You are on page 1of 4

www.jntuworld.

com

Code No: N0523

R07
MOBILE COMPUTING

Set No.1

IV B.Tech. I Semester Regular Examinations, November, 2011 (Common to Computer Science & Engineering, Information Technology and Electronics & Computer Engineering) Time: 3 Hours Max Marks: 80

Answer any FIVE Questions All Questions carry equal marks ******* 1. a) Explain the applications of Mobile Communications. b) How is synchronization achieved in GSM? Who is responsible for synchronization and why is it so important? 2. a) How are guard spaces realized between users in CDMA? b) Define the problem of hidden and exposed terminals. What happens in the case of such terminals if aloha, slotted aloha, reservation Aloha, or MACA is used? 3. a) What are general problems of mobile IP regarding security and support of QoS? b) How can DHCP be used for mobility and support of Mobile IP? 4. a) Explain indirect TCP. b) Why is timeout freezing required in case of mobile nodes? What are the modifications made in data link and TCP layers to enforce time-out freezing? 5. a) What are the advantages of hoarding data at the mobile device? b) Explain query-processing architecture for processing a query using distributed databases. 6. a) Explain hybrid data-delivery mechanism. b) Explain other alternative methods of selective tuning and indexing techniques. 7. a) Why is routing in multi-hop ad-hoc networks complicated, what are the special challenges? b) How does dynamic source routing handle routing? What is the motivation behind dynamic source routing compared to other routing algorithms from fixed networks. 8. a) Explain the functions of link manager in Bluetooth. b) Describe J2ME features. 1 of 1

T N

W U

R O

D L

www.jntuworld.com

www.jntuworld.com

Code No: N0523

R07
MOBILE COMPUTING

Set No.2

IV B.Tech. I Semester Regular Examinations, November, 2011 (Common to Computer Science & Engineering, Information Technology and Electronics & Computer Engineering) Time: 3 Hours Max Marks: 80

1.

Answer any FIVE Questions All Questions carry equal marks ******* a) What are the limitations of mobile and wireless devices? b) How is localization, location update, roaming etc., done in GSM and reflected in the databases? What are typical roaming scenarios?

2. a) Explain the term interference in the space, time, frequency and code domain. What are counter measures in SDMA, TDMA, FDMA and CDMA systems. b) Which of the MAC schemes can give hard guarantees related to bandwidth and access delay? 3. a) What could be quick solutions and why dont they work? b) List the entities of mobile IP and describe data transfer from a mobile node to a fixed node and vice-versa. Why and where is encapsulation needed? a) Explain snooping TCP. b) Describe slow start of congestion control. How can fast recovery take place in the congestion avoidance phase?

4.

5. a) Explain client-server computing with adaptation. b) Why does a mobile device take QoS issues into account while computing? List the object models for application adaptation for the QoS constraints. 6. a) Explain the reasons for communication asymmetry in mobile network. Give examples of asymmetric communication architecture for data dissemination. b) Explain index-based method of selective tuning and indexing techniques. 7. a) How does the symmetry of wireless links influence the routing algorithms proposed. b) What are the differences between AODV and the standard distance vector algorithm? Why are extensions needed? 8. a) Explain the MAC layer of Bluetooth. b) Describe the wireless application environment (WAE) logical model. 1 of 1

T N

W U

R O

D L

www.jntuworld.com

www.jntuworld.com

Code No: N0523

R07
MOBILE COMPUTING

Set No.3

IV B.Tech. I Semester Regular Examinations, November, 2011 (Common to Computer Science & Engineering, Information Technology and Electronics & Computer Engineering) Time: 3 Hours Max Marks: 80

1.

Answer any FIVE Questions All Questions carry equal marks ******* a) Explain the architecture of mobile computing. b) What are the functions or authentication and encryption in GSM? How is system security maintained?

2. a) Who performs the MAC algorithm for SDMA? What could be possible roles of mobile stations, base stations and planning from the network provider? b) How are guard spaces realized between users in CDMA? 3. Explain how tunneling works in general and especially for mobile IP using IP-in-IP, minimal and generic routing encapsulation respectively. Discuss the advantages and disadvantages of these three methods. 4. a) Explain congestion control in traditional TCP. b) Describe transaction oriented TCP. How does the integration of connection establishment, data transfer, and close functions into one help in transmitting and receiving at the TCP nodes.

5. a) Explain about context-aware computing. b) Explain the situations in which a database can crash. How does a database recover using recovery manager? What is the role of logged entries in updating transactions? 6. a) Describe pull-based data-delivery mechanism? What are the advantages and disadvantages of pull-based data-delivery? b) Explain the following selective tuning and indexing techniques. (i) Flexible indexing method (ii) Distributed index based method 7. a) What are the benefits of location information for routing in ad-hoc networks, which problems arise? b) What are the security threats to a MANET? Why a MANET faces greater security threats than a fixed infrastructure network? 8. a) Explain wireless session protocol. b) Explain different user scenarios of Bluetooth. 1 of 1

T N

W U

R O

D L

www.jntuworld.com

www.jntuworld.com

Code No: N0523

R07
MOBILE COMPUTING

Set No.4

IV B.Tech. I Semester Regular Examinations, November, 2011 (Common to Computer Science & Engineering, Information Technology and Electronics & Computer Engineering) Time: 3 Hours Max Marks: 80

Answer any FIVE Questions All Questions carry equal marks ******* 1. a) What are the limitations of a GSM cell in terms of diameter and capacity (voice, data) for the traditional GSM, HSCSD, GPRS? How can the capacity be increased? b) What are the reasons for the delays in the GSM system for packet data traffic? Distinguish between circuit switched and packet-oriented transmission. 2. a) What is the reason for the failure of MAC schemes in wireless networks? What is done in wired networks to avoid this effect? b) Explain about FDMA. 3. a) What is IP packet delivery? Explain it. b) What is reverse tunneling? What additional routes do packets take if reverse tunneling is required? 4. a) Compare the different types of transmission errors that can occur in wireless and wired networks. What additional role does mobility play? b) Explain mobile TCP. How does a supervisory host send TCP packets to the mobile node and to a fixed TCP connection? Give the advantages and disadvantages of mobile TCP. 5. a) Explain about power-aware computing. b) Explain stateless and stateful cache invalidation mechanisms. 6. a) Describe push-based data-delivery mechanism. What are the advantages and disadvantages of push-based data dissemination? b) Explain the following selective tuning and indexing techniques. i) Directory method ii) Hash-based method 7. a) Describe the properties of MANETs. b) Explain the dynamic source routing algorithm in MANETs. 8. a) Explain the functions of radio and baseband sublayers in Bluetooth. b) Explain wireless transaction protocol. 1 of 1

T N

W U

R O

D L

www.jntuworld.com