Sei sulla pagina 1di 4

MRK Institute of Technology MRK Institute of Technology

(Approved by AICTE & Affiliated to Anna University) (Approved by AICTE & Affiliated to Anna University)
Kattumannarkoil – 608301. Kattumannarkoil – 608301.

INTERNAL ASSESSMENT EXAMINATION - I INTERNAL ASSESSMENT EXAMINATION – I


(Subject with code) (Subject with code)
Year : Sem : Year : Sem :
Duration : 3 1/2 Hrs Marks : 100 Duration : 3 1/2 Hrs Marks : 100
Department : Date : Department : Date :
PART - A (20x2 =40)
PART - A (20x2 =40) ANSWER ALL THE QUESTIONS
ANSWER ALL THE QUESTIONS 1. List out the differences between Mobile Computing and Wireless
1. List out the differences between Mobile Computing and Wireless Networking
Networking 2. List some random assignment scheme
2. List some random assignment scheme 3. List the advantages of mobile computing
3. List the advantages of mobile computing 4. Explain hidden and exposed terminal problems in infrastructure
4. Explain hidden and exposed terminal problems in infrastructure less network
less network 5. What is random assignment scheme in the MAC protocol
5. What is random assignment scheme in the MAC protocol 6. List the application of mobile computing
6. List the application of mobile computing 7. What is connection less and connection oriented packet switching
7. What is connection less and connection oriented packet switching techniques
techniques 8. Difference between FDMA and TDMA
8. Difference between FDMA and TDMA 9. Prove that Barker code has good auto correlation
9. Prove that Barker code has good auto correlation 10. Describe about MAC layer in DECT architecture
10. Describe about MAC layer in DECT architecture 11. List the modifications proposed in single hop and multi hop
11. List the modifications proposed in single hop and multi hop wireless networks
wireless networks 12. What is the purpose of DHCP? In what way DHCP can be used
12. What is the purpose of DHCP? In what way DHCP can be used for mobility
for mobility 13. Mention the different entities in a mobile IP
13. Mention the different entities in a mobile IP 14. What led to the development of indirect TCP
14. What led to the development of indirect TCP 15. What is the reaction of standard TPC in case of packet loss
15. What is the reaction of standard TPC in case of packet loss 16. How does a MN identify that it has moved
16. How does a MN identify that it has moved 17. State any four features of IPV618 What led to the development
17. State any four features of IPV618 What led to the development of indirect TCP?
of indirect TCP? 18. List the modifications proposed in single hop and multi hop
18. List the modifications proposed in single hop and multi hop wireless networks
wireless networks 19. Illustrate the use of BOOTP protocol
19. Illustrate the use of BOOTP protocol 20. What is COA? How it is assigned
20. What is COA? How it is assigned
PART - B (5X12 = 60) PART - B (5X12 = 60)

ANSWER ALL THE QUESTIONS ANSWER ALL THE QUESTIONS


21. (a) (i)Explain hidden and exposed terminal problem in infrastructure 21. (a) (i)Explain hidden and exposed terminal problem in infrastructure
less network (6) less network (6)
(ii) Describe architecture of mobile computing (6) (ii) Describe architecture of mobile computing (6)
(Or) (Or)
21. (b) (i) Explain the wireless MAC issues in detail (6) 21. (b) (i) Explain the wireless MAC issues in detail (6)
(ii) Explain fixed assignment scheme with a neat diagram (6) (ii) Explain fixed assignment scheme with a neat diagram (6)

22. (a) (i) Differentiate between FDMA, TDMA and CDMA (6) 22. (a) (i) Differentiate between FDMA, TDMA and CDMA (6)
(ii) Explain the characteristics of mobile computing (6) (ii) Explain the characteristics of mobile computing (6)
(Or) (Or)
22. (b) (i) Write short note on ALOHA. Write a short note on slotted 22. (b) (i) Write short note on ALOHA. Write a short note on slotted
ALOHA scheme (6) ALOHA scheme (6)
(ii) Explain the advantages of CDMA explain the Disadvantages (ii) Explain the advantages of CDMA explain the Disadvantages
of CDMA (6) of CDMA (6)

23. (a) (i) Explain in detail about Multiple Access Collision Avoidance 23. (a) (i) Explain in detail about Multiple Access Collision Avoidance
(MACA) (6) (MACA) (6)
(ii) Briefly explain about code division multiple accesses with (ii) Briefly explain about code division multiple accesses with
neat sketches (6) neat sketches (6)
(Or) (Or)
23.(b) (i) what are th fixed assignment schemes of MAC Protocol? 23.(b) (i) what are th fixed assignment schemes of MAC Protocol?
Explain their mechanism in detail. (6) Explain their mechanism in detail. (6)
(ii) Explain the various taxonomy of Mac protocols in Detail (ii) Explain the various taxonomy of Mac protocols in Detail

24. (a) (i) Explain about the key mechanism in mobile IP (6) 24. (a) (i) Explain about the key mechanism in mobile IP (6)
(ii) With a neat diagram explain how packet delivery to and (ii) With a neat diagram explain how packet delivery to and
from a mobile node is transferred in Mobile IP (6) from a mobile node is transferred in Mobile IP (6)
(Or) (Or)
24. (b) (i) Give the comparison of various TCP advantages and 24. (b) (i) Give the comparison of various TCP advantages and
disadvantages in wireless networking (6) disadvantages in wireless networking (6)
(ii) Explain in detail about virtualization structure (6) (ii) Explain in detail about virtualization structure (6)

25. (a) (i) Discuss the UDP datagram communication (6) 25. (a) (i) Discuss the UDP datagram communication (6)
(ii) What is encapsulation? Explain in detail the various (ii) What is encapsulation? Explain in detail the various
encapsulation techniques in mobile IP (6) encapsulation techniques in mobile IP (6)
(Or) (Or)
25. (b) (i) Explain IP in IP, minimal IP and GRE encapsulation Methods 25. (b) (i) Explain IP in IP, minimal IP and GRE encapsulation Methods
(12) (12)

Potrebbero piacerti anche