Professional Documents
Culture Documents
MC - Solved
MC - Solved
66 insufficient resources
OR
b.Explain the architecture and transmission protocol of GPRS. (16)
12.a.Explain the IEEE 802.11 MAC management. (16) (not in reg 2013)
OR
b. Describe Bluetooth in detail. (16) (not in reg 2013)
13.a.Explain tunnelling and encapsulation in detail. (16)
Tunneling and Encapsulation
These mechanisms are used for forwarding packets between the HA and the COA.
A tunnel establishes a virtual pipe for data packets between a tunnel entry and a
tunnel endpoint.
Packets entering a tunnel are forwarded inside the tunnel and leave the tunnel
unchanged.
Tunneling, i.e., sending a packet through a tunnel, is achieved by using encapsulation.
Encapsulation is the mechanism of taking a packet consisting of packet header and
data and putting it into the data part of a new packet.
The reverse operation, taking a packet out of the data part of another packet, is called
decapsulation.
Encapsulation and decapsulation are the operations typically performed when a packet
is transferred from a higher protocol layer to a lower layer or from a lower to a higher
layer respectively. Here these functions are used within the same layer.
Working Mechanism of Tunneling and Encapsulation
o The HA takes the original packet with the MN, puts it into the data part of a
new packet and sets the new IP header in such a way that the packet is routed
to the COA.
o The new header is also called the outer header. Additionally, there is an
inner header which can be identical to the original header as this is the case
for IP-in-IP encapsulation, or the inner header can be computed during
encapsulation.
IP-in-IP Encapsulation
Ip-in-Ip encapsulation is mandatory for mobile IP.
The fields of the outer header are set as follows.
The version field ver is 4 for IP version 4, the internet header length (IHL) denotes
the length of the outer header in 32 bit words.
DS(TOS) is just copied from the inner header, the length field covers the complete
encapsulated packet.
TTL must be high enough so the packet can reach the tunnel endpoint.
The field IP-in-IP, is the type of the protocol used in the IP payload. This field is set
to 4, the protocol type for IPv4 because again an IPv4 packet follows after this outer
header.
IP checksum is calculated.
The next fields are the tunnel entry as source address (the IP address of the HA) and
the tunnel exit point as destination address (the COA).
The fields of the inner header are set as follows.
This header remains almost unchanged during encapsulation, thus showing the
original sender CN and the receiver MN of the packet.
The only change is TTL which is decremented by 1. This means that the whole tunnel
is considered a single hop from the original packet’s point of view.
This is a very important feature of tunneling as it allows the MN to behave as if it
were attached to the home network. No matter how many real hops the packet has to
take in the tunnel, it is just one (logical) hop away for the MN.
Finally, the payload follows the two headers.
Minimal Encapsulation
Minimal encapsulation 9 is an optional encapsulation method for mobile IP.
The tunnel entry point and endpoint are specified.
In this case, the field for the type of the following header contains the value 55 for the
minimal encapsulation protocol.
The inner header is different for minimal encapsulation.
The type of the following protocol and the address of the MN are needed.
If the S bit is set, the original sender address of the CN is included as omitting the
source is quite often not an option.
No field for fragmentation offset is left in the inner header and minimal encapsulation
does not work with already fragmented packets.
Generic Routing Encapsulation(GRE)
While IP-in-IP encapsulation and minimal encapsulation work only for IP, the GRE
scheme also supports other network layer protocols in addition to IP.
Generic routing encapsulation (GRE) allows the encapsulation of packets of one
protocol suite into the payload portion of a packet of another protocol suite.
The packet of one protocol suite with the original packet header and data is taken and
a new GRE header is prepended.
Together this forms the new data part of the new packet. Finally, the header of the
second protocol suite is put in front.
OR
b.Explain optimization in mobile IP in detail. (16)
ROUTE OPTIMIZATION
With the basic mobile IP protocol all packets to the MN have to go through the HA.
This can cause unnecessary overheads for the network between CN and HA, but also
between HA and COA, depending on the current location of the MN. As a result,
latency can increase dramatically.
The following route optimization techniques needs to be carried out to overcome this
problem.
o Enable direct notification of the Corresponding host
o Direct tunnelling from the corresponding host to the mobile host
o Binding cache maintained at the corresponding host
Binding Cache maintained at the Corresponding Host
One way to optimize the route is to inform the CN of the current location of the MN.
The CN can learn the location by caching it in a binding cache which is a part of the
local routing table for the CN.
The appropriate entity to inform the CN of the location is the HA.
The optimized mobile IP protocol needs four additional messages.
1. Binding request:
o Any node that wants to know the current location of an MN can send a
binding request to the HA.
o The HA can check if the MN has allowed dissemination of its current location.
o If the HA is allowed to reveal the location it sends back a binding update.
2. Binding update:
o This message when sent by the HA to CN reveals the current location of an
MN.
o The message contains the fixed IP address of the MN and the COA.
o The binding update can request an acknowledgement.
3. Binding acknowledgement:
o If requested, a node returns this acknowledgement after receiving a binding
update message.
4. Binding warning:
o If a node decapsulates a packet for an MN, but it is not the current FA for this
MN, this node sends a binding warning.
o The warning contains MN’s home address and a target node address, i.e., the
address of the node that has tried to send the packet to this MN.
o The recipient of the warning then knows that the target node could benefit
from obtaining a fresh binding for the MN.
o The recipient can be the HA, so the HA should now send a binding update to
the node that obviously has a wrong COA for the MN.
The CN can request the current location from the HA. If allowed by the MN, the HA
returns the COA of the MN via an update message.
The CN acknowledges this update message and stores the mobility binding.
Now the CN can send its data directly to the current foreign agent FAold. FAold
forwards the packets to the MN. This scenario shows a COA located at an FA.
Encapsulation of data for tunneling to the COA is now done by the CN, not the HA.
The MN might now change its location and register with a new foreign agent,
FAnew.
This registration is also forwarded to the HA to update its location database.
Furthermore, FAnew informs FAold about the new registration of MN. MN’s
registration message contains the address of FAold for this purpose.
Passing this information is achieved via an update message, which is acknowledged
by FAold. Registration replies are not shown in this scenario.
Without the information provided by the new FA, the old FA would not get to know
anything about the new location of MN.
In this case, CN does not know anything about the new location, so it still tunnels its
packets for MN to the old FA, FAold.
This FA now notices packets with destination MN, but also knows that it is not the
current FA of MN.
FAold might now forward these packets to the new COA of MN which is FAnew in
this example. This forwarding of packets is another optimization of the basic Mobile
IP providing smooth handovers.
Without this optimization, all packets in transit would be lost while the MN moves
from one FA to another. With TCP as the higher layer protocol this would result in
severe performance degradation.
To tell CN that it has a stale binding cache cache, FAold sends, in this example, a
binding warning message to CN.
CN then requests a binding update. The HA sends an update to inform the CN about
the new location, which is acknowledged.
Now CN can send its packets directly to FAnew, again avoiding triangular routing.
14.a.Explain mobile TCP in detail. (16) (not in reg 2013)
OR
b.i.Explain components and interface of the WAP architecture. (8) (not in reg 2013)
ii.Explain the idea behind WAE. (8) (not in reg 2013)
15.a.Illustrate the applications of pervasive computing (16) (not in reg 2013)
OR
b.Describe pervasive web application architecture with a neat diagram. (16) (not in reg
2013)
May / June 2015
CS2402 Mobile and Pervasive Computing
Part A
1. Why very long waves are used in sub marines? (not in reg 2013)
2. State the function of SST in GSM architecture.
An MSC handles all signalling needed for connection setup, connection release and
handover of connections to other MSCs. The standard signalling system No. 7 (SS7) is
used for this purpose. SS7 covers all aspects of control signalling for digital networks
3. Compare infra red and radio transmission. (not in reg 2013)
4. What is piconet? What restricts the number of active devices in a piconet? (not
in reg 2013)
5. When and why binding update is generated in mobile IP?
This message when sent by the HA to CN reveals the current location of an
MN.
The message contains the fixed IP address of the MN and the COA.
The binding update can request an acknowledgement.
6. Why is routing in multihop adhoc networks complicated?
Routing is complicated because of frequent topology changes, different capabilities of
the nodes, varying propagation characteristics. Furthermore, no central instance can
support routing.
7. List the disadvantages of I-TCP.
Violation of end to end semantics
Hand-off latency increases due to state transfer
8. Write a WML scripts for login process of a mobile application. (not in reg 2013)
9. List application areas of pervasive computing. . (not in reg 2013)
10. What are the challenges in pervasive computing? . (not in reg 2013)
Part B
11. a. i. Explain the functional architecture of GSM system. (10)
ii.Briefly discuss about cellular wireless networks. (6) (not in reg 2013)
OR
b. i. Explain the architecture of GPRS. (8)
ii.Explain security services of GSM. (8)
12.a.i. Explain contention-free access using polling mechanism in IEEE 802.11. (10)
(not in reg 2013)
ii. Explain the protocol stack of Bluetooth. (6) (not in reg 2013)
OR
b.i. Explain MAC management of 802.11. (8) (not in reg 2013)
ii. Explain the phases of HIPERLAN 1 EY-NPMA access scheme. (8) (not in reg
2013)
13.a.i. What is encapsulation? Explain IP-in-IP encapsulation. (8)
Encapsulation is the mechanism of taking a packet consisting of packet header and
data and putting it into the data part of a new packet.
The reverse operation, taking a packet out of the data part of another packet, is called
decapsulation.
Encapsulation and decapsulation are the operations typically performed when a packet
is transferred from a higher protocol layer to a lower layer or from a lower to a higher
layer respectively. Here these functions are used within the same layer.
Working Mechanism of Tunneling and Encapsulation
o The HA takes the original packet with the MN, puts it into the data part of a
new packet and sets the new IP header in such a way that the packet is routed
to the COA.
o The new header is also called the outer header. Additionally, there is an
inner header which can be identical to the original header as this is the case
for IP-in-IP encapsulation, or the inner header can be computed during
encapsulation.
IP-in-IP Encapsulation
Ip-in-Ip encapsulation is mandatory for mobile IP.
The fields of the outer header are set as follows.
The version field ver is 4 for IP version 4, the internet header length (IHL) denotes
the length of the outer header in 32 bit words.
DS(TOS) is just copied from the inner header, the length field covers the complete
encapsulated packet.
TTL must be high enough so the packet can reach the tunnel endpoint.
The field IP-in-IP, is the type of the protocol used in the IP payload. This field is set
to 4, the protocol type for IPv4 because again an IPv4 packet follows after this outer
header.
IP checksum is calculated.
The next fields are the tunnel entry as source address (the IP address of the HA) and
the tunnel exit point as destination address (the COA).
The fields of the inner header are set as follows.
This header remains almost unchanged during encapsulation, thus showing the
original sender CN and the receiver MN of the packet.
The only change is TTL which is decremented by 1. This means that the whole tunnel
is considered a single hop from the original packet’s point of view.
This is a very important feature of tunneling as it allows the MN to behave as if it
were attached to the home network. No matter how many real hops the packet has to
take in the tunnel, it is just one (logical) hop away for the MN.
Finally, the payload follows the two headers.
Step 1: When the client computer (or device) boots up or is connected to a network, a
DHCPDISCOVER message is sent from the client to the server. As there is no network
configuration information on the client so the message is sent with 0.0.0.0 as source
address and 255.255.255.255 as destination address. If the DHCP server is on local subnet
then it directly receives the message or in case it is on different subnet then a relay agent
connected on client’s subnet is used to pass on the request to DHCP server. The transport
protocol used for this message is UDP and the port number used is 67. The client enters
the initializing stage during this step.
Step 2: When the DHCP server receives the DHCPDISCOVER request message then it
replies with a DHCPOFFER message. As already explained, this message contains all the
network configuration settings required by the client. For example, the yaddr field of the
message will contain the IP address to be assigned to client. Similarly the the subnet mask
and gateway information is filled in the options field. Also, the server fills in the client
MAC address in the chaddr field. This message is sent as a broadcast (255.255.255.255)
message for the client to receive it directly or if DHCP server is in different subnet then
this message is sent to the relay agent that takes care of whether the message is to be
passed as unicast or broadcast. In this case also, UDP protocol is used at the transport
layer with destination port as 68. The client enters selecting stage during this step
Step 3: The client forms a DHCPREQUEST message in reply to DHCPOFFER message
and sends it to the server indicating it wants to accept the network configuration sent in
the DHCPOFFER message. If there were multiple DHCP servers that received
DHCPDISCOVER then client could receive multiple DHCPOFFER messages. But, the
client replies to only one of the messages by populating the server identification field with
the IP address of a particular DHCP server. All the messages from other DHCP servers
are implicitly declined. The DHCPREQUEST message will still contain the source
address as 0.0.0.0 as the client is still not allowed to use the IP address passed to it
through DHCPOFFER message. The client enters requesting stage during this step.
Step 4: Once the server receives DHCPREQUEST from the client, it sends the
DHCPACK message indicating that now the client is allowed to use the IP address
assigned to it. The client enters the bound state during this step.
Snooping TCP(S-TCP)
It improves the TCP performance by modifying the software at the base station but
maintains end-to-end semantics.
The modified software at the base station is known as snoop.
It monitors every packet that passes in both directions, i.e. from MH to FH and vice
versa.
It buffers the packets. congestion may be detected from FH to MH in the form of
duplicate ACKs or timeout.
It locally retransmits the packets to MH and hides the duplicate ACKs.
OR
b.i. Discuss in detail the components and protocols of Wireless Application Protocol.
(16) (not in reg 2013)
15.a.Discuss briefly about pervasive web application architecture. (16) (not in reg 2013)
OR
b. Discuss briefly how the access from Personal Digital Assistants is made through
WAP. (16)(not in reg 2013)
NOV / DEC 2013
CS2402- MOBILE AND PERVASIVE COMPUTING
Part A
1.What are the different types of access mechanisms?
TDMA
CDMA
FDMA
SDMA
2.How is authentication done in GSM network?
Authentication is based on the key stored in SIM. The AuC generates a random number and
sends to the mobile station. Both mobile station and base station calculates the SRES based
on the key and random value. If both the SRES are equal, then authentication is successful.
3.How does a new Bluetooth device discover a Bluetooth network? (not in reg 2013)
4.How is power conservation achieved in HIPERLAN? (not in reg 2013)
5.Write any two factors that affect the performance of Adhoc networking.
Energy constrained
Connectivity
6.What do you mean by zone routing protocol?
Zone Routing Protocol (ZRP) is a hybrid routing protocol which combines the best features
of proactive and reactive routing protocols. Proactive protocols are used in r-hop
neighbourhood zone. Reactive protocols are used outside this zone.
7.Mention the features present in WSP/Bin addition to that present in WSP. (not in reg
2013)
8.State the applications of wireless telephony. (not in reg 2013)
9.What is the need for interoperability in mobile device technology? (not in reg 2013)
10.Give some application areas of pervasive computing. (not in reg 2013)
Part B
11.a.i.Explain architecture of cellular mobile communication with neat diagram. (8) (not
in reg 2013)
ii. Explain connection establishment and frequency allocation in GSM. (8)
OR
b. How is data routing done in GPRS? In what aspect is data routing different from
voice routing ? state its limitations and applications.(16)
Data Routing and Mobility Management in GPRS:
Data routing or routing of data packets to and fro from a mobile user, is one of the
basic requirement in the GPRS network. The requirement can be divided into two areas:
DHCP messages
The following list includes the eight types of messages that can be sent between DHCP
clients and servers.
DHCPDiscover
Broadcast by a DHCP client when it first attempts to connect to the network. The
DHCPDiscover message requests IP address information from a DHCP server.
DHCPOffer
Broadcast by each DHCP server that receives the client DHCPDiscover message and has an
IP address configuration to offer to the client. The DHCPOffer message contains an unleased
IP address and additional TCP/IP configuration information, such as the subnet mask and
default gateway. More than one DHCP server can respond with a DHCPOffer message. The
client accepts the best offer, which, for a Windows DHCP client, is the first DHCPOffer
message that it receives.
DHCPRequest
Broadcast by a DHCP client after it selects a DHCPOffer. The DHCPRequest message
contains the IP address from the DHCPOffer that it selected. If the client is renewing or
rebinding to a previous lease, this packet might be unicast directly to the server.
DHCPAck
Broadcast by a DHCP server to a DHCP client acknowledging the DHCPRequest message.
At this time, the server also forwards any options. Upon receipt of the DHCPAck, the client
can use the leased IP address to participate in the TCP/IP network and complete its system
startup. This message is typically broadcast, because the DHCP client does not officially have
an IP address that it can use at this point. If the DHCPAck is in response to a DHCPInform,
then the message is unicast directly to the host that sent the DHCPInform message.
DHCPNack
Broadcast by a DHCP server to a DHCP client denying the client’s DHCPRequest message.
This might occur if the requested address is incorrect because the client moved to a new
subnet or because the DHCP client’s lease has expired and cannot be renewed.
DHCPDecline
Broadcast by a DHCP client to a DHCP server, informing the server that the offered IP
address is declined because it appears to be in use by another computer.
DHCPRelease
Sent by a DHCP client to a DHCP server, relinquishing an IP address and canceling the
remaining lease. This is unicast to the server that provided the lease.
DHCPInform
Sent from a DHCP client to a DHCP server, asking only for additional local configuration
parameters; the client already has a configured IP address. This message type is also used by
DHCP servers running Windows Server 2008 to detect unauthorized DHCP servers.
ii.Multicast routing
14.a.What are the various flavours of TCP available? Explain them in detail. (16)
i.Indirect TCP (I-TCP)
It segments the connection between the fixed host and mobile host into two different
connections: the wired part and the wireless part.
The wired connection exists between the Fixed Host (FH) and the Base Station(BS).
The wireless connection exists between the BS and the Mobile Host(MH).
Thus, the base station maintains two separate TCP connections: one over the fixed
network and the other over the wireless link.
The wireless link has poor quality communication, but it gets hidden from the fixed
network at the BS.
When a packet is sent by the FH to MH, the packet is received by the BS and then BS
transmits it to the MH over the wireless link.
If the mobile host moves out of the current BS region, the connection information and
responsibilities are transferred to the new BS.
ii. Fast Retransmission
iii. Snooping TCP(S-TCP)
It improves the TCP performance by modifying the software at the base station but
maintains end-to-end semantics.
The modified software at the base station is known as snoop.
It monitors every packet that passes in both directions, i.e. from MH to FH and vice
versa.
It buffers the packets. congestion may be detected from FH to MH in the form of
duplicate ACKs or timeout.
It locally retransmits the packets to MH and hides the duplicate ACKs.
iv. Mobile TCP(M-TCP)
As in I-TCP, the TCP connection between the FH and MH is segmented into wired
and wireless parts.
Wired connection is between FH and Supervisory Host(SH). Wireless connection is
between SH and MH.
The SH supervises all transmitted to MH and acknowledgements sent by MH.
If an ACK is not received by FH, SH decides that MH is disconnected and sets the
sender FH window size to 0. This prevents retransmission.
When SH notices that MH is connected, it sets the full FH window size.
v. Freeze TCP
The basic idea is to “freeze” the TCP senders stream, little before a disconnection is
occur.
This is done by artificially sending a “zero windows advertisement” informing the
sender that the receiver cannot receive data at the moment.
When the receiver resumes its connectivity, the receiver can unfreeze the sender by
sending the actual value of its receiver window.
OR
b.i. Explain WTA architecture. (8) (not in reg 2013)
ii. Explain about WAP agent profile. (8) (not in reg 2013)
15.a. Describe device connectivity and device management in pervasive computing.
(16)(not in reg 2013)
OR
b.i. Explain the pervasive web application architecture. (8) (not in reg 2013)
ii.Explain how PDA’S are accessed from PC’s vice versa and via WAP. (8) (not in reg
2013)
AGNI COLLEGE OF TECHNOLOGY IT6601- MOBILE COMPUTING
Prepared by,
M.Revathi, AP/CSE
AGNI COLLEGE OF TECHNOLOGY IT6601- MOBILE COMPUTING
9.Define POS.
A point of sale (POS) is the place where sales are made. On a macro level, a POS may be a
mall, a market or a city. On a micro level, retailers consider a POS to be the area where a
customer completes a transaction, such as a checkout counter. It is also known as a point of
purchase.
10.Differentiate E-commerce and M-commerce.
E-commerce or electronic commerce, is the process of buying and selling goods, products
and services over electronic systems such as internet, telephone and e-mail. M-
Commerce or mobile commerce is process of buying and selling products and services
through wireless handheld devices such as cell phones or PDAs.
Part B
11.a. Differentiate between FDMA,TDMA and CDMA. (16)
Prepared by,
M.Revathi, AP/CSE
AGNI COLLEGE OF TECHNOLOGY IT6601- MOBILE COMPUTING
OR
b.i.Explain the distinguishing features of various generations of wireless networks. (8)
1G, which stands for "first generation," refers to the first generation of wireless
telecommunication technology, more popularly known as cellphones. A set of wireless
standards developed in the 1980's, 1G technology replaced 0G technology, which featured
mobile radio telephones and such technologies as Mobile Telephone System (MTS),
Advanced Mobile Telephone System (AMTS), Improved Mobile Telephone Service (IMTS),
and Push to Talk (PTT).
Unlike its successor, 2G, which made use of digital signals, 1G wireless networks used
analog radio signals. Through 1G, a voice call gets modulated to a higher frequency of about
150MHz and up as it is transmitted between radio towers. This is done using a technique
called Frequency-Division Multiple Access (FDMA).
2G network allows for much greater penetration intensity. 2G technologies enabled the
various mobile phone networks to provide the services such as text messages, picture
messages and MMS (multi media messages). 2G technology is more efficient. 2G technology
holds sufficient security for both the sender and the receiver. All text messages are digitally
Prepared by,
M.Revathi, AP/CSE
AGNI COLLEGE OF TECHNOLOGY IT6601- MOBILE COMPUTING
encrypted. This digital encryption allows for the transfer of data in such a way that only the
intended receiver can receive and read it
GSM technology was able to transfer circuit switched data over the network. The use of 3G
technology is also able to transmit packet switch data efficiently at better and increased
bandwidth. 3G mobile technologies proffers more advanced services to mobile users. It can
help many multimedia services to function. The spectral efficiency of 3G technology is better
than 2G technologies. Spectral efficiency is the measurement of rate of information transfer
over any communication system. 3G is also known as IMT-2000
Prepared by,
M.Revathi, AP/CSE
AGNI COLLEGE OF TECHNOLOGY IT6601- MOBILE COMPUTING
Prepared by,
M.Revathi, AP/CSE
AGNI COLLEGE OF TECHNOLOGY IT6601- MOBILE COMPUTING
Tunneling
These mechanisms are used for forwarding packets between the HA and the COA.
A tunnel establishes a virtual pipe for data packets between a tunnel entry and a
tunnel endpoint.
Packets entering a tunnel are forwarded inside the tunnel and leave the tunnel
unchanged.
Tunneling, i.e., sending a packet through a tunnel, is achieved by using encapsulation.
OR
b.Give the comparison of various TCP advantages and disadvantages in wireless
networking. (16)
i.Indirect TCP (I-TCP)
It segments the connection between the fixed host and mobile host into two different
connections: the wired part and the wireless part.
The wired connection exists between the Fixed Host (FH) and the Base Station(BS).
The wireless connection exists between the BS and the Mobile Host(MH).
Thus, the base station maintains two separate TCP connections: one over the fixed
network and the other over the wireless link.
The wireless link has poor quality communication, but it gets hidden from the fixed
network at the BS.
When a packet is sent by the FH to MH, the packet is received by the BS and then BS
transmits it to the MH over the wireless link.
If the mobile host moves out of the current BS region, the connection information and
responsibilities are transferred to the new BS.
ii. Fast Retransmission
iii. Snooping TCP(S-TCP)
It improves the TCP performance by modifying the software at the base station but
maintains end-to-end semantics.
The modified software at the base station is known as snoop.
It monitors every packet that passes in both directions, i.e. from MH to FH and vice
versa.
It buffers the packets. congestion may be detected from FH to MH in the form of
duplicate ACKs or timeout.
It locally retransmits the packets to MH and hides the duplicate ACKs.
Prepared by,
M.Revathi, AP/CSE
AGNI COLLEGE OF TECHNOLOGY IT6601- MOBILE COMPUTING
Prepared by,
M.Revathi, AP/CSE
AGNI COLLEGE OF TECHNOLOGY IT6601- MOBILE COMPUTING
Prepared by,
M.Revathi, AP/CSE
AGNI COLLEGE OF TECHNOLOGY IT6601- MOBILE COMPUTING
Prepared by,
M.Revathi, AP/CSE
AGNI COLLEGE OF TECHNOLOGY IT6601- MOBILE COMPUTING
OR
b.i.Explain the functions of GPRS protocol stack with a diagram. (8)
Prepared by,
M.Revathi, AP/CSE
AGNI COLLEGE OF TECHNOLOGY IT6601- MOBILE COMPUTING
Prepared by,
M.Revathi, AP/CSE
AGNI COLLEGE OF TECHNOLOGY IT6601- MOBILE COMPUTING
Prepared by,
M.Revathi, AP/CSE
AGNI COLLEGE OF TECHNOLOGY IT6601- MOBILE COMPUTING
Prepared by,
M.Revathi, AP/CSE
AGNI COLLEGE OF TECHNOLOGY IT6601- MOBILE COMPUTING
Prepared by,
M.Revathi, AP/CSE
AGNI COLLEGE OF TECHNOLOGY IT6601- MOBILE COMPUTING
Prepared by,
M.Revathi, AP/CSE
AGNI COLLEGE OF TECHNOLOGY IT6601- MOBILE COMPUTING
Prepared by,
M.Revathi, AP/CSE
AGNI COLLEGE OF TECHNOLOGY IT6601- MOBILE COMPUTING
Prepared by,
M.Revathi, AP/CSE
AGNI COLLEGE OF TECHNOLOGY IT6601- MOBILE COMPUTING
OR
Prepared by,
M.Revathi, AP/CSE
AGNI COLLEGE OF TECHNOLOGY IT6601- MOBILE COMPUTING
Prepared by,
M.Revathi, AP/CSE
AGNI COLLEGE OF TECHNOLOGY IT6601- MOBILE COMPUTING
Prepared by,
M.Revathi, AP/CSE
AGNI COLLEGE OF TECHNOLOGY IT6601- MOBILE COMPUTING
ii. What are reactive and proactive protocols? Specify its advantages and disadvantages. (8)
Prepared by,
M.Revathi, AP/CSE
AGNI COLLEGE OF TECHNOLOGY IT6601- MOBILE COMPUTING
Prepared by,
M.Revathi, AP/CSE
AGNI COLLEGE OF TECHNOLOGY IT6601- MOBILE COMPUTING
Prepared by,
M.Revathi, AP/CSE
AGNI COLLEGE OF TECHNOLOGY IT6601- MOBILE COMPUTING
o Consumers can use their mobile phones to get a comparative pricing analysis
of a product at different stores.
o He can also get the comparative price of related products.
o For eg, by scanning the barcode of the product, he can view the price at
different nearby shops.
o After seeing the price at different shops, the customer may decide to buy from
a shop which shows low price.
B2B Applications
It is a form of commerce in which products or services are sold from a company to its
dealers.
For eg, a TV manufacturing company would sell to a dealer and not directly to a
customer.
The manufacturer and the dealers are said to be B2B partners. A few examples are:
Ordering and Delivery confirmation
o By scanning the bar code on a product and specifying the quantity, a dealer
can order the goods.
o The order can be sent to the dealer in the standard format.
o Mobile phones can be used to track the order of the status.
o By reading the bar code on a packet, a truck driver can confirm the order
delivery.
Stock tracking and control
o Mobile phones can be used to track the stock in a distributed inventory system
and send updates to a central database.
o By using a mobile phone to scan bar codes, employees can update the stock.
OR
b.i. Explain Mobile payment models and security issues. (10)
MOBILE PAYMENT SYSTEM (M-Payment)
Mobile Payment is an evolution of E-Payment schemes.
M-Payment is defined as a payment in which a mobile device is used to initiate,
authorize and confirm an exchange of financial value.
Mobile devices include mobile phones, PDA’s and any other device that connects to a
mobile network for making payments.
Prepared by,
M.Revathi, AP/CSE
AGNI COLLEGE OF TECHNOLOGY IT6601- MOBILE COMPUTING
A mobile device can be used for bill payments with access to account-based payment
instruments such as electronic funds transfer, internet banking, direct debit payment.
An important issue is the technical infrastructure needed on the customer side.
A technology may fail if the customer is not able to handle it easily.
So, simple procedures based on simple message exchange through SMS may prove
more successful.
The important payment solutions will be SMS-based, which can easily be charged to
the mobile phone bill of customers.
Some important problems are those of security, privacy and guarding against frauds.
There is a chance of theft of mobile device which can be used for fraudulent
payments.
Types of Mobile Payment Schemes
1. Bank account based
2. Credit card based
3. Micropayment
In all these, a third party service provider makes payment on the customer’s behalf.
Third party service provider can be bank, credit card company or telecom company.
The question is how would the third party service provider recover its cost.
It may require pre-payment from users, leading to some financial growth through
investment of this fund.
A service provider may charge a small amount as service charge.
Usually, users pay after the usage at every month end.
Bank account based M-Payment
o The bank account of the customer is linked to his mobile phone number.
o The customer can make M-payment with a vendor, by connecting through
Bluetooth or wireless LAN.
o The bank account of the customer is debited and the value is credited to the
vendor’s account.
Credit card based M-Payment
o Here, the credit card number is linked to the mobile phone number of the
customer.
o When the customer makes an M-Payment transaction with a merchant, the
credit card is charged.
Prepared by,
M.Revathi, AP/CSE
AGNI COLLEGE OF TECHNOLOGY IT6601- MOBILE COMPUTING
Prepared by,
M.Revathi, AP/CSE
AGNI COLLEGE OF TECHNOLOGY IT6601- MOBILE COMPUTING
the difficulty that store checkout clerks sometimes have in making sure that a barcode can be
read. And obviously, credit cards and ATM cards must be swiped through a special reader.
In contrast, RFID devices will work within a few feet (up to 20 feet for high-frequency
devices) of the scanner. For example, you could just put all of your groceries or purchases in
a bag, and set the bag on the scanner. It would be able to query all of the RFID devices and
total your purchase immediately. (Read a more detailed article on RFID compared to
barcodes.)
RFID technology has been available for more than fifty years. It has only been recently that
the ability to manufacture the RFID devices has fallen to the point where they can be used as
a "throwaway" inventory or control device. Alien Technologies recently sold 500 million
RFID tags to Gillette at a cost of about ten cents per tag.
One reason that it has taken so long for RFID to come into common use is the lack of
standards in the industry. Most companies invested in RFID technology only use the tags to
track items within their control; many of the benefits of RFID come when items are tracked
from company to company or from country to country.
Prepared by,
M.Revathi, AP/CSE
B.E/B.Tech DEGREE EXAMINATION, NOV/DEC 2017
Sixth Semester
IT6601 – MOBILE COMPUTING
(Regulation 2013)
Time: Three hours Maximum: 100 marks
Part B (5 x 16=80)
11.a.i. Explain hidden and exposed terminal problem in infrastructure-less
network. (8)
ii.Describe architecture of Mobile Computing. (8)
OR
b. What are the fixed assignment schemes of MAC protocol? Explain their
mechanism in detail. Compare and contrast them. (16)
12.a. Illustrate packet delivery mechanism in Mobile IP network with a neat
diagram. (16)
OR
b. Discuss and compare the various mechanisms used to improve the TCP
performance in mobile networks. (16)
13.a. Explain GSM architecture and its services with neat diagram. (16)
OR
b. Explain in detail about UMTS architecture and its services. (16)
3.3.UMTS (Universal Mobile Telecommunication Systems)
3.3.1 UMTS System Architecture
The UTRA network (UTRAN) handles cell level mobility and comprises several
Radio Network Subsystems (RNS).
The functions of the RNS include radio channel ciphering and deciphering, handover
control, radio resource management etc.
The UTRAN is connected to the user equipment (UE) via the radio interface Uu
(which is comparable to the Um interface in GSM).
Via the Iu interface (which is similar to the A interface in GSM), UTRAN
communicates with the core network (CN).
The CN contains functions for inter-system handover, gateways to other networks
(fixed or wireless), and performs location management.
UMTS Network Architecture
The UMTS network architecture can be divided into three main elements. They are:
1. User Equipment
2. Radio Network Subsystem
3. Core Network
User Equpiment(UE)
o The User Equipment is the name by which a cell phone is referred to.
o The new name was chosen because of the greater functionality that the UE
incorporates compared to a cell phone.
o It can be thought of as both a mobile phone used for talking and a data
terminal attached to a computer with no voice capability.
o It forms the final interface with the user.
o It consists of a variety of different elements including RF circuitry, processing,
antenna, battery, etc.
o UE RF circuitry: The RF areas handle all elements of the signal, both for
the receiver and for the transmitter.
o Baseband processing: The base-band signal processing consists mainly of
digital circuitry.
o Battery: There has been an increase in current drain on the battery. Users
expect the same battery life as previous phones. Now Lithium Ion (Li-ion)
batteries are used. These phones to remain small and relatively light while still
retaining or even improving the overall life between charges.
o Universal Subscriber Identity Module (USIM): This is a more advanced
version of the SIM card used in GSM, but contains the same type of
information. The USIM also contains a short message storage area that allows
messages to stay with the user even when the phone is changed.
Radio Network Subsystem(RNS)
o The Radio Network Subsystem is equivalent to that of the Base Station
Subsystem (BSS) in GSM.
o It provides and manages the wireless interface for the overall network.
o The overall radio access network, i.e. collectively all the Radio Network
Subsystem is known as the UTRAN UMTS Radio Access Network.
Core Network(CN)
o The core network provides all the central processing and management for the
system.
o It is the equivalent of the GSM Network Switching Subsystem or NSS.
o The core network is then the overall entity that interfaces to external networks
including the public phone network and other cellular telecommunications
networks.
o The UMTS core network may be split into two different areas:
1. Circuit switched elements
2. Packet Switched elements
Shared elements
The shared elements of the 3G UMTS core network architecture include the following
network entities:
Home location register (HLR): This database contains all the administrative
information about each subscriber along with their last known location. In this way,
the UMTS network is able to route calls to the relevant RNC.
Equipment identity register (EIR): The EIR is the entity that decides whether a
given UE equipment may be allowed onto the network. Each UE equipment has a
number known as the International Mobile Equipment Identity. This number, as
mentioned above, is installed in the equipment and is checked by the network during
registration.
Authentication centre (AuC) : The AuC is a protected database that contains the
secret key also contained in the user's USIM card.
14.a. Discuss route discovery and route maintenance mechanism in DSR with
illustrations. List its merits and demerits. (16)
OR
b. Describe the architecture of VANET with the functionality of the
components. Compare MANET with VANET. (16)
15.a. Illustrate the process of mobile payment. Compare and contrast mobile
payment schemes. (16)
OR
b. Explain android platform with its features, software stack and SDK. (16)