CS MOBILE AND PERVASIVE COMPUTING. YEAR & SEM: IV & VII Jochen Burkhardt, Pervasive Computing: Technology and Architecture of Mobile. Internet Applications .. Write notes on wireless sessions protocol. 4. Discuss about. The fourth Year,seventh semester Anna University notes for Mobile And Pervasive Computing (Subject Code: CS) is made available. CSMOBILE AND PERVASIVE COMPUTING 4) Explain the various applications of mobile computing. . Write notes on wireless sessions protocol. 4.
|Genre:||Health and Food|
|Published (Last):||28 October 2016|
|PDF File Size:||12.46 Mb|
|ePub File Size:||14.44 Mb|
|Price:||Free* [*Free Regsitration Required]|
What are the difference between AODV and the standard distance vector algorithm? What are the tele services of GSM?
Pervasive computing also called as ubiquitous computing is the trend toward embedding micro processors in everyday objects so that they can communicate information. What are the Key characteristics of pervasive computing? What is station and access point? What are the functional groups of MAC management?
A smooth handoff from one cell to the next requires that the mobile unit acquires the new cell before it relinquishes the old. Data rate up to 1Mbps. T-TCP can combine packets for connection establishment and connection release with user data packets.
Write short note on Wireless Datagram Protocol. Give the other terms of pervasive computing.
All inter system handovers are hard handovers. What is Adaptive modulation? Refers to any system in which the data speed or quality differ in one computimg as compared with other direction. Mention the computingg of WLAN? To locate an MS and to address the MS, the following numbers mobi,e needed. How does the registration on layer 3 of a mobile node work? The three algorithms have been specified to provide security services in GSM are.
GPRS provides packet mode transfer for applications. List the three different categories of services of GSM. What are the supplementary services offered by GSM? Three categories of services of GSM are:. State the features of I-TCP. What are the two things DSDV adds to the distance vector algorithm? State the features of M-TCP. For data transfer, the MAC layer offers two service primitives.
SEM 7 NOTES – CSE TUBE
Many string manipulation function are in this library. A client sends requests using MAC broadcasts. There are two basic reasons for handover. State two service primitives offers MAC layer, for data transfer.
How is synchronization carried out in a Pervasive Environment? Registration can be done in two different ways. At least one partner is needed for communication.
What are the problem of proactive routing? Finally, transmit the packet of the remaining node. Mention different types of encapsulation. Main reason is the forward error correction to mitigate transmission errors. No difference between fixed and wireless networks. Where the WiMAX application is useful? What is reverse tunneling? Typical wireless networks, the station has to move from one access point to another to provide uninterrupted service.
What are the two basic classes of handover? Passive Scanning simply means, station listening into the medium to find other networks, i.
A piconet is the type of connection that is formed between two or more Bluetooth-enabled devices, one device takes the role of moile, and all other devices assume a ‘slave’ role for synchronization reasons. What are the two different possibilities for the location of the COA?
This library provides many function for handling URLs with the syntax defined inn fielding. State the security services offered by GSM. Such a huge collection of questions with answers!
Atmospheric attenuation is greater at low elevation angle because the signal traverse the atmosphere com;uting longer distances. Therefore a sequence number is used to filter duplicates. What are the primary goal of IEEE Problems of a file system in mobile environment: What is triangular routing?