Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs
125/subject
if urgent then call us on 08791490301, 08273413412
PROGRAM - Master of
Science in Information Technology(MSc IT)Revised Fall 2011
SEMESTER
- 4
SUBJECT CODE &
NAME - MIT4033- WIRELESS AND MOBILE COMMUNICATION
CREDIT - 4
BK ID - B1485
MARKS – 60
Q1. List down
various features, advantages, disadvantages of a 4G network. 10
Ans: Fourth Generation or 4G: A 4G system is expected to
provide a communication technology based on Internet Protocol. Internet
protocol or IP is generally used in the computer
networks for data communication
among computers. All the devices are identified by a number called IP number.
In 4G network this concept is extended to telephony with an intention to make
data and voice communication integrated in the same architecture
Q2. Describe any
five GSM PLMN basic services. 10
Ans:
GSM PLMN Services: GSM PLMN is the technology that
enables communication among PSTN and mobile devices. It offers a number
of services to their subscribers. Various services offered by GSM PLMN
are classified under two categories. The first category is called
telephony service (or teleservices), that facilitate subscribers to
communicate with other subscribers using the telephony services. The
second category of service is called data services (or bearer services)
which provide the facility to transmit appropriate data signals to
Q3. Differentiate
BSC and MSC protocols. 10
Ans:
BSC protocols: Once the information is
communicated from the BTS to the BSC, the Abis
interface is used to communicate
further the information between the BTS and BSC. At this level, the radio
resources at the lower portion of Layer 3 are handled by the Base Transceiver
Station Management (BTSM) protocol rather than the
Q4. What is CDMA?
Explain the history of CDMA. 4+6 = 10
Ans: CDMA : we will be
introduced to the concept of CDMA, its channel concept and its operation. Code
Division Multiple Access technology emerged as an alternative to the GSM
cellular architecture. Frequency reuse is an important concept in wireless
systems, particularly cellular systems. Propagation losses allow frequency
bands to
Q5. Explain the
following: a) A5 algorithm for encryption b) A8 algorithm for key generation 10
Ans:
A5 Algorithm – An A5 encryption algorithm
scrambles the user's voice and data traffic between the handset and the base
station to provide privacy. An A5 algorithm is implemented in both the handset
and the base station subsystem (BSS). This algorithm is used to encipher and
decipher the data that is being transmitted on the Um interface. The Kc
(ciphering key) and the
plaintext data are inputted into
the A5 algorithm and the output is enciphered data. The A5 algorithm is a function
of the Mobile Equipment (ME) and not a function of the SIM card. The BTS also
makes use of the A5
Q6. List and
explain the different path loss models. 10
Ans:
Path Loss Models: Path loss models describe the
signal attenuation between a transmit and a receive antenna as a
function of the propagation distance and other parameters. Some models
include many details of the topography profile to estimate the signal
reduction, whereas others just consider carrier frequency and distance.
Path loss is the reduction in power density of an electromagnetic wave
as it propagates through space
Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs
125/subject
if urgent then call us on 08791490301, 08273413412
No comments:
Post a Comment