Document Details

GratifiedRuthenium

Uploaded by GratifiedRuthenium

2023

Amrita Vishwa Vidyapeetham

Tags

wireless communication mobile communication computer science technology

Full Transcript

## Amrita Vishwa Vidyapeetham ### B.Tech Mid Term Examination - September 2023 #### Seventh Semester #### Computer Science and Engineering #### 19CSE342 Wireless and Mobile Communication #### Mid-Term Examination | Qn No. | Questions | Marks | CO | Blooms Taxonomy level | |---|---|---|---|---| | 1...

## Amrita Vishwa Vidyapeetham ### B.Tech Mid Term Examination - September 2023 #### Seventh Semester #### Computer Science and Engineering #### 19CSE342 Wireless and Mobile Communication #### Mid-Term Examination | Qn No. | Questions | Marks | CO | Blooms Taxonomy level | |---|---|---|---|---| | 1 | Compare key features of 1G and 2G systems. | 5 | CO1 | L2, L5 | | 2 | Elucidate how cellular systems effectively accommodate a larger customer base, given the inherent limitation of available spectrum. | 5 | CO1 | L4 | | 3 | Investigate and list out the ways of how GSM implement its security features. | 5 | CO1 | L2, L5 | | 4 | GSM 2G systems manages data services using GPRS. Which technology replaces this in 3G systems? Distinguish data services in 2G and 3G systems. | 5 | CO1 | L1, L5 | | 5 | Argue for the reason why 4G technology LTE named so? Describe the role of eNB in LTE. | 5 | CO1 | L2, L4 | | 6 | Given that a digital cellular transmission employs the DSSS scheme, and the receiver receives a bit stream 101011010100101011010100. The chipping sequence used in this communication is 101011. Reconstruct the original data sent. | 5 | CO1 | L3 | | 7 | Given that 20 MHz of total spectrum is allocated for a duplex wireless cellular system and each simplex channel has 25 kHz RF bandwidth, solve for the following: a) the number of duplex channels. b) the total number of channels per cell site, if N = 4 cell reuse is used. c) the total number of channels per cell site, if N = 7 cell reuse is used. d) the total number of channels per cell site, if N = 12 cell reuse is used. e) if IMHz of the allocated spectrum is dedicated to control channels, how many people will be able to talk simultaneously in each cell arrangements? | 10 | CO1 | L3 | | 8 | Summarize on the structural makeup of the GSM system, encompassing its components and their interrelationships, with the support of an architectural diagram. | 10 | CO1 | L1, L2, L4, L5 | *** ## Amrita Vishwa Vidyapeetham ### B.Tech Missed Mid-Term Examination - October 2023 #### Seventh Semester #### Computer Science and Engineering #### 19CSE342 Wireless and Mobile Communication #### Missed-Mid-Term Examination | Qn No | Questions | Marks | CO | Blooms Taxonomy level | |---|---|---|---|---| | 1 | Compare key features of 2G and 3G systems. | 5 | CO1 | L2, L5 | | 2 | Elucidate how frequency reuse plays an important role in cellular systems? Give its mathematical formulation. | 5 | CO1 | L4 | | 3 | Investigate and list out the components of a communication system. | 5 | CO1 | L2, L5 | | 4 | Discuss how networking and switching works in GSM systems. | 5 | CO1 | L1, L5 | | 5 | Compare SDMA and FDMA. Explain the functions of following components: a) eNodeB b) MME c) HSS d) PGW e) SGW | 5 | CO1 | L2, L4, L3 | | 7 | Compare FHSS and DSSS with appropriate examples. Explain how it is useful in mobile communication. | 10 | CO1 | L3 | | 8 | Summarize on the structural makeup of 3G mobile communication system, encompassing its components and their interrelationships, with the support of an architectural diagram. | 10 | CO1 | L1, L2, L4, L5 | *** ## Amrita Vishwa Vidyapeetham ### Amrita School of Engineering, Amritapuri ### Department of Computer Science & Engineering ### B-Tech VII Semester ### 19CSE342 WIRELESS AND MOBILE COMMUNICATION ### Mid term Examination August 2022 #### Part A (6x4=24 marks) 1. Define MS, BS and MSC. 2. What you mean by cell splitting? 3. Elaborate the factors influencing small scale fading and large scale fading. 4. If a cellular operator is allocated 12.5 Mhz for each simplex band and if Bt is 12.5 Mhz, Bguard is 10khz and Bc is 30khz. Find the number of channels available in an FDMA system. 5. Write down the significance of propagation model. 6. Draw and explain the MAC frame architecture of IEEE 802.11. List out the advantages of WLAN. #### Part B 7. Explain the different types of diversity technique used in wireless communication system. Why Antenna diversity is known as space diversity? 8. What is frequency reuse concept? Describe the hand-off strategies in wireless communication. 9. How does spread spectrum work in wireless communication? Bandwidth of the spreaded datasignal is 15Mhz and unspreaded signal is 20Mhz. Calculate the process gain. 10. Discuss the connection management followed in Bluetooth technology. Is Bluetooth an IEEE standard like IEEE 802.11 and Ethernet? Justify. 11. Write down the main difference between TDMA, CDMA and FDMA. What are the applications? *** ## Amrita Vishwa Vidyapeetham ### Amrita School of Engineering, Amritapuri ### Department of Computer Science & Engineering ### B-Tech VII Semester ### 19CSE342 WIRELESS AND MOBILE COMMUNICATION ### Missed Mid term Examination September 2022 #### Part A (10X5=50 marks) 1. What do you mean by forward and reverse channel? 2. Define Channel assignment. List out the different types of Channel assignment. 3. Elaborate the factors influencing large scale fading with live examples. 4. How does spread spectrum work in wireless communication? 5. Write down the significance of Diffraction. 6. Draw and explain the architecture of Mobile routing. 7. List down the different diversity technique and how it is used in wireless communication system. 8. Write down the main difference between 2G 3G 4G and their applications too. 9. Explain the advantage of adhoc networks. 10. Can you explain what piconets are in context with Bluetooth technology? *** ## Amrita Vishwa Vidyapeetham ### Amrita School of Engineering, Amritapuri ### BTech (C.S), Third Year, V Semester ### Second Periodical Examination, September 2019 ### 15CSE370-Wireless and Mobile Communication ### maximum: 50 marks #### Duration: 2 Hours #### Section A [15 marks] 1) Compare and contrast the key difference between infrastructure and ad hoc networks. 2) How does a station perform Error Recovery with the DCF in 802.11 network? 3) There is a requirement to setup an outdoor Wi-Fi connection in the lobby during the Vidyut event. Describe briefly, what are the factors you normally consider to create an infrastructure mode? 4) In 802.11 MAC frame, "DS status" consist of two bits "from DS" and "to DS". When you run a wireshark session, you must set these bits to either '1' or 'O'. How will you interpret the following status table? | From DS = 0 | To DS = 0 | To DS = 1 | |---|---|---| | '00' = (a) | '01' = (b) | | '10' = (c) | '11' = (d) | #### Section B [25 Marks] 5) Mr. Ananthu and Mr. Akshay wants to watch a YouTube video through the connected SSID "AMRITA-LAN" through the same channel. Assume Akshay wins to access the medium. Create a frame exchange diagram for how long Akshay can content the medium for watching this video. 6) Briefly describe the hidden terminal problem in wireless media access with diagram. How does RTS/CTS overcome the hidden/exposed terminal problem? 7) Consider the following situations given below, analyse how CSMA/CD and CSMA/CA answers the following questions a) When should the station access the medium? b) What should be done if the medium is busy? c) How does the station determine the success or failure of the transmission? d) What will the station do if there is an access conflict? 8) Explain briefly about the network services involved in IEEE 802.11 WLAN #### Section C [10 Marks] 9) An infrastructure network of your hostel using a 1 Mbps IEEE 802.11 has 3 nodes N1, N2, N3, connected to an access point AP. At time t1= 0, N1 begins the transmission of a data packet to AP. There is no other ongoing transmission. At time 10 µs, N2 has a packet to be sent to AP and at 30 µs, N3 has a packet to be sent to AP. Assume that the random number generator (for backoff) will give the following values for N1: 1, 4, ...; for N2: 2, 5, ...; for N3: 3, 3, .... Assume that we do not use RTS/CTS or fragmentation, and all the data packets have the same length of 120 bytes and the ACK packet has a length of 20 bytes. Furthermore, the channel bit error rate is assumed to be 0, and 802.11 provides the maximum possible throughput when there are no collisions. Show the execution of the DCF mode of IEEE 802.11 for the above transmissions. Assume that SIFS is 10 µs, DIFS 50 µs, and slot time is 20 μs. *** ## Amrita Vishwa Vidyapeetham ### Amrita School of Engineering, Amritapuri ### Department of Computer Science & Engineering ### B-Tech VII Semester ### 19CSE342 WIRELESS AND MOBILE COMMUNICATION ### Mid term Examination September 2022 #### Part A (10X5=50 marks) 1. What do you mean by forward and reserve channel? 2. Define Channel assignment. List out the different types of Channel assignment. 3. Elaborate the factors influencing large scale fading with live examples. 4. How does spread spectrum work in wireless communication? 5. Write down the significance of Diffraction. 6. Draw and explain the architecture of Mobile routing. 7. List down the different diversity technique and how it is used in wireless communication system. 8. Write down the main difference between 2G 3G 4G and their applications too. 9. Explain the advantage of adhoc networks. 10. Can you explain what piconets are in context with Bluetooth technology? *** ## Amrita Vishwa Vidyapeetham ### Amrita School of Engineering, Amritapuri ### BTech (C.S), Third Year, V Semester ### Second Periodical Examination, September 2019 ### 15CSE370-Wireless and Mobile Communication ### maximum: 50 marks #### Duration: 2 Hours #### Section A [15 marks] 1) Compare and contrast the key difference between infrastructure and ad hoc networks. 2) How does a station perform Error Recovery with the DCF in 802.11 network? 3) There is a requirement to setup an outdoor Wi-Fi connection in the lobby during the Vidyut event. Describe briefly, what are the factors you normally consider to create an infrastructure mode? 4) In 802.11 MAC frame, "DS status" consist of two bits "from DS" and "to DS". When you run a wireshark session, you must set these bits to either '1' or 'O'. How will you interpret the following status table? | From DS = 0 | To DS = 0 | To DS = 1 | |---|---|---| | '00' = (a) | '01' = (b) | | '10' = (c) | '11' = (d) | #### Section B [25 Marks] 5) Mr. Ananthu and Mr. Akshay wants to watch a YouTube video through the connected SSID "AMRITA-LAN" through the same channel. Assume Akshay wins to access the medium. Create a frame exchange diagram for how long Akshay can content the medium for watching this video. 6) Briefly describe the hidden terminal problem in wireless media access with diagram. How does RTS/CTS overcome the hidden/exposed terminal problem? 7) Consider the following situations given below, analyse how CSMA/CD and CSMA/CA answers the following questions a) When should the station access the medium? b) What should be done if the medium is busy? c) How does the station determine the success or failure of the transmission? d) What will the station do if there is an access conflict? 8) Explain briefly about the network services involved in IEEE 802.11 WLAN #### Section C [10 Marks] 9) An infrastructure network of your hostel using a 1 Mbps IEEE 802.11 has 3 nodes N1, N2, N3, connected to an access point AP. At time t1= 0, N1 begins the transmission of a data packet to AP. There is no other ongoing transmission. At time 10 µs, N2 has a packet to be sent to AP and at 30 µs, N3 has a packet to be sent to AP. Assume that the random number generator (for backoff) will give the following values for N1: 1, 4, ...; for N2: 2, 5, ...; for N3: 3, 3, .... Assume that we do not use RTS/CTS or fragmentation, and all the data packets have the same length of 120 bytes and the ACK packet has a length of 20 bytes. Furthermore, the channel bit error rate is assumed to be 0, and 802.11 provides the maximum possible throughput when there are no collisions. Show the execution of the DCF mode of IEEE 802.11 for the above transmissions. Assume that SIFS is 10 µs, DIFS 50 µs, and slot time is 20 μs. *** ## Amrita Vishwa Vidyapeetham ### Amrita School of Engineering, Amritapuri ### B.Tech Missed Periodical Examination - October 2019 ### Computer Science and Engineering ### Fifth Semester ### 15CSE370 - Wireless and Mobile Communication ### Maximum: 50 marks #### Duration: 2 Hours #### Section A 1. In a cluster of marine fishing vessels, vessel A sends an alert signal to vessel B. Vessel B must stream a floating wire monopole antenna to get the alert signal. If the alert signal is transmitted at 30 kHz, how far should Vessel B should stream its antenna? (note: Assume a monopole antenna of length of 1/4) 2. Mr. Adarsh and Gokul is doing analysis on propagation effects. The following scenario shows (in Fig 1.) multiple transmission going from a cell tower to mobile phone. Identify which propagation mechanism in happening in each of the four cases [A, B, C, D]. 3. Geetanjali designed a unity gain antenna with a 900 MHz carrier frequency and she applied 50W to that antenna, find the received power in dBm at a free space distance of 100m from the antenna. Assume unity gain for the receiver antenna. 4. A signal with power 3 mW is distorted by noise with power 0.001 mW. Express the signal to noise ratio (SNR) in dB? #### Section B The following questions carry 4 marks each and answer the questions with the necessary steps and units. 5. What is the maximum data rate that can be supported on a 20 MHz noise-less channel, which uses skew-level digital signals? Also, Calculate the maximum achievable data rate over a 20 KHz channel whose signal to noise ratio is 20 dB 6. Explain in detail about Byzantine attack in a network. 7. Consider an indoor Amrita wireless LAN Network with fc = 2400 MHz having cell radius of 110m. Under the free-space path loss model, what transmit power is required at the access point such that all clients within the cell receive a minimum power of 15 µW. suppose the system frequency changed to 2.457 GHz, write your observations with mathematical expressions? [Assume Transmitting Gain and Receiving Gain = 1] 8. Explain the process of error recovery done with help of DCF mode in 802.11 MAC 9. A digital communication system operating at 40 Kbps encodes an 8-bit word signal. Find the minimum required bandwidth of the channel? What signal to noise ratio is required to achieve the desired capacity on the bandwidth that you have computed? 10. Under the free-space path-loss model, find the transmit power required to obtain a received power of 1 dBm for a wireless system with isotropic antennas and a carrier frequency f = 5 GHz, assuming a distance d = 10 m. Repeat for d = 100 m, keeping f = 5 GHz. Repeat for f = 50 GHz, keeping d = 10 m. 11. In CSMA/CA, nodes use a random delay before accessing the medium. Why is this being done? Also, explain the purpose of "exponential backoff". #### Section C 12. Consider the network topology below, where circles indicate the communication and interference range of each node A to F, i.e., each node can hear its immediate neighbors to the left and right. Assume that RTS/CTS is not being used. Answer the following questions. ![Image of network topology](./image_of_network_topology.png) 13. A person is standing 6 km away from the base station with a mobile. The electric field at 1 Km form the transmitter is measured to be 102 V/m. System uses a signal of 1800 MHz as carrier frequency. If the height of the transmitting antenna is 60 m and receiving antenna is 2m above the ground. Compute the received power at the mobile. *** ## Amrita Vishwa Vidyapeetham ### Amrita School of Engineering, Amritapuri ### B.Tech Second Periodical Examination - September 2019 ### Computer Science and Engineering ### Seventh Semester ### 15CSE371 Wireless and Mobile Computing ### Maximum: 50 marks #### Duration: 2 Hours #### Section A 1. Discuss the role of permanent IP address and care of IP address in Mobile IP? 2. What is triangle routing? 3. Based on the mobile IP implementation, how a mobile host detects that it has moved from its home network to a foreign network? 4. Discuss the two types of care of IP addresses and their role in packet routing. 5. What is the role of time-to-leave (TTL) in mobility binding? 6. Why cache is viewed as a part of the memory hierarchy? What is the main problem of cache management system? 7. Assume you are visiting a remote village (where the internet connectivity is poor) for doing a water quality survey in the village? Discuss the role of information caching when you go to such a remote village with poor connectivity? 8. Why mobile ad-hoc routing protocols are not suitable for disruption tolerant network? Give at least two reasons? #### Section B 9. Discuss briefly about publish subscribe mode of data dissemination. Give two example scenarios. 10. How does a mobile node access information from the remote servers such as Web Servers and File servers? Analyze the disadvantages of pull mode data access method and suggest a method to enhance it. 11. Explain in detail how Zone Routing Protocol combines the advantages of Proactive and Reactive routing protocols with the help of a diagram consists of several nodes and the zone radius of each node should be '2'. #### Section C 12. A Home Agent maintains mobility binding for each roaming mobile node. Suppose you are a network engineer and your company has appointed you to analyze the network and set time-to-leave (TTL) for mobility binding of roaming nodes. a) What are the parameters you will consider for setting the TTL? b) How will you set TTL for a mobility binding? c) What will happen if the TTL is too small in mobility binding? 13. Name the three switching methods that are used to connect the multiple communicating devices? How the switching method designed for voice communication is different from the other two? 14. Assume you are a member of the Kerala Disaster Management team Suppose you are assigned to deploy an ad-hoc network to one of the remote villages in Wayanad district that got heavily affected by the recent floods. Your aim is to establish an ad-hoc network and get information about the rescue operations in the village. You are in a team of five members, and you are distributed in five different locations in the village which are 300-400 meters apart. One of you are connected to the internet and that is considered as the destination node in this ad-hoc network setup. If any other node wants to communicate with the destination, then they have to pass the information through the intermediate nodes to the destination node. Suppose the below figure 1 shows your positions in the village. Here node S is connected to the internet and it our destination node in this network. ![Image of nodes connected to each other](./image_of_nodes.png) a) Which category of routing protocol you will choose in this case (proactive or reactive)? Justify your answer. b) If node D wants to send a message to node S, describe the steps involved in routing. What is the process each node has to follow to route a packet from node D to node S? *** ## Amrita Vishwa Vidyapeetham ### B.Tech Missed Periodical Examination - October 2019 ### Computer Science and Engineering ### Seventh Semester ### 15CSE371 Wireless and Mobile Computing ### Maximum: 50 marks #### Duration: 2 Hours #### Section A 1. Explain IP Tunneling. 2. Discuss the limitations of mobile computing. 3. Explain the role of Home Agent (HA) in mobility binding? 4. Suppose a district in Kerala has been hit by severe flooding and the entire communication network was disrupted. During the disaster relief effort, volunteers want to communicate with each other. What kind of network is suitable to connect the volunteers during this disaster relief efforts? Why? 5. Discuss the two cache consistency requirements. 6. Analyze the reliability of Grid Computing and Cloud Computing. 7. How resource handling is done in Cluster Computing, Grid Computing and Cloud Computing? #### Section B 8. Compare Mobile-Controlled handoff and Mobile- Assisted handoff. 9. Discuss one routing protocol for ad-hoc network, which requires each mobile node to maintain a complete list of routes to all its destination nodes. What are the advantages of such a protocol over reactive routing protocol? 10. Mobile clients' weak connectivity in a mobile wireless computing platform creates a new data management challenge. Specify that challenge. How it can be addressed? #### Section C 11. Broadcast scheduling deals with determining how often to publish a certain data item. Similar to memory hierarchy, the broadcast channel itself can be seen as a multiple virtual disk, each spinning at different rate. The most accessed data item is allocated to the fastest sinning disk. Suppose there are 13 data items, with item D1 assigned to disk 1 of the multiple virtual disk. Items D2 through D7 assigned to disk 2 and items D8 to D13 is assigned to disk 3. The items in the disk 1 appear 5 times more frequent than those on disk 3 and the items on disk 2 appear 2 times more frequent than on items on disk 3. Relative frequency of disk 1 is 5, relative frequency of disk 2 is 2 and relative frequency of disk 3 is 1. Schedule this broadcast channel based on AAFZ algorithm. 12. Discuss the difference between the Time Based Location update and Profile based location update. Discuss two scenarios where you think that updating the location based on the profile works better than updating the location based on time. 13. Why Vehicular network is considered as a Delay Tolerant Network? Discuss an algorithm for a DTN scenario in which only few mobile nodes are available with same wireless interface. The frequency of these nodes to meet each other is also very less. Discuss one advantage and disadvantage of our routing protocol considering the low node density and less meeting frequency. 14. There are 5 nodes in a network "S, A, B, C and D". Node A and node B are in the vicinity of node 'S', so node 'S' can be in direct contact with node 'B' and 'A'. Similarly node A is in contact with node 'S' and node 'D'. Node 'D' is in contact with node 'C' and node 'A'. Node 'C' is in contact with node 'B' and node 'D'. Draw the nodes and its links between each other. Suppose node 'S' wants to send data packets to node 'D', apply AODV protocol for routing in this network. Show the routing table construction steps for all the 5 nodes. *** ## Amrita Vishwa Vidyapeetham ### Amrita School of Engineering, Amritapuri ### Department of Computer Science & Engineering ### B-Tech VII Semester ### 19CSE342 WIRELESS AND MOBILE COMMUNICATION ### B Tech Degree Examination October 2022 #### Part A (10X6=60 marks) 1. Examine the features of scattering. Why does it occur? 2. State the various channel assignment strategies with respect to all sites. 3. Multipath components may combine constitutively or destructively at the mobiles and may cause the signals received by the mobile to distort or fade. Tilt out the factors driving for this fading. 4. Consider two different wireless systems, a and b. The system's signal bandwidth is much smaller than the channel's coherence bandwidth. Conversely, b employs a signal bandwidth much larger than the channel's coherence bandwidth. Which system (a or b) best suits frequency diversity techniques? 5. Elucidate the effects of multipath propagation on CDMA. 6. Distinguish between soft and hard hand-off in mobile communication. 7. Elaborate briefly with the aid of a diagram on how a frequency reuse factor of 7 can be used in a cellular system. 8. How do we select techniques to improve coverage and channel capacity in cellular systems? Explain each in detail. 9. Draw and explain the architecture of mobile routing? 10. Summarize the various diversity techniques and their use in wireless communication systems. #### Part B (5X8=40 marks) 11. Write down the main difference between 2G, 3G 4G and their applications. 12. Exemplify the advantage of ad-hoc networks with a suitable example. 13. Can DHCP prevent unauthorized laptops from using a DHCP network for dynamic addressing? Difference between DHCP discover message, offer message, and request message. 14. Disclose the importance of mobile TCP in the mobile transport layer. Define the terms * I TCP * Snooping TCP * Transmission/time-out freezing * Selective retransmission * Transaction oriented TCP 15.Do Bluetooth devices need a line of sight to connect? List the difference between Bluetooth and Wi-Fi IEEE 802.11 in networking. *** ## Amrita Vishwa Vidyapeetham ### B.Tech. Degree Examination - October/November 2023 #### Seventh Semester #### Computer Science and Engineering #### 19CSE342 Wireless and Mobile Communication #### Answer All Questions #### Max. Marks: 100 | Qn No. | Questions | Marks | CO | Blooms Taxonomy level | |---|---|---|---|---| | 1 | Suppose a major sporting event is happening in your city, and there is a surge in mobile data usage. How can 5G network features help manage this increased demand for data without interruptions? | 5 | CO1 | L2, L5 | | 2 | Describe the mathematical relationship between the frequency reuse factor and the capacity of a cellular network. How does altering the frequency reuse factor impact the capacity of the network? | 5 | CO1 | L3, L5 | | 3 | Discuss the value-added services that complement core voice and text communication in GSM. How did these services enhance the user experience? | 5 | CO1 | L2, L5 | | 4 | Why diversity in mobile communication? Discuss any two diversity techniques for efficient communication. | 5 | CO2 | L1, L2 | | 5 | MANETs are a flexible and cost-effective method for establishing communication between interested parties. However, scalability and energy constraints limit their widespread adoption. Elaborate the highlighted issues in detail. | 5 | CO3 | L4 | | 6 | Elucidate how DHCP supports the working of Mobile IP? | 5 | CO4 | L5 | | 7 | Examine the trade-offs between improving capacity and coverage in a mobile network. What strategies can network operators employ to balance these priorities effectively? | 10 | CO1 | L2, L4 | | 8 | Compare the core architectural feature changes when transitioning from 2G to 3G. Additionally, include necessary architectural diagrams. | 10 | CO1 | L4 | | 9 | Consider four stations: STA1, STA2, STA3, and STA4 each with unique codes CI[+1+1+1+1], C2[+1-1+1-1], C3[+1+1-1-1], and C4[+1-1-1+1] respectively. STA1 and STA3 send bit 0, station STA2 sends bit 1, and station STA4 is idle. Illustrate the communication process when STA4 wants to communicate with STAI, assuming CDMA technology is employed. | 10 | CO2 | L3 | | 10 | Analyze different random-access techniques, highlighting the associated issues, and provide an elaboration on how these issues can be effectively addressed. | 10 | CO2 | L4, L5 | | 11 | Discuss the features of traditional TCP and elucidate the limitations when attempting to extend traditional TCP for the mobile environment. | 10 | CO4 | L2, L4 | | 12 | Given that Bluetooth does not adhere to the TCP/IP model, which layer in the Bluetooth protocol stack replaces the MAC layer in the TCP/IP model? Discuss the functions and responsibilities of this layer. | 10 | CO3 | L4 | | 13 | Why is Mobile IP essential in the realm of mobile communication? Discuss the entities and terminologies involved in setting up Mobile IP. | 10 | CO4 | L2, L4 | L₁-Remember, L2-Understand, L3-Apply, L4-Analyze, L5-Evaluate, L6-Create

Use Quizgecko on...
Browser
Browser