Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
B) D-AMPS
C) IS-95
Q2. Discuss about the short history of wireless communication? (Marks 05, CO2)
Q3. What are the possible attacks and protection methods on mobile agents? (Marks
05, CO3)
Destruction of
Denial of service
Harassment
block execution
take up memory
prevention of access to resources/network
Repudiation
Event Model
Clone listener: Listens for cloning events. One can customize this listener to take
specific actions when an aglet is about to be cloned, when the clone is actually
created, and after the cloning has taken place.
Mobility listener: Listens for mobility events. One can use this listener to take action
when an aglet is about to be dispatched to another context, when it is about to be
retracted from a context, and when it actually arrives in a new context.
Persistence listener: Listens for persistence events. It allows the programmer to
take action when an aglet is about to be deactivated and after it has been
activated.
SVKMs NMIMS
Mukesh Patel School of Technology Management & Engineering
Programme : B.Tech (Comps) Year
: 4th
Sem : VIII
Academic Year
: 2014-15
Marks
: 15
Faculty
:
Mudit Kapoor
Date
: 10-Feb-2014
Duration
: 45 mins
Time : 1200 to
1245 hrs
Subject
: Mobile Computing
Code
: BTCO08003
Class
Test 1 Set B
Instructions:
1. Answer three questions.Q1 is compulsory.
2. Each question carries five (5) marks
Q1.
i) In the third generation of cellular phones, ______ uses a combination of WCDMA and TDMA.
A) IMT-DS
B) IMT-MC
C) IMT-TC
D) IMT-SC
Q2.
Explain hidden and exposed terminals? With diagram. (Marks 05, CO2)
Q3.
Write down the steps involve in process migration? (Marks 05, CO3)
1. A migration request is issued to a remote
node.
2. A process is detached from its source node
3. Communication is temporarily redirected
4. The process state is extracted.
5. A destination process instance is created
6. The state is transferred and imported into
a new instance
7. Some means of forwarding references
8. The new instance is resumed
Q4. What are the characteristics of the Mobile agents? (Marks 05, CO3)
Bandwidth conservation
Reduction of latency
Reduction of completion time
Asynchronous (disconnected)
communications
Load balancing
Dynamic deployment