Вы находитесь на странице: 1из 3

Sri Manakula Vinayagar Engineering College, Puducherry

MOBILE COMPUTING
APRIL 2015 APRIL/MAY2014
PART - A PART - A
1. What are the limitations of wireless communications? 1. How are guard spaces realized between users in CDMA?
2. Define palm pilot. 2. Differentiate Hard and soft hand off.
3. Write about Mobileare Office Server. 3. Compare the different types of transmission errors that can
4. State about Interoperability. occur in wireless and wired networks
5. What are the disadvantages of Virtual IP Protocols? 4. How can DHCP be used for mobility and support of Mobile-IP
6. Write about MOWSER 5. What advantages does the use of IPV6 offer for mobility?
7. What is Mobile Client/Server Data Access? 6. Write about the requirements of Mobile-IP
8. Mention the uses of the Two-tier Transaction Model. 7. Mention any two issues that arises in mobile data management.
9. List the various mobile computing models. 8. Discuss the problems of a file system in mobile environment.
10. What is Brew? What are its uses? 9. What are mobile agents?
PART - B 10. Describe the mobile client server model.
UNIT - I PART - B
11.Explain the basics of Digital Cellular Systems. UNIT - I
OR 11.Explain the wireless and mobile computing architecture.
12.Discuss about any four portable information appliances. OR
UNIT - II 12.Explain briefly about TDMA,CDMA.
13.Briefly discuss about various End-User Client Applications. UNIT - II
OR 13.Describe the 3G wireless networks.
14.Enumerate the concepts of 3G wireless networks. OR
UNIT - III 14.Write notes on mobility middleware.
15.Compare and contrast Loose Source Routing Protocol and UNIT - III
Mobile IP. 15.Discuss in detail the applications of GPRS.
OR OR
16.How Quality of Service is achieved in Mobile Networks? Briefly 16.Explain the concept of Mobile IP with example.
discuss. UNIT - IV
UNIT - IV 17.Explain briefly about Kangaroo transaction model and clustering
17.Write short notes on Reporting and Co-Transactions and the model.
Kangaroo Transaction Model. OR
OR 18.Explain briefly about isolation only and transaction model.
18.Discuss about Isolation-Only Transactions and Semantic-based UNIT - V
Nomadic Transaction Processing. 19.Explain the following mobile computing models.
UNIT - V a)Client server model b)Mobile agent model
19.Compare the Client/Server Model with the Client/Proxy/Server OR
Model. 20.Explain the thin client model and discuss operation model.
OR
20.Give brief introduction to the following tools: Sybian and EPOC.

MOBILE COMPUTING
Sri Manakula Vinayagar Engineering College, Puducherry

APRIL 2013 NOVEMBER 2013


PART - A PART - A
1. Write down the Nokia 9000 specification 1. What is Odyssey architecture?
2. What are the limitations of mobile environment? 2. Describe the Ninja without appropriate credentials.
3. What is UMTS? 3. Limitations of wireless and mobile communications.
4. What is Shiva’s PPP? 4. What is quality of service
5. What are the differences between Mobile IP & CDPD? 5. Explain in trade-offs
6. What is the role of Diffie-Hellman key exchange protocol in 6. What is KT?
mobile networks? 7. Define RPC.
7. What is Kangaroo transaction model? 8. What are the four types of mobile transaction?
8. Define presentation tier. 9. What are the different types of mobile computing models?
9. How can thin clients are utilized? 10. What are the advantages and disadvantages of Client-Server
10. What is EPOC? model?
UNIT - I UNIT - I
11 a. List out the limitations of wireless and mobile network. 11. Explain in detail about digital cellular system
11 b. Discuss about the architecture of wireless mobile computing 12. Explain the following in detail
with neat diagram. Palm top computers b. Hand held computers
12. Briefly discuss about the wireless network technology UNIT - II
UNIT - II 13. Explain in detail about the third generation wireless network
13. Briefly discuss about Puppeteer architecture and Explain in 14. Explain the end user application
detail about client application. Interacts with data service through UNIT - III
proxies. 15. Explain in detail about the mobile internet protocol
14 a. Write short note on Unicast and Multicast discovery 16. Explain in detail about Quality of service in mobile network
UNIT - IV
14 b. Explain in detail about security mechanism of three services
17. Explain in detail about the following
discovery framework.
a. Reporting and co-transactions
UNIT - III
b. Kangaroo transactions
15 a. Write short notes on CDPD
c. Clustering model
15 b. Discuss briefly about security and authentication in mobile
18. Explain in detail about the following
networking.
a. Isolation only transactions
16 a. Write short notes on UMTS with architecture.
b. Two-tier transactions
16 b. Discuss about the mobile access in World Wide Web. c. Semantic based Nomadic transactions
UNIT - IV UNIT - V
17 a. Briefly explain about the mobile transactions 19. Explain in detail about the following
17 b. Explain about the clustering algorithms a. Client/Server
18 a. Discuss about two tier transaction model b. Client/Proxy/Server model
18 b. Explain about isolation transaction level. 20. Explain in detail about the following
UNIT - V a. Disconnected operation model
19 a. Write short notes on Thin client model b. Mobile agents
19 b. Discuss about client server model c. Thin client model
20. Briefly explain about the tools used in mobile computing model

MOBILE COMPUTING
Sri Manakula Vinayagar Engineering College, Puducherry

APRIL/MAY -2016
NOVEMBER- 2015
PART - A
PART – A
1. Define a cell? 1.What is meant by Pervasive computing?
2. What do you mean by frequency reuse? 2.State the limitations of mobile computing?
3.What is mobility management? 3.Describe the concept of mobile agent system Inter Operability
4.What are the limitations of wireless and mobile communication? Facility(MASIF).
5.Distinguish between 3G and 4G cellular networks? 4.List the features of wireless networks.
6.What is meant by GPRS? 5.What are the ways UMTS paid attention to QOS?
7.Define Kangaroo Transaction Model? 6.Describe the benefits of GPRS.
8.Define IP addressing? 7.What are the properties of a “mobile transaction”?
9.Brief on mobile client server model? 8.Write a description on “Semantic based nomadic transaction processing?
10.List out basic objectives of WAP. 9.What the features of CLDC?
10.What is EPOC?
UNIT - I
UNIT - I
11.Explain the power control mechanism in CDMA. 11.With semantic diagram , explain the mobile computing architecture.
12.What are the security threats to wireless networks? Explain? 12.Compare and contrast the principle of CDMA and TDMA.
UNIT - II UNIT – II
13.Explain the different categories of mobility support software.
13.Explain about 3G wireless networks. 14.Elaborate on the mobile waves for application development and service
14.Explain the following: discovery.
(a)Mobility support software UNIT - III
(b)Mobility Middleware 15.Discuss about the mobile IP system components and its functionalities.
UNIT - III 16.Write a note on the following:
(a) CDPD
15. Explain about Virtual IP protocols. (b) Loose source routing protocol.
16. What are the merits and demerits of mobile access to WWW? UNIT – IV
Explain 17.Describe the steps involved in Kangaroo transaction model.
UNIT – IV 18.Explain the 2-Tier transaction model with its advantages.
UNIT – V
17. Explain the following: 19.What is BREW ? Explain the steps involved in developing and deploying
(a) Two Tier Transaction model a simple BREW application?
(b) Clustering model 20.Write a note on the following:
(a) Mobile agent model
18.What do mean by semantic based nomadic transaction (b) Windows CE.
processing? Explain?
UNIT – V
19. Compare and contrast different mobile computing models.
20.What are mobile agents? Explain the mobile agent model?

MOBILE COMPUTING

Вам также может понравиться