CS1602 – Mobile Computing
UNIT 1 to 5 Question Bank
Unit I. INTRODUCTION
Part A
1. Distinguish between mobile computing and wireless networking.
2. List the advantages of Mobile Computing?
3. List out the important applications of Mobile computing.
4. What is reservation-based scheme?
5. Spread spectrum is inherently secured than simple shift keying techniques. Justify this
statement.
6. What is meant by MAC protocol?
7. What is CDMA?
8. What is ALOHA?
9. What are the categories of Fixed assignment MAC protocols?
10. What is meant by multiplexing?
Part B
1. What is mobile computing? Mention the characteristics and applications of mobile
computing.
2. Explain in detail about Wireless MAC Issues.
3. What is FDMA? Briefly explain its working and its important applications.
4. Explain the Mobile computing application.
5. Differentiate between FDMA, TDMA and CDMA.
6. Explain the following: (i)Random Assignment Scheme (ii) Reservation Based Scheme
7. Explain hidden and exposed terminal problem and near and far terminal problem with
an example.
8. Explain different types of spread spectrum techniques used in cellular systems?
Unit II. MOBILE TELECOMMUNICATION SYSTEM
Part A
1. What are the different services offered by GSM?
2. What is the frequency range of uplink, downlink in GSM network?
3. What is voice oriented teleservices?
4. What are the supplementary services provided by GSM?
5. What are the reasons for the delay in a GSM system for packet data transfer?
6. Define Base Station System Application Part (BSSAP).
7. Mention the GSM Subsystem.
8. Distinguish between HLR and VLR.
9. What are the four possible handover in GSM?
10. List the three important features of GSM security.
PART B
1. Describe in detailed about generations of Cellular Communication Technology.
2. Draw and explain the functions of GSM system architecture. Write in detail about the
various types of handover in GSM.
3. Explain the Localization, calling and handover in GSM. Also discuss the timeline
diagram of the Intra MSC handover.
4. Explain in detail about UMTS architecture.
5. Explain (i) How security is implemented in GSM? (ii) Explain GSM Authentication
and security.
6. Explain the GPRS architecture reference model with a neat diagram.
7. Explain in detail about the handovers of GSM.
8. Write short notes on GSM protocol layers for signalling.
UNIT 3 – Mobile Network Layer
1. Mention the types of address assignment policies used in DHCP.
2. List out the features of Mobile IP.
3. What is meant by care of address and its types?
4. What is agent advertisement?
5. Define Agent solicitation.
6. What is DHCP?
7. What is encapsulation in mobile IP?
8. Write any two factors that affect the performance of ADHOC networking?
9. Write short notes on VANETs.
10. What is Route Optimization?
Part B
1. Explain in detail about overview of the operation and features of mobile IP.
2. Discuss in detail about three mechanisms in mobile IP.
3. With a neat diagram explain how packet delivery to and from a mobile node is
transferred in mobile IP.
4. Write short notes on Distance Vector protocol.
5. Explain the following: (i) AODV (ii) Zone routing (iii) Multicast routing
6. Explain (i) With a diagram explain DHCP and its protocol architecture. (ii) Explain
the agent discovery process in mobile-IP.
7. Explain in detail the various encapsulation techniques in mobile IP.
8. Explain (i) Draw and explain the architecture of VANET. (ii) Explain the various
security and attacks on VANET.
9. Explain the factors that make mobile ad-hoc networks more vulnerable to security
attacks compared to the traditional networks. Also explain the major types of security
attacks that are possible in a mobile ad-hoc network. How can each of these types of
attacks be overcome?
10. Think of ad-hoc networks with fast moving nodes, e.g., cars in a city. What
problems arise even for the routing algorithms adapted to ad-hoc networks? How
is the situation changed on highways? Connected nodes are in transmission range
and can forward messages along the edges. For routing, DSR should be used. The
caches of all nodes are empty. Now, D wants to send some packets to H. Give
the sequence of messages exchanged for finding a path (also the
―unnecessary messages). For each message, describe sender, receiver, and the list
of used nodes as written in the header by the routing protocol. Assume
that the paths are symmetrically. What happens if the connection between E
and G breaks down?
Unit 4 – Mobile Transport and Application Layer
Part A
1. What are the service primitives offered by Wireless Transaction Protocol (WTP)?
2. What is persistent mode in M-TCP?
3. What is the purpose of WAP?
4. What is WBXML?
5. Define WDP.
6. How is reliability achieved in WTP?
7. What is the function of a WAP gateway?
8. What is the use of WCMP?
9. What are the capabilities of WML Script?
10. What are the possible reasons for the loss of packets in mobile networks?
Part B
1. Explain in detail the WAP architecture with suitable diagram.
2. Explain Wireless Datagram Protocol (WDP) of WAP stack.
3. Write a WML script that asks the user to enter his name and age. Write validation
function(s) that ensure that name has only alphabets and age has only numeric.
4. Explain briefly Wireless Markup Language and its features.
5. Explain Wireless application environment with diagram.
6. Explain the architecture of WAP 2.0.
7. Explain WAP push architecture with proxy gateway.
8. Explain Transaction-oriented TCP with example. Discuss the limitations of traditional
TCP in the context of mobile networks. Explain end to end semantics of the transport
layer. Discuss how end to end semantics.
9. An University decides to go for a campus wide network to provide the Internet
connectivity using WiFi hotspots. Discuss the various factors to be considered
like number of hotspots required, key locations in which the hotspots are to
installed, connecting hotspots to the Internet Service Provider of the university.
Draw a sketch that conveys your design.
Unit 5 – Mobile Platforms and Applications
Part A
1. List out the Pros and Cons of M-commerce.
2. List the special constraints under which the mobile device needs to operate?
3. What is HDML?
4. Define POS.
5. What is Android SDK?
6. Write the structure of mobile commerce.
7. Mention the major protocols involved in mobile payment systems.
8. What are the advantages and disadvantages of BlackBerry OS?
9. Write the important capabilities of J2ME programs.
10. Differentiate E-Commerce and M-Commerce.
Part B
1. Explain various operating systems for mobile computing.
2. Explain in detail about Android SDK.
3. What is RFID? Explain few applications in which RFID is useful.
4. Illustrate the process of mobile payment. Compare and contrast mobile payment
schemes.
5. Explain the (i) structure of IOS. (ii) Explain the lifecycle of an iOS app development.
6. Write short notes on Android software stack and Android application components.
7. Explain the following: (i) Advantages and disadvantages of M-Commerce. (ii)
Applications of M-Commerce.
8. Explain the components of Mobile Operating Systems.