FirstRanker's choice
Code: 13A05801
--- Content provided by FirstRanker.com ---
B.Tech IV Year II Semester (R13) Regular & Supplementary Examinations April 2018
MOBILE COMPUTING
(Common to CSE and IT)
Time: 3 hours
Max. Marks: 70
--- Content provided by FirstRanker.com ---
PART - A
(Compulsory Question)
- Answer the following: (10 X 02 = 20 Marks)
- Give an example situation where infrastructure network is preferred to ad hoc network.
- What is the probability that two HIPERLANs will have the same ID?
- Why is power management important for ad hoc wireless networks?
- What are the advantages of reservation-based MAC protocols over contention based MAC protocols?
- Is a table-driven routing protocol suitable for high-mobility environments? Why?
- Find out the probability of a path break for an eight-hop path, given that the probability of a link break is 0.2.
- What are the limitations of the IEEE 802.11 MAC protocol that prevent it from supporting QoS traffic?
- Suggest a few metrics that can be associated with battery-aware routing techniques.
- Distinguish between ad hoc wireless networks and sensor networks.
- List the applications of sensor networks.
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
PART - B
(Answer all five units, 5 X 10 = 50 Marks)
--- Content provided by FirstRanker.com ---
UNIT - I
- Describe how wireless networks can replace wired networks in order to improve the efficiency.
OR
- Explain Bluetooth protocol stack.
UNIT - II
--- Content provided by FirstRanker.com ---
- Identify and elaborate some of the issues in pricing for multi-hop wireless communication.
- Describe a method used in alleviating the hidden terminal and exposed terminal problems at the MAC layer.
UNIT - III
- Describe CGSR protocol in detail.
OR
- Discuss the effects of multiple breaks on a single path at the TCP-F sender.
--- Content provided by FirstRanker.com ---
UNIT - IV
- Explain how a source node determines how many number of tickets (green and yellow tickets) are to be issued for a session in delay constrained TBP protocol.
OR
- Prove that the localized power-efficient routing algorithm is loop-free.
--- Content provided by FirstRanker.com ---
UNIT - V
- How does the hybrid usage of TDMA and FDMA minimize energy consumption? Explain.
OR
- Describe the Sybil attack and the Sinkhole attack on sensor networks.
--- Content provided by FirstRanker.com ---
This download link is referred from the post: JNTU Anantapur B-Tech 4-2 last 10 year question papers 2010 -2020 -All regulation- All branches- 4th Year 2nd Sem
--- Content provided by FirstRanker.com ---