Sunteți pe pagina 1din 6

SAMPLE EXAMINATION PAPER SAMPLE ANSWERS

EXAMINATION PAPER School Department Level TITLE OF PAPER COURSE CODE Date and Time Computing and Mathematical Sciences Computer Science Three Mobile Computing COMP1306 SAMPLE EXAM PAPER

This paper contains SIX questions. ALL questions carry the same number of marks. Marks will be awarded for the best FOUR answers. Each Question is Worth 25 marks.

Mobile Computing COMP 1306

Page 1 of 6

SAMPLE EXAMINATION PAPER SAMPLE ANSWERS


1. (a) IP 6 uses 128 bit address, as opposed to IP 4, this allows IP 6 to provide a vastly increased range of address. (b) Layer ISO/OSI 7 6 5 4 3 2 1 Application Presentation Application Session Transport Network Data Link Physical Transport Internet Network Segments Packets Frames Bits Data TCP/IP Encapsulation

(c) The ISO/OSI 7 Layer Model Layer 7: The Application Layer The application layer is the OSI layer that is closest to the user. It provides network services to the user's applications. It differs from the other layers in that it does not provide services to any other OSI layer, but rather, only to applications outside the OSI model. Examples of such applications are spreadsheet programs, word processing programs, and bank terminal programs. The application layer establishes the availability of intended communication partners, synchronizes and establishes agreement on procedures for error recovery and control of data integrity. Layer 6: The Presentation Layer The presentation layer ensures that the information that the application layer of one system sends out is readable by the application layer of another system. If necessary, the presentation layer translates between multiple data formats by using a common format. Layer 5: The Session Layer As its name implies, the session layer establishes, manages, and terminates sessions between two communicating hosts. The session layer provides its services to the presentation layer. It also synchronizes dialogue between the two hosts' presentation layers and manages their data exchange. In addition to session regulation, the session layer offers provisions for efficient data transfer, class of service, and exception reporting of session layer, presentation layer, and application layer problems. If you want to remember Layer 5 in as few words as possible, think of dialogues and conversations. Layer 4: The Transport Layer The transport layer segments data from the sending host's system and reassembles the data into a data stream on the receiving host's system. The Mobile Computing COMP 1306 Page 2 of 6

SAMPLE EXAMINATION PAPER SAMPLE ANSWERS


boundary between the transport layer and the session layer can be thought of as the boundary between application protocols and data-flow protocols. Whereas the application, presentation, and session layers are concerned with application issues, the lower four layers are concerned with data transport issues. The transport layer attempts to provide a data transport service that shields the upper layers from transport implementation details. Specifically, issues such as how reliable transport between two hosts is accomplished, is the concern of the transport layer. In providing communication service, the transport layer establishes, maintains, and properly terminates virtual circuits. In providing reliable service, transport error detection-and-recovery and information flow control are used. Layer 3: The Network Layer The network layer is a complex layer that provides connectivity and path selection between two host systems that may be located on geographically separated networks. Layer 2: The Data Link Layer The data link layer provides reliable transit of data across a physical link. In so doing, the data link layer is concerned with physical (as opposed to logical) addressing, network topology, network access, error notification, ordered delivery of frames, and flow control Layer 1: The Physical Layer The physical layer defines the electrical, mechanical, procedural, and functional specifications for activating, maintaining, and deactivating the physical link between end systems. Such characteristics as voltage levels, timing of voltage changes, physical data rates, maximum transmission distances, physical connectors, and other, similar, attributes are defined by physical layer specifications.

2. (a) Attenuation, scattering, diffraction, reflection, refraction. Except for attenuation all other effects can divert waves from a straight line (b) Spreading can be achieved by Frequency Hopping Spread Spectrum (FHSS) or Direct Sequence Spread Spectrum (DSSS) The main benefits of spread spectrum is it is very robust against interference and has inherent security (if the spreading code is unknown). (c) TDM/FDM systems have an upper limit of simultaneous users. The system assigns a certain time slot at a certain frequency to the user. If all time slots at all frequencies are occupied no more users can be accepted. Provided there is capacity, additional users do not influence other users as they are separated in time and frequency. In CDM systems where all users use the

Mobile Computing COMP 1306

Page 3 of 6

SAMPLE EXAMINATION PAPER SAMPLE ANSWERS


same frequencies at the same time, with separation being achieved by channel codes, each additional users decreases transmission quality of all other users, until eventually the signal to noise ratio limits the numbers of simultaneous users 3. (a) The JVM defines a set of services that are needed to run Java programs and provides links to the underlying operating system. This enables platform independent code to be developed for mobile devices. (b) Wireless networking to accommodate technologies such as Bluetooth, 802.15, 802.11x protocols, infrared GPRS Location Independent Computing Utilities are needed for location and temporal awareness to support different devices operating in different places and times Physical constraints of devices minimise power consumption, cope gracefully with sudden power loss, support for small screens, minimal memory. Increased levels of uncertainty in the environment Networks coming and going, devices appearing and disappearing, wide ranges of services. System should be able to handle these ad hoc. (c) Palm Power Low power platform, but does not have extensive support for peripheral power saving control Memory Good memory usage for small devices Networking Good support Telephony Extensive support Windows A variety of power saving options, including peripherals, but typically inefficient and power hungry Memory hungry Good support Limited support, dependant on plug ins Symbian Very power efficient and extensive support for power saving in peripheral equipment Very memory efficient Good support Extremely comprehensive support

Mobile Computing COMP 1306

Page 4 of 6

SAMPLE EXAMINATION PAPER SAMPLE ANSWERS


4. (a) It is too expensive to maintain strong consistency. Continuous updates require permanent connectivity, without connectivity all access must be blocked. Alternatives always include weakening the strong consistency. Schemes include periodic updates, reintegration and manual reintegration. (b) WML offers only a few formatting instructions,. It rather defines the intention of the author of a page. This is more flexible compared to HTML which relies on powerful displays. Scripting can help to reduce traffic by checking input on mobile device (Client side validation). Without scripting the device must transfer all input for checking to a server. (c) Not all mobile phone networks provide the same level of security. GSM for example provides only encryption over the air WAP adds security from the end device to the WAP gateway, however WAP does not guarantee end to end security. The security is broken at the gateway. 5. (a) Attenuation caused by atmosphere, dust, rain, for, snow, blocking of signals due to obstacles. The lower the elevation, the longer is the way for the signals to travel through the atmosphere. Without a beam, high output power is needed (b) Without any additional repeaters on earth, satellite phones only work outdoors, or close to windows. Satellite signals are typically too weak to penetrate roofs, and require line of sight. Thus high buildings may block the signal. (c) GEO Satellites seem to be pinned to the sky; pros fixed antennas possible, wide area coverage, simpler system design; cons long delays, high transmission power, low system capacity, weak signals at high latitudes and crowed positions over the equator. LEO pros low delay, lower transmission power, inter satellite routing; cons high complexity, high system cost MEO somewhere in between GEO and LEO HEO non circular orbits; pros- higher capacity over certain points cons complex systems

Mobile Computing COMP 1306

Page 5 of 6

SAMPLE EXAMINATION PAPER SAMPLE ANSWERS


6. (a) GSM uses SDM, FDM and TDM. SDM operators design the cell layout, place base stations and reuse frequencies according to certain cluster patterns, FDM Regulation authorities assign channels to operators, operators assign channels to bases stations, and base stations assign a certain channel during data transmission. TDM Base stations assign a time slot or several time slots to a terminal for transmission. (b) The typical reason for a handover is a weaker signal from the current base station, compared with a neighbouring base station. Another reason could be the current load situation: the network could decide to offload some users from a crowed cell. To succeed the same resources are needed in the new cell as were available in the old one, There must be enough time slots available to handle the same number of simultaneous connections, other wise bandwidth will decrease. (c) The GSM only stores the current location area in the visitor location register. Each time a user changes the location area, the change is reflected in the visitor location register. Additionally, periodic updates are possible. Roaming includes changing the network operator. The Home location register always stores the current VLR for the user, no matter if inside the won or inside a foreign network. Precise localisation of users is performed during call setup only.

Mobile Computing COMP 1306

Page 6 of 6

S-ar putea să vă placă și