Mobile Computing Suggession - GNIT
Mobile Computing Suggession - GNIT
Mobile Computing Suggession - GNIT
S-(1-2 MARKS):
It depends on the network signal; if the signal gets weaker, then the user experiences slow and
unstable services.
It needs more battery consumption.
3. Explain two primary reasons for occurring handover in mobile network. (S)
If a subscriber who is in a call or a data session moves out of coverage of one cell and enters
coverage area of another cell, a handoff is triggered for a continuum of service. The tasks that
were being performed by the first cell are delineating to the latter cell.
6. Specify the term Care-of Address (COA) and Correspondent Node (CN) in Mobile IP. (S)
Care-of Address (COA) is the temporary address used by a mobile node while it is moving
away from its home network.
Correspondent Node (CN) is a device on the internet communicating to the mobile node.
2|Page
Agent Registration: Mobile node after discovering the foreign agent sends a registration request
(RREQ) to the foreign agent. The foreign agent, in turn, sends the registration request to the
home agent with the care-of-address. The home agent sends a registration reply (RREP) to the
foreign agent. Then it forwards the registration reply to the mobile node and completes the
process of registration.
8. State the difference between ESS and BSS in IEEE 802.11 network. (S)
SL.
BSS (BASIC SERVICE SET) ESS (EXTENDED SERVICE SET)
NO.
Basic Service Set (BSS), as name
Extended Service Set (ESS), as name suggests,
suggests, is a group or set of all stations
is a group of BSSs or one or more
1. that communicate with each other. Here,
interconnected BSS along with their wired
stations are considered as computers or
network.
components connected to wired network.
It provides short-range wireless
2. It provides long range wireless communication.
communication.
BSS has a smaller number of user than
3. ESS has a greater number of user than BSS.
ESS.
10. State the differences between Home Agent (HA) and Foreign Agent (FA) in Mobile IP. (S)
The Home Agent is a router on the home network. It serves as the anchor point for
communication with the Mobile Node.
The Foreign Agent is a router that provides several services such as tunneling data-grams
whenever a mobile node visits a foreign network. It is responsible for delivering packets from
the Home Agent to the Mobile Node.
Tunneling: It establishes a virtual pipe for the packets available between a tunnel entry and an
endpoint. It is the process of sending a packet via a tunnel and it is achieved by a mechanism
called encapsulation. It takes place to forward an IP datagram from the home agent to the care-
of-address. Whenever the home agent receives a packet from the correspondent node, it
encapsulates the packet with source address as home address and destination as care-of-
address.
3|Page
12. What are the differences between Pro-active and Re-active routing protocol in MANET? (S)
SL.
NO PRO-ACTIVE ROUTING PROTOCOL REACTIVE ROUTING PROTOCOL
.
Routing information is stored in routing
1. Doesn’t Store.
tables.
2. High bandwidth is required. Low bandwidth is required.
3. Route Acquisition Delay is low. Route Acquisition Delay is high.
4. High Control Overhead. Low Control Overhead.
5. Convergence time is low. Routes are not up to date.
13. Draw the IEEE 802.11 frame format with several fields. (S)
The main fields of a frame of wireless LANs as laid down by IEEE 802.11 are:
Frame Control: It is a 2
bytes starting field composed
of 11 subfields. It contains
control information of the
frame.
Duration: It is a 2-byte field
that specifies the time period
for which the frame and its
acknowledgment occupy the
channel.
Address fields: There are three 6-byte address fields containing addresses of source,
immediate destination, and final endpoint respectively.
Sequence: It is a 2 bytes’ field that stores the frame numbers.
Data: This is a variable-sized field that carries the data from the upper layers. The
maximum size of the data field is 2312 bytes.
Check Sequence: It is a 4-byte field containing error detection information.
1. Describe HLR (Home location Register) and VLR (Visitor location register) in GSM
network. (M)
VLR stands for Visitor Location Register. VLR is a database which contains the exact
location of all mobile subscribers currently present in the service area of MSC. If you are going
from one state to another state, then your entry is marked into the database of VLR.
4|Page
A Home Location Register (HLR) is a database that contains subscriber information such as
the International Mobile Subscriber Identity (IMSI), the phone number associated with the
subscriber (the MSISDN), their account status, and their last known location.
GSM specifies different mechanism for data transmission. The original GSM allowing for
data rates of up to 9600 bits/s.
Bearer services permit transparent or non-transparent data transmission.
Transparent bearer services only use the physical layer to transmit data. Data transmission
has a constant delay at throughput if no transmission error occurs.
Non-transparent bearer services use protocols of layers two and three to implement error
correction and flow control. (data link layer and network layer).
TELE SERVICES:
Video Calls.
Video Text and Face Emoji.
Short Text Message (SMS).
SUPPLEMENTARY SERVICES:
Conference Calls.
Call Waiting.
Call Forwarding.
UTRAN (Universal Terrestrial Radio Access Network) is a pivotal component in the UMTS
(Universal Mobile Telecommunications System).
UTRAN acts as the bridge between mobile devices (UEs) and the core network (CN).
It manages radio resources, establishes radio bearers, and ensures smooth mobility for
UEs.
UTRAN sets up and maintains radio bearers, essential for reliable data transmission.
These bearers facilitate seamless communication between UEs and the core network.
5. What is Mobile Computing? What are the different applications of Mobile Computing? (M)
Mobile Computing is a technology that provides an environment that enables users to transmit
data from one device to another device without the use of any physical link or cables.
Applications of Mobile Computing: Following is a list of some significant fields in which
mobile computing is generally applied:
6. Identify the significance of MSISDN, IMSI, TMSI, MSRN - numbers for localizing a station
in a Mobile network. (M)
MSISDN: MSISDN refers to 'MS international ISDN numbers, and it is the dial number of our
phone line. It is the dial number exit in our contact list, and we give it to people in order to dial
us.
IMSI: IMSI refers to International Mobile Subscriber Identity, and it is a globally unique
identifier for every SIM card in the world. The IMSI is the main identifier for the MS.
TMSI: Temporary Mobile Subscriber Identity for most commonly sent between the mobile
and the network.
TMSI is assigned randomly by VLR to each mobile in the area.
6|Page
The TMSI number is local for a specific local area, and need to be updated every time when
the mobile moves to a new geographical area
MSRN: The MSRN (Mobile Station Roaming Number) plays a crucial role in call routing and
mobile communication. The primary use of MSRN is associated with the process of call setup
and call routing for mobile devices within the GSM network.
7. Specify the term "Handoff" with a proper example. State the differences between different
types of Handoff scenario occurred in mobile network (Hard handoff and Soft handoff). (M)
When a mobile user A moves from one cell to another cell then BSC 1 signal strength loses for
the mobile User A and the signal strength of BSC 2 increases and thus ongoing calls or data
connectivity for mobile users goes on without interrupting.
SL.
HARD HAND-OFF SOFT HAND-OFF
NO.
The definition of a hard-hand off is one Soft hand-off is defined as a hand-off
1. where an existing connection must be where a new connection is established
broken when the new one is established before old one is released
2. It allocates Different frequency It allocates same frequency
Hard hand-off typically used in TDMA Soft hand-off used in CDMA and some
3.
and FDMA TDMA systems
4. Hard hand-off is not very complicated More complex than hard hand-off
In hard hand-off handset always Communicate up to three or four radio
5.
communicated with one BS at a time links at the same time
SCO is used for real time data such as sound. It is used where fast delivery is preferred
over accurate delivery.
In an SCO link, a physical link is created between the master and slave by reserving
specific slots at regular intervals.
Damaged packet is not re-transmitted over SCO links.
A slave can have three SCO links with the master and can send data at 64 Kbps.
9. State the differences between piconet and scatternet in Bluetooth technology (M)
SL.
NO PICONET SCATTERNET
.
Piconet is the type of connection formed
It is a type of ad-hoc computer network
1. between 2 or more Bluetooth enabled
consisting of 2 or more piconets.
devices.
It supports maximum 8 nodes i.e., 1
2. It supports more than 8 nodes.
master & 7 slaves
It Allows less efficient use of Bluetooth It Allows more efficient use of Bluetooth
3. channel bandwidth. It is usually applied to channel bandwidth. It is applied to Bluetooth
Bluetooth devices. devices too.
4. It is a smaller coverage area It is a larger coverage area.
The CN is the backbone of the UMTS system, responsible for data transport and network
management.
It includes both circuit-switched (CS) and packet-switched (PS) functional modules.
For CS operations:
MSC (Mobile Switching Center) and GMSC (Gateway MSC) handle call routing and
switching.
Databases such as VLR (Visitor Location Register) and HLR (Home Location
Register) store subscriber information.
For PS operations:
SGSN (Serving GPRS Support Node) manages packet-switched connections.
GGSN (Gateway GPRS Support Node) connects to external packet data networks
(PDNs).
Destination sequenced distance vector routing (DSDV) is a table driven routing protocol
for MANET based on Bellman-Ford algorithm.
As we know, each mobile node maintains a routing table with a route to every possible
destination in the network and the number of hops to the destination.
Each entry in the table contains a sequence number assigned by the destination node.
A new route broadcast contains:
The destination address.
The number of hops required to reach the destination.
The sequence number of the information received about the destination and a new
sequence number unique to the broadcast.
If there are multiple routes available for the same destination, the route with the most
recent sequence number is used. If two updates have the same sequence number, the route
with smaller metric is used to optimize the routing.
Hence, Ad-Hoc On Demand Vector Routing protocol came as solution to it. The main
difference lies in the way of storing the path, in AODV Source node does not stores
complete path information, instead of that each node stores information of its previous and
next node. It also operates in two phases: Route discovery and Route maintenance.
In Wireless Sensor Networks (WSNs), the Medium Access Control (MAC) protocol is a set of
guidelines that dictate how each node should transmit data over the shared wireless medium.
The primary objective of the MAC protocol is to minimize the occurrence of idle listening,
over-hearing, and collisions of data packets. By efficiently managing access to the wireless
medium, the MAC protocol helps to reduce energy consumption and optimize the use of
network resources.
Agent Discovery: Agents advertise their presence by periodically broadcasting their agent
advertisement messages. The mobile node receiving the agent advertisement messages
observes whether the message is from its own home agent and determines whether it is in the
home network or foreign network.
Agent Registration: Mobile node after discovering the foreign agent sends a registration
request (RREQ) to the foreign agent. The foreign agent, in turn, sends the registration request
to the home agent with the care-of-address. The home agent sends a registration reply (RREP)
to the foreign agent. Then it forwards the registration reply to the mobile node and completes
the process of registration.
Tunneling: It establishes a virtual pipe for the packets available between a tunnel entry and an
endpoint. It is the process of sending a packet via a tunnel and it is achieved by a mechanism
called encapsulation. It takes place to forward an IP datagram from the home agent to the care-
of-address. Whenever the home agent receives a packet from the correspondent node, it
encapsulates the packet with source address as home address and destination as care-of-
address.
16. Gateway GPRS Support Node (GGSN) vs Serving GPRS Support Node (SGSN) in GPRS
network. (M)
18. What are the main responsibilities of different RSS unit - BSS, BTS, and BSC of GSM
Architecture? (M)
BSS stands for Base Station Subsystem. BSS handles traffic and signaling between a mobile
phone and the network switching subsystem. BSS having two components BTS and BSC.
BTS stands for Base Transceiver Station which facilitates wireless communication between
user equipment and a network. Every tower has BTS.
BSC stands for Base Station Controller. BSC has multiple BTS. You can consider the BSC as a
local exchange of your area which has multiple towers and multiple towers have BTS.
19. Describe Route Discovery and Route Maintenance phases in Dynamic Source Routing
protocol (DSR). (M)
Route Discovery: This phase determines the most optimal path for the transmission of data
packets between the source and the destination mobile nodes.
11 | P a g e
Route Maintenance: This phase performs the maintenance work of the route as the topology in
the mobile ad-hoc network is dynamic in nature and hence, there are many cases of link
breakage resulting in the network failure between the mobile nodes.
20. Describe Random waypoint model with the help of a proper example. (M)
Random waypoint model pauses time between changing its direction and/or speed. Mobile
Node (MN) begins by staying in one location for certain period of time. This is widely used in
indoor mobility models. We can choose random destination and speed (minimum speed or
maximum speed).
Radio subsystem as the name implies, the radio subsystem (RSS) comprises all radio specific
entities, i.e., the mobile stations (MS) and the base station subsystem (BSS).
A GSM network is composed of several functional entities, whose functions and interfaces are
specified. The GSM network can be divided into three broad parts.
The Mobile Station and the Base Station Subsystem communicate across the Um interface, also
known as the air interface or radio link.
The Base Station Subsystem communicates with the Mobile Services Switching Center across
the A interface.
3) OSS: OSS stands for Operating Subsystem. OSS is a functional entity which the network
operator monitors and control the system. OMC is the part of OSS. Purpose of OSS is to offer
the customer cost-effective support for all GSM related maintenance services.
1. MS: MS stands for Mobile System. MS comprises user equipment and software needed for
communication with a mobile network. Mobile Station (MS) = Mobile Equipment (ME) +
Subscriber Identity Module (SIM). Now, these mobile stations are connected to tower and
that tower connected with BTS.
2. BTS: BTS stands for Base Transceiver Station which facilitates wireless communication
between user equipment and a network. Every tower has BTS.
3. BSC: BSC stands for Base Station Controller. BSC has multiple BTS. You can consider the
BSC as a local exchange of your area which has multiple towers and multiple towers have
BTS.
4. MSC: MSC stands for Mobile Switching Center. MSC is associated with communication
switching functions such as call setup, call release and routing. Call tracing, call forwarding
all functions are performed at the MSC level. MSC is having further components like
VLR, HLR, AUC, EIR and PSTN.
13 | P a g e
VLR stands for Visitor Location Register. VLR is a database which contains the exact
location of all mobile subscribers currently present in the service area of MSC. If you
are going from one state to another state, then your entry is marked into the database of
VLR.
AUC: AUC stands for Authentication Center. AUC authenticates the mobile subscriber
that wants to connect in the network.
EIR: EIR stands for Equipment Identity Register. EIR is a database that keeps the
record of all allowed or banned in the network. If you are banned in the network then
you can’t enter the network, and you can’t make the calls.
PSTN: PSTN stands for Public Switched Telephone Network. PSTN connects with
MSC. PSTN originally a network of fixed line analog telephone systems. Now almost
entirely digital in its core network and includes mobile and other networks as well as
fixed telephones. The earlier landline phones which place at our home is nothing but
PSTN.
5. OMC: OMC stands for Operation Maintenance Center. OMC monitor and maintain the
performance of each MS, BSC and MSC within a GSM system.
Three subsystem BSS, NSS and OSS are connected with each other via some interfaces. Total
three interfaces are there:
Air Interface: Air interface is also known as UM interface. Interface between MS and BTS
is called as UM interface because it is mobile analog to the U interface of ISDN.
Abis Interface: It is a BSS internal interface linking with BTS and BSC.
3. Explain Mobile terminated call (MTC) / Mobile Originated Call (MOC) in Cellular
networks. (B)
MOBILE ORIGINATED CALL (MOC): MOC refers to a call that originates from a mobile
device (such as our smartphone) where the mobile device acts as the calling party.
WORKING:
1. The mobile device connects to the GSM network by establishing a radio channel with
the Base Station Subsystem (BSS).
14 | P a g e
2. The BSS reserves a channel just for them, assigns a frequency, and sets up a time slot
for communication.
3. Once that’s done, they communicate with the Mobile Switching Center (MSC).
4. The MSC verifies their subscriber information (usually stored in their SIM card) and
sets up a connection.
5. Encrypted messages flow between the MSC and the Base Transceiver Station (BTS),
ensuring secure communication.
6. Once authenticated, the MSC reserves a voice channel between itself and the BSS.
7. The call setup proceeds, and their voice travels to the called number (could be
someone’s landline or another mobile phone).
MOBILE TERMINATED CALL (MTC): MTC refers to a call within a telephone network
where the destination terminal is a mobile phone.
WORKING:
1. Someone initiates a call from a different network (e.g., a landline or another mobile
phone).
2. The network locates the mobile subscriber (say, X) to whom the call is directed.
3. Once located, the call is routed toward X's mobile device.
4. When X's phone rings, it’s an MTC—the call has reached X.
Intra-cell handover: Such a kind of handover is performed to optimize the traffic load in the
cell or to improve quality of a connection by changing carrier frequency.
Inter-cell handover: It is also known as Intra-BSC handover. Here the mobile moves from one
cell to another but remains within the same BSC (Base station controller).
Inter-BSC handover: It is also called as Intra-MSC handover. As BSC can control only a
limited number of cells, we might usually need to transfer a mobile from one BSC to another
BSC.
Inter-MSC handover: It occurs when a mobile move from one MSC region to another MSC.
MSC cover a large area. It can be imagined as a handover from Maharashtra MSC to Gujarat
MSC while travelling.
The logical unit link control adaptation protocol is equivalent to logical link control sub-layer
of LAN.
The ACL link uses L2CAP for data exchange but SCO channel does not use it.
The various function of L2CAP is:
The L2CAP reassembles the frame into packets again at the destination.
MULTIPLEXING:
L2CAP performs multiplexing at sender side and de-multiplexing at receiver side.
At the sender site, it accepts data from one of the upper layer protocols, frames them
and deliver them to the Base-band layer.
At the receiver site, it accepts a frame from the base-band layer, extracts the data, and
delivers them to the appropriate protocol layer.