IT1402- mobile computing - Nov/dec 2009 question paper

IT1402- mobile computing - Nov/dec 2009 Anna University PREVIOUS Question paper

answer ALL questions.
PART A- (10 X 2= 20 Marks)

1. Why do Hidden and Exposed terminal problems arise?

2. Differentiate Broadcast from Multicast.

3. Detail the features of MSAT.

4. How can an efficient routing be made in satellite systes?

5. When are tuning frequency and frequency considered?

6. How can you utilize mobile antennas efficiently?

7. Compare various modulation techniques.

8. When it's required to go for GMSK, GFSK and DQPSK?

9. In what functionalities Switches differ from Routers?

10. How and why does I-TCP isolate problems on the wireless link?

PART B - (5 X 16 = 80 Marks)

11. (a) Consider three users and Barker code of six bits each for the users transmitting the signals, introduce noise and near/far problem while transmitting and reconstruct the data in the receiving side providing the proper countermeasures for the complications. (Note: Use CDMA technologies) (Marks 16)

(b) (i) Table the frequency bands useed for wireless applications with their ranges, propagation models and applications. (Marks 6)

(ii) Represent diagrammatically the protocol machines for multiple access with collision avoidance. (Marks 10)

12. (a) (i) Sketch the data network in your campus. How many hosts are there and how large is the user population? What is the speed of the access link to the Internet? How so you gain access to the Internet? How much does home access to the Internet costs? (Marks 10)

(ii) Why are so many different identifiers/addresses (e.g. MSISDN, TMSI, IMSI) needed in GSM? Give reasons and distinguish between user- related and system related identifiers. (Marks 6)

(b) (i) Consider a mobile user who is migrating from a place to another place, provide him a seamless service by satellite system, also sketch the architecture. (Marks 8)

(ii) Discuss the importance of DECT Protocol Layers. (Marks 8)

13. (a) (i) Detail the time- bounded service on top of the standard DCF mechanism where ad hoc networks cannot use the function. (Marks 8)

(ii) Discuss the PHY frame format of an IEEE 802.11 using the spread spectrum technique which separates by code. (Marks 8)

(b) (i) The channel access control sublayer of HIPERLAN offers a connectionless data transfer service to the higher MAC layer. Justify the above statement with related references. (Marks 10)

(ii) Discuss the functionalities and support provided by L2CAP. (Marks 6)

14. (a) Discuss and detail the differences in topology reorganization in DSDV and DSR routing protocols. (Marks 16)

(b) (i) What are the general problems of mobile IP regarding security and support of quality of service? (Marks 8)

(ii) Name the inefficiencies of mobile IP regarding data forwarding from a correspondent node to a mobile node. What are optimizations and what additional problems do they cause? (Marks 8)

15. (a) What are the major difference between WAP 2.0 and WAP 1.x? What influenced the WAP 2.0 development? (Marks 16)

(b) Detail about UTMS Radio Interfaces in Frequency Division Duplex and Time Division Duplex modes. (Marks 16)
“Work hard in silence, let your success be your noise...”

    IT1402- mobile computing - Nov/dec 2009 question paper