FirstRanker Logo

FirstRanker.com - FirstRanker's Choice is a hub of Question Papers & Study Materials for B-Tech, B.E, M-Tech, MCA, M.Sc, MBBS, BDS, MBA, B.Sc, Degree, B.Sc Nursing, B-Pharmacy, D-Pharmacy, MD, Medical, Dental, Engineering students. All services of FirstRanker.com are FREE

📱

Get the MBBS Question Bank Android App

Access previous years' papers, solved question papers, notes, and more on the go!

Install From Play Store

Download AKTU B-Tech 8th Sem 2014-15 ECS 087 Mobile Computing Question Paper

Download AKTU (Dr. A.P.J. Abdul Kalam Technical University (AKTU), formerly Uttar Pradesh Technical University (UPTU) B-Tech 8th Semester (Eight Semester) 2014-15 ECS 087 Mobile Computing Question Paper

This post was last modified on 29 January 2020

AKTU B-Tech Last 10 Years 2010-2020 Previous Question Papers || Dr. A.P.J. Abdul Kalam Technical University


Printed Pages: 4

ECS-087

(Following Paper ID and Roll No. to be filled in your Answer Book)

--- Content provided by‍ FirstRanker.com ---

PAPER ID: 110857

Roll No.

B. Tech.

(SEM. VIII) THEORY EXAMINATION, 2014-15

MOBILE COMPUTING

--- Content provided by FirstRanker.com ---

Time: 3 Hours]

[Total Marks: 100

Note: Attempt all questions, each question carries equal marks

  1. Attempt any Four parts of the following: (4×5=20)

    1. Explain the word "Mobile Computing" and also give any suitable live example with merit of mobile computing.
    2. --- Content provided by FirstRanker.com ---

    3. Draw a diagram showing the positioning of wireless networks via wired networks. Why is a wired network usually part of the wireless infrastructure?
    4. What is General packet Radio service (GPRS)? Describe its architecture.
    5. Describe the following multiple access protocol
      1. TDMA
      2. FDMA
    6. --- Content provided by⁠ FirstRanker.com ---

    7. Discuss the concept of index Replication. What purpose it serves in mobile computing environment?
    8. Explain The GSM location updating signalling sequence with suitable diagram.
  2. Attempt any four parts of the following (4×5=20)

    1. Draw and define 802.11 protocol Stack regarding the following points
      1. Physical layer
      2. --- Content provided by⁠ FirstRanker.com ---

      3. MAC layer protocol
      4. Frame structure
    2. What is Bluetooth? What are the functions of different layers of Bluetooth protocol stack? Also discuss the concept of Bluetooth architecture.
    3. Explain the architecture and protocol stack of wireless Application protocol (WAP).
    4. --- Content provided by​ FirstRanker.com ---

    5. Suppose that A,B, & C are simultaneously transmitting 0, 1 bits using CDMA system with following sequence
      A=(-1,-1,-1,+1,+1,-1,+1,+1),
      B=(-1,-1,+1,-1,+1,+1,+1,-1)
      C=(-1,+1,-1,+1,+1,-1,-1,-1),
      What is the resulting chip sequence?
    6. --- Content provided by FirstRanker.com ---

    7. Why does traditional TCP not perform well in wireless networks? Discuss different approaches for TCP improvement.
    8. In Context to cellular network, discuss the following:
      1. Cell splitting
      2. Near & Far problem
      3. Hidden terminal problem
    9. --- Content provided by‌ FirstRanker.com ---

  3. Attempt any Two parts of the following. (2×10=20)

    1. Design the CODA file system and explain the different states. Draw the state Transition diagram and disconnected operation in CODA file system.
    2. Explain Adaptive clustering for Mobile Wireless networks
    3. Discuss the impact of mobile computing on following aspects of data management.
      1. Data dissemination
      2. --- Content provided by FirstRanker.com ---

      3. Query processing
      4. Caching
      5. Database overflow
  4. --- Content provided by‍ FirstRanker.com ---

  5. Attempt any Two parts of the following. (2×10=20)

    1. What is mobile agent? Describe the server architecture with the help of diagram. Also list the security threats to a mobile agent system.
    2. Describe fault tolerance issues involve in mobile computing? What are the monitoring processes?
    3. Discuss the challenges in transaction processing. What are the counter measures to security threat in computing environment
  6. --- Content provided by‌ FirstRanker.com ---

  7. Attempt any two parts of the following (2×10=20)

    1. Explain the following terms
      1. Global State Routing (GSR)
      2. Dynamic Source Routing(DSR)
      3. Destination Sequence Distance Vector routing (DSDV)
    2. --- Content provided by FirstRanker.com ---

    3. What do you understand by Mobile Ad-hoc Networks (MANET)? Describe some real life scenarios where it can be used.
    4. Describe route discover and route maintenance mechanism of AODV and TORA.

Get More previous year questions @ FirstRanker.com


--- Content provided by⁠ FirstRanker.com ---


This download link is referred from the post: AKTU B-Tech Last 10 Years 2010-2020 Previous Question Papers || Dr. A.P.J. Abdul Kalam Technical University