You are on page 1of 3
Total No of Pages: 02 ) B.TECH. FIFTH SEMESTER - 164 END SEMESTER EXAMINATION, DECEMBER-2021 syer™ Course Code: ITITC17 6 Course Title: Mobile Computing Time: 3:00 Hours Max. Marks: 40 Note: Attempt All the Five questions. Missing datalinformation if any nay be suitably assumed & mentioned in the answer, [QNo | Questions - £08 [Qi | Attempt any two parts of the follow! = cor 1a] What is Code Division Multiplexing? What was the 4 need of CDM technique? Compare CDM with TDM. and FDM. Tb | What is the effect of scattering and diffraction in 4 coz Signal Propagation? le | What is Dwell Time? Explain the concept of a COI, CO2 Frequency Hoping Spread Spectrum in Det Q2__| Attempt any two parts of the following 2a Draw the Protocol Architecture of GSM. Discuss the 4 col functioning of various layers in detail. 2b Draw the GSM mobile services reference model. How 4 col the GSM Bearer Services are.different from Tele Services. 2c | How the security is achieved in GSM. Explain the 4 cor process of Confidentiality in GSM. Q3__| Attempt any two parts of the following : 3a | Explain the GPRS Architecture in detail. What is the a COI, COs function of GPRS Tunnelling Protocol 3b Draw the UMTS core network diagram and F col, CO4 differemiate between different types of Hard and Soft Handover in UMTS in detail. 3e | What is Node B? What are the tasks of Radio Network 4 COI, CO4 Controller? Q4 | Attempt any two parts of the following 4a | Compare 4G and 5G technologies. Discuss 4 C03 ‘opportunities and requirements in 5G network. 4b | What are various components involved in Support and 4 C04, COS control in LTE architecture and how? 4¢ | Differentiate between FDD and TDD frames. 4 C03 structures. Q5 [Attempt any two parts of the following Sa | How the message transfer is done for DF WMAG-DCF a C04, COS using CSMA/CA. Explain how the problem of hidden node is solved in IEEE802.11 Sb Differentiate between piconet and scatternet. What are q COF the functions of baseband layer, discuss in detail? Se | What are the design goals of Mobile IP? Explain the 4 C04, COS working of Mobile IP in detail | Total No, of Name of Exami Pag Roll No. ('T) ViTI" Semester, May 2019 Mobile Computing arks:70 Paper No.: IT- 414 Max Marl Instruction to candidates: rite yo is 7 is question ee ur Roll No, on the top immediately on receipt of this au 2. AN i i! Asstime sot Sy equal marks. Attempt any FIVE of the following. Sime Suitable missing data, if any. ®) Draw and discuss the architecture of UMTS. Also listthe | 7 i: rain features of UMTS systems. tii Zs ) Explain about the concept of localization and calling in detail. Also discuss different types of handover in GSM. Differentiate between any TWO of the following: a) Proactive and Reactive routing 7x2 ») Hidden terminal and Exposed terminal problems ©) 4G LTE and YoLTE 8) What are Ad - Hoc networks? Discuss the advantages and| 7 disadvantages of these networks. Also explain how they Perform with respect to the security. ») Discuss the issues involved in the medium access in Ad- Hoc networks and also provide their solutions in these 'b) Define the parameters used to measure the performance networks, @) What is routing? Explain about Destination sequence distance vector (DSDV) routing in mobile Ad - Hoc networks. y of batteries. Discuss the power conservation techniques at various protocol layers. __ hitecture of IBEE 802.11. Also Heme een IEEE 802.112, 802.11b, | $0 12. 1In and 802.1 1ac? i 7 | 1) What eae ah? Where is it used? Also describe the | greneral format of packet and packet technology. 7 ee eae | «) List the different simulators avaiable for evaluating the Bee | performance of protocols designed for a network. 6 Explain at least one of them in detail. 7 b) Explain packet flow if two mobile nodes communicate and both are in foreign networks. What additional routes do packets take if reverse tunnelling is required? ete header in Bluetooth / | a) What are the different interframe spacing used in IEEE | | 802.11? Explain the working of DFWMAC-DCF with RTS/CTS extension with the help of an example. 7 | 7 b) List the different methods used for ISi mitigation. How does ISI depend on the carrier frequency, symbol rate, and movement of the sender/receiver? Discuss th of ISI on the TDM schemes? eefiect| 7 a a ed | Write short notes on any TWO of the followi wing: 8 a) MAC layer in Bluetooth, Z te ») IEEE 802.11 PHY frame format. c) Scatternet and Piconet

You might also like