Friday 29 January 2016

mit4033 smu msc it Fall 2015 IVth sem assignment

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412

PROGRAM - Master of Science in Information Technology(MSc IT)Revised Fall 2011
                                                                 SEMESTER - 4
SUBJECT CODE & NAME - MIT4033- WIRELESS AND MOBILE COMMUNICATION
CREDIT - 4
BK ID - B1485
MARKS – 60

Q1. List down various features, advantages, disadvantages of a 4G network. 10
Ans: Fourth Generation or 4G: A 4G system is expected to provide a communication technology based on Internet Protocol. Internet protocol or IP is generally used in the computer
networks for data communication among computers. All the devices are identified by a number called IP number. In 4G network this concept is extended to telephony with an intention to make data and voice communication integrated in the same architecture


Q2. Describe any five GSM PLMN basic services. 10
Ans: GSM PLMN Services: GSM PLMN is the technology that enables communication among PSTN and mobile devices. It offers a number of services to their subscribers. Various services offered by GSM PLMN are classified under two categories. The first category is called telephony service (or teleservices), that facilitate subscribers to communicate with other subscribers using the telephony services. The second category of service is called data services (or bearer services) which provide the facility to transmit appropriate data signals to


Q3. Differentiate BSC and MSC protocols. 10
Ans: BSC protocols: Once the information is communicated from the BTS to the BSC, the Abis
interface is used to communicate further the information between the BTS and BSC. At this level, the radio resources at the lower portion of Layer 3 are handled by the Base Transceiver Station Management (BTSM) protocol rather than the


Q4. What is CDMA? Explain the history of CDMA. 4+6 = 10
Ans: CDMA : we will be introduced to the concept of CDMA, its channel concept and its operation. Code Division Multiple Access technology emerged as an alternative to the GSM cellular architecture. Frequency reuse is an important concept in wireless systems, particularly cellular systems. Propagation losses allow frequency bands to


Q5. Explain the following: a) A5 algorithm for encryption b) A8 algorithm for key generation 10
Ans: A5 Algorithm – An A5 encryption algorithm scrambles the user's voice and data traffic between the handset and the base station to provide privacy. An A5 algorithm is implemented in both the handset and the base station subsystem (BSS). This algorithm is used to encipher and decipher the data that is being transmitted on the Um interface. The Kc (ciphering key) and the
plaintext data are inputted into the A5 algorithm and the output is enciphered data. The A5 algorithm is a function of the Mobile Equipment (ME) and not a function of the SIM card. The BTS also makes use of the A5

Q6. List and explain the different path loss models. 10
Ans: Path Loss Models: Path loss models describe the signal attenuation between a transmit and a receive antenna as a function of the propagation distance and other parameters. Some models include many details of the topography profile to estimate the signal reduction, whereas others just consider carrier frequency and distance. Path loss is the reduction in power density of an electromagnetic wave as it propagates through space

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412



No comments:

Post a Comment