IT6601 Mobile Computing
IT6601 Mobile Computing
IT6601 Mobile Computing
UNIT – I
INTRODUCTION
PART – A
1. Define Mobile Computing.
Mobile Computing also called as Ubiquitous Computing or Nomadic Computing is described as
the ability to compute remotely while on the move. It makes possible for people to access
information from anywhere and at any time.
Mobile Computing = Mobility + Computing
1
III Year/VI SEM
PANIMALAR INSTITUTE OF TECHNOLOGY DEPARTMENT OF IT
7. List out the differences between Mobile Computing and Wireless Networking.
S.No Mobile Computing Wireless Networking
It is a technology that access data It is a network that uses wireless data
1. through wireless network connections for connecting network
nodes
It denotes accessing information and It provides the basic communication
2. remote computational services while on infrastructure necessary for mobile
the move computing
It refers to computing devices that are It is a method of transferring
not restricted to a desktop. Eg: Smart information between a computing
3.
Phone, PDA, Laptop etc., devices such as PDA & data sources
without a physical connection
It refers to a device performing It refers to the data communication
computation that is not always without the use of a landline. Eg.
4.
connected to a central network Cellular Telephone, Two way radio,
Satellite, Wireless Connection.
2
III Year/VI SEM
PANIMALAR INSTITUTE OF TECHNOLOGY DEPARTMENT OF IT
3
III Year/VI SEM
PANIMALAR INSTITUTE OF TECHNOLOGY DEPARTMENT OF IT
B is in the radio range of A, and B is also with the radio range of C. The nodes A and C are not
in the radio range of each other. If both A and C start to transmit to B at the same time, the data
received at B would get garbled. This situation arises because A and C are “hidden” from each
other, because they are outside each other’s transmission range.
Note:- Hidden Terminal causes Collisions.
Exposed Terminal Problem:
Exposed Terminal Problem arises when all the three nodes are in the radio range of all nodes.
4
III Year/VI SEM
PANIMALAR INSTITUTE OF TECHNOLOGY DEPARTMENT OF IT
Now B is transmitting to A, C wants to send to another terminal (not A or B) outside the range. C
senses the carrier and detects that the carrier is busy, so C postpones the transmission until it
detects the medium is free. But A is outside the radio range of C. This problem arises because “C
is exposed to B”.
Note:- Exposed Terminal leads to inefficient spectrum usage and unnecessary transmission
delays.
5
III Year/VI SEM
PANIMALAR INSTITUTE OF TECHNOLOGY DEPARTMENT OF IT
24. Formulate a reason why Collision Detection is based protocol not suitable for
wireless networks?
Because, in a wireless network, it is very difficult for a transmitting node to detect a collision,
since any received signal from other nodes would be too weak compared to its original signal
and can easily be masked by noise. As a result the transmitting node would continue to transmit
the frame which leads to corrupted frame.
In wired network, when a node detects a collision, it immediately stops transmitting, thereby
minimizing channel wastage.
25. Assess why is the MAC protocol designed for infrastructure based wireless N/W
may not work satisfactory in infrastructure-less environment. Justify your answer?
Because,
It is for a transmitting node to detect collisions
Hidden and Exposed terminal problems makes MAC protocols inefficient.
PART - B
1. Explain the characteristics of Mobile Computing. [An] May/June 2016
2. Discuss briefly about Wireless Network Classifications. [An]
3. Explain the structure of Mobile Computing Applications with neat sketch. [An] May/June
2016
4. Explain the various taxonomy of MAC protocols in detail. [U] May/June 2016
5. Briefly explain FDMA, CDMA, and TDMA. [An] Nov/Dec 2011, May/June 12, May
/June 2013, Nov/Dec 2013, May/June 2014, Nov/Dec2014
6. Compare FDMA, TDMA & CDMA. [An]
7. Explain in detail about the motivation for specialized MAC. [U] May/June 2013
8. Explain the following: [U]
(i) Random Assignment Schemes
(ii) Reservation-based schemes
COURSE OUTCOME: An ability to explain the basics of Mobile Computing and MAC
protocol.
6
III Year/VI SEM
PANIMALAR INSTITUTE OF TECHNOLOGY DEPARTMENT OF IT
UNIT – II
5. Define COA.
It is an address that identifies the mobile node’s current location. The packets sent to the Mobile
Node are delivered to COA. COA is associated with the mobile node’s Foreign Agent (FA).
6. Define Tunneling.
Tunneling is the process of delivering the packet sent by the Home Agent(HA) to foreign
agent(COA) and frm COA to the mobile node via tunnel. Tunneling has two primary functions:
1. Encapsulation of data packet to reach the tunnel endpoint
7
III Year/VI SEM
PANIMALAR INSTITUTE OF TECHNOLOGY DEPARTMENT OF IT
12. What are the mechanisms used for forwarding the packet?
CN does not need to know anything about the MN’s current location and sends
the packet as usual to the IP address of MN
The packet is not forwarded into the subnet as usual, but encapsulated and
tunnelled to the COA
The foreign agent now decapsulates the packet, i.e., removes the additional
header, and forwards the original packet with CN as source and MN as destination to the
MN
13. What are the key mechanisms associated with Mobile IP?
1. Discovering the Care-of-Address
2. Registering the Care-of-Address
3. Tunneling to the Care-of-Address
8
III Year/VI SEM
PANIMALAR INSTITUTE OF TECHNOLOGY DEPARTMENT OF IT
9
III Year/VI SEM
PANIMALAR INSTITUTE OF TECHNOLOGY DEPARTMENT OF IT
It is used for sending requests from a web client (a browser) to a web server,
returning web content (web pages) from the server back to the client.
FTP:
FTP stands for File Transfer Protocol
FTP takes care of file transmission between computers.
24. What are the various mechanisms used to improve traditional TCP performance?
1. Slow Start
2. Congestion Avoidance
3. Fast Retransmit / Fast Recovery
25. What are the various mechanisms used to improve TCP performance in Mobile
Networks?
1. TCP in Single-hop Wireless Networks:
Indirect TCP (I-TCP)
Fast Retransmission
Snooping TCP (S-TCP)
Mobile TCP (M-TCP)
Freeze TCP (F-TCP)
10
III Year/VI SEM
PANIMALAR INSTITUTE OF TECHNOLOGY DEPARTMENT OF IT
31. Define time out freezing. May/June 12 and May/June 2013 Nov/Dec 2014
The MAC layer can inform the TCP layer of an upcoming loss of connection or that the current
interruption is not caused by congestion. TCP can now stop sending and ‘freezes’ the current
state of its congestion window and further timers
34. What are the possible locations for care of address? Nov/Dec 2013
The COA defines the current location of the MN from an IP point of view. All IP packets sent to
the MN are delivered to the COA, not directly to the IP address of the MN. Packet delivery
toward the MN is done using a tunnel, as explained later. To be more precise, the COA marks
the tunnel endpoint, i.e., the address where packets exit the tunnel
There are two different possibilities for the location of the COA:
Foreign agent COA
Co-located COA
35. What are the possible locations of Tunnel end point of Mobile IP? May/June 2014
A tunnel establishes a virtual pipe for data packets between a tunnel entry and a tunnel endpoint.
Packets entering a tunnel are forwarded inside the tunnel and leave the tunnel unchanged.
Tunneling, i.e., sending a packet through a tunnel is achieved by using encapsulation.
The possible locations of Tunnel end point are
11
III Year/VI SEM
PANIMALAR INSTITUTE OF TECHNOLOGY DEPARTMENT OF IT
37. What should the value of TTL Filed in the IP packet of agent advertisement? Why?
May/June 2014
The TTL field of the IP packet is set to 1 for all advertisements to avoid forwarding them. The IP
destination address according to standard router advertisements can be either set to 224.0.0.1,
which is the multicast address for all systems on a link or to the broadcast address
255.255.255.255.
PART – B
12
III Year/VI SEM
PANIMALAR INSTITUTE OF TECHNOLOGY DEPARTMENT OF IT
9. Explain indirect TCP. [U] Nov /Dec 2011&12, May/June 12, May /June 2013,
Nov/Dec2014
10. Short notes on Snooping and Mobile TCP. [R] Nov /Dec 2011&12, May/June 12, May
/June 2013, Nov/Dec 2013, May/June2014, Nov/Dec 2014
11. Write short notes on (i) TCP Tahoe (ii) TCP Reno [R]
12. Discuss and compare the various mechanisms used to improve the TCP performance.
[An] May/June 2016
COURSE OUTCOME: An ability to explain the need of Mobile Internet Protocol and
Transport Layer Protocol.
UNIT III
SYLLABUS: Global System for Mobile Communication (GSM) – General Packet Radio Service
(GPRS) – Universal Mobile Telecommunication System (UMTS)
PART-A
13
III Year/VI SEM
PANIMALAR INSTITUTE OF TECHNOLOGY DEPARTMENT OF IT
14
III Year/VI SEM
PANIMALAR INSTITUTE OF TECHNOLOGY DEPARTMENT OF IT
15
III Year/VI SEM
PANIMALAR INSTITUTE OF TECHNOLOGY DEPARTMENT OF IT
16
III Year/VI SEM
PANIMALAR INSTITUTE OF TECHNOLOGY DEPARTMENT OF IT
PART-B
1. Explain GSM architecture and its services with neat diagram. [U] Nov/Dec2011&12,
May/June 12, May /June 2013, Nov/Dec 2013, May/June 2014, Nov/Dec2014, May/June
2016
17
III Year/VI SEM
PANIMALAR INSTITUTE OF TECHNOLOGY DEPARTMENT OF IT
UNIT IV
PART – A
18
III Year/VI SEM
PANIMALAR INSTITUTE OF TECHNOLOGY DEPARTMENT OF IT
5. Mobility allows ad hoc networks created on the fly in any situation where there are
multiple wireless devices.
6. Flexible ad hoc can be temporarily setup at any time, in any place.
7. Lower getting - started costs due to decentralized administration.
8. The nodes in ad hoc network need not rely on any hardware and software. So, it can be
connected and communicated quickly.
19
III Year/VI SEM
PANIMALAR INSTITUTE OF TECHNOLOGY DEPARTMENT OF IT
13. Analyze and list out the various design issues associated with MANET.
1) Network Size and Node Density
2) Connectivity
3) Network Topology
4) User Traffic
5) Operational Environment
6) Energy Constraints
20
III Year/VI SEM
PANIMALAR INSTITUTE OF TECHNOLOGY DEPARTMENT OF IT
packet towards its destination using most efficient path. Efficiency of the path is measured in
various metrics like, Number of hops, traffic, security, etc. In Ad-hoc network each host node
acts as specialized router itself.
16. Differentiate between MANET routing strategies with routing strategies of traditional
networks.
21
III Year/VI SEM
PANIMALAR INSTITUTE OF TECHNOLOGY DEPARTMENT OF IT
2) Commercial oriented
a) remote vehicle personalization
22
III Year/VI SEM
PANIMALAR INSTITUTE OF TECHNOLOGY DEPARTMENT OF IT
b) internet access
c) digital map downloading
d) real time video relay
e) value-added advertisement
3) Convenience oriented
a) route diversion
b) electronic toll collection
c) parking availability
4) Productive Applications
a) Environmental Benefits
b) Time Utilization
c) Fuel Saving
PART – B
1. Explain the basic characteristics and applications of Mobile Ad hoc networks. [U]
May/June2016
2. Explain the various routing strategies in mobile ad-hoc networks. [U]
3. MANET Routing protocols. [An] Nov/Dec 2014
4. Explain DSR Routing Protocol in detail. [An] May/June 2016
23
III Year/VI SEM
PANIMALAR INSTITUTE OF TECHNOLOGY DEPARTMENT OF IT
COURSE OBJECTIVE: Gain knowledge about different mobile platforms and application
development.
PART – A
24
III Year/VI SEM
PANIMALAR INSTITUTE OF TECHNOLOGY DEPARTMENT OF IT
25
III Year/VI SEM
PANIMALAR INSTITUTE OF TECHNOLOGY DEPARTMENT OF IT
provider
Many devices can be unlocked with
third-party applications
10. What are the advantages and disadvantages of Windows Phone OS?
Advantages Disadvantages
Built in support for Windows Office Closed architecture
documents Small number of applications available
Multi-tasking Browser is a mix of IE7 and IE8 (a bit
Phones available form most service dated)
providers Applications must be approved by
Excellent development tools, with free Microsoft before being
versions available to students
Updates available directly from
Microsoft
26
III Year/VI SEM
PANIMALAR INSTITUTE OF TECHNOLOGY DEPARTMENT OF IT
Mobile Application
Mobile Client
Internet
15. What are the features required for a mobile device to enable mobile commerce?
27
III Year/VI SEM
PANIMALAR INSTITUTE OF TECHNOLOGY DEPARTMENT OF IT
28
III Year/VI SEM
PANIMALAR INSTITUTE OF TECHNOLOGY DEPARTMENT OF IT
21. List out the various technologies used for M-Payment systems.
a) SMS (Short Message Service)
b) USSD (Unstructured Supplementary Services Delivery)
c) WAP/GPRS
d) Phone based applications (J2ME/BREW)
e) SIM-based Application
f) Near Field Communication (NFC)
g) Dual Chip
h) Mobile Wallet
29
III Year/VI SEM
PANIMALAR INSTITUTE OF TECHNOLOGY DEPARTMENT OF IT
Fewer cards to carry around: Instead of a wallet full of credit cards, customers
can simply carry an identification card and mobile device.
Not limited to POS stations: Some retailers have already started experimenting
with mobile payment kiosks mounted around the retail floor. Customers can avoid long
lines and use their mobile devices to pay from anywhere.
Tested and proven overseas: Consumers in Kenya, Japan, Hong Kong, and
Taiwan have been using mobile payment technology for over a decade. Japanese
consumers can use their cell phones to buy at vending machines, ticket booths, and 1.8
million retailers.
30
III Year/VI SEM
PANIMALAR INSTITUTE OF TECHNOLOGY DEPARTMENT OF IT
PART – B
1. Explain in detail about the architecture of Mobile Operating system. [U]
2. Explain the components of Mobile Operating Systems. [U] May/June 2016
3. Explain the following: [An]
a) Android OS
b) Windows Phone OS
c) Apple IOS
d) Blackberry OS
4. Write short notes on Android SDK. [U] May/June 2016
5. Explain about M-Commerce and its structure with neat sketch. [R]
6. Explain the various applications of M-Commerce. [R] May/June 2016
7. Discuss briefly about the various technologies involved in M-Payment system. [Ap]
8. Explain the working of M-Payment system with any example application. [An]
9. Explain the Mobile Payment Scheme and Security Issues. [U] May/June 2016
COURSE OUTCOME: An ability to understand and explain the features of various Mobile
Operating Systems.
31
III Year/VI SEM
PANIMALAR INSTITUTE OF TECHNOLOGY DEPARTMENT OF IT
COURSE OUTCOMES
C311.1 An ability to explain the basics of Mobile Computing and MAC protocol.
C311.2 An ability to explain the need of Mobile Internet Protocol and Transport Layer Protocol.
C311.5 An ability to understand and explain the features of various Mobile Operating Systems.
CO-PO MATRIX:
CO PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
C311.1 2 2 1 - - - - - - - - 1
C311.2 2 2 2 - - - - - - - - 1
C311.3 1 2 1 - - - - - - - - 1
C311.4 1 2 2 - - - - - - - - 2
C311.5 2 2 1 - - - - - - - - 2
C311 1.6 2 1.4 - - - - - - - - 1.4
CO-PSO MATRIX:
32
III Year/VI SEM