About Me

Mobile And Pervasive Computing 7th ND11 CS2402

Sponsored Ads:

Quick Links
University Papers University Syllabus Entrance Exam
PSU Papers Bank Papers Placement Papers
VTU Anna Univerity Syllabus Anna Univerity Papers
Anna University
B.E./B.Tech. DEGREE EXAMINATION, NOVEMBER/DECEMBER 2011.
Seventh Semester
Computer Science and Engineering
CS 2402 MOBILE AND PERVASIVE COMPUTING
(Regulation 2008)

University Papers | Syllabus | Entrance Exam | Govt & PSU Papers | Bank Papers

Programming Questions  |  Travel Tips | Mobile Review | Placement Papers

ANNA UNIVERSITY SYLLABUS: CLICK HERE

ANNA UNIVERSITY PAPERS: CLICK HERE

Download PDF File - Click Here
For More Question paper of CSECLICK HERE

For more question paper of IT - CLICK HERE

PART A (10 × 2 = 20 marks)

1. What are the four types of handover available in GSM?
2. Distinguish between mobile terminated call and mobile originated call.
3. Mention the advantages of WLAN?
4. What are the three Low Power States provided by Bluetooth?
5. What are the requirements of mobile IP standard?
6. Differentiate wired networks routing from ad-hoc wireless networks routing.
7. List the advantages and disadvantages of mobile TCP?
8. Define WAE.
9. What is Pervasive Computing?
10. What are the various issues related to device management in pervasive computing?

PART B (5 × 16 = 80 marks)

11. (a) (i) Explain the GSM system architecture with a neat diagram. (8)
(ii) Describe the security services provided by GSM. (8)
Or
(b) (i) Explain the protocol architecture of GSM for signaling. (8)
(ii) Explain the architecture of GPRS with a neat diagram. (8)

12. (a) (i) Describe HiperLAN architectural components and their interactions. (8)
(ii) Explain the architecture of WiFi in detail. (8)
Or
(b) (i) Explain the system architecture of IEEE 802. (8)
(ii) Describe the architecture of WiMAX in detail. (8)

13. (a) (i) List the entities involved in mobile IP and describe the process of data transfer from a mobile node to a fixed node and vice versa. (8)
(ii) Why is conventional routing in wired networks not suitable for wireless networks? Substantiate your answers with suitable examples. (8)
Or
(b) (i) Explain in detail Dynamic Host Configuration Protocol. (8)
(ii) Describe how the multicast routing is done in ad-hoc networks. (8)

14. (a) (i) State the requirements of WAP. Explain its architectural components. (8)
(ii) Explain WML and WML scripts with an example. (8)
Or
(b) (i) What is WTP? Discuss about its classes. (8)
(ii) Explain the architecture of WTA. (8)

15. (a) (i) Describe the various hardware components involved in pervasive computing devices. (8)
(ii) Explain how a pervasive web application can be secured using an ‘Authentication Proxy’. (8)
Or
(b) (i) What are the applications of pervasive computing? Discuss any two of them.
(8)
(ii) Explain how pervasive web applications can be accessed via WAP. (8)

Post a Comment

0 Comments