mobile
DHCP automatically assigns IP addresses and
nodes.
network configuration to devices, simplifying
network management and supporting dynamic 67. 3G vs. 2G Technology:
IP allocation. 3G supports higher data rates and multimedia
services, providing better internet and
streaming capabilities than 2G, which primarily services, location tracking, and handovers
focuses on voice services. within the GSM network, enabling seamless
communication and mobility.
68. Characteristics of 4G and 5G Cellular
Networks: 77. Need for EIR (Equipment Identity Register):
4G offers broadband speeds and IP-based EIR verifies device authenticity using IMEI,
services, while 5G supports ultra-fast speeds, preventing unauthorized devices from
low latency, and massive IoT connectivity, accessing the network, thus enhancing security
revolutionizing mobile internet. and reducing fraud.
69. Important Features of GSM Security: 78. Define GPRS (General Packet Radio Service):
GSM security includes user authentication, GPRS enhances GSM networks by providing
data encryption, and confidentiality of user packet-switched data services, supporting
identity, ensuring privacy and secure internet access and multimedia messaging on
communication. mobile devices.
70. Define MSC and BSC: 79. Functions of GGSN (Gateway GPRS Support
MSC (Mobile Switching Center) manages calls Node):
and mobility, while BSC (Base Station GGSN connects the GPRS network to external
Controller) handles radio resources, managing networks, handles IP allocation, and routes
connections to mobile stations. data packets between mobile devices and the
internet.
71. Define Call Routing:
Call routing directs a call from the originating 80. Categories of GPRS Services:
device to the destination, involving network GPRS services are categorized as internet
nodes, signal processing, and potentially access, multimedia messaging, and location-
handoff if mobility is involved. based services, offering diverse data
applications for mobile users.
72. Define OMC (Operations and Maintenance
Center): 81. GPRS Advantages over GSM:
OMC oversees network maintenance, GPRS supports higher data rates, efficient use
monitoring performance, managing faults, and of network resources, and packet-switched
ensuring network availability and reliability in data, enabling internet browsing and
GSM systems. multimedia applications on mobiles.
73. Services of GSM: 82. Limitations of GPRS:
GSM services include voice calls, SMS, data GPRS has lower speeds than newer
services, roaming, and supplementary services technologies, limited support for real-time
like call forwarding, waiting, and caller ID. services, and requires significant power and
bandwidth resources.
74. Function of HLR and VLR:
HLR stores permanent subscriber information, 83. Main Elements of UMTS:
while VLR temporarily holds user data when UMTS includes core network components,
the mobile is in its service area, enabling call radio access network, and user equipment,
routing and services. forming the 3G architecture to support high-
speed data services.
75. Subsystems of GSM:
GSM subsystems include the mobile station 84. Differences Between UMTS and 2G Networks:
(user device), base station subsystem (radio UMTS offers higher data speeds, multimedia
management), and network subsystem (core capabilities, and IP-based services, unlike 2G,
operations and switching). which focuses primarily on voice and basic
data services.
76. Major Functions in NSS (Network Switching
Subsystem): 85. UMTS Compatibility with GSM/GPRS
NSS manages call switching, subscriber Networks:
UMTS networks can interoperate with 94. HSUPA (High-Speed Uplink Packet Access):
GSM/GPRS networks, allowing seamless HSUPA improves uplink speeds, enabling faster
transitions and service continuity between 2G, data uploading and supporting real-time
3G, and 4G networks. applications like video conferencing on mobile
networks.
86. Routing Protocol Issues in MANET (Mobile
Ad-hoc Network): 95. HSDPA (High-Speed Downlink Packet Access):
MANET routing protocols face challenges such HSDPA enhances downlink speeds for quicker
as dynamic topology, limited bandwidth, downloads and streaming, significantly
energy constraints, and frequent route improving user experience on 3G networks.
changes.
96. LTE Technology (Long-Term Evolution):
87. Dynamic Topology in MANET: LTE is a high-speed 4G technology offering
MANET’s dynamic topology refers to faster data transfer, reduced latency, and
constantly changing network connections, as support for mobile broadband and high-
nodes move freely, requiring adaptive routing definition streaming.
protocols.
97. 5G Architecture:
88. Ad-Hoc Routing Protocols Classification: 5G architecture includes the radio access
Ad-hoc routing protocols are classified into network, core network, and service layer,
proactive (maintain routes), reactive (on- providing ultra-fast connectivity and enabling
demand routes), and hybrid, combining both massive IoT and AI integration.
approaches.
98. Role of 5G in IoT:
89. Applications of MANET: 5G supports IoT with low latency, high speed,
MANETs are used in disaster response, military and massive device connectivity, facilitating
communication, remote sensing, and vehicular smart cities, automated industries, and
networks due to their adaptability and connected devices.
infrastructure-less design.
99. W-CDMA and Its Applications:
90. MANET Routing Algorithms Classification: W-CDMA is a 3G technology using wideband
MANET routing algorithms are classified as code division for high-speed
table-driven (proactive) and on-demand
(reactive), each catering to different network
needs.
91. Define VANET (Vehicular Ad-Hoc Network):
VANETs are networks in which vehicles
communicate with each other and roadside
infrastructure, enhancing traffic management
and safety.
92. Comparison of MANET and VANET:
MANETs are general mobile networks, while
VANETs specifically involve vehicles, with
higher mobility and unique challenges like fast
topology changes.
93. HSPA (High-Speed Packet Access):
HSPA is an advanced 3G technology offering
faster data speeds, enhancing mobile internet
and multimedia experiences on compatible
devices.

You might also like