Professional Documents
Culture Documents
MPC
MPC
CDhPUTINC
UNIT 1
1. 0efIne SAhA.
2. 0efIne C0hA.
3..What are the severaI versIons In CShA!
4.What Is meant by non-persIstent CShA!
5.What Is meant by p-persIstent CShA!
6. What Is S0hA!
7. What Is F00!
8. What are the 2 sub Iayers In 0LC!
) What Is EY-NhPA!
10) What do you mean by PoIIIng!
11) What are the four types of handover avaIIabIe In CSh!
12) What Is TETPA!
13) what are the categorIes of hobIIe servIces!
14) What are the servIces provIded by suppIementary servIces!
15) What are types of Handover!
IC UESTIDNS IN UNIT-1
1) 0Iscuss the advantage and dIsadvantage of ceIIuIar system wIth smaII ceIIs
2) ExpIaIn F0hA In detaII.
3) 0Iscuss S0hA In detaII.
4) ExpIaIn the varIous appIIcatIons of mobIIe computIng.
5) Why do hAC scheme In wIred network faII In wIreIess networks and how dose the muItIpIe access wIth
coIIIsIon avoIdance (hACA) scheme work.
6) ExpIaIn the archItecture of CSh wIth a neat dIagram.
7) How Is routIng carrIed out In CSh networks!
8) ExpIaIn In detaII about
a. hobIIe TermInated CaII
b. hobIIe DrIgInated CaII
WIth suItabIe dIagrams
) LIst the varIous handovers carrIed out In CSh and expIaIn any one of them In detaII.
10) How Is hobIIIty hanagement done In CSh !
11) ExpIaIn In detaII about the CeneraI Packet PadIo ServIce (CPPS)
UNIT II
IC UESTIDNS IN UNIT-II
UNIT III
IC UESTIDNS IN UNIT-3
1. ExpIaIn how
a. End to End packet deIIvery Is done In mobIIe IP
b. Agent advertIsement Is done In mobIIe IP
2. ExpIaIn how regIstratIon of a hobIIe Node Is carrIed out wIth approprIate request and repIy packet formats.
3. ExpIaIn In detaII about the IP In IP and mInImaI encapsuIatIons.
4. ExpIaIn In detaII about CPE encapsuIatIon wIth the approprIate packet format.
5. 0escrIbe the process of optImIzatIon In hobIIe IP wIth a suItabIe tImeIIne dIagram.
6. ExpIaIn In detaII about 0HCP.
7. 0Iscuss 0S0V routIng In detaII.
8. 0Iscuss 0SP routIng In detaII.
. Why Is conventIonaI routIng In wIred networks not suItabIe for wIreIess networks! SubstantIate your
answers wIth suItabIe exampIes.
10. How Is muItIcast routIng carrIed out In ad-hoc networks!
UNIT 1V
1. What do you mean by the term 'SnoopIng TCP'!. What Is Its demerIt!
2. What Is 'IndIrect TCP'!
3. What Is hobIIe TCP! LIst Its merIts.
4. LIst out the advantages of I-TCP.
5. LIst out dIsadvantages of I-TCP.
6. What Is WAP!
7. 0efIne WAE.
8. What Is WhL!
. WrIte short notes on WAP forum.
10. 0IstInguIsh between TradItIonaI TCP and wIreIess TCP!
11. What Is WTP! What are Its cIasses!
12. LIst out the network eIements of WAP.
13. What are the confIguratIon parameters to adapt TCP to wIreIess envIronments!
14. State the requIrements of WAP.
15. Name the Iayers of WAP.
16. What Is WTP! What are Its cIasses!
17. What Is WSP!
18. Name some features of WSP adapted to web browsIng.
1. What Is WhL!
20. What are the features of WhL!
21. What are the advantages of WhL ScrIpt over WhL!
22. Name the IIbrarIes specIfIed by WhL ScrIpt.
IC UESTIDNS IN UNIT-1V
UNIT V
1. 0Iscuss In detaII about any two PervasIve AppIIcatIons of your choIce In detaII.
2. ExpIaIn about the varIous hardware components InvoIved In PervasIve ComputIng 0evIces.
3. WrIte brIef notes on the foIIowIng.
a. Speech PecognItIon
b. HandwrItIng recognItIon
c. HaptIc Interfaces
d. WEPTY and FITALY keyboards
4. ExpIaIn In detaII about Io-hetrIcs. LIst out Its merIts and demerIts.
5. How Is synchronIzatIon carrIed out In a PervasIve EnvIronment! WrIte brIef notes on the synchL tooI.
6. What are the varIous Issues reIated to devIce management and how are they deaIt wIth!
7. ExpIaIn how a PervasIve Web AppIIcatIon can be secured usIng an 'AuthentIcatIon Proxy'.
8. How securIty Is achIeved In hVC and JSP based appIIcatIons!
. 0Iscuss In detaII about the access form PCs.
10. How Is access carrIed out In case of a P0A!
11. ExpIaIn In detaII about access vIa WAP.