1.
Define mobile computing and distinguish it from wireless networking
Mobile computing refers to transferring data or information between
devices without physical connection, e.g., laptops, tablets, and
smartphones. Wireless networking connects devices to a distributed
network, while mobile systems offer network resources anywhere.
Mobile computing devices, such as laptops, tablets, and smartphones, can
indeed exchange data even without a direct network connection. Here’s
how it works:
Local Communication: These devices can communicate directly with
each other using Bluetooth, Wi-Fi Direct, or NFC (Near Field
Communication). For example, you can transfer files between two
smartphones via Bluetooth without an internet connection.
Ad Hoc Networks: Mobile devices can form ad hoc networks when they
are in close proximity. In this setup, they create a temporary network
among themselves, allowing data exchange. Think of it like a group chat
where devices talk to each other directly.
Offline Apps: Many mobile apps are designed to work offline. They store
data locally and synchronize when an internet connection becomes
available. For instance, note-taking apps or offline maps function without
real-time network access.
Caching and Synchronization: Mobile apps cache data locally to improve
performance. When you later connect to a network, the app syncs with
the server to update information. Email apps often work this way.
2. Enumerate the applications of mobile computing in real-world
scenarios.
• Web or Internet Access
• Global Positioning System(GPS)
• Emergency Services
• Entertainment Services
• Educational Services
• Business Applications
• Credit card Verification
• Infotainment
3. State the significance of a Universal Mobile Telecommunication System
The Universal Mobile Telecommunications System (UMTS)
was a significant advancement in mobile communications.
It introduced 3G technology, enabling high-speed data
services and mobile internet access.
UMTS played a crucial role in shaping the evolution of
mobile networks, leading to the development of 4G (LTE)
and, subsequently, 5G networks
4. Compare the characteristics of mobile computing with traditional
computing
5. State any two of the importance of MAC protocols in ensuring efficient
communication in wireless networks
Channel Access Coordination: MAC protocols manage how devices share
the wireless communication channel. They prevent collisions by allowing
only one device to transmit at a time. This coordination ensures efficient
utilization of the limited channel bandwidth.
Prioritization and QoS (Quality of Service): MAC protocols prioritize
different types of traffic (e.g., voice, video, data) based on their
importance. By allocating resources appropriately, they enhance QoS.
For example, in Wi-Fi networks, the IEEE 802.11e standard introduces
QoS enhancements for multimedia applications.
6. Analyse the impact of mobile computing on modern business practices
• Enhanced Mobility and Productivity
• Business Process Transformation
• Customer Engagement and Marketing
• Data-Driven Insights
• Challenges and security concerns
7. Find out the characteristics while device can thus exhibit during
communication
• Analog or Digital Signal Generation
• Exchange of information
• Transmitting Messages
• Specific Examples of Communication Devices
o Modem
Switch
o Router
o Cell phone
8. Mention some of the disadvantages of WLANs
• Security Risks
• Limited Coverage Area
• Interference
• Bandwidth Limitations
• Cost and maintenance
• Environmental impact
9. Categorize the Limitations of Mobile Computing.
• Dependence on technology
• Battery life constraints
• Security concerns
• Cost implications
• Physical vulnerability
10. State the different kinds of mobility
User Mobility: This refers to the ability of users to move around
while maintaining access to telecommunication services. Essentially, it
allows users to switch locations, networks, and devices seamlessly.
Imagine someone using their smartphone to make a call while walking
from their home to the office—that’s user mobility.
Device Portability: Device portability focuses on the physical
movement of computing devices. It means that devices can be carried
from one place to another without losing functionality. For instance, a
laptop that you can take with you to a coffee shop or a tablet you use
both at home and during travel—that’s device portability.
13. What are the obstacles in mobile communications?
• Low bandwidth during communication
• Battery life constraints
• Network coverage gaps
• Device diversity
• Evolving Technology standards
14. Components of a wireless communication system
• Transmitter (TX)
• Modulator
• Antenna
• Channel
• Receiver (RX)
15. Classification of wireless MAC protocols?
• Contention-based protocols without
reservation/scheduling
• Contention-based protocols
• Contention-based protocols with scheduling mechanisms
• Other protocols (MMAC,MCSMA,PCM,RBAR)
16. What are the benefits of reservation schemes?
• Predictable Access
• Reduced Collisions
• Quality of Service
• Low Latency
• Fairness
• Energy Efficiency
17. Classify the Circuit Switching and Packet Switching.
18. What is the aim of ubiquitous computing?
Is to seamlessly integrate technology into our daily lives, making
it pervasive and invisible
Key Objectives
• Invisibility - Ubiquitous computing aims to make
technology disappear from our conscious
awareness.
• Context Awareness
• User-centric design
• Decentralization
• Physical-Virtual Integration
• Energy Efficiency
•
19. What are the key constraints of mobile computing?
• Limited Battery Life
• Limited Processing Power
• Limited Memory
• Limited Network Bandwidth
• Small Screen Size
• Intermittent Connectivity
• Security and Privacy Concerns
• Variability in Device Capabilities
• Physical Mobility and Environmental Factors
• User Interface Challenges
20. Sumarise the advantages of characteristics of mobile computing devices
• Portability
• Connectivity
• Flexibility
• Convenience
• Efficiency
10.Describe the architecture of Universal Mobile Telecommunication
System (UMTS) and its components
https://www.spiceworks.com/tech/iot/articles/what-is-umts/
11.Explain the working principles of General Packet Radio Service (GPRS)
in mobile networks.
https://www.spiceworks.com/tech/networking/articles/what-is-gprs/
12.Discuss the challenges associated with wireless MAC protocols in
mobile computing
1. **Dynamic Network Topology**: Mobile devices constantly change their
position and connectivity status, making it challenging for MAC protocols to
maintain stable connections.
2. **Limited Bandwidth**: Wireless networks often have limited bandwidth
compared to wired networks, which can lead to congestion and reduced
performance, especially in densely populated areas.
3. **Interference**: Wireless MAC protocols must contend with various
types of interference, such as noise from other devices or electromagnetic
interference, which can degrade signal quality and reliability.
4. **Power Consumption**: Mobile devices typically operate on battery
power, so MAC protocols need to balance the need for efficient
communication with the consumption of energy to prolong battery life.
5. **Handover Management**: When mobile devices move between
different access points or networks, seamless handover is crucial for
maintaining connectivity. However, coordinating handovers efficiently
without causing disruptions is a challenge for MAC protocols.
6. **Security**: Wireless networks are susceptible to various security
threats, including eavesdropping, unauthorized access, and data interception.
MAC protocols need to implement robust security measures to protect
against these threats.
7. **Quality of Service (QoS)**: Ensuring reliable and timely delivery of data
packets is essential for applications like video streaming or real-time
communication. MAC protocols must prioritize traffic and allocate resources
effectively to meet QoS requirements.
8. **Scalability**: As the number of mobile devices and network users
increases, MAC protocols must scale efficiently to accommodate higher traffic
volumes without sacrificing performance or introducing delays.
13.Compare and contrast fixed assignment schemes and random
assignment schemes in MAC protocols.
14.Describe the mobile services provided by GSM in detail
https://www.spiceworks.com/tech/networking/articles/what-is-
gsm/
16. Explain in detail about the GSM architecture
17. Briefly explain about GPRS
18. What are the obstacles in mobile communications
19. Components of a wireless communication system
Sure, here's a simple explanation of the components of a wireless
communication system:
1. **Transmitter**: This is where the message or data originates. It converts
the information into a form suitable for transmission through the airwaves.
Think of it like your phone when you're making a call or sending a text
message.
2. **Receiver**: On the other end of the communication link is the receiver.
It captures the transmitted signal and decodes it back into its original form.
It's like the phone of the person receiving your call or message.
3. **Medium**: In wireless communication, the medium is the air itself.
Unlike wired communication where signals travel through cables, wireless
signals travel through the air, which is why it's often called "radio waves" or
"wireless waves."
4. **Antenna**: Antennas are used to transmit and receive signals. They're
like the ears and mouth of the communication system, capturing signals from
the air and sending them out again.
5. **Modulation/Demodulation**: Before sending the signal, it needs to be
modulated to fit onto the carrier wave. At the receiver's end, demodulation is
performed to extract the original message from the carrier wave. This process
is like encoding and decoding a secret message.
6. **Channel**: The channel is the path through which the signal travels
from the transmitter to the receiver. It can be affected by various factors like
distance, obstacles, and interference from other devices.
7. **Noise**: Noise refers to any unwanted signals or interference that
disrupts the communication process. It could be background static, other
wireless devices, or even physical obstacles like buildings or trees.
8. **Protocols and Standards**: These are rules and guidelines that govern
how communication should happen. They ensure that different devices can
understand each other and communicate effectively. Examples include Wi-Fi,
Bluetooth, and cellular standards like 4G or 5G.
20. Classification of wireless MAC protocols?
Wireless MAC (Media Access Control) protocols can be classified into several
categories based on their underlying principles and mechanisms. Here's a
classification of wireless MAC protocols:
1. **Fixed Assignment Protocols**:
- **Time Division Multiple Access (TDMA)**: Divides the available
transmission time into fixed-length slots, each allocated to a specific device
for data transmission.
- **Frequency Division Multiple Access (FDMA)**: Divides the available
frequency spectrum into non-overlapping frequency bands, with each band
allocated to a different device for communication.
2. **Random Access Protocols**:
- **Carrier Sense Multiple Access (CSMA)**: Devices listen to the channel
before transmitting and wait if they detect other devices transmitting.
Variants include:
- **CSMA/CD (Carrier Sense Multiple Access with Collision Detection)**:
Devices detect collisions and attempt retransmission after a random backoff
period.
- **CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance)**:
Devices use techniques to avoid collisions, such as waiting for a random
period before transmitting.
- **ALOHA Protocols**: Allows devices to transmit data whenever they
have it, without checking the channel. Variants include:
- **Pure ALOHA**: Devices transmit data whenever they want, leading to
collisions that need to be resolved.
- **Slotted ALOHA**: Time is divided into slots, and devices can only
transmit at the beginning of each slot, reducing the probability of collisions.
3. **Scheduled Protocols**:
- **Polling**: A central controller (e.g., access point) polls individual devices
to determine when they have data to transmit, reducing contention and
collisions.
- **Token Passing**: Devices must possess a "token" to transmit data. Only
the device with the token can transmit, ensuring orderly data transmission.
4. **Hybrid Protocols**:
- **Combination of techniques**: Some MAC protocols combine elements
of fixed assignment, random access, and scheduling to optimize performance
in dynamic wireless environments.
21. What are the benefits of reservation schemes
22. Classify the Circuit Switching and Packet Switching?
23. What are the key constraints of mobile computing
24. Sumarise the advantages of characteristics of mobile computing devices
25. Discuss the challenges associated with wireless MAC protocols in mobile
computing
26. Propose innovative solutions to address the identified challenges