Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
(Approved by AICTE & Affiliated to Anna University) (Approved by AICTE & Affiliated to Anna University)
Kattumannarkoil – 608301. Kattumannarkoil – 608301.
22. (a) (i) Differentiate between FDMA, TDMA and CDMA (6) 22. (a) (i) Differentiate between FDMA, TDMA and CDMA (6)
(ii) Explain the characteristics of mobile computing (6) (ii) Explain the characteristics of mobile computing (6)
(Or) (Or)
22. (b) (i) Write short note on ALOHA. Write a short note on slotted 22. (b) (i) Write short note on ALOHA. Write a short note on slotted
ALOHA scheme (6) ALOHA scheme (6)
(ii) Explain the advantages of CDMA explain the Disadvantages (ii) Explain the advantages of CDMA explain the Disadvantages
of CDMA (6) of CDMA (6)
23. (a) (i) Explain in detail about Multiple Access Collision Avoidance 23. (a) (i) Explain in detail about Multiple Access Collision Avoidance
(MACA) (6) (MACA) (6)
(ii) Briefly explain about code division multiple accesses with (ii) Briefly explain about code division multiple accesses with
neat sketches (6) neat sketches (6)
(Or) (Or)
23.(b) (i) what are th fixed assignment schemes of MAC Protocol? 23.(b) (i) what are th fixed assignment schemes of MAC Protocol?
Explain their mechanism in detail. (6) Explain their mechanism in detail. (6)
(ii) Explain the various taxonomy of Mac protocols in Detail (ii) Explain the various taxonomy of Mac protocols in Detail
24. (a) (i) Explain about the key mechanism in mobile IP (6) 24. (a) (i) Explain about the key mechanism in mobile IP (6)
(ii) With a neat diagram explain how packet delivery to and (ii) With a neat diagram explain how packet delivery to and
from a mobile node is transferred in Mobile IP (6) from a mobile node is transferred in Mobile IP (6)
(Or) (Or)
24. (b) (i) Give the comparison of various TCP advantages and 24. (b) (i) Give the comparison of various TCP advantages and
disadvantages in wireless networking (6) disadvantages in wireless networking (6)
(ii) Explain in detail about virtualization structure (6) (ii) Explain in detail about virtualization structure (6)
25. (a) (i) Discuss the UDP datagram communication (6) 25. (a) (i) Discuss the UDP datagram communication (6)
(ii) What is encapsulation? Explain in detail the various (ii) What is encapsulation? Explain in detail the various
encapsulation techniques in mobile IP (6) encapsulation techniques in mobile IP (6)
(Or) (Or)
25. (b) (i) Explain IP in IP, minimal IP and GRE encapsulation Methods 25. (b) (i) Explain IP in IP, minimal IP and GRE encapsulation Methods
(12) (12)