You are on page 1of 4

03F104CS2402

Reg. No.:
9605 Cape Institute of Technology
104 Computer Science and Engineering(UG)
Series Exam-I (2015 16 ODD) Answer Key

II Year / III Semester


MOBILE AND PERVASIVE COMPUTING
Date : 04-08-2015 & Time: 9.30 To 11.10 A.M
Max. : 50 Marks
Note:

Write the examination using blue or black pen


Draw neat sketch with pencil (if necessary)
Use tables or charts (if necessary)
Answer all questions
Part A
(Answer for each question carries 2 Marks)

1. Quote the formulae for calculating distance in frequency reuse


The reuse distance D is calculated by using the formule
D=R3n
Where R=Freeequency Reuse
N=Number of cells
2. Define EY-NMPA in HiperLAN.
Elimination-yield non-preemptive priority multiple access (EY-NPMA)

EY-NPMA is a contention based


EY-NPMA provides excellent support for different classes of traffic
regarding
Provides quality of service
Demonstrates very low collision rates.

3. Discuss about the services provide by supplementary services in GSM ?


*

User identification
Call redirection
Call forwarding
Closed user groups
Multiparty Communication

4. Describe the types of handover in mobile communication.

Intra-cell handover

Inter-cell, intra- BSC handover

104 CSE <Series-I> 9605 CIT

Page 1 of 4

Anna University, Chennai

Inter-BSC, intra-MSC handover

Inter MSC handover

5. Formulate the behavior of data transmitted over the network in traffic engineering.
Method of optimizing the performance of a telecommunication
Regulating the behavior of data transmitted over that network.
A=h
-mean rate of calls attempted per unit time h
h-mean holding time per successful call
A -average number of calls arriving during average holding period, for normalized
6. List the primary goals of IEEE 802.11?

simple, robust
time bounded
asynchronous services

7. Define scatternet in Bluetooth.

A scatternet is a number of interconnected piconets


communication between more than 8 devices.
elects to participate
acts as a slave in a second
separate piconet.

8. Describe the informations in SIM.

Card type, serial no, list of subscribed services

Personal Identity Number(PIN)

Pin Unlocking Key(PUK)

An Authentication Key(KI)

9. Show the differences between adhoc and infrastructure networks


Infrastructure-based wireless networks:
Communication takes place only between the wireless nodes and the access point,
not directly between the wireless nodes.
Ad-hoc wireless networks:
Communication takes place directly with other nodes
104 CSE <Series-I> 9605 CIT

Page 2 of 4

Anna University, Chennai

no access point
Controlling medium access is necessary.

Part B
(Answer for each question carries 16 Marks)
10.(a) i)Define GSM. Explain the services, architecture and its protocol in detail. (16)

GSM Definition
History
Service
Architecture
Protocol
3 diagrams
OR

(b) i) Write short notes on mobility management in detail.

Call Management

Connection Establishment

Message Terminated Call

Message oriented call

Message flow for MTC and MOC

3 diagrams

(8)

ii) Explain how synchronization achieved in GSM and how security


authentication is maintained in GSM?.

(8)

A3 algorithm
Signal response
SIM
MSC
AC
1 diagram

11. (a) Explain about wireless LANs in detail.

104 CSE <Series-I> 9605 CIT

(16)

Page 3 of 4

Anna University, Chennai

Advantages
Disadvantage
Design goals
System Architecture
Adhoc
Infrastructure
WiFi
WiMax
3 diagrams
OR

(b) i) Write short notes on BRAN architecture.

Bran Architecture
HiperLAN 1
HiperLAN 2
HiperAccess
HiperLink
4 Diagrams

ii) Write short notes on WiMax.

(8)

(8)

Architecture
Standards
Two Dimensions of WiMax networks
WiMax Tower
WiMax Reciever
1 diagram

104 CSE <Series-I> 9605 CIT

Page 4 of 4

Anna University, Chennai

You might also like