You are on page 1of 6

Mobile Computing -2 marks

Mid-I
1. What do you mean by hidden and exposed terminal?

The hidden node problem or hidden terminal problem occurs when a node can
communicate with a wireless access point (AP), but cannot directly communicate with other
nodes that are communicating with that AP.

The exposed node problem occurs when a node is prevented from sending packets to other
nodes due to a neighboring transmitter

2. Define the term mobile node.

A mobile node is an Internet-connected device whose location and point of attachment to


the Internet may frequently be changed. This kind of node is often a cellular telephone or
handheld or laptop computer, although a mobile node can also be a router. Special support
is required to maintain Internet connections for a mobile node as it moves from one
network or subnet to another, because traditional Internet routing assumes a device will
always have the same IP address.

3. What is WTP?

Wireless transaction protocol (WTP) is a standard used in mobile telephony. It is a layer of


the Wireless Application Protocol (WAP) that is intended to bring Internet access to mobile
phones. WTP provides functions similar to TCP,except that WTP has reduced amount of
information needed for each transaction

4. Compare medium access control protocols.

Schedule-based: Establish transmission schedules statically or dynamically

 TDMA
 FDMA
 CDMA

Contention-based:

 Let the stations contend for the channel


 Random access protocols

Reservation-based:

 Reservations made during a contention phase


 Size of packet in contention phase much smaller than a data packet

Space-division multiple access:

 Serve multiple users simultaneously by using directional antennas

www.creativestellars.in
Mobile Computing -2 marks
Mid-I
5. Design Goals of WLAN’S?

The following are some of the goals which have to be achieved while designing WLANs:

 Operational simplicity
 Power-efficient operation
 License-free operation
 Tolerance to interference
 Global usability
 Security
 Quality of service requirements
 Compatibility with other technologies and applications

6. Mention the different entities in Mobile IP

 Care of address (COA)


 Corresponded Node ( CN )
 Mobile Node
 Home Network
 Foreign Network
 Home Agent
 Foreign Agent

7. State the requirements of WAP

WAP ARCHITECTURE REQUIREMENTS

 Leverage existing standards whenever possible


 Define a layered and extensible architecture
 Support as many wireless networks as possible
 Provide support for secure applications and communication
 Optimize for efficient use of device resources

8. List out Table driven routing protocols available

 Dynamic Destination-Sequenced Distance-Vector Routing Protocol


 The Wireless Routing Protocol
 Global State Routing
 Fisheye State Routing
 Hierarchical State Routing

www.creativestellars.in
Mobile Computing -2 marks
Mid-I
 Zone-based Hierarchical Link State Routing Protocol
 Clusterhead Gateway Switch Routing Protocol

9. Compare the features of Bluetooth and HIPERLAN

10. What are four types of routing protocols?

 Routing Information Protocols(RIP)


 Interior Gateway Protocol (IGRP)
 Open Shortest Path First (OSPF)
 Exterior Gateway Protocol (EGP)
 Enhanced interior gateway routing protocol (EIGRP)
 Border Gateway Protocol (BGP)
 Intermediate System-to-Intermediate System (IS-IS)

11. Define mobile computing.

Mobile computing is human–computer interaction by which a computer is expected to be


transported during normal usage, which allows for transmission of data, voice and video.
Mobile computing involves mobile communication, mobile hardware, and mobile software.
Communication issues include ad hoc networks and infrastructure networks as well as
communication properties, protocols, data formats and concrete technologies. Hardware
includes mobile devices or device components

12. Write down three applications of mobile computing

www.creativestellars.in
Mobile Computing -2 marks
Mid-I
 Emergency services
 CDPD(cellular digital packet data)
 Stock InformationCollation/Control
 Credit card verification
 For LegalPurposes
 For EstateAgents

13. What is IEEE 802.11 standard?

EEE 802.11 refers to the set of standards that define communication for wireless LANs
(wireless local area networks, or WLANs). The technology behind 802.11 is branded to
consumers as Wi-Fi.

As the name implies, IEEE 802.11 is overseen by the IEEE, specifically the IEEE LAN/MAN
Standards Committee (IEEE 802). The current version of the standard is IEEE 802.11-2007.

14. What is mobile IP?

Mobile IP is an Internet Engineering Task Force (IETF) standard communications protocol


that is designed to allow mobile device users to move from one network to another while
maintaining their permanent IP address. Defined in Request for Comments (RFC) 2002,
Mobile IP is an enhancement of the Internet Protocol (IP) that adds mechanisms for
forwarding Internet traffic to mobile devices (known as mobile nodes) when they are
connecting through other than their home network.

15. Define Proactive routing protocols.

In networks utilizing a proactive routing protocol, every node maintains one or more tables
representing the entire topology of the network. These tables are updated regularly in order
to maintain a up-to-date routing information from each node to every other node.

To maintain the up-to-date routing information, topology information needs to be


exchanged between the nodes on a regular basis, leading to relatively high overhead on the
network. One the other hand, routes will always be available on request.

16. What is the need of mobile computing?

www.creativestellars.in
Mobile Computing -2 marks
Mid-I

17. Write in brief about WAP

Wireless application protocol (WAP) is a communications protocol that is used for wireless
data access through most mobile wireless networks. WAP enhances wireless specification
interoperability and facilitates instant connectivity between interactive wireless devices
(such as mobile phones) and the Internet.

WAP functions in an open application environment and may be created on any type of OS.
Mobile users prefer WAP because of its ability to efficiently deliver electronic information.

18. What is Adhoc networks?

An ad hoc network is a network that is composed of individual devices communicating with


each other directly. The term implies spontaneous or impromptu construction because
these networks often bypass the gatekeeping hardware or central access point such as a
router. Many ad hoc networks are local area networks where computers or other devices
are enabled to send data directly to one another rather than going through a centralized
access point.

19. Define contention based MAC protocols

A contention-based protocol (CBP) is a communications protocol for operating wireless


telecommunication equipment that allows many users to use the same radio channel

www.creativestellars.in
Mobile Computing -2 marks
Mid-I
without pre-coordination. The "listen before talk" operating procedure in IEEE 802.11 is the
most well known contention-based protocol.

 Random Access-Based Protocols


 The power aware multicast protocol
 IEEE 802.11-inspired Contention based protocol
 Time out MAC

20. What are the Reactive routing protocols?

Protocols that fall under this category do not maintain the network topology information.
They obtain the necessary path when it is required, by using a connection establishment
process. Hence these protocols do not exchange routing information periodically

 Dynamic Source Routing (DSR)


 Ad Hoc On-demand Distance Vector Routing

www.creativestellars.in

You might also like