SNS COLLEGE OF ENGINEERING Kurumbapalayam(Po

advertisement
SNS COLLEGE OF ENGINEERING
Kurumbapalayam(Po), Coimbatore – 641 107
Accredited by NAAC-UGC with ‘A’ Grade
Approved by AICTE & Affiliated to Anna University, Chennai
INTERNAL ASSESMENT EXAMINATIONS – III
COURSE: B.E – CSE
CS2402 – MOBILE AND PERVASIVE COMPUTING
Class: VII Sem CSE
Duration: 2 Hours
ANSWER KEY
Maximum: 50 Marks
PART A - (10 X 2 = 20 marks)
1. Mention the goal of M-TCP?
2.
3.
4.
5.
6.
Splits TCP connection, chokes sender via window size.
What led to the development of Indirect TCP?
The TCP connection between the mobile host (MH) and the correspondent host (CH) is
split at the mobility support router (MSR). The connection between the MSR and MH has
independent, optimized flow and congestion control from the MSR to CH link. In fact, a
separate transport protocol can be used.
Mention the primary goal of WAP.
WAP's goal is to allow a wide variety of wireless devices to access live information
resources and applications. The philosophy behind WAP's approach is to utilize as few
resources as possible on the handheld device and compensate for the constraints of the device
by enriching the functionality of the network.
Mention the features present in WSP/B in addition to that present in WSP.
1. HTTP/1.1 functionality
2. Exchange of session headers
3. Push and Pull Data transfer
4. Asynchronous requests
What are the basic features of WML?
 WML is a markup language for small, wireless computing devices.
 In WML, variables can be defined that store data in string format. In HTML, variables
cannot be stored.
 WML uses WML script for client-side scripting, which is stored in a separate file. HTML
uses JavaScript.
 The supported image format for WML is WBMP. HTML supports JPEG, GIF and BMP.
 A micro-browser is used to run WML markup. A regular browser, such as Internet
Explorer, Firefox or Chrome, is used to run HTML markup.
 WML follows XHTML specification and is therefore case sensitive. HTML is not case
sensitive.
 WML has fewer tags compared to HTML.
 A deck is a set of WML cards. In HTML, a site is a set of HTML pages.
What are the three ways of WTA extends the WAE application model?

Content push: A WTA origin server can push the content.

Handling of network events: A device can have a table indicating how to react to
certain events from the mobile network.

Access to telephony function: Application running on the client can access telephony
functions from WML or WML script is very simple.
7. Aim of pervasive computing? Is it different from ubiquitous computing?
Pervasive computing (also called ubiquitous computing) is the growing trend towards
embedding microprocessors in everyday objects so they can communicate information. The
words pervasive and ubiquitous mean "existing everywhere." Pervasive computing devices
are completely connected and constantly available.
8. Why is palm OS popular in PDA’s?
Palm OS is a mobile operating system initially developed by Palm, Inc., for personal
digital assistants (PDAs) in 1996. Palm OS is designed for ease of use with a touch screenbased graphical user interface. It is provided with a suite of basic applications for personal
information management. Later versions of the OS have been extended to support smart
phones. Several other licensees have manufactured devices powered by Palm OS.
9. List the characteristics of smart card.
 Dimensions similar to those of a credit card. ID-1 of the ISO/IEC 7810 standard defines
cards as nominally 85.60 by 53.98 millimetres (3.370 in × 2.125 in). Another popular size
is ID-000 which is nominally 25 by 15 millimetres (0.984 in × 0.591 in) (commonly used
in SIM cards). Both are 0.76 millimetres (0.030 in) thick.
 Contains a tamper-resistant security system (for example a secure cryptoprocessor and a
secure file system) and provides security services (e.g., protects in-memory information).
 Managed by an administration system which securely interchanges information and
configuration settings with the card, controlling card blacklisting and application-data
updates.
 Communicates with external services via card-reading devices, such as ticket
readers, ATMs, DIP reader, etc.
10. How does the biometric authentication work in pervasive computing?
Biometrics is the science and technology of measuring and analyzing biological data.
It is used to uniquely identify individuals by their physical characteristics or personal behavior
traits. It is used to allow employees access to certain areas and for general ID purposes. A
biometrics system goes through three basic steps.
1.
Acquiring data
2.
Encryption
3.
Analysis of data
PART B
Answer All (5qns x 16mks = 80mks)
11
a)
What are the various flavours of TCP available? Explain in detail.
1.Indirect TCP
2.Snooping TCP
3.Mobile TCP
 Fast retransmit / Fast Recovery
 Transmission / Time out Freezing
 Selective Retransmission
 Transaction oriented TCP
OR
b) (i) State the requirements of WAP. Explain its architecture components.
Requirements :
•
Leverage existing standards whenever possible
16
08
•
•
•
•
•
Define a layered, scalable and extensible architecture
Support as many wireless networks as possible
Optimize for narrow-band bearers with high latency
Optimize for efficient use of device resources
Provide support for secure applications and communication
(ii) Explain WAE architecture.
• General-purpose application environment based on a combination of WWW and
mobile telephony technologies.
• It defines the user interface on the phone. It contains WML and WTA (Wireless
Telephony Application).
• Primary objective – interoperable environment.
12
a)
Explain the following
(i)Wireless datagram protocol
• The WAP datagram protocol (WDP) is the Transport layer that sends and
receives messages via any available bearer network, including SMS, USSD,
CSD, CDPD, IS–136 packet data, and GPRS.
• Operates above the data capable bearer services supported by various network
types.
• Provides a common unction independent of the underlying wireless network
interface to the upper layer protocols and hence they fork.
(ii) Wireless transport layer security
Based on industry-standard Transport Layer Security (TLS) protocol
• Optimized for use over narrow-band communication channels
08
08
08
•
Features:
– Data integrity
– Privacy
– Authentication
--Denial-of-service protection
OR
b) Explain the following
(i)Wireless transaction protocol
• The WAP transaction protocol (WTP) layer provides transaction support, adding
reliability to the datagram service provided by WDP.
• Light weight transaction-oriented protocol
• Three classes of transaction services
– Unreliable one-way requests
– Reliable one-way requests
– Reliable two-way request-reply transactions
13
a)
08
(ii) Wireless session protocol
08
• The WAP session protocol (WSP) layer provides a lightweight session layer to
allow efficient exchange of data between applications.
• Application layer with a consistent interface for two session services
– Connection-oriented service that operates above the transaction
layer protocol (WTP)
– Connectionless service that operates above a secure or non-secure
datagram service (WDP)
– Optimized for low-bandwidth bearer networks with long latency
(i) What is WML? Explain deck and card with WML code.
08
WML is the worldwide industry standard.
 WML is a markup language for small, wireless computing devices.
 In WML, variables can be defined that store data in string format. In HTML,
variables cannot be stored.
 WML uses WML script for client-side scripting, which is stored in a separate
file. HTML uses JavaScript.
 The supported image format for WML is WBMP. HTML supports JPEG, GIF
and BMP.
 A micro-browser is used to run WML markup. A regular browser, such as
Internet Explorer, Firefox or Chrome, is used to run HTML markup.
 WML follows XHTML specification and is therefore case sensitive. HTML is
not case sensitive.
 WML has fewer tags compared to HTML.
 A deck is a set of WML cards. In HTML, a site is a set of HTML pages.
DECKS and Cards :
<?xml version="1.0"?>
<!DOCTYPE wml PUBLIC "-//WAPFORUM//DTD WML 1.2//EN"
"http://www.wapforum.org/DTD/wml12.dtd">
<wml>
<card id="one" title="First Card">
<p>
This is the first card in the deck
</p>
</card>
<card id="two" title="Second Card">
<p>
Ths is the second card in the deck
</p>
</card>
</wml>
(ii) What are the design and implementation issues in device connectivity aspect of
pervasive computing? Explain.
1. The protocol for device to device to server interactions that are relevant in the
pervasive computing domain
2. The algorithm and protocols to address the security issue
Protocols:
The protocols are needed when a device wants to exchange data with other devices. E.G
Wireless Protocols
The yet another important topic is the consistency of the databases and their data
between a server and pervasive computing devices. The consistency can be solved by
synchronization or replication.
14
15
OR
b) Explain the operating system issues related to miniature devices.
 Separation of concerns
 Components
 Real world Interfacing
 Frameworks
 Multi Dimensional Optimization
 Hardware / Software Co –Design
Networking of miniature devices
a) Describe the various hardware components involved in pervasive computing devices.
 Batteries
 Nickel cadmium cell
 Lithium polymer battery
 Display
 DSTN
 OLED
 Memory
OR
b) What are the applications of pervasive computing? Discuss any two of them.
 Retail
 Airline check in and booking
 Sales force automation
 Health care
 Tracking
 Car information system
 Email access via WAP and voice

a) Explain how pervasive web applications can be accessed via WAP.
WAP Functionality:
Simple interactions with the services the internet can be done using a WAP device.
Infrastructure
A WAP gateway sits between mobile devices using the WAP protocol and the World
Wide Web, passing pages from one to the other much like a proxy.
08
16
16
16
16
This translates pages into a form suitable for the mobiles, for instance using the
Wireless Markup Language (WML).
OR
b) (i) Explain the various soft surface and semi-soft-surface-based display system and
technologies.
 Hardware Technology
 Software Technology
 Operating System and Java Platform
Hardware Technology
Batteries
Nickel Cadmium Cell
Nickel metal hydride
Lithium battery
Displays
LCO are replacing CRT used in the part
 DSTN
 OLED – Light emitting Organic Diode
 LEP - Light Emitting Polymer Technologies
(ii) Explain how a pervasive web application can be secured using an ‘Authentication
Proxy’.
The application uses a ID and a numerical password for authentication. This has the
advantage because it can work on any time.
Reliability
Trust
Data access
Malicious attacks
Information propagation
Customer ID using MISISDN Numbers
Customer authentication using WIM
08
08
Download