Dear
students get fully solved assignments
Send
your semester & Specialization name to our mail id :
“
help.mbaassignments@gmail.com ”
or
Call
us at : 08263069601
ASSIGNMENT
PROGRAM
|
MCA(REVISED FALL 2012)
|
SEMESTER
|
V
|
SUBJECT CODE & NAME
|
MCA5032- WIRELESS AND MOBILE COMMUNICATION
|
CREDIT
|
4
|
BK ID
|
|
MAX.MARKS
|
60
|
Note: Answer all questions. Kindly note that answers
for 10 marks questions should be approximately of 400 words. Each question is
followed by evaluation scheme.
Q.1
Describe about Wireless Communication. Explain its advantages.
Answer:
- Wireless communication is the transfer of
information between two or more points that are not connected by an electrical
conductor. The most common wireless technologies use radio. With radio waves
distances can be short, such as a few meters for television or as far as
thousands or even millions of kilometers for deep-space radio communications.
It encompasses various types of fixed, mobile, and portable applications,
including two-way radios, cellular telephones, personal digital assistants
(PDAs), and wireless networking. Other examples of
Q2.
Describe the concepts of cell splitting and frequency reuse in cellular
networks.
Answer: The concept of Cell Splitting is
quite self explanatory by its name itself. Cell splitting means to split up
cells into smaller cells. The process of cell splitting is used to expand the
capacity (number of channels) of a mobile communication system. As a network
grows, a quite large number of mobile users in an area come into picture.
Consider the following scenario.
There are 100 people in a specific area.
All of them owns a mobile phone (MS) and are quite comfortable to communicate
with each other. So, a provision for all of them to mutually communicate must
be made. As there are only 100 users, a single base station (BS) is built in
the middle of the area and all these users’ MS are connected to it. All these
100 users now come under the coverage area of a single base station. This
coverage area is called a cell. This is shown
Q.3
Differentiate between BSC and MSC protocols
Answer:
- BSC Protocols: After the information is passed
from the BTS to the BSC, a different set of interfaces is used. The Abis
interface is used between the BTS and BSC. At this level, the radio resources
at the lower portion of Layer 3 are changed from the RR to the Base Transceiver
Station Management (BTSM). The BTS management layer is a relay function at the
BTS to the BSC.
The RR protocols are responsible for the
allocation and reallocation of traffic channels between the MS and the BTS. These
services include controlling the initial access to the system, paging for MT
calls, the handover of calls between cell sites, power control, and call
termination. The RR protocols provide the procedures for the use, allocation,
reallocation, and release of the GSM channels. The BSC still has some radio
resource management in place for the frequency coordination, frequency
allocation, and the management of the overall network layer for the Layer 2
Q.4
What is CDMA? Explain the history of CDMA.
Answer:
- CDMA:- Code division multiple access (CDMA) is a
channel access method used by various
radio communication technologies.CDMA is
an example of multiple access , which is where several transmitters can send
information simultaneously over a single communication channel. This allows
several users to share a band of frequencies (see bandwidth). To permit this to
be achieved without undue interference between the users, CDMA employs
spread-spectrum technology and a special
coding scheme (where each transmitter is assigned a code).
CDMA (Code Division Multiple Access) CDMA
takes an entirely different approach from GSM/TDMA. CDMA spreads data out over
the channel after the
Q.5
Explain the following:
a)
A5 algorithm for encryption
b)
A8 algorithm for key generation
Answer:
- A5 algorithm for encryption:-A5 is used in Europe
and the United States. A5was a deliberate weakening of the algorithm for
certain export regions. A5 was developed
in 1987, when GSM was not yet considered for use outside Europe, and A5 was
developed in 1989. Though both were initially kept secret, the general design
was leaked in 1994 and the algorithms were entirely reverse engineered in 1999
by Marc Briceno from a GSM telephone. In 2000, around 130 million GSM customers
relied on A5 to protect the confidentiality of their voice
A8
algorithm for key generation
This algorithm is used in conjunction with
Ki the authentication key and RAND
(Random Number) to generate Kc
(Cipher Key ). This is used with A5/X
to cipher the data stream between the MS
(Mobile Station ) and the GSM
network. A variety of security algorithms are used to provide
authentication, cipher key generation, integrity and radio link privacy to
users on mobile networks
Q.6
List and explain the different path loss models
Answer:-
Path loss models:- Path loss (or path attenuation)
is the reduction in power density (attenuation ) of an electromagnetic
wave as it propagates through space.
Path loss is a major component in the analysis and design of the link budget of
a telecommunication system.
This term is commonly used in wireless
communications and signal propagation .
Path loss may be due to many effects, such as free-space loss , refraction ,
diffraction , reflection , aperture -medium
coupling loss , and absorption . Path loss is also
Dear
students get fully solved assignments
Send
your semester & Specialization name to our mail id :
“
help.mbaassignments@gmail.com ”
or
Call
us at : 08263069601
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.