Professional Documents
Culture Documents
3. “MAC protocol designed for infrastructure based wireless network may not work
satisfactory in infrastructure- less environment”-Justify. (Nov/Dec 17)
4. List some random assignment scheme. (April/May 17)
Random Assignment
a. ALOHA
b. Slotted ALOHA
c. CSMA
d. CSMA/CD
e. CSMA/CA
B is in the radio range of A, and B is also with the radio range of C. The nodes A and C
are not in the radio range of each other. If both A and C start to transmit to B at the same
time, the data received at B would get garbled. This situation arises because A and C are
“hidden” from each other, because they are outside each other’s transmission range.
Note:- Hidden Terminal causes Collisions.
Exposed Terminal Problem:
Exposed Terminal Problem arises when all the three nodes are in the radio range
of all nodes.
1. Apply mobile computing to design Taxi dispatcher and monitoring service. Explain the
components in detail. (April/May 18)
2. What is CSMA? What are the characteristics of CSMA? Explain their working with
advantages and disadvantages. (April/May 18)
3. Explain hidden and exposed terminal problem in infrastructure-less network. (Nov/Dec
17)
4. Describe the architecture of mobile computing. (Nov/Dec 17)
5. What are the fixed assignment schemes of MAC protocol? Explain their mechanism in
detail. Compare and contrast them. (Nov/Dec 17) (April/May 17)
6. Explain the wireless MAC issues in detail. (April/May 17)
7. Explain MAC protocols for Adhoc networks. (April/May 17)
8. Explain the characteristics of Mobile computing. (May/June 16) (April/May 18)
9. Explain the structure of Mobile Computing Application. (May/June 16) (April/May 18)
(April/May 17)
10. Explain the various taxonomy of MAC protocols. (May/June 16)