Get fully solved assignment. Buy
online from website
online store
or
plz drop a mail with your sub
code
we will revert you within 2-3
hour or immediate
Charges rs 125/subject
if urgent then
call us on 08791490301, 08273413412
PROGRAM - Master of
Science in Information Technology(MSc IT)Revised Fall 2011
SEMESTER
- 4
SUBJECT CODE &
NAME – Mca5032- WIRELESS AND MOBILE COMMUNICATION
CREDIT - 4
BK ID - B1485
MARKS – 60
Q1. Describe
wireless communication. Explain its advantages.
Answer:
Wireless communication is among technology’s biggest contributions to
mankind. Wireless communication involves the transmission of information over a
distance without help of wires, cables or any other forms of electrical
conductors. The transmitted distance can be anywhere between a few meters (for
example, a
2 Describe any five GSM PLMN basic services.
Answer: 5 GSM PLMN basic services
Dual-Tone multifrequency (DTMF): The automatic
answering machines used in wireless telephone network needs a controlling
mechanism. For this purpose the GSM PLMN uses a tone signalling service called
Dual-Tone Multifrequency. It facilitates subscribers with automatic answering
Q3. Differentiate
BSC and MSC protocols. 10
Ans:
BSC protocols: Once the information is
communicated from the BTS to the BSC, the Abis
interface is used to communicate
further the information between the BTS and BSC. At this level, the radio
resources at the lower portion of Layer 3 are handled by the Base Transceiver
Station Management (BTSM) protocol rather than the RR protocol. The BTSM layer acts
as a relay function at the BTS to communicate to the BSC
Q4. What is CDMA?
Explain the history of CDMA. 4+6 = 10
Ans: CDMA : we will be
introduced to the concept of CDMA, its channel concept and its operation. Code Division
Multiple Access technology emerged as an alternative to the GSM cellular
architecture. Frequency reuse is an important concept in wireless systems,
particularly cellular systems. Propagation losses allow frequency bands to be
reused in geographically separated locations. Code Division Multiple Access (CDMA)
is a cellular technology and it acts an important driving force for wireless
networks around the globe.
Q5. Explain the
following: a) A5 algorithm for encryption b) A8 algorithm for key generation 10
Ans:
A5 Algorithm – An A5 encryption algorithm
scrambles the user's voice and data traffic between the handset and the base
station to provide privacy. An A5 algorithm is implemented in both the handset
and the base station subsystem (BSS). This algorithm is used to encipher and
decipher the data that is being transmitted on the Um interface. The Kc
(ciphering key) and the
plaintext data are
Q6. List and
explain the different path loss models. 10
Ans:
Path Loss Models: Path loss models describe the
signal attenuation between a transmit and a receive antenna as a
function of the propagation distance and other parameters. Some models
include many details of the topography profile to estimate the signal
reduction, whereas others just consider carrier frequency and distance.
Path loss is the reduction in power density of an electromagnetic wave
as it propagates through space. It is a major component in the analysis
and design of the link budget of a telecommunication
Get fully solved assignment. Buy
online from website
online store
or
plz drop a mail with your sub
code
we will revert you within 2-3
hour or immediate
Charges rs 125/subject
if urgent then
call us on 08791490301, 08273413412
No comments:
Post a Comment