All posts from

Wireless & Mobile Computing B.Tech Question Paper : vardhaman.org

College : Vardhaman College Of Engineering
Degree : B.Tech
Department : Information Technology
Semester : VI
Subject :Wireless & Mobile Computing
Document type : Question Paper
Website : vardhaman.org

Download Previous / Old Question Papers :
May- 2014 :https://www.pdfquestion.in/uploads/vardhaman.org/6399-BT6RMAY14.pdf

Vardhaman  Wireless & Mobile Computing Question Paper

Four Year B. Tech VI Semester Regular Examinations June – 2014
(Regulations: VCE-R11)
(Information Technology)
Date: 8 June, 2014
Time: 3 hours
Max Marks: 75
Answer ONE question from each Unit
All Questions Carry Equal Marks

Related : Vardhaman College Of Engineering VLSI Design B.Tech Question Paper : www.pdfquestion.in/6394.html

All parts of the question must be answered in one place only :

Unit – I

1. a) Discuss the concept of handover in connection with the satellite communication? 8M
b) Satellites may be able to communicate directly with each other via inter-satellite links. Show the way how MUL and GWL play a major role in communication? 7M

2. a) Explain the IEEE 802.11 protocol architecture with a neat diagram? 7M
b) With a neat diagram, explain the format of IEEE 802.11 PHY frame using Direct Sequence Spread Spectrum (DSSS). 8M

Unit – II

3. a) Illustrate the problem of near and far terminals in medium access control? 7M
b) N bits of data are to be transmitted as a packet-switched data. The packets have a maximum of n bits each. The data transmission rate is n/T and the data to be transmittedis formatted into four packets A, B, C & D. If three different route are available for transmission. Calculate the time taken to complete the synchronous packet transmission. What is the time taken if N=4n? How much time will it take to transmit the same data through one single path? 8M

4. a) With the help of a diagram, explain system architecture of GSM? Also show the interfacing between different subsystems along with components of each subsystem? 8M
b) Describe the process of call handover when a mobile station moves? 7M

Unit – III

5. a) Explain the process of encapsulation by additional IP header of an IP packet? 7M
b) Illustrate the TCP connection timeout freezing of transmission protocol? 8M

6. a) How does dynamic source routing handle routing? What is the motivation behind dynamic source routing compared to other routing algorithms from fixed networks? 8M
b) Illustrate how mobile IP employees route optimization after mobility binding between COAj and CNk? 7M

Unit – IV

7. a) Explain Query-processing architecture for processing a query using distributed data bases? 7M
b) Describe context aware computing. What are different context-types used in contextaware computing? 8M
8. a) Explain ACID transaction rules that should be maintained by database transactional models to achieve data integrity? 8M
b) Why does a mobile device take quality of service issues into account while computing?
List the objects which specify and model the QoS? 7M

Unit – V

9. a) Explain the following with a neat diagram:
i. The WAP 2.0 client
ii. Gateway
iii. Web HTTP server architecture 7M

b) Explain the following protocols of WAP 1.1:
i. Wireless Transaction Protocol (WTP)
ii. Wireless Transport Layer Security (WTLS) 8M

10. a) Explain the source profiles, packages for the configurations of CLDC and CDC and the required virtual machine in J2ME? 7M
b) What is profile? How is MIDP defined from J2ME? Describe features of MIDP 3.0? 8M

Network Security & Cryptography

(Computer Science and Engineering)
Date: 8 June, 2014
Time: 3 hours Max Marks: 75
Answer ONE question from each Unit
All Questions Carry Equal Marks

All parts of the question must be answered in one place only
Unit – I :
1. a) With a neat diagram explain a model for Network security. 7M
b) Differentiate between Transposition Cipher and Substitution Cipher. Apply two stage transposition cipher on the text “treat diagrams as single units” using the keyword “sequence”. 8M
2. a) What is Steganography? Briefly explain any three techniques used. 7M
b) Encrypt the word “Semester Result” with the keyword “Examination” using Playfair Cipher. List the rules used. 8M

Unit – II :
3. a) With a neat diagram, describe Classical Feistel Cipher structure. 7M
b) Explain the different Cipher block modes of operation. 8M
4. a) Explain the following:
i. Differential Cryptanalysis
ii. Linear Cryptanalysis 7M
b) Explain the RC4 algorithm. 8M

Unit – III :
5. a) Discuss the Diffie-Hellman Key Exchange mechanism. 7M
b) With a neat diagram discuss the ingredients of a Public Key Cryptosystem. 8M
6. a) With a neat diagram discuss the essential elements of a Digital Signature Process 7M
b) Write the RSA algorithm for Encryption and Decryption. Given p=3, q=11, e=7 & m=5, perform RSA encryption and decryption. 8M

Unit – IV :
7. a) Describe the structure of Private and Public key rings used in PGP. 7M
b) Discuss Transport mode and Tunnel modes of using IPSec Encapsulating security payload. services. 8M

8. a) Describe the following with respect to Kerberos Version. 4:
i. Authentication Server
ii. Ticket Granting Server 8M
b) Briefly discuss the benefits of IPSec. Also list ant four IPSec services. 7M

Unit – V :
9. a) What are the components of a Virus? Discuss the four phases in the life time of a virus? 7M
b) What is a Firewall? Discuss any three types of Firewall? 8M
10. a) What are the objectives of SET? What do you understand by a dual signature that is used in SET? 7M
b) Discuss the following with respect to SSL Architecture:
i. SSL session
ii. SSL Connection 8M

Leave a Reply

How to add comment : 1) Type your comment below. 2) Type your name. 3) Post comment.

www.pdfquestion.in © 2021

Contact Us   Privacy Policy   SiteMap