7/27/2019 2mark-QUESBANK
1/17
1
UNIT I MOBILE NETWORKS 9
Cellular Wireless Networks GSM Architecture Protocols Connection Establishment Frequency Allocation Routing Mobility Management Security GPRS
PART A
1.What is mobile computing?
Mobile computing is a technolgythat allows transmission of data, via a computer,Without having
to be connected to a fixed physical link.
2. What is Mobility?
A person who moves
oBetween different geographical locations
oBetween different networks
oBetween different communication devices
o
Between different applicationsA device that moves
oBetween different geographical locations
oBetween different networks
3.What is guard space?Guard spaces are needed to avoid frequency band overlapping is also called channel interference.
4.What is multiplexing?
Multiplexing is transmitting multiple signals over a single communications line or computerchannel. The two common multiplexing techniques are FDM, which separates signals by
modulating the data onto different carrier frequencies, and TDM, which separates signals byinterleaving bits one after the other.
5.What is FDM
FDM is frequency division multiplexing which describes schemes to subdivide the frequency
dimension into several non overlapping frequency bands.
6.What is hopping sequence?
Transmitter and receiver stay on one of the channels like and TDM.The pattern of channel usageis called the hopping sequence,
7. What is dwell time?The time spend on a channel with a certain frequency is called the dwell time
8. What are the two types of hopping sequence?
1) Slow hopping2) Fast hopping
7/27/2019 2mark-QUESBANK
2/17
2
9. What are the advantages of cellular systems?
The advantages of cellular systems are,
_ Higher capacity
_ Less transmission power_ Local interface only
_ Robustness
10. What is digital cellular networks?
Digital cellular networks are segment of the market for mobile and wireless device which are
growing most rapidly.
11. What are the disadvantages of cellular systems?
The advantages of cellular systems are,
_ Infrastructure needed_ Handover needed
_ Frequency planning
12. What is GSM?
GSMis group special mobile.GSM is the successful digital mobile telecommunication system in
the world today.
13. What is authentication centre?
As the radio interface and mobile stations are particularly vulnerable a separate AuC has
beendefined to protect user identity and data transmission. The AuC contains the algorithms forauthentication as well as the keys for encryption and generates the values needed for user
authentication in the HLR. The AuC may, in fact, be situated in a special protected part of the
HLR.
14. What is called burst?
Data is transmitted in small portions is called bursts,
15. What are the basic groups of logical channels?
GSM specifies 2 basic groups of logical channels,
_ Traffic channels_ Control channels
16. Define MSC?
MSC is mobile services switching center.MSC are high performance digital ISDN switches.
17. What is GPRS?
GPRS is general pachet radio service.
18. Specify the steps perform during the search for a cell after power on?
7/27/2019 2mark-QUESBANK
3/17
3
19. Explain about transparent mode?
The transparent mode transfer simply forwards MAC data without any
further processing. The system then has to rely on the FEC which is always used in the radio
layer.
20. What are the basic classes of handovers?UMTS has 2 basic classes of handovers,_ Hard handover
_ Soft handover
21. What is GPRS?
GPRS is general packet radio service.
22. What are the control channel groups in GSM?
The control channel groups in GSM are:_ Broadcast control channel (BCCH).
_ Common control channel (CCCH).
_ Dedicated control channel (DCCH).
PART B
1. Explain GSM architecture?
_ Mobile services
o Bearer services
o Tele serviceso Supplementary services
_ System architecture
_ Radio subsystem
_ Network and switching subsystem_ Operation subsystem
2. Explain GSM System architecture?_ Protocol architecture
3. Explain briefly about Multiplexing?Space division multiplexing
Frequency division multiplexing
Time division multiplexing
Code division multiplexing
4. Explain medium access control?
MotivationSDMA
FDMA
TDMACDMAComparison
7/27/2019 2mark-QUESBANK
4/17
4
5. Write a short note on Cellular Wireless Networks
6. Explain the Security mechanism implemented in GSM.
7.Explain the GPRS system.
7/27/2019 2mark-QUESBANK
5/17
5
UNIT II WIRELESS NETWORKS 9
Wireless LANs and PANs IEEE 802.11 Standard Architecture Services Network
HiperLANBlue Tooth- Wi-FiWiMAX
PART A
7/27/2019 2mark-QUESBANK
6/17
6
7/27/2019 2mark-QUESBANK
7/17
7
7/27/2019 2mark-QUESBANK
8/17
8
PART B
6. Write a short note on Wi-Fi andWiMAX.
7/27/2019 2mark-QUESBANK
9/17
9
UNIT III ROUTING 9
Mobile IP DHCP AdHoc Proactive and Reactive Routing Protocols Multicast Routing.
PART A
7/27/2019 2mark-QUESBANK
10/17
10
7/27/2019 2mark-QUESBANK
11/17
11
PART B
7/27/2019 2mark-QUESBANK
12/17
12
UNIT IV TRANSPORT AND APPLICATION LAYERS 9
Mobile TCPWAPArchitectureWWW Programming ModelWDPWTLSWTP
WSPWAEWTA ArchitectureWMLWMLScripts.
PART A
7/27/2019 2mark-QUESBANK
13/17
13
7/27/2019 2mark-QUESBANK
14/17
14
7/27/2019 2mark-QUESBANK
15/17
15
PART B
6.Write a short notes on mobile TCP.
7/27/2019 2mark-QUESBANK
16/17
16
UNIT V PERVASIVE COMPUTING 9
Pervasive computing infrastructure-applications- Device Technology - Hardware, Human-
machine Interfaces, Biometrics, and Operating systems Device Connectivity Protocols,
Security, and Device Management- Pervasive Web Application architecture-Access from PCs
and PDAs - Access via WAP
PART A
1. What is Pervasive computing?Pervasive computing is a rapidly developing area of Information and Communications
Technology (ICT). The term refers to the increasing integration of ICT into peoples lives and
environments, made possible by the growing availability of microprocessors with inbuilt
communications facilities.
2. What are the three areas of pervasive computing technologies?
Pervasive computing involves three converging areas ofICT: computing (devices),
communications(connectivity) and user interfaces.
3. Give the history of pervasive computing.
Pervasive computing is the third wave of computingtechnologies to emerge sincecomputers first appeared:
First Wave - Mainframe computing era: one computershared by many people, via workstations.
Second Wave - Personal computing era: one computerused by one person, requiring aconscious interaction.Users largely bound to desktop.
Third Wave Pervasive (initially called ubiquitous)computing era: one person, many
computers. Millionsof computers embedded in the environment, allowingtechnology to recede
into the background.
4. Give the applications of pervasive computing.
Healthcare, home care, transport andenvironmental monitoring are among the mostfrequently cited.
5. List the devices used in pervasive computing.
PCS devices are likely to assume many different forms and sizes, from handheld units(similar to mobile phones) to near-invisible devices set into everyday objects (like furniture and
clothing). These will all be able to communicate with each other and act intelligently. Such
devices can be separated into three categories:
sensors: input devices that detect environmental changes, user behaviours, human commandsetc;
processors: electronic systems that interpret and analyse input-data; actuators: output devices that respond to processed information by altering the environment
via electronic or mechanical means. For example, air temperature control is often done with
actuators.
7/27/2019 2mark-QUESBANK
17/17
17
6. What is device connectivity?
Pervasive computing systems will rely on the interlinking of independent electronicdevices into broader networks. This can be achieved via both wired (such as Broadband (ADSL)
or Ethernet) and wireless networking technologies (such as WiFi or Bluetooth), with the devices
themselves being capable of assessing the most effective form of connectivity.
7. Define user interface in Pervasive computing.
User interfaces represent the point of contact between ICT and human users. For example with apersonal computer, the mouse and keyboard are used to inputinformation, while the monitor
usually provides the output.
8. List the different forms of human- computer interaction.
Active
Passive
Coercive
9. How is privacy, security and safety defined in pervasive computing?
Pervasive computing systems may have implications for privacy, security and safety, as a resultof their ability to:
gather sensitive data, for example on users' everyday interactions, movements, preferences and
attitudes, without user intervention or consent;
retrieve and use information from large databases/archives of stored data;
alter the environment via actuating devices.
10.List the drawback of pervasive computing over health.
Non-ionising radiation is a by-product of the wireless signals that are likely to be used to connectpervasive computing devices into broader networks.
PART B
1. Write a short note on pervasive computing infrastructure and also give its applications2. Explain the role of human machine interaction in pervasive computing.
3. Write a short note on device connectivity
4. Write a short note on security of pervasive computers
5. Write short note on pervasive web application architecture.