Professional Documents
Culture Documents
MC 2marks V Units
MC 2marks V Units
UNIT- I
1. Define Mobile computing.
Mobile computing systems are computing systems that may be easily moved
physically and whose computing capabilities may be used while they are being moved.
Examples: laptops, personal digital assistants (PDAs), and mobile phones.
5. Define GSM
Global System for Mobile Communications was originally developed by the
European Institute for Research and Strategic Studies in
Telecommunication(EURESCOM) as an advanced communications technology, to
describe protocols for second generation (2G) digital cellular networks used by mobile
phones.
Call Waiting
- Notification of an incoming call while on the handset
Call Hold
- Put a caller on hold to take another call
Call Barring
- All calls, outgoing calls, or incoming calls
Call Forwarding
- Calls can be sent to various numbers defined by the user
Calling Line ID
- incoming telephone number displayed
Alternate Line Service
- one for personal calls
- one for business calls
Closed User Group
- call by dialing last for numbers
Advice of Charge
- tally of actual costs of phone calls
Fax & Data
- Virtual Office / Professional Office
Roaming
- services and features can follow customer from market to market.
-
8. List the Advantages of GSM
21.Define NMT
• NMT – Nordic Mobile Telephone System
• analog technology
• deployed in the Benelux countries and Russia
• operates in the 450 and 900 MHz band
• first technology to offer international roaming – only within the Nordic countries .
3. Explain ITU.
It is a United Nation affiliated organization that oversees global
telecommunication systems and standards.
4. Explain ETSI.
It is Europe’s premier telecom standards organization well known for its
development of future wireless networks. It is used for achieving seamless
communication for the global consumer through cooperation on technical developments.
37. What are the two key players in the wired-network middleware?
Two key players in the wired-network middleware market that provide support
for distributed users are,
Novell’s Netware and
Microsoft’s Remote Access.
The HTTP protocol is stateless, requiring that each request contain the browser's
capabilities.
For a given browser this information is the same for all requests. When the CSI
establishes a connection with its SSL it sends its capabilities only on the first
request.
This information is maintained by the SSI for the duration of the connection. The
SSI includes the capabilities as part of the HTTP request that it forwards to the
target server (in the wire line network).
UNIT - IV
1. Define transactions.
A set of operations that translate a database from one consistent state to another
consistent state,that is a computation processing is considered as a transaction or conventional
transaction if it satisfies ACID (Atomicity, Consistency, Isolation, and Durability) properties.
9. Define Co-transaction.
A co-transaction, on the other hand, reports its results in a way similar to reporting
transactions. But upon delegation, the transaction stops execution and is resumed from the point
it left off. For any pair of co-transactions either both commit or both abort.
19. What are the modes of server delivery in client/server data access?
The mode for server data delivery can be
i. server-push,
ii. client-pull,
iii. a hybrid of both.
Unit- 5
1. List all mobile computing models
The following models of computing in the mobile environment are currently being
researched and investigated:
Client/server
Client/proxy/server
Disconnected operation
Mobile agent
The thin client model
• Network
– fast*, reliable*, BER < 10-6, bounded delay variance
The server caching strategy may not work properly in this model because the majority of
the fixed network caching algorithms use call backs to invalidate the client cache
Since the client could be disconnected or temporarily inaccessible (during hand-offs for
example), the cache invalidation process could fail.
• Approach II:
– Provide a full client and a mobility agent that intercepts requests to the
unreachable server, emulates the server, buffers the requests, and transmit them
upon reconnection (Oracle Mobile Agents)