MCA5032- WIRELESS AND MOBILE COMMUNICATION

Dear students get fully solved  assignments
Send your semester & Specialization name to our mail id :

“ help.mbaassignments@gmail.com ”
or
Call us at : 08263069601


ASSIGNMENT
PROGRAM
MCA(REVISED FALL 2012)
SEMESTER
V
SUBJECT CODE & NAME
MCA5032- WIRELESS AND MOBILE COMMUNICATION
CREDIT
4
BK ID

MAX.MARKS
60

Note: Answer all questions. Kindly note that answers for 10 marks questions should be approximately of 400 words. Each question is followed by evaluation scheme.

Q.1 Describe about Wireless Communication. Explain its advantages.
Answer: - Wireless communication is the transfer of information between two or more points that are not connected by an electrical conductor. The most common wireless technologies use radio. With radio waves distances can be short, such as a few meters for television or as far as thousands or even millions of kilometers for deep-space radio communications. It encompasses various types of fixed, mobile, and portable applications, including two-way radios, cellular telephones, personal digital assistants (PDAs), and wireless networking. Other examples of

Q2. Describe the concepts of cell splitting and frequency reuse in cellular networks.
Answer: The concept of Cell Splitting is quite self explanatory by its name itself. Cell splitting means to split up cells into smaller cells. The process of cell splitting is used to expand the capacity (number of channels) of a mobile communication system. As a network grows, a quite large number of mobile users in an area come into picture. Consider the following scenario.
There are 100 people in a specific area. All of them owns a mobile phone (MS) and are quite comfortable to communicate with each other. So, a provision for all of them to mutually communicate must be made. As there are only 100 users, a single base station (BS) is built in the middle of the area and all these users’ MS are connected to it. All these 100 users now come under the coverage area of a single base station. This coverage area is called a cell. This is shown

Q.3 Differentiate between BSC and MSC protocols
Answer: - BSC Protocols: After the information is passed from the BTS to the BSC, a different set of interfaces is used. The Abis interface is used between the BTS and BSC. At this level, the radio resources at the lower portion of Layer 3 are changed from the RR to the Base Transceiver Station Management (BTSM). The BTS management layer is a relay function at the BTS to the BSC.
The RR protocols are responsible for the allocation and reallocation of traffic channels between the MS and the BTS. These services include controlling the initial access to the system, paging for MT calls, the handover of calls between cell sites, power control, and call termination. The RR protocols provide the procedures for the use, allocation, reallocation, and release of the GSM channels. The BSC still has some radio resource management in place for the frequency coordination, frequency allocation, and the management of the overall network layer for the Layer 2


Q.4 What is CDMA? Explain the history of CDMA.
Answer: - CDMA:- Code division multiple access (CDMA) is a channel access method  used by various radio  communication technologies.CDMA is an example of multiple access , which is where several transmitters can send information simultaneously over a single communication channel. This allows several users to share a band of frequencies (see bandwidth). To permit this to be achieved without undue interference between the users, CDMA employs spread-spectrum  technology and a special coding scheme (where each transmitter is assigned a code).
CDMA (Code Division Multiple Access) CDMA takes an entirely different approach from GSM/TDMA. CDMA spreads data out over the channel after the

Q.5 Explain the following:
a) A5 algorithm for encryption
b) A8 algorithm for key generation
Answer: - A5 algorithm for encryption:-A5 is used in Europe and the United States. A5was a deliberate weakening of the algorithm for certain export regions.  A5 was developed in 1987, when GSM was not yet considered for use outside Europe, and A5 was developed in 1989. Though both were initially kept secret, the general design was leaked in 1994 and the algorithms were entirely reverse engineered in 1999 by Marc Briceno from a GSM telephone. In 2000, around 130 million GSM customers relied on A5 to protect the confidentiality of their voice

A8 algorithm for key generation
This algorithm is used in conjunction with Ki the authentication key and RAND  (Random Number) to generate Kc  (Cipher Key ). This is used with A5/X  to cipher the data stream between the MS  (Mobile Station ) and the GSM  network. A variety of security algorithms are used to provide authentication, cipher key generation, integrity and radio link privacy to users on mobile networks


Q.6 List and explain the different path loss models
Answer:- Path loss models:- Path loss (or path attenuation) is the reduction in power density (attenuation ) of an electromagnetic wave  as it propagates through space. Path loss is a major component in the analysis and design of the link budget of a telecommunication system.

This term is commonly used in wireless communications and signal  propagation . Path loss may be due to many effects, such as free-space loss , refraction , diffraction , reflection , aperture -medium  coupling loss , and absorption . Path loss is also
Dear students get fully solved  assignments
Send your semester & Specialization name to our mail id :

“ help.mbaassignments@gmail.com ”
or
Call us at : 08263069601


No comments:

Post a Comment

Note: Only a member of this blog may post a comment.