CS2402 Mobile And Pervasive Computing Nov Dec 2013 Important Questions - CS2402 Part B Important Questions - Anna University Part B CS2402 Mobile And Pervasive Computing Nov Dec 2013 Important Questions
UNIT –I
1. (i) Explain the GSM system architecture with a neat diagram.
(ii) Describe the security services provided by GSM.
2. (i) Explain the protocol architecture of GSM for signaling.
(ii) Explain the architecture of GPRS with a neat diagram.
3. (i) What are typical steps for handover on GSM network?
(ii) Discuss the advantage and disadvantage of cellular system with small cells
4. Explain the steps involved in the call delivery procedure in GSM network in the following cases:
(i) GSM mobile terminated call (8)
(ii) GSM mobile originated call (8)
5. (i) Why are so many different identifiers/addresses needed in GSM? Give reasons and distinguish
between user-related and system related identifiers.(8)
(ii) Explain the services provided by GSM?(8)
UNIT-II
1. Compare HiperLAN and Blue tooth in terms of ad-hoc capabilities, power saving mode, solving hidden
terminal problem, providing reliability fairness problem regarding channel access.
2. (i) Explain the operation of DFWMAC_DCF with a neat timing diagram.(8)
(ii) Draw the MAC frame of 802.11 and list the use of the fields. (8)
3. (i) Describe HiperLAN architectural components and their interactions. (8)
(ii) Explain the architecture of Wi-Fi in detail. (8)
4. (i) Explain the system architecture of IEEE 802. 11(8)
(ii) Describe the architecture of WiMAX in detail. (8)
5 (i) Explain the information bases and networking of adhoc HIPERLAN. (8)
(ii) Discuss MAC layer Bluetooth system (8)
UNIT – III
1. (i) Show the steps required for a handover from one FA to another FA including layer-2 and layer-3.
Assume 802.11 as layer-2. (8)
(ii) Name the ineffiencies of Mobile IP regarding data forwarding from CN to MN. W hat are the
optimizations possible? (8)
2. (i) What are the differences between wired networks and ad-hoc networks related to routing? (6)
(ii) What is the need for DHCP? With a state chart explain the operation of DHCP?
3(i) List the entities involved in mobile IP and describe the process of data transfer from a mobile node
to a fixed node and vice versa. (8)
(ii) Why is conventional routing in wired networks not suitable for wireless networks? Substantiate your
answers with suitable examples. (8)
4 (i) Discuss DSDV routing in detail. (8)
(ii) Describe how the multicast routing is done in ad-hoc networks. (8)
5 (i)Explain how tunneling works in general and especially for mobile IP using IP-in-IP, MINIMAL,and
generic routing encapsulation, respectively. Discuss the advantages and disadvantages of these three
methods.
(ii) How does dynamic source routing handle routing? What is the motivation between dynamic source
routing compared to other routing algorithms from fixed networks?
UNIT IV
1.(i) Explain the mechanisms of TCP that influence the efficiency in mobile environment.(8)
(ii) Explain the operation of Mobile TCP. (8)
2.(i) Why has a scripting language been added to WML? How can this language help saving bandwidth
and reducing delay? (8)
(ii) Which WTP class reflects the typical web access best? How is unnecessary overhead avoided when
using WSP on top of this class of web browsing?(8)
3. (i) State the requirements of WAP. Explain its architectural components. (8)
(ii) Explain WML and WML scripts with an example. (8)
4. (i) What is WTP? Discuss about its classes. (8)
(ii) Explain the architecture of WTA. (8)
UNIT V
1.(i) What are the design and implementation issues in device connectivity aspect of pervasive
computing?Explain (8)
(ii) Explain the operating system issues related to miniature devices.(8)
2.Explain the various soft surface and semi-soft-surface-based display system and technologies.(16)
3. (i) Describe the various hardware components involved in pervasive computing devices. (8)
(ii) Explain how a pervasive web application can be secured using an ‘Authentication Proxy’. (8)
4 (i) What are the applications of pervasive computing? Discuss any two of them. (8)
(ii) Explain how pervasive web applications can be accessed via WAP. (8)
ADS HERE !!!