0% found this document useful (0 votes)
11 views4 pages

MC Cat 1 TWO Marks Set 1 and 2

The document outlines key concepts in mobile computing, including challenges such as limited bandwidth and security issues, and details various cellular phone standards from 1G to 5G. It discusses the role of MAC protocols in managing wireless communication, the advantages of mobile computing, and the differences between GPRS and GSM. Additionally, it covers types of wireless networks, mobility, and security features in GSM.

Uploaded by

Sanjaikumar K
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views4 pages

MC Cat 1 TWO Marks Set 1 and 2

The document outlines key concepts in mobile computing, including challenges such as limited bandwidth and security issues, and details various cellular phone standards from 1G to 5G. It discusses the role of MAC protocols in managing wireless communication, the advantages of mobile computing, and the differences between GPRS and GSM. Additionally, it covers types of wireless networks, mobility, and security features in GSM.

Uploaded by

Sanjaikumar K
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

SET 1

1. Challenges in Mobile Computing


o Limited bandwidth and network congestion
o Power consumption constraints
o Security and privacy issues
o Frequent disconnections and handovers
2. Cellular Phone Standards
o 1G: Analog (AMPS, NMT)
o 2G: Digital (GSM, CDMA)
o 3G: High-speed (UMTS, CDMA2000)
o 4G: LTE (Long-Term Evolution)
o 5G: Ultra-fast, low latency
3. Reason Collision Detection is Unsuitable for Wireless Networks
o Wireless signals experience high interference and signal fading.
o Collision detection requires simultaneous transmission and reception, which is
difficult in wireless communication.
4. Role of a MAC (Medium Access Control) Protocol
o Controls access to the shared wireless medium.
o Prevents data collisions and manages efficient channel utilization.
5. TDMA Scheme for Satellite Systems
o In Time Division Multiple Access (TDMA), satellite communication is
divided into time slots assigned to different users, reducing interference and
optimizing bandwidth use.
6. Meaning of GSM
o Global System for Mobile Communications (GSM) is a standard for mobile
networks, providing voice and data services over digital cellular technology.
7. Three Levels of Security in GSM
o Network Security: Authentication of users via SIM cards.
o Radio Interface Security: Encryption of data transmission.
o Subscriber Identity Security: Protecting user identity with temporary
identifiers.
8. Reasons for Handover
o Weakening signal strength as the mobile user moves.
o Reducing network congestion by switching to a less crowded cell.
o Maintaining call continuity without dropping connections.
9. GPRS vs. GSM
o General Packet Radio Service (GPRS) offers faster data transfer than GSM.
o It supports an always-on internet connection.
o Efficient use of bandwidth with packet switching rather than circuit switching.
10. Information Stored in a SIM Card
• International Mobile Subscriber Identity (IMSI)
• Authentication Key (Ki)
• Stored phone numbers and SMS
• Network-specific information for connectivity
SET 2
1. Advantages of Mobile Computing
o Provides flexibility and remote access to data.
o Enhances productivity with anytime-anywhere connectivity.
o Supports multiple applications like communication, gaming, and e-commerce.
o Reduces infrastructure costs by leveraging wireless technologies.
2. Types of Wireless Networks
o Wireless Local Area Network (WLAN) – e.g., Wi-Fi
o Wireless Metropolitan Area Network (WMAN) – e.g., WiMAX
o Wireless Personal Area Network (WPAN) – e.g., Bluetooth, Zigbee
o Wireless Wide Area Network (WWAN) – e.g., Cellular networks
3. Objectives of MAC Protocols
o Efficient utilization of wireless bandwidth.
o Avoidance of data collisions and interference.
o Fair access to the medium for multiple users.
o Support for real-time and delay-sensitive applications.
4. Types of Mobility
o User Mobility – The ability of a user to move across networks.
o Device Mobility – The ability of a device to change locations.
o Session Mobility – Maintaining an active session while moving.
o Service Mobility – Continuity of services regardless of location.
5. Working of RTS/CTS in MACA (Multiple Access with Collision Avoidance)
o Sender sends Request to Send (RTS) to the receiver.
o Receiver replies with Clear to Send (CTS) if the channel is free.
o Sender transmits data upon receiving CTS, preventing collisions.
6. Important Features of GSM Security
o Authentication using SIM-based credentials.
o Encryption for secure data transmission.
o Temporary Mobile Subscriber Identity (TMSI) to protect user identity.
o Network challenge-response mechanism for fraud prevention.
7. Frequency Range of Uplink and Downlink in GSM
o Uplink: 890 – 915 MHz (mobile to base station).
o Downlink: 935 – 960 MHz (base station to mobile).
8. Types of Handoff
o Hard Handoff – Break-before-make transition between cells.
o Soft Handoff – Make-before-break transition using multiple connections.
o Horizontal Handoff – Handoff within the same network type.
o Vertical Handoff – Handoff between different network technologies.
9. Goals of GPRS (General Packet Radio Service)
o Efficient packet-switched data transmission.
o Always-on internet connectivity.
o Higher data rates compared to GSM.
o Optimized spectrum utilization.
10. Main Elements of UMTS (Universal Mobile Telecommunications System)
• User Equipment (UE) – Mobile device used by users.
• UMTS Terrestrial Radio Access Network (UTRAN) – Handles radio
communication.
• Core Network (CN) – Manages voice and data traffic.

You might also like