Professional Documents
Culture Documents
Mid-I
1. What do you mean by hidden and exposed terminal?
The hidden node problem or hidden terminal problem occurs when a node can
communicate with a wireless access point (AP), but cannot directly communicate with other
nodes that are communicating with that AP.
The exposed node problem occurs when a node is prevented from sending packets to other
nodes due to a neighboring transmitter
3. What is WTP?
TDMA
FDMA
CDMA
Contention-based:
Reservation-based:
www.creativestellars.in
Mobile Computing -2 marks
Mid-I
5. Design Goals of WLAN’S?
The following are some of the goals which have to be achieved while designing WLANs:
Operational simplicity
Power-efficient operation
License-free operation
Tolerance to interference
Global usability
Security
Quality of service requirements
Compatibility with other technologies and applications
www.creativestellars.in
Mobile Computing -2 marks
Mid-I
Zone-based Hierarchical Link State Routing Protocol
Clusterhead Gateway Switch Routing Protocol
www.creativestellars.in
Mobile Computing -2 marks
Mid-I
Emergency services
CDPD(cellular digital packet data)
Stock InformationCollation/Control
Credit card verification
For LegalPurposes
For EstateAgents
EEE 802.11 refers to the set of standards that define communication for wireless LANs
(wireless local area networks, or WLANs). The technology behind 802.11 is branded to
consumers as Wi-Fi.
As the name implies, IEEE 802.11 is overseen by the IEEE, specifically the IEEE LAN/MAN
Standards Committee (IEEE 802). The current version of the standard is IEEE 802.11-2007.
In networks utilizing a proactive routing protocol, every node maintains one or more tables
representing the entire topology of the network. These tables are updated regularly in order
to maintain a up-to-date routing information from each node to every other node.
www.creativestellars.in
Mobile Computing -2 marks
Mid-I
Wireless application protocol (WAP) is a communications protocol that is used for wireless
data access through most mobile wireless networks. WAP enhances wireless specification
interoperability and facilitates instant connectivity between interactive wireless devices
(such as mobile phones) and the Internet.
WAP functions in an open application environment and may be created on any type of OS.
Mobile users prefer WAP because of its ability to efficiently deliver electronic information.
www.creativestellars.in
Mobile Computing -2 marks
Mid-I
without pre-coordination. The "listen before talk" operating procedure in IEEE 802.11 is the
most well known contention-based protocol.
Protocols that fall under this category do not maintain the network topology information.
They obtain the necessary path when it is required, by using a connection establishment
process. Hence these protocols do not exchange routing information periodically
www.creativestellars.in