12.07.2015 Views

mobile computing 2003.pdf

mobile computing 2003.pdf

mobile computing 2003.pdf

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Total No. of Questions : 12] [Total No. of Pages : 2P1239[3964]-385B.E. (I.T.)MOBILE COMPUTING(2003 Course) (Elective - I) (414445) (Sem. - I)Time : 3 Hours] [Max. Marks :100Instructions to the candidates:1) Answers to the two sections should be written in separate books.2) Neat diagrams must be drawn wherever necessary.3) Assume suitable data, if necessary.SECTION - IQ1) a) Explain the functional differences in various generations of <strong>mobile</strong>networks. [8]b) Explain the significance of Core, Edge and Access Network in <strong>mobile</strong><strong>computing</strong> environment. [8]ORQ2) a) Explain the three tier architecture for <strong>mobile</strong> <strong>computing</strong> environment withthe appropriate diagram. [8]b) How many types of informations a context manager maintains? [8]Q3) Write short notes on: [18]a) GSM architecture.b) GSM security.c) Value added services in SMS.ORQ4) Write short notes on: [18]a) Java card.b) Mobile IP.c) Bluetooth protocol stack.P.T.O.


Q5) a) Write a detail note on WAP. [8]b) Explain all the entities used in GPRS architecture. [8]ORQ6) a) Differentiate CDMA and GSM. [8]b) Explain both the spread spectrum technologies. [8]SECTION - IIQ7) a) What are the advantages and limitations of WLAN? [8]b) Explain the 802.11 architecture. [8]ORQ8) a) Explain SS#7 protocol stack. [8]b) What are the important differences between a desktop computer and aportable handheld device like a PDA? [8]Q9) a) Write a detail note on three prong approach used in Java. [8]b) Describe the Palm OS architecture. [8]ORQ10)a) What is CDC and CDLC in J2ME? [8]b) Explain the functions of various layers in Symbian OS architecture. [8]Q11)Write short notes on: [18]a) Any two real time protocols.b) Windows CE architecture.c) Comparison between SIP and H.323.ORQ12)Write short notes on: [18]a) Various components of Information security.b) Symmetric and asymmetric key cryptography.c) Various attacks on static assets.E E E[3964]-385 2

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!