0% found this document useful (0 votes)
32 views24 pages

Mobile Computing Overview and Concepts

The document provides an overview of mobile computing, covering its definition, advantages, limitations, and applications. It also discusses various mobile communication technologies, including MAC protocols and their types (SDMA, TDMA, FDMA, CDMA), as well as the architecture and services of GSM. Additionally, it outlines key concepts such as multiplexing, handover processes, and the components of mobile telecommunication systems.

Uploaded by

J.A.S SANTHOSH
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
32 views24 pages

Mobile Computing Overview and Concepts

The document provides an overview of mobile computing, covering its definition, advantages, limitations, and applications. It also discusses various mobile communication technologies, including MAC protocols and their types (SDMA, TDMA, FDMA, CDMA), as well as the architecture and services of GSM. Additionally, it outlines key concepts such as multiplexing, handover processes, and the components of mobile telecommunication systems.

Uploaded by

J.A.S SANTHOSH
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

CS1602 Mobile Computing Department of CSE 2023-2024

UNIT I INTRODUCTION
Introduction to Mobile Computing - Mobile Computing Vs Wireless networking - Applications of Mobile
Computing - Structure of Mobile Computing Applications - Generations of Mobile Communication
Technologies - MAC Protocols - Wireless MAC Issues – SDMA - TDMA- FDMA - CDMA.
PART A
1. What is mobile computing?
Mobile Computing is a technology that allows transmission of data, voice and video
via a computer or any other wireless enabled device without having to be connected to
a fixed physical link.
2. Distinguish between mobile computing and wireless networking. (May 17,22,23) (Nov 21)
Mobile computing Wireless networking
Mobile computing refers to computing devices that are Wireless refers to the method of
not restricted to a desktop. A mobile device may be a transferring, and a data source,
PDA, a smart phone or a web phone, a laptop such as an agency database
computer, or any one of numerous other devices that server, without a physical
allow the user to complete tasks without being connection.
tethered, or connected, to a network. Accessing
information and remote computational service while
on the move.
3. List the advantages of mobile computing. (May 16)
Location flexibility and saves time, Enhanced productivity, Ease of research, Entertainment.
4. What are the limitations of Mobile Computing?
 Insufficient bandwidth
 Security standards
 Power Consumption
 Transmission Interferences
 Potential health hazards
 Human interface with device.
5. List out the important applications of Mobile computing.
 Vehicles Emergencies
 Business
 Replacement of wired networks
 Infotainment and more
 Location dependent services
 Mobile and wireless devices
6. What is meant by SDMA?
Spatial Division Multiple Access (SDMA) is a channel access method used in
mobile communication systems which reuses the same set of cell phone frequencies in a
given service area.
7. What is meant by multiplexing?
Multiplexing is not only a fundamental mechanism in communication systems but also
in everyday life. Multiplexing describes how several users can share a medium with
minimum or no interference.

St. Joseph’s College of Engineering Page 1 of 24


CS1602 Mobile Computing Department of CSE 2023-2024
8. List out the characteristics of Mobile communications.
 Fixed and wired, Mobile and wired
 Fixed and wireless, Mobile and wireless
9. What are the different categories of mobile and wireless devices?
 Sensor, Pager, Mobile phones
 Embedded controllers, Pocket computer
 Personal digital assistant
 Notebook/laptop
10. What is meant by MAC Protocols?(May 23)
Medium Access Control (MAC) protocol is the first protocol layer above the Physical Layer in
Adhoc. When an IP packet reaches its destination (sub) network, the destination IP address (a
layer 3 or network layer concept) is resolved with the Address Resolution Protocol for IPv4,
or by Neighbor Discovery Protocol (IPv6) into the MAC address (a layer 2 concept) of the
destination host.
11. Write the three types of MAC protocol?
Fixed assignment scheme: resource required for a call is assigned for the entire duration of
the call. Random assignment scheme: reservation schemes are called packet switched
scheme. No reservations are made. ALOHA, Slotted ALOHA, CSMA, Carrier Sense
Multiple Access/ Collision Detection (CSMA/CD), CSMA Collision Avoidance
(CSMA/CA).
Reservation based scheme: a node makes explicit reservation of the channel for an entire call
before transmitting.
12. What are the categories of Fixed assignment MAC protocols? (Nov 13)
 Frequency Division Multiple Access (FDMA)
 Time Division Multiple Access (TDMA)
 Code division Multiple Access (CDMA)
13. What is meant by FDMA?
Frequency Division Multiple Access (FDMA) is a channel access method used in multiple-
access protocols as a channelization protocol. FDMA gives users an individual allocation
of one or several frequency bands, or channels. It is particularly commonplace in satellite
communication.
14. What are the different features of MAC Protocols? (May 22)
 It should implement some rules that help to enforce discipline when multiple
nodes contend for a shared channel.
 It should help maximize the utilization of the channel
 Channel allocation needs to be fair. It should be capable of supporting several
types of traffic having different maximum and average bit rates.
15. What is CDMA? (Nov 13)
Code Division Multiple Access (CDMA) is a channel access method used by various
radio communication technologies. CDMA is an example of multiple access, where
several transmitters can send information simultaneously over a single communication
channel. As the term implies, CDMA is a form of multiplexing, which allows numerous
signals to occupy a single transmission channel, optimizing the use of available
bandwidth. CDMA (Code Division Multiple Access) is a digital cellular technology that
allows multiple users to share the same frequency band simultaneously by using unique
codes to differentiate between different calls.
St. Joseph’s College of Engineering Page 2 of 24
CS1602 Mobile Computing Department of CSE 2023-2024
16. Define TDMA.
Time Division Multiple Access (TDMA) is a channel access method for shared medium
networks. It allows several users to share the same frequency channel by dividing the
signal into different time slots. The users transmit in rapid succession, one after the other,
each using its own time slot.
17. What is ALOHA?
Advocates of Linux Open-source Hawaii Association (ALOHA) refers to a simple
communications scheme in which each source (transmitter) in a network sends data
whenever there is a frame to send. If the frame successfully reaches the destination
(receiver), the next frame is sent. If the frame fails to be received at the destination, it is sent
again.
18. What is the difference between Infrastructure and Ad-hoc Modes? (Nov 21)
 Infrastructure mode- Devices on the network all communicate through a single
access point, which is generally the wireless router.
 Ad-hoc mode -– It is also known as ―peer-to-peer‖ mode. Ad-hoc networks don’t
require a centralized access point. The devices on the wireless network connect directly
to each other.
19. What is reservation based scheme?
It is by RTS/CTS scheme. A sender transmits a Ready To Send (RTS) packet to the
receiver before the actual data transmission. On receiving this, the receiver sends Clear to
send (CTS) packet and the actual data transfer commence only after that.
20. Spread spectrum is inherently secured than simple shift keying techniques. Justify this
statement. (May 21)
Firstly, the transmitted signal should be difficult to detect by an adversary/jammer, i.e.,
the signal should have a Low Probability of Intercept (LPI). Secondly, the signal should be
difficult to disturb with a jamming signal, i.e., the transmitted signal should possess an
Anti-Jamming (AJ) property.
21. Analyze the following scenarios in which mobile communication is involved and mobile
communication is not involved.
i) A person from a cell phone accesses a stationary server in his office that is in a wired
network.
ii) A person from one PC transfers a file to another person who is also working in a PC
using wired connection.
iii) A call is made from a land line phone to a mobile phone.
iv) Communication takes place between a pocket PC and a PDA. (May 21)
i)Possible ii)Not needed iii)Possible iv)Possible
22. Why “MAC protocol designed for infrastructure based wireless network may not work
satisfactory in infrastructure less environment”– Justify (Nov 21)
Yes, MAC protocol designed for infrastructure based wireless network may not work
satisfactory in infrastructure-less environment due to collision, hidden and exposed terminal
problem and mobility of nodes.
PART-B
1. What is mobile computing? Mention the characteristics and applications of mobile
computing.(May 17,22)
2. Explain the distinguishing features of various generations of Mobile Communication.(May
23)
St. Joseph’s College of Engineering Page 3 of 24
CS1602 Mobile Computing Department of CSE 2023-2024
3. Explain in detail about Wireless MAC Issues.
4. What is FDMA? Briefly explain its working and its important applications. (May 17)
5. What is TDMA, SDMA? Briefly explain its working and its important applications.
6. Explain the Mobile computing application.
7. Differentiate between FDMA, TDMA and CDMA.
8. What is MACA protocol? In which environment is it suitable? Briefly explain.
9. Apply mobile computing to design Taxi dispatcher and monitoring service. Explain
the components in detail. (May 18)
10. Explain the following
(i) Random Assignment Scheme (ii) Reservation Based Scheme (May 22)
11. Apply mobile computing to design Taxi dispatcher and monitoring service. Explain
the components in detail. (May 18)
12. Explain hidden and exposed terminal problem and near and far terminal problem with
an example.(Nov 21)(May 23)
13. i) Explain the various components of an FHSS based communication system. (May 21)
ii) Assume that two senders A and B want to send the data. CDMA assigns 010011 as the
key to A and 110101 as the key to B. A wants to send 1 and B wants to send 0. CDMA
codes 0 as – 1 and 1 as + 1. Explain the steps involved in the process of sending
and receiving.
(May 21)
14. i) Explain how the slots are reserved by the base station based on the demand received
from the mobile nodes using PRMA. (May 21)
ii) Assume that three stations A, B and C are deployed as follows. B is within the
transmission range of A and C and A and C are not within the transmission range.
Explain how collisions are avoided using MACA protocol. (May 21)
15. i) Explain different types of spread spectrum techniques used in cellular systems?
ii) Describe the three-tier structure of mobile computing application.(Nov 21)
UNIT-II MOBILE TELECOMMUNICATION SYSTEM
Introduction to Cellular Systems – GSM: Services & Architecture – Protocols – Connection Establishment –
Handover – Routing – Mobility Management – Security; GPRS- UMTS – Architecture – Handover –
Security.
PART-A
1. What is the frequency range of uplink, downlink in GSM network? (May 18)
GSM stands for Global System for Mobile Communications.
GSM 900 : Uplink – 890 – 915 MHz Downlink – 935 – 960 MHz.
GSM 1800: Uplink – 1710-1785MHz Downlink – 1805-1880 MHz
GSM 1900: Uplink – 1850-1910MHz, Downlink – 1930-1990
MHz
2. What are the different services offered by GSM? (May 14,23)
 Bearer services
 Tele Services
 Supplementary services.
3. What is transparent bearer service and non-transparent bearer services of GSM?
Transparent bearer services only use the functions of the physical layer to transmit data.
Non transparent bearer services use protocols of the layers 2 and 3 to implement error
correction and flow control.

St. Joseph’s College of Engineering Page 4 of 24


CS1602 Mobile Computing Department of CSE 2023-2024
4. What is voice oriented teleservices?
Global System for Mobile Communications (GSM) mainly focus on voice oriented
teleservices. These comprise encrypted voice transmission, message services and basic data
communication with terminals as known from the Public Switching Telephone Network
(PSTN) or Integrated Services Digital Network (ISDN).
5. What are the four possible handover in GSM? (Nov 14)
 Intra-cell hand over
 Inter cell, intra Base Station Controller (BSC) hand over
 Inter BSC, intra Mobile switching Centre (MSC) handover
 Inter MSC hand over
6. What are the supplementary services provided by GSM? (Nov 16)(May 22)
The supplementary services provided by GSM are
 User Identification,Call redirection
 Forwarding of original calls,Closed user groups
 Multi party communication
7. What are the reasons for the delay in a GSM system for packet data transfer?
 Different data rates provided by traffic channels are low
 Authentication and encryption makes the data transmission low
 Various interferences and noises from the channel also cause delay.
8. Define Base Station System Application Part (BSSAP).
Base Station System Application Part (BSSAP) is an enhancement of GSM's BSSAP. It is
used to transfer signaling information between the SGSN and the VLR.
9. Mention the GSM Subsystem.
A Global System for Mobile Communications (GSM) system consists of three subsystems
namely
 Radio Sub System (RSS): It comprises of radio specific entities Mobile Station (MS), Base
station subsystem (BSS), Base Transceiver Station (BTS), Base Station Controller (BSC).
 Network and Switching Subsystem (NSS): It connects wireless networks to standard
public networks. It consists of Mobile switching Centre (MSC), Home Location
Register (HLR), and Visitor Location Register (VLR).
 Operation Subsystem (OSS): It contains all functions necessary for network operation
and maintenance. It consists of Operation Maintenance Centre (OMC),
Authentication Centre (AuC), Equipment Identity Register (EIR).
10. What are Tele services provided by GSM? (May 17)
 Telephony
 Emergency number
 Short message service
 Enhanced message service
 Multimedia message service
 Group 3 fax
11. What are the reasons for the delay in a GSM system for packet data transfer?
 Different data rates provided by traffic channels are low
 Authentication and encryption makes the data transmission low
 Various interferences and noises from the channel also cause delay.
12. What are the different control channels possible in GSM?
Broadcast control channel, Common control channel, Dedicated control channel.

St. Joseph’s College of Engineering Page 5 of 24


CS1602 Mobile Computing Department of CSE 2023-2024
13. List the three important features of GSM security. (May 16)
The security services offered by Global System for Mobile Communications (GSM):
Access control and Authentication: To authenticate a valid user for the Subscriber Identity
Module (SIM). The user needs a secret Personal Identification Number (PIN) to access the SIM.
Confidentiality: After authentication, Base Transceiver Station (BTS) and Mobile Station
(MS) apply encryption to voice, data and signaling.
14. What are the main network elements?
Three major categories of network elements:
 GSM phase 1/2 core network elements—Mobile services Switching Center (MSC),
Visitor Location Register (VLR), Home Location Register (HLR), Authentication
Center (AuC), and Equipment Identity Register (EIR)
 GPRS network elements— Serving GPRS Support Node (SGSN) and Gateway
GPRS Support Node (GGSN)
 UMTS-specific network elements— User Equipment (UE) and UMTS Terrestrial
Radio Access Network (UTRAN) elements.
15. What is meant by GGSN, SGSN, and BSSGP?
 Serving GPRS Support Node (SGSN): It is similar to MSC of GSM network. Data
compression, Authentication of General Packet Radio Service (GPRS) subscribers,
routing of data to the corresponding GGSN, Mobility management, Traffic statistics
collections.
 Gateway GPRS Support Node (GGSN): GGSN is the gateway to external networks such
as Packet Data Network (PDN) or IP network. It does two main functions. It is similar
to Gateway Mobile Switching Centre (GMSC) of GSM network, Routes mobile
destined packet coming from external IP networks to the relevant SGSN within the
GPRS network, Routes packets originated from a user to the respective external IP
network.
 Base Station System GPRS Protocol (BSSGP: The BSSGP layer ensures the transmission of
upper-layer data i.e., Logical Link Control Protocol Data Unit (LLC PDUs) from the
BSS to the SGSN or from the SGSN to the Base station subsystem (BSS). It ensures the
transmission of Global Multimedia Mobility (GMM) signaling and Network
Management (NM) signaling.
16. State the advantages of UMTS.
Universal Mobile Telecommunications System (UMTS) is one of the emerging mobile
phone technologies known as third-generation, or 3G.
Third-generation systems are designed to include such traditional phone tasks as calls,
voice mail, and paging, but also new technology tasks such as Internet access, video, and
SMS, or text messaging. One of the main benefits of UMTS is its speed. This speed makes
possible the kind of streaming video that can support movie downloads and video
conferencing.
17. List the services of GPRS. (Nov 17)(May 22)
GPRS offers end-to-end packet-switched data transfer services into two types:
 Point-To-Point service (PTP): It is between two users and can either be connectionless
or connection-oriented.
 Point-To-Multipoint service (PTM): It is a data transfer service from one user
to multiple users.

St. Joseph’s College of Engineering Page 6 of 24


CS1602 Mobile Computing Department of CSE 2023-2024
18. List out the basic logical Channels of GSM.
Traffic CHannels (TCH): GSM uses a TCH to transmit user data (e.g., voice, fax).
Control CHannels (CCH): CCHs are used in a GSM system to control medium
access, allocation of traffic channels or mobility management.
19. What is mean by LLC?
Logical Link Control (LLC) provides a reliable logical link between Mobile Station (MS)
and its assigned SGSN. Its functionality includes sequence control, in-order delivery,
flow control, detection of errors, and retransmission Automatic Repeat reQuest (ARQ),
Encryption acknowledged and unacknowledged data transmission modes. It is
improved versions of the Link Access Protocol on D channel (LAPD).
20. What is Location Management?
Location management is concerned with the procedures that enable the system to know the
current location of a powered-on mobile station so that the incoming call routing can be
completed.
21. Define Cellular Communication.
Cellular communication is a form of communication technology that enables the
use of mobile phones. A mobile phone is a bidirectional radio that enables simultaneous
transmission and reception. Cellular communication is based on the geographic
division of the communication coverage area into cells, and within cells.
22. List out the generations of Cellular Communication Technology?
1G - Analog Transmissions 2G - Digital Transmissions
3G- Enhanced Multimedia and streaming video 4G - Support interact multimedia, voice,
video other broad band services.
23. Define Mobility Management.
The Mobility Management (MM) function handles the functions that arise from the
mobility of the subscriber: especially the roaming, the location management, and the
authentication of the subscriber.
24. A mobile service provider has been allotted a limited number of frequency bands.
However he wants to accommodate more customers. What is the technique to be applied by
him to achieve this? (May 21)
The supplementary service associated with the feature identifier is service provider
dependent and must be coordinated between the user and the service provider at
subscription time.
25. Which one of the following is correct?
i) GSM is a 2G and analog network ii) GSM is a 3G and digital network
iii) GSM is a 4G and analog network iv) GSM is a 2G and digital network. (May 21)
i)False
ii) True iii) True iv)True
26. Describe IMSI and TMSI. (Nov 21)
The IMSI number is assigned to the mobile user by the telecom service provider or
telecom carrier. This telephone number is stored on SIM card. It is 15-digit in size. This
number takes into account specific country codes in order to use international subscriber
service. TMSI identifier is assigned by VLR entity after GSM mobile station establishes
communication with the GSM network(i.e. Base station or BTS). T he network then
uses TMSI instead of IMSI during call processing and call management tasks. This
identifier is shorter compare to IMSI number.
St. Joseph’s College of Engineering Page 7 of 24
CS1602 Mobile Computing Department of CSE 2023-2024
27. In what way is GPRS better than GSM?(May 23)
GPRS provides a better user experience than GSM by offering
 Faster speeds
 Always-on connectivity
 Greater efficiency
More flexible billing options.
28. Distinguish between HLR and VLR. (Nov 21)
HLR VLR
Home Location Register(HLR) contains Visitor Location Register (VLR) is a
entries for each and every subscriber database that contains part of the data
(MSISDN) within a mobile network. available in the HLR and other dynamic
information about the mobile stations’
currently roaming in the administrative
areas of the associated VLR.
HLR contains static and permanent When a mobile station moves from one
information about a subscriber. Location Area to another their information
is updated in the VLR, so as to locate the
mobile stations.
PART –B
1. Describe in detailed about generations of Cellular Communication Technology.
2. Draw and explain the functions of GSM system architecture. Write in detail about the
various types of handover in GSM. (Nov 17)(May 22,23)
3. Write short notes on GSM protocol layers for signalling.
4. Explain the Localization, calling and handover in GSM. Also discuss the timeline
diagram of the Intra MSC handover. (May 18)
5. i) How security is implemented in GSM?
ii) Explain GSM Authentication and security. (Nov 16)
6. Draw and explain the GPRS and its protocol architecture. (May 17, 22) (Nov 21)
7. Explain in detail about UMTS architecture. (May 18,23) (Nov 21)
8. Explain detail about different classes of handover in UMTS.
9. Write Short notes on GSM Frequency allocation.
10. (i) What are the functions of authentication and encryption in GSM?
(ii) Explain in detail about the handovers of GSM (Nov 21)
11. i) Explain the various components of radio subsystem of GSM networks.
ii) Discuss the bearer services of GSM networks. (May 21)
12. i) Explain the GPRS architecture reference model with a neat diagram.
ii) Discuss the UTRA FDD mode with a neat diagram. (May 21)
13. Assume that you are going to design and implement a cellular network for Uthiramerur
Taluk which is full of small villages except few small towns. Discuss the ways in which
you’ll decide the number of cells, type of cells, handoff, frequency band allocation and call
blocking. Draw a rough diagram that conveys your design. You have to implement a
cellular network for T. Nagar in Chennai. Repeat all the activities what you had done for
Uthiramerur network for T.Nagar network also. (May 21, 23)

St. Joseph’s College of Engineering Page 8 of 24


CS1602 Mobile Computing Department of CSE 2023-2024
UNIT-III MOBILE NETWORK LAYER
Mobile IP – Features – Key Mechanisms –Route Optimization - DHCP – AdHoc– Proactive protocol-DSDV,
Reactive Routing Protocols – DSR, AODV, Hybrid routing –ZRP, Multicast Routing- ODMRP, Vehicular
Ad Hoc networks (VANET) –MANET Vs VANET – Security.
PART- A
1. What is meant by mobile IP?
Mobile IP communication protocol refers to the forwarding of Internet traffic with a fixed
IP address even outside the home network. It allows users having wireless or mobile
devices to use the Internet remotely.
2. What are the key mechanisms in mobile IP?
 Discovering the care of address
 Registering the care of address
 Tunnelling to the care of address.
3. List out the features of Mobile IP. (Nov 14)(May 22)
 Transparency : Mobile end system should continue to keep its IP address
 Compatibility : It should be compatible with existing internet protocol
 Scalability : It should be scalable to support billions of moving host worldwide.
 Security : provide users with secure communication over the internet
4. What is agent advertisement?
Foreign and the home agents advertise their presence through periodic agent
advertisement messages. An agent advertisement message, lists one or more care of address
and a flag indicating whether it is a home agent or a foreign agent.
5. Mention the types of address assignment policies used in DHCP. (May 14)
 Manual configuration – manager can configure a specific address for a specific
computer.
 Automatic configuration – Dynamic Host Configuration Protocol (DHCP)
server assigns permanent address when a computer first attaches to the network.
 Dynamic configuration – server loans an address to a computer for a limited time.
6. What are the different terminologies of mobile IP?
 Home Network
 Home address
 Foreign agent
 Foreign Network
 Mobile IP
7. What is meant by care of address and its types? (Nov 16)
It is the address that is used to identify the present location of the mobile node in the
foreign network. Its types are Foreign agent care and Co-located care of addresses.
8. Define Agent solicitation.
Mobile node does not receive any Certificate of Authenticity (COA), then the Mobile
Network (MN) should send an agent solicitation message. But it is important to monitor
that these agent solicitation message do not flood the network.
9. Define Home agent.
It is located in home network and it provides several services for the Mobile Network
(MN). Home agent maintains a location registry. The location registry keeps track of the
node locations using the current care of address of the mobile network.

St. Joseph’s College of Engineering Page 9 of 24


CS1602 Mobile Computing Department of CSE 2023-2024
10. What is VANET?
Vehicular Ad-hoc Network is a special type of Mobile Ad Hoc Network (MANET) in
which moving automobiles from the nodes of the network. Vehicle communicates with
other vehicles that are within a range about 100m to 300 mts.
11. What is DHCP? (May 16, 18)
The Dynamic Host Configuration Protocol (DHCP) is mainly used to simplify the
installation and maintenance of networked computers. If a new computer is connected to
a network, DHCP can provide it with all the necessary following information for full
system integration into the network, Addresses, the subnet mask, the domain name, IP
address.
12. What is encapsulation in mobile IP? (May 16, 23)
Tunnel: -establishes a virtual pipe for data packets between a tunnel entry and a tunnel
endpoint. Packets entering a tunnel are forwarded inside the tunnel and leave the tunnel
unchanged.
Tunnelling- sending a packet through a tunnel, is achieved by using encapsulation.
Encapsulation - mechanism of taking a packet consisting of packet header and data and
putting it into the data part of a new packet.
13. Write any two factors that affect the performance of ADHOC networking? (Nov 13)
Node speed, pause-time, network size, number of traffic sources, and type of routing
(source Versus distributed), that affect the performance of ad hoc networks.
14. What is the different operation of mobile IP?
The remote client sends a datagram to the Mobile Network (MN) using its home
address it reaches the home agent a usual. The home agent encapsulates the datagram in
a new packet and sends it to the foreign agent.
15. Write short notes on VANETs. (May 21)
VANET refers to a network created in an ad-hoc manner where different moving vehicles
and other connecting devices come in contact over a wireless medium and exchange
useful information to one another. A small network is created at the same moment with
the vehicles and other devices behaving as nodes in the network.
16. What is Route Optimization? (May 17)
The problem in packet forwarding is Triangular Routing i.e., sender sends all packets via
Home Agent to Mobile Node. This leads to higher latency and network load. For route
optimization in Mobile IP, sender learns the current location of Mobile Node and direct
tunnelling is made to this location.Home Agent informs a sender about the location of
Mobile Node called binding information about the Mobile Node, i.e., the current Foreign
Agent (FA) address of the Mobile Node. Now the sender encapsulates the packets and
establishes the tunnel to the Foreign Agent for transparent transmission.
17. What are LSPDB and its advantages?
A router in the network receives the link state advertisement; it stores the packet in a data
base called Link State Packet Data Base (LSPDB).Each router constructs the connectivity
information for the entire network as a graph using shortest path algorithm.

St. Joseph’s College of Engineering Page 10 of 24


CS1602 Mobile Computing Department of CSE 2023-2024
18. Write the basic characteristics of LSP.
 Every router construct a graph representing the connectivity between the various
nodes in the network based on the information received from other routers.
 The graph representing the network is usually constructed in the form of a tree
with local router forming the root of the tree.
 The graph captures the shortest path route from the root to any other router.
19. Write the contents of LSP advertisement message.
 The identity of the router originating message, Identity of its entire neighbors.
 The delay along various links to its neighbors, a unique sequence number, which is
formed by increasing the count every time the router forms a new link state
advertisement.
 This link state advertisement is then flooded throughout the network as follows: send
a copy of a state advertisement to all of its neighbours
20. What is routing and MANET routing?
 Routing: To find the best path between the source and destination for
forwarding packets in any store and forward network.
 Mobile Ad Hoc Network (MANET) Routing: Each node in an ad-hoc network
needs to have routing capability and also need s to participate in routing to keep
the network operational.
21. What is distance vector routing protocol?
The term vector means that routes are advertised as a vector such as distance direction.
Where distance the number of hops between the two nodes and direction is defined in
terms of the next hop router to which the packets need to be forward. It is based on
Bellman ford algorithm. Based on calculating the distance and direction to any router in a
network. The cost is calculated using various route metrics.
22. Write the three types of communication.
 Unicast: Message is sent to single destination
 Multicast: Message is sent to a selected subset of the network.
 Broadcast: Message is sent to all the nodes in the network
 Mobile Ad Hoc Network (MANET) can broadly be classified into unicast and
multicast types.
23. Mention the importance of DHCP in the context of mobile computing. (May 21)
A DHCP server dynamically assigns an IP address & other network configuration
parameters to each device on a network so they communicate with other IP networks. It
enhance of an older protocol called BOOTP. It is an important part of the DDI solution.
24. Write a classification of Unicast MANET routing protocol. (Nov 14)
The classification is based on how a protocol manages to determine the route correctly in
the presence of topology changes. They are proactive and reactive protocols
 Proactive: they are table driven routing protocol. It maintains information about
routes to every other node in the network. E.g. Destination Sequenced Distance
Vector (DSDV).
 Reactive protocols: On demand routing protocol. E.g. Dynamic Source Routing
(DSR), Adhoc On demand Distance Vector (AODV) routing.

St. Joseph’s College of Engineering Page 11 of 24


CS1602 Mobile Computing Department of CSE 2023-2024
25. What is destination sequenced distance vector Routing Protocol?
The DSDVRP maintains a routing table in which all of the possible destinations and
number of hops to each destination are recorded. Each node maintains information
regarding routes to all the known destinations. The routing information is updated
periodically. To maintain traffic overhead, each node maintains routes which they may
never use.
26. What is dynamic source routing?
It maintains a routing cache which contains the list of all routes that the node has learnt.
When a node finds a new route it adds the new route to its cache. Each mobile node also
maintains sequence counter called request id to uniquely identify the last request it
had generated. It works in two phase: i) Route discovery ii) Route maintenance.
27. List the characteristics of VANET. (May 16)
 Lack of fixed infrastructure, Dynamic Topologies
 The speed of the movement of a mobile device can vary with time of the day,
Bandwidth constrains such as fading, noise, interference, variable capacity links
 Energy constrained operation, increased vulnerability, Autonomous terminal,
Multi hop environment.
28. Write the characteristics of secure ad hoc networks.
 Availability: to service DOS attacks
 Confidentiality: preventing its access by unauthorized users
 Integrity: No transferred message has been tampered
 Authentication: True identification of a peer node
 Non repudiation: sent message cannot deny it
29. What do you mean by zone routing protocol? (Nov 13)
Zone Routing Protocol (ZRP) is a hybrid Wireless Networking routing protocol that uses
both proactive and reactive routing protocols when sending information over the
network. ZRP was designed to speed up delivery and reduce processing overhead by
selecting the most efficient type of protocol to use throughout the route.
30. Write the attacks on different Layers.
 Application Layer: Malicious code, repudiation, data corruption
 Transport Layer: session hijacking, Synchronous (SYN) flooding
 Network Layer:
Wormhole, black hole, fabrication attack
 Data Link Layer:
Resource consumption
 Physical layer:
Traffic analysis, monitoring, disruption
 Multilayer:
Disk Operating System (DOS), impersonation, replay
31. What are the primary goals of the WAP Forum efforts and how are they reflected in the
initial WAP protocol architecture? (Nov 21)
The goal of WAP is to create recommendations and specifications that support the
creation of advanced services on wireless devices, with particular emphasis on the mobile
telephone. The WAP Forum is creating recommendations and technologies which enable
these services on all mobile devices and on all networks.

St. Joseph’s College of Engineering Page 12 of 24


CS1602 Mobile Computing Department of CSE 2023-2024
32. Distinguish Proactive and Reactive protocols. (May 17, 22, 23)
Proactive protocols
a. Determine routes independent of traffic pattern
b. Traditional link-state and distance-vector routing protocols are proactive
c. Examples:
i. DSDV (Dynamic Sequenced Distance-Vector)
ii. OLSR (Optimized Link State Routing)
Reactive protocols
a. Maintain routes only if needed
b. Examples:
i. DSR (Dynamic Source Routing)
ii. AODV (Adhoc On-demand Distance Vector)
33. Compare AODV and DSR protocols. (Nov 17)
Ad-hoc On-demand Distance Vector (AODV) routing protocol is a reactive protocol even
though it still uses characteristics of a proactive protocol. AODV uses the concept of route
discovery and route maintenance of Dynamic Source Routing (DSR) and the concept of
sequence number’s and sending of periodic beacon’s from DSDV.
AODV uses three types of control messages: Route REQuest (RREQ), Route REPly (RREP)
and Route ERRor (RERR) messages. The feature of DSR is source routing. The source or
the sender knows the complete hop-by-hop route to the destination. These routes are
stored in route cache. It uses a route discovery process to dynamically determine the
unknown route. It does not use periodic hello message unlike AODV. RREQ and RRER
message is used to discover the route.
34. What is triangular routing? (Nov 21)
Triangular routing is a method for transmitting packets of data in communications
networks. It uses a form of routing that sends a packet to a proxy system before
transmission to the intended destination. Triangular routing is a problem in mobile IP,
however it finds applications in other networking situations, for example to avoid
problems associated with network address translation (NAT), implemented for example
by Skype.
PART- B
1. List the requirements for Mobile IP. (Nov 14)
2. Explain in detail about overview of the operation and features of mobile IP.
3. Discuss in detail about three mechanisms in mobile IP. (May 18)
4. (i) With a diagram explain DHCP and its protocol architecture.(May 16,22)
(ii) Explain the agent discovery process in mobile-IP .(May 18,22)
5. With a neat diagram explain how packet delivery to and from a mobile node is
transferred in Mobile IP. (Nov 17)
6. What is encapsulation? Explain in detail the various encapsulation techniques in
mobile IP.(May 17)
7. Write short notes on Distance Vector protocol.
8. Explain in detail about proactive routing protocol with example. (Nov 14)
9. Explain about Dynamic source routing protocol/Discuss route discovery and
route maintenance mechanisms in DSR with illustrations. List its merits and demerits.
(May 18,22,23)(Nov 21)
St. Joseph’s College of Engineering Page 13 of 24
CS1602 Mobile Computing Department of CSE 2023-2024
10. Explain the following: (i) AODV (ii) Zone routing (iii) Multicast routing (Nov 16)
11. i) Draw and explain the architecture of VANET. (May 18,23) ii)Explain the various
security and attacks on VANET. (May 16)
12. Explain in detail about security issues in MANET
13. Explain in detail about the attacks in MANET of various layers
14. What are reactive and proactive protocols & its advantages and disadvantages? (Nov 16)
15. i) Explain DSR protocol with a sample topology. ii) Discuss the suitability of DSR in terms
of density of nodes, total number of nodes pattern of communication and end to end
delay. (May 21)
16. i) Explain ZRP with a sample topology. ii) Explain the reasons why a pure proactive or
a pure reactive protocol is not suitable for certain scenarios with suitable examples. (May 21)
17. Explain the factors that make mobile ad-hoc networks more vulnerable to security attacks
compared to the traditional networks. Also explain the major types of security attacks that
are possible in a mobile ad-hoc network. How can each of these types of attacks be
overcome? (May 22)
18. i) Explain packet flow if two mobile nodes communicate and both are in foreign
networks. What additional routes do packets take if reverse tunneling is required?
ii) What is the basic purpose of DHCP? Name the entities of DHCP. How can
DHCP be used for mobility and support of mobile IP? (Nov 21)
19. i) Think of ad-hoc networks with fast moving nodes, e.g., cars in a city. What
problems arise even for the routing algorithms adapted to ad-hoc networks? How
is the situation changed on highways?

Connected nodes are in transmission range and can forward messages along the edges. For
routing, DSR should be used. The caches of all nodes are empty. Now, D wants to send some
packets to H. Give the sequence of messages exchanged for finding a path
(also the ―unnecessary‖ messages). For each message, describe sender, receiver, and the list
of used nodes as written in the header by the routing protocol. Assume that
the paths are symmetrically. What happens if the connection between E and G breaks
down?
UNIT - IV MOBILE TRANSPORT AND APPLICATION LAYER
Mobile TCP– WAP – Architecture – WDP – WTLS – WTP –WSP – WAE – WTA Architecture – WML –
WAP 2.0.
PART- A
1. What are the service primitives offered by Wireless Transaction Protocol (WTP)?(May 22,23)
 TR-Invoke to initiate a new transaction
 TR-Result to send back the result of a previously initiated transaction
 TR-Abort to abort an existing transaction

St. Joseph’s College of Engineering Page 14 of 24


CS1602 Mobile Computing Department of CSE 2023-2024
2. What is the goal of M-TCP? (Nov 11)
 The goal of M-TCP is to prevent the sender window from shrinking if bit
errors or disconnection but not congestion cause current problems. It wants
 To provide overall throughput
 To lower the delay
 To maintain end-to-end semantics of TCP and to provide a more efficient handover.
3. What is persistent mode in M-TCP?
 The SH monitors all packets send to the MH and ACKs from the MH. If the SH
does not receive an ACK for some time, it assumes that the MH is disconnected.
 It then chokes the sender by setting the sender’s window size to zero. (i.e.) forces the
sender to go into persistent mode, i.e. the state of a sender will not change. This
means that the sender will not try to retransmit data.
 As soon as the SH detects the connectivity again, it reopens the window of the sender
to the old value. Thus the sender can continue sending at full speed.
4. What are the Advantages and Disadvantages of Mobile TCP?
Advantages
 M-TCP maintains the TCP end-to-end semantics. The SH does not send any ACK
itself but forwards the ACKs from the MN.
 If the MN is disconnected, M-TCP avoids useless retransmissions, slow starts or
breaking connections by simply shrinking the sender’s window to zero.
 Since M-TCP does not buffer data in the SH as I-TCP does, it does not necessary to
forward buffers to a new SH. Lost packets will be automatically retransmitted to the
new SH.
Disadvantages
 As the SH does not act as proxy as in I-TCP, packet loss on the wireless link due to
bit errors is propagated to the sender. M-TCP assumes low bit error rats, which is
not always a valid assumption.
 A modified TCP on the wireless link not only requires modifications to the MN
protocol software but also new network elements like the bandwidth manager.
5. What is the purpose of WAP?
 Wireless Application Protocol (WAP) is an open international standard for
accessing web in wireless environment.
 The purpose of WAP is to facilitate browsing and use the wired Internet such that
it is protocol independence.
 WAP provides a powerful framework for mobile applications to offer interactive
data services and interactivity support Internet and Web.
 WAP defines an industry-wide specification for developing service applications.

6. What is mean by WML?


Wireless Markup Language is based on the standard HTML known from the www
and on Handheld Device Markup Language (HDML). WML is specified as an XML
document type.

St. Joseph’s College of Engineering Page 15 of 24


CS1602 Mobile Computing Department of CSE 2023-2024
7. What are the features offered by WSP/B?
In addition to the general features of Wireless Session Protocol (WSP) , WSP/B offers
the following features adapted to web browsing:
 HTTP/1.1 functionality
 Exchange of session headers
 Push and pull data transfer
 Asynchronous requests
8. What is the use of WAP gateway?(May 22)
 WAP Gateway does protocol conversions between two ends—mobile client device and
HTTP server. It has caches which is required due to frequent disconnections in the
wireless environment. The gateway ensures security in wireless and wired networks.
 The gateway performs is Intra Web Markup Language (IWML) Script compilation
and convert to Common Gateway Interface (CGI) scripts for HTTP server.

9. What is WBXML?
Wireless Application Protocol (WAP) Binary eXtensible Markup Language (WBXML) is a
specification in binary representation so that XML-based language can be transmitted in
compact format. Here, a binary number can represent a tag in place of characters and an
attribute in place of characters. E.g., attribute ID that needs two characters can be
represented by a single byte. Hence, the binary format causes compact transmission.
10. What are the advantages of WTP?
WTP offers several advantages to higher layers, including an improved reliability over
datagram services, improved efficiency over connection-oriented services and support
for transaction-oriented services such as web browsing.
11. List the various WAP Protocols.
 WAE (Wireless Application Environment)
 WSP (Wireless Session Protocol)
 WTP (Wireless Transaction Protocol)
 WTLS (Wireless Transport Layer Security)
 WDP (Wireless Datagram Protocol)
12. What is WSP?
Wireless Session Protocol (WSP) has been designed to operate on top of the datagram
service Wireless Datagram Protocol (WDP) or the transaction service Wireless Transaction
Protocol (WTP). It provides a shared state between a client and a server to optimize content
transfer.
13. Define WDP.
Wireless Datagram Protocol (WDP) works as the transport layer of WAP. WDP processes
datagrams from upper layers to formats required by different physical data paths, bearers
that may be for example GSM SMS or CDMA Packet Data. WDP is adapted to the bearers
available in the device so upper layers don't need to care about the physical level.

St. Joseph’s College of Engineering Page 16 of 24


CS1602 Mobile Computing Department of CSE 2023-2024
14. What do you mean by MMS?
Multimedia Messaging Service (MMS) transfers asynchronous multi-media content. MMS
supports different media types such as JPEG, GIF, text and AMR coded audio. There
is no fixed upper bound for the message size. Depending on the network operator
and device capabilities typical sizes are 30-100 Kbytes.
15. How is reliability achieved in WTP?
Wireless Transaction Protocol (WTP) achieves reliability using duplicate removal,
retransmission, acknowledgements and unique transaction identifiers.
16. What is the function of transport layer in WAP?
The transport layer offers a bearer independent, consistent datagram-oriented service to
the higher layers of the WAP architecture. Communication is done transparently over one
of the available bearer services.
17. What is the use of WCMP?
Wireless Control Message Protocol (WCMP) provides error handling mechanisms for
Wireless Datagram Protocol (WDP). WCMP is used for diagnostic and informational
purposes. It is used by WDP nodes and gateways to report errors.
18. What are the features offered by WSP?
WSP offers certain features for content exchange between cooperating clients and servers:
i) Session management ii) Capability negotiation iii) Content encoding.
19. What is meant by WML?
Wireless Markup Language (WML) is based on the standard HTML known from the
www and on Handheld Device Markup Language (HDML). WML is specified as an
XML document type. WML follows a deck and card metaphor.
20. What are the capabilities of WML Script?
WML Script offer several capabilities:
 Validity check of user input, Access to device facilities
 Local user interaction, Extension to the device software
21. What is the function of a WAP gateway? (May 21)
A WAP gateway sits between mobile devices using the Wireless Application Protocol
(WAP) and the World Wide Web, passing pages from one to the other much like a proxy.
This translates pages into a form suitable for the mobiles, for instance using the Wireless
Mark-up Language.
22. What problems of HTTP can WSP solve? Why are these solutions especially needed in
wireless mobile environments? (Nov 21)
WSP offers session management, capability negotiation, push and pull, asynchronous
request, and efficient content encoding. Some of these features also come with HTTP/1.1.
However, in mobile and wireless environments efficient coding directly results in cheaper
web usage.
23. Define WTA.
Wireless Telephony Application (WTA) is a collection of telephony specific extensions for
call and feature control mechanisms, merging data networks and voice networks.

St. Joseph’s College of Engineering Page 17 of 24


CS1602 Mobile Computing Department of CSE 2023-2024
24. Define XHTML.
Extensible Hyper Text Mark-up Language (XHTML) developed by the w3c to replace and
enhance the currently used HTML. Since XHTML is more stringent in syntax and context-
sensitivity than HTML, it is much more important to build the code properly. Unlike
HTML, which includes a lenient HTML-specific parser, XHTML files are well-formed
and interpreted using standard XML parsers.
25. What are the possible reasons for the loss of packets in mobile networks? (May 21)
 Network Congestion.
 Problems with Network Hardware.
 Software Bugs.
 Overloaded Devices.
 Security Threats and inadequate infrastructure for handling packet loss.
 Network Performance Monitor.
26. Write a sample code for performing WML validations.
Sample code
import wmlvalidator
wml_doc = """
<?xml version="1.0"?>
<!DOCTYPE wml PUBLIC "-//WAPFORUM//DTD WML 1.3//EN"
"http://www.wapforum.org/DTD/wml13.dtd">
<wml>
<card id="greeting" title="Greetings">
<p>Hello World!</p>
</card>
</wml>
validator = wmlvalidator.WmlValidator()
# Validate the WML document
validation_result = validator.validate(wml_doc)
# Check the validation result
if validation_result.is_valid:
print("WML document is valid.")
else:
print("WML document is invalid.")
for error in validation_result.errors:
print("Validation error: {}".format(error.message))
PART-B
1. Explain Mobile TCP(M-TCP) and its advantages with the help of a suitable
schematic diagram.(May 22, 23)
2. Explain in detail the WAP architecture with suitable diagram.(Nov 21)(May 22)
3. Explain in detail the various classes in Wireless transaction protocol
4. Explain briefly WSP/B over WTP.
5. With a neat architecture diagram explain Wireless telephony application

St. Joseph’s College of Engineering Page 18 of 24


CS1602 Mobile Computing Department of CSE 2023-2024
6. i) Discuss the limitations of traditional TCP in the context of mobile networks. (May 21)
ii) Explain end to end semantics of the transport layer. Discuss how end to end
semantics. (May 21)
7. Explain briefly Wireless Markup Language and its features.
8. Explain Wireless application environment with diagram.
9. i) Explain Wireless Datagram Protocol (WDP) of WAP stack. ii) Write a WML script that
asks the user to enter his name and age. Write validation function(s) that ensure that name
has only alphabets and age has only numeric. (May 21, 23)
10. An University decides to go for a campus wide network to provide the Internet
connectivity using WiFi hotspots. Discuss the various factors to be considered like number
of hotspots required, key locations in which the hotspots are to installed, connecting
hotspots to the Internet Service Provider of the university. Draw a sketch that conveys
your design. (May 21)
11. Explain the architecture of WAP 2.0.
12. Explain WAP push architecture with proxy gateway.
13. Write briefly I-mode, SyncML.
14. i) How does Indirect TCP work? Discuss its advantages and disadvantages.
ii) Explain Transaction-oriented TCP with example. (Nov 21)
15. What is the reaction of standard TCP in case of packet loss? In what situation does this
reaction make sense and why is it quite often problematic in the case of wireless networks
and mobility? (May 22)
UNIT - V MOBILE PLATFORMS AND APPLICATIONS
Mobile Device Operating Systems – Special Constraints & Requirements – Commercial Mobile Operating
Systems – Software Development Kit: iOS, Android, Windows Phone – M-Commerce – Structure – Pros &
Cons – Mobile Payment System – Security Issues.
PART- A
1. What is Mobile OS?
The OS of mobile device is to facilitate efficient utilization of the resources of the device
by performing multiple tasks. It manages processor, memory, files, and attached devices
such as camera, speaker, keyboard, and screen.
2. What are the problems in Monolithic Kernel design
The traditional OS such as UNIX, Windows are known to have monolithic kernel design.
It makes the kernel massive, non-modular, hard to tailor, maintain, extend, and configure.
3. Give four examples of mobile OS. (May 16,22,23)
 Windows mobile: Graphics/windows/event manager handles all input and output
 IOS : Contextual OS - iOS is Apple’s mobile operating system that powers the
iPhone, iPad and iPod Touch.
 Android OS:
Code is structured into four different layers
 Blackberry OS:
High level of security.

St. Joseph’s College of Engineering Page 19 of 24


CS1602 Mobile Computing Department of CSE 2023-2024
4. What is micro kernel?
Microkernel tries to minimize the size of the kernel code.Only the basic hardware
dependent functionalities and a few critical functionalities are implemented in a kernel
mode and all other functionalities are implemented in the user mode. It is easier to
port, extend, and maintain OS code.
5. List the special constraints under which the mobile device needs to operate? (Nov 17) /
What are the special constraints and requirements of Mobile OS (Nov 21)(May 18)
 Limited memory: Less permanent and volatile storage
 Limited screen Size: Limits the size of the display screen.
 Miniature Keyboard: typing in the document and entering the string commands is
difficult
 Limited processing Power: Application Resource Manager (ARM) based processor
with restricted processor power, storage, and battery power.
6. Give example for mobile OS and its features.
 Windows mobile: Graphics/windows/event manager handles all input and output
 Palm OS: It is single tasking operating system.
 Symbian OS: Real time multitasking,pre-emptive,32 bit operating system
 IOS: contextual OS
 Android OS: Code is structured into four different layers
 Blackberry OS: High level of security
7. What is HDML?
Handheld Device Mark-up Language (HDML) consist of many cards. An advantage of
the card and deck model in the context of mobile networks is that a click on a web page
causes downloading of the entire deck associated with the web page on to the mobile
device. This reduces latency of access.
8. List out the protocols used in WAP.
 Application Layer: WAE ( Wireless Application Environment)
 Session Layer: WSP ( Wireless Session Protocol)
 Transaction layer: WTP ( Wireless Transaction Protocol)
 Security Layer: WTLS ( Wireless Transport Layer Security)
 Transport Layer: WDP ( Wireless Datagram Protocol)
 Network Layer: Bearer interfaces.
9. What is Android SDK?
The Android Software Development Kit (SDK) is a set of development tools used to
develop applications for Android platform. The Android SDK includes the following:
Required libraries.
10. Write the important capabilities of J2ME programs.
 Opening UDP connections between two device
 Establishing HTTP connections with a server
 Making socket connections
 Bluetooth programming
 Barcode scanning

St. Joseph’s College of Engineering Page 20 of 24


CS1602 Mobile Computing Department of CSE 2023-2024
11. What are the two configurations of J2ME?
 Connected limited device configuration for handheld devices: Low range of
consumer electronic device using 16-32 bit small computing device.eg device .eg
pager, cell phones
 Connected device configuration for plug in device: Higher end device e.g. Set top
box, smart phones.
12. List out the applications of M Commerce.
 Business to Consumer application: advertising, shopping comparison, mobile
ticketing, Information about a product, interactive advertisement and catalogue
shopping.
 Business to Business: ordering and delivery confirmation, stock tracking and
control, supply chain management, Mobile inventory management
13. What do you meant by Broadcast receivers?
Simply respond to broadcast messages from other applications or from the system itself.
These messages are sometime called events or intents. For example, applications can also
initiate broadcasts to let other applications know that some data has been downloaded to
the device and is available for them to use, so this is broadcast receiver who will
intercept this communication and will initiate appropriate action.
14. What are the key components of android architecture?
Activities They dictate the UI and handle the user interaction to the
smart phone screen
Services They handle background processing associated with an
application.
Broadcast Receivers They handle communication between Android OS and
applications.
Content Providers They handle data and database management issues.
15. What is the use of log message in android?
The Android logging system provides a mechanism for collecting and viewing system
debug output. Log cat dumps a log of system messages, which include things such as
stack traces when the emulator throws an error and messages that you have written from
your application by using the Log class.
16. Give the important Android API’s.
 Android Graphics, Android media,
 Android opengl,
 Android telephony, Android widget
17. What is the use of Content providers?
Content providers are used for reading and writing data that are either private to an
application or shared across applications. By using the content provider, an application
can query or modify the stored data.
18. What is M- commerce? (May 16)
It carries out any activity related to buying and selling of commodities, services or
information using the mobile handheld device. It is how payment can be made securely
and rapidly as soon as a buyer decides to make a purchase

St. Joseph’s College of Engineering Page 21 of 24


CS1602 Mobile Computing Department of CSE 2023-2024
19. What are the different android broadcast classes?
 Normal broadcasts (sent with Context.sendBroadcast) are completely asynchronous. All
receivers of the broadcast are run in an undefined order, often at the same time. This
is more efficient, but means that receivers cannot use the result or abort APIs included
here.
 Ordered broadcasts (sent with Context.sendOrderedBroadcast) are delivered to one
receiver at a time. As each receiver executes in turn, it can propagate a result to the
next receiver, or it can completely abort the broadcast so that it won't be passed to other
receivers.
20. Define MIDP.
 The Mobile Information Device Profile (MIDP) is a key element of the Java 2
Platform, Mobile Edition (J2ME).
 When combined with the Connected Limited Device Configuration (CLDC),
MIDP provides a standard Java runtime environment for today's most popular mobile
information devices, such as cell phones and mainstream Personal Digital Assistants.
21. Write the structure of mobile commerce.
Content provider implements an application by providing two sets of programs
 Client side: Run on micro browser installed on the users mobile device
 Server side: Performing database access and computation reside on the host computer.
22. Define POS? (Nov 16)
The Point Of Sale (POS) or Point Of Purchase (POP) is the time and place where a
retail transaction is completed. At the point of sale, the merchant would calculate the amount
owed by the customer and indicate the amount, and may prepare an invoice for the customer
(which may be a cash register printout), and indicate the options for the customer to make
payment.
23. Mention the major protocols involved in mobile payment systems. (May 21)
 Mobile browser-based payments,In-app mobile payments
 Mobile or wireless credit card readers
 Contactless mobile payments or mobile wallets
24. List out the Pros and Cons of M-commerce. (May 17)
Advantages:
 For the business organization the benefits of using M commerce includes
customer convenient, cost saving and new business opportunities
 It provides flexibility, Anywhere any time shopping using a light weight device
 Mobile device can be highly personalized. They provide additional level of
convenience to the customer.
Disadvantages:
 Do not generously offer graphics or processing power of the PC
 The small screen of the mobile devices limit the complexity of applications
 Underlying network may impose severer types of restrictions and Security.
25. What are the different features of SDK
 A client program which runs on the developer’s machine.
 A daemon program which runs as a process on each emulator or device instance.
 A server program which runs as a background process on the host machine

St. Joseph’s College of Engineering Page 22 of 24


CS1602 Mobile Computing Department of CSE 2023-2024
26. What are the advantages and disadvantages of BlackBerry OS? (Nov 17)
Advantages
Secure send and receive email using proprietary encryption, Multi-tasking and phones
available form most service Providers.

Disadvantages
Closed architecture, limited number of devices to choose from, limited number of
applications available, Application development is more complex and difficult than any
other OS.
Applications tend to be more costly.
27. Differentiate E-Commerce and M-Commerce. (Nov 16) (May 23)
E-Commerce M-Commerce
E-commerce stands for Electronic Commerce M-commerce stands for Mobile
wherein business transactions are done over the Commerce wherein commercial
Internet. Usually transactions are done using a transactions are done using cellular or
computer or a laptop. mobile phones that have access to the
Internet.
Devices used in E-Commerce are Desktops Devices used in M-Commerce are
and Laptops mobile phones, PDAs, Tablets etc.
E-commerce devices are not easy to carry and M-commerce devices are easy to carry
portability point of view it is not so good. and portability point of view it is good.
Its reachability is comparatively low than the Its reachability is more than that of
m- commerce as it is not so good in portability. e- commerce only due to the use of
mobile devices.
Examples of E-commerce include Amazon, Examples of M-commerce includes
Flipkart, Quikr, Olx websites. mobile Banking like paytm, in-app
purchasing Amazon mobile app.
28. What is writing once run everywhere?
Java 2 Micro Edition (J2ME) is meant for tiny devices such as mobile phones which
include a miniature version of Java Virtual Machine (JVM) called Kernel Virtual Machine
(KVM) which can run small java programs on mobile device.
29. Explain the Pros and Cons of M-Commerce. (Nov 21)
Pros of M-Commerce
 It creates a global customer base.
 It opens up rural markets. It provides easier inventory management.
 It allows you to scale a business very quickly.
 It offers a platform which encourages impulse purchases.

Cons of M-Commerce
 It requires technology access.
 It offers a lack of personal touch.
 It requires the app or website to be working.
 It requires you to ship products to consumers.

St. Joseph’s College of Engineering Page 23 of 24


CS1602 Mobile Computing Department of CSE 2023-2024
30. Differentiate native apps and web apps. (May 21,22)
Native Apps Web Apps
Mobile apps are developed for a Web Apps are accessed via the
specific platform, such as iOS for the Apple internet browser and will function
iPhone or Android. according to the device you’re viewing
them on
Mobile apps may work offline. In order to run web apps need an active
internet connection.
In order to run web apps need an active
Mobile apps may work offline. internet connection.
Native apps have more safety and security. Web apps have low security.
PART-B
1. Explain monolithic design versus microkernel design of an operating system.
2. Write short notes on special constraints and requirements of mobile OS.
3. Explain the components of Mobile Operating Systems. (May 16)
4. Explain in detail about WAP architecture.
5. Write in detail about a survey of commercial mobile operating system / Explain
various operating systems for mobile computing. (May 17)
6. Write notes on J2ME configuration.
7. Explain in detail about Android SDK. (Nov 17)
8. Briefly write how an application can be developed using the android SDK.
9. Write short notes on Android software stack and Android application components. (Nov
17)
10. What do you understand by M-Commerce? Explain the following:
i) Advantages and disadvantages of M-Commerce.
ii) Applications of M-Commerce. (May 16, 23)
11. Compare and contrast various mobile OS. (Nov 16) (May 23)
12. Explain the following
i) Structure of mobile Commerce / Write detailed notes on mobile commerce.(May 17)
ii) Mobile Payment System scheme and security issues/Illustrate the process of
mobile payment. Compare and contrast mobile payment schemes. (May 17,22)
13. What is RFID? Explain few applications in which RFID is useful. (Nov 16)
14. Illustrate the process of mobile payment. Compare and contrast mobile payment schemes.
(May 22) (Nov 21)
15. Explain the structure of android OS. Explain the lifecycle of an android app development.
(May 21,22)
16. i) Explain the structure of IOS.
ii) Explain the lifecycle of an iOS app development. (May 21)
17. Design an application for Alarm clock using android SDK. (May 23)

St. Joseph’s College of Engineering Page 24 of 24

You might also like