IV B.Tech. I Semester Regular Examinations, November, 2011
MOBILE COMPUTING
(Common to Computer Science & Engineering, Information Technology and Electronics &
Computer Engineering)
Time: 3 Hours Max Marks: 80
Answer any FIVE Questions
All Questions carry equal marks
*******
1. a) Explain the architecture of mobile computing.
b) What are the functions or authentication and encryption in GSM? How is system
security maintained?
2. a) Who performs the MAC algorithm for SDMA? What could be possible roles of
mobile stations, base stations and planning from the network provider?
b) How are guard spaces realized between users in CDMA?
3. Explain how tunneling works in general and especially for mobile IP using IP-in-IP,
minimal and generic routing encapsulation respectively. Discuss the advantages and
disadvantages of these three methods.
4. a) Explain congestion control in traditional TCP.
b) Describe transaction oriented TCP. How does the integration of connection
establishment, data transfer, and close functions into one help in transmitting and
receiving at the TCP nodes.
5. a) Explain about context-aware computing.
b) Explain the situations in which a database can crash. How does a database recover
using recovery manager? What is the role of logged entries in updating transactions?
6. a) Describe pull-based data-delivery mechanism? What are the advantages and
disadvantages of pull-based data-delivery?
b) Explain the following selective tuning and indexing techniques.
(i) Flexible indexing method (ii) Distributed index based method
7. a) What are the benefits of location information for routing in ad-hoc networks, which
problems arise?
b) What are the security threats to a MANET? Why a MANET faces greater security
threats than a fixed infrastructure network?
8. a) Explain wireless session protocol.
b) Explain different user scenarios of Bluetooth.
MOBILE COMPUTING
(Common to Computer Science & Engineering, Information Technology and Electronics &
Computer Engineering)
Time: 3 Hours Max Marks: 80
Answer any FIVE Questions
All Questions carry equal marks
*******
1. a) Explain the architecture of mobile computing.
b) What are the functions or authentication and encryption in GSM? How is system
security maintained?
2. a) Who performs the MAC algorithm for SDMA? What could be possible roles of
mobile stations, base stations and planning from the network provider?
b) How are guard spaces realized between users in CDMA?
3. Explain how tunneling works in general and especially for mobile IP using IP-in-IP,
minimal and generic routing encapsulation respectively. Discuss the advantages and
disadvantages of these three methods.
4. a) Explain congestion control in traditional TCP.
b) Describe transaction oriented TCP. How does the integration of connection
establishment, data transfer, and close functions into one help in transmitting and
receiving at the TCP nodes.
5. a) Explain about context-aware computing.
b) Explain the situations in which a database can crash. How does a database recover
using recovery manager? What is the role of logged entries in updating transactions?
6. a) Describe pull-based data-delivery mechanism? What are the advantages and
disadvantages of pull-based data-delivery?
b) Explain the following selective tuning and indexing techniques.
(i) Flexible indexing method (ii) Distributed index based method
7. a) What are the benefits of location information for routing in ad-hoc networks, which
problems arise?
b) What are the security threats to a MANET? Why a MANET faces greater security
threats than a fixed infrastructure network?
8. a) Explain wireless session protocol.
b) Explain different user scenarios of Bluetooth.
No comments:
Post a Comment