You are on page 1of 24
END TERM EXAMINATION SIXTH SEMESTER [BCA MOBILE COMPUTING [BCA-304] qime:3 hrs. Note: Attempt any five questions including from each unit. Ql. Answer any five of the following (a) What is WAP push protocol? ‘Ans. The WAP Push protocol allo: : include a URL link that the deview pees eat message and WAP Push messages can deliver rich eontent quake! ; programming can open the device browner 4 fa a cee experience. From the user's point af view, WAT Pe arene (WAP page) delivered directly to the use from the carriers point of view, WAP Push isu way ty chanteuse tr and to share revenue with content. providers. WAP Push inemapa sending a specially formatted Push Application Protocol (PAP Yeent Push Proxy Gateway (PPG), which, in turn, forwards thw content te th (WAP Push). Mobile Originated WAP Push messaging is not supported b WAP Push messages may include any form ofenntent, beenuse the r a URL link that should be opened over a WAP connection, Use browser, and WAP content appears. Winwap's WAP Protocol Stack provid Zand WAP 2.0 Gateway/Proxy connection needed to open the URL Link w connection. AWAP Push is a specially encoded message that includes a link toa WAP address, WAP Push can be delivered over any WDP-supported bearer, such as GPRS or SMS, The WAP Push message dircets the end user to a WAP address where particular content may be stored ready for viewing or downloading to the handset. Quo. 1 which is computeory. Select ano question questions briefly: : alerts that ma opt lo initiate a browner ess iy, h ice without requiring ui the WAP 2 2.1. (b) QE) What do you mean by CDMA? sig tha ee tay: Code Division Multiple Access (CDMA) is a sort of) male the use of available “ous Signals to occupy a single transmission channel. It optimizes Scanned with CamScanner 2ONT Sixth Semester, Mobile Computing Jere-high-frequency (UNV) ost undvidth. Thee technology is cnsnnenly used in ltrs bith fem yuarey HY ale talphivne nysterns, bonds rang bemecn the HOO RMITZ 3208 ee Multiple Avcens syotern is very different from time # useer Jas coe Wo Une vibole biandwiebthy nt CDMA codes are used dis! nd frequency roultiplexing te this for the entire duration “The be ish amnony the differs CDMA employs analog-te-digi apectrurn technology. Audio input is firet digitized inva binary elements, The frequency ofthe transmitted signal bx then made ta vary woxurding Ws a defined pattern (onde, se ibean be intercepted only response is programmed with the sume ende, wo it folluws exwetly along vith the transmitter frequency. There trillions of possible frequency-sequenciny endes, which enhances privacy and #1 loniny, difficult. The CDMA channel is nominally 1.24 MH wide, CDMA 1 called eoft handoff, which ininiinizes signal breakup ass handset y ta snother, ‘The combination of digital and spread-spectrum red Limes as many signals per unit bandyidth as analog modes, CDIMA ix eonpatible vith other cellular technologies; thin wlluws for nationwide roaming, The original CDMA standard, wlio known as CDMA One, offers a transmission speed of only up to 14.4 Kips in its single channel form and up to 116 Kbps in an eight-channel form, CDMAZ000 and Wideband CDMA deliver data many tines f Qu. (e) Wrulte the attribute of templates taggin WML. receiver whase frequene J conversion (ADC) in eotnblustion vith spread | ] | | tworks use a xebeine us fren ani coh 9 supports several Ans, The «templates element supports the following attribut Attribute Value Description | onenterbackward | url Occurs when the user navigates into a eard using onentertorward | unk Occurs when the user navigates into a card using ayo" task ontiner ul Occurs whan the "timer expires claws Clase dati | etn clus name for the elewent. The clans narne| is cane sonmitive, An element can be connected to multiple classes. Multiple clans names within the class attribute are separated b x Hlemont id | Bets w unique name for the eleme QP) What by unified monnaging? Ans, Unified mowsnginy (sometimes referred to an the unifi woul i ified mennagint pate (UM) Om Mlagrated messaging ayster) ia the handling of vole ie and regulat fext messages ax object feat ese os objects tn w single muiibox that a user ean accenn vither with Feacuiniug tale Pea er lephone. The PC usorean open and play back voiew estat Tun multimedia capabilities, Fix images enn he saved ar printed: ued can ecusH Une wie maithox by telaphune M lextare convert tue Hie and payed ah eae arene Unitie esvinien yt jes atone meanaion 's purteulstly convenient for mobile Imainns users boca Tien ene aac culesuen und customers thraugh « POC oF telephone, whi nestling endive uauen tarmac ae lat Worldwide telephone acense, Ul fens nti tall aniaver ling eae ON ite othr foutave, veld outlook Fila one nition a LUT cules. UNE eombinow voles monueyging an sinall 1198 Hwithox Unt cian be accorsod from imuny diffrent devices, Usa ean Hate Scanned with CamScanner LP. University-{BCA]-AB Publisher 2017-3 from their email inbox or by using outlook voi essages sing outlook voice access f 2 Be ono] over how users place outgoing calls from UM and the export Eel ialfare when they call into an organization oe #91. @) Define the term Bluetooth? _ Bluetooth is a telecommunications industry specificati : site dvics, computers and other devices can banyan ae ° a 7 aga short-range wireless connection. ehvather ~ bluetooth is, with the infrared, one of the major wireless technologi sieve WPAN, Bluetooth is a wireless LAN technology used enna ot xferent functions such as telephones, computers (laptop or desktop), notebooks, cameras, printers and so on. Bluetooth project was started by SIG (Special Interest Group) formed by four empanies IBM, Intel, Nokia and Toshiba for interconnecting computing and ammunicating devices using short-range, lower-power, inexpensive wireless radios. ‘The project was named Bluetooth after the name of Viking king- Harald Blaatand , stounified Denmark and Norway in 10th century. : Nowadays, Bluetooth technology is used for several computer and non computer application: 1.It is used for providing communication’between peripheral devices like wireless muse or keyboard with the.computer. 2. Itis used by modern healthcare devices to send signals to monitors. 3.It is used by modern communicating devices like mobile phone, PDAs, palmtops #cto transfer data rapidly. 4. Itis used for dial up networking. Thus allowing a notebook computer to call via amobile phone. 5, It is used for cordless telephoning to connect a handset and its local base station. 6. It also allows hands-free voice comm 1nication with headset. 7.It also enables a mobile computer to connect to a fixed LAN. 8 It can also be used for file transfer operations from one mobile phone to another. More recent Bluetooth versions make it possible for a user to place hands-free thone calls through a mobile phone or connect wireless headphones to a smartphone’s usic playlist, for example. Bluetooth technology can simplify tasks that previously Solved copious wires strewn among peripheral devices. For instance, with a Bluetooth- abled printer, one can connect wirelessly with a desktop, laptop or mobile device and - int out documents. It is also possible to syne a wireless keyboard with a tablet-style “vice, such as an Apple iPad or Kindle Fire, or even & DVD player with a television. it ee “Mbps and uses 2.4 GHz bandwidth. Bluetooth is that when the devi bmatically start the transfer infor} z between the devices is created ant 1. () What is rendering? f gts Rendering is the process of generating an image from a de ea ately ate program, ‘The model is a deseription of three dimensions! © tune salt language or data structure. It would contain geomet, ae eege. The term withing inormation. The image isa digital image or raster Taphies SNE). ag 2c !¢ by analogy with an “artia’s rendering” of @ seene. Tenders 8 final video ut, “N° Process of calculating effects in a vide 7 : : co is within the scope of a other devices mation without the user noticing. a small dd the user can accessed as iftthere were cables. 0 editing Scanned with CamScanner Sixth Semester, Mobile Computing rendering is the process of add shading, color and lamination i i te life-like images on a screen. to.a2-D or 3-D wireframe in order to creat cope ere i i topics of 3D computer graphics, and in practice alway, Tis one of Oa sub aes sipoline it’s the last major step, giving the fin] .d to the others. In the 7 a eases oeeaach the models and animation, With the inane jon of computer qraphies since the 1970s onward, it has become amore distinc! SYK It has uses in: computer and video games, simulators, movies or TV speci al eects, and design visualization, each employing a different balanee of features am ted niques, ‘Ava product, a wide variety of renderers are available, some are integrate into larger modelling and animation packages, some are stand-alone, some are free open-source projects. On the inside, a renderer is a carefully engineered program, based on a selective fuixture of disciplines related to: light physics, visual perception, mathematics, and software development. In the casé of 3D graphics, rendering may be done slowly, as in pre-rendering, or in real time, Pre-rendering is a computationally intensive process that is typically used for movie creation, while real-time rendering is often done for 3D video games which rely on the use of graphics cards with 3D hardware accelerators. Q.1. (g) Write logical operators in WML script. ‘Ans. Following logical operators are supported by WML: Assume variable A holds 20 and variable B holds 30 then: 4-2017 In3-D graphic design, ‘Operator Description Example and Called Logical AND operator. If both the (A and B) is true. operands are true then condition becomes true. . or Called Logical OR Operator. If any of the (Aor B) is true. two operands is non zero then condition becomes true. && Called Logical AND operator. If both the (A && B)is true. operands are non zero then condition becomes true. i Called Logical OR Operator. If any of the (A || B) is true, two operands is non zero then condition becomes true. ! Called Logical NOT Operator. Use to (A && B) is false, reverses the logical state of its operand. Ifa condition is true then Logical NOT operator will make false. a y UNIT-I Qa Deéerii iplexi; Anema a a multiplexing techniques with suitable diagrams. © + Mutiplexing is sending multiple signals or streams of information on aco" at the same time in the form ofa sii i signals athe rece or ofa singe, complex signal and then recovering the separ? Scanned with CamScanner LP. University-[BCA]-AB Publisher ies _guiplexed signal is transmitted over a communication channel, whi se mul amission medium (eg. a cable) The multiplexing divides ‘hee peat *\ 1 communication channel into several high-level logical channels, one for ow Bye signal ot data stream to be transferred, A reverse process, known as sstiplesing, can extract the original channels on the receiver side. nieve that performs the multiplexing is called a multiplexer (MUN), and a device arts the reverse process is called a demultiplexer (DEMUX or DMO. oe Division Multiplexing (SDM) s space-divi ion multiplexing simply implies different point-to-point wires for efferent channels. SDM implies a separate sender for each communication. In this type of ajiplesing, separate channels are obtained by specifically separating signal paths has separate electrical conductors or atmospheric paths. In SDM, there is a ‘Se ation of channels by mapping each channel onto a dedieated space. Thio is enabled ty using sectorized and directional antennas. We have to ensure non-overlapping jsterference ranges between senders, It is usually used in combination with frequency, time or code division multiplexing. SDM ensures maximum use of time and frequency. Frequency Division Multiplexing (FDM) Frequency-division multiplexing (FDM) is inherently an analog technology. FDM ses the combining of several signals into one medium by sending signals in several Gistinet frequency ranges over a single medium, Guard spaces between frequency bands toavoid overlapping (adjacent channel interference) wah Spe los Multiplexer Modulator ta >) nd Carrier fi 4 ‘Modulator nnnnan p>) proves Cartier fy Medulator Advantages: * lower channel bit rate (than * Requires coordination * works also for analog signals Disadvantages: i * Inefficient use of bandwidth if the traffic is * Requires guard band between channels * Cannot readily support variable user da fred bit rate sete Time Division Multiplexing (TDM) aitedivision multiplexing (TDM) is @ ‘TDM) means less susceptible to multi path IST distributed unevenly ta rates, fixed channel width means digital (or in rare cases, analog) technology ‘uses time, instead of space or frequency, to separate the different data streams. Scanned with CamScanner Sixth Semester, Mobile Computing 2 sequenci ‘a few bits or bytes from each individual ig TDM involves sequenci2e FD in such a way that they can be associated with eam ave receiver. I done sufficiently quickly, the receiving devices will not de Sppropriots The circuit time was used to serve another logical communication path, ay | cenders nse the same frequency but at different prints in time, Achannel etst the vo ] spectra soe nount of time. Precise synchronization is needed. All sendy, tae for a certain F ccheduling, Receivers have to listen to the right frequency exactly the right points in time. 6-2017 Put Advantages: + Only one carrier in the medium at any given time + High throughput even for many users + Common TX component design, only one power amplifier Disadvantages: + precise synchronization necessary + requires terminal to support a much higher data rate than the user information rate Code Division Multiplexing (CDM) Code division multiplexing (CDM) or spread spectrum is a class of technique! where several channels simultaneously share the same frequency spectrum, and this spectral bandwidth is much higher than the bit rate or symbol rate, One form frequency hopping, another is direct sequence spread spectrum. In the latter case, Scanned with CamScanner LP. University-[BCAL-AB Publisher 2017-7 annel transmits its bits as a coded channel-specific sequence of pulses called amber of chips per bit, or chips per symbol, is the spreading factor. This coded one asion typically is accomplished by transmitting a unique time-dependent Hepof short pulses, which are placed within chip times within the larger bit time. srepannels, each with a different code, can be transmitted on the same fiber or radio Hepelor other medium, and asynchronously demultiplexed. All channels use the oe spectrum at the same time ‘Advantages: « bandwidth efficient and good power control + noneed for coordination and synchronization «+ good protection against interference and tapping Disadvantages: + lower user data rates + more complex signal regeneration Q2.(b) What are the factors that enable the Convergence of Wired with Wireless media? Explain each of them. (4.5) ‘Ans, Convergence in telecommunications refers to the combination of multiple services through lines of telecommunication from a single provider. In the context of service delivery, it can also be formulated as the convergence to a single transport platform or infrastructure. Combining the transport of many services over the same infrastructure brings an immediate advantage of sharing the cost of the civil works as ‘well as increased revenues (Which are now collected from more types of traffic) for network operators and service providers. In the context of access and home networks, the convergence is using these networks for delivering both the regular traffic (e.g. from the Internet) and mobile communication signals, such as GSM,,UMTS, or LTE/Beyond 3G (B3G). “@.3. (a) Discuss FSK, PSK, AFSK and APSK. ®) Ans. Frequency shift keying (FSK) is one of several techniques used to transmit a digital signal on an analogue transmission medium. The frequency of a sine wave sanucs ig ahifted up or down to represent either a single binary value or a specific bit rattorn, The simplest form of frequency shift keying is called binary frequency shift keying (BFSK), in which the binary logic values one and zero are represented by the carrier frequency being shifted above or below the centre frequency, In conventional BFSK systems, the higher frequency represents a logic high (one) and is referred to.as the mark frequency. The lower frequency represents a logic low (zero) and is called the space frequency. The two frequencies are equi-distant from the centre frequency. A typical BFSK output waveform is shown below: Trthere sg discontinuity in phase when the frequency is sifted bowen! Cie and space values, the form of frequency shift keying used is said to be non-coherent, otherwise itis said to be coherent. In more complex schemes, additional frequensioe are Be aa ee coe pt tbe represented by each frequene” Vee pre nary ‘higher data rate, but requires more bandwidth (representing f feat sveses ne iss, for example, would require fon" diferent fea eases he probability of ‘cmpexity ofthe modulator and demodulator cits oh inet transmigci fi ‘nsmission errors occurring. Scanned with CamScanner 2017 Sixth Semester, Mobile Computing | Logic t Logic 0 Logle 1 Modulating (digital) signal Sino wave carrlor 1 MH viii '| Fig, Binary Frequency Shift Keying (BFSK) itt keying, (PSK) is a method of modulating digital signals onto an jor wave in which the phase of the carrier wave is shifted between two or 92 “ f Logic 1 Logie 0 Lope 1 ° Output signal Phase: analogue ear Modulating Frequency 3 2 “4 0 \_| 4 \] \ > Carrier Frequency 9 $364 45 467s ttt Output Frequency Phase shift key modulation Scanned with CamScanner LP. University-[BCA]-AB Publisher 2017-9 jues, depending upon the logic state of the input. bit stream. The simples oe ses two phases - 0 degrees and 180 degrees. The logic state of cach hit is aid with respect to the logic state of the preceding bit. I the logic state changes oon logic high to logic low) the phase of the carrier is shifted by 180 degrees. If the te ate does not change, the phase of the carrier remains the same. This form of PSK istelimes called biphase modulation. The output waveform of a 2-phase PSK lator is shown below. More complex forms of PSK employ four or eight phases. This allows more bits to be tensmitted for each phase angle used. ‘Audio frequency-shift keying (AFSK) is a modulation technique by which digital jiais represented by changes in the frequency (pitch) of an audio tone, yielding an ‘moded signal suitable for transmission via radio or telephone. Normally, the transmitted audio alternates between two tones: one, the “mark”, represents |abinary one; the other, the “space”, represents a binary zero. AFSK differs from regular frequency-shift keying in performing the modulation stbaseband frequencies. In radio applications, the AFSK-modulated signal normally isbeing used:to modulate an RF carrier (using a conventional technique, such 8AM or FM) for transmission. AFSK is not always used for high-speed data communications, since it is far less sficent in both power and bandwidth than most other modulation modes. In addition bits simplicity, however, AFSK has the advantage that encoded signals will pass through AC-coupled links, including most equipment originally designed to carry music speech. Amplitude & Phase Shift Keying(APSK) is a form of modulation that is being onsidered increasingly for technologies like 5G mobile communications and for many ‘ther applications. APSK, Amplitude & Phase Shift Keying has a number of characteristics and arantages that could help overcome issues that were encountered with other forms of adulation including phase shift keying and quadrature amplitude modulation thniques that are widely used at the moment. ‘As the name indicates, APSK, Amplitude and Phase Shift Keying uses a combination clamplitude and phase shift keying, but it is normally accomplished in a manner that tables its advantages to be enhanced. Amplitude and Phase-Shift Keying, APSK, is a digital modulation scheme that ‘wes both the amplitude and the phase changes of on the carrier signal to provide the ‘ala transport mechanism for the information. 4000 0000 Fig. APSK constellation diagram Scanned with CamScanner 10-2017 Sixth Semester, Mobile Computing APSK, Amplitude and frequency shift keying is able to reduce the number « Jovels required to Lransmit information for any given modulation order, ‘The concept behind AFSK is to modulate both phase and amplitude. Ho can be necomplished in way that enables the constellation to be moved wo th, are fewer power levels to he accommodated, ADVANTAGES OF APSK + Smalle + Lower peak to average pow vin, num of amplitude levels atio * Can be used with Gray coding to reduce BER Q.3. (b) With an example, explain the dir 5 ng it onto a carrier * Each symbol is represented by a number of chips, resulting in a signal with, larger range of frequencies but with redundant data * Sprend signal is modulated onto a carrier signal with fixed carrier frequency * DSSS uses a carrier that remains fixed to a specific frequency band. * Data signal (rather than being transmitted on a narrowband) spread onts much larger range of frequencies using. a specific spreading code (Pseudo noise sequen * DSSS signal has a redunda: cy fuctor and is therefore very robust 1 | 0 Osiginal sgn Lotroriiooororroriiooatorroertivoo Spreating i \ i spat 7] HI-FI AH r vent TI] tt : is 1 ' ' 1 1 ‘ DSSS Example , UNIT-II Q-4. (a) Rxplain the MAC mechanism used in WLAN. be Ans, Medlx acceys control (MAC) is a sublayer of the data link layer (DLL)i®% Seven-layer OSI Network reference model. MAC is responsible for the transmis! data packets to and from the network-interface card, and to and from another re™ shared channel. The basic function of MAC is to provide an addressing mechanis™ channel access so that each node available on a network ean communicate wit! nodes available on the same or other networks. Following Protocols are used by Medium Access Layer : ALOHA : ALOHA is a system for coordinating and arbitrating access 1 a communication channel. It was developed in the 1970s at the University of Ha" . if Scanned with CamScanner LP. University-[BCA]-AB Publisher 2017-11 ,iginal system used terrestrial radio broadcasting, but the s: hplemented in satellite communication systems. A shared Sse inieucerae like ALOHA requires a method of handling collisions that occur when two or more systems attempt to transmit on the channel at the same time. In the ALOHA system, a node transmits whenever data is available to send. If another node transmits at the same time, a collision occurs, and the frames that were transmitted are lost. However, a node can listen to broadcasts on the medium, even its own, and determine whether the frames were transmitted. Carrier Sensed Multiple Access (CSMA) : CSMA is a network access method used on shared network topologies such as Ethernet to control access to the network. Devices attached to the network cable listen (carrier sense) before transmitting. If the channel is in use, devices wait before transmitting. MA (Multiple Access) indicates that many devices can connect to and share the same network. All devices have equal access to use the network when it is clear. Even though devices attempt to sense whether the network is in use, there is a good chance that two stations will attempt to access it at the same time. On large networks, the transmission time between one end of the cable and another is enough that one station may access the cable even though anuther has already just accessed it. There are two methods for avoiding these so-called collisions, listed hére : (1) CSMA/CD (Carrier Sense Multiple Access/Collision Detection) : CD (collision detection) defines what happens when two devices sense a clear channel, then attempt to transmit at the same time. A collision occurs, and both devices stop transmission, wait for a random amount of time, and then retransmit. This is the technique used to access the 802.3 Ethernet network channel. This method handles collisions as they occur, but if the bus is constantly busy, collisions can occur so often that performance drops drastically. It is estimated that network traffic must be less than 40 percent of the bus capacity for the network to operate efficiently. If distances are long, time lags occur that may result in inappropriate carrier sensing, and hence collisions. (2) CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) : In CA. collisions are avoided because each node signals its intent to See ‘This method is not popular because it requires transmit before actually doing so. Seesive overhead tha ee rr york AN) Protocols : Ethernet prota stamina stoned lB ns ‘afaupes mode, data are tana using the popular Carer See Multiple Access! eens term oa their functionalities of GSM architecture. (8) Ans, Refde Q4(b) from End'Term Examination May-June ars. Q5. (a) Differetitiate between FDMA, TDMA and CD! Ans. Comparison between CDMA, TDMA, FDMA: = Usis [Toma FDMA oun the Yea |Seyments sending time | Segment the frequeney| SPCAC TN into disjoint time slots band into disjoint Teal code. demand driven or fixed | subbands _|_ Patterns: Scanned with CamScanner 12-2017 Sixth Semester, Mobile Computing ‘Terminals All terminals are active ‘Every terminal has All terminal my for short periods of time _| its own frequency be active ay © on same frequency. uninterrupted same plage ay | same monet uninterrupted! | m Signal Synchronization in time | Filteringin the Code plus spay separation __| domain frequency domain receivers, i, ‘Transmission | Discontinuous Continuous Continuous > u scheme je Cellcapacity | Limited Limited No absolute ling) on channel eapacy | on butitisan |} of interference limited system | ‘Advantages | Established fully Simple, established, | Flexible, ess] it + | digital, flexible robust frequency h planning needed, | P° soft handover | Disadvantages| Guard space needed Inflexible, frequencies | Complex receive, (multipath propagation), are scarce resource needs more th synchronization difficult complicated pore control for sendes} ° Other Standards in fixed networks|Typically combined Still faces some together with FDMA or —_| with TDMA and SDMA. | problems, higher SDMA used in many N mobile networks \ expectations, will : integrated wit ~ TDMA or FDMA < Q.5. (6) Discus in detail location management in mobile networks. Ans. Location management is an important problem in mobile computing sin} wireless mobile computers can change location while connected to the network. Ne strategies must be introduced to deal with the dynamic changes of a mobile comput network address. The ability to change locations while connected to the network crea a dynamic computing environment. This means that data which is static for stations computing becomes dynamic for mobile computing. An example is that @ stations? computer is permanently attached to the nearest server while mobile computers mechanism to determine which server to use. pv As people move, their mobile computers will use different network address** Tatworking used today has to be changed to deal with dynamically changing ad2 IfWe, for example, look at he Yi a! e ‘ow the Internet Protocol (IP) is designed for fixed OP) 14 & host IP is bound with its network address so moving toa ney location meats needs a new IP name, A fow basi mechanisms to de! been discussed to modify the IP-y Selective Broadcast aos With this method a message i i oie this Be is sent to all network cells asking the MOP avi toreply with its current addres re ive in lar ei Howevor, ifthe mobile computecinns sone’ MAY be too expensive ¥ out to the selected cells. A disadvantecs vi i is that Adi ge with selective broadcast is used when we have enough information about current location. . ation termine a mobile computer's current !o¢ sed protocols as below: Scanned with CamScanner LP. University-[BCA]-AB Publisher 2017-13 Central Services ‘he current address for each mobile user is kept in a centralized database. When a bile computer changes its address it also updates the central database by sending a essage containing its new address. Home Bases With this method the location of a given mobile computer is known by a single server (MSS), often called the Home Location Server. The user is permanently registered under this server and it-keeps track of where the mobile computer is. To send a message toa mobile user, the home location server has to be contacted first to obtain the users’ current address. ‘The main disadvantage with this scheme is that the way a message must travel may be much longer than the real distance. This scheme can also lead to low availability of information. Forwarding Pointers ‘This method is probably one of the fastest. Each time a mobile computer changes its address, a copy of the new address is added at the old location. The message sent is then forwarded along the chain of pointers until the mobile computer is reached. The pointer chain will be made longer every time the mobile computer changes location and this may lead to inefficient routing. To solve this the pointers at the message forwarders can be updated to contain more recent addresses. Even though this method is among the fastest it suffer from failure anywhere along the chain of pointers. Another problem is associated with deleting pointers which cannot be done before all message sources have been updated. The forwarding pointer method can be hard to implement. Location management involves two basic operations * Paging * Search by system to track the mobile * MSC broadcasts message * Target replies in the reverse channel * Update © Upper bound on the location uncertainty * Mobile sends update message on the reverse channel =) ce Location management is a key factor for mobile computing. Without a good strategy a ‘forlocation management, mobile computing cannot exist. s UNIT-II "S| Q6.(a) What are the various types of WML tasks? Discuss their attributes WJ | dusage with the help of a program. (7.5) As: A WML task is an element that specifies an action to be performed by the rovser, rather than something to be displayed. Task elements encapsulate all the y qautation required to perform the action, Tasks are used in many places in WML. For wt "uple, the action of changing to a new card is represented by a task element and sit ener of returning to the previous card visited is represented by a task | Tbeteare folowing four types of tasks in WML: {a2 T88K: is also known as Forward Navigation element, The task represents a | Mey of switching to a new card. i suottant Attributes HT oc stt lt specit ination Se ilies the URL of the destinatio © | Si giéteterer: It specifies whether the browser should send the URL of the current ion should 22h cath the request. Itis also useful when invoking a CGI servlet. The server “aated“™i2e the returned content based on the location from which the user Scanned with CamScanner 14-2017 Sixth Semester, Mobile Computing 3, Cache-control: It tells the server for a fresh copy of the card. s st should be sent as a GET or PQ; 4: Beth pecies wether he ress eri encoded in the URL, gt Saeeierie ‘te, Ina POST request, data is sent separately tg Example:

Move to First Page

REFRESH THIS PAGE:

Jeard> Scanned with CamScanner VL University HOA, AK Mublinher ONE TB spy The snoop Lh 9 aon, poops (oul sieve Ua nal iinag ihiondd bis done Cianpe atin ti whines far “ne No Mt a , ei », Phiss Gyr be awed to avervides he tennplintess event biaedhige far a giurtleud for puerto Mt po Important Atlan ae says Hen they eas rant fa Hw el plement HA waldo 1D for the elemont i. Example wml ceail> ~do namos*hack” typas"prey" bnlale" Buck" =noopl> “Ho elourd “Aun Qui.) What ave all sorvtoes avidly Anne 1 Produotlve Applications © emalls E-mail (oleetsonie mail) is Lvs exclu: of coy elecommunication, One ate sesnie tear be fils, BCT aceon ta iene in binary lah ae args reneged tafe! oo ea eave ive, esnal exe al Fue enuedvaye aves cna fe 10 grovidor Tarn not worker other than the Liber el ie pale al orate, Henn enn be re as woe) nt ey dnd vidas ‘on management (IM) rofers to the practice snd the rain on wexquive, rq usin robles Fotacumanbs psst-aseel an Algal), webs riypletes bark cma elated or oly and Miia, mbar of cacti OM (6) Ju for mobile internet? puter tore (He of rixplae brnaages td soe aor and Narrihuted to fists of peopl «PIM: Pornonnal Inform study of the neti tien people perform in sae persona angoriaation Henna oi pew ancl ennai nec Peoyenyeiny Ut 1 pia parvo’ various ren Or pest, eunpleyes Aiype of nofiware appiiention Denied Lo Helpuncrs organize candor ite of information, Hach form of infin too is angesnizend sare see os evnug ote diffrent aaa dl vo fulfill diapaurate rok dat puna: Jy an toil Wier Many PIMu also include viandar welling, and ealeisn prety aie Dae deal of PIM fa that poople rll aby zr tne lg rit in the right place, in he right Foran, nl of sufTiesont connpleten atl be ile current need, + UM: Ur objects in at single bytelophone, Phe VC we his multimedia eapabilit fame mailbox by telep! Into audio filess anne play’ Unified! messsayion, is partie Jurly convenient fo" mobil allgns than te reach colleagues and usta hippens tu he available, Some Her! after wuridiide Wile - : Unified mennnging (or UM) js he inte ration of aiffe! enn electron menue 2 communientions media (erally MB, f0% yoiceanail, “ide ment oR i Icing ne ng inteine Bee Pr oan ariel ea gest waitin communications systen Of jvered i yo in ore each yonith ia, uel voicemail saystanns, oomnesth ‘worreers, 07 an fax mHACHIneSs v eneslag iL types of mossy 8 2 thw ssn IM: Instant, messaging in the: excheane of ably Uo wl Mplie r + icatiay fn ealtinnes, Generally snevuded i the ridling of voice Sonn, nied reqguine ext seni ai mnnillvox Une ser rusis elie YUN 8 reseed evaousil Ct OF fran open and play bate gwar, wet HC raga es saree OF priate Fe user ea cers tie, ordinary e-rnall ote jn tanh rts Fock mewninygint ns Ue ba rd ors recast It whichever fer Hoeash nents HC) ur vile page OCH tent et 1A nofmaare 3% Scanned with CamScanner 16-2017 Sixth Semester, Mobile Computing ii ine 2 ected through 9 A : ddy” is online and connected Ugh the see whether a chosen friend, co-worker OF iat "is crn avail in the immediee selected service. Instant messauing T° tinued exchange simpler than vending the message exchange and also makes # ust be online at th ime the Pack and forth. For IMing to work, both users m Stacie the intended secpient must be willing to Seep re an IM Yo nie nh configure the IM client to reject Ghat Ses Mis will result in notification that the reel, or who isnot willing vo accept IMs, i) ress Tame IMs, it alert transmission a nth leted. If the am ow that indicates that an IM has arri the recipient with a distinctive sound, a window ndicates that an IM has arriv aa eich the recipient to accept or reject it, or a window containing —4 message. Il. Informational and Transactional ae * KIOSK to content: The relatively limited device capabilities dictate not only that the information presentation be simple and friendly but aleo that it provides clear and immediate value. More importantly, the user can retrieve just the desired information, at the desired time, and in preferred dosage (amount). This information can be personalized to meet the user's preferences and made relevant depending on the Jocation of the user at any given time. Upers are unlikely to surf the Web in the sare way that they do from a wired connection on the desktop; instead they will frequently access sites to obtain up-to-the-minute, time-critical, location-sensitive, value-added information. Users may access business-critical information, key financial transaction, or simply entertainment and games. ‘An interactive kiosk is a computer terminal featuring specialized hardware and” software designed within a public exhibit that provides access to information and applications for communication, commerce, entertainment, and education. Integration of technology allows kiosks to perform a wide range of functions, evolving into self- service kiosks. For example, kiosks may enable users to enter a public utility bill account number in order to perform an online transaction, or collect cash in exchange for merchandise. ‘The user can also have personalized content pushed to the mobile devices based on a priori settings or a Web-based profile. + E-commerce: Electronic commerce is the concept of carrying out over the Internet by establishing a market place or digital exchange. It involves an outlet with an electronic storefront on a Web server, online catalogs iderttifying the merchandise, an application that can perform dynamic pricing and deliver selected promotions and a back end connecting to transaction, payment and fulfillment systems. E-commerce (electronic commerce or EC) is the buying and selling of goods and gervioes, or the transmitting of funds or data, over an electronie network, primarily the internet. These business transactions occur either business-to-business, business-to” consumer, consumer-to-consumer or consumer-to-business. E-commerce is conducted using a vari icdtigh il i noes i sing a variety of applications, such as email, fax, online catalogs and shopping carts, Electronic Data Interchange (EDI), File Transfer Protocol, and Web services. Most of this is busi 5‘ if “ i i to-ute email and fer Eo ao aninese to business, with some companies atlemPiog tthes bani and fax for unsolicited ads (usually viewed as spam) to consumers a Tha : ‘ i as well as to send out e-newsletters to subscribers. ¢ bene e-commerce i i eee accel astueommerce include its around-the-clock availablity, the speed of Its perceived don aceton, Of Boods and services, accessibility, and international rem apa nasides include sometimes-limited customer service, not being able Shipping. | Pout Prior to purchase, and the necessitated wait time for produc! ‘Toonsure the security, pri auth chs the security, privacy and effectiveness of e-commerce, businesses b0U winess transactions, control access to resources such as webPase’ registered or selected users . 5 ben ‘8, enc) i i i ue Scanned with CamScanner ; LP. University-[BCA]-AB Publisher 2017-17 | Life Enhancing Services «Telematics Telematics is the blending of computers and wireless telecon ostensibly with the goal of efficiently conveying inform f business functions or government-related public se ymbine global positioning oadside wl mmunications tion over vast es, technologies, networks to improve a host o} The term has evolved to refer to automobile systems that co wMlite (GPS) tracking and other wireless communications for automatic re sistance and remote diagnostics. Major automakers are equipping new prototype yehicles with wireless-based services controlled by voice commands. This kind of telematics could enable motorists to perform a variety of wireless functions such as accessing the Internet, receiving or sending e-mail, downloading digital audio and video files, or obtaining “smart” transportation information, The technology of sending, receiving and storing information via telecommunication devices in conjunction with affecting control on remote objects * Entertainment * Multimedia Services + Bcare IV. Enterprise Service * Fleet Management * Sales Force Automation Q.7. (a) Write a program to add, subtract and multiply in WML. Ans. cale.wml is the basic file coded below to perform arithmetic operation: ‘st Amount:"/> ‘Operation:">

Value1:
Value: Result : br/>$(answer) ecept” label=“Result”> ‘cale, wmIs#operation(‘answe! ’,$(amount),'$(operator)’,$(amount2))"/> ‘ow, cale.wmls is the function file, means script which contains all the functions ss hichis needed in eale.wml tem function operation(result,val1,operate,val2) Scanned with CamScanner 18-2017 Sixth Semoator, Mobile Computing inwavall = vals 1 olso if(operatons’ MULT) ansevall * val i WMLMrow orvotVar(rosult ans); WML Browse : ' Q.7. db) What . . : v Known awa “deck”, Data in the deck is structured into ong Ans. AWML document or more “ards” (pages) ~ each of whieh repres YML docks nro stored on an ordinary wel s anal NIM type in addition to plain HTML and variants. The WML cards when requested b Wy a bridge (WAP gateway), which sits between Inobile devices and the World Wide Wob, passing payes from one to the other much like f proxy, Tho gateways send tho WML pages on ina form suitable for mobile device reception (WAT Binary XML). This process is hidden from the phone, so it may access the paye in the same way as a browser accesses HTML, using a URL (for example, http fexamplo.com/fun.vmb). (Provided the mobile phone operator has not specifically locked the phone to provent access of user-specified URLS.) WML, has a scaled-down set of procedural elements which can be used by the’ author to control navigation to other cards, Whon a WML page is accessed from a mobile phone, all the cards in the page are downlonded from the WAP the user goes to another card of the same deck, the mobile browser does not have to send any requests to the server since the file that contains the deck is already stored in the wireless device. __« You ean put links, text, images, input fields, option boxes and many other elements inneard, Example: scard id=“one” Litle="First Card’>

This is the first card in the deck

Cheeks if the value of left operand is (A> B) is not true, greater than the value of right operand, ifyes then condition becomes true. < Checks if the value of left operands less | (A= Checks if the value of left operand is (A >= B)is not true, greater than or equal to the value of right operand, if yes then condition becomes true. < Checks if the value of left operand is less _ | (A <= B)is true.) than or equal to the value of right operand, ifyes then condition becomes true. Logical Operators: There are following logical operators supported by WML Script language Assume variable A holds 10 and variable B holds 20 then: Operator Description and * Called Logical AND operator. Ifboth the operands are true then condition becomes true. or Called Logical OR Operator. Ifany of the two operands is non zero then condition becomes true, && Called Logical AND operator. If both the operands are non zero then condition becomes true, Called Logical OR Operator. Ifany of the two operands is non zero then condition becomes true, Called Logical NOT Operator, Use to i is fal: reverses the logical state of its operand, | “> &® B)is false Ifa condition is true then Logical NOT Example (A and B) is true. (Aor B) is true. (A && B) is true. (A 11 B)is true. operator will make false. Assignment Operators: There are following assi per following assignment operators Supported by WML Script language: oo Description Example = Simple assignment oj i il ssi? n perator, Assigns C=A+B will assift values fi i : : Bde op eot Ent side operands to ett value of A + Binto D assignment Operator. If i , It adds. 7 operand to the left operand and asa ce the result to left operand She? Me Scanned with CamScanner 0 is equivalem LP. University-{BCA]-AB Publisher 2017-21 7 Subtract AND assignment operator, It C~=Ais equivalent to I~ subtracts right operand from the left C=C-A operand and assign the result to left operand, i Multiply AND assignment operator, C *= Ais equivalent to It multiplies right operand with the C=C*A | left operand and assign the result to LL left operand fe Divide AND assignment operator, It C/= Ais equivalent to divides left operand with the right C=C/A operand and assign the result to left operand = Modulus AND assignment operator, C %= Ais equivalent to It takes modulus using two operands C=C%A and assign the result to left operand Conditional Operator There is one more oprator called conditional operator. This first evaluates an expression for a true or false value and then execute one of the two given statements depending upon the result of the evaluation. The conditioanl operator has this syntax: Operator | Description 2: | Conditional Expression Example If Condition is true ? Then value X: Otherwise value Y Q9. (a) Explain the access pragma and meta pragma with the help of example. (6) Ans. WML Script is a compiled language and uses Compilation Units and Pragmas. Acertain application-miay include separate scripts that were individually and independently compiled. A compilation unit can call functions that are defined in another tompilation unit. WMLScript uses pragmas to identify other compilation units that it uses, A pragma is a directive that generates special behavior from the compiler. All wragmas are optional, but if used must be preceded by the keyword use and appear at ‘be beginning of a compilation unit before any function declarations. Access Control Pragma: A WMLScript computation unit can protect its content ssing a special access control pragma, which is examined before any externally- &ined functions are executed, Acompilation unit may use only one access control pragma. The use access pragma written at the beginning of the WMLScript compilation unit. Forexample, use access domain “wap.acta.fi” path “/wap”; pragma is specified by the unique word access. The level of always checked before the function is executed. If the compilation unit the defined reserved words use access in front of the domain name(with the Slated domain) and/or a path(with reserved word path), the authority of the bea ot Unit that calls the pragma-protected function to execute the function will Thar before execution ty tax of access control pragma may be specified in any one of the ways: ye “88 domain An access control "tection is Stains Mea domain path; iferema: The second type of pragma.is the meta pragma. It communicates Recent play » Rents, ‘ers of the wireless communication: originating connection servers “lito; {Me name meta pragma request the originating servers for different . The ation Scanned with CamScanner \ 22-2017 Sixth Semester, Mobile Computing Meta pragmas convey information to different eens the WAP ratory, Compilation units may contain more than one meta pi . than meta pragma of the same type. Meta clement Name . User meta http equiv element Name “elementvalue” Use agent element Name elementvaluey ‘The second type of pragma is the meta pragma. It ommunicates b et e0n der players ofthe wireless communication: originating connection servers a hl ser agent ‘The name meta pragma request the originating servers for diffe ees formatiog Mota pragmas convey information to different entities in the WA Penton Compilation units may contain more than one meta pragma, but ane a pragma of the same type. meee Name information i intonded for origin servers, and may contain sug, information as copyright assignments. Network servers should not emit WMLSerist containing, and user agents should ignore, meta pragmas. For Example, fee use meta name “Created” “22-May-00"; http equiv information is used to control HTTP headers. It is used to spec HTTP header information between intermediating servers that transfer the compilation unit, For Example: use meta http equiv “keywords” “Script, Language”; User agent information is reserved for passing information to specific WAP use agents to implement WAP extensions, For Example: \ use meta user agent “Typo” “Test”; \.Q.9. (b) Explain the structure of Wireless Application Protocol, (63) Ans. Wireless Application Protocol(WAP) Architecture TheWAP protocol suite contains four protocols that are responsible for te communicatién between clients and WAP Gateways. As the protocols used on the Internet, these can be used in four different configurations: * Connectionless mode - only WSP and WDP on the sent datagrams, * Connectionless mode with security- additional e * Connection mode ~ additional use of WTP, acknowledged and may be retransmitted if lost, * Connection mode with security — additional eneryption by WTLS. Wireless Application Environment (WAE) Wireless Session Protocol (WSP) Wireless Transaction Protocol (WTP) Wireless ‘Transport Layer Security (WTLS) Wireless Datagram Protocol (WDP) Bearers are involved, no acknowledgements neryption by WTLS. now the datagram being sent mustle which gives reliable transmissions Scanned with CamScanner LP. University-[BCA]-AB Publisher 2017-23 as. When running WSP in connection mode, it will se a a n : i t up a session between the ing J Shrand the WAP Gateway. The session is assumed to be long-lived and ean be sesurnea ent are (© \fipeless Transaction Protocol (WIP):'The wireless transaction protocol (WTP) yngon top of a datagram service such as User Datagram Protocol (UDP), part af the jandard suite of TCPAP protocols, to provide a simplified protocol suitable foo hee int Jjgndwidth mobile devices, reliab gf tre ta, |eception of message. It makes su us an, they are lost. Messages are divided into three different cla: TE Doone nrtiable send with no resull.message — no retransmission ifthe sent message ne fis lost. : a iable send with no result message ~ retransmission if no acknowledgements ived. ey * Reliable send with reliable result message ~ the sender acknowledges the acknowledgement. ed acknowledgernent ore tries to optim: on itis nee you 21 ages his protocol the nee by providing the information that is ne ‘ive confirmation of del By stringing several sme together, t r fee) more quickly for what information is being communica ‘ansport Layer Security (WTL all cryptography- atures of WAP. WTLS handles ii autl tications by igital signing, and data integri Transport Layer Sec protowl Thi ayer can be subdivided into Handsha Handshake works somewhat similarly to the Transmi three way handshake, with the operation only. onfusing to information it vers, jon Control Protocol's ‘TCP, just request and response kind i) e Client (C1) (C1 Hello, Request Authentication of Server) Client (C1) (Si Hello and initiate certificate of exchange sends S1’'s certificate) Client (C1) (Cl Sends its (C1) <. {S1 Sends Hello Done, Data transfer starts) Client (C1) <. Cl Finished) ---> Server (S1) > Server (S1) wwre=eeeweennna—-> Server (S1) Certificate of authentication) aaeeneeennneeennnneennnne mene’ -> Server (S1) wwreeneen-ae> Server (SI) wesenecnenenenennnennnnenenennenenn Server (S1) aa > Server (SI) shake allows client and server to agree on the —— algorithm, ‘ndum values and exchange the nevessary eryptographic parameters. Tecan fi tify the security parameters and the handshake occurs w “with in between. : . : clo message containing the protoel version, set of eros and ‘on explaining how the client wants to encrypt the ene eee > hello message acknowledging the client, The server then initiates the ange process since the client asked for the server to authenticate itself eat hello message. The surver may ask the client to send its authentication ver. Then the server will send the hello done message along Scanned with CamScanner Sixth Semester, Mobile Computing data from the server then the yess the hello done with th t : responds with a finished message, Thjy tt ay and server may send and exchange enero DAWN Alor the elient rec fonds 0 finished mensaye and the server {he handahake iecompleted and the eli data Lo each other Hevord encryption and decryption operation of, s record protocol layer compresse, ayer takes care of th Inessage, When a messag to be transfe dala, encrypts iL and sends it to the other laye which does the transmission, se 4 way when Hi raeeived ik deerypts and decompresses the message hers’ fy nonding to the upper layers, me Wirelons Dataytram Protocol (WDP): WDP works as the transport layer of Ws f WDP processes dalagrams from vinper layers to formats required by different physicy data paths, beavers that may be for example GSM ‘SMS or CDMA Packet Data. Wop fidapled [ Lie bearers available in the device so upper layers don't need to care aby Lhe phyaical level, me Wh? aclually apecifies how various existing bearer service should be used provide naiatent service Lo the upper layers. nis is done by adapting the protocol, q the underlyinys bea F Hince different bearers have ‘ent features therefore some sections in the apweificntion are bigger or smaller han others, For instance, the section on IP bearer, |p is very short. As Wireless Datagram Protocol one must use the UDP protocol from the} tt TPrcldte. Chniidor the following diageam, bearer B4 is the example of showing how as WDP one muat use the UDP protocol from the IP-suite. H Se Wroless Datagram Protocol al a Bearer B1| BoarerB2 | BearerB3 | Bearer B4 Wy Adaption | Adaption Adaption Service al Bearer B3. w Service é Bewor B2 t Service a Bearer B14 Sorvico Physical Layer Air Link Adaption of WDP Wirelexs Markup Language (WML): The wireless markup language (WMMLDis WAP countor part to the hypertext markup language (HTML) on WWW. It is the pa dering Hinguaye twee for authoring services and is designed to fit small handés dovieen, Tike ITEM, WML ia also a tag-based language, but it has been designed fo Inmulwidth wirclonndovicos with limited input and output eapabilities. WML doeomet inate throny_h n “card-and-deck” metaphor. Acard is a single unit where inform wb to tho uwur oF tho wor can chooso to input some data, and a deck is 27° wel of cards, : WML. supports toxt and images, user inputs, navigation mechanism a! WMLSeript: WaiLSeripts can be used to enhance the functionality of just au for example JavnSeripts may bo utilized in HTML. It makes it poss! prucedural logic and computational functions to WAP based services. cs _, Wireless ‘Telephony Application (WTA): Tho wireless telephony appl (WTA) framework defines a sot of features to create telephony services: nd varia a ser ble to Scanned with CamScanner

You might also like