KEMBAR78
Mobile Computing Exam Prep | PDF | Channel Access Method | Cellular Network
0% found this document useful (0 votes)
113 views3 pages

Mobile Computing Exam Prep

This document contains 40 questions related to mobile computing topics such as wireless networking standards, multiple access techniques, MAC protocols, mobile network generations, GSM architecture and services, UMTS architecture, and applications of mobile computing. The questions cover foundational concepts, require analysis and comparison of techniques, and ask the reader to justify answers, illustrate concepts, and discuss features and issues in depth. The document aims to provide a comprehensive question bank testing knowledge across the key areas of mobile and wireless networking.

Uploaded by

Hrudhai S
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
113 views3 pages

Mobile Computing Exam Prep

This document contains 40 questions related to mobile computing topics such as wireless networking standards, multiple access techniques, MAC protocols, mobile network generations, GSM architecture and services, UMTS architecture, and applications of mobile computing. The questions cover foundational concepts, require analysis and comparison of techniques, and ask the reader to justify answers, illustrate concepts, and discuss features and issues in depth. The document aims to provide a comprehensive question bank testing knowledge across the key areas of mobile and wireless networking.

Uploaded by

Hrudhai S
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

CS8601-MOBILE COMPUTING QUESTION BANK

1 Tabulate the wireless networking standards used in Mobile Computing


2 List the random assignment scheme
3 Differentiate Mobile Computing and Wireless networking
4 Classify the various MAC Protocols
5 Illustrate the structure of mobile computing applications
6 Analyze the limitations of mobile computing?
7 Compare FDMA and TDMA Multiple access techniques in wireless communication
8 Classify Hidden Terminal and Exposed Terminal Problem with
the help of a diagram
9 State the difference between 1G, 2G, 2.5G, 3G mobile network communications
10 Categorize the basic services provided by MAC layer
11 Show the schematic operation of CDMA scheme
12 Illustrate middleware and gateway functions in mobile computing application?
13 The MAC protocol designed for infrastructure-based wireless network may not work
satisfactory in infrastructure-less environment. Justify your answer
14 Evaluate the CSMA/CD technique, when the sender starts to transmit if it senses the
channel to be free. But, even if it senses the channel to be free, there can be a collision why?
15 Develop a MACA Protocol? In which environment is it suitable?
Justify your answer.
16 Compose a role which is played by Radio/Infrared signals play in Mobile Computing.
17 Formulate a reason why Collision Detection based protocol is not
suitable for wireless networks.
18 In satellite communication, uplink and downlink frequencies are kept different. Justify the
answer
19 Evaluate the reasons in which the CDMA has the ability to carry all transmissions
simultaneously
20 Compose the reason and solution for hidden and exposed station problem
21 Tabulate the services of GSM?
22 List out the limitations of GPR
23 Relate the security issues in mobile computing
24 Compare the working of BTS and BSC within a BSS
25 Categorize the network elements in GPRS architecture
26 Compare HLR and VLR
27 Discuss the various QoS Profile
28 Infer I-TCP to isolate problems in wireless links
29 Illustrate the mechanisms used by DHCP for IP address allocation
30 Define Call Routing
31 Discuss the import features of GSM security
CS8601-MOBILE COMPUTING QUESTION BANK

32 Classify the major functions in RSS


33 Justify the reasons for soft handoff and hard handoff
34 Compose the various impacts of mobile phone on human body
35 Formulate the application areas of beacon signal
36 Compose the necessities of Horizontal roaming and vertical roaming
37 Formulate the essentials required for developing a GPRS network
38 Create different ways to develop anonymity
39 Compare GSM and DECT.
40 Invent the reason why does the UMTS networks easily work with the existing GSM/GPRS
networks.
Part B
1 Analyse the various applications of Mobile Computing
2 Discuss in detail about Random assignment scheme and Reservation based schemes.
3 Describe the features of various wireless network generations.
4 Compare following Multiple access techniques in Mobile communication FDMA,
TDMA,SDMA,CDMA
5 Summarize the issues of Wireless MAC Protocols
6 Evaluate the different categories of MAC protocols based on
situations under which protocols from one category would be
preferable over the other categories
7 Describe the GSM architecture in detail
8 Sketch the working of current mobile cellular phones. Briefly explain the distinguishing features of
various generations of wireless cellular networks
9 Discuss UMTS architecture in detail
10 Identify four similarities and four dissimilarities between a GSM network and UMTS
network
11 Summarize the overview of the working of current mobile cellular phones.
12 Is 3G cellular wireless technology superior to 2G technology? Justify your answer

Part C
1 Do you agree with the following statement: “In CSMA/CD protocol, when two nodes
transmit on a shared medium, a collision can occur only when two nodes start
transmitting exactly at the same instant?” Explain your answer

2 Predict appropriate Wireless MAC Issues and the various application of mobile
computing in details With a need diagram
3 Prepare a list of important functional differences and similarities between 1G,2G and
3G cellular networks
CS8601-MOBILE COMPUTING QUESTION BANK

4 Evaluate the characteristics of 2.5G and write the difference between 2G and 3G
technologies.(15)

You might also like