Sunteți pe pagina 1din 3

Introduction:

Define Mobile Computing, Pervasive Computing, Ubiquitous Computing. Discuss the applications of Mobile Computing. Compare wired and wireless Networks. What are the design issues and constraints of mobile and wireless networks. Explain MSK, QAM for 8 PSK, 16 PSK and draw constellation diagram using above to encode the following bit stream 101011101101101. Give the range of frequencies useful for mobile and wireless network. Explain the concept of spread spectrum. Differentiate FHSS and DSSS. Give a reference model for mobile (layered architecture) communication. Give the signal propagation effects. Define cell breathing and give the different cell structures.

MAC:
Define Multiplexing, discuss SDMA, FDMA, TDMA and CDMA. Why CSMA / CD is not applicable for mobile comm. Define i) Hidden Terminal ii) Exposed Terminal Explain MACA. Discuss TDMA variations. .Define i) Pure ALOHA ii) Slotted ALOHA iii) CSMA / CD Persistent, Non Persistent c) P-Persistent

GSM:
Explain GSM Architecture and Show various subsystems in GSM architecture. Explain about GSM security features. Discuss A3, A5, A8 algorithms with suitable diagrams. Describe the authentication and access grant processes in GSM. Explain the GSM frame format and its hierarchy. Explain the hand over mechanism in GSM.

Mobile Network LAYER:


How can DHCP be used for mobility and support mobile IP Name the inefficiencies of mobile IP regarding data forwarding a correspondent node to a mobile node. What are optimizations and what additional problems do they cause. Explain about tunneling and reverse tunneling concepts of mobile IP What is the difference between care of address and co-located care of Address in Mobile networks

Explain with a suitable diagram, how IP packet delivery is done in Wireless network. Explain Agent discovery and Registration

Mobile Transport layer:


compare the various classical enhancements to the TCP for supporting mobility Describe indirect TCP. Explain the modifications of indirect TCP as the selective repeat and mobile-end transport protocol. What are the advantages and disadvantages of I-TCP What are the functions of Snnoping sub-layers in the Snooping TCP. Explain M-TCP. How does a supervisory host send packets to the mobile host and affixed TCP connection. Give the advantages and disadvantages of M-TCP Explain with a diagram the Fast Retransmit and Fast Recovery in TCP in mobile networks. Why are three DACKS used to force retransmission in when a mobile node is handed over to a foreign network.

Data Broadcasting:
Show architecture for data dissemination and broadcast. . Explain the reasons for communication asymmetry in mobile networks. Give examples of asymmetric communication architecture for data dissemination. Describe push based data delivery mechanism. What are the advantages, disadvantages of push based data dissemination. Describe pull based data delivery mechanism. What are the advantages, disadvantages of pull based data dissemination. Describe hybrid data delivery mechanism. What are the situations in which push based and pull based mechanisms are preferred. Compare flat disk, skewed disk, multi disk broadcast model. Describe situations in which one is preferred over the other. EXPLAIN DAB EXPLAIN DVB.

Manets: Describe a Manet. How does a MANET differ from a fixed infrastructure network Describe the properties of MANETS Write about the mobile adhoc netwroks and their protocols in details Explain routing in adhoc networks using DSDV , DSR and Alternative Metrics with diagrams

Blue Tooth: Explain Bluetooth Architecture with a diagram Show master Slave architecture in piconet of Bluetooth devices. What are the states of Blue tooth device. Explain security in Bluetooth Explain with neat diagram for optimizing the power in Bluetooth

WAP: Explain WAP architecture with a block diagram What are the primary goals of WAP forum and How are they reflected in WAP architecture What problems of HTTP can the WSP solve. How are these solutions needed in Wireless Environment. Why does WAP define its own security layer and does not rely on the security provided by the mobile phone network. What problems does the WAP security layer cause.

S-ar putea să vă placă și