Monday 9 January 2017

mit4033 smu msc it fall 2016 (jan/feb 2017 exam) IVth sem assignment

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412

PROGRAM
Master of Science in Information Technology (MSc IT)
SEMESTER
FOURTH
SUBJECT CODE & NAME
MIT4033- Wireless and Mobile Communication
Qus:1 Write a short note on different generations of wireless network.
Answer: The wireless communication network has undergone lot of evolution from the day of its introduction. To study these history and evolution it is categories as different generations. Every generation carries the features that are available and supported by electronic devices of

Qus:2 Describe the concepts of followings:
(a) cell splitting
(b) frequency reuse in cellular networks
Answer: (a)cell splitting
This method to increase the capacity of users is used in a network when the size of each cell is same and the density of users on different. If the size of the cell is large, then the transmitted radio wave must be of higher energy (called strength of the signal) to reach the border of the cell


Qus:3 Describe BSC and MSC protocols.
Answer: BSC protocols Once the information is communicated from the BTS to the BSC, the Abisinterface is used to communicate further the information between the BT Sand BSC. At this level, the radio resources at the lower portion of Layer 3are handled by the Base Transceiver Station Management (BTSM) protocol rather than the RR protocol. The BTSM layer acts as a

Qus:4 List and explain the different methods of speech coding.
Answer: There are three different speech coding methods. They are:
a) Waveform coding
b) Source coding and
c) Hybrid coding
a) Waveform coding
This approximates the speech signal as waveform. In this class of coding, the objective is to minimize a criterion which measures the dissimilarity between the original and the reconstructed

Qus:5 Explain the following with context to GSM security:
a) A5 algorithm for encryption
b) A8 algorithm for key generation
Answer: GSM encryption is the means by which phone conversations on networks using GSM are scrambled, such that they cannot be descrambled and intercepted by others.
Basically 3

Qus:6What is Wimax? Discuss it’s architecture with suitable diagram.
Answer: WiMAX, which stands for worldwide Interoperability for Microwave Access, was designed by the WiMAX forum and standardized as IEEE 802.16.
WiMAX are being classified as a metropolitan area network (MAN). WiMAX is a telecommunications protocol that provides fixed and mobile Internet access. Two version of WiMAX are as

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412



1 comment:

  1. This is by far the worst blog I've stumbled upon this evening.

    ReplyDelete