You are on page 1of 26

MC 7503 MOBILE COMPUTING III MCA / V SEM

Unit – I
[2 Marks & 16 Marks]

UNIT I WIRELESS COMMUNICATION FUNDAMENTALS, ARCHITECTURE

2 Marks
1. What is mobile computing?
Mobile computing is a technology that allows transmission of data, via a computer, without
having to be connected to a fixed physical link.
2. What are two different kinds of mobility?
i. User Mobility: It refers to a user who has access to the same or similar telecommunication
services at different places.
ii. Device Portability: many mechanisms in the network and inside the device have to make sure
that communication is still possible while the device is moving.
3. What are applications of Mobile Computing?
• Vehicles
• Emergencies
• Business
• Replacement of wired networks
• Infotainment
• Location dependent services
 Follow-on services
 Location aware services
 Privacy
 Information services
 Support services
 Mobile and wireless devices
 Sensor
 Embedded controllers
 Pager
 Mobile phones
 Personal digital assistant
 Pocket computer
 Notebook/laptop

4. Define multiplexing.
Multiplexing is defined as the process of transmitting several message signals simultaneously
over a single channel.
5. List out the various Multiplexing Schemes?
 Space division multiplexing
 Frequency division multiplexing
 Time division multiplexing
 Code division multiplexing

Dept., of Computer Applications A.V.C.C.E


MC 7503 MOBILE COMPUTING III MCA / V SEM

6. Give the use of SDMA./ What is SDMA?


Space Division Multiple Access (SDMA) is used for allocating separated spaces to users in
wireless networks. The basis for the SDMA algorithm is formed by cells and sectorized antennas
which constitute the infrastructure implementing space division multiplexing (SDM).
7. Define CDMA.
Code Division Multiple Access systems use codes with certain characteristics to separate
different users. To enable access to the shared medium without interference. The users use the same
frequency and time to transmit data. The main problem is to find good codes and to separate this
signal from noise. The good code can be found the following 2 characteristic
1. Orthogonal.
2. Auto Correlation.
8. What the features are of Code Division multiple Accesses?
 It does not require external synchronization networks.
 CDMA offers gradual degradation in performance when the no. of users is increased
But it is easy to add new user to the system.
 If offers an external interference rejection capability.
9. What is hopping sequence?
Transmitter and receiver stay on one of the channels like and TDM. The pattern of channel
usage is called the hopping sequence.
10. What is the need for modulation?
 Ease of transmission
 Multiplexing
 Reduced noise
 Narrow bandwidth
 Frequency assignment
 Reduce the equipments limitations.
11. Give the classification of modulation.
There are two types of modulation. They are
 Analog modulation
 Digital modulation
12. Give the classification of Digital modulation.
 Amplitude shift keying
 Phase shift keying
 Frequency shift keying
13. Define demodulation.
Demodulation or detection is the process by which modulating voltage is recovered from the
modulated signal. It is the reverse process of modulation.

14. What is the advantage of a spread spectrum technique?


The main advantage of spread spectrum technique is its ability to reject interference whether it be the
unintentional interference of another user simultaneously attempting to transmit through the channel
(or) the intentional interference of a hostile transmitter to jam the transmission.
15. What is called frequency hop spread spectrum?
In frequency hop spread spectrum, the frequency of the carrier hops randomly from one
frequency to another frequency.
16. What is the function of Medium Access Control Layer?
2

Dept., of Computer Applications A.V.C.C.E


MC 7503 MOBILE COMPUTING III MCA / V SEM

The functions of Medium Access Control Layer are responsible for establishes, maintains,
and releases channels for higher layers by activating and deactivating physical channels.

17. What is GPRS?


The general packet radio service (GPRS) provides packet mode transfer for applications that
exhibit traffic patterns such as frequent transmission of small volumes (e.g., typical web requests) or
infrequent transmissions of small or medium volumes (e.g., typical web responses) according to the
requirement specification.
18. Write the Advantages of GPRS.
 GPRS should use the existing network resources more efficiently for packet mode
applications.
 To provide a selection of QoS parameters for the service requesters.
 GPRS should also allow for broadcast, multicast, and unicast service. The overall
goal in this context is the provision of a more efficient and cheaper packet transfer
service for internet applications
19. Comparison 2G and 3G.

20. What are the basic groups of logical channels?


GSM specifies 2 basic groups of logical channels,

2G 3G
Data services such s SMS, Universal access & portability
Services Introduced multimedia messaging (MMS), across different device types.
internet access & SIM cards.
Throughput/ Speed 9.6/14.4 Kbps. 3.1 Mbps (peak)/ 500-700 Kbps.
GSM - Global System for Mobile UMTS as its core network
Communication with architecture with HSPA protocol.
Technology
technological backbone of TDMA
& FDMA)
GSM, GPRS (2.5G) & EDGE UMTS & CDMA-2000 standards.
Standards
(2.75G).
Voice & data could not be Simultaneous voice & data
Voice & Data Support
simultaneously supported. support.
Consists of only circuit-switched Uses a combination of both
Switching Techniques networks. circuit-switched & packet-
switched networks.
 Traffic channels
 Control channels
21. What are the categories of Mobile services?
3

Dept., of Computer Applications A.V.C.C.E


MC 7503 MOBILE COMPUTING III MCA / V SEM

 Bearer services
 Tele services
 Supplementary services
22. What are subsystems in GSM system?
 Radio subsystem (RSS)
 Network & Switching subsystem (NSS)
 Operation subsystem (OSS)
23. What are the control channel groups in GSM?
The control channel groups in GSM are:
 Broadcast control channel (BCCH)
 Common control channel (CCCH)
 Dedicated control channel (DCCH)
24. What are the four types of handover available in GSM?
1. Intra cell Handover
2. Inter cell Intra BSC Handover
3. Inter BSC Intra MSC handover
4. Inter MSC Handover
25. Give the information’s in SIM?
 card type, serial no, list of subscribed services
 Personal Identity Number(PIN)
 Pin Unlocking Key(PUK)
 An Authentication Key(KI)
26. Define frequency hopping spread spectrum?
FHSS allows for the coexistence of multiple networks in the same area by separating
different networks using different hopping sequences.
27. What is mobile routing?
Even if the location of a terminal is known to the system, it still has to route the traffic
through the network to the access point currently responsible for the wireless terminal. Each time a
user moves to a new access point, the system must reroute traffic. This is known as mobile routing.
28. What is meant by beacon?
A beacon contains a timestamp and other management information used for power
management and roaming.
Ex: identification of the base station subsystem(BSS) .

29. What is call routing?


Routing in the PSTN is the process used to route telephone calls across the public switched
telephone network. This process is the same whether the call is made between two phones in the
same locality, or across two different continents.
30. What is authentication centre (AuC)?

Dept., of Computer Applications A.V.C.C.E


MC 7503 MOBILE COMPUTING III MCA / V SEM

AuC has been defined to protect user identity and data transmission. The AuC contains the
algorithms for authentication as well as the keys for encryption and generates the values needed for
user authentication in the HLR.
31. What is PLMN?
A public land mobile network (PLMN) is any wireless communications system intended
for use by terrestrial subscribers in vehicles or on foot. Such a system can stand alone, but often it is
interconnected with a fixed system such as the public switched telephone network (PSTN).
32. What is GSM?
 GSM stands for Global System for Mobile communications. It is a digital cellular
technology used for transmitting mobile voice and data services.
 The concept of GSM emerged from a cell based mobile radio system.
 GSM is the most widely accepted standard in telecommunications and it is implemented
globally.
33. Define Home Location Register (HLR).
 The Home Location Register (HLR) is the main database of permanent subscriber
information for a mobile network. The HLR is an integral component of CDMA (code
division multiple access), TDMA (time division multiple access), and GSM (Global System
for Mobile communications) networks.
 Maintained by the subscriber's home carrier , HLR contains relevant user information,
including address, account status, and preferences.
34. Define Visitor Location Register (VLR).
 A visitor location register (VLR) is a database that contains information about the
subscribers roaming within a mobile switching center's (MSC) location area.

16 Marks
1. Explain in detail about Multiplexing.

 Define Multiplexing.

 i. Space division multiplexing

 ii. Frequency division multiplexing

 iii. Time division multiplexing

 iv. Code division multiplexing

2. Discuss in detail about Spread Spectrum.

 Define Spread Spectrum.

 i. Direct sequence spread spectrum


5

Dept., of Computer Applications A.V.C.C.E


MC 7503 MOBILE COMPUTING III MCA / V SEM

 ii. Frequency hopping spread spectrum

3. GSM Architecture.

 GSM Architecture diagram.

 i. Radio subsystem(RSS).

 Mobile Station (MS)

 Base Station Subsystem (BSS)

 Base Transceiver Station (BTS)

 Base Station Controller (BSC)

 ii. Network and Switching Subsystem (NSS)

 Mobile Services Switching Center (MSC)

 Home Location Register (HLR)

 Visitor Location Register (VLR)

 iii. Operation Subsystem (OSS)

 Operation and Maintenance Center (OMC)

 Authentication Centre (AUC)

 Equipment Identity Register (EIR)

4. SMS Architecture.

 Architecture Diagram.

 i. Short message mobile terminated (SM MT)

 ii. Short message Mobile Originated (SM MO)

5. GPRS Network Architecture.

 Architecture Diagram.

 i. Serving GPRS Support Node (SGSN).

 ii. Gateway GPRS Support Node (GGSN)

Dept., of Computer Applications A.V.C.C.E


MC 7503 MOBILE COMPUTING III MCA / V SEM

UNIT II MOBILE WIRELESS SHORT RANGE NETWORKS

2 Marks
1. What are the Advantages of wireless LAN?

 Flexibility
 Planning
 Design
 Robustness
 Quality Service
 Cost
 Proprietary Solution
 Restriction
 Safety and Security
2. What are the Design Goals of Wireless LAN?

 Global Operation
 Low Power
 License-free Operation
 Robust transmission technology
 Simplified spontaneous co-operation
 Easy to use
 Protection of investment
 Safety and Security
 Transparency for application
3. Mention some of the disadvantages of WLANS?

 Quality of service
 Proprietary solutions.
 Restrictions
 Safety and Security
4. Mention the features of radio transmission?

Dept., of Computer Applications A.V.C.C.E


MC 7503 MOBILE COMPUTING III MCA / V SEM

 Cover large areas.


 Can penetrate walls, furniture’s.
 Does not need a LOS.
 Higher transmission rates.
5. What are the disadvantages of radio transmission?

 Shielding is not so simple.


 Can interfere with other senders.
 Limited ranges of license-free bands.
6. Mention the features of infrared transmission?

 Simple
 Extremely cheap
 Licenses are not needed
 Electrical devices do not interfere
7. What are Advantages and Disadvantages of Infrared?

Advantages:

 Simple and extremely cheap senders and receivers which integrated in almost all mobile
devices
 No licenses are needed for infrared technology and shielding is very simple.
 Electrical devices do not interfere with infrared transmission.
Disadvantages:

 Low bandwidth
 Quite easily shielded
 Cannot Penetrate
8. What is IEEE802.11 standard?
The IEEE 802.11 standard specifies the physical and medium access layer adapted to the
special requirements of wireless LANs. This standard offers the time bounded and
asynchronous services. The data rate of this standard is 54 M bits/s at 5 GHZ.
9. What is the primary goal of IEEE 802.11?

Dept., of Computer Applications A.V.C.C.E


MC 7503 MOBILE COMPUTING III MCA / V SEM

The primary goal of the standard was the specification of a simple, robust, WLAN which
offers time bounded and asynchronous services also it should be able to operate with multiple
physical layers.
10. What are the various versions of a physical layer defined in IEEE 802.11
standards?
 IEEE 802.11-83.5 MHz
 IEEE 802.11a -300 MHz
 IEEE 802.11b. 83.5 MHz
 IEEE 802.11g - 83.5 MHz
11. What is Bluetooth?
The Bluetooth technology also called as adhoc piconets. It is a local area network with over
limited coverage and does not need for an infrastructure. It is used to connect different small
devices in close proximity about 10m without the use of wiring or the need for wireless
infrastructure.

12. What are the advantages of Bluetooth technology?

 Bluetooth provides arrange of about 100 meters

 It is also low power and low processing with an overhead protocol

 The application with the Bluetooth are virtually endless.


13. What is scatternet?
Group of piconets are called as scatternets. A scatternet may have two piconets,
in which one device participates in two different piconets.
14. Types of Wireless Networks.
 WLANS(Wireless Local Area Networks)
 WPANS (Wireless Personal Area Networks)
 WMANS (Wireless Metropolitan Area Networks)
 WWANS (Wireless Wide Area Networks)
15. Difference between infrastructure and ad hoc Networs.
Infrastructure Networks Ad hoc Networks
Communication takes place communication takes place
between a wireless node and only between two wireless
access point nodes

The wireless node is simple as The wireless node is complex


functionality is based on the
access point
Can forward messages across Can forward messages only
networks with in the specified range
9

Dept., of Computer Applications A.V.C.C.E


MC 7503 MOBILE COMPUTING III MCA / V SEM

16. WLAN Technologies.

 Microwave Technology

 Infrared Technology

 Spread Spectrum Technology

17. Mention the elements of Bluetooth core protocols?


 Radio
 Baseband
 Link manager protocol
 Logical link control and adaptation protocol
 Service discovery protocol
18. Bluetooth Security entities.
 Bluetooth device address
 Security Authentication key
 Secret Encryption key
 Pseudo random number
19. State the requirements of WAP.

 Interoperable
 Scalable
 Efficient
 Reliable
 Secure
20. Name the layers of WAP.

 Transport layer
 Security layer
 Transaction layer
 Session layer
 Application layer
21. What is WSP?
The Wireless Session Protocol has been designed to operate on top of the
datagram service WDP or the transaction service WTP. It provides a shared state
between a client and a server to optimize content transfer.

22. What is WTP? What are its classes?


WTP stands for Wireless Transaction Protocol. It has been designed to run on
very thin clients such as mobile phones. It has three classes.
• Class 0: provides unreliable message transfer without any result message.
• Class 1: provides reliable message transfer without exactly one reliable result
message.
• Class 2: provides reliable message transfer with exactly one reliable result
message.

10

Dept., of Computer Applications A.V.C.C.E


MC 7503 MOBILE COMPUTING III MCA / V SEM

23. What are the components of WAP2.0?


The protocol framework of WAP2.0 consists of four components:
 Bearer networks
 Transport services
 Transfer services
 Session services
23. Define WAP
 WAP is Wireless Application Protocol. It is the basic Objective of the WAP
forum are to bring diverse Internet content and others data service to digital cellular
phones and other wireless, mobile terminals.
 More ever a protocol suite should enable global wireless communication across
different wireless network technologies.
 All WAP forum solution must be: interoperable, scalable, efficient, and reliable.
24. Define Wireless Application Environment (WAE).
The WAE is a application environment based on a combination of WWW and mobile
telephony technologies.
25. Define IRDA.
 Infrared Data Association (IrDA) is a wireless communication technology, it defines a
set of protocols from lower to upper layers covering data transfer and network
management.
 The IrDA transfer message comprises of an IrDA control part and IrDA data part.
 IrDA was designed for high data rate , low power consumption, low cost.
26. What is ZigBee?
 ZigBee is an open global standard for wireless technology designed to use low-power
digital radio signals for personal area networks.
 ZigBee operates on the IEEE 802.15.4 specification and is used to create networks that
require a low data transfer rate, energy efficiency and secure networking.

16 Marks
1. WLAN Equipment.
 LAN Adapter.
 Access Point (AP)
 Outdoor LAN bridges.
2. WLAN Topologies.
 Diagram with Explanation.
11

Dept., of Computer Applications A.V.C.C.E


MC 7503 MOBILE COMPUTING III MCA / V SEM

3. WLAN Technologies.
 i. IR Technology.
 ii. UHF Narrowband Technology
 iii. Spread Spectrum Technology
4. IEEE 802.11 Architecture.
 i. Infrastructure network
 ii. Point to Point (ad hoc) network
 Architecture Diagram.
5. WLAN MAC Layer.
 Introduction
 i. Exponential Backoff Algorithm with diagram.
 ii. Hidden and Exposed Node Problem with diagram.

6. WAP Architecture.
7. Bluetooth Architecture.
8. Short notes on : IrDA & ZigBee.
UNIT III MOBILE IP NETWORK LAYER, TRANSPORT LAYER

2 Marks
1. Define Mobile IP.
 Mobile IP is the technology for support of various mobile data and wireless
networking applications. Ex: GPRS.
 Mobile IP is and Internet Engineering Task Force standard communications protocol
that is designed to allow mobile device users to move from one network to another
while maintaining a permanent IP address
2. What are the requirements of mobile IP?
 Compatibility
 Transparency
 Scalability and efficiency
 Security
3. Mention the different entities in a mobile IP.
 Mobile Node
12

Dept., of Computer Applications A.V.C.C.E


MC 7503 MOBILE COMPUTING III MCA / V SEM

 Correspondent Node
 Home Network
 Foreign Network
 Foreign Agent
 Home Agent
 Care-Of address
 Foreign agent COA
 Co-located COA
4. Define Mobile node:
 A mobile node is an end-system or router that can change its point of attachment to
the Internet using mobile IP.
 The MN keeps its IP address and can continuously with any other system in the
Internet as long as link layer connectivity.
5. Define COA.
The COA (care of address) defines the current location of the MN from an IP point of view.
All IP packets sent to the MN are delivered to the COA, not directly to the IP address of the MN.
Packet delivery toward the MN is done using the tunnel.

6. Define a tunnel.
A tunnel establishes a virtual pipe for data packets between a tunnel entry and a tunnel
endpoint. Packets entering a tunnel are forwarded inside the tunnel and leave the tunnel unchanged.
7. What is encapsulation?
Encapsulation is the mechanism of taking a packet consisting of packet header and data
putting it into the data part of a new packet.
8. What is decapsulation?
The reverse operation, taking a packet out of the data part of another packet, is called
decapsulation.
9. Define an outer header.
The HA takes the original packet with the MN as destination, puts it into the data part of a
new packet and sets the new IP header in such a way that the packet is routed to the COA. The new
header is called the outer header.
10. Define an inner header.
There is an inner header which can be identical to the original header as this case for IP-in-IP
encapsulation, or the inner header can be computed during encapsulation.
11. What is meant by generic routing encapsulation?
Generic routing encapsulation allows the encapsulation of packets of one protocol suite into
the payload portion of a packet of another protocol suite.
12. Why is need of routing?
Routing is to find the path between source and destination and to forward the
packets appropriately.
13. List out the some of the popular Routing protocols.

 DSDV(Destination Sequence Distance Vector)


 DSR(Dynamic Source Routing)
 AODV(Ad-Hoc On Demand Vector Routing)
13

Dept., of Computer Applications A.V.C.C.E


MC 7503 MOBILE COMPUTING III MCA / V SEM

14. What is DHCP?


Dynamic Host Configuration Protocol (DHCP) is a client/server protocol that
automatically provides an Internet Protocol (IP) host with its IP address and other related
configuration information such as the subnet mask and default gateway.
15. What is mobile routing?
Even if the location of a terminal is known to the system, it still has to route the traffic
through the network to the access point currently responsible for the wireless terminal. Each time a
user moves to a new access point, the system must reroute traffic. This is known as mobile routing.
16. Define VoIP.
 VoIP (voice over IP) is an IP telephony term for a set of facilities used to manage the
delivery of voice information over the Internet.
 VoIP involves sending voice information in digital form in discrete packets rather than
by using the traditional circuit-committed protocols of the public switched telephone
network
17. How the dynamic source routing does divide the task of routing into two separate
problems?
 Route discovery
 Route Maintenance
20. Define snooping TCP.
The FA buffers all packets with destination mobile host and additionally snoops the
packet flow in both directions to recognize acknowledgements is called snooping TCP.
21. What is IPSec?
Internet Protocol security (IPSec) is a framework of open standards for helping to
ensure private, secure communications over Internet Protocol (IP) networks through the use of
cryptographic security services.
22. List out the Classical TCP improvements

 Indirect TCP
 Mobile TCP
 Snooping TCP
 Fast retransmitting/Fast recovery
 Transmission/Time-out Freezing
 Selective retransmission
 Transaction-oriented TCP

16 Marks
1. Mobile IP Entities.
 Mobile Node (MN)
14

Dept., of Computer Applications A.V.C.C.E


MC 7503 MOBILE COMPUTING III MCA / V SEM

 Correspondent Node (CN)


 Care of Address (COA)
 Foreign Agent (FA)
 Home Agent (HA)
 Home Network
 Virtual Network
 Tunnel
 Visited Network
 Visitor List
2. IP Packet Delivery.
 Diagram with explanation.
3. Tunneling and Encapsulation.
 i. IP-in-IP Encapsulation
 ii. Minimal Encapsulation
 iii. Generic Routing Encapsulation
4. Explain in detail about Dynamic Host Configuration Protocol (DHCP)
 Diagram with explanation.
5. Explain in detail Conventional TCP/IP Transport layer protocol.
 i. Indirect TCP
 ii. Snooping TCP
 iii. Mobile TCP
6. Short notes on VoIP.
7. Briefly explain IPSec (IP Security)
 i. Authentication Header (AH)
 ii. Encapsulating Security Payload (ESP).

UNIT IV MOBILE AD-HOC, SENSOR NETWORKS

2 Marks
1. What is ad-hoc network?
A wireless ad hoc network (WANET) is a decentralized type of wireless network.
The network is ad hoc because it does not rely on a pre existing infrastructure, such as
routers in wired networks or access points in managed (infrastructure) wireless networks.
2. Characteristics of Ad-hoc Network.
 Autonomous terminal
 Distributed operation
 Multi hop routing
 Dynamic network topology
 Fluctuating link capacity
 Light weight terminals.
3. Classification of Ad-hoc network.
 Wireless mesh network (WMN)
 Wireless sensor network (WSN)
15

Dept., of Computer Applications A.V.C.C.E


MC 7503 MOBILE COMPUTING III MCA / V SEM

 Mobile Ad-hoc network (MANET).


4. List the different types of ad-hoc networks.
i. Vehicular Ad-hoc networks (VANETs)
ii. Intelligent Vehicular adhoc networks(in VANET).
iii. Internet based mobile adhoc networks(iMANET)
5. List the application of mobile ad-hoc networks.
i. Rescue / Emergency operations
ii. Law Enforcement Activities
iii. Educational classrooms
iv. Military Battlefield
v. Commercial sector
vi. Local level.
6. Define destination sequence distance vector routing.
Destination sequence distance vector routing is an enhancement to distance vector routing for
ad-hoc networks and is used as routing information protocol in wired networks.
7. How the dynamic source routing does divide the task of routing into two
separate problems?
1. Route discovery
2. Route Maintenance
8. List out the some of the popular Routing protocols.
• DSDV(Destination Sequence Distance Vector)
• DSR(Dynamic Source Routing)
• AODV(Ad-Hoc On Demand Vector Routing)
9. Routing Algorithm / Protocols.
The ad hoc routing protocols can be divided into two classes based on when and how
the routes are discovered.
1. Table Driven Routing Protocols
2. On Demand Routing Protocols.
1. Table Driven Routing Protocols
 Dynamic Destination Sequenced Distance Vector Routing
Protocol(DSDV)
 Wireless Routing Protocol (WRP)
 Global State Routing Protocol (GSR)
 Fisheye State Routing (FSR)
 Hierarchical State Routing
 Clusterhead Gateway Switch Routing Protocol
2. On Demand Vector Routing Protocol
 Cluster Based Routing Protocol
 Ad-hoc On Demand Distance Vector Routing Protocol
 Dynamic Source Routing Protocol
 Temporally ordered Routing Protocol
 Associativity Based Routing Protocol
 Signal Stability Routing

16

Dept., of Computer Applications A.V.C.C.E


MC 7503 MOBILE COMPUTING III MCA / V SEM

10. What is MANET?


• A Mobil Ad hoc network (MANET) is a set of mobile nodes which communicate
over radio and do not need any infrastructure. This kind of networks are very flexible
and suitable for several situations and applications.
• All the nodes are mobile and connected dynamically topology changes rapidly.
• Applications:
o Military conflicts
o Emergency
o Medical situations
o Natural or human induce disasters.
11. Security goals in Ad-hoc Networks.
 Availability
 Confidentiality
 Integrity
 Authentication
 Non-Repudiation
12.What is Route Maintenance?
If a node is continuously sending packets via a route. It has to make sure that the route is
held upright. As soon as a node detects problems with the current route, it has to find an alternate
route.
13. What is route discovery?
A node only tries to discover a route to a destination of it has to send some thing to this
destination and there is currently no known route. If a node needs to discover a route, it broadcasts a
route request with a unique identifier and the destination address as parameters.
14. What are the metrics should be considered while routing?
• Number of hops
• Interference
• Reliability
• Error rate
15. List the advantages of using Adhoc networks?
• Instant Infrastructure
• Disaster Relief
• Dynamic Topology
16. Define Wireless Sensor Network (WSN).
A wireless sensor network (WSN) is a wireless network consisting of spatially distributed
autonomous devices using sensors to monitor physical or environmental conditions. A WSN system
incorporates a gateway that provides wireless connectivity back to the wired world and distributed
nodes.
17.List out the characteristics of WSN.
 Lifetime
 Flexibility
 Maintenance
17

Dept., of Computer Applications A.V.C.C.E


MC 7503 MOBILE COMPUTING III MCA / V SEM

 Data Collection
18. List the Application of Wireless Sensor Networks (WSN).
 Area Monitoring
 Health monitoring
 Air pollution monitoring
 Forest Fire Destruction
 Inventory tracking
 Water Quality monitoring
 Natural Disaster Prevention
 Machine Health Monitoring
 Waste Water Monitoring
19. Define Distributed Networks.
A distributed network is powered by network management software, which manages and
monitors data routing, combining and allocating network bandwidth, access control and other core
networking processes.
A Client / Server computing architecture is an example of a distributed network.
20. List out the characteristics of Distributed networks.
 Resource sharing
 Openess
 Concurrency
 Scalability
 Fault Tolerance
 Transparency
21. List the algorithm in Ad-hoc Sensor Networks.
 Greedy Packet Forwarding
 Planar Graph Routing
 Beanconless Routing
 Data Centric Routing

18

Dept., of Computer Applications A.V.C.C.E


MC 7503 MOBILE COMPUTING III MCA / V SEM

16 Marks
1. Explain Characteristics of Ad-hoc network.
 Autonomous Terminal
 Distributed Operation
 Multi-hop routing
 Dynamic network topology
 Fluctuating link capacity
 Light weight terminals.
2. Classification of Ad-hoc Network
 i. Wireless Mesh Network (WMN)
 ii. Wireless Sensor Network (WSN)
 iii. Mobile Ad-hoc Network (MANET)
3. Difference between cellular network and ad-hoc network.
4. Short notes on Routing.
 Routing Definition
 i. Source Routing
 ii. Hop-by-hop Routing
5. Explain in detail Routing Algorithm / Protocols.
 1. Table Driven Routing Protocols.
 Dynamic Destination Sequenced Distance Vector Routing Protocol
(DSDV).
 Wireless Routing Protocol (WRP)
 Global State Routing Protocol (GSR)
 Fisheye State Routing (FSR)
 Hierarchical State Routing
 Zone Based Hierarchical Link State Routing Protocol
 Clusterhead Gateway Switch Routing Protocol
 2. On Demand Protocol
 Cluster Based Routing Protocol
19

Dept., of Computer Applications A.V.C.C.E


MC 7503 MOBILE COMPUTING III MCA / V SEM

 Ad-hoc on Demand Distance Vector Routing (AODV)


 Dynamic Source Routing Protocol
 Temporally Ordered Routing Protocol
 Associativity Based Routing
 Signal Stability Routing
6. Application of Ad-hoc Networks.
 Tactical networks
 Emergency services
 Coverage extension
 Sensor networks
 Education
 Entertainment
 Home and Enterprise networks
 Context aware services
 Commercial environments
7. List out the Security goals in Ad-hoc networks
 Availability
 Confidentiality
 Integrity
 Authentication
 Non-repudiation
8. Explain in detail about Architecture of Wireless Sensor Network (WSN).
 Architecture diagram with explanation
 i. Network Topologies
 ii. End nodes versus routers
 iii. Mesh networking
9. Explain Characteristics of WSN.
i. Lifetime
ii. Flexibility
iii. Maintenance
20

Dept., of Computer Applications A.V.C.C.E


MC 7503 MOBILE COMPUTING III MCA / V SEM

iv. Data Collection


10. Application of WSN.
 Child education
 Surveillance
 Microsurgery
 Agriculture
 Inventory tracking
 Medical Monitoring
 Smart spaces
 Process monitoring
 Robotics
 Environmental monitoring
11. Short notes on characteristics of distributed networks.
i. Resource sharing
ii. Openess
iii. Concurrency
iv. Scalability
v. Fault Tolerance
vi. Transparency
12. Describe algorithms in ad-hoc sensor networks.
i. Greedy packet forwarding
ii. Planner Graph Routing
iii. Beanconless Routing
iv.Data centric Routing

UNIT V MOBILE APPLICATION DEVELOPMENT


2 Marks
1. List out the tools for mobile application development.
 Eclipse
 Xcode
 Visual Studio

21

Dept., of Computer Applications A.V.C.C.E


MC 7503 MOBILE COMPUTING III MCA / V SEM

2. Techniques for composing applications.


 Event based programming
 Model-View-Controller as the application architecture
 Auxiliary Files
 Managing applications
 Practicalities
3. Android Terminologies.
 Activities
 Services
 Content Providers
 Intents
 Broadcast Receivers
 Notifications
 Context
4. List out the Android updated versions.
 Android 1.5 Cupcake
 Android 1.6 Donut.
 Android 2.1 Éclair
 Android 2.2 Froyo
 Android 2.3 Gingerbread.
 Android 3.2 Honeycomb
 Android 4.0 Ice cream
 Android 4.1 Jelly Bean
 Android 4.2 Jelly Bean
 Android 4.3 Jelly Bean
 Android 4.4 Kitkat
5. Features of Android.
 Application Framework
 Dalvik virtual Machine
 Integrated browser
 Optimized Graphics
 SQLite
 Media Support
 GSM Telephony, Bluetooth, EDGE, 3G and wifi,camera,GPS,Compass.
 Rich Development Environment
6. Draw Android Architecture.

22

Dept., of Computer Applications A.V.C.C.E


MC 7503 MOBILE COMPUTING III MCA / V SEM

7. Android application packages.


 User interface Widgets (Button, Spin control, Text input)
 User interface layout
 Secure networking & Web browsing features
 Structured storage & relational database
 2D & 3D graphics
 Audio & Video format
 Access to optional hardware
8. Android application framework components.
 Activities are functions the application performs
 Groups of views define the application layout
 Intents inform the system about an application plans
 Services allow for background processing
 Notification alert
9. What is Application context?
 Application context is the central location for all top level application functionality.
 Context class can be used to manage application specific configuration detail.
 Use the application context to access setting and resources shared across multiple
activity instances.
10. Android Activity life cycle.
 Active
 Paused
 Stopped
 Inactive
11. What is Android Manifest file?
 Android projects use a special configuration file called Android manifest file to
determine application settings such as the application name and version, as well as
23

Dept., of Computer Applications A.V.C.C.E


MC 7503 MOBILE COMPUTING III MCA / V SEM

what permissions the application requires to run and what application components it
is comprised.
 Every application must have an AndroidManifest.xml file in its root directory. The
manifest presents essential information about the application to the android system.
12. What is Toggle Button?
Toggle Button control , like a check box or a radio button, is two state button. This button
can be in either On or OFF state.
13. Types of Android Application.
 Foreground
 Background
 Intermittent
 Widget
14. List out types of Built in layout classes in Android SDK framework.
 LinerLayout
 FrameLayout
 RelativeLayout
 AbsoluteLayout
 TableLayout
15. What is Intents?
Android uses intents to do specific job within application, intents are system messages,
running around the inside of the device, notifying application of various events from
hardware state changes to incoming data, application events.
16. Define Broadcast Receivers.
 It simply respond to broadcast messages from other application or from the system
itself.
 These messages are sometime called events or intents.
17. Describe the steps of Launch Configuration.
Step 1: Select Run configuration or Debug Configurations from the Run menu.
Step 2: Right – click Android application on the project type list and select new.
Step 3: Enter a name for the configuration
Step 4: Now choose your start up options. The first (Android) tab lets you select the
project to run and the activity that you want to start when run the application.
Step 5: Use the Target tab shown.
Step 6: Finally, set any additional properties in the Common tab.
Step 7: Click Apply, and your launch configuration will be saved.
18. Define the Android activity life cycle.
Activities in the system are managed as an activity stack. When a new activity is
started, it is placed on the top of the stack and becomes the running activity -- the previous
activity always remains below it in the stack, and will not come to the foreground again until
the new activity exits.
24

Dept., of Computer Applications A.V.C.C.E


MC 7503 MOBILE COMPUTING III MCA / V SEM

19. What are the Intent Filters and Intent Receivers?


• Intent Receiver: An Intent Receiver is like the mailbox of an Activity. The Intent
Receiver is used to allow activity to receive the specified Intent.
• Intent Filters: are used by activities to describe the types of intents they want to
receive, the outline type of data that should be passed with the intent.
20. Android Techniques for saving Data.
 Shared Preference
 Files
 SQLite Databases
 Content Providers
21. List out the GEO Services.
 Web Map Services (WMS)
 Web Feature Services (WFS)
 Geodatabases
 Intelligent Category Services.

16 Marks
1. List out the Android Terminologies.
1. Activities
2. Services
3. Content Providers
4. Intents
5. Broadcast Receivers
6. Notifications
7. Context.
2. Explain in detail about Layers in android software stack with diagram.
 Architecture diagram
 i. Applications
 ii. Applications framework
 iii. Libraries
 iv. Android runtime
25

Dept., of Computer Applications A.V.C.C.E


MC 7503 MOBILE COMPUTING III MCA / V SEM

 v. Linux Kernel
3. Explain in detail Android Application Architecture.
 Architecture diagram
 i. Activity manager and Fragment manager
 ii. View
 iii. Notification manager
 iv. Content providers
 v. Resource manager
 vi. Intents
4. Android Activity Life Cycle.
 Diagram
 Active States
 Paused
 Stopped
 Inactive.
5. Short notes on: Data storage, Retrieval & Sharing.
6. Short notes on: GEO Services.
7. How to create your own mobile application like game,clock,calendar.

--------------------------------------ALL THE BEST ----------------------------------------------

26

Dept., of Computer Applications A.V.C.C.E

You might also like