Sunday 19 May 2013

CS9251 MOBILE COMPUTING ANNA UNIVERSITY QUESTION PAPERS ME(CSE)



CS9251 MOBILE COMPUTING ANNA UNIVERSITY QUESTION PAPERS 
ME (CSE)

Question paper code: D2286
B.E/B.Tech Degree Examination APRIL /MAY 2010
Eighth Semester
Computer Science and Engineering
IT1402-MOBILE COMPUTING
(Regulation 2004)

Answer all questions
Part -A(10*2=20)Marks
1 What is spreading factor?
2.What is polling?
3.Distinguish between soft handover& hard Hand over.
4.Define foot print with respect to satellite systems.
5.State the 3 phases of the medium access of different competing nodes.
6.what are the power saving mechanisms in bluetooth?
7.What are the drawbacks of wired networks?
8.Define Dynamic Source Routing.
9.What is the difference between TCP & UDP.
10. Mention any 2 salient features of WAP.

Part-B (5*16=80)Marks
11 (a) i Discuss in detail about the types of antennas with their radiation patterns.(12)
ii Explain Diversity techniques.(4)
[or]
11 (b) Explain space Frequency,code & Time division Multiplexing in detail.(16)

12 (a) Describe Digital Audio Broadcasting.(16)

[or]

(b) Explain routing ,localization and handover in satellite systems.(16)

13 (a) Describe architecture of BLUE TOOTH.(16)

[or]

(b)Explain Channel control sub layer in HIPERLAN.(16)

14 (a) Explain optimization in Mobile IP in detail.(16)

[or]

(b)Explain IPV6 Protocol in detail.(16)

15 (a) Discuss the role of WWW in support for mobility.(16)
[or]

(b) Explain the following:
(i) Indirect TCP. (6)
(ii)Snooping TCP.(6)
(iii)Explain about performance enhancing proxies.(4)



CS9251 MOBILE COMPUTING ANNA UNIVERSITY QUESTION PAPERS 
ME (CSE)

CS9251 MOBILE COMPUTING ANNA UNIVERSITY QUESTION PAPERS 
ME (CSE)




B.E./B.Tech. DEGREE EXAMINATION, NOVEMBER/DECEMBER 2009.
Seventh Semester
Information Technology
IT1402- MOBILE COMPUTING
(Regulation 2004)

Time: Three hours Maximum:100 marks

Answer ALL questions.
PART A- (10 X 2= 20 Marks)

1. Why do Hidden and Exposed terminal problems arise?

2. Differentiate Broadcast from Multicast.

3. Detail the features of MSAT.

4. How can an efficient routing be made in satellite systes?

5. When are tuning frequency and frequency considered?

6. How can you utilize mobile antennas efficiently?

7. Compare various modulation techniques.

8. When it's required to go for GMSK, GFSK and DQPSK?

9. In what functionalities Switches differ from Routers?

10. How and why does I-TCP isolate problems on the wireless link?

PART B - (5 X 16 = 80 Marks)

11. (a) Consider three users and Barker code of six bits each for the users transmitting the signals, introduce noise and near/far problem while transmitting and reconstruct the data in the receiving side providing the proper countermeasures for the complications. (Note: Use CDMA technologies) (Marks 16)
(Or)

(b) (i) Table the frequency bands useed for wireless applications with their ranges, propagation models and applications. (Marks 6)

(ii) Represent diagrammatically the protocol machines for multiple access with collision avoidance. (Marks 10)

12. (a) (i) Sketch the data network in your campus. How many hosts are there and how large is the user population? What is the speed of the access link to the Internet? How so you gain access to the Internet? How much does home access to the Internet costs? (Marks 10)

(ii) Why are so many different identifiers/addresses (e.g. MSISDN, TMSI, IMSI) needed in GSM? Give reasons and distinguish between user- related and system related identifiers. (Marks 6)
(Or)

(b) (i) Consider a mobile user who is migrating from a place to another place, provide him a seamless service by satellite system, also sketch the architecture. (Marks 8)

(ii) Discuss the importance of DECT Protocol Layers. (Marks 8)

13. (a) (i) Detail the time- bounded service on top of the standard DCF mechanism where ad hoc networks cannot use the function. (Marks 8)

(ii) Discuss the PHY frame format of an IEEE 802.11 using the spread spectrum technique which separates by code. (Marks 8)
(Or)

(b) (i) The channel access control sublayer of HIPERLAN offers a connectionless data transfer service to the higher MAC layer. Justify the above statement with related references. (Marks 10)

(ii) Discuss the functionalities and support provided by L2CAP. (Marks 6)

14. (a) Discuss and detail the differences in topology reorganization in DSDV and DSR routing protocols. (Marks 16)
(Or)

(b) (i) What are the general problems of mobile IP regarding security and support of quality of service? (Marks 8)

(ii) Name the inefficiencies of mobile IP regarding data forwarding from a correspondent node to a mobile node. What are optimizations and what additional problems do they cause? (Marks 8)

15. (a) What are the major difference between WAP 2.0 and WAP 1.x? What influenced the WAP 2.0 development? (Marks 16)
(Or)

(b) Detail about UTMS Radio Interfaces in Frequency Division Duplex and Time Division Duplex modes. (Marks 16)



CS9251 MOBILE COMPUTING ANNA UNIVERSITY QUESTION PAPERS 
ME (CSE)

CS9251 MOBILE COMPUTING ANNA UNIVERSITY QUESTION PAPERS 
ME (CSE)



MAY /JUNE 2009
MOBILE COMPUTING.
Elective
Part –A
1. Define near /far effect?
2. Give any two application of satellite systems?
3. What are ad-hoc networks?
4. Define handover in WATM?
5. What is meant by Registration lifetime of a packet ?
6. What is meant by tunneling?
7. How does the standard TCP behave when a packet is lost during transmission?
8. Define time – out freezing?
9. Mention the role of transaction layer in WAP?
10. Mention any two messages of WCMP?


Part –B

11. a)Explain in detail:
i)DECT system. [Mark 8]
ii)TETRA system. [Mark 8]
Or
b) i) Discuss LEO,MEO, and GEO satellite systems. [Mark 8]
ii) Discuss Digital Video Broadcasting. [Mark 8]

12. a )Explain in detail:
i)HIPERLAN [Mark 8]
ii) BLUETOOTH [Mark 8]
Or
b) What is meant by WATM? Describe WATM reference model, location management , services and QOS. [Mark 16]
13.a) i) Discuss the purpose and application of DHCP. [Mark 8] ii) Explain agent discovery and registration. [Mark 8]
Or
b) Explain the various routing strategies in mobile ad-hoc networks?
14. a) Explain any 4 classical TCP improvement techniques. [Mark 16]
Or

b) i)Discuss Transaction oriented TCP in detail. [Mark 8]
ii) Discuss TCP over 2.5/3G wireless networks. [Mark 8]
15.a) Discuss the component of WAP arch/- and its application environment. [Mark 16]
Or
b)i)Write short notes on WML script. [Mark 8]
ii) Discuss WTA? [Mark 8]




CS9251 MOBILE COMPUTING ANNA UNIVERSITY QUESTION PAPERS 
ME (CSE)  SEMESTER II

CS9251 MOBILE COMPUTING ANNA UNIVERSITY QUESTION PAPERS 
ME (CSE) SEMESTER II



B.E. / B.Tech DEGREE EXAMINATION, NOVEMBER/DECEMBER 2008

Seventh Semester

Information Technology

IT1402 – MOBILE COMPUTING

(Regulation 2004)

Time: Three hours Maximum: 100 marks

Answer ALL questions.

PART A – (10 x 2=20 marks)

1. Differentiate analog modulation and digital modulation.
2. How are guard spaces realized between users in CDMA?
3. What are the general problems of satellite signals travelling from a satellite to
receiver?
4. Differentiate symmetrical and asymmetrical communication system.
5. What is HIPERLAN?
6. How is mobility restricted using WLANS?
7. What could be quick ‘solutions’ and why don’t they work?
8. What advantages does the use of IPV 6 offer for mobility?
9. Write the advantages and disadvantages of mobile TCP.
10. Define fast retransmit.

PART B – (5 x 16 = 80 marks)

11. (a) Explain in detail about multiplexing.

Or
(b) Explain the following :
(i) MAC
(ii) SDMA.

12. (a) Explain the functional architecture of a GSM system.

Or
(b) Discuss about digital video broadcasting.

13. (a) Explain the concept of blue tooth architecture.

Or
(b) Explain the concept of IEEE 802.11 medium access control layer.
14. (a) Explain the following :
(i) DSDV [Marks 8]
(ii) Ad-hoc DSR. [Marks 8]

Or
(b) Discuss about tunneling and encapsulation mechanism and reverse tunneling.

15. (a) Explain and detail about traditional TCP.

Or
(b) (i) Briefly explain about indirect and snooping TCP. [Marks 8]
(ii) Briefly discuss about WAP.[Marks 8]


CS9251 MOBILE COMPUTING ANNA UNIVERSITY QUESTION PAPERS 
ME (CSE)

CS9251 MOBILE COMPUTING ANNA UNIVERSITY QUESTION PAPERS 
ME (CSE)




B.E/B.Tech. Degree Examination, April/May 2008
Eighth Semester
(Regulation 2004)
Computer Science and Engineering

IT 1402- Mobile Computing

Part-A(10*2=20 marks)

1. Assume a receiver is located 10 km from a 150 W transmitter. The carrier
frequency is 6 GHz and free space propagation is assumed, Gain at
transmitter is 1 dB and Gain at receiver is 1 dB.

(a) Calculate the transmit power in dBW.

(b) Find the power at the receiver in Watts.

2. What limits the number of simultaneous users in a TDM/FDM system compared
to a CDM system ? What happens to the transmission quality of connections
if the load gets higher on the cell ?

3. Consider the handoff procedure in GSM system that is based on relative
signal strength with threshold; that is, a mobile switches from one cell
to another if (a) the signal at the current BS is sufficiently weak (less
than a predefined threshold) and (b) the other signal is stronger than
the two. What are the drawbacks of this scheme, when the threshold is
too low or too high ?

4. State the different types of transport modes and channels used to carry
packets in Digital Audio Broadcasting.

5. In the Distributed Coordination Function(DCF) protocol of IEEE 802.11,
why does a Node wait only SIFS time units (after the last data packet
reception) before sending an ACK, while waiting DIFS time units before
attempting a data transmission ?

6. What are the advantages and problems of forwarding mechanisms in Bluetooth
networks regarding security and power saving ?

7. How can DHCP be used for mobility and support of Mobile IP ?

8. What are the differences between AODV and the standard distance vector
algorithm ? Why are extensions needed ?

9. How and why does I-TCP isolate problems on the wireless link ? What are
the main drawbacks of this solution ?

10.Mention two WAP service providers. Find two cell phones supporting WAP
and identify which WAP version they support.


Part-B(5*16=80 marks)

11. (a) How does frequency reuse enhance cellular network capacity ? Besides
the number of users, what other major factor influences the decision
on cluster size ? A cellular system uses frequency spectrum 1800 MHz
to 1840 MHz for uplink channels and 1860 MHz to 1900 MHz for downlink
channels respectively. Each channel takes 200 KHz and can be shared
by 8 users. Each user needs one uplink and one downlink channel. How
many users can be supported without frequency reuse in this cellular
system ? [16]

(OR)

(b) What is the use of spread spectrum ? Sketch the block diagram of the
Transmitter and Receiver of DSSS. Explain what each block does and
what the signal looks like (in time and/or frequency domains) at each
location in the block diagram with an example.[16]


12. (a) Name the main elements of GSM system architecture and describe their
functions. What are the advantages of specifying not only the radio
interface but also the internal interfaces of the GSM system ?
Explain the inter-BSC,intra-MSC handover process in the GSM system
using typical signals and a message sequence chart. Explain the
decision points and the resource allocation steps,if they exist.[16]

(OR)

(b) What is DAB ? Explain the components,frame format and the protocol
used by DAB to access different formats of data also describe how
DVB is used for data broadcasting and to access high speed internet.
[16]


13. (a) (i) Using IEEE 802.11 (DCF): S1 and S2 send CBR/UDP traffic to the
common destination D. Consider S1,S2 and D all within receive
range of each other when the basic scheme is used (no RTS/CTS):
Describe a collision (what happens before,during and after).What
does the collision probability depend on ? When RTS/CTS is used:
What are the changes to the previous answers ? comment also on
the throughput and fairness. [16]

(OR)

(b) (i) Describe the briefly how collision is avoided in HIPERLAN-1. [8]

(ii)Draw the protocol architecture of Bluetooth and explain briefly
the Base band layer and L2CAP of Bluetooth. [8]


14. (a) Given the network topology below, use the dynamic source routing
algorithm to compute the shortest path from A to all other nodes.
Make sure to show the results of the computation at each step.[16]

7
B --- D
|\ 1/ |
| \ / |
12| /\ |1
| /10\ |
A --- C -------- E
3 1

(OR)

(b) Consider a mobile node MN from network X. The user of MN wishes to
communicate with a corresponding node CN in network Y. The node MN
moves from X to a foreign network A. Describe the sequence of
messages that are required in Mobile IPv4 so that MN and CN can
continue to communicate. Include both the user data messages and the
Mobile IP control messages. Now, consider the case where CN moves to
foreign network B while MN is still in the foreign network A. Can
CN and MN still communicate ? (Does Mobile IP support both endpoints
moving? ) Show the message flow to indicate how it will succeed or
fail in this case. [16]

15. (a) As a transport layer protocol, TCP uses a window mechanism to
exercise flow control over the best effort IP in the internet.
Flow control is exercised by the edge router based on congestion
status encountered in the core routers between teh TCP sender and
TCP receiver.

(i) Describe the operation of the window flow control mechanism. [8]

(ii)ACKs from the TCP receiver are the basis that the TCP sender
uses to adjust the sending window size. Describe and discuss
how ACKs are used for this purpose. [8]

(OR)

(b) Specify the enhancements made to the basic client server architecture
of the web to suit a mobile wireless user ? Briefly discuss the main
goals of WAP. Expain the layers of WAP protocol used to achieve the
following : A client wants to have a shared state with the server
for transferring the content. [16]





CS9251 MOBILE COMPUTING ANNA UNIVERSITY QUESTION PAPERS 
ME (CSE)

CS9251 MOBILE COMPUTING ANNA UNIVERSITY QUESTION PAPERS 
ME (CSE)


M.E. DEGREE EXAMINATION

MOBILE COMPUTING
Time : Three Hours Maximum : 100 marks
PART A (10 x 2 = 20 marks)

      1. What is a guard space?
2. What is CMDA?
3. List the four possible handover and scenarios in GSM
4. Define inclination angle and elevation angle
5. Give the 802.11 PHY frame format using DSS
6. What are the low power states of a blue tooth device?
7. What is a care of address?
8. What are the routing metrics in wireless adhoc network?
9. What is a wireless Telephony application?
10. List the classes of transaction service of WTP.

PART B (5 x 16 = 80 marks)

11. (a) Discuss in detail the Wireless Transaction Protocol. (16)
(or)
(b) Discuss in detail the Wireless Session Protocol (16)

12. (a) Explain time division multiple access (16)

(or)
(b) (i) Discuss the spread spectrum techniques (10)
(ii) What is Code Division Multiplexing? Explain (6)

13. (a) (i) Discuss in detail localization, calling and handover in GSM (10)
(ii) Explain the types of orbits in satellite system (6)
(or)
(b) (i) Explain the GSM system architecture (12)
(ii)Explain the protocol architecture of DECT (4)

14. (a) Discuss in detail the medium access control mechanism of ICCC 802.11 (16)
(or)
(b) (i) Explain the information bases and networking of adhoc HIPERLAN. (8)
(ii) Discuss MAC layer bluetooth system (8)

15. (a) (i)Describe tunneling and encapsulation in Mobile IP (8)
(ii) Discuss in detail dynamic source routing (8)
(or)
(b) (i) Write short notes on reverse tunneling (4)
(ii) Explain IP packet delivery, agent advertisement, discovery and registration process in mobile IP (12)


CS9251 MOBILE COMPUTING ANNA UNIVERSITY QUESTION PAPERS 
ME (CSE)

CS9251 MOBILE COMPUTING ANNA UNIVERSITY QUESTION PAPERS 
ME (CSE)



M.E. DEGREE EXAMINATION
MOBILE COMPUTING
Time : Three Hours Maximum : 100 marks

PART A- (10x2=20 marks)
1. What is spreading factor?
2. What is polling?
3. Distinguish between soft hand over and hard hand over.
4. Define footprint with respect to satellite systems.
5. State the three phases of the medium access of different competing nodes.
6. What are the power saving mechanisms in Bluetooth?
7. What are the drawbacks of wired networks?
8. Define: Dynamic Source Routing.
9. What is the difference between TCP and UDP?
10. Mention any two salient features of WAP.

PART B- (5x16=80 marks)
11.(a)(i) Discuss in detail the types of Antennas with their radiation patterns.
         (ii) Explain Diversity techniques.
OR
              (b) Explain Space, Frequency, Code and Time Division multiplexing in detail.

12.(a) Describe Digital Audio Broadcasting.
OR
          (b) Explain routing, localization and hand over in satellite systems.

13.(a) Describe the architecture of BLUE TOOTH.
OR
           (b) Explain channel control sub layer in HIPERLAN.


14.(a) Explain optimization in Mobile IP in detail.
OR
          (b) Explain IPv6 protocol in detail.

15.(a) Discuss the role of WWW in support for mobility.
OR
         (b) Explain the following:
(i) Indirect TCP.
(ii) Snooping TCP.
(iii) Explain about performance enhancing proxies.



CS2255 — DATABASE MANAGEMENT SYSTEMS ANNA UNIVERSITY QUESTION PAPERS



B.E./B.Tech. DEGREE EXAMINATION, APRIL/MAY 2010
Fourth Semester
Computer Science and Engineering
CS2255 — DATABASE MANAGEMENT SYSTEMS
(Common to Information Technology)
(Regulation 2008)
Time: Three hours Maximum: 100 Marks
Answer ALL Questions
PART A — (10 × 2 = 20 Marks)
1. Explain the basic structure of a relational database with an example.
2. What are the functions of a DBA?
3. Give the usage of the rename operation with an example.
4. What do you mean by weak entity set?
5. What is normalization?
6. Write a note on functional dependencies.
7. What do you mean by a transaction?
8. Define the term ACID properties.
9. Describe flash memory.
10. List out the physical storage media.

PART B — (5 × 16 = 80 Marks)
11. (a) (i) Discuss the various disadvantages in the file system and explain
how it can be overcome by the database system. (6)
(ii) What are the different Data models present? Explain in detail. (10)
Or
(b) (i) Explain the Database system structure with a neat diagram. (10)
(ii) Construct an ER diagram for an employee payroll system. (6)
12. (a) (i) Explain the use of trigger with your own example. (8)
(ii) Discuss the terms Distributed databases and client/server
databases. (8)
Or
(b) (i) What is a view? How can it be created? Explain with an example. (7)
(ii) Discuss in detail the operators SELECT, PROJECT, UNION with
suitable examples. (9)
13. (a) Explain 1NF, 2NF and 3NF with an example. (16)
Or
(b) Explain the Boyce-Codd normal form with an example. Also state how it
differs from that of 3NF. (16)
14. (a) (i) How can you implement atomicity in transactions? Explain. (8)
(ii) Describe the concept of serilalizability with suitable example. (8)
Or
(b) How concurrency is performed? Explain the protocol that is used to
maintain the concurrency concept. (16)
15. (a) What is RAID? Explain it in detail. (16)
Or
(b) Mention the purpose of indexing. How this can be done by B+ tree?
Explain. (16)



B.E./B.Tech. DEGREE EXAMINATION, NOVEMBER/DECEMBER 2011.
Fourth Semester
Computer Science and Engineering
CS 2255 — DATABASE MANAGEMENT SYSTEMS
(Common to Information Technology)
(Regulation 2008)
Time : Three hours                                                             Maximum : 100 marks
Answer ALL questions.
PART A — (10 × 2 = 20 marks)
1. What is a data model?
2. With an example explain what a derived attribute is?
3. Consider the following relation :
EMP (ENO, NAME, DATE_OF_BIRTH, SEX, DATE_OF_JOINING, BASIC_PAY, DEPT) Develop an SQL query that will find and display the average BASIC_PAY in each DEPT.
4. List the two types of embedded SQL SELECT statements.
5. Consider the following relation :
R (A, B, C, D, E)
The primary key of the relation is AB. The following functional
dependencies hold :
A C
B D
AB
Is the above relation in second normal form?
6. Consider the following relation : R(A, B, C, D)
The primary key of the relation is A. The following functional dependencies
hold :
A B,C 
B D 
Is the above relation in third normal form?
7. List the two commonly used Concurrency Control techniques.
8. List the SQL statements used for transaction control.
9. What are ordered indices?
10. Distinguish between sparse index and dense index.
PART B — (5 × 16 = 80 marks)
11. (a) (i) Construct an E-R diagram for a car-insurance company whose customers own one or more cars each. Each car has associated with it zero to any number of recorded accidents. State any assumptions you make. (6)
(ii) A university registrar’s office maintains data about the following entities :
(1) Courses, including number, title, credits, syllabus, and prerequisites;
(2) Course offerings, including course number, year,
semester, section number, instructor, timings, and classroom;
(3) Students, including student-id, name, and program; and
(4) Instructors, including identification number, name,
department, and title. Further, the enrollment of students in courses and grades awarded to students in each course they are enrolled for must be appropriately modeled. Construct an E-R diagram for the registrar’s office. Document all assumptions that you make about the mapping constraints. (10)
Or
(b) (i) With a neat sketch discuss the three-schema architecture of a DBMS. (8)
(ii) What is aggregation in an ER model? Develop an ER diagram using aggregation that captures the following information : 
Employees work for projects. An employee working for a particular project uses various machinery. Assume necessary attributes. State any assumptions you make. Also discuss about the ER diagram you have designed. (2 + 6)
12. (a) (i) Explain the distinctions among the terms primary key, candidate key, and super key. Give relevant examples. (6)
(ii) What is referential integrity? Give relevant example. (4)
(iii) Consider the following six relations for an Order-processing Database Application in a Company :
CUSTOMER (CUSTNO, CNAME, CITY)
ORDER (ORDERNO, ODATE, CUSTNO, ORD_AMT)
ORDER_ITEM (ORDERNO, ITEMNO, QTY)
ITEM (ITEMNO, ITEM_NAME, UNIT_PRICE)
SHIPMENT (ORDERNO, ITEMNO, WAREHOUSENO,
SHIP_DATE)
WAREHOUSE (WAREHOUSENO, CITY)
Here, ORD_AMT refers to total amount of an order; ODATE is the date the order was placed; SHIP_DATE is the date an order is shipped from the warehouse. Assume that an order can be shipped from several warehouses. Specify the foreign keys for
this schema, stating any assumptions you make. (6)
Or
(b) With relevant examples discuss the various operations in Relational Algebra. (16)
13. (a) Define a functional dependency. List and discuss the six inference rules for functional dependencies. Give relevant examples. (16)
Or
(b) (i) Give a set of Functional dependencies for the relation schema R(A,B,C,D,E) with primary key AB under which R is in 2NF but not in 3NF. (5)
(ii) Prove that any relation schema with two attributes is in BCNF.(5)
(iii) Consider a relation R that has three attributes ABC. It is decomposed into relations R1 with attributes AB and R2 with attributes BC. State the definition of lossless-join decomposition with respect to this example. Answer this question concisely by
writing a relational algebra equation involving R, R1, and R2. (6)
14. (a) (i) Define a transaction. Then discuss the following with relevant examples : (8)
(1) A read only transaction
(2) A read write transaction
(3) An aborted transaction
(ii) With a neat sketch discuss the states a transaction can be in. (4)
(iii) Explain the distinction between the terms serial schedule and serializable schedule. Give relevant example. (4)
Or
(b) (i) Discuss the ACID properties of a transaction. Give relevant example. (8)
(ii) Discuss two phase locking protocol. Give relevant example. (8)
15. (a) (i) When is it preferable to use a dense index rather than a sparse index? Explain your answer. (4)
(ii) Since indices speed query processing, why might they not be kept on several search keys? List as many reasons as possible.(6)
(iii) Explain the distinction between closed and open hashing. Discuss the relative merits of each technique in database applications. (6)
Or
(b) Diagrammatically illustrate and discuss the steps involved in processing a query.(16)
  


B.E./B.Tech. DEGREE EXAMINATION, APRIL/MAY 2011
Fourth Semester
Computer Science and Engineering
CS 2255 — DATABASE MANAGEMENT SYSTEMS
(Common to Information Technology)
(Regulation 2008)
Time : Three hours Maximum : 100 marks
Answer ALL questions
PART A — (10 × 2 = 20 marks)
1. Who is a DBA? What are the responsibilities of a DBA?
2. What is a data model? List the types of data models used.
3. What is embedded SQL? What are its advantages?
4. What is the difference between tuple relational calculus and domain relational
calculus?
5. What is meant by lossless-join decomposition?
6. A relation { } D C B A R , , , = has FD’s { } A D D C C AB F →→→ = , , . Is R is
in 3NF?
7. What are the ACID properties?
8. What are two pitfalls (problems) of lock-based protocols?
9. What are the advantages and disadvantages of indexed sequential file?
10. What is database tuning?
PART B — (5 × 16 = 80 marks)
11. (a) (i) With a neat diagram, explain the structure of a DBMS. (9)
(ii) Draw an E-R diagram for a small marketing company database,
assuming your own data requirements. (7)
Or
(b) (i) Compare the features of file system with database system. (8)
(ii) Explain the differences between physical level, conceptual level and
view level of data abstraction. (4)
(iii) Mention any four major responsibilities of DBA. (4)
12. (a) (i) Consider the following relational database
employee (employee-name, street, city)
works ( employee-name, company-name, salary)
company (company-name, city)
manages (employee-name, manager-name)
Give an expression in SQL to express each of the following queries :
Find the names and cities of residence of all employees who work
for XYZ Bank. Find the names, street address, and cities of
residence of all employees who work for XYZ Bank and earn more
than Rs. 10,000 per annum.
Find the names of all employees in this database who live in the
same city as the company for which they work.
Find the names of all employees who live in the same city and on
the same street as do their managers. (4 × 3 = 12)
(ii) Define the term distributed database management system and
mention the issues to be considered in the design of the same. (4)
Or
(b) (i) What are the relational algebra operations supported in SQL?
Write the SQL statement for each operation. (12)
(ii) What is data integrity? Explain the types of integrity constraints.
(4)
 13. (a) (i) Explain 1NF, 2NF, 3NF and BCNF with suitable example. (8)
(ii) Consider the universal relation { } I H G F E D C B A R , , , , , , , , =
and the set of functional dependencies
( ) { } { } { } { } { } F B E D A C B A F →→→ = , , , , { , { } { } { } { }} , , , J I D H G F →→ .
What is the key for R? Decompose R into 2NF, then 3NF relations.
(8)
Or
(b) What are the pitfalls in relational database design? With a suitable
example, explain the role of functional dependency in the process of
normalization. (16)
14. (a) (i) Explain about immediate update and deferred update recovery
techniques. (8)
(ii) Explain the concepts of serializability. (8)
Or
(b) (i) Explain Two-phase locking protocol. (8)
(ii) Describe about the deadlock prevention schemes. (8)
15. (a) (i) List the different levels in RAID technology and explain its
features. (12)
(ii) Describe the different methods of implementing variable length
records. (4)
Or
(b) (i) Explain the various indexing schemes used in database
environment. (12)
(ii) Let relations ( ) C B A r , , 1 and ( ) E D C r , , 2 have the following
properties : 1 r has 20,000 tuples, r2 has 45,000 tuples, 25 tuples of
r1 fit on one block, and 30 tuples of r2 fit on one block. Estimate the
number of block accesses required, using each of the following join
strategies for r1 r2 : (4)
(1) Nested-loop join with r1 as outer relation
(2) Block nested-loop join with r1 as outer relation
(3) Merge join if r1 and r2 are initially sorted
(4) Hash join (assuming that no overflow occurs).
  


B.E./B.Tech. DEGREE EXAMINATION, NOVEMBER/DECEMBER 2010
Fourth Semester
Computer Science and Engineering
CS 2255 — DATABASE MANAGEMENT SYSTEMS
(Common to Information Technology)
(Regulation 2008)
Time : Three hours Maximum : 100 Marks
Answer ALL questions
PART A — (10 × 2 = 20 Marks)
1. Define the two levels of data independence.
2. Write down any two major responsibilities of a database administrator.
3. List out the various relational algebra operators.
4. What are the four broad categories of constraints?
5. Define irreducible sets of dependencies.
6. Define the third normal form.
7. What are ACID properties?
8. What are the three kinds of intent locks?
9. Which are the factors to be considered for the evaluation of indexing and
hashing techniques?
10. What is the drawback of flash memory?

PART B — (5 × 16 = 80 Marks)
11. (a) Explain the three different groups of data models with examples. (16)
Or
(b) Describe the components of entity-relationship diagram with suitable
examples. (16)
12. (a) Describe the features of Embedded SQL and Dynamic SQL. Give suitable
examples. (16)
Or
(b) Write short notes on the following :
(i) Mandatory access control. (9)
(ii) Missing information. (7)
13. (a) Explain non loss decomposition and functional dependencies with
suitable example. (16)
Or
(b) Discuss Join Dependencies and Fifth Normal Form, and explain why
5NF? (16)
14. (a) (i) State the Two-Phase Commit protocol. Discuss the implications of a
failure of the coordinator and some participants. (10)
(ii) Briefly explain transaction recovery with primitive operations. (6)
Or
(b) (i) State and explain the three concurrency problems. (9)
(ii) What is meant by isolation level and define the five different
isolation levels. (7)
15. (a) (i) Discuss the improvement of reliability and performance of RAID (8)
(ii) Explain the structure of a B+-tree. (8)
Or
(b) Explain the complex selection predicates with example. (16)



B.E./B.Tech. DEGREE EXAMINATION, APRIL/MAY 2011
Fourth Semester
Computer Science and Engineering
CS 2255 — DATABASE MANAGEMENT SYSTEMS
(Common to Information Technology)
(Regulation 2008)
Time : Three hours Maximum : 100 marks
Answer ALL questions
PART A — (10 × 2 = 20 marks)
1. Who is a DBA? What are the responsibilities of a DBA?
2. What is a data model? List the types of data models used.
3. What is embedded SQL? What are its advantages?
4. What is the difference between tuple relational calculus and domain relational
calculus?
5. What is meant by lossless-join decomposition?
6. A relation { } D C B A R , , , = has FD’s { } A D D C C AB F →→→ = , , . Is R is
in 3NF?
7. What are the ACID properties?
8. What are two pitfalls (problems) of lock-based protocols?
9. What are the advantages and disadvantages of indexed sequential file?
10. What is database tuning?
PART B — (5 × 16 = 80 marks)
11. (a) (i) With a neat diagram, explain the structure of a DBMS. (9)
(ii) Draw an E-R diagram for a small marketing company database,
assuming your own data requirements. (7)
Or
(b) (i) Compare the features of file system with database system. (8)
(ii) Explain the differences between physical level, conceptual level and
view level of data abstraction. (4)
(iii) Mention any four major responsibilities of DBA. (4)
12. (a) (i) Consider the following relational database
employee (employee-name, street, city)
works ( employee-name, company-name, salary)
company (company-name, city)
manages (employee-name, manager-name)
Give an expression in SQL to express each of the following queries :
Find the names and cities of residence of all employees who work
for XYZ Bank. Find the names, street address, and cities of
residence of all employees who work for XYZ Bank and earn more
than Rs. 10,000 per annum.
Find the names of all employees in this database who live in the
same city as the company for which they work.
Find the names of all employees who live in the same city and on
the same street as do their managers. (4 × 3 = 12)
(ii) Define the term distributed database management system and
mention the issues to be considered in the design of the same. (4)
Or
(b) (i) What are the relational algebra operations supported in SQL?
Write the SQL statement for each operation. (12)
(ii) What is data integrity? Explain the types of integrity constraints.
(4)
 13. (a) (i) Explain 1NF, 2NF, 3NF and BCNF with suitable example. (8)
(ii) Consider the universal relation { } I H G F E D C B A R , , , , , , , , =
and the set of functional dependencies
( ) { } { } { } { } { } F B E D A C B A F →→→ = , , , , { , { } { } { } { }} , , , J I D H G F →→ .
What is the key for R? Decompose R into 2NF, then 3NF relations.
(8)
Or
(b) What are the pitfalls in relational database design? With a suitable
example, explain the role of functional dependency in the process of
normalization. (16)
14. (a) (i) Explain about immediate update and deferred update recovery
techniques. (8)
(ii) Explain the concepts of serializability. (8)
Or
(b) (i) Explain Two-phase locking protocol. (8)
(ii) Describe about the deadlock prevention schemes. (8)
15. (a) (i) List the different levels in RAID technology and explain its
features. (12)
(ii) Describe the different methods of implementing variable length
records. (4)
Or
(b) (i) Explain the various indexing schemes used in database
environment. (12)
(ii) Let relations ( ) C B A r , , 1 and ( ) E D C r , , 2 have the following
properties : 1 r has 20,000 tuples, r2 has 45,000 tuples, 25 tuples of
r1 fit on one block, and 30 tuples of r2 fit on one block. Estimate the
number of block accesses required, using each of the following join
strategies for r1 r2 : (4)
(1) Nested-loop join with r1 as outer relation
(2) Block nested-loop join with r1 as outer relation
(3) Merge join if r1 and r2 are initially sorted
(4) Hash join (assuming that no overflow occurs).