IT8602 Mobile Communication
IT8602 Mobile Communication
OF INFORMATION TECHNOLOGY
UNIT I INTRODUCTION 9
Introduction to Mobile Computing – Applications of Mobile Computing- Generations of Mobile
Communication Technologies-MAC Protocols – SDMA- TDMA- FDMA- CDMA
UNIT II MOBILE TELECOMMUNICATION SYSTEM 9
GSM – Architecture – Protocols – Connection Establishment – Frequency Allocation – Routing –
Mobility Management – Security –GPRS- UMTS- Architecture
UNIT III WIRELESS NETWORKS 9
Wireless LANs and PANs – IEEE 802.11 Standard – Architecture – Services – Blue Tooth- Wi-Fi –
WiMAX
UNIT IV MOBILE NETWORK LAYER 9
Mobile IP – DHCP – AdHoc– Proactive and Reactive Routing Protocols – Multicast Routing-
Vehicular Ad Hoc networks ( VANET) –MANET Vs VANET – Security
UNIT V MOBILE TRANSPORT AND 9
APPLICATION LAYER
Mobile TCP– WAP – Architecture – WDP – WTLS – WTP –WSP – WAE – WTA Architecture –
WML
TOTAL: 45 PERIODS
OUTCOMES:
At the end of the course, the student should be able to:
Explain the basics of mobile telecommunication system
1
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT. OF INFORMATION TECHNOLOGY
UNIT – I INTRODUCTION
2
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT. OF INFORMATION TECHNOLOGY
3
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT. OF INFORMATION TECHNOLOGY
7. List out the differences between Mobile Computing and Wireless Networking.
May/June 2017,Dec 2017 ,May 2018, May 2021 [U]
S.No Mobile Computing Wireless Networking
It is a technology that access data It is a network that uses wireless data
1. through wireless network connections for connecting network
nodes
It denotes accessing information and It provides the basic communication
2. remote computational services while on infrastructure necessary for mobile
the move computing
It refers to computing devices that are It is a method of transferring
not restricted to a desktop. Eg: Smart information between a computing
3.
Phone, PDA, Laptop etc., devices such as PDA & data sources
without a physical connection
It refers to a device performing It refers to the data communication
computation that is not always without the use of a landline. Eg.
4.
connected to a central network Cellular Telephone, Two way radio,
Satellite, Wireless Connection.
4
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT. OF INFORMATION TECHNOLOGY
5
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT. OF INFORMATION TECHNOLOGY
The Hidden Terminal Problem arises when at least three nodes (A, B and C) communicating.
B is in the radio range of A, and B is also with the radio range of C. The nodes A and C are not
in the radio range of each other. If both A and C start to transmit to B at the same time, the data
received at B would get garbled. This situation arises because A and C are “hidden” from each
other, because they are outside each other’s transmission range.
Note:- Hidden Terminal causes Collisions.
Exposed Terminal Problem:
Exposed Terminal Problem arises when all the three nodes are in the radio range of all nodes.
Now B is transmitting to A, C wants to send to another terminal (not A or B) outside the range. C
senses the carrier and detects that the carrier is busy, so C postpones the transmission until it
detects the medium is free. But A is outside the radio range of C. This problem arises because “C
is exposed to B”.
III YEAR / VI SEMESTER /2019-2020
6
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT. OF INFORMATION TECHNOLOGY
Note:- Exposed Terminal leads to inefficient spectrum usage and unnecessary transmission
delays.
16. What are the classifications of MAC Protocols? [R]
Wireless MAC protocols are classified into
A. Fixed-assignment schemes (Circuit-switched)
B. Random-Assignment schemes(CL packet-switched)
C. Reservation-based schemes(CO packet-switched)
7
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT. OF INFORMATION TECHNOLOGY
8
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT. OF INFORMATION TECHNOLOGY
Half Duplex operation –> either send or receive but not both at a given
time
Time varying channel
Burst channel errors
24. What are the challenges in mobile communication?
Portability: Portable computers face physical challenges (volume, weight, power
consumption, cost),
pragmatic challenges (increased chance of data loss, small user-interface issues), and
systems issues (network integration, resource imbalance such as lack of local storage,
impoverished computational power).
25. Give some Examples of Reservation based schemes in MAC Protocols.[U] May 2019
Examples of protocols in this category are, D-PRMA [3], CATA, and R- CSMA.
9
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT. OF INFORMATION TECHNOLOGY
10. Describe the applications of mobile computing[Ap]. Nov/Dec 2016, May/June 2017
11. Explain the various MAC issues in detai[U]l. May/June 2017
12. Explain fixed assignment scheme with a neat diagram.[R] May/June 2017, Dec 2017, May
2019
13. Explain hidden and exposed terminal problem in infrastructure-less network [U]Dec 2017, May
2021
14. Apply Mobile computing to design Taxi disapatcher and monitoring service. Explain the
components in detail. [Ap]May 2018 Nov/Dec 2018
15. List the characteristics of mobile systems.[U] May 2018
16. What is CSMA? What are the categories of CSMA? Explain their working with advantages
and disadvantages?[U] May 2018
17. How does MAC protocol for wireless networks differ from those in wired network?
Explain. May 2021
COURSE OUTCOME: Explain the basics of mobile telecommunication system.
10
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT. OF INFORMATION TECHNOLOGY
PART A
1. Expand GSM, GPRS and UMTS. [R]
GSM – Global System for Mobile Communication
GPRS – General Packet Radio Services
UMTS – Universal Mobile Telecommunication Systems
2. What is meant by GSM? [R]
Global System for Mobile Communication (GSM) is a wide area wireless
communications system that uses digital radio transmission to provide voice, data and
multimedia communication services. A GSM system coordinates the communication between a
mobile telephones (Mobile Stations), base stations (Cell Sites) and switching systems.
3. What is the important characteristic of GSM? [U]
GSM provides data services in addition to voice services and it is compatible to 1G
system.
4. What is the use of GSM in mobile telecommunication? [U] Nov/Dec 2011&12
May/June 12
This system was soon named the Global System for Mobile communications (GSM), The
primary goal of GSM was to provide a mobile phone system that allows users to roam and
provides voice services compatible to ISDN and other PSTN systems
5. Specify the three different categories of services defined by GSM [U]
Bearer services
Tele services
Supplementary services
6. What is the use of emergency number? [U]
11
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT. OF INFORMATION TECHNOLOGY
Another service offered by GSM is the emergency number. This service is mandatory for
all providers and free of charge. This connection also has the highest priority, possibly pre-
empting other connections, and will automatically be set up with the closest emergency center.
7. List the important supplementary services offered by GSM. [R] Nov/Dec 2016
User Identification
Call Forwarding (or Redirection)
Automatic call-back
Conferencing with up to 7 participants
8. What is meant by SMS and EMS? [R]
A useful service for very simple message transfer is the short message
service(SMS), which offers transmission of messages of up to 160 characters
The successor of SMS, the Enhanced Message Service (EMS), offers a larger
message size (e.g., 760 characters, concatenating several SMs), formatted text,
and the transmission of animated pictures
9. What are the sub systems available in GMS? [R] Nov/Dec2018
Radio subsystem
Network and switching subsystem
Operation subsystem
10. What is RSS? [R]
RSS stands for Radio Sub System. It compri2ses of all radio specific entities.
11. Name the entities of RSS. [R]
1. Mobile Station (MS)
2. Base Station Subsystem (BSS)
3. Base Transceiver Station (BTS)
4. Base Station Controller (BSC)
12. Classify the functions of HLR and VLR. [U]
Home Location Registers(HLR) Visitor Location Registers(VLR)
HLR is a mobile operator database that VLR is a temporary database that is
includes details specific to each subscriber updated whenever a new MS enters its
such as phone number, subscriber’s IMSI, area by roaming. The information is
pre/postpaid, user’s current location, obtained from the corresponding HLR.
12
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT. OF INFORMATION TECHNOLOGY
billing details, phone status – parameters. i.e., VLR supports roaming functions for
users outside the coverage area of their
own HLR.
Basic Parameters stored in the HLR: The additional data stored in the VLR in
Subscriber ID (IMSI and MSISDN) telecom is listed below:
Current Locationo f the user 1. Location Area Identity (LAI).
Supplementary Services Subscriber to 2. Temporary Mobile Subscriber
(Caller Tone, Missed Call Alert, Any Identity (TMSI).
Other Services etc.) 3. Mobile Station Roaming Number
Subscriber Status (Registered or (MSRN).
Deregistered) 4. Mobile status (busy/free/no answer
Authentication Key and AUC etc.).
Functionality
Mobile Subscriber Roaming Number
Subscribers
Security Management
Account Billing
14. List the 3 important features of GSM Security. [R] May/June 2016
1. Authentication – used to protect the network against unauthorized use.
2. Confidentiality – Data on the radio path is encrypted between the Mobile
Equipment (ME) and the BTS which protects user traffic and sensitive signaling
data against eavesdropping.
3. Anonymity – Anonymity is achieved by allocating Temporary Mobile
Subscriber Identity (TMSI) instead of permanent identities to protect against
tracking a user’s location and obtaining information about a user’s call log.
15. What are the characteristics of GSM? [U]
1. Communication
2. Total Mobility
3. World Wide Connectivity
13
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT. OF INFORMATION TECHNOLOGY
4. High Capacity
5. High Transmission Quality
6. Security Functions
7. SIM Card Bounded Service
16. Give the block diagram of GSM Authentication. [R]May/June 2014
14
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT. OF INFORMATION TECHNOLOGY
2. Consistent IP services
3. Same infrastructure for different air interfaces
4. Integrated telephony and Internet infrastructure
5. Service innovation independent of infrastructure
21. What are the services offered by GPRS? [U] (Dec 2017) May/June 2019
22. GPRS offers end-to-end packet-switched data transfer services which can be
categorized into the following two types:
1. Point-To-Point Service (PTP): It is between two users and can either be
connectionless or connection-oriented.
2. Point-To-Multipoint Service (PTM): It is a data transfer service from one user to
multiple users.
23. Point out the purpose of EIR in Mobile Computing. [U]
Equipment Identity Register (EIR) is a database that used to track handsets using the
IMEI. It helps to block calls from stolen, unauthorized, or defective mobiles.
24. What is the use of VOIP? [U] May/June 2013
Voice over Internet protocol, a technology for making telephone calls over the Internet in
which speech sounds are converted into binary.
25. What is meant by roaming? [R]
In wireless telecommunications, roaming is a general term referring to the extension of
connectivity service in a location that is different from the home location where the service was
registered. Roaming ensures that the wireless device is kept connected to the network, without
losing the connection.
26. What is the function of GGSN? [U] May/June 2014 Nov/Dec2018
The gateway GPRS support node (GGSN) is the interworking unit between the
GPRS network and external packet data networks (PDN). This node contains routing
information for GPRS users, performs address conversion, and tunnels data to a user
via encapsulation.
The GGSN is connected to external networks (e.g., IP or X.25) via the Gi
interface and transfers packets to the SGSN via an IP-based GPRS backbone network
(Gn interface).
15
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT. OF INFORMATION TECHNOLOGY
16
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT. OF INFORMATION TECHNOLOGY
Call Waiting.
Multiparty service.
32. Write the suggestions of mobile phone with respect to human body. [An] May/June
2017
Based on mixed epidemiological evidence on humans regarding an association between
exposure to RF radiation from wireless phones and head cancers (glioma and acoustic
neuroma), RF fields have been classified by the International Agency for Research on Cancer
as possibly carcinogenic to humans (Group 2B). Studies to date provide no indication that
environmental exposure to RF fields, such as from base stations, increases the risk of cancer or
any other disease.
33. Defrne Handoff. What are its types ?(U)(Dec 2017)
A handoff refers to the process of transferring an active call or data session from one cell
in a cellular network to another or from one channel in a cell to another. ...
34.What is frequency range of uplink and downlink in GSM network?(U) May 2018
In satellite telecommunication, a downlink is the link from a satellite down to one or more
ground stations or receivers, and an uplink is the link from a ground station up to a satellite.
Some companies sell uplink and downlink services to television stations, corporations, and to
other telecommunication carriers.
GSM-900 uses 890 - 915 MHz to send information from the Mobile Station to the Base
Transceiver Station (uplink) and 935 - 960 MHz for the other direction (downlink), providing
124 RF channels
A SIM card, also known as a subscriber identity module, is a smart card that stores data for GSM
cellular telephone subscribers. Such data includes user identity, location and phone number,
network authorization data, personal security keys, contact lists and stored text messages.
17
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT. OF INFORMATION TECHNOLOGY
36. List out the advantages of UMTS networks over 2G networks. [U]May 2019
PART-B
1. Explain GSM architecture and its services with neat diagram. [U] Nov/Dec2011&12,
May/June 12, May /June 2013, Nov/Dec 2013, May/June 2014, Nov/Dec2014, May/June
2016, May/June 2017, (Dec 2017) Nov/Dec2018
2. Explain services offered by GSM. [U] December 2012, Nov/Dec 2013, May/June 2019
3. Explain GSM Authentication and analyze the important features associated with Security
Services.[U] May/June 2016, May/June 2019
4. Draw a neat diagram of GPRS and explain its protocol architecture and services. List its
advantages and disadvantages [An] Nov/Dec 2011&12, May/June 12, May /June 2013,
Nov/Dec 2013, May/June 2014, Nov/dec2014, May/June 2016, Nov/Dec 2016, May/June
2017, May/June 2019
5. Explain in detail about UMTS Architecture and its Services. Describe the function of
HLR and VLR in ceall routing and roaming [U] May/June 2016, Nov/Dec 2016, Dec 2017,
May 2018 Nov/Dec2014, May 2021
6. What are the functions of authentication and encryption in GSM? How is system security
maintained? [U]Nov/Dec 2016
7. Explain in detail about the handovers of GSM. Also discuss the timeline diagram of the
Intra MSC handover. [U]Nov/Dec 2016, May 2018, May 2021
COURSE OUTCOME: Understand the architecture of Wireless LAN technologies.
Wireless LANs and PANs – IEEE 802.11 Standard – Architecture – Services- Bluetooth –
WiMAX.
COURSE OBJECTIVE: Be familiar with the network protocol stack
18
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT. OF INFORMATION TECHNOLOGY
19
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT. OF INFORMATION TECHNOLOGY
WiMAX(802.16)
Third generation or 3G cellular wireless.
10. Define Bluetooth? (R) (May/June 2016)
Bluetooth fills the niche of very short-range communication between mobile phones, PDAs,
notebook computers, and other personal or peripheral devices. For example, Bluetooth can be
used to connect mobile phones to a headset, or a notebook computer to a printer.
12. State the functions of bridges? (R) (Nov/Dec 2010 & April/May 2015 & May/June 2017)
A bridge functions by blocking or forwarding data, based on the destination MAC
address written into each frame of data.
If the bridge believes the destination address is on a network other than that from
which the data was received, it can forward the data to other networks to which it is
connected. If the address is not on the other side of the bridge
Bridges learn the MAC addresses of devices on connected networks by listening to
network traffic and recording.
It maintains a table that maps addresses to ports
13. What is the advantage of FDDI over a basic token ring? (R) (Nov/Dec 2010)
Token ring uses priority and reservation bits, but the priority operation of the FDDI ring
uses a principle that is based on a parameter known as the Token Rotation Time or TRT.
FDDI uses dual rings. When one ring fails, second ring performs data transfer process.
14. Mention some of the physical properties of Ethernet. (R) (April/May 2011)
Implemented on coaxial cable of up to 500 meters in length
Hosts connect by “tapping” into it.
Taps at least 2.5 meters apart
Transceiver is small device directly attached to tap
Detects when line is idle and drives signal when host is transmitting
All protocol logic implemented in the adaptor (not transceiver)
15. What is maximum transmission unit? (U) (May/June 2012)
MTU-Maximum Transmission Unit, which is the largest IP datagram that it can carry in a
20
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT. OF INFORMATION TECHNOLOGY
frame. It is the largest physical packet size, measured in bytes, that a network can transmit.
Any messages larger than the MTU are divided into smaller packets before being sent.
16. What is DHCP? (R) (Nov/Dec 2012)
The Dynamic Host Configuration Protocol (DHCP) is a network protocol used to configure
devices that are connected to a network (known as hosts) so they can communicate on that
network using the Internet Protocol (IP). It involves clients and a server operating in a client-
server model.
17. Differentiate fast Ethernet and gigabit. (An)(Nov/Dec 2012)
21
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT. OF INFORMATION TECHNOLOGY
Standard Description
802.1 Internetworking
802.2 Logical link control
802.3 Ethernet
802.4 Token bus
802.5 Token ring
802.6 Metropolitan area network (MAN)
19. How is the minimum size of an Ethernet frame determined? (E) (May/June 2013)
Minimum Frame Size = 2 * Maximum distance *(data rate / propagation speed)
20. How does an FDDI node determine whether it can send asynchronous traffic and
synchronous traffic? (U) (May/June 2013)
Synchronous traffic can consume a portion of the 100-Mbps total bandwidth of an FDDI
network, while asynchronous traffic can consume the rest. Synchronous bandwidth is
allocated to those stations requiring continuous transmission capability. Such capability is
useful for transmitting voice and video information. Other stations use the remaining
bandwidth asynchronously.
21. What is the average size of an Ethernet frame? (U) (May/June 2014)
The average size of an Ethernet frame is 1000 bytes.
22. What is the access method used by wireless LAN? (U) (May/June 2014)
Wi-MAX(802.16)
Wi-Fi
Bluetooth
22
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT. OF INFORMATION TECHNOLOGY
23. What is the network Address in a class A subnet with the IP address of one of the hosts
as 25.34.12.56 and mask 255.255.0.0? (E) (May/June 2014)
The network Address in a class A subnet is 25.34.0.0
24. What do you understand by CSMA protocol? (U) (April/May 2015)
The “carrier sense” in CSMA/CD means that all the nodes can distinguish between an idle
and a busy link, and “collision detect” means that all the nodes listens as it transmits and can
therefore detect when a frame it is transmitting has interfered (collided) with a frame
transmitted by another node.
25. Identify the class of the following IP Address: (E) (Nov/Dec 2015)
(a) 110.34.56.45 (b)212.208.63.23
110.34.56.45 : Class A
212.208.63.23: Class C
26. Define hidden node problem. (R) (May/June 2016)
In wireless networking, the hidden node problem or hidden terminal problem occurs when a
node is visible from a wireless access point (AP), but not from other nodes communicating
with said AP. This leads to difficulties in media access control.
27. What is scatternet? (R) (Nov/Dec 2016)
Connection of piconet is called scatternet
A secondary station in one piconet can be the primary in another piconet. (or) A device
can be slave in one piconet and master of another.
This station can receive message from the primary in the first piconet (as a secondary) and
acting as a primary, deliver them to secondary in the second piconet
A station can be a member of two piconets
23
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT. OF INFORMATION TECHNOLOGY
PART B
1. Explain the functioning of wireless LAN in detail.(R) (Nov/Dec 2010), May 2021
2. Write architecture of Wi-Fi, Wi-Max. (R) May 2021
3. Explain CSMA in detail(R) (April/May 2011)
4. Explain the physical properties of Ethernet 802.3 with necessary diagram of Ethernet
transceiver and adapter. (R) (Nov/Dec 2012)
5. Explain the physical properties and medium access protocol of Ethernet. (R) (May/June
2012)
6. Describe the transmitter algorithm implemented at the sender side of the Ethernet protocol.
Why should Ethernet frame should be 512 bytes long? (E) (10) (Nov/Dec 2013)
7. Explain how the hidden node and exposed node problem is addressed in 802.11? (U)(6)
8. Explain in detail about the access method and frame format used in Ethernet and token ring.
(U) (16) (April/May 2015)
9. (i) Discuss the MAC layer functions of IEEE802.11 (R) (8) (April/May 2015)
(ii) Briefly define key requirements of wireless LAN (U) (8)
10. Write short notes on: (R) (Nov/Dec 2015)
(i) Ethernet (ii) Wireless LAN
11. Explain the physical properties of Ethernet 802.3 with necessary diagram of Ethernet
transceiver and adapter. (U) (16)(Nov/Dec 2016)
12. Give the comparison between different wireless technologies? Enumerate 802.11 protocol
stack in detail.(U/An)(16)(May/June 2016)
13. Explain the media access control algorithm, CSMA/CD used in Ethernet.Why the same
algorithm cannot be used in wireless LAN (U)(8),(Nov/Dec2018)
14. Explain the services offered by IEEE 802.11 standard.(8), May 2021
Course Outcome: Understand the architecture of Wireless LAN technologies
Mobile IP – DHCP – AdHoc– Proactive and R active Routing Protocols- Multicast Routing-
Vehicular Ad Hoc networks ( VANET) –MANET Vs VANET – Security.
24
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT. OF INFORMATION TECHNOLOGY
PART – A
Mobility allows ad hoc networks created on the fly in any situation where there are
The nodes in ad hoc network need not rely on any hardware and software. So, it can be
25
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT. OF INFORMATION TECHNOLOGY
26
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT. OF INFORMATION TECHNOLOGY
9) Lightweight Terminals
10) Shared Physical Medium
9. Analyze the operational constraints (challenges) associated with MANET. [An]
1. Low Processing Capabilities & low bandwidth
2. Computational & Communication overhead
3. Mobility-induced route changes
4. Battery Constraints
5. Packet losses due to transmission errors
6. Security Threats
7. Dynamic Topology
10. What are the advantages of MANETs? [U]
They provide access to information and services regardless of geographic position.
Independence from central network administration
Self-configuring network, nodes are also act as routers. Less expensive as compared to
wired network.
Scalable—accommodates the addition of more nodes.
Improved Flexibility.
Robust due to decentralize administration.
The network can be set up at any place and time.
11. What are the disadvantages of MANET? [U]
1. Limited Resource
2. Limited Physical Security
3. Vulnerable to attacks. Lack of authorization facilitates
4. Variable network topology makes it hard to detect malicious nodes
5. Security protocols for wired network cannot work for adhoc network
6. Battery constraints
7. Frequent route changes leads to computational overhead
12. List out some of the applications of MANETs. [U] May/June 2017
Some of the typical applications include:
1) Communication among portable computers
2) Environmental Monitoring
27
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT. OF INFORMATION TECHNOLOGY
3) Sensor Networks
4) Military Sector
5) Personal Area Network and Bluetooth
6) Emergency Applications
13. Analyze and list out the various design issues associated with MANET. [An] Nov/Dec2018
1) Network Size and Node Density
2) Connectivity
3) Network Topology
4) User Traffic
5) Operational Environment
6) Energy Constraints
14. What is meant by routing in ad hoc networks? [U]
“Routing is the process of finding the best path between the source and the destination for
forwarding packets in any store-and-forward network. Routing is the mechanism of forwarding
packet towards its destination using most efficient path. Efficiency of the path is measured in
various metrics like, Number of hops, traffic, security, etc. In Ad-hoc network each host node
acts as specialized router itself.
15. Compare Link State and Distance Vector Routing. [U]
28
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT. OF INFORMATION TECHNOLOGY
16. Differentiate between MANET routing strategies with routing strategies of traditional
networks. [U]
29
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT. OF INFORMATION TECHNOLOGY
30
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT. OF INFORMATION TECHNOLOGY
2) Commercial oriented
a) remote vehicle personalization
b) internet access
c) digital map downloading
d) real time video relay
e) value-added advertisement
3) Convenience oriented
a) route diversion
b) electronic toll collection
c) parking availability
4) Productive Applications
a) Environmental Benefits
b) Time Utilization
c) Fuel Saving
24. Compare MANET Vs VANET. [U] May/June 2016, Nov/Dec 2016, May 2018, May 2019
31
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT. OF INFORMATION TECHNOLOGY
32
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT. OF INFORMATION TECHNOLOGY
29. What are the contents of link state advertisement message ?[U](Dec 2017)
Authentication.
Hello Dead Timers.
Area ID.
Nieghbor List (If not a nieghbor, sends more info)
Designated Router IP.
Backup DR IP.
Priority of Interfaces.
DSDV protocol uses and maintains a single table only, for every node individually. The
table contains the following attributes.
Routing Table : It contains the distance of a node from all the neighboring nodes along
with the sequence number( SEQ No means the time at which table is updated).
This table is updated on every step and ensures that each node broadcast as well as
receives correct information about all the nodes including their distance and sequence
number.
31. Why routing in MANET so complex task.[An] May/June 2019
Routing is to find correct path between the source and destination for forwarding
packets. Routing is complex task in MANET's because. ... While forwarding packet
33
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT. OF INFORMATION TECHNOLOGY
sender much check the parameters: a) Packet reaching the destination. b) Minimize the
number of hops/path length
32. Outline the basic objective of WAP.. [R] MAY 2021
The goal of WAP is to create recommendations and specifications that support the creation of
advanced services on wireless devices, with particular emphasis on the mobile telephone. The
WAP Forum is creating recommendations and technologies which enable these services on all
mobile devices and on all networks.
PART – B
1. Explain the basic characteristics and applications of Mobile Ad hoc networks. [U]
May/June2016, May/June2019
2. Explain in detail about the key mechanisms associated with Mobile IP. [U] Nov/Dec 2016
3. Express brief account of route optimization in Mobile IP. [U]
4. Explain the various routing strategies in mobile ad-hoc networks. [U]
5. MANET Routing protocols. [An] Nov/Dec 2014
6. Explain DSR Routing Protocol in detail. [An] May/June 2016, May 2021
,
34
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT. OF INFORMATION TECHNOLOGY
35
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT. OF INFORMATION TECHNOLOGY
25. A major task of the designer of a wireless sensor network is prolonging the life of the network.
Explain how this is achieved while designing a MANET. May 2021.
26. Consider the network given below in figure 1. Here “S” is source node and “D” is target node.
Illustrate the process of route discovery, route reply, data delivery and route caching using
DSR. Explain the approach. May 2021.
27. With a neat diagram explain how packet delivery to and from a mobile node is transferred in
mobile IP[U]. May/June 2017, Dec 2017
COURSE OUTCOME: Determine the functionality of network layer and Identify routing
protocol for a given Ad hoc networks.
PART – A
36
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT. OF INFORMATION TECHNOLOGY
A modified TCP on the wireless link not only requires modifications to the MH protocol
software but also new network elements like the bandwidth manager
3. How does M-TCP split the connections? [An]
Unmodified TCP
37
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT. OF INFORMATION TECHNOLOGY
Used to handle wired part of connection and used in between the Fixed Host (FH) and
the Supervisory Host (SH).
Optimized TCP
Used to handle wireless part of connection and used in between the Supervisory Host
(SH) and the Mobile Host (MH).
4. What is WAP protocol stack?[R]
WAP specifies an application framework and network protocols for wireless devices such as
mobile telephones, pagers, and personal digital assistants (PDAs)." WAP is the mobile phone
industry's answer to interactive web applications. WAP defines its own set of protocols but
models after existing web protocols.
5. What is WAP model?[R]
WAP is a set of protocols that allow wireless devices like hand-held cell phones to access the
internet. But it has programming model similar to that of WWW Transport of content is based
on standard communication protocols which are based on that of WWW. The micro browser is
analogous to standard web browser.
6. What are the various protocols in a WAP protocol suite?[U]
Wireless Session Protocol (WSP)
Wireless Transaction Protocol (WTP)
Wireless Transport Layer Security (WTLS)
Wireless Datagram Protocol (WDP)
38
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT. OF INFORMATION TECHNOLOGY
39
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT. OF INFORMATION TECHNOLOGY
40
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT. OF INFORMATION TECHNOLOGY
provides shared state between client and server, optimizes content transfer
session management (establish, release, suspend, resume)
efficient capability negotiation
content encoding
push
PART – B
1. Describe how mobile TCP improves TCP efficiency for mobile networks? How does
mobile TCP maintain end to end semantics? [An]May 2018
2. Describe in detail about the architecture of the WAP protocol stack[U]
3.Explain in detail about the components of WAP.[U]
4. Summarize the challenges in WAP[An]
5. Interpret the WTP class 2 protocols..[U] May 2021
6. Explain in detail about the different communication scenarios in WTP[An]
7.Describe about WML with example program[U]
8. Explain in detail about the WAP Architcture[U]
9. Summarize the working of Snooping TCP. May 2021
10. Describe WTA Framework in detail[U]
11. Illustrate the classical TCP improvements. May 2021
12. Explain the wireless transport layer security. May 2021
41
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT. OF INFORMATION TECHNOLOGY
COURSE OUTCOMES
COURSE NAME : IT8602 - MOBILE COMMUNICATION
YEAR/SEMESTER : III / VI
YEAR OF STUDY : 2019 –2020 EVEN (R – 2017)
On Completion of this course student will gain
Ability to Develop analytical skills for investigating and analyzing quality management
C311.4
issues in the industry and suggest implement able solutions to those..
CO-PO MATRIX
CO PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
C311.1 2 2 1 - - - - - - - 1 1
C311.2 2 2 2 - - - - - - - 1 1
C311.3 1 2 1 - - - - - - - 1 1
C311.4 1 2 2 - - - - - - - 1 2
C311.5 2 2 1 - - - - - - - 1 2
C311 1.6 2 1.4 - - - - - - - 1 1.4
42
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT. OF INFORMATION TECHNOLOGY
CO-PSO MATRIX:
43