Professional Documents
Culture Documents
LTPC3003
ACE/CSE/VII SEM
ARULMURUGAN COLLEGE OF ENGINEERING
THENNILAI, KARUR-639 206
DEPARTMENT OF COMPUTER SCIENCE & ENFINEERING
CS2402- MOBILE AND PERVASIVE COMPUTING
QUESTION BANK
PART-A
UNIT-I MOBILE NETWORKS
3. Find out the characteristics while device can thus exhibit during communication.
Fixed and Wired
Mobile and Wired
Fixed and Wireless
Mobile and Wireless
ACE/CSE/VII SEM
Follow-on services
Location aware services
Privacy
Information services
Support services
Mobile and wireless devices
Sensor
Embedded controllers
Pager
Mobile phones
Personal digital assistant
Pocket computer
Notebook/laptop
ACE/CSE/VII SEM
Hand over needed
Frequency planning
ACE/CSE/VII SEM
13. Give the informations in SIM?
Card type, serial no, list of subscribed services
Personal Identity Number(PIN)
Pin Unlocking Key(PUK)
An Authentication Key(KI)
14. What is the frequency range of uplink and downlink in GSM network?
The frequency range of uplink in GSM network is 890-960 MHz
The frequency range of downlink in GSM network is 935-960 MHz
ACE/CSE/VII SEM
18. What are the services provided by supplementary services?
User identification
Call redirection
Call forwarding
Closed user groups
Multiparty Communication
20. What are the reasons for delays in GSM for packet data traffic?
Collisions only are possible in GSM with a connection establishment. A slotted
ALOHA mechanism is used to get access to the control channel by which the base station
is told about the connection establishment attempt. After connection establishment, a
designated channel is installed for the transmission.
21. If 8 speech channels are supported on a single radio channel, and if no guard
band is assumed, what is the number of simultaneous users that can be
accommodated in GSM?
1000 users.
23. List out the numbers needed to locate an MS and to address the MS.
The numbers needed to locate an MS and to address the MS are:
ACE/CSE/VII SEM
Mobile station international ISDN number (MSISDN)
International mobile subscriber identity (IMSI)
Temporary mobile subscriber identity (TMSI)
Mobile station roaming number (MSRN)
and QoS- related information between the BSS and SGSN.BSSGP does not perform error
correction and works on top of a frame relay network.
ACE/CSE/VII SEM
Cost
Proprietary Solution
Restriction
Safety and Security
ACE/CSE/VII SEM
6. Mention the features of infrared transmission?
Simple
Extremely cheap
Licenses are not needed
Electrical devices do not interfere
ACE/CSE/VII SEM
10. Define random back off time?
If the medium is busy, nodes have to wait for the duration of DIFS, entering a
contention phase afterwards. Each node now chooses a random back off time within a
contention window and delays medium access for this random amount of time.
12. Is IEEE 802.11 and Wi-Fi same/ State the purpose of Wi-Fi.
Ans: No
It is wireless internet. Your laptop has an internal wireless card so you can connect to
wireless routers. If you goto a hotel that advertises free wireless internet, you should be
able to connect to it. You don't have to have an Ethernet cable to connect to the web at
home either.
13. Why the PHY layer of IEEE 802.11 is subdivided? What about HiperLAN2 and
Bluetooth?
PLCP Physical Layer Convergence Protocol
Clear channel assessment signal (carrier sense)
PMD Physical Medium Dependent
Modulation, coding
PHY Management channel selection,
MIB Station Management coordination of all management functions
14. What are the various versions of a physical layer defined in IEEE 802.11
standards?
IEEE 802.11-83.5 MHz
IEEE 802.11a -300 MHz
IEEE 802.11b. 83.5 MHz
IEEE 802.11g - 83.5 MHz
10
ACE/CSE/VII SEM
15. What are the system integration functions of MAC management?
Synchronization
Power management
Roaming
Management information base (MIB)
UNIT-III ROUTING
11
ACE/CSE/VII SEM
4. Explain Cellular IP.
Cellular IP provides local handovers without renewed registration by installing a
single cellular IP gateway for each domain, which acts to the outside world as a foreign
agent.
6. Define COA.
The COA (care of address) defines the current location of the MN from an IP
point of view. All IP packets sent to the MN are delivered to the COA, not directly to the
IP address of the MN. Packet delivery toward the MN is done using the tunnel. DHCP is
a good candidate for supporting the acquisition of Care Of Addresses.
7. Define a tunnel.
A tunnel establishes a virtual pipe for data packets between a tunnel entry and a
tunnel endpoint. Packets entering a tunnel are forwarded inside the tunnel and leave the
tunnel unchanged.
8. What is encapsulation?
Encapsulation is the mechanism of taking a packet consisting of packet header
and data putting it into the data part of a new packet.
9. What is decapsulation?
The reverse operation, taking a packet out of the data part of another packet, is
called decapsulation.
12
ACE/CSE/VII SEM
10. Define an outer header.
The HA takes the original packet with the MN as destination, puts it into the data
part of a new packet and sets the new IP header in such a way that the packet is routed to
the COA. The new header is called the outer header.
13
ACE/CSE/VII SEM
17. Define binding request.
Any node that wants to know the current location of an MN can send a binding
request to the HA. The HA can check if the MN has allowed dissemination of its current
location. If the HA is allowed to reveal the location it sends back a binding update.
14
ACE/CSE/VII SEM
23. Explain destination sequence distance vector routing.
Destination sequence distance vector routing is an enhancement to distance vector
routing for ad-hoc networks and is used as routing information protocol in wired
networks.
24. What are the two things added to the distance vector algorithm?
Sequence Numbers
Damping
25. How the dynamic source routing does divide the task of routing into two
separate problems?
Route discovery
Route Maintenance
26. How can DHCP be used for mobility and support of mobile IP?
Normally, a mobile node uses a care-of-address. In some cases, the mobile node
may have to act as its own foreign agent by using co-located care of address. The means
by which a mobile node acquires a co-located address is beyond the scope of mobile IP.
One means is to dynamically acquire temporary IP address an the move using services
such as DHCP.
15
ACE/CSE/VII SEM
29. Specify the field of minimal encapsulation method in mobile network layer.
Minimal encapsulation doing,
Avoids repetition of identical fields e.g. TTL, IHL, version, TOS
Only applicable for unfragmented packets, no space left for fragment
identification
16
ACE/CSE/VII SEM
TCP within the fixed network cannot be changed.
This led to the development of I-TCP which segments a TCP connection into a fixed part
and a wireless part.
17
ACE/CSE/VII SEM
8. State the requirements of WAP.
Interoperable
Scalable
Efficient
Reliable
Secure
18
ACE/CSE/VII SEM
12. What is WSP?
The Wireless Session Protocol has been designed to operate on top of the
datagram service WDP or the transaction service WTP. It provides a shared state
between a client and a server to optimize content transfer.
19
ACE/CSE/VII SEM
String
URL
WML Browser
Dialogs
20
ACE/CSE/VII SEM
22. What is image scaling?
If a page contains a true color, high-resolution picture, this picture can be called
down to fewer colors, lower resolution, or finally to only the title of the picture. The user
can decide to download the picture separately. Further one can offer clipping, zooming,
or detail Studies to users if they are interested in a part of the picture.
26. What are the two functions of the transport layer in the internet?
The two functions of the transport layer in the internet are check summing over
user data and multiplexing/ demultiplexing of data from applications.
21
ACE/CSE/VII SEM
acknowledgement. If acknowledgement arises it raises the level of congestion window by
one. If sender sends two packets if acknowledgement arises it raises the level of
congestion window by two. This scheme raises the level of congestion window every
time the acknowledges come back, which takes roundtrip time (RTT).This is called the
exponential growth of the congestion window.
22
ACE/CSE/VII SEM
31. Mention two WAP service provides. Find two cell phones supporting WAP and
identify which WAP version they support.
Wireless application protocol (WAP) is a common effort of many companies and
organizations to set up a framework for wireless and mobile web access using many
different transport systems. Eg. GSM, GPRS, UMTS
32. How and why does I-TCP isolate problems on the wireless link? What are the
main drawbacks of this solution?
The loss of the end to end semantics of TCP causes problems if the foreign agent
portioning the TCP connection crashes. Increased handover latency is more problematic
in practical use . The foreign agent must be a trusted entity because the TCP connections
end at this point.
33. Can the problems using TCP for mobile communication be solved by replacing
TCP with snooping TCP? Justify your answer.
Ans: yes
Buffering of packets sent to the mobile host lost packets on the wireless link (both
retransmitted immediately by the mobile host or directions) will be foreign agent,
respectively (so called local retransmission)
The foreign agent therefore snoops the packet flow and recognizes
acknowledgements in both directions, it also filters ACKs
Changes of TCP only within the foreign agent
23
ACE/CSE/VII SEM
interface for managing (e.g., creating and terminating) secure connections. It provides
functionality similar to TLS 1.0 and incorporates additional features such as datagram
support, optimized handshake and dynamic key refreshing.
M-TCP maintains the TCP end-to-end semantic. The SH does not send any
ACK itself but forwards the ACKs from the MH.
ii.
iii.
Since M-TCP does not buffer data in the SH as I-TCP does, it is not necessary to
forward buffers to a new SH. Lost packets will be automatically retransmitted to
the new SH.
Disadvantage:
i.
As the SH does not act as proxy as in I-TCP, packet loss on the wireless link due
to bit errors is propagated to the sender. M-TCP assumes low bit error rates,
which is not always a valid assumption.
ii.
A modified TCP on the wireless link not only requires modification to the MH,
protocol software but also new network elements like the bandwidth manager.
24
ACE/CSE/VII SEM
39. What is fast recovery?
The receipt of acknowledgement shows that there is no congestion justifying a
slow start. The sender can continue with the current congestion window. The sender
performs a fast recovery from the packet loss. This mechanism can improve the
efficiency of TCP dramatically.
43. What are the three ways of WTA extends the WAE application model?
i.
ii.
Handling of network events: A device can have a table indicating how to react to
certain events from the mobile network.
iii.
25
ACE/CSE/VII SEM
44. Define WCMP.
The wireless control message protocol provides error handling mechanism for
WDP and should therefore be implemented. WCMP contains control messages that
resemble the internet control message protocol for IPv4, messages and can also be used
for diagnostic and informational purposes. WCMP can be used by WDP nodes and
gateways to report error.
47. What are key features of the current development in Internet technology?
Improved radio technology and antennas
Core network convergence
Ad-hoc technologies
Simple and open service platform
26
ACE/CSE/VII SEM
UNIT V PERVASIVE COMPUTING
systems.
A large number of specialized computer systems are interconnected via local
buses and the internet.
Short range and wide area wireless communication are integrated.
Security element provide unauthorized access.
27
ACE/CSE/VII SEM
4. Define roaming environment?
Roaming Environment:
An
environment
that
allows
connectivity and
28
ACE/CSE/VII SEM
Cost-specific issues
29
ACE/CSE/VII SEM
Light Emitting Diode based Displays (LEDs)
Organic LED based Displays (OLEDs)
Light-Emitting Polymer based Displays (LEPs)
Chip-on-Glass Displays (CoGs)
Liquid Crystal on Glass Displays (LCoGs)
10. How does mobile internet protocol overcome the address problems of IPv4?
To overcome the address problems of IPv4 for mobile nodes mobile IP uses two
IP addresses: a fixed home address and care of address that changes at each new point of
attachment.
30
ACE/CSE/VII SEM
14. What is the latest technology emerged in batteries?
The latest in battery technology is the emergence of lithium polymer cells, which
use a gel material for the electrolyte. The batteries are made from a few thin and flexible
layers, and do not require a leak-proof casing. This means the batteries can be made in
any shape or size.
31
ACE/CSE/VII SEM
20. Challenges of device management in Pervasive Computing?
Tracking the device location
Device user relationship
Version control of devices and software that are out in the field
Software updates of existing devices
Installation of new software on existing devices
Providing secure access to device information
UNIT II
1. Discuss in detail about the channel access control sub layer of HIPERLAN technique.
2. Discuss in detail about the medium access control layer of IEEE802.11.
3. Explain the handover scenarios of HIPERLAN2 in detail.
4. Discuss the functionalities and support provided by L2CAP.
5. Explain the basic structure of an IEEE802.11 MAC data frame.
6. Explain the schematic of Bluetooth protocol architecture.
7. Explain the concept of Bluetooth architecture.
32
ACE/CSE/VII SEM
8. Explain in detail about Adhoc networks.
9. Discuss about Wi-Fi.
10. Explain in detail about WiMax.
UNIT III
1. Discuss in detail about the IP in IP encapsulation techniques.
2. Discuss how optimization is achieved in mobile IP.
3. Discuss in detail about the DSR routing protocol used in ad-hoc networks.
4. Specify the inefficiencies of mobile IP regarding data forwarding from a
correspondent node to a mobile node.
5. With a suitable example compare the behavior of DSDV and DSR algorithm with
their routing table or cache contents.
6. Discuss and detail the differences in topology reorganization in DSDV and DSR
routing protocols.
7. What are the general problems of mobile IP regarding security and support of quality
of service?
8. Explain the Dynamic Host Configuration Protocol.
9. Explain about Traditional routing algorithms in detail.
10. Discuss about Adhoc-networks.
UNIT IV
1. Discuss in detail about the classical indirect TCP and the snooping TCP.
2. Discuss in detail about the components and interface of the WAP architecture.
3. Compare snooping TCP with mobile TCP with example network scenarios.
4. How and why does I TCP isolate problems on the wireless link? What are the main
drawbacks of this solution?
5. What are the major difference between WAP 2.0 and WAP 1.x? What influenced the
WAP 2.0 development?
6. Explain the WAE logical model.
7. Which WTP class reflects the typical web access best? How is unnecessary overhead
avoided when using WSP on top of this class for web browsing?
33
ACE/CSE/VII SEM
8. What are the enhancements of WAE to the classic client/server model of the web?
What are the functions of this enhancement?
9. Explain the following: Freezing and transaction oriented TCP.
10. Explain about WML and WML script with the help of an example.
UNIT V
34
ACE/CSE/VII SEM
ARULMURUGAN COLLEGE OF ENGINEERING
THENNILAI, KARUR-639 206
DEPARTMENT OF COMPUTER SCIENCE & ENFINEERING
CS2402- MOBILE AND PERVASIVE COMPUTING
UNIT WISE UNIVERSITY QUESTIONS
35
ACE/CSE/VII SEM
PART B
1. How does frequency reuse enhance cellular network capacity? Besides the number of
users, what other major factor influences the decision on cluster size? A cellular
system uses frequency spectrum 1800 MHz to 1840 MHz for uplink channels and
1860 MHz to 1900 MHz for downlink channels respectively. Each channel takes 200
KHz and can be shared by 8 users. Each user needs one uplink and one downlink
channel. How many users can be supported without frequency reuse in this cellular
system? (16) [Apr/May 2008]
2. What is the use of spread spectrum? Sketch the block diagram of the Transmitter and
Receiver of DSSS. Explain what each block does and what the signal looks like ( in
time and/or frequency domains) at each location in the block diagram with an
example. (16) [Apr/May 2008]
3. Discuss in detail the types of antennas with their radiation patterns [12] [Apr/May
2010]
4. Explain diversity technique[4] [Apr/May 2010]
5. Explain space, frequency, code and TDM in detail [16] [Apr/May 2010]
6. Discuss briefly the CDM technique(8) [Nov/Dec 2007]
7. Discuss briefly the advanced PSK.(8) [Nov/Dec 2007]
8. Discuss briefly the cellular system.(10) [Nov/Dec 2007]
9. List the differences between the S/T/F/CDMA.(6) [Nov/Dec 2007]
10. How does the near/far effect influence TDMA systems?What happens in CDMA
systems? What are the counter measures in TDMA systems?(8)
11. Explain the countermeasures for interference in SDMA,TDMA,FDMA and CDMA
systems?(16) [Nov/Dec 2008]
12. What are the main benefits of a spread spectrum system? How can spreading be
achieved? How can DSSS systems benefit from multi-path propogation?(16)
[Nov/Dec 2008]
13. (i) Explain the GSM system architecture with a neat diagram. (8) [NOV/DEC 2011]
(ii) Describe the security services provided by GSM. (8) [NOV/DEC 2011]
14. (i) Explain the protocol architecture of GSM for signaling. (8) [NOV/DEC 2011]
(ii) Explain the architecture of GPRS with a neat diagram. (8) [NOV/DEC 2011]
36
ACE/CSE/VII SEM
15. (i) Name the main elements of the GSM architecture and describe their functions (10)
[MAY/JUNE2012]
(ii) What are the typical steps for handover on GSM network?(6)
[MAY/JUNE2012]
16. Explain the steps involved in the call delivery procedure in GSM network in the
following cases:
(i)
(ii)
17. Write notes on the system architecture of the GSM(16) [NOV/DEC 2012]
18. What are the various possible handover scenarios in GSM? Explain them in detail.
[NOV/DEC 2012]
UNIT- II WIRELESS NETWORKS
PART A
1. Consider the handoff procedure in GSM systems that is based on relative signal
strength with threshold; that is, a mobile switches from one cell to another if
(a) the signal at the current BS is sufficiently weak (less than a predefined threshold)
and (b) the other signal is stronger than the two. What are the drawbacks of this
scheme, when the threshold is too low or too high? [Apr/May 2008]
2. State the different types of transport modes and the channels used to carry packets in
Digital Audio Broadcasting. [Apr/May 2008]
3. Distinguish between soft handover and hard handover? [Apr/May 2010]
4. Define footprint with respect to satellite system? [Apr/May 2010]
5. List the three different categories of services of GSM. [Nov/Dec 2007]
6. Discuss the advantages of MEO. [Nov/Dec 2007]
7. Compare to the TCHs offered ,standard GSM could provide a much higher data
rate(33.8 kbits/sec) when looking at the air interface.What lowers the data rates
available to the user? [Nov/Dec 2008]
8. How much of the original GSM network does GPRS need?Which elements of the
network perform the data transfer? [Nov/Dec 2008]
9. Mention the advantages of WLAN? [NOV/DEC 2011]
10. What are the three Low Power States provided by Bluetooth? [NOV/DEC 2011]
37
ACE/CSE/VII SEM
11. In what situations collisions occur in IEEE 802.11? [MAY/JUNE2012]
12. What is adaptive modulation? [MAY/JUNE2012]
13. Distinguish between infrastructure and ad hoc networks. [NOV/DEC 2012]
14. What is Bluetooth? [NOV/DEC 2012]
PART B
1. Name the main elements of GSM system architecture and describe their functions.
What are the advantages of specifying not only the radio interface but also the
internal of the GSM System? Explain the inter BSC, intra MSC handover process
in the GSM system using typical signals and a message sequence chart. Explain the
decision points and the resource allocation steps, if they exist. (16) [Apr/May 2008]
2. What is DAB? Explain the components, frame format and the protocol used by DAB
to access different formats of data also describe how DVB is used for data
broadcasting and to access high speed internet. (16) [Apr/May 2008]
3. Describe DAB[16] [Apr/May 2010]
4. Explain routing, localization and handover in satellite systems. [16] [Apr/May 2010]
5. Discuss the protocol architecture of GSM telecommunications system.(16) [Nov/Dec
2007]
6. Discuss briefly the GPRS system.(16) [Nov/Dec 2007]
7. Explain the GSM handover schemes and state the reasons for their occurrence .Whish
resources need to be allocated during handover for data transmission using GPRS by
satisfying Qos?(16) [Nov/Dec 2008]
8. How is synchronization achieved in GSM and why it is important? How system
security is maintained in GSM?(16) [Nov/Dec 2008]
9. (i) Describe HiperLAN architectural components and their interactions. (8)
[NOV/DEC 2011]
(ii) Explain the architecture of WiFi in detail. (8) [NOV/DEC 2011]
10. (i) Explain the system architecture of IEEE 802. (8) [NOV/DEC 2011]
(ii) Describe the architecture of WiMAX in detail. (8) [NOV/DEC 2011]
38
ACE/CSE/VII SEM
11. Compare HiperLAN and Bluetooth in terms of adhoc capabilities, power saving
mode, solving hidden terminal problem, providing reliability fairness problem
regarding channel access. [MAY/JUNE2012]
12. (i) Explain the operation of DFWMAC DCF with a neat timing diagram(8)
[MAY/JUNE2012]
(ii) Draw the MAC frame of 802.11 and list the use of the fields.(8)
[MAY/JUNE2012]
13. Write notes on the MAC management of the IEEE 802.11 protocol. [NOV/DEC
2012]
14. Write notes on the channel access control sublayer. [NOV/DEC 2012]
UNIT-III ROUTING
PART A
1. In the Distributed Coordination Function (DCF) protocol of IEEE 802.11, why does a
Node wait only SIFS time units (after the last data packet reception) before sending
an ACK, while waiting DIFS time units before attempting a data transmission?
[Apr/May 2008]
2. What are the advantages and problems of forwarding mechanisms in Bluetooth
networks regarding security and power saving? [Apr/May 2008]
3. State the three phases of the medium access of different competing nodes. [Apr/May
2010]
4. What are the power saving mechanisms in Bluetooth? [Apr/May 2010]
5. What are the two different basic transmission technologies used to set up WLANs.
[Nov/Dec 2007]
6. List the different user scenarios for wireless piconets. [Nov/Dec 2007]
7. Why the PHY layer of IEEE 802.11 is subdivided? What about HiperLAN2 and
Bluetooth? [Nov/Dec 2008]
8. What is the functionality L2CAP? List the different types of logical channels it
provides? [Nov/Dec 2008]
9. What are the requirements of mobile IP standard? [NOV/DEC 2011]
10. Differentiate
wired
networks
routing
from
ad-hoc
wireless
networks
39
ACE/CSE/VII SEM
11. What is reverse tunneling? [MAY/JUNE2012]
12. What are the problems of proactive routing? [MAY/JUNE2012]
13. What are the disadvantages of I-TCP? [NOV/DEC 2012]
14. What are the basic features of WML? [NOV/DEC 2012]
PART B
1. Using IEEE 802.11 (DCF): S1 and S2 send CBR/UDP traffic to the common
destination D. Consider S1, S2 and D all within receive range of each other when the
basic scheme is used (no RTS/CTS): Describe a collision (what happens before,
during, and after). What does the collision probability depend on? When RTS/CTS is
used: what are the changes to the previous answers? Comment also on the throughout
and fairness. (16) [Apr/May 2008]
2. Describe the briefly how collision is avoided in HIPERLAN 1. (8) [Apr/May
2008]
3. Draw the protocol architecture of Bluetooth and explain briefly the Base band layer
and L2CAP of Bluetooth. (8). [Apr/May 2008]
4. Describe the architecture of Bluetooth. [16] [Apr/May 2010]
5. Explain channel control sub layer in hyper LAN[16] [Apr/May 2010]
6. Discuss in detail about the channel access control sub-layer of HIPERLAN
technique.(16) [Nov/Dec 2007]
7. Discuss in detail about the MAC layer of IEEE 802.11(16) [Nov/Dec 2007]
8. Explain the fields of IEEE 802.11 MAC packet structure .Compare them with IEEE
802.11b MAC fields.(8) [Nov/Dec 2008]
9. Explain the handover scenarios of hiperLAN2 in detail.(8) [Nov/Dec 2008]
10. How
reflected?What are the differences between infrastructure based and adhoc networks
regarding roaming?(16) [Nov/Dec 2008]
11. (i) List the entities involved in mobile IP and describe the process of data transfer
from a mobile node to a fixed node and vice
versa. (8) [NOV/DEC 2011]
40
ACE/CSE/VII SEM
(ii) Why is conventional routing in wired networks not suitable for wireless
networks? Substantiate your answers with suitable examples. (8) [NOV/DEC 2011]
12. (i) Explain in detail Dynamic Host Configuration Protocol. (8) [NOV/DEC 2011]
(ii) Describe how the multicast routing is done in ad-hoc networks. (8) [NOV/DEC
2011]
13. (i) Show the steps required for a handover from one FA to another FA including
layre-2 and layre-3. Assume 802.11 as layer-2. (8) [MAY/JUNE2012]
(ii) Name the inefficiencies of Mobile IP regarding data forwarding from CN to
MN. What are the optimizations possible? [MAY/JUNE2012]
14. (i) What are the differences between wired networks and adhoc wireless networks
related to routing? [MAY/JUNE2012]
(ii) What is the need for DHCP? With the state chart explain the operations of
DHCP? [MAY/JUNE2012]
15. Explain how the concepts of tunneling and encapsulation done in mobile IP.
[NOV/DEC 2012]
16. With an example explain the process of the dynamic source routing of the Ad-hoc
network. [NOV/DEC 2012]
UNIT IV TRANSPORT AND APPLICATION LAYERS
PART A
1. How can DHCP be used for mobility and support of mobile IP? [Apr/May 2008]
2. What are the differences between AODV and the standard distance vector algorithm?
Why are extensions needed? [Apr/May 2008]
3. What are the drawbacks of wired networks? [Apr/May 2010]
4. Define DSR[Apr/May 2010]
5. What are the problems related to the use of DHCP? [Nov/Dec 2007]
6. Discuss some of the routing metrics to be considered in a mobile network layer?
[Nov/Dec 2007]
7. How does registration on layer 3 of a mobile node work? [Nov/Dec 2008]
8. Specify the DHCP state transition diagram for acquiring the IP address. [Nov/Dec
2008]
41
ACE/CSE/VII SEM
9. List the advantages and disadvantages of mobile TCP? [NOV/DEC 2011]
10. Define WAE. [NOV/DEC 2011]
11. Name the advantages and disadvantages of user acknowledgement in WTP.
[MAY/JUNE2012]
12. How I-TCP isolate the problems on the wireless link? [MAY/JUNE2012]
13. What is Case-of Address? [NOV/DEC 2012]
14. Mention certain situation where Ad hoc networks are the only choice. [NOV/DEC
2012]
PART B
1. Given the network topology below, use the dynamic source routing algorithm to
compute the shortest path from A to all other nodes. Make sure to show the results of
42
ACE/CSE/VII SEM
8. Specify the inefficiencies of mobile
43
ACE/CSE/VII SEM
5. Why the TCP protocols used in wired networks cannot be as such used in wireless
networks? [Nov/Dec 2007]
6. Discuss the problems of a file system in mobile environment? [Nov/Dec 2007]
7. Can the problems using TCP for mobile communication be solved by replacing TCP
with snooping TCP? Justify your answer. [Nov/Dec 2008]
8. Specify the fields of minimal encapsulation method in mobile network layer.
[Nov/Dec 2008]
9. What is Pervasive Computing? [NOV/DEC 2011]
10. What are the various issues related to device management in pervasive
computing? [NOV/DEC 2011]
11. What is meant by pervasive computing? How is it done? [MAY/JUNE2012]
12. What makes device connectivity possible in pervasive computing?
[MAY/JUNE2012]
13. What are the key parts of the hardware of pervasive technologies? [NOV/DEC 2012]
14. How does biometric authentication work in pervasive computing? [NOV/DEC 2012]
PART B
1. As a transport layer protocol, TCP uses a window mechanism to exercise flow control
over the best effort IP in the internet. Flow control is exercised by the edge router
based on congestion status encountered in the core routers between the TCP sender
and the TCP receiver. (i) Describe the operation of the window flow control
mechanism. (8) [Apr/May 2008]
2. ACKs from the TCP receiver are the basis that the TCP sender uses to adjust the
sending window size. Describe and discuss how ACKs (8) [Apr/May 2008]
3. Specify the enhancements made to the basic client server architecture of the web to
suit a mobile wireless user? Briefly discuss the main goals of WAP. Explain the
layers of WAP protocol used to achieve the following: A client wants to have a
shared state with the server for transferring the content. (16) [Apr/May 2008]
4. Discuss the role of WWW in support for mobility.[16] [Apr/May 2010]
5. Explain the following
a. Indirect TCP [6]
44
ACE/CSE/VII SEM
b. Snooping TCP[6]
c. Performance enhancing proxies[4] [Apr/May 2010]
6. Discuss in detail about the classical indirect TCP and snooping TCP.(16) [Nov/Dec
2007]
7. Discuss in detail about the components and interface of the WAP architecture.(16)
[Nov/Dec 2007]
8. Compare snooping TCP with Mobile TCP with example network scenarios.(8)
9. How and why does I-TCP isolate problems on wireless link? What are the main
drawbacks of this solution?(8) [Nov/Dec 2008]
10. Explain in detail about the architecture of WAP?(16) [Nov/Dec 2008]
11. (i) Describe the various hardware components involved in pervasive computing
devices. (8) [NOV/DEC 2011]
(ii) Explain how a pervasive web application can be secured using an Authentication
Proxy. (8) [NOV/DEC 2011]
12. (i) What are the applications of pervasive computing? Discuss any two of them. (8)
[NOV/DEC 2011]
(ii) Explain how pervasive web applications can be accessed via WAP.(8)
[NOV/DEC 2011]
13. (i) Explain the operating system issues related to miniature devices(8)
[MAY/JUNE2012]
(ii) What are the design and implementation issues in device connectivity aspect
of pervasive computing? Explain. (8) [MAY/JUNE2012]
14. Explain the various soft surface and semi-soft-surface based display systems and
technologies. (16) [MAY/JUNE2012]
15. How is security in pervasive computing established? Explain them in detail.
[NOV/DEC 2012]
16. Write short notes on the smart-card based authentication via the Internet. [NOV/DEC
2012]
45