This document contains the answer key for a continuous assessment test on mobile communication and IoT for Kongu Engineering College. It includes 14 multiple choice and descriptive questions covering topics like radio frequency ranges, signal representation tools, antenna types, cellular network technologies and standards, Bluetooth networking, and the IEEE 802.11 protocol architecture.
Design and Implementation of Bluetooth MAC core with RFCOMM on FPGAAneesh Raveendran
The System-on-Chip (SoC) design of digital circuits makes the technology to be reusable. The current paper describes an aspect of design and implementation of IEEE 802.15.1 (Bluetooth) protocol on Field Programmable Gate Array (FPGA) based SoC. The Bluetooth is a wireless technology designed as a short-range connectivity solution for personal, portable and handheld electronic devices.
This design aims on Bluetooth technology with serial
communication (RS-232) profile at the application layer.
The IP core consists of Bluetooth Medium Access Control
(MAC) and Universal Asynchronous Receiver/Transmitter
(UART). Each module of the design is described and
developed with hardware description language-Very High
Speed Integrated Circuit Hardware Description Language
(VHDL). The final version of SoC is implemented and
tested with ALTERA STRATIX II EP2S15672C3 FPGA.
Design and Implementation of Bluetooth MAC core with RFCOMM on FPGAAneesh Raveendran
The System-on-Chip (SoC) design of digital circuits makes the technology to be reusable. The current paper describes an aspect of design and implementation of IEEE 802.15.1 (Bluetooth) protocol on Field Programmable Gate Array (FPGA) based SoC. The Bluetooth is a wireless technology designed as a short-range connectivity solution for personal, portable and handheld electronic devices.
This design aims on Bluetooth technology with serial
communication (RS-232) profile at the application layer.
The IP core consists of Bluetooth Medium Access Control
(MAC) and Universal Asynchronous Receiver/Transmitter
(UART). Each module of the design is described and
developed with hardware description language-Very High
Speed Integrated Circuit Hardware Description Language
(VHDL). The final version of SoC is implemented and
tested with ALTERA STRATIX II EP2S15672C3 FPGA.
NetSim Webinar on Cognitive Radio NetworksSANJAY ANAND
Why use a Network Simulator for research ?
Introduction to NetSim
Cognitive Radio Basics
Designing Cognitive Radio networks using NetSim
Modifying Cognitive Radio source C code in NetSim
How to develop custom metrics?
Q & A
Comparative study of various voip applications in 802.11 a wireless network s...ijmnct
Today, Voice over Wireless Local Area Network (VOWLAN) is the most accepted Internet application.
There are a large number of literatures regarding the performance of various WLAN networks. Most of
them focus on simulations and modeling, but there are also some experiments with real networks. This
paper explains the comparison of performance of two different VOIP (Voice over Internet Protocol)
applications over the same IEEE 802.11a wireless network. Radio link standard 802.11a have maximum
transmission rate of 54Mbps. First protocol is session initiation protocol (SIP) and second is H.323
protocol. First one has an agent called SIP proxy. Second have a gateway reflects the characteristics of a
Switched Circuit Network (SCN). With this comparison we have required to obtain a better understanding
of wireless network suitability for voice communication in IP network.
Indian Railway Industrial Training in Signal and Telecommunicationaayushshr18
Indian Railway Industrial Training provides practical knowledge and hands-on experience to individuals aspiring to work in the railway sector. The program covers various aspects of railway operations, maintenance, and technology, offering insights into locomotives, signaling systems, and safety protocols. Participants gain expertise in troubleshooting, repair, and maintenance of railway equipment, enhancing their technical skills. This comprehensive training fosters a deep understanding of the railway industry's intricacies, preparing individuals for careers in railway engineering and management. The program emphasizes safety standards, quality control, and efficiency, aligning with the dynamic and demanding nature of the railway sector.
NetSim Webinar on Cognitive Radio NetworksSANJAY ANAND
Why use a Network Simulator for research ?
Introduction to NetSim
Cognitive Radio Basics
Designing Cognitive Radio networks using NetSim
Modifying Cognitive Radio source C code in NetSim
How to develop custom metrics?
Q & A
Comparative study of various voip applications in 802.11 a wireless network s...ijmnct
Today, Voice over Wireless Local Area Network (VOWLAN) is the most accepted Internet application.
There are a large number of literatures regarding the performance of various WLAN networks. Most of
them focus on simulations and modeling, but there are also some experiments with real networks. This
paper explains the comparison of performance of two different VOIP (Voice over Internet Protocol)
applications over the same IEEE 802.11a wireless network. Radio link standard 802.11a have maximum
transmission rate of 54Mbps. First protocol is session initiation protocol (SIP) and second is H.323
protocol. First one has an agent called SIP proxy. Second have a gateway reflects the characteristics of a
Switched Circuit Network (SCN). With this comparison we have required to obtain a better understanding
of wireless network suitability for voice communication in IP network.
Indian Railway Industrial Training in Signal and Telecommunicationaayushshr18
Indian Railway Industrial Training provides practical knowledge and hands-on experience to individuals aspiring to work in the railway sector. The program covers various aspects of railway operations, maintenance, and technology, offering insights into locomotives, signaling systems, and safety protocols. Participants gain expertise in troubleshooting, repair, and maintenance of railway equipment, enhancing their technical skills. This comprehensive training fosters a deep understanding of the railway industry's intricacies, preparing individuals for careers in railway engineering and management. The program emphasizes safety standards, quality control, and efficiency, aligning with the dynamic and demanding nature of the railway sector.
This PPT is very much useful for practitioners who are all making products and services to society. Mangers think innovatively and come up with innovative ideas. It is a 5 stage processing also called a design thinking process. The stages are empathize, define, ideate, prototype and test.
HEAP SORT ILLUSTRATED WITH HEAPIFY, BUILD HEAP FOR DYNAMIC ARRAYS.
Heap sort is a comparison-based sorting technique based on Binary Heap data structure. It is similar to the selection sort where we first find the minimum element and place the minimum element at the beginning. Repeat the same process for the remaining elements.
Understanding Inductive Bias in Machine LearningSUTEJAS
This presentation explores the concept of inductive bias in machine learning. It explains how algorithms come with built-in assumptions and preferences that guide the learning process. You'll learn about the different types of inductive bias and how they can impact the performance and generalizability of machine learning models.
The presentation also covers the positive and negative aspects of inductive bias, along with strategies for mitigating potential drawbacks. We'll explore examples of how bias manifests in algorithms like neural networks and decision trees.
By understanding inductive bias, you can gain valuable insights into how machine learning models work and make informed decisions when building and deploying them.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Forklift Classes Overview by Intella PartsIntella Parts
Discover the different forklift classes and their specific applications. Learn how to choose the right forklift for your needs to ensure safety, efficiency, and compliance in your operations.
For more technical information, visit our website https://intellaparts.com
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERSveerababupersonal22
It consists of cw radar and fmcw radar ,range measurement,if amplifier and fmcw altimeterThe CW radar operates using continuous wave transmission, while the FMCW radar employs frequency-modulated continuous wave technology. Range measurement is a crucial aspect of radar systems, providing information about the distance to a target. The IF amplifier plays a key role in signal processing, amplifying intermediate frequency signals for further analysis. The FMCW altimeter utilizes frequency-modulated continuous wave technology to accurately measure altitude above a reference point.
1. KONGU ENGINEERING COLLEGE, PERUNDURAI 638 060
CONTINUOUS ASSESSMENT TEST 1
18CST63 - Mobile Communication and IoT
Answer Key
1. Identify the radio frequency range used by RADAR systems.
30 – 300 GHz (2mark)
2. List the representation of signals and its tools (2 mark)
Time domain - Oscilloscope
Frequency domain – Spectrum Analyzer
Phase domain - Oscilloscope
3. Write the type of antenna used by the following devices (4*0.5 = 2 mark)
a. Laptop – Omnidirectional antenna
b. Smart phone – Smart antenna
c. Satellite – Multi element antennal array
d. Direct to Home – Directional antenna
4. Give the maximum data rate of GSM and GPRS systems (2*1 = 2 mark)
GSM – 9.6 Kpbs
GPRS – 150 to 170 Kpbs
5. 5
.
Differentiate IMEI and IMSI in GSM network (2*1 = 2 mark)
International Mobile Equipment Identity (IMEI) – unique code to identify GSM
device
International Mobile Subscriber Identity (IMSI) – unique code to identify mobile
subscriber in the network globally.
6. What is use of white list, gray list and black list in Equipment Identity Register? ( 2 mark)
list of valid IMEIs (white list)
list of malfunctioning devices (gray list)
list of illegal devices (black list)
To prevent the theft of mobile device
7. Apply the suitable link that must be established for the given usecases (2*1 = 2 mark)
a. Communication between Earth Observation Satellite (EOS)-3 and EOS-4 – Inter
Satellite Link (ISL)
b. Communication between EOS-3 to Base station of ISRO – Gateway Link (GWL)
8. Give the operating frequency of Bluetooth and define piconet. (2*1 = 2 mark)
Frequency - 2.4 GHz ISM band
A piconet is a collection of Bluetooth devices which are synchronized to the same
hopping sequence
9. Identify the cellular generation of the following technologies (4*0.5 = 2 mark)
a. EDGE – 3G
b. GPRS – 2.5 G
2. 2
c. GSM – 2G
d. LTE – 4G
10. Define Internet of Things. (2 mark)
A dynamic global network infrastructure with self-configuring capabilities based on
standard and interoperable communication protocols where physical and virtual things have
identities, physical attributes and virtual personalities and use intelligent interfaces, and
are seamlessly integrated into the information network, often communicate data associated
with users and their environments
11. Assume there is a theft of the mobile phone and the user requests the service
provider to trace the location of the device. Provide a suitable architecture with the
essential subsystems of the GSM network to satisfy the user request. Also sketch the
flow of the signalling information in the proposed architecture.
GSM Subsystems
1. Radio Subsystem (RSS)
2. Network and Switching Subsystem (NSS)
3. Operation Subsystem (OSS)
5 mark
2 mark
3. 3
OSS Entities
Operation and Maintenance Center (OMC)
Authentication Center (AuC)
Equipment Identity Register (EIR)
Authentication Center (AuC)
o To protect user identity and data transmission
o Contains algorithm for authentication
o Keys for encryption and generate values for user authentication in HLR
o AuC present in special protected part of HLR
Equipment Identity Register (EIR)
o EIR – database of all IMEIs
o with valid SIM, anyone could use the stolen MS
o The EIR has a blacklist of stolen (or locked) devices
o In theory an MS is useless as soon as the owner has reported a theft.
Unfortunately, the blacklists of different providers are not usually
synchronized and the illegal use of a device in another operator’s network is
possible
o The EIR also contains a list of valid IMEIs (white list), and a list of
malfunctioning devices (gray list).
2 mark
1 mark
12. Sketch IEEE 802.11 protocol architecture and explain physical and MAC layers
1. Infrastructure based network
2. Adhoc based network
Infrastructure based network
Communication takes place only between the wireless node and the access point,
but not directly between the wireless nodes
Access point – control medium access, bridge to other wireless or wired networks
Several wireless networks – form one logical wireless network- access point
together with fixed network in between can connect several wireless networks –
form larger network – more radio coverage
Adhoc network
2 mark
3 mark
4. 4
Do not need infrastructure
Each node can communicate directly with other nodes
No access point – no medium access control
Nodes within ad-hoc network – communicate only – if they can reach each
other physically – within each other’s radio coverage
IEEE 802.11 – covers the physical layer PHY and medium access layer MAC
PHY – divided into
• Physical Layer Convergence Protocol (PLCP)
• Physical Medium Dependent (PMD)
MAC – medium access, fragmentation of user data, encryption
PLCP – provides carrier sense signal – Clear Channel Assessment (CCA) –
provides PHY Service Access Point (SAP)
PMD – modulation and encoding / decoding of signals
MAC Management
association and re-association of a station to access point
roaming between different access points
controls authentication, encryption, synchronization
Power management
3 mark
2 mark
13. Consider DFWMAC – DCF with RTS / CTS extension with DIFS time of 10 ms and
SIFS time of 2 ms. In order to reduce error rate, fragmentation mode is applied.
Assume three stations A, B and C are in the scenario, in which B can reach
both A and C, whereas A and C are not reachable to each other.
The transmission medium allows packet size of 1500 Bytes
The data to be transmitted is 2500 Bytes
Each Byte will take transmission time of 0.01 ms
RTS, CTS and ACK packet will take 3 ms in timeline
Station A sends data to B
Calculate the time period (ms) for the given scenarios
a. How long will the data transmission take place? – 57 ms
b. What is the duration of NAV (frag1)? – 22 ms
c. Give the total number of SIFS packet used in the entire transmission - 5
d. At what time the first fragment reaches the receiver? – 35 ms
When does the station A receives the acknowledgement for frag2? – 57 ms
5 * 1 = 5
mark
5. 5
e.
5 mark
14. Explain the networking of the Bluetooth devices and associated state transitions
Bluetooth operates in the 2.4 GHz ISM band
• Bluetooth operates on 79 channels in the 2.4 GHz band with 1 MHz
carrier spacing
• Each device performs frequency hopping with 1,600 hops/s in a pseudo
random fashion
• Bluetooth applies FHSS for interference mitigation
• A piconet is a collection of Bluetooth devices which are synchronized to
the same hopping sequence
• One device in the piconet can act as master (M), all other devices
connected to the master must act as slaves (S)
• The master determines the hopping pattern in the piconet and the slaves
have to synchronize to this pattern
• Each piconet has a unique hopping pattern. If a device wants to
participate it has to synchronize to this
2 mark
6. 6
Two additional types of device
Parked devices (P)
Stand-by (SB)
• Parked devices - can not actively participate in the piconet (i.e., they do
not have a connection), but are known and can be reactivated within
some milliseconds
• Stand-by devices - do not participate in the piconet
• Each piconet has exactly one master and up to seven simultaneous slaves
• More than 200 devices can be parked. The reason for the upper limit of
eight active devices, is the 3-bit address used in Bluetooth
• If a parked device wants to communicate and there are already seven
active slaves, one slave has to switch to park mode to allow the parked
device to switch to active mode
Formation of Piconet
• All active devices have to use the same hopping sequence they must be
synchronized
• Master sends its clock and device ID
• All Bluetooth devices have the same networking capabilities, i.e., they
can be master or slave - there is no distinction between terminals and
base stations, any two or more devices can form a piconet
• The unit establishing the piconet automatically becomes the master, all
other devices will be slaves
• The hopping pattern is determined by the device ID, a 48-bit worldwide
unique identifier
• The phase in the hopping pattern is determined by the master’s clock
• After adjusting the internal clock according to the master a device may
participate in the piconet
• All active devices are assigned a 3-bit active member address (AMA)
• All parked devices use an 8-bit parked member address (PMA)
• Devices in stand-by do not need an address
States of Bluetooth devices
3 mark
2 mark
3 mark