BTL Questions No. Illustrate how hidden terminal and exposed node problems affect the communication between mobile devices?

Similar documents
VALLIAMMAI ENGNIEERING COLLEGE SRM Nagar, Kattankulathur

CEB620MOBILE COMPUTING

10CS64: COMPUTER NETWORKS - II

Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol

EPL 657 Wireless Networks

Questions for Mobile Communications 2 nd ed.

IT 3202 Internet Working (New)

Contents. Preface to the Second Edition Preface to the First Edition. Mobility Management 48

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols

Course Duration: Course Content Course Description Course Objectives Course Requirements

TCP in Wireless Networks

Enterprise VoIP Services over Mobile Ad-Hoc Technologies

IT Data Communication and Networks (Optional)

IT4405 Computer Networks (Compulsory)

Introduction Chapter 1. Uses of Computer Networks

Professur Technische Informatik Prof. Dr. Wolfram Hardt. Network Standards. and Technologies for Wireless Sensor Networks. Karsten Knuth

TCP and Wireless Networks Classical Approaches Optimizations TCP for 2.5G/3G Systems. Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme

6LoWPAN Technical Overview

TCP for Wireless Networks

Security in Ad Hoc Network

Design and Implementation of Ad-hoc Communication and Application on Mobile Phone Terminals

Wireless LAN advantages. Wireless LAN. Wireless LAN disadvantages. Wireless LAN disadvantages WLAN:

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks

ISSUES AND CHALLENGES OF QUALITY OF SERVICE IN MOBILE ADHOC NETWORK

UNIT 8:- Mobile Ad-Hoc Networks, Wireless Sensor Networks

LIST OF FIGURES. Figure No. Caption Page No.

Remote Home Security System Based on Wireless Sensor Network Using NS2

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

Bluetooth voice and data performance in DS WLAN environment

Intelligent Agents for Routing on Mobile Ad-Hoc Networks

Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols

Security for Ad Hoc Networks. Hang Zhao

Customer Specific Wireless Network Solutions Based on Standard IEEE

CS263: Wireless Communications and Sensor Networks

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs

SERVICE DISCOVERY AND MOBILITY MANAGEMENT

CHAPTER 1 1 INTRODUCTION

Computer Networks. Wireless and Mobile Networks. László Böszörményi Computer Networks Mobile - 1

ECE/CS 372 introduction to computer networks. Lecture 13

CSMA/CA. Information Networks p. 1

PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2

4.1 CD BSc (Hons) Information Technology (Diploma to Degree Upgrade 1.5 Years Part Time)

CCNA 1: Networking Basics. Cisco Networking Academy Program Version 3.0

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction

4.1 CD304 - BSc (Hons) Information Technology (Diploma to Degree Top-up 1 year Full Time)

1 Introduction to mobile telecommunications

Mobile Communications Chapter 8: Network Protocols/Mobile IP

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme

Comparative Study of Performance Evaluation for Mobile Ad hoc networks using a proxy node

Wireless Personal Area Networks (WPANs)

Lecture 1: Introduction

Chapter 6: Conclusion

Mobile Communications Chapter 9: Mobile Transport Layer

ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS

Configuration Notes Trapeze Networks Infrastructure in Ascom VoWiFi System

Introduction: Why do we need computer networks?

GSM Network and Services

THE BCS PROFESSIONAL EXAMINATIONS BCS Level 5 Diploma in IT. October 2009 EXAMINERS' REPORT. Computer Networks

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING

8/27/2014. What is a computer network? Introduction. Business Applications (1) Uses of Computer Networks. Business Applications (2)

SBSCET, Firozpur (Punjab), India

Industrial Networks & Databases

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

Mobile Computing/ Mobile Networks

Wireless LANs vs. Wireless WANs

CCT vs. CCENT Skill Set Comparison

WPAN. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Wireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring Mike Freedman

10. Wireless Networks

Security and Scalability of MANET Routing Protocols in Homogeneous & Heterogeneous Networks

SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS

Lecture 7 Multiple Access Protocols and Wireless

Introduction to Ad hoc Networks

Performance Comparison of AODV, DSDV, DSR and TORA Routing Protocols in MANETs

Gujarat University Syllabus M.Tech (Networking & Communications) II

CPS221 Lecture: Layered Network Architecture

First Semester Examinations 2011/12 INTERNET PRINCIPLES

From reconfigurable transceivers to reconfigurable networks, part II: Cognitive radio networks. Loreto Pescosolido

Achieving Energy Efficiency in MANETs by Using Load Balancing Approach

MASTER THESIS REPORT MSc IN ELECTRICAL ENGINEERING WITH EMPHASIS ON TELECOMMUNICATION

Wireless Technologies for Automation

TOWARDS STUDYING THE WLAN SECURITY ISSUES SUMMARY

An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks *

Wireless LAN Concepts

Figure 1. The Example of ZigBee AODV Algorithm

Nokia Call Connect v1.1 for Cisco User s Guide. Part Number: N Rev 003 Issue 1

TECHNICAL NOTE. GoFree WIFI-1 web interface settings. Revision Comment Author Date 0.0a First release James Zhang 10/09/2012

Volume 12 Issue 4 Version 1.0 Fabruary 2012 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals Inc.

Introduction to IPv6 and Benefits of IPv6

An Evaluation of Security Services schemes For IEEE Wireless LAN s Using Qualnet

WHITE PAPER. Mobility Services Platform (MSP) Using MSP in Wide Area Networks (Carriers)

Computer Networks CS321

Wireless Mesh Networks under FreeBSD

Outline. Wireless System Integration WLAN. WAN Technologies ดร. อน นต ผลเพ ม LAN. WAN Server LAN. Wireless System Architecture Protocols

IP and Mobility. Requirements to a Mobile IP. Terminology in Mobile IP

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

Performance Evaluation of Large-Scale Wireless Sensor Networks Communication Protocols that can be Integrated in a Smart City

Fast and Secure Data Transmission by Using Hybrid Protocols in Mobile Ad Hoc Network

COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK

Transcription:

SRM NAGAR, KATTANKULATHUR 0 0 ACADEMIC YEAR: 0 7 SEMESTER: ODD BRANCH: MCA YEAR: III SEMESTER: V SUBJECT CODE AND NAME: MC70 MOBILE COMPUTING NAME OF THE FACULTY MEMBER AND DESIGNATION: Mr. C. VIJAYAKUMARAN ASSISTANT PROFESSOR (SEL.G) UNIT I PART A Qn, L What is Signal Propagation? Explain the meaning of Burst and list its types List the components of the Frequency Spectrum Identify the needs for Multiplexing of signals? Compare FDM and TDM Write the uses of Spread Spectrum 7 Distinguish between FHSS and DSSS 8 Illustrate the frequency ranges of uplink and downlink in GSM network 9 List the different types of handover mechanisms used in GSM 0 Show the functions of Radio Sub System in GSM architecture Discuss about call routing in GSM? What is GPRS? Mention its services Analyze the different address identifiers used in a GSM System Invent the basic requirements of Mobility Management? Summarize the limitations of Frequency Allocation? Plan the steps involved in GSM s A Authentication algorithm? 7 Explain the SMS protocol services and features? 8 Classify the Value Added Services available through SMS in GSM 9 Illustrate how hidden terminal and exposed node problems affect the communication between mobile devices? 0 Judge the features of Packet Data Networks

SRM NAGAR, KATTANKULATHUR 0 0 PART - B Briefly discuss about i. Components of Frequency Spectrum (8) ii. Multiplexing (8) Write in detail on Functional Architecture of GSM system Compare and contrast i. G and G Networks (8) ii. Mobile originated call and mobile terminated call (8) Assess the following i. Authentication and Security in GSM(8) ii. PLMN () iii. Operation and Maintenance Sub Systems () Discuss with neat sketches about i. Direct Sequence Spread Spectrum (DSSS) (8) and ii. Frequency Hopping Spread Spectrum (8) Describe the features i. CDMA (8) ii. Entities in GSM () iii. Identifiers in GSM () 7 Explain in detail about GPRS Protocols architecture with neat diagram () 8 Illustrate the Principles of i. Frequency Allocation in GSM () ii. Address structures used in GSM () iii. Packet Data Network () Generalize the following with respect to GSM 9 i. G Mobile Wireless System Services (8) ii. Mobility Management (8) 0 Show the overview of i. Cellular Networks () ii. GPRS data services and its applications () iii. Handover and Call Routing in GSM (8) Explain i. The concept behind Code Division Multiple Access. (8) ii. Compare GSM and CDMA (8) Examine i. How is the communication in GSM secure? Explain the different algorithms used. (8) ii. Location Management in GSM (8) Describe in detail the GPRS Network Architecture () Analyze in detail the protocol architecture of GSM with a neat sketch ()

SRM NAGAR, KATTANKULATHUR 0 0 UNIT II PART A Define. Quality of Service (QoS) What are the byte ordering functions? Describe the features of Adhoc networks Analyze about topologies of WLAN What are the security features offered by Bluetooth? Discuss the features of Bluetooth enabled devices 7 What is meant by IRDA? 8 Explain the concept of Piconet 9 Show the features of Scatter-net in Bluetooth 0 Classify the topologies of WLAN Generalize the technologies of WLAN Show the metrics used in WLAN medium access control mechanisms Explain the security features of Bluetooth List the uses of MANET Summarize the features of WAP Distinguish between hidden node and exposed node problem is WLAN 7 Compose the role of Transport layer in WAP 8 Describe the functions of ZigBee 9 Distinguish between wired and Wireless LANs 0 Assess the usage of infrared communication? PART B Identify the following i. WLAN Equipments () ii. WLAN Topologies () iii. WLAN Standards () Show the various Power Management Standards of WLAN in detail () Compare and contrast i. DCF Vs PCF in WLAM MAC (8) and ii. Infra-structure based Vs Adhoc topologies (8) Write short notes on i. IRDA () ii. Issues in Wireless MAC () iii. Hidden node and Exposed Terminal Problems () Generalize features of i. WAP.0 (8)

SRM NAGAR, KATTANKULATHUR 0 0 ii. ZigBee (8) Discuss i. The system architecture of IEEE Standard 80. in detail (8) ii. The Security components and SDP protocol in Bluetooth (8) Assess the following with respect to WLAN 7 I. MAC Performance Metrics (8) II. Features of MAC Protocols (8) Examine the following 8 i. Security of WLAN (8) ii. System architecture of Bluetooth (8) Describe the features of the following 9 i. Wireless Transport Layer Security WTLS (8) ii. Bluetooth Protocols (8) 0 Examine in detail about the WAP Architecture with a neat sketch () Explain the protocol layers of Bluetooth protocol in detail () Describe the Medium Access Control scheme of IEEE 80. () Explain the following protocols of WAP architecture: i. Wireless Session Protocol () ii. Wireless Transaction Protocol (WTP) () iii. Wireless Transport Layer Security (WTLS) () iv. Wireless Datagram Protocol (WDP) () Distinguish between i. Infrared and Radio Transmissions (8) ii. Internet and WAP architecture (8) PART A UNIT III Design the structure of an IP Packet Write brief outline about Selective Retransmission Assess the goals of Mobile IP Describe the features of Mobile TCP Show the functions of DHCP Examine the features of Snooping TCP 7 Analyze how does the I-TCP isolate problems on wireless link? 8 Illustrate the distinct phases of Dynamic Host Configuration Protocol 9 Demonstrate the capability of standard TCP in handling link disconnection 0 Explain the fast retransmission and fast recovery features of TCP Describe the steps involved in IP packet delivery What is Care of Address? Compose the characteristics of VoIP Summarize the purpose of IPSec What are the functions of Mobile Transport Layer List out the benefits of Transaction Oriented TCP 7 Show how Mobile IP handles the location of a mobile device?

SRM NAGAR, KATTANKULATHUR 0 0 8 Distinguish between I-TCP and S-TCP 9 Infer the functions of Handover Management in Mobile IP 0 Order the steps involved in the registration process of Mobile IP PART B Compose the following with respect to Mobile IP i. Registration of a node (8) ii. Agent Discovery (8) Recommend the process involved in i. Tunneling and Encapsulation (8) ii. Rout Optimization (8) Write short notes on i. Entities used in Mobile IP (8) ii. Reverse Tunneling (8) Describe the functions of i. IP Security Protocols (8) i. Voice over Internet Protocol (8) Illustrate the concepts involved in i. Mobile IP hand over management () ii. Location Management (8) Explain i. How packet delivery takes place in mobile network layer? (8) ii. Dynamic Host Configuration Protocol with neat diagram (8) Show the steps involved in 7 i. Traditional TCP (8) ii. Snooping TCP (8) 8 Describe the various Encapsulation Techniques used in Mobile IP () Summarize the features of 9 i. Generic Encapsulation (8) ii. IP-in-IP Encapsulation (8) Write a short notes on 0 ii. Mobile TCP (8) iii. Transaction oriented TCP (8) Explain how data transfer is done using Mobile IP from a mobile node to a fixed node and vice versa. Why and where is encapsulation needed? () How does Indirect TCP work? Discuss its advantages & disadvantages () Differentiate between traditional TCP and mobile oriented TCP () Analyze the necessity of i. Mobile IP (8) ii. Mobile TCP (8)

SRM NAGAR, KATTANKULATHUR 0 0 PART A UNIT- IV Tabulate the Adhoc Proactive routing protocols Name the phases of AODV List the applications of MANET Write the uses of Wireless Sensor Networks Show the features of TORA routing algorithm Illustrate the types of localization techniques used in Adhoc networks 7 Write the expansion for i) DSDV and ii) CGSR 8 Summarize the features of WSN 9 Discuss ant two features of Personal Area Networks 0 Assess the types of PAN Decide the features of reactive routing techniques Differentiate between Proactive and Reactive Routing Protocols Show a block diagram for typical arrangement of protocol stack in WSN Analyze the security threats involved in Adhoc networks Interpret the phases of TORA routing algorithm Compose the characteristics of WSN 7 Invent the features of routing algorithms used in WSN 8 Explain the features of Distributed Networks 9 Explain about sensing coverage of WSN 0 List out the scheduling techniques in the distributed networks PART B Discuss about i. MANET (8) ii. PAN (8) Explain the protocol stack of WSN with a neat sketch () Assess the features of the following with suitable examples i. Proactive Routing Protocols (8) ii. Reactive Routing Protocols (8) Describe the process of i. AODV routing protocol (8) ii. DSR Routing Protocol (8) Write short notes on i. Security Issues in MANET () ii. Routing Issues in MANET () iii. Routing issues in WSN ()

SRM NAGAR, KATTANKULATHUR 0 0 Describe the applications of i. Distributed Network (8) ii. Wireless Sensor Network () iii. Adhoc Networks () Explain a mechanism to implement the following routing protocols 7 i. TORA (8) ii. CGSR (8) Generalize the following functions of WSN 8 i. Communication Coverage (8) ii. Sensing Coverage (8) Examine the following with respect to Distributed Networks 9 i. Load balancing techniques (8) ii. Scheduling techniques (8) 0 Illustrate the DSDV routing protocol in mobile Adhoc networks () Explain in detail the working of any one routing protocol for mobile adhoc networks, with appropriate diagrams () Write about the different ways in which routing is done in Sensor Networks () Compare i. Routing in Wireless Sensor Network and Adhoc Networks (8) ii. Distributed network and Client/Server network (8) Describe the following features of WSN i. Rumor Routing (8) ii. Selective Flooding (8) PART A UNIT V List out the Android SDK features Find the meaning of Android Virtual Device State the advantages of SDK Manager Determine the comparative advantage of using Dalvik Virtual Machine over Java Virtual Machine in Android OS Outline the core components of Android application life cycle Describe the features of Activity Class 7 Illustrate the functions of Geo Service 8 Invent the steps for a new mobile application 9 Show the features of Android Studio 0 Assess the states of an activity Write short notes on Activity Stack Examine the components related to Android application layer Demonstrate the uses of Service class Explain the use of Broadcast Receiver class Analyze components of content provider class Generalize the features of Medea Framework

SRM NAGAR, KATTANKULATHUR 0 0 7 Show the uses of SQLite database 8 What is the use of Intents? 9 Compare the application layer and the application frame work in the Android software stack. 0 Distinguish between oncreate() and onstart() methods. Part B Assess the steps involved in mobile application development () Discuss the features of i. Activity Manager (8) ii. Window Manager (8) Illustrate the techniques used to compose a mobile application with suitable example () Describe in detail on i. Active Life Cycle in Mobile Application (8) ii. The Android software stack with neat diagram (8) Explain the following i. Package Manager (8) ii. Resource Manager (8) Summarize the features of i. Android Libraries (8) ii. Android Runtime Components (8) Write short notes on 7 i. Storing and Loading of files and tools associated with Android (8) ii. Retrieving the content of a table from the database (8) Explain the features of 8 i. Android Application Frameworks (8) ii. Content Provider Classes (8) 9 Generalize the processes involved in Activity Life Cycle () What is 0 i. Map View and Map Activity? How to create a map based activity? (0) ii. Intent and Intent Activity? Give example () List the functions of i. Android Widgets () ii. Web Kit () iii. Geo Services (8) Differentiate between Android application life cycle and Activity life cycle () Analyze the features of i. SQLite Database (8) ii. Broadcast Receiver classes (8) Explain the steps involved in creating the following Android applications i. Static digital clock (8) ii. Phone Book (8)