1. Differentiate between wireless communication and mobile communication?
2. With explanations, mind-map the architecture diagram for the following WLAN standards:
a. IEEE 802.11
b. HYPER LAN
c. MANET
3. Define mobility in the context of mobile computing?
4. What are the major types of mobile devices used in mobile computing?
5. Explain the role of mobile operating systems (e.g., Android, iOS) in mobile computing?
6. What is cloud computing, and how does it integrate with mobile computing?
7. How does wireless communication contribute to mobile computing?
8. What is mobile ad-hoc networking (MANET), and what are its applications?
9. What is the significance of Wi-Fi and Bluetooth in mobile computing?
10. What are mobile applications (apps), and how do they function on mobile devices?
11. Explain the concept of mobile data synchronization and its importance.
12. What is location-based service (LBS), and how is it used in mobile computing?
13. Explain the concept of cellular networks in mobile computing?
14. Explain the Bluetooth WLAN standard, and how it is used in mobile devices?
15. Describe the differences between Wi-Fi, LTE, and 5G for mobile data transmission?
16. What factors would you consider when selecting a mobile network for a rural area with
17. How does mobile security differ from traditional desktop security?
18. What are the key security threats in mobile computing?
19. Define mobile computing protocols and explain their importance in data transmission.
20. How does mobile device management (MDM) benefit businesses in mobile computing?
21. What are 4G and 5G technologies, and how do they affect mobile computing?
22. What is the role of Internet of Things (IoT) in mobile computing?
23. A VPN is a private data network that makes use of the public telecommunication infrastructure,
maintaining privacy through the use of a tunneling protocol and security procedures. Elucidate
four reasons why today’s Companies are looking at using a private virtual network (VPN) for both
extranets and wide-area intranets?
24. How does battery life impact mobile computing, and what technologies help improve it?
25. What are the challenges and limitations faced in mobile computing (e.g., network coverage,
device limitations)?
26.
27. Describe the components of Satellite Communication System?
28. Evaluate the roles of GPRS in today’s mobile technology and propose the upgrade strategy for
the next generations?
29. Discuss the role of 4G and 5G networks in enhancing mobile computing experiences?
30. Demonstrate the structure of the communication network architecture and describe its
components?
31. Wireless LANs are generally categorized according to the transmission technique that is used.
With examples, explain the following WLAN techniques: Infrared (IR) LANs, Spread Spectrum
LANs and Narrowband microwave?
32. With explanations, mind-map the architecture diagram for the following WLAN standards:
a. IEEE 802.11
b. HYPER LAN
c. MANET
33. Compare and contrast the SMS principle and MMS principle within the mobile applications
34. Expose your expected advancements of the mobile computing over the next 10 years?
35. The Link Manager protocol is used for managing the security, link set-up and control.
36. Explain seven functionalities within the Bluetooth peer to peer messaging?
37. Illustrate the network architecture of the GLOBAL STAR and explain its role in the mobile
network systems?
1. Difference between Wireless Communication and Mobile Communication
Aspect Wireless Communication Mobile Communication
Definition Transmission of data without Communication while being on the move
wires or cables using wireless tech
Mobility May or may not support user Always supports user mobility
Support mobility
Example Wi-Fi, Satellite Communication Cellular networks (GSM, 4G), mobile
devices
Usage Home, office networks, IoT Smartphones, tablets, mobile computing
Context systems
2. WLAN Architecture Mind-Map (IEEE 802.11, HYPER LAN, MANET)
a. IEEE 802.11 Architecture:
Components:
o STA (Station)
o AP (Access Point)
o BSS (Basic Service Set)
o ESS (Extended Service Set)
o DS (Distribution System)
Modes:
o Infrastructure Mode
o Ad-Hoc Mode
b. HYPER LAN Architecture:
Developed by: ETSI (European Telecommunications Standards Institute)
Types:
o HiperLAN/1 (20 Mbps, ATM-based)
o HiperLAN/2 (Up to 54 Mbps, IP support)
Components:
o Access Points
o Mobile Terminals
o Control Channel
Features: QoS support, high security
c. MANET (Mobile Ad-hoc Network):
Characteristics:
o No fixed infrastructure
o Nodes act as routers and hosts
o Dynamic topology
Architecture:
o Mobile Nodes
o Routing Protocols (AODV, DSR)
o Peer-to-peer communication
3. Define Mobility in Mobile Computing
Mobility refers to the ability of a user or device to move freely and maintain continuous network
connectivity and computing capability while moving. It enables real-time access to data and
services across different geographical locations.
4. Major Types of Mobile Devices in Mobile Computing
Smartphones
Tablets
Laptops/Ultrabooks
Wearables (e.g., smartwatches)
e-Readers
Embedded Mobile Devices (e.g., in vehicles or smart appliances)
5. Role of Mobile Operating Systems (e.g., Android, iOS)
Device Management: Manages hardware and resources.
App Platform: Supports application installation and execution.
User Interface: Provides GUI for user interaction.
Security: Enforces security policies and app sandboxing.
Communication Services: Manages wireless communication protocols (Wi-Fi,
Bluetooth, etc.)
6. What is Cloud Computing, and How Does It Integrate with Mobile
Computing?
Cloud Computing is the delivery of computing services (e.g., storage, processing, databases,
software) over the internet ("the cloud").
Integration with Mobile Computing:
Remote Access: Mobile devices can access data/applications stored in the cloud.
Data Backup & Sync: Automatic synchronization and backup of mobile data.
Scalability: Users can use powerful cloud resources regardless of mobile device
capacity.
Examples: Google Drive, iCloud, Microsoft OneDrive
7. How Does Wireless Communication Contribute to Mobile Computing?
Wireless communication enables mobile computing by:
Providing Connectivity: Allows mobile devices to access networks (Wi-Fi, cellular,
Bluetooth).
Supporting Mobility: Users can work from anywhere without wired connections.
Enabling Real-time Communication: Instant messaging, video calls, and online access.
Examples: Wi-Fi for internet access, 4G/5G for cellular data, Bluetooth for short-range
sharing.
8. What is Mobile Ad-Hoc Networking (MANET), and What Are Its
Applications?
MANET (Mobile Ad-hoc Network):
A self-configuring, infrastructure-less network of mobile devices connected wirelessly.
Devices act as both hosts and routers.
Applications:
Military communication in battlefields
Disaster recovery scenarios (e.g., earthquakes)
Vehicular ad-hoc networks (VANETs)
Temporary networks in conferences or festivals
9. What Is the Significance of Wi-Fi and Bluetooth in Mobile Computing?
Wi-Fi:
Enables high-speed internet access wirelessly.
Used for browsing, streaming, file downloads/uploads.
Bluetooth:
Facilitates short-range communication.
Used for file sharing, wireless headsets, IoT device connectivity.
Significance:
Both support wireless and mobile communication.
Enhance user experience by enabling untethered interaction and seamless data transfer.
10. What Are Mobile Applications (Apps), and How Do They Function on
Mobile Devices?
Mobile Applications (Apps):
Software programs designed to run on mobile devices like smartphones or tablets.
Functionality:
Provide services such as social media, games, productivity tools, banking, etc.
Installed via app stores (e.g., Google Play, Apple App Store).
Interact with device hardware (GPS, camera, sensors) and often access cloud-based
services.
11. Explain the Concept of Mobile Data Synchronization and Its Importance
Mobile Data Synchronization is the process of keeping data consistent across multiple devices
(e.g., smartphones, tablets, cloud).
Importance:
Ensures that changes on one device reflect on others (e.g., email, calendar).
Enhances productivity and continuity.
Prevents data loss with backup synchronization (e.g., Google Sync, iCloud).
Allows offline work and updates once reconnected.
12. What Is Location-Based Service (LBS), and How Is It Used in Mobile
Computing?
LBS (Location-Based Services):
Services that provide information or functionality based on a user's geographic location
using GPS, Wi-Fi, or cell tower data.
Uses in Mobile Computing:
Navigation (Google Maps)
Ride-hailing apps (Uber, Bolt)
Geo-tagging photos
Emergency services (SOS location tracking)
Targeted advertising based on location
13. Explain the Concept of Cellular Networks in Mobile Computing
Cellular Networks are wireless networks divided into small geographic areas called cells, each
served by a base station.
In Mobile Computing:
Allow users to make calls, send SMS, and use mobile data while moving.
Support standards like 2G, 3G, 4G (LTE), and 5G.
Enable seamless connectivity through handovers between cells.
14. Explain the Bluetooth WLAN Standard and How It Is Used in Mobile
Devices
Bluetooth WLAN Standard:
A short-range wireless communication standard (IEEE 802.15.1).
Operates in the 2.4 GHz frequency band.
Usage in Mobile Devices:
Wireless file sharing
Connecting accessories (headphones, smartwatches, keyboards)
IoT connectivity
Low power consumption ideal for battery-powered devices
15. Differences Between Wi-Fi, LTE, and 5G for Mobile Data Transmission
Feature Wi-Fi LTE (4G) 5G
Access Local (routers/APs) Cellular (broad coverage) Cellular (very high speed)
Speed High (up to 1 Gbps) Moderate (up to 100 Very High (1–10 Gbps)
Mbps)
Latency Low Moderate Ultra-low (1 ms)
Range Limited (within a Wide area Wide area with dense
building) nodes
Use Homes, offices Mobile internet IoT, smart cities,
Case streaming
16. Factors to Consider When Selecting a Mobile Network for a Rural Area
Network Coverage – Strong signal availability in remote locations.
Cost & Affordability – Budget-friendly plans for the population.
Data Speed – Sufficient for basic browsing and communication.
Infrastructure – Availability of towers and backhaul.
Reliability – Consistent uptime and support.
Technology Support – Compatibility with 3G/4G, potential upgrade to 5G.
17. How Does Mobile Security Differ from Traditional Desktop Security?
Aspect Mobile Security Desktop Security
Mobility Devices are often on the move Usually stationary
Network Usage Frequent use of public Wi-Fi Typically uses secured networks
OS & Updates Fragmented updates across devices Centralized control and updates
Authentication Biometrics (face, fingerprint) Passwords or tokens
App Control App store-based app distribution Software from various sources
18. Key Security Threats in Mobile Computing
Malware & Spyware
Phishing attacks
Unsecured Wi-Fi access
Data leakage through apps
Lost or stolen devices
Man-in-the-middle (MITM) attacks
Unauthorized access due to weak passwords
19. Define Mobile Computing Protocols and Explain Their Importance in Data
Transmission
Mobile Computing Protocols are standardized rules that govern data communication in mobile
environments.
Examples:
TCP/IP: For internet communication
HTTP/HTTPS: For secure web services
WAP: Wireless Application Protocol for mobile web
Bluetooth & NFC protocols: For device-to-device communication
Importance:
Enable consistent and secure data transfer.
Manage session control, routing, and error detection.
Support real-time mobile communication and application access.
20. How Does Mobile Device Management (MDM) Benefit Businesses in Mobile
Computing?
MDM (Mobile Device Management) is a system for monitoring, managing, and securing
employees' mobile devices.
Benefits:
Security Enforcement: Controls over app usage and device encryption.
Remote Management: Lock/wipe data from lost devices.
Policy Compliance: Ensures usage aligns with company policies.
Productivity: Enables safe use of business apps and data on the go.
App Distribution: Easily push updates and apps to devices.
21. What Are 4G and 5G Technologies, and How Do They Affect Mobile
Computing?
4G (Fourth Generation):
Speed: ~100 Mbps (mobile), up to 1 Gbps (stationary)
Based on LTE technology
Supports HD video, VoIP, online gaming
5G (Fifth Generation):
Speed: Up to 10 Gbps
Ultra-low latency (~1 ms)
Supports massive IoT, AR/VR, real-time applications
Impact on Mobile Computing:
Faster data transmission and real-time communication
Supports smart cities, connected devices, and immersive experiences
Enhances cloud integration and remote work
22. Role of Internet of Things (IoT) in Mobile Computing
IoT refers to the interconnection of physical devices via the internet.
In Mobile Computing:
Mobile devices act as controllers and data monitors (e.g., controlling smart home
gadgets)
Enables real-time data access and processing from sensors
Supports automation and smart environments (health, agriculture, industry)
Examples: Smartwatches, fitness trackers, connected cars
23. Four Reasons Why Companies Use VPNs for Extranets and WANs
1. Data Security: Encrypts data to prevent interception during transmission.
2. Remote Access: Allows secure access to internal systems from remote locations.
3. Cost Efficiency: Uses public infrastructure (e.g., internet) instead of private leased lines.
4. Privacy Compliance: Helps meet data privacy laws and regulations.
24. How Does Battery Life Impact Mobile Computing, and What Technologies
Help Improve It?
Impact:
Limits operation time of mobile devices
Affects usability for remote work and travel
Can interrupt communication or data processing
Technologies to Improve Battery Life:
Battery Optimization Software (power-saving modes)
Efficient Chipsets (e.g., ARM-based processors)
OLED/AMOLED Displays (consume less power)
Fast Charging & Wireless Charging
AI-based Power Management
25. Challenges and Limitations in Mobile Computing
Limited Battery Life
Weak Network Coverage in rural or remote areas
Hardware Constraints (small screens, low processing power)
Security Risks (data breaches, device theft)
Latency and Bandwidth issues
Device Compatibility across different OS and platforms
27. Components of Satellite Communication System
1. Satellite (Space Segment):
o Orbits Earth and relays signals
2. Ground Station (Earth Segment):
o Includes antennas, transceivers, and control systems
3. User Equipment (Mobile Segment):
o Handheld or vehicle-based receivers
4. Transponder:
o Receives, amplifies, and retransmits signals
5. Control Center:
o Monitors and manages satellite operation and health
28. Role of GPRS and Upgrade Strategy
GPRS (General Packet Radio Service):
Introduced in 2G networks
Enabled packet-switched data services like web browsing and MMS
Speeds: 56–114 Kbps
Upgrade Strategy:
EDGE (Enhanced GPRS) → 3G (UMTS) → 4G (LTE) → 5G
Each upgrade improves speed, capacity, and latency.
Integrate with IoT and real-time applications for modern needs.
29. Role of 4G and 5G in Enhancing Mobile Computing
4G Enhancements:
Supports seamless video streaming, cloud apps, and gaming
Reliable internet access for mobile workers
5G Enhancements:
Ultra-low latency enables AR/VR, real-time robotics
Massive device connectivity supports IoT ecosystems
Energy-efficient, supports longer device uptime
30. Structure of the Communication Network Architecture and Its Components
Communication Network Architecture:
css
CopyEdit
[User Devices] ↔ [Access Network] ↔ [Core Network] ↔ [Internet/Services]
Components:
1. User Devices: Smartphones, tablets, laptops
2. Access Network: Wi-Fi, 4G/5G, Satellite — connects users to the core
3. Core Network: Switches, routers, base stations — manages data traffic
4. Service Network: Cloud services, web servers, app servers
5. Protocols: TCP/IP, HTTP, HTTPS — enable communication
31. WLAN Techniques: Infrared, Spread Spectrum, and Narrowband
Microwave
a. Infrared (IR) LANs:
Use infrared light (non-visible spectrum) for communication.
Short-range, line-of-sight required.
Example: Remote control-like data transfer between laptops.
b. Spread Spectrum LANs:
Spread data over a wider frequency range than needed.
More secure and resistant to interference.
Types:
o Frequency Hopping Spread Spectrum (FHSS)
o Direct Sequence Spread Spectrum (DSSS)
Example: IEEE 802.11b/g Wi-Fi.
c. Narrowband Microwave:
Uses a small, fixed range of frequencies.
Higher bandwidth than IR, but prone to interference.
Requires directional antennas for long distances.
Example: Point-to-point microwave links in backhaul networks.
32. Mind-Map Architecture Diagrams for WLAN Standards
a. IEEE 802.11 (Wi-Fi)
Components: Stations, APs, Distribution System
Modes: Infrastructure and Ad-Hoc
Security: WEP, WPA2
b. HYPERLAN
Developed by ETSI (Europe)
Higher speed than early IEEE 802.11
Prioritized traffic handling and QoS
c. MANET (Mobile Ad-Hoc Network)
No fixed infrastructure
Nodes act as routers and hosts
Dynamic topology
Self-organizing and decentralized
33. Compare and Contrast: SMS vs. MMS
Feature SMS (Short Message MMS (Multimedia Messaging Service)
Service)
Content Text only (160 characters) Multimedia: images, video, audio, text
Data Usage No internet required Uses mobile data or internet
Compatibility Works on all phones Requires MMS-enabled devices
Cost Cheaper Usually more expensive
Speed Faster Slightly slower due to file size
34. Expected Advancements in Mobile Computing (Next 10 Years)
6G Networks: Ultra-high speed and microsecond latency
AI Integration: Smarter apps, real-time decisions
Augmented Reality (AR)/Virtual Reality (VR): Fully immersive mobile experiences
Foldable & Wearable Devices: Advanced and multi-use form factors
Edge Computing: Real-time data processing near the source
Quantum-Resistant Security: New encryption methods
Global Satellite Internet: Like Starlink, covering remote areas
Advanced IoT Ecosystem: Smarter homes, cities, industries
35. Link Manager Protocol (Bluetooth)
A Bluetooth layer responsible for:
o Link setup and teardown
o Authentication
o Encryption
o Power control
o Role switching (master/slave)
o Quality of service (QoS)
o Security mode negotiation
36. Seven Functionalities in Bluetooth Peer-to-Peer Messaging
1. Device Discovery – Identifies nearby Bluetooth devices.
2. Link Setup – Establishes secure connection.
3. Authentication – Confirms trusted devices.
4. Encryption – Protects message content.
5. Data Exchange – Sends messages (text, file) peer-to-peer.
6. Error Detection – Ensures reliable data delivery.
7. Power Management – Optimizes battery during message exchange.
37. Globalstar Network Architecture & Role in Mobile Networks
Components:
LEO Satellites: Provide global coverage
User Terminals: Satellite-enabled phones
Ground Stations: Route calls/data to terrestrial networks
Role in Mobile Networks:
Extends communication to remote/rural/ocean regions
Supports voice, SMS, GPS, and IoT
Used in emergency response, maritime, and military sectors