FirstRanker Logo

FirstRanker.com - FirstRanker's Choice is a hub of Question Papers & Study Materials for B-Tech, B.E, M-Tech, MCA, M.Sc, MBBS, BDS, MBA, B.Sc, Degree, B.Sc Nursing, B-Pharmacy, D-Pharmacy, MD, Medical, Dental, Engineering students. All services of FirstRanker.com are FREE

📱

Get the MBBS Question Bank Android App

Access previous years' papers, solved question papers, notes, and more on the go!

Install From Play Store

Download AKTU B-Tech 8th Sem 2017-18 NIT 801 Mobile Computing Question Paper

Download AKTU (Dr. A.P.J. Abdul Kalam Technical University (AKTU), formerly Uttar Pradesh Technical University (UPTU) B-Tech 8th Semester (Eight Semester) 2017-18 NIT 801 Mobile Computing Question Paper

This post was last modified on 30 January 2020

AKTU B-Tech Last 10 Years 2010-2020 Previous Question Papers || Dr. A.P.J. Abdul Kalam Technical University


Firstranker's choice

Printed Pages: 02

Paper Id: 13801

--- Content provided by⁠ FirstRanker.com ---

FirstRanker.com

Sub Code: NIT-801

Roll No.

B TECH

(SEM-VIII) EVEN SEMESTER THEORY EXAMINATION 2017-18

--- Content provided by FirstRanker.com ---

MOBILE COMPUTING

Time: 3 Hours

Total Marks: 100

Attempt all Sections. If require any missing data; then choose suitably.

SECTION A

--- Content provided by​ FirstRanker.com ---

1. Attempt all questions in brief. 2 x 10 = 20

  1. What is Roaming?
  2. Distinguish between collisions on PHY and MAC layer.
  3. Is a directional antenna useful for mobile phones? Why?
  4. What advantages does the use of IPv6 offer for mobility?
  5. --- Content provided by⁠ FirstRanker.com ---

  6. What is the relation between GSM and GPRS?
  7. What is Mobile IP?
  8. List down the disadvantages of M-TCP.
  9. Define Fisheye State Routing.
  10. What are hidden node and exposed node problems in wireless LAN?
  11. --- Content provided by FirstRanker.com ---

  12. Explain HLR and VLR in GSM architecture.

SECTION B

2. Attempt any three of the following: 10 x 3 = 30

  1. Compare the three generations of wireless telephone systems on the basis of features, technology used and applications.
  2. How does mobility affect data replication on mobile platform? Explain.
  3. --- Content provided by‍ FirstRanker.com ---

  4. “CSMA/CD is not a suitable protocol for wireless LAN”. Give reasons in favors of or against the statement.
  5. Explain the various security threats during data transfer in mobile communication and give suitable example of authentication and privacy preceding for mobile computing.
  6. Discuss the DSDV with example and differentiate it from AODV. Explain pro-active, reactive routing protocol.

SECTION C

3. Attempt any one part of the following: 10 x 1 = 10

--- Content provided by FirstRanker.com ---

  1. Where and when can collisions occur while accessing the GSM system? Compare possible collisions caused by data transmission in standard GSM, HSCSD and GPRS.
  2. Compare SDMA, TDMA, FDMA and CDMA in terms of transmission techniques, signal separation, advantages, disadvantages and applications?

4. Attempt any one part of the following: 10 x 1 = 10

  1. What are the characteristics of MANET? Explain the process of Path Discovery and Path Maintenance in DSR Routing Protocols.
  2. Explain the concept of "Frequency Reuse" as applied to cellular communications. What are the advantages of this approach? How does it increase the capacity of the system?
  3. --- Content provided by⁠ FirstRanker.com ---

5. Attempt any one part of the following: 10 x 1 = 10

  1. What is the basic purpose of agent advertisement in packet forwarding? Explain the message format of agent advertisement.
  2. Explain registration and location updation of wireless mobile terminal in a foreign network.

6. Attempt any one part of the following: 10 x 1 = 10

  1. Explain the different fundamental differences between ad hoc network and other networks. What advantages do ad hoc networks offer?
  2. --- Content provided by FirstRanker.com ---

  3. List and define the entities of mobile IP and describe data transfer from a mobile node to a fixed node and vice-versa.

7. Attempt any one part of the following: 10 x 1 = 10

  1. Why does WAP define its own security layer and does not rely on the security provided by the mobile phone network? What problems does the WAP security layer cause? Think of end-to-end security.
  2. Discuss fast-retransmit and fast-recovery mechanisms of mobile TCP in detail.

FirstRanker.com

--- Content provided by‍ FirstRanker.com ---



This download link is referred from the post: AKTU B-Tech Last 10 Years 2010-2020 Previous Question Papers || Dr. A.P.J. Abdul Kalam Technical University

--- Content provided by‌ FirstRanker.com ---