Download as pdf or txt
Download as pdf or txt
You are on page 1of 134

MAY /JUNE 2013

CS2402- MOBILE AND PERVASIVE COMPUTING


PART A
1.What are the security issues in mobile networking?
 Connectivity problem
 Less signal strength
2. What is mobility management?
Mobility management is a feature in GSM that allows the system to know the current location
of the user and to use the same phone number world wide. To provide this feature, GSM
performs periodic location updates.
3.What are HIPERLANs? (not in reg 2013)
4.Distinguish between WiFi and WIMAX. (not in reg 2013)
5.Distinguish between proactive and reactive routing protocols.
Proactive protocols Reactive protocols
Also known as table-driven protocol Also known as on demand protocol
Performs periodic table update It does not perform periodic table update
6.What is DHCP?
Dynamic Host Configuration Protocol (DHCP) is a network protocol that enables a server
to automatically assign an IP address to a computer from a defined range of numbers (i.e., a
scope) configured for a given network.
7.What is the use of WML? (not in reg 2013)
8. What is WAP? (not in reg 2013)
9. Define biometrics. (not in reg 2013)
10. Name some applications of pervasive computing. (not in reg 2013)
PART B
11.a.Discuss in detail on the CDMA technology with an example.(16)
 Fixed assignment schemes are usually called circuit switched schemes.
 In the fixed assignment schemes, the resources required for a call are assigned for the
entire duration of the call.
 On the other hand, the random assignment schemes and the reservation based schemes
are called as packet-switched schemes.
 The random assignment schemes are comparable to the connection-less packet-
switching schemes. In this no resource reservations are made and the nodes simply
start to transmit as soon as they have a packet to send.
 The reservation based schemes are comparable to the connection-based packet-
switching scheme. In this, a node makes explicit reservation of the channel for an
entire call before transmitting.
Fixed Assignment Schemes
 A few important categories of fixed assignment MAC protocols are the following:
o Frequency Division Multiple Access(FDMA)
o Time Division Multiple Access(TDMA)
o Code Division Multiple Access (CDMA)
o Space Division Multiple Access (SDMA)
Code Division Multiple Access (CDMA)
 In CDMA, multiple users are allotted with different codes that consist of sequences of
0 and 1 to access the same channel without interference.
 A special coding scheme is used that allows signals from multiple users to be
multiplexed over the same physical channel.
 In CDMA, multiple users use the same frequency at the same time and no time
scheduling is applied.
 All the senders send signals simultaneously through a common medium.
 The bandwidth of this medium is much larger than the space that would be allocated to
each packet transmission during FDMA and the signals can be distinguished from
each other by means of a special coding scheme that is used.
 This is done with the help of a frequency spreading code known as the m-bit Pseudo-
Noise code (PN) sequence.
 Using m bits, 2m-1 different codes can be obtained. From these codes, each user will
use only one code.
 What is a good code for CDMA?
o A code for a certain user should have a good auto-correlation and be
orthogonal to other codes.
o Two vectors (codes) are said to be orthogonal if their inner product=0. Let p
and q be two vectors and suppose p=(2,5,0) and q=(0,0,17), then their inner
product is p*q=(2*0+5*0+0*17)=0.
o For good auto-correlation, binary 0 is represented as -1 and binary 1 is
represented as +1. Let the binary sequence be 1001, then the representation of
the sequence is +1-1-1+1. A code has good auto-correlation, if the inner
product with itself is large.
 Working of CDMA
o Two senders, A and B, want to send data to the receiver C. CDMA assigns the
following unique and orthogonal key sequences: key Ak=010011 for sender A,
key B sends Bk=110101 for sender B. Sender A wants to send the bit Ad=1
and sender B wants to send the bit Bd=0. We code binary 0 as -1 and binary 1
as +1.
o Both senders spread their signal using their key(the term ‘spreading’ refers to
the simple multiplication of the data bit with the key). Sender A then sends the
signal As=Ad*Ak= +1*(-1,+1,-1,-1,+1,+1)=(-1,+1,-1,-1,+1,+1). Sender B then
sends the signal Bs=Bd*Bk= -1*(+1,+1,-1,+1,-1,+1)=(-1,-1,+1,-1,+1,-1).
o Both signals are then transmitted at the same time using the same frequency to
receiver C. The signal received by receiver C is As+Bs= (-1,+1,-1,-1,+1,+1) +
(-1,-1,+1,-1,+1,-1) = (-2,0,0,-2,+2,0).
o The receiver now wants to receive data from sender A and therefore tunes into
the code of A i.e.applies A’s code for despreading: C*Ak= (-2,0,0,-2,+2,0) *
(-1,+1,-1,-1,+1,+1)=2+0+0+2+2+0=6. As the result is much larger than 0, the
receiver detects a binary 1.
o The receiver now wants to receive data from sender B and therefore tunes into
the code of B i.e. applies B’s code for dispreading: C*Bk=(-2,0,0,-2,+2,0) *
(+1,+1,-1,+1,-1,-1) = -2+0+0-2-2+0=-6. As the result is smaller than 0 (i.e.
negative), the receiver detects a binary 0.
Advantages of CDMA
 One of the main advantages of CDMA is that dropouts occur only when the phone is
at least twice as far from the base station. Thus, it is used in the rural areas where
GSM cannot cover.
 Another advantage is its capacity; it has a very high spectral capacity that it can
accommodate more users per MHz of bandwidth.
Disadvantages of CDMA
 Channel pollution, where signals from too many cell sites are present in the
subscriber. s phone but none of them is dominant. When this situation arises, the
quality of the audio degrades.
 When compared to GSM is the lack of international roaming capabilities.
 The ability to upgrade or change to another handset is not easy with this technology
because the network service information for the phone is put in the actual phone
unlike GSM which uses SIM card for this.
 Limited variety of the handset, because at present the major mobile companies use
GSM technology.
OR
b. Explain localization, calling and handover in GSM. (16)
12.a.Discuss in detail about the medium access control layer in IEEE 802.11. (16) (not in
reg 2013)
OR
b. Explain the working principle of MAC layer of Bluetooth. (16) (not in reg 2013)
13.a.Give a detailed description of the concepts behind agent advertisement, discovery
and registration in Mobile IP. (16)
Agent Discovery
 During connection establishment, it is necessary for a mobile node to determine its
foreign agent. This task is referred to as agent discovery.
 The following two discovery methods are popularly used: 1)Agent advertisement
2)Agent solicitation.
 Agent Advertisement
o Foreign Agents and home Agents advertise their presence periodically using a
special Agent Advertisement messages.
o For these advertisements, Internet Control Message Protocol (ICMP)
messages are used.
o In figure, the upper part represents the ICMP packet while the lower part is the
extension needed for mobility.
o The TTL field of the IP packet is set to 1 for all advertisements to avoid
forwarding them. The IP destination address according to standard router
advertisements can be either set to 224.0.0.1, which is the multicast address
for all systems on a link or to the broadcast address 255.255.255.255.
 Agent Solicitation
o In case a Mobile Node does not receive any COA, then the MN should send an
agent solicitation message.
o But it is important to monitor that these agent solicitation messages do not
flood the network.
o A mobile node can usually send up to three solicitation messages (one per
second) as soon as it enters a new network.
o The basic purpose of the solicitation messages sent by a mobile node is to
search for a Foreign Agent.
o If an MN does not receive any address in response to its solicitation messages,
then to avoid network flooding, the MN should exponentially reduce the rate
of sending the solicitation messages.
o Discovering a new agent can be done anytime, not just if the MN is not
connected to one. The MN can look for a better connection while still sending
via the old path.
 After these steps of advertisements or solicitations the MN can now receive a COA,
either one for an FA or a co-located COA.
 The MN knows its location (home network or foreign network) and the capabilities of
the agent.
 The next step for the MN is the registration with the HA if the MN is in a foreign
network.
Registration
 Having received a COA, the MN has to register with the HA.
 The main purpose of the registration is to inform the HA of the current location for
correct forwarding of packets.
 Registration can be done in two different ways depending on the location of the COA.
 COA is at FA
o The MN sends its registration request containing the COA to the FA which is
forwarding the request to the HA.
o The HA now sets up a mobility binding containing the mobile node’s home
IP address and the current COA.
o Additionally, the mobility binding contains the lifetime of the registration.
o Registration expires automatically after the lifetime and is deleted; so, an MN
should reregister before expiration.
o This mechanism is necessary to avoid mobility bindings which are no longer
used.
o After setting up the mobility binding, the HA sends a reply message back to
the FA which forwards it to the MN.
 Co-located COA
o The MN may send the request directly to the HA and HA sends reply directly
to the MN.
o This is also the registration procedure for MNs returning to their home
network.
o However, if the MN received an agent advertisement from the FA it should
register via this FA.
 Registration Request
o UDP packets are used for registration requests.
o The source address of the packet is set to the IP address of the MN, the IP
destination address is that of the FA or HA (depending on the location of the
COA).
o UDP is used because of low overheads and better performance compared to
TCP in wireless environments.
o The fields relevant for mobile IP registration requests follow as UDP data.
 Registration Reply
o A registration reply, which is conveyed in a UDP packet, contains a type
field set to 3 and a code indicating the result of the registration request.
Registration Code Explanation
0 Registration accepted
1 registration accepted, but
Successful simultaneous mobility
bindings unsupported
65 administratively prohibited

66 insufficient resources

67 mobile node failed


authentication
Denied by FA
68 home agent failed
authentication

69 requested lifetime too long

129 administratively prohibited

130 insufficient resources

131 mobile node failed


authentication
Denied by HA
132 foreign agent failed
authentication

133 registration identification


mismatch

135 too many simultaneous mobility


bindings
OR
b. Discuss in detail about the Dynamic source routing with an example. (16)
14.a. Discuss in detail about the mobile TCP and list its advantages and drawbacks. (16)
(not in reg 2013)
OR
b. Discuss in detail about the mobile TCP and list its advantages.(16) (not in reg 2013)
15.a. How is server-side security done in pervasive computing? Explain it in detail. (16)
(not in reg 2013)
OR
b.Write down the functionality of WAP in access via WAP. (not in reg 2013)
MAY /JUNE 2014
CS2402- MOBILE AND PERVASIVE COMPUTING
Part A
1.What are the types of services in GSM?
 Bearer service
 Tele service
 Supplementary service
2.What are the disadvantages of cellular systems? (not in reg 2013)
3.Mention the design goals of WLANS. (not in reg 2013)
4.Mention the elements of Bluetooth core protocols. (not in reg 2013)
5.Define triangular routing.
Triangular routing is a method for transmitting packets of data in communications networks.
It uses a form of routing that sends a packet to a proxy system before transmission to the
intended destination.
6.What is the basic purpose of DHCP?
Dynamic Host Configuration Protocol (DHCP) is a network protocol that enables a server
to automatically assign an IP address to a computer from a defined range of numbers (i.e., a
scope) configured for a given network.
7.What is wireless telephony application? . (not in reg 2013)
8.List the classes of transaction service of WTP. . (not in reg 2013)
9.Define Pervasive computing. . (not in reg 2013)
10.List some types of biometric devices. . (not in reg 2013)
Part B
11.a.i.Describe the system architecture of GSM. (12)
ii. Explain the types of handover in GSM. (4)

OR
b.Explain the architecture and transmission protocol of GPRS. (16)
12.a.Explain the IEEE 802.11 MAC management. (16) (not in reg 2013)
OR
b. Describe Bluetooth in detail. (16) (not in reg 2013)
13.a.Explain tunnelling and encapsulation in detail. (16)
Tunneling and Encapsulation
 These mechanisms are used for forwarding packets between the HA and the COA.
 A tunnel establishes a virtual pipe for data packets between a tunnel entry and a
tunnel endpoint.
 Packets entering a tunnel are forwarded inside the tunnel and leave the tunnel
unchanged.
 Tunneling, i.e., sending a packet through a tunnel, is achieved by using encapsulation.
 Encapsulation is the mechanism of taking a packet consisting of packet header and
data and putting it into the data part of a new packet.
 The reverse operation, taking a packet out of the data part of another packet, is called
decapsulation.
 Encapsulation and decapsulation are the operations typically performed when a packet
is transferred from a higher protocol layer to a lower layer or from a lower to a higher
layer respectively. Here these functions are used within the same layer.
 Working Mechanism of Tunneling and Encapsulation
o The HA takes the original packet with the MN, puts it into the data part of a
new packet and sets the new IP header in such a way that the packet is routed
to the COA.
o The new header is also called the outer header. Additionally, there is an
inner header which can be identical to the original header as this is the case
for IP-in-IP encapsulation, or the inner header can be computed during
encapsulation.
IP-in-IP Encapsulation
 Ip-in-Ip encapsulation is mandatory for mobile IP.
 The fields of the outer header are set as follows.
 The version field ver is 4 for IP version 4, the internet header length (IHL) denotes
the length of the outer header in 32 bit words.
 DS(TOS) is just copied from the inner header, the length field covers the complete
encapsulated packet.
 TTL must be high enough so the packet can reach the tunnel endpoint.
 The field IP-in-IP, is the type of the protocol used in the IP payload. This field is set
to 4, the protocol type for IPv4 because again an IPv4 packet follows after this outer
header.
 IP checksum is calculated.
 The next fields are the tunnel entry as source address (the IP address of the HA) and
the tunnel exit point as destination address (the COA).
 The fields of the inner header are set as follows.
 This header remains almost unchanged during encapsulation, thus showing the
original sender CN and the receiver MN of the packet.
 The only change is TTL which is decremented by 1. This means that the whole tunnel
is considered a single hop from the original packet’s point of view.
 This is a very important feature of tunneling as it allows the MN to behave as if it
were attached to the home network. No matter how many real hops the packet has to
take in the tunnel, it is just one (logical) hop away for the MN.
 Finally, the payload follows the two headers.
Minimal Encapsulation
 Minimal encapsulation 9 is an optional encapsulation method for mobile IP.
 The tunnel entry point and endpoint are specified.
 In this case, the field for the type of the following header contains the value 55 for the
minimal encapsulation protocol.
 The inner header is different for minimal encapsulation.
 The type of the following protocol and the address of the MN are needed.
 If the S bit is set, the original sender address of the CN is included as omitting the
source is quite often not an option.
 No field for fragmentation offset is left in the inner header and minimal encapsulation
does not work with already fragmented packets.
Generic Routing Encapsulation(GRE)
 While IP-in-IP encapsulation and minimal encapsulation work only for IP, the GRE
scheme also supports other network layer protocols in addition to IP.
 Generic routing encapsulation (GRE) allows the encapsulation of packets of one
protocol suite into the payload portion of a packet of another protocol suite.
 The packet of one protocol suite with the original packet header and data is taken and
a new GRE header is prepended.
 Together this forms the new data part of the new packet. Finally, the header of the
second protocol suite is put in front.
OR
b.Explain optimization in mobile IP in detail. (16)
ROUTE OPTIMIZATION
 With the basic mobile IP protocol all packets to the MN have to go through the HA.
 This can cause unnecessary overheads for the network between CN and HA, but also
between HA and COA, depending on the current location of the MN. As a result,
latency can increase dramatically.
 The following route optimization techniques needs to be carried out to overcome this
problem.
o Enable direct notification of the Corresponding host
o Direct tunnelling from the corresponding host to the mobile host
o Binding cache maintained at the corresponding host
Binding Cache maintained at the Corresponding Host
 One way to optimize the route is to inform the CN of the current location of the MN.
 The CN can learn the location by caching it in a binding cache which is a part of the
local routing table for the CN.
 The appropriate entity to inform the CN of the location is the HA.
 The optimized mobile IP protocol needs four additional messages.
1. Binding request:
o Any node that wants to know the current location of an MN can send a
binding request to the HA.
o The HA can check if the MN has allowed dissemination of its current location.
o If the HA is allowed to reveal the location it sends back a binding update.
2. Binding update:
o This message when sent by the HA to CN reveals the current location of an
MN.
o The message contains the fixed IP address of the MN and the COA.
o The binding update can request an acknowledgement.
3. Binding acknowledgement:
o If requested, a node returns this acknowledgement after receiving a binding
update message.
4. Binding warning:
o If a node decapsulates a packet for an MN, but it is not the current FA for this
MN, this node sends a binding warning.
o The warning contains MN’s home address and a target node address, i.e., the
address of the node that has tried to send the packet to this MN.
o The recipient of the warning then knows that the target node could benefit
from obtaining a fresh binding for the MN.
o The recipient can be the HA, so the HA should now send a binding update to
the node that obviously has a wrong COA for the MN.
 The CN can request the current location from the HA. If allowed by the MN, the HA
returns the COA of the MN via an update message.
 The CN acknowledges this update message and stores the mobility binding.
 Now the CN can send its data directly to the current foreign agent FAold. FAold
forwards the packets to the MN. This scenario shows a COA located at an FA.
 Encapsulation of data for tunneling to the COA is now done by the CN, not the HA.
The MN might now change its location and register with a new foreign agent,
FAnew.
 This registration is also forwarded to the HA to update its location database.
 Furthermore, FAnew informs FAold about the new registration of MN. MN’s
registration message contains the address of FAold for this purpose.
 Passing this information is achieved via an update message, which is acknowledged
by FAold. Registration replies are not shown in this scenario.
 Without the information provided by the new FA, the old FA would not get to know
anything about the new location of MN.
 In this case, CN does not know anything about the new location, so it still tunnels its
packets for MN to the old FA, FAold.
 This FA now notices packets with destination MN, but also knows that it is not the
current FA of MN.
 FAold might now forward these packets to the new COA of MN which is FAnew in
this example. This forwarding of packets is another optimization of the basic Mobile
IP providing smooth handovers.
 Without this optimization, all packets in transit would be lost while the MN moves
from one FA to another. With TCP as the higher layer protocol this would result in
severe performance degradation.
 To tell CN that it has a stale binding cache cache, FAold sends, in this example, a
binding warning message to CN.
 CN then requests a binding update. The HA sends an update to inform the CN about
the new location, which is acknowledged.
 Now CN can send its packets directly to FAnew, again avoiding triangular routing.
14.a.Explain mobile TCP in detail. (16) (not in reg 2013)
OR
b.i.Explain components and interface of the WAP architecture. (8) (not in reg 2013)
ii.Explain the idea behind WAE. (8) (not in reg 2013)
15.a.Illustrate the applications of pervasive computing (16) (not in reg 2013)
OR
b.Describe pervasive web application architecture with a neat diagram. (16) (not in reg
2013)
May / June 2015
CS2402 Mobile and Pervasive Computing
Part A
1. Why very long waves are used in sub marines? (not in reg 2013)
2. State the function of SST in GSM architecture.
An MSC handles all signalling needed for connection setup, connection release and
handover of connections to other MSCs. The standard signalling system No. 7 (SS7) is
used for this purpose. SS7 covers all aspects of control signalling for digital networks
3. Compare infra red and radio transmission. (not in reg 2013)
4. What is piconet? What restricts the number of active devices in a piconet? (not
in reg 2013)
5. When and why binding update is generated in mobile IP?
 This message when sent by the HA to CN reveals the current location of an
MN.
 The message contains the fixed IP address of the MN and the COA.
 The binding update can request an acknowledgement.
6. Why is routing in multihop adhoc networks complicated?
Routing is complicated because of frequent topology changes, different capabilities of
the nodes, varying propagation characteristics. Furthermore, no central instance can
support routing.
7. List the disadvantages of I-TCP.
 Violation of end to end semantics
 Hand-off latency increases due to state transfer
8. Write a WML scripts for login process of a mobile application. (not in reg 2013)
9. List application areas of pervasive computing. . (not in reg 2013)
10. What are the challenges in pervasive computing? . (not in reg 2013)
Part B
11. a. i. Explain the functional architecture of GSM system. (10)
ii.Briefly discuss about cellular wireless networks. (6) (not in reg 2013)
OR
b. i. Explain the architecture of GPRS. (8)
ii.Explain security services of GSM. (8)
12.a.i. Explain contention-free access using polling mechanism in IEEE 802.11. (10)
(not in reg 2013)
ii. Explain the protocol stack of Bluetooth. (6) (not in reg 2013)
OR
b.i. Explain MAC management of 802.11. (8) (not in reg 2013)
ii. Explain the phases of HIPERLAN 1 EY-NPMA access scheme. (8) (not in reg
2013)
13.a.i. What is encapsulation? Explain IP-in-IP encapsulation. (8)
 Encapsulation is the mechanism of taking a packet consisting of packet header and
data and putting it into the data part of a new packet.
 The reverse operation, taking a packet out of the data part of another packet, is called
decapsulation.
 Encapsulation and decapsulation are the operations typically performed when a packet
is transferred from a higher protocol layer to a lower layer or from a lower to a higher
layer respectively. Here these functions are used within the same layer.
 Working Mechanism of Tunneling and Encapsulation
o The HA takes the original packet with the MN, puts it into the data part of a
new packet and sets the new IP header in such a way that the packet is routed
to the COA.
o The new header is also called the outer header. Additionally, there is an
inner header which can be identical to the original header as this is the case
for IP-in-IP encapsulation, or the inner header can be computed during
encapsulation.
IP-in-IP Encapsulation
 Ip-in-Ip encapsulation is mandatory for mobile IP.
 The fields of the outer header are set as follows.
 The version field ver is 4 for IP version 4, the internet header length (IHL) denotes
the length of the outer header in 32 bit words.
 DS(TOS) is just copied from the inner header, the length field covers the complete
encapsulated packet.
 TTL must be high enough so the packet can reach the tunnel endpoint.
 The field IP-in-IP, is the type of the protocol used in the IP payload. This field is set
to 4, the protocol type for IPv4 because again an IPv4 packet follows after this outer
header.
 IP checksum is calculated.
 The next fields are the tunnel entry as source address (the IP address of the HA) and
the tunnel exit point as destination address (the COA).
 The fields of the inner header are set as follows.
 This header remains almost unchanged during encapsulation, thus showing the
original sender CN and the receiver MN of the packet.
 The only change is TTL which is decremented by 1. This means that the whole tunnel
is considered a single hop from the original packet’s point of view.
 This is a very important feature of tunneling as it allows the MN to behave as if it
were attached to the home network. No matter how many real hops the packet has to
take in the tunnel, it is just one (logical) hop away for the MN.
 Finally, the payload follows the two headers.

ii.Explain Dynamic Source Routing with an example. (8)


OR
b.i.Explain agent discovery process in Mobile IP. (10)
Agent Discovery
 During connection establishment, it is necessary for a mobile node to determine its
foreign agent. This task is referred to as agent discovery.
 The following two discovery methods are popularly used: 1)Agent advertisement
2)Agent solicitation.
 Agent Advertisement
o Foreign Agents and home Agents advertise their presence periodically using a
special Agent Advertisement messages.
o For these advertisements, Internet Control Message Protocol (ICMP)
messages are used.
o In figure, the upper part represents the ICMP packet while the lower part is the
extension needed for mobility.
o The TTL field of the IP packet is set to 1 for all advertisements to avoid
forwarding them. The IP destination address according to standard router
advertisements can be either set to 224.0.0.1, which is the multicast address
for all systems on a link or to the broadcast address 255.255.255.255.
o The fields in the ICMP part are defined as follows: The type is set to 9, the
code can be 0, if the agent also routes traffic from non-mobile nodes, or 16, if
it does not route anything other than mobile traffic.
o The number of addresses advertised with this packet is in #addresses while
the addresses themselves follow as shown.
o Lifetime denotes the length of time this advertisement is valid.
o Preference levels for each address help a node to choose the router that is the
most eager one to get a new node.
o The extension for mobility has the following fields defined: type is set to 16,
length depends on the number of COAs provided with the message and equals
6 + 4*(number of addresses).
o An agent shows the total number of advertisements sent since initialization in
the sequence number.
o By the registration lifetime the agent can specify the maximum lifetime in
seconds a node can request during registration.
o The R bit (registration) shows, if a registration with this agent is required even
when using a colocated COA at the MN.
o If the agent is currently too busy to accept new registrations it can set the B
bit.
o The following two bits denote if the agent offers services as a home agent (H)
or foreign agent (F) on the link.
o Bits M and G specify the method of encapsulation used for the tunnel.
o While IP-in-IP encapsulation is the mandatory standard, M can specify
minimal encapsulation and G generic routing encapsulation.
o In the first version of mobile IP, the V bit specified the use of header
compression. Now the field r at the same bit position is set to zero and must
be ignored.
o The new field T indicates that reverse tunneling is supported by the FA.
o The following fields contain the COAs advertised. A foreign agent setting the
F bit must advertise at least one COA.
o A mobile node in a subnet can now receive agent advertisements from either
its home agent or a foreign agent. This is one way for the MN to discover its
location.
 Agent Solicitation
o In case a Mobile Node does not receive any COA, then the MN should send an
agent solicitation message.
o But it is important to monitor that these agent solicitation messages do not
flood the network.
o A mobile node can usually send up to three solicitation messages (one per
second) as soon as it enters a new network.
o The basic purpose of the solicitation messages sent by a mobile node is to
search for a Foreign Agent.
o If an MN does not receive any address in response to its solicitation messages,
then to avoid network flooding, the MN should exponentially reduce the rate
of sending the solicitation messages.
o Discovering a new agent can be done anytime, not just if the MN is not
connected to one. The MN can look for a better connection while still sending
via the old path.
 After these steps of advertisements or solicitations the MN can now receive a COA,
either one for an FA or a co-located COA.
 The MN knows its location (home network or foreign network) and the capabilities of
the agent.
 The next step for the MN is the registration with the HA if the MN is in a foreign
network.

ii.What is DHCP? Explain the mechanism of DHCP. (6)


Dynamic Host Configuration Protocol (DHCP) is a network protocol that enables a
server to automatically assign an IP address to a computer from a defined range of
numbers (i.e., a scope) configured for a given network.

 Step 1: When the client computer (or device) boots up or is connected to a network, a
DHCPDISCOVER message is sent from the client to the server. As there is no network
configuration information on the client so the message is sent with 0.0.0.0 as source
address and 255.255.255.255 as destination address. If the DHCP server is on local subnet
then it directly receives the message or in case it is on different subnet then a relay agent
connected on client’s subnet is used to pass on the request to DHCP server. The transport
protocol used for this message is UDP and the port number used is 67. The client enters
the initializing stage during this step.
 Step 2: When the DHCP server receives the DHCPDISCOVER request message then it
replies with a DHCPOFFER message. As already explained, this message contains all the
network configuration settings required by the client. For example, the yaddr field of the
message will contain the IP address to be assigned to client. Similarly the the subnet mask
and gateway information is filled in the options field. Also, the server fills in the client
MAC address in the chaddr field. This message is sent as a broadcast (255.255.255.255)
message for the client to receive it directly or if DHCP server is in different subnet then
this message is sent to the relay agent that takes care of whether the message is to be
passed as unicast or broadcast. In this case also, UDP protocol is used at the transport
layer with destination port as 68. The client enters selecting stage during this step
 Step 3: The client forms a DHCPREQUEST message in reply to DHCPOFFER message
and sends it to the server indicating it wants to accept the network configuration sent in
the DHCPOFFER message. If there were multiple DHCP servers that received
DHCPDISCOVER then client could receive multiple DHCPOFFER messages. But, the
client replies to only one of the messages by populating the server identification field with
the IP address of a particular DHCP server. All the messages from other DHCP servers
are implicitly declined. The DHCPREQUEST message will still contain the source
address as 0.0.0.0 as the client is still not allowed to use the IP address passed to it
through DHCPOFFER message. The client enters requesting stage during this step.
 Step 4: Once the server receives DHCPREQUEST from the client, it sends the
DHCPACK message indicating that now the client is allowed to use the IP address
assigned to it. The client enters the bound state during this step.

14.a.i. What is Wireless Telephony Application? Explain the logical architecture of


WTA. (8) (not in reg 2013)
ii.Explain how snooping TCP ensures end-to-end connectivity. (8)
TCP in Mobile Networks
 In internet, TCP is the standard transport protocol. It supports diverse applications.
 A few applications are file transfer, email etc.
 The performance of TCP is good in wired networks, but degrades in wireless mobile
networks. This also leads to poor performance in mixed wired-wireless environment.
 The reason is lower bandwidth, bandwidth fluctuation, higher delay, high bit error
rate and poor link reliability.
 So, several modifications were done in original TCP,

Snooping TCP(S-TCP)
 It improves the TCP performance by modifying the software at the base station but
maintains end-to-end semantics.
 The modified software at the base station is known as snoop.
 It monitors every packet that passes in both directions, i.e. from MH to FH and vice
versa.
 It buffers the packets. congestion may be detected from FH to MH in the form of
duplicate ACKs or timeout.
 It locally retransmits the packets to MH and hides the duplicate ACKs.
OR
b.i. Discuss in detail the components and protocols of Wireless Application Protocol.
(16) (not in reg 2013)
15.a.Discuss briefly about pervasive web application architecture. (16) (not in reg 2013)
OR
b. Discuss briefly how the access from Personal Digital Assistants is made through
WAP. (16)(not in reg 2013)
NOV / DEC 2013
CS2402- MOBILE AND PERVASIVE COMPUTING
Part A
1.What are the different types of access mechanisms?
 TDMA
 CDMA
 FDMA
 SDMA
2.How is authentication done in GSM network?
Authentication is based on the key stored in SIM. The AuC generates a random number and
sends to the mobile station. Both mobile station and base station calculates the SRES based
on the key and random value. If both the SRES are equal, then authentication is successful.
3.How does a new Bluetooth device discover a Bluetooth network? (not in reg 2013)
4.How is power conservation achieved in HIPERLAN? (not in reg 2013)
5.Write any two factors that affect the performance of Adhoc networking.
 Energy constrained
 Connectivity
6.What do you mean by zone routing protocol?
Zone Routing Protocol (ZRP) is a hybrid routing protocol which combines the best features
of proactive and reactive routing protocols. Proactive protocols are used in r-hop
neighbourhood zone. Reactive protocols are used outside this zone.
7.Mention the features present in WSP/Bin addition to that present in WSP. (not in reg
2013)
8.State the applications of wireless telephony. (not in reg 2013)
9.What is the need for interoperability in mobile device technology? (not in reg 2013)
10.Give some application areas of pervasive computing. (not in reg 2013)
Part B
11.a.i.Explain architecture of cellular mobile communication with neat diagram. (8) (not
in reg 2013)
ii. Explain connection establishment and frequency allocation in GSM. (8)
OR
b. How is data routing done in GPRS? In what aspect is data routing different from
voice routing ? state its limitations and applications.(16)
Data Routing and Mobility Management in GPRS:
Data routing or routing of data packets to and fro from a mobile user, is one of the
basic requirement in the GPRS network. The requirement can be divided into two areas:

 Data packet routing


 Mobility management.
Data Packet Routing
 The important roles of GGSN involve connection with the external data network.
 The GGSN updates the location directory using information supplied by the SGSNs
about the location of an MS.
 It routes the external data network protocol packet encapsulated over the GPRS
backbone to the SGSN currently serving the MS.
 There are three important routing schemes:
1. Mobile-originated message - This path begins at the GPRS mobile device
and ends at the host.
2. Network-initiated message when the MS is in its home network - This
path begins at the host and ends at the GPRS mobile device.
3. Network-initiated message when the MS roams to another GPRS
network - This path begins at the host of visited network and ends at the
GPRS mobile device.
 The GPRS network encapsulates all data network protocols into its own
encapsulation protocol called the GPRS tunnelling protocol (GTP).
 The GTP ensures security in the backbone network and simplifies the routing
mechanism and the delivery of data over the GPRS network.
Mobility Management
 The operation of the GPRS is partly independent of the GSM network.
 However, some procedures share the network elements with current GSM functions
to increase efficiency and to make optimum use of free GSM resources (such as
unallocated time slots).
 An MS can be in any of the following three states in the GPRS system. The three-
state model is unique to packet radio. GSM uses a two-state model either idle or
active.
Active State
 Data is transmitted between an MS and the GPRS network only when the MS is in
the active state.
 In the active state, the SGSN knows the cell location of the MS.
 Packet transmission to an active MS is initiated by packet paging to notify the MS of
an incoming data packet.
 The data transmission proceeds immediately after packet paging through the channel
indicated by the paging message.
 The purpose of the paging message is to simplify the process of receiving packets.
 The MS listens to only the paging messages instead of to all the data packets in the
downlink channels. This reduces battery usage significantly.
 When an MS has a packet to transmit, it must access the uplink channel.
 The uplink channel is shared by a number of MSs, and its use is allocated by a BSS.
 The MS requests use of the channel in a random access message. The BSS allocates
an unused channel to the MS and sends an access grant message in reply to the
random access message.
Standby State
 In the standby state, only the routing area of the MS is known. (The routing area can
consist of one or more cells within a GSM location area).
 When the SGSN sends a packet to an MS that is in the standby state, the MS must be
paged. Because the SGSN knows the routing area of the MS, a packet paging
message is sent to the routing area. On receiving the packet paging message, the MS
relays its cell location to the SGSN to establish the active state.
Idle State
 In the idle state, the MS does not have a logical GPRS context activated or any
Packet-Switched Public Data Network (PSPDN) addresses allocated.
 In this state, the MS can receive only those multicast messages that can be received
by any GPRS MS.
 Because the GPRS network infrastructure does not know the location of the MS, it is
not possible to send messages to the MS from external data networks.
Routing Updates
 When an MS that is in an active or a standby state moves from one routing area to
another within the service area of one SGSN, it must perform a routing update.
 The routing area information in the SGSN is updated, and the success of the
procedure is indicated in the response message.
 A cell-based routing update procedure is invoked when an active MS enters a new
cell.
 The MS sends a short message containing the identity of the MS and its new location
through GPRS channels to its current SGSN. This procedure is used only when the
MS is in the active state.
 The inter-SGSN routing update is the most complicated routing update. The MS
changes from one SGSN area to another, and it must establish a new connection to a
new SGSN. This means creating a new logical link context between the MS and the
new SGSN and informing the GGSN about the new location of the MS.
12.a.Explain IEEE 802.11 standard architecture and security. (16) (not in reg 2013)
OR
b.i.Write notes on HIPERLAN. (8) (not in reg 2013)
ii.Compare WLAN, Bluetooth, and Wifi with typical example. (8) (not in reg 2013)
13.a.Compare and contrast the proactive and reactive routing in adhoc networks.
Explain with algorithmic example for each. (16)
OR
b. Write short notes on i.DHCP ii.Multicast Routing. (8 + 8)
i.DHCP

DHCP messages
The following list includes the eight types of messages that can be sent between DHCP
clients and servers.
DHCPDiscover
Broadcast by a DHCP client when it first attempts to connect to the network. The
DHCPDiscover message requests IP address information from a DHCP server.
DHCPOffer
Broadcast by each DHCP server that receives the client DHCPDiscover message and has an
IP address configuration to offer to the client. The DHCPOffer message contains an unleased
IP address and additional TCP/IP configuration information, such as the subnet mask and
default gateway. More than one DHCP server can respond with a DHCPOffer message. The
client accepts the best offer, which, for a Windows DHCP client, is the first DHCPOffer
message that it receives.
DHCPRequest
Broadcast by a DHCP client after it selects a DHCPOffer. The DHCPRequest message
contains the IP address from the DHCPOffer that it selected. If the client is renewing or
rebinding to a previous lease, this packet might be unicast directly to the server.
DHCPAck
Broadcast by a DHCP server to a DHCP client acknowledging the DHCPRequest message.
At this time, the server also forwards any options. Upon receipt of the DHCPAck, the client
can use the leased IP address to participate in the TCP/IP network and complete its system
startup. This message is typically broadcast, because the DHCP client does not officially have
an IP address that it can use at this point. If the DHCPAck is in response to a DHCPInform,
then the message is unicast directly to the host that sent the DHCPInform message.
DHCPNack
Broadcast by a DHCP server to a DHCP client denying the client’s DHCPRequest message.
This might occur if the requested address is incorrect because the client moved to a new
subnet or because the DHCP client’s lease has expired and cannot be renewed.
DHCPDecline
Broadcast by a DHCP client to a DHCP server, informing the server that the offered IP
address is declined because it appears to be in use by another computer.
DHCPRelease
Sent by a DHCP client to a DHCP server, relinquishing an IP address and canceling the
remaining lease. This is unicast to the server that provided the lease.
DHCPInform
Sent from a DHCP client to a DHCP server, asking only for additional local configuration
parameters; the client already has a configured IP address. This message type is also used by
DHCP servers running Windows Server 2008 to detect unauthorized DHCP servers.
ii.Multicast routing
14.a.What are the various flavours of TCP available? Explain them in detail. (16)
i.Indirect TCP (I-TCP)
 It segments the connection between the fixed host and mobile host into two different
connections: the wired part and the wireless part.
 The wired connection exists between the Fixed Host (FH) and the Base Station(BS).
 The wireless connection exists between the BS and the Mobile Host(MH).
 Thus, the base station maintains two separate TCP connections: one over the fixed
network and the other over the wireless link.
 The wireless link has poor quality communication, but it gets hidden from the fixed
network at the BS.
 When a packet is sent by the FH to MH, the packet is received by the BS and then BS
transmits it to the MH over the wireless link.
 If the mobile host moves out of the current BS region, the connection information and
responsibilities are transferred to the new BS.
ii. Fast Retransmission
iii. Snooping TCP(S-TCP)
 It improves the TCP performance by modifying the software at the base station but
maintains end-to-end semantics.
 The modified software at the base station is known as snoop.
 It monitors every packet that passes in both directions, i.e. from MH to FH and vice
versa.
 It buffers the packets. congestion may be detected from FH to MH in the form of
duplicate ACKs or timeout.
 It locally retransmits the packets to MH and hides the duplicate ACKs.
iv. Mobile TCP(M-TCP)
 As in I-TCP, the TCP connection between the FH and MH is segmented into wired
and wireless parts.
 Wired connection is between FH and Supervisory Host(SH). Wireless connection is
between SH and MH.
 The SH supervises all transmitted to MH and acknowledgements sent by MH.
 If an ACK is not received by FH, SH decides that MH is disconnected and sets the
sender FH window size to 0. This prevents retransmission.
 When SH notices that MH is connected, it sets the full FH window size.
v. Freeze TCP
 The basic idea is to “freeze” the TCP senders stream, little before a disconnection is
occur.
 This is done by artificially sending a “zero windows advertisement” informing the
sender that the receiver cannot receive data at the moment.
 When the receiver resumes its connectivity, the receiver can unfreeze the sender by
sending the actual value of its receiver window.
OR
b.i. Explain WTA architecture. (8) (not in reg 2013)
ii. Explain about WAP agent profile. (8) (not in reg 2013)
15.a. Describe device connectivity and device management in pervasive computing.
(16)(not in reg 2013)
OR
b.i. Explain the pervasive web application architecture. (8) (not in reg 2013)
ii.Explain how PDA’S are accessed from PC’s vice versa and via WAP. (8) (not in reg
2013)
AGNI COLLEGE OF TECHNOLOGY IT6601- MOBILE COMPUTING

IT6601 Mobile Computing


Part A
1.What are the limitations of mobile computing?
 Quality of connectivity
 Security concerns
2. What are the different random assignment scheme in MAC?
 ALOHA
 CSMA
 CSMA/CD
 CSMA/CA
3.Define COA.
o The COA defines the current location of the MN from an IP point of view.
o All IP packets sent to the MN are delivered to the COA, not directly to the IP
address of the MN.
4.Illustrate the use of BOOTP protocol.
The Bootstrap Protocol (BOOTP) is a computer networking protocol used in
Internet Protocol networks to automatically assign an IP address to network devices from a
configuration server.
5.Write about the supplementary services in GSM.
These services offer various enhancements for the standard telephony service and may vary
from provider to provider. Typical services are user identification, call redirection or
forwarding.
6.What is multicasting?
Multicasting is the process of delivering message to a group of destination nodes in a single
transmission. Multicast routing is difficult in MANET due to host mobility and broadcast
nature.
7.Outline the concept of RTT?
Round-trip time (RTT) is the length of time it takes for a signal to be sent plus the length
of time it takes for an acknowledgment of that signal to be received.
8.Compare and contrast MANET Vs VANET.
MANET VANET
They have power limitation They do not have power limitation
Rate of movement is less Rate of movement is high

Prepared by,
M.Revathi, AP/CSE
AGNI COLLEGE OF TECHNOLOGY IT6601- MOBILE COMPUTING

9.Define POS.
A point of sale (POS) is the place where sales are made. On a macro level, a POS may be a
mall, a market or a city. On a micro level, retailers consider a POS to be the area where a
customer completes a transaction, such as a checkout counter. It is also known as a point of
purchase.
10.Differentiate E-commerce and M-commerce.
E-commerce or electronic commerce, is the process of buying and selling goods, products
and services over electronic systems such as internet, telephone and e-mail. M-
Commerce or mobile commerce is process of buying and selling products and services
through wireless handheld devices such as cell phones or PDAs.
Part B
11.a. Differentiate between FDMA,TDMA and CDMA. (16)

Prepared by,
M.Revathi, AP/CSE
AGNI COLLEGE OF TECHNOLOGY IT6601- MOBILE COMPUTING

OR
b.i.Explain the distinguishing features of various generations of wireless networks. (8)
1G, which stands for "first generation," refers to the first generation of wireless
telecommunication technology, more popularly known as cellphones. A set of wireless
standards developed in the 1980's, 1G technology replaced 0G technology, which featured
mobile radio telephones and such technologies as Mobile Telephone System (MTS),
Advanced Mobile Telephone System (AMTS), Improved Mobile Telephone Service (IMTS),
and Push to Talk (PTT).
Unlike its successor, 2G, which made use of digital signals, 1G wireless networks used
analog radio signals. Through 1G, a voice call gets modulated to a higher frequency of about
150MHz and up as it is transmitted between radio towers. This is done using a technique
called Frequency-Division Multiple Access (FDMA).
2G network allows for much greater penetration intensity. 2G technologies enabled the
various mobile phone networks to provide the services such as text messages, picture
messages and MMS (multi media messages). 2G technology is more efficient. 2G technology
holds sufficient security for both the sender and the receiver. All text messages are digitally

Prepared by,
M.Revathi, AP/CSE
AGNI COLLEGE OF TECHNOLOGY IT6601- MOBILE COMPUTING

encrypted. This digital encryption allows for the transfer of data in such a way that only the
intended receiver can receive and read it
GSM technology was able to transfer circuit switched data over the network. The use of 3G
technology is also able to transmit packet switch data efficiently at better and increased
bandwidth. 3G mobile technologies proffers more advanced services to mobile users. It can
help many multimedia services to function. The spectral efficiency of 3G technology is better
than 2G technologies. Spectral efficiency is the measurement of rate of information transfer
over any communication system. 3G is also known as IMT-2000

ii.Describe the applications of Mobile computing. (8)


For Estate Agents
Estate agents can work either at home or out in the field. With mobile computers they
can be more productive. They can obtain current real estate information by accessing multiple
listing services, which they can do from home, office or car when out with clients. They can
provide clients with immediate feedback regarding specific homes or neighbourhoods, and
with faster loan approvals, since applications can be submitted on the spot. Therefore, mobile
computers allow them to devote more time to clients.
Emergency Services
Ability to receive information on the move is vital where the emergency services are
involved. Information regarding the address, type and other details of an incident can be
dispatched quickly, via a CDPD(Cellular Digital Packet Data) system using mobile
computers, to one or several appropriate mobile units which are in the vicinity of the incident.
Here the reliability and security implemented in the CDPD system would be of great
advantage.
In courts
Defence counsels can take mobile computers in court. When the opposing counsel
references a case which they are not familiar, they can use the computer to get direct, real-
time access to on-line legal database services, where they can gather information on the case
and related precedents. Therefore mobile computers allow immediate access to a wealth of
information, making people better informed and prepared.
12.a.Explain about the key mechanism in mobile IP. (16)
 Mobile IP is associated with the following three basic mechanisms:
o Discovering the Care-of-Address
o Registering the Care-of-Address

Prepared by,
M.Revathi, AP/CSE
AGNI COLLEGE OF TECHNOLOGY IT6601- MOBILE COMPUTING

o Tunneling to the Care-of-Address


 The registration process works over UDP and the discovery protocol works over
ICMP.
Agent Discovery
 During connection establishment, it is necessary for a mobile node to determine its
foreign agent. This task is referred to as agent discovery.
 The following two discovery methods are popularly used: 1)Agent advertisement
2)Agent solicitation.
 Agent Advertisement
o Foreign Agents and home Agents advertise their presence periodically using a
special Agent Advertisement messages.
o For these advertisements, Internet Control Message Protocol (ICMP)
messages are used.
o Agent Solicitation
o In case a Mobile Node does not receive any COA, then the MN should
send an agent solicitation message.
o But it is important to monitor that these agent solicitation messages do
not flood the network.
o A mobile node can usually send up to three solicitation messages (one
per second) as soon as it enters a new network.
o The basic purpose of the solicitation messages sent by a mobile node is
to search for a Foreign Agent.
o If an MN does not receive any address in response to its solicitation
messages, then to avoid network flooding, the MN should
exponentially reduce the rate of sending the solicitation messages.
o Discovering a new agent can be done anytime, not just if the MN is not
connected to one. The MN can look for a better connection while still
sending via the old path.
Registration
 Having received a COA, the MN has to register with the HA.
 The main purpose of the registration is to inform the HA of the current location for
correct forwarding of packets.
 Registration can be done in two different ways depending on the location of the COA.

Prepared by,
M.Revathi, AP/CSE
AGNI COLLEGE OF TECHNOLOGY IT6601- MOBILE COMPUTING

Tunneling
 These mechanisms are used for forwarding packets between the HA and the COA.
 A tunnel establishes a virtual pipe for data packets between a tunnel entry and a
tunnel endpoint.
 Packets entering a tunnel are forwarded inside the tunnel and leave the tunnel
unchanged.
 Tunneling, i.e., sending a packet through a tunnel, is achieved by using encapsulation.
OR
b.Give the comparison of various TCP advantages and disadvantages in wireless
networking. (16)
i.Indirect TCP (I-TCP)
 It segments the connection between the fixed host and mobile host into two different
connections: the wired part and the wireless part.
 The wired connection exists between the Fixed Host (FH) and the Base Station(BS).
 The wireless connection exists between the BS and the Mobile Host(MH).
 Thus, the base station maintains two separate TCP connections: one over the fixed
network and the other over the wireless link.
 The wireless link has poor quality communication, but it gets hidden from the fixed
network at the BS.
 When a packet is sent by the FH to MH, the packet is received by the BS and then BS
transmits it to the MH over the wireless link.
 If the mobile host moves out of the current BS region, the connection information and
responsibilities are transferred to the new BS.
ii. Fast Retransmission
iii. Snooping TCP(S-TCP)
 It improves the TCP performance by modifying the software at the base station but
maintains end-to-end semantics.
 The modified software at the base station is known as snoop.
 It monitors every packet that passes in both directions, i.e. from MH to FH and vice
versa.
 It buffers the packets. congestion may be detected from FH to MH in the form of
duplicate ACKs or timeout.
 It locally retransmits the packets to MH and hides the duplicate ACKs.

Prepared by,
M.Revathi, AP/CSE
AGNI COLLEGE OF TECHNOLOGY IT6601- MOBILE COMPUTING

iv. Mobile TCP(M-TCP)


 As in I-TCP, the TCP connection between the FH and MH is segmented into wired
and wireless parts.
 Wired connection is between FH and Supervisory Host(SH). Wireless connection is
between SH and MH.
 The SH supervises all transmitted to MH and acknowledgements sent by MH.
 If an ACK is not received by FH, SH decides that MH is disconnected and sets the
sender FH window size to 0. This prevents retransmission.
 When SH notices that MH is connected, it sets the full FH window size.
v. Freeze TCP
 The basic idea is to “freeze” the TCP senders stream, little before a disconnection is
occur.
 This is done by artificially sending a “zero windows advertisement” informing the
sender that the receiver cannot receive data at the moment.
 When the receiver resumes its connectivity, the receiver can unfreeze the sender by
sending the actual value of its receiver window.
13.a.i. What are the functions of authentication and encryption in GSM? How is system
security maintained? (8)

Prepared by,
M.Revathi, AP/CSE
AGNI COLLEGE OF TECHNOLOGY IT6601- MOBILE COMPUTING

Prepared by,
M.Revathi, AP/CSE
AGNI COLLEGE OF TECHNOLOGY IT6601- MOBILE COMPUTING

ii.Explain in detail about the handovers of GSM. (8)

Prepared by,
M.Revathi, AP/CSE
AGNI COLLEGE OF TECHNOLOGY IT6601- MOBILE COMPUTING

OR
b.i.Explain the functions of GPRS protocol stack with a diagram. (8)

Prepared by,
M.Revathi, AP/CSE
AGNI COLLEGE OF TECHNOLOGY IT6601- MOBILE COMPUTING

Prepared by,
M.Revathi, AP/CSE
AGNI COLLEGE OF TECHNOLOGY IT6601- MOBILE COMPUTING

Prepared by,
M.Revathi, AP/CSE
AGNI COLLEGE OF TECHNOLOGY IT6601- MOBILE COMPUTING

ii.Explain in detail about UMTS architecture. (8)

Prepared by,
M.Revathi, AP/CSE
AGNI COLLEGE OF TECHNOLOGY IT6601- MOBILE COMPUTING

Prepared by,
M.Revathi, AP/CSE
AGNI COLLEGE OF TECHNOLOGY IT6601- MOBILE COMPUTING

Prepared by,
M.Revathi, AP/CSE
AGNI COLLEGE OF TECHNOLOGY IT6601- MOBILE COMPUTING

14.a. Explain the traditional routing protocols. (16)

Prepared by,
M.Revathi, AP/CSE
AGNI COLLEGE OF TECHNOLOGY IT6601- MOBILE COMPUTING

Prepared by,
M.Revathi, AP/CSE
AGNI COLLEGE OF TECHNOLOGY IT6601- MOBILE COMPUTING

OR

Prepared by,
M.Revathi, AP/CSE
AGNI COLLEGE OF TECHNOLOGY IT6601- MOBILE COMPUTING

b.i.What are Multicast routing protocols. (8)

Prepared by,
M.Revathi, AP/CSE
AGNI COLLEGE OF TECHNOLOGY IT6601- MOBILE COMPUTING

Prepared by,
M.Revathi, AP/CSE
AGNI COLLEGE OF TECHNOLOGY IT6601- MOBILE COMPUTING

ii. What are reactive and proactive protocols? Specify its advantages and disadvantages. (8)

Prepared by,
M.Revathi, AP/CSE
AGNI COLLEGE OF TECHNOLOGY IT6601- MOBILE COMPUTING

Prepared by,
M.Revathi, AP/CSE
AGNI COLLEGE OF TECHNOLOGY IT6601- MOBILE COMPUTING

15.a.i. Compare and contrast the various mobile OS. (10)

ii.Discuss the applications of M-Commerce. (6)


B2C Applications
 It is a form of commerce in which products or services are sold by a business firm to a
consumer.
 Nearly half of the total M-Commerce market is filled with B2C applications. A few
examples are:
 Advertising
o Using the demographic information collected by the wireless service provider
and current location of a user, a good targeted advertising can be done.
o The wireless service provider may keep track of the history of the purchases
made by customers.
o For eg, a customer wants to buy an electronic product after getting more
details about it.
o For this, he can view all the relevant advertisements by taking the picture of
the bar code using his mobile device.
 Comparison Shopping

Prepared by,
M.Revathi, AP/CSE
AGNI COLLEGE OF TECHNOLOGY IT6601- MOBILE COMPUTING

o Consumers can use their mobile phones to get a comparative pricing analysis
of a product at different stores.
o He can also get the comparative price of related products.
o For eg, by scanning the barcode of the product, he can view the price at
different nearby shops.
o After seeing the price at different shops, the customer may decide to buy from
a shop which shows low price.
B2B Applications
 It is a form of commerce in which products or services are sold from a company to its
dealers.
 For eg, a TV manufacturing company would sell to a dealer and not directly to a
customer.
 The manufacturer and the dealers are said to be B2B partners. A few examples are:
 Ordering and Delivery confirmation
o By scanning the bar code on a product and specifying the quantity, a dealer
can order the goods.
o The order can be sent to the dealer in the standard format.
o Mobile phones can be used to track the order of the status.
o By reading the bar code on a packet, a truck driver can confirm the order
delivery.
 Stock tracking and control
o Mobile phones can be used to track the stock in a distributed inventory system
and send updates to a central database.
o By using a mobile phone to scan bar codes, employees can update the stock.
OR
b.i. Explain Mobile payment models and security issues. (10)
MOBILE PAYMENT SYSTEM (M-Payment)
 Mobile Payment is an evolution of E-Payment schemes.
 M-Payment is defined as a payment in which a mobile device is used to initiate,
authorize and confirm an exchange of financial value.
 Mobile devices include mobile phones, PDA’s and any other device that connects to a
mobile network for making payments.

Prepared by,
M.Revathi, AP/CSE
AGNI COLLEGE OF TECHNOLOGY IT6601- MOBILE COMPUTING

 A mobile device can be used for bill payments with access to account-based payment
instruments such as electronic funds transfer, internet banking, direct debit payment.
 An important issue is the technical infrastructure needed on the customer side.
 A technology may fail if the customer is not able to handle it easily.
 So, simple procedures based on simple message exchange through SMS may prove
more successful.
 The important payment solutions will be SMS-based, which can easily be charged to
the mobile phone bill of customers.
 Some important problems are those of security, privacy and guarding against frauds.
 There is a chance of theft of mobile device which can be used for fraudulent
payments.
Types of Mobile Payment Schemes
1. Bank account based
2. Credit card based
3. Micropayment
 In all these, a third party service provider makes payment on the customer’s behalf.
 Third party service provider can be bank, credit card company or telecom company.
 The question is how would the third party service provider recover its cost.
 It may require pre-payment from users, leading to some financial growth through
investment of this fund.
 A service provider may charge a small amount as service charge.
 Usually, users pay after the usage at every month end.
 Bank account based M-Payment
o The bank account of the customer is linked to his mobile phone number.
o The customer can make M-payment with a vendor, by connecting through
Bluetooth or wireless LAN.
o The bank account of the customer is debited and the value is credited to the
vendor’s account.
 Credit card based M-Payment
o Here, the credit card number is linked to the mobile phone number of the
customer.
o When the customer makes an M-Payment transaction with a merchant, the
credit card is charged.

Prepared by,
M.Revathi, AP/CSE
AGNI COLLEGE OF TECHNOLOGY IT6601- MOBILE COMPUTING

o The amount will be credited to the merchants account.


o This method depends on the penetration of credit cards in a country.
o Currently, the penetration level of credit cards is low, but it is expected to
grow in the coming years.
 Micropayment
o Micropayment is intended for small purchases, such as from vending
machines.
o The mobile device can communicate with the vending machine directly using
Bluetooth or Wireless LAN.
o A customer makes call to the number of service provider of the vending
machine where the per call charge is equal to the cost of the vending item.
o This scheme is implemented through the cooperation of the mobile phone
operator and a third party service provider.
o This approach has been used for vending from coca-cola machines.
Security Issues
 Users of mobile devices is difficult to trace because of the roaming of users.
 The mobile device go on-line and off-line frequently. Thus attacks would be very
difficult to trace.
 Another risk is the possibility of loss or theft of mobile device.
 A mobile device that is stolen can cause fraudulent activities.
 There is no satisfactory mechanism to authenticate a particular user.

ii. What is RFID? Explain few applications in which RFID is useful.(6)


RFID stands for Radio-Frequency IDentification. The acronym refers to small electronic
devices that consist of a small chip and an antenna. The chip typically is capable of carrying
2,000 bytes of data or less.
The RFID device serves the same purpose as a bar code or a magnetic strip on the back of a
credit card or ATM card; it provides a unique identifier for that object. And, just as a bar code
or magnetic strip must be scanned to get the information, the RFID device must be scanned to
retrieve the identifying information.
RFID Works Better Than Barcodes
A significant advantage of RFID devices over the others mentioned above is that the RFID
device does not need to be positioned precisely relative to the scanner. We're all familiar with

Prepared by,
M.Revathi, AP/CSE
AGNI COLLEGE OF TECHNOLOGY IT6601- MOBILE COMPUTING

the difficulty that store checkout clerks sometimes have in making sure that a barcode can be
read. And obviously, credit cards and ATM cards must be swiped through a special reader.
In contrast, RFID devices will work within a few feet (up to 20 feet for high-frequency
devices) of the scanner. For example, you could just put all of your groceries or purchases in
a bag, and set the bag on the scanner. It would be able to query all of the RFID devices and
total your purchase immediately. (Read a more detailed article on RFID compared to
barcodes.)
RFID technology has been available for more than fifty years. It has only been recently that
the ability to manufacture the RFID devices has fallen to the point where they can be used as
a "throwaway" inventory or control device. Alien Technologies recently sold 500 million
RFID tags to Gillette at a cost of about ten cents per tag.
One reason that it has taken so long for RFID to come into common use is the lack of
standards in the industry. Most companies invested in RFID technology only use the tags to
track items within their control; many of the benefits of RFID come when items are tracked
from company to company or from country to country.

Prepared by,
M.Revathi, AP/CSE
B.E/B.Tech DEGREE EXAMINATION, NOV/DEC 2017
Sixth Semester
IT6601 – MOBILE COMPUTING
(Regulation 2013)
Time: Three hours Maximum: 100 marks

Answer ALL Questions


PART A (10 x 2 = 20)
1. List out the difference between Mobile Computing and Wireless
Networking.
Mobile is a word that is commonly used to describe portable devices. A
mobile device is one that is made to be taken anywhere. Therefore, it needs
an internal battery for power, and must be connected to a modern mobile
network that can help it to send and receive data without attaching to a
hardware infrastructure.
Wireless, on the other hand, does not mean mobile. Traditional computers
or other non-mobile devices can access wireless networks. List some random
assignment schemes.
2. “MAC protocol designed for infrastructure based wireless network may
not work satisfactory in infrastructure-less environment.”-Justify.
This is because, in wireless network the strength of a signal decreases
proportionally to the square of the distance to the sender. This causes collision
detection to be difficult.
3. To which layer do each of the following protocols belong to? What is
their functionality?
 RARP
 DNS
RARP belongs to internet layer. RARP is used to find the IP address based on
the MAC address.
DNS belongs to application layer. DNS is a software service for translating
domain names into IP addresses.
4. Differentiate the functionalities of a foreign agent and home agent.
FA is a router in the foreign network. FA can provide several services to the
MN during its visit to the foreign network.
HA is located in the home network. HA maintains a location registry.
5. List the services of GPRS.
 Data transmission
 Telephony
 Emergency services
6. Define handoff. What are its types?
Handoff is a techniques in which a Mobile Station changes its base station. It
happens when the mobile station moves out of the range of a BTS.
TYPES:
 Intra-Cell
 Inter-cell, Intra-BSC
 Inter-BSC, Intra-MSC
 Inter-MSC
7. Compare AODV and DSR protocols.
DSR uses source routing in which a data packet carries the complete path to be
traversed. However, in AODV, the nodes store the next-hop information
corresponding to each flow.
8. What are the contents of link state advertisement message?
 Sender address
 Receiver address
 Connection number
9. What are the constraints in Mobile OS?
 Limited memory
 Limited screen size
 Limited battery power
 Limited processing power
10. What are the advantages and disadvantages of Blackberry OS?
Pros: Excellent connectivity, very fast and snappy
Cons: Camera quality is not great, Application support is bad.

Part B (5 x 16=80)
11.a.i. Explain hidden and exposed terminal problem in infrastructure-less
network. (8)
ii.Describe architecture of Mobile Computing. (8)
OR
b. What are the fixed assignment schemes of MAC protocol? Explain their
mechanism in detail. Compare and contrast them. (16)
12.a. Illustrate packet delivery mechanism in Mobile IP network with a neat
diagram. (16)
OR
b. Discuss and compare the various mechanisms used to improve the TCP
performance in mobile networks. (16)
13.a. Explain GSM architecture and its services with neat diagram. (16)
OR
b. Explain in detail about UMTS architecture and its services. (16)
3.3.UMTS (Universal Mobile Telecommunication Systems)
3.3.1 UMTS System Architecture
 The UTRA network (UTRAN) handles cell level mobility and comprises several
Radio Network Subsystems (RNS).
 The functions of the RNS include radio channel ciphering and deciphering, handover
control, radio resource management etc.
 The UTRAN is connected to the user equipment (UE) via the radio interface Uu
(which is comparable to the Um interface in GSM).
 Via the Iu interface (which is similar to the A interface in GSM), UTRAN
communicates with the core network (CN).
 The CN contains functions for inter-system handover, gateways to other networks
(fixed or wireless), and performs location management.
 UMTS Network Architecture

The UMTS network architecture can be divided into three main elements. They are:
1. User Equipment
2. Radio Network Subsystem
3. Core Network
 User Equpiment(UE)
o The User Equipment is the name by which a cell phone is referred to.
o The new name was chosen because of the greater functionality that the UE
incorporates compared to a cell phone.
o It can be thought of as both a mobile phone used for talking and a data
terminal attached to a computer with no voice capability.
o It forms the final interface with the user.
o It consists of a variety of different elements including RF circuitry, processing,
antenna, battery, etc.
o UE RF circuitry: The RF areas handle all elements of the signal, both for
the receiver and for the transmitter.
o Baseband processing: The base-band signal processing consists mainly of
digital circuitry.
o Battery: There has been an increase in current drain on the battery. Users
expect the same battery life as previous phones. Now Lithium Ion (Li-ion)
batteries are used. These phones to remain small and relatively light while still
retaining or even improving the overall life between charges.
o Universal Subscriber Identity Module (USIM): This is a more advanced
version of the SIM card used in GSM, but contains the same type of
information. The USIM also contains a short message storage area that allows
messages to stay with the user even when the phone is changed.
 Radio Network Subsystem(RNS)
o The Radio Network Subsystem is equivalent to that of the Base Station
Subsystem (BSS) in GSM.
o It provides and manages the wireless interface for the overall network.
o The overall radio access network, i.e. collectively all the Radio Network
Subsystem is known as the UTRAN UMTS Radio Access Network.

 Core Network(CN)
o The core network provides all the central processing and management for the
system.
o It is the equivalent of the GSM Network Switching Subsystem or NSS.
o The core network is then the overall entity that interfaces to external networks
including the public phone network and other cellular telecommunications
networks.
o The UMTS core network may be split into two different areas:
1. Circuit switched elements
2. Packet Switched elements

 Circuit Switched elements


o These elements are primarily based on the GSM network entities and carry
data in a circuit switched manner, i.e. a permanent channel for the duration of
the call.
o It contains the following network entities:
o Mobile switching centre (MSC): This is essentially the same as that within
GSM, and it manages the circuit switched calls under way.
o Gateway MSC (GMSC): This is effectively the interface to the external
networks.
 Packet switched elements
o These network entities are designed to carry packet data.
o This enables much higher network usage as the capacity can be shared and
data is carried as packets which are routed according to their destination.
o It includes the following network entities:
o Serving GPRS Support Node (SGSN): It is the same as that of GPRS
architecture. The SGSN provides a number of functions within the UMTS
network architecture.
a. Mobility management When a UE attaches to the Packet
Switched domain of the UMTS Core Network, the SGSN generates
MM information based on the mobile's current location.
b. Session management: The SGSN manages the data sessions
providing the required quality of service.
c. Interaction with other areas of the network: The SGSN is able
to manage its elements within the network only by communicating
with other areas of the network, e.g. MSC and other circuit
switched areas.
d. Billing: The SGSN is also responsible for billing. It achieves this
by monitoring the flow of user data across the GPRS network.
o Gateway GPRS Support Node (GGSN): Like the SGSN, this entity was
also first introduced into the GPRS network. It handles inter-working between the
UMTS packet switched network and external packet switched networks. In
operation, when the GGSN receives data addressed to a specific user, it checks if
the user is active and then forwards the data to the SGSN serving the particular
UE.

Shared elements
The shared elements of the 3G UMTS core network architecture include the following
network entities:
 Home location register (HLR): This database contains all the administrative
information about each subscriber along with their last known location. In this way,
the UMTS network is able to route calls to the relevant RNC.
 Equipment identity register (EIR): The EIR is the entity that decides whether a
given UE equipment may be allowed onto the network. Each UE equipment has a
number known as the International Mobile Equipment Identity. This number, as
mentioned above, is installed in the equipment and is checked by the network during
registration.
 Authentication centre (AuC) : The AuC is a protected database that contains the
secret key also contained in the user's USIM card.
14.a. Discuss route discovery and route maintenance mechanism in DSR with
illustrations. List its merits and demerits. (16)
OR
b. Describe the architecture of VANET with the functionality of the
components. Compare MANET with VANET. (16)
15.a. Illustrate the process of mobile payment. Compare and contrast mobile
payment schemes. (16)
OR
b. Explain android platform with its features, software stack and SDK. (16)

You might also like