1.    Define Mobile computing.
Mobile computing as a generic term describing ability to use the technology to wirelessly connect to and use centrally located information and/or application software through the application of small, portable, and wireless computing and communication devices.

2.    Difference between FDMA and TDMA.

FDMA

TDMA

 

Frequency Division Multiplexing Access is a method of dividing a single band into 30 discrete channels.

Time Division Multiplexing Access that also allows more subscribers to use the same frequency band.

Each channel would then be capable of handling separate traffic, whether it’s a call or a data transfer.

TDMA divides a single channel into 3 discrete time partitions.

FDMA is also used in the Total Access Communication System (TACS).

TDMA is utilized by Digital-Advanced Mobile Phone System (D-AMPS) and Global System for Mobile communications (GSM).


 3.    Why do Hidden and Exposed terminal problem arise.
Hidden terminal problem is due to the fact that a node (say A) transmitting to another node (say B) cannot hear transmissions from another node C, which might also be transmitting to B, and might interfere with the A-to-B transmissions.
Exposed node problem occurs when a node is prevented from sending packets to other nodes because of a neighboring transmitter.

4.    Prove that Barker code has good auto correlation.
When the receiver attempts to correlate the received coded symbols with respect to any of the codes which it internally generates, it is not able to correlate even when it uses exactly the same code as the one used for transmission.
Reasons for no correlation
Propagation delay
Inappropriate code

5.    Write the characteristics of mobile computing.
•    Ubiquity
•    Location awareness
•    Adaptation
•    Broadcast
•    Personalization

6.    Draw the 3 Tier structure of Mobile computing application.

Presentation(Tire-1)

Application(Tier-2)

Data(Tier-3)

7.    State the issue in wireless MAC protocol.
•    Hidden Terminal Problem.
•    Exposed Terminal Problem.

8.    Draw the Taxonomy of MAC protocol.


9.    Write the different Random assignment scheme in MAC.
•    ALOHA
•    Slotted ALOHA
•    CSMA
•    CSMA/CD
•    CSMA/CA


10.    Difference between Mobile computing vs Wireless Networking.

Mobile computing

Wireless Networking

Mobile Computing denotes accessing information and remote computational services.

Wireless Networking provides the basic communication infrastructure.

It is based on wireless networking.

Wireless Networking is an important ingredient of mobile computing.

11.    Define mobile IP.
Mobile IP (or MIP) is an Internet Engineering Task Force (IETF) standard communications protocol that is designed to allow mobile device users to move from one network to another while maintaining a permanent IP address.

12.    What is Tunneling process?
The encapsulation process creates a logical construct called a tunnel between the device that encapsulates and the one that decapsulates.

13.    Define COA.
A care-of address (usually referred to as CoA) is a temporary IP address for a mobile device. This allows a home agent to forward messages to the mobile device. A separate address is required because the IP address of the device that is used as host identification is topologically incorrect - it does not match the network of attachment. The care-of address splits the dual nature of an IP address, that is, its use is to identify the host and the location within the global IP network.

14.    State the features of mobile IP.
•    Transparency
•    Compatibility
•    Security
•    Efficiency and Scalability

15.    State the key mechanism used in Mobile IP.
•    Discovering the care-of-address
•    Registering the care-of-address
•    Tunnelling to the care-of-address