Mobile Computing Practice que ans

Download as pdf or txt
Download as pdf or txt
You are on page 1of 16

Explain the Network and switching subsystem of GSM architecture

-Network and Switching Subsystem (NSS) in GSM handles calls, subscriber information, and
security
Key components include:
Mobile Switching Center (MSC): Routes calls and manages connections between users.
Home Location Register (HLR): Stores permanent subscriber details like phone numbers
and service profiles.
Visitor Location Register (VLR): Temporarily holds data for users currently in the area,
supporting roaming.
Authentication Center (AUC): Verifies subscriber identities for security.
Equipment Identity Register (EIR): Checks if devices are authorized, blocking stolen or
unauthorized ones.
Gateway MSC (GMSC): Connects GSM calls to other networks like landlines.

Write a short note SIM


- A SIM (Subscriber Identity Module) is a small card in a mobile phone that stores your
phone number, contacts, and unique ID. It helps connect your phone to the network so you
can make calls, send messages, and use data. You can move a SIM card to another phone to
keep the same number. It also keeps your information secure with PIN protection.

Explain UMTS architecture in detail


- he UMTS architecture has three main parts:
1. User Equipment (UE): This is the mobile device (like a phone or tablet) that connects
to the network. It has a USIM card that stores user data and identity.
2. UMTS Terrestrial Radio Access Network (UTRAN): This part connects the device to
the core network through Node B (similar to cell towers), which handles signals and
radio communication.
3. Core Network (CN): Manages calls, data sessions, and connections with other
networks (like the internet or other phone networks). It also includes databases to
track users and handle roaming.
Explain GSM architecture in detail
- The GSM architecture has three main parts:
1. Mobile Station (MS): This is the user’s device, like a mobile phone. It has the SIM
card, which stores the user's identity and allows connection to the network.
2. Base Station Subsystem (BSS): This part includes Base Transceiver Stations (BTS)
(cell towers) and Base Station Controllers (BSC). The BTS handles radio
communication with phones, while the BSC manages these BTSs and controls call
handovers between them.
3. Network and Switching Subsystem (NSS): This part manages call routing, mobility,
and user information. It includes the Mobile Switching Center (MSC) for call
management, HLR and VLR databases for storing user information, and the AUC and
EIR for security and device checking.

Define Mobile computing.


- Mobile computing is the use of portable devices like smartphones and tablets to
access the internet and communicate while on the go. It allows users to work and
connect from anywhere without being tied to a location. Key points include:
1. Portability: Easy to carry.
2. Connectivity: Connects to Wi-Fi or cellular networks.
3. Wireless: Uses wireless technology for communication.
4. Location: Often includes GPS for location services.

Adv-
Portability: Easy to carry and use anywhere.
Real-Time Access: Instant access to information and apps.
Flexibility: Work or communicate from any location.
Better Communication: Quick calls, messages, and video chats.
Productivity: Work anytime, improving efficiency.
Location Services: GPS for maps and nearby info.
Convenience: Do tasks like shopping, banking, and learning on the go.
Mobile Computing vs. Wireless Networking:
1. Mobile Computing: Using portable devices (like phones or tablets) to work or access
data anywhere.
2. Wireless Networking: The technology (like Wi-Fi) that connects devices without
cables

Distinguish between infrastructure-based network and infrastructure less network.


-Infrastructure-Based Network: Has fixed structures (like Wi-Fi routers or cell towers) to
connect devices. Example: Wi-Fi in an office.
Infrastructure-Less Network: Devices connect directly without fixed structures. Example:
Bluetooth between phones.

Give constraints and applications of Mobile computing.


- Constraints of Mobile Computing:
1. Battery Life: Needs frequent charging.
2. Network Issues: Unstable connections in some areas.
3. Security Risks: Vulnerable to hacking and theft.
4. Limited Power: Less processing power than computers.
5. Small Screens: Harder to use for detailed tasks.
Applications of Mobile Computing:
1. Healthcare: Telemedicine and patient monitoring.
2. Banking: Mobile payments and banking.
3. Education: E-learning and educational apps.
4. Transportation: GPS and ride-sharing.
5. Retail: Mobile shopping and payments.

What are the challenges in Wireless Communication?


- Challenges in Wireless Communication:
1. Interference: Other devices can disrupt signals.
2. Signal Strength: Signals weaken with distance and obstacles.
3. Security: More vulnerable to hacking.
4. Limited Bandwidth: Can slow down in crowded areas.
5. Battery Drain: Wireless use drains battery quickly.
6. Weather Impact: Bad weather can affect signal quality.

1. Define Mobile Computing


Mobile computing is the ability to use portable devices like smartphones and tablets to
access data and perform tasks while on the move.
2. List the Advantages of Mobile Computing
• Portability: Devices are easy to carry.
• Real-Time Access: Instant access to information.
• Flexibility: Work from anywhere.
• Better Communication: Quick calls and messages.
• Increased Productivity: Work anytime.
• Location Services: GPS functionality.
• Convenience: Tasks like shopping and banking on the go.
3. Distinguish between Mobile Computing and Wireless Networking
• Mobile Computing: Involves using portable devices for access to information.
• Wireless Networking: Refers to the technology that connects devices without
physical cables.
4. Distinguish between Infrastructure-Based Network and Infrastructure-Less Network
• Infrastructure-Based Network: Uses fixed equipment (e.g., routers) to manage
connections.
• Infrastructure-Less Network: Devices connect directly without fixed infrastructure
(e.g., ad-hoc networks).
5. Give Constraints and Applications of Mobile Computing
Constraints: Battery life, network stability, security risks, limited processing power, small
screen size. Applications: Healthcare, banking, education, transportation, retail.
6. What are the Challenges in Wireless Communication?
• Interference: Signals disrupted by other devices.
• Signal Range: Weakness over distance.
• Security: Vulnerable to attacks.
• Bandwidth Limitations: Congestion in high-traffic areas.
• Energy Consumption: High power use affects battery life.
7. Illustrate Ad-Hoc Networks with Pictorial Representation
An ad-hoc network consists of devices connected directly to each other without a central
router, often represented in a mesh format.
8. Give the Uses of Ad-Hoc Networks
• Temporary networks for events.
• Military communication.
• Disaster recovery operations.
• Personal area networks (e.g., Bluetooth connections).
9. Mention the Applications of Ad-Hoc Networks
• Emergency response.
• Peer-to-peer file sharing.
• Sensor networks.
• Vehicle-to-vehicle communication.
10. Point out the Characteristics of Mobile Computing
• Mobility: Ability to use devices anywhere.
• Connectivity: Seamless internet access.
• Adaptability: Supports various applications.
• User-Centric: Focus on user needs and experiences.
11. Describe the Function of Presentation, Application, and Data Tier of Mobile
Environment
• Presentation Tier: Manages the user interface and user interaction.
• Application Tier: Processes data and business logic.
• Data Tier: Stores and retrieves data from databases.
12. What is the Role of a MAC Protocol?
The MAC (Media Access Control) protocol manages how multiple devices share and access
the communication medium without interference.
13. Identify the Issues of Wireless MAC Protocol
• Collision Management: Preventing data collisions.
• Fairness: Ensuring equal access for all devices.
• Energy Efficiency: Minimizing power consumption.
• Latency: Reducing delays in communication.
14. Classify the Types of MAC Protocol
• Contention-Based Protocols: Devices compete for access (e.g., CSMA/CD).
• Token-Based Protocols: Use a token to grant access.
• Time-Division Protocols: Allocate time slots for each device.
15. Explain Hidden Terminal Problems in Infrastructure-Less Network
In an infrastructure-less network, two devices may not see each other but can communicate
with a common device, causing data collisions.
16. When Does the Exposed Terminal Problem Arise?
This occurs when a device is prevented from transmitting because it senses a busy medium,
even though it wouldn’t interfere with another ongoing transmission.
17. Reasons MAC Protocol for Infrastructure-Based Wireless May Not Work Satisfactorily
in Infrastructure-Less Networks
• Lack of central coordination.
• Increased mobility causing rapid topology changes.
• Higher collision rates due to direct communication.
18. Reason Why Collision Detection Based Protocol is Not Suitable for Wireless Networks
Collision detection requires devices to listen while transmitting, which is impractical in
wireless environments due to signal attenuation and interference.
19. Describe TDMA, FDMA, and CDMA and Tabulate the Differences Among Them
• TDMA (Time Division Multiple Access): Divides time into slots for each user.
• FDMA (Frequency Division Multiple Access): Allocates separate frequency bands to
users.
• CDMA (Code Division Multiple Access): Uses unique codes for each user to share the
same frequency.

Feature TDMA FDMA CDMA

Access Method Time slots Frequency bands Unique codes


Feature TDMA FDMA CDMA

Efficiency Moderate Lower Higher

Complexity Lower Lower Higher

20. Discuss the Basic Scheme of the CDMA Protocol


CDMA allows multiple users to transmit simultaneously by assigning unique codes, allowing
efficient use of the frequency spectrum.
21. Role of a Pseudorandom Generator in CDMA
It generates unique codes for each user, ensuring that signals can be distinguished from one
another despite sharing the same frequency.
22. Principle Responsibilities of the MAC Protocol
• Managing access to the transmission medium.
• Avoiding data collisions.
• Ensuring fairness among users.
• Providing reliability in data delivery.
23. Characteristics of 1G, 2G, 3G, 4G, 5G
• 1G: Analog voice communication.
• 2G: Digital voice, SMS.
• 3G: Mobile internet access, multimedia.
• 4G: High-speed internet, IP-based services.
• 5G: Ultra-low latency, massive IoT support, enhanced mobile broadband.
24. Properties of Bluetooth
• Short-range wireless technology.
• Low power consumption.
• Supports multiple devices (up to 7).
• Secure data transmission.
25. Protocols of Bluetooth
• L2CAP: Logical Link Control and Adaptation Protocol.
• RFCOMM: Serial port emulation.
• SDP: Service Discovery Protocol.
26. Different Entities of PCS Architecture and Their Working
• Mobile Station (MS): User device for communication.
• Base Station Controller (BSC): Manages radio resources and call routing.
• Mobile Switching Center (MSC): Connects calls and manages handoffs.
• Home Location Register (HLR): Stores user information.
• Visitor Location Register (VLR): Temporarily stores user data while in a region.
27. Explain Various Protocol Layers of WAP
• Application Layer: User applications (WAP services).
• Session Layer: Manages sessions and communication.
• Transport Layer: Ensures reliable data transport.
• Network Layer: Manages data routing and addressing.
28. Difference Between DSDV & AODV Routing Algorithm
• DSDV (Destination-Sequenced Distance Vector): Proactive, maintains up-to-date
routes.
• AODV (Ad Hoc On-Demand Distance Vector): Reactive, establishes routes only when
needed.
29. Explain DSDV Routing Algorithm
DSDV is a proactive routing protocol where each node maintains a table of the shortest
paths to all other nodes and updates this table periodically.
30. Explain AODV Routing Algorithm
AODV is a reactive protocol that discovers routes on demand. When a node needs to
communicate, it broadcasts a route request, establishing a path to the destination.
31. What are Different Handoff Types?
• Hard Handoff: Breaks the connection before establishing a new one.
• Soft Handoff: Maintains connections to multiple base stations during the switch.
• Horizontal Handoff: Between similar networks (e.g., 4G to 4G).
• Vertical Handoff: Between different networks (e.g., 4G to Wi-Fi).
32. What is Frequency Reusing?
Frequency reusing allows the same frequency channels to be used in different geographical
areas, increasing the capacity of a wireless network.
33. Explain 3-Cell & 7-Cell Cellular Structure
• 3-Cell Structure: Divides a region into 3 cells, allowing frequency reuse with minimal
interference.
• 7-Cell Structure: Divides into 7 cells, increasing capacity and reducing interference
further.
34. What is Co-Channel & Adjacent Channel Interference?
• Co-Channel Interference: Occurs when cells using the same frequency interfere with
each other.
• Adjacent Channel Interference: Happens when nearby channels interfere due to
insufficient separation.
35. What is Signal to Noise Ratio (SNR)?
SNR measures the level of desired signal to the level of background noise, indicating the
quality of a wireless signal.
36. What are Different Types of Frequency Channel Assignment Techniques?
• Fixed Assignment: Pre-allocated frequencies.
• Dynamic Assignment: Frequencies allocated based on demand.
• Hybrid Assignment: Combination of fixed and dynamic.
37. Explain Each Block of GSM Architecture
• Mobile Station (MS): User device.
• Base Station Subsystem (BSS): BTS and BSC for radio communication.
• Network and Switching Subsystem (NSS): MSC, HLR, VLR for call management.
• Operation Support System (OSS): Manages network operations.
38. Explain Security Algorithms Used in GSM Along With Block Diagram
GSM employs algorithms like A3 for authentication and A5 for encryption to secure
communications.
39. What is HSCSD?
High-Speed Circuit-Switched Data (HSCSD) enhances data rates by combining multiple time
slots for circuit-switched data.
40. Explain GPRS Architecture Along With Each Entity
• Mobile Station (MS): User device.
• GGSN (Gateway GPRS Support Node): Connects to external networks.
• SGSN (Serving GPRS Support Node): Manages data delivery to/from MS.
• HLR: User information storage.
41. Explain GSM Protocol Architecture
GSM has multiple layers including physical, link, network, and application layers, managing
signaling and communication.
42. Explain GPRS Protocol Architecture
GPRS architecture includes the same entities as GSM but adds layers for data services,
ensuring packet-switched communication.
43. Explain UMTS Architecture
UMTS architecture includes User Equipment (UE), Node B (base station), RNC (Radio
Network Controller), and Core Network for data handling.
44. What is UMTS Core Network?
The UMTS core network manages data routing, mobility, and user sessions, connecting users
to external networks.
45. Explain 802.11 Architecture
802.11 architecture includes stations (STAs), access points (APs), and distribution systems for
wireless LAN communication.
46. What are the Issues of GSM Location Management?
• User Privacy: Protecting user location information.
• Efficiency: Quick updates for user locations.
• Cost: Managing costs associated with location updates.
47. What are the Mobile Databases of GSM?
• HLR: Permanent user data.
• VLR: Temporary user data while roaming.
48. Explain HLR Failure Restoration
HLR failure restoration involves backup systems ensuring continued access to user data and
minimizing downtime.
49. Explain VLR Failure Restoration
VLR failure restoration includes maintaining temporary user data and redirecting requests to
a backup VLR.
50. Explain O-I & O-II Algorithms
These algorithms manage user location updates and facilitate efficient tracking and routing
in GSM.
51. What are the Performance Evaluation Metrics of Handoff?
• Handoff Success Rate: Successful transitions between networks.
• Call Dropping Rate: Frequency of dropped calls.
• Handoff Latency: Time taken to complete a handoff.
52. What are the Factors Affecting Hand-off?
• Signal Strength: Changes in signal can trigger handoffs.
• User Speed: Fast-moving users may require quicker handoffs.
• Network Load: High traffic can affect handoff efficiency.
53. Differentiate Between Traditional IP and Mobile IP
Traditional IP is static and does not support changing networks, while Mobile IP allows
devices to maintain the same IP address while moving between networks.
54. What is Encapsulation in Mobile IP?
Encapsulation in Mobile IP involves wrapping packets in another packet to deliver them to a
mobile node's care-of address.
55. List the Advantages and Disadvantages of Mobile IP
Advantages: Seamless connectivity, consistent IP address, supports mobility. Disadvantages:
Increased complexity, potential for latency, requires more resources.
56. What Do You Mean by the Term Binding of Mobile Node?
Binding refers to the association between a mobile node's home address and its current
care-of address.
57. What Do You Mean by Agent Advertisement?
Agent advertisement is a process where the mobile agent broadcasts its presence to inform
nodes of its availability for routing.
58. What is Agent Solicitation and Agent Discovery?
• Agent Solicitation: Requesting the presence of a mobile agent.
• Agent Discovery: Finding available agents for routing.
59. Illustrate the Schematic Model of Mobile IP
The model illustrates mobile nodes, home agents, and foreign agents managing
communication as the mobile node moves.
60. Explain IP Packet Delivery With Neat Diagram
IP packet delivery involves encapsulating packets at the source and routing them through
the network to the destination.
61. What is DHCP?
Dynamic Host Configuration Protocol (DHCP) automates IP address assignment to devices on
a network.
62. Point Out the Advantages and Disadvantages of Mobile TCP
Advantages: Better handling of packet loss, improved reliability. Disadvantages: Increased
complexity, potential for slower performance.
63. Show the Pictorial Representation of Indirect TCP Model
Indirect TCP involves a split connection between the sender and receiver, with the mobile
node handling changes in the connection.
64. State the Functions of SMTP and SNMP Protocols
• SMTP (Simple Mail Transfer Protocol): Manages sending and receiving emails.
• SNMP (Simple Network Management Protocol): Monitors and manages network
devices.
65. Illustrate Snooping TCP with Suitable Examples
Snooping TCP caches packets at the base station to reduce latency and improve performance
for mobile nodes.
66. Explain the Following Terminologies
• Home Address: Permanent IP address of a mobile node.
• Mobile Node: Device that can change its network location.
• Foreign Agent: Manages connections for mobile nodes in a foreign network.
• Foreign Network: Network where the mobile node is currently connected.
• Home Network: The mobile node's original network.
• Corresponding Node: The entity communicating with the mobile node.
• Care of Address: Temporary address used by the mobile node while away from
home.
• Agent Discovery: The process of finding available agents.
• Tunneling and Encapsulation: Methods for sending packets through the network
securely.
67. Is 3G Cellular Wireless Technology Superior to 2G Technology?
Yes, 3G offers higher data rates, better voice quality, and supports multimedia services
compared to 2G.
68. Show the Characteristics of 4G and 5G Cellular Networks
• 4G: High-speed data, IP-based services, improved latency.
• 5G: Ultra-low latency, massive IoT support, enhanced mobile broadband, high
capacity.
69. List the 3 Important Features of GSM Security
• Encryption: Protects user data.
• Authentication: Verifies user identity.
• Integrity: Ensures message integrity.
70. Define MSC and BSC
• MSC (Mobile Switching Center): Manages call routing and mobility.
• BSC (Base Station Controller): Controls base stations and handles communication
between MS and MSC.
71. Define Call Routing
Call routing is the process of directing phone calls from the caller to the intended recipient
through the network.
72. Define OMC
OMC (Operation and Maintenance Center): Manages network operations, monitoring, and
maintenance tasks.
73. List the Services of GSM
• Voice calls
• SMS (text messaging)
• Data services (GPRS, EDGE)
• Voice mail
• Call forwarding
74. Describe the Function of HLR and VLR
• HLR (Home Location Register): Stores permanent user data and subscription details.
• VLR (Visitor Location Register): Temporarily stores user information while the user is
roaming.
75. What are the Subsystems of GSM?
• Mobile Station (MS)
• Base Station Subsystem (BSS)
• Network and Switching Subsystem (NSS)
• Operation Support Subsystem (OSS)
76. Point Out the Major Functions in NSS
• Call management
• Mobility management
• User data storage
• Network interconnection
77. Analyze the Need for EIR
EIR (Equipment Identity Register) helps manage mobile devices in the network, ensuring
that stolen or unauthorized devices are blocked.
78. Define GPRS
GPRS (General Packet Radio Service) is a packet-switched technology that enhances GSM,
allowing for higher data rates and continuous connection.
79. Give the Functions of GGSN
GGSN (Gateway GPRS Support Node) connects GPRS networks to external IP networks,
managing data packet transfer.
80. Classify the Categories of GPRS Services
• Contention-Based: Shared access for multiple users.
• Dedicated: Reserved resources for specific users.
81. GPRS is Advantageous Over GSM. Justify the Statement.
GPRS supports higher data rates and packet-switched services, making it suitable for internet
access and multimedia applications.
82. Generalize the Limitations of GPRS
• Limited data rates compared to 3G.
• Dependency on GSM infrastructure.
• Latency issues during handover.
83. What are the Main Elements of UMTS?
• User Equipment (UE)
• Node B (base station)
• RNC (Radio Network Controller)
• Core Network
84. How UMTS Networks are Different from 2G Network?
UMTS networks offer higher data rates, support for multimedia services, and improved
capacity compared to 2G.
85. Can UMTS Networks Easily Work with Existing GSM/GPRS Networks?
Yes, UMTS is designed to coexist with GSM and GPRS, allowing for gradual migration and
interoperability.
86. Identify the Issues Addressed by Routing Protocol in MANET
• Dynamic topology changes.
• Route discovery and maintenance.
• Efficient use of limited resources.
87. What Do You Mean by Dynamic Topology of MANET?
Dynamic topology refers to the frequent changes in the network structure due to node
mobility.
88. Classify Ad-Hoc Routing Protocols
• Proactive Protocols: Maintain routes at all times (e.g., DSDV).
• Reactive Protocols: Find routes on-demand (e.g., AODV, DSR).
89. Give the Applications of MANET
• Military applications
• Disaster recovery
• Mobile conferencing
• Internet access in remote areas
90. Classify the MANET Routing Algorithms
• Table-Driven Protocols: e.g., DSDV.
• On-Demand Protocols: e.g., AODV, DSR.
91. Define VANET
VANET (Vehicular Ad-Hoc Network) enables communication between vehicles and
infrastructure for safety and traffic management.
92. Compare MANET Vs VANET
• MANET: General mobile devices, dynamic topology.
• VANET: Vehicles specifically, predictable movement patterns.
93. What is HSPA?
HSPA (High-Speed Packet Access) enhances 3G networks with improved data rates and
capacity.
94. What is HSUPA?
HSUPA (High-Speed Uplink Packet Access) improves uplink data rates in HSPA.
95. What is HSDPA?
HSDPA (High-Speed Downlink Packet Access) enhances downlink data rates in 3G networks.
96. What is LTE Technology?
LTE (Long-Term Evolution) is a 4G technology providing high-speed wireless data
communication.
97. Architecture of 5G
5G architecture includes multiple components like User Equipment (UE), gNodeB (5G base
station), and the 5G Core Network for efficient data handling.
98. Role of 5G in IoT
5G provides enhanced connectivity, low latency, and massive device support, making it ideal
for IoT applications.
99. What is W-CDMA? Applications of W-CDMA.
W-CDMA (Wideband Code Division Multiple Access) is a 3G technology used for mobile
communication, supporting voice and data services.
100. Explain CDMA 2000 1x.
CDMA 2000 1x is a 3G technology that improves data rates and capacity over traditional
CDMA, supporting various services including voice and multimedia.

You might also like